A consumer today may use several types of payment cards, such as a credit card, a gift card, and an ATM card. Different types of payment cards may be well suited for different occasions. For example, a consumer would want to use an ATM card when no credit is accepted or use a gift card from a merchant in a business location of the merchant. It can be inconvenient and unwieldy to manage a number of payment cards. In addition, the use of each payment card often needs to be specifically controlled. For example, a consumer would want to deactivate a payment card when it is stolen, and a parent may want to limit the use of a payment card given to a child.
Embodiments of the present invention will be described and explained through the use of the accompanying drawings in which:
In this description, references to “an embodiment”, “one embodiment” or the like, mean that the particular feature, function, structure or characteristic being described is included in at least one embodiment of the technique introduced here. Occurrences of such phrases in this specification do not necessarily all refer to the same embodiment. On the other hand, the embodiments referred to also are not necessarily mutually exclusive.
Introduced here is a technique related to a proxy card which emulates different payment cards according to different rules. Using this technique, a consumer benefits from the use of multiple payment cards with the single proxy card. Furthermore, the consumer can manage the selection of a payment card for emulation and the emulation of each selected payment card with various rules based on time, location, business, or other factor(s). Specifically, the consumer can create, edit or delete the various rules for each payment card using an electronic device, such as a mobile phone, which transmits the resulting rules to the proxy card at various points in time.
In certain embodiments a “proxy card” is a card that can emulate one or more other cards/accounts (e.g., payment cards/accounts). The proxy card is essentially identical or similar in appearance to a payment card, such as a credit card, a debit card, or a gift card, being roughly of wallet size and having an identification component, such as a magnetic stripe or integrated circuit (IC) chip, which can hold information identifying one or more payment cards. In addition, in some embodiments the proxy card includes a processor and memory capable of computation, processing and storage functionalities. The proxy card may also include input and output elements, such as a button or switch for input and a liquid-crystal display (LCD) or light emitting diode (LED) display for output. Furthermore, the proxy card includes a communication interface to carry out short-range (typically less than 100 meters) wireless communication, which may be implemented by Bluetooth Low Energy (BLE), for example. These features enable the proxy card to emulate each of multiple payment cards according to specified rules.
In some embodiments, the proxy card stores in the memory one or more rules governing the emulation of each payment card. It also stores in the memory identification information for each payment card. Upon accepting a selection of one of the multiple payment cards, through the input element or the communication interface, the processor configures the identification component to correspond to the selected payment card in accordance with emulation rules associated with the payment card. The proxy card also displays any status update or error message through the output element.
In some embodiments, the server system 108 provides a client device with a graphical user interface (GUI) for the management of a proxy card profile. The GUI can be displayed on any of various client electronic devices, such as a mobile phone 104, a tablet, a laptop, or a desktop. The consumer can create, edit, or delete a proxy card profile on the server system 108.
In the selection section 130, each line corresponds to a selection rule. The selection rules specify how to select one or more payment cards out of a group of payment cards. The selection rules can be expressed in various forms, with regard to time, location, business, or other factors. Some examples are as follows: 1) selecting a particular payment card after normal business hours; 2) selecting a gift card from a particular merchant when the proxy card is located within a business establishment of the merchant; 3) selecting a payment card with a low foreign exchange rate when the proxy card 102 is located in a foreign country; 4) selecting a particular payment card when the proxy card is located at a business in a particular industry (e.g., entertainment, restaurant, etc.); 5) selecting a credit card instead of a debit card under a specified condition; 6) selecting a payment card in the consumer's name before selecting a payment card not in the consumer's name; 7) skipping a payment card that has been used more than a specified number of times or for transactions totaling more than a specified amount of money during a period of time.
In some embodiments, the selection rules can incorporate or be combined with Boolean operators. They can also be prioritized so that conflicts between them can be resolved. In some embodiments, while the selection rules enable an automatic selection of a payment card, they can be overridden by the consumer at the time of using the proxy card, as discussed below.
In the emulation section 132, each row corresponds to a set of emulation rules associated with a registered payment card, i.e., a payment card associated with the proxy card. These emulation rules control the emulation of a payment card, controlling how the payment card is emulated, for security, efficiency, and other purposes. The emulation rules can also be expressed in various forms, with regard to time, location, business, or other factors.
