Method and system for managing token image replacement

Information

  • Patent Grant
  • 7591412
  • Patent Number
    7,591,412
  • Date Filed
    Thursday, October 25, 2007
    17 years ago
  • Date Issued
    Tuesday, September 22, 2009
    15 years ago
Abstract
A system for managing token image replacement is provided. The system includes a remote server, a personal computer (PC) connected to the remote server, a smartcard that can be read by the PC, and a card image server. Using application logic and rules, the remote server is able to read the card image on the smartcard and determine if the card image on the smartcard needs to be updated. If an indicator on the smartcard is set to “update”, the remote server then retrieves a backup card image that corresponds to the card from the card image server. The remote server forwards the backup card image to the PC which, in turn, writes the backup card image including transaction information to the smartcard. Once the backup card image is written onto the smartcard, the indicator in the smartcard is then reset to ensure that subsequent interactions with the system would not initiate an update.
Description
BACKGROUND OF THE INVENTION

The present invention generally relates to card image replacement and, more specifically, to a method and system for managing card image replacement on a smartcard via a computer network.


The emergence of secured tokens, such as smartcards, has allowed a much higher volume of information to be stored on a transaction card. For instance, in addition to the typical cardholder information, a smartcard is able to store a variety of different programs including, for example, a loyalty program of which the cardholder is a participant. Furthermore, unlike cards with magnetic stripes which can only retain static information, the use of a smartcard allows information stored thereon to be changed dynamically. As a result, there is often a need to update or replace contents of a smartcard.


Moreover, smartcards often need to be replaced for any number of reasons. Due to the transit time needed for replacement cards to reach their respective cardholders, these cards (such as a chip card that has the capability to receive updated information) generally do not contain the latest transaction information. This is because transactions conducted with the old card often occur during the transit period, i.e., the period between the issuance of the replacement card and the actual receipt of that card by its owner.


There are many different situations in which replacement cards are needed. One common situation is when an old card is about to expire. Typically when issuers, such as banks, replace a card, they do so by sending a replacement card to the cardholder in advance of the expiration date. Once the replacement card has been personalized and sent for delivery to the cardholder, there is a period of time that the cardholder may be conducting transactions on his/her existing card. In the case of a chip card, a cardholder may make transactions that result in information being stored on the chip during the time the replacement card is in transit. As a result, when the replacement card is delivered to the cardholder, the most recent transaction information would not be captured on the replacement card.


Another common situation in which a replacement card is desired is when a card has been lost or stolen. Similar to the situation described above, the replacement card would not contain the most recent transaction information. Furthermore, in the case of lost or stolen cards, unauthorized and/or illegal transactions may have occurred. Therefore, it would be important to include the correct authorized transaction information on the replacement card.


Hence, it would be desirable to provide a method and system that is capable of facilitating card image replacement so as to allow replacement cards to be updated with the latest accurate transaction information in an intelligent and efficient manner.


BRIEF SUMMARY OF THE INVENTION

A system for managing token image replacement is provided. In an exemplary embodiment, the system includes a remote server, a personal computer (PC) connected to the remote server, a smartcard that can be read by the PC, and a card image server. Using application logic and rules, the remote server is able to read the card image on the smartcard and determine if the card image on the smartcard needs to be updated. If an indicator on the smartcard is set to “update”, the remote server then retrieves a backup card image that corresponds to the card from the card image server. The remote server forwards the backup card image to the PC which, in turn, writes the backup card image including transaction information to the smartcard. Once the backup card image is written onto the smartcard, the indicator in the smartcard is then reset to ensure that subsequent interactions with the system would not initiate an update.


Reference to the remaining portions of the specification, including the drawings and claims, will realize other features and advantages of the present invention. Further features and advantages of the present invention, as well as the structure and operation of various embodiments of the present invention, are described in detail below with respect to accompanying drawings, like reference numbers indicate identical or functionally similar elements.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a simplified block diagram illustrating an exemplary embodiment of the present invention; and



FIG. 2 is a flow diagram further illustrating an exemplary method for managing token image replacement in accordance with the present invention.





