Aspects and embodiments of the present invention relate in general to methods and devices for biometrically identifying and authenticating a user during an access control transaction. More specifically, certain aspects and embodiments of the present invention provide methods and access control processor devices for biometric authentication of a user to prevent unauthorized access to a secured location, object and/or data.
Currently, a variety of devices and methods have been developed in an attempt to improve authentication fidelity and to safeguard sensitive personal identity and private information in light of the increasing security threat due to the rapid advancements in networking and mobile communication technologies. However, certain authentication technologies in use today are still based on the traditional “knowledge-based factor” or “possession-based factor” identification and verification approaches. In a typical knowledge-based authentication approach, only one authentication factor (such as knowledge of a password is required in order to gain access to a system. In a possession-based authentication approach, possession of one authentication factor (e.g. possession of card or token) is required in order to gain access to a system. More recently, some of these technologies have been implemented in combination as two-factor authentication schemes wherein both knowledge-based and possession-based factors are required simultaneously for authentication. These types of authentications have recently gained increasing acceptance. An example of such authentication scheme is the common bank card transaction wherein the card itself represents the authorizing possession factor (bearer has the card) and the corresponding personal identification number (PIN) represents the authorizing factor that is known only to the account holder. However, despite these apparent additional layers of security, misplacement of the possession factor such as lost or stolen cards and a breach of the knowledge factor (such as compromised password) remain problematic for these types of transactions. As a result, when the possession factor (e.g. card) and the password are simultaneously compromised or duplicated, there is no apparent suitable countermeasure for the breach as it is no longer possible to authenticate the true identity of the holder of said device.
In a typical access control transaction using the traditional two factor verification system, a bearer of the access control-processor device, such as, for example, an access card, presents the card to gain access or entry to a secured site. The card presented by the bearer is read or swiped using a magnetic reader or other similar devices. The information contained on the magnetic stripe of the card is read and transmitted to the issuing institution. The institution then interrogates its database of active cards against the information received. If the institution verifies that the card is valid and active, and/or when additional verification parameters are met, an approval is provided to the card holder to gain entry. In some instances, additional authentication scheme based on interrogation of information only known to the user such as, for example, a password, may be used to supplement and/or enhance the security scheme.
However, despite these apparent additional layers of security, misplacement of the possession factor such as lost or stolen cards and a breach of the knowledge factor (such as compromised passwords) remains problematic for these types of transactions. Within these conventional authentication systems, when the possession factor (e.g. card) and the password are simultaneously compromised or duplicated, there is no apparent suitable countermeasure for this type of security breach as it is no longer possible to authenticate the true identity of the holder of said device.
In light of these security threats, the use of access control processor devices (e.g. cards or badges) by non-authorized bearers continues to present a difficult and costly problem for institutions. Various security features have been designed and implemented with mixed success to minimize these types of fraud and security breach. Thus, there remains a need for improved methods and devices for user authentication during access control transactions.
To address some of the problems and needs as stated in the forgoing, aspects and embodiments of the presented invention directed to methods and devices for conducting access control transactions using biometric authentication are provided.
Aspects and embodiments of the present disclosure provide methods and devices for authenticating the identity of the account holder associated with an access control processor device. In once aspect, an access control transaction processor device with a front face and a back face, a communication element, a power source affixed to the device, the power source connected to the communication element on the device, and a biometric detection system connected to the power source, is provided. In certain embodiments, the biometric detection system may include a contact surface configured for the placement of user finger(s) to receive biometric input, a biometric sensor or detector for obtaining an electronic profile of the finger of the user that is placed on the contact surface, and/or a sensor, including pressure sensor, for detecting the pressure profile generated by applying the finger of the user to the contact surface.
Aspects of the invention also provide a method of authenticating a user for an access control transaction. The method comprises providing an access control transaction processor device (e.g. card) by inputting user biometric information into a biometric verification system of the access control processor card, verifying the biometric information entered into the biometric verification system with pre-stored biometric information of the access control processor card, activating a communication element on the card when the biometric information entered into the biometric verification system is successfully verified, and maintaining an inactive status for the communication element on the card when the biometric information entered into the biometric verification system is not successfully verified.
