The present application claims the benefit of U.S. patent application Ser. No. 14/705,407 for a Method and System to Protect Software-based Network-Connected Devices from Advanced Persistent Threat filed May 6, 2015 (and published Nov. 10, 2016 as U.S. Patent Application Publication No. 2016/0330218), now U.S. Pat. No. 9,954,871. Each of the foregoing patent application, patent publication, and patent is hereby incorporated by reference in its entirety.
The present invention relates to the protection of network-connected devices from cyber attacks.
Generally speaking, a new form of highly targeted cyber attack known as an Advanced Persistent Threat (APT) has emerged as a way to obtain sensitive data and login credentials from any number of companies. Devices that contain software such as bar code scanners, payment terminals, and mobile computers are used to streamline operations for companies. These devices are commonly connected to Point of Sale and Enterprise Resource Planning systems. These devices have recently been targeted to be used as an entry point to a larger system that may contain sensitive data.
In an APT attack, malware or contaminated firmware is loaded onto the network-connected device. The initial attack can be done even before the device is shipped from the factory. Once the device is connected to a network, for example a bar code scanning device in a retail chain, the APT can access the larger retail network and obtain credit card numbers and any other data on the network.
Therefore, a need exists for a method and system to protect networks from APT attacks which are spawned through network-connected devices contaminated with malware.
Accordingly, in one aspect, the present invention embraces a method and a system for protecting a network-connected device from an advanced persistent threat cyber-attack.
In an exemplary embodiment, a method of protecting a network-connected device from an advanced persistent threat (APT) cyber-attack is provided. In general, the network-connected device has an operating system, a memory, memory instructions which hold executable program instructions, and is communication enabled. The method of protecting such a network-connected device from an APT, is comprised of the steps: detecting the advanced persistent threat due to the presence of rogue software in the memory instructions of the network-connected device; and locking-down the communications of the network-connected device.
In another exemplary embodiment of the method of protecting such a network-connected device from an APT, the network-connected device is provided with routines installed at a low level of the network-connected device. The routines are correlated to the memory instructions. The detecting step of the method comprises authenticating the executable program instructions of the network-connected device using the installed routines.
In yet another exemplary embodiment of the method, the routines are computing checksum blocks routines. The authenticating step in the method is comprised of: generating checksums for the memory instructions before the network-connected device is deployed for the first time and comparing the checksum block routines to the generated checksums for the memory instructions.
In yet a further exemplary embodiment of the method, the generating step is accomplished when the memory instructions are loaded into the memory or alternatively, the generating step is accomplished when the memory instructions are loaded into the memory prior to executing the instructions for the first time.
In yet another exemplary embodiment of the method, the low level of the network-connected device where the routines are installed is part of the operating system.
In a further exemplary embodiment of the method, the locking-down step is initiated if the checksums for the memory instructions are not authenticated by the checksum block routines in the comparing step.
In yet a further exemplary embodiment, the method comprises, installing the checksum block routines when the operating system is installed. Alternatively, the installing step is performed before the network-connected device is deployed for the first time.
In another exemplary embodiment of the method, the authenticating step comprises: looking for unauthorized instructions in the executable program instructions.
In another exemplary embodiment of the method, looking for unauthorized instructions in the executable program instructions is conducted before the executable program instructions in the memory instructions are executed in the network-connected device for the first time. Additionally, the looking step is conducted periodically.
In another exemplary embodiment, the method further comprises: protecting the checksum block routines from unauthorized changes.
In a further exemplary embodiment of the method, the protecting step is accomplished by a public key and private key cryptography.
Alternatively, in another embodiment, the protecting step is accomplished by a two-factor authentication. The two-factor authentication requires that a notification be sent to a party responsible for the network-connected device before any changes in the memory instructions or the checksums can be made.
In a further exemplary embodiment, the locking-down step is initiated if unauthenticated instructions in the memory instructions are found in the looking step.
In yet another exemplary embodiment, the comparing step is conducted before memory instructions are run in the network-connected device for the first time.
In yet a further exemplary embodiment the comparing step is conducted periodically.
In another exemplary embodiment of the method, the locking-down step includes allowing connections to the network-connected device that are hard-wired to the network-connected device.
In yet another exemplary embodiment, the method further comprises: performing diagnostics while the network-connected device is locked down, whereby details about the advanced persistent threat are identified.
In a further exemplary embodiment, the method further comprises: updating the memory instructions to restore the network-connected device to a pre-advanced persistent threat cyber-attack state.
In another exemplary embodiment, the method further comprises: issuing an alert by the network-connected device to indicate an advanced persistent threat has been detected.
In a further exemplary embodiment, the issuing step is accomplished prior to the locking down step.
In yet a further exemplary embodiment, the issuing step is accomplished by a visual indicator on the network-connected device.
Alternatively, or in addition, in yet another embodiment, the issuing step is accomplished by an audio indicator on the network-connected device.
In another aspect, the present invention embraces a system for protecting a network-connected device from an advanced persistent threat cyber-attack. In the foregoing aspect of the present invention, the network-connected device is wireless communication enabled and is provided with an operating system, a central processing unit, a memory, and executable program instructions loaded into the memory. The operating system, central processing unit, memory, and executable program instructions are communicatively linked. the system comprising:
In an exemplary embodiment, the system comprises: routines installed in a low-level of the network-connected device, the routines being correlated to the executable program instructions before the network-connected device is deployed for the first time. The central processing unit is configured to allow the routines to authenticate the executable program instructions before the central processing unit executes the program instructions. The routines are configured to lock-down communications between the network-connected device and other devices if the routine finds instructions in the memory which do not correlate to the executable program instructions in the memory.
In another exemplary embodiment, the system further comprises checksums generated for the executable programs in the memory, and the routines are computing checksum block routines. The checksum block routines are configured to authenticate the checksums in the executable programs.
In another exemplary embodiment, the central processing unit is configured to allow the routines to authenticate all the executable program instructions in the memory before the central processing unit executes the program instructions.
In yet another exemplary embodiment, the system further comprises a security scheme to protect the checksum block routines.
In a further exemplary embodiment, the security scheme is a public key and private key cryptography.
In yet a further exemplary embodiment, the security scheme is a two-factor scheme. The two-factor authentication requires that a notification be sent to a party responsible for the network-connected device before any changes in the memory instructions or the checksums can be made.
In another exemplary embodiment, the system further comprises diagnostic routines configured to run on the network-connected device when in communications lock-down. The diagnostic routines are configured to identify details of the advanced persistent threat cyber-attack.
In yet another exemplary embodiment, the system further comprises updating routines configured to run on the network-connected device when in communications lock-down. The updating routines are configured to update the executable program instructions to a pre-advanced persistent threat cyber-attack state.
In a further exemplary embodiment, the system comprises an alert indicator. The alert indicator is communicatively linked to the routines and is initialized when the routines lock-down the network-connected device. The alert indicator may be an audio alarm or a visual indicator.
The foregoing illustrative summary, as well as other exemplary objectives and/or advantages of the invention, and the manner in which the same are accomplished, are further explained within the following detailed description and its accompanying drawings.
The present invention embraces a system and a method of protecting a network-connected device from an advanced persistent threat attack.
