This section is intended to introduce the reader to various aspects of art that may be related to various aspects of the present disclosure, which are described below. This discussion is believed to be helpful in providing the reader with background information to facilitate a better understanding of the various aspects of the present disclosure. Accordingly, it should be understood that these statements are to be read in this light, and not as admissions of prior art.
Authentication systems and methods may be utilized to confirm or to verify an identity of a user. For example, a user of a computing device may attempt to log into a back-end system, and authentication systems and methods may be utilized to ensure that the user is authorized to log into the back-end system. In some cases, authentication can be achieved based on credentials input by the user (e.g., username and password).
Interconnected devices, which are sometimes referred to as Internet of Things (IoT) devices, are devices that include components (e.g., processor, sensor, and/or communication device) that enable the devices to exchange data over a network. For example, a user may have multiple interconnected devices, such as thermostats, alarm systems, televisions, and the like, in their home. It is presently recognized that it may be desirable to provide authentication systems and methods for the interconnected devices.
Certain embodiments commensurate in scope with the present disclosure are summarized below. These embodiments are not intended to limit the scope of the disclosure, but rather these embodiments are intended only to provide a brief summary of possible forms of present embodiments. Indeed, present embodiments may encompass a variety of forms that may be similar to or different from the embodiments set forth below.
In an embodiment, an authentication system includes processing circuitry configured to receive an indication of a number of interconnected devices that are in communication with a user device. The processing circuitry is also configured to compare the number of interconnected devices that are in communication with the user device to a threshold. The processing circuitry is further configured to grant access to an application on the user device in response to the number of interconnected devices meeting or exceeding the threshold.
In an embodiment, an authentication system includes processing circuitry configured to receive a request to authenticate a user via an authentication application installed on a user device. The processing circuitry is also configured to perform a first authentication step that includes obtaining and verifying a passcode, a password, or biometric data. The processing circuitry is further configured to confirm that a support application that is configured to enable the user to control a plurality of interconnected devices is installed on the user device. The processing circuitry is further configured to, in response to completion of the first authentication step and confirmation that the support application is installed on the user device, provide a credential that indicates authentication of the user to the support application.
In an embodiment, a method of operating an authentication system includes receiving, at processing circuitry, an indication of a number of interconnected devices that are in communication with a user device. The method also includes comparing, with the processing circuitry, the number of interconnected devices that are in communication with the user device to a threshold. The method further includes granting, with the processing circuitry, access to an application on the user device in response to the number of interconnected devices meeting or exceeding the threshold.
These and other features, aspects, and advantages of the present disclosure will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
One or more specific embodiments of the present disclosure will be described below. In an effort to provide a concise description of these embodiments, all features of an actual implementation may not be described in the specification. It should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another. Moreover, it should be appreciated that such a development effort might be complex and time consuming, but would nevertheless be a routine undertaking of design, fabrication, and manufacture for those of ordinary skill having the benefit of this disclosure.
When introducing elements of various embodiments of the present disclosure, the articles “a,” “an,” and “the” are intended to mean that there are one or more of the elements. The terms “comprising,” “including,” and “having” are intended to be inclusive and mean that there may be additional elements other than the listed elements. Additionally, it should be understood that references to “one embodiment” or “an embodiment” of the present disclosure are not intended to be interpreted as excluding the existence of additional embodiments that also incorporate the recited features.
Embodiments of the present disclosure are directed to authentication systems and methods for interconnected devices (e.g., IoT devices). With the foregoing in mind,
The system 10 may include one or more connections (e.g., network interfaces; routers) that are configured to connect to a network 16 (e.g., the Internet). In some embodiments, the system 10 may include a hub 15 that is communicatively coupled to the network 16 and that is also communicatively coupled to the interconnected devices 12 via any of the variety of wired or wireless protocols. Thus, the hub 15 and/or the interconnected devices 12 may be controlled via an application running on the user device 18. For example, a support entity (e.g., business organization) may provide a support application 20 that enables control of the interconnected devices 12, even if the interconnected devices 12 are manufactured by different manufacturing entities (e.g., vendors; business organizations).