Other systems, methods, and/or products will be or become apparent to one with skill in the art upon review of the following drawings and detailed description. It is intended that all such additional systems, methods, and/or products be included within this description, be within the scope of the present invention, and be protected by the accompanying claims.
Accordingly, aspects and embodiments of the present invention provide an access control processor device configured to allow for authentication of the bearer of the card. In addition, there is provided an access control processor device that will allow for authentication of the user based on biometric information. Furthermore, there is provided an access control processor card configured for biometric authentication of the user, while having the capability of being used with conventional access control card reading devices, systems, and/or networks.
The present invention now will be described more fully hereinafter with reference to the accompanying drawings, in which illustrative embodiments of the invention are shown. However, this invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises,” “comprising,” “includes” and/or “including” when used in this specification, specify the presence of stated features, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, elements, components, and/or groups thereof.
Aspects of the present invention relate generally to methods and devices for conducting access control transactions. Certain exemplary embodiments relate to biometric authentications in connection with these transactions.
As used herein, access control processor device embodiments of the present invention may include, for example, contact cards, contactless cards, tokens, or badges. As used herein, an access control processor device may be broadly understood as being a portable access control processing device associated with an account or authorized user within an access control system. Suitable access control card embodiments may include a plastic card, a badge or other access control devices comprising a solid support, including for example, plastic support such as PVC or ABS plastic. In certain embodiments, the device may include imprinting feature's and/or a hologram to avoid counterfeiting.
In one aspect, an access control transaction card embodiment configured to allow for authentication of the bearer of the card is provided.
In certain embodiments, the authentication is based on successful verification of biometric information.
In certain embodiments, the authentication is based on successful verification of the biometric information in combination with successful verification of a password. In certain other embodiments, the biometric authentication scheme may be optionally combined with an additional authentication feature based on verification of additional information known only to the user during a transaction.
In certain embodiments, the access control processor device comprises a biometric information verification system or components thereof.
In certain embodiments, the access control processor device comprises a biometric information input detector and an authentication logic processor.
In certain other embodiments, the biometric detector may further comprise a thin-film biometric sensor pad configured to acquire the card holder's biometric profile.
In another aspect, an access control processor card configured to allow for authentication of the user, while having the capability of being used with conventional card reading apparatus, system, and/or networks, is provided.
In certain embodiments, the biometric information verification/input system may comprise a thin-film biosensor pad. The biometric information verification system may be configured to capture, store, and authenticate (include identification and/or verification) of biometric information via a logic processor.
In an exemplary embodiment of the invention, the access control processor device may further comprise at least one hologram on at least one of the front and the back face of the card. Furthermore, the access control processor device may be configured to include a power source.
In other embodiments, the access control processor device may further comprise a unique identification number on the face (e.g. front face) of the card.
In other embodiments, the method may further comprise entering the biometric information into the biometric verification system, deactivating the communication element on the card when the pre-stored biometric information does not match after a predetermined amount of time.
In other embodiments, the method can further comprise deactivating the one of the active magnetic strip, the contactless radio frequency (R.F.) unit and the processor (e.g. computer chip) on the card when the biometric information and the pre-stored biometric information do not match. Additionally, the method may further comprise permanently deactivating all functions of the card after the biometric information entered into the biometric input system and the pre-stored biometric information do not match after three or more attempts.
In other embodiments, the method may also comprise providing a master unlocking code for the card to re-activate functions of the card deactivated after the biometric information entered into the biometric input system and the pre-stored biometric information do not match after prescribed number of attempted entries (e.g. three or more attempts).
As used herein, access control transaction includes all transactions wherein access to a site, whether physical or virtual, is permitted only after authentication. Authentication may include identification and/or verification of the identity of the person requesting entry thereto. Exemplary physical access sites may include, for example, buildings, perimeters, rooms, floors, gates, and/or airport terminals. Exemplary virtual access sites may include, for example, computers, networks, data, and/or websites.
