Embodiments disclosed herein relate to biometric data which may be used to authenticate and identify users of various electronic devices and, more particularly, to various biometric data which may be communicated from a first secure electronic device to a second secure electronic device in to allow an identified user to access the second secure electronic device.
Biometric identification or authentication may be used in computers and other electronic devices as a form of identification and access control. Biometric identifiers are distinctive, measurable physiological characteristics related to the configuration or characteristics of the body that can be used to identify individuals. Example biometric identifiers include, but are not limited to, a fingerprint, face recognition, DNA, a palm print, hand geometry, iris recognition, retina recognition, and scent. A biometric system may perform an identification comparison against a biometric database in an attempt to establish the identity of an individual. The system will identify the individual by comparing a biometric sample such as a fingerprint to stored fingerprint samples in the database. Biometrics may be used in place of, or in conjunction with, other methods of personal recognition such as passwords, PINs or keys.
Fingerprint recognition features may be available on some portable electronic devices, such as smartphones, thereby allowing users to unlock their phone, as well as to make purchases by using fingerprints stored on their device. The use of biometrics may supplement or displace the use of a password to access a portable electronic device. A biometric sensor may, for example, be built into the home or start button of a smartphone (or any other input device or region) to sense or detect a user's fingerprint and grant or deny access based on that fingerprint.
Disclosed embodiments use biometric device pairing to allow biometric identification-equipped devices to be used for pairing with other electronic devices and/or for secure access to the other electronic devices, including non-biometric authentication enabled devices. The biometric identification-equipped device (or simply, “biometric equipped device,” “biometric enabled device” or “biometric device”) may establish a secure connection with a second, different device. The connection is based at least in part on the acquisition and verification of biometric data. Thereafter, the biometric device may access the second device to retrieve data, configure the second device, transmit data, or otherwise interact.
In certain embodiments, a one-time initialization process exchanges credentials between the biometric equipped devices and the non-equipped devices. Once the credentials are exchanged between the devices, the biometric enabled device establishes a secure channel from the credentialed device. The biometric enabled device receives a user's biometric data, verifies the biometric data, and sends a message or signal to the non-enabled device to unlock that device. A password or other authorization is thus not needed to access the non-enabled device and the user may thus access that device securely and conveniently after authentication by the biometric enabled device. The non-enabled device may or may not include biometrics in some embodiments. That is, both the first and subsequent device(s) may be biometrically enabled in some embodiments.
In one embodiment, the biometric enabled device is a smartphone with a fingerprint sensor to permit a user to unlock the smartphone and, in turn, unlock one or more other devices such as a laptop computer which may or may not be biometric enabled. Because accessing one electronic device of a user allows access to one or more other electronic devices of the user without password or other entry protocol, this system is more convenient, is easier for a user, and contributes to the overall user satisfaction. The biometric pairing system thus allows accessibility to multiple devices with one security verification between the various devices.
In one aspect, an electronic device includes a first biometric sensor and a processing device operably connected to the first biometric sensor. The processing device may be configured to receive biometric data from the first biometric sensor and determine if the biometric data matches a biometric template. At least one transmitter device is operably connected to the processing device. The at least one transmitter device is operative to pair the electronic device to a second electronic device across a network and to transmit an authorization message to the second electronic device based on a match between the biometric data and the biometric template. The authorization message permits the electronic device to automatically access the second electronic device.
In another aspect, a method for a controller device to pair with an accessory device includes receiving, by the controller device, biometric data associated with a user of the controller device and establishing a secure connection between the controller device and the accessory device. The controller device can generate an asymmetric key pair based on the biometric data to produce a first public key. The controller device and the accessory device may then exchange public keys. The controller device transmits the first public key to the accessory device, and receives a second public key associated with the accessory device.
In yet another aspect, a method for a controller device to access information on an accessory device paired with the controller device can include a controller device receiving first biometric data and generating an authorization message based on a match between the first biometric data and a first biometric template. The authorization message is then communicated from the controller device to the accessory electronic device. The accessory device may be unlocked based on the authorization message. Based on the authorization message, the controller device can access the information on the accessory device.
The disclosure will be readily understood by the following detailed description in conjunction with the accompanying drawings, wherein like reference numerals designate like structural elements, and in which:
The present disclosure recognizes that personal information data, including biometric data, in the present technology, can be used to the benefit of users. For example, the use of biometric authentication data can be used for convenient access to device features without the use of passwords. In other examples, user biometric data is collected for providing users with feedback about their health or fitness levels. Further, other uses for personal information data, including biometric data that benefit the user are also contemplated by the present disclosure.