In an exemplary embodiment, illustrated in
In another exemplary embodiment, the system (5) is further comprised of checksums (11) generated for the executable programs (10) in the memory (11). The routines (12) are computing checksum block routines (12). The checksum block routines (12) are configured to authenticate the checksums (11) in the executable program instructions (10).
In yet a further exemplary embodiment of the invention, the central processing unit (7) is configured to allow the routines (12) to authenticate all the executable program instructions (10) in the memory (9) before the central processing unit (7) executes the program instructions (10).
In another exemplary embodiment of the invention, the system (5) further comprises a security scheme or system (16) to protect the checksum block routines (12) from tampering. The security scheme (16) may be a public key/private key cryptography. In such a security system (16), changes to the checksum block routines (12) could only be accomplished if the authors of the APT had access to both keys. The public and private key pair comprises two uniquely related cryptographic keys. The key pair is mathematically related. Whatever is encrypted with a Public Key may only be decrypted by its corresponding Private Key and vice versa.
In yet another exemplary embodiment, the security scheme or system (16) comprises a two-factor authentication scheme. The two-factor authentication requires that a notification be sent to the party responsible for the network-connected device (6) before any changes are made in the memory (9) executable program instructions (10) or the in the checksums (11).
In a further exemplary embodiment of the invention, the system (5) further comprises diagnostic routines (13). The diagnostic routines (13) are configured to run on the network-connected device (6) when the network-connected device (6) is in communications lock-down. The diagnostic routines (13) are configured to identify details of the advanced persistent threat.
In still a further exemplary embodiment of the present invention, the system (5) comprises updating routines (14). The updating routines (14) are configured to update the executable program instructions (10) in the memory (9) to a pre-advanced persistent thereat attack state.
In yet another exemplary embodiment, the system (5) further comprises an alert indicator (17). The alert indicator (17) is communicatively linked via the system bus (18) to the routines (12). The alert indicator (17) is initialized by a command from the routines (12) when the routines (12) lock-down the network-connected device (6). The alert indicator (17) may be an audio alarm or a visual indicator, such as a blinking LED on the network-connected device (6).
In another aspect, the present invention embraces a method of protecting a network-connected device from an advanced persistent threat attack. In the foregoing embodiments, the network-connected device is generally comprises as described in
In another embodiment of the method (20), the network-connected device is provided with routines installed at a low level of the network-connected device. The routines are correlated to the memory instructions. The detecting step (21) comprises the step of authenticating the executable program instructions (27) of the network-connected device using the installed routines.
In a further embodiment of the present invention, the locking-down step (22) includes the step of allowing connections to the network-connected device that are hard-wired to the network connected device (24).
In another embodiment of the present invention, the method (20) further comprises issuing an alert (23) by the network-connected device to indicate an advance persistent threat has been detected. The issuing step (23) is accomplished by a visual indicator on the network-connected device or in the alternative, an audio alert issuing from the network-connected device.
In yet another exemplary embodiment of the invention, the method (20) further comprises the steps of performing diagnostics while the network-connected device is locked-down (25) and updating the memory instructions to restore the network-connected device to a pre-advanced persistent threat state (26).
The authenticating step (27) of
In another exemplary embodiment, the generating step (32) is comprised of the step of installing checksum block routines in the operating system (33b) when the operating system is installed. The installed checksum block routines correlate to the checksums in the memory instructions.
In another exemplary embodiment, the generating step (32) is comprised of the step of installing checksum block routines in the operating system (33a) before the operating system is deployed for the first time.
In yet another exemplary embodiment, the authenticating method (31) further comprises protecting the checksum block routines from unauthorized changes (35).
In another exemplary embodiment, the protecting step (35) can be accomplished with a public key/private key cryptography. The public and private key pair comprises two uniquely related cryptographic keys. The key pair is mathematically related. Whatever is encrypted with a Public Key may only be decrypted by its corresponding Private Key and vice versa. In relation to the present invention, changes made to the checksum block routines can only be made using the public and private key pair. Only a party responsible for the network-connected device (6) would have access to the private key.
In yet another exemplary embodiment, the protecting step (35) is accomplished by a two-factor authentication. The two-factor authentication requires that a notification be sent to a party responsible for the network-connected device before any changes in the memory instructions and the checksums can be made.
In another embodiment of the authenticating step (27) of
In another exemplary embodiment, the looking step (42) is conducted periodically.
In yet another exemplary embodiment, the looking step (42) is conducted before the executable program instructions in the memory instructions are executed in the network-connected device for the first time.
In yet another exemplary embodiment, if during the looking step (42) unauthenticated instructions are found in memory instructions, the method further comprises locking down communications (43). If no unauthenticated instructions are found, then the method further comprises: executing the program instructions (44).
The following represent exemplary embodiments in accordance with the present disclosure.
A method of protecting a network-connected device from an advanced persistent threat cyber-attack, the network-connected device having an operating system, a memory, memory instructions holding executable program instructions, and being communication enabled, comprising the steps of:
detecting the advanced persistent threat due to the presence of rogue software in the memory instructions of the network-connected device; and
locking-down the communications of the network-connected device.
The method of Exemplary Embodiment 1, wherein the network-connected device is provided with routines installed at a low level of the network-connected device, the routines being correlated to the memory instructions; and wherein the detecting step comprises:
authenticating the executable program instructions of the network-connected device using the installed routines.
The method of Exemplary Embodiment 2, wherein the routines are computing checksum blocks routines; and the authenticating step comprises: generating checksums for the memory instructions before the network-connected device is deployed for the first time; and comparing the checksum block routines to the checksums for the memory instructions.
The method of Exemplary Embodiment 3, wherein the generating step is accomplished when the memory instructions are loaded into the memory.
The method of Exemplary Embodiment 3, wherein the generating step is accomplished prior to executing the instructions for the first time.
The method of Exemplary Embodiment 3, wherein the low level of the network-connected device is part of the operating system.
The method of Exemplary Embodiment 3, wherein the locking-down step is initiated if the checksums for the memory instructions are not authenticated by the checksum block routines in the comparing step.
The method of Exemplary Embodiment 6, further comprising the step of installing the checksum block routines when the operating system is installed.
The method of Exemplary Embodiment 6, further comprising the step of installing the checksum block routines into the operating system before the network-connected device is deployed for the first time.
The method of Exemplary Embodiment 3, further comprising the step of: protecting the checksum block routines from unauthorized changes.
The method of Exemplary Embodiment 10, wherein the protecting step is accomplished by a public key and private key cryptography.
The method of Exemplary Embodiment 10, wherein the protecting step is accomplished by a two-factor authentication, the two-factor authentication requiring that a notification be sent to a party responsible for the network-connected device before any changes in the memory instructions or the checksums can be made.
The method of Exemplary Embodiment 2, wherein the authenticating step comprises: looking for unauthorized instructions in the executable program instructions.
The method of Exemplary Embodiment 13, wherein the looking step is conducted before the executable program instructions in the memory instructions are executed in the network-connected device for the first time.
The method of Exemplary Embodiment 13, wherein the looking step is conducted periodically.
The method of Exemplary Embodiment 13, wherein the locking-down step is initiated if unauthenticated instructions in the memory instructions are found in the looking step.
The method of Exemplary Embodiment 14, wherein the locking-down step is initiated if unauthenticated instructions in the memory instructions are found in the looking step.
