Digital signatures with an embedded view

Information

  • Patent Grant
  • 7568101
  • Patent Number
    7,568,101
  • Date Filed
    Thursday, May 13, 2004
    20 years ago
  • Date Issued
    Tuesday, July 28, 2009
    14 years ago
Abstract
Digital signatures having an embedded view of signed data that lock the signed data but permit it to be repurposed are described. One of these digital signatures can be repurposed for signature by others, such as co-signers or counter-signers. Another of these digital signatures includes embedded information sufficient to recreate the embedded view using the signed data. A method for building a digital signature is also described that permits signing different parts of an electronic document.
Description
TECHNICAL FIELD

This invention relates to digital signature methods and systems.


BACKGROUND

Digital signatures are valid substitutes to traditional inked signatures in many countries. Digital signatures, like inked signatures, may be used as evidence to show that a particular body of data was signed.


Typical digital signatures allow a signer to electronically sign data and be reasonably certain that the data will not change. Thus, data having a digital signature is locked; it cannot be altered without invalidating the digital signature. Because of this, a digital signature can be used as evidence to show that the data locked by the digital signature was signed and has not been altered since it was signed.


While the data may not change since it was signed, how the data is presented can change with some types of electronic documents. Data presented in one way may be substantially different to the viewer than when presented in another. Important data can be shown with a large font that is easily seen in one presentation, for instance, but in another be shown in a small-font footnote.


This can be a significant problem for types of digital signatures that do not preserve the view of the data when signed. These types of digital signatures will not show how the data was presented when signed, making them less reliable evidence. Thus, while digital signatures typically lock the data that is signed, some types of digital signatures do not lock or preserve the view of the data when it was signed.


Some other types of digital signatures, however, preserve the view of the data when it was signed using a link to the view at a remote website. Here the data of the digital signature can be presented in other ways after the data is signed, but the view seen by the signer is preserved, at least initially, through this remote website.


These digital signatures suffer from significant drawbacks. First, the view stored in the remote website may not be valid or exist when the digital signature is later used as evidence. In many real-world situations, a digital signature may need to be used as evidence ten, twenty, or even thirty years from when it was signed. The view initially preserved at the remote website may not exist then. Second, the view, even if it exists, may not be readily available, such as when the remote website cannot be readily accessed.


Another type of digital signature partially addresses this drawback but it suffers from another problem. This type of digital signature combines the view of the data when signed and the data itself. But combining the data and the view prevents the data from being read by a machine. Because the data is not machine readable, it cannot be repurposed, which significantly limits the usefulness of this type of digital signature.


Given the foregoing, there is a need in the art for a digital signature that can permit signed data to be repurposed and that can also include the view when signed.


SUMMARY

A digital signature and related methods and systems providing an embedded view of signed and repurposable data is described. Allowing signed data to be repurposed permits the signed data to be reused, allowing, for instance, other individuals to sign different portions of the signed data or the same signed data in a different presentation.


A digital signature, as disclosed herein, can also include embedded information sufficient to recreate the embedded view using the signed data. This information provides a check on the embedded view to further secure the digital signature.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 illustrates an exemplary architecture having an exemplary electronic document and signing application.



FIG. 2 sets forth a flow diagram of an exemplary process for creating digital signatures in part by interacting with a potential signer.



FIG. 3 illustrates a screen shot showing part of a signable data section of the electronic document.



FIG. 4 illustrates an exemplary certification dialog box.



FIG. 5 illustrates an exemplary comment dialog box.



FIG. 6 illustrates an exemplary signing overview dialog box showing exemplary information that can be embedded into a digital signature.



FIG. 7 illustrates a screen shot showing part of a signable data section that has been signed.



FIG. 8 sets forth a flow diagram of an exemplary process for building digital signatures.



FIG. 9 illustrates an exemplary electronic document, signature blocks, and digital signature.


The same numbers are used throughout the disclosure and figures to reference like components and features.





DETAILED DESCRIPTION
Overview

Digital signatures and related methods and systems described below can provide an embedded view of data when signed that locks the signed data and permits it to be repurposed. Allowing signed data to be repurposed permits the signed data to be reused, allowing, for instance, other individuals to sign different portions of the signed data or the same signed data in a different presentation. An embedded view makes a digital signature more secure by capturing the context that lead to the decision to sign, without having to rely on a potentially unreliable or unavailable view.


This embedded view captures how data is presented when a signer makes a decision to sign. By seeing data in a particular way, a signer makes a decision to sign or not sign. Because this embedded view shows how the data was presented to the signer at signing and the context in which the data is shown, this embedded view can be important in establishing what the signer intended to sign.


These digital signatures may also include other embedded information that further secures the digital signature. Information sufficient to recreate the computer environment with which the embedded view was viewed, for instance, may be embedded to provide additional context for the embedded view. With this information (called “meta information”), a court of law can determine what computer environment is needed to recreate what a signer viewed at signing. The court can then recreate what the signer viewed by presenting the embedded view with this computer environment.


Comments, custom information, and the like also may be embedded to further secure and provide context for the digital signature.


Described below are these and other exemplary digital signatures and related methods and systems for building and using them. In some embodiments, the techniques and processes discussed herein may be implemented using one or more computer-readable media.


Exemplary Electronic Document and Signature Blocks

Referring to FIG. 1, an exemplary architecture 100 is shown having an electronic document 102 and signing application 104 accessible by a computer 106. This architecture 100 and its components are shown to aid in discussing, but are not intended to limit the applicability of, the digital signatures and their related methods.


In this architecture 100, the electronic document 102 is hierarchically structured and written using a tag-based language. In one embodiment, this language comprises eXtensible Markup Language (XML), though other structures and languages may be used. It is shown divided into signable data sections 102a, 102b, 102c, and 102d, each of which relates to various signature blocks 108, 110, 112, and 114, these relationships shown with dashed lines. These signature blocks are as yet unsigned, but are shown related to those data sections that they can lock once signed. These signature blocks can be structured to conform to the XML Signatures standard currently prescribed by the World Wide Web Consortium (W3C).


The signing application 104 comprises a user interface 116 (though this user interface 116 can be separate from the signing application 104), which can be used to aid a potential signer in signing a digital signature.


Creating Digital Signatures

Referring to FIG. 2, an exemplary process 200 for creating digital signatures is shown. The process 200 is illustrated as a series of blocks representing individual operations or acts performed by the signing application 104 and the user interface 116. This and other processes described herein may be implemented in any suitable hardware, software, firmware, or combination thereof. In the case of software and firmware, these processes represent sets of operations implemented as computer-executable instructions.


At block 202, an electronic document capable of being signed is presented to a potential signer. In an ongoing embodiment, the user interface 116 presents the electronic document 102 and enables selection of data sections 102a, 102b, 102c, and 102d for signing. The user interface 116 can present the electronic document 102 by transforming the XML into viewable HTML (Hyper Text Machine Language) using an XSLT (eXtensible Stylesheet Language Transformation) file or other suitable technique.


Referring to FIG. 3, a screen shot 300 showing a portion 302 of the electronic document 102 is shown. This portion 302 shows a view of part of the signable data section 102a of the electronic document 102 and a selector 304 by which a user can select to sign this data section 102a. The user can select to sign just the data section 102a, just the data section 102b, both the data sections 102b and 102c at once, or all of the data sections at once. This array of choices is enabled in this embodiment by the signature blocks 108, 110, 112, and 114. In the ongoing embodiment, the user selects to sign just the data section 102a.


