Method and system including phone with rewards image

Information

  • Patent Grant
  • 7857215
  • Patent Number
    7,857,215
  • Date Filed
    Tuesday, October 23, 2007
    16 years ago
  • Date Issued
    Tuesday, December 28, 2010
    13 years ago
Abstract
A system having a host configured to maintain information relating to a first portable device and a second portable device and an interface device configured to communicate with the host and the first and second portable devices. The interface is configured to determine whether the first portable device is valid for image synchronization for recording an image of the first portable device, determine whether the second portable device is valid for image synchronization so as to download an image of the first portable device to the second portable device. The interface is further configured to determine whether the second portable device is valid for image replacement using information provided by the host for retrieving an image of the first portable device and download the retrieved image to the second portable device. The interface device also includes control logic configured to determine whether the second portable device includes additional information that is not included in the image of the first portable device for concatenating the additional information with the image of the first portable device, and download the concatenated additional information and image of the first portable device onto the second portable device. The interface device concatenates the additional information and the image of the first portable device based on a set of conflict resolution rules.
Description
BACKGROUND OF THE INVENTION

The present invention generally relates to card image replacement and, more specifically, to a method and system for managing card image replacement on a token via a computer network.


The emergence of secured tokens, such as smartcards, has allowed a much higher volume of information to be stored on a transaction card. For instance, in addition to the typical cardholder information, a smartcard is able to store a variety of different programs including, for example, a loyalty program of which the cardholder is a participant. Furthermore, unlike cards with magnetic stripes which can only retain static information, the use of a smartcard allows information stored thereon to be changed dynamically. As a result, there is often a need to update or replace contents of a smartcard.


Moreover, smartcards often need to be replaced for any number of reasons. Due to the transit time needed for replacement cards to reach their respective cardholders, these cards (such as a chip card that has the capability to receive updated information) generally do not contain the latest transaction information. This is because transactions conducted with the old card often occur during the transit period, i.e., the period between the issuance of the replacement card and the actual receipt of that card by its owner.


There are many different situations in which replacement cards are needed. One common situation is when an old card is about to expire. Typically when issuers, such as banks, replace a card, they do so by sending a replacement card to the cardholder in advance of the expiration date. Once the replacement card has been personalized and sent for delivery to the cardholder, there is a period of time that the cardholder may be conducting transactions on his/her existing card. In the case of a chip card, a cardholder may make transactions that result in information being stored on the chip during the time the replacement card is in transit. As a result, when the replacement card is delivered to the cardholder, the most recent transaction information would not be captured on the replacement card.


Another common situation in which a replacement card is desired is when a card has been lost or stolen. Similar to the situation described above, the replacement card would not contain the most recent transaction information. Furthermore, in the case of lost or stolen cards, unauthorized and/or illegal transactions may have occurred. Therefore, it would be important to include the correct authorized transaction information on the replacement card.


Under conventional practice, a replacement card does not always contains the latest information that the cardholder desires. Sometimes, the latest information that the cardholder wishes to store on the replacement card may not be available. For example, in existing card-based, offline loyalty programs, when an issued card reaches its expiration date, a new (replacement) card is typically sent to the cardholder in advance, normally one month prior to expiration. Activities continue on the old card while the new card is being prepared and mailed to the cardholder. In order to prepare the new card, the old card status is utilized when personalizing the new card, enabling the new card to be functional when it is delivered to the cardholder. During the period of time after the new card is prepared and the date when the cardholder receives the replacement (new) card, the cardholder may conduct incremental reward transactions using his/her old card, thereby causing the image stored within the old card to be updated and, therefore, out of sync with the image personalized on the new card. As a result, when the cardholder attempts to utilize the new card, one or more earned rewards may have been lost entirely or reward accumulations may have been lost, causing customer dissatisfaction and confusion.


Hence, it would be desirable to provide a method and system that is capable of facilitating card image replacement so as to allow replacement cards to be updated with the latest accurate transaction information in an intelligent and efficient manner.


BRIEF SUMMARY OF THE INVENTION

A system for facilitating image management for portable devices is disclosed. The system includes a host configured to maintain information relating to a first portable device and a second portable device and an interface device configured to communicate with the host and the first and second portable devices. The interface device includes control logic configured to: determine whether the first portable device is valid for image synchronization using information provided by the host; and if it is determined that the first portable device is valid for image synchronization, record an image of the first portable device, determine whether the second portable device is valid for image synchronization, and download an image of the first portable device to the second portable device if it is determined that the second portable device is valid for image synchronization.


The interface device further includes control logic configured to: determine whether the second portable device is valid for image replacement using information provided by the host, and if it is determined that the second portable device is valid for image replacement, retrieve an image of the first portable device and download the retrieved image to the second portable device.


The interface device also includes control logic configured to: determine whether the second portable device includes additional information that is not included in the image of the first portable device, and if it is determined that the second portable device includes the additional information, concatenate the additional information with the image of the first portable device, and download the concatenated additional information and image of the first portable device onto the second portable device. The interface device concatenates the additional information and the image of the first portable device based on a set of conflict resolution rules.