The method of Exemplary Embodiment 3, wherein the comparing step is conducted before memory instructions are run in the network-connected device for the first time.
The method of Exemplary Embodiment 3, wherein the comparing step is conducted periodically.
The method of Exemplary Embodiment 1, wherein the locking-down step includes allowing connections to the network-connected device that are hard-wired to the network-connected device.
The method of Exemplary Embodiment 1, further comprising: performing diagnostics while the network-connected device is locked down, whereby details about the advanced persistent threat are identified.
The method of Exemplary Embodiment 1, further comprising: updating the memory instructions to restore the network-connected device to a pre-advanced persistent threat cyber-attack state.
The method of Exemplary Embodiment 1, further comprising: issuing an alert by the network-connected device to indicate an advanced persistent threat has been detected.
The method of Exemplary Embodiment 23, wherein the issuing step is accomplished prior to the locking down step.
The method of Exemplary Embodiment 23, wherein the issuing step is accomplished by a visual indicator on the network-connected device.
The method of Exemplary Embodiment 23, wherein the issuing step is accomplished by an audio indicator on the network-connected device.
A system for protecting a network-connected device from an advanced persistent threat cyber-attack, the network-connected device being wireless communication enabled and having an operating system, a central processing unit, a memory, executable program instructions loaded into the memory; the operating system, central processing unit, memory and executable program instructions being communicatively linked; the system comprising:
routines installed in a low-level of the network-connected device, the routines being correlated to the executable program instructions before the network-connected device is deployed for the first time;
the central processing unit being configured to allow the routines to authenticate the executable program instructions before the central processing unit executes the program instructions;
the routines being configured to lock-down communications between the network-connected device and other devices if the routine finds instructions in the memory which do not correlate to the executable program instructions in the memory.
The system of Exemplary Embodiment 27, further comprising: checksums generated for the executable programs in the memory, and wherein the routines are computing checksum block routines, the checksum block routines being configured to authenticate the checksums in the executable programs.
The system of Exemplary Embodiment 27, wherein the central processing unit is configured to allow the routines to authenticate all the executable program instructions in the memory before the central processing unit executes the program instructions.
The system of Exemplary Embodiment 28, further comprising a security scheme to protect the checksum block routines.
The system of Exemplary Embodiment 30, wherein the security scheme is a public key and private key cryptography.
The system of Exemplary Embodiment 30, wherein the security scheme is a two-factor scheme, the two-factor authentication requiring that a notification be sent to a party responsible for the network-connected device before any changes in the memory instructions or the checksums can be made.
The system of Exemplary Embodiment 27, further comprising diagnostic routines configured to run on the network-connected device when in communications lock-down, the diagnostic routines being configured to identify details of the advanced persistent threat cyber-attack.
The system of Exemplary Embodiment 27, further comprising updating routines configured to run on the network-connected device when in communications lock-down, the updating routines being configured to update the executable program instructions to a pre-advanced persistent threat cyber-attack state.
The system of Exemplary Embodiment 27, comprising an alert indicator, the alert indicator being communicatively linked to the routines, the alert indicator being initialized when the routines lock-down the network-connected device.
The system of Exemplary Embodiment 35, wherein the alert indicator is selected from an audio alarm and a visual indicator.
To supplement the present disclosure, this application incorporates entirely by reference the following commonly assigned patents, patent application publications, and patent applications:
In the specification and/or figures, typical embodiments of the invention have been disclosed. The present invention is not limited to such exemplary embodiments. The use of the term “and/or” includes any and all combinations of one or more of the associated listed items. The figures are schematic representations and so are not necessarily drawn to scale. Unless otherwise noted, specific terms have been used in a generic and descriptive sense and not for purposes of limitation.
Number | Name | Date | Kind |
---|---|---|---|
6832725 | Gardiner et al. | Dec 2004 | B2 |
7003672 | Angelo | Feb 2006 | B2 |
7043758 | Grupe | May 2006 | B2 |
7128266 | Zhu et al. | Oct 2006 | B2 |