As used herein, a biometric information verification system may include a biometric information input and verification components and/or subsystems configured to read, acquire, and authenticate the input biometric information/data profile of a user. The systems may include a biometric input detector or sensor and a logic processor (e.g. chip) to acquire, store, verify, process, interrogate, and/or authenticate user biometric information, such as, for example, fingerprint profile data. Sensors, detectors, processors, and various components or subsystems of the biometric information verification systems may be integrated into a single payment processor device or may be separately located within a system or network. Exemplary biometric detectors may include a thin-film substrate, or a thin-film transistor (TFT) layer on the thin-film substrate, and an array of electric field sensing electrodes adjacent the TFT layer for receiving a finger profile. The TFT layer may include a plurality of TFTs defining a respective TFT amplifier stage for each electric field sensing electrode. The sensor may further include a finger excitation electrode adjacent the array of electric field sensing electrodes, and at least one integrated circuit adjacent the thin-film substrate. The integrated circuit may include a monocrystalline substrate and processing circuitry adjacent the monocrystalline substrate and connected to the TFT amplifier stages. Optical, ultrasonic and other type fingerprint sensors may also be used as would be readily understood by those skilled in the art. Biometric input apparatus and related technology are well known in the art, including those described in U.S. Pat. No. 6,131,464.
In certain embodiments, a finger to be scanned is placed upon the contact surface of a biometric information input sensor, such as, for example, a pressure sensor. The pressure sensor detects the amount of pressure exerted by the finger upon contact surface. The pressure sensor inputs data from measured pressure and the user fingerprint profile data is acquired, stored, and processed by the biometric information system processor. During operation, the applied pressure of a finger upon contact surface may be monitored to ensure proper finger pressure is maintained throughout the scanning process. Once the fingerprint profile data of a user is acquired, the processor of the biometric information system will determine whether the image obtained is a suitable for subsequent interrogation with known user profile data. In certain embodiments, optical fingerprint scanners may be utilized and such exemplars are commercially available from companies such as L-1 Identity Solutions, Digital Persona, Inc., Digital Biometrics, Inc., and Startek, Inc. In certain other embodiments, non-optical finger image scanners may be used, exemplars are commercially available through companies such as, for example, SGS-Thomson.
In certain embodiments, the pressure detector comprises a thin-film pressure sensor, such as, for example, commercially available Uniforce sensors from Force Imaging Technologies. The pressure sensor generates an electric resistance that is proportional to the pressure placed on the pressure sensor. This variable resistance is then converted to an analog voltage via a conventional op amp circuit. This analog voltage can then be processed by the biometric information processor.
In certain other embodiments, the biometric information detection system may have the ability to sequentially or simultaneously acquire multiple information profiles, such as, for example, optical images in combination with pressure profile data. In certain embodiments, the pressure sensor may comprise a piezoresistive strain gauge. This strain gauge may be attached to the back of the finger image sensor. When a finger is placed on the sensor, the pressure from the finger deforms the sensor package slightly. The strain gauge converts this deformation into a variable resistance that is proportional to the finger's pressure. In certain embodiments, multiple sensors may be configured into one verification system or device.
In yet another embodiment, the image sensor and the pressure sensor may be combined in a single integrated circuit. In this embodiment, the capacitive pressure sensors are distributed on the surface of a capacitive fingerprint sensor via a complementary metal oxide semiconductor (CMOS)—compatible silicon micromachining process. Averaging the output of the collection of pressure sensors provides an overall indication of the amount of pressure on the finger print sensor. In other embodiments, the pressure sensor comprises compressive load cells, linear variable differential transformer (LVDT) transducers, capacitive transducers, piezoelectric transducers, and quartz transducers, as is known in the art. Other embodiments will place the pressure sensor relative to the finger image scanner and contact surface in other configurations, as will be apparent to one of skill in the art; all are to be considered within the scope of the present invention.
As used herein, biometric information includes biometric information profiles that may be authenticated singly or in combination with passwords or tokens, to improve the security of existing authentication systems. Authenticating factors may include knowledge based factors such as, for example, a password; or possession factors such as, for example, a credit card or security token.
As used herein, the authentication may include processes of identification and verification of individuals based on unique physical or behavioral characteristics. Certain of these processes may include matching patterns of individuals against databases of records, including gathering proof of identities, enrolling biometric data and converting the data into templates, and/or matching templates to stored records using algorithms.
As used herein, biometric-based authentication applications may include workstation, network, and domain access, single sign-on, application logon, data protection, remote access to resources, transaction security and web security. As used herein, biometric authentication may be used alone or integrated with other technologies such as smart cards, encryption keys and digital signatures, to enhance security.
