Bi-directional image capture methods and apparatuses

Information

  • Patent Grant
  • 8055014
  • Patent Number
    8,055,014
  • Date Filed
    Tuesday, August 3, 2010
    14 years ago
  • Date Issued
    Tuesday, November 8, 2011
    13 years ago
Abstract
An apparatus has two optical portions, for capturing imagery from two directions. One portion captures imagery from the user (e.g., the user's retina), and the other captures imagery from another subject. In one arrangement, each optical portion has its own image sensor, and the two portions operate at the same time to capture imagery. Information derived from the imagery of the user (e.g., a hash) can be used—in consultation with a database—to attempt to identify the user. Such an image hash can be steganographically embedded into the subject-related image information. A great number of other features and arrangements are also detailed.
Description
TECHNICAL FIELD

The technology relates to methods and apparatuses for image capture and processing.


BACKGROUND AND SUMMARY

Advances in electronics have made it trivial to capture and edit creative digital works, including images, audio, and video. These advances also make it difficult to control unauthorized copying and alteration of these works. In particular, one challenge presented by this technology is to uniquely associate a work with its creator. Another challenge is to prevent tampering of the work, or at least provide a reliable method for detecting tampering.


One way to associate multimedia data with its owner or creator is to hide identifying information in the media signal through data hiding or steganography. Steganography refers to a process of hiding information into a signal. One example of steganography is digital watermarking. Digital watermarking is a process for modifying media content to embed a machine-readable code into the data content. The data may be modified such that the embedded code is imperceptible or nearly imperceptible to the user, yet may be detected through an automated detection process. Most commonly, digital watermarking is applied to media such as images, audio signals, and video signals. However, it may also be applied to other types of data, including documents (e.g., through line, word or character shifting), software, multi-dimensional graphics models, and surface textures of objects.


Digital watermarking systems have two primary components: an embedding component that embeds the watermark in the media content, and a reading component that detects and reads the embedded watermark. The embedding component embeds a watermark by altering data samples of the media content in the spatial, temporal or some other transform domain (e.g., Fourier, Discrete Cosine, Wavelet Transform domains). The reading component analyzes target content to detect whether a watermark is present. In applications where the watermark encodes information (e.g., a message), the reader extracts this information from the detected watermark.


The present assignee's work in steganography, data hiding and watermarking is reflected in U.S. Pat. No. 5,862,260; in application Ser. Nos. 09/503,881 and 09/452,023 (now U.S. Pat. Nos. 6,614,914 and 6,408,082); and in published specifications WO 9953428 and WO0007356 (corresponding to U.S. application Ser. Nos. 09/074,034 (now U.S. Pat. No. 6,449,377) and 09/127,502 (now U.S. Pat. No. 6,345,104)). A great many other approaches are familiar to those skilled in the art. The artisan is presumed to be familiar with the full range of literature about steganography, data hiding and watermarking.


The technology provides methods, systems and devices for capturing and encoding a user attribute in a media signal. It also provides methods, systems and devices for authenticating the media signal using the encoded user attribute data.


One aspect of the technology is a method for capturing and encoding a user attribute in a media signal. This method applies to a variety of media signals, including images (still and video) and audio. The method captures a user attribute of the user of a media signal capture device, such as a camera, video recorder, etc. It then encodes the user attribute into a media signal captured by the device. The method may be implemented in the media signal capture device, which enables the user attribute data to be captured from the user and encoded into content as it is being captured by the device.


One type of user attribute data is a retinal scan. This type of data is particularly suited for digital camera applications. In such applications, an image sensor may capture the photographer's retinal image for immediate encoding into an image captured with the same or a different image sensor in the camera. The method applies to other media capture devices, media signal types, and user attributes such as a voice signature, fingerprint, etc.


Another aspect of the technology is a media signal capture device capable of encoding a user attribute in a media signal captured in the device. The device includes a user attribute capture unit for capturing a user attribute of a user of the media signal capture device. It also includes an encoder for encoding the user attribute into a media signal captured by the device.


