Methods and systems for IC card application loading

Information

  • Patent Grant
  • 7523495
  • Patent Number
    7,523,495
  • Date Filed
    Thursday, April 19, 2007
    17 years ago
  • Date Issued
    Tuesday, April 21, 2009
    15 years ago
Abstract
Systems and methods are described that provide a new type of application load unit for use in the secure loading of applications and/or data onto integrated circuit cards or smart cards. Plaintext key transformation units can be created for each of a plurality of smart cards that are to be loaded with a desired or selected application. A plaintext key transformation unit may be individually encrypted using the public keys associated with target smart cards. An application provider can create one or more application load unit using known means and can then create one or more additional plaintext key transformation unit, one for each target smart card using corresponding public keys which can be obtained taken from a database of card public keys.
Description
BACKGROUND

1. Field of the Application


Generally, this application relates to smart card technology. More specifically, it relates to a systems and methods for smart card implementation of key encryption key—key transformation unit (“K2KTU”).


2. Description of the Related Art


Integrated circuit (“IC”) cards are becoming increasingly used for many different purposes in the world today. Typically, an IC card (also referred to herein as a smart card) is the size of a conventional credit card or debit card and contains one or more integrated circuits, which can be in the form of one or more computer chips, including, for example, a processing element, a read-only-memory (ROM) element, an electrically erasable programmable read only-memory (EEPROM) element, an input/output (I/O) mechanism and other circuitry as may be required to support the smart card in its operations. In addition to its native operating system, an IC card may contain a single application (e.g., a debit or credit application, a purse or electronic money application, an affinity or loyalty program application, and the like) or it may contain multiple independent applications in its memory. MULTOS™ is one example of an operating system that runs on smart cards, as well as other platforms, and allows multiple independent applications to be executed on a smart card. This allows a card user to run one or more of the multiple programs stored on the card regardless of the type of terminal (e.g., an ATM, an airport kiosk, a telephone, a point of sale (POS) device, and the like) into which the card may be inserted or swiped for use.


A conventional single application IC card, such as a telephone card or an electronic cash card, is loaded with a single application at its personalization stage. Typically, that single application cannot be modified or changed after the card is issued even if the modification is desired by the card user or card issuer. Moreover, if a card user wanted a variety of application functions to be performed, such as both an electronic purse and a credit/debit function, the card user would be required to carry multiple physical single application cards on his or her person, which would be quite cumbersome and inconvenient. Further, if an application developer or card user desired two different applications to interact or exchange data with each other, such as a purse application interacting with a frequent flyer loyalty application, the card user would be forced to swap multiple single application cards in and out of the card-receiving terminal, making the transaction difficult, lengthy and inconvenient.


Therefore, it would be beneficial to have the ability store multiple applications on the same IC card. For example, a card user may have both a purse application and a credit/debit application on the same card so that the user could select which type of payment (i.e., by electronic cash or credit card) to use when making a purchase. It would be further beneficial to provide multiple applications to an IC card, where sufficient memory existed and in which an operating system capable of supporting multiple applications was present on the card. Although multiple applications could be pre-selected and placed in the memory of the card during its production stage, it would also be beneficial to have the ability to load and delete applications for the card post-production as needed.


The increased flexibility and power of storing multiple applications on a single card create new challenges to be overcome concerning the integrity and security of the information (including application code and associated data) exchanged between the individual card and the application provider, as well as within the entire system when loading and deleting applications and associated data. It would be beneficial to have the capability in the IC card system to exchange data among cards, card issuers, system operators and application providers securely and to load and delete applications securely at any time from either a terminal or remotely over a telephone line, Internet or intranet connection or other wired or wireless data conduit. Because these data transmission lines are not typically secure lines, a number of security and entity-authentication techniques must be implemented to make sure that applications being sent over the transmission lines are only loaded on the intended cards.