It is presently recognized that it would be desirable to authenticate the user prior to allowing the user to communicate with and control the interconnected devices 12 using the support application 20 on the user device 18. In some embodiments, the authentication protocol may be carried out via another application running on the user device 18. For example, an authentication entity (e.g., issuer; business organization) may provide an authentication application 22 that facilitates the authentication protocol. The authentication protocol may include biometrics, passcodes, passwords, and/or other authentication types. In some embodiments, the authentication protocol is a multifactor authentication protocol. As shown, an authentication computing system 24 (e.g., cloud computing system) associated with the authentication entity may communicate with the user device 18 during the authentication protocol.
As an example, in operation, the user may open the authentication application 22 on the user device 18. The authentication application 22 may prompt the user to input a passcode, a password, biometric data, or the like to complete a first authentication step (e.g., local authentication step). The authentication computing system 24 may determine or receive an indication that the first authentication step is complete. Next, the authentication computing system 24 may determine whether the support application 20 is installed on the user device 18. For example, the authentication computing system 24 may attempt to communicate with the support application 20 and/or may access this information from the user device 18. Then, upon successful completion of the first authentication step and upon confirmation that the support application 20 is installed on the user device 18, the authentication computing system 24 may provide a credential to the support application 20 (e.g., to open the support application and/or to enable use of the support application 20 to control the interconnected devices 12). In this way, the support application 20 may enable use of the support application 20 to control the interconnected devices 12 only after the user has been authenticated via the authentication application 22 and the authentication computing system 24.
It should be appreciated that other variations are envisioned. For example, the support application 20 may be available and operable to control one or more of the interconnected devices 12 (e.g., a first set; interior light controls, exterior light controls, and/or other devices) without the credential and one or more of the interconnected devices 12 (e.g., a second set; an alarm system, a thermostat, and/or other devices) only with the credential. In this way, the support application 20 may enable use of the support application 20 to control at least some of the interconnected devices 12 only after the user has been authenticated via the authentication application 22 and the authentication computing system 24.
In some embodiments, the support application 20 may be not be available (e.g., able to be opened) without the credential from the authentication computing system 24. Additionally or alternatively, the support application 20 may be automatically opened (e.g., activated) in response to receipt of the credential from the authentication computing system 24. Additionally or alternatively, certain features within the support application 20 (e.g., virtual buttons to control some of all of the interconnected devices 12) may be automatically displayed and/or enabled in response to receipt of the credential from the authentication computing system 24. For example, a virtual button to control at least one of the interconnected devices 12 (e.g., an appliance) within the structure 14 may not be visible or may have an inactive appearance (e.g., be grayed out and/or presented in dashed lines) while the support application 20 is open and prior to receipt of the credential. Then, the virtual button may be displayed to be visible or may have an active appearance (e.g., in color and/or in solid lines) while the support application 20 is open and after receipt of the credential. In this way, the grant of access to the support application 20 may include granting access to the support application 20 or certain features thereof.
As shown in
In some embodiments, the authentication application 22 may prompt the user to complete a second authentication step (e.g., non-local authentication step) prior to providing the credential to the support application 20. For example, the authentication computing system 24 may send an authentication code (e.g., passcode, password) to a registered email address of the user, a registered phone number of the user, and/or to another registered device of the user. Then, the user may locate the authentication code and may interact with the authentication code (e.g., by clicking on a link with the authentication code; by entering the authentication code into the authentication application 22). In this way, the authentication computing system 24 may determine and confirm that an individual who is attempting to use the user device 18 and the support application 20 installed thereon to control the interconnected devices 12 is associated with the registered email address, the registered phone number, and/or another registered device. Together, the first authentication step and the second authentication step may indicate that the user is handling the user device 18 and that it is appropriate for the credential to be sent from the authentication computing system 24 to the support application 20 so that the support application 20 may then be used to control the interconnected devices 12.