At block 204 of FIG. 2, an intention to sign the presented electronic document or its data section is received. In the ongoing embodiment, the user interface 116 receives a selection of the data section 102a.


At block 206, a way in which the presented electronic document or its data section can be signed is determined. In the ongoing embodiment, the signing application 104 determines in which way the selected section can be signed by analyzing the signature block 108. The signature block 108 can set forth that this data section 102a can be signed by only one person, by multiple persons as co-signers, or by multiple persons as counter-signers. It can also set forth that this data section 102a permits a digital signature having meta information, comments, and custom data, for instance. The signing application 104 directs the user interface 116 according to the ways in which the selected section can be signed. In this embodiment, the user interface 116 follows blocks 208, 210 and 216 based on this direction from the signing application 104.


At block 208, a signer's identity is selected and received. In the ongoing embodiment, the user interface 116 enables selection of and receives the identity of the signer. The signer's identity can be represented by a private key in a infrastructure (PKI) certification or another suitable technique. In one embodiment, a person selecting a signer's identity can be different from that person's own identity. Thus, a person selecting the signer's identity can be acting as an agent for the signer, such as an assistant acting as an agent for his or her boss.


Referring to FIG. 4, a dialog box for certificate selection 400 presented by the user interface 116 is shown. Here the signer chooses a way by which his or her identity is certified.


At block 210 of FIG. 2, comments and/or custom information are enabled and received. In the ongoing embodiment, the user interface 116 enables the user to add comments. Comments or custom information can be received from sources other than the user, which will be described in greater detail below.


Referring to FIG. 5, a comment dialog box 500 presented by the user interface 116 is shown. Here the signer adds comments, if desired. Comments can help aid in analyzing a digital signature by adding context or otherwise setting the expressed intent of the signer. In this case, the signer simply comments that he approves of the applicant by his signature. In other cases, a signer might comment that he or she has reservations about some particular aspect of a document or data section he or she is signing. The user interface 116 can also present custom information options to the user (not shown), such as selecting a time stamp from a website, determining a location of the user with a global position device, and the like. This custom information can also be embedded in the digital signature to further secure and provide context for the digital signature.


At block 212 of FIG. 2, information sufficient to recreate the view currently seen of the data intended to be signed is determined. In the ongoing embodiment, the signing application 104 determines what computer environment is necessary to recreate the view of the data section 102a currently presented to the potential signer. This environment is described with information about the computer's software and/or hardware and is called “meta information”. Using this meta information, a view embedded in the digital signature can later be verified by recreating that view from the data with the described computer environment.


At block 214, information that can be built into or locked by the digital signature is arranged or compiled. In the ongoing embodiment, the signing application 104 compiles the information that will be built into the digital signature if the user signs the data section 102a. The signing application 104 compiles information received by the user interface 116, such as comments from the signer and the signer's identity. The signing application 104 also compiles other information, such as the meta information, in some cases custom information, and/or a static image of the view currently seen by the user.


At block 216, information that can be embedded into or locked by the digital signature is presented and the signature enabled and received. In the ongoing embodiment, the user interface 116 presents information that will be embedded into and locked by the digital signature if the user signs the data section 102a. In this embodiment, the information comprises the user's PKI certification, the meta information, the comments, and the static image of the view of the data section 102a and the other information shown at the moment signed. The static image can comprise data and information other than that which is signed so long as what is and is not signed in the static view can be differentiated.


In one embodiment, the static image comprises just the data signed, here the data section 102a. In another embodiment, the static image comprises additional data, such as all the data of the electronic document 102.


Referring to FIG. 6, information that can be embedded in the digital signature, should the user sign, is presented by the user interface 116 using a signing overview dialog box 600. The user interface 116 presents the comment at 602, the meta information at 604, and the static image at 606. The user can choose to sign the digital signature by selecting a sign button 608. The user can choose to view the certificate by selecting a view certificate button 610. Prior to selecting the sign button 608, the user can select a confirmation checkbox 612, thereby recording that the user has verified the content of the overview dialog box 600 prior to signing.


As part of this presentation, the user interface 116 enables the user to check over the presented information, verify the content, and sign the digital signature.


At block 218 of FIG. 2, a digital signature with an embedded view of the data at signing that locks the signed data but permits the signed data to be repurposed is built. In the ongoing embodiment, the signing application 104 builds the digital signature by embedding the information into the digital signature that was presented to the signer with the signature overview dialog box 600. This digital signature comprises an embedded, static image 606 of the view of the data section 102a that the signer viewed and selected to sign. This static image 606 secures the digital signature by showing in what way and to what extent the data section 102a was presented to the signer. In one embodiment, the static image 606 does not show all of the data section 102a. In this case the static image 606 shows the view presented to the signer of the data section 102a, though this view can show less than all of the data of the data section 102a.


Also in this ongoing embodiment, the digital signature comprises meta information 604 sufficient to recreate the computer environment by which the signer viewed the data section 102a. This meta information 604 provides an additional check, or a stand-alone check if no static image is embedded, on the view of the data section 102a seen by the signer.


Again in this embodiment, the digital signature comprises the comment 602 added by the signer. This comment 602 further secures and/or provide context for the signer's choice to sign the data section 102a.


At block 220 of FIG. 2, the signed electronic document and/or data section is presented. In the ongoing embodiment, the user interface 116 presents the electronic document 102 showing the data section 102a as signed and by whom. The data section 102a is locked by the digital signature, and the electronic document 102 and the data section 102a are repurposable. In some embodiments, all of the other data of the electronic document 102 (the data 102b, 102c, and 102d) can be changed without breaking the digital signature on the data section 102a, while the data section 102a can be repurposed but not changed. Thus, other people can view and change the electronic document 102 except for the data section 102a. They can also view, reuse, and re-present the data section 102a. They can view the signed data section 102a as seen by the signer by viewing the static image 606, which is embedded in the digital signature. They can also co-sign or counter-sign the signed data section 102a (as permitted by the signature block 108). This digital signature can also insure that the data section 102a that is signed by a co-signer or counter-signer is identical to that signed by the first signer.


For documents that have many sections and need many signatures, especially if these sections and signatures overlap, this embodiment of the digital signature enables efficient reviewing and signing. A later signer of all of the data sections of the electronic document 102, for instance, knows that if the data section 102a is signed, that he or she is signing data that is identical to that which was previously signed. In some cases this is very important. For example, a CEO of a company may need to sign all of a document, but before doing so wants to know if what he is signing has already been signed by other appropriate persons. If data section 102a is related to safety standards, the CEO may want to know that the head engineer of the company has signed this data section 102a before the CEO signs the entire electronic document 102. The CEO also may want to be sure that the data section 102a has not changed since it was signed. In this embodiment, the CEO can be sure that the data signed by the head engineer has been signed and has not changed. Because this digital signature permits signed data to be read by machines, and thus be repurposed, the CEO can view the data section 102a as seen by the engineer at signing, or repurpose the data section 102a to see it in another view. When the CEO signs the whole document (here following the signature block 114) he can be signing data that has previously been signed (the data section 102a) and data that has not (e.g., the data section 102d).