The present disclosure further contemplates that the entities responsible for the collection, analysis, disclosure, transfer, storage, or other use of such personal information data will comply with well-established privacy policies and/or privacy practices. In particular, such entities should implement and consistently use privacy policies and practices that are generally recognized as meeting or exceeding industry or governmental requirements for maintaining personal information data private and secure, including the use of data encryption and security methods that meets or exceeds industry or government standards. For example, personal information from users should be collected for legitimate and reasonable uses of the entity and not shared or sold outside of those legitimate uses. Further, such collection should occur only after receiving the informed consent of the users. Additionally, such entities would take any needed steps for safeguarding and securing access to such personal information data and ensuring that others with access to the personal information data adhere to their privacy policies and procedures. Further, such entities can subject themselves to evaluation by third parties to certify their adherence to widely accepted privacy policies and practices.
Despite the foregoing, the present disclosure also contemplates embodiments in which users selectively block the use of, or access to, personal information data, including biometric data. That is, the present disclosure contemplates that hardware and/or software elements can be provided to prevent or block access to such personal information data. For example, in the case of biometric authentication methods, the present technology can be configured to allow users to optionally bypass biometric authentication steps by providing secure information such as passwords, personal identification numbers (PINS), touch gestures, or other authentication methods, alone or in combination, known to those of skill in the art. In another example, users can select to remove, disable, or restrict access to certain health-related applications collecting users' personal health or fitness data.
Reference will now be made in detail to representative embodiments illustrated in the accompanying drawings and in particular with reference to
Pairing is a process used in computer networking to set up an initial link between computing devices in order to allow communications between them. In some embodiments, user authentication (e.g., authentication of user based on biometric data) on one device may be communicated wirelessly to another device to allow that user to access the second device without entering a password or other authentication indicia.
Generally, embodiments described herein may pair two or more devices such that a person possessing one of the devices (a “controller device”) may access data, applications, and the like from the other devices after authorization (e.g., authentication of user based on biometric data) of the controller device is complete. The authorization may be performed wirelessly in many cases, and may last for a set period of time or until some condition is reached. As one non-limiting example, authorization may last until a network or other wireless connection between the paired devices is lost. This may permit a person having the controller device on his or her person, or nearby, to physically access other devices without forcing that person to enter security credentials. As another option, this may allow a person to access data from paired devices remotely through the controller device.
Generally, the authorization may occur across a secure, encrypted communication channel. As part of the authorization, the controller device may transmit an acknowledgement or indication that a user or other person associated with the controller device has provided biometric data to the controller device, and that the controller device has recognized the person based on the biometric data. Thus, the controller device may serve as a gateway for a user to access the other devices; in such embodiments it is not necessary that all devices have the capability or physical structure to access, receive or interpret biometric data. Nonetheless, the security associated with biometric data acquisition and recognition may be extended to all paired devices insofar as they may rely on the controller device to gather biometric data and recognize an authorized, enrolled person from such data.
In some embodiments, a low power transmitter device communicates with the controller device and the paired device(s). The low power transmitter device can utilize a wireless personal area network radio wavelength communication technology designed to be used over short distances from fixed and mobile devices. The low power transmitter device can be used to identify device locations in indoor venues where global positioning system (GPS) technologies are not as effective due to interference with overhead satellite communications by the structures defining the indoor venues. The low power transmitter device may also be used to provide communications between the electronic devices over these same, relatively short, distances.
In the disclosed embodiments, the biometric data is described as fingerprint data or a fingerprint(s). However, in some embodiments the biometric data can be other types of biometric data and/or data that is derived from (or based on) the biometric data. Example biometric data includes, but is not limited to, a user's voice, a palm print, veins, face, iris, and/or retina. Additionally or alternatively, the data that is derived from, or based on, a user's biometric data can include a histogram, a numerical score, a code, a key, a message, and so on.
Referring to
Because this biometric access feature provides convenient and secure access to a device, a portable electronic device may also include capability to allow a user to utilize the same access to certain other of the user's electronic devices such a laptop computer, a tablet computer, a wearable computing device (e.g., smart watch or health assistant), or another portable electronic device which may or may not be biometric access enabled.