DETAILED DESCRIPTION OF THE INVENTION

The present invention in the form of one or more exemplary embodiments will now be described. FIG. 1 is a simplified block diagram illustrating an exemplary embodiment of the present invention. Referring to FIG. 1, according to one exemplary embodiment, the system 10 includes a remote server 12, a loyalty and account host 16, a token acceptance device 14 and a token 18. In other alternative exemplary embodiments (not shown), multiple instances of each component of the system 10 may be included. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will know of other ways and/or methods to construct various system configurations in accordance with the present invention.


The loyalty and account host 16 maintains information on a number of loyalty programs and respective accounts relating to the loyalty programs. For example, the loyalty and account host 16 maintains backup token images of tokens 18 participating in the loyalty programs. A token image includes information relating to the holder of the token 18 or the loyalty program participant such as, loyalty programs that the holder is eligible to participate in and the associated account information, loyalty transactions completed, rewards earned and reward redeemed, etc. Optionally, the loyalty and account host 16 may maintain two or more backup token images for each token 18, depending on the particular design and/or constraints. The backup token images need not be identical. Various dated versions of the backup token images can be maintained. For example, a first backup token image for the token 18 may reflect information as of a first date, and a second backup token image for the same token may reflect information as of a second date. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will appreciate other ways and/or methods that can be used to maintain backup token images in accordance with the present invention. The loyalty and account host 16 can be implemented as a server or a computer that is capable of maintaining data or other information including token images, etc.


In one exemplary implementation, the token 18 is a smartcard. It should be understood that the token 18 includes other types of portable devices including, for example, a cellular phone, a personal digital assistant, a pager, a payment card (such as a credit card and an ATM card), a security card, an access card, smart media, a transponder and the like.


The token acceptance device 14 is a device that is capable of communicating with the token 18 including, for example, a point-of-sale device, a cellular phone, a personal digital assistant (PDA), a personal computer (PC), a tablet PC, a handheld specialized reader, a set-top box, an electronic cash register, a virtual cash register, a kiosk, a security system, an access system, and the like. In one exemplary embodiment, the token acceptance device 14 further includes a loyalty plug-in 22 and a loyalty transaction interface 24. As will be further described below, the loyalty plug-in 22 and the loyalty transaction interface 24 cooperate with one another as well as the remote server 12 to facilitate token image replacement.


The remote server 12 functions in cooperation with the loyalty and account host 16 and the token acceptance device 14 to facilitate maintenance of the token 18, as will be further described below. The remote server 12 is connected to the token acceptance device 14 and the loyalty and account host 16 via respective communication links, such as, a dialup connection, a leased line, a computer network including the Internet, and the like. The remote server 12 further includes an open program engine (OPE) 20. The OPE 20 contains application logic and rules that are used to manage and process loyalty transactions in connection with loyalty programs that are associated with the token 18. In addition, the application logic and rules in the OPE 20 are also used to facilitate maintenance of the token 18.


The system 10 operates in the following exemplary manner to complete token image replacement on the token 18. First, the token 18 is inserted into the token acceptance device 14 so that information on the token 18 can be retrieved. For example, using the application logic and rules, the remote server 12 is able to read the token image on the token 18 and determine if the token image on the token 18 needs to be updated. If an indicator on the token 18 is set to “update”, the remote server 12 then retrieves a backup token image that corresponds to the token 18 from the loyalty and account host 16.


The indicator on the token 18 may be set to “update” in a number of ways. For example, in one situation, the indicator may be set by the issuer of the token 18 when the issuer forwards the token 18 to the holder. At the time the holder receives the token 18, the token 18 may be blank or contain minimal information. Hence, when the holder uses the token 18 to conduct loyalty program activities, the latest token image can be uploaded to the token 18 to keep the token 18 current. In another situation, occurrence of a certain event might trigger the setting of the indicator to “update” so that additional information pertaining to the triggering event can be uploaded to the token 18.


As mentioned above, optionally, there may be two or more backup token images that can be uploaded to the token 18. Logic may be included to allow the appropriate backup token image to be uploaded. Various criteria can be used to determine which backup token image is to be uploaded. For example, a backup token image from a specific date may need to be uploaded to the token 18.