As used herein, biometric information may include unique physiological information that related to the account holder. Exemplary information includes fingerprints and related profiles, which may include optical, physiological and/or morphological characteristics; as well as differential profiles, including differential pressure profiles generated based on the distinct impressions between the ridges and valleys of the papillary lines in the finger of the account holder. Other exemplars may also include temperature, electrical resistance, pulse, finger pressure, blood pressure, face recognition, hand geometry and iris recognition profiles. It is understood that authentication scheme may be based on single biometric information profile or combinations thereof.
As used herein, fingerprint may include an impression of the friction ridges of all or any part of the finger. A friction ridge may include a raised portion of the epidermis on the palmar (palm and fingers) or plantar (sole and toes) skin, consisting of one or more connected ridge units of friction ridge skin. These ridges are sometimes known as “dermal ridges” or “dermal papillae”. Fingerprints may be deposited in natural secretions from the eccrine glands present in friction ridge skin (secretions consisting primarily of water) or they may be made by ink or other contaminants transferred from the peaks of friction skin ridges to a relatively smooth surface such as a fingerprint card. Fingerprint includes impressions transferred from the pad on the last joint of fingers and thumbs. In certain embodiments, fingerprint may include portions of lower joint areas of the fingers (which may also used to make identifications).
As used herein, fingerprint identification includes art understood processes related to the field of dactyloscopy. It may include the process of comparing questioned and known friction skin ridge impressions (e.g. Minutiae) from fingers, palms, and toes to determine if the impressions are from the same finger (or palm, toe, etc.). The flexibility of friction ridge skin means that no two finger or palm prints are ever exactly alike (never identical in every detail), even two impressions recorded immediately after each other. Fingerprint identification (also referred to as individualization) occurs when an expert (or an expert computer system operating under threshold scoring rules) determines that two friction ridge impressions originated from the same finger or palm (or toe, sole) to the exclusion of all others.
As used herein, fingerprint types may include latent prints. Exemplary latent prints include hidden, invisible, or accidental impression left by friction ridge skin on a surface, regardless of whether it is visible or invisible at the time of deposition, whether they are from natural secretions of the eccrine glands present on friction ridge skin (which produce palmar sweat, sebum, and various kinds of lipids), or whether the impression is in a contaminant such as motor oil, blood, paint, ink, etc.
As used herein, fingerprint types may include patent prints. Exemplary patent prints may include friction ridge impressions of unknown origin which are obvious to the human eye and are caused by a transfer of foreign material on the finger, onto a surface.
As used herein, fingerprint types may also include plastic prints. Exemplary plastic print include friction ridge impressions from a finger or palm (or toe/foot) deposited in a material that retains the shape of the ridge detail.
As used herein, fingerprints may also include all the art understood fingerprint and related print profiles from the following categories: Roscher system, the Vucetich system, and the Henry system. In the Henry system of classification, fingerprint patterns may include Arch, Loop and Whorl profiles. Fingerprints may also include patterns to plain arches or tented arches. Loops may be radial or ulnar, depending on the side of the hand the tail points towards. Whorls may also have sub-group classifications including plain whorls, accidental whorls, double loop whorls, and central pocket loop whorls.
As used herein, suitable biometric information useful for interrogation and authentication of individual identify may include profiles from the following standards and specifications: International Committee on Information Technology Standards M1 (biometrics section of national organization that produces technical standards for the American National Standards Institute (INCITS M1) and International Standards Organization (ISO) SC37 Minutiae-Based Fingerprint Data Interchange Format: International Standards Organization JTC1 SC17 WG3; ANSI/INCITS 378-2004, ANSI/INCITS 385-2004; BioAPI: ANSI/INCITS 358-2002: CBEFF: ANSI X9.84-2002: and X.509 Attribute Certificate.
As used herein, communication element may include one of an active magnetic strip, a contactless radio frequency unit, and an authenticating processor (e.g. chip). The magnetic strip may contain unique user-associated data. In certain embodiments, the magnetic strip may be activated after initial authentication of user identity so the unique user-associated data encoded on the strip may become accessible to the processor.
