Methods and systems for peripheral accounting

Information

  • Patent Grant
  • 8428484
  • Patent Number
    8,428,484
  • Date Filed
    Friday, March 4, 2005
    19 years ago
  • Date Issued
    Tuesday, April 23, 2013
    11 years ago
Abstract
Embodiments of the present invention comprise systems, methods and devices for providing external accounting functions for a peripheral device.
Description
BACKGROUND OF THE INVENTION

Imaging devices such as printers, copiers, scanners and fax machines can have a wide array of functions and capabilities to fit specific uses or combinations of uses. Imaging devices often take the form of a multi-function peripheral device (MFP) that combines the functions of two or more of the traditionally separated imaging devices. An MFP may combine any number of imaging devices, but typically comprises the functions of a printer, scanner, copier and fax machine.


Some imaging devices may contain computing resources for data storage and processing such as processors, hard disk drives, memory and other devices. As imaging devices add more features and functions, they become more costly and complex.


More complex imaging devices and MFPs may comprise network connectivity to provide communication with other computing devices, such as personal computers, other imaging devices, network servers and other apparatus. This connectivity allows the imaging device to utilize off-board resources that are available on a connected network.


Imaging devices typically have a user input panel with an array of buttons, knobs and other user input devices. Some devices also have a display panel, which can be for display only or can be a touch panel display that enables user input directly on the display.


Devices with touch panel displays or displays with buttons arranged in cooperation with the display can display menu data that may be selected by user input. This menu data is typically driven by an on-board server module within the imaging device.


BRIEF SUMMARY OF THE INVENTION

Embodiments of the present invention comprise systems, methods and devices for interacting with a remote computing device from an imaging device. These embodiments comprise remote computing devices configured to communicate with imaging devices, imaging devices configured to communicate with remote computing devices and systems comprising various combinations of remote computing devices in communication with imaging devices.


The foregoing and other objectives, features, and advantages of the invention will be more readily understood upon consideration of the following detailed description of the invention taken in conjunction with the accompanying drawings.





BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS


FIG. 1 is a diagram of an embodiment of the present invention comprising an imaging device in connection with a remote computing device;



FIG. 2 is an image of an exemplary user interface for an imaging device;



FIG. 3 shows an exemplary imaging device;



FIG. 4 is a chart depicting steps of an imaging device method;



FIG. 5 is a chart depicting steps of an imaging device method using a markup language;



FIG. 6 shows an exemplary remote computing device embodiment;



FIG. 7 is a diagram showing components of an exemplary remote computing device;



FIG. 8 is a chart showing steps of a remote computing device method;



FIG. 9 is a chart showing steps of a remote computing device method using a markup language;



FIG. 10 is a diagram showing a system comprising multiple imaging devices in connection with a remote computing device;



FIG. 11 is a chart showing steps of a method that may be employed by the system depicted in FIG. 10;



FIG. 12 is a diagram showing components of some embodiments comprising multiple RCDs and linked resources;



FIG. 13 is a diagram showing embodiments comprising external accounting for a native walk up job;



FIG. 14 is a diagram showing embodiments comprising external accounting and external security for a native walk up job;



FIG. 15A is a diagram showing embodiments comprising external accounting for a walk up job wherein a remote application provides job functionality;



FIG. 15B is a continuation of the diagram of FIG. 15A;



FIG. 16 is a diagram showing embodiments comprising external accounting for an exemplary scan job originating on an RCD;



FIG. 17 is a diagram showing an extension of other embodiments to allow for additional jobs without re-authenticating a user; and



FIG. 18 is a diagram showing an exemplary print job originating on an RCD and employing external accounting and security.





DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

Embodiments of the present invention will be best understood by reference to the drawings, wherein like parts are designated by like numerals throughout. The figures listed above are expressly incorporated as part of this detailed description.


It will be readily understood that the components of the present invention, as generally described and illustrated in the figures herein, could be arranged and designed in a wide variety of different configurations. Thus, the following more detailed description of the embodiments of the methods and systems of the present invention is not intended to limit the scope of the invention but it is merely representative of the presently preferred embodiments of the invention.


Elements of embodiments of the present invention may be embodied in hardware, firmware and/or software. While exemplary embodiments revealed herein may only describe one of these forms, it is to be understood that one skilled in the art would be able to effectuate these elements in any of these forms while resting within the scope of the present invention.


Embodiments of the present invention comprise interfaces and architecture that integrate imaging devices with remote computing device applications and environments to provide solutions that may not be possible solely with an imaging device alone. Some embodiments comprise an infrastructure and set of interfaces that allow applications on a network to programmatically control imaging device functions and interact with a user through an imaging device input panel. Software functions that are not practical within the imaging device can be performed on the server but are accessible from the imaging device.


For the purposes of this specification and claims, an imaging device (IDev) may be described as a device that performs an imaging function. Imaging functions comprise scanning, printing, copying, image transmission (sending and receiving), image conversion and other functions. Exemplary imaging devices comprise printers, copiers, facsimile machines, scanners, computing devices that transmit, convert or process images and other devices. An IDev may also perform multiple imaging functions. For example, and not by way of limitation, a multi-function peripheral device (MFP), which typically has the capability to perform a plurality of functions comprising a printer, scanner, copier and/or a facsimile machine or image transmitter/receiver, is a type of imaging device. Other MFP imaging devices may comprise other combinations of functions and still qualify as an IDev.


For the purposes of this specification and claims, a remote computing device (RCD) is a device capable of processing data and communicating with other devices through a communications link. An RCD is a remote device because it requires a communications link, such as a network connection, a telephone line, a serial cable or some other wired or wireless link to communicate with other devices such as an imaging device. Some exemplary RCDs are network servers, networked computers and other processing and storage devices that have communications links.


Some embodiments of the present invention may be described with reference to FIGS. 1 & 2. These embodiments comprise an imaging device (IDev) 4 that may be a multi-function peripheral device (MFP) or a single function device. The imaging device 4 further comprises a user interface (UI) panel 2, which may comprise input buttons 14 and a display device 12 or may comprise a touch panel system with or without buttons 14. User input and display may also be performed through a separate UI device 8, which may be connected to the imaging device 4 by a communication link 12, such as a USB connection, a network cable, a wireless connection or some other communications link. UI device 8 may comprise an input device, such as a keyboard or buttons as well as a display device, which may also be a touch screen panel. UI device 8 may also comprise an interface for transfer of instructions that are input to the device 8 from a remote input device. This form of UI device 8 may comprise memory sticks, USB memory cards and other storage devices that may be configured to store input for transfer to an imaging device.


These embodiments further comprise a remote computing device (RCD) 6 that is linked to the imaging device 4 via a communications link 10, such as a network connection. This network connection may be a typical wired connection or a wireless link.


Embodiments of the present invention may provide menu data from the RCD 6 to the imaging device UI panel 2 or remote panel 8 via the network connection 10. Once this menu data is fed to the imaging device 4, an UI panel 2, 8 on the imaging device 4 may be used to interact with applications that run on the remote computing device 6. User input received from UI panels 2, 8 may be returned directly to the remote computing device 6.


A Web Service is a software application identified by a Uniform Resource Identifier (URI), whose interfaces and binding are capable of being defined, described and discovered by Extensible Markup Language (XML) artifacts and supports direct interactions with other software applications using XML based messages via Internet-based protocols.


An application on the remote computing device 6 may use one or more Web Services to control various features in the imaging device 4, such as enabling, disabling or setting device values or controlling device functions.


Embodiments of the present invention allow network applications running on remote computing devices to interact with the user of the imaging device through the imaging device I/O panel. These embodiments allow imaging device user interface (UI) control (i.e., touch panel, button/display) by applications. Some embodiments may also integrate custom display screens or menus with the native imaging device UI. Embodiments may hand off control of imaging device functions between standard operation modes performed on the imaging device in response to user input to an imaging device UI and open systems modes that utilize network resources, such as applications on RCDs, through user input at the imaging device UI.


Embodiments of the present invention comprise network-based applications that have full control over the imaging device UI to display text and graphics in any format. In these embodiments, the application can programmatically display buttons, textboxes, graphics, etc. in any layout desired.


In some embodiments, the UI layout is easy to program using a standard language, such as a markup language. These languages comprise Hypertext Markup Language (HTML), Extensible Markup Language (XML), Wireless Markup Language (WML), Extensible Hypertext Markup Language (XHTML) and other languages.


In some embodiments of the present invention a remote computing device application or server application is able to request a keyboard UI to be displayed on the imaging device display 12, 8. In some embodiments, this functionality is available on the imaging device and does not need to be recreated by remote computing device applications. In some embodiments, the remote computing device may define the keyboard prompt and default values. These embodiments may comprise a remote computing device that is able to rename imaging device UI buttons, such as the OK and Cancel buttons as well as define additional buttons.


In some embodiments, menu templates may be served to the imaging device UI by the imaging device itself 4 or from a remote computing device 6.


External Authorization Application


Some embodiments of the present invention may comprise a remote computing device application that is registered as the External Authorization server. The External Authorization application may control access to the imaging device and may have top-level control of the UI. UI control may be given to this application in the same manner that control is given to an internal auditor.


In these embodiments, when an imaging device system boots, it checks to see if an External Authorization application is registered. If so, the imaging device is placed in disabled mode and the application is contacted to take control of the UI. If the External Authorization server is not available, an error message may be displayed and the device may remain disabled. The imaging device may periodically try to contact the External Authorization server until it is available. Table 1 below describes what entity has control of the UI, in an exemplary embodiment, when the device is in a disabled state.









TABLE 1







UI Control in Disabled State









Button Press
UI Control
Indicator Lights





Device boots
External Application
None


Document Filing
External Application
None


Image Send
External Application
None


Copy
External Application
None


Job Status
Device - standard Job Status
Job Status



screens


Custom Settings
Device - standard Custom Settings
N/A



screens


OS Mode
Not available when device is



disabled










Remote Computing Device Applications


In embodiments of the present invention, access to the custom UI panels of imaging devices may vary from application to application. Some solutions, such as Document Management integration, may wish to leverage the native Image Send screens, but display some custom UI's to gather additional information about a scan job. Other solutions, like custom printing applications, may be accessed from a separate mode than the native functions.


In order to accommodate the diversified needs of these solutions applications, embodiments may support multiple integration points for UI control. These integration points are based on a user action (“trigger”) for which applications may register. In some embodiments, applications may be registered with target devices so that the device knows that when “trigger A” occurs on the front panel to contact “remote computing device B” for instructions. In exemplary embodiments, applications may be integrated with an imaging device at any of several “trigger” points.


Remote computing devices may be registered to a specific function and contacted when that function's hardware key is pressed (e.g. Image Send) on the imaging device UI. Any UI information provided by the remote computing device may be displayed instead of the standard function screens native to the imaging device. This trigger may be used for applications that wish to replace the existing functions with completely custom UI's, such as an alternative scan solution or a specialized display, such as a “Section 508” compatible screen or other specialized-need interface that may have large buttons or other accommodations.


In some embodiments, each function on the imaging device may have a menu on the touch screen that remote computing devices, such as servers, can register. This enables solutions applications to provide custom content and still use some of the standard functionality provided by the imaging device. When a button assigned to a custom application is selected, a menu will be displayed with the solutions registered to that function. Users may select the desired solution and the remote computing device will be contacted for instructions.


In some embodiments, a stand-alone RCD mode that provides remote computing device application access can be accessed from the job queue portion of the UI that is displayed on every screen. This trigger point may be used for applications that do not fit within one of the standard device functions, such as custom printing solutions on an imaging device. When the RCD menu is selected, a menu will be displayed with the solutions applications registered to the generic RCD mode. Users will select the desired solution and the remote computing device will be contacted for instructions.


