1. The Field of the Invention
The present invention relates to user interface menus in computers and electronic devices and, more particularly, to methods, systems, and computer program products for controlling how contact information is provided to computer applications.
2. Background and Relevant Art
The term “contact,” as described herein, generally refers to any person, group, organization, business, household, or other type of identifiable entity. The term “contact information,” as defined herein, generally refers to any information that corresponds to a contact and that may be considered relevant for identifying, contacting, accessing, corresponding or communicating with the contact. In the context of the present application, contact information is used by an application to perform a desired function, such as, for example, sending an email, initiating a telephone call, accessing a website, initiating a gaming session, performing a financial transaction, and so forth. Non-limiting examples of contact information include names, aliases, telephone Me numbers, email addresses, home addresses, instant messaging (IM) addresses, and web addresses. Contact information can also refer to other types of information such as the status of a contact. For example, information indicating a contact is currently online, or on a telephone line may also be broadly considered as contact information.
Many applications require, access, transmit, or otherwise utilize contact information. Examples of some applications that utilize contact information include email applications, network gaming applications, instant messaging applications, telephone and telephony applications, Internet applications, financial applications, word processing applications, and business management applications.
Applications that utilize contact information typically provide interfaces or menus for entering desired contact information within one or more fields. For example, an email interface will typically include fields for receiving the email addresses of the intended email recipients. Contact information can also be gathered without the user's express knowledge. For example, with regard to the email application, contact information corresponding to the sender (i.e., the sender's name, email address, etc.) can be gathered behind the scenes, without requiring user input and sometimes even without the user's knowledge.
The contact information that is gathered by an application can then be published or otherwise used and sometimes without the user's express knowledge or consent. This can be very undesirable, particularly when the user has no intent for their contact information to be gathered at all.
Allowing applications to automatically gather contact information about a user can also be problematic, even when a user has provided implied or actual consent to the application to gather their information. For example, if a single computing system is shared by multiple people, the computing system may have access to different contact information for each of the people that share the computing system, thereby increasing the possibility that an application can obtain the wrong contact information for any particular person using the computing system at any particular time.
Yet another problem in the art is that existing applications typically do not expressly notify the user what the gathered contact information is going to be used for. This can make it difficult for a user to decide if they are willing to provide the requested contact information. Even if a user could eventually find such information by navigating to related web pages or to help menus that are associated with the application, this is undesirable, particularly if the user does not immediately know where to begin looking for such information. Accordingly, users typically have to make uninformed decisions about whether they want to provide their contact information or not.
Yet another problem in the art is that even if a user does consent to the gathering and use of their contact information, the computing system may not know which contact information to gather about a user. In particular, a user may have different sets of contact information or ‘personas’ that correspond to different environments in which they live. For example, a user may have a family persona, a school persona, a friends persona, a work persona, a recreational persona, and so forth, each corresponding to different aliases, addresses (e.g., physical/email), telephone numbers, and so forth. However, because an application may not know which information the user would prefer to have gathered, the wrong information may inadvertently be gathered and published or otherwise used by the application.
The present invention is directed to improved methods, systems, and corresponding computer program products and interfaces for controlling how contact information is provided to one or more requesting applications and, more particular, for enabling a user to informatively control which of their contact information is gathered by an application.
According to one aspect of the invention, an interface object that identifies different contact personas corresponding to a user is displayed for user selection when an application requests contact information about the user. The user can then select the appropriate contact persona that they are willing to have corresponding and relevant information gathered about. For example, the list of personas that may be selected from can include a business persona, a personal persona, an e-commerce persona, an anonymous persona, or any other persona that has been developed and that the application can be provided access to. The contact information corresponding to the selected persona can then be provided to the requesting application, as selectively determined by the user.
Another interface can also be provided to enable a user to view corresponding information that is associated with the various personas. In some embodiments, this information picker interface defaults to requested persona information that is intended to be sent to the calling application. The user can then choose to send the information or different information, rather than the default information, by using the information picker.
The information picker interface can be accessed by special request or whenever an application seeks information about a user. The contact information that is displayed by the information picker can exhaustively display all of the contact information that is associated with a given persona, or, alternatively, only the contact information that is being requested at a particular moment by an application, or any combination thereof. The information picker can also be configured to display and provide access to the privacy policies of the applications that seek information about the user and that explain how the user's contact information will be used, thereby enabling the user to make informed decisions about what contact information the applications will be granted access to.
