The invention relates to the field of network based services and structures. More particularly, the invention relates to identity creation, management, authentication, and authorization structures for enhanced network services.
At the present time, the identity of an individual or user in a network environment, such as the Internet, is comprised of a large number of pieces of information, which is collected and recollected by a large number of entities. Some basic information regarding an individual, such as but not limited to name information, address information, identification information, financial information, profile information, and or preference information, is repeatedly collected and stored at a large number of system entities. Additional information, such as a user name and password, is created, as necessary, such that the individual or user can sign on and/or gain access to a service provider.
A large number of pieces of an individual's business and personal identity are therefore scattered across an increasing number of system entities, such as but not limited to commercial entities, banking and investment institutions, credit card companies, service providers, and/or educational institutions.
Individuals are therefore required to repeatedly enter much of the same information, in the process of numerous professional and/or personal endeavors. Furthermore, as the information for an individual changes, the stored information becomes increasingly impractical to manage and/or update. In addition, the numerous user names and passwords associated with an individual quickly becomes unwieldy, such that users often forget or lose track of the information they need to access services and/or accounts.
Several structures and methods have been described for identity and proxy-based networks, such as:
Other systems provide various details of the operation of network identity and proxy systems, such as U.S. Pat. No. 6,460,036, System and Method for Providing Customized Electronic Newspapers and Target Advertisements; U.S. Pat. No. 6,029,195, System for Customized Electronic Identification of Desirable Objects; U.S. Pat. No. 5,835,087, System for Generation of Object Profiles for a System for Customized Electronic Identification of Desirable Objects; U.S. Pat. No. 5,754,939, System for Generation of User Profiles for a System for Customized Electronic Identification of Desirable Objects; U.S. Pat. No. 5,754,938, Pseudonymous Server for System for Customized Electronic Identification of Desirable Objects; U.S. Pat. No. 6,490,620, Integrated Proxy Interface for Web Based Alarm Management Tools; U.S. Pat. No. 6,480,885, Dynamically Matching Users for Group Communications Based on a Threshold Degree of Matching of Sender and Recipient Predetermined Acceptance Criteria; U.S. Pat. No. 6,473,407, Integrated Proxy Interface for Web Based Alarm management Tools; U.S. Pat. No. 6,421,733, System for Dynamically Transcoding Data Transmitted Between Computers; U.S. Pat. No. 6,385,652, Customer Access Solutions Architecture; U.S. Pat. No. 6,373,817, Chase Me System; U.S. Pat. No. 6,338,064, Method for Enabling a Web Server Running a “Closed” Native Operating System to Impersonate a User of a Web Client to Obtain a Protected File; U.S. Pat. No. 6,259,782, One-Number Communications System and Service Integrating Wireline/Wireless Telephone Communications Systems; U.S. Pat. No. 5,974,566, Method and Apparatus for Providing Persistent Fault-Tolerant Proxy Login to a Web-Based Distributed File Service; European Pat. No. EP 1094404, Collaborator Discovery Method and System; European Pat. No. EP 1031206, Identity Discovery method for Detecting Authorized Security Service Which is Illicitly Transferring Decoding Capabilities for use in Unauthorized Security Devices; The Session Initiation Protocol: Internet-Centric Signaling; H. Schulzrinne, J. Rosenberg; IEEE Communications Magazine; October 2000; How Bluetooth Embeds in the Environment; Lawday, G.; Electronic Product Design; November 2001; and Business: Designing with Users in Internet Time; J. Braiterman, S. Verhage, and R. Choo; Interactions: September-October 2000.
It would be advantageous to provide an identity based service system, which does not require a user to create a user identity for each participant. The development of such an identity based service system would constitute a major technological advance.
Furthermore, it would be advantageous to provide an identity based service system, which allows a user to create an identity that can be controllably accessed and shared by a plurality of participants. The development of such an identity based service system would constitute a further technological advance.
As well, it would be advantageous that such an identity based service system be integrated with existing site authentication and authorization structures, such that the identity based service system is readily used by a wide variety of sites. The development of such an identity based service system would constitute a further major technological advance.
An identity based service system is provided, in which an identity is created and managed for a user or principal, such that at least a portion of the identity is available to use between one or more system entities. A system entity is able to discover a service descriptor, such as through a discovery service, given a service name and a name identifier of the user, whereby system entities can find and invoke the user's other personal web services. A translation is preferably provided between a plurality of namespaces, to prevent linkable identity information over time between system entities.
A principal 12, such as a user, user agent, is an entity 27 that can acquire a system identity 29, and be authenticated and vouched for 19 by a basic authentication agency (BAA) 14. A principal 12 often comprises a user or individual, using a user agent, either a web browser or a smart web services client.
A basic authentication agency (BAA) 14 authenticates and vouches for principals 12, and provides system management for system identities 29. A participant 16 provides service to one or more requesters, such as principals 12 or other participants 16, typically through a service consumer 48 (
The identity based service system 10a shown in
For example, a user U, through a principal 12, is able to authorize a participant 16 to access his or her contact data 94a (
The identity based system framework 10 enables participants 16 and other system entities 27 to craft and offer sophisticated services, including multi-provider-based services 116, e.g. 116a, 116b, 116c, and/or 116n (
As seen in
As seen in
A service provider (SP) 54 hosts personal web services 116 (
As seen in
The participant SP 16, acting as a service consumer 48, uses the discovery service 42, to determine whether the principal 12 is enabled for a particular service 116, and to obtain the necessary assertions which authorize use of the service 116. The policy framework addresses whether the principal 12 is enabled for some particular service, and if so, what fine-grained methods are allowed, and what data is to be returned. Web service security is typically applied to all messages flowing between system entities 27.