In
In
In
In some embodiments, the user may be able to use the authentication application 22 to provide a control input to adjust the interconnected devices 12, as represented by arrow 43. The control input may be provided to the support computing system 30, as represented by arrow 45. The control input may be recorded and stored in a library (e.g., fabric) associated with the support computing system 30, as represented by arrow 47. The support computing system 30 may then provide an indication of the control input to vendor API, as represented by arrow 49. Then, the vendor API may provide actuation signals to actuate the interconnected devices 12, as represented by arrow 51. In this way, the support application 20, the authentication application 22, the authentication computing system 24, and the support computing system 30 may authenticate the user and then interact with the vendor computing system 32 to provide the user with the ability to control the interconnected devices 12 via control inputs at the authentication application 22. It should also be appreciated that the components and techniques described with reference to
With reference to
The user may also provide inputs that set a respective priority (e.g., relative priority or rank; numerical value) for each interconnected device 12 in the system 10. The priority may be based on a reliability (e.g., expected reliability; a likelihood of the interconnected device 12 being communicatively connected to the user device 18) while the user is within the structure 14 and/or while the user attempts to use the user device 18 to control the interconnected devices 12. For example, the first interconnected device and/or the second interconnected device may be permanent fixtures within the structure 14, and the first interconnected device may have a wired connection (e.g., to the network interface and/or the hub 15), while the second interconnected device may have a wireless connection (e.g., to the network interface and/or the hub 15). However, the third interconnected device may be outside of the structure 14, which may make its communications less reliable as compared to interconnected devices within the structure 14, for example. Furthermore, the fourth interconnected device may be movable with respect to the structure 14, and may not be present at or near the structure 14 at certain times. Accordingly, the user may set a first highest priority for the first interconnected device, a second high-intermediate priority for the second interconnected device, and a third low-intermediate priority for the third interconnected device, and a lowest intermediate priority for the fourth interconnected device. The various interconnected devices 12 may additionally or alternatively be prioritized based on security (e.g., a likelihood of being hacked) and/or other factors. Furthermore, the user may elect to adjust the priority based on experience, such as to lower the priority for one of the interconnected devices that has historically been less reliable. The user may set and/or adjust the priority manually via inputs, such as via inputs to the support application 20 and/or the authentication application 22, during a setup process.
In some embodiments, the user device 18 (an app or program stored thereon and activated by a processor; the authentication application 22) may utilize an algorithm, a lookup table, artificial intelligence, or the like to assess and prioritize the various interconnected devices 12 for authentication purposes. This automated generation of a hierarchy of the interconnected devices 12 for authentication purposes may take into account the reliability (e.g., whether consistently operating, operating based on battery and direct power, proximity to the hub 15 and/or the structure 14) and/or security (e.g., whether a device has sufficient local protocols to avoid hacking). It should be noted that this hierarchy of interconnected devices 12 for authentication purposes makes computer operation more efficient and secure. For example, the user may have numerous interconnected devices 12 assembled in the hierarchy for authentication purposes, but some may not be operational when authentication is completed. Thus, those can be skipped over and others used, which avoids delays in authentication and increases the speed of operation for a related network or computer system.
Further, because the hierarchy may be organized based on reliability and/or security, when preferred interconnected devices 12 are not available to authenticate, more of the less preferred interconnected devices 12 may be required for authentication. For example, if only three preferred interconnected devices 12 need to be detected as local to the user device 18 that will be used to control the interconnected devices 12, five non-preferred interconnected devices 12 may need to be detected as local to the user device 18 that will be used to control the interconnected devices 12 to increase security and confirmability. In this way, the authentication techniques may be utilized to grant access to and/or to provide the ability to use the support application 20 (e.g., provide the credential to enable use of the virtual buttons in the support application 20) to control the interconnected devices 12 based on a number of the interconnected devices 12 that are communicatively coupled to the user device 18. Additionally or alternatively, the authentication techniques may be utilized to authenticate the user to grant access to any of a variety of accounts (e.g., unrelated to the interconnected devices 12, such as financial accounts/banking accounts or other accounts that are not managed by the support entity or the vendor(s); related to the interconnected devices 12, such as accounts managed by the support entity or the vendor(s)).
More particularly, when the user attempts to use the user device 18 to access an account and/or to control the interconnected devices 12, the user may only be authenticated and granted access to the account and/or to control the interconnected devices 12 if (e.g., in response to; only if) a threshold number of interconnected devices 12 are detected as being in communication with the user device 18 (e.g., being present). Furthermore, the threshold number may vary based on the priority of the interconnected devices 12 that are detected. For example, the user may be authenticated and granted access to the account and/or to control the interconnected devices 12 as long as the first interconnected device is detected. Or in some embodiments, the user may be authenticated and granted access to the account and/or to control the interconnected devices 12 as long as the first interconnected device and at least one of the second interconnected device, the third interconnected device, or the fourth interconnected device is detected. Or in some embodiments, if the first interconnected device is not detected, then the user may be authenticated and granted access to the account and/or to control the interconnected devices 12 only if all of the second interconnected device, the third interconnected device, and the fourth interconnected device are detected. In some embodiments, the priority designations may be numerical values (e.g., on a scale of 1 to 10), and the threshold may be a threshold score. In such cases, the user may only be authenticated and granted access to the account and/or to control the interconnected devices 12 if a sum of the numerical values for the interconnected devices 12 that are detected exceed the threshold score.
