Authenticating cloud computing enabling secure services

Information

  • Patent Grant
  • 9384339
  • Patent Number
    9,384,339
  • Date Filed
    Tuesday, January 8, 2013
    11 years ago
  • Date Issued
    Tuesday, July 5, 2016
    8 years ago
Abstract
Authenticating cloud computing enabling secure services (ACCESS) offloads “client authentication” activity onto a third-party authenticating cloud computing enabling secure services (ACCESS) node. Instead of having a client device authenticate itself directly to a network server, the client device instead authenticates itself to a third-party authenticating cloud computing enabling secure services (ACCESS) node. The authenticating cloud computing enabling secure services (ACCESS) node then provides credentials that are used by the client device to communicate directly with the server (and utilize the service) without any further authentication being necessary.
Description
BACKGROUND OF THE INVENTION

1. Field of the Invention


This invention relates generally to secure communications. More particularly it relates to authentication of a network device.


2. Background of the Related Art


Conventional service and network administration systems control external access to services with an authentication, access control, or gateway device at the edge of an internal network, such that the gateway device resides between the servers that provide a given service, and the clients that utilize that service. As used herein, the term “server” refers generally to one or more computer systems that work individually or cooperatively to provide a service to client devices.



FIG. 7 shows conventional authentication wherein network-level traffic management policy requires inbound traffic to be forced to pass through a gateway device.


In particular, as shown in FIG. 7, an authenticating gateway 700 resides in a given internal network 702, providing a forced bottleneck between one or more clients 704 and one or more services 710, 712. All external network traffic must pass through the authenticating gateway 700. The authenticating gateway 700 enforces security policy.


By forcing all traffic through the authenticating gateway 700, all security functions are performed by the authenticating gateway 700 (such as authentication, access control, and admission control). Doing so has a great advantage in that these functions do not then have to be included as part of the services 710, 712. Rather, only the authenticating gateway device 700 need be accounted for as part of the overall service architecture.


A core observation by the present inventors is that servers in the cloud are typically geographically or topographically decentralized. As a result, the use of an inline gateway device for security has several significant flaws for modern services in a cloud environment: (1) Lack of Scalability. All traffic to and from a service's servers must be routed through the gateway device, to ensure that the gateway device provides its security function. (2) Server co-location. Servers must be placed close (spatially and/or topographically) to the gateway device, for the gateway-to-server link not to add significant latency to service response times. (3) Inflexible Architecture. Clients must communicate with the gateway device, not with the actual servers.


Cloud computing addresses these flaws by allowing servers (and therefore services) to run with spatial and computational independence. Unfortunately, in doing so the ability to control the flow of traffic between a client and a server is lost; in particular network-level traffic routing rules can no longer be used to achieve the desired security architecture.


SUMMARY OF THE INVENTION

In accordance with the principles of the present invention, a method and apparatus for authenticating a cloud-based secure service comprises receiving a key from a service server. Credentials are received from a client device. An authentication token is passed to the client device when the credentials from the client device are pre-authorized, whereby the client device is enabled to access a service from the service server using the authentication token.





BRIEF DESCRIPTION OF THE DRAWINGS

Features and advantages of the present invention will become apparent to those skilled in the art from the following description with reference to the drawings, in which:



FIG. 1 shows a first exemplary step of service registration, for authenticating cloud computing enabling secure services (ACCESS), in accordance with the principles of the present invention.



FIG. 2 shows a second exemplary step of client access request, for authenticating cloud computing enabling secure services (ACCESS), in accordance with the principles of the present invention.



FIG. 3 shows an exemplary optional third step of a push notification, for authenticating cloud computing enabling secure services (ACCESS), in accordance with the principles of the present invention.



FIG. 4 shows an exemplary fourth step of token authorization to client, for authenticating cloud computing enabling secure services (ACCESS), in accordance with the principles of the present invention.



FIG. 5 shows an exemplary fifth step of a service request, for authenticating cloud computing enabling secure services (ACCESS), in accordance with the principles of the present invention.



FIG. 6 shows an exemplary optional sixth step of a pull notification, of authenticating cloud computing enabling secure services (ACCESS), in accordance with the principles of the present invention.



FIG. 7 shows conventional authentication wherein network-level traffic management policy requires inbound traffic to be forced to pass through a gateway device.





DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS

The present inventors have appreciated that a conventional authenticating gateway device becomes a bottleneck as the number of services (protected by the gateway) or the amount of traffic (through the gateway) scale upwards, particularly in a cloud environment. The inventors hereof have also recognized that server co-location, particularly in a cloud environment, reduces the opportunity to geographically distribute servers for resiliency and performance. Moreover, the inventors hereof have realized that unless gateway devices are widely replicated in a cloud environment, there will seldom be a short-distance path between the client and the gateway, and the increased path length adds latency to the services provided.


The present invention enables authentication of a network device using a network service as part of an access control or admission control strategy. Conventional approaches toward mandating service security in a cloud computing environment build security activities such as authentication into the service itself. But the present inventors have appreciated that this approach is undesirable because uniform development or deployment of security activities can no longer be ensured. Rather, the inventors hereof have realized that in a cloud computing (or similar distributed computing) environment, better security mechanisms (such as authentication, access control, and admission control) are needed to work well in geographically-independent and computationally-independent environments such as the cloud.


The present invention conveys security information in a distributed (or “cloud”) computing environment utilizing what is referred to herein as: authenticating cloud computing enabling secure services (ACCESS). A central tenet of authenticating cloud computing enabling secure services (ACCESS) is that a network service is enabled to offload its “client authentication” activity onto a third-party authenticating cloud computing enabling secure services (ACCESS) node. Instead of having a client authenticate itself directly to a server, the client instead authenticates itself to a third-party authenticating cloud computing enabling secure services (ACCESS) node. The authenticating cloud computing enabling secure services (ACCESS) node then provides credentials that are used by the client to communicate directly with the server (and utilize the service) without any further authentication being necessary. This separation of authentication activity from the remainder of the cloud-provided service is a specific adaptation of the present invention to the operating characteristics of a cloud environment.


The term “service administrator” as used herein generally refers to the service provider or service designer; i.e., the entity device responsible for a given service.


To begin use of authenticating cloud computing enabling secure services (ACCESS), a given service administrator first provides an ACCESS node with a list of descriptive items regarding specific security aspects to enforce. For instance, exemplary descriptive items regarding specific security aspects to enforce may include: (a) a set of secret cryptographic keys and/or certificates for use in communication and in signing authentication messages; (b) a list of users, roles, and principals; (c) sets of objects or resources to be utilized and protected by the authenticating cloud computing enabling secure services (ACCESS) protocol; and/or (d) machine-enforceable policies governing when and how the principals can utilize the resources.



FIG. 1 shows a first exemplary step of service registration, for authenticating cloud computing enabling secure services (ACCESS), in accordance with the principles of the present invention.


In particular, as shown in FIG. 1, a service server 102 provides an authenticating cloud computing enabling secure services (ACCESS) node 100 with a registration message 110 containing an authentication policy (or policies), and other appropriate information. An exemplary initial transaction between the service administrator 102 and the authenticating cloud computing enabling secure services (ACCESS) node 100 is subject to special security protections. These precautions are needed to prevent a malicious party from bypassing the authenticating cloud computing enabling secure services (ACCESS) protocol or providing invalid configuration information to the authenticating cloud computing enabling secure services (ACCESS) node 100.