Referring to FIG. 7, the user interface 116 presents a view 700 of the data section 102a of the electronic document 102. The data section 102a is shown with an indication that it has been signed with text and an icon, shown at 702. Data within the data section 102a is locked; thus, the comments and hiring recommendation shown at 704 and 706 cannot be changed without breaking the signature shown at 702. Each signature block can permit a single signature, co-signatures, or counter-signatures for each data section to which it pertains. In this embodiment, another signature of the data section 102a is not permitted by the signature block 108, and so a choice to add another signature is not enabled at this location. Elsewhere in the electronic document 102, a signature can be enabled of all of the electronic document 102, the data section 102b, or the data sections 102b and 102c at once, as prescribed by the signature blocks 110, 112, and 114.


An exemplary method by which the signing application 104 can build digital signatures and exemplary structures for these digital signature are set forth below.


Exemplary Method for Building Digital Signatures

Referring to FIG. 8, an exemplary process 800 for building digital signatures is shown. This process 800 is illustrated as a series of blocks representing individual operations or acts performed by the signing application 104. This process 800 is an exemplary implementation of the block 218 of FIG. 2, though this process 800 can be implemented separately as a stand-alone process or otherwise not implemented as part of the process 200.


In one embodiment of the process 800, the signing application 104 builds a digital signature in part by embedding information into a signature block and then locking the embedded information. In other embodiments, however, information is embedded directly into a digital signature without first embedding it into a signature block. In still others, information is embedded into a signature block and locked, but other parts of the signature block are not locked and so remain changeable.


In each of the blocks 802, 804, 806, 808, 810, and 812, the signing application 104 can embed information into a digital signature by embedding the information into a signature block. The signature block can then be locked, thereby creating a digital signature comprising the information embedded into the signature block.


At block 802, the signing application 104 embeds the view of the signed data into the digital signature. In one embodiment, the signing application 104 embeds information into one of the signature blocks 108, 110, 112, and 114 and then locks the embedded information. The data signed is the data to which the signature block pertains.


In the illustrated and described embodiment, the signature blocks 108, 110, 112, and 114 comprise XML selector (e.g., and XPath expression) indicating the data of the electronic document 102 on which a signature can be made. For example, the signature block 108 indicates the data section 102a as signable. Similarly, the signature block 114 indicates the data sections 102a, 102b, 102c, and 102d as signable together. These signature blocks can indicate what part is signable through the tree or subtree for the data section 102a of the hierarchically structured electronic document 102.


The view embedded by the signing application 104 can comprise a static image seen by the signer at signing. In the ongoing embodiment, the signing application 104 embeds the static image 606 into the signature block 108 as a portable network graphic (PNG) file.


Referring to FIG. 9, an exemplary digital signature 902 is shown. This digital signature 902 is based on the ongoing example using the signature block 108 of FIG. 1. The digital signature 902 comprises the signature block 108, embedded information, and a locking element. Here the signing application 104 embeds the static image 606 within the digital signature 902 as a PNG file of an embedded static image 904.


At block 804 of FIG. 8, the signing application 104 embeds meta information sufficient to recreate the embedded view from the signed data. This meta information comprises specifications of the computer environment used by the signer to view the signed data, such as system date, time, and time-zone, the versions of the operating system and the signing application 104, system data (e.g., type of processor), number of monitors, type of monitors, type and/or version of image application that rendered the view, and/or the like.


Referring to FIG. 9, an embedded meta information 906 is shown. In the ongoing embodiment the embedded meta information 906 comprises the meta information 604: “System date/time: Friday, Jan. 16, 2004 4:02”; “Windows version: 5.1.2600”; “Office version: 11.0.5870”; “InfoPath version: 11.0.5924”; and “Number of monitors: 1.”


At block 806 of FIG. 8, the signing application 104 embeds into the digital signature information sufficient to indicate the identity of the signer.


Referring to FIG. 9, an embedded signer identity 908 is shown. In the ongoing embodiment, the embedded identity 906 comprises a PKI certification issued by Microsoft™ and shown in FIG. 5.


At block 808 of FIG. 8, the signing application 104 embeds a comment into the digital signature.


Referring to FIG. 9, embedded comment information 910 is shown. In the ongoing embodiment, the embedded comment 910 comprises the text “I approve” of the comment 602 of FIG. 6.


At block 810 of FIG. 8, the signing application 104 can embed custom information into the digital signature. This custom information can be received from the signer or another source. The signing application 104 can, for instance, receive custom information from remote locations (such as a time-stamp from a government or other reliable website), a GPS (Global Positioning Satellite) device, and the like. This custom information can be added to the digital signature 902 using custom user code (e.g., script) or other manners for extending the signature block 108 and/or the digital signature 902.


Referring to FIG. 9, embedded custom information 912 is shown. In the ongoing embodiment, the embedded custom information 912 comprises a GPS-determined physical location of the signer's computer (the computer 106) at signing.


At block 812 of FIG. 8, the signing application 104 embeds information indicating what data is signed into the digital signature. In some embodiments, this information is a transformation indicating the data signed, such as by pointing to part or all of an electronic document. This transformation can indicate a particular subtree or subtrees of a structured electronic document to which the digital signature pertains.


Referring to FIG. 9, an embedded data indicator 914 is shown. In this embodiment, the data indicator 914 is part of the signature block 108. In embodiments not using a signature block, the signing application 104 embeds the data indicator 914 into the digital signature 902.


At block 814 of FIG. 8, the signing application 104 locks the digital signature. The signing application 104 can lock the digital signature by computing a strong cryptographic hash over the signed data and the embedded information, or with another suitable technique. The signing application 104 can also embed the strong cryptographic hash within the digital signature.


In the ongoing embodiment of the digital signature 902, the signing application 104 computes a strong cryptographic hash over the information embedded within the signature block 108, such as the static image 904, the meta information 906, the signer identity 908, the comment information 910, the custom information 912, and/or the data indicator 914, and the signed data (indicated by the indicator 914). This strong cryptographic hash is added to the digital signature 902 and locks the embedded information of the digital signature 902 and the signed data (here the data section 102a). If any of the information or the signed data is changed, the strong cryptographic hash of the digital signature 902 will not match with a new hash computed over the changed information and/or signed data. Because of this, the digital signature 902 will be deemed invalid if these are changed. The strong cryptographic hash does not, however, prevent the embedded information from being viewed by persons. It also does not prevent the signed data from being read by a machine. Because the signed data can be read by a machine, it can also be repurposed without breaking the digital signature 902.


Referring to FIG. 9, a signature lock 916 is shown in the digital signature 902. In this embodiment, the digital signature lock 916 comprises the strong cryptographic hash described above.


The digital signature 902 is shown as the signature block 108 with embedded information and locked with a strong cryptographic hash. In other embodiments, however, a digital signature can be built without use of a signature block. In these cases the signing application 104 collects the information, determines the data that is intended to be signed, embeds the information into a digital signature and locks the information and the data.


CONCLUSION

The above-described digital signatures are secured by an embedded view of the signed data and also permit that data to be repurposed. Although the invention has been described in language specific to structural features and/or methodological acts, it is to be understood that the invention defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as exemplary forms of implementing the claimed invention.

