The present invention relates generally to fuel dispenser and other retail payment systems. More particularly, the invention relates to sensors for detecting unauthorized removal of or tampering with a payment system input device.
By way of background, payment systems have been incorporated into fueling sites in order to allow a customer to pay for fuel and other goods and services (such as a car wash, fast food, or convenience store products) using a credit or debit card. Such payment systems comprise various input devices, such as card readers and PIN pads, which are configured to accept data necessary to process the payment. The customer may provide certain payment data by presenting a payment card bearing a magnetic stripe or chip to a payment card reader. Data stored on the payment card may include one or more of the following: a Primary Account Number (PAN), the cardholder's name, a service code, and the card's expiration date. Also, if required to complete the transaction, the customer may enter account information such as a personal identification number (PIN) using a PIN entry device (e.g, PIN pad). The system communicates the data to a remote host system responsible for the customer's account for verification.
Because of the continuing challenges fraud poses to customers, merchants, and banks, among others, payment card companies are requiring more and more security during payment card transactions. Thus, organizations that process, store, or transmit payment data must comply with certain industry standards. These industry standards typically require that input devices (e.g., card readers and PIN entry devices) meet certain physical security requirements, including containing an anti-removal mechanism, also known as a dismount sensor. In the past, these anti-removal mechanisms included cable-based switches positioned in hard to access locations which provided some degree of protection for both the cable and switch. Other anti-removal mechanisms included microswitches on the input device that closed when the input device was mounted to a structure. In either case, the input devices did not include security around the interface between the switch and the structure and did not provide enough inherent security to meet new, more demanding payment card company mandates.
The present invention recognizes and addresses disadvantages of prior art constructions and methods. According to one embodiment, the present invention provides a system for detecting unauthorized removal or tampering. The system comprises an input device comprising tamper-response electronics and memory and a flexible circuit assembly coupled with the input device. The flexible circuit assembly comprises an outer layer and a first inner layer disposed between the input device and the outer layer. The first inner layer comprises at least one switch. The system also comprises a cable coupled with the flexible circuit assembly and operatively connected to the tamper-response electronics of the input device. The outer layer of the flexible circuit assembly and the cable comprise a first tamper-responsive conductor circuit. The at least one switch and the first tamper-responsive conductor circuit are in electrical communication with the tamper-response electronics via the cable.
According to a further embodiment, the present invention provides a multi-layer tamper detection arrangement for use with an input device comprising tamper-response electronics and memory. The multi-layer sensor comprises a flexible circuit assembly configured for connection to the input device. The flexible circuit assembly comprises an outer layer comprising a first tamper-responsive conductor circuit and a first inner layer disposed beneath the outer layer. The first inner layer comprises at least one switch, a removal detection circuit, and a foreign conductor detection circuit. The at least one switch is configured to close the removal detection circuit when the at least one switch is actuated, and the foreign conductor detection circuit is normally open. The first tamper-responsive conductor circuit, the removal detection circuit, and the foreign conductor detection circuit are configured for electrical communication with the tamper-response electronics of the input device.
According to a further embodiment, the present invention provides a method of detecting unauthorized removal of or tampering with an input device comprising tamper-response electronics and memory. The method comprises the step of providing a flexible circuit assembly coupled with the input device. The flexible circuit assembly comprises an outer layer comprising a first tamper-responsive conductor circuit and a first inner layer disposed between the input device and the outer layer. The first inner layer comprises at least one switch, a removal detection circuit, and a foreign conductor detection circuit. The at least one switch is operatively connected to the removal detection circuit, and the foreign conductor detection circuit is normally open. The first tamper-responsive conductor circuit, the removal detection circuit, and the foreign conductor detection circuit are in electrical communication with the tamper-response electronics of the input device. The method also comprises the step of monitoring electrical characteristics of the first tamper-responsive conductive circuit, the removal detection circuit, and the foreign conductor detection circuit. Finally, the method comprises the step of producing a tamper response at the tamper response electronics when a change in electrical characteristics of one of the first tamper-responsive conductive circuit, the removal detection circuit, and the foreign conductor detection circuit is detected.
