The present invention relates to a method and system for authorizing a transaction between two parties over a network and, more particularly, to authorizing a transaction over the network when an authorization code has been received by an authorizing entity, the authorization code being produced by a fingerprint identification device in response to comparing a fingerprint of one of the parties to a stored fingerprint in the device.
As the use of networks, for example the Internet, become more prevalent, an ever expanding quantum of electronic commerce will be conducted between users over these networks. Typically, a consumer of goods and/or services electronically connects to a provider of goods and/or services over a network, for example, by way of a website. Using known website browser software, the consumer may review and select goods or services and request that such goods or services be delivered to a specified address.
The provider of goods or services, of course, expects to be paid for any goods or services requested by the consumer. Typically, this is accomplished by asking the consumer to enter his or her credit card number and expiration date. Sometime thereafter, and most likely after the consumer has disconnected from the provider's website, the provider telephones an authorizing entity (e.g., the originator or managing entity) of the credit card and requests authorization to complete the transaction. In particular, the provider of goods and/or services transmits the credit card number, expiration date, consumer name, and purchase amount to the authorizing entity and awaits authorization. The authorizing entity accesses the consumer's credit card account and verifies that the consumer is in good standing and that the purchase amount will not cause the consumer's credit balance to exceed his or her credit limit. If the authorizing entity's review of the consumer's credit account is favorable, then authorization is transmitted to the provider of goods and/or services to complete the transaction with the consumer.
As the provider of goods and/or services never actually sees the consumer and cannot assess the consumer in terms of whether or not the consumer is attempting to fraudulently utilize the credit card, both the provider of goods and/or services and the authorizing entity (originator of the credit card) must assume that the consumer is the authorized user of the credit card. It is only when the authorized user of a lost or stolen credit card calls the authorizing entity (or its representative) to report the lost and/or stolen card, that fraudulent uses of the credit card may be avoided.
Similar problems occur when goods and/or services are requested and confirmed by a user of the network simply by connecting with the provider's website. For example, when a provider of goods and/or services requires an initial registration with a particular consumer that authorizes billing the consumer for use of the website, accidental (or fraudulent) use of the website is likely by non-authorized users. More particularly, a parent (authorized user) may contract with a provider of goods and/or services to permit the authorized consumer to utilize the website. The terms of the contract (or registration) may be that the consumer's credit card will be charged for an amount representing use of the website by the authorized consumer (e.g., obtaining information from the website or purchasing goods). Unfortunately, the only way that the provider of goods and/or services knows that a user of the website is an authorized consumer is by way of an identification number (e.g., password etc.) given by the authorized consumer or automatically transmitted by the authorized consumer's personal computer. Thus, any user of the authorized consumer's personal computer who obtains the password (if employed) may access the website and incur charges without the knowledge of the authorized consumer.
Accordingly, there is a need in the art for a new method and system for facilitating and authorizing transactions between parties over a network which provides all parties to the transaction with confidence that the initiator of the transaction is authorized to enter into the transaction.
In accordance with one or more aspects of the present invention, a method includes generating authentication information using a fingerprint authentication device; transmitting the authentication information to a managing entity; authenticating a user of the fingerprint authentication device based upon at least the authentication information; transmitting an authentication to at least one provider of goods or services; and if the authentication is valid, accessing the at least one provider of goods or services. Alternatively, the method may include receiving a request to access at least one provider of goods or services; requesting authentication to access the at least one provider of goods or services; receiving authentication from a managing entity to access the at least one provider of goods or services. Still further, the method may alternatively include receiving authentication information from a remotely connected fingerprint authentication device; authenticating a user of the fingerprint authentication device based upon the authentication information; and transmitting an authentication to at least one remotely connected provider of goods or services. Still further, the method may include: initiating a connection with at least one provider of goods or services; generating authentication information using a fingerprint authentication device; transmitting the authentication information to a managing entity; and accessing the at least one provider of goods or services if the authentication information is valid.
Preferably, the stored fingerprint is in an encrypted format.
