[0001] the application requires the priority of No. 60/622,137, the U.S. Provisional Patent Application submitted on October 26th, 2004, and the name of this application is called " A Method and System forAffecting the Utility of a Target "; The application requires the priority of No. 60/633,971, the U.S. Provisional Patent Application submitted on December 7th, 2004, and the name of this application is called " AMethod and Means of RF Activation of a Target "; The application requires the U.S. Provisional Patent Application 60/654 of submission on February 18th, 2005, No. 384 priority, the name of this application is called " A Method and Means of RF Activation of a Target ", and these three pieces of patent applications all add the application with way of reference.
Embodiment
[0060] with reference to figure 1, expression is used for the system of controlling object effectiveness.Cooperate 12 pairs of systems 10 of object of each point in the distribution chain to describe.Object 12 can be such as computer, TV, instrument, MP3 player, the electronic installation of camera, game machine or toy and so on.In another example, object can be a tangible medium, such as being CD, DVD, CD or recreation cassette tape.Object 12 just has the change implement device when producing or prepare.The change implement device is used for the available effectiveness of controlling object or the use of object.More specifically, the change implement device can have a plurality of states, and each state corresponds respectively to the upstate of object utility.In concrete an application, the change implement device can switch between two upstates of effectiveness.[0061] shown in square frame 12a, when object entered distribution chain, this object was configured to have a kind of effectiveness.For example, this effectiveness may be subjected to strict restriction, and object does not have available function.In another example, also might be that the effectiveness that is provided with only allows certain demonstration effectiveness.Be understandable that concrete effectiveness can be provided with respectively according to the needs of distribution chain.For example, distribution chain certain a bit, when object is transferred to client, may need to change the effectiveness that object can be used.Correspondingly, square frame 12b be have an active device 16 object in the point of sale or the situation of other transmission points 14.Because object is near active device 16, so active device or other reading devices can read identifier value or other signs from object.Utilize this identifier, active device just can produce or obtain authorization key.This authorization key may be stored in point-of-sale terminals 14 places with regard to this locality, also can connect by network and obtain from network operation center or other remote servers.Point-of-sale terminals 14 is connected with operation center 18.Operation center can be in same device with point-of-sale terminals 14, perhaps is in other devices of other positions.Can also there be a plurality of computer servers in operation center 18, and by network system distribution process and database.Operation center's 18 stored one group id and corresponding authorization key 21.In another example, operation center's 18 operative algorithm processes are to produce corresponding to the key from active device 16 received information.No matter be to produce or obtain key, operation center 18 all can send to the authorization key of object point-of-sale terminals 14, and at point-of-sale terminals 14, this key is effective to active device 16.
[0062] 14 places in the point of sale, point-of-sale terminals is typically connected to active device, can carry out various other prerequisite tasks or process, with the decision authorized effectiveness of changing object whether.For example, point-of-sale terminals can be used for confirming to be used for the payment of object, or confirms that the client's of some special objects of purchase age also satisfies condition.Shown insquare frame 12c, can change object utility if point of sale device is authorized,active device 16 sends to this object with authorization key so.In an example,active device 16 can read ID and authorization key is sent to object from object by RF (radio frequency) communication.Be understandable that, also can adopt the communication of other types.For example, can carry out unidirectional or two-way communication by infrared (IR) communication.In another example, object also can contact with active device physics to realize communication.
[0063] shown insquare frame 12d, the authorization key that the object utilization receives is changed its inner change implement device state to the another one state.Under this another state, the effectiveness of object is with different in the effectiveness when the change implement device is in first state.Object has the logic that is connected in the change implement device, and described change implement device is used for the use authority key and changes object utility.For example, during production process, define a limited accass key, and this key is stored in the object.Can't read, change or destroy this limited accass key from the outside, but can read by the logic of object or other processing.This limited accass key and the authorization key that receives are contrasted or be used, just can determine whether can change object utility.
[0064] in the instantiation ofsystem 10, object 12 is expressed as the MP3 player.Produce during the MP3 object apparatus, the limited accass key is stored in the MP3 player.In addition, the change implement device is installed also in the MP3 player, this device is arranged to limit the state of the effectiveness of MP3 player.More specifically, first state of change implement device is set to the MP3 player and can't powers up or cisco unity malfunction, and second state then is set to allow the MP3 player available fully.For example, the change implement device may be the printed circuit board trace of ground connection.The ground connection trace may be connected on the pin of MP3 processor, as long as this pin ground connection, the MP3 player just can not power up or initialization.Certainly can also realize the switching of MP3 player between each operating state according to the plurality of optional mode and by more changeable more implement device structure.The MP3 player has when producing and changes the power supply that implement device matches, optionally to remove earthed circuit.This power supply can be battery, electromagnetic transducer or radio frequency converter, perhaps obtains electric energy from the working power of MP3 player.
[0065] generated MP3 player and the MP3 player prepare sold as restricted products like this, this moment, the MP3 player can not normal power-up or bring into play its effectiveness.Therefore, the limited MP3 player of effectiveness does not almost have any use for client, unlikely become the object of theft yet.Manufacturer returns addressable identifier of MP3 player.For example, this identifier can be a bar code, or can be by the storage data of the visit of the reading system such as infrared.This identifier and its corresponding key value are grasped by producer, obtain when recovering MP3 player effectiveness to make things convenient for retailer or other authorized parties.The controlled MP3 player of effectiveness will be reduced in the distribution transportation greatly and arrive the risk of having things stolen in retailer's the process.In addition, the retailer also can be in a loose environment displaying merchandise, the MP3 player is presented to client, and needn't too worry the problem of having things stolen.Like this, owing to steal to the limited MP3 player that can't use like this, so also can reduce safety measure such as sales counter with lock or complicated the packing during retail without any meaning.
[0066] when client determines to buy the MP3 player, client can take the MP3 player to point-of-sale terminals 14 places, near active device 16.When the MP3 player when the active device, its addressable ID just can be read out by the mode that active device 16 utilizes barcode value or utilizes mode wireless or that EM (electromagnetism) communicates by letter to obtain the addressable ID that is stored.For example, this communication can be RF (radio frequency) communication.Point-of-sale terminals can carry out network with operation center 18 and be connected, and this addressable ID is sent to operation center.The operation center that stores the database of MP3 player limited accass key correlated identities obtains the authorization key of the MP3 player that is positioned at point of sale device.At point-of-sale terminals 14 places, may also have extra affirmation operation.For example, the salesman of retail shop will be from client's gathering, the identity card and the age that perhaps need to check client.After these other affirmation standard was finished, terminating machine that could firm sale point was got ready for recovery MP3 player effectiveness.Hypothesis activation device 16 thinks and can recover that it sends to the MP3 player in the mode of radio communication with authorization key usually.After the MP3 player is received authorization key, utilize to carry logic relatively this authorization key and the limited accass key that prestores.If two cipher key match, the MP3 player is opened earth connection with regard to the activating power that utilizes it.After earth connection was opened, the MP3 player of opening power had just had whole effectiveness for client.
[0067] in another example, client may buy the MP3 player from online retailer, and the MP3 player is sent client by the mode of shipping or postal delivery.In this case, can recover the effectiveness of MP3 player with other alternative method.A kind of optional method is, online retailer's warehouse or transportation department are equipped with active device, as the part of shipment process, recovers MP3 player effectiveness by retailer's employee.It is controlled that the MP3 player remained effectiveness when another optional method was shipping, but transport together also have active device, recover the effectiveness of MP3 player before delivery or during delivery.Under this method, the deliver goods driver can recover its effectiveness when client receives the MP3 player, therefore can avoid the stolen risk in the whole shipment process.Also have a kind of optional method to be, client has the family expenses active device, and uses this active device to recover the effectiveness of MP3 player.In the in the end this method, MP3 player effectiveness the whole shipment process from manufacturer to the client position all is limited, up to finishing commodity transaction, is just finally recovered the effectiveness of MP3 player by client.
[0068] under some situation, the MP3 player also needs auxiliary circuit and confirms that effectiveness is restored.For example, the state of change implement device be can measure, other tests or measurement perhaps carried out.According to whether successfully activating, in confirming memory, different values is set.Active device 16 can read the affirmation memory, to confirm to activate successfully to client and network operation center.By confirming successful activation, the retailer can have higher customer satisfaction, and can be accurately, in time to the supplier's report and the permission payment of MP3 player.
[0069] with reference to figure 2, expression is used to use the method for effectiveness controlled object.Method 25 expression clients select to buy certain effectiveness controlled object, shown in square frame 26.Client can buy at traditional retail shop, also can be in by online ordering system or mail order.When client selected to buy, object did not also have effectiveness or has only partial utility, did not therefore have what value concerning the thief.Like this, because what benefit the thief can not get, stolen risk will reduce greatly.But, need to recover object utility in some point of sale.So, shown in square frame 28, when the time that is provided with by the retailer, position or incident take place, send authorization key to object.For example, this can finish on the terminating machine of retail point, also can finish on the remote activation device of client's family, perhaps carries out on other positions that the retailer selects.Shown in square frame 32, because object carries logic, change implement device and activating power, therefore can confirm that authorization key is correct, open the change implement device then to recover object utility.As long as object is authorized, the change implement device just can recover its state, makes object have whole effectiveness.Also have another situation to be, the rank that effectiveness is recovered depends on the particular value of authorization code.Like this, object has a plurality of authorization keys, the object utility rank that each authorization key is corresponding different.According to the different authorization keys that receive, object recovers predefined effectiveness rank.The benefit of doing like this in method 25 is, both can farthest reduce stolenly, can satisfy customer demand preferably again simultaneously.
[0070] method 35 expression retailer receiving slave objects are shown in square frame 37.These objects can be without any effectiveness electronic installation, can not normal power-up electronic device, effectiveness serious limited or have only the electronic installation of demonstration effectiveness and the optical medium such as DVD, CD that can not read access on playing device etc.Like this, the controlled object of these effectiveness almost is not worth for the thief, and therefore stolen risk will reduce greatly.Shown in square frame 39, when the time that is provided with by the retailer, position or incident took place, the retailer just can recover whole effectiveness of object.Once affirmation, object is such its effectiveness of recovering shown in square frame 41 just.Like this, the retailer controls time, place and the incident of effective recovery device effectiveness.In distribution chain, the mode of transportation effectiveness controlled object is generally boat-carrying, truck transport or other means of transportation.Method 45 has represented that dealer and carrier receive the process of effectiveness controlled object.The effectiveness controlled object is useless concerning the thief, and therefore stolen risk is much lower.Shown in square frame 48, the dealer to the predetermined area, finishes delivery with object transportation.So, receive goods (square frame 47) from dealer or shipping company, up to them goods being handed to next stage mechanism (square frame 48), the risk that object is stolen has all obviously reduced.