However, typical processes used in the art today for securely transmitting data and/or applications to an IC card do not handle batch loading of the data and/or applications well because the information is targeted to an individual IC card using that IC card's public card. If a transmitting entity were desirous of populating multiple IC cards with the same data and/or application, an encrypted set of data would have to be created for each IC card separately. One example of this typical process is illustrated in commonly-owned U.S. Pat. No. 6,230,267, which is also fully incorporated herein for all purposes. Another example is illustrated in commonly-owned U.S. Pat. No. 6,632,888, which is also fully incorporated herein for all purposes.



FIG. 1 illustrates an example of a typical, secure application load process used in conjunction with the MULTOS™ IC card system. As shown in FIG. 1, an application load unit prime 10 is created to include an encrypted application load unit 100 using the application provider secret key (“AP_SK”) 11 in combination with a key transformation unit (“KTU”) prime 102. Typically the KTU prime 102 is created by performing a triple DES operation (i.e., key-encryption-key, key encryption key (“KEK”), operation) on the standard KTU using a transport key. The application load unit prime is then transmitted via typical methods to be loaded onto an IC card 18. However, prior to loading, the KTU prime 102 must be translated (i.e., decrypted) at 152 back to the regular KTU 154. This operation requires that a hardware security module (“HSM”) 15 be located locally at the personalization bureau. The HSM 15 communicates securely with the application provider to perform a secure key ceremony 14 whereby the KEK 12, 12′ transport key is exchanged. Once the HSM 15 has the transport key 12, it can translate the KTU prime 102 back to the regular KTU 154. Then, the regular application load unit can be used load the application to the target card.


However, typical processes used in the art today for securely transmitting data and/or applications to an IC card do not handle batch loading of the data and/or applications well because the information is targeted to an individual IC card using that IC card's public card. If a transmitting entity were desirous of populating multiple IC cards with the same data and/or application, an encrypted set of data would have to be created for each IC card separately. One example of this typical process is illustrated in commonly-owned U.S. Pat. No. 6,230,267, which is also fully incorporated herein for all purposes. Another example is illustrated in commonly-owned U.S. patent application Ser. No. 09/932,013, issued as U.S. Pat. No. 7,469,339, which is also fully incorporated herein for all purposes.





BRIEF DESCRIPTION OF THE DRAWINGS

Aspects and features of this application will become apparent to those ordinarily skilled in the art from the following detailed description of certain embodiments in conjunction with the accompanying drawings, wherein:



FIG. 1 illustrates an example of a typical, secure application load process used in conjunction with the MULTOS™ IC card system; and



FIG. 2 illustrates an example of a novel secure application load process used in conjunction with an IC card system according to certain embodiments.





DETAILED DESCRIPTION

Embodiments will now be described in detail with reference to the drawings, which are provided as illustrative examples of certain embodiments so as to enable those skilled in the art to practice the embodiments and are not meant to limit the scope of the application. Where aspects of certain embodiments can be partially or fully implemented using known components or steps, only those portions of such known components or steps that are necessary for an understanding of the embodiments will be described, and detailed description of other portions of such known components or steps will be omitted so as not to obscure the embodiments. Further, certain embodiments are intended to encompass presently known and future equivalents to the components referred to herein by way of illustration.


As used herein, the terms application provider and personalization bureau are used as a matter of convenience, for consistency and clarity. However, as will become evident to those skilled in the art, the functions of both can be performed at either one of the facilities or even at a completely different facility including, for example, at the card issuer. Such variations are accommodated in many embodiments and fall within the scope of the invention.


Certain embodiments propose a new type of application load unit (“ALU”) for use in the secure loading of applications and/or data onto IC cards (or smart cards). This new type of ALU, as discussed herein, will be referred to as a confidential ALU prime. In certain embodiments, the ALU prime can be created using combinations of conventional techniques augmented according to certain aspects of the invention. For example, the encrypted ALU can be combined with the KTU prime, which is an encrypted KTU using a KEK. In addition, a new component can also be created and combined in the ALU prime. This new component, as discussed herein, will be referred to as a card-specific KEK KTU (K2KTU). This new type of KTU is also a type of card-targeted KTU, but instead of the KTU containing the keys that were used to encrypt the ALU (as the regular KTU and KTU prime contain), the K2KTU contains the KEK used to create the KTU prime. In this way, no HSM will be necessary at the personalization facility.