As seen in
In some system embodiments 10, service consumers 48 are hosted on a server at a participant 54. In alternate system embodiments 10, service consumers 48 are hosted on a user device 192 (
A discovery device (DS) 42 is typically hosted by a basic authentication agency (BAA) 14, and enables service consumers 48 to discover service endpoint information 96 (
Architectural Components. The identity based service system 10 comprises the following architectural components:
As seen in
Discovery Service Overview. In the identity based service system 10, the personal web services 116 for a user U are preferably distributed across multiple service providers 54. Therefore, service consumers 48 include a means for discovering service locations 54. The discovery service 42 is a personal web service which enables system entities 27 to discover a service descriptor 26, given a service name and a user's name identifier 174 (
As seen in
Based upon the request 50, the participant 16 receives 51 the service descriptor 26 and assertion for service 28 from the discovery service 42. The participant 16 then invokes service 52, e.g. 52a (
System Operation. The identity based service system 10, such as the system 10c shown in
Because of the pseudonymous identity of users in the identity based service system 10, service consumers 48 and service providers 54 do not have a common name for a user U. The basic authentication agency 14 of a user U is the system entity 27 that maps between the disparate namespaces 176,182 (
The service consumer 48 prompts the name translation service, by sending the user's name 174a in the WSC-BAA namespace 176, to the basic authentication agency 14. The basic authentication agency 14 hands back a user name 174b in the WSP-BAA namespace 182, within a format that the service consumer 48 is blinded to this name, via encryption 184. The encrypted value 184 of the name 174b is preferably different each time the name 174a,174b is used, such that there is no linkable identity information over time between the service consumer 48 and the service provider 54. This name translation assertion 28 is also preferably time-bound, to prevent long-term use of a translated name 174b, and to prevent linking of the actions of a principal 12.
In the identity based service system 10, the user's basic authentication agency 14 always hosts the discovery service 42, since the discovery service 42 must be aware of the pair-wise identifier relationships 174a,174b between parties 27.
In response to a discovery request, the service 42 returns 52 a service descriptor 26 that points to a particular service provider 54: Additionally, a translated name 174b and relevant security tokens 186 (
The discovery service 42 also provides an administrative interface, whereby a set of services 116 for a user can be configured. Services may be registered and unregistered.
Profile Service.
A profile service 116b (
Data category information 102 allows information to be classified as applicable, such as to define a home or business profile. For example, an address can be classified as a home and/or a business address. Data categories 102 are typically defined by service providers 54, by service consumers 48, and/or by principals 12.
Change timestamps information 104 typically comprises a number 105, e.g. 105a, which represents the latest modification time of a particular node and associated descendants.
Data validation information 106 comprises an indication of whether the data content 94 has been validated or not. If the data content 94 is validated, the information may preferably comprise what type of validation was performed, and when the validation was performed. A service consumer 48 typically uses metadata 107.
In some basic embodiments of the identity based service system 10, the core services comprise a basic authentication service 14,116a. In alternate basic embodiments of the identity based service system 10, the core services comprise both an authentication service 116a and a profile service 116b. In some preferred embodiments of the identity based service system 10, the core services comprise a variety of services, such as an authentication service 14,116a, a profile service 116b, an alert service 116c, and/or a wallet service 116n.
The identity based service system 10 also supports other value-added services 116 for a user, such as a calendar service and/or an address book service. The identity based service system 10 provides access 54 for a wide variety of participant sites 120a-120k, such as large business sites 120a and/or small business sites 120k.
As seen in
The core service provider 118b shown in
As seen in
Levels of Trust and Integration. The identity based service system 10 preferably provides varying levels of trust and integration. For example, as seen in
A larger site 120, such as a large retail site 120a or an auction site 120b, which is integrated with the network 112 and is able to perform tasks on behalf of the user U, e.g. get money from a wallet 116n, typically has a higher level of trust with the system 10.
Core service providers 118, such as providers 118a-118j of core services 116, typically have a high level of trust with the system 10, and are able to perform system functions on behalf of a user U. In addition, core service providers 118 which provide authentication 116a have the highest level of service requirements, and inherently require the highest level of trust within the system 10.
Service Invocation. In order to enable interactions between multiple endpoints within a circle of trust, the discovery service 42 issues service assertions 28 (
In some embodiments of the identity based service system 10, messages can be routed and be transported through multiple hops. Additionally, message-level confidentiality is employed for sensitive data in multi-hop cases where confidentiality is required.
A target service provider 54,118 does not simply consume the service assertion 28. Relevant policy is enforced to ensure that the service invocation is in line with the principal's policies.
Authentication. Most system services require requester authentication. Additionally, the response is authenticated. For example, a user authentication comprises a determination of the identity 29 of a user U. Online authentication can take many forms, such as a stored browser cookie, a user name/password combination, or stronger technologies such as smart cards or biometric devices.
In the identity based service system 10, the user's identity 29 is authenticated, in accordance with privacy and security policies. The evidence of authentication for a user U comprises the user identity 29, in addition to assertions of authentication strength. The evidence of authentication for a user U refers to stored and/or passed data that indicates that a user is authenticated, and which can be interrogated to verify the authentication.
