The present invention relates to a set-top box function that receives broadcast or multicast multimedia content and enables client-side protection of the multimedia content for non-real-time playback.
In a broadcast/multicast (one-to-many) video transport system, digital watermarking can most easily be accomplished at the source of the video broadcast. This approach delivers a common watermark to each termination or client receiving the broadcast or multicast video content. However, this common watermark provides no deterrent to the user against anonymous redistributions. This redistribution can occur through public Peer-to-Peer (P2P) networks, darknets, or postings to video sharing sites.
Client-side watermarking may be used to address this issue. More specifically, client-side watermarking may be used to watermark broadcast or multicast content with information clearly identifying the end user or client device. This watermark then serves to deter the end user from violating the copyright policy by illegally redistributing the video content. However, client-side watermarking requires substantial resources and, therefore, significantly increases the cost of the client device. As such, there is a need for a low cost system providing client-side protection of broadcast or multicast content.
The present invention relates to client-side protection of broadcast or multicast multimedia content for non-real-time playback. A set-top box function receives a request to record multimedia content and determines whether recording of the multimedia content is restricted. Upon receiving the multimedia content, the set-top box decrypts the multimedia content, if necessary, for real-time playback. If recording of the multimedia content is restricted, the set-top box re-encrypts the multimedia content and generates a packaged file including the re-encrypted multimedia content and one or more of a content identifier, a set-top identifier, a network reference to a copyright policy server, and a record policy of the multimedia content. The packaged file is either stored locally or transferred to remote storage. A remote system having access to the packaged file obtains the packaged file and enforces a copyright policy of the multimedia content before releasing the multimedia content for non-real-time playback. For example, the copyright policy may require that the multimedia content be watermarked with a content identifier, a set-top identifier, and/or user information identifying an associated user, that a desired Digital Rights Management (DRM) policy be enforced, that the user purchase the multimedia content, or that the user pay a fee for non-real-time access to the multimedia content.
Those skilled in the art will appreciate the scope of the present invention and realize additional aspects thereof after reading the following detailed description of the preferred embodiments in association with the accompanying drawing figures.
The accompanying drawing figures incorporated in and forming a part of this specification illustrate several aspects of the invention, and together with the description serve to explain the principles of the invention.
The embodiments set forth below represent the necessary information to enable those skilled in the art to practice the invention and illustrate the best mode of practicing the invention. Upon reading the following description in light of the accompanying drawing figures, those skilled in the art will understand the concepts of the invention and will recognize applications of these concepts not particularly addressed herein. It should be understood that these concepts and applications fall within the scope of the disclosure and the accompanying claims.
The set-top box function 12 then decrypts and optionally decompresses the multimedia content from the content server 14 and provides the decrypted, decompressed multimedia content to the playback device 16 for real-time playback. The playback device 16 may be, for example, a High Definition Multimedia Interface (HDMI)/High-bandwidth Digital Content Protection (HDCP) compliant television or the like. Note that while the discussion herein focuses on HDMI/HDCP as the preferred embodiment, the present invention is not limited thereto. The present invention is equally applicable to any digital multimedia output interface and associated Digital Rights Management (DRM) scheme. In addition, as discussed below in detail, if recording of the multimedia content is restricted, the set-top box function 12 re-encrypts the decrypted multimedia content using an encryption key obtained from the license server 18 and generates a packaged file including the re-encrypted multimedia content and one or more of a content identifier (ID) identifying the multimedia content, a set-top ID identifying the set-top box function 12, a Uniform Resource Locator (URL) or other reference to the copyright policy server 24, and a record policy for the multimedia content obtained from the license server 18. The set-top box function 12 then stores the packaged file either locally where the remote system 22 has access to the packaged file or remotely in the remote storage 20 associated with the remote system 22.
The remote system 22 may be a personal computer, multimedia center, Digital Video Recorder (DVR), portable media device, or the like connected to the set-top box function 12 via, for example, a Local Area Network (LAN). For example, the remote system 22 may be a personal computer connected to the set-top box function 12 via a LAN in an associated user's home. Using the URL of the copyright policy server 24, the remote system 22 then interacts with the copyright policy server 24 to obtain and enforce a copyright policy of the multimedia content. Note that the copyright policy server 24 is more generally referred to herein as a rights policy server. Likewise, the copyright policy is more generally referred to herein as a rights policy. The copyright policy for the multimedia content may be defined by the owner of the multimedia content, a broadcaster of the multimedia content, or the like. As discussed below, the manner in which the copyright policy is enforced depends on the details of the copyright policy. The copyright policy may require client-side watermarking of the multimedia content with the set-top ID of the set-top box function 12, the content ID of the multimedia content, and/or user specific information. As another example, the copyright policy may require that a desired Digital Rights Management (DRM) policy be enforced.
