Automated software programs, referred to as bots, web bots, or robots, typically run automated scripts to perform simple tasks at a faster rate than a human. There are various types of bots. The most popular bots are web spiders or crawlers that are used by search engines to search the content of a website to generate indices of the website's content for a search engine. A chat bot engages in conversations with humans or other bots. A shopbot searches the Internet for the best price for a commodity.
However, bots have been employed for malicious purposes. Bots have been used to sign up for free email accounts every minute in order to send thousands of junk emails. Bots have been used to participate in online chatrooms in order to direct the chatroom's participants to advertisements. Bots have been used to participate in online polls in order to influence the outcome of the poll in a desired manner. Bots have also been used to impersonate humans to target and persuade humans to give away or provide sensitive information.
To combat bots, programs are used that facilitate tests that are capable of only being passed by a human user in order to detect a bot. However, some of these tests are cumbersome and time-consuming for a human. Others may be dependent on the user's language, physical location and education and not universally applicable for wide spread use.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
A user interface uses a gamified challenge to determine whether the input detected through the user interface is from a human or a non-human user. In one aspect, the gamified challenge is a dynamic geometric-series based challenge that displays a random, variable-length sequence of different types of geometric objects. The objects in the sequence are animated, colored, and/or oriented at a particular angle. The user has to play the gamified challenge by repeating the order in which the objects are animated in the user interface or by engaging with the geometric-series based challenge as dynamically instructed by the challenge. For example, the instructions may dictate that the user click only on the red objects or blue squares that are pulsated. The challenge is dynamically-constructed in order to ensure that a bot does not detect patterns in the challenge.
The gamified challenge is utilized when the user interface suspects that input may be generated from a non-human user. This suspicion is based on a risk level that considers several features extracted from the user session and from usage metrics of the website. A risk engine associated with the website monitors the behavior of the user session communications and usage metrics in order to generate a risk level based on that behavior.
The gamified challenge becomes progressively harder when a challenge is failed or when the tracked features suggest that the challenge is actively being tampered with. The number of objects in the sequence may be increased, a different type of animation may be used, additional geometric objects may be used and/or the orientation of the objects may change. The user is given a predetermined amount of time to pass the challenge and/or a pre-configured amount of attempts. When the user fails the challenge due to a set number of attempts or failure within the allotted time frame, the user is denied any further interactions with the website and suspected of being a non-human user.
These and other features and advantages will be apparent from a reading of the following detailed description and a review of the associated drawings. It is to be understood that both the foregoing general description and the following detailed description are explanatory only and are not restrictive of aspects as claimed.
Overview
The aspects disclosed pertain to various mechanisms for detecting a non-human user interacting with a website. A user interface of the website uses a gamified challenge to determine whether the input detected through the user interface is from a human or a non-human user or bot. In one aspect, the gamified challenge is a dynamic geometric-series based challenge that displays a random, variable-length, sequence of different types of geometric objects. The objects in the sequence are animated, colored, and/or oriented at a particular angle. The user has to play the gamified challenge in order to obtain access to a resource or service from the website, such as obtaining a new user account, or the like.
The gamified challenge is utilized when the user interface suspects that input may be generated from a non-human user. This suspicion is based on a risk level that considers factors associated with the user. A risk engine monitors the behavior of the user accessing resources/services of the website and the usage of the website in general in order to determine if a non-human user is interacting with the user interface.
The gamified challenge becomes progressively harder when a challenge is failed. The number of objects in the sequence may be increased, a different type of animation may be used, additional geometric objects may be used and/or the orientation of the objects may change. The user is given a predetermined amount of time to pass the challenge and/or a pre-configured amount of attempts. When the user fails the challenge after a threshold number of attempts within the allotted time frame, the user is denied any further interactions with the website and suspected of being a non-human user.
The gamified challenge applies gaming elements to the challenge to make the challenge more engaging and attractive to a human. The geometric objects are universally-known shapes and are not constrained to a particular language or geographic location. The gaming elements make the challenge entertaining and an enjoyable experience. The animation of the gaming elements in a sequence can be easily comprehended by a human user but challenging for a bot.
The gamified challenge includes instructions that inform the user on what to do with the displayed geometric objects. For example, the gamified challenge may instruct a user to click on red or blue objects that are pulsated or click on a sequence of objects in a particular order.