In the example of FIG. 1, it is assumed that prior to the disclosed step, e.g., perhaps at the time that the service administrator 102 contracted or paid to use authenticating cloud computing enabling secure services (ACCESS)—the service server 102 and the authenticating cloud computing enabling secure services (ACCESS) node 100 exchanged cryptographic keys 120. All further communications between the service's server(s) 102 and the authenticating cloud computing enabling secure services (ACCESS) node 100 are encrypted using the shared secret represented by those cryptographic keys 120. As a result, knowledge of these cryptographic keys 120 is used as an authenticity and integrity verification over direct communications between the service server 102 and the authenticating cloud computing enabling secure services (ACCESS) node 100.


In addition, during the step shown and described with reference to FIG. 1, the service server(s) or service administrator 102 specifies in registration message 110 which of the optional service notification methods to use after a client device 104 authenticates (e.g., with a push notification or pull notification.)


Only a single authenticating cloud computing enabling secure services (ACCESS) node 100 is shown in FIG. 1. However, the authenticating cloud computing enabling secure services (ACCESS) service itself may be provided by a single node 100 or by multiple distributed nodes operating in federation. Also, the service administrator 102 may also simultaneously use multiple competing ACCESS-style security offerings, each operated independently, for clients 104 or service servers 102 to be able to choose among authentication providers. The inventors recognize that the authenticating cloud computing enabling secure services (ACCESS) system may support multiple communication protocols. The exemplary structures provided herewith in this invention may be embedded within a variety of communication protocols either defined by standards or developed for proprietary purposes.


An exemplary structure of a registration message 110 (occurring over an encrypted transport) is as follows:


Unique service instance identifier;


Service identifier status (e.g., online, offline, suspend); and


Optional notification method (e.g., push, pull, default, none).


Notification method format may be:

    • Unforgeable token (same format as provided to client);
    • Subset notification (specific parameters are identified which the service requests explicit notification on for all signed tokens.)


Depending upon the specific encryption methodology used, the shared cryptographic key(s) 120 are exchanged out-of-band or in-band between the service server 102 and the authenticating cloud computing enabling secure services (ACCESS) node(s) 100 prior to the step shown and described with reference to FIG. 1. The authenticating cloud computing enabling secure services (ACCESS) node 100 preferably supports multiple encryption methods, and more than one encryption method may be employed simultaneously by the authenticating cloud computing enabling secure services (ACCESS) node 100 for use in communications with multiple service servers 102 (and multiple services).



FIG. 2 shows a second exemplary step of client access request, for authenticating cloud computing enabling secure services (ACCESS), in accordance with the principles of the present invention.


In particular, as shown in FIG. 2, when a given client 104 desires to utilize a given service 102, the client 104 is directed first to contact the access node 100 to authenticate or otherwise request service from the service 102.


To do so, the client 104 provides the authenticating cloud computing enabling secure services (ACCESS) node 100 with a set of key-value pairs containing preferably all of the credentials 210 for the client 104 that are required for the client 104 to use the service 102.


The credentials 210 for the client 104 necessary for client 104 to utilize a given service 102 may include, e.g., passwords, biometric data about an authorized user of the client 104, or the user's device, location information including current and previous locations and direction of travel, historical documentation regarding previous successful authentications by the client 104, use of the service 102 (or of other related services), and/or output from seeded pseudorandom number generators in possession of the client 104, among others. These credentials 210 may be provided by the client device 104, software residing thereon, or by direct input from a user of the client device 104.


All communications between the client 104 and the authenticating cloud computing enabling secure services (ACCESS) node 100 may involve encrypted transport.



FIG. 2 shows a single message being exchanged from the client 104 to the authenticating cloud computing enabling secure services (ACCESS) node 100. However, multiple messages may be sent between the client 104 and the authenticating cloud computing enabling secure services (ACCESS) node 100. For example, the client 104 may provide a minimum set of credentials 210; the authenticating cloud computing enabling secure services (ACCESS) node 100 may reject those credentials 210 as not satisfying its requirements; and the client 104 could then resubmit a broader set of credentials 210 in the hopes of gaining authentication to utilize the service 102.


Optionally, the authenticating cloud computing enabling secure services (ACCESS) node 100 may first provide a list of required minimum authentication keys. For example, the authenticating cloud computing enabling secure services (ACCESS) node 100 may convey to the client 104 that it will accept either (1) a set of key-value pairs containing two passwords; or (2) a set of key-value pairs containing one password and one piece of biometric information. In this case, the client 104 may either send all of its authentication information as credentials 210 in this step shown and described with respect to FIG. 1, or only its choice of the minimum information to satisfy authentication requirements conveyed by the authenticating cloud computing enabling secure services (ACCESS) node 100.



FIG. 3 shows an exemplary optional third step of a push notification, for authenticating cloud computing enabling secure services (ACCESS), in accordance with the principles of the present invention.


In particular, as shown in the optional step of FIG. 3, the authenticating cloud computing enabling secure services (ACCESS) node 100 may notify the service server(s) 102 directly of the results of the authentication exchange using push message 310. Push message 310 is encrypted using the shared or calculated asymmetric cryptographic keys 120 in order to provide authenticity and integrity verification over direct communications between the service server 102 and the authenticating cloud computing enabling secure services (ACCESS) node 100.


Such a “push” message, if requested by the service administrator in the step shown in FIG. 1, informs the service server(s) 102 of the identity of each authenticated client 104. This information may be used by the service server(s) 102 as part of a load balancing, data or result prefetching, or other performance-optimization strategy. “Push or Pull Notifications” are discussed further herein with respect to FIG. 6.



FIG. 4 shows an exemplary fourth step of token authorization to client, for authenticating cloud computing enabling secure services (ACCESS), in accordance with the principles of the present invention.


In particular, as shown in FIG. 4, if the user device client 104 is authenticated, the authenticating cloud computing enabling secure services (ACCESS) node 100 generates an unforgeable authentication token 410 (signed capability) and provides it to the client 104. While the authentication token 410 itself is typically provided to the client 104 in encrypted format, the structure of this authentication token 410 is a set of one or more key-value pairs, plus a hash value. The key-value pairs may include information representing the result of the authentication activity, including:

    • Client identity (as observable by the server);
    • Server identity or identities (as requested by the client);
    • Values or summary of authentication credentials provided by the client;
    • Timestamps, including token creation time and length of token validity;
    • Nonce (to prevent token reuse);
    • Token type (single-use/valid-until-used, multiple-use);
    • Token exclusivity (whether the token may be used simultaneously with other tokens);
    • Server exclusivity (whether the token may be used simultaneously on multiple client requests);
    • Privileges granted (at client's level of authentication);
    • Quality of Service (or QoS) granted (at client's level of authentication); and/or
    • Custom key-value pairs (defined by the service administrator in step #1).