Once the backup token image is retrieved from the loyalty and account host 16, the backup token image is forwarded by the remote server 13 to the token acceptance device 14. The token acceptance device 14 then updates or writes the backup token image to the token 18. Typically, the entire backup token image is uploaded to the token 18. However, it should be noted that in some situations the token acceptance device 14 may choose to update the token 18 with selected portions of the backup token image. In other words, all or portions of the backup token image can be uploaded onto the token 18. This may be necessary to ensure that certain information that may have been added to the token 18 during prior transactions is not overwritten.


Once the backup token image is written onto the token 18, the indicator in the token 18 is then reset to ensure that subsequent interactions with the system 10 will not initiate an update.



FIG. 2 is a flow diagram further illustrating an exemplary method for managing token image replacement in accordance with the present invention. At 30, the loyalty plug-in 22 detects that an “update” is needed for the token 18. At 32, the loyalty plug-in 22 communicates with the loyalty transaction interface 24 which, in turn, issues an update request to the OPE 20. The update request includes information that is needed to identify the token 18. At 34, upon receiving the update request, the OPE 20 contacts the loyalty and account host 16 to retrieve the appropriate backup token image. The appropriate backup token image is determined based on information included in the update request. At 36, upon receiving the backup token image, the OPE 20 engages in mutual authentication with the token 18 with the help of the loyalty transaction interface 24. At 38, upon successful mutual authentication, the backup token image is passed by the OPE 20 to the loyalty plug-in 22 via the loyalty transaction interface 24. The loyalty plug-in 22 then updates the token 18 with the backup token image. At 40, the loyalty plug-in 22 then confirms the loyalty transaction interface 24 of the successful update. The loyalty transaction interface 24, in turn, forwards the confirmation to the OPE 20. The OPE 20 stores the confirmation for subsequent reporting to the loyalty and account host 16.


The backup token image can also be provided to the token 18 in other exemplary manners. For example, the cardholder may contact a customer service representative to request an update (i.e., the backup token image) for the token 18. The customer service representative then, in turn, forwards an email to the cardholder with the backup token image attached. The backup token image can then be provided to the token 18. In another instance, the cardholder may contact the remote server 12 to request an update for the token 18. The remote server 12 may send the backup token image to a specific location, such as, a store. The store may have, for example, kiosks that allow the backup token image to be retrieved. The cardholder may then be instructed to visit the specific location to retrieve the backup token image. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will know of other ways and/or methods to provide the backup token image to a token in accordance with the present invention.


In an exemplary embodiment, the system 10 as described above is implemented using a number of hardware and/or software components. It should be understood that in addition to the configurations described above, these components may be distributed in other manners, integrated or modular or otherwise, amongst the various components of the system 10 to achieve the same collective functionality, depending on factors such as the system design and resource constraints. For example, the open program engine 20 and the loyalty and account host 16 can be combined into a single remote server; and the loyalty plug-in 22 and the loyalty transaction interface 24 can be combined into single loyalty client. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will know of other ways and/or methods to implement the functionality provided by the present invention in various forms and/or configurations.


The system 10 of the present invention as described above can be deployed in a number of applications. In one exemplary application, the system 10 can be used to update a newly issued smartcard with the most recent transaction information. After the newly issued smartcard is sent but before it is received by the cardholder, the cardholder may conduct transactions using his old smartcard during this interim period. Information relating to these transactions is captured on the backup smartcard image which is maintained by the loyalty and account host 16. This information, however, could not have been and is not stored on the newly issued smartcard. In addition, to improve security reasons associated with potential loss during transit, the new smartcard can be rendered blank or contain minimal information when it is sent to the cardholder. Subsequently, when the cardholder receives the new smartcard, the system 10 allows the new smartcard to be updated with the backup smartcard image which includes the most recent transaction information captured during the interim period.


In another exemplary application, the system 10 can be used to update a newly issued smartcard with selected transaction information. This application is similar to the one described above except that selected transaction information is desired as opposed to the most recent. This may be desired in a situation where the new smartcard is issued to replace an old smartcard that has been stolen or lost. In this situation, the most recent transaction information may reflect fraudulent transactions. Hence, the new smartcard may need to be updated with information that existed at a certain point in time which is not necessarily the most recent. By using the system 10, the cardholder can update the new smartcard with the appropriate backup smartcard image to reflect only legitimate transactions that have been incurred. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will appreciate other ways and/or methods to deploy the present invention.