Claims
  • 1. A computer-readable medium storing a digital signature, wherein the digital signature comprises an embedded view of signed data, the embedded view locking the signed data and comprising a visual representation of the signed data as seen by a signer if signing the signed data, and wherein the embedded view permits the signed data to be repurposed to allow the signed data to be co-signed or counter-signed, wherein the digital signature further comprises embedded information sufficient to recreate the embedded view from the signed data, the embedded information including one or more specifications of a computing environment used to present the visual representation, and wherein the digital signature further comprises a signature block comprising an XML tag indicating the signed data from other data of an electronic document.
  • 2. The computer-readable medium of claim 1, wherein the digital signature further comprises embedded comments received from the signer.
  • 3. The computer-readable medium of claim 1, wherein the digital signature further comprises embedded custom information.
  • 4. The computer-readable medium of claim 3, wherein the embedded custom information comprises a physical location of the signer.
  • 5. The computer-readable medium of claim 3, wherein the embedded custom information comprises custom user code extending the digital signature.
  • 6. The computer-readable medium of claim 1, wherein the digital signature further comprises the signed data.
  • 7. The computer-readable medium of claim 1, wherein the signed data is part of an electronic document.
  • 8. The computer-readable medium of claim 1, wherein the digital signature further comprises a strong cryptographic hash computed over the embedded view and the signed data effective to lock the embedded view and the signed data.
  • 9. The computer-readable medium of claim 1, wherein the signed data comprises extensible markup language.
  • 10. A computer-readable medium storing a digital signature comprising a static image of signed data when signed, wherein the digital signature is configured to lock the signed data and permit the signed data to be repurposed, the digital signature further comprising embedded information sufficient to recreate a view of the signed data that is identical to the static image, the embedded information including one or more specifications of a computing environment used to present the signed data, wherein the view provides a first visual representation associated with the signed data as seen by a signer if signing the signed data, and wherein the digital signature is further configured to permit at least one of: viewing a second visual representation of the signed data different than the first visual representation; orco-signing or counter-signing the signed data.
  • 11. The computer-readable medium of claim 10, wherein the sufficient information indicates an operating system version and a number of monitors.
  • 12. One or more computer-readable media storing computer executable instructions that, when executed by a computer, perform a method comprising: embedding a static image of data into a signature block of a digital signature, wherein at least a portion of the data is identifiable as signed data that is repurposable allowing a second digital signature of the signed data to be built, and wherein the static image provides a visual representation of the signed data as seen by a signer if signing the signed data, wherein the signature block comprises an XML tag indicating the repurposable signed data; andembedding information into the digital signature sufficient to recreate the static image from the signed data, the embedded information including one or more specifications of a computing environment used to present the static image.
  • 13. The computer-readable media of claim 12, wherein the acts further comprise embedding a second static image of the signed data into the second digital signature.
  • 14. The computer-readable media of claim 12, wherein the acts further comprise presenting an electronic document comprising the signed data and receiving a selection to sign the signed data.
  • 15. The computer-readable media of claim 12, wherein the acts further comprise embedding a certificate indicating an identity of the signer into the digital signature.
  • 16. The computer-readable media of claim 12, wherein the acts further comprise embedding comments into the digital signature.
  • 17. The computer-readable media of claim 12, wherein the acts further comprise embedding a time-stamp into the digital signature.
  • 18. The computer-readable media of claim 12, wherein the acts further comprise embedding custom information into the digital signature by extending the digital signature.
  • 19. The computer-readable media of claim 12, wherein the acts further comprise locking the digital signature by computing a strong cryptographic hash over the static image and the signed data.
  • 20. A method comprising: receiving a digital signature having an embedded static image of data, wherein at least a portion of the data is identifiable as signed data, and wherein the embedded static image provides a visual representation of the signed data as seen by a signer if signing the signed data, wherein the digital signature further comprises embedded information sufficient to recreate the static image from the signed data, the embedded information including one or more specifications of a computing environment used to present the static image; andrepurposing the signed data without breaking the digital signature, wherein the act of repurposing comprises: building a second digital signature of the signed data; andpresenting a static image of the signed data that is different than the embedded static image.