The present invention can be practiced to overcome some of the known problems in the art. In particular, the interfaces that are provided by the present application and their use can enable a user to be apprised of an applications request for contact information and can provide a user some control over what information is gathered and how it is used by requesting applications.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the invention. The features and advantages of the invention may be realized and obtained by means of the instruments and combinations particularly pointed out in the appended claims. These and other features of the present invention will become more fully apparent from the following description and appended claims, or may be learned by the practice of the invention as set forth hereinafter.
In order to describe the manner in which the above-recited and other advantages and features of the invention can be obtained, a more particular description of the invention briefly described above will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. Understanding that these drawings depict only typical embodiments of the invention and are not therefore to be considered to be limiting of its scope, the invention will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:
The present invention extends to methods, systems and computer-program products for controlling how contact information is organized and presented to applications for use.
The term “application,” as used herein, can include interfaces, modules, code and computer-executable instructions, that can be run by a user in order to complete some action, including, but not limited to web-based applications. This of course, includes applications hosted locally by the user's computing system, as well as applications hosted by remote systems.
The term “contact information,” as used herein, and which is defined above in more detail, generally includes information that corresponds to a contact and that may be considered relevant for identifying, contacting, accessing, corresponding or communicating with the contact. Contact information can also be defined as any information corresponding to a person.
The term “persona,” which is used at times herein interchangeably with the term “profile,” is generally defined as a particular way a person can be described or identified by contact information. Accordingly, each person may have, although not necessarily, multiple personas that are each associated with different contact information about a person. Examples of personas can include, but are not limited to, a family persona, a school persona, a friends persona, a work persona, a recreational persona, a business persona, an e-commerce persona, an anonymous persona, and a personal persona. The various personas and their corresponding contact information can be stored in tables, indexes and other data structures that are made available to the user's computing system.
In various embodiments described herein, interfaces are used to control association of and access to contact information. These interfaces can be created, modified and used through computer software components, which are sometimes referred to herein as computer-executable instructions or computing modules.
As described herein, a programming interface (or more simply, an interface) may be viewed as any mechanism, process, protocol for enabling one or more segment(s) of code to communicate with or access the functionality provided by one or more other segment(s) of code. Alternatively, a programming interface may be viewed as one or more mechanism(s), method(s), function call(s), module(s), object(s), etc. of a component of a system capable of communicative coupling to one or more mechanism(s), method(s), function call(s), module(s), etc. of other component(s). The term “segment of code” in the preceding sentence is intended to include one or more instructions or lines of code, and includes, e.g., code modules, objects, subroutines, functions, and so on, regardless of the terminology applied or whether the code segments are separately compiled, or whether the code segments are provided as source, intermediate, or object code, whether the code segments are utilized in a runtime system or process, or whether they are located on the same or different machines or distributed across multiple machines, or whether the functionality represented by the segments of code are implemented wholly in software, wholly in hardware, or a combination of hardware and software.
Accordingly, it will be appreciated that the embodiments of the invention can include special purpose and general-purpose computing devices including various computer software and hardware that can be used to enable the interfaces described herein. The embodiments within the scope of the present invention can also include computer-readable media for carrying or having the computer-executable instructions or data structures stored thereon that comprise the interfaces and the code for using and modifying them.
It will be appreciated that the computer-readable media can be any available media that can be accessed by a general purpose or special purpose computer, including, but not limited to mobile communications devices. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer. The computer-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions, such as the acts and steps described below.
When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or a combination of hardwired or wireless) to a computer or mobile communications device, the computer/device properly views the connection as a computer-readable medium. Thus, any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of computer-readable media.
Controlling Access to Contact Information
Various applications can request different types of contact information. For example, the hosting application can request telephone numbers, email addresses, physical address, names, personal identification numbers, credit card numbers, and so forth.
According to one embodiment, however, the applications only request the contact information is required by the applications to perform an intended function, despite the availability of other contact information. For example, an email application may only require a name or alias and an email address. In other embodiments, however, applications may also request additional information that is not necessarily required, but that the application is configured to gather nonetheless. For example, an Internet application may not need a user's telephone number, but may request it anyway, so that it can later be sold to a telemarketing company. In such circumstances, a user might find it desirable to prevent the application from gathering unnecessary information. In such cases, the methods and interfaces of the invention can be utilized to prevent the application from obtaining contact information that is not required by the application.
