Field
The present invention relates generally to systems, methods, and computer program products for obtaining mobile device data.
Related Art
In a mobile commerce environment, mobile devices typically include mobile wallet applications for storing and managing data. Mobile wallet applications are also used to manage inbound and outbound communications to and from mobile devices, for performing a variety of processes such as activating other applications, resolving hardware and software changes, and provisioning accounts. Such communications to and from the mobile wallet applications on the mobile devices are directed to and received from a number of systems internal and external to a mobile wallet provider architecture.
A mobile wallet provider is a company, organization, entity, or the like, that provides services such as contactless transactions (e.g., payments, commerce, venue admissions, transit ticketing). A mobile wallet provider architecture includes a number of systems for facilitating such transactions. Systems within a mobile wallet provider architecture may include servers, enterprise service buses (ESBs), trusted service managers (TSMs), and the like.
A mobile wallet provider also communicates with systems outside of the mobile wallet provider architecture in order to provide its services. Such systems may include service provider (SP) systems, mobile network operator (systems), merchant systems, point of sale (POS) terminals, and the like.
To ensure that communications to and from mobile wallet applications on mobile devices are successfully sent and received, systems involved in such communications need to know, have access to and/or store mobile device data such as mobile device numbers (MDNs) associated with the mobile devices.
Typically, mobile device data is obtained by requesting and/or receiving such data from the mobile device. That is, the mobile device prompts its user to input the mobile device data or retrieves the mobile device data from its memory and, in turn, transmits that data to the requesting and/or target system. The mobile device data is transmitted from the mobile device to the requesting and/or target system using mobile-originated (e.g., mobile device-originated) messages (e.g., short message service (SMS) messages) transmitted over mobile (e.g., wireless) communications networks.
Effective and efficient transmission of mobile device data using this type of messaging and mobile communications networks depends on a variety of mobile communications networks and their providers. Mobile communications networks may be affected by outages, and inefficient and/or ineffective service, which may result in data loss, delays and the like. Failure to securely and reliably obtain mobile device data may result in failed execution of processes, redundant execution of processes, and the like.
Given the foregoing, it would be beneficial to provide systems with mobile device data for communicating with mobile devices using an alternative communication mechanism and infrastructure.
The example embodiments presented herein meet the above-identified needs by providing systems, methods, and computer program products for obtaining mobile device data.
In one example embodiment, a system is provided for obtaining mobile device data. The system includes at least one memory and a processor coupled to the at least one memory. A first request for mobile device data is received over a communications network. The first request includes a first identifier associated with a mobile device. A first mobile network operator (MNO) system corresponding to the mobile device is identified from a plurality of MNO systems using the first identifier. A second request is transmitted to the first MNO system. The second request includes the first identifier. A response is received from the first MNO system. The response includes the mobile device data. The mobile device data and the first identifier are transmitted to a server.
In another example embodiment, a method for obtaining mobile device data, comprising steps of: receiving, over a communications network, a first request for mobile device data, the first request including a first identifier associated with a mobile device; identifying, from a plurality of mobile network operator (MNO) systems, a first MNO system corresponding to the mobile device, using the first identifier; transmitting a second request to the first MNO system, the second request including the first identifier; receiving a response from the first MNO system, the response including the mobile device data; and transmitting the mobile device data and the first identifier to a server.
In yet another example embodiment, a non-transitory computer-readable medium has stored thereon sequences of instructions, which when executed by a computer, cause the computer to: receive, over a communications network, a first request for mobile device data, the first request including a first identifier associated with a mobile device; identify, from a plurality of mobile network operator (MNO) systems, a first MNO system corresponding to the mobile device, using the first identifier; transmit a second request to the first MNO system, the second request including the first identifier; receive a response from the first MNO system, the response including the mobile device data; and transmit the mobile device data and the first identifier to a server.
The features and advantages of the example embodiments presented herein will become more apparent from the detailed description set forth below when taken in conjunction with the following drawings.