In certain embodiments, one K2KTU can be created for each smart card to be loaded with a particular application; that is, the KEK may be individually encrypted under each Public Key of each target smart card. In certain embodiments, a KEK can be provided that is common to all KTU primes and an application provider may create a K2KTU for a plurality smart cards independent of related ALU primes. However, it will be appreciated that in certain embodiments, the KEK used should match and will typically remain constant over time although, in certain embodiments the KEK may be permitted to change on occasion.


In certain embodiments, to ensure the integrity of the K2KTU, the application provider can digitally sign each K2KTU using the same application provider secret key (AP_SK) that was used to create the application signature. This will ensure that only genuine K2KTUs are ultimately processed. This signature feature provides advantages including, for example, the ability to overcome one of the existing security weaknesses of the MULTOS™ application loading system whereby, in the current system, the regular KTUs (and thus the KTU primes) are not digitally signed by the application provider.



FIG. 2 illustrates an example of a novel secure application load process used in conjunction with an IC card system according to certain aspects of the invention. As shown in FIG. 2, an application provider can create one or more ALU primes 20 using the AP_SK 21 and KEK 22 as described above and as is currently performed. However, the application provider can then additionally create one or more K2KTUs 23, one for each target IC card 28 using the public key (MKD_PK) 240 of the target card 28, which can be obtained from storage 24 such as a database of card public keys that can be provided, for example, by a key management authority. The application provider can further digitally sign each K2KTU 23 using its AP_SK 21. Having secured the set of K2KTUs 23 for an application, the application provider can transmit the ALU primes 20 and the K2KTUs 23 to the personalization bureau via any secure or non-secure transmission means.


As shown in FIG. 2, at the personalization bureau, an ALU prime 25 can be selected for loading on a desired smart card 28. Based on the card ID (MCD_ID) 282, and, as applicable, an application ID, a correct K2KTU 262 can be selected from the one or more K2KTUs 260 created for that application. After loading the KTU prime 252 from the ALU prime 25 into the target IC card 28, the K2KTU 262 can be loaded. However, the order of these loads can be altered within the scope of certain embodiments. After load initiation (e.g., using a “CREATE MEL” command), the certificate can be checked and the AP_PK extracted. The application signature may then be checked. Following application signature check, the K2KTU signature can be verified using AP_PK. The K2KTU 262 can be decrypted using the smart card's secret key (MKD_SK). Then the K2KTU 262 can be checked to ensure that this particular ALU is intended for the desired IC card 28. Finally, the regular KTU can be decrypted using the KEK 22 contained within K2KTU 262. Once the regular KTU is translated from the KTU prime 25 using the KEK 22, application load proceeds as normal.


In certain embodiments, no HSM need be present at the location of the card application terminal (i.e., no key ceremony is required) when the K2KTU component is used. Further, the application provider can create multiple K2KTUs 23 for an application or create multiple sets of K2KTUs 23 for an associated set of multiple applications and distribute the one or more confidential ALU primes 20 to a personalization bureau for more efficient batch processing of multiple IC cards. For a particular application (e.g., based on an applications ID) and a particular card (i.e., based on the card's ID), the proper K2KTU can be selected from the proper set of K2KTUs (i.e., where each set of K2KTUs can be representative of a particular application, and each member K2KTU within a set is associated with a particular card to receive that application).