In particular, the methods of the invention can include the act for determining whether an application has authorization to access the requested information (act 120). This can be based in part on whether the information is needed by the application and how it will be used. In one embodiment, for example, shown and described below in more detail with reference to
According to another embodiment, authorization is automatically performed through the use of access control lists (ACL's) that exist on the user's computing system. The ACL entry specifically granting access permission to the information requested by the application.
Authorization can also be determined inherently through the interfaces that are described herein, such as, for example, by determining whether the contact information requested by the application corresponds with the information that is already associated with one or more personas that the user has selected to be made available to the application, either at the time the information is requested or at an earlier time.
If it is determined that the application has authorization to access the information, then the requested information is provided (act 130). However, if authorization has not already been granted to the application, and even in some cases where it has, the user can still select the desired contact information or use a persona to provide the application with appropriate information.
A persona generally comprises contact information that can be used to describe a particular profile of a person. For example, a business persona may include a person's work address, work telephone number, work email address, a work alias or title, and so forth. Whereas, a personal persona may include a personal cell phone number, private email address, home address, and so forth.
As mentioned above, a user can have any number of personas. The personas can also be created or modified by the user, as described below, or implicitly defined by the user's interaction with various applications. For example, if an application has previously asked for and obtained a user's home telephone number and address, the modules of the invention can enable such information to be tracked and automatically used to develop a corresponding profile or persona for the user.
To help the user select an appropriate persona, the user's computing system or other computing system that has access to the user's contact information and corresponding personas proceeds to identify the available contact personas (act 150).
In some cases, the user may not have any personas that are currently developed or that can be identified. In these circumstances, the identification- of available contact personas can include the generation of default personas, even though the contact information provided within the default personas is wrong or missing. Thereafter, the user can modify the contact information that is associated with the various personas through an interface, as described below in more detail with reference to
Identification of the available personas (act 150) can also include the process of determining who the logged on user is. If no one is presently logged onto the computing system, such that it is being used anonymously, the actual user may be prompted to log on or to otherwise identify themselves so that the user's personas can be identified. In other embodiments, the identity of the user is obtained from the application that is requesting the contact information and that has in some way indicated who the user is. In yet other embodiments, any number of the available personas that can be accessed by a computing system are identified, even though they may not all correspond to the person for whom contact information is being requested.
Once the contact personas have been identified, they are presented to a user for selection, thereby enabling the user to select or otherwise identify the appropriate persona for which corresponding contact information will be provided to the requesting application (act 150).
In one embodiment, the available personas are presented through an interface object that is integrated within the interface of the requesting application. For example, in
Although the interface object can be integrated within the interfaces of existing applications, it will be appreciated that in other embodiments, the interface object can also comprise a separate stand alone interface, menu, icon or other object that is presented to the user independently of the application's interface.
In other embodiments, the user can also be presented with additional personas that have been identified and that might correspond with different people, such as for example, when the user has not yet been identified by the computing system through a logging on procedure.
To protect contact information that may be confidential, such as, for example, personal identification numbers, social security numbers, bank account numbers, etc., security modules can also be provided to prevent a user from accessing or utilizing the personas of different users unless they have been authorized to do so. Such authorization may require the user to log in or to provide other certain information to verify their identity.
In the present example, an email application has requested contact information about the user that will be included in metadata and headers for outgoing mail. The user may not have been made aware of this, but upon seeing the profile interface object 210, the user can be informed that the application is seeking certain information. To provide even more notice to the user, the interface object can be displayed in an even more notorious or evident manner.
The user can be further informed about the information the application is seeking through a separate interface, such as, for example, the interface 300 shown in
It can be useful to notify the user of an application's request for information because some requests are not explicitly made to the user, but instead are made to the user's computing system without the user's express knowledge. Likewise, some requests for information are made at times that predate the user's ultimate use of an application, such that a reminder to the user of the application's request for information can be useful.
Turning now to
The business profile currently includes fields for a business name (310), email address (320), physical address (330), and phone number (340), each of which can be populated with the appropriate information. This information can be added at any time, prior to the application requesting the information, or after. This information can also be modified by a user at the interface 300.
The types of information that are presented in the interface 300 can be limited to the specific information being requested by the application or, more broadly, can include all types of related contact information that is associated with the user's corresponding persona.