Those skilled in the art will appreciate the scope of the present invention and realize additional aspects thereof after reading the following detailed description of preferred embodiments in association with the accompanying drawing figures.
A full and enabling disclosure of the present invention, including the best mode thereof directed to one of ordinary skill in the art, is set forth in the specification, which makes reference to the appended drawings, in which:
Repeat use of reference characters in the present specification and drawings is intended to represent same or analogous features or elements of the invention.
Reference will now be made in detail to presently preferred embodiments of the invention, one or more examples of which are illustrated in the accompanying drawings. Each example is provided by way of explanation of the invention, not limitation of the invention. In fact, it will be apparent to those skilled in the art that modifications and variations can be made in the present invention without departing from the scope or spirit thereof. For instance, features illustrated or described as part of one embodiment may be used on another embodiment to yield a still further embodiment. Thus, it is intended that the present invention covers such modifications and variations as come within the scope of the appended claims and their equivalents.
Embodiments of the present invention provide a multiple layer flexible circuit assembly which may be used to provide tamper-response security for an input device. As used herein, the term “input device” broadly refers to secure devices, including but not limited to encrypting PIN pads, keypads, touchscreens, secure card readers, and smartcard readers, which are capable of receiving information associated with a user of the input device. Such information may include information associated with a payment card, such as a PAN or other account number, the user's name, a service code, and the card's expiration date. Further, such information can include data associated with payment devices processed on-site or in a private retailer's network, such as data from loyalty or program-specific cards.
Desirably, all input devices used in accordance with the present invention include a secure area comprising a processor, a memory or storage unit, and tamper-response electronics. The memory of the input devices may store one or more encryption algorithms, keys, and/or ciphers used to immediately encrypt input information upon receipt. In a preferred embodiment, the input devices may allow triple-DES derived unique key per transaction (DUKPT) encryption of input information. As described below, in the case of unauthorized access or tampering detected at the tamper-response electronics, the input device's contents, including data contained in or handled by the input device's processor and/or memory, are preferably erased, deleted, or destroyed. Alternatively, any portion of the contents of the input device sufficient to identify input information or encryption algorithms, keys, and/or ciphers is erased should tampering occur.
The term “layer” is used herein comprise one or more sheets, films, substrates, or the like and may include (by way of example only) printed circuits, switches, and other electronic components, adhesives, insulating materials, shields, and sealants.
Some embodiments of the present invention are particularly suitable for use with an input device in a retail service station environment, and the below discussion will describe preferred embodiments in that context. However, those of skill in the art will understand that the present invention is not so limited. In fact, it is contemplated that the present invention be used with any appropriate retail environment. Additionally, it is contemplated that the present invention be used with any suitable input device carrying information that requires protection from tampering.
Referring now to
The central building 12 may further house a site controller (SC) 26, which in an exemplary embodiment may be the PASSPORT® POS system, sold by Gilbarco Inc. of Greensboro, N.C., although third party site controllers may be used. Site controller 26 may control the authorization of fueling transactions and other conventional activities as is well understood, and site controller 26 may preferably be in operative communication with each POS. Alternatively, site controller 26 may be incorporated into a POS, such as point of sale 22 if needed or desired.
Further, site controller 26 may have an off-site communication link 28 allowing communication with a remote host processing system 30 for credit/debit card authorization, content provision, reporting purposes or the like, as needed or desired. In one embodiment, communication link 28 may be a stand alone router, switch, or gateway, although it should be appreciated that site controller 26 may additionally perform the functions of, and therefore replace, such a device. The off-site communication link 28 may be routed through the Public Switched Telephone Network (PSTN), the Internet, both, or the like, as needed or desired. Remote host processing system 30 may comprise at least one server maintained by a third party, such as a financial institution. Although only one remote host processing system 30 is illustrated, those of skill in the art will appreciate that in a retail payment system allowing payment via payment devices issued by multiple payment card companies or financial institutions, site controller 26 may be in communication with a plurality of remote host processing systems 30.