  • 21. The method of claim 20, further comprising recreating the static image from the signed data.
US Referenced Citations (635)
Number Name Date Kind
4201978 Nally May 1980 A
4498147 Agnew et al. Feb 1985 A
4514800 Gruner et al. Apr 1985 A
4564752 Lepic et al. Jan 1986 A
4641274 Swank Feb 1987 A
4674040 Barker et al. Jun 1987 A
4723211 Barker et al. Feb 1988 A
4739477 Barker et al. Apr 1988 A
4815029 Barker et al. Mar 1989 A
4847749 Collins et al. Jul 1989 A
4910663 Bailey Mar 1990 A
4933880 Borgendal et al. Jun 1990 A
4962475 Hernandez et al. Oct 1990 A
5025484 Yamanari et al. Jun 1991 A
5072412 Henderson, Jr. et al. Dec 1991 A
5179703 Evans Jan 1993 A
5182709 Makus Jan 1993 A
5187786 Densmore et al. Feb 1993 A
5191645 Carlucci et al. Mar 1993 A
5195183 Miller et al. Mar 1993 A
5204947 Bernstein et al. Apr 1993 A
5206951 Khoyi et al. Apr 1993 A
5218672 Morgan et al. Jun 1993 A
5222160 Sakai et al. Jun 1993 A
5228100 Takeda et al. Jul 1993 A
5237680 Adams et al. Aug 1993 A
5249275 Srivastava Sep 1993 A
5274803 Dubin et al. Dec 1993 A
5297249 Bernstein et al. Mar 1994 A
5297283 Kelly, Jr. et al. Mar 1994 A
5313631 Kao May 1994 A
5313646 Hendricks et al. May 1994 A
5317686 Salas et al. May 1994 A
5333317 Dann Jul 1994 A
5339423 Beitel et al. Aug 1994 A
5339424 Fushimi Aug 1994 A
5341478 Travis, Jr. et al. Aug 1994 A
5369766 Nakano et al. Nov 1994 A
5369778 San Soucie et al. Nov 1994 A
5371675 Greif et al. Dec 1994 A
5377323 Vasudevan Dec 1994 A
5379419 Heffernan et al. Jan 1995 A
5381547 Flug et al. Jan 1995 A
5390325 Miller Feb 1995 A
5396623 McCall et al. Mar 1995 A
5408665 Fitzgerald Apr 1995 A
5410646 Tondevold et al. Apr 1995 A
5410688 Williams et al. Apr 1995 A
5412772 Monson May 1995 A
5434975 Allen Jul 1995 A
5436637 Gayraud et al. Jul 1995 A
5438659 Notess et al. Aug 1995 A
5440744 Jacobson et al. Aug 1995 A
5446842 Schaeffer et al. Aug 1995 A
5455875 Chevion et al. Oct 1995 A
5459865 Heninger et al. Oct 1995 A
5481722 Skinner Jan 1996 A
5497489 Menne Mar 1996 A
5504898 Klein Apr 1996 A
5517655 Collins et al. May 1996 A
5535389 Elder et al. Jul 1996 A
5542070 LeBlanc et al. Jul 1996 A
5550976 Henderson et al. Aug 1996 A
5551035 Arnold et al. Aug 1996 A
5555325 Burger Sep 1996 A
5566330 Sheffield Oct 1996 A
5572643 Judson Nov 1996 A
5572648 Bibayan Nov 1996 A
5577252 Nelson et al. Nov 1996 A
5581686 Koppolu et al. Dec 1996 A
5581760 Atkinson et al. Dec 1996 A
5600789 Parker et al. Feb 1997 A
5602996 Powers, III et al. Feb 1997 A
5608720 Biegel et al. Mar 1997 A
5625783 Ezekiel et al. Apr 1997 A
5627979 Chang et al. May 1997 A
5630126 Redpath May 1997 A
5634121 Tracz et al. May 1997 A
5634124 Khoyi et al. May 1997 A
5640544 Onodera et al. Jun 1997 A
5644738 Goldman et al. Jul 1997 A
5649099 Theimer et al. Jul 1997 A
5659729 Nielsen Aug 1997 A
5664178 Sinofsky Sep 1997 A
5668966 Ono et al. Sep 1997 A
5669005 Curbow et al. Sep 1997 A
5682536 Atkinson et al. Oct 1997 A
5689667 Kurtenbach Nov 1997 A
5689703 Atkinson et al. Nov 1997 A
5704029 Wright, Jr. Dec 1997 A
5706501 Horikiri et al. Jan 1998 A
5717939 Bricklin et al. Feb 1998 A
5721824 Taylor Feb 1998 A
5740439 Atkinson et al. Apr 1998 A
5742504 Meyer et al. Apr 1998 A
5745683 Lee et al. Apr 1998 A
5745712 Turpin et al. Apr 1998 A
5748807 Lopresti et al. May 1998 A
5758184 Lucovsky et al. May 1998 A
5758358 Ebbo May 1998 A
5761408 Kolawa et al. Jun 1998 A
5761683 Logan et al. Jun 1998 A
5764984 Loucks Jun 1998 A
5764985 Smale Jun 1998 A
5778372 Cordell et al. Jul 1998 A
5778402 Gipson Jul 1998 A
5784555 Stone Jul 1998 A
5790796 Sadowsky Aug 1998 A
5798757 Smith Aug 1998 A
5801701 Koppolu et al. Sep 1998 A
5802304 Stone Sep 1998 A
5806079 Rivette et al. Sep 1998 A
5815830 Anthony Sep 1998 A
5826265 Van Huben et al. Oct 1998 A
5835777 Staelin Nov 1998 A
5838906 Doyle et al. Nov 1998 A
5842018 Atkinson et al. Nov 1998 A
5845077 Fawcett Dec 1998 A
5845090 Collins, III et al. Dec 1998 A
5854630 Nielsen Dec 1998 A
5859973 Carpenter et al. Jan 1999 A
5862372 Morris et al. Jan 1999 A
5862379 Rubin et al. Jan 1999 A
5864819 De Armas et al. Jan 1999 A
5907704 Gudmundson et al. May 1999 A
5910895 Proskauer et al. Jun 1999 A
5911776 Guck Jun 1999 A
5915112 Boutcher Jun 1999 A
5922072 Hutchinson et al. Jul 1999 A
5928363 Ruvolo Jul 1999 A
5929858 Shibata et al. Jul 1999 A
5940075 Mutschler, III et al. Aug 1999 A
5950010 Hesse et al. Sep 1999 A
5956481 Walsh et al. Sep 1999 A
5960199 Brodsky et al. Sep 1999 A
5963964 Nielsen Oct 1999 A
5973696 Agranat et al. Oct 1999 A
5974454 Apfel et al. Oct 1999 A
5982370 Kamper Nov 1999 A
5983348 Ji Nov 1999 A
5987480 Donohue et al. Nov 1999 A
5991710 Papineni et al. Nov 1999 A
5991731 Colon et al. Nov 1999 A
5991877 Luckenbaugh Nov 1999 A
5995103 Ashe Nov 1999 A
5999740 Rowley Dec 1999 A
6005570 Gayraud et al. Dec 1999 A
6014135 Fernandes Jan 2000 A
6016520 Facq et al. Jan 2000 A
6018743 Xu Jan 2000 A
6026379 Haller et al. Feb 2000 A
6026416 Kanerva et al. Feb 2000 A
6031989 Cordell Feb 2000 A
6035297 Van Huben et al. Mar 2000 A
6035309 Dauerer et al. Mar 2000 A
6044205 Reed et al. Mar 2000 A
6052531 Waldin et al. Apr 2000 A
6052710 Saliba et al. Apr 2000 A
6054987 Richardson Apr 2000 A
6072870 Nguyen et al. Jun 2000 A
6078326 Kilmer et al. Jun 2000 A
6078327 Liman et al. Jun 2000 A
6078924 Ainsbury et al. Jun 2000 A