Hardware Key Interaction


In some embodiments of the present invention, when an imaging device is enabled, additional hardware keys may be used to manage the device. Hardware key assignments for an exemplary embodiment are shown in table 2.









TABLE 2







Exemplary Hardware Key Assignments









Button Press
Standard IDev Mode
RCD Mode





Mode keys (Copy,
Clear current job
Clear current job settings,


Doc Filing, Image
settings, move to
move to target screen


Send) and Custom
target screen


Settings key


Job Status key
Move to Job Status,
Move to Job Status,



maintain current
maintain current settings &



settings & UI location
UI location


Clear (C)
Clears settings
Sends clear event to




external application


Clear All (CA)
Clears settings, cancels
Cancels job and returns to



job, and returns to
default IDev screen



default IDev screen
(notification sent to external




application)




**When External




Authorization is controlling




the UI, only notification is




sent


Start
Initiates scan function
Initiates scan function


Number keys
Input for copy count or
Not used



fax numbers


*
Logs user out (disable
Logs user out (disable



device and contact
device and contact External



External Authorization
Authorization for screens)



for screens)









In some embodiments, in addition to the * key for logout, a timeout period may be implemented. Some embodiments also comprise an auto clear setting that can be configured for a given period of time, such as 10 to 240 seconds (or disabled). In these embodiments, when there is no activity for the time configured in auto clear, the device may automatically return to disabled mode and attempt to contact a remote computing device to retake control of the UI.


Error & Jam Notification


Depending on a particular solution, a remote computing device application may have full or only partial control of the imaging device UI and a particular imaging job. In some embodiments, partial control may include cases where a remote computing device is monitoring clicks, but native modes are responsible for the UI interaction and controlling the job. Partial control may also include cases where the remote computing device application is integrated with a native mode (UI trigger=function custom menu). In these embodiments, the imaging device may handle all error and jam notifications with only a notification sent to the relevant remote computing device application.


For some embodiments, in cases where the remote computing device application has full control over the UI and the job, error and jam notifications may be handled differently depending on the type of error. For recoverable errors, a notification may be sent to the remote computing device application and the application may be responsible for displaying messages and resolving the error. For non-recoverable errors, the imaging device and RCD mode may interact to gracefully handle the error condition (e.g. provide user with instructions for clearing jam).


Control Handoffs


In some embodiments, at different points throughout an imaging job, several applications may need control over an imaging device including, but not limited to, an External Authorization application, a standard RCD application, an imaging device native mode and other applications. The following section describes, for an exemplary embodiment, the various steps in an exemplary job, the entities that may have control during each step, and what type of control may be allowed.


STEP 1: User provides credentials to access the device at the device UI. This step may be controlled by a remote computing device, such as an External Authorization application or by Internal Accounting (native mode) in the imaging device itself. At the end of this step, the device is enabled. The External Authorization application may also specify default parameters or disable specific job parameters (e.g. default file format is PDF, but user may change; color mode is set to B/W and user may not change).


STEP 2: User sets parameters for the job using one of the native imaging device modes or a standard RCD application. At the end of this step the user makes an input to initiate the job. When the input is made, an optional notification may be sent to the standard RCD application, which can then change job parameters if desired. An e-mail application is one example of an application that may request notification when the user input is made. A user may use native Image Send screens or other input to select scan options and choose e-mail recipients. A user may then select a custom application button and choose the scan-to-e-mail option from the menu. The e-mail application may then display custom screens for the user to set permissions for the file. Once a user places the original document(s) on the scanner and initiates the process, the e-mail application may capture the destination parameters set by the user and change the target destination to the e-mail application FTP server. The e-mail application may then receive the file, apply the appropriate permissions, and send to the e-mail recipients selected by the user. A remote computing device application may also want to retake control of the UI at this point, if, as in some embodiments, the application generates thumbnails of the scanned images and displays them to the user for verification.


STEP 3: Once the job is initiated, the imaging device is responsible for scanning or RIPing the job and spooling it to the HDD. If the imaging device is configured to authorize jobs with an external authorization application, it may send a click report to the application and wait for instructions. The external authorization application may enable the job for sending/printing, cancel the job, or change job parameters (and then enable). As an example, a rules-based printing application may wish to change job parameters after it receives a click report. Some rules-based printing applications support rules-based printing and scanning that can limit what each user is allowed to do based on the time of day, the destination, or many other parameters. For example, only users in the marketing group may be able to scan high-quality color images. If a user from another group selects color and 600 dpi, a rules-based application may change the parameters to color and 200 dpi. At the end of this step the job should either be authorized or canceled.


STEP 4: In some embodiments, this may be an optional step, where the standard RCD application in step 2 may have specified the destination as a HDD for temporary storage. This step may also be used, in some embodiments, by a Java application running on the imaging device. For example, a government office may have a custom encryption application running on the device that takes the scanned document, encrypts it, and then requests the imaging device to send it to the target destination selected by the user in step 2. In some embodiments, it may be beneficial to send a notification to the external authorization application after this step—because the imaging device does not know how long the file will be on the HDD or what the application is going to do with it—and after the send/print step.


STEP 5: In the final step, the file is actually output. In typical embodiments, the file is either sent over the network or printed locally. At the end of this step, a notification that the job was successfully completed should be sent to the external authorization application and optionally, to the standard RCD application.


Device Control and Management API's


The API's may be used to allow a remote computing device application to control access to an imaging device for vend applications and to manage the device from a remote location.


Device Control and Vend API


In some embodiments of the present invention, a Device Control and Vend API allows applications to enable and disable access to the device and track click counts. The Device Control and Vend API may provide an RCD with the following controls:


ENABLE/DISABLE DEVICE OF FUNCTION—this may allow an RCD to enable or disable access to the device as a whole or by function to enforce individual user privileges. In some exemplary embodiments, the functions listed in Table 3 may be selectively enabled or disabled by an application.









TABLE 3







Device Functions








Enable/Disable
Description





Copy
Copy function



(Copy button)


Image Send
Scan and fax function, plus send from Doc Filing



(Image Send button)


Document Filing
All access to Document Filing functions



(Document Filing button)


Print
Network prints, pull print from front panel, and



print from Document Filing



(No button control)









REPORT CLICKS USED—at the end of a successful job, the clicks used may be reported back to an RCD including:









TABLE 4







Job and Page Characteristics

















Fax
PC-
E-mail/
Broad-
Scan


Item
Copy
Print
Send
Fax
FTP
cast
to HD










JOB Characteristics














Job Mode
Yes
Yes
Yes
Yes
Yes
Yes
Yes


Broadcast
No
No
Yes
Yes
Yes
Yes
No


Manage No.


User Name
Yes
Yes
Yes
Yes
Yes
Yes
Yes


Address
No
No
Yes
Yes
Yes
#
No


Start Time
Yes
Yes
Yes
Yes
Yes
Yes
Yes


End Time
Yes
Yes
Yes
Yes
Yes
Yes
Yes


Total Page
Yes
Yes
Yes
Yes
Yes
Yes
Yes


Result
Yes
Yes
Yes
Yes
Yes
Yes
Yes


Error Cause
No
No
Yes
Yes
Yes
Yes
No


Doc Filing
Yes
Yes
Yes
Yes
Yes
Yes
Yes


Save Mode
*1
*1
*1
*1
*1
*1
*1


File Name
*1
Yes
*1
Yes
Yes
*1
Yes


File Size
Yes
Yes
*1
*1
*1
*1
Yes


Resolution
Yes
Yes
Yes
Yes
Yes
Yes
Yes


Special
Yes
Yes
Yes
No
Yes
Yes
Yes


Finishing
Yes
Yes
No
No
No
No
No


File Format
No
No
No
No
Yes
Yes
No


Compression
No
No
No
No
Yes
Yes
No







PAGE Characteristics














Copy
Yes
Yes
Yes
Yes
Yes
#
Yes


Paper Size
Yes
Yes
Yes
Yes
Yes
Yes
Yes


Simplex/duplex
Yes
Yes
Yes
Yes
Yes
Yes
Yes


Paper Type
Yes
Yes
Yes
Yes
No
No
Yes


Page
Yes
Yes
Yes
Yes
Yes
Yes
Yes





*1 - Yes when Document Filing is used






DEBIT MODE—in these embodiments, when an application enables the device it may specify if the current job requires authorization. If so, the job will be spooled to memory and click information (e.g., as defined in Table 4) will be sent to an RCD. An RCD will then notify the device if the job should be deleted or output/sent. At this point, the application also has the option of changing job parameters. If the application does not require authorization, the job will continue as normal and a click report will be sent at the end of the job.


PRINT JOB ACCOUNTING—in these embodiments, an RCD may wish to monitor print jobs along with walk-up functions. For print job accounting, an IDev may monitor all incoming print jobs and send accounting data in the PJL header to an RCD for verification before printing the job. The RCD will evaluate the accounting data (or lack thereof) and inform the IDev to continue with or cancel the job.


REPORT ON UNIDENTIFIED JOBS—in these embodiments, an RCD may also wish to monitor print jobs that it cannot associate to a specific user, such as device reports and incoming fax jobs. The RCD can register to receive click counts for all unidentified jobs, so that it may bill them to a general account.


Device Management API


In some embodiments of the present invention, a Device Management API allows a network application to remotely setup and manage the imaging device. In exemplary embodiments, the Device Management API may provide an RCD with the following controls:

    • DEVICE STATUS—an RCD may request the current status of the device. This is the same status information as reported on the embedded web pages.
    • DEVICE CONFIGURATION—an RCD can retrieve a list of installed options supported by the device.
    • WEB PAGE SETTINGS—an RCD application can retrieve and set any of the values that are configurable on the embedded web pages.
    • KEY OPERATOR PROGRAMS—an RCD application can retrieve and set any of the values that are configurable in Key Operator Programs, including software keys.
    • CUSTOM SETTINGS—an RCD application can retrieve and set any of the values that are configurable in Custom Settings.
    • JOB STATUS—an RCD application can retrieve the current job queue and history information and reprioritize or delete jobs in the queue.
    • CLICK COUNTS—an RCD application can retrieve device total counts and clicks for each function by account code.
    • DATA SECURITY SETTINGS—an RCD application may retrieve the status information on the DSK (e.g. last erase) and initiate data clear functions.
    • RED DATA—an RCD can retrieve all data typically sent in a RED message.
    • REMOTE REBOOT—an RCD can initiate a reboot of the imaging device.


The above groupings are provided only as an exemplary embodiment detailing which settings should be included. In some embodiments, actual API's should be grouped by functional areas since there may be overlap between Key Operator settings and web page settings.