The present invention provides a number of advantages and benefits. For example, a cardholder would have more incentive to transfer his/her reward information to a new smartcard which, in turn, results in better customer satisfaction since the cardholder is able to more easily reap the rewards of his/her participation in loyalty programs. Most current loyalty programs maintain rewards through back-end systems and have longer duration such as annual expiration dates or greater, which does not impact card reissue. Card reissue provides a smartcard with an account number only. The real time concatenation and transfer of reward and multiple program information provided by the present invention becomes more relevant due to the numerous reward programs stored on one smartcard with varying expiration dates of potentially short duration.


Also, in most paper-based reward systems, the loss of a paper-based reward means the loss of the reward. The present invention allows rewards to be retained even if the smartcard that carries the current information relating to a reward program has been lost. This again results in better customer satisfaction since the cardholder will not feel that s/he has unjustly lost his/her rewards due to a lost or stolen smartcard.


Reference to the remaining portions of the specification, including the drawings and claims, will realize other features and advantages of the present invention. Further features and advantages of the present invention, as well as the structure and operation of various embodiments of the present invention, are described in detail below with respect to accompanying drawings, like reference numbers indicate identical or functionally similar elements.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a simplified schematic diagram illustrating one exemplary embodiment of the present invention; and



FIGS. 2A and 2B are flowcharts illustrating exemplary operations of one embodiment of the present invention.





DETAILED DESCRIPTION OF THE INVENTION

The present invention in the form of one or more exemplary embodiments will now be described. FIG. 1 is a simplified schematic diagram illustrating one exemplary embodiment of the present invention. In this exemplary embodiment, the system 100 includes a portable device creation module 102, a host 104, a communication medium 106, an interface device 108, a cardholder selection interface 110 and a portable device 112.


The host 104 can be any kind of computing device, such as, a server or the like. The host 104 cooperates with the portable device creation module 102 to create the portable device 112 for use in the system 100. The host 104 communicates with the interface device 108 via the communication medium 106. The communication medium 106 may be any kind of communication network, including but not limited to the Internet, a local area network (LAN), a wide area network (WAN), and a wireless network, etc. The interface device 108, in turn, communicates with the portable device 112 via the cardholder selection interface 110 to allow images to be replaced or updated on the portable device 112, as will be further described below. The interface device 106 can be, for example, a kiosk, a fixed workstation or a website, that is designed to allow a user to communicate with the host 104 to perform various functions as further described below. The portable device 112 includes smartcards, cellular phones, personal digital assistants (PDAs), pagers, payment cards, security cards, access cards, smart media, transponders, and the like.


In one exemplary application, the system 100 is deployed in connection with a loyalty/reward program. The system 100 allows a cardholder to activate image replacement for his/her smartcards. The system 100 includes a control application (or set of software components) residing within a kiosk or on a website that allows the cardholder to request and initiate synchronization of the rewards program images (RPIs) residing respectively on two smartcards that are in the possession of the cardholder. The first smartcard is an existing smartcard that is currently used by the cardholder for transactions associated with a loyalty program, and the second smartcard is a new smartcard that is sent to the cardholder. The second smartcard may be sent to the cardholder for a number of reasons including, for example, replacing the first smartcard or allowing the cardholder to have multiple smartcards for his/her use.


More specifically, the system 100 includes a card merge module (CMM) that enables the upload and/or download of card images to and from a smartcard, an application or applet on a smartcard capable of interacting with the kiosk or website, and appropriate user interface and device driver software.


When the cardholder visits the kiosk or website and selects the RPI synchronization option, the CMM performs the following functions where appropriate. First, the CMM authenticates a first (existing) smartcard supplied by the cardholder. The CMM also checks with the host 104 to determine if synchronization with the first smartcard is allowed. The host 104 maintains information relating to the number of synchronizations that can be performed for a smartcard or an account associated with the smartcard. In a situation where only one synchronization is allowed, if a previous synchronization has already been performed, then the CMM disallows the requested synchronization.


If synchronization is permitted, the CMM then further performs the following. The RPI of the first smartcard is recorded. The CMM then instructs the cardholder to insert the second (new) smartcard into a card acceptance device or card reader coupled to the kiosk or website. The second smartcard is then authenticated. As mentioned above, the second smartcard is sent to the cardholder for any one of a number of reasons. The host 104 maintains information relating to the second smartcard that is sent to the cardholder, thereby allowing authentication to be performed. Once the second smartcard is authenticated, the previously recorded RPI of the first smartcard is downloaded to the second smartcard. Where appropriate, the CMM may contact the host 104 to retrieve additional information, such as transaction history, for downloading to the second smartcard. The CMM then confirms the successful synchronization.