As used herein, authentication processor may include a chip or logic processor configured to acquire, store, verify, analyze, interrogate, or authenticate unique user data and/or biometric information profiles. It is understood by those known in the art that instructions for authentication methods and device embodiments may be stored on a non-volatile programmable memory and executed by a processor. Non-volatile programmable memory is configured to be an application memory device, and may store information such as the primary account number, current balance information, and/or user biometric profiles. Examples of non-volatile programmable memory include, but not limited to: a magnetic stripe, flash memory, Electrically Erasable Programmable Read-Only Memory. (EEPROM), or any other non-volatile computer memory or storage known in the art. The processor and the non-volatile programmable memory may be coupled to one another through an internal bus system. Data can be interchanged between the biometric sensors, the processor, and the non-volatile programmable memory.
As used herein, biometric sensor may be configured to recognize directionality and orientation of the fingerprint profile (e.g. right or left thumb). Additionally, the biometric sensor may be configured to accommodate various readers' geometry at the points of transaction (POT). Exemplary biometric detector or sensor may include temperature (e.g. heat) sensors; optical sensors (e.g. optical properties, images), capacitive sensors; solid-state sensors (e.g. electrical resistance); pulse sensors, blood pressure sensors, pressure sensor (e.g. differential pressure between the ridges and valleys of the papillary lines, ultrasonic sensors, light sensors; and/or movement detectors.
Referring to
Referring to
In addition to the magnetic strip 200, a hologram 204 is provided at the back of the card 100 to allow a merchant to visually identify if the card 100 has been officially produced by the issuing institution. A security code feature 208 is also provided at the back of the card 104 for further identification purposes if needed. The card 100 is also provided with a signature block 210 upon which a bearer provides a signature for visual authentication purposes if required.
The back surface 202 may also be configured with a biometric information input sensor/detector 106 positioned on the card 100. The biometric information input sensor/detector 106 is connected to (or may be a component of) the biometric verification system 209 and/or the communication element (e.g. active magnetic strip) 200. The card 100 may also have a contactless radio frequency unit 216 and a logic processor 218 on the card 100.
Referring to
The processor 218 may also be configured to permanently lock the active magnetic strip 200 when a predetermined number of incorrect biometric information entries are provided to the biometric information verification system 209. In the illustrated embodiment, the processor 218 is configured to allow three (3) incorrect biometric information entries before permanently locking the active magnetic strip 200.
The power source 302 may also be charged through use of the biometric sensor as they are compressed by the bearer. Alternative power source configurations are also possible. In all situations, the power source 302 is configured to provide electrical power to the biometric information verification system 209 in a sufficient amount to allow the processor 218 and the biometric information verification system 209 to function for authentication purposes. Alternative configurations of the present invention are also provided wherein instead of an active magnetic strip 200, a contactless radio frequency unit 216 may be activated. In a still further alternative configuration, the processor 218 may itself provide an authorization code.
The power source 302 may be positioned on any layer of the card 100 as well as any position along the body of the card 100. The biometric input sensor/detector 106 may also be configured underneath the front surface 106, as a non-limiting example.
The biometric input sensor/detector 106 may be positioned along any section of the card 100 as a surface feature of the card 100 or may be internally positioned within the card 100. In an exemplary embodiment of the invention, when the sensor pad is located within the body of the card 100, a plastic surface may be placed over the top of biometric input sensor/detector from abrasion during use of the card 100. The biometric input sensor/detector 106 is also connected to the processor 218 such that when activated, the system 209 may accept and verify biometric information related to a bearer of the card 100. To this end, the biometric input sensor/detector 106 may be connected to a separate processor 218, or may have the processor placed within the biometric verification system 209 or input sensor/detector apparatus that will verify both pad information and biometric information.
Referring to
The pre-stored biometric information may be entered by the issuer of the card 100 or may be input by the user during the initial receipt of the card 100 during activation.