The hash value represents a signature over all key-value pairs, using the shared secret information conveyed in the step of FIG. 1, following best practices for message integrity using secret-key or public-key cryptography. The authentication token 410 is “unforgeable” because it is protected using this information known only to the authenticating cloud computing enabling secure services (ACCESS) node 100 and to the service server(s) 102.


The key-value contents of the authentication token 410 itself may or may not be encrypted (using keys shared in the step of FIG. 1) depending on the configuration instructions of the service administrator in the step of FIG. 1.


In the step of FIG. 2, the client 104 is shown as contacting the authenticating cloud computing enabling secure services (ACCESS) node 100 directly. In such a case the reply from the authenticating cloud computing enabling secure services (ACCESS) node 100 in the step of FIG. 4 would include a redirect providing information on what the client 104 should do next, for example specifying which service provider 102 in the cloud 50 is best suited for the geographic or network-topographic location of the client 104. In an alternate implementation, the client 104 contacts a service server 102 directly, but (since the client 104 is not presenting an authentication token 410) the service server 102 using the communication protocol specific redirect message immediately redirects the client 104 to the authenticating cloud computing enabling secure services (ACCESS) node 100 for authentication. Conceptually both implementations are similar to how DNS redirection is currently used in web caching infrastructures. Additionally, an unseen network element may intercept an attempted unauthorized communication initiated by the client 104 going to the service server 102. If the client's 104 unauthorized communication attempt is intercepted it may be redirected by this unseen network element to the authenticating cloud computing enabling secure services (ACCESS) node 100 for authentication.


The authentication tokens 410 as provided by the authenticating cloud computing enabling secure services (ACCESS) node 100 provide authorization control based upon three categories: Token format, access control, and user restrictions.


Token Format:


During the authenticating cloud computing enabling secure services (ACCESS) node provisioning shown in the step of FIG. 1, the service administrator of the service server 102 specifies what sort(s) of authentication token(s) should be created by the authenticating cloud computing enabling secure services (ACCESS) node 100 (given a set of principles and objects that it has authenticated under a policy), or simply states that the authenticating cloud computing enabling secure services (ACCESS) node 100 may use a default format to convey the authentication token 410.


Access Controls:


Depending on the service environment, this authentication token 410 may either grant full access to the client device 104 service 102, or it may provide fine-grained access control (“capabilities”) for what actions the client 104 is permitted to take and what resources the client device 104 is permitted to consume. In the strictest sense, access controls limit what capabilities of the service (and of the service's servers 102) the client user device 104 may consume. Therefore, access controls are configured per service offering.


User Restrictions:


In situations where the service environment dictates, the authentication tokens 410 may specify user restrictions. User restrictions are independent of the capabilities of the service 102 offered but may result in the same consequences as access controls. For example, the authentication token 410 may be time-limited (expiring after a set time), geography limited (expiring if a client 104 departs a geographical region), or it may be revocable by the authenticating cloud computing enabling secure services (ACCESS) node 100 on demand or when the client 104 requests access to another service 102.



FIG. 5 shows an exemplary fifth step of a service request, for authenticating cloud computing enabling secure services (ACCESS), in accordance with the principles of the present invention.


In particular, as shown in FIG. 5, finally, the client 104 directly contacts the service server 102 and sends the authentication token 410 to the service server 102. The client 104 uses the authentication token 410 to obtain service directly from the service server 102.


All the service server 102 has to do is check the validity of the authentication token 410 presented before it accepts the client requests (in this case by verifying the hashed signature included in the authentication token 410 matches what the service server 102 expects given the secret cryptographic keys 120 the service server 102 shared with the authenticating cloud computing enabling secure services (ACCESS) node 100), optionally check the identity of the client 104 against any messages received from the authenticating cloud computing enabling secure services (ACCESS) node 100 in the optional step of FIG. 3, parse the access authentication token 410 to determine which resources to provide to the client 104, and use the authentication token 410 to determine with what quality of service to provide those resources. The service server 102 then begins to perform work on behalf of the client 104.


No further interaction is required between the client 104 and the authenticating cloud computing enabling secure services (ACCESS) node 100, unless the client 104 later needs to expand its privileges or permissions by repeating the authentication process using a broader set of credentials 210.



FIG. 6 shows an exemplary optional sixth step of a pull notification, of authenticating cloud computing enabling secure services (ACCESS), in accordance with the principles of the present invention.


In particular, as shown in FIG. 6, in an optional step, the service server 102 may contact the authenticating cloud computing enabling secure services (ACCESS) node 100 to verify the validity of the authentication token 410 or to obtain additional information about the authentication inputs and authentication decision.


The structure of the “push” or “pull” notification is based upon the information provided by the service server or service administrator 102 shown with respect to the step of service registration shown in FIG. 1. This structure remains valid until the service server 102 notifies the authenticating cloud computing enabling secure services (ACCESS) node 100 otherwise. These notifications may include any of the following information, in the form of explicitly declared key-value pairs:

    • Client identity (as observable by the server);
    • Server identity or identities (as requested by the client);
    • Values or summary of authentication credentials provided by the client;
    • Timestamps, including token creation time and length of token validity;
    • Nonce (to prevent token reuse);
    • Token type (single-use/valid-until-used, multiple-use);
    • Token exclusivity (whether the token may be used simultaneously with other tokens);
    • Server exclusivity (whether the token may be used simultaneously on multiple client requests);
    • Privileges granted (at client's level of authentication);
    • Quality of Service granted (at client's level of authentication); and/or
    • Custom key-value pairs (defined by the service administrator in the step show in FIG. 1.)


When either a “pull” or “push” step is selected by the service administrator of the service server 102, the authentication token 410 provided to the client 104 in FIG. 4 may contain only a subset of the key-value pairs 110. The authentication token 410 also may not contain the same hash values and protection schemes. Protection over the authentication transaction itself stems from the shared secret between the service's servers 102 and the authenticating cloud computing enabling secure services (ACCESS) node 100 as established in the step shown in FIG. 1.


The optional step of a pull notification shown and described with respect to FIG. 6 may or may not be used in conjunction with the optional additional step of a push notification shown and described with respect to FIG. 3. The step of pull notification may be mutually exclusive to the step of a push notification.


The disclosed architecture of authenticating cloud computing enabling secure services in accordance with the principles of the present invention provides security functions such as authentication, access control, and admission control. The use of ACCESS architecture also addresses the conventional problems of lack of scalability, server colocation, and inflexible architecture. The service's servers 102 may reside anywhere in the given cloud 50, as may the authenticating cloud computing enabling secure services (ACCESS) node(s) 100, without reducing either the performance of the client-server link or reducing the security functions achieved.


The invention has particular applicability to the mobile handheld market (both for cellular telephones and other personal mobile devices), especially with respect to these devices communicating directly with end services and bypassing the cellular telecommunications networks. It also has applicability to the general-purpose computing market, both for consumer/business workstations accessing cloud services & for server systems that in turn use backend services provided in the cloud.


The authenticating cloud computing enabling secure services method and architecture of the present invention may be implemented such that the highest point-to-point performance between a given client and a given cloud-enabled service may be achieved. The invention has applicability to both end-client application developers (who might include ACCESS technologies in their applications or products) as well as any company that “resells” authentication as a third-party service, e.g., to such application developers.