7159783 | Walczyk et al. | Jan 2007 | B2 |
7228563 | Szor | Jun 2007 | B2 |
7413127 | Ehrhart et al. | Aug 2008 | B2 |
7516489 | Lahti | Apr 2009 | B2 |
7716727 | Phillips et al. | May 2010 | B2 |
7726575 | Wang et al. | Jun 2010 | B2 |
7814543 | Phillips et al. | Oct 2010 | B2 |
8254568 | Smith et al. | Aug 2012 | B2 |
8294969 | Plesko | Oct 2012 | B2 |
8317105 | Kotlarsky et al. | Nov 2012 | B2 |
8322622 | Liu | Dec 2012 | B2 |
8366005 | Kotlarsky et al. | Feb 2013 | B2 |
8371507 | Haggerty et al. | Feb 2013 | B2 |
8376233 | Van Horn et al. | Feb 2013 | B2 |
8381979 | Franz | Feb 2013 | B2 |
8390909 | Plesko | Mar 2013 | B2 |
8408464 | Zhu et al. | Apr 2013 | B2 |
8408468 | Horn et al. | Apr 2013 | B2 |
8408469 | Good | Apr 2013 | B2 |
8424768 | Rueblinger et al. | Apr 2013 | B2 |
8434151 | Franklin | Apr 2013 | B1 |
8448863 | Xian et al. | May 2013 | B2 |
8457013 | Essinger et al. | Jun 2013 | B2 |
8459557 | Havens et al. | Jun 2013 | B2 |
8469272 | Kearney | Jun 2013 | B2 |
8474712 | Kearney et al. | Jul 2013 | B2 |
8479992 | Kotlarsky et al. | Jul 2013 | B2 |
8490877 | Kearney | Jul 2013 | B2 |
8517271 | Kotlarsky et al. | Aug 2013 | B2 |
8523076 | Good | Sep 2013 | B2 |
8528818 | Ehrhart et al. | Sep 2013 | B2 |
8544737 | Gomez et al. | Oct 2013 | B2 |
8548420 | Grunow et al. | Oct 2013 | B2 |
8550335 | Samek et al. | Oct 2013 | B2 |
8550354 | Gannon et al. | Oct 2013 | B2 |
8550357 | Kearney | Oct 2013 | B2 |
8556174 | Kosecki et al. | Oct 2013 | B2 |
8556176 | Van Horn et al. | Oct 2013 | B2 |
8556177 | Hussey et al. | Oct 2013 | B2 |
8559767 | Barber et al. | Oct 2013 | B2 |
8561895 | Gomez et al. | Oct 2013 | B2 |
8561903 | Sauerwein | Oct 2013 | B2 |
8561905 | Edmonds et al. | Oct 2013 | B2 |
8565107 | Pease et al. | Oct 2013 | B2 |
8571307 | Li et al. | Oct 2013 | B2 |
8579200 | Samek et al. | Nov 2013 | B2 |
8583924 | Caballero et al. | Nov 2013 | B2 |
8584945 | Wang et al. | Nov 2013 | B2 |
8587595 | Wang | Nov 2013 | B2 |
8587697 | Hussey et al. | Nov 2013 | B2 |
8588869 | Sauerwein et al. | Nov 2013 | B2 |
8590789 | Nahill et al. | Nov 2013 | B2 |
8596539 | Havens et al. | Dec 2013 | B2 |
8596542 | Havens et al. | Dec 2013 | B2 |
8596543 | Havens et al. | Dec 2013 | B2 |
8599271 | Havens et al. | Dec 2013 | B2 |
8599957 | Peake et al. | Dec 2013 | B2 |
8600158 | Li et al. | Dec 2013 | B2 |
8600167 | Showering | Dec 2013 | B2 |
8602309 | Longacre et al. | Dec 2013 | B2 |
8608053 | Meier et al. | Dec 2013 | B2 |
8608071 | Liu et al. | Dec 2013 | B2 |
8611309 | Wang et al. | Dec 2013 | B2 |
8615487 | Gomez et al. | Dec 2013 | B2 |
8621123 | Caballero | Dec 2013 | B2 |
8622303 | Meier et al. | Jan 2014 | B2 |
8628013 | Ding | Jan 2014 | B2 |
8628015 | Wang et al. | Jan 2014 | B2 |
8628016 | Winegar | Jan 2014 | B2 |
8629926 | Wang | Jan 2014 | B2 |
8630491 | Longacre et al. | Jan 2014 | B2 |
8635309 | Berthiaume et al. | Jan 2014 | B2 |
8636200 | Kearney | Jan 2014 | B2 |
8636212 | Nahill et al. | Jan 2014 | B2 |
8636215 | Ding et al. | Jan 2014 | B2 |
8636224 | Wang | Jan 2014 | B2 |
8638806 | Wang et al. | Jan 2014 | B2 |
8640958 | Lu et al. | Feb 2014 | B2 |
8640960 | Wang et al. | Feb 2014 | B2 |
8643717 | Li et al. | Feb 2014 | B2 |
8646692 | Meier et al. | Feb 2014 | B2 |
8646694 | Wang et al. | Feb 2014 | B2 |
8657200 | Ren et al. | Feb 2014 | B2 |
8659397 | Vargo et al. | Feb 2014 | B2 |
8668149 | Good | Mar 2014 | B2 |
8678285 | Kearney | Mar 2014 | B2 |
8678286 | Smith et al. | Mar 2014 | B2 |
8682077 | Longacre | Mar 2014 | B1 |
D702237 | Oberpriller et al. | Apr 2014 | S |
8687282 | Feng et al. | Apr 2014 | B2 |
8688967 | Smith et al. | Apr 2014 | B2 |
8692927 | Pease et al. | Apr 2014 | B2 |
8695880 | Bremer et al. | Apr 2014 | B2 |
8698949 | Grunow et al. | Apr 2014 | B2 |
8702000 | Barber et al. | Apr 2014 | B2 |
8717494 | Gannon | May 2014 | B2 |
8720783 | Biss et al. | May 2014 | B2 |
8723804 | Fletcher et al. | May 2014 | B2 |
8723904 | Marty et al. | May 2014 | B2 |
8727223 | Wang | May 2014 | B2 |
8740082 | Wilz | Jun 2014 | B2 |
8740085 | Furlong et al. | Jun 2014 | B2 |
8746563 | Hennick et al. | Jun 2014 | B2 |
8750445 | Peake et al. | Jun 2014 | B2 |
8752766 | Xian et al. | Jun 2014 | B2 |
8756059 | Braho et al. | Jun 2014 | B2 |
8757495 | Qu et al. | Jun 2014 | B2 |
8760563 | Koziol et al. | Jun 2014 | B2 |
8763909 | Reed | Jul 2014 | B2 |
8776242 | McDougal | Jul 2014 | B2 |
8777108 | Coyle | Jul 2014 | B2 |
8777109 | Dberpriller et al. | Jul 2014 | B2 |
8779898 | Havens et al. | Jul 2014 | B2 |
8781520 | Payne et al. | Jul 2014 | B2 |
8783573 | Havens et al. | Jul 2014 | B2 |
8789757 | Barten | Jul 2014 | B2 |
8789758 | Hawley et al. | Jul 2014 | B2 |
8789759 | Xian et al. | Jul 2014 | B2 |
8794520 | Wang et al. | Aug 2014 | B2 |
8794522 | Ehrhart | Aug 2014 | B2 |
8794525 | Amundsen et al. | Aug 2014 | B2 |
8794526 | Wang et al. | Aug 2014 | B2 |
8798367 | Ellis | Aug 2014 | B2 |
8807431 | Wang et al. | Aug 2014 | B2 |
8807432 | Van Horn et al. | Aug 2014 | B2 |
8820630 | Qu et al. | Sep 2014 | B2 |
8822848 | Meagher | Sep 2014 | B2 |
8824692 | Sheerin et al. | Sep 2014 | B2 |
8824696 | Braho | Sep 2014 | B2 |
8842849 | Wahl et al. | Sep 2014 | B2 |
8844822 | Kotlarsky et al. | Sep 2014 | B2 |
8844823 | Fritz et al. | Sep 2014 | B2 |
8849019 | Li et al. | Sep 2014 | B2 |