Internal Accounting API


In some embodiments, an Internal Accounting API may allow a remote computing device application to configure internal accounting and report click counts. In some exemplary embodiments an Internal Accounting API may include:

    • SET AUDITING OPTIONS—an RCD may set auditing options including which modes auditing is enabled for, “account number security”, and “cancel jobs of invalid accounts.”
    • MANAGE ACCOUNT CODES—an RCD can add, edit, or delete account codes
    • ACCOUNT LIMITS—an RCD application can specify a maximum number of clicks by function for individual account codes or for all account codes
    • ACCOUNT RESET—an RCD application can reset the click count for an individual account or for all accounts
    • RETRIEVE CLICKS—an RCD can retrieve the number of clicks by function for each account code


      Font and Form Management API


Some embodiments of the present invention may comprise a Font and Form Management API, which allows an RCD application to remotely download and manage fonts and forms in mass-storage. In some exemplary embodiments, a Font and Form Management API may provide a remote computing device with the following controls:

    • MASS STORAGE CONTROL—an RCD application can retrieve mass storage status information including storage capacity, space available, and write-protect mode plus modify write-protect status.
    • RESOURCE LIST—an RCD application can retrieve a list of stored fonts and forms including font or macro ID, font number, font/form name, escape sequence, and file size.
    • DOWNLOAD RESOURCE—an RCD application can download PCL fonts, PCL macros, and PS fonts and forms. Any special processing that is performed when a resource is downloaded via the web pages will also be performed when the resource is downloaded via Open Systems.
    • DELETE RESOURCE—an RCD application can delete any resource stored in mass storage.
    • UPLOAD RESOURCES—an RCD application can upload an individual or all resources. On devices where effective memory management is unavailable, a server application can use this function to “defrag” mass storage.
    • FONT/MACRO ID's—an RCD application can assign or modify the ID's assigned to PCL fonts and macros.


      Firmware Management API


In some embodiments of the present invention, a Firmware Management API may allow a remote computing device or network application to remotely download and manage the imaging device firmware. In some exemplary embodiments, a Firmware Management API may provide a remote computing device (e.g., a server) with the following controls:

    • FIRMWARE VERSIONS—an RCD application can retrieve the current firmware version numbers.
    • SERVICE MODE—an RCD application can place the MFP in service mode to lockout other jobs that will interfere with firmware upgrade. Upon receiving a service mode request, the IDev will stop accepting incoming jobs, complete all jobs in the queue, and then notify the server that it is in service mode.
    • UPDATE FIRMWARE—an RCD can download an updated firmware version to the device. If a reboot is necessary, the IDev will perform it automatically when download is complete.
    • DOWNLOAD STATUS—the IDev will send a status notification (success/error) to an RCD after firmware download.
    • REVERT TO PREVIOUS VERSION—if firmware update is not successful, the application can request the IDev to revert to the previous firmware version.


Device Function API's

In some embodiments of the present invention, device function API's allow a remote computing device application to use existing imaging device functionality to provide new custom solutions.


Image Send API


In some embodiments, an Image Send API may provide the remote computing device application with the following controls:

    • IMAGE SEND PARAMETERS—a remote computing device application can get and set values for the following scan and fax parameters:
      • COLOR OR B/W
      • IMAGE MODE—TEXT, TEXT/PHOTO, PHOTO; EXPOSURE LEVEL
      • RESOLUTION
      • FILE FORMAT—FILE TYPE, COMPRESSION, AND PAGES PER FILE
      • ORIGINAL—ORIGINAL SIZE, SIMPLEX/DUPLEX, ROTATE, AND JOB BUILD
      • FILENAME
      • SUBJECT
      • MESSAGE
      • SENDER
      • SCHEDULE SEND TIME
      • PAGE DIVISION (BOOK SCANNING)
      • COVER PAGE
      • TRANSMISSION MESSAGE (CONFIDENTIAL, URGENT, ETC.)
      • THIN PAPER SCANNING
      • DESTINATION
      • DOCUMENT FILING
    • INITIATE SCAN—the remote computing device application can initiate the scan function (same as user pressing start button).


In some embodiments, a remote computing device can change the default values on the imaging device or the values for the current job. For the current job, the remote computing device may also specify if scan parameters may be modified by the user or not. If one remote computing device application (e.g. Access Control) specifies that a parameter cannot be changed and then a second application (e.g. Document Management) tries to set the parameter, a notification may be sent to the second application and the setting will not be changed.


Print API


In some embodiments, print jobs may be submitted by remote computing device applications using standard printing channels. In some exemplary embodiments, a Print API may provide a remote computing device with the following additional control:

    • PJL SNIFFING—an RCD application can register with the IDev to be contacted for instructions when a specific PJL command is found in a print job. The RCD can then instruct the IDev to replace the command, cancel the job, or continue printing. This interface may be used in applications like accounting and other-brand compatibility.


      Copy API


In some embodiments of the present invention, a Copy API may provide a remote computing device with the following exemplary controls:

    • COPY PARAMETERS—an RCD application can get and set values for the following copy parameters:
      • COLOR OR B/W
      • EXPOSURE—TEXT, TEXT/PHOTO, PHOTO, SUPER PHOTO; EXPOSURE LEVEL
      • PAPER SELECT (BY TRAY)
      • COPY RATIO
      • 2-SIDED COPY—1TO1, 1TO2, 2TO2, 2TO1; BINDING EDGE
      • OUTPUT—OUTPUT TRAY, SORT, STAPLE, GROUP, OFFSET
      • ORIGINAL SIZE
      • SPECIAL FUNCTIONS—MARGIN SHIFT, ERASE, PAMPHLET, ETC.
      • DOCUMENT FILING
    • INITIATE COPY—an RCD application can initiate the copy function (same as user pressing start button).


In some embodiments, a remote computing device can change the default values on the imaging device or the values for the current job. For the current job, the remote computing device may also specify if copy parameters may be modified by the user or not.


Document Filing API


In some embodiments of the present invention, a Document Filing API may provide a remote computing device with the following exemplary controls:

    • BACKUP/RESTORE—the remote computing device application can import and export a batch file with all Document Filing data. In some embodiments, this package will be in a proprietary format since it contains documents that are password-protected and should not be accessed individually—this is typically for restore in case of failure or cloning to other devices.
    • FILE/FOLDER LIST—the remote computing device application can retrieve, modify, and create new files and folders to be stored on the IDev (also covered in device management).
    • DOWNLOAD FILE—the remote computing device can download a new file to the Document Filing systems and specify folder, filename, usemame, and password.
    • USER LIST—the remote computing device application can retrieve, modify, and create new users to be stored on the IDev (also covered in device management).
    • HDD STATUS—the remote computing device application can retrieve the current HDD status including the % allocated to the main folder, quick folder, and custom folders and the % remaining.
    • DOC FILING PARAMETERS—the remote computing device application can get and set values for storing a file to Doc Filing including:
      • EXPOSURE
      • RESOLUTION
      • ORIGINAL—SIZE, SIMPLEX/DUPLEX
      • FILE INFORMATION—USERNAME, FILENAME, FOLDER, CONFIDENTIAL, PASSWORD
      • SPECIAL MODES—ERASE, DUAL PAGE COPY, 2IN1, JOB BUILD, CARD SHOT
    • INITIATE PRINT—the remote computing device application can select a stored file and initiate a print including the following parameters:
      • PAPER SIZE/SOURCE
      • OUTPUT—SORT/GROUP, OUTPUT TRAY, STAPLE, PUNCH, OFFSET
      • SIMPLEX/DUPLEX (TABLET/BOOKLET)
      • TANDEM PRINT
      • NUMBER OF COPIES
      • DELETE OR STORE AFTER PRINTING
    • INITIATE SEND—the remote computing device application can select a stored file and initiate a send including the following parameters:
      • RESOLUTION
      • FILE FORMAT
      • DESTINATION
      • TIMER
      • SENDER
      • FILENAME
      • SUBJECT
      • MESSAGE


Security

Allowing external applications to control an imaging device opens up the imaging device to new security vulnerabilities. In embodiments of the present invention that provide some security measures, the following exemplary items are security concerns that may be addressed by the remote computing device interface.


Access to remote computing device interfaces may be limited to valid applications. Embodiments provide extensive access and control of the imaging device, which poses a significant security risk. The interface of these embodiments may be protected from access by attackers, while maintaining ease of setup and use for valid solutions.


Confidential data (user credentials and job data) may be protected during network transfer. User credentials and job data may be secured during network transfer to ensure that it cannot be stolen, an intruder cannot monitor device activity, and a man-in-the-middle attack cannot change messages. Imaging devices may support Secure Sockets Layer (SSL) and other connections to ensure data is safe while being communicated between the imaging device and remote computing device applications.


Administrators may have the ability to lock-down imaging device access. For users with strict security policies, administrators may have the ability to disable access by remote computing devices or limit access to specific applications. Administrators may have an option to register the limited applications that they wish to access the imaging device interfaces.


Remote computing device applications may ensure the imaging device is not being “spoofed.” The remote computing device may be able to authenticate an imaging device that it is contract with it to ensure an intruder cannot imitate the imaging device to collect network configuration and password information, monitor file/folder structures of a document management system, or spoof security settings and DSK status of the imaging device.


A remote computing device may ensure that the server is not being “spoofed.” The imaging device must be able to authenticate all remote computing devices that it is in contact with to ensure that an intruder is not spoofing the remote computing device's IP address. By pretending to be the remote computing device, an intruder could steal user credentials, redirect scanned documents, change device settings or firmware, or bring down the access control system (either to provide access to unauthorized users or initiate a denial of service attack for valid users).


Access control/vend applications may not be compromised when a remote computing device is unavailable. When the remote computing device is unavailable, it may not be acceptable to provide open access to the device. If the remote computing device is unavailable at startup or becomes unavailable at anytime (e.g. someone disconnects network cable), the imaging device may immediately be disabled and an error message displayed.


An administrator may be able to adjust a security level based on company and application requirements. Security requirements can have a large impact on the time it takes to develop a remote computing device application and the resources required to implement the solution. Users using some embodiments may range from a small business with one imaging device, no IT staff, and a simple scan or print application to a large government office using access control and audit trails to track all device activity. The security measures used to protect imaging device interfaces may be adjustable by the administrator to match the target environment.


The imaging device and remote computing device applications may be able to hand-off user credentials. Users may be prompted to login at multiple points throughout a job. For example, an access control application or accounting application may control total device access, the imaging device may have user authentication enabled for Image Send, and a document management application may require user login before showing a folder list. In many environments, all of these applications will use a common user database. In some embodiments, it is, therefore, desirable for the applications to pass user credentials to each other, so that each one does not have to repeat the authentication process.


Some embodiments of the present invention may be described with reference to FIG. 3. These embodiments comprise an imaging device only, which is configured to interact with a remote computing device, such as a server through a communications link. The imaging device 30 comprises a user interface 32, which comprises a user input device 34, such as a keypad, one or more buttons, knobs or switches or a touch-screen panel and a display 36, which may comprise user input device 34 in the form of a touch-screen panel.


Imaging device 30 will typically be capable of performing one or more imaging functions including, but not limited to, scanning, printing, copying, facsimile transmission (sending and receiving) and others.


These embodiments further comprise a communications link 38, which may be a wired connection (as shown in FIG. 3) comprising a network cable, a Universal Serial Bus (USB) cable, a serial cable, a parallel cable, a powerline communication connection such as a HomePlug connection or other wired connections. Alternatively, the communications link 38 may comprise a wireless connection, such as an IEEE 802.11(b) compliant connection, a Bluetooth connection, an Infrared Data Association (IrDA) connection or some other wireless connection.


The operation of some imaging device embodiments may be explained with reference to FIG. 4. In these embodiments, menu data is received 40 from a remote computing device (not shown in FIG. 3), which is connected to the imaging device 30 via the communication link 38 through a wired or wireless connection. This menu data is then displayed 42 on the imaging device user interface display 36. This display of remote menu data is intended to prompt a user to make an input on the user interface input device 34.


Imaging devices of these embodiments are further configured to accept input from a user in response to a display of remote menu data and communicate 44 that user input to a remote computing device. In some embodiments, this user input data will be processed by a remote computing device. This may comprise running an application on the remote computing device. This processing may also comprise accessing and communicating data that is stored on the remote computing device.


The imaging devices of these embodiments are further configured to receive 46 data resulting from processing the user input data. This may comprise data generated by an application running on the remote computing device in response to the user input. The imaging device may also receive data that was stored on a remote computing device, such as a file server, in response to processing the user input.