[0071], represents the object of controlled distribution system with reference now to Fig. 3 A.Object 50 generally has shell 52, and object is enclosed in the packing.In an example, object 50 can be an electronic product, also can be the tangible medium such as CD, DVD, game machine, recreation cassette tape or CD.Usually just enter distribution chain after object 50 dispatches from the factory, till the retailer receives it.The retailer shows and subject of a sale 50 to client usually.Purchase of customer object 50 is to obtain certain useful especially effectiveness.For example, if object 50 is MP3 players, client just wishes to play the MP3 music file by loud speaker or earphone.In another example, if to liking film CD (DVD), client just wishes DVD to be put into corresponding player and plays and appreciate high-quality film.Yet object 50 has multiple effectiveness state.Like this, object might be in certain effectiveness state in distribution chain, and then, when client took object, object might be set under another state.In example more specifically, the effectiveness of object 50 nearly all can not be used in distribution or retail location.Then, when transferring client to, with the effectiveness full recovery of object.Like this, can not obtain any benefit owing to steal object, the stolen risk in distribution and the retail location has just fundamentally reduced.Therefore, object 50 should share with active device, these device and network operation center mutual communication and be the part of whole distribution control system.In 10/874 of submission on June 23rd, 2004, No. 642, title be the U.S. Patent application of " Method and Apparatus for Activating Optical media " and submit to July in 2003 31 10/632, No. 047, title is more detailed process and the method for describing the exciting light medium all sidedly in the U.S. Patent application patent of " Wireless ActivationSystem and Method ", these two pieces of patent applications quote in full in herein, as a reference.[0072] object 50 receives authorization key by telecommunication circuit 58.Telecommunication circuit 58 might be the radio communication circuit such as radio frequency or electromagnetic receiver.Object has logic 65, and it is configured to be used for receiving authorization key and determine whether object will change its effectiveness, how to change effectiveness or what kind of variation is effectiveness made.May comprise logical construction and dynamic memory or nonvolatile memory in the logic.In an example, logic 65 usefulness object key 63 decide object whether can be transformed into another kind of other effectiveness of level.In an example, object key 63 is stored in the unreadable mode of external device (ED) in the process of producing.For example, object key 63 may be stored in when producing in non-volatile, that can not wipe, the unmodifiable memory.This object key may have identical value with authorization key, so logic only compares limiting access object key 63 and the authorization key that receives, thereby determines whether to change the effectiveness of object.Should be understood that other snoop logics are handled and also can be used to make such decision.Logic of propositions 65 is determined to change effectiveness, and logic will require to change implement device 67 and come the change state.For example, the change implement device may be: electronic switch, fuse, circuit condition breakpoint, logic state or be defined in a class value in the memory.In another example, the change implement device is the convertible optical material of electronics such as electrochromic material.Should be appreciated that other devices also can be used as the change implement device.
[0073] the change implement device can be in the auxiliary change state down of activating power 61, the perhaps value of storing with logical process setting or change memory.For example, activating power 61 might be the independent battery to logic 65, communication process 58 and 67 power supplies of change implement device.In another example, activating power 61 also may be the transducer that a radio frequency that receives or electromagnetic energy are converted into available electrical energy.And activating power can all or part ofly obtain from the object external resource.Should be appreciated that other electronic components that may also need realize the device as transducer.In another example, working power 73 provides activating power can for whole device.Should be appreciated that not all object all needs working power.For example, when object was in the distribution chain, if whole device is the MP3 player, and the MP3 player had the rechargeable battery of operability, and the initial electric weight that has of rechargeable battery is enough to power to active circuit so.In another example, activating power 61 also can be provided by a plurality of power supplys.For example, small-capacity cells can be given the power supply of change implement device, and RF or EM converter apparatus can be to logic and communicator 58 power supplies.Should be understood that, can adopt the circuit supply of plurality of optional mode in object 50.
[0074] in an example, object 50 is the electronic installations with the working power 73 of powering to the effectiveness of device.Effectiveness module 74 directly influences the effectiveness device.For example, the effectiveness module might be electric supply installation, processor, engine, display, executable code, memory, amplifier, printhead or lamp etc.Should be understood that, can use various types of effectiveness circuit and effectiveness module.Object 50 has a kind of mode of operation, and effectiveness module 74 is used working power under this state.And effectiveness module 74 is connected to change implement device 67 with the accessible level of decision effectiveness.For example, the effectiveness device does not allow electric supply installation or engine operation under certain state, therefore makes object 50 not have any significant operation.For another example, the change implement device might cause effectiveness device operand 50 under effectiveness minimizing or example modes.Allow device at the limited performance work of finishing drilling at retail shop like this, later recovering its whole effectiveness then, client just can use the repertoire of object like this.Be understandable that object 50 can have one or more buffer circuits to come working power 73 and change implement device 67 and interrelated logic and telecommunication circuit thereof and isolate.When using working power, this isolation can protect change implement device and logic not to be damaged, and on the contrary, when applying power supply to the change implement device when causing that it changes state, this isolation can protect change implement device and logic not to be damaged.Also can adopt multiple other isolation program and circuit.
[0075] in more complicated distribution model, object 50 has an accessible object ID 56.Object ID 56 may be barcode value or RFID value.Under the requirement of active device, object 50usefulness telecommunication circuits 54 transmit its objectID.Telecommunication circuit 54 can be simple RFID telecommunication circuit, is used for the RFID value is sent to activated terminals.Then, activated terminals obtains or produces an authorization key according to object ID.This key is sent tocommunicator 58, so that the limited accass target cipher key oflogic 65 usefulness it and storage compares.Utilize object ID, a concrete single object or a big class object can be associated with authorization key.Fig. 3 A has represented the functional module relation, and corresponding circuit realizes separating some function further, and in conjunction with some other function.For example, but the operand circuit can adopt single RF receiving system to be used as received communicationfunctional block 58 and transmitcommunication function block 54.
[0076] with reference now to Fig. 3 B, the optional structure of indicated object 50.Under this structure, object 50 is used to provide the information of confirming that its effectiveness is effectively controlled.In view of the above, object 50 has confirms circuit or memory 59, is used for according to the actual of object 50 or suitably effectiveness state and change state.In some cases, detect the virtual condition of effectiveness or the virtual condition of change implement device.In other cases, be not easy to measure and detect virtual condition, therefore some aspect in the change detected process alternatively.In this case, confirm that the change procedure success just means the effectiveness that has very likely successfully changed object.Therefore, confirm that circuit 59 can directly detect the state of change implement device 67, perhaps measures the electronics process that is used to cause variation.For example, confirm that circuit 59 can detect the electric current by fuse, confirm that according to this enough electric weight pass through and the fusing fuse.Although be not direct detected state, the change of fuse state very likely causes the change of object utility state.In another example, confirm that circuit 59 may be connected in logic 65, and confirm to activate logically truely.In another example, confirm that circuit 59 also may be directly connected to effectiveness module or effectiveness device itself, whether take place thereby confirm to activate.Receive the information that the required module of change that realizes expecting in the object utility has changed in case confirm circuit 59, then this confirmation signal will send active device to or is read according to the requirement of active device by transmitter.Object among Fig. 3 B confirms that to active device and distribution control system effectiveness is changed by feedback information.This information is used for generating report or two Initial Payouts to the distribution chain party then.
[0077] with reference to figure 4A, the method for expression control electronic installation distribution.In method 100, object is in non-operating state, and for example, its main power source cuts out.When manufacturing object, just limit its effectiveness, cause object under the first effectiveness rank, to operate, shown in square frame 102.For example, to such an extent as to first effectiveness of object is not had practical value by the limitation in height object to client.Like this, in client or the distribution chain other people just can not steal this device.When being chosen by the retailer in the distribution chain or other donors, this object can obtain authorization key, shown in square frame 104.Usually, although have other addresses or process to use, authorization key is to be received by the retail terminal machine by communication.Electronic product determines whether to be authorized to change the first effectiveness rank by carrying logic and activating power, shown in square frame 106.If receive correct authorization key, its activating power of use for electronic products and logic, with will change implement device from first state exchange to second state, shown in square frame 108.Subsequently, for example, when client bought electronic product back home, client inserted or opens the power supply of electronic product, shown in square frame 111.At this moment change implement device and be in second state, object also can be operated under the second available effectiveness state, shown in square frame 113.For example, second effectiveness can be complete operation effectiveness.
[0078] in another example, first effectiveness is demonstration effectiveness and second effectiveness is the effectiveness of working fully.But if the product of has age restriction, first effectiveness also may be to work effectiveness fully and second effectiveness is restriction effectiveness.Like this, the retailer can correspondingly forbid some performance of electronic product according to client's age.Sometimes client may buy product according to some performances that needs.But complete operation product and active device are put together and are limited unwanted performance.The flexible configuration that point-of-sale terminal that like this, just can be in retail environment or service area are finished electronic product.Although electronic product changes its effectiveness when giving client, the effectiveness of electronic product can also can change at other times.For example, manufacturer before delivery, use the change implement device come the concrete configuration electronic product.Will produce the electronic product of Standard Edition like this and optionally increase or remove its effectiveness with one or more change implement devices.Should be appreciated that this dynamic-configuration process can be at other times by the attendant's execution as retail shop.Similarly, for example optical medium of CD and so on also can be placed by manufacturer in multiple change implement device, and each change implement device all is used to change the effectiveness of medium.So in production or distribution process, the effectiveness of medium may be changed.Like this, will produce the medium or the media content of a Standard Edition, and optionally increase or remove its effectiveness with one or more change implement devices.Should be appreciated that this dynamic-configuration process can be at other times by the attendant's execution as retail terminal.
[0079] with reference to figure 4B, expression utilizes the process of electronic installation object.Shown in square frame 116, has the electronic product that is under the non-operating state in the method 115.For example, do not insert the electronic product that power supply or mains switch are in closed condition.Shown in square frame 117, electronic product may be in mode of operation.For example, insert power supply or open its mains switch to electronic product.Then, the available effectiveness rank of electronic product can change along with the state of change implement device.For example, if the change implement device is in first state shown in square frame 119, electronic product just can move under the first effectiveness rank shown in square frame 121.If the change implement device is in second state shown in square frame 118, electronic product will move under the second effectiveness rank shown in square frame 120.As described in method 115, the effectiveness rank of electronic product often depends on the state that changes implement device.Therefore, the change implement device can make electronic product always could use after obtaining correct authorization key.If never receive authorization key, electronic product is in the first effectiveness state always so.In instantiation, if the first effectiveness rank by limitation in height, electronic product does not just have actual utility concerning client so.Shi Qie risk will reduce greatly like this, can not obtain any interests because steal the electronic product that is in first state.
[0080] with reference to figure 4C, expression is used to control the concrete grammar of electronic installation target distribution.Electronic product in themethod 125 has operation and not operation two states.Usually, under the non-operating state power supply be turn-off and under the mode of operation power supply normally open.Shown insquare frame 126, when producing electronic product, control its effectiveness and it is arranged on the first effectiveness rank.Electronic product circulates in distribution chain, and certain mechanism in distribution chain thinks and can change till its effectiveness.For example, when the point-of-sale terminal retailer transfers electronic product to client, perhaps increase or remove its concrete effectiveness element and finish by retail trader.Because electronic product is set at the first effectiveness rank at first, so if be in mode of operation, electronic component can only possess its first effectiveness rank.For example, if the effectiveness of electronic product is completely restricted, electronic product just can not switch on or all effectiveness all disabled.
[0081] when electronic product is in non-operating state and need be transformed into the second effectiveness state, it must be moved to the position of closing on active device.Active device may be the activated terminals of point of sale or the device that is positioned at other positions.Shown in square frame 127, electronic installation receives the inquiry to addressable ID.Addressable ID is the value of the memory that can wirelessly read or the bar code that is used for scanning.Shown in square frame 129, addressable ID is transferred back to active device.Shown in square frame 131, activated terminals is by permitting the effectiveness that changes object with other Local or Remote system cooperatings.For example, activated terminals can be confirmed the membership in credit card funded payment, password, the tissue, the mandate of activated terminals or client's age etc.Shown in square frame 133, suppose that permission changes object utility, activated terminals sends authorization key to object so.Usually authorization key carries out wireless receiving with the electromagnetic mode as radio communication and so on.Still be in object acquisition under the non-operating state and be stored in limited accass key in the object.The limited accass key is stored in the unmodifiable nonvolatile storage, can not be read by external device (ED).The limited accass key is stored in the object usually in process of production, copy that also has authorization key that is stored and relevant ID, and the device that is used to be activated obtains.Therefore, shown in square frame 136 and 138, object carries logic and obtains or utilize the limiting access key and itself and authorization key are compared.Shown in square frame 140, if key agreement, then object determines that its effectiveness should be changed.Shown in square frame 142, logic and change implement device will change implement device together and change to second state then.Change implement device and the effectiveness module relation that is used to guide the electronic product particular utility.Therefore, shown in square frame 144, when electronic product is in operating state, should be according to the second effectiveness work shown in square frame 146.