As an example, web sites often store a cookie to provide personalization information about their site for the user. However, for e-commerce transactions, that same web site may require a user to explicitly supply an ID 196 (
System Authorization. While user authentication determines the identity 29 of the user U, authorization is the process of determining what an authenticated user U is allowed to do, and the determination any services and/or entities 27 which are allowed to act on behalf of the user U.
For example, a web site that provides access to bank account information may be configured to allow only the primary account holder to transfer funds to/from the account, but allow all members of the family to view the current account balance. While each user U is authenticated, only one user U is able to perform authorized activities.
Another example would be that of a network payment service (or smart wallet) 116n (
As shown above, some embodiments of the identity based service system 10 feature a delegation of authorization, wherein a user U is not required to navigate to a payment site to authorize a transaction. For example, while a user U shops at a web site 120, during a checkout process, a system enabled web site 120 may access the payment/wallet service 116n, on behalf of the user U, wherein the user has delegated authorization to the web site to act on his behalf with the payment service 116n.
User Identities. In the identity based service system 10, an identity 29 of a user U comprises a persona for that user.
The use of multiple identities 29 allows users U to store relevant information associated with each identity 29, and use or expose the information only as needed. For example, as seen in
Similarly, an “anonymous” identity 29 would typically comprise no personally-identifiable information, enabling use of that identity 29 in appropriate situations.
Scopes of Authentication. Network authentication occurs when a user's evidence-of-authentication 19, e.g. 19b (
In addition, a local authentication may occur, such as when evidence of authentication for a user U is issued by a local site/service, using its own authentication facilities, wherein the evidence of authentication is only valid for that specific site or service. A local authentication does not inherently carry with the user U from one site to another, and does not allow the site or service to access network services on behalf of the user U.
Some embodiments of the identity based service system 10 provide both forms of authentication, whereby the system 10 can be integrated with sites that already have an authentication system.
Requester identity, such as that of a web consumer 48, is established by the inclusion of a security token 186 (
The responder's identity can be authenticated, such as by validating that the signature of the response (containing the original RequestID) is authentic.
Long-Lived Access to Services. In some alternate system embodiments 10, pursuant to the approval of a user U, the discovery service 42 assures long-lived service assertions to a service consumer 48, such that the service consumer 48 can repeatedly invoke a service at the service provider 54. Continual acceptance of the service assertion 28 at the service provider 54 is dependent on user approval of continued access of the service at the service provider 54. Long-lived access may also be employed to allow services 27 to act on behalf of the user U even when the user U is not present.
However, in system embodiments 10 wherein revocation is preferred to be controlled by the basic authentication agency 14 and associated discovery service 42, the discovery service 42 prevents long-lived service assertions to a service consumer 48.
Service Infrastructure. While current system embodiments 10 comprise a profile service (PS) 116 (
For example, the infrastructure is typically accessible via SOAP over HTTP calls, as defined by WSDL descriptions, and use agreed-upon schemas, such that the web services infrastructure transparently supports both static and dynamic data. An example of static data is a basic profiling service that returns an e-mail address. An example of dynamic data is that of an infrastructure served by a calendar service, which return calendar appointments.
Services, which for example may include a user's profile 116b, wallet 116n, or calendars/alerts 116c, typically comprise a set of logically related functionality, and comprise collections of attributes and service calls.
Core Authentication Records. The core authentication record (CAR) 132 shown in
As seen in
For example, users U often look at their work personification as different and distinct from their home personification, with different sites 120 visited, different credit cards 116n, and sometimes even different alert mechanisms 116c.
As seen in
The links 136 also preferably include quick-links 140 between accounts 132. Once as user U logs in 18 to either account 132, they can switch between the accounts 132, e.g. from 132a to 132b, on an as needed or as desired basis, without logging in 18 again. For example, as seen in
While the user U may retain a similar identity while operating different devices, such as a work identity, the chosen services 138,116 and links 136,140 linked to the authentication records 132a,132b may be chosen or selected as suitable for the device 192. For example, an extended alert list 116c may be linked to a desktop computer 192a, while an abbreviated alert list 116c be linked to a mobile device 192b, such as a personal digital assistant 192b, or an Internet enabled cell phone 192b. Similarly, a wide variety of web site links 140 may be linked to a desktop computer 192a, while only a few key web site links 140 may be linked to a mobile device 192b.
While much of the identity 29, services 116, and/or core providers 118 may be shared between authentication records 132a, 132b in
System Advantages. The Identity based service system 10 provides significant advantages over conventional identity and service structures. Through the establishment of a system identity 29, a user U can quickly provide information as needed to system entities 27, while controlling how the information is distributed. The use of a secure and centralized identity structure provides controlled authentication and authorization of all system entities 27.
Through the use of detailed identity information, the identity based service system 10 provides unique value-added services, such as fast sign-in 18, a customized personal network environment, and quick links 140 to existing and new associated service providers 120.
System Operation.
In the process of registering as a user at the site 120, the user typically establishes a user name 194 and password 196, and enters appropriate information to operate within the site 120, such as name, address, and/or credit information 96.
Although the identity based service system and its methods of use are described herein in connection with personal computers, mobile devices, and other microprocessor-based devices, such as portable digital assistants or network enabled cell phones, the apparatus and techniques can be implemented for a wide variety of electronic devices and systems, or any combination thereof, as desired.