6081610 Dwork et al. Jun 2000 A
6084585 Kraft et al. Jul 2000 A
6088708 Burch et al. Jul 2000 A
6091417 Lefkowitz Jul 2000 A
6094657 Hailpern et al. Jul 2000 A
6097382 Rosen et al. Aug 2000 A
6098081 Heidorn et al. Aug 2000 A
6108637 Blumenau Aug 2000 A
6108783 Krawczyk et al. Aug 2000 A
6115646 Fiszman et al. Sep 2000 A
6121965 Kenney et al. Sep 2000 A
6122647 Horowitz et al. Sep 2000 A
6144969 Inokuchi et al. Nov 2000 A
6151624 Teare et al. Nov 2000 A
6154128 Wookey et al. Nov 2000 A
6163772 Kramer et al. Dec 2000 A
6167521 Smith et al. Dec 2000 A
6167523 Strong Dec 2000 A
6182094 Humpleman et al. Jan 2001 B1
6182095 Leymaster et al. Jan 2001 B1
6188401 Peyer Feb 2001 B1
6191797 Politis Feb 2001 B1
6192367 Hawley et al. Feb 2001 B1
6195661 Filepp et al. Feb 2001 B1
6199204 Donohue Mar 2001 B1
6209128 Gerard et al. Mar 2001 B1
6216152 Wong et al. Apr 2001 B1
6219698 Iannucci et al. Apr 2001 B1
6225996 Gibb et al. May 2001 B1
6235027 Herzon May 2001 B1
6253366 Mutschler, III Jun 2001 B1
6253374 Dresevic et al. Jun 2001 B1
6263313 Milsted et al. Jul 2001 B1
6266810 Tanaka et al. Jul 2001 B1
6268852 Lindhorst et al. Jul 2001 B1
6272506 Bell Aug 2001 B1
6275227 DeStefano Aug 2001 B1
6275599 Adler et al. Aug 2001 B1
6279042 Ouchi Aug 2001 B1
6281896 Alimpich et al. Aug 2001 B1
6282711 Halpern et al. Aug 2001 B1
6286033 Kishinsky et al. Sep 2001 B1
6292897 Gennaro et al. Sep 2001 B1
6297819 Furst Oct 2001 B1
6300948 Geller et al. Oct 2001 B1
6307955 Zank et al. Oct 2001 B1
6308179 Petersen et al. Oct 2001 B1
6308273 Goertzel et al. Oct 2001 B1
6311271 Gennaro et al. Oct 2001 B1
6314415 Mukherjee Nov 2001 B1
6321259 Ouellette et al. Nov 2001 B1
6321334 Jerger et al. Nov 2001 B1
6327628 Anuff et al. Dec 2001 B1
6331864 Coco et al. Dec 2001 B1
6342907 Petty et al. Jan 2002 B1
6343149 Motoiwa Jan 2002 B1
6343302 Graham Jan 2002 B1
6345256 Milsted et al. Feb 2002 B1
6345278 Hitchcock et al. Feb 2002 B1
6345361 Jerger et al. Feb 2002 B1
6347323 Garber et al. Feb 2002 B1
6349408 Smith Feb 2002 B1
6351574 Yair et al. Feb 2002 B1
6353851 Anupam et al. Mar 2002 B1
6353926 Parthesarathy et al. Mar 2002 B1
6356906 Lippert et al. Mar 2002 B1
6357038 Scouten Mar 2002 B1
6366907 Fanning et al. Apr 2002 B1
6366912 Wallent et al. Apr 2002 B1
6367013 Bisbee et al. Apr 2002 B1
6369840 Barnett et al. Apr 2002 B1
6369841 Salomon et al. Apr 2002 B1
6374402 Schmeidler et al. Apr 2002 B1
6381742 Forbes et al. Apr 2002 B2
6381743 Mutschler, III Apr 2002 B1
6389434 Rivette et al. May 2002 B1
6393456 Ambler et al. May 2002 B1
6396488 Simmons et al. May 2002 B1
6405221 Levine et al. Jun 2002 B1
6408311 Baisley et al. Jun 2002 B1
6414700 Kurtenbach et al. Jul 2002 B1
6421070 Ramos et al. Jul 2002 B1
6421656 Cheng et al. Jul 2002 B1
6425125 Fries et al. Jul 2002 B1
6429885 Salb et al. Aug 2002 B1
6434563 Pasquali et al. Aug 2002 B1
6434564 Ebert Aug 2002 B2
6442563 Bacon et al. Aug 2002 B1
6442755 Lemmons et al. Aug 2002 B1
6446110 Lection et al. Sep 2002 B1
6449617 Quinn et al. Sep 2002 B1
6457009 Bollay Sep 2002 B1
6460058 Koppolu et al. Oct 2002 B2
6463419 Kluss Oct 2002 B1
6470349 Heninger et al. Oct 2002 B1
6473800 Jerger et al. Oct 2002 B1
6476828 Burkett et al. Nov 2002 B1
6476833 Moshfeghi Nov 2002 B1
6477544 Bolosky et al. Nov 2002 B1
6480860 Monday Nov 2002 B1
6487566 Sundaresan Nov 2002 B1
6490601 Markus et al. Dec 2002 B1
6493702 Adar et al. Dec 2002 B1
6501864 Eguchi et al. Dec 2002 B1
6502101 Verprauskus et al. Dec 2002 B1
6502103 Frey et al. Dec 2002 B1
6505230 Mohan et al. Jan 2003 B1
6505300 Chan et al. Jan 2003 B2
6507856 Chen et al. Jan 2003 B1
6516322 Meredith Feb 2003 B1
6519617 Wanderski et al. Feb 2003 B1
RE38070 Spies et al. Apr 2003 E
6546546 Van Doorn et al. Apr 2003 B1
6549221 Brown et al. Apr 2003 B1
6549878 Lowry et al. Apr 2003 B1
6549922 Srivastava et al. Apr 2003 B1
6553402 Makarios et al. Apr 2003 B1
6560616 Garber May 2003 B1
6560620 Ching May 2003 B1
6560640 Smethers May 2003 B2
6563514 Samar May 2003 B1
6571253 Thompson et al. May 2003 B1
6578144 Gennaro et al. Jun 2003 B1
6581061 Graham Jun 2003 B2
6584469 Chiang et al. Jun 2003 B1
6584548 Bourne et al. Jun 2003 B1
6585778 Hind et al. Jul 2003 B1
6589290 Maxwell et al. Jul 2003 B1
6594686 Edwards et al. Jul 2003 B1
6598219 Lau Jul 2003 B1
6603489 Edlund et al. Aug 2003 B1
6604099 Chung et al. Aug 2003 B1
6606606 Starr Aug 2003 B2
6609200 Anderson et al. Aug 2003 B2
6611822 Beams et al. Aug 2003 B1
6611840 Baer et al. Aug 2003 B1
6611843 Jacobs Aug 2003 B1
6613098 Sorge et al. Sep 2003 B1
6615276 Mastrianni et al. Sep 2003 B1
6629109 Koshisaka Sep 2003 B1
6631357 Perkowski Oct 2003 B1
6631379 Cox Oct 2003 B2
6631497 Jamshidi et al. Oct 2003 B1
6631519 Nicholson et al. Oct 2003 B1
6632251 Rutten et al. Oct 2003 B1
6635089 Burkett et al. Oct 2003 B1
6636845 Chau et al. Oct 2003 B2
6643633 Chau et al. Nov 2003 B2
6643652 Helgeson et al. Nov 2003 B2
6643684 Malkin et al. Nov 2003 B1
6651217 Kennedy et al. Nov 2003 B1
6654737 Nunez Nov 2003 B1
6654932 Bahrs et al. Nov 2003 B1
6658417 Stakutis et al. Dec 2003 B1
6658622 Aiken et al. Dec 2003 B1
6661920 Skinner Dec 2003 B1
6668369 Krebs et al. Dec 2003 B1
6671805 Brown et al. Dec 2003 B1
6675202 Perttunen Jan 2004 B1
6678717 Schneider Jan 2004 B1
6681370 Gounares et al. Jan 2004 B2
6691230 Bardon Feb 2004 B1
6691281 Sorge et al. Feb 2004 B1
6697944 Jones et al. Feb 2004 B1
6701434 Rohatgi Mar 2004 B1
6701486 Weber et al. Mar 2004 B1
6704906 Yankovich et al. Mar 2004 B1
6711679 Guski et al. Mar 2004 B1
6720985 Silverbrook et al. Apr 2004 B1
6725426 Pavlov Apr 2004 B1
6728755 de Ment Apr 2004 B1