Once the imaging device 30 has received 46 the processed data, the imaging device 30 may perform 48 a native function in response to the data or using the data. For example, and not be way of limitation, the imaging device 30 may print a document that was stored on the remote computing device and modified on the remote computing device according to the user input. As another non-limiting example, the imaging device 30 may active or enable functions (i.e., scanning, copying, printing, fax transmission) on the imaging device in response to the receipt 46 of processed data.


Some, more specific, imaging device embodiments may be explained with reference to FIG. 5. In these embodiments, the imaging device 30 is configured to receive 50 menu data formatted in a markup language from a remote computing device. The communication link by which the menu data is communicated may be established and maintained using a Hypertext Transfer Protocol (HTTP). The markup language may comprise terms from Hypertext Markup Language (HTML), Extensible Markup Language (XML), Wireless Markup Language (WML), Extensible Hypertext Markup Language (XHTML) and/or other languages.


Once the menu data is received 50, it may be displayed 52 on the imaging device user interface display 36. As in previously described embodiments, the menu data is typically intended to prompt user input on imaging device user interface 32. Display 52 of the remotely-stored menu data may be accomplished with a browser application that is native to the imaging device 30.


In these embodiments, the imaging device 30 is further configured to route 54 user input received through its user interface 32 to a remote computing device. The remote computing device that receives the user input may then run an application or otherwise process the user input and return the results of the processing to the imaging device 30. Accordingly, the imaging device 30 is further configured to receive 56 processed data from a remote computing device. In some embodiments, the imaging device 30 may perform one or more functions in response to the receipt 56 of processed data.


Some embodiments of the present invention may be explained with reference to FIG. 6. These embodiments comprise a remote computing device (RCD) 60, which has a communications link 64. Communications link 64 may be a wired connection (as shown in FIG. 6) comprising a network cable, a Universal Serial Bus (USB) cable, a serial cable, a parallel cable, a powerline communication connection such as a HomePlug connection or other wired connections. Alternatively, the communications link 64 may comprise a wireless connection, such as an IEEE 802.11(b) compliant connection, a Bluetooth connection, an Infrared connection, such as those defined in the Infrared Data Association (IrDA) standard or some other wireless connection. In some embodiments, RCD 60 may further comprise a data storage device 62, which is typically a hard drive, but may also be an optical drive device, such as an array of compact disk drives, flash memory or some other storage device.


Embodiments of RCD 60 may be further described with reference to FIG. 7. In these embodiments, RCD 60 comprises a processor 72 for processing data and running programs such as operating systems and applications. RCD 60 may further comprise memory 74, which may be in the form of Random Access Memory (RAM) and Read Only Memory (ROM). Generally, any applications processed by processor 72 will be loaded into memory 74. RCD 60 may further comprise a network interface 78, which allows RCD 60 to communicate with other devices, such as an imaging device 30. In some embodiments, RCD 60 may also comprise a user interface 80, but this is not required in many embodiments. Storage 62 may be used to store applications and data that may be accessed by an imaging device 30 of embodiments of the present invention. Processor 72, memory 74, storage 62, network interface 78 and, optionally, user interface 80 are typically linked by a system bus 76 to enable data transfer between each component. Communications link 64 may couple the RCD 60 to other devices via network interface 78.


In some embodiments, described with reference to FIG. 8, an RCD 60 may comprise menu data stored on storage device 62 or in memory 74. This menu data may be configured for display on an imaging device user interface 32. Menu data may be stored in many formats and configurations. In some embodiments menu data may take the form of terms expressed with a markup language. The markup language may comprise terms from Hypertext Markup Language (HTML), Extensible Markup Language (XML), Wireless Markup Language (WML), Extensible Hypertext Markup Language (XHTML) and/or other languages. In these embodiments, menu data may be sent 82 through a communications link 64 to an imaging device 30. Accordingly, menu data configured for display on an imaging device is stored on RCD 60.


An RCD 60, of some embodiments, will be further configured to receive 84 user input obtained through the user interface 32 of an imaging device 30 and transferred to the RCD 60 over communications links 38 & 64. Once this input data is received at an RCD 60, the input data may be processed 86. This processing 86 may comprise conversion of the data to a new format, execution of commands contained within the data or some other process. Once the input data has been processed 86, the processed output may be sent 88 back to the imaging device 30 where the processed output may be used in an imaging device process or function.


In some embodiments, as described with reference to FIG. 9, an RCD 60 may send 90 menu data configured for an imaging device display 36 using a markup language. The markup language menu data is then received at the imaging device 30 and displayed to a user. Typically, this will prompt the user to enter an input on the imaging device user interface 32. This user input will then be sent by the imaging device 30 to the RCD 60. The RCD 60 will then receive 92 the input data prompted by the display of the menu data on the imaging device 30. Once received, the input data may be processed 94 on the RCD 60. Processing may comprise the selection, recordation and/or modification of a form, document or other data stored on RCD 60, the authorization of a user identified by the user input, the translation of a document input by the user, generation of a map or other directions related to user input or some other process or function.


Some embodiments of the present invention may be described with reference to FIGS. 10 & 11. These embodiments comprise at least one RCD 60 and a plurality of imaging devices 30a-30d. In these embodiments, at least one of the imaging devices 30a-30d comprises a user interface 32 with a display 36 and user input panel 34 that is integral with the display (i.e., touch-screen) or a separate input unit. RCD 60 is connected to imaging devices 30a-30d by a communications link and network 100 to enable data transmission between RCD 60 and imaging devices 30a-30d.


In these embodiments, menu data is stored on RCD 60 and sent 110 to at least one of the imaging devices 30a-30d where the menu data is displayed on a user interface. Any of Imaging devices 30a-30d that receive the menu data are configured to accept 112 and transmit 114 user input to an RCD 60. Once the user input data is received at the RCD, the data may be processed 116 as discussed in previously described embodiments. The result of processing 116 may then be sent 118 back to any combination of the imaging devices 30a-30d.


In these embodiments, a single RCD 60 may be used to provide processing power, resources and functionality to a plurality of imaging devices 30a-30d without reproducing these resources in each imaging device. In some embodiments, data generated by input on one imaging device 30a may be directed to another imaging device 30d for processed data output or final processing.


Some embodiments of the present invention may be described with reference to FIG. 12. In these embodiments, an imaging device (IDev) 120 comprises a user interface (UI) 124, which is capable of receiving user input and displaying data to a user. The user interface 124 will typically comprise a display, often in the form of a touch panel. The display may be used to display data to a user. This data may comprise menu data to prompt for a user selection or data entry, such as a user ID and password, form selection or some other input. This data may be supplied to the UI from an RCD 126a, 126b or 126c, from the device itself 120, from a networked database 125 or from some other location accessible to the IDev 120 via a communications link such as a network 122. The imaging device 120 has a communication link 122, which may comprise a typical computer network connection, a serial cable or some other wired or wireless communication link as described in other embodiments. The communication link 126 connects the imaging device 120 to a remote computing device (RCD) 128, such as a server. The RCD 128 may be used to store documents, such as forms, and other data and make that data accessible from the imaging device 120. The RCD 128 may also execute applications that interact with or receive input from the imaging device 120 and its user interface 124. In some embodiments, an RCD 126a-126c may comprise accounting and control functions that may authenticate a user, authorize IDev 120 usage, and enable IDev 120 functions based on a user status, such as a user's account balance or credit availability. Parts of these functions may be performed on different RCDs 126a-126c, via database access 125 or through other network devices.


Peripheral Device Accounting and Access


Embodiments of the present invention comprise systems and methods for peripheral device accounting and access. Peripheral devices comprise printers, scanners, copiers, plotters, facsimile machines, and other devices that may be connected to communicate with computing devices through a communication link, such as a network connection. Some peripheral devices comprise multiple functions. Multiple function peripherals may be referred to as MFPs. A common type of MFP comprises a printer, scanner and facsimile machine and may perform copier functions using the scanner and printer functionality. Other MFPs have different combinations of functions.


Some peripheral devices may be used in a commercial environment where users pay a fee to use the various peripheral device functions. A common scenario comprises an MFP connected to an accounting system, which keeps track of functions performed by a user and calculates a fee to be paid by the user for the functions performed. This scenario may employ a debit, credit or some other accounting system for billing purposes. The following paragraphs describe exemplary embodiments of accounting-enabled peripheral devices.


Some embodiments of the present invention may be described with reference to FIG. 13. These embodiments comprise a multi-function peripheral (MFP) 132 that is connected via a communications link to an RCD 134, which performs external accounting functions. In this diagram, user input is shown as actions from a user 130. In these embodiments, a user 130 is present at the MFP 132 and provides input thereto via a user interface (UI). In these exemplary embodiments, the MFP 132 comprises a Web Service that enables communication through HTTP calls.


In a typical use scenario, the MFP 132 is powered up 138 and, during a “boot up” phase, the MFP 132, requests 142 a menu to be displayed on the device UI. The menu may be supplied by an RCD 134 or may be stored on the MFP 132 itself. The menu may be requested with an HTTP Get call and supplied with an HTTP Response. If the menu is supplied from an RCD 134, the RCD 134 will respond to the request and transmit 144 a menu to the MFP 132 for UI display. A user 130 may then input user credentials 146, such as a user ID or authorization code that will identify the user 130 and an associated account.


Once a user 130 has input credentials 146, the user ID/account ID is transmitted 148 to the external accounting RCD 134, which may then authenticate 150 the user/account, by verifying that the user is a valid, approved user. If the user is not authenticated, the MFP will remain in a disabled state. Once authentication 150 has been successfully completed, the external accounting RCD 134, may send a successful authentication message 152 to the MFP 132, which may be displayed to the user 130. Upon successful authentication, 150, the external accounting RCD 134 may also send an enabling message 154 to the MFP 132. This message 154 may contain commands that activate specific functions on the MFP 132 and provide menu content to allow a user to select functionality that is not available before authentication.


When the enabling message 154 is received at the MFP 132, the MFP may perform enabling functions 156 that provide enhanced access to MFP functions. Authentication 150 may also link the user's requests to a user account that may employ a debit, credit or other payment system. When enabling functions 156 need to be performed at the MFP 132, a device enabled message 158 may be sent back to the external accounting RCD 134 to indicate that the MFP 132 is now enabled and ready for further content. The external accounting RCD 134 may respond 160 to the enabled message 158 with additional menus or other commands, content or other data.


When the MFP 132 is enabled and menus and other content are provided to the device UI, a user 130 may select 162 an MFP function and designate function parameters through a UI or otherwise. The MFP 132 may respond to this selection 162 by creating a job ID 164 and description, which may, in some embodiments, be presented to a user 130 for confirmation. If confirmation 166 is received, the job ID/description is transmitted 168 to the external accounting RCD 134 for authorization. In some embodiments of the present invention, authorization 169 may comprise account management wherein the fees associated with the job description are compared to a user account status to verify that sufficient finds are available, sufficient credit is authorized or some other status. If the account status is acceptable for the specific job identified in the job description/ID, the job may be authorized and an authorization message 170 may be sent to the MFP 132 to authorize the job within the limits of the account status. Job limits may comprise a number of copies or iterations of a job that are allowed by the account status. In some embodiments, a counter may count down from the authorized limit until it reaches zero. At this point, the job authorization will be terminated and the job execution will stop. If the account status is not acceptable, the job may not be authorized and the user may be prompted to change the account status or modify the job description.