As well, while the identity based service system and its methods of use are described herein in connection with interaction between a principal and a network through a device, the use of identity based services can be implemented for a wide variety of electronic devices and networks or any combination thereof, as desired.
Accordingly, although the invention has been described in detail with reference to a particular preferred embodiment, persons possessing ordinary skill in the art to which this invention pertains will appreciate that various modifications and enhancements may be made without departing from the spirit and scope of the claims that follow.
Number | Name | Date | Kind |
---|---|---|---|
4218738 | Matyas et al. | Aug 1980 | A |
5113522 | Dinwiddie, Jr. et al. | May 1992 | A |
5173939 | Abadi et al. | Dec 1992 | A |
5210795 | Lipmer et al. | May 1993 | A |
5245656 | Loeb et al. | Sep 1993 | A |
5343529 | Goldfine et al. | Aug 1994 | A |
5349642 | Kingdon | Sep 1994 | A |
5418854 | Kaufman et al. | May 1995 | A |
5481720 | Loucks et al. | Jan 1996 | A |
5491752 | Kaufman et al. | Feb 1996 | A |
5497421 | Kaufman et al. | Mar 1996 | A |
5521980 | Brands | May 1996 | A |
5544322 | Cheng et al. | Aug 1996 | A |
5560008 | Johnson et al. | Sep 1996 | A |
5577254 | Gilbert | Nov 1996 | A |
5581616 | Crandall | Dec 1996 | A |
5590199 | Krajewski, Jr. et al. | Dec 1996 | A |
5604805 | Brands | Feb 1997 | A |
5611048 | Jacobs et al. | Mar 1997 | A |
5633931 | Wright | May 1997 | A |
5649099 | Theimer et al. | Jul 1997 | A |
5651068 | Klemba et al. | Jul 1997 | A |
5659616 | Sudia | Aug 1997 | A |
5659617 | Fischer | Aug 1997 | A |
5682430 | Kilian et al. | Oct 1997 | A |
5684950 | Dare et al. | Nov 1997 | A |
5684951 | Goldman et al. | Nov 1997 | A |
5689698 | Jones et al. | Nov 1997 | A |
5710814 | Klemba | Jan 1998 | A |
5737419 | Ganesan | Apr 1998 | A |
5740248 | Fieres et al. | Apr 1998 | A |
5745573 | Lipner et al. | Apr 1998 | A |
5754841 | Carino, Jr. | May 1998 | A |
5754938 | Herz et al. | May 1998 | A |
5754939 | Herz et al. | May 1998 | A |
5757916 | MacDoran et al. | May 1998 | A |
5757920 | Misra et al. | May 1998 | A |
5768373 | Lohstroh et al. | Jun 1998 | A |
5774552 | Grimmer | Jun 1998 | A |
5793952 | Limsico | Aug 1998 | A |
5794250 | Carino, Jr. et al. | Aug 1998 | A |
5799086 | Sudia | Aug 1998 | A |
5799088 | Raike | Aug 1998 | A |
5805703 | Crandall | Sep 1998 | A |
5809144 | Sirbu et al. | Sep 1998 | A |
5815195 | Tam | Sep 1998 | A |
5815665 | Teper et al. | Sep 1998 | A |
5835087 | Herz et al. | Nov 1998 | A |
5835596 | Klemba et al. | Nov 1998 | A |
5841865 | Sudia | Nov 1998 | A |
5841870 | Fieres et al. | Nov 1998 | A |
5841871 | Pinkas | Nov 1998 | A |
5852665 | Gressl et al. | Dec 1998 | A |
5864665 | Tran | Jan 1999 | A |
5864667 | Barkan | Jan 1999 | A |
5864843 | Carino, Jr. et al. | Jan 1999 | A |
5867665 | Butman et al. | Feb 1999 | A |
5869823 | Bublitz et al. | Feb 1999 | A |
5870474 | Wasilewski et al. | Feb 1999 | A |
5870562 | Butman et al. | Feb 1999 | A |
5872849 | Sudia | Feb 1999 | A |
5873083 | Jones et al. | Feb 1999 | A |
5875296 | Shi et al. | Feb 1999 | A |
5884270 | Walker et al. | Mar 1999 | A |
5884272 | Walker et al. | Mar 1999 | A |
5884312 | Dutsan et al. | Mar 1999 | A |
5889863 | Weber | Mar 1999 | A |
5892828 | Perlman | Apr 1999 | A |
5892905 | Brandt et al. | Apr 1999 | A |
5903721 | Sixtus | May 1999 | A |
5903830 | Joao et al. | May 1999 | A |
5903892 | Hoffert et al. | May 1999 | A |
5905862 | Hoekstra | May 1999 | A |
5907620 | Klemba et al. | May 1999 | A |
5913202 | Motoyama | Jun 1999 | A |