6735721 Morrow et al. May 2004 B1
6745367 Bates et al. Jun 2004 B1
6748385 Rodkin et al. Jun 2004 B1
6751777 Bates et al. Jun 2004 B2
6754874 Richman Jun 2004 B1
6757826 Paltenghe Jun 2004 B1
6757868 Glaser et al. Jun 2004 B1
6760723 Oshinsky et al. Jul 2004 B2
6763343 Brooke et al. Jul 2004 B1
6772139 Smith, III Aug 2004 B1
6772165 O'Carroll Aug 2004 B2
6774926 Ellis et al. Aug 2004 B1
6779154 Nussbaum et al. Aug 2004 B1
6781609 Barker et al. Aug 2004 B1
6782144 Bellavita et al. Aug 2004 B2
6799299 Li et al. Sep 2004 B1
6801929 Donoho et al. Oct 2004 B1
6816849 Halt, Jr. Nov 2004 B1
6845380 Su et al. Jan 2005 B2
6845499 Srivastava et al. Jan 2005 B2
6847387 Roth Jan 2005 B2
6848078 Birsan et al. Jan 2005 B1
6871220 Rajan et al. Mar 2005 B1
6874130 Baweja et al. Mar 2005 B1
6876996 Czajkowski et al. Apr 2005 B2
6889359 Conner et al. May 2005 B1
6901403 Bata et al. May 2005 B1
6915454 Moore et al. Jul 2005 B1
6931532 Davis et al. Aug 2005 B1
6941510 Ozzie et al. Sep 2005 B1
6941511 Hind et al. Sep 2005 B1
6941521 Lin et al. Sep 2005 B2
6948129 Loghmani Sep 2005 B1
6948133 Haley Sep 2005 B2
6948135 Ruthfield et al. Sep 2005 B1
6950980 Malcolm Sep 2005 B1
6961897 Peel, Jr. et al. Nov 2005 B1
6963875 Moore et al. Nov 2005 B2
6968503 Chang et al. Nov 2005 B1
6968505 Stoll et al. Nov 2005 B2
6993714 Kaler et al. Jan 2006 B2
6996776 Makely et al. Feb 2006 B1
6996781 Myers et al. Feb 2006 B1
7000179 Yankovich et al. Feb 2006 B2
7002560 Graham Feb 2006 B2
7003722 Rothchiller et al. Feb 2006 B2
7010580 Fu et al. Mar 2006 B1
7020869 Abrari et al. Mar 2006 B2
7024417 Russakovsky et al. Apr 2006 B1
7032170 Poulose Apr 2006 B2
7036072 Sulistio et al. Apr 2006 B1
7039875 Khalfay et al. May 2006 B2
7051273 Holt et al. May 2006 B1
7058663 Johnston et al. Jun 2006 B2
7062764 Cohen et al. Jun 2006 B2
7065493 Homsi Jun 2006 B1
7080083 Kim et al. Jul 2006 B2
7080325 Treibach-Heck et al. Jul 2006 B2
7086009 Resnick et al. Aug 2006 B2
7086042 Abe et al. Aug 2006 B2
7088374 David et al. Aug 2006 B2
7100147 Miller et al. Aug 2006 B2
7103611 Murthy et al. Sep 2006 B2
7106888 Silverbrook et al. Sep 2006 B1
7107282 Yalamanchi Sep 2006 B1
7107521 Santos Sep 2006 B2
7146564 Kim et al. Dec 2006 B2
7152205 Day et al. Dec 2006 B2
7168035 Bell et al. Jan 2007 B1
7178166 Taylor et al. Feb 2007 B1
7190376 Tonisson Mar 2007 B1
7191394 Ardeleanu et al. Mar 2007 B1
7213200 Abe et al. May 2007 B2
7236982 Zlatanov et al. Jun 2007 B2
7272789 O'Brien Sep 2007 B2
7281018 Begun et al. Oct 2007 B1
7296017 Larcheveque et al. Nov 2007 B2
7313758 Kozlov Dec 2007 B2
7316003 Dulepet et al. Jan 2008 B1
7318237 Moriconi et al. Jan 2008 B2
7334178 Stanciu et al. Feb 2008 B1
20010007109 Lange Jul 2001 A1
20010022592 Alimpich et al. Sep 2001 A1
20010024195 Hayakawa Sep 2001 A1
20010037345 Kiernan et al. Nov 2001 A1
20010054004 Powers Dec 2001 A1
20010056429 Moore et al. Dec 2001 A1
20010056460 Sahota et al. Dec 2001 A1
20020010700 Wotring Jan 2002 A1
20020010743 Ryan et al. Jan 2002 A1
20020010746 Jilk, Jr. et al. Jan 2002 A1
20020013788 Pennell et al. Jan 2002 A1
20020019941 Chan et al. Feb 2002 A1
20020023113 Hsing et al. Feb 2002 A1
20020026441 Kutay et al. Feb 2002 A1
20020026461 Kutay et al. Feb 2002 A1
20020032590 Anand et al. Mar 2002 A1
20020032692 Suzuki et al. Mar 2002 A1
20020032706 Perla et al. Mar 2002 A1
20020032768 Voskuil Mar 2002 A1
20020035579 Wang et al. Mar 2002 A1
20020035581 Reynar et al. Mar 2002 A1
20020040469 Pramberger Apr 2002 A1
20020054126 Gamon May 2002 A1
20020057297 Grimes et al. May 2002 A1
20020065798 Bostleman et al. May 2002 A1
20020065847 Furukawa et al. May 2002 A1
20020070973 Croley Jun 2002 A1
20020078074 Cho et al. Jun 2002 A1
20020078103 Gorman et al. Jun 2002 A1
20020083318 Larose Jun 2002 A1
20020099952 Lambert et al. Jul 2002 A1
20020100027 Binding et al. Jul 2002 A1
20020112224 Cox Aug 2002 A1
20020129056 Conant Sep 2002 A1
20020133484 Chau et al. Sep 2002 A1
20020152222 Holbrook Oct 2002 A1
20020152244 Dean et al. Oct 2002 A1
20020156772 Chau et al. Oct 2002 A1
20020156846 Rawat et al. Oct 2002 A1
20020156929 Hekmatpour Oct 2002 A1
20020169752 Kusama et al. Nov 2002 A1
20020169789 Kutay et al. Nov 2002 A1
20020174147 Wang et al. Nov 2002 A1
20020174417 Sijacic et al. Nov 2002 A1
20020178380 Wolf et al. Nov 2002 A1
20020184219 Preisig et al. Dec 2002 A1
20020188597 Kern et al. Dec 2002 A1
20020188613 Chakraborty et al. Dec 2002 A1
20020194219 Bradley et al. Dec 2002 A1
20020196281 Audleman et al. Dec 2002 A1
20020196288 Emrani Dec 2002 A1
20020198891 Li et al. Dec 2002 A1
20020198935 Crandall, Sr. et al. Dec 2002 A1
20030004951 Chokshi Jan 2003 A1
20030007000 Carlson et al. Jan 2003 A1
20030014397 Chau et al. Jan 2003 A1
20030018668 Britton et al. Jan 2003 A1
20030020746 Chen et al. Jan 2003 A1
20030023641 Gorman et al. Jan 2003 A1
20030025732 Prichard Feb 2003 A1
20030026507 Zlotnick Feb 2003 A1
20030028550 Lee et al. Feb 2003 A1
20030037303 Bodlaender et al. Feb 2003 A1
20030043986 Creamer et al. Mar 2003 A1
20030046665 Ilin Mar 2003 A1
20030048301 Menninger Mar 2003 A1
20030051243 Lemmons et al. Mar 2003 A1
20030055811 Stork et al. Mar 2003 A1
20030055828 Koch et al. Mar 2003 A1
20030056198 Al-Azzawe et al. Mar 2003 A1
20030061386 Brown Mar 2003 A1
20030061567 Brown et al. Mar 2003 A1
20030084424 Reddy et al. May 2003 A1
20030093755 O'Carroll May 2003 A1
20030110443 Yankovich et al. Jun 2003 A1
20030120578 Newman Jun 2003 A1
20030120651 Bernstein et al. Jun 2003 A1
20030120659 Sridhar et al. Jun 2003 A1
20030120671 Kim et al. Jun 2003 A1
20030120686 Kim et al. Jun 2003 A1