Another aspect of the technology is a method of authenticating a media signal. The method decodes user attribute data encoded in the media signal within a media signal capture device that captured the media signal. It then compares the decoded user attribute data with user attribute data computed for a person. This process may be used to verify that a creator of the content, such as photographer, did create the media content in question (e.g., a photograph, video recording, etc.).


Further features will become apparent with reference to the following detailed description and accompanying drawings.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a diagram illustrating a method for encoding an attribute of a user of a media capture device into a media signal captured by the device.



FIG. 2 is a diagram illustrating a method for encoding retinal scan data into an image.



FIG. 3 illustrates a method for evaluating an image processed as shown in FIG. 2.





DETAILED DESCRIPTION


FIG. 1 is a diagram illustrating a method for encoding a user attribute of a user of a media capture device into a media signal captured by the device. This method integrates a process of capturing the media signal (e.g., image or audio signal) with a process of encoding a user attribute into the media signal. By combining these processes, it provides a convenient and reliable way of encoding information about the content creator into the content. Additionally, since it can be performed at the time of capture of the content, it enables subsequent alteration of the content to be detected. These features make the method particularly useful in associating the content with its creator and authenticating the content.


As depicted in FIG. 1, the method captures a user attribute (100) of the user of the device (102). Preferably, the user attribute should uniquely identify the user, should enable immediate and automated capture by the device, and should allow capture at or near the time of capture of the media signal in which it is embedded. However, these criteria are not absolute necessities for all applications. One example of a user attribute is an image of an identifying characteristic of the user such as a retinal scan or fingerprint. Another is a voice recording. The capture of this data is implemented in a user attribute capture unit, which may include an image sensor and optical elements, a digital recorder and user input controls, a fingerprint scanning element, etc.


After capturing the user attribute, the method may optionally convert it into a more compact data representation. In a typical application, the user attribute is in the form of an electronic signal, such as a digital image of a retinal scan or fingerprint or a digital audio recording of the user's voice. In these cases, the method transforms the signal representing the user attribute into more compact, yet statistically unique user attribute data. Statistically unique, in this context, refers to an attribute that is statistically improbable of being generated from two different users. The process of generating the user attribute data is generally depicted as a hash in FIG. 1 (104). A “hash” in this context refers to transformation in a data representation from one form to another where the data retains statistically unique characteristics.


For additional security, cryptographic functions may be used to digitally sign and encrypt the user attribute data. Encryption provides an additional layer of security to prevent unwanted uses of the encoded information. Some examples of applicable cryptographic methods include RSA, DES, IDEA (International Data Encryption Algorithm), skipjack, discrete log systems (e.g., El Gamal Cipher), elliptic curve systems, cellular automata, etc.


These cryptographic methods may be used to create a digital signature to place in a watermark message. Public key cryptographic methods employ a private and public key. The private key is kept secret, and the public key is distributed. To digitally sign a user attribute data, the media capture device encrypts the message with a private key. The private key is uniquely associated with the device or a particular user. Those having a public key verify that the message has originated from the holder of the private key by using the public key to decrypt the message.


The user attribute data may be both encrypted and digitally signed using two stages of encryption. In the encoding process, a digital signature stage encrypts at least part of the data with a private key. An encryption stage then encrypts the signed data with a public key. The decoding process reverses these steps. First, a decryption stage decrypts the data with a private key corresponding to public key used in the encryption stage. Then, a second stage decrypts the output of the previous stage with the public key corresponding to the private key used to authenticate the data.


As a separate, and potentially concurrent process to the process of capturing the user attribute data, the method captures a media signal (106) into which the user attribute data will be embedded (108). Some examples include capturing an image, or a sequence of video frames in a camera, recording an audio signal, or both image and audio capture (such as in a video camera).