[0082] with reference to figure 5, expression is another object of distribution control system.Object 150 is similar to the object of describing among Fig. 3 A 50, therefore is not described in detail.The same with object 50, object 150 has the telecommunication circuit 158 of obtaining authorization key from outside active device.Communication module 158 and logical one 65 and change implement device 163 are worked together, and the change implement device is changed between first state and second state.Change according to this state, effectiveness module 171 provides different effectiveness ranks for object 150.Object needs activating power 159 to be communication, logic and the power supply of change implement device, and working power 173 is the main operation circuit and the device power supply of object.Object 150 also has limited accass object key 161 and accessible object ID 156.Telecommunication circuit 154 is used to object ID value 156 is delivered to active device.Store the main element of object 150 in the shell 152.In an example, shell 152 is a chest or box.Because the radio communication of other elements in other aspects meeting limit shells 152 of shell 152 or object, some circuit of object 150 and logic leave in the peripheral hardware 151 of main object shell 152.Shown in example among Fig. 5, peripheral hardware 151 has activating power (may be a battery or RF/EM energy converter), telecommunication circuit 158, telecommunication circuit 154 and addressable ID 156.Yet in conventional configurations, peripheral hardware and RF power-switching circuit are limited in antenna or the antenna holding circuit, and the ID of object is stored in the object shell 152.Like this, need not be subjected to any circuit that carries out radio communication intrusively to be in the object outside.Other circuit that change object utility are in the object shell 152.Be understandable that, also other circuit can be moved to peripheral hardware 151 in shell.For example, in some cases, object key and logic can move to peripheral hardware.If in the activating power 159 battery is arranged, battery can be placed in the shell 152 or on the peripheral hardware 151.
[0083] peripheral hardware 151 can be installed or be attached in the object shell 152, perhaps is linked to object shell 152 away from the object placement and by circuit.In addition, peripheral hardware 151 can be linked to object shell 152 by the connector 166 of object shell 152.In another example, peripheral hardware can temporarily be installed on the shell by the power input mouth of object shell 152.In this case, when the attaching plug of peripheral hardware 152 and shell 152 was connected, object 150 can be activated; After activated terminals is handled, attaching plug is extracted from peripheral hardware 151, simultaneously plug is inserted supply socket and make electronic product in running order.Also can use other available connectors.For example, can adopt existing audio frequency, video or data connector.But, when using AN connector 166, may need to provide a buffer circuit 167 to come object of protection circuit 169 not to be subjected to the damage of peripheral hardware 151.When object utility will be changed, buffer circuit 166 was used for the authorization key that receives is passed to logical one 65, and, when object is in mode of operation, send the signal in the connector to its conventional object circuit 169.For example, if connector 166 is audio connectors, so, when using object, the signal in the connector just is transferred into audio object circuit 169.Buffer circuit design and structure are known technology, so just need not go through again.By making up the active circuit part of object outside, kept communicating by letter of more robustnesss with active device, when from available RF or EM source switching energy, also kept more effective RF or EM Conversion of energy.
[0084] with reference to figure 6A, expression electronic installation object 200.The effectiveness ofelectronic installation 202 is limited when producing.When circulating in distribution chain like this, 202 couples of potential thieves of electronic product are almost without any value.Therefore, fundamentally reduced the risk that is stolen.Shown insquare frame 224,electronic product 202 by logical circuit, power circuit, be stored in value in the memory or the operation of processor activates its effectiveness module.When shown insquare frame 222, when being electrically connected ground connection, the particular utility module is just without any effectiveness.When loading workingpower 226, for example when the mains switch of object was activated, switch 219 cut out, and when platedcircuit trace 217 ground short circuits, will restart pin ground connection like this.Like this, althougheffectiveness module 224 has been loaded working power, the processor of electronic product and logical circuit are in rebooting status always, so electronic product is just without any effectiveness.Therefore, when the change implement device is in first state, whenever openelectronic product 202, its main function all is limited.
[0085] when client bought this electronic product in retail shop,electronic product 202 will be near active device.Active device requires ID is provided value, andRF transmitter 204 just sends itsID value 206 to active device.Though explained RF communication, can also use other available communications.Active device can be determined the effectiveness of authoritative restoreobject 202 together with remote server, network operation center, salesman and client.If activated terminals obtains proper authorization, each rights and interests side confirms that also this electronic product can recover effectiveness, and active device will send authorization key to RF receiver 208.RF receiver 208 sends the authorization key of receiving tologic 215, andlogic 215 is authorization key andlimited accass key 213 relatively.Limited accass key 213 is stored in the electronic product in process of production.If limited accass key of being stored 213 and authorization key coupling, logic will be connected the PCB circuit.When electronic product not in working order,power supply 211 is used for totransmitter 204,receiver 208,logic 215 and 217 power supplies of change implement device.This power supply may be battery, RF/EM energy converter or be connected in working power 226.For example,RF receiver 208 serves as the receiver of RF/EM power supply changeover device 211.Also can use the power supply of other types.
[0086] incase PCB trace 217 is opened, when loading workingpower 226,switch 219 will cut out at every turn.Like this, the voltage of restarting pin just can reach circulation by from not extracted on the ground.Therefore logic just can not restarted.Electronic product will normally move after opening power or initialization logic and the effectiveness, reaches whole effectiveness.Also can adopt a plurality of authorization keys and a plurality of change implement device.Like this, can selectively open several effectiveness states.
[0087] with reference to figure 6B, expression computer processor object 250.For example, processor 252 may be microprocessor, gate array device, DSP or other processor circuits.Although describe with processor, also available other available logic and storage devices.Have a limited accass key 261 when producing processor 252.The limited accass key is stored in the database and with processor ID value 256 and is associated.The change implement device of processor 252 exists with logical value 265 forms.Logical value can not read from the outside, and with form storage non-volatile and that can not destroy.When logical value is arranged on first state, the steering circuit 274 that logical value makes processor is set causes the guiding failure.Therefore in another example, the initial setting up value can only make processor enter restricted mode, can only carry out simple operations and can not reach whole effectiveness.Usually, working power 227 will receive the pin or the circuit of electric power from external power source.Active circuit is subjected to working power protection, and will be isolated with active circuit and operating circuit by isolated transistor 268.For example, if working transistor 268 carries out suitable biasing and is connected to working power 277, steering circuit 274 reads logical value when applying working power with box lunch.Like this, processor 252 powers up Shi Douhui at every turn and checks to provide what effectiveness rank.
[0088] processor 252 can be used as discrete parts or as than a sale such as element of bigger device (for example computer system, camera or MP3 player).In some cases, it is useful radio communication and circuit being installed in the processor device outside.When processor or the single unit system with processor need be activated, processor sent to active device with RF transmitter 254 with processor ID 256.Active device generates or obtains the authorization key identical with limited accass key 261.RF receiver 257 receive authorization keys and and logic 263 together with a new logical value input logic value zone 265.Power supply such as RF/EM energy converter 259 is used to power up and help to be provided with new logical value to active circuit.In case processor is provided with a new logic value in logical value zone 265, power up the effectiveness rank work that preprocessor all is provided with the new logic value.Processor has whole effectiveness usually under new logical level.Different effectiveness ranks also can be arranged under this pattern.Also can increase or removal effectiveness from processor according to the authorization key of receiving.Like this, can store a plurality of limited accass codes 261, each code all is associated with the effectiveness of processor different stage.Although for example understand processor 252 and RF transmitter 254, RF receiver 257, and be incorporated into the power supply 259 in the processor, can also be installed in all or part structure outside of processor shell.For example, transmitter 254, receiver 257 and power supply 259 can be placed in the packing of processor housing exterior or processor.In addition, if processor 252 is integrated in the bigger device, some structures can be placed on for example plated circuit of processor outside.Should be appreciated that the structure that optionally to place institute's example according to concrete application requirements.
[0089] with reference to figure 7A, expression is used for the object that controlled distribution system makes up.Object 300 is CDs 302.Althoughobject 300 is described to CD, it also can be other tangible mediums.For example, object 300 may be DVD, VCD, credit card, gift token, bill, recreation cassette tape, readable memory, bottle or other tangible mediums.Player, driver or games system can read the data ofCD 302, and this is the main effectiveness of CD.Like this, thus the content of storing in the player perception CD shows the effectiveness of CD.Similarly, limited CD can not be played device and read or read, writes the optical disc storage district.
[0090] meaningful district, index, menu, log-on data or document and work control in thecontent 316 of CD 302.Content 316 can be: movie file, audio files, game file or other information that need watch or use.Change implementdevice 315 in the CD can be set to two states at least.Under a kind of state, the change implement device can disturb the ability ofplayer 303 reading of content 316.More specifically,player 303 haslaser 319 and is used for the relevant of reading ofcontent 316 and reads and display circuit 321.Yet if change implementdevice 315 has limited the effectiveness of CD, the change implement device just reads index, menu, log-on data or fileinfo or content information by the performance of disturbing laser 319.Like this, it is just limited fully to be placed on the effectiveness of the CD in the destination player.
[0091] in an example, change implementdevice 315 can be the electronics fertile material.More specifically, the change implement device can be to utilize the signal of telecommunication to change the electrochromic material of its optical characteristics.Like this, when electrochromic material during opaque substantially or high index of refraction, to such an extent as to laser is read by fully disturbing or the circuit of the device that displays the play can not correctly read light signal.But when change implement device when being changed to the achromatic state of optics, laser just can be correct reads index, menu, log-on data or file, perhaps content regions, thus make full use of CD.
[0092] RF orother EM receivers 308 that is used for receiving authorization key arranged in theCD.Logic 313 receives authorization keys and makes decision such as whether should changing compact disc states.In an example,logic 313 utilizes the authorization key that carrieslimited accass key 311 and receive to compare.If cipher key match, logic just utilize additional step to make change implementdevice 315 be transformed into different conditions.CD has thepower supply 310 that is used for activatinglogic 313 andreceiver 308 and influences the conversion of change implement device 315.Power supply 310 may be the battery of preserving together with CD or be kept at the packing that is used for packing CD; It also may be the RF/EM energy converter that wireless energy is converted to electric energy.
[0093] change implementdevice 315 can be used to increase or limit the effectiveness of CD.For example, the change implement device ofCD 302 just is set at first state that limits CD effectiveness fully when dispatching from the factory.Stolen risk when having reduced fully thatCD 302 circulates distribution chain so just.Anyly steal or stolen or the people of the copy of unauthorized CD can not use this CD in commercial player.Therefore effectiveness or effectiveness are very limited not to be reduced the risk that is stolen greatly because of stolen CD has.
[0094] some places in the distribution chain such as the point of sales terminal of retail shop, CD can be resumed whole effectiveness.When CD is placed on the point of sale, during near active device, CD can be received the request that ID 306 is provided.This ID may be a bar code, also might be stored in the addressable memory, waits for by wireless transmission.In this case, CD is passed active device back by RF transmitter 304.Active device may be carried out together with the telework center and confirm and authorization tasks, thereby confirms whether to permit recovery CD effectiveness.In case after authorizing, active device reaches RF receiver 308 with authorization key.Logic 313 is used the limited accass key that is stored in the CD.In process of production, limited accass key 311 is stored in the CD, and related with CD 306.Active device can ask to visit the file of associated optical disc ID and authorization key.These files are kept at network operation center or other security server positions by safety usually.Like this, active device can receive the limited accass key of CD 302.If logic 313 determines limited accass keys 311 and the authorization key that receives and be complementary, logic and power supply 310 will change implement device together and be transformed near optics achromaticity state so.Like this, CD just can use in its corresponding player 303.
[0095] with reference to figure 7B, theCD 302 that expression has supplementary features.CD among Fig. 7 B is similar with the CD among Fig. 7 A, no longer describes in detail.CD can be carried out the conversion of available effectiveness mentioned above shown in Fig. 7 B.ButCD 302 has with the additional conditions that determine whether the change implement device is transformed into new state.For example,logic 313 has the additional input end that allows the counter input.This counter is used to calculate the number of times that CD is activated, if reach maximum, will limit and recover any effectiveness.In another example,logic 313 has time signal, and for example, this time signal can be just at the timer of timing, and it provides additional input signal.Like this, CD just can recover its whole effectiveness, and the logic monitors elapsed time after the effluxion that sets, returns to restriction state with CD then.Like this, CD just can be measured activation at preset timedintervals.Logic 313 also can have extra memory space, is used for the actuating logic function, and is used for storing the following required value of determining.
