The present invention relates to monitoring transport of electronic documents, more particularly but not exclusively to such monitoring for the enforcement of secrecy and confidentiality.
Modern businesses and industries rely heavily on the creation, storage and transportation of digital documents and other kinds of digital files as a primary means of communication, information storage, and documentation. In many cases, the digital documents and files contain proprietary and/or confidential material. These documents and files may easily be disseminated in an unauthorized manner using standard electronic mail. Companies are therefore at daily risk of disclosing sensitive internal documents, leading to substantial financial losses. Banking, legal, medical, government, and manufacturing companies have much to lose if sensitive internal documents are leaked. The safe distribution of internal documents, memos, blueprints, payroll records, patient medical information, banking and financial transactions etc, is becoming more complex to ensure. In fact, as a consequence of such leaks, the United States federal government was prompted to intervene and has mandated that companies should protect sensitive information such as financial and patient medical records. From the company and business standpoint, potential risks include financial losses, fiduciary risks, legal problems, competitive intelligence, public relations problems, loss of clients and privacy liability. There is therefore a great interest in methods that mitigate disclosure of confidential digital documents.
One of the greatest obstacles to a reliable security system and mechanism is what known as “the human factor”: methods and systems for securing digital documents and digital media content that require the user to perform tedious and/or cumbersome operations in order to secure the media are rendered, in many cases, ineffective. If the user does not perform the required operations, the digital documents and the digital media remain unprotected, regardless of the strength of the basic security mechanism which underlies the system. It is therefore vital for any practical security system to be “user friendly”, such that the very action of securing the digital documents and the digital media will be a natural part of the workflow. Many of the currently used security procedures are not embedded into the natural workflow, thereby effectively discourage the users from follow the established security procedure by making it possible to neglect to use those procedures without effecting the workflow, thereby effectively causing an overall decrease in the total security level.
Another important aspect of successful security system is its compatibility with current standards and formats and with popular mailing software. Many security systems do not comply with popular formats and software which enjoy a large customer base. Such security systems present a hazard for potential costumers, regardless of the security and the sophistication of the underlying mechanism.
Another important aspect of securing documents and other confidential material, which does not exist in some of the current systems, is an effective classification method. Since there is a cost and overhead for any level of security, the level of confidentiality may be matched by different protection measures, in a manner that would balance the hazards of unauthorized disclosure and the overall cost of the protection measures, in order to assure that the system is cost-effective and that the classification tags are being taken seriously by the users
There is thus a recognized need for, and it would be highly advantageous to have, a method and system that allows control of unauthorized dissemination of electronic mail, which overcomes the drawbacks of current methods as described above.
The present invention seeks to provide a novel method and system for the mitigation of illegal and unauthorized disclosure of electronic documents, without otherwise interfering with rightful usage and the privacy of the users. Specifically, the current invention provides methods for constructing a user-friendly e-mail security system that is compatible with current modes of operation and current electronic mailing software and standards.
According to a first aspect of the present invention there is provided a method for classification and enforcement of security requirements in an information dissemination system, where the information dissemination system is not designed for the specification and enforcement comprising the steps of:
In another preferred embodiment of the present invention, the security requirements are specified implicitly, by classifying the information, the classification implies the security requirements.
In another preferred embodiment of the present invention, the classification comprises at least one of the following:
In another preferred embodiment of the present invention, the security requirements comprise requirements about at least one of the following:
In another preferred embodiment of the present invention, the information comprises at least one of the following:
In another preferred embodiment of the present invention, the security requirements are stored in at least one of the following:
In another preferred embodiment of the present invention, the information comprises at least one E-mail message, and the security requirements are embedded in at least one of the following:
In another preferred embodiment of the present invention, the enforcement module comprises at least one of the following:
In another preferred embodiment of the present invention, the information dissemination system comprises software, and the method is implemented by at least one of the following:
In another preferred embodiment of the present invention, the enforcement comprises at least one of the following:
In another preferred embodiment of the present invention, the information dissemination system comprises at least one of the following:
In another preferred embodiment of the present invention, the information dissemination system comprises Microsoft® Outlook® and the method is implemented by utilizing at least one of the following fields:
According to a second aspect of the present invention there is provided a system for classification and enforcement of security requirements operating in conjunction with an information dissemination system, where the information dissemination system is not designed for the specification and enforcement, the system for classification and enforcement of security requirements comprising:
In another preferred embodiment of the present invention, the security requirements are specified implicitly, by classifying the information, the classification implies the security requirements.