In accordance with one or more further aspects of the present invention, a system includes: a fingerprint authentication device to generate authentication information; a managing entity to receive the authentication information, the managing entity authenticates a user of the fingerprint authentication device based upon the authentication information; and at least one provider of goods or services to receive an authentication from the managing entity, wherein the user of the fingerprint authentication device accesses the at least one provider of goods or services if the authentication is valid. Alternatively, the system may include: at least one provider of goods or services to receive a request for access, to request authentication for access, and to receive authentication from a managing entity for access to the at least one provider of goods or services. Still further, a system may include: at least one provider of goods or services to receive a request for access, to request authentication for access, and to receive authentication from a managing entity for access to the at least one provider of goods or services. Still further, a system may include: a managing entity to receive authentication information from a remotely connected fingerprint authentication device, to authenticate a user of the fingerprint authentication device based upon the authentication information, and to transmit an authentication to at least one remotely connected provider of goods or services.
In accordance with one or more further aspects of the present invention, an apparatus includes: a fingerprint authentication device to initiate a connection with at least one provider of goods or services, to generate authentication information, to transmit the authentication information to a managing entity, and to access the at least one provider of goods or services if the authentication information is valid.
In accordance with one or more further aspects of the present invention, a system includes: means for generating authentication information using a fingerprint authentication device; means for transmitting the authentication information to a managing entity; means for authenticating a user of the fingerprint authentication device based upon at least the authentication information; means for transmitting an authentication to at least one provider of goods or services; and if the authentication is valid, means for accessing the at least one provider of goods or services. Alternatively, a system may include: means for receiving a request to access at least one provider of goods or services; means for requesting authentication to access the at least one provider of goods or services; means for receiving authentication from a managing entity to access the at least one provider of goods or services. Still further, a system may include: means for receiving authentication information from a remotely connected fingerprint authentication device; means for authenticating a user of the fingerprint authentication device based upon the authentication information; and means for transmitting an authentication to at least one remotely connected provider of goods or services. Still further, a system may include: means for initiating a connection with at least one provider of goods or services; means for generating authentication information using a fingerprint authentication device; means for transmitting the authentication information to a managing entity; and means for accessing the at least one provider of goods or services if the authentication information is valid.
In accordance with one or more further aspects of the present invention, a computer readable medium includes instruction, which when executed by a processor performs a method comprising: generating authentication information using a fingerprint authentication device; transmitting the authentication information to a managing entity; authenticating a user of the fingerprint authentication device based upon at least the authentication information; transmitting an authentication to at least one provider of goods or services; and if the authentication is valid, accessing the at least one provider of goods or services. The computer readable medium may include instructions, which when executed by a processor performs a method including: receiving a request to access at least one provider of goods or services; requesting authentication to access the at least one provider of goods or services; receiving authentication from a managing entity to access the at least one provider of goods or services. A computer readable medium may include instructions, which when executed by a processor performs a method including: receiving authentication information from a remotely connected fingerprint authentication device; authenticating a user of the fingerprint authentication device based upon the authentication information; and transmitting an authentication to at least one remotely connected provider of goods or services. Still further, a computer readable medium may includes instructions, which when executed by a processor performs a method including: initiating a connection with at least one provider of goods or services; generating authentication information using a fingerprint authentication device; transmitting the authentication information to a managing entity; and accessing the at least one provider of goods or services if the authentication information is valid.
Other objects, features, and advantages will become apparent to those skilled in the art in light of the description herein taken in conjunction with the accompanying drawing.
For the purposes of illustrating the invention, there are shown in the drawings forms which are presented preferred, it being understood, however, that the invention is not limited to the precise arrangements and instrumentalities shown.
Reference is now made to
Preferably, the payor bank 10 issues a plurality of fingerprint identification devices 50 to a plurality of customers 52. The fingerprint identification devices 50 may take any of a number of forms, e.g., a card, a smart card, a cellular phone, and a universal serial bus stick. It is preferred that each fingerprint identification device 50 is associated with one or more of the functional accounts of the payor bank 10. For example, the payor bank 10 may issue a fingerprint identification device 50 to a customer 52 which is associated with a bank account 26. That customer 52 may be issued another fingerprint identification device 50 associated with an electronic safety deposit box 24. It is understood, however, that the payor bank 10 may issue a single fingerprint identification device 50 which is associated with both the bank account 26 and electronic safety deposit box 24 (and any other functional account) without departing from the scope of the invention.