Car wash 14 may have a POS 32 associated therewith that communicates with site controller 26 for inventory and/or sales purposes. Car wash 14 alternatively may be a stand alone unit. Note that car wash 14, convenience store 18, and quick serve restaurant 20 are all optional and need not be present in a given fueling environment.
Fueling islands 16 may have one or more fuel dispensers 34 positioned thereon. Fuel dispensers 34 may be, for example, the ENCORE® sold by Gilbarco Inc. of Greensboro, N.C. Fuel dispensers 34 are in electronic communication with site controller 26 through any suitable link, such as two wire, RS 422, Ethernet, wireless, etc. if needed or desired.
Fueling environment 10 also has one or more underground storage tanks (USTs) 36 adapted to hold fuel therein. As such, USTs 36 may each be a double walled tank. Further, each UST 36 may include a tank monitor (TM) 38 associated therewith. Tank monitors 38 may communicate with fuel dispensers 34 (either through site controller 26 or directly, as needed or desired) to determine amounts of fuel dispensed and compare fuel dispensed to current levels of fuel within USTs 36 to determine if USTs 36 are leaking.
Tank monitor 38 may communicate with site controller 26 and further may have an off-site communication link 40 for leak detection reporting, inventory reporting, or the like. Much like off-site communication link 28, off-site communication link 40 may be through the PSTN, the Internet, both, or the like. If off-site communication link 28 is present, off-site communication link 40 need not be present and vice versa, although both links may be present if needed or desired.
Further information on and examples of fuel dispensers and retail fueling environments are provided in U.S. Pat. No. 6,435,204 (entitled “Fuel Dispensing System”); U.S. Pat. No. 5,956,259 (entitled “Intelligent Fueling”); U.S. Pat. No. 5,734,851 (entitled “Multimedia Video/Graphics in Fuel Dispensers”); U.S. Pat. No. 6,052,629 (entitled “Internet Capable Browser Dispenser Architecture”); U.S. Pat. No. 5,689,071 (entitled “Wide Range, High Accuracy Flow Meter”); U.S. Pat. No. 6,935,191 (entitled “Fuel Dispenser Fuel Flow Meter Device, System and Method”); and U.S. Pat. No. 7,289,877 (entitled “Fuel Dispensing System for Cash Customers”), all of which are incorporated herein by reference in their entireties for all purposes. An exemplary tank monitor 38 may be the TLS-450 manufactured and sold by the Veeder-Root Company of Simsbury, Conn. For more information about tank monitors and their operation, reference is made to U.S. Pat. No. 5,423,457 (entitled “Real time tank product loss detection system”); U.S. Pat. No. 5,400,253 (entitled “Automated Statistical Inventory Reconciliation System for Convenience Stores and Auto/truck Service Stations”); U.S. Pat. No. 5,319,545 (entitled “System to Monitor Multiple Fuel Dispensers and Fuel Supply Tank”); and U.S. Pat. No. 4,977,528 (entitled “Apparatus and Method for Determining the Amount of Material in A Tank”), all of which are incorporated by reference herein in their entireties for all purposes.
The memory of control system 42 may be any suitable memory or computer-readable medium as long as it is capable of being accessed by the control system, including random access memory (RAM), read-only memory (ROM), erasable programmable ROM (EPROM), or electrically EPROM (EEPROM), CD-ROM, DVD, or other optical disk storage, solid-state drive (SSD), magnetic disc storage, including floppy or hard drives, any type of suitable non-volatile memories, such as secure digital (SD), flash memory, memory stick, or any other medium that may be used to carry or store computer program code in the form of computer-executable programs, instructions, or data. Control system 42 may also include a portion of memory accessible only to control system 42.