U.S. application Ser. No. 13/506,418, entitled “Usage Authentication via Intercept and Challenge For Network Services”, filed Apr. 18, 2012, to McFarland et al., and having common Assignment to the present application, has applicability to the present invention, and is incorporated herein by reference.


While the invention has been described with reference to the exemplary embodiments thereof, those skilled in the art will be able to make various modifications to the described embodiments of the invention without departing from the true spirit and scope of the invention.

Claims
  • 1. A method of pre-authenticating a client device for direct access to a cloud-based secure service, comprising: receiving a request for pre-authorization from a client device, at an access node separate from a cloud-based secure service server;receiving credentials from said client device, at said access node separate from said cloud-based secure service server, said credentials comprising a registration message encrypted using a shared secret cryptographic key;passing a pre-authorized authentication token together with a redirect to said client device, said pre-authorized authentication token for provision by said client device directly to said cloud-based secure service server without passage through said access node;providing a push or pull notification, when authenticated, from said access node to said cloud-based secure service server, said notification identifying said client device;receiving a request at said access node, from said cloud-based secure service server, to verify validity of said pre-authorized authentication token received by said cloud-based secure service server from said client device; andreceiving a request from said cloud-based secure service server for additional information regarding authentication of said client device to access a cloud-based secure service on said cloud-based secure service server;whereby said client device directly provides its own authorization token directly to said cloud-based secure service server bypassing said access node to directly access said cloud-based secure service server.
  • 2. Apparatus to pre-authenticate a client device for direct access to a cloud-based secure service, comprising: means for receiving a request for pre-authorization from a client device, at an access node separate from a cloud-based secure service server;means for receiving credentials from said client device, at said access node separate from said cloud-based secure service server, said means for receiving credentials receives a registration message encrypted using a shared secret cryptographic key;means for passing a pre-authorized authentication token together with a redirect to said client device, said pre-authorized authentication token for provision by said client device directly to said cloud-based secure service server without passage through said access node;means for providing a push or pull notification, when authenticated, from said access node to said cloud-based secure service server, said notification identifying said client device;means for receiving a request at said access node, from said cloud-based secure service server, to verify validity of said pre-authorized authentication token received by said cloud-based secure service server from said client device; andmeans for receiving a request from said cloud-based secure service server for additional information regarding authentication of said client device to access a cloud-based secure service on said cloud-based secure service server;whereby said client device is enabled to directly provide its own authorization token directly to said cloud-based secure service server, bypassing said access node, to directly access said cloud-based secure service server.
Parent Case Info

This application claims priority from U.S. Provisional No. 61/586,467, filed Jan. 13, 2012, to John L. Griffin et al., entitled “Authenticating Cloud Computing, Enabling Secure Services,” the entirety of which is explicitly incorporated herein by reference.