With reference to
It is most preferred that the stored fingerprint and other information regarding the customer 52 are in encrypted form (e.g., using known PKI technology) and that this encrypted information remain encrypted when transmitted from the device 50 to any other device. It is preferred that the fingerprint identification device 50 is connectable to a computer 54 (such as a PC) through an interface 56. The fingerprint identification device 50 may include a connector 57 which is matable with a corresponding connector 58 on the interface 56. The interface 56 preferably receives information from the fingerprint identification device 50 through the connectors 57, 58 and transfers at least some of this information to the PC 54 by way of the universal serial bus (USB) interface.
Alternatively, the device 50 may include an integral interface for connecting to the computer 54 by way of the universal serial bus (USB). Thus, the information on the fingerprint identification device 50 may be transmitted over a network (e.g., the Internet) from the computer 54, preferably in encrypted form (e.g., using API data transfer, PKS 11).
Most preferably, the fingerprint identification device 50 is a small, stand alone unit (e.g., measuring about 8.5 cm×5.4 cm×0.9 cm and weighting about 35 grams). It is most preferred that the fingerprint sensor 51 include a matrix of pixels formed in a semiconductor chip, a 128×192 matrix of pixels being preferred. Any of the known fingerprint matching algorithms may be employed, such as pattern matching. See, for example, U.S. Patent No. 4,582,985, entitled DATA CARRIER, the entire disclosure of which is hereby incorporated by reference.
In an alternative embodiment, the fingerprint identification device may be integral with the interface 56 or the interface 56 may contain separate fingerprint identification circuitry (including sensor 51) such that the device 50 is not required to execute fingerprint recognition and matching. In another alternative embodiment of the invention, the computer 54 may contain fingerprint identification circuitry (including sensor 51) integrally disposed therein such that neither the device 50 nor the interface 56 is required to execute fingerprint recognition and matching.
Referring to
Reference is now made to
At action 100, the customer 52 connects to the online provider of goods and/or services 60, 62 or 64 by way of the network in a manner well known to those skilled in the art. For example, the customer 52 may utilize a personal computer (PC) 54 (
At action 104, the provider of goods and/or services prompts the customer 52 to authenticate himself or herself as being authorized to use a particular mode for making remittance, for example, debiting a demand deposit account (DDA), debiting a credit card account, etc. In particular, the provider of goods and/or services prompts the customer 52 to authenticate himself by activating the fingerprint identification device 50.
At action 106, the customer 52 activates the fingerprint identification device 50 in a manner consistent with known techniques such that the fingerprint identification device compares the customer's fingerprint with a stored fingerprint (action 108) and produces an authorization code indicating that a match exists between the customer's fingerprint and the stored fingerprint. At action 110, the customer 52 inserts the fingerprint identification device 50 into an interface device 56 (
At action 114, if the customer 52 fails to transfer the authentication code to the provider of goods and/or services 60, 62 or 64, then it is preferred that the provider of goods and/or services rejects the transaction and again requests that the customer authenticate himself (action 104). When at least the authentication code is received by the provider of goods and/or services 60, 62 or 64, then the processing of the transaction is permitted to continue.