Next, the method encodes the user attribute data into the media signal to create an encoded media signal (110, 112). One way to encode the data is to steganographically embed it in the media signal. Examples of steganographic embedding implementations are provided in U.S. Pat. No. 5,862,260, and U.S. patent application Ser. No. 09/503,881, referenced above. Another way to encode the user attribute data is to place it in a file header of the media signal.


The method outlined above enables user attributes to be encoded into a media signal at or near the time of capture. For example, the method may be implemented within media capture devices such as cameras, scanners, recorders, etc. This feature links the user of the capture device and creator of the media content to the content. In cases where steganographic techniques, such as digital watermarking, are used to encode the user attribute data, the association between the user attributes and the content remains through various transformations and file format changes, is imperceptible or substantially imperceptible to humans viewing or listening to the content, and can be used to establish whether or not the content has been tampered with after capture.


To provide an example, FIG. 2 depicts a system and method for encoding retinal scan data into an image. In this example, the method is implemented within a single lens reflex digital camera. This type of configuration is common in commercially available 35 mm digital cameras. The single lens reflex body 200 includes an eyepiece 202 through which the photographer view's the subject of the photograph. An optical element 204 directs light reflected from the photographer's eye 206 (Image source 1) to an image sensor 208. The image sensor depicted here is a CCD array. Alternative sensor technology, such as a CMOS sensor may also be used.



FIG. 2 shows a configuration where the sensor used to record a user attribute also captures an image into which the user attribute is encoded. The light from the subject (Image source 2) enters the camera through its primary optical element 210 (e.g., an image field lens) and is directed to the image sensor 208. In response to the user actuating a shutter command (or other analogous signal capture command), the camera time multiplexes the image sensor to capture user attribute data and the subject image. As an alternative, the camera may include a separate image sensors for user attribute and subject image data, respectively. Using separate sensors, the camera can capture the user attribute data at the same time as the subject image data.


A controller 212, such as the Central Processing Unit/Digital Camera (CPU/DCAM) integrated circuit shown in FIG. 2, controls image capture from the two image sources in response to a user's image capture input command. The controller communicates with a memory subsystem 214, which includes one or more memory devices for storing program code, image data, and image metadata, including user attribute data.


One operation scenario proceeds as depicted in FIG. 2 and described below. First, the photographer presses a shutter command button on the camera (300). In response, the sensor captures an image of the photographer's eye through the eyepiece (302). The controller transfers the image to memory, analyzes it to derive a statistically unique retina image, and hashes the retina image into an identifier to be encoded into an image (304). While a variety of hashing algorithms can be used, the hash algorithm used to compute the identifier should retain the statistically unique characteristic of the retina image. Examples of hashing algorithms include MD5, MD2, SHA, SHA1.


While it holds this identifier in memory A, the controller captures an image of the subject through the primary optical element 210 and places it into memory B (306). Next, the controller performs conventional color formatting of the captured image, such as raw image to Bayer RGB image formatting (308).


The controller may also gather additional metadata relating to the image. There are many types of metadata such as: a time stamp, camera settings, a user name, location, etc. The controller may encode a cross reference link to this metadata into the image or its file header/footer. The cross reference link may be a number or other code (HTML link, pointer, address, index, etc.) that references a device where the metadata is stored. For example, the metadata may be stored in an external database and referenced via the link. The metadata may be transferred from the camera along with the image data via a wire or wireless link to the database.


Alternatively, the controller may encode the metadata directly into the image or the file header/footer (see, for example, block 310, FIG. 2). For example, metadata such as a time stamp, location (e.g., GPS coordinates), etc. may be concatenated with the identifier representing user attribute data and encoded into the image. The metadata is generated by the camera, devices in the camera (a GPS device, clock) or from user input. The embedded metadata may also include a hash of the image that is later used to detect image alteration. To be effective, a hash function used to compute an image hash that is embedded in the image should be insensitive to the alteration of the image caused by embedding auxiliary data into the image. For more on associating metadata with media signals such as images, audio and video, see co-pending application Ser. No. 09/507,096, entitled Associating Data with Images In Imaging Systems, filed on Feb. 17, 2000.