The present invention enables enforcement of a copyright policy for recorded multimedia content while keeping the set-top box function 12 relatively low-cost. More specifically, the set-top box function 12 generates a packaged file including the re-encrypted multimedia content and makes the packaged file accessible to the remote system 22. The remote system 22, rather than the set-top box function 12, then enforces the copyright policy by, for example, watermarking the multimedia content before releasing the multimedia content to the user in non-real-time. As such, client-side protection may be enforced by the remote system 22, which may be the user's personal computer, rather than the set-top box function 12. As a result, the cost of the set-top box function 12 is substantially reduced.
The set-top box function 12 is preferably a set-top box such as a digital cable television set-top box or an IPTV set-top box, or a sub-system of a set-top box such as a digital cable television or IPTV decoder. However, the present invention is not limited thereto. The set-top box function 12 may alternatively be a hardware and/or software function stored on a personal computer or the like.
In this embodiment, the set-top box function 12 includes a network interface (NIC) 26 for receiving the multimedia content from the content server 14. The network interface 26 may be a network interface card, digital television tuner, or the like enabling the set-top box function 12 to either tune to a desired broadcast channel or subscribe to a desired multicast channel. In this example, the multimedia content from the content server 14 is encrypted and compressed, or encoded, according to the MPEG2 standard, the MPEG4 standard, the H.264 standard, or some other standardized or proprietary compression technique.
A decryption function 28 operates to decrypt the multimedia content using a known key. Note that the key may be obtained from the content server 14 or an associated authentication system. A decompression function 30 decompresses the decrypted multimedia content. The multimedia content may then be provided to the playback device 16 for real-time playback via a secure digital interface, which in this example is an HDMI/HDCP interface 32. Again, note that while the discussion herein focuses on HDMI/HDCP as the preferred embodiment, the present invention is not limited thereto. The present invention is equally applicable to any digital multimedia output interface and associated Digital Rights Management (DRM) scheme. The HDMI/HDCP interface 32 ensures that the playback device 16 is an HDCP complaint device before providing the decrypted, decompressed multimedia content to the playback device 16 in order to prevent the decrypted, decompressed multimedia content from being recorded by an unauthorized device such as a non-complaint DVD recorder, personal computer, or DVR.
According to the present invention, when the multimedia content is desired to be recorded, an operating system 34, or control system, of the set-top box function 12 determines whether recording of the multimedia content is restricted. For example, if the multimedia content desired to be recorded is an episode of “The Office,” the operating system 34 determines whether recording of the episode or recording of the series “The Office” is restricted. The operating system 34 may determine whether recording is restricted by, for example, examining a broadcast flag within the multimedia content or sending a request to the license server 18. Alternatively, metadata describing the multimedia content such as the metadata included within an Electronic Programming Guide (EPG) may include information identifying whether recording is restricted.
If recording is restricted, the operating system 34 sends a request to the license server 18. The request may include the content ID of the multimedia content and a set-top ID 36 of the set-top box function 12. The content ID may be some identifier of the multimedia content provided by the content server 14. For example, the content ID may include information describing the multimedia content such as the title of the multimedia content obtained from the EPG based on clock information from a Real Time Clock (RTC) 38. The set-top ID 36 may be an identifier such as, for example, a serial number of the set-top box function 12, and may be used by the license server 18 to determine whether the set-top box function 12 is permitted to record the multimedia content for non-real-time playback in the manner described below.
In response to the request, the license server 18 returns an encryption key to be used to re-encrypt the multimedia content and optionally the URL of the copyright policy server 24 and a record policy for the multimedia content. The encryption key may be, for example, unique to the set-top box function 12, unique to the multimedia content, or unique to combination of the set-top box function 12 and the multimedia content. As discussed below, the URL of the copyright policy server 24 may later be used by the remote system 22 to contact the copyright policy server 24. The record policy may include advance information regarding the steps that will be necessary to obtain non-real-time access to the multimedia content. For example, the record policy may include information stating that the user will be required to purchase the multimedia content or pay a fee before non-real-time access is permitted, information indicating that client-side watermarking will be required, or information describing a DRM policy for the multimedia content.