Referring to
A biometric sensor 10 is the interface between the biometric sensing system and a user's biometric data. As described earlier, the biometric sensor 10 can be placed on, in, or below the input element 13 of the electronic device 11. In some embodiments, the biometric sensor 10 may be located in portions of the electronic device 11 other than adjacent to input element 13.
The biometric sensor 10 acquires biometric data such as, for example, a fingerprint 14 of a user. While the illustrated biometric sensor 10 is generally an image acquisition system, in other embodiments the biometric sensor can be a voiceprint recognition device, a finger length sensor, a retinal scanner, or other biometric sensor according to the desired user characteristics to be sensed. For example, in some embodiments, the biometric sensor 10 can be a microphone on the electronic device 11 which may identify a voiceprint of a user to be used for biometric access.
Pre-processing of the sensed biometric data may be accomplished by a pre-processing component 17, which may be operative to do one or more of: remove artifacts from the sensed image; enhance the image (for example by removing background noise); and normalize the image data. Data is then transmitted to feature extractor 18, which may identify certain features of the captured image, such as the whorls and lines in a fingerprint.
In some embodiments, a vector of numbers or an image with particular properties representing identifying features is used to create a template in a template generator 19. A template is a synthesis of the relevant identifying characteristics and is extracted from source images or other biometric data. Elements of the biometric measurement that are not used in the comparison algorithm typically are discarded in the template to reduce the data requirements. In the enrollment process, for a first time user, the template generated in the template generator 19 may be stored in a storage device 21 for future use to allow that user to become a permitted user and access the electronic device 11.
In the verification or test process, the biometric data (e.g., fingerprint) sensed by the biometric sensor 10 is compared against stored templates in the storage device 21 and a matching identity determined by comparative matching device 22 is sent to the electronic device 11 to verify the identity of the user. In some embodiments, multiple biometric templates may be enrolled and stored in the storage device 21. The storage device 21 can be configured as one or more memories, including, but not limited to, RAM, ROM, flash memory, and removable memory, or combinations thereof. The multiple biometric templates may be from the primary user or they may be from one or more individuals approved by the primary user to allow more than one user to be verified as an approved user and granted access to the electronic device 11. The user thus controls who may access the electronic device 11.
Although particular operations have been discussed and described for enrollment, template generation, testing and authorization, it should be appreciated that many other methods and systems for each such operation exist. Accordingly, the foregoing is intended to provide only one example of various biometric enrollment/sensing operations and is not intended to limit embodiments described herein.
The electronic device 11 may include a number of other electronic components, such as a processor 89 operative to generally control certain operations of the electronic device. Although not shown in
The first transmitter device 90 is operative to communicate wired or wirelessly with other devices. The first transmitter device 90 can send and receive data and communications to and from the other devices. Example transmitters include, but are not limited to, Wi-Fi, Bluetooth®, and near field communication. The second transmitter device 90 may be a low power transmitter device that is operative to transmit and receive data and communications (wired or wirelessly) associated with the biometric sensor 10 to other devices, thereby permitting the electronic device to access other electronic devices. Data transmission, wireless and/or wired communication, and other functions of the electronic device will be described in more detail later.
A user may choose to store multiple biometric templates in the biometric sensing system of
Referring to
Alternatively, in some embodiments it may be convenient to access multiple devices from one biometric-enabled device, even if the other devices also have biometric access capability. For example, in a situation where a user has a device, such as electronic device 11, and wishes to access another device, such as electronic device 24, it may enhance or facilitate the user's operation to access the second electronic device 24 and/or information 23 contained in the second electronic device 24 (e.g., a document) without entering any additional security verification into the second electronic device 24. The user may physically access, without additional security verification, the second electronic device 24 so long as the biometric-enabled first electronic device 11 is on the user's person or near the second electronic device 24, for example.
Referring to
An identification or other authorization message 16 may be transmitted (wired or wirelessly) across a network to the second electronic device 24 (or any other suitable electronic device). In some embodiments, a wireless transceiver device 26 may communicatively couple the first electronic device 11 (e.g., smartphone) to the second electronic device 24 (e.g., laptop computer). Any suitable wireless transceiver device may be used. Example wireless transceiver devices include, but are not limited to, beacons, repeaters, range extenders, and relay transmitters. The wireless transceiver device can employ any suitable communication protocol, such as Bluetooth® Low Energy. In some embodiments, the wireless transceiver 26 may be the low power transmitter device 91 in
Communicating the authorization message 16 from the first electronic device 11 to the second electronic device 24 generally permits the first electronic device 11 and/or its user to access the second electronic device 24 and some or all of the information 23 contained therein. It should be appreciated that certain embodiments may permit access to the second electronic device 24 only through or by the first electronic device 11. In other embodiments, the exchange of authorization messages or signals (as described in more detail below) may effectively unlock the second electronic device 24, thereby permitting access through conventional means such as the second electronic device's keyboard, mouse, or other input. The second electronic device 24 may remain unlocked or otherwise accessible as long as it is in communication with the first electronic device 11, or the second electronic device 24 may remain accessible only for a period of time after which another authorization operation may be necessary. The second electronic device 24 may further periodically look for the presence of the first electronic device 11. In some embodiments, if the first electronic device 11 is found, the time before which another authorization is requested may be extended.