The example embodiments presented herein are directed to systems, methods, and computer program products for obtaining mobile device data, which are described herein in terms of a mobile wallet application activation process. This description is not intended to limit the application of the example embodiments presented herein. In fact, after reading the following description, it will be apparent to one skilled in the relevant art(s) how to implement the following example embodiments in alternative processes such as the management of hardware and/or software changes, provisioning of applications, installation of applications, and the like.
Mobile devices 101 may be, for example, a cellular phone, tablet or the like. Although not illustrated in
Mobile devices 101 each include, store and/or are associated with attributes such as a device identifier (ID), SE ID, mobile subscriber integrated services digital network-number (MSISDN) (hereinafter referred to as a “mobile device number” or “MDN”), mobile network operator (MNO) ID, and/or subscriber identity module (SIM) ID. A device ID may be an international mobile equipment identity (IMEI), a mobile equipment identifier (MEID), a Media Access Control (MAC) address, or a similar unique serial number associated with hardware of a mobile device. An SE ID may be a card image number (CIN), which is a unique number associated with a secure element. An MDN may be a phone number associated with a mobile device line of service, which is associated with a user and/or a mobile device. An MNO ID is a unique number corresponding to an MNO (also referred to as wireless network carriers) associated with a mobile device. A SIM ID may be an integrated circuit card ID (ICCID) or an international mobile subscriber identity (IMSI), depending on the type of mobile device.
Mobile devices 101 include or have stored in their memory, respective mobile wallet applications which include instructions that when executed by the processor of the corresponding mobile devices 101, cause the mobile devices to act as instruments, for example, for processing contactless transactions. Each mobile wallet application is associated with a corresponding mobile wallet identifier (WID).
Mobile communications network 105, over which mobile devices 101 are connected to mobile wallet architecture 110, may be a cellular network, radio network, wireless network, mobile network or the like. Mobile devices 101 may communicate with mobile wallet architecture 110 using over-the-air (OTA) technology, secure channel protocol, secure sockets layer (SSL), transport layer security (TLS), or the like.
Mobile wallet architecture 110 may include one or more systems and/or devices managed by a mobile wallet provider, for example, for providing contactless transaction functionality. For example, mobile wallet architecture 110 may include an enterprise service bus (ESB) 115, trusted service manager (TSM) 120 and server 125. It should be understood that ESB 115, TSM 120 and server 125 may be implemented either as separate systems, or as a single system. ESB 115, TSM 120 and server 125 may include a processor and memory, and may be communicatively coupled with each other.
ESB 115 is a system for managing predetermined types of communications to and from external systems, such as MNO systems 140-1, 140-2, . . . , 140-n (collectively “140” or “MNO system(s) 140”). In one example embodiment, ESB 115 may be hardware and/or software that provides interfaces for receiving and transmitting data, for example, to and from MNO systems 140.
TSM 120 is a system for managing predetermined types of communications to and from systems and devices. In one example embodiment, TSM 120 may be hardware and/or software that provides interfaces for receiving and transmitting data, for example, to and from ESB 115, MNO systems 140, mobile devices 101, and the secure elements associated with mobile devices 101.
Server 125 (also known as a “wallet server” or “mobile wallet server”) is hardware and/or software for storing data associated with, for example, mobile devices, MNOs, mobile wallet applications, secure elements, and the like. In one example embodiment, server 125 stores mobile wallet application profiles, which may include mobile device, user, mobile wallet application and transaction data. Server 125 may receive and respond to requests for stored data from other systems such as ESB 115 and TSM 120.
MNO systems 140 are connected to mobile wallet architecture 110 (and/or each of the systems included in mobile wallet architecture 110) over a network 130. Network 130 may be a mobile communications network, virtual private network (VPN), or the like. MNO systems 140 are standalone or multi-device systems operated by mobile network operators. In one example embodiment, MNO systems 140 include a processor and memory. MNO systems 140 may store associated mobile device information, such as account information, MDN, and the like. In one example embodiment, MNO systems 140 may receive and respond to requests for data, such as requests for an MDN associated with a mobile device.