According to another exemplary aspect, the system 100 may also be used to provide RPI replacement for a new smartcard that has been issued as a replacement for a lost, stolen or damaged smartcard. In this situation, upon the cardholder selecting the RPI replacement option, the CMM performs an RPI replacement. The cardholder may provide the requisite information to allow the CMM to perform the RPI replacement. More specifically, the CMM first checks with the host 104 to determine if the requested RPI replacement is allowed. If the RPI replacement is allowed, the CMM then performs an online query to a central database for the purpose of downloading the most current copy of the RPI for the old smartcard. In one implementation, the query to the central database is effected through the host 104. Where appropriate, the CMM may also contact the host 104 to retrieve additional information. Once the copy of the desired RPI (and any additional information) is retrieved, the copy is stored by the CMM. The CMM then prompts the cardholder to insert the second the new replacement smartcard into the card acceptance device or card reader. The new replacement smartcard is then authenticated. If the authentication is successful, the CMM downloads a copy of the previously stored RPI and additional information, if appropriate, onto the new replacement smartcard and confirms the successful download.


As mentioned above, the CMM has the ability to evaluate and block the requested RPI synchronization or RPI replacement if such synchronization or replacement is not allowed.


In addition, the system 100 may further be used to provide a concatenation or merge of information between two smartcards during either the synchronization or replacement process.


Information from the new smartcard, the old smartcard and the host 104, where appropriate, is concatenated when information from the foregoing three entities do not overlap. In other words, corresponding information from the three entities, where appropriate, is combined to build the proper transaction history on the new smartcard. As will be discussed below, concatenation of information may be subject to conflict resolution rules or logic.


Information from the new smartcard, the old smartcard and the host 104, where appropriate, is merged when there is some overlap of information from the foregoing three entities. For example, all three entities may have different information relating to program accumulators or counters for the same loyalty program. Merging of information may include one or more of the following: merging two or more values to create a new value; and providing choices to the cardholder to, for example, select which program(s) s/he wants to delete or retain, merge or copy without change, choose not to install a program and merge programs that are unrelated.


In one illustrative example, the CMM has the ability to determine if the new smartcard has been used to perform any rewards transactions prior to its presentation for RPI synchronization or replacement. If the new smartcard has been used for transactions (meaning that the new smartcard contains new information that is not available on the old smartcard), then the CMM compares the respective RPIs on the old and the new smartcards to detect any differences. The detected differences represent new information that is on the new smartcard but not on the old one. The CMM then downloads a copy of the desired RPI (which generally is a copy of the RPI from the old smartcard) onto the new smartcard. Next, the CMM updates the new smartcard based on the detected differences to ensure that the new information previously stored on the new smartcard prior to its synchronization or replacement is restored and retained. For example, the CMM may add any rewards programs from the old RPI that are not present within the new RPI; and the CMM may update rewards programs that exist in both versions of the RPIs by summing the results of both (i.e., adding the redemptions and accumulation counters of both RPIs and recording the sum of both on the RPI of the new smartcard).


It should be understood that the concatenation or merge of information between two smartcards as described above can be performed according to one or more sets of predetermined conflict resolution rules or logic. For example, there may not be sufficient memory capacity on the new smartcard to store the old RPI from the old smartcard as well as the new information on the new smartcard. In this situation, the CMM may consult certain rules to eliminate information to accommodate the limited memory capacity of the new smartcard. For instance, the most recent information is retained first, which conversely means the oldest information is eliminated first. In another example, the respective RPIs from the new and the old smartcards may contain conflicting information. Similarly, the CMM may consult certain rules to resolve any such conflict. The rules and/or logic that can be used to provide the merge or concatenation of information as described above may take on many different forms depending on the specific applications. In some situations, input or selections may be requested from the cardholder to resolve any conflicts. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will appreciate how to design the desired rules and/or logic to implement the foregoing functions in accordance with the present invention.


Depending on the conflict resolution rules or logic, information from any two smartcards can be combined or concatenated. In one example, for smartcards with the same primary account number (PAN) but different cardholders, program balances can be combined as described above.


Moreover, the process of concatenating card images from an expired smartcard to a newly reissued smartcard can be tied to the activation function.


Furthermore, the CMM also has a mechanism that detects and reports when the new smartcard is removed from the card acceptance device or card reader before completion of the RPI synchronization or replacement process and when the desired RPI has not been successfully downloaded and/or updated. If the new smartcard is removed before completion of the RPI synchronization or replacement process or the desired RPI has not been successfully downloaded and/or updated, the RPI of the new smartcard is considered to be “torn” or otherwise corrupted. The foregoing process could then be used to perform repair of the RPI on the new smartcard.



FIGS. 2A and 2B further illustrate exemplary operations of the system 100 according to one embodiment of the present invention. Referring to FIG. 2A, at 202, an issuer of a smartcard initiates a smartcard replacement process by, amongst other things, issuing a new smartcard. At 204, the new smartcard is linked to the old smartcard. The two smartcards may be linked based on a common loyalty account, the cardholder, or some other criteria. The linking information is stored in the central database. At 206, the new smartcard is forwarded to the cardholder.