When a job is authorized and the authorization message 170 is received, the MFP 132 may proceed to configure itself 172 for the job and execute 174 the job. After job completion, a job completion event message 176 may be sent to the external accounting RCD 134. This message may inform the RCD 134 that the job is complete and may trigger accounting functions that debit, use credit or otherwise account for the job completion in the user's account. In addition to informing the RCD that the job is complete, the completion event message 176 may provide additional information about the job so that the RCD 134 may determine how to charge an account. After a job is complete, a user 130 may manually log out 178 to disable further use of the user's account or the account may be disabled automatically, such as a log out after a specified timeout period. When a user logs out, either manually or through an automated process, a login UI may be automatically displayed on the MFP 132.


Some embodiments of the present invention may be described with reference to FIG. 14. These embodiments comprise a multi-function peripheral (MFP) 132 that is connected via a communications link to an RCD 134, which performs external accounting functions. In these embodiments, a user 130 is present at the MFP 132 and provides input thereto via a user interface (UI). In these exemplary embodiments, the MFP 132 comprises a Web Service that enables communication through HTTP calls, however, other methods may be used.


In a typical use scenario, the MFP 132 is powered up 138 and, during a “start up” phase, the MFP 132, requests 142 a menu to be displayed on the device UI. The menu may be supplied by an RCD 134 or may be stored on the MFP 132 itself. The menu may be requested with an HTTP Get call and supplied with an HTTP Response. If the menu is supplied from an RCD 134, the RCD 134 may respond to the request and transmit 144 a menu to the MFP 132 for UI display. A user 130 may then input user credentials 146, such as a user ID or authorization code that will identify the user 130 and an associated account.


Once a user 130 has input credentials 146, the user ID/account ID is transmitted 148 to an external accounting RCD 134. In these exemplary embodiments, the accounting RCD 134 processes the user/account data and sends it to a remote security device 136, such as a security server/database. The security device 136 may then authenticate the user or account to verify that the user is a valid, approved user. If the user is not authenticated 182, the security device will not send a response notifying the accounting RCD 134 to enable the peripheral device 132 and the MFP 132 will remain in a disabled state. If authentication 182 is successfully completed, the security device 136, will notify 186 the accounting RCD 134 of the authentication. The external accounting RCD 134, may then send a successful authentication message 152 to the MFP 132, which may be displayed to the user 130. Upon successful authentication, 150, the external accounting RCD 134 may also send an enabling message 154 to the MFP 132. This message 154 may contain commands that activate specific functions on the MFP 132 and provide menu content to allow a user to select functionality that is not available before authentication.


When the enabling message 154 is received at the MFP 132, the MFP may perform enabling functions 156 that provide enhanced access to MFP functions. Authentication 150 may also link the user's requests to a user account that may employ a debit, credit or other payment system. When enabling functions 156 need to be performed at the MFP 132, a device enabled message 158 may be sent back to the external accounting RCD 134 to indicate that the MFP 132 is now enabled and ready for further content. The external accounting RCD 134 may respond 160 to the enabled message 158 with additional menus or other commands, content or other data. This additional content 160 may be displayed 188 to a user.


When the MFP 132 is enabled and menus and other content are provided to the device UI, a user 130 may select 162 an MFP function and designate function parameters through a UI or otherwise. Confirmation of the job parameters may be communicated 166 by the user and a job ID/description may be created 164 and transmitted 168 to the external accounting RCD 134 for authorization. In some embodiments of the present invention, authorization 169 may comprise account management wherein the fees associated with the job description are compared to a user account status to verify that sufficient funds are available, sufficient credit is authorized or some other status. If the account status is acceptable for the specific job identified in the job description/ID, the job may be authorized and an authorization message 170 may be sent to the MFP 132 to authorize the job within the limits of the account status. Job limits may comprise a number of copies or iterations of a job that are allowed by the account status. In some embodiments, a counter may count down from the authorized limit until it reaches zero. At this point, the job authorization will be terminated and the job execution will stop. If the account status is not acceptable, the job may not be authorized and the user may be prompted to change the account status or modify the job description.


When a job is authorized and the authorization message 170 is received, the MFP 132 may proceed to configure itself 172 for the job and execute 174 the job. After job completion, a job completion event message 176 may be sent to the external accounting RCD 134. This message may inform the RCD 134 that the job is complete and may trigger accounting functions that debit, use credit or otherwise account for the job completion in the user's account. In addition to informing the RCD that the job is complete, the completion event message 176 may provide additional information about the job so that the RCD 134 may determine how to charge an account. After a job is complete, a user 130 may manually log out 178 to disable further use of the user's account or the account may be disabled automatically, such as a log out after a specified timeout period. When a user logs out, either manually or through an automated process, a login UI may be automatically displayed on the MFP 132.


Some embodiments of the present invention may be described with reference to FIGS. 15A and 15B. These embodiments comprise a multi-function peripheral (MFP) 132 that is connected via a communications link to an RCD 134, which performs external accounting functions. In these embodiments, a user 130 is present at the MFP 132 and provides input thereto via a user interface (UI). In these exemplary embodiments, the MFP 132 comprises a Web Service that enables communication through HTTP calls, however, other methods may be used.


In a typical use scenario, the MFP 132 is powered up 138 and, during a “start up” phase, the MFP 132, requests a menu to be displayed on the device UI. The menu may be supplied by an RCD 134 or may be stored on the MFP 132 itself. The menu may be requested with an HTTP Get call and supplied with an HTTP Response. If the menu is supplied from an RCD 134, the RCD 134 may respond to the request and transmit 144 a menu to the MFP 132 for UI display. A user 130 may then input user credentials 146, such as a user ID or authorization code that will identify the user 130 and an associated account.


Once a user 130 has input credentials 146, a UI session may be initiated and the user ID/account ID may be transmitted 148 to the external accounting RCD 134, which may then authenticate 150 the user/account, by verifying that the user is a valid, approved user. If the user is not authenticated, the MFP will remain in a disabled state. Once authentication 150 has been successfully completed, the external accounting RCD 134, may send a successful authentication message 152 to the MFP 132, which may be displayed to the user 130. Upon successful authentication, 150, the external accounting RCD 134 may also send an enabling message 154 to the MFP 132. This message 154 may contain commands that activate specific functions on the MFP 132 and provide menu content to allow a user to select functionality that is not available before authentication.


When the enabling message 154 is received at the MFP 132, the MFP may perform enabling functions that provide enhanced access to MFP functions. Authentication 150 may also link the user's requests to a user account that may employ a debit, credit or other payment system. A device enabled message 158 may be sent back to the external accounting RCD 134 to indicate that the MFP 132 is now enabled and ready for further content. The external accounting RCD 134 may respond 160 to the enabled message 158 with additional menus or other commands, content or other data.


When the MFP 132 is enabled and menus and other content are provided to the device UI, a user 130 may select 192 an MFP function and designate function parameters through a UI or otherwise. The MFP 132 may then open a user interaction channel to a second remote computing device (RCD2) 136 on which applications, menu content and other data may reside. RCD2136 may comprise a multi-layer menu structure or some other access mechanism that adds significant functionality to the MFP 132. RCD2136 may comprise language translation functions, mapping functions and many other functions.


Applications running on RCD2136 my access MFP 132 directly 196 using Web Services and HTTP calls or using some other protocol or method. A remote application on RCD2136 may create a job through connection 196. When this occurs, MFP 132 may create a job ID 198 to identify the job. Once created, the job ID may be communicated back to the RCD2 application. An application on RCD2136 may then respond 202 with device configuration data and job parameters. Once the job is fully configured, RCD2 may request 204 execution of the job. This request is typically followed by an authorization procedure to ensure that the user's account status will support the job.


Authorization may be initiated by a request from the MFP 132 to an external accounting RCD 134. In some embodiments of the present invention, authorization 208 may comprise account management wherein the fees associated with the job description are compared to a user account status to verify that sufficient funds are available, sufficient credit is authorized or some other status. If the account status is acceptable for the specific job identified in the job description/ID, the job may be authorized and an authorization message 210 may be sent to the MFP 132 to authorize the job within the limits of the account status. Job limits may comprise a number of copies or iterations of a job that are allowed by the account status. In some embodiments, a counter may count down from the authorized limit until it reaches zero. At this point, the job authorization will be terminated and the job execution will stop. If the account status is not acceptable, the job may not be authorized and the user may be prompted to change the account status or modify the job description.


When a job is authorized and the authorization message 210 is received, the MFP 132 may notify 212 any application on RCD2136 of the authorization status and proceed to configure itself 214 for the job and execute 216 the job. RCD2136 may query 218 the MFP 132 for a job status and close 220 the job when appropriate. After job completion, a job completion event message 222 may be sent to the external accounting RCD 134 and/or application RCD2136. This message may inform the RCDs that the job is complete and may trigger accounting functions that debit, use credit or otherwise account for the job completion in the user's account. After a job is complete, a user 130 may manually log out to disable further use of the user's account or the account may be disabled automatically, such as a log out after a specified timeout period. When a user logs out, either manually or through an automated process, a login UI may be automatically displayed on the MFP 132.


Some embodiments of the present invention may be described with reference to FIG. 16. These embodiments comprise a multi-function peripheral (MFP) 132 that is connected via a communications link to an RCD 134, which performs external accounting functions. In these exemplary embodiments, the MFP 132 may comprise a Web Service that enables communication through HTTP calls.


In these embodiments a second remote computing device (RCD2) 136 may comprise applications, menu content and other data and functions for MFP 132. In some exemplary embodiments, RCD2 comprises a driver, such as a TWAIN driver that interacts with MFP 132.


In a typical use scenario, a user initiates a scan job or some other job using a driver on RCD2136. The RCD2136 driver may then send 230 job configuration data and user information to MFP 132. When this is received, MFP 132 may assign 135 a job ID.


User credentials such as user ID and account ID data may be embedded in the scan job request. When this data is obtained by MFP 132, it may be transmitted 232 to the external accounting RCD 134, which may then authenticate 233 the user/account, by verifying that the user is a valid, approved user. If the user is not authenticated, the MFP may remain in a disabled state. Once authentication 233 has been successfully completed, the external accounting RCD 134, may send a successful authentication message 234 to the MFP 132, which may be displayed to the user 130. When the MFP 132 receives a successful authentication confirmation 234, the MFP 132 may notify 236 the driver on RCD2136 of the successful authentication and the RCD2 driver may respond 238 with device configuration commands and job data. Once the job is configured on the MFP 132, a driver may request 240 job execution.


The job must be authorized before execution so the MFP 132 may send job configuration data to external accounting RCD 134 for authorization. In some embodiments of the present invention, authorization 243 may comprise account management wherein the fees associated with the job description are compared to a user account status to verify that sufficient funds are available, sufficient credit is authorized or some other status. If the account status is acceptable for the specific job identified in the job description/ID, the job may be authorized and an authorization message 244 may be sent to the MFP 132 to authorize the job within the limits of the account status. Job limits may comprise a number of copies or iterations of a job that are allowed by the account status. In some embodiments, a counter may count down from the authorized limit until it reaches zero. At this point, the job authorization will be terminated and the job execution will stop. If the account status is not acceptable, the job may not be authorized and the user may be prompted to change the account status or modify the job description.


When a job is authorized and the authorization message 244 is received, the MFP 132 may send a message 246 to the RCD2136 driver indicating that it will proceed with job execution.


The MFP 132 may then proceed to configure itself 248 for the job and execute 250 the job. The RCD2136 driver may request a job completion status 252 to determine when the job has been fully executed and close the job 254 when appropriate.