The systems and/or devices illustrated in system 100 are explained in further detail below with reference to
An MDN is obtained by the mobile wallet architecture 202, for example, in order to establish a secure and reliable connection between the mobile device 201 (e.g., its associated secure element) and the mobile wallet architecture 202 (e.g., its associated TSM). The established connection can be used, for example, to transmit and receive information used to activate a mobile wallet application on the mobile device.
In
In turn, at step 254, the mobile wallet architecture 202 transmits a request for an MDN to the MNO system 203. The request for an MDN includes the identifier corresponding to the mobile device 201 (e.g., a SIM ID such as an ICCID), which was transmitted at step 252. The request for an MDN may also include additional mobile device or mobile wallet application information such as a mobile device ID, MNO ID, WID, and/or the like. The request for an MDN transmitted at step 254 is routed to the MNO system associated with the mobile device 201 (in this case, MNO system 203), based on information received at step 252, or based on pre-stored data associated with the mobile device 201. For example, the mobile wallet architecture 202 may identify MNO system 203 as the proper target MNO system based on the SIM ID, MNO ID, and the like.
In turn, the MNO system 203 performs an internal query 255 to retrieve the MDN associated with mobile device 201, based on the information received in the request for an MDN transmitted at step 254. At step 256, the MNO system 203 transmits the retrieved MDN to the mobile wallet architecture 202. The mobile wallet architecture 202 stores, at step 258, the received MDN in association with the mobile device 201. That is, the MDN and, for example, SIM ID of the mobile device 201 may be associatively stored by the mobile wallet architecture 202. In one example embodiment, an aggregation and/or association of data, referred to as a “profile” is created and stored by the mobile wallet architecture based on information received by and/or available to the mobile wallet architecture. The profile may be, for example, an association of the WID, SIM ID, SE ID, MDN, and/or the like. That data may also be associated with a profile identifier corresponding to that particular grouping of information.
At step 260, the request initiated at step 250 is resumed and processed via communications between the mobile wallet architecture 202 and the mobile device 201. That is, the mobile wallet architecture 202, having obtained an accurate and MNO-verified MDN associated with the mobile device 201, can securely process a request (e.g., mobile wallet application activation request) by, among other actions, communicating with the mobile device 201.
In turn, at step 350, the mobile device 301 transmits mobile device information to a wallet server 303 (e.g.,
At step 352, the wallet server transmits a request to an ESB 305 (e.g.,
In turn, the ESB 305 identifies the appropriate MNO system with which to communicate (i.e., the MNO system corresponding to mobile device 301). The ESB 305 may identify the proper MNO system based on mobile device information received from the wallet server, such as the SIM ID, SE ID and/or MNO ID corresponding to the mobile device 301. It should be understood that the proper MNO system may be identified and/or selected from a plurality of MNO systems (e.g.,
In turn, at step 354, the ESB 305 communicates with the MNO system 306 to receive the MDN associated with mobile device 301. That is, at step 354, the ESB 305 transmits an MDN request to the MNO system 306. The MDN request includes at least a portion of the information transmitted at step 350 to the wallet server or at step 352 to the ESB 305. In particular, the request transmitted at step 354 includes an identifier (e.g., a SIM ID or SE ID) associated with the mobile device 301. The MNO system 306 uses the mobile device information received from the ESB 305 and retrieves the MDN associated with the mobile device information. Still in step 354, the MNO system 306 transmits a message or response to the ESB 306, including the retrieved MDN associated with the mobile device 301.
It should be understood that a mobile device may be associated with more than one identifier. In an optional embodiment, more than one identifier is associated with the mobile device and used to retrieve an MDN associated with the mobile device information.
In one example embodiment, the message or response transmitted at step 354 may include information indicating whether the MDN retrieval requested by the ESB 306 succeeded or failed. Such information may be in the form of a code associated with a predetermined result. For example, a code may indicate that there was a failure caused by one or more of a service outage, non-existent MDN, lack of permissions, or unidentifiable target mobile device.