An encryption and file packaging function 40 re-encrypts the multimedia content using the encryption key obtained from the license server 18 and generates the packaged file including the re-encrypted multimedia content. The packaged multimedia file also includes one or more of the content ID, the set-top ID 36, the URL of the copyright policy server 24, and the record policy for the multimedia content. In one embodiment, the packaged multimedia file is stored in local storage 42 and may be thereafter accessed by the remote system 22. The local storage 42 may be, for example, one or more hard disc drives, internal or removable memory, or the like. In another embodiment, the packaged multimedia file is transferred to the remote system 22 via a network interface (NIC) 44 and stored in the remote storage 20. Although illustrated separately, the network interface 44 may alternatively be the same network interface 26 used to receive the multimedia content from the content server 14. The packaged file may be transferred to the remote system 22 over a LAN or alternatively some direct wired or wireless connection. Note that during or before the transfer, the packaged media file may be temporarily stored in the local storage 42. As another alternative, the set-top box function 12 may transfer the packaged file directly to the remote storage 20. For example, the remote storage 20 may be a network device, and the set-top box function 12 may transfer the packaged multimedia file to the remote storage 20 via a LAN. As another example, the set-top box function 12 may transfer the packaged multimedia file to the remote storage directly over a direct wired or wireless connection.
If recording is not restricted, the set-top box function 12, and in this embodiment the encryption and file packaging function 40, may store the decrypted multimedia content from the decryption function 28 in the local storage 42 or, alternatively, the remote storage 20.
Notably, the decryption function 28, the decompression function 30, the HDMI/HDCP interface 32, and the encryption and file packaging function 40 are preferably, but not necessarily, implemented on a single integrated circuit (IC) 46 to prevent unauthorized access to the decrypted multimedia content. For example, the decryption function 28, the decompression function 30, the HDMI/HDCP interface 32, and the encryption and file packaging function 40 may be implemented on a single Application Specific Integrated Circuit (ASIC) or Field Programmable Gate Array (FPGA). As such, a user is unable to probe wiring or connections between the decryption function 28, the decompression function 30, the HDMI/HDCP interface 32, and the encryption and file packaging function 40 to obtain an unprotected copy of the multimedia content.
If recording is restricted (step 104), the set-top box function 12 then sends a request to the license server 18 for an encryption key to be used for re-encrypting the desired multimedia content and optionally one or more of the URL for the copyright policy server 24 and the record policy for the desired multimedia content (step 106). The request may include the content ID of the desired multimedia content and optionally the set-top ID 36 of the set-top box function 12. As mentioned above, the encryption key returned by the license server 18 may be unique to the desired multimedia content, unique to the set-top box function 12, or unique to the combination of the desired multimedia content and the set-top box function 12. The URL of the copyright policy server 24 may be used later by the remote system 22 to contact the copyright policy server 24. The record policy may include advance information regarding the steps that will be necessary to obtain non-real-time access to the multimedia content. For example, the record policy may include information stating that the user will be required to purchase the multimedia content or pay a fee before non-real-time access is permitted, information indicating the client-side watermarking will be required, or information describing a DRM policy for the multimedia content.
If the requested data is not obtained from the license server 18 (step 108), the set-top box function 12 notifies the user (step 110). The requested data may not be obtained where a network connection to the license server 18 is lost or interrupted or if the set-top box function 12 is not permitted to record the desired multimedia content for non-real-time playback. Optionally, the process may return to step 106 and repeat. At some point, if the requested data is not obtained from the license server 18, the recording process is aborted (step 112). The process may be aborted, for example, after the first time the set-top box function 12 fails to obtain the requested data from the license server 18 or after a predetermined number of iterations through steps 106-110.
Returning to step 108, if the set-top box obtains the requested data from the license server 18, the set-top box function 12 then stores the requested data (step 114). The set-top box function 12 also stores the record parameters and waits for the broadcast or multicast of the desired multimedia content (step 116).
Returning to step 104, if recording of the desired multimedia content is not restricted, the set-top box function 12 stores the record parameters and waits for the broadcast or multicast of the desired multimedia content (step 116).
