The invention relates to data collection devices and more particularly to a transaction terminal for use in aiding purchase transactions and other transactions.
“Transaction terminals” of the type having a data collection (e.g. mag stripe, smart card) input and signature capture capability for attachment to a point-of-sale (POS) network are growing in popularity. Unfortunately, currently available transaction terminals have been observed to exhibit numerous limitations.
For example, while presently available transaction terminals often are configured to prompt a user to enter personal identification (PIN) information, presently available transaction terminal lack adequate security features for assuring that the PIN information cannot be stolen, either by overriding of an encryption routine or by theft of encryption keys.
Presently available transaction terminals are also lacking in security features for monitoring presentation fraud. For example, while transaction terminals prompt a user to enter PIN information and to enter a signature, they are lacking in features which would enable determination of whether the person presenting information is in fact the person he purports to be.
The physical housings presently available transaction terminals have also observed to be problematic. The reading unit of presently available transaction terminals is a “swipe” style mag strip card reader which defines a slit opening on the top of the terminal. The orientation and configuration of these swipe-style slot transaction terminals force a reader into assuming uncomfortable and awkward body and arm positions during the reading process.
Other problems with present day transaction terminals exist as well. For example, present day transaction terminal allow unscrupulous persons to open the terminal, and remove secure information bearing microchips or to syphon information from the chips.
There is a need to address these and other problems observed with presently available transaction terminals.
According to its major aspects and broadly stated the invention is an ergonomically designed multifunctional transaction terminal for use in various transactions such as transactions involving credit cards, debit cards, and customer loyalty cards.
A transactional terminal according to the invention in one possible embodiment includes a housing having a top portion partially defined by a touch screen, a base, and an enlarged head portion extending forwardly from the base to define a lip. An insert style card reader having horizontally oriented feed slot opening toward the front of the housing is disposed in the lip of the housing. The feed slot may be angled downward slightly to reduce build up in the slot and to encourage a sweeping action on the part of a card during card removal. The touch screen may be angled downward in coplanar relationship with the feed slot to improve visibility of the touch screen and to improve simultaneous observation of touch screen and card indicia. The housing may include a detachable riser and may be adapted to receive a detachable holder apparatus for holding a stylus.
The transaction terminal according to the invention may further include numerous other features including a secure information entry circuit, a tamper detection security feature, an improved data I/O system, and an improved user interface system.
These and other details and advantages will become apparent from the detailed description of the preferred embodiment hereinbelow.
a and 1b are perspective views of an exemplary transaction terminal according to the invention;
c is a top view of an exemplary transaction terminal according to the invention;
e is a side view of an exemplary transaction terminal according to the invention;
f is a side view of a wedge style user according to the invention;
g is a bottom perspective view of a transaction terminal according to the invention;
h and 1i are cutaway side views of an exemplary transaction terminal according to the invention;
j and 1k are bottom perspective views of an exemplary transaction terminal according to the invention having SAMS access doors;
m is a terminal according to the invention including an integrated fingerprint scanner.
n shows a universal cable of the invention;
o is a top view of a universal connection of the invention;
p is a side view of a terminal including an optical reader;
q is a front view of a terminal according to the invention including an optical reader, a retinal scanner and a fingerprint scanner;
r is a perspective view of a riser.
s-1t are view of terminals in an exemplary embodiment for illustrating dimensional features.
a is a functional electrical block diagram of an exemplary transaction terminal according to the invention;
b is an exemplary chip system architecture diagram of an exemplary transaction terminal according to the invention;
c is a functional electrical block diagram showing of a security block shown in the block diagram of
d shows an alternative embodiment of a security block according to the invention;
e shows a functional block diagram of a secure information entry circuit of the invention;
f and 2g are memory maps illustrating just two of several possible embodiments of firmware;
h is a flow diagram illustrating an exemplary encryption routine according to the invention;
a is a flow diagram illustrating a flow of events in a typical POS transaction;
b-3e show various embodiments of possible POS networks;
f-3g illustrate alternative cash registers which may be disposed in communication with a transaction terminal of the invention;
a is an exemplary assembly diagram for an exemplary transaction terminal according to the invention;
b and 4c are detailed assembly diagrams illustrating a break-in detection feature according to the invention;
d is a partial exploded perspective view of a main PCB of an exemplary transaction terminal according to the invention;
a is a side view of an exemplary stylus and cord according to the invention;
b is a cutaway partial side view of the stylus shown in
c, 5d, and 5f are perspective views of a stylus holder assembly according to the invention;
e is a side view of a holder assembly according to the invention;
a-6d are various perspective views of a hybrid reader unit which may be incorporated in a transaction terminal according to the invention;
a-7b are functional diagrams illustrating a brooming effect of the invention;
c is a business model diagram illustrating a method for marketing ad supplying a terminal according to the invention;
a-8b are function lay-out diagrams of a touch screen overlay;
Perspective views of a transaction terminal according to the invention, which may be adapted for reading card information, for secure receipt of personal identification (PIN) information, for signature capture, and numerous other functions are shown in
Transaction terminal 10 includes a rugged housing 11 having a top 11a, a bottom 11b, a front 11f, and sides 11s. Housing 11 further includes a base portion 11bs and an enlarged head portion 11h extending forwardly from base 11b to define a lip 11L. Integrated in the top 11T of terminal is a touch screen 20, which will be described herein, comprises a display 234 and a touch sensitive overlay 23 disposed over display 234. Disposed in housing lip 11L and opening toward front 11F of housing 11 is an insert-style card reader 240. Housing 11 further includes a detachable riser 11R and a tangle-resistant stylus 30 disposed in a specially configured holder apparatus 40 adapted for attachment either on housing 11 or on another member separate from housing 10. Terminal 10 further includes I/O connection ports 40 and 42 for allowing communication with other computer systems such as cash registers, or other host computer systems, e.g server system, or hub computer systems as will be described later herein.
A high level electrical block diagram of terminal 10 is shown in
Control circuit 210 may be in communication with other types of of memory including “flash” type memory, e.g. a memory device 216F sold under the commercial names “Multimedia MMC,” “Smart Media,” “Compact Flash,” and “Memory Stick.” Flash type memory devices are especially useful for storing image data and signature data. Memory 216 which may be included in or in communication with control circuit 210 may also comprise a long term storage device 216s such as a hard drive, a floppy disk, or a compact disc. It has become increasingly common to package memory devices, particularly RAM and ROM devices within a single IC chip including control circuit CPU 212, RAM 216, and ROM 218.