At action 116, the provider of good and/or services 60, 62 or 64 preferably transfers data to the payor bank 10, which data preferably includes at least one of the authentication code, payor bank identification number, customer account number, and purchase amount. It is most preferred that at least the authentication code be provided to the payor bank 10. The payor bank 10 then analyzes at least one of the payor bank identification number (action 118), the customer account number (action 120), the purchase amount (action 122) and the authorization code (124) to determine whether one or all of the data are valid. Most preferably, the payor bank 10 analyzes the authentication code (action 124) to verify its validity prior to authorizing the transaction. As illustrated, the queries at actions 118, 120, 122, and 124 are linked serially through the affirmative (“Y”) branch of each. It is noted, however, that the queries of actions 118, 120, 122, and 124 may be linked in parallel without departing from the scope of the invention. It is intended that an affirmative determination at one or more of the queries of actions 118, 120, 122 and 124 tends to advance the process flow toward action 128. If, however, any one or more of the data are not valid and the queries at one or more of actions 118, 120, 122 and 124 are negative (“N”), then the payor bank 10 preferably establishes a negative authorization condition (action 126).
At action 128, the payor bank 10 preferably transmits the authorization condition to the provider of goods and/or services and the provider of goods and/or services determines whether the authorization condition is positive or negative (action 130). When the authorization condition is negative, the provider of goods and/or services refuses to complete the transaction (action 132). Conversely, when the authorization condition is positive, the provider of goods and/or services completes the transaction (action 134).
Those skilled in the art will appreciate that commercial transactions conducted at the point of sale, for example, at brick and mortar stores, 70, 72, may be carried out in accordance with the invention using the steps illustrated in
With reference to
At action 158, the payor bank 10 debits the customer's account and at action 160, a determination is again made as to whether the provider of goods and/or services 70, 72 utilizes the same payor bank 10 as the customer 52. If it does, the payor bank 10 directly credits the bank account of the provider of goods and/or services (action 162). If not, the payor bank 10 transmits a credit to the bank of the provider of goods and/or services (action 164) and that bank credits the provider's bank account (action 166).
Reference is now made to
At action 200, the customer 52 preferably accesses the settlement bank 10 via a network, such as the Internet, using any of the known techniques. After the customer 52 has indicated that he or she is interested in conducting an investment transaction, the settlement bank 10 prompts the customer 52 to authenticate himself or herself (action 202). In response, the customer 52 preferably activates the fingerprint identification device 50 (action 204) which causes the device to compare the customer's fingerprint with a stored fingerprint (action 206) and produce an authentication code if a match is obtained.
At action 208, the customer preferably inserts the fingerprint identification device 50 into an interface 56 (
At action 212, if the settlement bank 10 receives the authentication code (and, if required, the investment account number), then the investment transaction is permitted to continue. If not, then the process flows back to action 202 where the customer 52 is again prompted to authenticate himself or herself.
At action 214, the customer 52 preferably provides investment instructions to the settlement bank 10 over the network, such as “buy 100 shares of xyz corporation” and, at action 216, the settlement bank 10 transmits the instructions to the on-line investment provider 66 (e.g., an investment bank). It is noted that the investment instructions may be transmitted to the on-line investment provider 66 in a way which maintains the customer's anonymity. Indeed, the customer's name, account number, etc., need not be transmitted to the investment provider 66. The customer 52, however, may instruct the settlement bank 10 as to whether or not he or she wishes to maintain such anonymity.
At action 218, the on-line investment provider 66 executes the investment instructions and does not require authorization because, by previous agreement, the receipt of investment instructions from the settlement bank 10 itself is authorization enough. At action 220, a transaction receipt is transmitted to the settlement bank 10 indicating whether remittance is required or payment is being made. At action 224, the settlement bank 10 credits or debits the customer's investment account in accordance with the transaction receipt and, at action 226, the settlement bank 10 debits and/or credits the on-line investment provider's 66 account.
Reference is now made to
At action 308, the customer preferably inserts the fingerprint identification device 50 into an interface 56 (
At action 312, if the payor bank 10 receives the authentication code (and, if required, the account number), then the access process continues. If not, the process flows back to action 302 where the customer 52 is again prompted to authenticate himself or herself. At action 314, the customer 52 may again request access to the electronic account, e.g., the electronic safety deposit box 24, and, at action 316, the payor bank 10 grants the customer's request and permits the customer 52 to manipulate, receive, and/or transmit electronic file(s) to the account. Those skilled in the art will appreciate that the files contained in an electronic safety deposit box 24 may include will(s), codicil(s), title to securities or other property, contract(s), certificate(s), insurance policies, etc. These files are represented by the “database” shown in the electronic safety deposit box 24 shown in
Advantageously, the method and system of the present invention readily provides for authorizing transactions over a network in which all parties to the transaction maintain confidence that the initiator (e.g., the customer) of the transaction is authorized to enter into the transaction. The transactions are not limited to commercial transactions for goods/services, but may include investment transactions, and access to electronic bank accounts, such as electronic safety deposit boxes 24, bank deposit accounts 26, settlement credit/debit accounts 28, etc.