In another preferred embodiment of the present invention, the classification comprises at least one of the following:
In another preferred embodiment of the present invention, the security requirements comprise requirements about at least one of the following:
In another preferred embodiment of the present invention, the information comprises at least one of the following:
In another preferred embodiment of the present invention, the security requirements are stored in at least one of the following:
In another preferred embodiment of the present invention, the information comprises at least one E-mail message, and the security requirements are embedded in at least one of the following:
In another preferred embodiment of the present invention, the enforcement module comprises at least one of the following:
In another preferred embodiment of the present invention, the information dissemination system comprises software, and the system for classification and enforcement of security requirements is implemented by at least one of the following:
In another preferred embodiment of the present invention, the enforcement comprises at least one of the following:
In another preferred embodiment of the present invention, the information dissemination system comprises at least one of the following;
In another preferred embodiment of the present invention, the information dissemination system comprises Microsoft® Outlook® and the system for classification and enforcement of security requirements is implemented by utilizing at least one of the following fields:
The present invention successfully addresses the shortcomings of the presently known configurations by providing a method and system for for controlling unauthorized dissemination of electronic mail, which can efficiently serve digital information protection.
For a better understanding of the invention and to show how the same may be carried into effect, reference will now be made, purely by way of example, to the accompanying drawings.
With specific reference now to the drawings in detail, it is stressed that the particulars shown are by way of example and for purposes of illustrative discussion of the preferred embodiments of the present invention only, and are presented in the cause of providing what is believed to be the most useful and readily understood description of the principles and conceptual aspects of the invention. In this regard, no attempt is made to show structural details of the invention in more detail than is necessary for a fundamental understanding of the invention, the description taken with the drawings making apparent to those skilled in the art how the several forms of the invention may be embodied in practice. In the accompanying drawings:
The present embodiments deal, generally speaking, with protection against unauthorized dissemination of classified digital documents.
In a preferred embodiment of the present invention, the method provides a utility that allows the leverage of current features to create classification of security requirements, to be utilized by components of the security system, in order to govern the routing of e-mail messages.
In a preferred embodiment of the present invention the user uses a user interface in order to provide details regarding the required security handling policies with respect to the content of the mail he or she creates. These details may, for example, include limitation on distribution such as authorized recipients groups or security and confidentiality level. After these details are entered, the system enforces the indicated handling of outgoing mail by intercepting and blocking mails whose destination and sending method is not allowed according to those details. In a preferred embodiment of the present invention the system alerts authorized personnel and/or the sender and/or the original composer of the mail when blocking occurs. In another preferred embodiment of the present invention, the mail is not blocked for certain security handling policies and only the alerting occurs. In another preferred embodiment of the present invention, for certain security handling policies, the blocked mails can be sent by authorized users in order to override the blocking action
In a preferred embodiment of the present invention the user interface is integrated into the mailing software by implementing an extension to the mailing software.
In another preferred embodiment of the present invention the user interface is integrated into the mailing software by intrinsic support within the mailing software.
In another preferred embodiment of the present invention the user interface is integrated into the mailing software by an external utility.
In another preferred embodiment of the present invention the user interface is integrated into the mailing software by a combination of an external utility and an extension of the mailing software and/or intrinsic support within the mailing software.
In a preferred embodiment of the present invention, the mailing software is Microsoft® Outlook®.
In a preferred embodiment of the present invention Outlook® is extended by implementing a COM (Microsoft® Component Object Model) object preferably implemented as a dynamic link library—DLL, which utilizes Outlook® Add-In support COM interfaces. This is referred to as an Outlook® Add-In.
In another preferred embodiment of the present invention, the mailing software is Microsoft® Outlook® Express.
In a preferred embodiment of the present invention, an existing interface is extended as part of the user interface support (for example the sensitivity drop-down box in Microsoft® Outlook®.
In a preferred embodiment of the present invention, a property sheet is added to the options interface as part of the user interface support.
In another preferred embodiment of the present invention, a command bar button is added as part of the user interface support.
In another preferred embodiment of the present invention, some of the events (for example composing a new mail, or sending mail) are handled as part of the user interface support (e.g. causing a window to pop up).
In another preferred embodiment of the present invention windows in which user interaction is possible are parts of the user interface support.
In a preferred embodiment of the present invention ActiveX® controls (a specialized kind of COM objects conforming to a specified interface) are utilized as part of the user interface support.