At 208, when the cardholder selects the RPI synchronization or replacement option at a kiosk (or website). At 210, the application determines which of the two options has been selected. If the synchronization option has been selected, at 212, the application checks to see if the old smartcard is present in the card acceptance device or card reader and, if not, the application displays a request to the cardholder to insert the old smartcard. At 214, the application then determines if the old smartcard is valid. Such determination may be performed by authenticating the old smartcard. A person of ordinary skill will know of various well-know techniques and/or methods that can be used to perform the authentication. In addition, the old smartcard may not be valid for other reasons. For example, an authorized number of synchronizations with respect to the old smartcard have already been performed. If the old smartcard is not valid, an appropriate error message is displayed to the cardholder and the card issuer is contacted at 216.


At 218, if the old smartcard is valid, then the application records the old smartcard's RPI. At 220, the application instructs the cardholder to insert the new smartcard into the card acceptance device or card reader. At 222, the application determines whether the new smartcard is valid for synchronization. The new smartcard may not be valid for synchronization for a number of reasons. For example, the new smartcard is not linked to the old smartcard. At 224, if the new smartcard is not valid for synchronization, an appropriate error message is displayed to the cardholder and the card issuer is contacted.


Referring to FIG. 2B, at 226, the application then checks to see if the new smartcard has been used in a rewards transaction prior to the requested RPI synchronization. If the new smartcard has not been used in a rewards transaction, then at 228 the application downloads a copy of the previously stored RPI from the old smartcard onto the new smartcard. At 234, the application logs the RPI added to the new smartcard. At 236, the application transmits a record of the RPI synchronization process and a copy of the RPI currently stored on the new smartcard to the central database for archival and subsequent update purposes.


If it is determined that the new smartcard has been used in a rewards transaction, then at 230 the application determines whether there is sufficient room on the new smartcard to store the additional information relating to the rewards transaction. If there is sufficient room, at 234 the application calculates the differences between the respective RPIs of the old and the new smartcards. Using such differences, the application then at 236 performs the appropriate merge or concatenation and generates an updated RPI for the new smartcard. The merge or concatenation is performed based on certain rules and/or logic. If there is not sufficient room, i.e., if the combination of the two RPIs cannot be stored within the available internal memory of the new smartcard, the application then at 232 may provide the cardholder with a dialog box showing a list of all unique programs within both RPIs and enable the cardholder to select those programs that should be downloaded to the new smartcard. Alternatively, the application may provide the cardholder with the “best case” selection of the programs that are recommended for inclusion on the new smartcard. In another example, for any duplicated program (i.e., a program that appears on both the old and the new smartcards), the application sums the program information, where appropriate, such as program balances and redemption count, before loading the program to the new smartcard.


Once the merge or concatenation is completed, the application then similarly sends a record of the RPI synchronization process and a copy of the RPI currently stored on the new smartcard to the central database for archival and subsequent update purposes.


Optionally, once the final RPI has been written to the new smartcard, the application may allow the cardholder to obtain a listing of the concatenated information including, for example, a list of rewards programs remaining on the new smartcard with the updated balances.


Referring back to FIG. 2A, if the RPI synchronization option is not selected, then at 242 the application determines whether the RPI replacement option is selected. If it is determined that the replacement option is selected, then at 244 the application instructs the cardholder to insert the new smartcard. At 246, the application then checks to determine whether the new smartcard is valid for replacement purposes. Similarly, the new smartcard may not be valid for any one of a number of reasons. For example, the new smartcard may not be authenticated because the new smartcard is not linked to any old smartcard, or an authorized number of replacements have already been performed. If the new smartcard is not valid, then at 216 an appropriate message is displayed to the cardholder and the card issuer is contacted.


If the new smartcard is valid, then at 248 the application downloads a desired copy of an RPI (which generally is a copy of an RPI from the old smartcard) from the central database and temporarily stores that RPI in its internal memory. The same logic then follows as shown in FIG. 2B.


The present invention as described herein provides the capability for the cardholder to retain earned rewards by interactively performing the tasks of synchronizing, replacing or concatenating the RPI of his/her new smartcard with that of the old smartcard, regardless of whether the old smartcard is being replaced due to its loss, theft, re-issuance due to expiration or damage.


The present invention as described herein is applicable to various environments. In one environment, the present invention is used in connection with retail merchant and service organization payment systems that interface to a portable device such as a smartcard in the context of a transaction where the cardholder is provided with variable incentives or rewards when specific, desired purchase behaviors are performed.


The present invention can also be deployed in an environment where the interface between the portable device and the card acceptance device at an acceptance point is performed offline and critical rewards data, programs and/or parameters are electronically stored within the portable device in the form of an image. The present invention can be used in connection with a rewards/loyalty system that is designed in a network centric model, wherein an unrestricted number of cardholders, card issuers, acceptance point operators (merchants) and rewards sponsors may participate in a one common rewards program.


The present invention may also be implemented in different combinations of hardware and software than the ones described. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will know of other ways and/or methods to implement the present invention.