It is understood that the examples and embodiments described herein are for illustrative purposes only and that various modifications or changes in light thereof will be suggested to persons skilled in the art and are to be included within the spirit and purview of this application and scope of the appended claims. All publications, patents, and patent applications cited herein are hereby incorporated by reference for all purposes in their entirety.

Claims
  • 1. A method for using a portable token, the method comprising: providing a portable token comprising loyalty program information to a token acceptance device, the token acceptance device being external to the portable token, wherein the token acceptance device thereafter reads an update indicator on the portable token, the update indicator indicating if the portable token requires updating; andreceiving at least a portion of a backup token image at the portable token if the update indicator indicates that the portable token is to be updated,wherein the portable token is in the form of a phone.
  • 2. The method of claim 1 further comprising mutually authenticating the portable token with a remote server.
  • 3. The method of claim 2 wherein the remote server comprises an open program engine.
  • 4. The method of claim 1 wherein the token acceptance device comprises a loyalty plug-in and wherein the method further comprises: communicating with the loyalty plug-in using the portable token.
  • 5. The method of claim 4 wherein the loyalty plug-in further communicates with a remote server.
  • 6. The method of claim 1 wherein the at least the portion of the backup token image comprises an entire backup token image.
  • 7. The method of claim 1 wherein the update indicator is reset after receiving at least the portion of the backup token image.
  • 8. The method of claim 1 wherein the token acceptance device comprises a loyalty plug-in and wherein the method further comprises: communicating with the loyalty plug-in using the portable token, wherein the loyalty plug-in detects whether an update of the portable token is needed.
  • 9. The method of claim 8 wherein the loyalty plug-in further communicates with a remote server.
  • 10. The method of claim 8 wherein the update indicator is reset after receiving at least the portion of the backup token image.
  • 11. A phone comprising loyalty program information and an update indicator, the update indicator indicating if the phone requires updating, wherein the phone is configured to interact with a token acceptance device, the token acceptance device being external to the phone, wherein the token acceptance device thereafter reads an update indicator on the phone and wherein the phone is further configured to receive at least a portion of a backup token image if the update indicator indicates that the phone is to be updated.
  • 12. The phone of claim 11 wherein the phone is further configured to mutually authenticate with a remote server.
  • 13. The phone of claim 12 wherein the remote server comprises an open program engine.
  • 14. The phone of claim 11 wherein the at least the portion of the backup token image comprises an entire backup token image.
  • 15. The phone of claim 11 wherein the update indicator is configured to be reset after receiving at least the portion of the backup token image.
  • 16. The method of claim 1 wherein the portion of a backup token image only contains loyalty transactions conducted prior to a point in time when the portable was reported stolen.
  • 17. The phone of claim 11 wherein the portion of the backup token image is sent to the token acceptance device in an e-mail.
CROSS-REFERENCES TO RELATED APPLICATION

The present application is a continuation application of U.S. patent application Ser. No. 11/540,020, filed on Sep. 29, 2006, which is a continuation of U.S. patent application Ser. No. 10/661,228, filed on Sep. 12, 2003, which claims the benefit of priority under 35 U.S.C. § 119 from U.S. Provisional Patent Application Ser. No. 60/410,555, entitled “METHOD AND SYSTEM FOR MANAGING CARD IMAGE REPLACEMENT”, filed on Sep. 13, 2002, all of which are hereby incorporated by reference in their entirety for all purposes.