First, at some point prior to or at the beginning of the broadcast or multicast of the desired multimedia content, the set-top box function 12 tunes to the desired channel (step 200). As used herein, “tune” may be subscribing to the corresponding multicast channel or tuning a digital television tuner to the corresponding channel. In this example, the set-top box function 12 checks for non-real-time playback restrictions (step 202). Even though this step was also performed in the process of
If recording is restricted (step 204), the set-top box function 12 then sends a request to the license server 18 for the encryption key to be used for re-encrypting the desired multimedia content and optionally one or more of the URL for the copyright policy server 24 and the record policy for the desired multimedia content (step 206). Like step 202, step 206 is optional. If the requested data is not obtained from the license server 18 (step 208), the set-top box function 12 determines whether the requested data has been previously obtained from the license server 18 during the process of
Returning to steps 208 and 210, if the set-top box function 12 obtains the requested data from the license server 18 or has previously obtained the requested data from the license server 18, the set-top box function 12 stores the requested data if necessary and generates an open file including one or more of the URL of the copyright policy server 24, the content ID of the desired multimedia content, the set-top ID 36, and the record policy of the desired multimedia content (step 218). The set-top box function 12 then re-encrypts the decrypted multimedia content from the decryption function 28 using the encryption key from the license server 18 and stores the re-encrypted multimedia content in the open file, thereby generating the packaged multimedia file (step 220). As discussed above, the packaged multimedia file may be stored locally in the local storage 42 or stored remotely in the remote storage 20. Note that if remote storage is desired, the packaged file may or may not be temporarily stored locally by the set-top box function 12 prior to transfer to the remote storage 20.
Returning to step 204, if recording of the desired multimedia content is not restricted, the set-top box function 12 plays the desired multimedia content within compliant real-time display parameters (step 216). More specifically, the multimedia is content decrypted, decompressed and provided to the playback device 16 via the HDMI/HDCP interface 32.
In order to release the multimedia content for non-real-time playback, the remote system 22 requests a copyright policy for the multimedia content from the copyright policy server 24 using the URL for the copyright policy server 24 stored in the packaged multimedia file (step 306). Alternatively, the remote system 22 may already know the URL of the copyright policy server 24, in which case the URL in the packaged multimedia file is optional. In response to the request, the copyright policy server 24 returns the copyright policy for the multimedia content to the remote system 22 (step 308). The copyright policy may, for example, require client-side watermarking of the multimedia content with information identifying the multimedia content, the set-top box function 12, and/or the associated user. As another example, the copyright policy may be a DRM policy for the multimedia content. The DRM policy may be, for example, a maximum number of times that that multimedia content may be played, a maximum number of devices to which the multimedia content may be copied or on which the multimedia content may be played, or the like. In addition or alternatively, the copyright policy may require that the user purchase the multimedia content or pay a fee for non-real-time playback of the multimedia content.
Upon receiving the copyright policy, the remote system 22 and the copyright policy server 24 interact to enforce the copyright policy (step 310). Enforcing the copyright policy may include, for example, watermarking the multimedia content before releasing the multimedia content for non-real-time playback, enforcing a DRM policy, and/or conducting an e-commerce transaction during which the user purchases the multimedia content or otherwise pays for non-real-time playback of the multimedia content.
As a first example, in order to enforce the copyright policy, the copyright policy server 24 or an associated server may obtain the key for decrypting the re-encrypted multimedia content from the license server 18 and provide an executable watermarking application and the key to the remote system 22. Alternatively, the key may be embedded in the executable watermarking application or obtained by the executable watermarking application from the copyright policy server 24 or the license server 18 during execution. The remote system 22 may then run the executable watermarking application, where the executable watermarking application decrypts the re-encrypted multimedia content in the packaged multimedia file and watermarks the multimedia content with, for example, one or more of the content ID from the packaged multimedia file, the set-top ID 36 from the packaged multimedia file, and user specific information. The user specific information may include information such as the name of the user of the set-top box function 12 and/or the user of the remote system 22, a credit card number of a credit card used for an e-commerce transaction to purchase the multimedia content or pay a fee for non-real-time playback, or the like. Once the multimedia content is watermarked, the watermarked multimedia content may be released and stored for non-real-time playback by the remote system 22 and/or the set-top box function 12. Still further, the watermarked multimedia content 12 may be transferred to the set-top box function 12 and stored locally in the local storage 42.