Control circuit 210 is in communication with a number of components, including reader unit 240 which in a preferred embodiment in an insert style (also known as “dip” style) hybrid magnetic stripe and smart card reader/writer. Hybrid reader 240 may be an OEM integrated unit, e.g. a ZU series reader of the type available from Matsushita of Japan, an ST-40 series hybrid reader available from Secure-Tech, or a hybrid reader of the type available from IDTECH. Hybrid reader unit 240 includes a mag stripe reader 241 in communication with magnetic control and decode circuit 242, and smart card reader/writer 243 in communication with smart card control and decode circuit 244. Hybrid reader unit 240 may be disposed in pocket 13 defined in lower section 11LW of housing 11 as seen in assembly view
Control circuit 210 in the embodiment of
Another user interface data input device which may be disposed in communication with control circuit 210 is an optical reader unit having imaging assembly 263 and associated control and decode out circuit 264. Decoding could also be carried out by control circuit 210. A model IT 4200 optical reader module with decode out circuit of the type available from Hand Held Products, Inc. may be selected to provide the function indicated by blocks 263 and 264. Assembly 263 could also be a linear assembly. Embodiments of transaction terminals according to the invention including an optical reader unit having 263 are shown in
It will be appreciated that significant functionality is added to terminal 10 when terminal is equipped with an optical reader. When terminal 10 includes a 2D reader control circuit 210 can store frames of image data into memory e.g. memory 216f. Optical reader 263 can be controlled for use in capturing frames of image data comprising handwritten signatures. If control circuit 210 determines that a signature capture mode using touch screen 20 fails, control circuit 210 may display a prompt prompting a user to dispose a signature bearing substrate in the field of view of imaging assembly 263. Circuit 210 may further display on screen 20 a button for actuating image capture, then capture a signature when a user actuates a control button. By storing the image representation including a signature representation into memory 216. The symbol decoding functionality of reader unit including assembly 263 coupled with the image capture functionality of assembly 263 renders terminal 10 operable to execute numerous types of user-interactive methods which are useful for fraud prevention and other purposes. U.S. Ser. No. 09/788,179, entitled “Identification Card Reader” filed Feb. 16, 2001, and assigned to the assignee of the present invention describes numerous methods for determining whether a card holder is the person he purports to be utilizing an optical reader having image capture and decode capability and numerous other methods relating to identification and fraud prevention. Applicants hereby expressly incorporate herein U.S. Ser. No. 09/788,179 in its entirety by reference. It is seen from
Still further, control circuit 210 may be in communication with a fingerprint scanner unit having a scanner 265 and associated control circuitry 266. A fingerprint scan unit may be provided by, for example, by a BERGDATA OEM module fingerprint scan unit or an ULTRA SCAN Corp. Series 400 OEM Fingerprint Scan unit. Transaction terminal 10 may capture an electronic fingerprint representation and send the electronic fingerprint representation to a non-integral computer system such as a computer system of Network 380, and Network 380 may perform the identification. Also Network 380 may periodically download a database of relevant electronic fingerprint authorizations for use by control circuit 210 in performing fingerprint identification functions. Transaction terminals according to the invention comprising integrated fingerprint scanning units are shown in
Transaction terminal 10 can also include a retinal scan unit including scanner 267 associated control circuit 268. A scan unit including scanner 267 and control circuit 268 may be provided by components from an Icam 2001 retina scan unit available from Eye Dentify Corp. Control circuit 210 may perform identifications based on captured retinal scan signatures by transmitting captured electronic retinal signatures to a nonintegrated computer system for identification, e.g. to Network 380, or by downloading a database of signatures from e.g. Network 380 for identification by circuit 210. A retinal scanning transaction terminal 10 is shown in
Transaction terminal 10 further includes a touch pad screen 20 including a display 234 and a touch pad overlay 230. Touch pad screen or “touch screen” 20 displays information to a user such as prompt information, a virtual keypad, and advertising messages, etc. Touch screen 20 also serves as a means to input data. Touch screen 20 serves as both a virtual keypad and signature capture platform. Touch pad screen 20 may comprise an LCD display 234 in combination with a touch screen overlay 230. Display 234, e.g. may be a 5.7″, ¼ VGA (320×240) resolution color or monochrome LCD screen of the type available from Nan Ya Corporation. Display 334 may be driven by an on-chip LCD controller available on a microchip including circuit CPU 212 if circuit is appropriately selected, or in association with dedicated control circuit 235 as shown in
Touch screen overlay 230 may be, for example, a Nissa NIS/RC-872 overlay with parallel interface. Touch screen overlay 230 typically operates in association with touch screen controller 231. Touch screen control circuit 231, like LCD circuit 235 can be integrated in an IC comprising element control circuit 210. In the embodiment shown in assembly view
As shown in
The inventors found that the optimal configuration for touch screen overly 230 varies depending on the intended actuation mechanism for touch screen 20. In certain applications, touch screens are designated for actuation by a finger, in other application stylus 74 and in other applications, such as in terminal 10, both. Touch screen overlays comprise support mechanisms known as “microdots” 820 which are interposed between two layers of overlay 230 as best seen in
In the invention described with reference to
Preferably, the remaining characteristics of overlay 230 remain as they would have been in the absence of the described microdot spacing variation. That is, layers 810, 812, and 814 of touch screen overlay 230 remain single unitary sheets of light transmissive material. Zones 806 and 808 could also comprise separate and x-y dimension spaced apart sections of layering material. However, such a configuration, among other disadvantages would not allow a person entering signature information to exceed the bounds of signature zone during the course of entering signature data and still have the signature data received.
Referring to further components of terminal 10, terminal 10 may include secure circuit block 220, to be described in greater detail herein in communication with circuit 210 for preventing theft of electronically stored information such as PIN information.
Still further, transaction terminal 10 includes at least one and preferably more than one communication interface for providing communication with an external computer system such as a cash register 340 or a computer system 350 and 360 of a POS network to be described herein. In the specific embodiment shown in the block diagram of
Terminal 10 can also include such interfaces as a PCMCIA interface 255 in communication with a PCMCIA slot connector 44. Slot connecter 44 may receive, for example, an RF communication card, a flash memory card, an optical reader PCMCIA card or other commonly available PCMCIA cards. PCMCIA slot connector 44 may be disposed to be accessible from the outside of housing 11 or else PCMCIA slot connector 44 may be accessible from the interior of housing 11 only. An RF or other wireless type of interface may also be provided in hard-wired communication with control circuit 210, e.g. an IR interface 277, shown in
In accordance with the invention, several interfaces can be physically packaged to terminate at housing 11 of terminal 10 in a single electrical connector port 42. As will be discussed in greater detail herein transaction terminal 10 is commonly connected in communication with a cash register 340 which is PC based or PC compatible. Cash registers commonly comprise at least one of four major types of communication connector ports: PC USB, IBM retail USB, RS232 or RS485 physical connector ports, each having a different PIN configuration. In accordance with the invention, terminal 10 includes a universal connector port 42 which includes a plurality of pins, wherein at least a first pin or group 51 of pins P are in communication with a first type of interface (e.g. USB), at least a second pin or group of pins 52 are in communication within a second type of interface (e.g. RS 232). Universal connector port 42 of terminal 10 may include additional groups of pins in communication with additional types of interface. For example, a third group of pins 53 may be are in communication with a third type of interface (e.g. RS485) certain types of interfaces may be adapted so that pins “P” of universal port 42 are shared. For example, RS 232 and RS 485 interfaces can be adapted so that pins of the interfaces are shared with use of switching circuitry 272 as will be described herein.