D716285 | Chaney et al. | Oct 2014 | S |
8851383 | Yeakley et al. | Oct 2014 | B2 |
8854633 | Laffargue | Oct 2014 | B2 |
8866963 | Grunow et al. | Oct 2014 | B2 |
8868421 | Braho et al. | Oct 2014 | B2 |
8868519 | Maloy et al. | Oct 2014 | B2 |
8868802 | Barten | Oct 2014 | B2 |
8868803 | Caballero | Oct 2014 | B2 |
8870074 | Gannon | Oct 2014 | B1 |
8879639 | Sauerwein | Nov 2014 | B2 |
8880426 | Smith | Nov 2014 | B2 |
8881983 | Havens et al. | Nov 2014 | B2 |
8881987 | Wang | Nov 2014 | B2 |
8903172 | Smith | Dec 2014 | B2 |
8908995 | Benos et al. | Dec 2014 | B2 |
8910870 | Li et al. | Dec 2014 | B2 |
8910875 | Ren et al. | Dec 2014 | B2 |
8914290 | Hendrickson et al. | Dec 2014 | B2 |
8914788 | Pettinelli et al. | Dec 2014 | B2 |
8915439 | Feng et al. | Dec 2014 | B2 |
8915444 | Havens et al. | Dec 2014 | B2 |
8916789 | Woodburn | Dec 2014 | B2 |
8918250 | Hollifield | Dec 2014 | B2 |
8918564 | Caballero | Dec 2014 | B2 |
8925818 | Kosecki et al. | Jan 2015 | B2 |
8939374 | Jovanovski et al. | Jan 2015 | B2 |
8942480 | Ellis | Jan 2015 | B2 |
8944313 | Williams et al. | Feb 2015 | B2 |
8944327 | Meier et al. | Feb 2015 | B2 |
8944332 | Harding et al. | Feb 2015 | B2 |
8950678 | Germaine et al. | Feb 2015 | B2 |
D723560 | Zhou et al. | Mar 2015 | S |
8967468 | Gomez et al. | Mar 2015 | B2 |
8971346 | Sevier | Mar 2015 | B2 |
8976030 | Cunningham et al. | Mar 2015 | B2 |
8976368 | Akel et al. | Mar 2015 | B2 |
8978981 | Guan | Mar 2015 | B2 |
8978983 | Bremer et al. | Mar 2015 | B2 |
8978984 | Hennick et al. | Mar 2015 | B2 |
8985456 | Zhu et al. | Mar 2015 | B2 |
8985457 | Soule et al. | Mar 2015 | B2 |
8985459 | Kearney et al. | Mar 2015 | B2 |
8985461 | Gelay et al. | Mar 2015 | B2 |
8988578 | Showering | Mar 2015 | B2 |
8988590 | Gillet et al. | Mar 2015 | B2 |
8991704 | Hopper et al. | Mar 2015 | B2 |
8996194 | Davis et al. | Mar 2015 | B2 |
8996384 | Funyak et al. | Mar 2015 | B2 |
8998091 | Edmonds et al. | Apr 2015 | B2 |
9002641 | Showering | Apr 2015 | B2 |
9007368 | Laffargue et al. | Apr 2015 | B2 |
9010641 | Qu et al. | Apr 2015 | B2 |
9015513 | Murawski et al. | Apr 2015 | B2 |
9016576 | Brady et al. | Apr 2015 | B2 |
D730357 | Fitch et al. | May 2015 | S |
9022288 | Nahill et al. | May 2015 | B2 |
9026840 | Kim | May 2015 | B1 |
9030964 | Essinger et al. | May 2015 | B2 |
9033240 | Smith et al. | May 2015 | B2 |
9033242 | Gillet et al. | May 2015 | B2 |
9036054 | Koziol et al. | May 2015 | B2 |
9037344 | Chamberlin | May 2015 | B2 |
9038911 | Xian et al. | May 2015 | B2 |
9038915 | Smith | May 2015 | B2 |
D730901 | Oberpriller et al. | Jun 2015 | S |
D730902 | Fitch et al. | Jun 2015 | S |
9047098 | Barten | Jun 2015 | B2 |
9047359 | Caballero et al. | Jun 2015 | B2 |
9047420 | Caballero | Jun 2015 | B2 |
9047525 | Barber | Jun 2015 | B2 |
9047531 | Showering et al. | Jun 2015 | B2 |
9049640 | Wang et al. | Jun 2015 | B2 |
9053055 | Caballero | Jun 2015 | B2 |
9053378 | Hou et al. | Jun 2015 | B1 |
9053380 | Xian et al. | Jun 2015 | B2 |
9057641 | Amundsen et al. | Jun 2015 | B2 |
9058526 | Powilleit | Jun 2015 | B2 |
9061527 | Tobin et al. | Jun 2015 | B2 |
9064165 | Havens et al. | Jun 2015 | B2 |
9064167 | Xian et al. | Jun 2015 | B2 |
9064168 | Todeschini et al. | Jun 2015 | B2 |
9064254 | Todeschini et al. | Jun 2015 | B2 |
9066032 | Wang | Jun 2015 | B2 |
9070032 | Corcoran | Jun 2015 | B2 |
D734339 | Zhou et al. | Jul 2015 | S |
D734751 | Oberpriller et al. | Jul 2015 | S |
9076459 | Braho et al. | Jul 2015 | B2 |
9079423 | Bouverie et al. | Jul 2015 | B2 |
9080856 | Laffargue | Jul 2015 | B2 |
9082023 | Feng et al. | Jul 2015 | B2 |
9084032 | Rautiola et al. | Jul 2015 | B2 |
9087250 | Coyle | Jul 2015 | B2 |
9092681 | Havens et al. | Jul 2015 | B2 |
9092682 | Wilz et al. | Jul 2015 | B2 |
9092683 | Koziol et al. | Jul 2015 | B2 |
9093141 | Liu | Jul 2015 | B2 |
9098763 | Lu et al. | Aug 2015 | B2 |
9104929 | Todeschini | Aug 2015 | B2 |
9104934 | Li et al. | Aug 2015 | B2 |
9107484 | Chaney | Aug 2015 | B2 |
9111159 | Liu et al. | Aug 2015 | B2 |
9111166 | Cunningham | Aug 2015 | B2 |
9135483 | Liu et al. | Sep 2015 | B2 |
9137009 | Gardiner | Sep 2015 | B1 |
9141839 | Xian et al. | Sep 2015 | B2 |
9147096 | Wang | Sep 2015 | B2 |
9148474 | Skvoretz | Sep 2015 | B2 |
9158000 | Sauerwein | Oct 2015 | B2 |
9158340 | Reed et al. | Oct 2015 | B2 |
9158953 | Gillet et al. | Oct 2015 | B2 |
9159059 | Daddabbo et al. | Oct 2015 | B2 |
9165174 | Huck | Oct 2015 | B2 |
9171543 | Emerick et al. | Oct 2015 | B2 |
9183425 | Wang | Nov 2015 | B2 |
9189669 | Zhu et al. | Nov 2015 | B2 |
9195844 | Todeschini et al. | Nov 2015 | B2 |
9202458 | Braho et al. | Dec 2015 | B2 |
9208366 | Liu | Dec 2015 | B2 |
9208367 | Wangu | Dec 2015 | B2 |
9219836 | Bouverie et al. | Dec 2015 | B2 |
9224022 | Ackley et al. | Dec 2015 | B2 |
9224024 | Bremer et al. | Dec 2015 | B2 |
9224027 | Van Horn et al. | Dec 2015 | B2 |
D747321 | London et al. | Jan 2016 | S |
9230140 | Ackley | Jan 2016 | B1 |
9235553 | Fitch et al. | Jan 2016 | B2 |
9239950 | Fletcher | Jan 2016 | B2 |
9245492 | Ackley et al. | Jan 2016 | B2 |
9443123 | Hejl | Jan 2016 | B2 |
9248640 | Heng | Feb 2016 | B2 |
9250652 | London et al. | Feb 2016 | B2 |
9250712 | Todeschini | Feb 2016 | B1 |
9251411 | Todeschini | Feb 2016 | B2 |