Returning to the example depicted in FIG. 2, the controller embeds the identifier into the formatted image using a watermark encoding process (312). Examples of watermark encoding processes are provided in U.S. Pat. No. 5,862,260, and in application Ser. No. 09/503,881, filed Feb. 14, 2000, referenced above. Other image watermark, steganographic or data hiding programs may be used to encode the identifier in the subject image as well.


Finally, the controller writes the image marked with the identifier to a file (314). The user or controller may transfer the image from the camera to another device via a portable memory device (such as flash memory, floppy disk, etc.) or a wire or wireless communication link (e.g., infrared, radio, wireless modem, modem, USB, USB2, IEEE 1394, computer network connection, etc.). As an additional step, the controller may also hash the marked image and insert the image hash in the file header/footer before transferring it. One simple hash is a check sum. Other cryptographic hashes may be used, such as those cited earlier.



FIG. 3 illustrates a method for evaluating an image processed as shown in FIG. 2. In cases where the image file includes an image hash, the process begins by evaluating the hash to determine whether the image has been altered. The input is a suspect image 400, which may have undergone some tampering or alteration after being captured. The method reads the image hash from the file (402) (e.g., from the header or footer), re-computes the image hash for the suspect image (404), and compares this computed hash with the one read from the file (406). If the two hashes differ, then the image has been altered.


Next, the method proceeds to check the user attribute data. It decodes the embedded user attribute data (408, 410) from the image using a decoder compatible with the encoder. It then compares the extracted user data with separately computed user data to determine whether there is a match (412).


There are several application scenarios for this user authentication process. In one scenario, the user attribute data for a person purported to be the photographer is captured (414, 416), hashed (418, 420) and compared with the extracted user data (412). If there is a match, then the photographer is deemed to have created the suspect image (422). In another scenario, user attributes (416) for several photographers are captured (416), hashed (418), and stored in a database (420), along with information about the person. The user attribute data extracted from the image is used as an index to this database to look up the identity of the photographer.


The processes depicted in FIG. 3 may be implemented in hardware, software or a combination of hardware and software. For example, the process may be incorporated into an authentication system implemented in a computer or computer network. The processes depicted in FIG. 3 may be implemented in programs executed from the system's memory (a computer readable medium, such as an electronic, optical or magnetic storage device.) Suspect media signals may be delivered to the computer electronically via a wire or wireless network or memory device (e.g., flash memory, optical disk, magnetic storage device, etc.), or by scanning or recording an analog form of the suspect media signal (scanning a photograph, or recording suspect analog audio signals). In the case where analog versions of the suspect signal are evaluated, steganographic embedding processes used to encode the user attribute data should be selected to survive digital to analog and analog to digital conversion.


While the specific examples provided in FIGS. 2 and 3 related to digital cameras, similar processes may be implemented in other media signal capture devices, including scanners, and audio and video recorders. Retinal scan data is one example of a user attribute data. Other types of user attribute data include a fingerprint or voice signature. A fingerprint may be captured by requesting the user of the capture device to place a finger on a scanning element, and then taking an image of the finger. A voice signature may be captured by recording the user's voice, and then coding a digital recording of the voice into signature for embedding in the media signal. One way to encode the digital recording is to use audio compression, and particularly, coding designed for voice signals.


CONCLUDING REMARKS

Having described and illustrated the principles of the technology with reference to specific implementations, it will be recognized that the technology can be implemented in many other, different, forms. To provide a comprehensive disclosure without unduly lengthening the specification, applicants incorporate by reference the patents and patent applications referenced above. These patents and patent applications provide additional details about implementing watermarking systems.


The particular combinations of elements and features in the above-detailed embodiments are exemplary only; the interchanging and substitution of these teachings with other teachings in this and the incorporated-by-reference patents/applications are also contemplated.