The ESB 305, upon receiving the MDN from the MNO system 306, transmits, at step 356, the MDN to the wallet server 303. The wallet server 303 stores the MDN received from the ESB 305 (e.g., the MDN corresponding to mobile device 301), for example, in wallet database 304. In one example embodiment, the MDN is stored in association with other information corresponding to the mobile device 301 (e.g., SIM ID, SE ID, MNO ID, WID).
In turn, the ESB 305 transmits, at step 358, a request to create a user profile to a TSM 307 (e.g.,
The TSM 307, having received the MDN of the mobile device 301, can accurately and reliably route communications to the mobile device 301. For example, at step 360, the TSM 307 transmits a wakeup message request to short message service (SMS) gateway 308. The wakeup message may be, for example, a short message peer-to-peer (SMPP) communication. The SMS gateway 308 may be any type of gateway that allows communications between the TSM 307 and mobile device 301 (or SE 302, associated with mobile device 301). The SMS gateway 308 may be communicatively coupled or connected to a mobile network and operable to handle a variety of protocols including Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), SMPP, web services, and the like.
At step 362, the SMS gateway 308 transmits a binary SMS message to the mobile device 301, based on the wakeup message sent at step 360. The mobile device 301 routes the binary SMS message to its corresponding secure element 302.
In turn, at step 364, the secure element 302 and the TSM 307 establish a secure communications channel (e.g., bearer independent protocol (BIP) channel), over which data can securely be transmitted. The secure communications channel between the secure element 302 and the TSM 307 can be used to transmit, for example, application protocol data unit (APDU) commands and responses. In one example embodiment, APDUs and data can be directly exchanged between the TSM 307 and the secure element 302. APDUs can be used to, among other things, load, install, instantiate, and/or personalize applets on the secure element 302. The establishment of a secure communications channel between multiple systems and/or devices (e.g., TSM, secure element) is described in further detail in U.S. patent application Ser. No. 14/508,304, filed on Oct. 7, 2014 and titled “Systems, Methods, and Computer Program Products for Managing Communications,” the contents of which are incorporated herein by reference in their entirety.
The example embodiments described above such as, for example, the systems and procedures depicted in or discussed in connection with
The computer 400 may include without limitation a processor device 430, a main memory 435, and an interconnect bus 437. The processor device 430 may include without limitation a single microprocessor, or may include a plurality of microprocessors for configuring the computer 400 as a multi-processor system. The main memory 435 stores, among other things, instructions and/or data for execution by the processor device 430. The main memory 435 may include banks of dynamic random access memory (DRAM), as well as cache memory.
The computer 400 may further include a mass storage device 440, peripheral device(s) 442, portable non-transitory storage medium device(s) 446, input control device(s) 444, a graphics subsystem 448, and/or an output display interface 449. For explanatory purposes, all components in the computer 400 are shown in
The portable storage medium device 446 operates in conjunction with a nonvolatile portable storage medium, such as, for example, a compact disc read only memory (CD-ROM), to input and output data and code to and from the computer 400. In some embodiments, the software for storing information may be stored on a portable storage medium, and may be inputted into the computer 400 via the portable storage medium device 446. The peripheral device(s) 442 may include any type of computer support device, such as, for example, an input/output (I/O) interface configured to add additional functionality to the computer 400. For example, the peripheral device(s) 442 may include a network interface card for interfacing the computer 400 with a network 439.
The input control device(s) 444 provide a portion of the user interface for a user of the computer 400. The input control device(s) 444 may include a keypad and/or a cursor control device. The keypad may be configured for inputting alphanumeric characters and/or other key information. The cursor control device may include, for example, a handheld controller or mouse, a trackball, a stylus, and/or cursor direction keys. In order to display textual and graphical information, the computer 400 may include the graphics subsystem 448 and the output display 449. The output display 449 may include a cathode ray tube (CRT) display and/or a liquid crystal display (LCD). The graphics subsystem 448 receives textual and graphical information, and processes the information for output to the output display 449.
Each component of the computer 400 may represent a broad category of a computer component of a general and/or special purpose computer. Components of the computer 400 are not limited to the specific implementations provided here.