When terminal 10 comprises universal connector port 42, a supplier of terminal 10 supplies along with terminal 10 a cable 60 for connection with universal connector 42 which is available in one of N varieties, where N is the number of interfaces that universal connector port 42 is in communication with within terminal 10. Thus, if universal connector port 42 is connected to four different interfaces (RS 232, RS485, IBM retail USB, PC USB), then a supplier 10 will make available cable 60 in one of four varieties. Each variety of cable 60 will have a proximal end connector 61 which interfaces with universal connector 42. Thus, if universal connector is a 15 socket connector, the proximal end of each variety of cable will include a proximal end connector 61 having 15 pins. The varieties of cables will differ in the connector of distal end 62. The first variety of cable will have distal end connector 62 in accordance with the standard connector form of the first type of interface, the second variety of cable 60 will have a distal end connector 62 in accordance with the standard connector format of the second type of interface and so on. A customer will order the appropriate variety of cable from a supplier depending on the type of interface terminal that will be interfaced within a cash register or other host computer system. In the alternative, a supplier may supply each of several cable varieties to a customer and the customer may chose the appropriate cable, and may switch cables if terminal 10 is required to communicate with a different interface. It can be seen that the product supply system including universal connector port 42 and associated customer selected cable 60 greatly reduces the size requirements of terminal back end 11rr. The universal connector and cable product supply system also significantly reduces the cost of terminal 10 without compromising functionality, since it reduces the number of physical connector ports that have to be integrated during assembly at terminal back end 11rr.
In a further aspect of the universal connector port feature of the invention, control circuit, 210 polls the contents of designated interface identifier, or “cable select pins” 42cs pins of connector 42. When the various cables 60 are made, conductors of cable 60 are wired so that the two conductors of cable 60 which supply the interface identifier pins of interface 42 supply the identifier pins with a unique signature indicative of the interface to which distal end 62 of cable 60 is interfaced with. For example, it will be seen that a set of cables 60 can be configured so that a first variety of cable supplies interface identifier pins of connector 42 with a signature of 00 indicative of an interface of a first type, a second variety supplies a signature of 01 indicative of an interface of a second type, a third variety of cable 60 supplies a signature 10 indicative of an interface of a third type, and a fourth variety of cable supplies a signature 11 of a fourth type when distal end connector 62 is connected to a device. More specifically, cable 60 can be made to provide a signature indicative of the cable type by manufacturing cable 60 of each variation in a complementary fashion with the voltage supply to connector 42 so that the lines of cable 60 interfacing with cable select pins 42cs of connector 42 return a high logic value to control circuit 210, unless the lines interfacing with cable select pins 42cs are connected within the length in cable to ground. Therefore, by grounding out one line that interfaces with a cable select pin 42cs, a logic 0 is returned to the cable pin select. By grounding out both lines of cable 60 interfacing with cable select pins 42cs, two low data points (i.e. a 00) signature is returned to cable select pins 42cs. Accordingly, it can be seen that circuit 210 can be made to automatically identify the interface to which cable 60 is connected to, and can automatically adjust controls of I/O interface, of related circuit terminal 10 accordingly.
Additional features of the invention in an exemplary embodiment are understood with reference to the system architecture of
With reference to the transaction cycle flow diagram of
Typically, transaction terminal 10 is disposed in a retail store klosk, or customer service desk. When a customer makes a transaction using a credit card or a debit card, an electronic benefits card (EBC) or customer loyalty card, a customer, at STEP 1, inserts a card into insert reader to read the card. A customer may, in addition, be prompted by terminal 10 to enter PIN information into terminal 10, and may be prompted to write a signature on the terminal 10 so that terminal 10 can capture a signature.
About the time that a customer inserts a card into terminal 10, a sales associate, at STEP 2, enters the sales amount into POS network 300, to be described in more detail wherein, using e.g. a keypad 340K of cash register 340, or a bar code reader 342 or 263. In the alternative, the dollar amount can be entered into transaction terminal 10 at STEP 2. At STEP 3, transaction terminal 10 communicates a customer's card information data determined from a reading of the card and other transaction data to POS network 300. Transaction terminal 10 may also communicate PIN information of a customer to POS 300 as part of STEP 3. Also, a transaction terminal may communicate a captured signature to POS network 300 as part of STEP 3. More typically however, a signature may be captured by terminal 10 and transmitted to POS network 300 after authorization is complete as will be described herein. Signature data may be achieved for use in a signature recognition system by a retailer for recognition by a computer system of retailer POS Network 300 or as a third party, e.g. at a computer at 380. Transaction terminal 10 may also store signature data for later processing, which may be performed on a batch basis. Transaction terminal 10 may also archive other transaction data.
POS (Point-of Sale) Network 300, as is indicated in
In another embodiment as indicated in
Another embodiment of POS network 300 and 300-3 is shown in
In yet another embodiment of POS network described with reference to
As indicated in the embodiment of
In a further aspect of POS Network 300, POS Network 300 can be in communication with another computer Network 380, which may be the Internet (World Wide Web). Connecting POS Network 300 to another Network 380 allows POS Network 300 to readily access information from a wide variety of computer databases, which information is pertinent to financial transactions. For example, by way of communication with Network 380, POS Network 380 can access such information as drive, license identification information, consumer credit rating information, consumer criminal record information, sales history information, consumer demographic data, and other consumer information. Aspects of the invention relating to access of information from Network 380 will be discussed in greater detail herein.
Continuing with reference to the transaction cycle flow diagram of
At STEP 5 debit card or credit card network 320 and 322 transmit the transaction data to a computer system (or a network of computer systems) operated by an Issuing Bank 330. Issuing Bank 330 provides a number of important functions in relation to the transaction processing cycle. Issuing bank (1) makes sure that a customer's account has sufficient funds; (2) charges a customer's account for a transaction; (3) charges a customer's account for any applicable fees in relation to the transaction, and distributes the funds to appropriate parties (e.g. Distribution Network operators); and (4) monitors for card holder fraud, (5) may automatically preliminarily authorize small dollar transactions, and (6) may preliminarily authorize transactions based on risk calculations which cannot be authorized because of technical problems (e.g. Network 322 is down); (7) capture and store a data record of the transaction.
At STEP 6, Issuing Bank 330 debits a customer's account, and may, as part of STEP 6, initiate action to obtain payment of the debt (if credit card transaction from a customer). For example, Issuing Bank 330 may send a bill to a customer's home mailing address notifying a customer of an amount of a debt. As part of STEP 6, Issuing Bank 330 may automatically notify a customer of a debit via email communication to a customer's email address, or may post a notice on the Issuing Bank's website so that the notice is read when a customer opens his account information from the Issuing Bank's website.
At STEP 7, POS Network 300 sends transaction data to a computer system a network of computer systems operated by an Acquiring Bank and Acquiring Bank 332 appropriately credits a retailer's account by the amount of the transaction less any fees. Acquiring Bank (1) credits a retailer's account (2) charges the retailer any applicable fees and distributes these fees to appropriate entities involved in the transaction (e.g. Distribution network operators), (2) monitors for collection fraud, and (4) supplies information and customer service to a retailer, in part through communication with POS Network 300. Typically, STEP 7 is a batch process performed e.g. after business hours, whereas STEPS 1 through 6 described herein are all performed automatically after a transaction is initiated, within seconds of one another (except the nonelectronic mailing step described as part of STEP 6). In some instances STEP 7, is carried out with manual data entry and human observation of financial data records.