5918228 | Rich et al. | Jun 1999 | A |
5923756 | Shambroom | Jul 1999 | A |
5930786 | Carino, Jr. et al. | Jul 1999 | A |
5933503 | Schell et al. | Aug 1999 | A |
5937159 | Meyers et al. | Aug 1999 | A |
5944794 | Okamoto et al. | Aug 1999 | A |
5956407 | Slavin | Sep 1999 | A |
5958050 | Griffin et al. | Sep 1999 | A |
5960200 | Eager et al. | Sep 1999 | A |
5961593 | Gabber et al. | Oct 1999 | A |
5966705 | Koneru et al. | Oct 1999 | A |
5974151 | Slavin | Oct 1999 | A |
5974453 | Anderson et al. | Oct 1999 | A |
5974549 | Golan | Oct 1999 | A |
5974566 | Ault et al. | Oct 1999 | A |
5982891 | Ginter et al. | Nov 1999 | A |
5983176 | Hoffert et al. | Nov 1999 | A |
5983208 | Haller et al. | Nov 1999 | A |
5987140 | Rowney et al. | Nov 1999 | A |
5991713 | Unger et al. | Nov 1999 | A |
5995624 | Fielder et al. | Nov 1999 | A |
5996076 | Rowney et al. | Nov 1999 | A |
5999525 | Krishnaswamy et al. | Dec 1999 | A |
5999711 | Misra et al. | Dec 1999 | A |
5999973 | Glitho et al. | Dec 1999 | A |
6003136 | Schanze | Dec 1999 | A |
6005939 | Fortenberry et al. | Dec 1999 | A |
6006333 | Nielsen | Dec 1999 | A |
6009175 | Schanze | Dec 1999 | A |
6009177 | Sudia | Dec 1999 | A |
6014646 | Vallee et al. | Jan 2000 | A |
6021496 | Dutcher et al. | Feb 2000 | A |
6023684 | Pearson | Feb 2000 | A |
6023724 | Bhatia et al. | Feb 2000 | A |
6026379 | Haller et al. | Feb 2000 | A |
6026430 | Butman et al. | Feb 2000 | A |
6029195 | Herz | Feb 2000 | A |
6031910 | Deindl et al. | Feb 2000 | A |
6032260 | Sasmazel et al. | Feb 2000 | A |
6035332 | Ingrassia, Jr. et al. | Mar 2000 | A |
6044465 | Dutcher et al. | Mar 2000 | A |
6049610 | Crandall | Apr 2000 | A |
6049877 | White | Apr 2000 | A |
6052122 | Sutcliffe et al. | Apr 2000 | A |
6052730 | Felciano et al. | Apr 2000 | A |
6055639 | Schanze | Apr 2000 | A |
6058106 | Cudak et al. | May 2000 | A |
6058478 | Davis | May 2000 | A |
6061665 | Bahreman | May 2000 | A |
6061789 | Hauser et al. | May 2000 | A |
6064878 | Denker et al. | May 2000 | A |
6065054 | Dutcher et al. | May 2000 | A |
6067542 | Carino, Jr. et al. | May 2000 | A |
6073241 | Rosenberg et al. | Jun 2000 | A |
6076078 | Camp et al. | Jun 2000 | A |
6078955 | Konno et al. | Jun 2000 | A |
6081893 | Grawrock et al. | Jun 2000 | A |
6081900 | Subramaniam et al. | Jun 2000 | A |
6082776 | Feinberg | Jul 2000 | A |
6083276 | Davidson et al. | Jul 2000 | A |
6085198 | Skinner et al. | Jul 2000 | A |
6085223 | Carino, Jr. et al. | Jul 2000 | A |
6085321 | Gibbs et al. | Jul 2000 | A |
6088451 | He et al. | Jul 2000 | A |
6088717 | Reed et al. | Jul 2000 | A |
6091737 | Hong et al. | Jul 2000 | A |
6091835 | Smithies et al. | Jul 2000 | A |
6092196 | Reiche | Jul 2000 | A |
6092199 | Dutcher et al. | Jul 2000 | A |
6094659 | Bhatia | Jul 2000 | A |
6094721 | Eldrisge et al. | Jul 2000 | A |
6104392 | Shaw et al. | Aug 2000 | A |
6104815 | Alcorn et al. | Aug 2000 | A |
6105095 | Miller et al. | Aug 2000 | A |
6108330 | Bhatia et al. | Aug 2000 | A |
6108703 | Leighton et al. | Aug 2000 | A |
6112188 | Hartnett | Aug 2000 | A |
6115742 | Franklin et al. | Sep 2000 | A |
6122740 | Andersen | Sep 2000 | A |
6134583 | Herriot | Oct 2000 | A |
6134591 | Nickles | Oct 2000 | A |
6135646 | Kahn et al. | Oct 2000 | A |
6138157 | Welter et al. | Oct 2000 | A |
6141760 | Abadi et al. | Oct 2000 | A |
6144657 | Baehr | Nov 2000 | A |
6144988 | Kappel | Nov 2000 | A |
6148083 | Fieres et al. | Nov 2000 | A |
6148333 | Guedalia et al. | Nov 2000 | A |
6148404 | Yatsukawa | Nov 2000 | A |
6154738 | Call | Nov 2000 | A |
6157618 | Biss et al. | Dec 2000 | A |