Additional Descriptions of Certain Aspects of the Invention


Certain embodiments of the invention provide methods for securely loading an application, comprising the steps of maintaining a plurality of cryptographic keys in an electronically addressable device, communicating one or more applications to the device, the one or more applications encrypted using cryptographic keys provided in a first plaintext key transformation unit, the first plaintext key transformation unit being encrypted using a common key, wherein the common key and the one or more applications are furnished by a provider and the common key is common to a plurality of devices, and communicating the common key to the device in a second plaintext key transformation unit, the second plaintext key transformation unit being encrypted using one or more device-specific transport keys. In some of these embodiments, each of the communicating the one or more applications and the communicating the common key is secured using selected ones of the plurality of cryptographic keys including a provider-specific key. In some of these embodiments, the plurality of cryptographic keys includes a device-specific public transport key. In some of these embodiments, the common key is communicated to the device upon verification of the device-specific public transport key by a key management authority.


In some of these embodiments, the plurality of cryptographic keys includes a device-specific secret transport key operative to extract the common key from the second plaintext key transformation unit. In some of these embodiments, the plurality of cryptographic keys includes the common key and wherein the second plaintext key transformation unit is digitally signed using a secret key of the provider. In some of these embodiments, the communicating includes communicating one or more of the plurality of cryptographic keys to the provider, the one or more cryptographic keys including a device-specific public transport key, and identifying the device to the provider. In some of these embodiments, the device is one of a plurality of devices and further comprising the steps of encrypting each of the one or more applications using keys associated with the each application, encrypting the first plaintext key transformation unit using the common key, the plaintext key transformation unit including the associated keys and corresponding application-specific information, and for each of the plurality of devices, encrypting second plaintext key transformation units using public transport keys associated with each of the plurality of devices, the second plaintext key transformation units including the common key, information specific to the each application and device-specific information, and digitally signing each second key transformation unit using a private key of the provider.


In some of these embodiments, the second plaintext key transformation units are encrypted using symmetric encryption. In some of these embodiments, the symmetric encryption is Triple DES. In some of these embodiments, the symmetric encryption is AES. In some of these embodiments, the plurality of cryptographic keys includes keys associated with the plurality of devices. In some of these embodiments, the device-specific secret key and the device-specific public key are provided using an asymmetric technique. In some of these embodiments, the asymmetric technique is RSA. In some of these embodiments, the plurality of cryptographic keys includes certified public and secret keys furnished by a certification authority, and further comprising the steps of encrypting a provider-specific public key using a certified secret key to obtain a provider-specific public key certificate, signing the encrypted application using a provider-specific secret key to obtain a digital signature, and signing the second key transformation unit using the provider-specific secret key to obtain a digital signature. In some of these embodiments, the step of verifying the provider-specific public key certificate with the certified public key.


In some of these embodiments, the method also comprises deriving the provider-specific public key from a decrypted public key certificate associated with the provider, and verifying the digital signatures of the application and second key transformation unit based on the derived provider-specific public key. In some of these embodiments, the decrypted public key certificate contains application-specific information. In some of these embodiments, the method also comprises decrypting the verified second plaintext key transformation unit using a verified device-specific private transport key, and verifying the resultant first plaintext key transformation unit is intended for the device, the verifying including comparing the identity of the device with a device identification in the first plaintext key transformation unit, confirming that the plurality of cryptographic keys includes the common key, decrypting the first plaintext key transformation unit associated with the application using the first key, associating the first plaintext key transformation unit with the decrypted second plaintext key transformation unit, and decrypting the application using the plurality of keys contained within the first plaintext key transformation unit.


In some of these embodiments, a device is employed that comprises a computing device and storage, the device configured to receive an encrypted application, wherein the storage maintains a plurality of cryptographic keys including a device-specific private transport key and a common key and the computing device is configured to decrypt the encrypted application using the device-specific private transport key and the common key. In some of these embodiments, the encrypted application is encrypted using cryptographic keys provided in a first plaintext key transformation unit, the first plaintext key transformation unit being encrypted using the common key, wherein the common key and the one or more applications are furnished by a provider. In some of these embodiments, the common key is provided to the device in a second plaintext key transformation unit, the second plaintext key transformation unit being encrypted using one or more device-specific transport keys. In some of these embodiments, the encrypted application and the common key are provided to the device using selected ones of the plurality of cryptographic keys including a provider-specific key to secure communication of the encrypted application and the common key.