US Referenced Citations (668)
Number Name Date Kind
1103073 O'Connell Jul 1914 A
4494119 Wimbush Jan 1985 A
4651156 Martinez Mar 1987 A
4706275 Kamil Nov 1987 A
4891638 Davis Jan 1990 A
4891650 Scheffer Jan 1990 A
4910767 Brugliera et al. Mar 1990 A
4928107 Kuroda May 1990 A
4952928 Carroll Aug 1990 A
4972484 Theile Nov 1990 A
5014206 Scribner May 1991 A
5043736 Darnell Aug 1991 A
5055851 Scheffer Oct 1991 A
5068656 Sutherland Nov 1991 A
5068891 Marshall Nov 1991 A
5070329 Jasimaki Dec 1991 A
5081667 Drori Jan 1992 A
5119104 Heller Jun 1992 A
5126722 Kamis Jun 1992 A
5144283 Arens Sep 1992 A
5161180 Chavous Nov 1992 A
5166972 Smith Nov 1992 A
5177478 Wagai Jan 1993 A
5193215 Olmer Mar 1993 A
5208756 Song May 1993 A
5214789 George May 1993 A
5218367 Scheffer Jun 1993 A
5223844 Mansell Jun 1993 A
5239570 Koster Aug 1993 A
5265630 Hartmann Nov 1993 A
5266944 Caroll Nov 1993 A
5283570 DeLuca Feb 1994 A
5289527 Tiedemann Feb 1994 A
5293642 Lo Mar 1994 A
5299132 Wortham Mar 1994 A
5301354 Schwendeman Apr 1994 A
5311516 Kuznicke May 1994 A
5325302 Izidon Jun 1994 A
5327529 Fults Jul 1994 A
5334974 Simms Aug 1994 A
5335246 Yokev Aug 1994 A
5343493 Karimulah Aug 1994 A
5347568 Moody Sep 1994 A
5351235 Lahtinen Sep 1994 A
5361212 Class Nov 1994 A
5363425 Mufti Nov 1994 A
5365451 Wang Nov 1994 A
5374936 Feng Dec 1994 A
5379451 Nakagoshi Jan 1995 A
5381338 Wysocki Jan 1995 A
5387993 Heller Feb 1995 A
5388147 Grimes Feb 1995 A
5390339 Bruckery Feb 1995 A
5394158 Chia Feb 1995 A
5396227 Carroll Mar 1995 A
5398190 Wortham Mar 1995 A
5406614 Hara Apr 1995 A
5418537 Bird May 1995 A
5422813 Schuchman Jun 1995 A
5423076 Westergren Jun 1995 A
5432841 Rimer Jul 1995 A
5434789 Fraker Jul 1995 A
5454024 Lebowitz Sep 1995 A
5461390 Hoshen Oct 1995 A
5470233 Fruchterman Nov 1995 A
5479408 Will Dec 1995 A
5479482 Grimes Dec 1995 A
5485161 Vaugh Jan 1996 A
5485163 Singer Jan 1996 A
5488563 Chazelle Jan 1996 A
5494091 Freeman Feb 1996 A
5497149 Fast Mar 1996 A
5506886 Maine Apr 1996 A
5508931 Snider Apr 1996 A
5513243 Kage Apr 1996 A
5515287 Hakoyama May 1996 A
5517199 DiMattei May 1996 A
5519403 Bickley May 1996 A
5530655 Lokhoff Jun 1996 A
5530914 McPheters Jun 1996 A
5532690 Hertel Jul 1996 A
5535434 Siddoway Jul 1996 A
5539395 Buss Jul 1996 A
5539398 Hall Jul 1996 A
5539829 Lokhoff Jul 1996 A
5543776 L'Esperance Aug 1996 A
5546445 Dennison Aug 1996 A
5552772 Janky Sep 1996 A
5555286 Tendler Sep 1996 A
5568119 Schipper Oct 1996 A
5568153 Beliveau Oct 1996 A
5574648 Pilley Nov 1996 A
5579372 Angstrom Nov 1996 A
5588009 Will Dec 1996 A
5592535 Klotz Jan 1997 A
5594780 Wiedeman Jan 1997 A
5604486 Lauro Feb 1997 A
5606313 Allen Feb 1997 A
5606618 Lokhoff Feb 1997 A
5606850 Nakamura Mar 1997 A
5610815 Gudat Mar 1997 A
5614890 Fox Mar 1997 A
5615116 Gudat Mar 1997 A
5621793 Bednarek Apr 1997 A
5628051 Salin May 1997 A
5629693 Janky May 1997 A
5633912 Tsoi May 1997 A
5636276 Brugger Jun 1997 A
5661652 Sprague Aug 1997 A
5661755 Van de Kerkhof Aug 1997 A
5682600 Salin Oct 1997 A
5689245 Noreen Nov 1997 A
5699053 Jonsson Dec 1997 A
5704029 Wright, Jr. Dec 1997 A
5721781 Deo Feb 1998 A
5731785 Lemelson Mar 1998 A
5740534 Ayerst Apr 1998 A
5761618 Lynch Jun 1998 A
5765152 Erickson Jun 1998 A
5767795 Schaphorst Jun 1998 A
5768509 Gunluk Jun 1998 A
5771353 Eggleston Jun 1998 A
5774533 Patel Jun 1998 A
5774670 Montulli Jun 1998 A
5787357 Salin Jul 1998 A
5794142 Vanttila Aug 1998 A
5797094 Houde Aug 1998 A
5797096 Lupien Aug 1998 A
5802492 DeLorrme Sep 1998 A
5806000 Vo Sep 1998 A
5809415 Rossman Sep 1998 A
5812086 Bertiger Sep 1998 A
5812087 Krasner Sep 1998 A
5822700 Hult Oct 1998 A
5828740 Khue Oct 1998 A
5835907 Newman Nov 1998 A
5841396 Krasner Nov 1998 A
5857201 Wright, Jr. Jan 1999 A
5864667 Barkam Jan 1999 A
5874914 Krasner Feb 1999 A
5896369 Warsta Apr 1999 A
5920821 Seaholtz Jul 1999 A
5922074 Richard Jul 1999 A
5930250 Klok Jul 1999 A
5930701 Skog Jul 1999 A
5943399 Banister Aug 1999 A
5945944 Krasner Aug 1999 A
5946629 Sawyer Aug 1999 A
5946630 Willars Aug 1999 A
5950130 Coursey Sep 1999 A
5950137 Kim Sep 1999 A
5953398 Hill Sep 1999 A
5960362 Grob Sep 1999 A
5974054 Couts Oct 1999 A
5978685 Laiho Nov 1999 A
5983099 Yao Nov 1999 A
5987323 Houtari Nov 1999 A
5998111 Abe Dec 1999 A
5999124 Sheynblat Dec 1999 A
6014602 Kithol Jan 2000 A
6032051 Hall Feb 2000 A
6035025 Hanson Mar 2000 A
6049710 Nilsson Apr 2000 A
6052081 Krasner Apr 2000 A
6058300 Hanson May 2000 A
6061018 Sheynblat May 2000 A
6061346 Nordman May 2000 A
6064336 Krasner May 2000 A
6064875 Morgan May 2000 A
6067045 Castelloe May 2000 A
6070067 Nguyen May 2000 A
6075982 Donovan Jun 2000 A
6081229 Soliman Jun 2000 A
6081508 West Jun 2000 A
6085320 Kaliski, Jr. Jul 2000 A
6101378 Barabush Aug 2000 A
6104931 Havinis Aug 2000 A
6108533 Brohoff Aug 2000 A
6122503 Daly Sep 2000 A
6122520 Want Sep 2000 A
6124810 Segal Sep 2000 A
6131028 Whittington Oct 2000 A
6131067 Girerd Oct 2000 A
6133874 Krasner Oct 2000 A
6134483 Vayanos Oct 2000 A
6138003 Kingdon Oct 2000 A
6148197 Bridges Nov 2000 A
6148198 Anderson Nov 2000 A
6149353 Nilsson Nov 2000 A
6150980 Krasner Nov 2000 A
6154172 Piccionelli Nov 2000 A
6169891 Gorham Jan 2001 B1
6169901 Boucher Jan 2001 B1
6169902 Kawamoto Jan 2001 B1
6173181 Losh Jan 2001 B1
6178505 Schnieder Jan 2001 B1
6178506 Quick, Jr. Jan 2001 B1
6181935 Gossman Jan 2001 B1
6188354 Soliman Feb 2001 B1