Some further aspects of possible transactions involving Terminal 10 can be understood with reference to the following examples, EXAMPLE I and EXAMPLE II, wherein the term “host” in Example I and Example II is used to refer to a computer system or network of computer systems interposed between a cash register and a debit/credit networks 320 and 322 as described above with reference to
The purchaser may initiate the transaction or be prompted by the POS device. Electronic Benefits Transfer (EBT) using magnetic stripe cards or smart cards is similar to a debit transaction. Rules and exact procedures varies by State.
Note: “Off-line debit” processes as if it were a credit card transaction. Ordering of steps:
(A) Associate 312 initiates a new sale and begins scanning items;
(B) Purchaser 310 selects their payment option=debit;
(C) Terminal 10 saves customer selection=debit;
(D) Purchaser 310 inserts their card on the terminal MSR/SCR;
(E) Terminal 10 stores the credit card track data;
(F) Terminal 10 request PIN;
(G) Purchase 310 enters PIN;
(H) Terminal 10 encrypts PIN block and stores the result;
(I) Terminal 10 waits for POS 340 terminal request;
(J) Associate 312 completes the sale;
(K) POS 340 sends sale total to Terminal 10, waits for reply;
(L) Terminal 10 displays total and prompts the purchase for “cash back”;
(M) Purchaser 310 responds to cash back prompt, “yes”+amount or “no”; Terminal 10 requests confirmation and displays new total;
(N) Terminal 10 replies to POS 340 with track data, PIN block and “debit” flag;
(O) POS 340 sends the amount(s), card data, PIN block, terminal ID, etc. to host 300;
(P) Host 300 adds merchant data and forwards to authorization Network 320;
(Q) Network 320 translates PIN block encryption to Zone key (Each network switch and processor translates the incoming PIN block to the encryption algorithm and key of the next zone);
(R) Network 320 examines card Bank ID Number (BIN) and routes to issuing bank;
(S) Issuer 330 checks account balance, account status, and fraud data;
(T) Issuer 330 verifies PIN;
(U) Issuer 330 replies “yes” or “no” for authorization or an error code;
(V) Network 320 sends issuer response to retailer host;
(W) Host 300 routes the issuer/network response to a POS terminal 340;
(X) POS 340 notifies associate of issuer response;
(Y) POS 340 sends message to Terminal 10 authorized or declined.
If authorized, the transaction is complete from the Terminal 10 point of view.
Note: All PIN-based payments are encrypted. Responses are not encrypted or secure.
The following describes typical credit card transaction flow in U.S. networks for transactions initiated on a connected POS terminal.
The purchaser may initiate the transaction or be prompted by the POS device.
(A) Associate 312 initiates a new sale and begins scanning items;
(B) Purchaser 310 selects their payment option=credit;
(C) Terminal 10 saves customer selection=credit;
(D) Purchaser 310 inserts their card on the terminal MSR/SCR;
(E) Terminal 10 stores the credit card track data, waits for POS terminal request;
(F) Associate 312 completes the sale;
(G) POS 340 sends a message to the Terminal 10=“send data”;
(H) Terminal 10 replies to POS with track data and “credit” flag;
(I) POS 340 sends transaction amount, card data, terminal ID, etc. to host along with merchant data;
(J) Host 300 adds merchant data and forwards to authorization to network;
(K) Network 320 examines card Bank ID Number (BIN) and routes to issuer;
(L) Issuer 330 checks account balance and fraud data;
(M) Issuer 330 replies “yes” or “no” for authorization or an error code;
(N) Network 320 sends issuer response to retailer host;
(O) Host 300 routes the issuer/network response to the POS terminal;
(P) POS 340 notifies associate of issuer response;
(Q) POS 340 sends message to Terminal 10, authorized or declined.
(R) Purchaser 310 signs signature on touch screen 320;
(S) Signature saved at terminal 10 and/or transmitted to POS for further processing (e.g. signature recognition).
If authorized, the transaction is complete from the Terminal 10 point of view.
Note: In the United States, credit transactions are not encrypted. Responses are not encrypted or secure. Credit transactions that are processed in Canada are encrypted and use MACing for data integrity.
Referring to further aspects of the invention, housing 11 of terminal 10 includes a number of important features which will now be described in greater detail. Housing includes a top 11t, a bottom 11b, a first side 11s, a second side 11s, a back end 11rr, and a front 11f. As best seen in
Referring to aspects of bottom of housing 11b with reference to
As seen in
As shown in
Dimensional information relating to terminal 10 in one exemplary preferred embodiment is summarized in
Additional advantages of the positioning of slot 245 according to the invention are described with reference to
A fulcrum and brooming effect is yielded when card 90 is pivoted about a fulcrum 712 defined by slot top edge 712. When card 90 is pivoted about fulcrum 712 distal end 90d of card 90 imparts a force against bottom 345b of slot 3455. Therefore, when card 90 is pulled out card 90 will operate as a broom to sweep debris, moisture, particulate matter out of slot 90.
It is seen further with reference to
The fulcrum and brooming effect is yielded in both embodiments when a user pulls card out and up as indicated by arrow 711. In addition, it is seen from
An important aspect of the invention is the positioning of insert hybrid slot reader 240 in terminal 10 in relation to other components of terminal 10. Insert reader 240 is disposed in the front of terminal 10 and is accessible from the front of terminal 10. Accordingly, when a card is inserted reader 240, a user's view of screen 240 is not obscured as in the case of the prior art transaction terminal 700 of
As best seen
Referring to further aspects of terminal 10 relating to housing 11, terminal 10 further includes stylus holder apparatus 70 which is described in detail with reference to
In the present invention, holder apparatus 70 may be made selectively attachable to housing 11 with use of a double-stick adhesive pad (referred to as double stick tape) of one of the many types available from 3M, for example, or with other types of fasteners. In
Referring to further aspects of stylus 74, a connecting arrangement for connecting stylus-end 79 of cord 75 to cord-end 80 of stylus 74 is described in detail with reference to
In a still further aspect of housing 11, the colors and/or patterns exhibited by the exterior of housing 11 can adapted to aid a user in orienting card 90 in relation to slot 345. As best seen in the top view of
Importantly, housing 11 when manufactured to exhibit multiple colors should be made to exhibit different colors without substantially weakening the structural support and protection provided by housing 11. Housing 11, which may comprise a polycarbonate ABS blend, can be made to exhibit different colors as between zone 732 and zone 734 without substantial degradation of containment advantages provided by housing 11 by utilization of a two-shot molding process during the manufacture of housing upper section 11up, wherein a first shot of the two-shot molding process defined the color of zone 732 and a second shot of the two part molding process defined the color of zone 734.
In yet another aspect of the invention, housing 11 can be made to exhibit colors or patterns in accordance with the colors and/or patterns for terminal that are desired by the buyer-retailer of terminal 10. The inventors discovered that the most desirable colors and patterns for housing 11 vary greatly between different retailers. Some retailers may desire bright colors for terminal 10 in an effort to attract attention to terminal 10. Other retailers may desire subtle colors for terminal 10 in an effort to reduce psychological stresses which are sometimes associated with the expenditure of personal funds. Still other retailers may desire pattern and colors for terminal 10 that are in accordance with its company trademarks and or advertising campaigns. Other retailers may desire that terminal 10 carry advertising of a third party business which will subsidize at least in part the cost of terminal 10.