In the illustrated embodiment, dispenser 34 has a base 44 and a top 46, with a canopy 48 supported by two side panels 50. Fuel dispenser 34 is subdivided into multiple compartments. In this regard, a hydraulic area 52 encloses hydraulic components and an electronic area 54 encloses electronic components. A vapor barrier may be used to separate the hydraulic area 52 from the electronic area 54.
Several components used to control fuel flow may be housed within the hydraulic area 52. Fuel from USTs 36 is pumped through a piping network into inlet pipe 56. Fuel being dispensed passes though a meter 58, which is responsive to flow rate or volume. A displacement sensor 60 (e.g., pulser) is employed to generate a signal in response to fuel flow though the meter 58. Signals indicative of the flow of fuel being dispensed are provided to control system 42 via control lines 62. Control/data lines 62 may provide control signaling to a valve 64 that may be opened and closed to permit or not permit dispensing of fuel.
Meter flow measurements from sensor 60 are collected by control system 42. Control system 42 also typically performs calculations such as cost associated with a fuel dispensing transaction. Additionally, control system 42 controls transactional processing at fuel dispenser 34 as will be described in more detail below.
As a dispensing transaction progresses, fuel is then delivered to a hose 66 and through a nozzle 68 into the customer's vehicle. Dispenser 34 includes a nozzle boot 70, which may be used to hold and retain nozzle 68 when not in use. Nozzle boot 70 may include a mechanical or electronic switch to indicate when nozzle 68 has been removed for a fuel dispensing request and when nozzle 68 has been replaced, signifying the end of a fueling transaction. A control line provides a signaling path from the electronic switch to control system 42. Control system 42 may use signaling received via the control line in order to make a determination as to when a transaction has been initiated or completed.
Control/data lines 72 provide electronic communication between control system 42 and a user interface 74. User interface 74 includes various combinations of subsystems to facilitate customer interaction with dispenser 34 and acceptance of payment for dispensed fuel. A bezel 76 acts as a lip around the various subsystems of interface 74. In most cases, bezel 76 is flush with the face of the fuel dispenser; however, in some embodiments it may extend outwardly from the face, in effect forming a raised lip. Bezel 76 may also comprise a plurality of sections that frame or house various subsystems or components.
As shown, user interface 74 includes several input devices. For example, user interface 74 may include a keypad 78. Keypad 78 is typically used for entry of a PIN if the customer is using a debit card for payment of fuel or other goods or services. In a preferred embodiment, keypad 78 may be the FlexPay™ encrypting PIN pad offered by Gilbarco Inc. User interface 74 may also include a secure card reader 80 for accepting credit, debit, or other chip or magnetic stripe cards for payment. Additionally, secure card reader 80 may accept loyalty or program-specific cards.
User interface 74 may also include other input devices such as a contactless card reader 82 (e.g., for integrated circuit or “smart” cards). Further, user interface 74 may include other payment or transactional devices such as a bill acceptor 84, a receipt printer 86, and a change delivery device 88. Receipt printer 86 may provide a customer with a receipt of the transaction carried out at fuel dispenser 34. Change delivery device 88 may deliver change to a customer for overpayment. Other transactional devices, such as an optical reader and a biometric reader, are also contemplated.
A display 90 may be used to display information, such as transaction-related prompts and advertising, to the customer. In some embodiments, a touch screen may be used for display 90. In this case, display 90 may be configured to display a virtual keypad for receiving payment data such as a PIN of a debit card or the billing zip code of a credit card, for instance. Display 90 may also be used to receive a selection from the customer regarding the displayed information.