It should be appreciated that the profile with the priority designations may be set up automatically, such as by the authenticating computing system 24 or other suitable computing system based on characteristics of the interconnected devices 12 that are detected as being present (e.g., during a set up process) and/or that are input by the user (e.g., during the set up process). For example, the characteristics may include a type of interconnected device, a position of the interconnected device relative to the structure 14, a baseline strength of a communication connection, a security of the interconnected device, or the like.
As noted above, the authentication protocol that authenticates the user based on the detection of the interconnected devices 12 may be used as part of a process (e.g., logon process) to grant the user access to an account (e.g., financial account). For example, the user may be granted access to the account through a financial services application 34 installed on the user device 18 as long as (e.g., only if) the authenticating computing system 24 detects the threshold number of interconnected devices 12. Thus, in response to detecting the threshold number of interconnected devices 12, the authentication computing system 24 may provide a credential to the financial services application 34 (e.g., to open the financial services application 34 and/or to enable use of the financial services application 34 to access the account). In this way, the financial services application 34 may enable use of the financial services application 34 to control the interconnected devices 12 only after the user has been authenticated via the authentication application 22 and the authentication computing system 24.
It should be appreciated that other variations are envisioned. For example, the financial services application 34 may be available and operable to access certain features related to the account (e.g., view account balance) without the credential and to access other features related to the account (e.g., transfer funds) only with the credential. In this way, the financial services application 34 may enable use of the financial services application 34 to access some or all features related to the account only after the user has been authenticated via the authentication application 22 and the authentication computing system 24. Thus, the grant of access to the financial services application 34 may include granting access to the financial services application 34 or certain features thereof.
In some embodiments, the financial services application 34 may not be available (e.g., able to be opened) without the credential from the authentication computing system 24. Additionally or alternatively, the financial services application 34 may be automatically opened (e.g., activated) in response to receipt of the credential from the authentication computing system 24. Additionally or alternatively, certain features within the financial services application 34 (e.g., certain virtual buttons) may be automatically displayed and/or enabled in response to receipt of the credential from the authentication computing system 24. For example, a virtual button to transfer funds may not be visible or may have an inactive appearance (e.g., grayed out and/or presented in dashed lines) while the financial services application 34 is open and prior to receipt of the credential. Then, the virtual button may be displayed to be visible or may have an active appearance (e.g., in color and/or in solid lines) while the financial services application 34 is open and after receipt of the credential.
In some embodiments, the financial services application 34 may provide the user with a first (e.g., simpler) logon process to access the account in response to receipt of the credential or other indication that the authenticating computing system 24 detected the threshold number of interconnected devices 12 (e.g., the user may be prompted to input a user name and password, but may not be prompted to retrieve a passcode sent to a registered email address of the user; fewer steps). Similarly, the financial services application 34 may provide the user with a second (e.g., more complex) logon process to access the account without the credential or in response to receipt of an indication that the authenticating computing system 24 failed to detect the threshold number of interconnected devices 12 (e.g., the user may be prompted to input a user name and password, and may also be prompted to retrieve a passcode sent to a registered email address of the user; more steps). It should be appreciated than any of the authentication steps and protocols disclosed herein may be combined in any suitable manner. Additionally, aspects described with reference to the support application 20 may be implemented with the financial services application 34, and vice versa (e.g., if the support application 20 has a logon process, the logon process may be simpler if the authentication protocol confirms the threshold number of devices and more complex if the authentication protocol does not confirm the threshold number of devices). Furthermore, any suitable computing system may be utilized to carry out the authentication steps and protocols disclosed herein.