In a preferred embodiment of the present invention an external utility handles events in the mailing software and implements part of the user interface support.
In a preferred embodiment of the present invention, part of the user interface support in Microsoft® Outlook® include utilizing the categories and/or sensitivity and/or importance fields in order to reduce (or eliminate) the need to implement an extension. E.g. a distribution groups can be indicated by some of the categories selected and sensitivity can indicate the confidentiality level classification.
In a preferred embodiment of the present invention, part of the user interface support in Microsoft® Outlook® extending and/or changing the sensitivity and/or importance fields' underling enumerated type ranges.
In a preferred embodiment of the present invention, part of the user interface support in Microsoft® Outlook® includes utilizing the mileage and/or the billing information and/or the companies.
In a preferred embodiment of the present invention, part of the user interface support in Microsoft® Outlook® includes utilizing the user properties fields that provides support for adding named property fields.
In a preferred embodiment of the present invention some of the information is embedded in mail headers and/or attachments
Before explaining at least one embodiment of the invention in detail, it is to be understood that the invention is not limited in its application to the details of construction and the arrangement of the components set forth in the following description or illustrated in the drawings. The invention is applicable to other embodiments or of being practiced or carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein is for the purpose of description and should not be regarded as limiting.
Reference is firstly made to
In another preferred embodiment of the present invention, the enforcement module comprises at least one of the following:
In another preferred embodiment of the present invention, the information dissemination system comprises software, and the system for classification and enforcement of security requirements is implemented by at least one of the following:
Reference is now made to
Reference is now made to
Reference is now made to
Reference is now made to
In another preferred embodiment of the present invention, the security requirements comprise requirements about at least one of the following:
For example, a user with a secret security classification may not be allowed to send top secret classified information to external recipients, or may only be allowed to send secret classified information when encrypted or to a restricted set of recipients.
In another preferred embodiment of the present invention, the security requirements are stored in at least one of the following ways:
In another preferred embodiment of the present invention, the information comprises at least one E-mail message, and the security requirements are embedded in at least one of the following:
In another preferred embodiment of the present invention, enforcement is carried out using at least one of the following:
In another preferred embodiment of the present invention, the information dissemination system comprises Microsoft Outlook™ and the system for classification and enforcement of security requirements is implemented by utilizing at least one of the following fields:
The default values of those fields may be changed, or interpreted in a way which would encourage the user to utilize these fields, for example, by changing the normal workflow for these values (e.g. by displaying a message box, or blocking the sending of the information for some or all recipients).
In a preferred embodiment of the present invention the user uses a user interface in order to provide details regarding the required security handling policies of the mail she or he creates. These details may include, for example, limitations on distribution such as to authorized recipients or groups thereof or confidentiality level classification. After these details are entered, the system enforces the indicated handling of outgoing mail by intercepting and blocking mails whose destination and sending method is not allowed according to those details. The system may also alert authorized personnel and/or the sender and/or the original composer of the mail when a block occurs. In another preferred embodiment of the present invention, according to certain security handling policies, the mail is not actually blocked, but only the alerting occurs. In another preferred embodiment of the present invention, for certain security handling policies, the blocked mails can be resent by authorized users in order to override the block, thereby allowing recovery from system errors.
In a preferred embodiment of the present invention the user interface is integrated into the mailing software by implementing an extension to the mailing software, by intrinsic support within the mailing software, by an external utility or by combination of the above.
In a preferred embodiment of the present invention, the mailing software is Microsoft® Outlook®.
In a preferred embodiment of the present invention Microsoft® Outlook® mailing software is extended by implementing a COM (Microsoft® Component Object Model) object, preferably implemented as a dynamic link library—DLL, which utilizes Outlook® Add-In support COM interfaces. This is referred to as an Outlook® Add-In.
In another preferred embodiment of the present invention, the mailing software is Microsoft® Outlook® Express.
In a preferred embodiment of the present invention, an existing interface is extended as part of the user interface support, for example the sensitivity drop-down box in Microsoft® Outlook®.
In a preferred embodiment of the present invention, a property sheet is added to the options interface as part of the user interface support. Adding such a property sheet enables the addition of data entry fields to the user interface.
In another preferred embodiment of the present invention, a command bar button is added as part of the user interface support.
In another preferred embodiment of the present invention, some of the events (e.g., composing a new mail or sending mail) are handled as part of the user interface support (e.g. causing a window to pop up).
In another preferred embodiment of the present invention, windows in which user interaction is possible are parts of the user interface support.