Although the invention herein has been described with reference to particular embodiments, it is to be understood that these embodiments are merely illustrative of the principles and applications of the present invention. It is therefore to be understood that numerous modifications may be made to the illustrative embodiments and that other arrangements may be devised without departing from the spirit and scope of the present invention as defined by the appended claims.
This application is a continuation of U.S. patent application Ser. No. 09/510,811, filed Feb. 23, 2000, the entire disclosure of which is hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
4582985 | Lofberg | Apr 1986 | A |
4766293 | Boston | Aug 1988 | A |
4805222 | Young et al. | Feb 1989 | A |
4816653 | Anderl et al. | Mar 1989 | A |
5056019 | Schultz et al. | Oct 1991 | A |
5131038 | Puhl et al. | Jul 1992 | A |
5173851 | Off et al. | Dec 1992 | A |
5221838 | Gutman et al. | Jun 1993 | A |
5256863 | Ferguson et al. | Oct 1993 | A |
5276736 | Chaum | Jan 1994 | A |
5280527 | Gullman et al. | Jan 1994 | A |
5323146 | Glaschick et al. | Jun 1994 | A |
5329589 | Fraser et al. | Jul 1994 | A |
5436972 | Fischer | Jul 1995 | A |
5457747 | Drexler et al. | Oct 1995 | A |
5461217 | Claus | Oct 1995 | A |
5475758 | Kikuchi et al. | Dec 1995 | A |
5521362 | Powers | May 1996 | A |
5521890 | Miche et al. | May 1996 | A |
5537314 | Kanter | Jul 1996 | A |
5545139 | Kriesel | Aug 1996 | A |
5550358 | Tait et al. | Aug 1996 | A |
5557518 | Rosen | Sep 1996 | A |
5557541 | Schulhof et al. | Sep 1996 | A |
5561709 | Remillard | Oct 1996 | A |
5594230 | Waite et al. | Jan 1997 | A |
5598474 | Johnson | Jan 1997 | A |
5604805 | Brands | Feb 1997 | A |
5615277 | Hoffman | Mar 1997 | A |
5623552 | Lane | Apr 1997 | A |
5650761 | Gomm et al. | Jul 1997 | A |
5661807 | Guski et al. | Aug 1997 | A |
5696827 | Brands | Dec 1997 | A |
5710887 | Chelliah et al. | Jan 1998 | A |
5712913 | Chaum | Jan 1998 | A |
5734838 | Robinson et al. | Mar 1998 | A |
5737701 | Rosenthal et al. | Apr 1998 | A |
5744787 | Teicher | Apr 1998 | A |
5748737 | Daggar | May 1998 | A |
5761308 | Torii et al. | Jun 1998 | A |
5778068 | Johnson et al. | Jul 1998 | A |
5778384 | Provino et al. | Jul 1998 | A |
5796832 | Kawan | Aug 1998 | A |
5809212 | Shasha | Sep 1998 | A |
5815665 | Teper et al. | Sep 1998 | A |
5825876 | Peterson, Jr. | Oct 1998 | A |
5838812 | Pare, Jr. et al. | Nov 1998 | A |
5841871 | Pinkas et al. | Nov 1998 | A |
5856659 | Drupsteen et al. | Jan 1999 | A |
5870723 | Pare et al. | Feb 1999 | A |
5878138 | Yacobi | Mar 1999 | A |
5878139 | Rosen | Mar 1999 | A |