6188752 Lesley Feb 2001 B1
6188909 Alananra Feb 2001 B1
6189098 Kaliski, Jr. Feb 2001 B1
6195557 Havinis Feb 2001 B1
6198431 Gibson Mar 2001 B1
6199045 Giniger Mar 2001 B1
6199113 Alegre Mar 2001 B1
6205330 Windbladh Mar 2001 B1
6208290 Krasner Mar 2001 B1
6208854 Roberts Mar 2001 B1
6215441 Moeglein Apr 2001 B1
6219557 Havinis Apr 2001 B1
6223046 Hamill-Keays Apr 2001 B1
6226529 Bruno May 2001 B1
6239742 Krasner May 2001 B1
6247135 Feague Jun 2001 B1
6249680 Wax Jun 2001 B1
6249744 Morita Jun 2001 B1
6249873 Richard Jun 2001 B1
6253203 O'Flaherty Jun 2001 B1
6260147 Quick, Jr. Jul 2001 B1
6266614 Alumbaugh Jul 2001 B1
6275692 Skog Aug 2001 B1
6275849 Ludwig Aug 2001 B1
6278701 Ayyagari Aug 2001 B1
6289373 Dezonno Sep 2001 B1
6297768 Allen, Jr. Oct 2001 B1
6307504 Sheynblat Oct 2001 B1
6308269 Proidl Oct 2001 B2
6313786 Sheynblat Nov 2001 B1
6317594 Gossman Nov 2001 B1
6321091 Holland Nov 2001 B1
6321092 Fitch Nov 2001 B1
6321257 Kotala Nov 2001 B1
6324524 Lent Nov 2001 B1
6327473 Soliman Dec 2001 B1
6327479 Mikkola Dec 2001 B1
6330454 Verdonk Dec 2001 B1
6333919 Gaffney Dec 2001 B2
6360093 Ross Mar 2002 B1
6360102 Havinis Mar 2002 B1
6363254 Jones Mar 2002 B1
6367019 Ansell Apr 2002 B1
6370389 Isomursu Apr 2002 B1
6377209 Krasner Apr 2002 B1
6400314 Krasner Jun 2002 B1
6400958 Isomursu Jun 2002 B1
6411254 Moeglein Jun 2002 B1
6421002 Krasner Jul 2002 B2
6427001 Contractor Jul 2002 B1
6433734 Krasner Aug 2002 B1
6434381 Moore Aug 2002 B1
6442391 Johansson Aug 2002 B1
6449473 Raivisto Sep 2002 B1
6449476 Hutchison, IV Sep 2002 B1
6456852 Bar Sep 2002 B2
6463272 Wallace Oct 2002 B1
6477150 Maggenti Nov 2002 B1
6504491 Christians Jan 2003 B1
6505049 Dorenbosch Jan 2003 B1
6510387 Fuchs Jan 2003 B2
6512922 Burg Jan 2003 B1
6512930 Sandegren Jan 2003 B2
6515623 Johnson Feb 2003 B2
6519466 Pande Feb 2003 B2
6522682 Kohli Feb 2003 B1
6526026 Menon Feb 2003 B1
6529500 Pandharipande Mar 2003 B1
6529829 Turetzky Mar 2003 B2
6531982 White Mar 2003 B1
6538757 Sansone Mar 2003 B1
6539200 Schiff Mar 2003 B1
6539232 Hendrey et al. Mar 2003 B2
6539304 Chansarkar Mar 2003 B1
6542464 Takeda Apr 2003 B1
6542734 Abrol Apr 2003 B1
6542743 Soliman Apr 2003 B1
6549776 Joong Apr 2003 B1
6549844 Egberts Apr 2003 B1
6553236 Dunko Apr 2003 B1
6556832 Soliman Apr 2003 B1
6560456 Lohtia May 2003 B1
6560461 fomukong May 2003 B1
6560534 Abraham May 2003 B2
6564261 Gudjonsson May 2003 B1
6570530 Gaal May 2003 B2
6571095 Koodli May 2003 B1
6574558 Kohli Jun 2003 B2
6580390 Hay Jun 2003 B1
6584552 Kuno Jun 2003 B1
6587691 Granstam Jul 2003 B1
6594500 Bender Jul 2003 B2
6597311 Sheynblat Jul 2003 B2
6600927 Hamilton Jul 2003 B2
6603973 Foladare Aug 2003 B1
6606495 Korpi Aug 2003 B1
6606554 Edge Aug 2003 B2
6609004 Morse Aug 2003 B1
6611757 Brodie Aug 2003 B2
6618593 Drutman Sep 2003 B1
6618670 Chansarkar Sep 2003 B1
6621452 Knockeart Sep 2003 B2
6621810 Leung Sep 2003 B1
6628233 Knockeart Sep 2003 B2
6633255 Krasner Oct 2003 B2
6640184 Rabe Oct 2003 B1
6650288 Pitt Nov 2003 B1
6661372 Girerd Dec 2003 B1
6665539 Sih Dec 2003 B2
6665541 Krasner Dec 2003 B1
6671620 Garin Dec 2003 B1
6677894 Sheynblat Jan 2004 B2
6680694 Knockeart Jan 2004 B1
6680695 Turetzky Jan 2004 B2
6687504 Raith Feb 2004 B1
6691019 Seeley Feb 2004 B2
6694258 Johnson Feb 2004 B2
6697629 Grilli Feb 2004 B1
6698195 Hellinger Mar 2004 B1
6701144 Kirbas Mar 2004 B2
6703971 Pande Mar 2004 B2
6703972 Van Diggelen Mar 2004 B2
6704651 Van Diggelen Mar 2004 B2
6707421 Drury Mar 2004 B1
6714793 Carey Mar 2004 B1
6718174 Vayanos Apr 2004 B2
6720915 Sheynblat Apr 2004 B2
6721578 Minear Apr 2004 B2
6721871 Piispanen Apr 2004 B2
6724342 Bloebaum Apr 2004 B2
6725159 Krasner Apr 2004 B2
6728701 Stoica Apr 2004 B1
6731940 Nagendran May 2004 B1
6734821 Van Diggelen May 2004 B2
6738013 Orler May 2004 B2
6738800 Aquilon May 2004 B1
6741842 Goldberg May 2004 B2
6744856 Karnik Jun 2004 B2
6744858 Ryan Jun 2004 B1
6745038 Callaway, Jr. Jun 2004 B2
6747596 Orler Jun 2004 B2
6748195 Phillips Jun 2004 B1
6751464 Burg Jun 2004 B1
6756938 Zhao Jun 2004 B2
6757544 Rangarajan Jun 2004 B2
6757545 Nowak Jun 2004 B2
6771742 McCalmont Aug 2004 B2
6771971 Smith Aug 2004 B2
6772340 Peinado Aug 2004 B1
6775255 Roy Aug 2004 B1
6775267 Kung Aug 2004 B1
6775534 Lindgren Aug 2004 B2
6775655 Peinado Aug 2004 B1
6775802 Gaal Aug 2004 B2
6778136 Gronemeyer Aug 2004 B2
6778885 Agashe Aug 2004 B2
6781963 Crockett Aug 2004 B2
6788249 Farmer Sep 2004 B1
6795444 Vo Sep 2004 B1
6795699 McGraw Sep 2004 B1
6799049 Zellner Sep 2004 B1
6799050 Krasner Sep 2004 B1
6801159 Swope Oct 2004 B2
6804524 Vandermaijden Oct 2004 B1
6807534 Erickson Oct 2004 B1
6810323 Bullock Oct 2004 B1
6813264 Vassilovski Nov 2004 B2
6813560 Van Diggelen Nov 2004 B2
6816111 Krasner Nov 2004 B2
6816580 Timmins Nov 2004 B2
6816710 Krasner Nov 2004 B2
6816719 Heinonen Nov 2004 B1
6816734 Wong Nov 2004 B2
6820069 Kogan Nov 2004 B1
6829475 Lee Dec 2004 B1
6832373 O'Neill Dec 2004 B2
6839020 Geier Jan 2005 B2
6839021 Sheynblat Jan 2005 B2
6839417 Weisman Jan 2005 B2
6842715 Gaal Jan 2005 B1
6847618 Laursen Jan 2005 B2
6847822 Dennison Jan 2005 B1
6853916 Fuchs Feb 2005 B2
6856282 Mauro Feb 2005 B2
6861980 Rowitch Mar 2005 B1
6865171 Nilsson Mar 2005 B1
6865395 Riley Mar 2005 B2
6867733 Sandhu Mar 2005 B2
6867734 Voor Mar 2005 B2
6873854 Crockett Mar 2005 B2
6876734 Summers Apr 2005 B1
6882850 McConnell et al. Apr 2005 B2
