This application claims priority from (1) U.S. Provisional Patent Application No. 60/025,947 filed Sep. 11, 1996, entitled METHOD OF USING FINGERPRINTS TO ELIMINATE WIRELESS PHONE FRAUD AND TO ASCERTAIN A CALLER'S IDENTITY and naming Y. Li, D. R. K. Rao, and S. Subbiah as inventors, and (2) U.S. Provisional Patent Application No. 60/025,949, filed Sep. 11, 1996, entitled EMBEDDABLE MODULE FOR FINGERPRINT CAPTURE AND MATCHING, and naming R. Rao, S. Subbiah, Y. Li, and D. Chu as inventors. Both of these applications are incorporated herein by reference in their entireties and for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
2952181 | Mawer | Sep 1960 | |
4135147 | Riganati et al. | Jan 1979 | |
4151512 | Riganati et al. | Apr 1979 | |
4322163 | Schiller et al. | Mar 1982 | |
4537484 | Fowler et al. | Aug 1985 | |
4747147 | Sparrow | May 1988 | |
4947442 | Tanaka et al. | Aug 1990 | |
5091942 | Dent | Feb 1992 | |
5109427 | Yang et al. | Apr 1992 | |
5131038 | Puhl et al. | Jul 1992 | |
5402490 | Mihm, Jr. et al. | Mar 1995 | |
5420908 | Hodges et al. | May 1995 | |
5448760 | Frederick | Sep 1995 | |
5465290 | Hampton et al. | Nov 1995 | |
5467403 | Fishbine et al. | Nov 1995 | |
5493621 | Matsumura | Feb 1996 | |
5559504 | Itsumi et al. | Sep 1996 | |
5583486 | Kersten | Dec 1996 | |
5680460 | Tomko et al. | Oct 1997 | |
5706349 | Aditham et al. | Jan 1998 | |
5796832 | Kawan | Aug 1998 | |
5872834 | Teitelbaum | Feb 1999 | |
5938706 | Feldman | Aug 1999 | |
5995641 | Yamaguchi | Nov 1999 |
Number | Date | Country |
---|---|---|
2533699 | Jul 1975 | DE |
3610397 A1 | Mar 1986 | DE |
3743856 A1 | Dec 1987 | DE |
0304547 A2 | Apr 1982 | EP |
0348182 A3 | Dec 1989 | EP |
0348182 A2 | Dec 1989 | EP |
392 159 A2 | Oct 1990 | EP |
0457398 A2 | Nov 1991 | EP |
0583011 A2 | Feb 1994 | EP |
0583011 A3 | Feb 1994 | EP |
04111038 | Apr 1992 | JP |
04352548 | Dec 1992 | JP |
04358182 A3 | Dec 1992 | JP |
WO9618169 | Jun 1996 | WO |
98 32093 | Jul 1998 | WO |
Entry |
---|
Field, “Curbing Today's card sharps” Computer Weekly Apr. 12, 1990. Number 1209 P 30(2).* |
Nichols, ICSA Guide to Cryptography, McGraw-Hill, 1998.* |
Security for Computer Networks, 2e, D. W. Davies and W. L. Price John Wiley & Sons, 1998.* |
Gaffney, Jr., J.E., “Fingerprint Pattern Offset Determination and Matching Method;” pp. 773-774; Aug. 3, 1974; IBM Technical Disclosure Bulletin. |
Rao, T.C., “Feature Extraction for Fingerprint Classification, ” pp. 181-192; Aug. 9, 1975; Pattern Recognition Letters. |
“Software THeft Extends Well Beyond China,” May 20, 1996, Wall Street Journal. |
“New Chip Verifies Fingerprints,” May 22, 1997, Tom Abate, San Francisco Chronicle. |
“Embeddable Module for Fingerprint Capture and Matching,” Sep. 11, 1996, D. Ramesh K. Rao, et al., U.S. Provisional Application Serial No. 60/025,949. |
“A Biometric Based Method for Software Distribution,” Sep. 11, 1996, Subramanian Subbiah, et al., U.S. Provisional Application, Serial No. 60/025,913. |
Number | Date | Country | |
---|---|---|---|
60/025947 | Sep 1996 | US | |
60/025949 | Sep 1996 | US |