In some embodiments, regarding time, an emulation rule specifies that the emulation is on or off at a designated time or relative to the occurrence of an event, or the emulation lasts for a specified period of time, etc. Such an event can be, for example, the push of a button on the proxy card to signify the beginning of emulation, the accessing of the identification component on the proxy card, which normally signifies the end of emulation, the entering or exiting of a business location, the opening or closing of a business location, etc. Regarding location, an emulation rule specifies that the emulation is on or off at a designated location, near a particular object, etc. A designated location can be as specific as an address or the name of a business establishment or as broad as a category of businesses, such as a restaurant, or the name of a geographic area, such as New York City. An object in a scenario can be, for example, a mobile electronic device that also belongs to the consumer and communicates with the server system 108, such as a smart phone. The presence of such an object near the proxy card increases the possibility that the proxy card is in the possession of its rightful owner. Regarding business, an emulation rule specifies that the emulation is on or off depending on the nature of the business operating at the current location. Various aspects of the business can be taken into consideration, such as the size, the credit history, the customer service, etc.
In some embodiments, for each of the registered payment cards, multiple emulation rules can be combined. For example, a parent who controls the use of the proxy card by a child may create a first rule combination which indicates that a payment card is emulated for one hour from the time the button on the proxy card 102 is pushed when the business operating at the current location is a video game store, and a second rule combination which indicates that the payment card is emulated during the entire time the proxy card is on the premises of the business operating at the current location when the business is a bookstore. Furthermore, multiple emulation rules or combinations of emulation rules can be prioritized so that conflicts between them can be resolved.
In some embodiments, certain data regarding the registered payment cards, including the identification information and the proxy card profile, are transmitted from the server system 108 to the proxy card at various times. For example, the data regarding the registered payment cards can be transmitted to the proxy card 102 periodically or whenever a new payment card is registered and an existing payment card is un-registered. The proxy card profile similarly can be transmitted periodically or whenever a certain amount of update has been made to the proxy card profile. The transmission can result from a push from the server system 108 or a pull from the proxy card. Communication between the server system 108 and the proxy card can be through an electronic device that also belongs to the consumer and that communicates with the server system 108, such as the mobile phone 104. Specifically, the communication between the server system 108 and the mobile phone 104 can be through a cellular network and another network such as the Internet, for example, and the communication between the mobile phone 104 and the proxy card 102 can be through a short-range wireless link, which can be implemented by BLE.
In some embodiments, in applying the selection or emulation rules, the proxy card 102 determines whether a specific event has occurred, such as the push of a button on the proxy card 102 or the closing of a business location where the proxy card 102 is located. The proxy card 102 can detect the occurrence of an event or receive information from a nearby electronic device, such as the mobile phone 104, regarding the occurrence of an event through a short-range wireless link, such as BLE. As one example, the proxy card 102 can contain special hardware, such as an accelerometer, which detects the pressure exerted on or the speed of the proxy card 102, thereby determining whether the proxy card 102 is being swiped through a magnetic card reader. As another example, when the proxy card 102 is swiped through a magnetic card reader attached to the POS system 106, the information read from a magnetic stripe on the proxy card 102 can be transmitted from the POS system 106 through the server system 108 and the mobile phone 104 and back to the proxy card 102. The proxy card 102 also determines whether it is in a particular location or near a particular object. As one example, the proxy card 102 determines whether it is near a mobile phone of the consumer by requesting the mobile phone 104 to transmit its mobile phone number, where both the request and the response can be via a short-range wireless link, such as BLE. Next, the proxy card 102 determines whether the transmitted number matches the number for the mobile phone 104 previously stored on the proxy card 102. As another example, the proxy card 102 determines whether it is in a particular location by requesting the mobile phone 104, which has Global Positioning System (GPS) capabilities, to transmit information regarding its current location, using a short-range wireless link such as mentioned above. In addition, the proxy card 102 determines the nature of the business operating at the current location. The proxy card 102 can similarly rely on the mobile phone 104 to obtain such information directly, from a web search, for example, or by contacting the server system 108, which stores data regarding merchants and businesses. The proxy card 102 can also request a POS system 106 near the current location to transmit information regarding the business, such as a Merchant Category Code (MCC), using a short-range wireless link.