The customer may use soft keys 92 to respond to information requests presented to the user via the display 90. An intercom 94 may be provided to generate audible cues for the customer and to allow the customer to interact with an attendant. In addition, dispenser 34 may include a transaction price total display 96 that presents the customer with the price for fuel that is dispensed. A transaction gallon total display 98 may be used to present the customer with the measurement of fuel dispensed in units of gallons or liters. Octane selection buttons 100 may be provided for the customer to select which grade of fuel is to be dispensed before dispensing is initiated. Finally, price per unit (PPU) displays 102 may be provided to show the price per unit of fuel dispensed in either gallons or liters, depending on the programming of dispenser 34.
As noted above, embodiments of the invention relate to sensors for detecting unauthorized removal of or tampering with an input device. For example, some embodiments provide a flexible circuit assembly which may be used for detecting tampering at a card reader. In this regard,
Card reader 110 may comprise a dual-sided read head 112 for receiving information from a payment card, such as a magnetic stripe or EMV card, which may be inserted into a read slot 114. Card reader 110 may further comprise a housing 116 containing card reader electronics (described in more detail below) and at least one input-output (“I/O”) port 118 for receiving and loading encryption keys. In presently preferred embodiments, secure card reader 110 may be similar to the MagTek® PermaSeal secure card reader or the FlexPay™ secure card reader offered by Gilbarco Inc.
As will be appreciated, card reader 110 may be configured for mounting with a bezel of a fuel dispenser, such as bezel 76 described above. Thus, card reader 110 may define a front face 120 and a flange 122 disposed behind front face 120. After mounting, front face 120 is flush with a front surface of the bezel and flange 122 is adjoins a rear surface of the bezel. Because flange 122 defines a larger area than front face 120, flange 122 prevents removal of card reader 110 from the front of the bezel and offers a measure of weather protection for the electronics in housing 116.
A bracket may preferably be used to secure card reader 110 to the bezel, although other mounting methods are contemplated. As shown in
Generally, according to embodiments of the present invention, a flexible circuit assembly may be coupled between an input device and a structure to which the input device is mounted. Preferably, pressure applied to the flexible circuit assembly during mounting actuates at least one switch in a layer of the flexible circuit assembly to complete a removal detection circuit. Thus, when the device is removed during an attempt to compromise the device, the removal detection circuit will be opened. The input device is preferably provided with tamper-response electronics to detect the removal attempt and take appropriate action to prevent fraud.
A flexible circuit assembly of the present invention may be coupled with an input device in many different locations depending on the input device in question and the method by which it is mounted to a structure. By way of example, however,
When card reader 110 is secured to a fuel dispenser bezel, flexible circuit assembly 126 may be compressed between flange 122 and the rear surface of the bezel. As described below, this pressure on flexible circuit assembly 126 preferably closes one or more switches disposed in a layer of flexible circuit assembly 126. Here, four such switches 134 are shown schematically.
Outer layer 136 preferably comprises a first tamper-responsive conductor circuit 140. Those of skill in the art are familiar with tamper-responsive conductor circuits (sometimes referred to as tamper-responsive “mesh”). For example, tamper-responsive conductor circuit 140 may be formed of a pair of closely-spaced conductive patterns 142, 144 screen printed onto the flexible substrate of outer layer 136. (It will be appreciated that other deposition techniques may be used to form patterns 142, 144 on the flexible substrate.) Conductive patterns 142, 144 may be formed of any suitable conductive material, such as silver or copper, and follow a serpentine path along the flexible substrate. Additionally, although not shown in
Patterns 142, 144, which preferably substantially cover outer layer 136, begin and terminate at connector 130. Thus, tamper-responsive conductive circuit 140 may preferably be adapted for electrical communication with tamper-response electronics in a secure area of an input device. Further, the tamper-responsive conductor circuit extends over the portion of outer layer 136 defining part of cable 128, and thus the connection between the tamper-response electronics and flexible circuit assembly 126 is also protected against tampering. Those of skill in the art will appreciate that, in use, tamper-response electronics continuously monitor one or more electrical characteristics (such as resistance or voltage) of conductive patterns 142, 144. Patterns 142, 144 are preferably positioned such that tampering will cause either or both of patterns 142, 144 to break or a short to occur. The tamper-response electronics will then detect a change in one or more electrical characteristics and take appropriate action to prevent fraud, such as setting an alarm and disabling the input device or erasing or overwriting a memory of the input device.