9258033 | Showering | Feb 2016 | B2 |
9262633 | Todeschini et al. | Feb 2016 | B1 |
9262660 | Lu et al. | Feb 2016 | B2 |
9262662 | Chen et al. | Feb 2016 | B2 |
9269036 | Bremer | Feb 2016 | B2 |
9270782 | Hala et al. | Feb 2016 | B2 |
9274812 | Doren et al. | Mar 2016 | B2 |
9275388 | Havens et al. | Mar 2016 | B2 |
9277668 | Feng et al. | Mar 2016 | B2 |
9280693 | Feng et al. | Mar 2016 | B2 |
9286496 | Smith | Mar 2016 | B2 |
9297900 | Jiang | Mar 2016 | B2 |
9298964 | Li et al. | Mar 2016 | B2 |
9301427 | Feng et al. | Mar 2016 | B2 |
9304376 | Anderson | Apr 2016 | B2 |
9310609 | Rueblinger et al. | Apr 2016 | B2 |
9313377 | Todeschini et al. | Apr 2016 | B2 |
9317037 | Byford et al. | Apr 2016 | B2 |
D757009 | Oberpriller et al. | May 2016 | S |
9342723 | Liu et al. | May 2016 | B2 |
9342724 | McCloskey | May 2016 | B2 |
9361882 | Ressler et al. | Jun 2016 | B2 |
9365381 | Colonel et al. | Jun 2016 | B2 |
9373018 | Colavito et al. | Jun 2016 | B2 |
9375945 | Bowles | Jun 2016 | B1 |
9378403 | Wang et al. | Jun 2016 | B2 |
D760719 | Zhou et al. | Jul 2016 | S |
9360304 | Chang et al. | Jul 2016 | B2 |
9383848 | Daghigh | Jul 2016 | B2 |
9384374 | Bianconi | Jul 2016 | B2 |
9386034 | Cochenour | Jul 2016 | B2 |
9390596 | Todeschini | Jul 2016 | B1 |
D762604 | Fitch et al. | Aug 2016 | S |
9411386 | Sauerwein | Aug 2016 | B2 |
9412242 | Van Horn et al. | Aug 2016 | B2 |
9418269 | Havens et al. | Aug 2016 | B2 |
9418270 | Van Volkinburg et al. | Aug 2016 | B2 |
9423318 | Lui et al. | Aug 2016 | B2 |
D766244 | Zhou et al. | Sep 2016 | S |
9443222 | Singel et al. | Sep 2016 | B2 |
9454689 | McCloskey et al. | Sep 2016 | B2 |
9464885 | Lloyd et al. | Oct 2016 | B2 |
9465967 | Xian et al. | Oct 2016 | B2 |
9478113 | Xie et al. | Oct 2016 | B2 |
9478983 | Kather et al. | Oct 2016 | B2 |
D771631 | Fitch et al. | Nov 2016 | S |
9481186 | Bouverie et al. | Nov 2016 | B2 |
9488986 | Solanki | Nov 2016 | B1 |
9489782 | Payne et al. | Nov 2016 | B2 |
9490540 | Davies et al. | Nov 2016 | B1 |
9491729 | Rautiola et al. | Nov 2016 | B2 |
9497092 | Gomez et al. | Nov 2016 | B2 |
9507974 | Todeschini | Nov 2016 | B1 |
9519814 | Cudzilo | Dec 2016 | B2 |
9521331 | Bessettes et al. | Dec 2016 | B2 |
9530038 | Xian et al. | Dec 2016 | B2 |
D777166 | Bidwell et al. | Jan 2017 | S |
9558386 | Yeakley | Jan 2017 | B2 |
9572901 | Todeschini | Feb 2017 | B2 |
9606581 | Howe et al. | Mar 2017 | B1 |
D783601 | Schulte et al. | Apr 2017 | S |
D785617 | Bidwell et al. | May 2017 | S |
D785636 | Oberpriller et al. | May 2017 | S |
9646189 | Lu et al. | May 2017 | B2 |
9646191 | Unemyr et al. | May 2017 | B2 |
9652648 | Ackley et al. | May 2017 | B2 |
9652653 | Todeschini et al. | May 2017 | B2 |
9656487 | Ho et al. | May 2017 | B2 |
9659198 | Giordano et al. | May 2017 | B2 |
D790505 | Vargo et al. | Jun 2017 | S |
D790546 | Zhou et al. | Jun 2017 | S |
9680282 | Hanenburg | Jun 2017 | B2 |
9697401 | Feng et al. | Jul 2017 | B2 |
9701140 | Alaganchetty et al. | Jul 2017 | B1 |
9954871 | Hussey | Apr 2018 | B2 |
20070063048 | Havens et al. | Mar 2007 | A1 |
20090134221 | Zhu et al. | May 2009 | A1 |
20100177076 | Essinger et al. | Jul 2010 | A1 |
20100177080 | Essinger et al. | Jul 2010 | A1 |
20100177707 | Essinger et al. | Jul 2010 | A1 |
20100177749 | Essinger et al. | Jul 2010 | A1 |
20110169999 | Grunow et al. | Jul 2011 | A1 |
20110202554 | Powilleit et al. | Aug 2011 | A1 |
20120111946 | Golant | May 2012 | A1 |
20120168512 | Kotlarsky et al. | Jul 2012 | A1 |
20120193423 | Samek | Aug 2012 | A1 |
20120203647 | Smith | Aug 2012 | A1 |
20120223141 | Good et al. | Sep 2012 | A1 |
20130043312 | Van Horn | Feb 2013 | A1 |
20130075168 | Amundsen et al. | Mar 2013 | A1 |
20130175341 | Kearney et al. | Jul 2013 | A1 |
20130175343 | Good | Jul 2013 | A1 |
20130257744 | Daghigh et al. | Oct 2013 | A1 |
20130257759 | Daghigh | Oct 2013 | A1 |
20130270346 | Xian et al. | Oct 2013 | A1 |
20130292475 | Kotlarsky et al. | Nov 2013 | A1 |
20130292477 | Hennick et al. | Nov 2013 | A1 |
20130293539 | Hunt et al. | Nov 2013 | A1 |
20130293540 | Laffargue et al. | Nov 2013 | A1 |
20130306728 | Thuries et al. | Nov 2013 | A1 |
20130306731 | Pedraro | Nov 2013 | A1 |
20130307964 | Bremer et al. | Nov 2013 | A1 |
20130308625 | Park et al. | Nov 2013 | A1 |
20130313324 | Koziol et al. | Nov 2013 | A1 |
20130332524 | Fiala et al. | Dec 2013 | A1 |
20140001267 | Giordano et al. | Jan 2014 | A1 |
20140002828 | Laffargue et al. | Jan 2014 | A1 |
20140025584 | Liu et al. | Jan 2014 | A1 |
20140100813 | Showering | Jan 2014 | A1 |
20140034734 | Sauerwein | Feb 2014 | A1 |
20140039693 | Havens et al. | Feb 2014 | A1 |
20140049120 | Kohtz et al. | Feb 2014 | A1 |
20140049635 | Laffargue et al. | Feb 2014 | A1 |
20140061306 | Wu et al. | Mar 2014 | A1 |
20140063289 | Hussey et al. | Mar 2014 | A1 |
20140066136 | Sauerwein et al. | Mar 2014 | A1 |
20140067692 | Ye et al. | Mar 2014 | A1 |
20140070005 | Nahill et al. | Mar 2014 | A1 |
20140071840 | Venancio | Mar 2014 | A1 |
20140074746 | Wang | Mar 2014 | A1 |
20140076974 | Havens et al. | Mar 2014 | A1 |
20140078342 | Li et al. | Mar 2014 | A1 |
20140098792 | Wang et al. | Apr 2014 | A1 |
20140100774 | Showering | Apr 2014 | A1 |
20140103115 | Meier et al. | Apr 2014 | A1 |