In a preferred embodiment of the present invention, ActiveX® controls (i.e., a specialized kind of COM objects conforming to a specified interface) are utilized as part of the user interface support.
In a preferred embodiment of the present invention, an external utility handles events in the mailing software and implements part of the user interface support.
In a preferred embodiment of the present invention, part of the user interface support in Microsoft® Outlook® includes utilizing the categories and/or sensitivity and/or importance fields in order to reduce or eliminate the need to implement an extension. E.g., distribution groups can be indicated by some of the categories selected and sensitivity can indicate the confidentiality level classification.
In a preferred embodiment of the present invention, part of the user interface support in Microsoft® Outlook® includes extending and/or changing the sensitivity and/or importance fields and/or other enumerated type ranges.
In a preferred embodiment of the present invention, part of the user interface support in Microsoft® Outlook® includes utilizing the mileage and/or the billing I information and/or the companies and/or the user properties fields.
In a preferred embodiment of the present invention, part of the user interface support in Microsoft® Outlook® includes utilizing the ability to add named fields in Microsoft® Outlook® in order to provide classification labels.
In a preferred embodiment of the present invention some of the classification information is embedded in mail headers and/or attachments. (Note that in the case of Microsoft® Outlook®, some of the aforementioned fields are automatically included as headers.)
In a preferred embodiment of the present invention the mailing software is IBM® Lotus® Domino® server or Lotus Notes®, and the information is embedded into the access control data. In another preferred embodiment of the present invention the mailing software is IBM® Lotus® Domino® server or Lotus Notes® and the information is transferred separately from the sent note. In another preferred embodiment of the present invention the mailing software is IBM® Lotus® Domino® server or Lotus Notes® and the information is attached to the note as a part thereof.
It is appreciated that one or more steps of any of the methods described herein may be implemented in a different order than that shown, while not departing from the spirit and scope of the invention.
While the methods and apparatus disclosed herein may or may not have been described with reference to specific hardware or software, the methods and apparatus have been described in a manner sufficient to enable persons of ordinary skill in the art to readily adapt commercially available hardware and software as may be needed to reduce any of the embodiments of the present invention to practice without undue experimentation and using conventional techniques.
A number of features have been shown in various combinations in the above embodiments. The skilled person will appreciate that the above combinations are not exhaustive, and all reasonable combinations of the above features are hereby included in the present disclosure.
While the present invention has been described with reference to a few specific embodiments, the description is intended to be illustrative of the invention as a whole and is not to be construed as limiting the invention to the embodiments shown. It is appreciated that various modifications may occur to those skilled in the art that, while not specifically shown herein, are nevertheless within the true spirit and scope of the invention.
This application is related to and claims priority from U.S. Provisional Patent Application No. 60/353,997, filed Feb. 5, 2002, the contents of which are hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
5278955 | Forte et al. | Jan 1994 | A |
5440723 | Arnold et al. | Aug 1995 | A |
5444779 | Daniele | Aug 1995 | A |
5870744 | Sprague | Feb 1999 | A |
6006332 | Rabne et al. | Dec 1999 | A |
6076105 | Wolff et al. | Jun 2000 | A |
6115533 | Tahara et al. | Sep 2000 | A |
6167136 | Chou | Dec 2000 | A |
6282175 | Steele et al. | Aug 2001 | B1 |
6324650 | Ogilvie | Nov 2001 | B1 |
6332030 | Manjunath et al. | Dec 2001 | B1 |
6370574 | House et al. | Apr 2002 | B1 |
6430177 | Luzeski et al. | Aug 2002 | B1 |
6646676 | DaGraca et al. | Nov 2003 | B1 |
6651099 | Dietz et al. | Nov 2003 | B1 |
6691156 | Drummond et al. | Feb 2004 | B1 |