6885874 Grube Apr 2005 B2
6885940 Brodie Apr 2005 B2
6888497 King May 2005 B2
6888932 Snip May 2005 B2
6895238 Newell May 2005 B2
6895249 Gaal May 2005 B2
6900758 Mann May 2005 B1
6903684 Simic Jun 2005 B1
6904029 Fors Jun 2005 B2
6907224 Younis Jun 2005 B2
6907238 Leung Jun 2005 B2
6912230 Salkini Jun 2005 B1
6912395 Benes Jun 2005 B2
6912545 Lundy Jun 2005 B1
6915208 Garin Jul 2005 B2
6917331 Gronemeyer Jul 2005 B2
6930634 Peng Aug 2005 B2
6937187 Van Diggelen Aug 2005 B2
6937872 Krasner Aug 2005 B2
6940826 Simard Sep 2005 B1
6940950 Dickinson et al. Sep 2005 B2
6941144 Stein Sep 2005 B2
6944540 King Sep 2005 B2
6947772 Minear Sep 2005 B2
6950058 Davis Sep 2005 B1
6957073 Bye Oct 2005 B2
6961562 Ross Nov 2005 B2
6963557 Knox Nov 2005 B2
6965754 King Nov 2005 B2
6965767 Maggenti Nov 2005 B2
6968044 Beason Nov 2005 B2
6970917 Kushwaha Nov 2005 B1
6973320 Brown Dec 2005 B2
6975266 Abraham Dec 2005 B2
6978453 Rao Dec 2005 B2
6980816 Rohler Dec 2005 B2
6985747 Chithambaram Jan 2006 B2
6993355 Pershan Jan 2006 B1
6996720 DeMello Feb 2006 B1
6999782 Shaughnessy Feb 2006 B2
7024321 Deninger Apr 2006 B1
7024393 Peinado Apr 2006 B1
7047411 DeMello May 2006 B1
7065351 Carter Jun 2006 B2
7065507 Mohammed Jun 2006 B2
7072667 Olrik Jul 2006 B2
7079857 Maggenti Jul 2006 B2
7103018 Hansen Sep 2006 B1
7103574 Peinado Sep 2006 B1
7106717 Rosseau Sep 2006 B2
7110773 Wallace Sep 2006 B1
7136466 Gao Nov 2006 B1
7136838 Peinado Nov 2006 B1
7151946 Maggenti Dec 2006 B2
7174153 Ehlers Feb 2007 B2
7177397 McCalmont Feb 2007 B2
7177398 Meer Feb 2007 B2
7177399 Dawson Feb 2007 B2
7200380 Havlark Apr 2007 B2
7209758 Moll et al. Apr 2007 B1
7209969 Lahti Apr 2007 B2
7218940 Niemenna May 2007 B2
7221959 Lindquist May 2007 B2
7245900 Lamb Jul 2007 B1
7260186 Zhu Aug 2007 B2
7260384 Bales et al. Aug 2007 B2
7321773 Hines Jan 2008 B2
7330899 Wong Feb 2008 B2
7333480 Clarke Feb 2008 B1
7369508 Parantainen May 2008 B2
7369530 Keagy May 2008 B2
7382773 Schoeneberger Jun 2008 B2
7394896 Norton Jul 2008 B2
7428571 Ichimura Sep 2008 B2
7436785 McMullen Oct 2008 B1
7440442 Grabelsky et al. Oct 2008 B2
7573982 Breen Aug 2009 B2
7602886 Beech Oct 2009 B1
7711094 Olshansky May 2010 B1
7783297 Ishii Aug 2010 B2
20010011247 O'Flaherty Aug 2001 A1
20010040886 Jimenez Nov 2001 A1
20010049274 Degraeve Dec 2001 A1
20020037735 Maggenti Mar 2002 A1
20020052214 Maggenti May 2002 A1
20020061760 Maggenti May 2002 A1
20020069529 Wieres Jun 2002 A1
20020077083 Zellner Jun 2002 A1
20020077084 Zellner Jun 2002 A1
20020077118 Zellner Jun 2002 A1
20020077897 Zellner Jun 2002 A1
20020086676 Hendry Jul 2002 A1
20020098832 Fleischer Jul 2002 A1
20020102996 Jenkins Aug 2002 A1
20020102999 Maggenti Aug 2002 A1
20020111172 DeWolf Aug 2002 A1
20020112047 Kushwaha Aug 2002 A1
20020118650 Jagadeesan Aug 2002 A1
20020123327 Vataja Sep 2002 A1
20020126656 Park Sep 2002 A1
20020138650 Yamamoto Sep 2002 A1
20020156732 Odjik Oct 2002 A1
20020158777 Flick Oct 2002 A1
20020173317 Nykanen Nov 2002 A1
20020191595 Mar Dec 2002 A1
20030009277 Fan Jan 2003 A1
20030009602 Jacobs Jan 2003 A1
20030012148 Peters Jan 2003 A1
20030013449 Hose Jan 2003 A1
20030016804 Sheha Jan 2003 A1
20030026245 Ejzak Feb 2003 A1
20030037163 Kitada Feb 2003 A1
20030040272 Lelievre Feb 2003 A1
20030061170 Uzo Mar 2003 A1
20030065788 Salomaki Apr 2003 A1
20030072318 Lam Apr 2003 A1
20030078064 Chan Apr 2003 A1
20030081557 Mettala May 2003 A1
20030086422 Klinker et al. May 2003 A1
20030096626 Sabo et al. May 2003 A1
20030100320 Ranjan May 2003 A1
20030101329 Lahti May 2003 A1
20030101341 Kettler May 2003 A1
20030103484 Oommen Jun 2003 A1
20030108176 Kung Jun 2003 A1
20030109245 McCalmont Jun 2003 A1
20030114157 Spitz Jun 2003 A1
20030119521 Tipnis Jun 2003 A1
20030119528 Pew Jun 2003 A1
20030125042 Olrik Jul 2003 A1
20030137961 Tsirtsis Jul 2003 A1
20030153340 Crockett Aug 2003 A1
20030153341 Crockett Aug 2003 A1
20030153342 Crockett Aug 2003 A1
20030153343 Crockett Aug 2003 A1
20030161298 Bergman Aug 2003 A1
20030196105 Fineburg Oct 2003 A1
20030204640 Sahineja Oct 2003 A1
20030223381 Schroderus Dec 2003 A1
20040002326 Maher Jan 2004 A1
20040032485 Stephens Feb 2004 A1
20040043775 Kennedy Mar 2004 A1
20040044623 Wake Mar 2004 A1
20040047461 Weisman Mar 2004 A1
20040068665 Fox et al. Apr 2004 A1
20040068724 Gardner Apr 2004 A1
20040092250 Valloppillil May 2004 A1
20040098497 Banet May 2004 A1
20040132465 Mattila Jul 2004 A1
20040148357 Corrigan et al. Jul 2004 A1
20040181689 Kiyoto Sep 2004 A1
20040184584 McCalmont Sep 2004 A1
20040185875 Diacakis Sep 2004 A1
20040190497 Knox Sep 2004 A1
20040198332 Lundsgaard Oct 2004 A1
20040198386 Dupray Oct 2004 A1
20040203922 Hines Oct 2004 A1
20040205151 Sprigg Oct 2004 A1
20040229632 Flynn Nov 2004 A1
20040235493 Ekerborn Nov 2004 A1
20040242238 Wang Dec 2004 A1
20040267445 De Luca Dec 2004 A1
20050028034 Gantman Feb 2005 A1
20050039178 Marolia Feb 2005 A1
20050041578 Huotari Feb 2005 A1
20050043037 Loppe Feb 2005 A1
20050053209 D'Evelyn Mar 2005 A1
20050071671 Karaoguz Mar 2005 A1
20050083911 Grabelsky Apr 2005 A1
20050086467 Asokan Apr 2005 A1
20050090236 Schwinke Apr 2005 A1
20050107673 Ball May 2005 A1
20050112030 Gaus May 2005 A1
20050119012 Merheb Jun 2005 A1
20050120214 Yeates Jun 2005 A1
20050134504 Harwood Jun 2005 A1
20050135569 Dickinson et al. Jun 2005 A1
20050136885 Kaltsukis Jun 2005 A1
20050149430 Williams Jul 2005 A1