In some embodiments, as a result of applying the emulation rules, the proxy card 102 begins and ends the emulation of the selected payment card accordingly. It is possible that when the proxy card 102 is actually used, where the identification component is accessed by the POS system 106, for example, the emulation of the selected payment card is off according to the associated emulation rules. In that case, the proxy card 102 or the POS system 106 can display an error message. In response, the consumer may manually select another payment card, re-initiate an event, such as pushing a button on the proxy card 102, or take other actions to remedy the situation. The proxy card 102 can also automatically select the next payment card based on the selection rules.
In some embodiments, when the proxy card 102 is not emulating any payment card (e.g., because it is set to emulate the blank card, because the emulation is off for the selected payment card, or for some other reason), the proxy card 102 turns on a fraud protection feature. For example, the proxy card 102 displays an error message in an LCD on the proxy card 102 or sends an alert to the mobile phone 104 when the number of attempts to use the proxy card exceeds a predetermined threshold during a certain timeframe or duration.
In step 208, the electronic system transmits existing emulation rules associated with the payment card to the proxy card. When the electronic system, such as the mobile phone that also belongs to the user, is near the proxy card, the electronic system can transmit the emulation rules directly using a short-range wireless link, such as BLE, Bluetooth, Wi-Fi, NFC or RFID. When the electronic system is not near the user, it can transmit the emulation rules to an electronic device that is near the user using a typical network interface and relies on that electronic device for further transmission to the proxy card. The transmission can be done based on a predetermined schedule, whenever emulation rules are updated, and so on. The emulation rules associated with the payment card may be transmitted by themselves or together with additional emulation rules.
In step 302, the proxy card selects one card of the group of payment cards to emulate, based on an instruction from a user of the proxy card. The proxy card can preselect a payment card according to certain selection rules, but the user can manually select a card using the input element on the proxy card. Once a selection of a payment card is made, the proxy card needs to apply the emulation rules associated with the selected payment card. An emulation rule specifies how a payment card should be emulated with respect to time, location, business or other factors. Therefore, the proxy card identifies the current time, the current location, and the business operating at the current location in order to apply the emulation rules. In terms of time, in step 304, the proxy card detects any use of the input element for signifying a start or an end of emulation or any access of the identification component, which can correspond to an end of emulation. In terms of location and business, in step 306, the proxy card receives from a nearby electronic device, such as a mobile phone or a POS system of a store, data regarding the current location or the business operating at the current location using a short-range wireless link, such as BLE. Having identified the current time, the current location, and the business operating at the current location, in step 308, the proxy card applies the emulation rules associated with the selected payment card to determine how to emulate the selected payment card. Specifically, the proxy card configures the identification element to correspond to the selected payment card for a specific timeframe. Outside the timeframe, in step 310, the proxy card performs no emulation by keeping the identification element in a blank state that does not correspond to any payment card. This measure provides a high level of security. An alternative measure is for the proxy card to emulate a particular card by default.
In the illustrated embodiment, the processing system 400 includes one or more processors 410, memory 411, a communication device 412, and one or more input/output (I/O) devices 413, all coupled to each other through an interconnect 414. In some embodiments, the processing system 400 may not have any I/O devices 413. The interconnect 414 may be or include one or more conductive traces, buses, point-to-point connections, controllers, adapters and/or other conventional connection devices. The processor(s) 410 may be or include, for example, one or more general-purpose programmable microprocessors, microcontrollers, application specific integrated circuits (ASICs), programmable gate arrays, or the like, or a combination of such devices. The processor(s) 410 control the overall operation of the processing device 400. Memory 411 may be or include one or more physical storage devices, which may be in the form of random access memory (RAM), read-only memory (ROM) (which may be erasable and programmable), non-volatile memory such as flash memory, miniature hard disk drive, or other suitable type of storage device, or a combination of such devices. Memory 411 may store data and instructions that configure the processor(s) 410 to execute operations in accordance with the techniques described above. The communication device 412 may be or include, for example, an Ethernet adapter, cable modem, Wi-Fi adapter, cellular transceiver, Bluetooth transceiver, or the like, or a combination thereof. For an electronic sensing device of a merchant, or a proxy card or mobile device of a consumer, the communication device 412 supports at least one technology for short-range wireless communication. Depending on the specific nature and purpose of the processing device 400, the I/O devices 413 can include devices such as a display (which may be a touch screen display), audio speaker, keyboard, mouse or other pointing device, microphone, camera, etc.