The interface can also include additional information, such as the privacy value proposition 350 of the application and/or of the application's owners that will inform the user what the contact information will be used for. This privacy and use information can be directly included in the interface 300, or, alternatively, it can be linked to from one or more objects, such as a hyperlink, that are provided by the interface 300. The privacy and use information can be specifically requested by the modules of the present invention as a prerequisite to providing the requested contact information to the applications. Alternatively, this information can be voluntarily provided without request.
The next illustrated act is to determine which of the available persona information will be presented and the format in which it will be presented (act 160). In particular, a persona may include more information than a user wishes to make available to an application. Likewise, an application may not want all of the contact information that is made available by a persona. Accordingly, the request by the application can be automatically matched with the available information to identify the information that will be presented. Alternatively, a user can be required to manually enter the information into the fields of the interface 300, and to explicitly approve the transmission of the information, if any, that is displayed by the interface 300.
If at anytime the user wants to change the contact information that is being provided to the application, they can modify it through the interface 300 as mentioned above.
The format in which the information is presented can also be specifically requested by an application. For example, an application might request the information be provided in a V-card format, in list, or in another format.
The appropriate contact information that has been requested is then presented in the appropriate format (act 130). What is considered appropriate is generally application specific and corresponds to the application's request for information as well as the persona that was selected by the user. By way of example, the appropriate contact information for an email application could include the business email address and business name of a user, if the user has specifically selected that the business persona be used to satisfy the application's request for information.
It will be appreciated that by doing this, the user can control what information is published and used by the application. For example, the outgoing messages will include only the user's business name and email address to identify the sender. Likewise, if the user were to select the anonymous persona for a new email, the new outgoing email would then include an anonymous email address and name that would not identify the sender or that would only identify the sender in some anonymous way.
Although the previous example is provided with respect to email functionality, it will be appreciated that the scope of the invention extends to other embodiments in which contact information is utilized by other application to enable different functionality. For example, other applications may utilize the methods and interfaces of the invention include applications that use contact information to initiate a telephony session, initiate a telephone call, initiate a network connection, initiate a gaming session, access a website, perform a financial transaction, send material goods via postal mail, and so forth. These applications can be hosted by the user's computing system or by a remote computing system.
It will be appreciated that the present invention, as it has been described, overcomes many of the problems with controlling how contact information is provided to applications. In particular, the interfaces that are provided by the present application and their use can enable a user to be informed of application requests for contact information and can provide a user control over what information is gathered and how it is used by requesting applications.
Computing Environment
It will be appreciated by those skilled in the art that the invention may be practiced in computing systems and network computing environments with various configurations, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like. The invention may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination of hardwired or wireless links) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
With reference to
The computer 420 may also include a magnetic hard disk drive 427 for reading from and writing to a magnetic hard disk 439, a magnetic disk drive 428 for reading from or writing to a removable magnetic disk 429, and an optical disk drive 430 for reading from or writing to removable optical disk 431 such as a CD-ROM, DVD-ROM or other optical media. The magnetic hard disk drive 427, magnetic disk drive 428, and optical disk drive 430 are connected to the system bus 423 by a hard disk drive interface 432, a magnetic disk drive-interface 433, and an optical drive interface 434, respectively. The drives and their associated computer-readable media provide nonvolatile storage of computer-executable instructions, data structures, program modules and other data for the computer 420. Although the exemplary environment described herein employs a magnetic hard disk 439, a removable magnetic disk 429 and a removable optical disk 431, other types of computer readable media for storing data can be used, including magnetic cassettes, flash memory cards, digital versatile disks, Bernoulli cartridges, RAMs, ROMs, and the like.
Program code means comprising one or more program modules may be stored on the hard disk 439, magnetic disk 429, optical disk 431, ROM 424 or RAM 425, including an operating system 435, one or more application programs 436, other program modules 437, and program data 438. A user may enter commands and information into the computer 420 through keyboard 440, pointing device 442, or other input devices (not shown), such as a microphone, joy stick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 421 through a serial port interface 446 coupled to system bus 423. Alternatively, the input devices may be connected by other interfaces, such as a parallel port, a game port or a universal serial bus (USB). A monitor 447 or another display device is also connected to system bus 423 via an interface, such as video adapter 448. In addition to the monitor, personal computers typically include other peripheral output devices (not shown), such as speakers and printers.