For example, in some embodiments the first electronic device 11 and the second electronic device 24 can transmit data between functions, applications, operating software, and other software on one or both electronic devices after the second electronic device is unlocked based on the fingerprint. Additionally or alternatively, one electronic device (e.g., the first electronic device 11) can initiate an online purchase that is completed on the other device (e.g., the second electronic device 24). For example, an online purchase of an audio or video file can be initiated on the first electronic device 11. The payment information (e.g., credit card information) may be transmitted to the online store from the second electronic device 24 and/or the audio or video file can be downloaded to the second electronic device 24.
Similarly, one electronic device (e.g., the first electronic device 11) can initiate an operation that is completed or performed by the other device (e.g., the second electronic device 24) based on biometric data. For example, the second electronic device 24 can be used to initiate the capture of an image and the first electronic device 11 can then capture the image. Thereafter, in some embodiments the first electronic device 11 may transmit the captured image to the second electronic device 24. In another example, the first electronic device 11 can be used to initiate the sending of an email and the second electronic device 24 may then send the email.
In some embodiments, the first electronic device can utilize biometric data to pair with the second electronic device. Additionally or alternatively, the first electronic device 11 can set up or change the settings of the second electronic device. For example, based on biometric data, the first electronic device 11 can be used to change a network setting or a password on the second electronic device.
Referring again to
In other embodiments, various activities may be enabled by one or more stored biometric data. For example, a user may unlock the second electronic device 24 with a fingerprint while a retinal scan or other biometric data can be used to enable additional operations such as authorizing an online purchase. In other embodiments, various other actions, such as downloading information or documents online, may be enabled by a specific type of biometric data. As another example, stored biometric data could be used to enable access to remote storage of data, such as data stored in a cloud computing network.
As yet another example, accessing a user's bank account or banking online may require one or more particular types of biometric data to authorize that user and enable access. Continuing the example, sensing a user's fingerprint or other biometric data may be required to access that user's account and withdraw money from an automated teller machine. In other embodiments, enabling online purchases or use of a credit card could be authorized by sensing particular biometric data of the person on his or her portable electronic device and conveying that information to a paired device such as a vendor computer to authorize the transaction.
In order to accomplish the access and authentication activities described above with respect to
Referring to
In operation 29, a secure connection between the controller device and the accessory device is established. Once this secure connection has been established, the controller device uses the biometric information (e.g., sensed biometric data such as a fingerprint) to generate an encryption key in operation 31. In operation 32, the controller device and the accessory device exchange public keys over the secured connection established in operation 29. The controller device and the accessory device are now paired and the process of authorizing the user to securely access the accessory device will be described below with respect to
Once the controller device (e.g., first electronic device 11) and the accessory device (e.g., second electronic device 24) have been paired as described above with respect to
Referring to
In operation 41, the accessory device advertises its availability while the controller device scans for peripherals supporting the pairing function in operation 42. In some embodiments, the controller device discovers the accessory device through a wireless communications device (e.g., wireless transceiver device 26) using Bluetooth® Low Energy or another protocol. In operation 43, the controller device displays the electronic devices (including the accessory device) located within a predetermined distance. In one embodiment, the predetermined distance is a communication range, which can be approximately 2 meters.
Referring to
Referring to
If the identification is successful in operation 54, then a processor (e.g., processor 89) generates an asymmetric key pair and returns a public key to the controller device (operation 55). In one embodiment, the processor is a secure enclave processor, which is tamper-resistant processor capable of securely hosting code and data. If the biometric identification of operation 55 is not successful, the pairing of the accessory and controller devices does not occur and the process is terminated (operation 56).