Software embodiments of the example embodiments presented herein may be provided as a computer program product, or software, that may include an article of manufacture on a machine-accessible or machine-readable medium having instructions. The instructions on the non-transitory machine-accessible machine-readable or computer-readable medium may be used to program a computer system or other electronic device. The machine- or computer-readable medium may include, but is not limited to, floppy diskettes, optical disks, CD-ROMs, and magneto-optical disks or other types of media/machine-readable medium suitable for storing or transmitting electronic instructions. The techniques described herein are not limited to any particular software configuration. They may find applicability in any computing or processing environment. The terms “computer-readable”, “machine-accessible medium” or “machine-readable medium” used herein shall include any medium that is capable of storing, encoding, or transmitting a sequence of instructions for execution by the machine and that causes the machine to perform any one of the methods described herein. Furthermore, it is common in the art to speak of software, in one form or another (e.g., program, procedure, process, application, module, unit, logic, and so on), as taking an action or causing a result. Such expressions are merely a shorthand way of stating that the execution of the software by a processing system causes the processor to perform an action to produce a result.
Portions of the example embodiments of the invention may be conveniently implemented by using a conventional general purpose computer, a specialized digital computer and/or a microprocessor programmed according to the teachings of the present disclosure, as is apparent to those skilled in the computer art. Appropriate software coding may readily be prepared by skilled programmers based on the teachings of the present disclosure.
Some embodiments may also be implemented by the preparation of application-specific integrated circuits, field programmable gate arrays, or by interconnecting an appropriate network of conventional component circuits.
Some embodiments include a computer program product. The computer program product may be a storage medium or media having instructions stored thereon or therein which can be used to control, or cause, a computer to perform any of the procedures of the example embodiments of the invention. The storage medium may include without limitation a floppy disk, a mini disk, an optical disc, a Blu-ray Disc, a DVD, a CD-ROM, a micro-drive, a magneto-optical disk, a ROM, a RAM, an EPROM, an EEPROM, a DRAM, a VRAM, a flash memory, a flash card, a magnetic card, an optical card, nanosystems, a molecular memory integrated circuit, a RAID, remote data storage/archive/warehousing, and/or any other type of device suitable for storing instructions and/or data.
Stored on any one of the computer readable medium or media, some implementations include software for controlling both the hardware of the general and/or special computer or microprocessor, and for enabling the computer or microprocessor to interact with a human user or other mechanism utilizing the results of the example embodiments of the invention. Such software may include without limitation device drivers, operating systems, and user applications. Ultimately, such computer readable media further include software for performing example aspects of the invention, as described above.
Included in the programming and/or software of the general and/or special purpose computer or microprocessor are software modules for implementing the procedures described above.
While various example embodiments of the present invention have been described above, it should be understood that they have been presented by way of example, and not limitation. It will be apparent to persons skilled in the relevant art(s) that various changes in form and detail can be made therein. Thus, the present invention should not be limited by any of the above-described example embodiments, but should be defined only in accordance with the following claims and their equivalents.
In addition, it should be understood that the figures are presented for example purposes only. The architecture of the example embodiments presented herein is sufficiently flexible and configurable, such that it may be utilized and navigated in ways other than that shown in the accompanying figures.
Further, the purpose of the foregoing Abstract is to enable the U.S. Patent and Trademark Office and the public generally, and especially the scientists, engineers and practitioners in the art who are not familiar with patent or legal terms or phraseology, to determine quickly from a cursory inspection the nature and essence of the technical disclosure of the application. The Abstract is not intended to be limiting as to the scope of the example embodiments presented herein in any way. It is also to be understood that the procedures recited in the claims need not be performed in the order presented.