Accordingly, the inventors have adopted a business method for marketing and supplying terminal 10 that is explained with reference to the business model diagram of
Referring to further aspects of the invention, terminal 10 may be equipped with a variety of security features, which may take on a variety of forms. Referring to a first security feature, housing 11 is adapted so that if an unscrupulous party attempts to break into housing 11 to steal secure information from a storage device of terminal 10, the secure electronically stored information is automatically destroyed. Referring again to electrical block diagram 2a of
Transaction terminal 10 is adapted so that certain information previously designated as secure information is stored in a designated IC chip. Such information may include, for example, encryption keys or other information which may be designated as secure such as card identification numbers, signature information, fingerprint information, and retinal signature information, decoded-out message data decoded from e.g. an optical or RF card reader. In accordance with applicable banking standards (ANSI ISO), PIN information, when entered into a POS device such as transaction terminal 10 should be encrypted at terminal 10, as will be explained. From time-to-time, encryption keys stored in terminal 10 may be updated and replaced with new encryption keys. As will be described in further detail herein, transaction terminal 10 is adapted so that when a user enters PIN information in response to a prompt for PIN information displayed by terminal 10, an encryption algorithm stored in ROM 223 of secure chip 221 is called for execution by IC chip CPU 224 to encrypt the pin information in accordance with an encryption key stored in RAM 222. Encryption keys may be stored in other, mechanically and logically secure, preferably erasable, storage locations.
Encryption keys which terminal 10 may use for PIN encryption typically comprise one of two types: “master session” and DUKPT. Master session keys are used by a symmetrical encryption algorithm. The Data Encryption Standard (DES) is the most common form of master session keys. Under a master-session scheme, terminal 10 has a strong “master” key and a second “session” key. Typical implementations use a weaker session key. The session key is used to encrypt PIN blocks. The master key is used to secure replacement session keys. Terminal and the first computer (host) of POS Network 300 that receives and processes the encrypted PIN block must have the same key. POS Network 300, comprised of many “nodes” or computer systems connected by various communications links, translates the PIN from the key used by the sending device (terminal, host, etc.) to the encryption key and scheme used by the next node in the transmission chain. This repeats until the encrypted PIN block arrives at Issuing Bank 333. Accordingly, “security zones” are created which increase the difficulty of an unscrupulous party compromising the system. It also allows each zone to trust only the devices with which it directly communicates. It also greatly simplifies distribution of the symmetric keys. A given node must only deal with two other nodes rather than every node in the chain. Debit card Issuing Bank 333 does not convert the PIN block to clear data. Issuing Bank 330 submits the encrypted PIN block to a security device commonly called a Network Security Processor (NSP). The NSP verifies the PIN validity and returns a “yes” or “no” response. That response is utilized by issuing bank 330 for verifying the validity of the PIN entered on transaction terminal 10.
Derived Unique Key Per Transaction (DUKPT) keys and encryption scheme is common in POS terminals and PIN pads installed since 1997. The advantage of DUKPT and other similar schemes is that each PIN block encryption uses a new (“unique”) key whereas the master session encryption uses the same key for all transactions. In DUKPT PIN systems, over 1 million keys can be generated from an initial base key. The “T” in DUKPT can also mean “terminal” since the terminal ID is used to generate the key set, a given base key can create many unique key sets. DUKPT PIN encryption keys are unique and no key can be computed from any other key. So if a given transaction key is compromised, no other transactions are at risk. The base key is not stored in the terminal. The current method of PIN encryption using DUKPT is similar to the master session encryption method described above. Additional data is used and the key is applied to the PIN block only for the current transaction. The node security zones are substantially identical to those described above with reference to the master session described above. In many systems, the terminal's DUKPT PIN block is translated to a master session PIN block at the first intercept computer system which may be e.g. a POS Network computer system of a retailer, or a computer system third party network provider. The conversion allows the simpler master session to be used for relatively secure host/server point to point communications. The computer centers are physically more secure than distributed transaction terminals. Issuing Bank 330 then processes the authentication according to the master session method described above.
With master session keys, all PIN blocks encrypted with a given key can be decrypted if the key is compromised. Since the master session key is stored in a relatively less secure terminal and distributed in publicly accessible locations, the risk of attack is greater. To reduce the risk, most implementations allow for a periodic key exchange where a host system generates a random key value, encrypts it under a strong exchange key and sends it through POS Network 300 to the terminal 10. All nodes between the originator and the terminal must be able to handle the key exchange. When the new session key arrives at terminal 10, terminal decrypts the new session key from the master key (which also resides in the terminal) uses the key for subsequent PIN block encryptions. DUKPT keys normally do not have to be replaced unless the entire key set is exhausted or the well protected base key is compromised. Further, a data integrating encryption algorithm (e.g. MAC) may be utilized by terminal 10.
With further reference to a tamper-detection security feature of the invention, the selection of an IC chip including integrated RAM, ROM and a CPU, wherein encryption keys are stored in volatile RAM 222, an encryption algorithm is stored in ROM 223, and the algorithm is executed by integrated CPU 224, yields an important benefit. If the CPU that executed the encryption algorithm were stored on an IC chip separate from the chip including volatile RAM 222, then an unscrupulous party may attempt to intercept the unencrypted PIN data, with use of probes, while it is being retrieved by the CPU from its storage location in RAM. The arrangement above protects against the above potential security breach. An unscrupulous party could not readily, if at all, contact probes onto circuit tracings of packaged secure IC chip 221 comprising RAM 222 and ROM 223.
As indicated in
Description of a terminal break-in theft prevention scheme is made in further detail with reference to the block diagrams
Referring to the assembly diagram
As is indicated by the electrical schematic diagram of
Security circuit block 220 may also be configured so that IC chip 221 is erased by disconnecting power therefrom when there is a security breach whether terminal 10 is in a powered-down mode or powered-up mode. In the embodiment if
Referring to further aspects of the invention and relating to the security feature just described, transaction terminal 10 in the assembly view shown in
In a further aspect of a panel system according to the invention, upper section 11up and panels 21 and 22 are complementarily formed so that bore holes 419h and the bolts or screws 416 which they accommodate are completely hidden from view when panels 21 and 22 are attached to housing 11. In the embodiment of
As has been described herein, PIN information should be encrypted whenever it is entered into terminal 10. If PIN information is not encrypted by terminal 10, an unscrupulous party may attempt to electronically syphon the PIN information from a storage device of terminal or in a computer system located upstream from terminal in the transaction cycle depicted in
Terminal 10 is preferably adapted so that an operating program of terminal 10 can be customized by an user-programmer, so that the characteristic of, and sequence of, e.g. prompts, other messages, menus displayed by touch screen 20 are configurable by an user-programmer. In accordance with the invention, a programmer-user may develop instructions of an operating program using a program builder system 390 as seen in
Accordingly, terminal 10 may be adapted to include a secure information entry feature which is described with reference to
Referring to aspects of the secure information entry feature of the invention in further detail, cryptographic firmware 281 of secure information entry circuit 280 can take on a variety of forms. In general, the term “firmware” as used herein shall refer to any hardware or software or combination hardware/software element of a processor based controller which cannot be changed by the ordinary methods and protocols available for use by a user-programmer for changing instruction of a main program of the processor based controller.