6725371 | Verhoorn, III et al. | Apr 2004 | B1 |
6732101 | Cook | May 2004 | B1 |
6732149 | Kephart | May 2004 | B1 |
6826609 | Smith et al. | Nov 2004 | B1 |
6920482 | Fujiyoshi | Jul 2005 | B1 |
7003731 | Rhoads et al. | Feb 2006 | B1 |
7107618 | Gordon et al. | Sep 2006 | B1 |
7240209 | Carro | Jul 2007 | B2 |
7249175 | Donaldson | Jul 2007 | B1 |
20010034849 | Powers | Oct 2001 | A1 |
20010046069 | Jones | Nov 2001 | A1 |
20010049790 | Faccin et al. | Dec 2001 | A1 |
20020078158 | Brown et al. | Jun 2002 | A1 |
20020104026 | Barra et al. | Aug 2002 | A1 |
20020112015 | Haynes | Aug 2002 | A1 |
20020120581 | Schiavone et al. | Aug 2002 | A1 |
20020120692 | Schiavone et al. | Aug 2002 | A1 |
20020120869 | Engstrom | Aug 2002 | A1 |
20020124052 | Brown et al. | Sep 2002 | A1 |
20020129140 | Peled et al. | Sep 2002 | A1 |
20020140986 | Takayama | Oct 2002 | A1 |
20020169954 | Bandini et al. | Nov 2002 | A1 |
20020194280 | Altavilla et al. | Dec 2002 | A1 |
20020194308 | Hall | Dec 2002 | A1 |
20030055907 | Stiers | Mar 2003 | A1 |
20030093518 | Hiraga | May 2003 | A1 |
20030126463 | Sistla | Jul 2003 | A1 |
20030135564 | Tsuchiya | Jul 2003 | A1 |
20030149732 | Peled et al. | Aug 2003 | A1 |
20030152207 | Ryan | Aug 2003 | A1 |
20030229673 | Malik | Dec 2003 | A1 |
20040025057 | Cook | Feb 2004 | A1 |
20040049696 | Baker et al. | Mar 2004 | A1 |
20040059786 | Caughey | Mar 2004 | A1 |
20040533677 | Peled et al. | Apr 2004 | |
20040136513 | Chiu | Jul 2004 | A1 |
20040177271 | Arnold et al. | Sep 2004 | A1 |
20050025291 | Peled et al. | Feb 2005 | A1 |
20050138353 | Spies et al. | Jun 2005 | A1 |
20100023754 | Peled et al. | Jan 2010 | A1 |
Number | Date | Country |
---|---|---|
19734585 | Feb 1999 | DE |
2350747 | Dec 2000 | GB |
11-110556 | Apr 1999 | JP |
2000-353133 | Dec 2000 | JP |
2004-533677 | Nov 2004 | JP |
WO 9833340 | Jul 1998 | WO |
WO 0277847 | Mar 2002 | WO |
Entry |
---|
Official Action Dated Jan. 5, 2009 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/927,044. |
OA Jan. 5, 2009. |
OA of May 23, 2008. |
OA of Jan. 3, 2008. |
Official Action Dated Feb. 22, 2008 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/003,269. |
Official Action Dated Jun. 25, 2007 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/003,269. |
Official Action Dated Mar. 13, 2009 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/003,269. |
Notice of Allowance Dated Jun. 30, 2009 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/003,269. |
Official Action Dated Nov. 23, 2005 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/003,269. |
Examiner's Report Dated Jan. 17, 2007 From the Australian Government, IP Australia Re.: Application No. 2002225312. |
International Preliminary Examination Report Dated Dec. 6, 2002 From the International Preliminary Examining Authority Re.: Application No. PCT/IL02/00037. |
International Search Report Dated Jun. 5, 2002 From the International Searching Authority Re.: Application No. PCT/IL02/00037. |
Official Action Dated Mar. 5, 2007 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/003,269. |
Official Action Dated Aug. 10, 2006 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/003,269. |
Official Action Dated Nov. 14, 2008 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/003,269. |
Official Action Dated Aug. 25, 2009 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/927,044. |
Response Dated Mar. 17, 2010 to Official Action of Nov. 18, 2009 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/357,201. |
Translation of Notice of Reason for Rejection Dated Oct. 31, 2008 From the Japanese Patent Office Re.: Application No. 2002-575825. |
Official Action Dated Dec. 8, 2010 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/927,044. |
Response Dated Nov. 3, 2010 to Official Action of Jun. 7, 2010 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/927,044. |
Communication Pursuant to Article 94(3) EPC Dated Nov. 13, 2009 From the European Patent Office Re.: Application No. 02715694.2. |
Office Action Dated Oct. 18, 2009 From the Israeli Patent Office Re.: Application No. 170428 and Its Translation Into English. |
Response Dated Dec. 1, 2009 to Requisition of the Examiner of Jun. 2, 2009 From the Canadian Intellectual Property Office Re.: Application No. 2,220,866. |
Response Dated Sep. 1, 2011 to Official Action of May 27, 2011 From the US Patent and Trademark Office Re. U.S. Appl. No. 12/574,787. |
Response Dated Sep. 1, 2010 to Office Action of Apr. 27, 2010 From the Israeli Patent Office Re.: Application No. 170428. |