[0096] be used for confirming CD whether the affirmation structure of transition status also withCD 302 explanations.In an example, this affirmation system exists with the form ofeffectiveness status circuit 307, and this circuit is used to byRF transmitter 304 current effectiveness state be sent back active device.Like this, active device can confirm that CD is in expection and returns to form before client leaves the retail point.In another example, in case change implementdevice 315 changes,effectiveness state 307 also is used to transmit automaticallysignal.Effectiveness state 307 can be determined state variation by one or more points on the active circuit in supervision or the detection CD.For example,effectiveness status circuit 307 can monitor power supply and relevant power supply circuits, can make the conversion of change implementdevice 315 completion statuses to determine enough electric power.In another example, but effectiveness state monitoring logic, thus determine whether state suitable change takes place.(not shown) in another example, effectiveness state can directly monitor the characteristic of change implementdevice 315, and give the RF transmitter the current status report of change implement device.
[0097] confirm to change by report, active device can confirm that CD had recovered effectiveness before client leaves the retail point.In addition, report and payment authorization produce in distribution chain accurately.Also can adopt other to confirm the method for conversion effectiveness state.
[0098] with reference to figure 8, expression is the distribution control method.Method 350 has and is used for one group of ID and one group of or a series of database that corresponding authorization key links together.These ID and key can be dispersed in several servers on the server, perhaps store or are created in the local activation device.Between identification code and the authorization key unique man-to-man relation, perhaps many-one relationship.For example, each CD all has a unique ID and relative unique active coding.Because an authorization key is only to be used for recovering the effectiveness of a specific CD, setting like this can tighten security.In another example, an authorization key can be used a group id number.Like this, can send an authorization key and activate a series of products.Although reduced fail safe, this device can reduce the workload of network and mandate.In another example, object has the supplementary that generates authorization key.For example, can store date of manufacture and time in CD, when active device read CD, security algorithm will generate correct authorization key.The entity that like this, only has safety and a predefine algorithm just can be with addressable data and time associating information in authorization key.Key and identification number are stored in the key file 377.These key files can be stored in the retail point, also can be distributed in other servers of same physical address, perhaps are distributed in the different device and address.
[0099] shown in square frame 354, addressable identification number and limited accass key when dispatching from the factory, object are just arranged.Addressable identification number can the barcode value form be stored, and perhaps is stored in interrogation zone by wireless RF/EM system.Like this, active device just can be confirmed specific object.Object also have one be stored in non-volatile, can not change and the limited accass key of the outside memory address that not can read.Usually, the limited accass key that is stored in the object is the same with square frame 352 top authorization keys.Can also use other processes.Manufacturer is with the effectiveness of the method controlling object shown in the square frame 356.For example, can not use or almost can not use, also object can be arranged to demonstration or restraint of labour pattern, can also in distribution chain, activate its effectiveness and then limit its effectiveness to such an extent as to manufacturer can limit the effectiveness object of object fully.The mode of object shown in just can square frame 358 circulates in distribution channel.In distribution channel, object only has the effectiveness that manufacturer activates.Like this, manufacturer can limit the effectiveness of its object conscientiously till the effectiveness of the side's of being authorized to change object.Thereby, in place, time or incident that manufacturer confirms, can allow object is transformed into different effectiveness states.Usually, shown in square frame 361, object is placed on the active device place near point of sales terminal.Active device 379 has the network that obtains ID and key file information and is connected, and perhaps has local canned data.Active device is communicated by letter by RF or EM and object carries out radio communication.Shown in square frame 361, active device 379 reads addressable identification number from object.Shown in square frame 363, active device can be carried out other work and determine to allow active device to change the effectiveness of object.For example, active device can be paid the bill for object with the definite together client of point of sales terminal or inputed correct password.
[0100] active device also can be authorized in the network operation center.For example, authorization device has the ID of mandate or code, and they must be confirmed or be constrained to by special communication port or device to communicate by the network operation center.In another example,active device 379 can have complete GPS-capable, reports its positional information to the network authorization center.Like this, active device must arrive desired location and activate object before authorizing active device.Shown insquare frame 365, if receive all mandates of network operation center,active device 379 will obtain the authorization key that is associated with the identification number of object.Shown insquare frame 367, active device sends authorization key to object with wireless RF or EM communication process usually.Shown insquare frame 369, object receives authorization key and carries out key relatively with the limited accass key.Shown insquare frame 371, if key is complementary, object just changes its effectiveness by the state that changes the change implement device.
[0101] in some cases, object can have and is used for the internal circuit that the affirmation state changes.Shown insquare frame 372, in this case, object has the internal circuit that is used for detecting or monitoring change implement device state, and gives active device this status report, shown in square frame 372.Confirmation is fed to the network operation center to finish report and payment.
[0102] with reference to figure 9A, expression is used to distribute the system of control.Manufacturer's 402 utility of production controlled objects in the system 400.More particularly, manufacturers produce has the object that changes implement device, and this device can come the change state according to the authorization key of receiving.Manufacturer has the network service that is connected with network operation center 407.Manufacturer uploads a series ofID values 409 that are used for confirming the effectiveness controlled object thatmanufacturer 402 produces.The object of these identifications has the one group ofassistance authorization key 411 that is used for implementing the effectiveness conversion, and these keys upload to networkoperation center 407 by manufacturer 402.Object has a plurality of keys, and different keys can be provided with different effectiveness ranks.Manufacturer also can be provided withadditional access control 412 to device.For example, manufacturer can limit specific products in sale particular country or the area.In addition, manufacturer is activated in specific country before may not wanting to allow specific DVD film CD on a predetermined date.Like this, even if object is put intodistribution chain 404, manufacturer still can controlling object.
[0103]distribution chain 404 can comprise some entities, comprising: consignor, truck man, storage people, distribution people and other distributionentities.Distribution chain 404 receives the controlled object ofmanufacturer 402 and controlled object is sent to retail environment 406.Therefore, duringdistribution chain 404 had object, object was in the controlled rank of effectiveness always.More specifically, manufacturer even can be in the available effectiveness of control device in the whole distribution chainalmost.Retail brick 406 has theactive device 402 that is used for changing object utility.Retail company can determine to change in what situation, place and time the effectiveness of object.For example, some retailers can change effectiveness as client when point-of-sale terminal is bought product, and other retailers activate effectiveness in the time of then can being chosen in object and entering retail shop.Furtherly, the time of different product activation is also different.For example, the large-scale durable electronic product such as large screen television is difficult in retail location and is stolen, and therefore can activate effectiveness at berthing facilities.But the CD of being hidden and taking away easily in the shop just can only activate effectiveness at point of sales terminal after payment.
[0104] no matter be at point of sales terminal or in other positions,active device 408 all by and object between radio communication obtain the object identifying information, and send authorization key to object.Active device andnetwork operation center 407 communicate carries out these operations.Network operation centervisit ID value 409,authorization key 411 and any additional access control 412.Theseadditional access controls 412 may comprise self further authorizes and safe control active device 408.For example, the identifier thatactive device 408 must have before authorizing the active device operation and default identifier is complementary.In another example,active device 408 needs and the particular preset communication network communicates, for example, and specific TCP/IP port.Ifactive device 408 is by nonspecific port communication, active device is in unwarranted position and is operated by unwarranted people so, so the network operation center can not send any authorization key.For example, active device has complete global positioning system and can givenetwork operation center 407 with its location information report.Ifactive device 408 is not thatnetwork operation center 407 can not send authorization key yet at the physical location of expection.For example, if active device is stolen or move out in desired location, and the thief is being when just attempting activating this object in other addresses, and said method will be very useful.
[0105]access control module 412 also may be communicated by letter with transaction control system 415.Transaction control system 415 may be associated withnetwork operation center 407 and be present in local retail store, perhaps by third party's remote control.For example,transaction control 415 may be a credit card authorization company, and the said firm receives the credit card authorization request fromactive device 402, and sends license confirmation information to active device.Like this, after the affirmation of receivingtransaction control system 415,active device 408 could activate object.Authorization requests may comprise check, cheque card, debit card or other financial instruments.Transaction control also may comprise confirms password, membership, security proving, age, biometric data or other affirmation values.
[0106]active device 408 also may receive the correct affirmation signal that activates object of controlling oneself.In this case, active device may send the information that success changes to networkoperation center 407 or transaction control 415.Like this, receive that effectiveness successfully changes notice after, generate corresponding report and payment authorization.
[0107] with reference to figure 9B, the distribution chain that expression has been simplified.In this distribution chain, manufacturer's 426 utility of production controlled objects.Shown in square frame 428, manufacturer transports object producing harbour 427, and the berthing facilities of center for distribution receives object.Shown in square frame 430, center for distribution 429 is received the cargo pier that connects that product is transported to the retailer by the retailer.Shown in square frame 432, the retailer can remove object the showcase to retail location then with object storage in the warehouse 431.Here, client can process object, and may be with the checkout terminal 433 of object to point-of-sale terminals.The retail salesman uses wireless RF/EM active device to come sweep object usually.Active device is confirmed object and is obtained this object specific authorized key.Salesman and point of sales terminal receive payment and other information that needs, for example age, password or membership etc. are provided under client's cooperation.At this moment, object is under the selected effectiveness state of manufacturer.Choose in case obtain manufacturer's permission and be authorized to the retailer, manufacturer just allows to send authorization key.Like this, producer can controlling object can sell client's time, place and condition.Therefore, manufacturer can allow only after specific date or time, to send authorization key to the specific geographical area or the age colony.In an example, manufacturer and retailer coordinate essential permission and key are delivered to active device by network operation center.Then, the retailer utilizes authorization key that object is arranged on the second effectiveness state.Afterwards, shown in square frame 434, client just can take object home and operand under second state.
[0108] in an example, the complete effectiveness controlled object of manufacturers produce.The effectiveness controlled object shifted between different berthing facilities, center for distribution, warehouse, showcase or shopping cart before arriving point of sales terminal fully.In whole process, if object is stolen, so this object almost or does not at all have effectiveness, so the stolen risk of object reduces greatly.Like this, no matter have how many entities to have object during the course, manufacturer has all successfully controlled from producing the distribution and the use of point-of-sale terminal product each stage.In case the retailer has activated object, client just can use its whole effectiveness.
[0109], represents limited display packing 435 with reference to Figure 10.Limited packing 435 has the packing 436 of packing limited CD 438.Packing 436 has a remarkable mark that exists withlabel 437 forms, is used to indicate that the effectiveness of CD is restricted.Because the effectiveness of CD is completely restricted, this makes client, employee and any potential thief know that all before CD was activated in the payment registration office, CD can not be play in corresponding client's playing device.Therefore, can not play by effectiveness controlledobject 438 being provided and clearly marking this object, thereby greatly reduce the stolen risk of object.
What [0110] show in the similar type packing 439 is the controlled video-game of effectiveness ofnew issue.Recreation 442 has been restricted to and can not have played, and theremarkable label 441 of recreation packing 440 shows that this recreation can not play.Because the recreation cassette tape can not use in the game machine of expection, stolen risk also reduces greatly.As last example, portable MP 3player 445 is illustrated in its packing 446.MP3 player 448 has been completely restricted effectiveness, so be in inoperable state.Be attached to label 447 on the packing 446 and represent that clearly this MP3 player can not work.Like this, stolen MP3 player does not just have effectiveness, and therefore stolen risk has also reduced.
[0111] with reference to the business transaction such as object being sold or transferred to client, the effectiveness controlled object has been described tentatively.Yet, use the effectiveness controlled object in also can or using at other field.For example, controlled object can be used for army or other government departments, thus the distribution of control device and medium and use.Like this, can be in the process of storage and transportation the effectiveness of restraint device or medium, recover its all or part of effectiveness at controlled when and where then.In an instantiation, can in the process of producing, storing and transporting weapon, close its destructive effectiveness.When weapon arrived the battlefield distributing point, the Weapon Director who is authorized to recovered its whole service behaviours with active device.Active device and secure network operation center confirm that together this weapon is activated by the officer who is authorized in place that allows and time.Similarly controlled system can be used for other electronic products and media object.