Unless contrary to physical possibility, it is envisioned that (i) the methods/steps described above may be performed in any sequence and/or in any combination, and that (ii) the components of respective embodiments may be combined in any manner.
The techniques introduced above can be implemented by programmable circuitry programmed/configured by software and/or firmware, or entirely by special-purpose circuitry, or by a combination of such forms. Such special-purpose circuitry (if any) can be in the form of, for example, one or more application-specific integrated circuits (ASICs), programmable logic devices (PLDs), field-programmable gate arrays (FPGAs), etc.
Software or firmware for use in implementing the techniques introduced here may be stored on a machine-readable storage medium and may be executed by one or more general-purpose or special-purpose programmable microprocessors. A “machine-readable medium”, as the term is used herein, includes any mechanism that can store information in a form accessible by a machine (a machine may be, for example, a computer, network device, cellular phone, personal digital assistant (PDA), manufacturing tool, any device with one or more processors, etc.). For example, a machine-accessible medium includes recordable/non-recordable media (e.g., read-only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; etc.), etc.
Although the present invention has been described with reference to specific exemplary embodiments, it will be recognized that the invention is not limited to the embodiments described but can be practiced with modification and alteration within the spirit and scope of the appended claims. Accordingly, the specification and drawings are to be regarded in an illustrative sense rather than a restrictive sense.
Number | Name | Date | Kind |
---|---|---|---|
5590038 | Pitroda | Dec 1996 | A |
6427911 | Barnes et al. | Aug 2002 | B1 |
8280793 | Kempkes et al. | Oct 2012 | B1 |
8317103 | Foo et al. | Nov 2012 | B1 |
8577731 | Cope et al. | Nov 2013 | B1 |
8579203 | Lambeth et al. | Nov 2013 | B1 |
8590796 | Cloutier et al. | Nov 2013 | B1 |
8622309 | Mullen | Jan 2014 | B1 |
8712854 | Rafferty et al. | Apr 2014 | B1 |
8788418 | Spodak et al. | Jul 2014 | B2 |
8939357 | Perry | Jan 2015 | B1 |
8972298 | Kunz et al. | Mar 2015 | B2 |
9010644 | Workley | Apr 2015 | B1 |
9092767 | Andrews et al. | Jul 2015 | B1 |
9135545 | Lamba | Sep 2015 | B1 |
9183480 | Quigley et al. | Nov 2015 | B1 |
9224141 | Lamba et al. | Dec 2015 | B1 |
9311585 | Steshenko | Apr 2016 | B1 |
9619792 | Aaron et al. | Apr 2017 | B1 |
9679234 | Wade | Jun 2017 | B2 |
9922321 | Aaron et al. | Mar 2018 | B2 |
10037526 | Campos | Jul 2018 | B2 |
20030019942 | Blossom | Jan 2003 | A1 |
20030061157 | Hirka et al. | Mar 2003 | A1 |
20030065805 | Barnes, Jr. | Apr 2003 | A1 |
20040138999 | Friedman et al. | Jul 2004 | A1 |
20040158728 | Kim | Aug 2004 | A1 |
20050247785 | Bertin | Nov 2005 | A1 |
20060032906 | Sines | Feb 2006 | A1 |
20060077895 | Wright | Apr 2006 | A1 |
20060206488 | Distasio | Sep 2006 | A1 |
20080078831 | Johnson et al. | Apr 2008 | A1 |
20080177826 | Pitroda | Jul 2008 | A1 |