It should be understood that the embodiments provided are illustrative and not restrictive. Various other modifications are possible within the scope of the invention claimed. Moreover, while the description of the different embodiments are provided in the context of a loyalty program, a person of ordinary skill in the art would appreciate how to utilize the present invention in other applications or context where combining of information may be desirable.

Claims
  • 1. A method comprising: using a first portable phone comprising a first rewards program image;communicating with a host that maintains a second rewards program image; andreceiving the second rewards program image or any different information between the second rewards program image and the first rewards program image at a second portable phone,wherein the first portable phone and the second portable phone are linked to a common account, and wherein the first portable phone and the second portable phone are possessed by the same person, and the common account is used by the same person.
  • 2. The method of claim 1 further comprising receiving transaction history information along with the second rewards program image at the second portable phone.
  • 3. The method of claim 1 wherein communicating with the host comprises communicating with the host through a communication network.
  • 4. The method of claim 1 wherein communicating with the host comprises communicating with the host through a communication network, wherein the communication network comprises a wireless network.
  • 5. The method of claim 1 further comprising contacting the host to initiate a rewards program image synchronization process via a website prior to communicating with the host.
  • 6. The method of claim 1 wherein the host comprises information regarding a number of image synchronizations that is allowed by the common account.
  • 7. The method of claim 1 wherein the common account is a common loyalty account.
  • 8. The method of claim 1 wherein receiving the second rewards program image or any different information between the second rewards program image and the first rewards program image at the second portable phone comprises receiving the second rewards program image at the second portable phone.
  • 9. The method of claim 8 wherein the method is performed by a user of the first portable phone and the second portable phone.
  • 10. The method of claim 1 wherein the method is performed by a user of the first portable phone and the second portable phone.
  • 11. A method comprising: receiving information regarding a first rewards program image on a first portable phone; andsending a second rewards program image maintained in a host, or any different information between the second rewards program image and the first rewards program image, to a second portable phone,wherein the first portable phone and the second portable phone are linked to a common account, and wherein the first portable phone and the second portable phone are possessed by the person, and the common account is used by the same person.
  • 12. The method of claim 11 wherein sending the second rewards program image maintained in the host, or any different information between the second rewards program image and the first rewards program image, to the second portable phone comprises sending the second rewards program image maintained in the host to the second portable phone.
  • 13. The method of claim 11 wherein the common account is a common loyalty account.
  • 14. The method of claim 11 wherein the second rewards images is sent to the second portable phone through a wireless network.
  • 15. The method of claim 11 further comprising sending transaction history information along with the second rewards program image to the second portable phone.
  • 16. The method of claim 11 further comprising receiving authentication information corresponding to the first portable phone.
  • 17. The method of claim 16 further comprising receiving authentication information corresponding to the second portable phone.
  • 18. A host configured to: receive information regarding a first rewards program image on a first portable phone; andsend a second rewards program image, or any different information between the second rewards program image and the first rewards program image, to a second portable phone, wherein the first portable phone and the second portable phone are linked to a common account, and wherein the first portable phone and the second portable phone are possessed by the same person, and the common account is used by the same person.
  • 19. The method of claim 1 wherein the common account is associated with a primary account number.
  • 20. The method of claim 1 wherein a merge module contacts the host.
  • 21. The method of claim 20 wherein the merge module prompts a user of the second portable phone.
  • 22. The method of claim 21 further comprising authenticating the second portable phone.
CROSS REFERENCE TO RELATED APPLICATIONS

This patent application is a continuation of U.S. patent application Ser. No. 11/440,791, filed May 24, 2006, which is a continuation patent application of U.S. patent application Ser. No. 10/661,380, filed on Sep. 12, 2003, which are herein incorporated by reference in their entirety.