This application claims priority to U.S. Provisional Patent Application No. 61/918,169, filed Dec. 19, 2013, the entire contents of which are incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5590038 | Pitroda | Dec 1996 | A |
5640002 | Ruppert et al. | Jun 1997 | A |
5748740 | Curry et al. | May 1998 | A |
5805702 | Curry et al. | Sep 1998 | A |
5884271 | Pitroda | Mar 1999 | A |
5901303 | Chew | May 1999 | A |
5940510 | Curry et al. | Aug 1999 | A |
5949880 | Curry et al. | Sep 1999 | A |
6073840 | Marion | Jun 2000 | A |
6105013 | Curry et al. | Aug 2000 | A |
6116505 | Withrow | Sep 2000 | A |
6131811 | Gangi | Oct 2000 | A |
6237095 | Curry et al. | May 2001 | B1 |
6422464 | Terranova | Jul 2002 | B1 |
6587835 | Treyz et al. | Jul 2003 | B1 |
6601759 | Fife et al. | Aug 2003 | B2 |
6671358 | Seidman et al. | Dec 2003 | B1 |
6732081 | Nicholson | May 2004 | B2 |
6769607 | Pitroda et al. | Aug 2004 | B1 |
6813609 | Wilson | Nov 2004 | B2 |
6837436 | Swartz et al. | Jan 2005 | B2 |
6925439 | Pitroda | Aug 2005 | B1 |
7083094 | Cooper | Aug 2006 | B2 |
7110792 | Rosenberg | Sep 2006 | B2 |
7127236 | Khan et al. | Oct 2006 | B2 |
7155405 | Petrovich | Dec 2006 | B2 |
7194422 | Killick | Mar 2007 | B1 |
7216109 | Donner | May 2007 | B1 |
7249112 | Berardi et al. | Jul 2007 | B2 |
7286818 | Rosenberg | Oct 2007 | B2 |
7298271 | Sprogis | Nov 2007 | B2 |
7308426 | Pitroda | Dec 2007 | B1 |
7330714 | Rosenberg | Feb 2008 | B2 |
7349885 | Gangi | Mar 2008 | B2 |
7469151 | Khan et al. | Dec 2008 | B2 |
7469381 | Ording | Dec 2008 | B2 |
7483858 | Foran et al. | Jan 2009 | B2 |
7494055 | Fernandes et al. | Feb 2009 | B2 |
7529563 | Pitroda | May 2009 | B1 |
7571139 | Giordano et al. | Aug 2009 | B1 |
7581678 | Narendra et al. | Sep 2009 | B2 |
7613628 | Ariff et al. | Nov 2009 | B2 |
7631810 | Liu et al. | Dec 2009 | B2 |
7693752 | Jaramillo | Apr 2010 | B2 |
7708198 | Gangi | May 2010 | B2 |
7712658 | Gangi | May 2010 | B2 |
7775430 | Lin | Aug 2010 | B2 |
7805615 | Narendra et al. | Sep 2010 | B2 |
7828214 | Narendra et al. | Nov 2010 | B2 |
7856377 | Cohagan et al. | Dec 2010 | B2 |
7864163 | Ording et al. | Jan 2011 | B2 |
7942337 | Jain | May 2011 | B2 |
7954715 | Narendra et al. | Jun 2011 | B2 |
7954716 | Narendra et al. | Jun 2011 | B2 |
7954717 | Narendra et al. | Jun 2011 | B2 |
7961101 | Narendra et al. | Jun 2011 | B2 |
7967215 | Kumar et al. | Jun 2011 | B2 |
7991158 | Narendra et al. | Aug 2011 | B2 |
8072331 | Narendra et al. | Dec 2011 | B2 |
8083145 | Narendra et al. | Dec 2011 | B2 |
8091786 | Narendra et al. | Jan 2012 | B2 |
8131645 | Lin et al. | Mar 2012 | B2 |
8140418 | Casey et al. | Mar 2012 | B1 |
8396808 | Greenspan | Mar 2013 | B2 |
8423462 | Amacker et al. | Apr 2013 | B1 |
8429046 | Pitroda | Apr 2013 | B2 |
20020049631 | Williams | Apr 2002 | A1 |
20020082921 | Rankin | Jun 2002 | A1 |
20020174025 | Hind et al. | Nov 2002 | A1 |