After job completion, a job completion event message 256 may be sent to the external accounting RCD 134. This message may inform the RCD 134 that the job is complete and may trigger accounting functions that debit, use credit or otherwise account for the job completion in the user's account. In addition to informing the RCD that the job is complete, the completion event message 176 may provide additional information about the job so that the RCD 134 may determine how to charge an account. After a job is complete, a user 130 may manually log out 178 to disable further use of the user's account or the account may be disabled automatically, such as a log out after a specified timeout period. When a user logs out, either manually or through an automated process, a login UI may be automatically displayed on the MFP 132.


Further embodiments of the present invention may be described with reference to FIG. 17. These embodiments comprise a multi-function peripheral (MFP) 132 that is connected via a communications link to an RCD 134, which performs external accounting functions. In this diagram, user input is shown as actions from a user 130. In these embodiments, a user 130 is present at the MFP 132 and provides input thereto via a user interface (UI). In these exemplary embodiments, the MFP 132 may comprise a Web Service that enables communication through HTTP calls.


In these embodiments, a user will have already submitted user ID data and will typically have completed a prior job on MFP 132. After the initial job is completed, a user may request another job without resubmitting the user ID data. In a typical use scenario, the already authenticated user may configure a job 260 and select MFP 132 functions via a user interface on an MFP 132. When a job is fully configured, a user may request job execution 262 and the MFP 132 may assign 264 a job ID.


The new job must also be authorized by the external accounting RCD 134 before execution. The MFP 132 may send 266 job configuration data to the external accounting RCD 134 for authorization. In some embodiments of the present invention, authorization 270 may comprise account management wherein the fees associated with the job description are compared to a user account status to verify that sufficient funds are available, sufficient credit is authorized or some other status. If the account status is acceptable for the specific job identified in the job description/ID, the job may be authorized and an authorization message 268 may be sent to the MFP 132 to authorize the job within the limits of the account status. Job limits may comprise a number of copies or iterations of a job that are allowed by the account status. In some embodiments, a counter may count down from the authorized limit until it reaches zero. At this point, the job authorization will be terminated and the job execution will stop. If the account status is not acceptable, the job may not be authorized and the user may be prompted to change the account status or modify the job description.


When a job is authorized and the authorization message 244 is received, the MFP 132 may then proceed to configure itself 272 for the job and execute 274 the job. After job completion, a job completion event message 276 may be sent to the external accounting RCD 134. This message may inform the RCD 134 that the job is complete and may trigger accounting functions that debit, use credit or otherwise account for the job completion in the user's account. In addition to informing the RCD that the job is complete, the completion event message 176 may provide additional information about the job so that the RCD 134 may determine how to charge an account. After a job is complete, a user 130 may manually log out 178 to disable further use of the user's account or the account may be disabled automatically, such as a log out after a specified timeout period. When a user logs out, either manually or through an automated process, a login UI may be automatically displayed on the MFP 132.


Still further embodiments of the present invention may be described with reference to FIG. 18. These embodiments comprise a multi-function peripheral (MFP) 132 that is connected via a communications link to an RCD 134, which performs external accounting functions. In these exemplary embodiments, the MFP 132 may comprise a Web Service that enables communication through HTTP calls.


In these embodiments a second remote computing device (RCD2) 136 may comprise applications, menu content and other data and functions for MFP 132. In some exemplary embodiments, RCD2 may comprise an application that may create a print job.


In a typical use scenario, a user may initiate 280 a print job or some other job from an application on RCD2136. The print job may comprise user ID and user account information. When this is received, MFP 132 may sniff out 282 the user credentials and other data from the print job.


When this data is obtained by MFP 132, it may be transmitted 284 to the external accounting RCD 134, which may then authenticate 286 the user/account, by verifying that the user is a valid, approved user. If the user is not authenticated, the MFP may remain in a disabled state. Once authentication 286 has been successfully completed, the external accounting RCD 134, may send a successful authentication message 288 to the MFP 132, which may be displayed to the user 130. When the MFP 132 receives a successful authentication confirmation 288, the MFP 132 may create a job ID 290.


The job must be authorized before execution so the MFP 132 may send 292 job configuration data to external accounting RCD 134 for authorization. In some embodiments of the present invention, authorization 296 may comprise account management wherein the fees associated with the job description are compared to a user account status to verify that sufficient funds are available, sufficient credit is authorized or some other status. If the account status is acceptable for the specific job identified in the job description/ID, the job may be authorized and an authorization message 294 may be sent to the MFP 132 to authorize the job within the limits of the account status. Job limits may comprise a number of copies or iterations of a job that are allowed by the account status. In some embodiments, a counter may count down from the authorized limit until it reaches zero. At this point, the job authorization will be terminated and the job execution will stop. If the account status is not acceptable, the job may not be authorized and the user may be prompted to change the account status or modify the job description.


When a job is authorized and the authorization message 294 is received, the MFP 132 may then proceed to configure itself 298 for the job and execute 300 the job. The RCD2136 application may request a job completion status 302 to determine when the job has been fully executed.


After job completion, a job completion event message 304 may be sent to the external accounting RCD 134. This message may inform the RCD 134 that the job is complete and may trigger accounting functions that debit, use credit or otherwise account for the job completion in the user's account. In addition to informing the RCD that the job is complete, the completion event message 176 may provide additional information about the job so that the RCD 134 may determine how to charge an account. After a job is complete, a user 130 may manually log out 178 to disable further use of the user's account or the account may be disabled automatically, such as a log out after a specified timeout period. When a user logs out, either manually or through an automated process, a login UI may be automatically displayed on the MFP 132.


The terms and expressions which have been employed in the forgoing specification are used therein as terms of description and not of limitation, and there is no intention in the use of such terms and expressions of excluding equivalence of the features shown and described or portions thereof, it being recognized that the scope of the invention is defined and limited only by the claims which follow.