Gamified differs from playing games online. Gamified pertains to using game design elements to situations that are not designed to be games. For example, in one aspect, the gamified challenge is utilized in servicing new account requests. The gamified challenge is given to an anonymous user in order to ensure that the user is a human rather than a bot.
Attention now turns to a further discussion of the system, devices, components, and methods utilized in a code completion system.
System
At least one website 104A utilizes the gamified challenge during a new user account registration process. The website 104A offers resource and/or services to registered users through the Internet which requires a user to have an account with the website. The resources and/or services may include an online software subscription service (e.g., Office365, etc.), a webmail service (e.g., Gmail, outlook, yahoo mail), and the like.
The website 104A includes a user account component 114, a user interface component 116, and a gamified challenge component 118. The user account component 114 maintains a repository of the registered user accounts. The user interface component 116 interacts with the user through visual displays to obtain input data and to display output data. The user interface component 116 may be part of an operating system. The user interface component 116 may generate web pages that are provided to the browser of the user device 102 to facilitate communications between the user device 102 and the website 104A.
The gamified challenge component 118 interacts with the user to facilitate the challenges. The gamified challenge component 118 provides one or more dynamic challenges to the user, obtains the responses from the user, and analyzes the responses. The gamified challenge component 118 may be part of the user interface component.
The risk engine 112 monitors the activities that are performed in a user session and the activities performed at all the websites of the cloud service. The monitored activities are then characterized by several factors, such as the number of times the user fails a challenge, the number of times the user exceeds an expected time to complete a challenge, the location of the client device engaged in the user session, the reputation of the IP address used to communicate with the website, the browser and browser extension used, and the time-of-day the communication is initiated. The reputation of the IP address is based on the frequency of accesses to the cloud service from an IP address, the amount of spam generated from the IP address, the number of DOS attacks attributable to the IP address, and the like.
The user account component 114, the user interface component 116, the gamified challenge component 118, and the risk engine 112 may be a sequence of computer program instructions, that when executed by a processor, causes the processor to perform methods and/or operations in accordance with a prescribed task. These components may be implemented as program code, programs, procedures, module, code segments, program stacks, middleware, firmware, methods, routines, and so on. The executable computer program instructions may be implemented according to a predefined computer language, manner or syntax, for instructing a computer to perform a certain function. The instructions may be implemented using any suitable high-level, low-level, object-oriented, visual, compiled and/or interpreted programming language.
It should be noted that
Attention now turns to an exemplary illustration of the gamified challenge. In one aspect, the gamified challenge is used in the registration of a new user's account with a website. Referring to
The user interface component 116 issues a request to the risk engine 112 to determine if there is a risk associated with the new account request. For example, the IP address associated with the request may have been previously associated with numerous failed logon attempts and, in this case, the gamified challenge component 118 presents a first-level gamified challenge to the user.
In addition, the geometric shapes may be displayed in different colors and in a particular orientation. There are instructions 302 on the user display that explain the gamified challenge. For example, a gamified challenge 308 appears which presents a sequence of animated geometric objects in a particular order. The user has to hit the play icon 306 and repeat the sequence by touching/clicking each of the geometric shapes in the same order that the shapes are displayed in the challenge 308.
As shown in
The gamified challenge component 118 tracks the sequence input by the user. If the sequence is correct, an acceptance display 312 is generated, as shown in
Alternatively, a user may be given a preconfigured amount of time to complete the gamified challenge. The time limit applied to the gamified challenge is based on the amount of time that a human user would normally take to complete the challenge. If the user does not complete the challenge within the prescribed time allotment, the gamified challenge component generates another error display 316, 320 as shown in
The increased level of complexity may include additional geometric objects, a different animation, and a longer challenge sequence as shown in
The increased level of complexity may also include a challenge that alters the orientation of the geometric objects. An orientation is the angular position of an object relative to the Cartesian coordinate system. Turning to
If the user passes a challenge, the acceptance display shown in
Methods.
Attention now turns to description of the various exemplary methods that utilize the system and device disclosed herein. Operations for the aspects may be further described with reference to various exemplary methods. It may be appreciated that the representative methods do not necessarily have to be executed in the order presented, or in any particular order, unless otherwise indicated. Moreover, various activities described with respect to the methods can be executed in serial or parallel fashion, or any combination of serial and parallel operations. In one or more aspects, the method illustrates operations for the systems and devices disclosed herein.
Turning to
A website 104A receives a request to initiate a user session with a user device 102 (block 402).