20080197201 | Manessis et al. | Aug 2008 | A1 |
20080222047 | Boalt | Sep 2008 | A1 |
20090043702 | Bennett | Feb 2009 | A1 |
20090063312 | Hurst | Mar 2009 | A1 |
20090159663 | Mullen et al. | Jun 2009 | A1 |
20090159667 | Mullen | Jun 2009 | A1 |
20090159671 | Mullen | Jun 2009 | A1 |
20090159672 | Mullen | Jun 2009 | A1 |
20090192904 | Patterson et al. | Jul 2009 | A1 |
20100063906 | Nelsen | Mar 2010 | A1 |
20100102125 | Gatto | Apr 2010 | A1 |
20100218009 | Hoeksel et al. | Aug 2010 | A1 |
20110131128 | Vaananen | Jun 2011 | A1 |
20110174874 | Poznansky et al. | Jul 2011 | A1 |
20110180598 | Morgan et al. | Jul 2011 | A1 |
20110231270 | Dykes et al. | Sep 2011 | A1 |
20110238510 | Rowen et al. | Sep 2011 | A1 |
20110240748 | Doughty | Oct 2011 | A1 |
20110270747 | Xu | Nov 2011 | A1 |
20110295750 | Rammal | Dec 2011 | A1 |
20110313840 | Mason et al. | Dec 2011 | A1 |
20120059718 | Ramer et al. | Mar 2012 | A1 |
20120123935 | Brudnicki | May 2012 | A1 |
20120310760 | Phillips et al. | Dec 2012 | A1 |
20130024364 | Shrivastava et al. | Jan 2013 | A1 |
20130024371 | Hariramani et al. | Jan 2013 | A1 |
20130030997 | Spodak et al. | Jan 2013 | A1 |
20130036048 | Campos | Feb 2013 | A1 |
20130048719 | Bennett | Feb 2013 | A1 |
20130117155 | Glasgo | May 2013 | A1 |
20130134216 | Spodak et al. | May 2013 | A1 |
20130134962 | Kamel et al. | May 2013 | A1 |
20130204777 | Irwin, Jr. et al. | Aug 2013 | A1 |
20130204793 | Kerridge et al. | Aug 2013 | A1 |
20130228616 | Bhosle et al. | Sep 2013 | A1 |
20130246218 | Gopalan | Sep 2013 | A1 |
20130248591 | Look et al. | Sep 2013 | A1 |
20130254227 | Shim et al. | Sep 2013 | A1 |
20130256403 | MacKinnon | Oct 2013 | A1 |
20130284806 | Margalit | Oct 2013 | A1 |
20130339166 | Baer | Dec 2013 | A1 |
20140074655 | Lim et al. | Mar 2014 | A1 |
20140074716 | Ni | Mar 2014 | A1 |
20140084059 | Sierchio et al. | Mar 2014 | A1 |
20140101035 | Tanner et al. | Apr 2014 | A1 |
20140149282 | Philliou et al. | May 2014 | A1 |
20140159869 | Zumsteg et al. | Jun 2014 | A1 |
20140214567 | Llach et al. | Jul 2014 | A1 |
20140217174 | Lo | Aug 2014 | A1 |
20150058146 | Gaddam et al. | Feb 2015 | A1 |
20150058940 | Robison | Feb 2015 | A1 |
20150069126 | Leon | Mar 2015 | A1 |
20150073983 | Bartenstein | Mar 2015 | A1 |
20150127553 | Sundaram et al. | May 2015 | A1 |
20150134513 | Olson et al. | May 2015 | A1 |
20150186871 | Laracey | Jul 2015 | A1 |
20150205550 | Lee | Jul 2015 | A1 |
20160086166 | Pomeroy et al. | Mar 2016 | A1 |
Number | Date | Country |
---|---|---|
H05333966 | Dec 1993 | JP |
2015061005 | Apr 2015 | WO |
2016003831 | Jan 2016 | WO |
Entry |
---|
Non-Final Office Action dated Aug. 23, 2017, for U.S. Appl. No. 14/455,225, of Templeton, T., et al., filed Aug. 8, 2014. |
Final Office Action dated Sep. 29, 2017, for U.S. Appl. No. 14/455,220, of Templeton, T., et al., filed Aug. 8, 2014. |
U.S. Appl. No. 14/168,274 of Odawa, A. et al., filed Jan. 30, 2014. |
U.S. Appl. No. 14/455,220 of Templeton, T. et al., filed Aug. 8, 2014. |
U.S. Appl. No. 14/455,225 of Templeton, T. et al., filed Aug. 8, 2014. |
Non-Final Office Action dated Jan. 20, 2017, for U.S. Appl. No. 14/168,274, of Odawa, A.W., et al., filed Jan. 30, 2014. |