In some of these embodiments, a method for secure application loading of an application to electronically addressable devices is provided. The method may comprise the steps of maintaining a plurality of cryptographic keys within the device, providing the device with one or more applications, encrypted using a plurality of cryptographic keys within a plaintext key transformation unit and said plaintext key transformation unit being encrypted using a non-device-specific key, each application and non-device-specific key being furnished by a provider, providing the device with the non-device-specific key within a plaintext key transformation unit, encrypted using a device-specific transport key resulting in the key-encryption-key key transformation unit. In some of these embodiments, the communication of the application and non-device-specific key are secured using selected ones of the plurality of cryptographic keys, including a provider-specific key associated with a provider.


In some of these embodiments, the method may further comprise encrypting a plurality of applications intended for different devices using a plurality of keys, formatting the plurality of keys and application-specific information into a plaintext key transformation unit and encrypting said key transformation unit using a single non-device-specific key, formatting the non-device-specific key, application-specific information and device-specific information into a plaintext key transformation unit and encrypting said key transformation unit using each of the device-specific public transport keys of the plurality of devices resulting in the key-encryption-key key transformation units, digitally signing each key-encryption-key key transformation unit using a provider private key.


Although the application has been particularly described with reference to embodiments thereof, it should be readily apparent to those of ordinary skill in the art that various changes, modifications, substitutes and deletions are intended within the form and details thereof, without departing from the spirit and scope of the application. Accordingly, it will be appreciated that in numerous instances some features of certain embodiments will be employed without a corresponding use of other features. Further, those skilled in the art will understand that variations can be made in the number and arrangement of inventive elements illustrated and described in the above figures. It is intended that the scope of the appended claims include such changes and modifications.

Claims
  • 1. A method for securely loading an application, comprising the steps of: communicating at least one application load unit, said application load unit comprising the application and security data for authentication and protection of code and data associated with the application, to a selected one of a plurality of devices, the at least one application load unit being encrypted using cryptographic keys provided in a first plaintext key transformation unit, the first plaintext key transformation unit being encrypted using a common key, wherein the common key and at least one application load unit are furnished by an application provider and the common key is common to the plurality of devices; andcommunicating the common key to the selected device in a second plaintext key transformation unit, the second plaintext key transformation unit being encrypted using a public key of said selected device, wherein each of the step of communicating at least one application load unit and the step of communicating the common key is secured using a secret key of the application provider.
  • 2. A method according to claim 1, wherein the step of communicating the common key to the selected device is preceded by a step of verifying the public key of said selected device by a key management authority.
  • 3. A method according to claim 1, wherein the second plaintext key transformation units are encrypted using symmetric encryption.
  • 4. A method according to claim 3, wherein the symmetric encryption is Triple DES.
  • 5. A method according to claim 3, wherein the symmetric encryption is AES.
  • 6. A method according to claim 1, wherein the device-specific secret key and the device-specific public key are provided using an asymmetric technique.
  • 7. A method according to claim 6, wherein the asymmetric technique is RSA.
  • 8. A method according to claim 1, wherein the cryptographic keys comprise certified public and secret keys furnished by a certification authority, and further comprising the steps of: encrypting a public key of the application provider using a certified secret key to obtain a provider-specific public key certificate; signing the encrypted application load unit using the secret key of the application provider to obtain a digital signature; andsigning the second key transformation unit using the secret key of the application provider to obtain a digital signature.
  • 9. A method according to claim 8, and further comprising the step of verifying the provider-specific public key certificate with a certified public key.
  • 10. A method according to claim 9, and further comprising the steps of: deriving the public key of the application provider from a decrypted public key certificate associated with the application provider; andverifying the digital signatures of the application and second plaintext key transformation unit based on the derived public key.
  • 11. A method according to claim 10, wherein the decrypted public key certificate contains application-specific information.
  • 12. A method according to claim 10, and further comprising the steps of: decrypting the verified second plaintext key transformation unit using a verified secret key of said selected device; andverifying the first plaintext key transformation unit is intended for the selected device, the verifying comprising comparing the identity of the selected device with a device identification in the first plaintext key transformation unit,confirming that a plurality of cryptographic keys stored on the selected device includes the common key,decrypting the first plaintext key transformation unit associated with the application using the common key,associating the first plaintext key transformation unit with the decrypted second plaintext key transformation unit, anddecrypting the application using the cryptographic keys provided in the first plaintext key transformation unit.
  • 13. A device comprising a computing device and storage, the device configured to receive an encrypted application load unit, said application load unit comprising an application and security data for authentication and protection of code and data associated with the application, wherein: the storage maintains a plurality of cryptographic keys including a secret key of said device and a common key; and the computing device is configured to decrypt the encrypted application load unit using the secret key and the common key, wherein:the encrypted application load unit is encrypted using cryptographic keys provided in a first plaintext key transformation unit, the first plaintext key transformation unit being encrypted using the common key, wherein the common key and the one or more applications are furnished by an application provider; the common key is provided to the device in a second plaintext key transformation unit, the second plaintext key transformation unit being encrypted using a public key of the device; and the encrypted application and the common key are provided to the device using a secret key of the application provider.
CLAIM OF PRIORITY