Turning to
During the user session, the risk engine 112 tracks certain features from the information provided in each request and in the actions performed by the requester. These features may be recorded by session identifier and/or IP address. These features may include the IP address of the source of the request, the geographic location of the source of the request, the time-of-day the request was made, and the type of browser or browser extension used to make the request, and the IP address reputation. IP addresses associated with malicious activities, such as spam, denial-of-service attacks, fraudulent account creations, and the like may be tracked by third party services that are available to the risk engine 112. The risk engine uses the IP address to obtain the IP address reputation of the current user session. (Collectively, block 504).
The geographic location of the source of the request is considered since certain locations are more likely to be associated with malicious activities. The time-of-day a request is made is significant especially if requests are made consistently at the same time periodically over a time span. Typically, user-initiated requests are relatively random events with no clear pattern. Automatically-initiated requests tend to exhibit a periodic pattern that occur routinely over some time interval. The type of browser is significant since some browsers or browser extensions are known to have security exploits making them easily compromised. Additionally, the risk engine 112 tracks features performed by the user in the user session. For example, the risk engine 112 may track the number of challenges performed, the number of failed challenge attempts, and the number of timed-out challenge attempts (Collectively, block 504).
In addition, the risk engine 112 tracks usage metrics of the website and/or other websites in the cloud service. For example, the risk engine 112 may collect the number of new account requests and the number of failed logon attempts, number of failed challenges, and frequency of access by each IP address to the website. These usage metrics are used to gain insight into the current processing load of the website. The repeated failed logon attempts or repeated new account requests within a time span may be indicative of an automated program performing these activities. (Collectively, block 506).
Returning back to
Otherwise, when the email address or phone number is not associated with an existing user account and before the new user account is opened, the new user account component 116 checks the reputation of the requestor by obtaining a risk level from the risk engine 112. The risk level is used to identify the complexity of the gamified challenge. (Collectively, block 404).
Turning to
Alternatively, the risk engine 112 may use heuristics to identify patterns from the features and metrics. For example, when a new user account request is generated at the same time-of-day from the same geographic location from the same IP address routinely, the risk engine would generate a high-risk level indicating a suspicion that the challenge is being tampered with or initiated from a non-human user.
Turning back to
The user interface component 116 initiates the gamified challenge component 118 to dynamically generate a first-level gamified challenge, such as the gamified challenge shown in
Otherwise (block 412—no), the gamified challenge component 118 proceeds with adding an extra level of complexity to the challenge (block 410) if the user has not exceeded a threshold number of attempts (block 414—no). The gamified challenge component 118 may add additional geometric objects to the challenge, place all the geometric objects in a different orientation and/or animation, and increase the length of the challenge sequence. For example, any one of the challenges shown in
If the user fails the challenge after the allotted number of attempts (block 414—yes), then the request is rejected (block 416). The user interface component 116 may notify the user as shown in the user display of
Exemplary Operating Environment
Attention now turns to a discussion of an exemplary operating environment.
A computing devices 602 may be any type of electronic device, such as, without limitation, a mobile device, a personal digital assistant, a mobile computing device, a smart phone, a cellular telephone, a handheld computer, a server, a server array or server farm, a web server, a network server, a blade server, an Internet server, a work station, a mini-computer, a mainframe computer, a supercomputer, a network appliance, a web appliance, a distributed computing system, multiprocessor systems, or combination thereof. The operating environment 400 may be configured in a network environment, a distributed environment, a multi-processor environment, or a stand-alone computing device having access to remote or local storage devices.
The computing device 602 may include one or more processors 606, one or more communication interfaces 608, one or more storage devices 610, one or more input/output devices 612, and one or more memory devices 614. A processor 606 may be any commercially available or customized processor and may include dual microprocessors and multi-processor architectures. The communication interface 608 facilitates wired or wireless communications between the computing device 602 and other devices. A storage device 610 may be computer-readable medium that does not contain propagating signals, such as modulated data signals transmitted through a carrier wave. Examples of a storage device 610 include without limitation RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD), or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage, all of which do not contain propagating signals, such as modulated data signals transmitted through a carrier wave. There may be multiple storage devices 610 in the computing device 602. The input/output devices 612 may include a keyboard, mouse, pen, voice input device, touch input device, display, speakers, printers, etc., and any combination thereof.