20030126555 Aggarwal et al. Jul 2003 A1
20030128196 Lapstun et al. Jul 2003 A1
20030135825 Gertner et al. Jul 2003 A1
20030140132 Champagne et al. Jul 2003 A1
20030158897 Ben-Natan et al. Aug 2003 A1
20030163285 Nakamura et al. Aug 2003 A1
20030167277 Hejlsberg et al. Sep 2003 A1
20030182268 Lal Sep 2003 A1
20030182327 Ramanujam et al. Sep 2003 A1
20030187756 Klivington et al. Oct 2003 A1
20030187930 Ghaffar et al. Oct 2003 A1
20030188260 Jensen et al. Oct 2003 A1
20030189593 Yarvin Oct 2003 A1
20030192008 Lee Oct 2003 A1
20030200506 Abe et al. Oct 2003 A1
20030204511 Brundage Oct 2003 A1
20030204814 Elo et al. Oct 2003 A1
20030205615 Marappan Nov 2003 A1
20030212664 Breining et al. Nov 2003 A1
20030212902 van der Made Nov 2003 A1
20030217053 Bachman et al. Nov 2003 A1
20030220930 Milleker et al. Nov 2003 A1
20030225469 DeRemer et al. Dec 2003 A1
20030225768 Chaudhuri Dec 2003 A1
20030225829 Pena et al. Dec 2003 A1
20030226132 Tondreau et al. Dec 2003 A1
20030233374 Spinola et al. Dec 2003 A1
20030233644 Cohen et al. Dec 2003 A1
20030236859 Vaschillo et al. Dec 2003 A1
20030236903 Piotrowski Dec 2003 A1
20030237046 Parker et al. Dec 2003 A1
20030237047 Borson Dec 2003 A1
20040002939 Arora Jan 2004 A1
20040003031 Brown et al. Jan 2004 A1
20040003353 Rivera et al. Jan 2004 A1
20040003389 Reynar et al. Jan 2004 A1
20040010752 Chan et al. Jan 2004 A1
20040024842 Witt Feb 2004 A1
20040030991 Hepworth et al. Feb 2004 A1
20040039990 Bakar et al. Feb 2004 A1
20040039993 Kougiouris et al. Feb 2004 A1
20040044961 Pesenson Mar 2004 A1
20040044965 Toyama et al. Mar 2004 A1
20040054966 Busch et al. Mar 2004 A1
20040059754 Barghout et al. Mar 2004 A1
20040073565 Kaufman et al. Apr 2004 A1
20040073868 Easter et al. Apr 2004 A1
20040078756 Napper et al. Apr 2004 A1
20040083426 Sahu Apr 2004 A1
20040088647 Miller et al. May 2004 A1
20040088652 Abe et al. May 2004 A1
20040093596 Koyano May 2004 A1
20040107367 Kisters Jun 2004 A1
20040117769 Lauzon et al. Jun 2004 A1
20040123277 Schrader et al. Jun 2004 A1
20040146199 Berkner et al. Jul 2004 A1
20040163041 Engel Aug 2004 A1
20040172442 Ripley Sep 2004 A1
20040181711 Johnson et al. Sep 2004 A1
20040186762 Beaven et al. Sep 2004 A1
20040189716 Paoli et al. Sep 2004 A1
20040194035 Chakraborty Sep 2004 A1
20040205473 Fisher et al. Oct 2004 A1
20040205525 Murren et al. Oct 2004 A1
20040205534 Koelle Oct 2004 A1
20040205571 Adler et al. Oct 2004 A1
20040205592 Huang Oct 2004 A1
20040205605 Adler et al. Oct 2004 A1
20040205653 Hadfield et al. Oct 2004 A1
20040205671 Sukehiro et al. Oct 2004 A1
20040210599 Friedman et al. Oct 2004 A1
20040221238 Cifra et al. Nov 2004 A1
20040221245 Chickles et al. Nov 2004 A1
20040237030 Malkin Nov 2004 A1
20040261019 Imamura et al. Dec 2004 A1
20040268229 Paoli et al. Dec 2004 A1
20050004893 Sangroniz Jan 2005 A1
20050005248 Rockey et al. Jan 2005 A1
20050015279 Rucker Jan 2005 A1
20050015732 Vedula et al. Jan 2005 A1
20050022115 Baumgartner et al. Jan 2005 A1
20050027757 Klessig et al. Feb 2005 A1
20050033728 James Feb 2005 A1
20050038711 Marlelo Feb 2005 A1
20050055627 Lloyd et al. Mar 2005 A1
20050060324 Johnson et al. Mar 2005 A1
20050060721 Choudhary et al. Mar 2005 A1
20050065933 Goering Mar 2005 A1
20050065936 Goering Mar 2005 A1
20050066287 Tattrie et al. Mar 2005 A1
20050071752 Marlatt Mar 2005 A1
20050076049 Qubti et al. Apr 2005 A1
20050091285 Krishnan et al. Apr 2005 A1
20050091305 Lange et al. Apr 2005 A1
20050102370 Lin et al. May 2005 A1
20050102612 Allan et al. May 2005 A1
20050108104 Woo May 2005 A1
20050108624 Carrier May 2005 A1
20050114757 Sahota et al. May 2005 A1
20050132196 Dietl Jun 2005 A1
20050138086 Pecht-Seibert Jun 2005 A1
20050138539 Bravery et al. Jun 2005 A1
20050171746 Thalhammer-Reyero Aug 2005 A1
20050198086 Moore et al. Sep 2005 A1
20050198125 Macleod Beck et al. Sep 2005 A1
20050198247 Perry et al. Sep 2005 A1
20050223063 Chang et al. Oct 2005 A1
20050223320 Brintzenhofe et al. Oct 2005 A1
20050246304 Knight et al. Nov 2005 A1
20050268222 Cheng Dec 2005 A1
20060020586 Prompt et al. Jan 2006 A1
20060026534 Ruthfield et al. Feb 2006 A1
20060031757 Vincent, III Feb 2006 A9
20060036995 Chickles et al. Feb 2006 A1
20060041838 Khan Feb 2006 A1
20060059434 Boss et al. Mar 2006 A1
20060069605 Hatoun Mar 2006 A1
20060069985 Friedman et al. Mar 2006 A1
20060080657 Goodman Apr 2006 A1
20060085409 Rys et al. Apr 2006 A1
20060101037 Brill et al. May 2006 A1
20060101051 Carr et al. May 2006 A1
20060129978 Abrari et al. Jun 2006 A1
20060143220 Spencer, Jr. Jun 2006 A1
20060161559 Bordawekar et al. Jul 2006 A1
20060200754 Kablesh et al. Sep 2006 A1
20070036433 Teutsch Feb 2007 A1
20070050719 Lui et al. Mar 2007 A1
20070061467 Essey Mar 2007 A1
20070061706 Cupala Mar 2007 A1
20070074106 Ardeleanu Mar 2007 A1
20070094589 Paoli Apr 2007 A1
20070100877 Paoli May 2007 A1
20070101280 Paoli May 2007 A1
20070118803 Walker et al. May 2007 A1
20070130504 Betancourt et al. Jun 2007 A1
20070186157 Walker et al. Aug 2007 A1
20070208606 MacKay et al. Sep 2007 A1
20070208769 Boehm et al. Sep 2007 A1
20080028340 Davis Jan 2008 A1
Foreign Referenced Citations (20)
Number Date Country
0841615 Nov 1999 EP
0961197 Dec 1999 EP
1076290 Feb 2001 EP
1221661 Jul 2002 EP
3191429 Jan 1900 JP
63085960 Apr 1988 JP
401173140 Jul 1989 JP
4225466 Aug 1992 JP
5314152 Nov 1993 JP
406014105 Jan 1994 JP
6139241 May 1994 JP
6180697 Jun 1994 JP
6180698 Jun 1994 JP
2000132436 May 2000 JP
2002183652 Jun 2002 JP
2003173288 Jun 2003 JP
WO 9924945 May 1999 WO
WO 9956207 Nov 1999 WO
WO 0144934 Jun 2001 WO
WO0157720 Aug 2001 WO