Claims
  • 1. A method comprising: sensing a user action;in response to the sensed action, capturing first image data, using a first optical portion, from a first side of an apparatus, wherein the first image data depicts a subject;in response to the sensed action, capturing second image data, using a second optical portion, from a second side of the apparatus, wherein the second image data depicts part of the user, wherein the first side of the apparatus is opposite of the second side of the apparatus, wherein the first and second optical portions have parallel but not coincident optical axes, and wherein the capturing of the first image data and the second image data occurs at the same time;computing a hash based at least in part on the second image data;storing information including at least information based on the first image data, and the hash; andconsulting database information comprising stored data for plural different persons, to attempt to identify, by reference to the stored information, the user.
  • 2. The method of claim 1, wherein at least one of the image data comprises video data, and the method further comprises wirelessly transmitting video information from the apparatus.
  • 3. The method of claim 1, further comprising creating a single data object including information based on the first image data and the hash.
  • 4. The method of claim 3, wherein creating comprises generating third image data different than the first and second image data.
  • 5. The method of claim 3, wherein creating comprises steganographically embedding the hash into information based on the first captured image data.
  • 6. A video apparatus comprising: a body configured to include a first and a second different optical portions;the first optical portion configured to capture first image data from a first side of the body;the second optical portion configured to capture second image data from a second, opposite side of the body, wherein the first and second optical portions have respective optical axes that are parallel but not coincident;a controller configured to control capturing image data by the first and second optical portions, wherein at least one of the optical portions is configured to capture video, and wherein the first and second optical portions are configured to capture image data at the same time; anda wireless portion configured to transfer data, including video data.
  • 7. The apparatus of claim 6, further comprising a processor configured to produce single video data incorporating information derived from both the first and second image data.
  • 8. The apparatus of claim 6, further comprising a processor configured to steganographically encode information based on second image data into information based on first image data.
  • 9. The apparatus of claim 6, further comprising a processor configured to steganographically encode a hash based on second sensor data into information based on first sensor data.
  • 10. A tangible computer-readable medium having instructions stored thereon that, if executed by a computing device, cause the computing device to perform operations comprising: sensing a user action;in response to the sensed action, controlling capturing of first image data, using a first optical portion, from a first side of an apparatus, wherein the first image data depicts a subject;in response to the sensed action, controlling capturing of second image data, using a second optical portion, from a second side of the apparatus, wherein the second image data depicts part of the user, wherein the first side of the apparatus is opposite of the second side of the apparatus, wherein the first and second optical portions have parallel but not coincident optical axes, and wherein the capturing of the first image data and the second image data occurs at the same time;computing a hash based on the second image data;storing information including at least information based on the first image data, and the hash; andconsulting database information comprising stored data for plural different persons, to attempt to identify, by reference to the stored information, the user.
  • 11. The tangible computer-readable medium of claim 10, further comprising instructions that, if executed by the computing device, cause the computing device to perform operations comprising controlling wirelessly transmitting video information from the apparatus, wherein at least one of the image data comprises video data.
  • 12. The method of claim 10, further comprising instructions that, if executed by the computing device, cause the computing device to perform operations comprising creating a single data object including information based on the first image data and the hash.
  • 13. The method of claim 12, wherein creating comprises generating third image data different than the first and second image data.
  • 14. The method of claim 12, wherein creating comprises steganographically embedding the hash into information based on the first captured image data.
RELATED APPLICATION DATA

This application is a division of application Ser. No. 11/382,207 (now U.S. Pat. No. 7,769,208), which is a continuation of application Ser. No. 09/585,678, filed Jun. 1, 2000 (now U.S. Pat. No. 7,043,048). The subject matter of the present application is related to that disclosed in U.S. Pat. No. 5,862,260, and in application Ser. No. 09/503,881, filed Feb. 14, 2000 (now U.S. Pat. No. 6,614,914). The foregoing documents are incorporated by reference.