US Referenced Citations (243)
Number Name Date Kind
3935933 Tanaka et al. Feb 1976 A
4011433 Tateisi et al. Mar 1977 A
4108350 Forbes, Jr. Aug 1978 A
4124109 Bissell et al. Nov 1978 A
4195864 Morton et al. Apr 1980 A
4412631 Haker Nov 1983 A
4544590 Egan Oct 1985 A
4568403 Egan Feb 1986 A
4674041 Lemon et al. Jun 1987 A
4723212 Mindrum et al. Feb 1988 A
4742215 Daughters et al. May 1988 A
4794530 Yukiura et al. Dec 1988 A
4825053 Caille Apr 1989 A
4837422 Dethloff et al. Jun 1989 A
4841712 Roou Jun 1989 A
4868376 Lessin et al. Sep 1989 A
4882675 Nichtberger et al. Nov 1989 A
4910672 Off et al. Mar 1990 A
4930129 Takahira May 1990 A
4941090 McCarthy Jul 1990 A
4949256 Humble Aug 1990 A
4954003 Shea Sep 1990 A
4985615 Iijima Jan 1991 A
4992940 Dworkin Feb 1991 A
5019452 Watanabe et al. May 1991 A
5019695 Itako May 1991 A
5025372 Burton et al. Jun 1991 A
5056019 Schultz et al. Oct 1991 A
5060793 Hyun et al. Oct 1991 A
5060804 Beales et al. Oct 1991 A
5063596 Dyke Nov 1991 A
5115888 Schneider May 1992 A
5117355 McCarthy May 1992 A
5128752 Von Kohorn Jul 1992 A
5161256 Iijima Nov 1992 A
5162638 Diehl et al. Nov 1992 A
5173851 Off et al. Dec 1992 A
5185695 Pruchnicki Feb 1993 A
5200889 Mori Apr 1993 A
5202826 McCarthy Apr 1993 A
5227874 Von Kohorn Jul 1993 A
5256863 Ferguson et al. Oct 1993 A
5285278 Holman Feb 1994 A
5287181 Holman Feb 1994 A
5287268 McCarthy Feb 1994 A
5299834 Kraige Apr 1994 A
5308120 Thompson May 1994 A
5353218 De Lapa et al. Oct 1994 A
5380991 Valencia et al. Jan 1995 A
RE34915 Nichtberger et al. Apr 1995 E
5402549 Forrest Apr 1995 A
5417458 Best et al. May 1995 A
5420606 Begum et al. May 1995 A
5450938 Rademacher Sep 1995 A
5466010 Spooner Nov 1995 A
5471669 Lidman Nov 1995 A
5473690 Grimonprez et al. Dec 1995 A
5483444 Heintzeman et al. Jan 1996 A
5484998 Bejnar et al. Jan 1996 A
5491326 Marceau et al. Feb 1996 A
5491838 Takahisa et al. Feb 1996 A
5500681 Jones Mar 1996 A
5501491 Thompson Mar 1996 A
5513102 Auriemma Apr 1996 A
5515270 Weinblatt May 1996 A
5530232 Taylor Jun 1996 A
5531482 Blank Jul 1996 A
5535118 Chumbley Jul 1996 A
5537314 Kanter Jul 1996 A
5559313 Claus et al. Sep 1996 A
5564073 Takahisa Oct 1996 A
5577266 Takahisa et al. Nov 1996 A
5577915 Feldman Nov 1996 A
5578808 Taylor Nov 1996 A
5579537 Takahisa Nov 1996 A
5594493 Nemirofsky Jan 1997 A
5612868 Off et al. Mar 1997 A
5621812 Deaton et al. Apr 1997 A
5642485 Deaton et al. Jun 1997 A
5644723 Deaton et al. Jul 1997 A
5649114 Deaton et al. Jul 1997 A
5649118 Carlisle et al. Jul 1997 A
5650209 Ramsburg et al. Jul 1997 A
5687322 Deaton et al. Nov 1997 A
5689100 Carrithers et al. Nov 1997 A
5691525 Aoki et al. Nov 1997 A
5710886 Christensen et al. Jan 1998 A
5727153 Powell Mar 1998 A
5734838 Robinson et al. Mar 1998 A
5742845 Wagner Apr 1998 A
5754762 Kuo et al. May 1998 A
5761648 Golden et al. Jun 1998 A
5765141 Spector Jun 1998 A
5767896 Nemirofsky Jun 1998 A
5774546 Handelman et al. Jun 1998 A
5774870 Storey Jun 1998 A
5776287 Best et al. Jul 1998 A
5791991 Small Aug 1998 A
5794210 Goldhaber et al. Aug 1998 A
5797126 Helbling et al. Aug 1998 A
5802519 De Jong Sep 1998 A
5804806 Haddad et al. Sep 1998 A
5806044 Powell Sep 1998 A
5806045 Biorge et al. Sep 1998 A
5815658 Kuriyama Sep 1998 A
5822735 De Lapa et al. Oct 1998 A
5822737 Ogram Oct 1998 A
5832457 O'Brien et al. Nov 1998 A
5844218 Kawan et al. Dec 1998 A
5845259 West et al. Dec 1998 A
5854581 Mori et al. Dec 1998 A