As explained above, flexible circuit assembly 126 preferably comprises one or more switches configured to close when flexible circuit assembly 126 is mounted. Preferably, these switches are disposed in first inner layer 138 and function to selectively complete a removal detection circuit as described below. Although any suitable switch can be used, the switches may preferably be momentary contact, push button type devices typically found in membrane switches. As shown, switches 134 may preferably be similar to the membrane switches offered by Xymox Technologies, Inc. of Milwaukee, Wis.
Thus, for example, the flexible substrate of first inner layer 138 may comprise printed conductors forming a circuit having open contacts at the locations of switches 134. First inner layer 138 may also comprise spacer layer to space a second flexible substrate containing conductive pads or the like from the substrate on which the circuit is printed. Although the spacer layer normally holds the conductive pads out of contact with the open contacts, pressure applied to the area of switches 134 causes the conductive pads to complete the circuit. In some embodiments, switches 134 may be tactile and comprise a metal (e.g., stainless steel) or polyester dome. Additional background information regarding the construction of suitable membrane switches is provided in U.S. Pat. No. 4,217,473 to Parkinson and U.S. Pat. No. 4,218,600 to Kissner, each of which is incorporated herein by reference in its entirety for all purposes.
Although some embodiments of flexible circuit assembly 126 may comprise only outer layer 136 and first inner layer 138, additional tamper-response security may obtain by providing a second inner layer 146 (preferably made of a material similar to that of layers 136 and 138). Second inner layer 146 may be disposed between first inner layer 138 and the input device to which flexible circuit assembly 126 is affixed. Also, second inner layer 146 preferably comprises a second tamper-responsive conductor circuit 148 formed of printed conductors 150, 152. Second inner layer 146 and tamper-responsive conductor circuit 148 are preferably analogous to first inner layer 136 and tamper-responsive conductor circuit 140, respectively. Additionally, in some embodiments tamper-responsive conductor circuits 140, 148 may be combined to form a single tamper-responsive conductor circuit spanning multiple layers.
As noted above, flexible circuit assembly 126 is preferably in electrical communication with a secure area of an input device. Generally, the secure area may be a tamper-protected physical enclosure for components of an input device which carry sensitive information, such as encryption keys or customer account numbers. Thus, the secure area may be protected by one or more tamper-responsive conductor circuits and/or encased in epoxy or the like. Background information regarding secure areas for electronic components of an input device is found in U.S. Pat. No. 6,853,093 to Cohen et al., the entire disclosure of which is incorporated herein by reference for all purposes.
More particularly,
The circuits in flexible circuit assembly 126 may be in electrical communication with tamper-responsive electronics 160. Tamper-responsive conductor circuits 140, 148 were described above with reference to
Tamper-response electronics 160 preferably monitor the electrical characteristics of the circuits in flexible circuit assembly 126 and provide outputs to processor 156. Processor 156 may determine whether a change in a measured parameter indicates tampering, such as where the parameter exceeds a predetermined threshold. If tampering is indicated, processor 156 may instruct tamper-response electronics 160 to erase and/or overwrite the data stored in memory 158. Alternatively, processor 156 may set a tamper flag and disable card reader 110 until card reader 110 is “rearmed” by authorized service personnel.
Those of skill in the art will appreciate that processor 156, memory 158, and tamper-response electronics 160 are shown as discrete elements only to facilitate description of preferred embodiments. In other embodiments, any or all of these elements may be arranged differently and/or combined, such as into one or more integrated circuits.