Non-Final Office Action dated Apr. 27, 2017, for U.S. Appl. No. 14/455,220, of Templeton, T., et al., filed Aug. 8, 2014. |
Final Office Action dated May 19, 2017, for U.S. Appl. No. 14/168,274, of Odawa, A.W., et al., filed Jan. 30, 2014. |
“Bluetooth Accessory Design Guidelines for Apple Products,” Apple Inc., dated Sep. 18, 2013, Retrieved from the Internet URL: https://developer.apple.com/hardwaredrivers/BluetoothDesignGuidelines.pdf, pp. 1-40. |
Chiraag, “A payment Card that Changes Magnetic Stripe via Smartphone,” published Nov. 12, 2013, Retrieved from the Internet URL: https://letstalkpayments.com/card-changes-magnetic-stripe-via-smartphone/, on Jan. 3, 2018, pp. 1-6. |
Non-Final Office Action dated Jan. 9, 2015, for U.S. Appl. No. 14/145,895 of Aaron, P., et al., filed Dec. 31, 2013. |
Non-Final Office Action dated Feb. 6, 2015, for U.S. Appl. No. 14/478,522, of Lamba, K., filed Sep. 5, 2014. |
Non-Final Office Action dated Feb. 18, 2015, for U.S. Appl. No. 14/244,632, of Quigley, O.S.C., et al., filed Apr. 3, 2014. |
Non-Final Office Action dated May 12, 2015, for U.S. Appl. No. 14/189,869 of Lamba, K., et al., filed Feb. 25, 2014. |
Non-Final Office Action dated May 26, 2015, for U.S. Appl. No. 14/225,338, of Aaron, P., et al., filed Mar. 25, 2014. |
Non-Final Office Action dated May 27, 2015, for U.S. Appl. No. 14/197,704, of Lamba, K., et al., filed Mar. 5, 2014. |
Notice of Allowance dated Jun. 3, 2015, for U.S. Appl. No. 14/478,522, of Lamba, K., filed Sep. 5, 2014. |
Notice of Allowance dated Jul. 6, 2015, for U.S. Appl. No. 14/244,632, of Quigley, O.S.C., et al., filed Apr. 3, 2014. |
Final Office Action dated Aug. 18, 2015, for U.S. Appl. No. 14/145,895, of Aaron, P., et al., filed Dec. 31, 2013. |
Notice of Allowance dated Sep. 3, 2015, for U.S. Appl. No. 14/244,632, of Quigley, O.S.C., et al., filed Apr. 3, 2014. |
Notice of Allowance dated Sep. 18, 2015, for U.S. Appl. No. 14/197,704, of Lamba, K., et al., filed Mar. 5, 2014. |
Non-Final Office Action dated Sep. 23, 2015, for U.S. Appl. No. 14/478,601, of Steshenko, R.T.S. V., filed Sep. 5, 2014. |
Final Office Action dated Oct. 2, 2015, for U.S. Appl. No. 14/225,338, of Aaron, P., et al., filed Mar. 25, 2014. |
Advisory Action dated Dec. 31, 2015, for U.S. Appl. No. 14/225,338, of Aaron, P., et al., filed Mar. 25, 2014. |
Non-Final Office Action dated Jan. 22, 2016, for U.S. Appl. No. 14/189,869, of Lamba, K., et al., filed Feb. 25, 2014. |
Notice of Allowance dated Feb. 8, 2016, for U.S. Appl. No. 14/478,601, of Steshenko, R.T.S.V., filed Sep. 5, 2014. |
Non-Final Office Action dated Mar. 24, 2016, for U.S. Appl. No. 14/145,895, of Aaron, P., et al., filed Dec. 31, 2013. |
Non-Final Office Action dated May 9, 2016, for U.S. Appl. No. 14/225,338, of Aaron, P., et al., filed Mar. 25, 2014. |
Final Office Action dated Jul. 18, 2016, for U.S. Appl. No. 14/189,869, of Lamba, K., et al., filed Feb. 25, 2014. |
Non-Final Office Action dated Aug. 4, 2016, for U.S. Appl. No. 14/321,429, of Wade, J., filed Jul. 1, 2014. |
Final Office Action dated Sep. 1, 2016, for U.S. Appl. No. 14/225,338, of Aaron, P., et al., filed Mar. 25, 2014. |