5855007 Jovicic et al. Dec 1998 A
5857175 Day et al. Jan 1999 A
5859419 Wynn Jan 1999 A
RE36116 McCarthy Feb 1999 E
5865340 Alvern Feb 1999 A
5865470 Thompson Feb 1999 A
5868498 Martin Feb 1999 A
5880769 Nemirofsky et al. Mar 1999 A
5884271 Pitroda Mar 1999 A
5884277 Khosla Mar 1999 A
5884278 Powell Mar 1999 A
5887271 Powell Mar 1999 A
5890135 Powell Mar 1999 A
5892827 Beach et al. Apr 1999 A
5898838 Wagner Apr 1999 A
5903732 Reed et al. May 1999 A
5905246 Fajkowski May 1999 A
5905908 Wagner May 1999 A
5907350 Nemirofsky May 1999 A
5907830 Engel et al. May 1999 A
5909486 Walker et al. Jun 1999 A
5912453 Gungl et al. Jun 1999 A
5915244 Jack et al. Jun 1999 A
5923884 Peyret et al. Jul 1999 A
5924072 Havens Jul 1999 A
5926795 Williams Jul 1999 A
5928082 Clapper, Jr. Jul 1999 A
5931947 Burns et al. Aug 1999 A
5943651 Oosawa Aug 1999 A
5950173 Perkowski Sep 1999 A
5953047 Nemirofsky Sep 1999 A
5953705 Oneda Sep 1999 A
5956694 Powell Sep 1999 A
5956695 Carrithers et al. Sep 1999 A
5958174 Ramsberg et al. Sep 1999 A
5960082 Haenel Sep 1999 A
5963917 Ogram Oct 1999 A
5969318 Mackenthun Oct 1999 A
5970469 Scroggie et al. Oct 1999 A
5974399 Giuliani et al. Oct 1999 A
5974549 Golan Oct 1999 A
5978013 Jones et al. Nov 1999 A
5987795 Wilson Nov 1999 A
5997042 Blank Dec 1999 A
6000608 Dorf Dec 1999 A
6002771 Nielsen Dec 1999 A
6003113 Hoshino Dec 1999 A
6003134 Kuo et al. Dec 1999 A
6005942 Chan et al. Dec 1999 A
6009411 Kepecs Dec 1999 A
6012635 Shimada et al. Jan 2000 A
6014634 Scroggie et al. Jan 2000 A
6024286 Bradley et al. Feb 2000 A
6035280 Christensen Mar 2000 A
6038551 Barlow et al. Mar 2000 A
6041309 Laor Mar 2000 A
6047325 Jain et al. Apr 2000 A
6049778 Walker et al. Apr 2000 A
6052468 Hillhouse Apr 2000 A
6052690 de Jong Apr 2000 A
6052785 Lin et al. Apr 2000 A
6055509 Powell Apr 2000 A
6061660 Eggleston et al. May 2000 A
6067526 Powell May 2000 A
6070147 Harms et al. May 2000 A
6073238 Drupsteen Jun 2000 A
6076068 DeLapa et al. Jun 2000 A
6076069 Laor Jun 2000 A
6089611 Blank Jul 2000 A
6094656 De Jong Jul 2000 A
6101422 Furlong Aug 2000 A
6101477 Hohle et al. Aug 2000 A
6105002 Powell Aug 2000 A
6105865 Hardesty Aug 2000 A
6105873 Jeger Aug 2000 A
6112987 Lambert et al. Sep 2000 A
6112988 Powell Sep 2000 A
6119933 Wong et al. Sep 2000 A
6119945 Muller et al. Sep 2000 A
6122631 Berbec et al. Sep 2000 A
6129274 Suzuki Oct 2000 A
6138907 Mori et al. Oct 2000 A
6144948 Walker et al. Nov 2000 A
6151586 Brown Nov 2000 A
6151587 Matthias Nov 2000 A
6154751 Ault et al. Nov 2000 A
6161870 Blank Dec 2000 A
6164549 Richards Dec 2000 A
6170061 Beser Jan 2001 B1
6173269 Solokl et al. Jan 2001 B1
6173891 Powell Jan 2001 B1
6179205 Sloan Jan 2001 B1
6179710 Sawyer et al. Jan 2001 B1
6183017 Najor et al. Feb 2001 B1
6185541 Scroggie et al. Feb 2001 B1
6189100 Barr et al. Feb 2001 B1
6189878 Dorf Feb 2001 B1
6195666 Schneck et al. Feb 2001 B1
6210276 Mullins Apr 2001 B1
6216014 Proust et al. Apr 2001 B1
6216204 Thiriet Apr 2001 B1
6220510 Everett et al. Apr 2001 B1
6222914 McMullin Apr 2001 B1
6230143 Simons et al. May 2001 B1
6237145 Narasimhan et al. May 2001 B1
6241287 Best et al. Jun 2001 B1
6243687 Powell Jun 2001 B1
6243688 Kalina Jun 2001 B1
6244958 Acres Jun 2001 B1
6266647 Fernandez Jul 2001 B1
6267263 Emoff et al. Jul 2001 B1
6269158 Kim Jul 2001 B1
6279112 O'Toole, Jr. et al. Aug 2001 B1
6282516 Giuliani Aug 2001 B1
6292785 McEvoy et al. Sep 2001 B1
6292786 Deaton et al. Sep 2001 B1