During the interrogation/verification process (e.g. when the device is not fully activated or reached a permanent inactivation), the method provides for maintaining an inactive status 410 for one of the active magnetic strip, the contactless radio frequency unit 216 and the processor 218 on the card 100 when the biometric information and the pre-stored biometric information do not match and requiring the user to re-enter the information. If the strip is activated 414 upon verification, then the strip is deactivated after completion of the transaction or after a pre-defined amount of time has elapsed after activation. The amount/time of activation may also be related to the power requirements for card functions so that the power supply is not overburdened during a transaction. The method 400 may be completed again after deactivation of the active strip has been completed. In addition, an additional security measure may be used in the invention, where the issuing entity may have a master lock combination that may be input into the card 100 to allow further attempts at strip activation, or may allow for instantaneous strip activation as necessary, thereby minimizing the amount of replacement cards that would be necessary if permanent deactivation occurs. The method may also provide for a master unlocking code for the card to re-activate functions of the card after at least one of the input biometric information and the pre-stored biometric information do not match after a predefined number of attempts. By providing for the master unlocking code, an issuer may allow reactivation of the card 100 that has been locked due to inappropriate biometric or numeric data input.
Embodiments of the invention provide an access control processor card configured to allow for both power generation on the card 100 and verification of the authenticity of a user. The authentication of the bearer/user of the access control card 100 that is based on a verification scheme using biometric information profile has a higher fidelity compared to that of conventional card transactions. This authentication process is difficult to replicate, and therefore fraud is prevented or substantially reduced. The card 100 has a configuration that will also allow for the user to store biometric information to allow authentication of the card 100. Embodiments of the invention also provide a card 100 that will allow for authentication of the user, while being cost efficient in production. The card 100 presented above also has the capability of being used with conventional card reading apparatus, systems and networks.
Embodiments of the invention also provide a card 100 that will have a configuration that will allow for the power generated on the card 100 to be stored for use by components/circuitry on the card 100.
In the foregoing specification, the invention has been described with reference to specific exemplary embodiments thereof. It will, however, be evident that various modifications and changes may be made thereunto without departing from the broader spirit and scope of the invention as set forth in the appended claims. The specification and drawings are accordingly to be regarded in an illustrative rather than in a restrictive sense.
Number | Name | Date | Kind |
---|---|---|---|
4253086 | Szwarcbier | Feb 1981 | A |
4582985 | Lofberg | Apr 1986 | A |
5072103 | Nara | Dec 1991 | A |
5546471 | Merjanian | Aug 1996 | A |
5613012 | Hoffman et al. | Mar 1997 | A |
5615277 | Hoffman | Mar 1997 | A |