This embodiment may be preferred where it is desired that would-be tamperers not know in advance the location of the security feature they are attempting to disable. In particular, because of the small physical dimensions of flexible circuit assembly 200, this device may be affixed to an input device in a random position during manufacturing. It will be appreciated that random positioning of flexible circuit assembly 200 adds an additional security feature to be overcome. Depending on the application, it may be desirable to use more than one circuit assembly 200 with a single input device, arranged randomly with respect to each other.
While one or more preferred embodiments of the invention have been described above, it should be understood that any and all equivalent realizations of the present invention are included within the scope and spirit thereof. The embodiments depicted are presented by way of example only and are not intended as limitations upon the present invention. Thus, it should be understood by those of ordinary skill in this art that the present invention is not limited to these embodiments since modifications can be made. Therefore, it is contemplated that any and all such embodiments are included in the present invention as may fall within the scope and spirit thereof.
Number | Name | Date | Kind |
---|---|---|---|
4217473 | Parkinson | Aug 1980 | A |
4218600 | Kissner | Aug 1980 | A |
4811288 | Kleijne et al. | Mar 1989 | A |
4977528 | Norris | Dec 1990 | A |
5319545 | McGarvey et al. | Jun 1994 | A |
5400253 | O'Connor | Mar 1995 | A |
5423457 | Nicholas et al. | Jun 1995 | A |
5448638 | Johnson et al. | Sep 1995 | A |
5689071 | Ruffner et al. | Nov 1997 | A |
5734851 | Leatherman et al. | Mar 1998 | A |
5747757 | Van Zeeland et al. | May 1998 | A |
5956259 | Hartsell, Jr. et al. | Sep 1999 | A |
6052629 | Leatherman et al. | Apr 2000 | A |
6435204 | White et al. | Aug 2002 | B2 |
6686539 | Farquhar et al. | Feb 2004 | B2 |
6853093 | Cohen et al. | Feb 2005 | B2 |
6935191 | Olivier et al. | Aug 2005 | B2 |
7151461 | Wilson et al. | Dec 2006 | B2 |
7214874 | Dangler et al. | May 2007 | B2 |
7289877 | Wilson | Oct 2007 | B2 |
7607576 | Robertson et al. | Oct 2009 | B2 |
7703201 | Oggioni et al. | Apr 2010 | B2 |
7710286 | Thornley et al. | May 2010 | B1 |
7832628 | Mittler | Nov 2010 | B2 |
7843339 | Kirmayer | Nov 2010 | B2 |
7898413 | Hsu et al. | Mar 2011 | B2 |
7902993 | DeMarco | Mar 2011 | B2 |
20070271544 | Engstrom | Nov 2007 | A1 |
20080120191 | Long | May 2008 | A1 |
20080278353 | Smith et al. | Nov 2008 | A1 |
20090070583 | von Mueller et al. | Mar 2009 | A1 |
20090089214 | Weston et al. | Apr 2009 | A1 |
20090119221 | Weston et al. | May 2009 | A1 |
20090154696 | Robertson et al. | Jun 2009 | A1 |
20090222383 | Tato et al. | Sep 2009 | A1 |
20090265638 | Carapelli et al. | Oct 2009 | A1 |
20100268612 | Berrio et al. | Oct 2010 | A1 |
20110013044 | Steinberg et al. | Jan 2011 | A1 |
20110047081 | Kelly et al. | Feb 2011 | A1 |
20110199308 | Nativel et al. | Aug 2011 | A1 |
20120180140 | Barrowman et al. | Jul 2012 | A1 |
20130300453 | Carapelli et al. | Nov 2013 | A1 |
Number | Date | Country |
---|---|---|
1408459 | Apr 2004 | EP |
Entry |
---|
International Search Report and Written Opinion dated Aug. 10, 2012 for corresponding PCT Application No. PCT/US2012/037283, International Filing Date May 10, 2012. |
Number | Date | Country | |
---|---|---|---|
20120286760 A1 | Nov 2012 | US |