6296191 Hamann et al. Oct 2001 B1
6299530 Hansted et al. Oct 2001 B1
6321208 Barnett et al. Nov 2001 B1
6385723 Richards May 2002 B1
6390374 Carper et al. May 2002 B1
6480935 Carper et al. Nov 2002 B1
6549773 Linden et al. Apr 2003 B1
6549912 Chen Apr 2003 B1
6612490 Herrendoerfer et al. Sep 2003 B1
6681995 Sukeda et al. Jan 2004 B2
6689345 Jager Lezer Feb 2004 B2
7051923 Nguyen et al. May 2006 B2
20020002468 Spagna et al. Jan 2002 A1
20020076051 Nii Jun 2002 A1
20020107797 Combaluzier Aug 2002 A1
20090159675 Nguyen et al. Jun 2009 A1
Foreign Referenced Citations (120)
Number Date Country
200039412 Dec 2000 AU
1002756 May 1991 BE
2293944 Aug 2000 CA
2267041 Sep 2000 CA
2317138 Jan 2002 CA
19522527 Jan 1997 DE
19848712 Apr 2000 DE
19960978 Aug 2000 DE
10015103 Oct 2000 DE
0203424 Dec 1986 EP
0292248 Nov 1988 EP
0475837 Mar 1992 EP
0540095 May 1993 EP
0658862 Jun 1995 EP
0675614 Oct 1995 EP
0682327 Nov 1995 EP
0875841 Nov 1998 EP
0936530 Aug 1999 EP
0938050 Aug 1999 EP
0938051 Aug 1999 EP
0944007 Sep 1999 EP
0949595 Oct 1999 EP
0982692 Mar 2000 EP
0984404 Mar 2000 EP
1085395 Mar 2001 EP
1102320 May 2001 EP
1111505 Jun 2001 EP
1113387 Jul 2001 EP
1113407 Jul 2001 EP
1168137 Jan 2002 EP
1233333 Aug 2002 EP
2772957 Jun 1999 FR
2793048 Nov 2000 FR
2794543 Dec 2000 FR
2796176 Jan 2001 FR
2804234 Jul 2001 FR
2331381 May 1999 GB
2343091 Apr 2000 GB
2351379 Dec 2000 GB
2355324 Apr 2001 GB
2000-112864 Apr 2000 JP
2000-181764 Jun 2000 JP
2001-202484 Jul 2001 JP
2001-236232 Aug 2001 JP
0039297 May 2001 KR
0044823 Jun 2001 KR
0058742 Jul 2001 KR
0021237 Mar 2002 KR
WO 9016126 Dec 1990 WO
WO 9625724 Aug 1996 WO
WO 9638945 Dec 1996 WO
WO 9642109 Dec 1996 WO
WO 9705582 Feb 1997 WO
WO 9710562 Mar 1997 WO
WO 9739424 Oct 1997 WO
WO 9802834 Jan 1998 WO
WO 9809257 Mar 1998 WO
WO 9820465 May 1998 WO
WO 9843169 Oct 1998 WO
WO 9843212 Oct 1998 WO
WO 9852153 Nov 1998 WO
WO 9910824 Mar 1999 WO
WO 9916030 Apr 1999 WO
WO 9919846 Apr 1999 WO
WO 9944172 Sep 1999 WO
WO 9945507 Sep 1999 WO
WO 9949415 Sep 1999 WO
WO 9949426 Sep 1999 WO
WO 0039714 Jul 2000 WO
WO 0046665 Aug 2000 WO
WO 0054507 Sep 2000 WO
WO 0057315 Sep 2000 WO
WO 0057613 Sep 2000 WO
WO 0062265 Oct 2000 WO
WO 0062472 Oct 2000 WO
WO 0067185 Nov 2000 WO
WO 0068797 Nov 2000 WO
WO 0068902 Nov 2000 WO
WO 0068903 Nov 2000 WO
WO 0069183 Nov 2000 WO
WO 0075775 Dec 2000 WO
WO 0077750 Dec 2000 WO
WO 0104851 Jan 2001 WO
WO 0106341 Jan 2001 WO
WO 0108087 Feb 2001 WO
WO 0113572 Feb 2001 WO
WO 0115397 Mar 2001 WO
WO 0118633 Mar 2001 WO
WO 0118746 Mar 2001 WO
WO 0129672 Apr 2001 WO
WO 0133390 May 2001 WO
WO 0140908 Jun 2001 WO
WO 0142887 Jun 2001 WO
WO 0144900 Jun 2001 WO
WO 0144949 Jun 2001 WO
WO 0147176 Jun 2001 WO
WO 0150229 Jul 2001 WO
WO 0152575 Jul 2001 WO
WO 0155955 Aug 2001 WO
WO 0159563 Aug 2001 WO
WO 0161620 Aug 2001 WO
WO 0165545 Sep 2001 WO
WO 0167694 Sep 2001 WO
WO 0171648 Sep 2001 WO
WO 0171679 Sep 2001 WO
WO 0173530 Oct 2001 WO
WO 0173533 Oct 2001 WO
WO 0178020 Oct 2001 WO
WO 0180563 Oct 2001 WO
WO 0184377 Nov 2001 WO
WO 0184474 Nov 2001 WO
WO 0184512 Nov 2001 WO
WO 0188705 Nov 2001 WO
WO 0206948 Jan 2002 WO
WO 0210962 Feb 2002 WO
WO 0214991 Feb 2002 WO
WO 0215037 Feb 2002 WO
WO 0221315 Mar 2002 WO
WO 0229577 Apr 2002 WO
WO 02088895 Nov 2002 WO
Related Publications (1)
Number Date Country
20080097852 A1 Apr 2008 US
Continuations (2)
Number Date Country
Parent 11440791 May 2006 US
Child 11877505 US
Parent 10661380 Sep 2003 US
Child 11440791 US