US Referenced Citations (265)
Number Name Date Kind
3935933 Tanaka et al. Feb 1976 A
4011433 Tateisi et al. Mar 1977 A
4108350 Forbes, Jr. Aug 1978 A
4124109 Bissell et al. Nov 1978 A
4195864 Morton et al. Apr 1980 A
4412631 Haker Nov 1983 A
4544590 Egan Oct 1985 A
4568403 Egan Feb 1986 A
4674041 Lemon et al. Jun 1987 A
4723212 Mindrum et al. Feb 1988 A
4742215 Daughters et al. May 1988 A
4794530 Yukiura et al. Dec 1988 A
4825053 Caille Apr 1989 A
4837422 Dethloff et al. Jun 1989 A
4841712 Roou Jun 1989 A
4868376 Lessin et al. Sep 1989 A
4882675 Nichtberger et al. Nov 1989 A
4910672 Off et al. Mar 1990 A
4930129 Takahira May 1990 A
4941090 McCarthy Jul 1990 A
4949256 Humble Aug 1990 A
4954003 Shea Sep 1990 A
4985615 Iijima Jan 1991 A
4992940 Dworkin Feb 1991 A
5019452 Watanabe et al. May 1991 A
5019695 Itako May 1991 A
5025372 Burton et al. Jun 1991 A
5056019 Schultz et al. Oct 1991 A
5060793 Hyun et al. Oct 1991 A
5060804 Beales et al. Oct 1991 A
5063596 Dyke Nov 1991 A
5115888 Schneider May 1992 A
5117355 McCarthy May 1992 A
5128752 Von Kohorn Jul 1992 A
5161256 Iijima Nov 1992 A
5162638 Diehl et al. Nov 1992 A
5173851 Off et al. Dec 1992 A
5185695 Pruchnicki Feb 1993 A
5200889 Mori Apr 1993 A
5202826 McCarthy Apr 1993 A
5227874 Von Kohorn Jul 1993 A
5256863 Ferguson et al. Oct 1993 A
5285278 Holman Feb 1994 A
5287181 Holman Feb 1994 A
5287268 McCarthy Feb 1994 A
5299834 Kraige Apr 1994 A
5308120 Thompson May 1994 A
5353218 De Lapa et al. Oct 1994 A
5380991 Valencia et al. Jan 1995 A
RE34915 Nichtberger et al. Apr 1995 E
5402549 Forrest Apr 1995 A
5417458 Best et al. May 1995 A
5420606 Begum et al. May 1995 A
5450938 Rademacher Sep 1995 A
5466010 Spooner Nov 1995 A
5471669 Lidman Nov 1995 A
5473690 Grimonprez et al. Dec 1995 A
5483444 Heintzeman et al. Jan 1996 A
5484998 Bejnar et al. Jan 1996 A
5491326 Marceau et al. Feb 1996 A
5491838 Takahisa et al. Feb 1996 A
5500681 Jones Mar 1996 A
5501491 Thompson Mar 1996 A
5513102 Auriemma Apr 1996 A
5515270 Weinblatt May 1996 A
5521966 Friedes et al. May 1996 A
5530232 Taylor Jun 1996 A
5531482 Blank Jul 1996 A
5535118 Chumbley Jul 1996 A
5537314 Kanter Jul 1996 A
5559313 Claus et al. Sep 1996 A
5564073 Takahisa Oct 1996 A
5577266 Takahisa et al. Nov 1996 A
5577915 Feldman Nov 1996 A
5578808 Taylor Nov 1996 A
5579537 Takahisa Nov 1996 A
5594493 Nemirofsky Jan 1997 A
5612868 Off et al. Mar 1997 A
5621812 Deaton et al. Apr 1997 A
5642485 Deaton et al. Jun 1997 A
5644723 Deaton et al. Jul 1997 A
5649114 Deaton et al. Jul 1997 A
5649118 Carlisle et al. Jul 1997 A
5650209 Ramsburg et al. Jul 1997 A
5687322 Deaton et al. Nov 1997 A
5689100 Carrithers et al. Nov 1997 A
5691525 Aoki et al. Nov 1997 A
5710886 Christensen et al. Jan 1998 A
5727153 Powell Mar 1998 A
5734838 Robinson et al. Mar 1998 A