The authentication computing system 24 and any of the computing systems disclosed herein may include a processor, a memory device, a storage device, and/or a communication component. The memory device and/or the storage device may store code (or instructions), and the processor may function to process the code and control operations in response to the code. It should be noted that the processor may be any type of computer processor or microprocessor capable of executing computer-executable code. Further, the processor may be representative of or include multiple processors. The memory device and the storage device may be any suitable article of manufacture that can serve to store processor-executable code, data, or the like. These articles of manufacture may represent computer-readable media (e.g., any suitable form of memory or storage) that may store the processor-executable code used by the processor to perform the presently disclosed techniques. The memory device and the storage device may also store data, various software applications, and the like. It should be noted that non-transitory merely indicates that the media is tangible and not a signal. The communication component may facilitate network communications (e.g., wired or wireless) with other systems and devices. For example, as shown in
While only certain features and embodiments have been illustrated and described, many modifications and changes may occur to those skilled in the art without materially departing from the novel teachings and advantages of the subject matter recited in the claims. The order or sequence of any process or method steps may be varied or re-sequenced according to alternative embodiments. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the disclosure. Furthermore, in an effort to provide a concise description of the exemplary embodiments, all features of an actual implementation may not have been described, such as those unrelated to the presently contemplated best mode, or those unrelated to enablement. It should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation specific decisions may be made. Such a development effort might be complex and time consuming, but would nevertheless be a routine undertaking of design, fabrication, and manufacture for those of ordinary skill having the benefit of this disclosure, without undue experimentation.
This application claims priority to and the benefit of U.S. Provisional Application No. 63/065,943, entitled “AUTHENTICATION SYSTEMS AND METHODS FOR INTERCONNECTED DEVICES,” filed Aug. 14, 2020, which is hereby incorporated by reference in its entirety for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
6154879 | Pare, Jr. et al. | Nov 2000 | A |
6233565 | Lewis et al. | May 2001 | B1 |
6618806 | Brown et al. | Sep 2003 | B1 |
6697806 | Cook | Feb 2004 | B1 |
6898633 | Lyndersay et al. | May 2005 | B1 |
6920559 | Nessett et al. | Jul 2005 | B1 |
7480939 | Nessett et al. | Jan 2009 | B1 |
7765580 | Vandergeest et al. | Jul 2010 | B2 |
8051142 | Pizano | Nov 2011 | B2 |
8250632 | Staddon | Aug 2012 | B1 |
8291236 | Vantalon et al. | Oct 2012 | B2 |
8365258 | Dispensa | Jan 2013 | B2 |
8510820 | Oberheide et al. | Aug 2013 | B2 |
8533796 | Shenoy et al. | Sep 2013 | B1 |
8752150 | Ivanov et al. | Jun 2014 | B2 |
8793490 | Szwalbenest | Jul 2014 | B1 |
8918479 | O'Connell et al. | Dec 2014 | B2 |
9003504 | Goldberg | Apr 2015 | B2 |
9009778 | Pearce et al. | Apr 2015 | B2 |
9042608 | Black | May 2015 | B2 |
9043887 | McLachlan et al. | May 2015 | B2 |
9147061 | McClendon et al. | Sep 2015 | B1 |
9195834 | Jakobsson | Nov 2015 | B1 |
9225716 | Tuchman et al. | Dec 2015 | B2 |