[0112], represents controlled electronics object apparatus 450 with reference to Figure 11.Electronic installation 450 has box body 452, and effectiveness module and other operating circuits and device are being adorned and protected to this box body.Therefore in an example, box body 452 is metals, can limit the radio communication of element and circuit in the object.Like this, the radio communication of the device of object and element required strong RF or EM signal to carry out strong effective communication.In order to improve the performance of radio communication, fix up an aerial wire in shell 452 outsides 455 and this antenna be electrically connected to active circuit in the shell 452.Like this, though the change implement device still in object shell 452, being easy between antenna and the active device reached radio communication.In an instantiation, connector 453 is placed in the shell 452.It is special that this connector may aim at antenna 452, or the existing connector of object.For example, if to liking audio devices, object might have some existing audio connectors.In another example, object 450 can be by external communication or the power supply of DC power supply connector.Like this, connector 453 can be an attaching plug or adapter input.Also can use the connector of the available other types such as Ethernet data port, serial data port, USB wiring or other standard audio, video and data connector.
[0113] in use,antenna 455 is attached on theconnector 453 in production and transportation.In the point of sales terminal place, active device andantenna 445 cooperations send or receive the information or the electric energy of circuit in the object encapsulation 452.Particularly, antenna can receive the request that is used for identifier value, and identifier value is sent to active device.After executing authorisation step, active device can send authorization key to object by antenna 445.Object has byconnector 453 and is connected to logic on the antenna.This logic determines whether to change its change implement device to other states.After the effectiveness state changed, object can change confirmation to the active device report by antenna 455.Usually, at this moment client can transportelectronic installation 450 in another place and electronic installation is arranged on operable state.Client can take off and remove antenna 455.In another example,antenna 455 andshell 452 are integrated, therefore are retained on the shell.
[0114] with reference to Figure 12, an example of expression antenna.In Figure 12, a platedcircuit plate 465 is arranged in the object encapsulation 462.Change implement device, logic and support circuit are positioned at464.Antenna 461 is connected to above theinternal circuit 464 by connector.Can also and change implement device and antenna or connector logic is set together.Like this, wheninternal circuit 464 during by RF or EM communication shielding,external antenna 461 just can be ready for communicating by letter.Althoughantenna element 461 only is made up of the antenna structure of object encapsulation case outside in the diagram, also the parts of other internal circuits can be placed on the outside.For example, the power supply with RF/EM transducer form is placed in theantenna element 461 as a battery.In another example, some or all logics are moved in the limiting access storage of antenna element and object key.Certainly, being provided with of the latter is may fail safe lower, but may be useful to some application facility.But because the effectiveness module that changes in implement device and the object shell connects together usually, the change implement device will be always in the object shell.
[0115] Figure 13 is another example of antenna element 471.In this example, shell 472 has printed circuit board (PCB) 475, and plated circuit plate 475 comprises internal circuit 474.Controlled system 470 is particularly useful when using the existing audio frequency of object, video, data or power connector.For example, might need to be connected with antenna 471 with audio connector.But the internal audio frequency circuit is worked under relatively low frequency usually, for example, is lower than 100 kilo hertzs, is designed to sometimes work being lower than under 30 kilo hertzs the frequency.Therefore, antenna 471 receives 900 required megahertzes or other radio frequency signals can't carry out strong effective communication with built-in circuit 474 under radio frequency.Therefore, use modulator-demodulator 479 that radio frequency signals is demodulated to relatively low frequency.For example, when antenna received the RF signal of communication of 900 megahertzes, this signal will be demodulated to can be by the relatively low frequency signal of audible level circuit transmission.Like this, built-in circuit 474 will receive the signal of a relatively low frequency, and it is used for changing the state of change implement device in the shell 472.
[0116] with reference to Figure 14, expression effectiveness controlled object.Object 425 has an object apparatus 429 in packing 427.If object apparatus 429 is electronic installations, packing 427 is exactly the box body or the transportation chest of for example placing objects device 429.Give an example, if to as if tangible medium, packing may be a box just, as the transparent boxes that are used for the Amaray box of DVD or are used for CD are with the preservation medium.In some cases, object may be disturbed by radio communication.For example, even generally the plastic medium box can not disturbed by radio communication, but the metal level of disk may be disturbed, therefore may need with external control part 439 be put within the packing 427, outside the disk.Therefore, external control part 439 just is attached on the object 429, is used for guaranteeing radio communication efficiently.According to concrete object and packing, external control part 439 may be placed on the inside of packing, perhaps expands by packing, perhaps is placed on the outside of packing.The external control part couples together with internal control part 431, is used for the effectiveness of controlling object.Internal control part and external control part both or one of them all have a power supply that is used to activate with operation control circuit.For example, external control part 439 may have the RF/EM conversion equipment, and the internal control part may have battery.Object apparatus may also have working power 435.In order to protect internal circuit to be without prejudice, buffer circuit 438 need be connected to switch 441.Like this, effectiveness device 433 is just protected, thereby avoids the interference of the signal of telecommunication of internal control part 431 generations.And the internal control part also is subjected to the protection of power supply 435 when electric current is supplied.For example, when working power 435 was activated, spacer assembly 441 was exactly a switch that internal control part 431 is connected with 433 disconnections of effectiveness device.When the needs Additional Protection, can also use accurate more isolation program and device.
[0117] with reference to Figure 15, expression effectiveness controlled object.Object 500 has the object circuit 504 that is arranged within shell or the box 502.Shell 502 may disturb with object circuit 504 between communicate by letter, therefore the part with the effectiveness control circuit is installed in the outside proper of object shell.AN connector 521 is installed on the shell 502, and external control part 518 is connected on the AN connector 512.External control partly has the RF/EM antenna structure, and corresponding telecommunication circuit.For example, AN connector 521 and relative built-in circuit can not be worked under radio frequency.Therefore, external control part 518 included demodulator circuits just are used for reducing the frequency of received signal.Like this, the radio frequency signals that is received just is demodulated to the frequency signal that can carry out effective strong communication in object apparatus circuit 504.External control part 518 and internal control part 506 are used for realizing the change of the effectiveness of controlled plant device jointly.More specifically, change implement device and effectiveness module 508 couple together and realize other effectiveness of a specific order.Because activation signal is used for effectiveness in the connector circuit, so the isolation of effectiveness circuit and protection just become very important.Like this, can provide adjunct circuit.For example, only when the active circuit un-activation, just provide the input circuit 512 that is connected with connector 521.Also have many known methods that other substitute that the isolation of effectiveness circuit can be provided.
[0118] Figure 16 represents to have the electronic installation of external antenna, and described antenna is connected to AC connector or power line.This antenna is inserted into the head of unsettled ac power cable.Use suitable physical connector, same design can be used for the IEC power supply and enters connector.In this embodiment, by using suitable digital coding, it is flowing through demodulated data of lower frequency (for example~500 kilo hertz) that transceiver/demodulator will make modulated RF (for example 900 megahertzes) conversion of signals of importing.The restituted signal of this low frequency (~500 kilo hertzs) is connected to the power interface connector on the object apparatus.Isolation network is linked to each other with the object power supply by the AC electric connector, and described isolation network is separated activation data stream and object electric power input module.This isolation network comprises two inductance and two electric capacity.Choosing of these devices based on the frequency ratio between employed signal frequency of object connector (being 60 hertz in this example) and the employed activation frequency (~500 kilo hertzs).At 500 kilo hertzs, inductance presents high impedance for activation signal, and electric capacity presents Low ESR.Therefore, activation signal connects active circuit, and inductance is isolated low source impedance.When the frequency of supply of object was 60 hertz, situation was opposite.Inductance is Low ESR, 60 hertz energy are coupled on the power supply, and electric capacity presents high impedance to 60 hertz of energy, thereby prevents to be coupled to active circuit with 60 hertz.
[0119] Figure 17 represents to have the electronic installation of external antenna, and described external antenna is connected to audio input port.The bandwidth that audio signal needs is up to 20 kilo hertzs, and this just means that activation signal is that example that is lower than previous 60 hertz of power supplys with respect to the ratio of audio signal.This lower ratio may just need a more complicated filter construction, realizes needed Signal Spacing.In the audio path of this example, except inductance, also added a shunt capacitance, this makes through the big high attenuation of filtered activation signal (having accelerated cut-off characteristics).Because the audio input signal level is lower, therefore the device that also needs to add is avoided the audio frequency input stage is damaged.This can realize by the resistance of a simple two-diode clamp circuit and a suitable size.When normal operating conditions is powered to object, activation power diode D1 is reverse bias by the object power supply, therefore audio signal is presented high impedance.This just makes audio signal and active circuit isolated, and is simultaneously also that the noise source in voicefrequency circuit and the active circuit is isolated.
[0120] Figure 18 represents to have the electronic installation of external antenna, and described antenna is connected to audio output port.As described in Figure 17, for audio signal, the topology of filter can be more complicated.In this case, because connector is audio frequency output, just need different topologys to prevent the audio output circuit overload.Though realized simple bipolar LC filter, may also need more limit here, thereby realize required to activation signal isolation and do not influence the response of audio signal simultaneously.In addition, as shown in the figure, also need shown in the feedback loop of audio frequency output amplifier in separation filter is set, thereby alleviate influence to audio frequency response.
[0121] Figure 19 represents to have the electronic installation of external antenna, described antenna be connected to for other devices provide the DC power supply device (that is, and supply unit, PSE).Because big output capacitance is relevant with the DC power supply, so isolation network does not just need it to carry filter capacity.The inductance that increases combines with the PSE output filter capacitor, constitutes to make object circuit and the isolated isolation network of RFA signal that is written into.Under the situation of audio frequency amplifier output, preferably in the feedback loop of output voltage regulator, isolation network is set, thereby reduces the influence of isolation network for the normal operation of supply unit.
[0122] Figure 20 represents to have the electronic installation of external antenna, and described antenna is connected to the object by the power supply of outside DC power supply, and the DC power supply is such as being that AC power supplies socket rectification by on the wall obtains the DC power supply.Such object is called as current-collecting device (PD).As shown in the figure, the isolation network of object power supply comprises single inductance.The input filter capacitor of object power supply forms a low pass filter with this inductance, and this filter presents high impedance for activation signal, thereby activation signal and power circuit is isolated.When object was powered by the outside DC power supply of normal operation, this inductance helped to reduce the external high frequency noise.Because input filter capacitor all bigger usually (high capacity) does not therefore just need clamp diode yet.
[0123] Figure 21 represents to have the electronic installation of external antenna, and described antenna is connected to the video input.Because having on frequency domain of vision signal and activation signal is overlapping, so use the passive filtering isolation network just can not effectively isolate these signals.In this case, isolation can be finished by a switching device, and such as passing through relay or solid-state switch, the energy supply of this switching device comes from the object power supply of normal subjects duration of work.In activation, when object cut off the power supply, relay K 1 sent activation signal to active circuit.When powering, will power to relay K 1, thereby vision signal be sent to the normal subjects circuit but not the activation input by relay K 1 to object.This makes and has reached isolation highly between activation signal and the object circuit.For used connector is not all systems of object power supply source, and this way all is feasible.Can also be with solid-state switch but not relay finish signal and switch.In these cases, two solid-state switches may need back-to-back series connection, the diode of its bottom is disconnected when object cuts off the power supply, and presented activation signal.
[0124] uses as mentioned above and the illustrated method of Figure 16-21, can many other object connectors be used as the port of activation signal.Many connectors all have untapped pin, can be used for activation signal and not need any isolation network.This class connector includes but not limited to following a few class: USB port, ethernet port, mouse port, keyboard port, pcmcia port, memory card port, S video port, game port, serial ports, parallel port, telephone jack and battery connector.
[0125] according to noted earlier, realizing under the situation of some condition (be client situation under) for the product payment, method and system safe in utilization is realized the change of item (" object ") effectiveness, will be of value to many aspects of routine work.To illustrate that as following example this has related to from leasing film and the video-game stolen broad range to the supply chain that prevents manufacturer-retailer at home.For making things convenient for producer, retailer and consumer to use, be starved of a kind of to the object (for example DVD) that is in operable state or be in the method and system that the object of operable state (as the DVD player in the sealing carton) not all is suitable for.