In another embodiment, the executable watermarking application may watermark the multimedia content with information identifying the user such as the set-top ID 36 and/or the user information and with information identifying the content such as the content ID and/or information identifying the content owner. These watermarks can be said to be a content specific watermark and a user specific watermark. The copyright policy server 24 may provide a digital certificate including information corresponding to the content specific watermark and the user specific watermark, wherein access to the watermarked multimedia content may be controlled based on a comparison of the digital certificate and the watermarks in the multimedia content. For example, full access may be provided if the information in the digital certificate matches both the content specific watermark and the user specific watermark. Limited access may be provided if the digital certificate matches only the content specific watermark. As such, if the user loses the watermarked multimedia content, the user may obtain another copy of the watermarked multimedia content and still have limited access. For more information, the interested user is directed to U.S. patent application Ser. No. 11/565,013, entitled MULTIPLE WATERMARKS FOR DIGITAL RIGHTS MANAGEMENT (DRM) AND CONTENT TRACKING, which was filed on Nov. 30, 2006 and is hereby incorporated by reference in its entirety.
As another example, client-side watermarking may be performed in a manner similar to that discussed above. However, in this example, the copyright policy server 24 may provide a unique ID to be used for client-side watermarking. The unique ID may be stored in a remote database associated with the copyright policy server 24. In order to identify the user, the set-top ID 36 and/or user specific information is provided to the copyright policy server 24 and stored in the database in association with the unique ID used for watermarking.
As another example, the remote system 22 may provide the re-encrypted multimedia content to the copyright policy server 24 or associated system. The copyright policy server 24 or associated system may then generate an executable package including the re-encrypted multimedia content and the key for decrypting the re-encrypted multimedia content. The executable package is returned to the remote system 22. Upon execution, the executable package forces client-side watermarking of the multimedia content before the multimedia content is released for storage and non-real-time playback. For more information, the interested reader is directed to U.S. patent application Ser. No. 11/554,317, entitled EXECUTABLE PACKAGE FORCING WATERMARKING OF EMBEDDED DIGITAL MEDIA CONTENT, which was filed on Oct. 30, 2006 and is hereby incorporated by reference in its entirety.
As a final example, the multimedia content may be compressed according to MPEG2, MPEG4, H.264, or the like. In addition to the multimedia content, the set-top box function 12 may receive a number of hybrid I-Frames (or I-Slices), where the hybrid I-Frames are low-loss versions of one or more of the I-Frames in the multimedia content stream. In this example, the hybrid I-Frames are also encrypted and stored in the packaged multimedia file. Then, in order to watermark the multimedia content, the hybrid I-Frames are watermarked and used to replace the corresponding I-Frames in the multimedia content stream. Watermarking may be performed by an executable watermarking application provided by the copyright policy server 24 or by an executable package having the encrypted multimedia content and hybrid I-Frames embedded therein in a manner similar to that described above. For more information, the interested reader is directed to U.S. patent application Ser. No. 11/555,707, entitled CLIENT-SIDE WATERMARKING USING HYBRID I-FRAMES, filed on Nov. 2, 2006 and U.S. patent application Ser. No. 11/555,709, entitled SELECTION OF I-FRAMES FOR CLIENT-SIDE WATERMARKING, filed on Nov. 2, 2006, which are hereby incorporated by reference in their entireties.
Those skilled in the art will recognize improvements and modifications to the preferred embodiments of the present invention. All such improvements and modifications are considered within the scope of the concepts disclosed herein and the claims that follow.