6157636 | Voit et al. | Dec 2000 | A |
6161181 | Haynes, III et al. | Dec 2000 | A |
6173406 | Wang et al. | Jan 2001 | B1 |
6175869 | Ahuja et al. | Jan 2001 | B1 |
6175920 | Schanze | Jan 2001 | B1 |
6178455 | Schutte et al. | Jan 2001 | B1 |
6178504 | Fieres et al. | Jan 2001 | B1 |
6178510 | O'Connor et al. | Jan 2001 | B1 |
6178511 | Cohen et al. | Jan 2001 | B1 |
6182142 | Win et al. | Jan 2001 | B1 |
6185316 | Buffam | Feb 2001 | B1 |
6185573 | Angelucci et al. | Feb 2001 | B1 |
6185598 | Farber et al. | Feb 2001 | B1 |
6185689 | Todd, Sr. et al. | Feb 2001 | B1 |
6189030 | Kirsch et al. | Feb 2001 | B1 |
6189096 | Haverty | Feb 2001 | B1 |
6195097 | Shrader et al. | Feb 2001 | B1 |
6198824 | Shambroom | Mar 2001 | B1 |
6199052 | Mitty et al. | Mar 2001 | B1 |
6199113 | Alegre et al. | Mar 2001 | B1 |
6199195 | Goodwin et al. | Mar 2001 | B1 |
6205482 | Navarre et al. | Mar 2001 | B1 |
6208656 | Hrastar et al. | Mar 2001 | B1 |
6212511 | Fisher et al. | Apr 2001 | B1 |
6212635 | Reardon | Apr 2001 | B1 |
6216231 | Stubblebine | Apr 2001 | B1 |
6223292 | Dean et al. | Apr 2001 | B1 |
RE37178 | Kingdon | May 2001 | E |
6225995 | Jacobs et al. | May 2001 | B1 |
6226749 | Carloganu et al. | May 2001 | B1 |
6226752 | Gupta et al. | May 2001 | B1 |
6230168 | Unger et al. | May 2001 | B1 |
6233234 | Curry et al. | May 2001 | B1 |
6233458 | Haumont et al. | May 2001 | B1 |
6249282 | Sutcliffe et al. | Jun 2001 | B1 |
6249523 | Hrastar et al. | Jun 2001 | B1 |
6252952 | Kung et al. | Jun 2001 | B1 |
6253203 | O'Flaherty et al. | Jun 2001 | B1 |
6256664 | Donoho et al. | Jul 2001 | B1 |
6256734 | Blaze et al. | Jul 2001 | B1 |
6256739 | Skopp et al. | Jul 2001 | B1 |
6256741 | Stubblebine | Jul 2001 | B1 |
6256773 | Bowman-Amuah | Jul 2001 | B1 |
6259782 | Gallant | Jul 2001 | B1 |
6259789 | Paone | Jul 2001 | B1 |
6263362 | Donoho et al. | Jul 2001 | B1 |
6263432 | Sasmazel et al. | Jul 2001 | B1 |
6275824 | O'Flaherty et al. | Aug 2001 | B1 |
6275934 | Novicov et al. | Aug 2001 | B1 |
6275942 | Bernhard et al. | Aug 2001 | B1 |
6275944 | Kao et al. | Aug 2001 | B1 |
6278904 | Ishii | Aug 2001 | B1 |
6279006 | Shigemi et al. | Aug 2001 | B1 |
6279111 | Jensenworth et al. | Aug 2001 | B1 |
6281790 | Kimmel et al. | Aug 2001 | B1 |
6282295 | Young et al. | Aug 2001 | B1 |
6282549 | Hoffert et al. | Aug 2001 | B1 |
6285760 | Crandall | Sep 2001 | B1 |
6286046 | Bryant | Sep 2001 | B1 |
6286104 | Buhle et al. | Sep 2001 | B1 |
6289010 | Voit et al. | Sep 2001 | B1 |
6289039 | Garodnick | Sep 2001 | B1 |
6289382 | Bowman-Amuah | Sep 2001 | B1 |
6298383 | Gutman et al. | Oct 2001 | B1 |
6298445 | Shostack et al. | Oct 2001 | B1 |
6301575 | Chadha et al. | Oct 2001 | B1 |
6301661 | Shambroom | Oct 2001 | B1 |
6304915 | Nguyen et al. | Oct 2001 | B1 |
6304973 | Williams | Oct 2001 | B1 |
6307935 | Crandall et al. | Oct 2001 | B1 |
6308203 | Itabashi et al. | Oct 2001 | B1 |
6308274 | Swift | Oct 2001 | B1 |
6311194 | Sheth et al. | Oct 2001 | B1 |
6311269 | Luckenbraugh et al. | Oct 2001 | B2 |
6313855 | Shuping et al. | Nov 2001 | B1 |
6314409 | Schneck et al. | Nov 2001 | B2 |
6314425 | Serbinis et al. | Nov 2001 | B1 |
6314518 | Linnartz | Nov 2001 | B1 |
6321338 | Porras et al. | Nov 2001 | B1 |
6324525 | Kramer et al. | Nov 2001 | B1 |
6324647 | Bowman-Amuah | Nov 2001 | B1 |
6324648 | Grantges, Jr. | Nov 2001 | B1 |
6327574 | Kramer et al. | Dec 2001 | B1 |
6330566 | Durham | Dec 2001 | B1 |
6332163 | Bowman-Amuah | Dec 2001 | B1 |
6334114 | Jacobs et al. | Dec 2001 | B1 |
6334121 | Primeaux et al. | Dec 2001 | B1 |
6334190 | Silverbrook et al. | Dec 2001 | B1 |