[0126] proposed to realize novel method and the system that object utility changes here.Object can be in operable state or operable state not.Realize change by combining with object.The change depend on the active device that closes between communicate by letter.Described method and system is the implementation procedure that is used for realizing the object utility change.Object can be in operable state or operable state not.Realize change by combining with object, and change depend on the active device that closes between communicate by letter.Method and system as described herein is the change that is used for realizing in the object, thereby recovers its effectiveness, is deliberately limited before the effectiveness of object.Object can be in operable state or operable state not.The change depend on the active device that closes between communicate by letter.
[0127] give one example, a certain product (object) of manufacturer delivery comprises that public identifier (" object ID ") is with relevant private key (" key of object ") and in object inside " be used to realize change device ".Manufacturer sends to network operation center (" NOC ") respectively with the ID and the private key of object.In manufacturer or link after a while, the effectiveness of object is deliberately limited.The reason of doing like this may be many-sided, as in order to prevent that this object of thief from stealing it before purchased or in order to facilitate new business model (as new leasehold mode).In order to recover the effectiveness of object, with it near one " activator appliance ": device can be connected to communicatedly.Activator appliance obtains object ID and it is transmitted NOC.NOC uses and searches the key relevant with object from the object ID of activator appliance.The key of NOC transmission object is to activator appliance, and activator appliance sends information to object then.Object receives the object key from activator appliance, thereby the device that makes object internal condition felicity condition that the realization Obj State is changed is had an effect the effectiveness of recovery object; This condition is the private key that receives object.
[0128] realizes satisfying the condition that object inside changes, logically, need on the device of object outside, comprise one or an above conditional event.Such as, an object (as calculator), near the object key that the activator appliance wireless transmission is come may needing, in order to a certain electronic switch of closed its inside, thereby the battery of permitting object starts object as power supply.If what receive is not correct object key, then electronic switch keeps off-state, and object also just can't be worked (effectiveness of object just keeps confined state, and the holder of object also can't therefrom benefit).Activator appliance is query object and obtains object ID from the most important condition that NOC obtains correct object key.The possible further condition that activator appliance transmits the object key of obtaining from NOC to object is that the consumer has paid and buys this object.Therefore, the prerequisite of activator appliance transmission object key is to receive the notice of having paid the bill by " link system " (being cashier's machine or other payment systems).
[0129] NOC also can use object ID to come Query Information, and does not use the object key related with activating sale (for example relevant decision rule of product batch number, shipment dates, issuing date, price and transaction etc.).Like this, NOC can realize the one or many transaction, and transmits one or more coherent signals to object (or object and activator appliance).From the signal of NOC or activator appliance also with from or the signal that is sent to link system (for example process payment), dealer or the manufacturer usefulness of bill and inventory management (for example for) and retailer etc. carry and communicating by letter.Signal described herein (for example signal among Fig. 8 751) may be one or more passive (as bar code) and active (as the RF signal or the signal of telecommunication) signal; One or more data component (for example, device identification and IP address) are organized into one or more (attached or independently) of separating communicates by letter.Communication may comprise data (information of analog form or digital form) and/or power supply.As shown in the figure, adopt one or more symbols (arrow) to emphasize data flow and power supply direction among the figure.But here, the number of symbol does not define or limits two communication numbers between the entity, does not also define or limit the number of data element wherein or source element.
[0130] common, to liking tangible entity, data or content are then invisible.For example, CD is an object, but CD content stored (for example software, film, music etc.) is not.All objects all have operable state (as a DVD or the DVD player that plugs in).A lot of objects comprise most of electric devices, and operable state not (DVD player of powering as not have in packing box also) is also all arranged.Object also may be that activate or unactivated.Have a mind to adopt one or more methods to limit the un-activation object, thereby influence its effectiveness.The effectiveness (all or wherein subelement) that activates object is resumed or reproduces by the change that realizes object utility.
[0131] activating object is exactly the process of recovering or reproducing object utility.No matter be that object under work or the non operating state can operate with " active device " or module cooperation.No matter be work or non operating state, object can be activated.The effector (change implement device) of restriction object utility may be reversed, repeat or forever change.In some instances, effector (and restriction result) may partly or entirely be negated by other modules (as along separate routes).The effector (change implement device) of restriction object utility has one or more.For example, effector may be one DVD player ON/OFF circuit is connected to the electronic switch of opening in the circuit of power supply.For another example, the effectiveness device may be to intervene the thin electric light rete of DVD that DVD player reads dvd content.Effector also may be the content of logic OR data and storage thereof.
[0132] effector (change implement device) that can change object utility often just was provided with by manufacturer before delivery, but also might finish setting by retail trader or system integrator.Also can when object enters in client's hand, automatically perform (repetition) and be provided with, as, can separate the CD of activation automatically, after using a period of time (as the leasehold), it can be backwards to unactivated state automatically, makes DVD player can't read content wherein.
[0133] object may be consumption electronic product and computer product (DVD player, video game machine and control desk, TV, digital camera, phone, PDA(Personal Digital Assistant), battery, calculator, computer, printer, facsimile machine, monitor, portable music and video recording/reproducing device, vehicle audio or the like), instrument and instrument (automatically controlled especially) and wrist-watch etc.Object also may be such as CD (as CD, DVD) and so on medium, for example, these medium have the device that changes its optical characteristics.Object also may be system unit and replace element (as hard disk drive, storage card etc.).Object also may be instrument, machinery etc.
[0134] effectiveness of object often is its main function (for example: broadcast receiver playing back music, printer prints, optical disc storage are by data of player or drive access or the like)." effectiveness " speech can be regarded as any use, function, characteristic of object etc. herein.The effectiveness of object also can be understood as any benefit of obtaining (comprising the sense organ benefit) from product, especially those are rejected the use that will influence object or the benefit of value.
[0135] object is integrated the one or more changes of active device to implement conditionally to carry out in response to one or more external signals.Partly or entirely active device can be replenishing of original product.These devices can partly or entirely be removed.General active device comprises: communicator, conditional logic (" logic "), memory, change realize module, power supply and common object identifier (" object ID ").Active device may comprise that also one is hidden or privately owned key (" object key ") and other necessary elements of carrying out to activate (as confirming the device of object activation state).In some cases, active device can include only the memory that has object ID, module and the power supply of realizing change, perhaps includes only module and the power supply of realizing change.
[0136] parts of object (as communication module, power supply, object ID or the like) are attached on the object usually, although these parts can use the intrinsic element of object whole or in part.For example, the existing battery of calculator can be as a power supply, to avoid needing boosting battery or to be used for obtaining from external power source the module of electric energy.Figure 22 isobject 700 graphic of having integratedactive device 710, comprising:
Communication module 771;
Logic 712;
Memory 713;
Change realizesmodule 714;
Power supply 715;
Object ID 716;
Object key 717.
[0137] communication module 711 realizes comprising the communication of data or external device (ED) power supply.Communication module 711 may be one or more wired or wireless systems.For example, infrared ray (IR) and radio frequency (RF) transmitter/receiver.Communication module 711 is also supported unidirectional or two-way communication.Logic 712 comprises the module that realizes stealth in the object or dominance decision rule, its by with the communicating by letter of external device (ED), conditionally object is changed.Logic 712 is used definite effectively which kind of change (if any) of realization of signal that receives from external device (ED).Logic 712 can be used the arbitrary module in several disparate modules separately, perhaps with its combination, as electronic switch, gate-array circuit or microprocessor etc.Memory 713 can be stored data, decision rule, instruction etc., and related with object 700 or activation.For example, memory 713 may have: information (as retail trader's identifier, path code or the like) that manufacturer receives in canned data (as product code, date of manufacture and lot number code or the like), the transportation before delivery or the information that when object activation, receives (as sales date, retailer's identifier, active device identifier, Customer Information and preference, operation parameter/option---number of times and duration that object is used) etc.Memory 713 can be (being separated as, the storage device of object ID 716 and object key 717 storage device with the data that receive in transportation) of concentrating or separate.Memory 713 may be programmable, writeable, erasable or read-only or the like.Memory 713 may be electronics or other forms, for example the optical readable label of bar code and so on.
[0138] change realizes that module 714 may be the combination of one or more types.For example: electric power/electronic switch, electromechanical lock, able to programme/erasable memory, electro-optic film etc., and all realize the necessary related elements of change.The work of change realization module 714 may be carried out according to logic 712.An importance of the embodiment of the invention activates object exactly, and the device of the active information of transmission does not need to know integrated what active device in the object, and how to realize change, has realized which kind of change or how to have influenced effectiveness of object or the like.Power supply 715 is parts (as communication module 711, the logic 712 etc.) power supply of active device 710.Power supply 715 may be the energy storage such as the battery of charging before manufacturer's delivery.Power supply 714 may be the module of wireless receiving from the electric energy of external source, all antennas that receives RF broadcasting or electromagnetic radiation in this way of external source.Power supply 715 also may be the electric contactor that is used for receiving the external source electric energy.Power supply 715 may be to be used for combination to the different module of obtaining, storing and sending of the parts of active device 710 power supply.Should be appreciated that power supply 715 should comprise that miscellaneous part to active device 710 provides the indispensable parts of suitable available electrical energy.
[0139]object ID 716 is associated withactive device 710 and/or object 700.Under the particular case,object ID 716 may comprise the identifier thatactive device 710 and object 700 are shared.The commonaccessible object ID 716 of outside (public)device.Object ID 716 may be unique toactive device 710 or object 700 (as string number), or it is common to have the active device and an object of similar features or attribute, perhaps belongs to same colony or other member oflevel.Object ID 716 may comprise the one or more data that are stored in the memory 713.Thisobject ID 716 also may be stored on one or more different kinds of memory or the one or moreposition.Object ID 716 also may be stored inobject 700 or its packing box body of computer (as be equipped with).Object ID is connectingobject 700 oractive device 700 directly, also can not be directly connected to object 700 or active device 700.Object key 717 andobject ID 716 are associated, and can not be visited with sharedobject ID 716 corresponding outsides (privately owned)device.Object key 717 may be stored in thememory 713, and may comprise and realize several data that Secure Transaction is required and/or algorithm etc.
[0140] Figure 23 represents the example ofactive device 710 another kind of structures.Wireless embodiment of communication module 711 (as RF transmitter or receiver) andpower supply 715 are placed onobject 700outsides.Logic 712,memory 713,realization change module 714,object ID 716 and object key 717 all are placed on the inside of object 700.Inside and outside element is connected to each other by link block 718.Link block may be electric wire, flat cable etc., and perhaps link block is connected to object periphery (as the connector of the box body ofobject 700 is housed by connection).
[0141] when the radio communication of the design intervention of for example object and external device (ED), but arrangement shown in Figure 23 is that for example to activate object necessary.Most of consumption electronic product is designed to minimize the RF transmission especially.At this problem, use the function element of the active device of wireless communication module can be distributed in two or more positions; Some of them are in object inside, and other are in the object outside.
[0142] Figure 23 is a profile instance of active device, supposes that it is the DVD player (object 700) that has active device 710.Electronic switch (change realize module 714) is incorporated in the circuit (trace) of printed circuit board (PCB) of DVD, and the switch of this circuit board and power supply disconnects.Switch is leaving when factory transports, and when switch is leaving, unless Closing Switch, DVD player can not power on.The microcontroller that comprises in the logic 712 is connected (link block 718) with memory 713 with switch and flat cable.Flat cable inserts in spininess (protrusion) jack that is installed on the DVD player metal shell.What insert jack is the RF transceiver and the transformer (communication module 711 and power supply 715) that can receive data and electric energy from the external RF source.When the RF signal that comprises data and electric energy is received by the subsystem of object 700 outsides (element group), these signals just are delivered to internal subsystems, described subsystem realizes conditionally that by Closing Switch the effectiveness in the object 700 changes, thereby recovers the effectiveness of DVD player; When mains switch is closed, will power on.The assembly of communication module 711, power supply 715 and link block 718 (perhaps its parts) can have nothing to do and produce in enormous quantities in the other system element.An advantage like this is that each subsystem can irrespectively be produced in enormous quantities with other.In addition, also can remove external system like a cork.