5623552 | Lane | Apr 1997 | A |
5737439 | Lapsley et al. | Apr 1998 | A |
5764789 | Pare, Jr. et al. | Jun 1998 | A |
5802199 | Pare, Jr. et al. | Sep 1998 | A |
5805719 | Pare, Jr. et al. | Sep 1998 | A |
5838812 | Pare, Jr. et al. | Nov 1998 | A |
5870723 | Pare, Jr. et al. | Feb 1999 | A |
5870895 | Fally | Feb 1999 | A |
5982914 | Lee et al. | Nov 1999 | A |
6012039 | Hoffman et al. | Jan 2000 | A |
D425873 | Anderson et al. | May 2000 | S |
6131464 | Pare, Jr. et al. | Oct 2000 | A |
6154879 | Pare, Jr. et al. | Nov 2000 | A |
6182892 | Angelo et al. | Feb 2001 | B1 |
6185318 | Jain et al. | Feb 2001 | B1 |
6192142 | Pare, Jr. et al. | Feb 2001 | B1 |
6209104 | Jalili | Mar 2001 | B1 |
6230148 | Pare, Jr. et al. | May 2001 | B1 |
6269348 | Pare, Jr. et al. | Jul 2001 | B1 |
6366682 | Hoffman et al. | Apr 2002 | B1 |
6391198 | Porter et al. | May 2002 | B1 |
6397198 | Hoffman et al. | May 2002 | B1 |
6411728 | Lee et al. | Jun 2002 | B1 |
6581042 | Pare, Jr. et al. | Jun 2003 | B2 |
6591002 | Lee et al. | Jul 2003 | B2 |
6594376 | Hoffman et al. | Jul 2003 | B2 |
6662166 | Pare, Jr. et al. | Dec 2003 | B2 |
6728397 | McNeal | Apr 2004 | B2 |
6879966 | Lapsley et al. | Apr 2005 | B1 |
6920435 | Hoffman et al. | Jul 2005 | B2 |
6950810 | Lapsley et al. | Sep 2005 | B2 |
6957770 | Robinson | Oct 2005 | B1 |
6980670 | Hoffman et al. | Dec 2005 | B1 |
6985608 | Hoffman et al. | Jan 2006 | B2 |
7004389 | Robinson et al. | Feb 2006 | B1 |
7082415 | Robinson et al. | Jul 2006 | B1 |
7152045 | Hoffman | Dec 2006 | B2 |
7185807 | Robinson et al. | Mar 2007 | B1 |
7248719 | Hoffman et al. | Jul 2007 | B2 |
7269737 | Robinson | Sep 2007 | B2 |
7272247 | Hamid | Sep 2007 | B2 |
7308584 | Himmel et al. | Dec 2007 | B2 |
7319987 | Hoffman et al. | Jan 2008 | B1 |
7334735 | Antebi | Feb 2008 | B1 |
7367049 | Robinson et al. | Apr 2008 | B1 |
7387240 | Ziegler | Jun 2008 | B2 |
7389269 | Robinson et al. | Jun 2008 | B1 |
7437330 | Robinson et al. | Oct 2008 | B1 |
7464059 | Robinson et al. | Dec 2008 | B1 |
7483862 | Robinson et al. | Jan 2009 | B1 |
7497372 | Robinson et al. | Mar 2009 | B1 |
7502761 | Siegal et al. | Mar 2009 | B2 |
7512567 | Bemmel et al. | Mar 2009 | B2 |
7526652 | Ziegler | Apr 2009 | B2 |
7533066 | Robinson et al. | May 2009 | B1 |
7533809 | Robinson et al. | May 2009 | B1 |
7536352 | Lapsley et al. | May 2009 | B2 |
7542590 | Robinson et al. | Jun 2009 | B1 |
7543156 | Campisi | Jun 2009 | B2 |
7545621 | Haddad | Jun 2009 | B2 |
7558406 | Robinson et al. | Jul 2009 | B1 |
7558407 | Hoffman et al. | Jul 2009 | B2 |
7565329 | Lapsley et al. | Jul 2009 | B2 |
7606401 | Hoffman et al. | Oct 2009 | B2 |
7613659 | Hoffman et al. | Nov 2009 | B1 |
7620605 | Hoffman et al. | Nov 2009 | B2 |
7624073 | Robinson et al. | Nov 2009 | B1 |
7631193 | Hoffman | Dec 2009 | B1 |
7698567 | Hoffman | Apr 2010 | B2 |
7747528 | Robinson et al. | Jun 2010 | B1 |
7765164 | Robinson et al. | Jul 2010 | B1 |
7769695 | Robinson et al. | Aug 2010 | B2 |
7778933 | Robinson et al. | Aug 2010 | B2 |
7831468 | Conte et al. | Nov 2010 | B1 |
7836485 | Robinson et al. | Nov 2010 | B2 |
7882032 | Hoffman | Feb 2011 | B1 |
7970678 | Lapsley | Jun 2011 | B2 |
8015118 | Robinson et al. | Sep 2011 | B1 |
8260716 | Hoffman et al. | Sep 2012 | B2 |
8370218 | Robinson et al. | Feb 2013 | B2 |
20020090117 | Kramer | Jul 2002 | A1 |
20020153424 | Li | Oct 2002 | A1 |
20020188842 | Willeby | Dec 2002 | A1 |
20020188872 | Willeby | Dec 2002 | A1 |