This application claims priority to and incorporates by reference herein U.S. Provisional Application Ser. No. 60/793,543 filed Apr. 19, 2006 entitled “Methods and Systems for IC Card Application Loading.”

US Referenced Citations (175)
Number Name Date Kind
4214230 Fak et al. Jul 1980 A
4218582 Hellman et al. Aug 1980 A
4259720 Campbell Mar 1981 A
4302810 Bouricius et al. Nov 1981 A
4305059 Benton Dec 1981 A
4321672 Braun et al. Mar 1982 A
4341951 Benton Jul 1982 A
4405829 Rivest et al. Sep 1983 A
4408203 Campbell Oct 1983 A
4423287 Zeidler Dec 1983 A
4442345 Mollier et al. Apr 1984 A
4453074 Weinstein Jun 1984 A
4467139 Mollier Aug 1984 A
4498000 Decavele et al. Feb 1985 A
4536647 Atalla et al. Aug 1985 A
4578530 Zeidler Mar 1986 A
4605820 Campbell, Jr. Aug 1986 A
4629872 Hällberg Dec 1986 A
4630201 White Dec 1986 A
4650978 Hudson et al. Mar 1987 A
4669596 Capers et al. Jun 1987 A
4705211 Honda et al. Nov 1987 A
4709136 Watanabe Nov 1987 A
4709137 Yoshida Nov 1987 A
4727243 Savar Feb 1988 A
4727244 Nakano et al. Feb 1988 A
4731842 Smith Mar 1988 A
4734568 Watanabe Mar 1988 A
4736094 Yoshida Apr 1988 A
4742215 Daughters et al. May 1988 A
4745267 Davis et al. May 1988 A
4746788 Kawana May 1988 A
4748557 Tamada et al. May 1988 A
4748668 Shamir et al. May 1988 A
4752677 Nakano et al. Jun 1988 A
4757185 Onishi Jul 1988 A
4757543 Tamada et al. Jul 1988 A
4759063 Chaum Jul 1988 A
4759064 Chaum Jul 1988 A
4767920 Kitta et al. Aug 1988 A
4778983 Ushikubo Oct 1988 A
4785166 Kushima Nov 1988 A
4786790 Kruse et al. Nov 1988 A
4797542 Hara Jan 1989 A
4797920 Stein Jan 1989 A
4798941 Watanabe Jan 1989 A
4802218 Wright et al. Jan 1989 A
4803347 Sugahara et al. Feb 1989 A
4811393 Hazard Mar 1989 A
4816653 Anderl et al. Mar 1989 A
4816654 Anderl et al. Mar 1989 A
4825052 Chemin et al. Apr 1989 A
4831245 Ogasawara May 1989 A
4833595 Iijima May 1989 A
4839504 Nakano Jun 1989 A
4839792 Iijima Jun 1989 A
4849614 Watanabe et al. Jul 1989 A
4853522 Ogasawara Aug 1989 A
4853961 Pastor Aug 1989 A
4874935 Younger Oct 1989 A
4877945 Fujisaki Oct 1989 A
4877947 Mori Oct 1989 A
4879747 Leighton et al. Nov 1989 A
4882474 Anderl et al. Nov 1989 A
4887234 Iijima Dec 1989 A
4891503 Jewell Jan 1990 A