US Referenced Citations (225)
Number Name Date Kind
4015240 Swonger et al. Mar 1977 A
4109237 Hill Aug 1978 A
4528588 Lofberg Jul 1985 A
4620318 Hill Oct 1986 A
4994831 Marandi Feb 1991 A
4995086 Lilley et al. Feb 1991 A
5103486 Grippi Apr 1992 A
5284364 Jain Feb 1994 A
5499294 Friedman Mar 1996 A
5541655 Kaneda Jul 1996 A
5579079 Yamada et al. Nov 1996 A
5646997 Barton Jul 1997 A
5767496 Swartz et al. Jun 1998 A
5787186 Schroeder Jul 1998 A
5799092 Kristol et al. Aug 1998 A
5841886 Rhoads Nov 1998 A
5857038 Owada et al. Jan 1999 A
5862260 Rhoads Jan 1999 A
5907149 Marckini May 1999 A
5917542 Moghadam et al. Jun 1999 A
5995630 Borza Nov 1999 A
6005936 Shimizu et al. Dec 1999 A
6064737 Rhoads May 2000 A
6064764 Bhaskaran et al. May 2000 A
6122403 Rhoads Sep 2000 A
6148091 DiMaria Nov 2000 A
6185316 Buffam Feb 2001 B1
6185318 Jain et al. Feb 2001 B1
6208746 Musgrave Mar 2001 B1
6229924 Rhoads et al. May 2001 B1
6243481 Tao Jun 2001 B1
6263091 Jain et al. Jul 2001 B1
6289112 Jain et al. Sep 2001 B1
6292092 Chow et al. Sep 2001 B1
6301368 Bolle et al. Oct 2001 B1
6307949 Rhoads Oct 2001 B1
6311214 Rhoads Oct 2001 B1
6314197 Jain et al. Nov 2001 B1
6321981 Ray et al. Nov 2001 B1
6332193 Glass et al. Dec 2001 B1
6366680 Brunk et al. Apr 2002 B1
6377699 Musgrave et al. Apr 2002 B1
6381341 Rhoads Apr 2002 B1
6385329 Sharma et al. May 2002 B1
6389151 Carr et al. May 2002 B1
6397334 Chainer et al. May 2002 B1
6408082 Rhoads et al. Jun 2002 B1
6421070 Ramos et al. Jul 2002 B1
6424725 Rhoads et al. Jul 2002 B1
6433818 Steinberg et al. Aug 2002 B1
6516079 Rhoads et al. Feb 2003 B1
6522770 Seder et al. Feb 2003 B1
6535617 Hannigan et al. Mar 2003 B1
6542927 Rhoads Apr 2003 B2
6553129 Rhoads Apr 2003 B1
6567533 Rhoads May 2003 B1
6577336 Safai Jun 2003 B2
6580808 Rhoads Jun 2003 B2
6590608 Matsumoto et al. Jul 2003 B2
6590996 Reed et al. Jul 2003 B1
6611607 Davis et al. Aug 2003 B1
6614914 Rhoads et al. Sep 2003 B1
6647128 Rhoads Nov 2003 B1
6647130 Rhoads Nov 2003 B2
6650761 Rodriguez et al. Nov 2003 B1
6681028 Rodriguez et al. Jan 2004 B2
6681029 Rhoads Jan 2004 B1
6687383 Kanevsky et al. Feb 2004 B1
6694042 Seder et al. Feb 2004 B2
6694043 Seder et al. Feb 2004 B2
6700990 Rhoads Mar 2004 B1
6700995 Reed Mar 2004 B2
6704869 Rhoads et al. Mar 2004 B2
6718046 Reed et al. Apr 2004 B2
6718047 Rhoads Apr 2004 B2
6721440 Reed et al. Apr 2004 B2
6760463 Rhoads Jul 2004 B2
6763123 Reed et al. Jul 2004 B2
6768809 Rhoads et al. Jul 2004 B2
6775392 Rhoads Aug 2004 B1
6798894 Rhoads Sep 2004 B2