6335927 | Elliott et al. | Jan 2002 | B1 |
6338064 | Ault et al. | Jan 2002 | B1 |
6339595 | Rekhter et al. | Jan 2002 | B1 |
6339773 | Rishe | Jan 2002 | B1 |
6339828 | Grawrock et al. | Jan 2002 | B1 |
6339832 | Bowman-Amuah | Jan 2002 | B1 |
6341306 | Rosenschein et al. | Jan 2002 | B1 |
6341310 | Leshem et al. | Jan 2002 | B1 |
6341316 | Kloba et al. | Jan 2002 | B1 |
6341352 | Child et al. | Jan 2002 | B1 |
6341353 | Herman et al. | Jan 2002 | B1 |
6345288 | Reed et al. | Feb 2002 | B1 |
6345303 | Knauerhase et al. | Feb 2002 | B1 |
6351812 | Datar et al. | Feb 2002 | B1 |
6356936 | Donoho et al. | Mar 2002 | B1 |
6356937 | Montville et al. | Mar 2002 | B1 |
6363488 | Ginter et al. | Mar 2002 | B1 |
6366298 | Haitsuka et al. | Apr 2002 | B1 |
6366962 | Teibel | Apr 2002 | B1 |
6370573 | Bowman-Amuah | Apr 2002 | B1 |
6373817 | Kung et al. | Apr 2002 | B1 |
6374354 | Walmsley et al. | Apr 2002 | B1 |
6377548 | Chuah | Apr 2002 | B1 |
6377953 | Gawlick et al. | Apr 2002 | B1 |
6378075 | Goldstein et al. | Apr 2002 | B1 |
6381644 | Munguia et al. | Apr 2002 | B2 |
6385604 | Bakalash et al. | May 2002 | B1 |
6385615 | Haeri et al. | May 2002 | B1 |
6385652 | Brown et al. | May 2002 | B1 |
6385725 | Baum-Waidner | May 2002 | B1 |
6389402 | Ginter et al. | May 2002 | B1 |
6393468 | McGee | May 2002 | B1 |
6393479 | Glommen et al. | May 2002 | B1 |
6393482 | Rai et al. | May 2002 | B1 |
6400381 | Barrett et al. | Jun 2002 | B1 |
6401203 | Eigeles | Jun 2002 | B1 |
6401211 | Brezak, Jr. et al. | Jun 2002 | B1 |
6405252 | Gupta et al. | Jun 2002 | B1 |
6405312 | Ly | Jun 2002 | B1 |
6405318 | Rowland | Jun 2002 | B1 |
6405364 | Bowman-Amuah | Jun 2002 | B1 |
6408336 | Schneider et al. | Jun 2002 | B1 |
6411309 | Ly | Jun 2002 | B1 |
6415270 | Rackson et al. | Jul 2002 | B1 |
6415295 | Feinberg | Jul 2002 | B1 |
6415323 | McCanne et al. | Jul 2002 | B1 |
6418441 | Call | Jul 2002 | B1 |
6418448 | Sarkar | Jul 2002 | B1 |
6421733 | Tso et al. | Jul 2002 | B1 |
6421768 | Purpura | Jul 2002 | B1 |
6424714 | Wasilewski et al. | Jul 2002 | B1 |
6434568 | Bowman-Amuah | Aug 2002 | B1 |
6438125 | Brothers | Aug 2002 | B1 |
6438594 | Bowman-Amuah | Aug 2002 | B1 |
6438691 | Mao | Aug 2002 | B1 |
6442606 | Subbaroyan et al. | Aug 2002 | B1 |
6446092 | Sutter | Sep 2002 | B1 |
6446119 | Olah et al. | Sep 2002 | B1 |
6446204 | Pang et al. | Sep 2002 | B1 |
6460036 | Herz | Oct 2002 | B1 |
6463061 | Rekhter et al. | Oct 2002 | B1 |
6466975 | Sterling | Oct 2002 | B1 |
6470450 | Langford et al. | Oct 2002 | B1 |
6473407 | Ditmer et al. | Oct 2002 | B1 |
6477513 | Walker et al. | Nov 2002 | B1 |
6477580 | Bowman-Amuah | Nov 2002 | B1 |
6477665 | Bowman-Amuah | Nov 2002 | B1 |
6480885 | Olivier | Nov 2002 | B1 |
6490620 | Ditmer et al. | Dec 2002 | B1 |
6496935 | Fink et al. | Dec 2002 | B1 |
6519617 | Wanderski et al. | Feb 2003 | B1 |
6532493 | Aviani, Jr. et al. | Mar 2003 | B1 |
6578078 | Smith et al. | Jun 2003 | B1 |
6658000 | Raciborski et al. | Dec 2003 | B1 |
6662300 | Peters | Dec 2003 | B1 |
6732101 | Cook | May 2004 | B1 |
6819766 | Weidong | Nov 2004 | B1 |
6879965 | Fung et al. | Apr 2005 | B2 |
6910179 | Pennell et al. | Jun 2005 | B1 |
6952769 | Dubey et al. | Oct 2005 | B1 |
6959336 | Moreh et al. | Oct 2005 | B2 |
6981028 | Rawat et al. | Dec 2005 | B1 |
6996718 | Henry et al. | Feb 2006 | B1 |
7024690 | Young et al. | Apr 2006 | B1 |
7082532 | Vick et al. | Jul 2006 | B1 |
20020002577 | Garg et al. | Jan 2002 | A1 |
20020010784 | Clayton et al. | Jan 2002 | A1 |
20020028706 | Barnard et al. | Mar 2002 | A1 |
20020029195 | Russell et al. | Mar 2002 | A1 |