As will be discussed in greater detail herein, circuit 280 may comprise components of control circuit 210. Accordingly, it will be seen that the characteristic of cryptographic firmware 285 of secure information entry circuit 280 may vary depending on the software architecture selected for allowing reprogramming of terminal control circuit 210 (changing of instructions of the main program). Alternative software architecture which may be employed for enabling changing of instructions of a main program associated with control circuit 210 with use of a program builder system 390 are described with reference to the memory map diagrams of
In another architecture which may be employed from allowing reprogramming of terminal 10, circuit 210, 280 executes a script program (which is sometimes referred to simply as a script) that is built by a programmer-user at builder system 390 using high level instructions or e.g. by inputting inputs in response GUI displayed programming prompts displayed on display 390d. When circuit 210, 280 is of the type that executes a script program, ROM 283, 218 stores an interpreter program stored in address locations 270. When a script program architecture is selected, script instructions built at builder system 390 do not have to be complied into machine code prior to being executed. Instead, when a script program architecture is selected, interpreter program stored at 270 interprets and executes script instructions built at system 390 and thereby eliminates the need to compile a set of high lever instructions authored at system 390 into machine code prior to their execution by terminal 10. In the example of
It will be understood that the above archetypal examples are selected merely to highlight that cryptographic firmware 285 can take on a variety of different forms and are not intended to rigorously define the precise characteristic of subject matter that can be considered firmware. In fact many software architectures exhibit characteristics of both of the archetypal architectures described. Still further it will be understood that firmware e.g. 285, while most typically comprising some form of user inaccessible or difficult to access code instructions, need not comprise any code instructions. For example, cryptographic firmware 285 according to the invention can include discreet IC formed electrical circuit components tied to an appropriate address bus location e.g. a key storing address 291 of RAM 282 or ROM 283 called during execution of an encryption routine of the invention which circuit components are operative to change the state of an encryption mode signal when such an address is selected.
As has been indicated herein and again by
Additional features of the invention will be understood with reference to one specific example of the invention. A flow diagram explaining operations of secure information entry circuit 280 as may occur when executing an encryption routine utilizing the two CPU architecture of
Referring to further aspects of indicator 287 a secure information entry feature of the invention, indicator 287 may take on several forms. In the example of
Importantly, indicator 287 need not comprise a light source. Indicator 287 could comprise an acoustic output device in terminal 10 or away from terminal 10. Indicator 287 could also be a graphical icon or message displayed on screen 20 or on a display e.g. display 340 spaced apart from terminal 10. The state changing encryption mode signal (which may be encrypted by terminal 10) can be transmitted to any computer system of POS network 300, shown in
Referring to further aspects of information message 280, it will be understood that the attributes of information message 288 will change depending on what secure information is being captured by terminal 10 and the characteristics of indicator 287. In the example of
While the present invention has been explained with reference to the structure disclosed herein, it is not confined to the details set forth and this invention is intended to cover any modifications and changes as may come within the scope of the following claims.
Number | Name | Date | Kind |
---|---|---|---|
2357378 | Benford | Sep 1944 | A |
3596389 | Drueck | Aug 1971 | A |
3857626 | Rosenberger et al. | Dec 1974 | A |
3954244 | Gopstein | May 1976 | A |
4017129 | Boldt et al. | Apr 1977 | A |
4075460 | Gorgens | Feb 1978 | A |
4126768 | Grenzow | Nov 1978 | A |
4134537 | Glaser et al. | Jan 1979 | A |
4141078 | Bridges, Jr. et al. | Feb 1979 | A |
4273996 | Weimer | Jun 1981 | A |
RE30773 | Glaser et al. | Oct 1981 | E |
4313035 | Jordan et al. | Jan 1982 | A |
4317957 | Sendrow | Mar 1982 | A |
4375032 | Uchida et al. | Feb 1983 | A |
4390968 | Hennessy et al. | Jun 1983 | A |
4392023 | Sears | Jul 1983 | A |
4403700 | Manlove | Sep 1983 | A |
4417136 | Rushby et al. | Nov 1983 | A |
4432020 | Onose et al. | Feb 1984 | A |
4438704 | Hutcheon et al. | Mar 1984 | A |
4460965 | Trehn et al. | Jul 1984 | A |
4471165 | DeFino et al. | Sep 1984 | A |
4476468 | Goldman | Oct 1984 | A |
4501958 | Glize et al. | Feb 1985 | A |
4524396 | Schulz et al. | Jun 1985 | A |
4529870 | Chaum | Jul 1985 | A |
4534562 | Cuff et al. | Aug 1985 | A |
4582985 | Lofberg et al. | Apr 1986 | A |
4630201 | White | Dec 1986 | A |
4658416 | Tanaka | Apr 1987 | A |
4680801 | Etherington et al. | Jul 1987 | A |
4689478 | Hale et al. | Aug 1987 | A |
4689742 | Troy et al. | Aug 1987 | A |
4711996 | Drexler | Dec 1987 | A |
4747050 | Brachtl et al. | May 1988 | A |
4771460 | Tamada et al. | Sep 1988 | A |
4775784 | Stark | Oct 1988 | A |