The computer 420 may operate in a networked environment using logical connections to one or more remote computers, such as remote computers 449a and 449b. Remote computers 449a and 449b may each be another personal computer, a server, a router, a network PC, a peer device or other common network node, and typically include many or all of the elements described above relative to the computer 420, although only memory storage devices 450a and 450b and their associated application programs 436a and 436b have been illustrated in
When used in a LAN networking environment, the computer 420 is connected to the local network 451 through a network interface or adapter 453. When used in a WAN networking environment, the computer 420 may include a modem 454, a wireless link, or other means for establishing communications over the wide area network 452, such as the Internet. The modem 454, which may be internal or external, is connected to the system bus 423 via the serial port interface 446. In a networked environment, program modules depicted relative to the computer 420, or portions thereof, may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing communications over wide area network 452 may be used.
The present invention can also be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Number | Name | Date | Kind |
---|---|---|---|
5214756 | Franklin | May 1993 | A |
5640565 | Dickinson | Jun 1997 | A |
5659788 | Sorneya | Aug 1997 | A |
5737726 | Cameron | Apr 1998 | A |
5767897 | Howell | Jun 1998 | A |
5870744 | Sprague | Feb 1999 | A |
5873108 | Goyal | Feb 1999 | A |
5896321 | Miller | Apr 1999 | A |
5913032 | Schwartz | Jun 1999 | A |
5923848 | Goodhand | Jul 1999 | A |
5950193 | Kulkarni | Sep 1999 | A |
5959629 | Masui | Sep 1999 | A |
5999208 | McNerney | Dec 1999 | A |
6008799 | Van Kleeck | Dec 1999 | A |
6014135 | Fernandes | Jan 2000 | A |
6026396 | Hall | Feb 2000 | A |
6065012 | Balsara | May 2000 | A |
6208339 | Atlas | Mar 2001 | B1 |
6209005 | Harker | Mar 2001 | B1 |
6212534 | Lo | Apr 2001 | B1 |
6216122 | Elson | Apr 2001 | B1 |
6247043 | Bates | Jun 2001 | B1 |
6269369 | Robertson | Jul 2001 | B1 |
6339826 | Hayes | Jan 2002 | B2 |
6411961 | Chen | Jun 2002 | B1 |
6434564 | Ebert | Aug 2002 | B2 |
6460074 | Fishkin | Oct 2002 | B1 |
6539379 | Vora | Mar 2003 | B1 |
6557004 | Ben-Shachar et al. | Apr 2003 | B1 |
6564213 | Ortega | May 2003 | B1 |
6564327 | Klensin et al. | May 2003 | B1 |
6571235 | Marpe | May 2003 | B1 |
6581059 | Barrett et al. | Jun 2003 | B1 |
6581062 | Draper | Jun 2003 | B1 |
6609108 | Pulliam | Aug 2003 | B1 |
6643661 | Polizzi | Nov 2003 | B2 |
6661434 | MacPhail | Dec 2003 | B1 |
6668281 | Ayyadurai | Dec 2003 | B1 |
6678685 | McGill | Jan 2004 | B2 |
6699125 | Kirmse | Mar 2004 | B2 |
6701348 | Sommerer | Mar 2004 | B2 |
6718366 | Beck | Apr 2004 | B2 |
6753889 | Najmi | Jun 2004 | B1 |
6781608 | Crawford | Aug 2004 | B1 |
6791583 | Tang | Sep 2004 | B2 |
6820075 | Shanahan | Nov 2004 | B2 |
6820204 | Desai et al. | Nov 2004 | B1 |
6828988 | Hudson | Dec 2004 | B2 |
6829607 | Tafoya | Dec 2004 | B1 |
6832263 | Polizzi | Dec 2004 | B2 |
6845370 | Burkey et al. | Jan 2005 | B2 |