20020179703 | Allen | Dec 2002 | A1 |
20030009382 | D'Arbeloff et al. | Jan 2003 | A1 |
20030083042 | Abuhamdeh | May 2003 | A1 |
20030115126 | Pitroda | Jun 2003 | A1 |
20030132298 | Swartz et al. | Jul 2003 | A1 |
20030200489 | Hars | Oct 2003 | A1 |
20040073519 | Fast | Apr 2004 | A1 |
20040186768 | Wakim et al. | Sep 2004 | A1 |
20050004866 | Bonalle et al. | Jan 2005 | A1 |
20050171898 | Bishop et al. | Aug 2005 | A1 |
20050222961 | Staib et al. | Oct 2005 | A1 |
20050234769 | Jain et al. | Oct 2005 | A1 |
20050247777 | Pitroda | Nov 2005 | A1 |
20060265339 | Vakil | Nov 2006 | A1 |
20060287004 | Fuqua | Dec 2006 | A1 |
20070014407 | Narenda et al. | Jan 2007 | A1 |
20070014408 | Narenda et al. | Jan 2007 | A1 |
20070198432 | Pitroda et al. | Aug 2007 | A1 |
20080306849 | Johnson, Jr. et al. | Dec 2008 | A1 |
20090108064 | Fernandes et al. | Apr 2009 | A1 |
20090164322 | Khan et al. | Jun 2009 | A1 |
20100241494 | Kumar et al. | Sep 2010 | A1 |
20110073663 | Narendra et al. | Mar 2011 | A1 |
20110171996 | Narendra et al. | Jul 2011 | A1 |
20110223972 | Narendra et al. | Sep 2011 | A1 |
20110231238 | Khan et al. | Sep 2011 | A1 |
20110244796 | Khan et al. | Oct 2011 | A1 |
20110269438 | Narendra et al. | Nov 2011 | A1 |
20110271044 | Narendra et al. | Nov 2011 | A1 |
20110272468 | Narendra et al. | Nov 2011 | A1 |
20110272469 | Narendra et al. | Nov 2011 | A1 |
20120064828 | Khan et al. | Mar 2012 | A1 |
20120109764 | Martin et al. | May 2012 | A1 |
20120265684 | Singh | Oct 2012 | A1 |
20120323664 | Klems | Dec 2012 | A1 |
20130111599 | Gargiulo et al. | May 2013 | A1 |
20130218769 | Pourfallah | Aug 2013 | A1 |
20130260734 | Jain et al. | Oct 2013 | A1 |
20130262302 | Lettow et al. | Oct 2013 | A1 |
20140068722 | Hayat | Mar 2014 | A1 |
Number | Date | Country |
---|---|---|
2 381 614 | Mar 2001 | CA |
1 222 503 | Jul 2002 | EP |
0 766 852 | Aug 2004 | EP |
1 412 890 | Nov 2004 | EP |
1 477 943 | Nov 2004 | EP |
10-2013-0116905 | Oct 2013 | KR |
WO 0118629 | Mar 2001 | WO |
WO 03012717 | Feb 2003 | WO |
2012091349 | Jul 2012 | WO |
2015094808 | Jun 2015 | WO |
Entry |
---|
PCT/US2014/069271, “International Search Report and Written Opinion received for PCT Patent Application No. PCT/US2014/069271, dated Mar. 13, 2015,”, 8 pages. |
U.S. Appl. No. 14/508,304, filed Oct. 7, 2014. |
Pastore, “Extended European Search Report issued in European Application No. 14872331.5”, dated Mar. 30, 2017, 7 pages. |
NA, “Korean Office Action issued in Korean Application No. 10-2016-7016719”, dated Mar. 22, 2017, 6 pages of English Translation and 5 pages of Korean Office Action. |
Baharlou, “International Preliminary Report on Patentability issued in International Application No. PCT/US2014/069271”, dated Jun. 30, 2016, 7 pages. |
Number | Date | Country | |
---|---|---|---|
20150181418 A1 | Jun 2015 | US |
Number | Date | Country | |
---|---|---|---|
61918169 | Dec 2013 | US |