Claims
  • 1. A method for peripheral device accounting, said method comprising: a) transmitting user identification (ID) menu content to a peripheral device from a remote computing device (RCD), wherein said peripheral device comprises a restricted function that is not accessible without restricted function menu content stored on said RCD;b) displaying said user ID menu content at said peripheral device;c) accepting a user ID code at said peripheral device;d) transmitting said user ID code from said peripheral device to said RCD;e) using said user ID code to validate a user with said RCD;f) transmitting restricted function menu content from said RCD to said peripheral device, displaying said restricted function menu content at said peripheral device and enabling functional parameter input for said restricted function at said peripheral device when said user ID code is validated;g) accepting a peripheral job configuration defined by said functional parameter input at said peripheral device;h) transmitting said peripheral job configuration from said peripheral device to said RCD;i) checking a user account to verify a user account status at said RCD;j) enabling said peripheral device to execute said job configuration when said user account status is positive;k) executing said job configuration at said peripheral device; andl) reporting a job execution status to said RCD, wherein said job execution status report enables said RCD to update said user account status when said job configuration is successfully completed.
  • 2. A method as described in claim 1 wherein said validation of a user with said RCD comprises authentication of said user with a security system remote to said RCD.
  • 3. A method for peripheral device accounting, said method comprising: a) transmitting user identification (ID) menu content to a peripheral device from a remote computing device (RCD), wherein said peripheral device comprises a restricted function that is not accessible without restricted function menu content stored on said RCD;b) displaying said user ID menu content at said peripheral device;c) accepting a user ID code at said peripheral device;d) transmitting said user ID code from said peripheral device to said RCD;e) using said user ID code to validate a user with said RCD;f) transmitting restricted function menu content from said RCD to said peripheral device, displaying said restricted function menu content at said peripheral device and enabling functional parameter input for said restricted function at said peripheral device via said restricted function menu content when said user ID code is validated;g) accepting a peripheral job configuration defined by said functional parameter input at said peripheral device;h) transmitting said peripheral job configuration from said peripheral device to a second RCD (RCD2);i) transmitting a job ID request from said RCD2 to said peripheral device;j) checking a user account to verify a user account status at said RCD;k) enabling said peripheral device to execute said job configuration when said user account status is positive;l) executing said job configuration at said peripheral device; andm) reporting a job execution status to said RCD, wherein said job execution status report enables said RCD to update said user account status when said job configuration is successfully completed.
US Referenced Citations (526)
Number Name Date Kind
5085587 DesForges et al. Feb 1992 A
5228100 Takeda et al. Jul 1993 A
5323393 Barrett et al. Jun 1994 A
5365494 Lynch Nov 1994 A
5410646 Tondeviod et al. Apr 1995 A
5504589 Montague et al. Apr 1996 A
5513112 Herring et al. Apr 1996 A
5542031 Douglass et al. Jul 1996 A
5586260 Hu Dec 1996 A
5659845 Krist et al. Aug 1997 A
5664206 Murow et al. Sep 1997 A
5671412 Christiano Sep 1997 A
5699493 Davidson et al. Dec 1997 A
5699494 Colbert et al. Dec 1997 A
5717439 Levine et al. Feb 1998 A
5726883 Levine et al. Mar 1998 A
5727082 Sugishima Mar 1998 A
5727135 Webb et al. Mar 1998 A
5745712 Turpin et al. Apr 1998 A
5745883 Krist et al. Apr 1998 A
5760775 Sklut et al. Jun 1998 A
5774678 Motoyama Jun 1998 A
5778356 Heiny Jul 1998 A
5791790 Bender et al. Aug 1998 A
5796934 Bhanot et al. Aug 1998 A
5799206 Kitagawa et al. Aug 1998 A
5799289 Fukushima et al. Aug 1998 A
5812818 Adler et al. Sep 1998 A
5832264 Hart et al. Nov 1998 A
5848231 Teitelbaum et al. Dec 1998 A
5877776 Beaman et al. Mar 1999 A
5915001 Uppaluru Jun 1999 A
5944824 He Aug 1999 A
5956487 Venkatraman et al. Sep 1999 A
5956698 Lacheze et al. Sep 1999 A
5968127 Kawabe et al. Oct 1999 A
5993088 Nogay et al. Nov 1999 A
5995553 Crandall et al. Nov 1999 A
5999708 Kajita Dec 1999 A
6042384 Loiacono Mar 2000 A
6044382 Martino Mar 2000 A
6069706 Kajita May 2000 A
6075860 Ketcham Jun 2000 A
6115132 Nakasuma et al. Sep 2000 A
6118546 Sanchez Sep 2000 A
6128731 Zarrin et al. Oct 2000 A
6141662 Jeyachandran Oct 2000 A
6148346 Hanson Nov 2000 A
6161139 Win et al. Dec 2000 A
6178308 Bobrow et al. Jan 2001 B1
6199080 Nielsen Mar 2001 B1
6213652 Suzuki et al. Apr 2001 B1
6216113 Aikens et al. Apr 2001 B1
6233409 Haines et al. May 2001 B1
6239802 Lahey et al. May 2001 B1
6240456 Teng et al. May 2001 B1
6246487 Kobayashi Jun 2001 B1
6292267 Mori et al. Sep 2001 B1
6301016 Matsueda et al. Oct 2001 B1
6307640 Motegi Oct 2001 B1
6311040 Kucinski et al. Oct 2001 B1
6349275 Schumacher et al. Feb 2002 B1
6353878 Dunham Mar 2002 B1
6369905 Mitsuhashi et al. Apr 2002 B1
6407820 Hansen et al. Jun 2002 B1
6426798 Yeung Jul 2002 B1
6433883 Kajita Aug 2002 B1
6438589 Iwata Aug 2002 B1
6462756 Hansen et al. Oct 2002 B1
6476926 Yano et al. Nov 2002 B1
6490547 Atkin et al. Dec 2002 B1
6490601 Markus et al. Dec 2002 B1
6509974 Hansen Jan 2003 B1
6510466 Cox et al. Jan 2003 B1
6516157 Maruta et al. Feb 2003 B1
6526258 Bejar et al. Feb 2003 B2
6567179 Sato et al. May 2003 B1
6590589 Sluiman Jul 2003 B1
6590673 Kadowaki Jul 2003 B2
6592275 Aihara et al. Jul 2003 B1
6597469 Kuroyanagi Jul 2003 B1
6604157 Brusky et al. Aug 2003 B1
6621422 Rubenstein Sep 2003 B2
6623529 Lakritz Sep 2003 B1
6636929 Frantz et al. Oct 2003 B1
6643650 Slaughter et al. Nov 2003 B1
6652169 Parry Nov 2003 B2
6685637 Rom Feb 2004 B1
6707466 Van Sickle et al. Mar 2004 B1
6721286 Williams et al. Apr 2004 B1
6735773 Trinh et al. May 2004 B1
6749434 Stuppy Jun 2004 B2
6775729 Matsuo et al. Aug 2004 B1
6772945 Mahoney et al. Oct 2004 B2
6823225 Sass Nov 2004 B1
6826727 Mohr et al. Nov 2004 B1
6836623 Imai Dec 2004 B2
6836845 Lennie et al. Dec 2004 B1
6850252 Hoffberg Feb 2005 B1
6854839 Collier et al. Feb 2005 B2
6862110 Harrington Mar 2005 B2
6862583 Mazzagatte et al. Mar 2005 B1
6865716 Thurston Mar 2005 B1
6873429 Matsuura Mar 2005 B2
6874010 Sargent Mar 2005 B1
6904412 Broadbent et al. Jun 2005 B1
6915525 Ozawa Jul 2005 B2
6934706 Mancuso et al. Aug 2005 B1
6934740 Lawande et al. Aug 2005 B1
6940532 Fukui et al. Sep 2005 B1
6948175 Fong et al. Sep 2005 B1
6951303 Petersen et al. Oct 2005 B2
6964014 Parish Nov 2005 B1
6975820 Wong Dec 2005 B2
6999987 Billingsley et al. Feb 2006 B1
7003723 Kremer et al. Feb 2006 B1
7007026 Wilkinson et al. Feb 2006 B2
7012706 Hansen Mar 2006 B1
7013289 Horn et al. Mar 2006 B2
7019753 Rappaport et al. Mar 2006 B2
7034958 Hara Apr 2006 B1
7072057 Hansen Jul 2006 B1
7079143 Gilbert Jul 2006 B2
7095513 Stringham Aug 2006 B2
7107285 von Kaenel et al. Sep 2006 B2
7107615 Cossel et al. Sep 2006 B2
7117504 Smith et al. Oct 2006 B2
7124097 Claremont et al. Oct 2006 B2
7126717 Jeyachandran Oct 2006 B2
7127700 Large Oct 2006 B2
7136909 Balasuriya Nov 2006 B2
7136941 Nguyen et al. Nov 2006 B2
7143364 Tam Nov 2006 B1
7145673 Lin Dec 2006 B1
7145686 Simpson et al. Dec 2006 B2
7149697 Zerza et al. Dec 2006 B2
7149964 Cottrille et al. Dec 2006 B1
7162103 Meunier et al. Jan 2007 B2
7170618 Fujitani et al. Jan 2007 B2
7171615 Jensen et al. Jan 2007 B2
7174056 Silverbrook et al. Feb 2007 B2
7177814 Gong et al. Feb 2007 B2
7181017 Nagel et al. Feb 2007 B1
7181442 Yeh et al. Feb 2007 B2
7185078 Pleyer et al. Feb 2007 B2
7188125 Karr Mar 2007 B1
7188181 Squier et al. Mar 2007 B1
7191391 Takashima Mar 2007 B2
7191393 Chin et al. Mar 2007 B1
7197615 Arakawa et al. Mar 2007 B2
7203699 Bellamy Apr 2007 B2
7212301 Treibach-Heck et al. May 2007 B2
7216292 Snapper et al. May 2007 B1
7216347 Harrison et al. May 2007 B1
7228501 Brown et al. Jun 2007 B2
7233929 Lingle et al. Jun 2007 B1
7233973 Melet et al. Jun 2007 B2
7234110 Sumitomo Jun 2007 B2
7239409 Parry Jul 2007 B2
7249100 Murto et al. Jul 2007 B2
RE39808 Motegi Sep 2007 E
7268896 Bellagamba et al. Sep 2007 B2
7272269 Tojo et al. Sep 2007 B2
7275044 Chauvin et al. Sep 2007 B2
7284061 Matsubayashi et al. Oct 2007 B2
7284199 Parasnis et al. Oct 2007 B2
7293034 Paya et al. Nov 2007 B2
7296221 Treibach-Heck et al. Nov 2007 B1
7301658 Henry Nov 2007 B2
7305616 Nelson et al. Dec 2007 B1
7313587 Dharmarajan Dec 2007 B1
7321440 Kimura Jan 2008 B2
7325196 Covington et al. Jan 2008 B1
7327478 Matsuda Feb 2008 B2
7328245 Hull et al. Feb 2008 B1
7340389 Vargas Mar 2008 B2
7343551 Bourdev Mar 2008 B1
7349949 Connor et al. Mar 2008 B1
7363586 Briggs et al. Apr 2008 B1
7397362 Zhang et al. Jul 2008 B2
7404204 Davenport et al. Jul 2008 B2
7406660 Sikchi et al. Jul 2008 B1
7412374 Seiler et al. Aug 2008 B1
7424129 Hull et al. Sep 2008 B2
7437406 Hauduc et al. Oct 2008 B2
7437663 Lakhdhir et al. Oct 2008 B2
7441188 Russell et al. Oct 2008 B1
7444519 Laferriere et al. Oct 2008 B2
7444590 Christian et al. Oct 2008 B2
7451117 Cozianu et al. Nov 2008 B2
7451392 Chalecki et al. Nov 2008 B1
7454623 Hardt Nov 2008 B2
7467211 Herman et al. Dec 2008 B1
7472343 Vasey Dec 2008 B2
7478171 Ramaswamy et al. Jan 2009 B2
7490167 Pena et al. Feb 2009 B2
7496837 Larcheveque et al. Feb 2009 B1
7500178 O'Donnell Mar 2009 B1
7508535 Hart et al. Mar 2009 B2
7509649 Shenfield Mar 2009 B2
7545528 Takabayashi et al. Jun 2009 B2
7548334 Lo et al. Jun 2009 B2
7552265 Newman et al. Jun 2009 B2
7565554 Joosten et al. Jul 2009 B2
7567360 Takahashi et al. Jul 2009 B2
7573593 Hart et al. Aug 2009 B2
7599942 Mohamad Oct 2009 B1
7657557 Super Feb 2010 B2
7729363 Shenfield et al. Jun 2010 B2
7826081 Stevens et al. Nov 2010 B2
7886219 Lund Feb 2011 B2
7904600 Madril et al. Mar 2011 B2
7920101 Lum et al. Apr 2011 B2
7941743 Reddy et al. May 2011 B2
7941744 Oppenlander et al. May 2011 B2
7975214 Boegelund et al. Jul 2011 B2
8006176 Reddy et al. Aug 2011 B2
8037402 Foushee et al. Oct 2011 B2
8049677 Lum et al. Nov 2011 B2
8060556 Krane et al. Nov 2011 B2
20010021945 Matsuura Sep 2001 A1
20010027439 Holzman et al. Oct 2001 A1
20010027527 Khidekel et al. Oct 2001 A1
20010028808 Nomura et al. Oct 2001 A1
20010038462 Teeuwen et al. Nov 2001 A1
20010039614 Hellberg et al. Nov 2001 A1
20010044787 Shwartz et al. Nov 2001 A1