20140104413 | McCloskey et al. | Apr 2014 | A1 |
20140104414 | McCloskey et al. | Apr 2014 | A1 |
20140104416 | Giordano et al. | Apr 2014 | A1 |
20140106725 | Sauerwein | Apr 2014 | A1 |
20140108010 | Maltseff et al. | Apr 2014 | A1 |
20140108402 | Gomez et al. | Apr 2014 | A1 |
20140108682 | Caballero | Apr 2014 | A1 |
20140110485 | Toa et al. | Apr 2014 | A1 |
20140114530 | Fitch et al. | Apr 2014 | A1 |
20140125853 | Wang | May 2014 | A1 |
20140125999 | Longacre et al. | May 2014 | A1 |
20140129378 | Richardson | May 2014 | A1 |
20140131443 | Smith | May 2014 | A1 |
20140131444 | Wang | May 2014 | A1 |
20140133379 | Wang et al. | May 2014 | A1 |
20140136208 | Maltseff et al. | May 2014 | A1 |
20140140585 | Wang | May 2014 | A1 |
20140152882 | Samek et al. | Jun 2014 | A1 |
20140158770 | Sevier et al. | Jun 2014 | A1 |
20140159869 | Zumsteg et al. | Jun 2014 | A1 |
20140166755 | Liu et al. | Jun 2014 | A1 |
20140166757 | Smith | Jun 2014 | A1 |
20140168787 | Wang et al. | Jun 2014 | A1 |
20140175165 | Havens et al. | Jun 2014 | A1 |
20140191913 | Ge et al. | Jul 2014 | A1 |
20140197239 | Havens et al. | Jul 2014 | A1 |
20140197304 | Feng et al. | Jul 2014 | A1 |
20140204268 | Grunow et al. | Jul 2014 | A1 |
20140214631 | Hansen | Jul 2014 | A1 |
20140217166 | Berthiaume et al. | Aug 2014 | A1 |
20140217180 | Liu | Aug 2014 | A1 |
20140231500 | Ehrhart et al. | Aug 2014 | A1 |
20140247315 | Marty et al. | Sep 2014 | A1 |
20140263493 | Amurgis et al. | Sep 2014 | A1 |
20140263645 | Smith et al. | Sep 2014 | A1 |
20140270196 | Braho et al. | Sep 2014 | A1 |
20140270229 | Braho | Sep 2014 | A1 |
20140278387 | DiGregorio | Sep 2014 | A1 |
20140282210 | Bianconi | Sep 2014 | A1 |
20140288933 | Braho et al. | Sep 2014 | A1 |
20140297058 | Barker et al. | Oct 2014 | A1 |
20140299665 | Barber et al. | Oct 2014 | A1 |
20140351317 | Smith et al. | Nov 2014 | A1 |
20140362184 | Jovanovski et al. | Dec 2014 | A1 |
20140363015 | Braho | Dec 2014 | A1 |
20140369511 | Sheerin et al. | Dec 2014 | A1 |
20140374483 | Lu | Dec 2014 | A1 |
20140374485 | Xian et al. | Dec 2014 | A1 |
20150001301 | Ouyang | Jan 2015 | A1 |
20150009338 | Laffargue et al. | Jan 2015 | A1 |
20150014416 | Kotlarsky et al. | Jan 2015 | A1 |
20150021397 | Rueblinger et al. | Jan 2015 | A1 |
20150028104 | Ma et al. | Jan 2015 | A1 |
20150029002 | Yeakley et al. | Jan 2015 | A1 |
20150032709 | Maloy et al. | Jan 2015 | A1 |
20150039309 | Braho et al. | Feb 2015 | A1 |
20150040378 | Saber et al. | Feb 2015 | A1 |
20150049347 | Laffargue et al. | Feb 2015 | A1 |
20150051992 | Smith | Feb 2015 | A1 |
20150053769 | Thuries et al. | Feb 2015 | A1 |
20150062366 | Liu et al. | Mar 2015 | A1 |
20150063215 | Wang | Mar 2015 | A1 |
20150088522 | Hendrickson et al. | Mar 2015 | A1 |
20150096872 | Woodburn | Apr 2015 | A1 |
20150100196 | Hollifield | Apr 2015 | A1 |
20150115035 | Meier et al. | Apr 2015 | A1 |
20150127791 | Kosecki et al. | May 2015 | A1 |
20150128116 | Chen et al. | May 2015 | A1 |
20150133047 | Smith et al. | May 2015 | A1 |
20150134470 | Hejl et al. | May 2015 | A1 |
20150136851 | Harding et al. | May 2015 | A1 |
20150142492 | Kumar | May 2015 | A1 |
20150144692 | Hejl | May 2015 | A1 |
20150144698 | Teng et al. | May 2015 | A1 |
20150149946 | Benos et al. | May 2015 | A1 |
20150161429 | Xian | Jun 2015 | A1 |
20150186703 | Chen et al. | Jul 2015 | A1 |
20150199957 | Funyak et al. | Jul 2015 | A1 |
20150210199 | Payne | Jul 2015 | A1 |
20150220753 | Zhu et al. | Aug 2015 | A1 |
20150254485 | Feng et al. | Sep 2015 | A1 |
20150310243 | Ackley | Oct 2015 | A1 |
20150310389 | Crimm et al. | Oct 2015 | A1 |
20150327012 | Bian et al. | Nov 2015 | A1 |
20160014251 | Hejl | Jan 2016 | A1 |
20160040982 | Li et al. | Feb 2016 | A1 |
20160042241 | Todeschini | Feb 2016 | A1 |
20160057230 | Todeschini et al. | Feb 2016 | A1 |
20160062473 | Bouchat et al. | Mar 2016 | A1 |
20160092805 | Geisler et al. | Mar 2016 | A1 |
20160101936 | Chamberlin | Apr 2016 | A1 |
20160102975 | McCloskey et al. | Apr 2016 | A1 |
20160104019 | Todeschini et al. | Apr 2016 | A1 |
20160104274 | Jovanovski et al. | Apr 2016 | A1 |
20160109219 | Ackley et al. | Apr 2016 | A1 |
20160109220 | Laffargue | Apr 2016 | A1 |
20160109224 | Thuries et al. | Apr 2016 | A1 |
20160112631 | Ackley et al. | Apr 2016 | A1 |
20160112643 | Laffargue et al. | Apr 2016 | A1 |
20160117627 | Raj et al. | Apr 2016 | A1 |
20160124516 | Schoon et al. | May 2016 | A1 |
20160125217 | Todeschini | May 2016 | A1 |
20160125342 | Miller et al. | May 2016 | A1 |
20160133253 | Braho et al. | May 2016 | A1 |
20160171597 | Todeschini | Jun 2016 | A1 |
20160171666 | McCloskey | Jun 2016 | A1 |
20160171720 | Todeschini | Jun 2016 | A1 |
20160171775 | Todeschini et al. | Jun 2016 | A1 |
20160171777 | Todeschini et al. | Jun 2016 | A1 |
20160174674 | Oberpriller et al. | Jun 2016 | A1 |
20160178479 | Goldsmith | Jun 2016 | A1 |
20160178685 | Young et al. | Jun 2016 | A1 |
20160178707 | Young et al. | Jun 2016 | A1 |
20160179132 | Harr et al. | Jun 2016 | A1 |
20160179143 | Bidwell et al. | Jun 2016 | A1 |
20160179368 | Roeder | Jun 2016 | A1 |
20160179378 | Kent et al. | Jun 2016 | A1 |
20160180130 | Bremer | Jun 2016 | A1 |
20160180133 | Oberpriller et al. | Jun 2016 | A1 |
20160180136 | Meier et al. | Jun 2016 | A1 |