5742845 Wagner Apr 1998 A
5754762 Kuo et al. May 1998 A
5761648 Golden et al. Jun 1998 A
5765141 Spector Jun 1998 A
5767896 Nemirofsky Jun 1998 A
5774546 Handelman et al. Jun 1998 A
5774870 Storey Jun 1998 A
5776287 Best et al. Jul 1998 A
5791991 Small Aug 1998 A
5794210 Goldhaber et al. Aug 1998 A
5797126 Helbling et al. Aug 1998 A
5802519 De Jong Sep 1998 A
5804806 Haddad et al. Sep 1998 A
5806044 Powell Sep 1998 A
5806045 Biorge et al. Sep 1998 A
5815658 Kuriyama Sep 1998 A
5822735 De Lapa et al. Oct 1998 A
5822737 Ogram Oct 1998 A
5832457 O'Brien et al. Nov 1998 A
5844218 Kawan et al. Dec 1998 A
5845082 Murakami Dec 1998 A
5845259 West et al. Dec 1998 A
5854581 Mori et al. Dec 1998 A
5855007 Jovicic et al. Dec 1998 A
5857175 Day et al. Jan 1999 A
5859419 Wynn Jan 1999 A
RE36116 McCarthy Feb 1999 E
5865340 Alvern Feb 1999 A
5865470 Thompson Feb 1999 A
5868498 Martin Feb 1999 A
5880769 Nemirofsky et al. Mar 1999 A
5884271 Pitroda Mar 1999 A
5884277 Khosla Mar 1999 A
5884278 Powell Mar 1999 A
5887271 Powell Mar 1999 A
5890135 Powell Mar 1999 A
5892827 Beach et al. Apr 1999 A
5898838 Wagner Apr 1999 A
5903732 Reed et al. May 1999 A
5905246 Fajkowski May 1999 A
5905908 Wagner May 1999 A
5907350 Nemirofsky May 1999 A
5907830 Engel et al. May 1999 A
5909486 Walker et al. Jun 1999 A
5912453 Gungl et al. Jun 1999 A
5915244 Jack et al. Jun 1999 A
5923884 Peyret et al. Jul 1999 A
5924072 Havens Jul 1999 A
5926795 Williams Jul 1999 A
5928082 Clapper, Jr. Jul 1999 A
5931947 Burns et al. Aug 1999 A
5943651 Oosawa Aug 1999 A
5950173 Perkowski Sep 1999 A
5953047 Nemirofsky Sep 1999 A
5953705 Oneda Sep 1999 A
5956694 Powell Sep 1999 A
5956695 Carrithers et al. Sep 1999 A
5958174 Ramsberg et al. Sep 1999 A
5960082 Haenel Sep 1999 A
5963917 Ogram Oct 1999 A
5969318 Mackenthun Oct 1999 A
5970469 Scroggie et al. Oct 1999 A
5974399 Giuliani et al. Oct 1999 A
5974549 Golan Oct 1999 A
5978013 Jones et al. Nov 1999 A
5987795 Wilson Nov 1999 A
5997042 Blank Dec 1999 A
6000608 Dorf Dec 1999 A
6002771 Nielsen Dec 1999 A
6003113 Hoshino Dec 1999 A
6003134 Kuo et al. Dec 1999 A
6005942 Chan et al. Dec 1999 A
6009411 Kepecs Dec 1999 A
6012635 Shimada et al. Jan 2000 A
6014634 Scroggie et al. Jan 2000 A
6024286 Bradley et al. Feb 2000 A
6035280 Christensen Mar 2000 A
6038551 Barlow et al. Mar 2000 A
6041309 Laor Mar 2000 A
6047325 Jain et al. Apr 2000 A
6049778 Walker et al. Apr 2000 A
6052468 Hillhouse Apr 2000 A
6052690 de Jong Apr 2000 A
6052785 Lin et al. Apr 2000 A
6055509 Powell Apr 2000 A
6061660 Eggleston et al. May 2000 A
6061671 Baker et al. May 2000 A
6067526 Powell May 2000 A
6070147 Harms et al. May 2000 A
6073238 Drupsteen Jun 2000 A
6076068 DeLapa et al. Jun 2000 A
6076069 Laor Jun 2000 A
6089611 Blank Jul 2000 A
6094656 De Jong Jul 2000 A