20050169248 Truesdale Aug 2005 A1
20050174991 Keagy Aug 2005 A1
20050192822 Hartenstein Sep 2005 A1
20050201529 Nelson Sep 2005 A1
20050209995 Aksu Sep 2005 A1
20050213716 Zhu Sep 2005 A1
20050232252 Hoover Oct 2005 A1
20050243778 Wang Nov 2005 A1
20050250516 Shim Nov 2005 A1
20050259675 Tuohino Nov 2005 A1
20050265318 Khartabil Dec 2005 A1
20050266864 Chen et al. Dec 2005 A1
20050271029 Iffland Dec 2005 A1
20050282518 D'Evelyn Dec 2005 A1
20050287979 Rollender Dec 2005 A1
20050287990 Mononen Dec 2005 A1
20050289097 Trossen Dec 2005 A1
20060008065 Longman et al. Jan 2006 A1
20060023747 Koren et al. Feb 2006 A1
20060026288 Acharya Feb 2006 A1
20060036680 Shim Feb 2006 A1
20060053225 Poikselka Mar 2006 A1
20060058042 Shim Mar 2006 A1
20060058102 Nguyen et al. Mar 2006 A1
20060064307 Pakkala Mar 2006 A1
20060068753 Karpen Mar 2006 A1
20060079249 Shim Apr 2006 A1
20060120517 Moon Jun 2006 A1
20060128395 Muhonen Jun 2006 A1
20060135177 Winterbottom Jun 2006 A1
20060188083 Breen Aug 2006 A1
20060193447 Schwartz Aug 2006 A1
20060212558 Sahinoja Sep 2006 A1
20060212562 Kushwaha Sep 2006 A1
20060225090 Shim et al. Oct 2006 A1
20060234639 Kushwaha Oct 2006 A1
20060234698 Fok Oct 2006 A1
20060239205 Warren Oct 2006 A1
20060242230 Smith Oct 2006 A1
20060258380 Liebowitz Nov 2006 A1
20060293024 Benco Dec 2006 A1
20060293066 Edge Dec 2006 A1
20070003024 Olivier Jan 2007 A1
20070019614 Hoffman Jan 2007 A1
20070022011 Altberg Jan 2007 A1
20070026854 Nath Feb 2007 A1
20070026871 Wager Feb 2007 A1
20070027997 Polk Feb 2007 A1
20070030539 Nath Feb 2007 A1
20070036139 Patel Feb 2007 A1
20070037585 Shim Feb 2007 A1
20070041513 Gende Feb 2007 A1
20070049288 Lamprecht Mar 2007 A1
20070072624 Niemaenmaa Mar 2007 A1
20070081635 Croak Apr 2007 A1
20070082681 Kim Apr 2007 A1
20070082682 Kim Apr 2007 A1
20070115941 Patel May 2007 A1
20070121601 Kikinis May 2007 A1
20070149213 Lamba Jun 2007 A1
20070160036 Smith Jul 2007 A1
20070162228 Mitchell Jul 2007 A1
20070167177 Kraufvelin Jul 2007 A1
20070182547 Wachter Aug 2007 A1
20070202897 Smith Aug 2007 A1
20070206568 Silver Sep 2007 A1
20070206613 Silver Sep 2007 A1
20070242660 Xu Oct 2007 A1
20070243885 Shim Oct 2007 A1
20070263610 Mitchell Nov 2007 A1
20070270164 Maier Nov 2007 A1
20080014931 Yared Jan 2008 A1
20080037715 Prozeniuk Feb 2008 A1
20080063153 Krivorot Mar 2008 A1
20080065775 Polk Mar 2008 A1
20080109650 Shim May 2008 A1
20080117859 Shahidi May 2008 A1
20080186164 Emigh Aug 2008 A1
20080214202 Toomey Sep 2008 A1
20080263169 Brabec et al. Oct 2008 A1
20090137244 Zhou et al. May 2009 A1
20090158136 Rossano et al. Jun 2009 A1
20090158397 Herzog et al. Jun 2009 A1
20090172804 Spies et al. Jul 2009 A1
20090265552 Moshir et al. Oct 2009 A1
20090265763 Davies et al. Oct 2009 A1
20100250603 Balakrishnaiah et al. Sep 2010 A1
20100287369 Monden Nov 2010 A1
20100311447 Jackson Dec 2010 A1
20110053618 Lin et al. Mar 2011 A1
20110145564 Moshir et al. Jun 2011 A1
20110252146 Santamaria et al. Oct 2011 A1
20110307947 Kariv Dec 2011 A1
20110314533 Austin Dec 2011 A1
20120124367 Ota et al. May 2012 A1
20120150968 Yasrebi et al. Jun 2012 A1
20120192287 Cai et al. Jul 2012 A1
20120198535 Oberheide et al. Aug 2012 A1
Foreign Referenced Citations (10)
Number Date Country
WO2006075856 Jul 2006 KR
PCTSE9801887 Oct 1998 WO
PCTUS9928848 Dec 1999 WO
WO0145342 Jun 2001 WO
PCTUS0146666 Nov 2001 WO
WO2004025941 Mar 2004 WO
PCTUS05022090 Jun 2005 WO
WO2005051033 Jun 2005 WO
WO 2010124739 Nov 2010 WO
WO2011100331 Aug 2011 WO
Non-Patent Literature Citations (17)
Entry
International Search Report received in PCT/US2013/21199 dated Mar. 26, 2013.
International Search Report received in PCT/US2012/068083 dated Feb. 8, 2013.
International Search Report received in PCT/US2013/21199 dated Dec. 12, 2013.
Intrado Inc., Qwest Detailed SR/ALI to MPC/GMLC Interface Specification for TCP/IP Implementation of TIA/EIA/J-STD-036 E2 with Phase I Location Description Addition, Intrado Informed Response; Apr. 2004; Issue 1.11; pp. 1-57.
International Search Report in PCT/US2007/23243 dated Apr. 2, 2008.
PCT International Search Report (PCTUS2007/23714) and Written Opinion of International Searching Authority, Apr. 18, 2008.
Le-Pond Chin, Jyh-Hong Wen, Ting-Way Liu, The Study of the Interconnection of GSM Mobile Communication System Over IP based Network, May 6, 2001, IEEE, Vehicular Technology Conference, vol. 3, pp. 2219-2223.
Location Based Services V2 Roaming Support (non proprietary), 80-V8470-2NP A, dated Jan. 27, 2005, pp. 1-56.
Qualcomm CDMA Technologies, MS Resident User Plane LBS Roaming—80-VC718-1 E, 2006, pp. 1-37.
Qualcomm CDMA Technologies, LBS Control Plane/User Plane Overview—80-VD378-1NP B, 2006, pp. 1-36.
Bhalla et al, TELUS, Technology Strategy—LBS Roaming Summit, Sep. 19, 2006.
Alfredo Aguirre, Ilusacell, First and Only Carrier in Mexico with a 3G CDMA Network, 2007.
Mike McMullen, Sprint, LBS Roaming Summit, Sep. 19, 2006.
Andrew Yeow, BCE, LBS Roaming Summit, Sep. 19, 2006, pp. 1-8.
Nars Haran, U.S. Cellular, Packet Data—Roaming and LBS Overview, Nov. 2, 2007, pp. 1-15.
Qualcomm CDMA Technologies, LBS Control Plane Roaming—80-VD377-1NP A, 2006, pp. 1-10.
European Search received in EP13735985 dated Oct. 6, 2015.
Related Publications (1)
Number Date Country
20130269020 A1 Oct 2013 US
Provisional Applications (1)
Number Date Country
61586467 Jan 2012 US