A memory device 614 may be any non-transitory computer-readable storage media that may store executable procedures, applications, and data. The computer-readable storage media does not pertain to propagated signals, such as modulated data signals transmitted through a carrier wave. It may be any type of non-transitory memory device (e.g., random access memory, read-only memory, etc.), magnetic storage, volatile storage, non-volatile storage, optical storage, DVD, CD, floppy disk drive, etc. that does not pertain to propagated signals, such as modulated data signals transmitted through a carrier wave. A memory device 614 may also include one or more external storage devices or remotely located storage devices that do not pertain to propagated signals, such as modulated data signals transmitted through a carrier wave. The memory device 614 may include an operating system 616, a user account component 618, a user interface component 620, a gamified challenge component 622, a risk engine 624, and other applications and data 626.
A computing device 602 may be communicatively coupled to a network 604. The network 604 may be configured as an ad hoc network, an intranet, an extranet, a virtual private network (VPN), a local area network (LAN), a wireless LAN (WLAN), a wide area network (WAN), a wireless WAN (WWAN), a metropolitan network (MAN), the Internet, a portions of the Public Switched Telephone Network (PSTN), plain old telephone service (POTS) network, a wireless network, a WiFi® network, or any other type of network or combination of networks.
The network 604 may employ a variety of wired and/or wireless communication protocols and/or technologies. Various generations of different communication protocols and/or technologies that may be employed by a network may include, without limitation, Global System for Mobile Communication (GSM), General Packet Radio Services (GPRS), Enhanced Data GSM Environment (EDGE), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (W-CDMA), Code Division Multiple Access 2000, (CDMA-2000), High Speed Downlink Packet Access (HSDPA), Long Term Evolution (LTE), Universal Mobile Telecommunications System (UMTS), Evolution-Data Optimized (Ev-DO), Worldwide Interoperability for Microwave Access (WiMax), Time Division Multiple Access (TDMA), Orthogonal Frequency Division Multiplexing (OFDM), Ultra Wide Band (UWB), Wireless Application Protocol (WAP), User Datagram Protocol (UDP), Transmission Control Protocol/Internet Protocol (TCP/IP), any portion of the Open Systems Interconnection (OSI) model protocols, Session Initiated Protocol/Real-Time Transport Protocol (SIP/RTP), Short Message Service (SMS), Multimedia Messaging Service (MMS), or any other communication protocols and/or technologies.
In one aspect, one or more of the computing devices 602 may be part of a cloud service. A cloud service is any service made available to users on demand from the Internet from a cloud service provider, other than the user's on-premise servers. Cloud services include online data storage and backup solutions, web-based email services, hosted office suites, document collaboration services, database processing services, technical support services, etc. Examples of cloud services include Microsoft Azure, Google Cloud, Amazon Web Services, and the like.
In one aspect, the risk engine 628 may be located outside of the website or the cloud service. In this aspect, the risk engine 628 may utilize additional features and metrics to detect a non-human user. The risk engine 628 may utilize information from malware services that track the IP addresses of malicious activities. The risk engine 628 may analyze the network traffic into the website and/or cloud service to detect patterns of suspicious activity.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
A system is disclosed having one or more processors and a memory. The memory contains at least one program configured to be executed by the one or more processors. The at least one program including instructions that: during a user session for a new user account, track features from the request; generate a risk level based on the tracked features; based on a high risk level, initiate a gamified challenge before processing the request, the gamified challenge including a dynamically-generated sequence of geometric objects, a geometric object in the sequence having an orientation, color, and animation effect, the gamified challenge having instructions for a user to interact with one or more of the geometric objects in a particular order within a span of time; and upon a number of failed attempts at the gamified challenge, reject the request as being initiated from a non-human user.
In one aspect of the system, the tracked features include one or more of an IP address, a location associated with the IP address, a time-of-day, a browser used to initiate the request, or a browser extension used by the browser.
In another aspect of the system, the at least one program includes further instructions that upon a failed attempt at the gamified challenge, increase a complexity of the gamified challenge. The increased complexity is made by increasing a number of geometric objects in the sequence, by associating one or more geometric objects in the sequence with a different orientation, by associating one or more geometric object in the sequence with a different animation effect, or by adding different types of geometric objects into the sequence.