That [0143] Figure 24 represents is an embodiment ofobject 700 andactivation 710, realizesmodule 714,power supply 715 andobject ID 716 comprisingmemory 713, change.For example, object 700 is the CDs that are placed in the papery disk cover, and this disk cover has the printed bar code (memory 713) that comprises DVD product code (object ID 716).DVD suitably is placed in the electromagnetic field ofpower supply 715, with the change (change realizes module 714) that realizes electro-optic film make object from first state variation to second state.When being in first state, the laser head of electro-optic film prevention DVD player visits the content in the DVD.And when being in second state (state of activation), electro-optic film then allows the laser head of DVD player to read content in the DVD.Perhaps, electronic switch is placed on the DVD player or its inside.Electronic switch is used to control the state of electro-optic film.Can use the mode of other embodiment introductions as herein described to realize and control electronic switch.
[0144] Figure 25 represents activator appliance 720.Activator appliance 720 is a kind of devices, is used to activateobject 700; The data of the active device of one of active device shown in transmission such as Fig. 1-3 and/or electric energy; Realize decision rule and safety; Reconcile the communication between other Apparatus and systems and theactive device 710; And it is mutual etc. to support that the user carries out.The effectiveness ofactivator appliance 720 may be included in single entities or the solid polymer composite, also may carry out difference setting according toapplication.Activator appliance 720 also may be integrated into such as bar code scanner or other and activate the device that takes place the usual means of address or be in same place with it.For example, theactivator appliance 720 of the check-out counter of retail point is fixed usually, powers by 115V (in the U.S.) AC power supplies, and communicates via wired connection and NOC and/or the chain-circuit system such as cashier's machine.Yet theactivator appliance 720 that is used for medium/client's center applications also can be that move, battery-powered, and carries out radio communication with NOC.
[0145] be independent of specific system embodiment (as retailer, medium/client),activator appliance 720 comprisesadjacent communication module 721,processor 722,memory 723, and power supply 724.Activator appliance 720 may further comprise or several in the following:
Identifier (" activating ID ") 725;
Activator appliance key 726;
Allpurpose communication module 727;
Input module 728;
Visual output module 729;
Security module 730.
[0146]adjacent communication module 721 is used for sending data and/or electric power to active device 710.Adjacent communication module 721 can be supported one or more wired and wireless modes, includes but not limited to IR, UV, RF, electromagnetism, sound, electric induction (by direct contact) etc.For example, electromagnetic radiation can be used for transmitting electric power toactive device 710 and RF is used for the identical or different signal transmitting and receiving data or the combination of data andelectric power.Processor 722 is the device of general purpose microprocessor or application-specific IC or other suitable deal with data and instruction normally.When activatorappliance 726 was integrated into point of sales system,processor 722 can be shared for example scanner or cashier's machine etc. by other devices (other elements of activator appliance).
[0147]memory 723 electronics normally, and can be programmable, writeable, erasable or read-only.The information that is stored in thememory 723 can be temporary transient or permanent, and it can comprise the data that are associated withactivator appliance 720,active device 720, NOC and chain-circuit system and transaction etc., decision rule, instruction etc.For example,memory 723 may comprise manufacturer before transportation canned data (as,activator appliance ID 725,activator appliance key 726, product code, date of manufacture and lot number).Memory 723 also may comprise with the relevant information of retailer or storage foreground (as, retailer and storage foreground identifier, retailer's special product/stock code etc.).Memory 723 also may comprise network and dial telephone address, be used for NOC and chain-circuit system (as, cashier's machine or barcode scanner)communicate.Memory 723 also may compriseobject key.Memory 723 also may comprise with the relevant information of transaction (as, authorize, activate and affirmation history, elapsed time etc.).Memory 723 also may comprise from input module 728 (as, card reader, keyboard etc.) information that receives.
[0148] although in some is used such as medium/client uses (referring to XYZ), be battery-powered, power supply 724 is 715V (in the U.S.) AC power supplies normally.Activator appliance ID 725 and activator appliance 720 are associated, and usually can by external device (ED) (as, active device 720, NOC or chain-circuit system) conduct interviews.Activator appliance ID 725 may be the unique ID of activator appliance 720 or the shared ID of a group or a rank device, for example belongs to a certain shops or retailer together with other activator appliances.Activator appliance ID 725 is stored in the electrical storage usually.Activator appliance key 726 is the data that are stored in the activator appliance 720, can be with respect to usually by the activator appliance ID 725 (publicly-owned) of external device (ED) visit, and activator appliance key 726 can not be visited (privately owned) by external device (ED).Usually activator appliance key 726 is data relevant with activator appliance ID 725, although it may be stored afterwards or change, this key may be stored in the activator appliance 720 simultaneously with activator appliance ID 725.Activator appliance key 726 also may be and the relevant or specific data of retailer, shop, retail trader or external device (ED) or system's (as activator appliance).
[0149] allpurpose communication module 727 is to be used for external device (ED) and often is the module that outer device of device such as NOC or chain-circuit system and system communicate.Allpurpose communication module 727 can support local and wide area is wired and/or wireless network.For example, allpurpose communication module 726 can support to be connected to local 802.11 wireless networks of wide area telecommunications network (for example internet or Virtual Private Network), thereby communicates with long-range NOC.
[0150]input module 728 comprise from the personnel that visited activator appliance 720 (as, client, user or employee) there receives the operational blocks which partition system of input.For example be keyboard, card reader, biometric sensors/scanner or the like.The input that receives viainput module 728 can be stored in theactivator appliance 720 and/or thedevice 720 that is activated uses, with realize transaction or be sent to object 700, NOC or suitable chain-circuit system in.Activator appliance 720 can also haveoutput module 729, thereby message transmission is carried out mutual personnel (for example, client, user and employee) with activator appliance 720.Output module 729 may partly comprise one or more devices, these device all LCD in this way (LCD), light-emitting diode (LED), cathode ray tube (CRT) and printer etc.
[0151] activator appliance also may havesecurity module 730, and describedsecurity module 730 is used for realizing safety atactivator appliance 720, particularly stops unwarrantedvisit.Security module 730 can be the device that physicallylocks.Security module 730 also can be the module (as the transponder of GPS) that is used for determiningactivator appliance 720 geographicalposition.Security module 730 can be conditionally (as with time or signal correction) communicate with other devices or system, these devices or system are such as being cashier's machine, LAN server orNOC 740.
[0152] Figure 26 represents to realize theNOC 740 that concludes thebusiness.NOC 740 is computer systems, and part comprisesprocessor 742,memory 742 and communication module 743.Usually, the position that is activated away fromactivator appliance 720 and object 740 of NOC 740.ButNOC 740 also can be near activator appliance and activation place (as retail shop).In addition, certain performance or function, the especially storage ofobject key 713 thatNOC 740 realizes can be dispersed in different addresses and the device (as retailer, StoreFront, point of sales system, activator appliance etc.).NOC 740 can utilize the data, the decision rule that receive from different entities and different device and system to wait to receive, store and realize transaction, and these different entities include but not limited to object manufacturer, retail trader, retailer, payment processor, client etc.; Device that these are different and system for example are object, activator appliance and chain-circuit system.Can communicate via wired or wireless communication network and these entities, device and system.
[0153] Figure 27 represents chain-circuit system 750, comprisesprocessor 745,memory 746 and communication module 747.Chain-circuit system 750 may close onactivator appliance 720 or with its at same position, also may be away from activator appliance 720.Chain-circuit system for example is cashier's machine, credit/debit Payment Processing System and inventory system.
[0154] Figure 28 represents to be used for activating the system A schematic diagram of object 700.System A comprises:
Object 700 (comprising active device 710);
Activator appliance 720;
Adjacent communication 750.
[0155]adjacent communication 750 is used for transmitting data and/or electric energy betweenobject 700 and activator appliance 720.Adjacent communication 750 may be unidirectional or two-way, and uses one or more wired or wireless communication meanss.Adjacent communication 750 can be initiated by communication module 715 (object 700) or adjacent communication module 721 (activator appliance 720).For example,adjacent communication 750 may be initiated byobject 700 being moved on in electromagnetic field or the RF field, being placed onobject 700 before the infrared sensor or directly contacting (as with electronics or Mechanical Contact) with activator appliance 720.Adjacent communication 750 also can be initiated by the RF signal that communication module 711 (object 700) is received by broadcasting by adjacent communication module 721.Adjacent communication 750 also can be received from chain-circuit system byactivator appliance 720 and import and initiate, and this chain-circuit system is such as being bar code reader, cashier's machine or media player.
That [0156] Figure 29 represents is first embodiment of the A of system, and this system can activate theobject 700 that comprises active device 710.In the example of the A of system,activator appliance 720 receives thecommunication 751 that comprisesobject ID 716, and wherein,object ID 716 is used forobject 700 is associated with data that are stored inmemory 723 and/or decision rule.Activator appliance 720 (processor 722) is carried out decision rule and is transmittedcorrect activation signal 752 with adjacent communicationmodule 727.Object 700usefulness communication modules 711 received communications 752.The change oflogic 712 realization condition logics and storing value (memory 713) and suitablystartup realization object 700 changes realizesmodule 714.
[0157] activator appliance 720 can be to object 700 inquiry object IDs 716.Perhaps, the broadcasting of object 716 or the signal that is provided via communication module 711 by object 700 can be provided activator appliance 720.The example of system A is a retail trade system, and in this system, only belonging to specially, retailer's product just can be activated by the activator appliance 720 of retail shop (retailer, the object that closes on and cash desk are arranged in retail shop) lining.In this example, activator appliance 720 receives the signal 751 from object 700, and wherein object 700 comprises object ID 716, and object ID 716 is used for object 700 identified and becomes to belong to particular retailer (for example, retailer's code).If activator appliance 720 confirms that object ID 716 belongs to the retailer that activator appliance 720 is authorized to activate, then activator appliance 720 just sends the activation signal (communication 752) that comprises the retail code.Object 700 received signals 752 also compare the value of being stored in retail code and the memory 713.If the two is complementary, for example, processor logic 712 will start change and realize module 714, for example comes closed circuit, so that object 700 operate as normal (recovering its effectiveness).The power supply of above mentioning in the example 715 may be internal cell or external power source (such as communication 752).
[0158] Figure 30 represents the B of system, and system B can activate object 700 (having active device 710), transmits relevant information (communication 753) to chain-circuit system 750.Communication 753 may comprise one or more data (not shown)s that send one or more chain-circuit systems according to the serial or parallel mode to.
[0159] communication 753 can comprise: the data relevant with object 700, and/or the data (for example activator appliance ID 725) relevant with activator appliance 720.Such as, communication 753 can comprise an object identifier 716, it can be connected system 750 and receive (for example cashier's machine), thereby realizes financial transaction (promptly collecting the expense of object 700 to the client) and upgrade stock inventory.A concrete example is the bar code that communication 753 simulations are read by bar code scanner usually.Communication 753 (for example can depend on communication 752 communication, before communication 753, activation signal has been sent to object 700, wherein chain-circuit system 750 is used communication 753, thereby to client charge), or 752 communications (as activating the expense that object 700 forward direction clients collect object 716) that depend on communication 753 of communicating by letter.Communication 753 can comprise and the relevant data of object 700 activation that these data obtain (for example employee identification symbol or the promotion code of importing via input module 728) via activator appliance 720 from other sources outside the object 700.Another example of system B is that communication 753 comprises the system relevant with the activation of object 700, wherein object 700 is communicated by letter with chain-circuit system 750, and chain-circuit system 750 is (such as being used for stock/production management, audit etc.) computer systems of the manufacturer or the retail trader of object 700.