20020029201 | Barzilai et al. | Mar 2002 | A1 |
20020029269 | McCarthy et al. | Mar 2002 | A1 |
20020038287 | Villaret et al. | Mar 2002 | A1 |
20020077993 | Immonen et al. | Jun 2002 | A1 |
20020087859 | Weeks et al. | Jul 2002 | A1 |
20020095222 | Lignoul | Jul 2002 | A1 |
20020111964 | Chen et al. | Aug 2002 | A1 |
20020133697 | Royer et al. | Sep 2002 | A1 |
20020146129 | Kaplan | Oct 2002 | A1 |
20020147645 | Alao et al. | Oct 2002 | A1 |
20020164031 | Piikivi | Nov 2002 | A1 |
20020184507 | Makower et al. | Dec 2002 | A1 |
20030014557 | Berger et al. | Jan 2003 | A1 |
20030018898 | Lection et al. | Jan 2003 | A1 |
20030023880 | Edwards et al. | Jan 2003 | A1 |
20030041033 | Kaplan | Feb 2003 | A1 |
20030084054 | Clewis et al. | May 2003 | A1 |
20030101341 | Kettler, III et al. | May 2003 | A1 |
20030105862 | Villavicencio | Jun 2003 | A1 |
20030131266 | Best et al. | Jul 2003 | A1 |
20030135507 | Hind et al. | Jul 2003 | A1 |
20030149781 | Yared et al. | Aug 2003 | A1 |
20030163733 | Barriga-Caceres et al. | Aug 2003 | A1 |
20030167445 | Su et al. | Sep 2003 | A1 |
20030182558 | Lazzaro et al. | Sep 2003 | A1 |
20030195858 | Watanabe et al. | Oct 2003 | A1 |
20030229850 | Lue | Dec 2003 | A1 |
20040003112 | Alles et al. | Jan 2004 | A1 |
20040059941 | Hardman et al. | Mar 2004 | A1 |
20040088578 | Chao et al. | May 2004 | A1 |
20040103063 | Takayama et al. | May 2004 | A1 |
20040139319 | Favazza et al. | Jul 2004 | A1 |
20040172552 | Boyles et al. | Sep 2004 | A1 |
20040210839 | Lucovsky | Oct 2004 | A1 |
20040250140 | Chavis et al. | Dec 2004 | A1 |
20040260647 | Binn et al. | Dec 2004 | A1 |
20040267870 | Rozmus et al. | Dec 2004 | A1 |
20050021964 | Bhatnagar et al. | Jan 2005 | A1 |
20050074126 | Stanko | Apr 2005 | A1 |
20050187883 | Bishop et al. | Aug 2005 | A1 |
20050240763 | Bhat et al. | Oct 2005 | A9 |
Number | Date | Country |
---|---|---|
456 920 | Nov 1991 | EP |
610 362 | Sep 1995 | EP |
695 985 | Feb 1996 | EP |
773 647 | May 1997 | EP |
774 845 | May 1997 | EP |
821 326 | Jan 1998 | EP |
0912026 | Apr 1998 | EP |
858 021 | Aug 1998 | EP |
0917120 | Nov 1998 | EP |
938 217 | Aug 1999 | EP |
940 959 | Sep 1999 | EP |
940 960 | Sep 1999 | EP |
946 022 | Sep 1999 | EP |
0940760 | Sep 1999 | EP |
667 998 | Oct 1999 | EP |
0949593 | Oct 1999 | EP |
0949595 | Oct 1999 | EP |
0950972 | Oct 1999 | EP |
957 424 | Nov 1999 | EP |
0977399 | Feb 2000 | EP |
1047992 | Feb 2000 | EP |
991 005 | Apr 2000 | EP |
992 924 | Apr 2000 | EP |
1041768 | Apr 2000 | EP |
990 972 | May 2000 | EP |
1001358 | May 2000 | EP |
1076279 | Feb 2001 | EP |
1081914 | Mar 2001 | EP |
1081916 | Mar 2001 | EP |
1 089 516 | Apr 2001 | EP |
1 094 404 | Apr 2001 | EP |
1089196 | Apr 2001 | EP |
1089200 | Apr 2001 | EP |
1100013 | May 2001 | EP |
1 109 371 | Jun 2001 | EP |
739 560 | Jun 2001 | EP |
1117204 | Jul 2001 | EP |
1117207 | Jul 2001 | EP |
1 126 663 | Aug 2001 | EP |
1 126 681 | Aug 2001 | EP |
1132828 | Sep 2001 | EP |
1 160 645 | Dec 2001 | EP |
1168167 | Jan 2002 | EP |
1182590 | Feb 2002 | EP |
1189161 | Mar 2002 | EP |
1 193 587 | Apr 2002 | EP |
876 722 | Apr 2002 | EP |
1209597 | May 2002 | EP |
1 217 857 | Jun 2002 | EP |
1217549 | Jun 2002 | EP |
1217551 | Jun 2002 | EP |
1220510 | Jul 2002 | EP |
1223757 | Jul 2002 | EP |
1239685 | Sep 2002 | EP |
1241596 | Sep 2002 | EP |
2364474 | Jan 2002 | GB |
2001-249901 | Sep 2001 | JP |
WO9832066 | Jul 1998 | WO |
9919822 | Apr 1999 | WO |
WO 0036812 | Jun 2000 | WO |
WO 0220498 | Mar 2001 | WO |
WO 0145022 | Jun 2001 | WO |
Number | Date | Country | |
---|---|---|---|
20050076248 A1 | Apr 2005 | US |