A method is disclosed comprising: tracking features extracted from a user's request at a computing device offering a resource; analyzing the tracked features to determine a risk level of the request being associated with a non-human user; based on the analysis indicating a high risk level, generating a gamified challenge, the gamified challenge including a sequence of geometrically-shaped objects, a geometrically-shaped object in the sequence having an orientation, color, and an animation effect, the gamified challenge having instructions for a user to interact with one or more of the geometrically-shaped objects in a particular order within a span of time; and based on the analysis indicating a low risk level, processing the user's request without generating the gamified challenge.
The method further comprises, upon detection of a failed attempt at the gamified challenge, increasing the complexity of the gamified challenge. Increasing the complexity of the gamified challenge further comprises, increasing a number of geometrically-shaped objects in the sequence, adding a different type of geometrically-shaped object to the sequence, associating one or more geometrically-shaped objects in the sequence with a different animation effect, or associating one or more geometrically-shaped objects in the sequence in a different orientation. The method further comprises, when a number of failed attempts at the gamified challenge exceeds a threshold, reject the request.
In one aspect, the tracked features include one or more of an IP address, a location associated with the IP address, a time-of-day, a browser used to initiate the request, or a browser extension used by the browser. In another aspect, the tracked features include usage metrics of the computing device. The method further comprises rejecting the request, when the challenge is not completed within a particular time limit.
A device is disclosed having a memory coupled to a processor. The processor is configured to: receive a request to establish a user session with the device; track features extracted from the established user session; based on the tracked features, generate a first gamified challenge to determine if a non-human user is communicating in the user session, the first gamified challenge including a first sequence of geometrically-shaped objects, a geometrically-shaped object in the first sequence having an orientation, color, and an animated effect, the first gamified challenge having a first set of instructions for a user to interact with one or more of the geometrically-shaped objects in a particular order and within a time limit; upon failure of the first gamified challenge, generate a second gamified challenge with a different sequence than the first sequence, the different sequence having additional geometrically-shaped objects and a second set of instructions that differ from the first set of instructions; and upon a subsequent failure of the second gamified challenge, terminate the request.
In an aspect, the tracked features include one or more of an IP address, a location associated with the IP address, a time-of-day, a browser used to initiate the request, or a browser extension used by the browser.
In an aspect, the second gamified challenge uses a different animated effect for each of the geometrically-shaped objects than in the first gamified challenge. In an aspect, the second gamified challenge uses a different orientation to display each of the geometrically-shaped objects than in the first gamified challenge.
In an aspect, the processor is further configured to use the extracted features to determine a risk level associated with the user of the request, the risk level being high when the extracted features indicate a past history of malicious activity.
In an aspect, the processor is further configured to use the extracted features to determine a risk level associated with the user of the request, the risk level being high when the extracted features indicate a pattern of repeated failed attempts from a common IP address.