6813366 Rhoads Nov 2004 B1
6879701 Rhoads Apr 2005 B1
6917724 Seder et al. Jul 2005 B2
6920232 Rhoads Jul 2005 B2
6931451 Logan et al. Aug 2005 B1
6947571 Rhoads et al. Sep 2005 B1
6975746 Davis et al. Dec 2005 B2
6988202 Rhoads et al. Jan 2006 B1
6996252 Reed et al. Feb 2006 B2
7003731 Rhoads et al. Feb 2006 B1
7024016 Rhoads et al. Apr 2006 B2
7027614 Reed Apr 2006 B2
7035427 Rhoads Apr 2006 B2
7043048 Ellingson May 2006 B1
7044395 Davis et al. May 2006 B1
7047418 Ferren et al. May 2006 B1
7051086 Rhoads et al. May 2006 B2
7054465 Rhoads May 2006 B2
7062069 Rhoads Jun 2006 B2
7095871 Jones et al. Aug 2006 B2
7111170 Rhoads et al. Sep 2006 B2
7113614 Rhoads Sep 2006 B2
7139408 Rhoads et al. Nov 2006 B2
7158654 Rhoads Jan 2007 B2
7164780 Brundage et al. Jan 2007 B2
7171016 Rhoads Jan 2007 B1
7174031 Rhoads et al. Feb 2007 B2
7177443 Rhoads Feb 2007 B2
7184570 Rhoads Feb 2007 B2
7213757 Jones et al. May 2007 B2
7215793 Takahashi May 2007 B2
7224819 Levy et al. May 2007 B2
7224995 Rhoads May 2007 B2
7248717 Rhoads Jul 2007 B2
7261612 Hannigan et al. Aug 2007 B1
7289643 Brunk Oct 2007 B2
7305104 Carr et al. Dec 2007 B2
7308110 Rhoads Dec 2007 B2
7313251 Rhoads Dec 2007 B2
7319775 Sharma et al. Jan 2008 B2
7330564 Brundage et al. Feb 2008 B2
7369678 Rhoads May 2008 B2
7377421 Rhoads May 2008 B2
7391880 Reed et al. Jun 2008 B2
7406214 Rhoads et al. Jul 2008 B2
7424131 Alattar et al. Sep 2008 B2
7427030 Jones et al. Sep 2008 B2
7433491 Rhoads Oct 2008 B2
7444000 Rhoads Oct 2008 B2
7444392 Rhoads et al. Oct 2008 B2
7450734 Rodriguez et al. Nov 2008 B2
7460726 Levy et al. Dec 2008 B2
7466840 Rhoads Dec 2008 B2
7486799 Rhoads Feb 2009 B2
7502759 Hannigan et al. Mar 2009 B2
7508955 Carr et al. Mar 2009 B2
7515733 Rhoads Apr 2009 B2
7536034 Rhoads et al. May 2009 B2
7537170 Reed et al. May 2009 B2
7545952 Brundage et al. Jun 2009 B2
7564992 Rhoads Jul 2009 B2
RE40919 Rhoads Sep 2009 E
7602978 Levy et al. Oct 2009 B2
7628320 Rhoads Dec 2009 B2
7643649 Davis et al. Jan 2010 B2
7650009 Rhoads Jan 2010 B2
7653210 Rhoads Jan 2010 B2
7657058 Sharma Feb 2010 B2
7685426 Ramos et al. Mar 2010 B2
7693300 Reed et al. Apr 2010 B2
7697719 Rhoads Apr 2010 B2
7711143 Rhoads May 2010 B2
7738673 Reed Jun 2010 B2
7747038 Rhoads Jun 2010 B2
7751588 Rhoads Jul 2010 B2
7751596 Rhoads Jul 2010 B2
7756290 Rhoads Jul 2010 B2
7760905 Rhoads et al. Jul 2010 B2
7762468 Reed et al. Jul 2010 B2
7769208 Ellingson Aug 2010 B2
7787653 Rhoads Aug 2010 B2
7792325 Rhoads et al. Sep 2010 B2
7822225 Alattar Oct 2010 B2