4891506 Yoshimatsu Jan 1990 A
4900904 Wright et al. Feb 1990 A
4901276 Iijima Feb 1990 A
4906828 Halpern Mar 1990 A
4907270 Hazard Mar 1990 A
4926480 Chaum May 1990 A
4935962 Austin Jun 1990 A
4949257 Orbach Aug 1990 A
4961142 Elliott et al. Oct 1990 A
4969188 Schöbi Nov 1990 A
4977595 Ohta et al. Dec 1990 A
4984270 LaBounty Jan 1991 A
4985615 Iijima Jan 1991 A
4987593 Chaum Jan 1991 A
4993068 Piosenka et al. Feb 1991 A
4995081 Leighton et al. Feb 1991 A
4996711 Chaum Feb 1991 A
5001753 Davio et al. Mar 1991 A
5003594 Shinagawa Mar 1991 A
5005200 Fischer Apr 1991 A
5010239 Mita Apr 1991 A
5012074 Masada Apr 1991 A
5012076 Yoshida Apr 1991 A
5014312 Lisimaque et al. May 1991 A
5016274 Micali et al. May 1991 A
5038025 Kodera Aug 1991 A
5068894 Hoppe Nov 1991 A
5093862 Scwartz Mar 1992 A
5097115 Ogasawara et al. Mar 1992 A
5120939 Claus et al. Jun 1992 A
5128997 Pailles et al. Jul 1992 A
5131038 Puhl et al. Jul 1992 A
5142578 Matyas et al. Aug 1992 A
5146499 Geffrotin Sep 1992 A
5148481 Abraham et al. Sep 1992 A
5161231 Iijima Nov 1992 A
5162989 Matsuda Nov 1992 A
5163098 Dahbura Nov 1992 A
5164988 Matyas et al. Nov 1992 A
5165043 Miyahara et al. Nov 1992 A
5166503 Mizuta Nov 1992 A
5175416 Mansvelt et al. Dec 1992 A
5180901 Hiramatsu Jan 1993 A
5191193 Le Roux Mar 1993 A
5191608 Geronimi Mar 1993 A
5200999 Matyas et al. Apr 1993 A
5201000 Matyas et al. Apr 1993 A
5202922 Iijima Apr 1993 A
5214702 Fischer May 1993 A
5224162 Okamoto et al. Jun 1993 A
5243175 Kato Sep 1993 A
5247578 Pailles et al. Sep 1993 A
5293577 Hueske et al. Mar 1994 A
5371797 Bocinsky, Jr. Dec 1994 A
5378884 Lundstrom et al. Jan 1995 A
5420405 Chasek May 1995 A
5452431 Bournas Sep 1995 A
5473690 Grimonprez et al. Dec 1995 A
5485520 Chaum et al. Jan 1996 A
5511121 Yacobi Apr 1996 A
5517011 Vandenengel May 1996 A
5530232 Taylor Jun 1996 A
5534857 Laing et al. Jul 1996 A
5539825 Akiyama et al. Jul 1996 A
5542081 Geronimi Jul 1996 A
5544246 Mandelbaum et al. Aug 1996 A
5546523 Gatto Aug 1996 A
5557516 Hogan Sep 1996 A
5574269 Mori et al. Nov 1996 A
5578808 Taylor Nov 1996 A
5581708 Iijima Dec 1996 A
5588146 Leroux Dec 1996 A
5682027 Bertina et al. Oct 1997 A
5692132 Hogan Nov 1997 A
5699528 Hogan Dec 1997 A