9240887 | Hamlin et al. | Jan 2016 | B2 |
9275208 | Protopapas | Mar 2016 | B2 |
9317673 | Grigg et al. | Apr 2016 | B2 |
9569771 | Lesavich et al. | Feb 2017 | B2 |
9686272 | Blinn | Jun 2017 | B2 |
9722790 | Ebrahimi | Aug 2017 | B2 |
9774578 | Ateniese et al. | Sep 2017 | B1 |
9817958 | McCorkendale | Nov 2017 | B1 |
10063542 | Kao | Aug 2018 | B1 |
10164973 | Prasad et al. | Dec 2018 | B1 |
10263981 | Prasad et al. | Apr 2019 | B1 |
10601819 | Prasad et al. | Mar 2020 | B1 |
10616216 | Prasad et al. | Apr 2020 | B1 |
11032286 | Prasad et al. | Jun 2021 | B1 |
20090119754 | Schubert | May 2009 | A1 |
20090210328 | Fomenko et al. | Aug 2009 | A1 |
20090254975 | Turnbull | Oct 2009 | A1 |
20100257357 | McClain | Oct 2010 | A1 |
20140047531 | Zaitsev | Feb 2014 | A1 |
20140214670 | McKenna | Jul 2014 | A1 |
20150229650 | Grigg | Aug 2015 | A1 |
20150278820 | Meadows | Oct 2015 | A1 |
20150332395 | Walker et al. | Nov 2015 | A1 |
20150356524 | Pennanen | Dec 2015 | A1 |
20150356555 | Pennanen | Dec 2015 | A1 |
20150365405 | Kalinichenko et al. | Dec 2015 | A1 |
20150371224 | Lingappa | Dec 2015 | A1 |
20150379510 | Smith | Dec 2015 | A1 |
20160034675 | Chandra | Feb 2016 | A1 |
20160203477 | Yang et al. | Jul 2016 | A1 |
20160212129 | Johnston | Jul 2016 | A1 |
20160261411 | Yau et al. | Sep 2016 | A1 |
20160321751 | Creighton, IV et al. | Nov 2016 | A1 |
20160330027 | Ebrahimi | Nov 2016 | A1 |
20160358165 | Maxwell | Dec 2016 | A1 |
20160365978 | Ganesan et al. | Dec 2016 | A1 |
20170048216 | Chow et al. | Feb 2017 | A1 |
20170053249 | Tunnell et al. | Feb 2017 | A1 |
20170076280 | Castinado et al. | Mar 2017 | A1 |
20170076286 | Castinado et al. | Mar 2017 | A1 |
20170078299 | Castinado et al. | Mar 2017 | A1 |
20170103391 | Wilson, Jr. et al. | Apr 2017 | A1 |
20170105171 | Srivastava | Apr 2017 | A1 |
20170109748 | Kote | Apr 2017 | A1 |
20170140375 | Kunstel | May 2017 | A1 |
20170177898 | Dillenberger | Jun 2017 | A1 |
20170206382 | Rodriguez De Castro et al. | Jul 2017 | A1 |
20170228704 | Zhou et al. | Aug 2017 | A1 |
20170230375 | Kurian | Aug 2017 | A1 |
20170232300 | Tran et al. | Aug 2017 | A1 |
20170244707 | Johnsrud et al. | Aug 2017 | A1 |
20170250972 | Ronda et al. | Aug 2017 | A1 |
20170278186 | Creighton, IV et al. | Sep 2017 | A1 |
20170279801 | Andrade | Sep 2017 | A1 |
20170287068 | Nugent | Oct 2017 | A1 |
20170289111 | Voell et al. | Oct 2017 | A1 |
20180077569 | Chao | Mar 2018 | A1 |
20180288209 | Kim | Oct 2018 | A1 |
20180374097 | Hanna | Dec 2018 | A1 |
20190043054 | Crank | Feb 2019 | A1 |
20190052630 | Lapidous | Feb 2019 | A1 |
20190190992 | Warrick | Jun 2019 | A1 |
20190349385 | Fox | Nov 2019 | A1 |
20200022322 | Lafian | Jan 2020 | A1 |
20200053091 | Childress | Feb 2020 | A1 |
Number | Date | Country |
---|---|---|
2016101183 | Sep 2016 | AU |
105681301 | Jun 2016 | CN |
106230808 | Dec 2016 | CN |
106230852 | Dec 2016 | CN |
106408299 | Feb 2017 | CN |
106484836 | Mar 2017 | CN |
106504091 | Mar 2017 | CN |
101590076 | Feb 2016 | KR |
101591244 | Feb 2016 | KR |
20160150278 | Dec 2016 | KR |
101762245 | Jul 2017 | KR |
101773073 | Aug 2017 | KR |
101773074 | Aug 2017 | KR |
101780636 | Sep 2017 | KR |
2016036969 | Mar 2016 | WO |
2017006134 | Jan 2017 | WO |
2017006135 | Jan 2017 | WO |
2017006136 | Jan 2017 | WO |
2017021154 | Feb 2017 | WO |
2017044554 | Mar 2017 | WO |
2017066715 | Apr 2017 | WO |
2017079795 | May 2017 | WO |
2017091530 | Jun 2017 | WO |
2017104899 | Jun 2017 | WO |
2017119564 | Jul 2017 | WO |
2017136956 | Aug 2017 | WO |
2017139688 | Aug 2017 | WO |
2017146333 | Aug 2017 | WO |
Number | Date | Country | |
---|---|---|---|
63065943 | Aug 2020 | US |