20160180594 | Todeschini | Jun 2016 | A1 |
20160180663 | McMahan et al. | Jun 2016 | A1 |
20160180678 | Ackley et al. | Jun 2016 | A1 |
20160180713 | Bernhardt et al. | Jun 2016 | A1 |
20160185136 | Ng et al. | Jun 2016 | A1 |
20160185291 | Chamberlin | Jun 2016 | A1 |
20160186926 | Oberpriller et al. | Jun 2016 | A1 |
20160188861 | Todeschini | Jun 2016 | A1 |
20160188939 | Sailors et al. | Jun 2016 | A1 |
20160188940 | Lu et al. | Jun 2016 | A1 |
20160188941 | Todeschini et al. | Jun 2016 | A1 |
20160188942 | Good et al. | Jun 2016 | A1 |
20160188943 | Linwood | Jun 2016 | A1 |
20160188944 | Wilz | Jun 2016 | A1 |
20160189076 | Mellott et al. | Jun 2016 | A1 |
20160189087 | Morton et al. | Jun 2016 | A1 |
20160189088 | Pecorari et al. | Jun 2016 | A1 |
20160189092 | George et al. | Jun 2016 | A1 |
20160189284 | Mellott et al. | Jun 2016 | A1 |
20160189288 | Todeschini | Jun 2016 | A1 |
20160189366 | Chamberlin et al. | Jun 2016 | A1 |
20160189443 | Smith | Jun 2016 | A1 |
20160189447 | Valenzuela | Jun 2016 | A1 |
20160189489 | Au et al. | Jun 2016 | A1 |
20160191684 | DiPiazza et al. | Jun 2016 | A1 |
20160192051 | DiPiazza et al. | Jun 2016 | A1 |
20160125873 | Braho et al. | Jul 2016 | A1 |
20160202951 | Pike et al. | Jul 2016 | A1 |
20160202958 | Zabel et al. | Jul 2016 | A1 |
20160202959 | Doubleday et al. | Jul 2016 | A1 |
20160203021 | Pike et al. | Jul 2016 | A1 |
20160203429 | Mellott et al. | Jul 2016 | A1 |
20160203797 | Pike et al. | Jul 2016 | A1 |
20160203820 | Zabel et al. | Jul 2016 | A1 |
20160204623 | Haggert et al. | Jul 2016 | A1 |
20160204636 | Allen et al. | Jul 2016 | A1 |
20160204638 | Miraglia et al. | Jul 2016 | A1 |
20160316190 | McCloskey et al. | Jul 2016 | A1 |
20160227912 | Oberpriller et al. | Aug 2016 | A1 |
20160232891 | Pecorari | Aug 2016 | A1 |
20160292477 | Bidwell | Oct 2016 | A1 |
20160294779 | Yeakley et al. | Oct 2016 | A1 |
20160306769 | Kohtz et al. | Oct 2016 | A1 |
20160314276 | Sewell et al. | Oct 2016 | A1 |
20160314294 | Kubler et al. | Oct 2016 | A1 |
20160323310 | Todeschini et al. | Nov 2016 | A1 |
20160325677 | Fitch et al. | Nov 2016 | A1 |
20160327614 | Young et al. | Nov 2016 | A1 |
20160327930 | Charpentier et al. | Nov 2016 | A1 |
20160328762 | Pape | Nov 2016 | A1 |
20160330218 | Hussey et al. | Nov 2016 | A1 |
20160343163 | Venkatesha et al. | Nov 2016 | A1 |
20160343176 | Ackley | Nov 2016 | A1 |
20160364914 | Todeschini | Dec 2016 | A1 |
20160370220 | Ackley et al. | Dec 2016 | A1 |
20160372282 | Bandringa | Dec 2016 | A1 |
20160373847 | Vargo et al. | Dec 2016 | A1 |
20160377414 | Thuries et al. | Dec 2016 | A1 |
20160377417 | Jovanovski et al. | Dec 2016 | A1 |
20170010141 | Ackley | Jan 2017 | A1 |
20170010328 | Mullen et al. | Jan 2017 | A1 |
20170010780 | Waldron et al. | Jan 2017 | A1 |
20170016714 | Laffargue et al. | Jan 2017 | A1 |
20170018094 | Todeschini | Jan 2017 | A1 |
20170046603 | Lee et al. | Feb 2017 | A1 |
20170047864 | Stang et al. | Feb 2017 | A1 |
20170053146 | Liu et al. | Feb 2017 | A1 |
20170053147 | Geramine et al. | Feb 2017 | A1 |
20170053647 | Nichols et al. | Feb 2017 | A1 |
20170055606 | Xu et al. | Mar 2017 | A1 |
20170060316 | Larson | Mar 2017 | A1 |
20170061961 | Nichols et al. | Mar 2017 | A1 |
20170064634 | Van Horn et al. | Mar 2017 | A1 |
20170083730 | Feng et al. | Mar 2017 | A1 |
20170091502 | Furlong et al. | Mar 2017 | A1 |
20170091706 | Lloyd et al. | Mar 2017 | A1 |
20170091741 | Todeschini | Mar 2017 | A1 |
20170091904 | Ventress | Mar 2017 | A1 |
20170092908 | Chaney | Mar 2017 | A1 |
20170094238 | Germaine | Mar 2017 | A1 |
20170098947 | Wolski | Apr 2017 | A1 |
20170100949 | Celinder et al. | Apr 2017 | A1 |
20170108838 | Todeschini et al. | Apr 2017 | A1 |
20170108895 | Chamberlin et al. | Apr 2017 | A1 |
20170118355 | Wong et al. | Apr 2017 | A1 |
20170123598 | Phan et al. | May 2017 | A1 |
20170124369 | Rueblinger et al. | May 2017 | A1 |
20170124396 | Todeschini et al. | May 2017 | A1 |
20170124687 | McCloskey et al. | May 2017 | A1 |
20170126873 | McGary et al. | May 2017 | A1 |
20170126904 | d'Armancourt et al. | May 2017 | A1 |
20170139012 | Smith | May 2017 | A1 |
20170140329 | Bernhardt et al. | May 2017 | A1 |
20170140731 | Smith | May 2017 | A1 |
20170147847 | Berggren et al. | May 2017 | A1 |
20170150124 | Thuries | May 2017 | A1 |
20170169198 | Nichols | Jun 2017 | A1 |
20170171035 | Lu et al. | Jun 2017 | A1 |
20170171703 | Maheswaranathan | Jun 2017 | A1 |
20170171803 | Maheswaranathan | Jun 2017 | A1 |
20170180359 | Wolski et al. | Jun 2017 | A1 |
20170180577 | Nguon et al. | Jun 2017 | A1 |
20170181299 | Shi et al. | Jun 2017 | A1 |
20170190192 | Delario et al. | Jul 2017 | A1 |
20170193432 | Bernhardt | Jul 2017 | A1 |
20170193461 | Jonas et al. | Jul 2017 | A1 |
20170193727 | Van Horn et al. | Jul 2017 | A1 |
20170200108 | Au et al. | Jul 2017 | A1 |
20170200275 | McCloskey et al. | Jul 2017 | A1 |
Number | Date | Country |
---|---|---|
2013163789 | Nov 2013 | WO |
Entry |
---|
Forbes.com, “How a Scanner Infected Corporate Systems and Stole Data; Beware Trojan Peripherals” dated Jul. 10, 2014; 3 pages. |
Number | Date | Country | |
---|---|---|---|
20180248897 A1 | Aug 2018 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14705407 | May 2015 | US |
Child | 15957996 | US |