4783823 | Tasaki et al. | Nov 1988 | A |
4803347 | Sugahara et al. | Feb 1989 | A |
4809326 | Shigenaga et al. | Feb 1989 | A |
4839781 | Barnes et al. | Jun 1989 | A |
4843224 | Ohta et al. | Jun 1989 | A |
4858121 | Barber et al. | Aug 1989 | A |
4868376 | Lessin et al. | Sep 1989 | A |
4870503 | Miura | Sep 1989 | A |
4897865 | Canuel | Jan 1990 | A |
4902079 | Kaplan et al. | Feb 1990 | A |
4910767 | Brugliera et al. | Mar 1990 | A |
4917792 | Murakami et al. | Apr 1990 | A |
4920256 | Marty et al. | Apr 1990 | A |
4920567 | Malek | Apr 1990 | A |
4928001 | Masada et al. | May 1990 | A |
4930093 | Houser et al. | May 1990 | A |
4941090 | McCarthy | Jul 1990 | A |
4943868 | Yoshinaga et al. | Jul 1990 | A |
5000598 | Jingu et al. | Mar 1991 | A |
5001612 | Odlum | Mar 1991 | A |
5012512 | Basso et al. | Apr 1991 | A |
5025373 | Keyser, Jr. et al. | Jun 1991 | A |
D319434 | Lund | Aug 1991 | S |
5055660 | Bertagna et al. | Oct 1991 | A |
5109426 | Parks | Apr 1992 | A |
5115888 | Schneider | May 1992 | A |
5151581 | Krichever et al. | Sep 1992 | A |
5202826 | McCarthy | Apr 1993 | A |
5202922 | Iijima et al. | Apr 1993 | A |
D336464 | Clough et al. | Jun 1993 | S |
5216517 | Kinoshita et al. | Jun 1993 | A |
5223677 | Kapp et al. | Jun 1993 | A |
D337569 | Kando | Jul 1993 | S |
5227614 | Danielson et al. | Jul 1993 | A |
5229588 | Detwiler et al. | Jul 1993 | A |
D338656 | Spayde et al. | Aug 1993 | S |
5237487 | Dittmer et al. | Aug 1993 | A |
5249103 | Forsythe | Sep 1993 | A |
5258604 | Behrens et al. | Nov 1993 | A |
5287268 | McCarthy | Feb 1994 | A |
5288980 | Patel et al. | Feb 1994 | A |
5297030 | Vassigh et al. | Mar 1994 | A |
5297202 | Kapp et al. | Mar 1994 | A |
5298897 | Harrison et al. | Mar 1994 | A |
D345966 | Perez | Apr 1994 | S |
5311325 | Edwards et al. | May 1994 | A |
5317136 | Hasegawa et al. | May 1994 | A |
5324922 | Roberts | Jun 1994 | A |
D350120 | Tsuboi et al. | Aug 1994 | S |
5334821 | Campo et al. | Aug 1994 | A |
5341428 | Schatz | Aug 1994 | A |
5347589 | Meeks et al. | Sep 1994 | A |
5352877 | Morley et al. | Oct 1994 | A |
5353331 | Emery et al. | Oct 1994 | A |
5356243 | Vogel | Oct 1994 | A |
5357563 | Hamilton et al. | Oct 1994 | A |
5362053 | Miller | Nov 1994 | A |
5365046 | Haymann et al. | Nov 1994 | A |
5379037 | Harrison et al. | Jan 1995 | A |
5384449 | Peirce | Jan 1995 | A |
5386104 | Sime | Jan 1995 | A |
5406619 | Akhteruzzaman et al. | Apr 1995 | A |
5422472 | Tavislan et al. | Jun 1995 | A |
5444226 | Collins, Jr. | Aug 1995 | A |
5448044 | Price et al. | Sep 1995 | A |
D363271 | Peterson | Oct 1995 | S |
D363511 | Hui | Oct 1995 | S |
5455829 | Klingberg | Oct 1995 | A |
5455861 | Faucher et al. | Oct 1995 | A |
5464971 | Sutcliffe et al. | Nov 1995 | A |
5467403 | Fishbine et al. | Nov 1995 | A |
5479530 | Nair et al. | Dec 1995 | A |
D366466 | Lee et al. | Jan 1996 | S |
5489773 | Kumar | Feb 1996 | A |
5509083 | Abtahi et al. | Apr 1996 | A |
5521966 | Friedes et al. | May 1996 | A |
D372730 | Sasaki | Aug 1996 | S |
5559885 | Drexler et al. | Sep 1996 | A |
5561282 | Price et al. | Oct 1996 | A |
5568357 | Kochis et al. | Oct 1996 | A |
5577118 | Sasaki et al. | Nov 1996 | A |
5581607 | Richardson, Jr. et al. | Dec 1996 | A |
5586166 | Turban | Dec 1996 | A |
5625534 | Okaya et al. | Apr 1997 | A |
5638457 | Deaton et al. | Jun 1997 | A |
5640002 | Ruppert et al. | Jun 1997 | A |
5652806 | Friend | Jul 1997 | A |
5657389 | Houvener | Aug 1997 | A |
5659431 | Ackley | Aug 1997 | A |
5672860 | Miller et al. | Sep 1997 | A |
5679943 | Schultz et al. | Oct 1997 | A |
D385857 | Cohen et al. | Nov 1997 | S |
D385903 | Kim et al. | Nov 1997 | S |
D386781 | Sasaki | Nov 1997 | S |
5697202 | Totilo | Dec 1997 | A |
5703349 | Meyerson et al. | Dec 1997 | A |
D389813 | Itoh | Jan 1998 | S |
5714745 | Ju et al. | Feb 1998 | A |
5717195 | Feng et al. | Feb 1998 | A |
5740232 | Pailles et al. | Apr 1998 | A |
5745705 | Iguchi | Apr 1998 | A |
5805807 | Hanson et al. | Sep 1998 | A |
D400191 | Butts et al. | Oct 1998 | S |
5818023 | Meyerson et al. | Oct 1998 | A |
5825002 | Roslak | Oct 1998 | A |
5845256 | Pescitelli et al. | Dec 1998 | A |
D404376 | Shane et al. | Jan 1999 | S |
D404761 | Tarpenning et al. | Jan 1999 | S |
5864125 | Szabo | Jan 1999 | A |
5878124 | Griesmer et al. | Mar 1999 | A |
5888087 | Hanson et al. | Mar 1999 | A |
5895902 | Ziarno | Apr 1999 | A |
5923735 | Swartz et al. | Jul 1999 | A |
5926549 | Pinkas | Jul 1999 | A |
5933812 | Meyer et al. | Aug 1999 | A |
5945975 | Lundrigan et al. | Aug 1999 | A |
D413582 | Tompkins | Sep 1999 | S |
5949043 | Hayashida | Sep 1999 | A |
5949378 | Coveley | Sep 1999 | A |
5959281 | Domiteaux | Sep 1999 | A |
5969324 | Reber | Oct 1999 | A |
5970146 | McCall et al. | Oct 1999 | A |
5979753 | Roslak | Nov 1999 | A |
5979757 | Tracy et al. | Nov 1999 | A |
5979764 | Swyst et al. | Nov 1999 | A |
5984182 | Murrah et al. | Nov 1999 | A |
6003008 | Postrel et al. | Dec 1999 | A |
6003762 | Hayashida | Dec 1999 | A |
6004003 | Dalton et al. | Dec 1999 | A |
6019286 | Li et al. | Feb 2000 | A |
6024288 | Gottlich et al. | Feb 2000 | A |
6049813 | Danielson et al. | Apr 2000 | A |
D425558 | Tarpenning et al. | May 2000 | S |
6062477 | Wike, Jr. et al. | May 2000 | A |
6062478 | Izaguirre et al. | May 2000 | A |
6064751 | Smithies et al. | May 2000 | A |
6065679 | Levie et al. | May 2000 | A |
D426237 | Wranne et al. | Jun 2000 | S |
6073034 | Jacobsen et al. | Jun 2000 | A |
6076731 | Terrell | Jun 2000 | A |
6078848 | Bernstein et al. | Jun 2000 | A |
6084528 | Beach et al. | Jul 2000 | A |