6870921 | Elsey et al. | Mar 2005 | B1 |
6871140 | Florance et al. | Mar 2005 | B1 |
6883000 | Gropper | Apr 2005 | B1 |
6895388 | Smith | May 2005 | B1 |
6907580 | Michelman | Jun 2005 | B2 |
6947929 | Bruce | Sep 2005 | B2 |
6959340 | Najmi | Oct 2005 | B1 |
6983310 | Rouse | Jan 2006 | B2 |
6985924 | Schwartz | Jan 2006 | B2 |
6988128 | Alexander | Jan 2006 | B1 |
6990495 | Grason | Jan 2006 | B1 |
6993712 | Ramachandran | Jan 2006 | B2 |
7007149 | Chung | Feb 2006 | B2 |
7010572 | Benjamin | Mar 2006 | B1 |
7010599 | Shrinivasan | Mar 2006 | B2 |
7010616 | Carlson | Mar 2006 | B2 |
7043471 | Cheung | May 2006 | B2 |
7068768 | Barnes | Jun 2006 | B2 |
7076498 | Banerjee | Jul 2006 | B2 |
7096232 | Doss | Aug 2006 | B2 |
7113941 | Arend | Sep 2006 | B2 |
7117271 | Haverstock | Oct 2006 | B2 |
7130853 | Roller | Oct 2006 | B2 |
7139774 | Dettinger | Nov 2006 | B2 |
7143190 | Christensen | Nov 2006 | B2 |
7146570 | Yeh | Dec 2006 | B2 |
7149731 | Dettinger | Dec 2006 | B2 |
7159207 | Tang | Jan 2007 | B2 |
7162474 | Harker | Jan 2007 | B1 |
7185290 | Cadiz | Feb 2007 | B2 |
7191210 | Grossman | Mar 2007 | B2 |
7209951 | Goldberg | Apr 2007 | B2 |
7185271 | Lee | Jul 2007 | B2 |
7302634 | Lucovsky | Nov 2007 | B2 |
20020029254 | Davis et al. | Mar 2002 | A1 |
20020073207 | Widger | Jun 2002 | A1 |
20020107914 | Charisius | Aug 2002 | A1 |
20020120864 | Wu et al. | Aug 2002 | A1 |
20020143961 | Siegel et al. | Oct 2002 | A1 |
20020156895 | Brown | Oct 2002 | A1 |
20020186257 | Cadiz | Dec 2002 | A1 |
20030041065 | Lucovsky | Feb 2003 | A1 |
20030041076 | Lucovsky | Feb 2003 | A1 |
20030069874 | Hertzog et al. | Apr 2003 | A1 |
20030050911 | Lucovsky | May 2003 | A1 |
20030158855 | Farnham | Aug 2003 | A1 |
20030210265 | Haimberg | Nov 2003 | A1 |
20040083453 | Knight | Apr 2004 | A1 |
20040093334 | Scherer | May 2004 | A1 |
20040103364 | Dornback | May 2004 | A1 |
20040107283 | Paddon | Jun 2004 | A1 |
20040117322 | Bjorksten et al. | Jun 2004 | A1 |
20040139025 | Coleman | Jul 2004 | A1 |
20040177082 | Nitta | Sep 2004 | A1 |
20040199581 | Kucharewski et al. | Oct 2004 | A1 |
20040210844 | Pettinati | Oct 2004 | A1 |
20040235520 | Cadiz | Nov 2004 | A1 |
20040236792 | Celik | Nov 2004 | A1 |
20040243935 | Abramovitch | Dec 2004 | A1 |
20040260948 | Miyata et al. | Dec 2004 | A1 |
20050002510 | Elsey et al. | Jan 2005 | A1 |
20050004874 | Gilmour et al. | Jan 2005 | A1 |
20050015439 | Balaji | Jan 2005 | A1 |
20050080805 | Haeberle | Apr 2005 | A1 |
20050114329 | Dettinger | May 2005 | A1 |
20050131888 | Tafoya | Jun 2005 | A1 |
20050182741 | Grossman | Aug 2005 | A1 |
20050262208 | Haviv | Nov 2005 | A1 |
20050283468 | Karnvar | Dec 2005 | A1 |
20060010104 | Pettinati | Jan 2006 | A1 |
20060041545 | Heidloff | Feb 2006 | A1 |
20060053384 | La Fetra | Mar 2006 | A1 |
20060064645 | Neven | Mar 2006 | A1 |
20060174002 | Shrinivasan | Aug 2006 | A1 |
20060253787 | Fogg | Nov 2006 | A1 |
20060277213 | Robertson | Dec 2006 | A1 |
Number | Date | Country |
---|---|---|
WO02073454 | Sep 2002 | WO |
WO 2005013079 | Feb 2005 | WO |
Number | Date | Country | |
---|---|---|---|
20050091072 A1 | Apr 2005 | US |