20040044739 | Ziegler | Mar 2004 | A1 |
20040073510 | Logal et al. | Apr 2004 | A1 |
20040129787 | Saito et al. | Jul 2004 | A1 |
20040177045 | Brown | Sep 2004 | A1 |
20040215615 | Larsson et al. | Oct 2004 | A1 |
20050035200 | Hendrick | Feb 2005 | A1 |
20050085931 | Willeby | Apr 2005 | A1 |
20050110103 | Setlak | May 2005 | A1 |
20050153779 | Ziegler | Jul 2005 | A1 |
20050194452 | Nordentoft et al. | Sep 2005 | A1 |
20050207624 | Ehlers et al. | Sep 2005 | A1 |
20050229007 | Bolle et al. | Oct 2005 | A1 |
20050240778 | Saito | Oct 2005 | A1 |
20050253683 | Lowe | Nov 2005 | A1 |
20050269402 | Spitzer et al. | Dec 2005 | A1 |
20050278222 | Nortrup | Dec 2005 | A1 |
20060032908 | Sines | Feb 2006 | A1 |
20060106734 | Hoffman et al. | May 2006 | A1 |
20060111977 | Hawkins | May 2006 | A1 |
20060113381 | Hochstein et al. | Jun 2006 | A1 |
20060123465 | Ziegler | Jun 2006 | A1 |
20060136332 | Ziegler | Jun 2006 | A1 |
20060170530 | Nwosu et al. | Aug 2006 | A1 |
20060213970 | Trajkovic et al. | Sep 2006 | A1 |
20060265602 | Robinson | Nov 2006 | A1 |
20070131759 | Cox | Jun 2007 | A1 |
20070162337 | Hawkins | Jul 2007 | A1 |
20070189581 | Nordentoft et al. | Aug 2007 | A1 |
20070220272 | Campisi et al. | Sep 2007 | A1 |
20070282677 | Carpenter | Dec 2007 | A1 |
20070288319 | Robinson et al. | Dec 2007 | A1 |
20070288320 | Cooper et al. | Dec 2007 | A1 |
20080019578 | Saito et al. | Jan 2008 | A1 |
20080097851 | Bemmel et al. | Apr 2008 | A1 |
20080147481 | Robinson et al. | Jun 2008 | A1 |
20080223925 | Saito et al. | Sep 2008 | A1 |
20080271116 | Robinson et al. | Oct 2008 | A1 |
20090066239 | Yabunouchi | Mar 2009 | A1 |
20090070270 | Robinson et al. | Mar 2009 | A1 |
20090074256 | Haddad | Mar 2009 | A1 |
20090099944 | Robinson | Apr 2009 | A1 |
20090138366 | Bemmel | May 2009 | A1 |
20090177587 | Siegal | Jul 2009 | A1 |
20090228362 | Lapsley | Sep 2009 | A1 |
Number | Date | Country |
---|---|---|
750154 | Jul 2002 | AU |
10-2001-0054151 | Jul 2001 | KR |
10-2001-0069593 | Jul 2001 | KR |
10-2004-0036850 | May 2004 | KR |
WO 9636934 | Nov 1996 | WO |
WO 9809227 | Mar 1998 | WO |
WO 9815924 | Apr 1998 | WO |
WO 9841947 | Sep 1998 | WO |
WO 9931621 | Jun 1999 | WO |
WO 0026849 | May 2000 | WO |
WO 0045247 | Aug 2000 | WO |
WO 0045320 | Aug 2000 | WO |
WO 0046710 | Aug 2000 | WO |
WO 0046737 | Aug 2000 | WO |
WO 0049561 | Aug 2000 | WO |
WO 0067187 | Nov 2000 | WO |
WO 0106440 | Jan 2001 | WO |
WO 0120531 | Mar 2001 | WO |
WO 0214984 | Feb 2002 | WO |
WO 2007092715 | Aug 2007 | WO |
WO 2008002979 | Jan 2008 | WO |
Entry |
---|
International Search Report for PCT/US2008/086414 (Filed Nov. 12, 2008); Visa U.S.A. Inc. |
International Preliminary Report on Patentability issued Jun. 15, 2010 with Written Opinion. |
Office Action mailed on Aug. 3, 2010 in related U.S. Appl. No. 12/001,499; 9 pages. |
Office Action mailed on Jan. 24, 2011 in related U.S. Appl. No. 12/001,499; 21 pages. |
International Search Report mailed on Oct. 1, 2009 in PCT/US2008/086404; 9 pages. |
U.S. Appl. No. 10/678,646, filed Oct. 6, 2003; Robinson et al. (31 pages). |
Non-Final Office Action for U.S. Appl. No. 12/001,449, dated Jul. 11, 2011, 16 pages. |
Final Office Action for U.S. Appl. No. 12/001,449, dated Oct. 26, 2011, 16 pages. |
Non-Final Office Action for U.S. Appl. No. 12/001,449, dated Jul. 23, 2012, 20 pages. |
Final Office Action for U.S. Appl. No. 12/001,449, dated Feb. 4, 2013, 12 pages. |
Number | Date | Country | |
---|---|---|---|
20090150994 A1 | Jun 2009 | US |