Number | Name | Date | Kind |
---|---|---|---|
5613004 | Cooperman et al. | Mar 1997 | A |
5687236 | Moskowitz et al. | Nov 1997 | A |
5758257 | Herz et al. | May 1998 | A |
5790935 | Payton | Aug 1998 | A |
5809139 | Girod et al. | Sep 1998 | A |
5905800 | Moskowitz et al. | May 1999 | A |
6141753 | Zhao et al. | Oct 2000 | A |
6282299 | Tewfik et al. | Aug 2001 | B1 |
6389541 | Patterson | May 2002 | B1 |
6510234 | Cox et al. | Jan 2003 | B1 |
6567107 | Stannard | May 2003 | B1 |
6721282 | Motley | Apr 2004 | B2 |
6735699 | Sasaki et al. | May 2004 | B1 |
6738493 | Cox et al. | May 2004 | B1 |
6751670 | Patterson | Jun 2004 | B1 |
6774926 | Ellis et al. | Aug 2004 | B1 |
6804779 | Carroni et al. | Oct 2004 | B1 |
6975743 | Venkatesan et al. | Dec 2005 | B2 |
6980204 | Hawkins et al. | Dec 2005 | B1 |
6987985 | Purkayastha et al. | Jan 2006 | B2 |
7003131 | Watson et al. | Feb 2006 | B2 |
7016668 | Vaidyanathan et al. | Mar 2006 | B2 |
7020304 | Alattar et al. | Mar 2006 | B2 |
7036024 | Watson | Apr 2006 | B2 |
7065607 | England et al. | Jun 2006 | B2 |
7069580 | Deitz et al. | Jun 2006 | B1 |
7167599 | Diehl | Jan 2007 | B1 |
7242766 | Lyle | Jul 2007 | B1 |
7369677 | Petrovic et al. | May 2008 | B2 |
7409556 | Wu et al. | Aug 2008 | B2 |
7415617 | Ginter et al. | Aug 2008 | B2 |
7562397 | Mithal et al. | Jul 2009 | B1 |
20010051996 | Cooper et al. | Dec 2001 | A1 |
20020010759 | Hitson et al. | Jan 2002 | A1 |
20020013812 | Krueger et al. | Jan 2002 | A1 |
20020049580 | Kutaragi et al. | Apr 2002 | A1 |
20020054578 | Zhang et al. | May 2002 | A1 |
20020057799 | Kohno | May 2002 | A1 |
20020061029 | Dillon | May 2002 | A1 |
20020104003 | Iwamura | Aug 2002 | A1 |
20020104099 | Novak | Aug 2002 | A1 |
20020122141 | Lee | Sep 2002 | A1 |
20020129367 | Devara | Sep 2002 | A1 |
20020141578 | Ripley et al. | Oct 2002 | A1 |
20020144267 | Gutta et al. | Oct 2002 | A1 |
20020156842 | Signes et al. | Oct 2002 | A1 |
20020168082 | Razdan | Nov 2002 | A1 |
20020172395 | Foote et al. | Nov 2002 | A1 |
20030009769 | Hensgen et al. | Jan 2003 | A1 |
20030012403 | Rhoads et al. | Jan 2003 | A1 |
20030050055 | Ting et al. | Mar 2003 | A1 |
20030081580 | Vaidyanathan et al. | May 2003 | A1 |
20030093665 | Cooper et al. | May 2003 | A1 |
20030138127 | Miller et al. | Jul 2003 | A1 |
20030152096 | Chapman | Aug 2003 | A1 |
20030161268 | Larsson et al. | Aug 2003 | A1 |
20030191850 | Thornton | Oct 2003 | A1 |
20040008864 | Watson et al. | Jan 2004 | A1 |
20040010692 | Watson | Jan 2004 | A1 |
20040010694 | Collens et al. | Jan 2004 | A1 |
20040030798 | Andersson et al. | Feb 2004 | A1 |
20040042421 | Mahany | Mar 2004 | A1 |
20040049787 | Maissel et al. | Mar 2004 | A1 |
20040070593 | Neely et al. | Apr 2004 | A1 |
20040073916 | Petrovic et al. | Apr 2004 | A1 |
20040083487 | Collens et al. | Apr 2004 | A1 |
20040086122 | Watson | May 2004 | A1 |
20040088549 | Ukai et al. | May 2004 | A1 |
20040088557 | Malcolm et al. | May 2004 | A1 |
20040117824 | Karaoguz et al. | Jun 2004 | A1 |
20040131184 | Wu et al. | Jul 2004 | A1 |
20040139047 | Rechsteiner et al. | Jul 2004 | A1 |
20040156528 | Joo et al. | Aug 2004 | A1 |
20040187005 | Molaro | Sep 2004 | A1 |
20040234099 | Venkatesan et al. | Nov 2004 | A1 |
20040248615 | Purkayastha et al. | Dec 2004 | A1 |
20040263941 | Chen et al. | Dec 2004 | A1 |
20040264372 | Huang | Dec 2004 | A1 |