Advisory Action dated Oct. 11, 2016, for U.S. Appl. No. 14/189,869, of Lamba, K., et al., filed Feb. 25, 2014. |
Final Office Action dated Oct. 12, 2016, for U.S. Appl. No. 14/145,895, of Aaron, P., et al., filed Dec. 31, 2013. |
Non-Final Office Action dated Nov. 3, 2016, for U.S. Appl. No. 14/225,342, of Lamba, K., et al., filed Mar. 25, 2014. |
Notice of Allowance dated Nov. 8, 2016, for U.S. Appl. No. 14/225,338, of Aaron, P., et al., filed Mar. 25, 2014. |
Advisory Action dated Dec. 22, 2016, for U.S. Appl. No. 14/145,895, of Aaron, P., et al., filed Dec. 31, 2013. |
Notice of Allowance dated Feb. 7, 2017, for U.S. Appl. No. 14/321,429, of Wade, J., filed Jul. 1, 2014. |
Final Office Action dated Mar. 10, 2017, for U.S. Appl. No. 14/225,342, of Lamba, K., et al., filed Mar. 25, 2014. |
Non-Final Office Action dated Mar. 13, 2017, for U.S. Appl. No. 14/189,869, of Lamba, K., et al., filed Feb. 25, 2014. |
Non-Final Office Action dated Apr. 12, 2017, for U.S. Appl. No. 14/145,895, of Aaron, P., et al., filed Dec. 31, 2013. |
Advisory Action dated Jun. 9, 2017, for U.S. Appl. No. 14/225,342, of Lamba, K., et al., filed Mar. 25, 2014. |
Non-Final Office Action dated Jun. 29, 2017, for U.S. Appl. No. 14/189,869, of Lamba, K., et al., filed Feb. 25, 2014. |
Notice of Allowance dated Nov. 9, 2017, for U.S. Appl. No. 14/145,895, of Aaron, P., et al., filed Dec. 31, 2013. |
Advisory Action dated Dec. 11, 2017, for U.S. Appl. No. 14/455,220, of Templeton, T., et al., filed Aug. 8, 2014. |
Final Office Action dated Jan. 8, 2018, for U.S. Appl. No. 14/189,869, of Lamba, K., et al.al., filed Feb. 25, 2014. |
Office Action for European Patent Application No. 14855987.5, dated Mar. 23, 2018. |
Advisory Action dated Apr. 12, 2018, for U.S. Appl. No. 14/189,869, of Lamba, K., et al., filed Feb. 25, 2014. |
Final Office Action dated May 2, 2018, for U.S. Appl. No. 14/455,225, of Templeton, T., et al., filed Aug. 8, 2014. |
International Search Report and Written Opinion for International Application No. PCT/US2014/058447, dated Jan. 15, 2015. |
International Search Report and Written Opinion for International Application No. PCT/US2015/038165, dated Sep. 17, 2015. |
Extended European Search Report for European Patent Application No. 14855987.5, dated May 10, 2017. |
Non-Final Office Action dated Oct. 5, 2018, for U.S. Appl. No. 14/189,869, of Lamba, K., et al., filed Feb. 25, 2014. |
Advisory Action dated Jul. 25, 2018, for U.S. Appl. No. 14/455,225, of Templeton, T., et al., filed Aug. 8, 2014. |
Office Action for European Patent Application No. 14855987.5, dated Sep. 14, 2018. |
Notice of Allowance dated Dec. 27, 2018, for U.S. Appl. No. 14/455,225, of Templeton T., et al., filed Aug. 8, 2014. |
Notice of Allowance dated Jan. 7, 2019, for U.S. Appl. No. 14/455,220, of Templeton, T., et al., filed Aug. 8, 2014. |
Final Office Action dated Feb. 25, 2019, for U.S. Appl. No. 14/189,869, of Lamba, K., et al., filed Feb. 25, 2014. |
Advisory Action dated May 7, 2019, for U.S. Appl. No. 14/189,869, of Lamba, K., et al., filed Feb. 25, 2014. |
Non-Final Action dated May 30, 2019, for U.S. Appl. No. 15/436,478, of Kartik Lamba filed Feb. 17, 2017. |