That [0160] Figure 31 represents is another embodiment (having active device 710) that can activate the system B ofobject 700, in this system, activates communication (communication 752) and depends on thecommunication 754 from chain-circuit system 750.For instance, 752responsible activator appliance 720 received signals of communicating by letter, this signal indication financial transaction is finished by chain-circuit system 750, and for example, the client had been that the object of being bought 700 has been paid money just beforeobject 700 activates.
[0161] another example of the B of system is a kind of system, 752dependence activator appliances 720 receivedcommunication 754 from chain-circuit system 750 (inventory system) of wherein communicating by letter, the quantity ofobject 700 that can be for sale in the affirmation stock.
[0162] another example of the B of system is, whereinobject 700 is limited class article, such as being fit to film (for example R level DVD) that the adult watches or the electronic game that divides age category.In this case, chain-circuit system 750 receivesobject ID 716 bycommunication 753, whether needs other inputs (such as employee identification symbol or client's birthday) with decision before communicating 754.Same conditional logic also can be finished byactivator appliance 720, can or swipe the card etc. by artificial input, atactivator appliance 720 places or chain-circuit system 750 places obtain employee's input.In another example of the B of system, communication 752 (such as following variablees: the activationary time section of object, the access times of object, addressable content, activated functional etc.) is depended in the change ofobject 700 conditionally, 752 depends on included variable in thecommunication 754 conditionally and communicate by letter.
[0163] except thatactive device 710, object 700 can also integrated devices, in order to the variation that determines to expect in a certain object whether (such as checking whether a certain circuit is closed, perhaps the electricity of measuring object or optical properties) take place.This device can be included within theobject 700 and withactivator appliance 720 and communicate.This device can also be betweenobject 700 and activator appliance 720 (such as a crossing object and activator appliance and detected in activator appliance/circuit of measuring).This device can also be connected to the conditioned disjunction Boolean logic (if surpass a certain threshold value such as measured value, just sending signal to activator appliance) in the object, and activator appliance is to transmission confirmation signals such as chain-circuit systems (cashier's machine).Use comes the realization condition logic from the information (numerical value or decision rule etc.) that NOC receives.
[0164] Figure 32 represents the instantiation of the B of system, wherein communicate by letter and 753 depend onactivator appliance 720, described activator appliance 720 (from the device of the alterable features of decision objects 700) received communication 751a, whether communication 751a can be changed (activation) by verification object 700.Such as, cashier's machine (chain-circuit system 750) receivedcommunication 753 depends onactivator appliance 720 received communication 751a, before collecting the payment ofobject 700 to client, confirms thatobject 700 has been activated.
[0165] Figure 33 represents the C of system, and system C can activate object 700 (having active device 720), and comprisesobject 700,activator appliance 720 and NOC 740.The example of system C is a kind of system, and whereinactivator appliance 720 751 is receivedobject ID 716 by communicating byletter.Activator appliance 720 is comprising that thecommunication 755 ofobject ID 716 is sent to NOC 740.NOC 740 receivescommunication 755, then by coming query object key 717 withobject ID 716related.NOC 740 comprises that thecommunication 756 ofobject key 717 is sent toactivator appliance 720 to part.After receivingcommunication 756,activator appliance 720 just transmits the activation communication (communication 752) that wherein partly includes objectID 713.Object 700 752 receivesobject key 716 by communicating by letter, andlogic 712 usefulness object key 716 activate change and realizemodule 714, realizes variation in theobject 700 with this.In the another one example of the C of system,communication 755 comprises anactivator appliance ID 725, and this ID ofNOC 740 usefulness authenticates activator appliance 720.In another example of the C of system,communication 755 includes input from input module 728 (such as user identity card number or PIN code, or POS etc.), andNOC 740 realizes communicating byletter 756 conditionally with this.
[0166] Figure 34 represents the D of system, and in the D of system,communication 753 depends oncommunication 756 conditionally.Such as, thecommunication 756 interior chain-circuit systems 750 that can comprise will be collected the information of client's price (byactivator appliance 720, transmitting ascommunication 753).Communication 753 can depend oncommunication 756 conditionally, 756 depends on conditionally then by the 755activator appliance ID 725 that receive that communicate by letter and communicate by letter.Such as, the expense that chain-circuit system 750 will be collected client depends onobject 700 and retailer (relevant with activator appliance ID 725).
[0167]communication 756 may comprise other data aboutobject 700, and these data are used foractivator appliance 720, whenNOC 740 transmits authorization code (object key 717), is used for realizing transaction (such as the price or the expense ofobject 700).Communication 753,communication 754,communication 755 and communicate by letter and 756 can use separately also can combine use, thereby be used for identification, authentication or authorizeactivator appliance 720 to stop unwarranted use.Such as,NOC 740 or chain-circuit system 750 can be guaranteed safety by certain methods, these methods for example, if activator appliance at first be not identified, verify and authorize, then refuse the request (object key for example is provided) that the activator appliance requirement is participated in business.Except being outside the particular data and algorithm of purpose, also can use other modules (such as GPS transmitter and receiver, relatively and absolute time signal etc.) with this (such as, activator appliance key 726).
[0168] Figure 35 represents the D of system, wherein communicate byletter 756 depend on conditionallycommunication 754; Such as,NOC 740transmission object keys 716 depend on the notice thatNOC 740 receives, this notice in chain-circuit system 750 (by activator appliance 720) paid fund.In another example of the D of system,communication 752 depends oncommunication 754 conditionally and communicates byletter 756; 756 both after just begin communicate byletter 751 with communicating by letter such as 720 of, activatorappliances receiving communication 754.
[0169] Figure 36 represents the E of system, and whereinNOC 740 receivescommunication 757 from chain-circuit system 750.Communication 757 may comprise the data from object 700 (such as object ID 716), activator appliance 720 (such as activator appliance ID) and chain-circuit system 750 (notice of received payment such as whether).Communication 758 may comprise the data that are used for chain-circuit system 750 (confirming such as buying), activator appliance 720 (for example the activator appliance key 726) and object 700 (such as object key 717).
[0170] Figure 37 represents the F of system, and whereinobject 700 comprisesobject ID 716 and object key 717, thisobject 700 by frommanufacturer 760 transmission (transmission 761) to theshop 770 and be activated in theshop.Manufacturer 760 sends toNOC 740 viacommunication 762 withobject ID 716 and object key 717.Communication 762 is usually via communication network.In order to activateobject 700 inshop 770, object is placed on the place nearactivator appliance 720, andactivator appliance 720 can be connected communicatedly withNOC740.Via communication 751,activator appliance 720 obtainsobject IDs 716 fromobject 700, and viacommunication 755object ID 716 is sent to NOC 740.NOC 740 searches theobject key 717 that is associated withobject ID 716 inmemory 742, wherein memory to small part comprises the information that is obtained frommanufacturer 760 viacommunication 762.NOC 740 is sent toactivator appliance 720 to object key 717 viacommunication 756, andactivator appliance 720 is sent to object 700 viacommunication 752 withobject key 717then.Logic 712 in theobject 700 comparesactivator appliance 720 object key 717 that transmits and theobject key 717 that is stored in thememory 713, if the two coupling,logic 712 will activate change implementdevice 714 so, and it recovers effectiveness withobject 700 subsequently.
[0171] Figure 38 represents the G of system, and the G of this system is the expansion embodiment of the F of system, and it comprises chain-circuit system 750 (such as cashier's machine), and chain-circuit system 750 can be connected communicatedly withactivator appliance 720 in theshop 770; System G further is included in thecommunication 764 betweenNOC 740 and the manufacturer 760.Communication 764 can comprise and the relevant data of object that activate manufacturer 706.
[0172] Figure 39 represents the H of system, comprising theobject 700 ofobject ID 716 and object key 717, byretail distribution channel 771, is transferred to client's dwelling house 772 from manufacturer 760.Retail distribution channel 771 may be made of a plurality of entities and place, to adapt to different client's retail modes, comprises the retail mode in internet/phone/mail-order and traditional entity shop (bricks-and-mortar).System H further comprises the chain-circuit system 773 that can be connected toNOC 773 communicatedly.Chain-circuit system 773 may be the retailer's of object 700 a computer system, and comprises the Customer Information relevant with activating sale (such as authority to purchase (AP)) and be sent to NOC viacommunication 763.
[0173] Figure 40 is illustrated in the object 700 (computer in the DVD in for example plainly-packed DVD box, carton etc.) in the packing 780.Figure 41 represents one or more communications, and these communications relate to bridge joint or pass packing 780 and communicate (data and/or energy) betweenobject 700 and external device (ED).This communication can be wireless or wired medium or device, also can be the different medium of various suitable relay datas and/or energy or the combination of device, these media or device comprise: lead, flat cable, bright window or lens (visible light, IR, UV radiation); RF, sound, electromagnetic transmitter/receiver, antenna, rectifier, energy source (as light-emitting diode).Such as,communication 781 can be passed through electromagnetic field wirelesstransmission energy.Communication 782 can be passed through RF wirelessly transmitting data andenergy.Communication 783 and 784 can be via the cable transmission data and the energy of the method that adopts the bridgejoint packing.Communication 783 and 784 may be passed through diverse ways, such as (183) and UV (184) method of wired/electronics, perhaps RF (183) and electronics/wired (184) method.
[0174] Figure 42 is illustrated in theobject 700 in the packing 780, on the packing 780 or pack the distributed component that comprisesmemory 713 in 780.Memory 713 in this configuration may comprise that these information are according to the form storage such as type slug font code or RFID label in order to activateobject ID 716 or other information ofobject 700.
[0175] communication means between external device (ED) and thememory 713 may be different with the method for direct communication between external device (ED) and the object 700.May be used for connection object ID frommemory 713 such as, infrared communication 791 (such as bar code scanner).Another example is to comprise that thememory 713 ofobject ID 716 is integrated into the RFID label that is embedded in the packing 780, and conduct interviews via RF communication 792.In a back example, can strengthen RFID, so that can utilize communication module 793 to come communication between bridge joint external device (ED) and the object 700.Communication module 793 can be different from thecommunication 792 that is used betweenmemory 713 and the external device (ED).
[0176]active device 710 can be merged into an item independent, that can generate in batches, thereby replenishes existing industrial standard: " RFID inductor " comprising:
Communication module 711 (RF transceiver);
Logic 712 and memory 713 (microcontroller);
Change implement device 714: such as, have the electronic switch of two outputs;
Power supply 715 (RF transceiver/rectifier);
Object ID 716;
Object key 717.
[0177] Shang Mian RFID effectiveness device can be set an independent unit for, can be arranged to the breach (for example, the breach on printed circuit board trace) in bridge data or the power circuit; A raised pad is ended on each limit, and welding realizes the output of the module of variation.When change realized that module activates (switch closure), circuit was finished, and the effectiveness ofobject 700 is resumed.
[0178] alternatively, change realization module 714 (switch) can be separated with RFID effectiveness device, and be embedded into inaccessible in theobject 700 or unknown position (, or removing certain part below or rear of object from RFID effectiveness device) such as within printed circuit board (PCB).In case satisfy correct condition (such as receiving suitable activation communication), RFID effectiveness device will Closing Switch, recovers the effectiveness of object.
[0179] various system and method as herein described is compared with previous system, have many good qualities and difference, comprising:
Activating does not need to depend on object initialization active module conditionally; These modules are positioned at object inside;
Not at the enterprising line activating of network-level, got rid of change to object (such as, authorize credit card or advance payment phonecard);
" activation " is not limited to change the data that are stored in the object memories, outside device (such as computer) or network (credit card processing) also with its realize changing output how to use object (such as, enciphered data can not weaken the ability that DVD player " reads " DVD; Only weakened the ability of DVD player " explanation " data);
Object or Object Operations module are not carried out irreversible restriction and make the permanent change of its effectiveness;
Obtain the information of object (such as, in response to separating activation signal) or general activation signal (such as, the induction safety label) before, do not change; And
Object can under its non operating state, be activated (such as, do not need at first object to be taken out in the packing and plug in).
[0180] although this paper discloses certain preferred embodiment of the present invention and optional embodiment, should be understood that, utilize the present invention, can carry out various modification and expansion above-mentioned technology.All such modifications and expansion all are included in the connotation and scope of claims.