20050008017 | Datta et al. | Jan 2005 | A1 |
20050034001 | Pontarelli | Feb 2005 | A1 |
20050050103 | Kesteloot et al. | Mar 2005 | A1 |
20050081042 | Venkatesan et al. | Apr 2005 | A1 |
20050086069 | Watson et al. | Apr 2005 | A1 |
20050097331 | Majidimehr et al. | May 2005 | A1 |
20050108769 | Arnold et al. | May 2005 | A1 |
20050120127 | Bradley et al. | Jun 2005 | A1 |
20050123135 | Hunt et al. | Jun 2005 | A1 |
20050125405 | Watson et al. | Jun 2005 | A1 |
20050144468 | Northcutt et al. | Jun 2005 | A1 |
20050169632 | Song et al. | Aug 2005 | A1 |
20050182876 | Kim et al. | Aug 2005 | A1 |
20050182989 | Zarnke et al. | Aug 2005 | A1 |
20050183120 | Jain et al. | Aug 2005 | A1 |
20050192987 | Marsh | Sep 2005 | A1 |
20050201340 | Wang et al. | Sep 2005 | A1 |
20050201726 | Malcolm et al. | Sep 2005 | A1 |
20050216942 | Barton | Sep 2005 | A1 |
20050220321 | Langelaar | Oct 2005 | A1 |
20050239497 | Bahl et al. | Oct 2005 | A1 |
20050251486 | Nair | Nov 2005 | A1 |
20050286438 | Rajkotia | Dec 2005 | A1 |
20060010274 | Olson | Jan 2006 | A1 |
20060015735 | Kudo et al. | Jan 2006 | A1 |
20060047967 | Akhan et al. | Mar 2006 | A1 |
20060048185 | Alterman | Mar 2006 | A1 |
20060048186 | Alterman | Mar 2006 | A1 |
20060050880 | Taylor et al. | Mar 2006 | A1 |
20060053452 | Lee et al. | Mar 2006 | A1 |
20060053472 | Goto et al. | Mar 2006 | A1 |
20060056349 | Nakatugawa et al. | Mar 2006 | A1 |
20060059560 | Montulli | Mar 2006 | A1 |
20060072786 | Watson et al. | Apr 2006 | A1 |
20060075243 | Lakamp et al. | Apr 2006 | A1 |
20060080707 | Laksono | Apr 2006 | A1 |
20060085534 | Ralston et al. | Apr 2006 | A1 |
20060085830 | Bruck et al. | Apr 2006 | A1 |
20060095401 | Krikorian et al. | May 2006 | A1 |
20060095471 | Krikorian et al. | May 2006 | A1 |
20060095472 | Krikorian et al. | May 2006 | A1 |
20060095792 | Hurtado et al. | May 2006 | A1 |
20060123235 | Vanstone | Jun 2006 | A1 |
20060126888 | Talstra et al. | Jun 2006 | A1 |
20060127037 | Van Hoff et al. | Jun 2006 | A1 |
20060129672 | Mayer | Jun 2006 | A1 |
20060133644 | Wells et al. | Jun 2006 | A1 |
20060156003 | Zhang et al. | Jul 2006 | A1 |
20060156416 | Huotari et al. | Jul 2006 | A1 |
20060158968 | Vanman et al. | Jul 2006 | A1 |
20060161776 | Van Der Veen et al. | Jul 2006 | A1 |
20060165169 | Ng et al. | Jul 2006 | A1 |
20060173794 | Sellars et al. | Aug 2006 | A1 |
20060174128 | Yuval | Aug 2006 | A1 |
20060193492 | Kuzmich et al. | Aug 2006 | A1 |
20060200416 | White et al. | Sep 2006 | A1 |
20060206933 | Molen et al. | Sep 2006 | A1 |
20070002742 | Krishnaswamy et al. | Jan 2007 | A1 |
20070056046 | Claudatos et al. | Mar 2007 | A1 |
20070061488 | Alagappan et al. | Mar 2007 | A1 |
20070061580 | Venkatesan et al. | Mar 2007 | A1 |
20070100771 | Eckleder et al. | May 2007 | A1 |
20070124474 | Margulis | May 2007 | A1 |
20070130585 | Perret et al. | Jun 2007 | A1 |
20070133673 | Imaizumi | Jun 2007 | A1 |
20070269044 | Bruestle et al. | Nov 2007 | A1 |
20080005676 | Evans et al. | Jan 2008 | A1 |
20080044087 | Levy et al. | Feb 2008 | A1 |
20080148063 | Hanko et al. | Jun 2008 | A1 |
20090037388 | Cooper et al. | Feb 2009 | A1 |
20090287837 | Felsher | Nov 2009 | A1 |
20090287940 | Carr | Nov 2009 | A1 |
Number | Date | Country |
---|---|---|
2306869 | May 1997 | GB |
WO 0040021 | Jul 2000 | WO |
WO 2005045647 | May 2005 | WO |
WO 2006046099 | May 2006 | WO |