6101422 Furlong Aug 2000 A
6101477 Hohle et al. Aug 2000 A
6105002 Powell Aug 2000 A
6105865 Hardesty Aug 2000 A
6105873 Jeger Aug 2000 A
6112987 Lambert et al. Sep 2000 A
6112988 Powell Sep 2000 A
6119933 Wong et al. Sep 2000 A
6119945 Muller et al. Sep 2000 A
6122631 Berbec et al. Sep 2000 A
6129274 Suzuki Oct 2000 A
6138907 Mori et al. Oct 2000 A
6144948 Walker et al. Nov 2000 A
6151586 Brown Nov 2000 A
6151587 Matthias Nov 2000 A
6154751 Ault et al. Nov 2000 A
6161870 Blank Dec 2000 A
6164549 Richards Dec 2000 A
6169678 Kondo et al. Jan 2001 B1
6170061 Beser Jan 2001 B1
6173269 Solokl et al. Jan 2001 B1
6173891 Powell Jan 2001 B1
6179205 Sloan Jan 2001 B1
6179710 Sawyer et al. Jan 2001 B1
6183017 Najor et al. Feb 2001 B1
6185541 Scroggie et al. Feb 2001 B1
6189100 Barr et al. Feb 2001 B1
6189878 Meese Feb 2001 B1
6193152 Fernando et al. Feb 2001 B1
6195666 Schneck et al. Feb 2001 B1
6210276 Mullins Apr 2001 B1
6216014 Proust et al. Apr 2001 B1
6216204 Thiriet Apr 2001 B1
6220510 Everett et al. Apr 2001 B1
6222914 McMullin Apr 2001 B1
6230143 Simons et al. May 2001 B1
6237145 Narasimhan et al. May 2001 B1
6241287 Best et al. Jun 2001 B1
6243687 Powell Jun 2001 B1
6243688 Kalina Jun 2001 B1
6244958 Acres Jun 2001 B1
6266647 Fernandez Jul 2001 B1
6267263 Emoff et al. Jul 2001 B1
6269158 Kim Jul 2001 B1
6270011 Gottfried Aug 2001 B1
6279112 O'Toole, Jr. et al. Aug 2001 B1
6282516 Giuliani Aug 2001 B1
6292785 McEvoy et al. Sep 2001 B1
6292786 Deaton et al. Sep 2001 B1
6296191 Hamann et al. Oct 2001 B1
6299530 Hansted et al. Oct 2001 B1
6321208 Barnett et al. Nov 2001 B1
6385723 Richards May 2002 B1
6390374 Carper et al. May 2002 B1
6427140 Ginter et al. Jul 2002 B1
6480935 Carper et al. Nov 2002 B1
6549773 Linden et al. Apr 2003 B1
6549912 Chen Apr 2003 B1
6553494 Glass Apr 2003 B1
6564215 Hsiao et al. May 2003 B1
6606744 Mikurak Aug 2003 B1
6612490 Herrendoerfer et al. Sep 2003 B1
6681995 Sukeda et al. Jan 2004 B2
6689345 Jager Lezer Feb 2004 B2
6779115 Naim Aug 2004 B1
6792536 Teppler Sep 2004 B1
6880752 Tarnovsky et al. Apr 2005 B2
6976165 Carpentier et al. Dec 2005 B1
6980670 Hoffman et al. Dec 2005 B1
7051923 Nguyen et al. May 2006 B2
20010011250 Paltenghe et al. Aug 2001 A1
20010045451 Tan et al. Nov 2001 A1
20020002468 Spagna et al. Jan 2002 A1
20020004783 Paltenghe et al. Jan 2002 A1
20020010757 Granik et al. Jan 2002 A1
20020076051 Nii Jun 2002 A1
20020077904 Ali Jun 2002 A1
20020107797 Combaluzier et al. Aug 2002 A1
20030131041 Dinker et al. Jul 2003 A1
20040225776 DiRaimondo et al. Nov 2004 A1
20060011719 Lehtonen et al. Jan 2006 A1
Foreign Referenced Citations (120)
Number Date Country
200039412 Dec 2000 AU
1002756 May 1991 BE
2293944 Aug 2000 CA
2267041 Sep 2000 CA
2317138 Jan 2002 CA
19522527 Jan 1997 DE