The final operation in the example pairing process of
Once the controller and accessory devices have been paired, the controller device may be used to authorize operations on the accessory device. Referring to
Referring again to
If the public key of the controller device is found, the accessory device uses its secret key and the controller device's public key to generate a shared secret key in operation 68. At operation 69, the accessory device uses its long term secret key to sign the concatenation of its public key and the public key of the controller device.
The authorization process continues at operation 71 with the accessory device deriving a symmetric key from the shared secret key and encrypting a signature of the shared public keys. The accessory device then responds with its keys and encrypted signature at operation 72.
At operation 73, the controller device receives the response from operation 72, and at operation 74 searches for the public key of the accessory device and rejects it if not found after searching. In operation 75, the controller device uses its secret key and an ECDH public key to generate a shared secret key which may, in one embodiment, be an ECDH key. The controller device decrypts the signature from operation 72 and verifies the signature using the public key of the accessory device (operation 76).
The next operation in the authorization process is to have the controller device sign data using its long term secret key and biometric authorization. This process begins with the controller device verifying biometric data from the user in operation 35 (
The next operation in the authorization process is verification to the accessory device (operation 37 in
The final step in the authorization process (operation 38 in
Various encryption algorithms may be used in various embodiments disclosed herein. For example, for Elliptic-Curve Diffie-Hellman (ECDH encryption), the algorithm may be Curve25519. For signature generation and verification, the algorithm Ed25519 may be used. For hashing, the SHA-512 algorithm may be used. For key derivation, the HKDF-SHA-512 algorithm may be used. The encryption algorithm is preferable ChaCha20 and for message authentication, the Poly1305 algorithm may be used. Of course, other encryption algorithms may be used for any of these functions without departing from the scope of the disclosed embodiments.
The various operations shown in
Additionally, although embodiments have been described in conjunction with a smartphone and a laptop, other embodiments are not limited to these electronic devices. Any suitable electronic device can be the first electronic device and the second electronic device. As one example, the first electronic device may be a smartphone and the second electronic device a wearable computing device, such as a smart watch or a health assistant. Biometric data can be used to pair the smartphone and the wearable computing device. Additionally or alternatively, biometric data may be received to permit the smartphone to unlock the wearable computing device. Additionally or alternatively, biometric data may be used to allow the smartphone (e.g., the user of the smartphone) to access applications, data, and/or functions on the wearable computing device. In another example, the first electronic device may be a tablet computing device and the second electronic device a smartphone. In yet another example, the first electronic device may be a digital music player and the second electronic device a tablet computing device.
The foregoing description, for purposes of explanation, used specific nomenclature to provide a thorough understanding of the described embodiments. However, it will be apparent to one skilled in the art that the specific details are not required in order to practice the described embodiments. Thus, the foregoing descriptions of the specific embodiments described herein are presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the embodiments to the precise forms disclosed. It will be apparent to one of ordinary skill in the art that many modifications and variations are possible in view of the above teachings.
This application is a continuation of U.S. patent application Ser. No. 14/871,387, filed Sep. 30, 2015, entitled “Biometric Device Pairing,” which claims the benefit under 35 U.S.C. § 119(e) of U.S. Provisional Patent Application No. 62/057,709, filed Sep. 30, 2014, entitled “Biometric Device Pairing,” both of which are incorporated herein by reference in their entirety as if fully disclosed herein.