6085972 | Wright | Jul 2000 | A |
6097606 | Groves et al. | Aug 2000 | A |
6101483 | Petrovich et al. | Aug 2000 | A |
6102290 | Swartz et al. | Aug 2000 | A |
6112857 | Morrison | Sep 2000 | A |
6118889 | Izuno et al. | Sep 2000 | A |
D431590 | Brown et al. | Oct 2000 | S |
D434399 | Lanet | Nov 2000 | S |
6142369 | Jonstromer | Nov 2000 | A |
6149055 | Gatto | Nov 2000 | A |
6149062 | Danielson et al. | Nov 2000 | A |
6155489 | Colins, Jr. et al. | Dec 2000 | A |
6168077 | Gray et al. | Jan 2001 | B1 |
6179206 | Matsumori | Jan 2001 | B1 |
6193152 | Fernando et al. | Feb 2001 | B1 |
6196460 | Shin | Mar 2001 | B1 |
6199753 | Tracy et al. | Mar 2001 | B1 |
6230970 | Walsh et al. | May 2001 | B1 |
6234389 | Valliani et al. | May 2001 | B1 |
6243447 | Swartz et al. | Jun 2001 | B1 |
6246577 | Han et al. | Jun 2001 | B1 |
6246995 | Walter et al. | Jun 2001 | B1 |
6247645 | Harris et al. | Jun 2001 | B1 |
D445418 | Chen | Jul 2001 | S |
6253998 | Ziarno | Jul 2001 | B1 |
6257487 | Hayashida | Jul 2001 | B1 |
6266685 | Danielson et al. | Jul 2001 | B1 |
6268788 | Gray | Jul 2001 | B1 |
D447136 | Groves et al. | Aug 2001 | S |
6272506 | Bell | Aug 2001 | B1 |
6275644 | Domas et al. | Aug 2001 | B1 |
6279825 | Yokoyama | Aug 2001 | B1 |
D447476 | Chaiken et al. | Sep 2001 | S |
6308893 | Waxelbaum et al. | Oct 2001 | B1 |
6311165 | Coutts et al. | Oct 2001 | B1 |
D451097 | Schmeisser et al. | Nov 2001 | S |
6311896 | Mulla et al. | Nov 2001 | B1 |
6313917 | Tang et al. | Nov 2001 | B1 |
6321981 | Ray et al. | Nov 2001 | B1 |
D451507 | Lin | Dec 2001 | S |
D451535 | Lee | Dec 2001 | S |
6330973 | Bridgelall et al. | Dec 2001 | B1 |
6336900 | Alleckson et al. | Jan 2002 | B1 |
6340115 | Swartz | Jan 2002 | B1 |
6357662 | Helton et al. | Mar 2002 | B1 |
6359603 | Zwern | Mar 2002 | B1 |
D455433 | Alviar et al. | Apr 2002 | S |
6373511 | Groves et al. | Apr 2002 | B1 |
6394355 | Schlieffers et al. | May 2002 | B1 |
6400836 | Senior | Jun 2002 | B2 |
6415982 | Bridgelall et al. | Jul 2002 | B2 |
6424949 | Deaton et al. | Jul 2002 | B1 |
6431444 | Gatto | Aug 2002 | B1 |
6435412 | Tsi et al. | Aug 2002 | B2 |
6439345 | Recktenwald et al. | Aug 2002 | B1 |
D462679 | Liu | Sep 2002 | S |
D464345 | Liu | Oct 2002 | S |
6460069 | Berline et al. | Oct 2002 | B1 |
6466657 | Anvret et al. | Oct 2002 | B1 |
6471125 | Addy | Oct 2002 | B1 |
6474550 | Caridas | Nov 2002 | B1 |
6486862 | Jacobsen et al. | Nov 2002 | B1 |
6492978 | Selig et al. | Dec 2002 | B1 |
6512840 | Tognazzini | Jan 2003 | B1 |
6532152 | White et al. | Mar 2003 | B1 |
6539363 | Allgeier et al. | Mar 2003 | B1 |
6550683 | Augustine | Apr 2003 | B1 |
6554705 | Cumbers | Apr 2003 | B1 |
6557754 | Gray et al. | May 2003 | B2 |
6572012 | Gannon et al. | Jun 2003 | B1 |
6575368 | Tamburrini et al. | Jun 2003 | B1 |
6595422 | Doljack | Jul 2003 | B1 |
D479716 | Miller | Sep 2003 | S |
6676016 | Coskrey, IV | Jan 2004 | B1 |
6679425 | Sheppard et al. | Jan 2004 | B1 |
D486176 | Flaherty et al. | Feb 2004 | S |
D491216 | Ookushi et al. | Jun 2004 | S |
D492303 | Schlieffers et al. | Jun 2004 | S |
6757156 | Adams et al. | Jun 2004 | B2 |
D492718 | Ookushi et al. | Jul 2004 | S |
6779196 | Igbinadolor | Aug 2004 | B1 |
D496682 | Ookushi et al. | Sep 2004 | S |
D498754 | Blyth | Nov 2004 | S |
D502945 | Huang et al. | Mar 2005 | S |
D503709 | Lodato et al. | Apr 2005 | S |
D504890 | Sung et al. | May 2005 | S |
7121470 | McCall et al. | Oct 2006 | B2 |
20010000405 | Gray et al. | Apr 2001 | A1 |
20010013549 | Harris et al. | Aug 2001 | A1 |
20010020640 | Yokochi | Sep 2001 | A1 |
20020104944 | Pogatetz et al. | Aug 2002 | A1 |
20020140714 | Hoffman | Oct 2002 | A1 |
20030132292 | Gomez et al. | Jul 2003 | A1 |
20030132293 | Fitch et al. | Jul 2003 | A1 |
20030132294 | Gomez et al. | Jul 2003 | A1 |
20030132297 | McCall et al. | Jul 2003 | A1 |
20030132918 | Fitch et al. | Jul 2003 | A1 |
20030135751 | O'Donnell et al. | Jul 2003 | A1 |
20030178492 | Tamburrini et al. | Sep 2003 | A1 |
20030210223 | Park | Nov 2003 | A1 |
20030218604 | Wood et al. | Nov 2003 | A1 |
20030229793 | McCall et al. | Dec 2003 | A1 |
20040210759 | Fitch et al. | Oct 2004 | A1 |
Number | Date | Country |
---|---|---|
645909 | Jan 1994 | AU |
2086670 | Nov 1992 | CA |
2290732 | May 2001 | CA |
3100662 | Nov 1981 | DE |
69223581 | Jul 1998 | DE |
69318883 | Mar 1999 | DE |
69228742 | Oct 1999 | DE |
0185782 | Jul 1986 | EP |
0535905 | Apr 1993 | EP |
0 565 253 | Oct 1993 | EP |
0 565 253 | Oct 1993 | EP |
0565253 | Oct 1993 | EP |
0953949 | Nov 1999 | EP |
1065481 | Jan 2001 | EP |
0809836 | May 2002 | EP |
03715923.3 | Jan 2003 | EP |
2324634 | Oct 1998 | GB |
05205095 | Aug 1993 | JP |
6501331 | Feb 1994 | JP |
6223269 | Aug 1994 | JP |
2000207638 | Jul 2000 | JP |
2000515655 | Nov 2000 | JP |
2001076013 | Mar 2001 | JP |
470149 | Nov 1993 | SE |
WO 9221110 | Nov 1992 | WO |
WO 9221110 | Nov 1992 | WO |
9626505 | Aug 1996 | WO |
WO-9728512 | Aug 1997 | WO |
WO 9810368 | Mar 1998 | WO |
WO 9814917 | Apr 1998 | WO |
WO 9819435 | May 1998 | WO |
WO 9850876 | Nov 1998 | WO |
WO 9949347 | Sep 1999 | WO |
WO 9949432 | Sep 1999 | WO |
9960533 | Nov 1999 | WO |
WO 0004487 | Jan 2000 | WO |
WO-0007585 | Feb 2000 | WO |
WO 0016073 | Mar 2000 | WO |
WO 0023936 | Apr 2000 | WO |
WO 0036545 | Jun 2000 | WO |
WO 0070585 | Nov 2000 | WO |
WO 0137229 | May 2001 | WO |
WO 0138098 | May 2001 | WO |
WO 0138098 | May 2001 | WO |
0161657 | Aug 2001 | WO |
0184771 | Nov 2001 | WO |
WO-03060832 | Jul 2003 | WO |
Number | Date | Country | |
---|---|---|---|
20030132918 A1 | Jul 2003 | US |