5704046 Hogan Dec 1997 A
5705798 Tarbox Jan 1998 A
5708780 Levergood et al. Jan 1998 A
5715314 Payne et al. Feb 1998 A
5724424 Gifford Mar 1998 A
5796831 Paradinas et al. Aug 1998 A
5825875 Ugon Oct 1998 A
5841870 Fieres et al. Nov 1998 A
5844218 Kawan et al. Dec 1998 A
5889941 Tushie et al. Mar 1999 A
5923844 Peyret et al. Jul 1999 A
6005942 Chan et al. Dec 1999 A
6038551 Barlow et al. Mar 2000 A
6230267 Richards et al. May 2001 B1
6233683 Chan et al. May 2001 B1
6317832 Everett et al. Nov 2001 B1
6385723 Richards May 2002 B1
6488211 Everett et al. Dec 2002 B1
6575372 Everett et al. Jun 2003 B1
6659354 Everett et al. Dec 2003 B2
6742715 Everett et al. Jun 2004 B2
7469339 Everett et al. Dec 2008 B2
20020062451 Scheidt et al. May 2002 A1
20070143616 Everett et al. Jun 2007 A1
20070180276 Everett et al. Aug 2007 A1
20070255955 Everett et al. Nov 2007 A1
20080005567 Johnson Jan 2008 A1
20080010470 McKeon et al. Jan 2008 A1
20080052515 Everett et al. Feb 2008 A1
20080059812 Everett et al. Mar 2008 A1
20080091956 Everett et al. Apr 2008 A1
20080091957 Everett et al. Apr 2008 A1
20080091958 Everett et al. Apr 2008 A1
20080137842 Everett et al. Jun 2008 A1
Foreign Referenced Citations (37)
Number Date Country
0 152 024 Aug 1985 EP
0 157 303 Oct 1985 EP
0 190 733 Aug 1986 EP
0 218 176 Apr 1987 EP
0 261 030 Mar 1988 EP
0 275 510 Jul 1988 EP
0 292 248 Nov 1988 EP
0 328 289 Aug 1989 EP
0 354 793 Feb 1990 EP
0 451 936 Oct 1991 EP
0 537 756 Apr 1993 EP
0 547 741 Jun 1993 EP
0 559 205 Sep 1993 EP
0 588 339 Mar 1994 EP
0 636 998 Feb 1995 EP
0 647 902 Apr 1995 EP
0 666 550 Aug 1995 EP
0 751 460 Jan 1997 EP
2 536 928 Jun 1984 FR
2 284 689 Jun 1995 GB
2592856 Mar 1997 JP
WO 8707062 Nov 1987 WO
WO 8809019 Nov 1988 WO
WO 9005960 May 1990 WO
WO 9101538 Feb 1991 WO
WO 9116691 Oct 1991 WO
WO 9213322 Aug 1992 WO
WO 9320538 Oct 1993 WO
WO 9321612 Oct 1993 WO
WO 9522810 Aug 1995 WO
WO 9619771 Jun 1996 WO
WO 9628795 Sep 1996 WO
WO 9638825 Dec 1996 WO
WO 9843212 Oct 1998 WO
WO 9910824 Mar 1999 WO
WO 9916031 Apr 1999 WO
WO 9916031 Apr 1999 WO
Related Publications (1)
Number Date Country
20080005559 A1 Jan 2008 US
Provisional Applications (1)
Number Date Country
60793543 Apr 2006 US