Number | Name | Date | Kind |
---|---|---|---|
5921548 | Goldberg | Jul 1999 | A |
7653931 | Peterson | Jan 2010 | B1 |
8023927 | Coleman | Sep 2011 | B1 |
9272208 | LeTourneau | Mar 2016 | B1 |
9450958 | Saylor | Sep 2016 | B1 |
9519763 | Rodriguez | Dec 2016 | B1 |
9767263 | McInerny | Sep 2017 | B1 |
10007776 | Bailey | Jun 2018 | B1 |
10225252 | Den Boer et al. | Mar 2019 | B1 |
10482462 | Eidam | Nov 2019 | B1 |
10540492 | Norris, III | Jan 2020 | B1 |
10839066 | Pham | Nov 2020 | B1 |
20040172564 | Federova | Sep 2004 | A1 |
20050097320 | Golan | May 2005 | A1 |
20080216163 | Pratte | Sep 2008 | A1 |
20090150983 | Saxena | Jun 2009 | A1 |
20090150986 | Foreman | Jun 2009 | A1 |
20090187481 | Bonzi | Jul 2009 | A1 |
20100028846 | Cohen | Feb 2010 | A1 |
20100251388 | Dorfman | Sep 2010 | A1 |
20110150267 | Snelling | Jun 2011 | A1 |
20110264663 | Verkasalo | Oct 2011 | A1 |
20110282997 | Prince | Nov 2011 | A1 |
20110314540 | Poluri | Dec 2011 | A1 |
20120084450 | Nagamati | Apr 2012 | A1 |
20120117239 | Holloway | May 2012 | A1 |
20120166409 | Saxena | Jun 2012 | A1 |
20120243729 | Pasquero | Sep 2012 | A1 |
20120246737 | Paxton | Sep 2012 | A1 |
20120323700 | Aleksandrovich | Dec 2012 | A1 |
20130097697 | Zhu | Apr 2013 | A1 |
20130322616 | Bayer, Sr | Dec 2013 | A1 |
20140059663 | Rajshekar | Feb 2014 | A1 |
20140066176 | LeTourneau | Mar 2014 | A1 |
20140067474 | Deo | Mar 2014 | A1 |
20140181968 | Ge | Jun 2014 | A1 |
20140189798 | Grimaud | Jul 2014 | A1 |
20140189835 | Umerley | Jul 2014 | A1 |
20140208419 | Chang | Jul 2014 | A1 |
20140289833 | Briceno | Sep 2014 | A1 |
20140317723 | Hicks | Oct 2014 | A1 |
20140330900 | Libin | Nov 2014 | A1 |
20150190709 | Moorthy | Jul 2015 | A1 |
20150235018 | Gupta | Aug 2015 | A1 |
20150314440 | Parker | Nov 2015 | A1 |
20150317700 | Ford | Nov 2015 | A1 |
20160028730 | Natarajan | Jan 2016 | A1 |
20160065559 | Archer | Mar 2016 | A1 |
20160125193 | Dai Zovi | May 2016 | A1 |
20160234191 | Leong | Aug 2016 | A1 |
20160239656 | Yan | Aug 2016 | A1 |
20160300054 | Turgeman | Oct 2016 | A1 |
20170013012 | Hansen | Jan 2017 | A1 |
20170032113 | Tunnell | Feb 2017 | A1 |
20170060857 | Imbruce | Mar 2017 | A1 |
20170063932 | Hubbard | Mar 2017 | A1 |
20170109752 | Hubbard | Apr 2017 | A1 |
20170161490 | Fedor | Jun 2017 | A1 |
20170180348 | Piccolotto | Jun 2017 | A1 |
20170237766 | Mattson | Aug 2017 | A1 |
20170262623 | Plenderleith | Sep 2017 | A1 |
20170318019 | Gordon | Nov 2017 | A1 |
20180060550 | Li | Mar 2018 | A1 |
20180089453 | Scholz | Mar 2018 | A1 |
20180115597 | Gillette | Apr 2018 | A1 |
20180158053 | Adams | Jun 2018 | A1 |
20180197575 | Doherty | Jul 2018 | A1 |
20180310171 | Whitaker | Oct 2018 | A1 |
20180322270 | Bailey | Nov 2018 | A1 |
20180349206 | Erickson | Dec 2018 | A1 |
20190015747 | Thompson | Jan 2019 | A1 |
20190026448 | Bhamidipaty | Jan 2019 | A1 |
20190043241 | Scheff | Feb 2019 | A1 |
20190220588 | Agarwal | Jul 2019 | A1 |
20190236262 | Yamada | Aug 2019 | A1 |
20190244196 | John | Aug 2019 | A1 |
20190347399 | Cramer | Nov 2019 | A1 |
20190377861 | Whitney | Dec 2019 | A1 |
20190387005 | Zawoad | Dec 2019 | A1 |
20200012780 | Seshadri | Jan 2020 | A1 |
20200028874 | Lam | Jan 2020 | A1 |
20200042681 | Benkreira | Feb 2020 | A1 |
20200074059 | Beckett, Jr. | Mar 2020 | A1 |
20200076715 | Kondapalli | Mar 2020 | A1 |
20200089867 | Kim | Mar 2020 | A1 |
20200097643 | Uzun | Mar 2020 | A1 |
20200134159 | Ford | Apr 2020 | A1 |
20200193009 | Shafet | Jun 2020 | A1 |
20200204541 | Nair | Jun 2020 | A1 |
20200204845 | Laurent | Jun 2020 | A1 |
20200234310 | Daley | Jul 2020 | A1 |
20200280544 | Sivaraman | Sep 2020 | A1 |
20200288306 | Do | Sep 2020 | A1 |
20210109895 | Umashankar | Apr 2021 | A1 |
Number | Date | Country |
---|---|---|
3382934 | Oct 2018 | EP |
2010111169 | Sep 2010 | WO |
Entry |
---|
“International Search Report and Written Opinion Issued in PCT Application No. PCT/US20/056946”, dated Feb. 8, 2021, 10 Pages. |
Number | Date | Country | |
---|---|---|---|
20210133304 A1 | May 2021 | US |