5878235 | Porterfield et al. | Mar 1999 | A |
5884271 | Pitroda | Mar 1999 | A |
5884272 | Walker et al. | Mar 1999 | A |
5887140 | Itsumi et al. | Mar 1999 | A |
5892900 | Ginter et al. | Apr 1999 | A |
5897622 | Blinn et al. | Apr 1999 | A |
5903721 | Sixtus | May 1999 | A |
5915022 | Robinson et al. | Jun 1999 | A |
5917913 | Wang | Jun 1999 | A |
5923016 | Fredregill et al. | Jul 1999 | A |
5926624 | Katz et al. | Jul 1999 | A |
5926798 | Carter | Jul 1999 | A |
5936220 | Hoshino et al. | Aug 1999 | A |
5943423 | Muftic | Aug 1999 | A |
5945652 | Ohki et al. | Aug 1999 | A |
5948040 | DeLorme et al. | Sep 1999 | A |
5949411 | Doerr et al. | Sep 1999 | A |
5956699 | Wong et al. | Sep 1999 | A |
5966704 | Furegati et al. | Oct 1999 | A |
5987134 | Shin et al. | Nov 1999 | A |
5990804 | Koyama | Nov 1999 | A |
6000832 | Franklin et al. | Dec 1999 | A |
6002770 | Tomko et al. | Dec 1999 | A |
6002787 | Takhar et al. | Dec 1999 | A |
6003014 | Lee et al. | Dec 1999 | A |
6006200 | Boies et al. | Dec 1999 | A |
6009415 | Shurling et al. | Dec 1999 | A |
6012039 | Hoffman et al. | Jan 2000 | A |
6014636 | Reeder | Jan 2000 | A |
6016476 | Maes et al. | Jan 2000 | A |
6018724 | Arent | Jan 2000 | A |
6021496 | Dutcher et al. | Feb 2000 | A |
6023679 | Acebo et al. | Feb 2000 | A |
6026491 | Hiles | Feb 2000 | A |
6029150 | Kravitz | Feb 2000 | A |
6035403 | Subbiah et al. | Mar 2000 | A |
6047268 | Bartoli et al. | Apr 2000 | A |
6047269 | Biffar | Apr 2000 | A |
6073124 | Krishnan et al. | Jun 2000 | A |
6076075 | Teicher | Jun 2000 | A |
6076167 | Borza | Jun 2000 | A |
6078891 | Riordan et al. | Jun 2000 | A |
6085178 | Bigus et al. | Jul 2000 | A |
6088731 | Kiraly et al. | Jul 2000 | A |
6105010 | Musgrave | Aug 2000 | A |
6108644 | Goldschlag et al. | Aug 2000 | A |
6119096 | Mann et al. | Sep 2000 | A |
6122737 | Bjorn et al. | Sep 2000 | A |
6128602 | Northington et al. | Oct 2000 | A |
6129274 | Suzuki | Oct 2000 | A |
6138911 | Fredregill et al. | Oct 2000 | A |
6141754 | Choy | Oct 2000 | A |
6148241 | Ludtke et al. | Nov 2000 | A |
6151600 | Dedrick | Nov 2000 | A |
6163772 | Kramer et al. | Dec 2000 | A |
6167517 | Gilchrist et al. | Dec 2000 | A |
3741214 | Smith | Jan 2001 | A |
6182076 | Yu et al. | Jan 2001 | B1 |
6226618 | Downs et al. | May 2001 | B1 |
6243689 | Norton | Jun 2001 | B1 |
6260021 | Wong et al. | Jul 2001 | B1 |
6263446 | Kausik et al. | Jul 2001 | B1 |
6269348 | Pare et al. | Jul 2001 | B1 |
6270011 | Gottfried | Aug 2001 | B1 |
6279112 | O'Toole et al. | Aug 2001 | B1 |
6282653 | Berstis et al. | Aug 2001 | B1 |
6289323 | Gordon et al. | Sep 2001 | B1 |
6310966 | Dulude et al. | Oct 2001 | B1 |