Number | Name | Date | Kind |
---|---|---|---|
6167517 | Gilchrist et al. | Dec 2000 | A |
6178506 | Quick, Jr. | Jan 2001 | B1 |
7378939 | Sengupta et al. | May 2008 | B2 |
7623659 | Huang et al. | Nov 2009 | B2 |
7865140 | Levien et al. | Jan 2011 | B2 |
7925022 | Jung et al. | Apr 2011 | B2 |
8027518 | Baker et al. | Sep 2011 | B2 |
8190129 | Ben Ayed | May 2012 | B2 |
8244211 | Clark | Aug 2012 | B2 |
8370640 | Adams et al. | Feb 2013 | B2 |
8433919 | Giobbi et al. | Apr 2013 | B2 |
8438647 | Jevans | May 2013 | B2 |
8467770 | Ben Ayed | Jun 2013 | B1 |
8473748 | Sampas | Jun 2013 | B2 |
8694784 | Lekies | Apr 2014 | B1 |
8850045 | Berg et al. | Sep 2014 | B2 |
8854966 | Fadell | Oct 2014 | B2 |
8994498 | Agrafioti et al. | Mar 2015 | B2 |
9032493 | Lortz et al. | May 2015 | B2 |
9158906 | Guajardo Merchan et al. | Oct 2015 | B2 |
9203819 | Fenton et al. | Dec 2015 | B2 |
9264897 | Ge et al. | Feb 2016 | B2 |
9270671 | Bonazzoli et al. | Feb 2016 | B2 |
9298905 | Giobbi | Mar 2016 | B1 |
9363108 | Bell et al. | Jun 2016 | B2 |
9407619 | Tunnell et al. | Aug 2016 | B2 |
9503894 | Shanmugam et al. | Nov 2016 | B2 |
9628273 | Alshammari | Apr 2017 | B2 |
20020056043 | Glass | May 2002 | A1 |
20020090912 | Cannon | Jul 2002 | A1 |
20040073795 | Jablon | Apr 2004 | A1 |
20060116107 | Hulvey | Jun 2006 | A1 |
20070050303 | Schroeder et al. | Mar 2007 | A1 |
20070106895 | Huang | May 2007 | A1 |
20070150415 | Bundy | Jun 2007 | A1 |
20070257104 | Owen | Nov 2007 | A1 |
20070260876 | Brown | Nov 2007 | A1 |
20080137859 | Jagadeesan | Jun 2008 | A1 |
20090228707 | Linsky | Sep 2009 | A1 |
20090287929 | Kolesnikov | Nov 2009 | A1 |
20100042841 | King | Feb 2010 | A1 |
20100138666 | Adams | Jun 2010 | A1 |
20110047384 | Jacobs | Feb 2011 | A1 |
20110106954 | Chatterjee et al. | May 2011 | A1 |
20110113485 | Little | May 2011 | A1 |
20110191837 | Guajardo Merchan | Aug 2011 | A1 |
20110314153 | Bathiche et al. | Dec 2011 | A1 |
20120082312 | Liu | Apr 2012 | A1 |
20120143707 | Jain | Jun 2012 | A1 |
20120159599 | Szoke | Jun 2012 | A1 |
20130036017 | Galloway | Feb 2013 | A1 |
20130179944 | Kozlay | Jul 2013 | A1 |
20130237190 | Smith | Sep 2013 | A1 |
20130298208 | Ayed | Nov 2013 | A1 |
20140046664 | Sarkar | Feb 2014 | A1 |
20140068725 | Zhang et al. | Mar 2014 | A1 |
20140068744 | Bran | Mar 2014 | A1 |
20140129843 | Shi et al. | May 2014 | A1 |
20140136720 | Bonazzoli | May 2014 | A1 |
20140181925 | Smith | Jun 2014 | A1 |
20140237256 | Ben Ayed | Aug 2014 | A1 |
20140325220 | Tunnell | Oct 2014 | A1 |
20150028996 | Agrafioti | Jan 2015 | A1 |
20150077224 | Pal | Mar 2015 | A1 |
20150089222 | White | Mar 2015 | A1 |
20150163221 | Bolin | Jun 2015 | A1 |
20150186636 | Tharappel | Jul 2015 | A1 |
20150188891 | Grange | Jul 2015 | A1 |
20150222517 | McLaughlin | Aug 2015 | A1 |
20150257004 | Shanmugam | Sep 2015 | A1 |
20150319149 | Alshammari | Nov 2015 | A1 |
20160094550 | Bradley et al. | Mar 2016 | A1 |
20160156636 | Tan | Jun 2016 | A1 |
20160182507 | Zhang et al. | Jun 2016 | A1 |
Number | Date | Country |
---|---|---|
1809792 | Jul 2006 | CN |
1918584 | Feb 2007 | CN |
101124769 | Feb 2008 | CN |
101208701 | Jun 2008 | CN |
101467204 | Jun 2009 | CN |
101933051 | Dec 2010 | CN |
101946472 | Jan 2011 | CN |
102255896 | Nov 2011 | CN |
102263643 | Nov 2011 | CN |
102292731 | Nov 2011 | CN |
103310142 | Sep 2013 | CN |
103890768 | Jun 2014 | CN |
103907328 | Jul 2014 | CN |
M415369 | Nov 2011 | TW |
WO 98012670 | Mar 1998 | WO |
WO 06128171 | Nov 2006 | WO |
Number | Date | Country | |
---|---|---|---|
20180205728 A1 | Jul 2018 | US |
Number | Date | Country | |
---|---|---|---|
62057709 | Sep 2014 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14871387 | Sep 2015 | US |
Child | 15855954 | US |