Office Action Dated Jan. 3, 2008 From the Israeli Patent Office Re.: Application No. 157810. |
Official Action Dated Jun. 8, 2009 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/357,201. |
Official Action Dated Mar. 9, 2007 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/357,201. |
Official Action Dated Jul. 16, 2007 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/357,201. |
Official Action Dated Jun. 17, 2008 From the Japanese Patent Office Re.: Application No. 2002-575825. |
Official Action Dated Oct. 18, 2010 From the US Patent and Trademark Office Re. U.S. Appl. No. 12/574,787. |
Official Action Dated Jan. 19, 2010 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/927,044. |
Official Action Dated May 21, 2008 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/357,201. |
Official Action Dated May 23, 2008 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/927,044. |
Official Action Dated Nov. 29, 2007 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/357,201. |
Official Action Dated Jul. 31, 2006 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/357,201. |
Requisition by the Examiner Dated Jun. 2, 2009 From the Canadian Intellectual Property Office Re.: Application No. 2,440,866. |
Response Dated Feb. 15, 2010 to Office Action of Oct. 18, 2009 From the Israeli Patent Office Re.: Application No. 170428. |
Response Dated Feb. 24, 2010 to Communication Pursuant to Article 94(3) EPC of Nov. 13, 2009 From the European Patent Office Re.: Application No. 02715694.2. |
Sato et al. “Information Distribution Platform Leading the 21st Century Networked Society II, Rights Management”, NTT Technical Journal, The Telecommunications Association (TTA), 12(11): 26-30, Nov. 1, 2000. |
Response Dated Jan. 18, 2011 to Official Action of Oct. 18, 2010 From the US Patent and Trademark Office Re. U.S. Appl. No. 12/574,787. |
Official Action Dated Feb. 10, 2012 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/927,044. |
Notice of Allowance Dated Apr. 7, 2011 From the Canadian Intellectual Property Office Re.: Application No. 2,440,866. |
Official Action Dated Oct. 5, 2011 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/927,044. |
Official Action Dated Nov. 17, 2011 From the US Patent and Trademark Office Re. U.S. Appl. No. 12/574,787. |
Office Action Dated Feb. 20, 2011 From the Israeli Patent Office Re.: Application No. 170428 and Its Translation Into English. |
Official Action Dated Mar. 9, 2011 From the US Patent and Trademark Office Re. U.S. Appl. No. 12/574,787. |
Response Dated Apr. 4, 2011 to Official Action of Mar. 9, 2011 From the US Patent and Trademark Office Re. U.S. Appl. No. 12/574,787. |
Response Dated Apr. 7, 2011 to Official Action of Dec. 8, 2010 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/927,044. |
Official Action Dated May 27, 2011 From the US Patent and Trademark Office Re. U.S. Appl. No. 12/574,787. |
Response Dated Sep. 22, 2011 to Official Action of Jun. 22, 2011 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/927,044. |
Office Action Dated Apr. 27, 2010 From the Israeli Patent Office Re.: Application No. 170428 and Its Translation Into English. |
Response Dated Apr. 14, 2010 to Official Action of Jan. 19, 2010 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/927,044. |
Official Action Dated Jun. 7, 2010 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/927,044. |
Notice of Allowance Dated Jun. 1, 2012 From the US Patent and Trademark Office Re. U.S. Appl. No. 12/574,787. |
Examiner's Answer Before the Board of Patents Appeals and Interferences Dated Nov. 6, 2012 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/927,044. |
Translation of Notice of Reason for Rejection Dated Jun. 17, 2008 From the Japanese Patent Office Re.: Application No. 2002-575825. |
Office Action Dated Dec. 23, 2012 From the Israeli Patent Office Re.: Application No. 170428 and Its Translation Into English. |
Office Action Dated Feb. 15, 2012 From the Israeli Patent Office Re.: Application No. 170428 and Its Translation Into English. |
Official Action Dated Jun. 22, 2011 From the US Patent and Trademark Office Re.: U.S. Appl. No. 10/927,044. |
Response Dated Jul. 7, 2011 to Office Action of Feb. 20, 2011 From the Israeli Patent Office Re.: Application No. 170428. |
Number | Date | Country | |
---|---|---|---|
20030149732 A1 | Aug 2003 | US |
Number | Date | Country | |
---|---|---|---|
60353997 | Feb 2002 | US |