6314196 | Yamaguchi et al. | Nov 2001 | B1 |
6353811 | Weissman | Mar 2002 | B1 |
6356905 | Gershman et al. | Mar 2002 | B1 |
6366953 | Inoue | Apr 2002 | B2 |
6370629 | Hastings et al. | Apr 2002 | B1 |
6434535 | Kupka et al. | Aug 2002 | B1 |
6442692 | Zilberman | Aug 2002 | B1 |
6453301 | Niwa | Sep 2002 | B1 |
6487662 | Kharon et al. | Nov 2002 | B1 |
6502748 | Berg et al. | Jan 2003 | B2 |
6529885 | Johnson | Mar 2003 | B1 |
6556976 | Callen | Apr 2003 | B1 |
6560741 | Gerety et al. | May 2003 | B1 |
6574607 | Carter et al. | Jun 2003 | B1 |
6578014 | Murcko, Jr. | Jun 2003 | B1 |
6592044 | Wong et al. | Jul 2003 | B1 |
6615264 | Stoltz et al. | Sep 2003 | B1 |
6655585 | Shinn | Dec 2003 | B2 |
6662166 | Pare et al. | Dec 2003 | B2 |
6687390 | Avni et al. | Feb 2004 | B2 |
6695207 | Norris, Jr. | Feb 2004 | B1 |
6871287 | Ellingson | Mar 2005 | B1 |
6910132 | Bhattacharya | Jun 2005 | B1 |
6941462 | Tsukamura et al. | Sep 2005 | B1 |
6968453 | Doyle et al. | Nov 2005 | B2 |
7003495 | Burger et al. | Feb 2006 | B1 |
7124300 | Lemke | Oct 2006 | B1 |
7181297 | Pluvinage et al. | Feb 2007 | B1 |
7188110 | Ludtke et al. | Mar 2007 | B1 |
7251633 | Ludtke et al. | Jul 2007 | B2 |
7284266 | Morris et al. | Oct 2007 | B1 |
7565541 | Tarbouriech | Jul 2009 | B1 |
7613659 | Hoffman et al. | Nov 2009 | B1 |
20010044906 | Kanevsky et al. | Nov 2001 | A1 |
20010045458 | Polansky | Nov 2001 | A1 |
20010051996 | Cooper et al. | Dec 2001 | A1 |
20020123967 | Wang | Sep 2002 | A1 |
20020123971 | Maritzen et al. | Sep 2002 | A1 |
20020128980 | Ludtke et al. | Sep 2002 | A1 |
20020147914 | Arnold | Oct 2002 | A1 |
20020191816 | Maritzen et al. | Dec 2002 | A1 |
20040044627 | Russell et al. | Mar 2004 | A1 |
20040177097 | Yu et al. | Sep 2004 | A1 |
20040199469 | Barillova et al. | Oct 2004 | A1 |
Number | Date | Country |
---|---|---|
0917119 | May 1999 | EP |
0949595 | Oct 1999 | EP |
1 033 687 | Sep 2000 | EP |
1 085 424 | Mar 2001 | EP |
3060424 | Mar 1991 | JP |
9722857 | Feb 1997 | JP |
10240691 | Sep 1998 | JP |
11501423 | Feb 1999 | JP |
9978521 | Mar 1999 | JP |
11096363 | Apr 1999 | JP |
99164179 | Jun 1999 | JP |
11345266 | Dec 1999 | JP |
351799 | Feb 1999 | TW |
87107650 | Feb 1999 | TW |
WO-9513591 | May 1995 | WO |
9618162 | Jun 1996 | WO |
9908217 | Feb 1999 | WO |
WO 9906928 | Feb 1999 | WO |
9921321 | Apr 1999 | WO |
WO-0108055 | Feb 2001 | WO |
WO-0122351 | Mar 2001 | WO |
WO-0150428 | Jul 2001 | WO |
WO-0159732 | Aug 2001 | WO |
WO-2005033830 | Apr 2005 | WO |
Number | Date | Country | |
---|---|---|---|
20020188574 A1 | Dec 2002 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 09510811 | Feb 2000 | US |
Child | 10207529 | US |