19848712 Apr 2000 DE
19960978 Aug 2000 DE
10015103 Oct 2000 DE
0203424 Dec 1986 EP
0292248 Nov 1988 EP
0475837 Mar 1992 EP
0540095 May 1993 EP
0658862 Jun 1995 EP
0675614 Oct 1995 EP
0682327 Nov 1995 EP
0875841 Nov 1998 EP
0936530 Aug 1999 EP
0938050 Aug 1999 EP
0938051 Aug 1999 EP
0944007 Sep 1999 EP
0949595 Oct 1999 EP
0982692 Mar 2000 EP
0984404 Mar 2000 EP
1085395 Mar 2001 EP
1102320 May 2001 EP
1111505 Jun 2001 EP
1113387 Jul 2001 EP
1113407 Jul 2001 EP
1168137 Jan 2002 EP
1233333 Aug 2002 EP
2772957 Jun 1999 FR
2793048 Nov 2000 FR
2794543 Dec 2000 FR
2796176 Jan 2001 FR
2804234 Jul 2001 FR
2331381 May 1999 GB
2343091 Apr 2000 GB
2351379 Dec 2000 GB
2355324 Apr 2001 GB
2000-112864 Apr 2000 JP
2000-181764 Jun 2000 JP
2001-202484 Jul 2001 JP
2001-236232 Aug 2001 JP
0039297 May 2001 KR
0044823 Jun 2001 KR
0058742 Jul 2001 KR
0021237 Mar 2002 KR
WO 9016126 Dec 1990 WO
WO 9625724 Aug 1996 WO
WO 9638945 Dec 1996 WO
WO 9642109 Dec 1996 WO
WO 9705582 Feb 1997 WO
WO 9710562 Mar 1997 WO
WO 9739424 Oct 1997 WO
WO 9802834 Jan 1998 WO
WO 9809257 Mar 1998 WO
WO 9820465 May 1998 WO
WO 9843169 Oct 1998 WO
WO 9843212 Oct 1998 WO
WO 9852153 Nov 1998 WO
WO 9910824 Mar 1999 WO
WO 9916030 Apr 1999 WO
WO 9919846 Apr 1999 WO
WO 9944172 Sep 1999 WO
WO 9945507 Sep 1999 WO
WO 9949415 Sep 1999 WO
WO 9949426 Sep 1999 WO
WO 0039714 Jul 2000 WO
WO 0046665 Aug 2000 WO
WO 0054507 Sep 2000 WO
WO 0057315 Sep 2000 WO
WO 0057613 Sep 2000 WO
WO 0062265 Oct 2000 WO
WO 0062472 Oct 2000 WO
WO 0067185 Nov 2000 WO
WO 0068797 Nov 2000 WO
WO 0068902 Nov 2000 WO
WO 0068903 Nov 2000 WO
WO 0069183 Nov 2000 WO
WO 0075775 Dec 2000 WO
WO 0077750 Dec 2000 WO
WO 0104851 Jan 2001 WO
WO 0106341 Jan 2001 WO
WO 0108087 Feb 2001 WO
WO 0113572 Feb 2001 WO
WO 0115397 Mar 2001 WO
WO 0118633 Mar 2001 WO
WO 0118746 Mar 2001 WO
WO 0129672 Apr 2001 WO
WO 0133390 May 2001 WO
WO 0140908 Jun 2001 WO
WO 0142887 Jun 2001 WO
WO 0144900 Jun 2001 WO
WO 0144949 Jun 2001 WO
WO 0147176 Jun 2001 WO
WO 0150229 Jul 2001 WO
WO 0152575 Jul 2001 WO
WO 0155955 Aug 2001 WO
WO 0159563 Aug 2001 WO
WO 0161620 Aug 2001 WO
WO 0165545 Sep 2001 WO
WO 0167694 Sep 2001 WO
WO 0171648 Sep 2001 WO
WO 0171679 Sep 2001 WO
WO 0173530 Oct 2001 WO
WO 0173533 Oct 2001 WO
WO 0178020 Oct 2001 WO
WO 0180563 Oct 2001 WO
WO 0184377 Nov 2001 WO
WO 0184474 Nov 2001 WO
WO 0184512 Nov 2001 WO
WO 0188705 Nov 2001 WO
WO 0206948 Jan 2002 WO
WO 0210962 Feb 2002 WO
WO 0214991 Feb 2002 WO
WO 0215037 Feb 2002 WO
WO 0221315 Mar 2002 WO
WO 0229577 Apr 2002 WO
WO 02088895 Nov 2002 WO
Related Publications (1)
Number Date Country
20080128484 A1 Jun 2008 US
Provisional Applications (1)
Number Date Country
60410555 Sep 2002 US
Continuations (2)
Number Date Country
Parent 11540020 Sep 2006 US
Child 11923958 US
Parent 10661228 Sep 2003 US
Child 11540020 US