7837094 Rhoads Nov 2010 B2
7945781 Rhoads May 2011 B1
7949147 Rhoads et al. May 2011 B2
7953270 Rhoads May 2011 B2
7953824 Rhoads et al. May 2011 B2
7957553 Ellingson et al. Jun 2011 B2
7961949 Levy et al. Jun 2011 B2
20010007130 Takaragi Jul 2001 A1
20010011680 Soltesz et al. Aug 2001 A1
20010025342 Uchida Sep 2001 A1
20010034705 Rhoads et al. Oct 2001 A1
20010034835 Smith Oct 2001 A1
20010055407 Rhoads Dec 2001 A1
20020009208 Alattar et al. Jan 2002 A1
20020010684 Moskowitz Jan 2002 A1
20020061120 Carr et al. May 2002 A1
20020072935 Rowse et al. Jun 2002 A1
20020080396 Silverbrook et al. Jun 2002 A1
20020131076 Davis Sep 2002 A1
20020176003 Seder et al. Nov 2002 A1
20020186886 Rhoads Dec 2002 A1
20020196272 Ramos et al. Dec 2002 A1
20030011684 Narayanaswami et al. Jan 2003 A1
20030038879 Rye et al. Feb 2003 A1
20030040957 Rhoads et al. Feb 2003 A1
20030105730 Davis et al. Jun 2003 A1
20030130954 Carr et al. Jul 2003 A1
20040005093 Rhoads Jan 2004 A1
20040101212 Fedorovskaya et al. May 2004 A1
20040190750 Rodriguez et al. Sep 2004 A1
20040240704 Reed Dec 2004 A1
20040264733 Rhoads et al. Dec 2004 A1
20050036656 Takahashi Feb 2005 A1
20050041835 Reed et al. Feb 2005 A1
20050058318 Rhoads Mar 2005 A1
20050192933 Rhoads et al. Sep 2005 A1
20060013435 Rhoads Jan 2006 A1
20060041591 Rhoads Feb 2006 A1
20060251291 Rhoads Nov 2006 A1
20070055884 Rhoads Mar 2007 A1
20070108287 Davis et al. May 2007 A1
20070276841 Rhoads et al. Nov 2007 A1
20070276928 Rhoads et al. Nov 2007 A1
20080121728 Rodriguez May 2008 A1
20080133555 Rhoads et al. Jun 2008 A1
20080292134 Sharma et al. Nov 2008 A1
20090012944 Rodriguez et al. Jan 2009 A1
20090125475 Rhoads et al. May 2009 A1
20090232352 Carr et al. Sep 2009 A1
20090286572 Rhoads et al. Nov 2009 A1
20090290754 Rhoads Nov 2009 A1
20100045816 Rhoads Feb 2010 A1
20100062819 Hannigan et al. Mar 2010 A1
20100172540 Davis et al. Jul 2010 A1
20100198941 Rhoads Aug 2010 A1
20100315495 Ellingson Dec 2010 A1
20110007936 Rhoads Jan 2011 A1
20110026777 Rhoads et al. Feb 2011 A1
20110051998 Rhoads Mar 2011 A1
20110062229 Rhoads Mar 2011 A1
20110091066 Alattar Apr 2011 A1
Foreign Referenced Citations (4)
Number Date Country
WO9603286 Feb 1996 WO
WO9827510 Jun 1998 WO
WO0070585 Jan 2000 WO
WO0036605 Jun 2000 WO
Related Publications (1)
Number Date Country
20100315495 A1 Dec 2010 US
Divisions (1)
Number Date Country
Parent 11382207 May 2006 US
Child 12849514 US
Continuations (1)
Number Date Country
Parent 09585678 Jun 2000 US
Child 11382207 US