20020016921 Olsen et al. Feb 2002 A1
20020020750 Dymetman et al. Feb 2002 A1
20020029256 Zintel et al. Mar 2002 A1
20020032745 Honda Mar 2002 A1
20020049786 Bibliowicz et al. Apr 2002 A1
20020052916 Kloba et al. May 2002 A1
20020055984 Chang et al. May 2002 A1
20020059265 Valorose, III May 2002 A1
20020073148 Haines et al. Jun 2002 A1
20020080381 Haines Jun 2002 A1
20020089691 Ferlitsch et al. Jul 2002 A1
20020093676 Parry Jul 2002 A1
20020098027 Koike et al. Jul 2002 A1
20020099796 Chou Jul 2002 A1
20020103827 Sesek Aug 2002 A1
20020105664 Inoue et al. Aug 2002 A1
20020107939 Ford et al. Aug 2002 A1
20020109718 Mansour et al. Aug 2002 A1
20020112037 Koss Aug 2002 A1
20020120792 Blair Aug 2002 A1
20020138279 Al-Kazily et al. Sep 2002 A1
20020138476 Suwa et al. Sep 2002 A1
20020138666 Fujisawa Sep 2002 A1
20020145627 Whitmarsh Oct 2002 A1
20020147858 Motoyama et al. Oct 2002 A1
20020152183 Soares et al. Oct 2002 A1
20020152235 Motoyama et al. Oct 2002 A1
20020152302 Motoyama et al. Oct 2002 A1
20020156688 Horn et al. Oct 2002 A1
20020156795 Edwards et al. Oct 2002 A1
20020156846 Rawat et al. Oct 2002 A1
20020171857 Hisatomi Nov 2002 A1
20020194180 Alsop et al. Dec 2002 A1
20020194350 Lu et al. Dec 2002 A1
20030002074 Miyano Jan 2003 A1
20030007170 Kajita et al. Jan 2003 A1
20030011633 Conley et al. Jan 2003 A1
20030011640 Green et al. Jan 2003 A1
20030014515 Motoyama et al. Jan 2003 A1
20030014529 Simpson et al. Jan 2003 A1
20030033369 Bernhard Feb 2003 A1
20030035133 Berkema et al. Feb 2003 A1
20030038965 Simpson et al. Feb 2003 A1
20030043205 Hill Mar 2003 A1
20030043396 Klosterman et al. Mar 2003 A1
20030043405 Hill Mar 2003 A1
20030048470 Garcia Mar 2003 A1
20030048473 Rosen Mar 2003 A1
20030049037 Sadowara et al. Mar 2003 A1
20030053123 Wu et al. Mar 2003 A1
20030063313 Ito Apr 2003 A1
20030065766 Parry Apr 2003 A1
20030065791 Garg et al. Apr 2003 A1
20030065985 McGeorge, Jr. Apr 2003 A1
20030074267 Acharya et al. Apr 2003 A1
20030074312 White Apr 2003 A1
20030081240 Soto et al. May 2003 A1
20030084114 Simpson et al. May 2003 A1
20030084302 de Jong et al. May 2003 A1
20030088642 Price et al. May 2003 A1
20030106021 Mangrola Jun 2003 A1
20030123112 Kajita et al. Jul 2003 A1
20030131110 Chang et al. Jul 2003 A1
20030140053 Vasey Jul 2003 A1
20030142351 Sakura Jul 2003 A1
20030164987 Enomoto et al. Sep 2003 A1
20030167336 Iwamoto et al. Sep 2003 A1
20030174356 Cherry et al. Sep 2003 A1
20030182632 Murdock et al. Sep 2003 A1
20030184552 Chadha Oct 2003 A1
20030184590 Will Oct 2003 A1
20030184782 Perkins Oct 2003 A1
20030187922 Ohara et al. Oct 2003 A1
20030188193 Venkataramappa Oct 2003 A1
20030188260 Jensen et al. Oct 2003 A1
20030197883 Lay et al. Oct 2003 A1
20030212982 Brooks et al. Nov 2003 A1
20030225796 Matsubara Dec 2003 A1
20030225829 Pena et al. Dec 2003 A1
20030225894 Ito Dec 2003 A1
20030231196 Keohane et al. Dec 2003 A1
20030233437 Kitada et al. Dec 2003 A1
20040003341 alSafadi et al. Jan 2004 A1
20040008363 Suzuki et al. Jan 2004 A1
20040012628 Kropf et al. Jan 2004 A1
20040012644 Allen et al. Jan 2004 A1
20040019705 Ogura Jan 2004 A1
20040030693 Toda Feb 2004 A1
20040034786 Okamoto et al. Feb 2004 A1
20040034807 Rostowfske Feb 2004 A1
20040039990 Bakar et al. Feb 2004 A1
20040044779 Lambert Mar 2004 A1
20040046789 Inanoria Mar 2004 A1
20040054573 Shah et al. Mar 2004 A1
20040061729 Green Apr 2004 A1
20040064759 McGuire et al. Apr 2004 A1
20040068693 Rawat et al. Apr 2004 A1
20040070606 Yang et al. Apr 2004 A1
20040080511 Gilbert Apr 2004 A1
20040080771 Mihira et al. Apr 2004 A1
20040080778 Ito et al. Apr 2004 A1
20040088155 Kerr et al. May 2004 A1
20040093515 Reeves, Jr. May 2004 A1
20040098165 Butikofer May 2004 A1
20040098316 Philippe et al. May 2004 A1
20040098595 Apperle et al. May 2004 A1
20040105104 Ishikawa et al. Jun 2004 A1
20040105122 Schaeffer Jun 2004 A1
20040109028 Stern et al. Jun 2004 A1
20040111670 Sasakuma et al. Jun 2004 A1
20040113941 Sliwa et al. Jun 2004 A1
20040117358 von Kaenel et al. Jun 2004 A1
20040117784 Endoh Jun 2004 A1
20040122659 Hourihane et al. Jun 2004 A1
20040125403 Furst et al. Jul 2004 A1
20040128349 Maruyama Jul 2004 A1
20040130744 Wu et al. Jul 2004 A1
20040130749 Aoki Jul 2004 A1
20040133525 Singh et al. Jul 2004 A1
20040150663 Kim Aug 2004 A1
20040158471 Davis et al. Aug 2004 A1
20040162076 Chowdry et al. Aug 2004 A1
20040165209 Aoki et al. Aug 2004 A1
20040169881 Sato Sep 2004 A1
20040179229 Laughlin Sep 2004 A1
20040181747 Hull et al. Sep 2004 A1
20040187018 Owen et al. Sep 2004 A1
20040193678 Trufinescu et al. Sep 2004 A1
20040161257 Ishihara Oct 2004 A1
20040199538 Matsuda et al. Oct 2004 A1
20040203358 Anderson et al. Oct 2004 A1
20040205118 Yu Oct 2004 A1
20040205533 Lopata et al. Oct 2004 A1
20040205620 Nishikiori et al. Oct 2004 A1
20040212823 Chavers et al. Oct 2004 A1
20040215671 Hyakutake et al. Oct 2004 A1
20040221231 Madril, Jr. et al. Nov 2004 A1
20040223778 Zwiefelhofer Nov 2004 A1
20040226993 Fulcher et al. Nov 2004 A1
20040227968 Nakamura et al. Nov 2004 A1
20040230500 Imago Nov 2004 A1
20040230637 Lecoueche et al. Nov 2004 A1
20040236862 Ito Nov 2004 A1
20040254955 Reese et al. Dec 2004 A1
20040255263 Ando Dec 2004 A1
20040261010 Matsuishi Dec 2004 A1
20040268229 Paoli et al. Dec 2004 A1
20040268306 Cheng et al. Dec 2004 A1
20050005094 Jamieson et al. Jan 2005 A1
20050015472 Catania et al. Jan 2005 A1
20050015585 Kurose Jan 2005 A1
20050022112 Kato Jan 2005 A1
20050026593 Anderson et al. Feb 2005 A1
20050028086 Itavaara et al. Feb 2005 A1
20050044248 Mihira et al. Feb 2005 A1
20050055475 MacKay et al. Mar 2005 A1
20050057560 Bibr et al. Mar 2005 A1
20050060046 Ito et al. Mar 2005 A1
20050060564 Murakami et al. Mar 2005 A1
20050063010 Giannetti Mar 2005 A1
20050068581 Hull et al. Mar 2005 A1
20050071507 Ferlitsch Mar 2005 A1
20050071746 Hart et al. Mar 2005 A1
20050076291 Yee et al. Apr 2005 A1
20050080649 Alvarez et al. Apr 2005 A1
20050086584 Sampathkumar et al. Apr 2005 A1
20050091087 Smith et al. Apr 2005 A1
20050091490 Ogura Apr 2005 A1
20050091671 Deem et al. Apr 2005 A1
20050097458 Wilson May 2005 A1
20050102616 Thurston May 2005 A1
20050108353 Yamamoto May 2005 A1
20050114267 Miwa et al. May 2005 A1
20050114658 Dye et al. May 2005 A1
20050114766 Yamamoto May 2005 A1
20050119955 Dang et al. Jun 2005 A1
20050129423 Lester et al. Jun 2005 A1
20050131715 Trethewey Jun 2005 A1
20050138547 Muhanna et al. Jun 2005 A1
20050149576 Marmaros et al. Jul 2005 A1
20050152334 Okamoto et al. Jul 2005 A1
20050185217 Nishizawa et al. Aug 2005 A1
20050195221 Berger et al. Sep 2005 A1
20050203747 Lecoeuche Sep 2005 A1
20050210399 Filner et al. Sep 2005 A1
20050223413 Duggan et al. Oct 2005 A1
20050231747 Bledsoe et al. Oct 2005 A1
20050231755 Araumi et al. Oct 2005 A1
20050246428 Araumi Nov 2005 A1
20050257134 Goodman et al. Nov 2005 A1
20050257148 Goodman et al. Nov 2005 A1
20050262440 Stanciu et al. Nov 2005 A1
20050265744 Uruta Dec 2005 A1
20060004738 Blackwell et al. Jan 2006 A1
20060007480 Yokokura Jan 2006 A1
20060010180 Kawamura et al. Jan 2006 A1
20060015734 Atobe Jan 2006 A1
20060028397 O'Rourke Feb 2006 A1
20060031411 Gimson et al. Feb 2006 A1
20060038004 Rielly et al. Feb 2006 A1
20060041443 Horvath, Jr. Feb 2006 A1
20060045386 Fukuoka et al. Mar 2006 A1
20060056873 Kimura Mar 2006 A1
20060059434 Boss et al. Mar 2006 A1
20060064647 Tapuska et al. Mar 2006 A1
20060075251 Correl et al. Apr 2006 A1
20060077119 Zhang et al. Apr 2006 A1
20060077411 Mathieson et al. Apr 2006 A1
20060077413 Lum et al. Apr 2006 A1
20060077414 Lum et al. Apr 2006 A1
20060077426 Lovat et al. Apr 2006 A1
20060077427 Zhang et al. Apr 2006 A1
20060077428 Lovat et al. Apr 2006 A1
20060077429 Zhang et al. Apr 2006 A1
20060077430 Zhang et al. Apr 2006 A1
20060077431 Zhang et al. Apr 2006 A1
20060077432 Lovat et al. Apr 2006 A1
20060077433 Zhang et al. Apr 2006 A1
20060077434 Zhang et al. Apr 2006 A1
20060077435 Lovat et al. Apr 2006 A1
20060077436 Zhang et al. Apr 2006 A1
20060077437 Lovat et al. Apr 2006 A1
20060077438 Lovat et al. Apr 2006 A1
20060077439 Yamamura et al. Apr 2006 A1
20060077440 Stevens et al. Apr 2006 A1
20060077442 Lum et al. Apr 2006 A1
20060077443 Lum et al. Apr 2006 A1
20060077444 Lum et al. Apr 2006 A1
20060077445 Yamamura et al. Apr 2006 A1
20060077446 Lum et al. Apr 2006 A1
20060077447 Sojian et al. Apr 2006 A1
20060077448 Plewnia et al. Apr 2006 A1
20060077449 Lum et al. Apr 2006 A1
20060077450 Reddy et al. Apr 2006 A1
20060077451 Nguyen et al. Apr 2006 A1
20060077452 Nguyen et al. Apr 2006 A1
20060077453 Plewnia et al. Apr 2006 A1
20060077454 Lum et al. Apr 2006 A1
20060078345 Lovat et al. Apr 2006 A1
20060078346 Lovat et al. Apr 2006 A1
20060080123 Plewnia Apr 2006 A1
20060080124 Plewnia Apr 2006 A1
20060080129 Reddy et al. Apr 2006 A1
20060080184 Zhang et al. Apr 2006 A1
20060080185 Lovat et al. Apr 2006 A1
20060080731 Zhang et al. Apr 2006 A1
20060085430 Yamamura et al. Apr 2006 A1
20060085835 Istvan et al. Apr 2006 A1
20060086788 Zhang et al. Apr 2006 A1
20060090128 Reddy et al. Apr 2006 A1
20060077423 Mathieson et al. May 2006 A1
20060092097 Reddy et al. May 2006 A1
20060095541 Sojian et al. May 2006 A1
20060095542 Reddy et al. May 2006 A1
20060103588 Chrisop et al. May 2006 A1
20060103873 Reddy et al. May 2006 A1
20060107197 Friend et al. May 2006 A1
20060107212 Lovat et al. May 2006 A1
20060107224 Friend et al. May 2006 A1
20060112123 Clark et al. May 2006 A1
20060117257 Hasson et al. Jun 2006 A1
20060119883 Lovat et al. Jun 2006 A1
20060154227 Rossi et al. Jul 2006 A1
20060162076 Bartlett et al. Jul 2006 A1
20060165105 Shenfield et al. Jul 2006 A1
20060168355 Shenfield et al. Jul 2006 A1
20060174196 Zhang et al. Aug 2006 A1
20060184522 McFarland et al. Aug 2006 A1
20060200748 Shenfield Sep 2006 A1
20060200749 Shenfield Sep 2006 A1
20060221941 Kishinsky et al. Oct 2006 A1
20060224405 White et al. Oct 2006 A1
20060235742 Castellanos et al. Oct 2006 A1
20060277286 Zhang et al. Dec 2006 A1
20060279474 Lum et al. Dec 2006 A1
20060279475 Lum et al. Dec 2006 A1
20070022180 Shu et al. Feb 2007 A1
20070041035 Sembower et al. Feb 2007 A1
20070061129 Barreiro Mar 2007 A1
20070078805 Reddy et al. Apr 2007 A1
20070089049 Gormish et al. Apr 2007 A1
20070091010 Richardson et al. Apr 2007 A1
20070094103 Hyakutake et al. Apr 2007 A1
20070146823 Borchers et al. Jun 2007 A1
20070147610 Kethi Reddy Jun 2007 A1
20070173266 Barnes Jul 2007 A1
20070174894 Matsunaga Jul 2007 A1
20070186150 Rao et al. Aug 2007 A1
20070201654 Shenfield Aug 2007 A1
20070201655 Shenfield Aug 2007 A1
20070226608 Virk et al. Sep 2007 A1
20070233902 Trefler et al. Oct 2007 A1
20070283274 Mettifogo Dec 2007 A1
20070291293 Bellagamba et al. Dec 2007 A1
20080022267 Johnson et al. Jan 2008 A1
20080046806 Reddy et al. Feb 2008 A1
20080072162 Dauerer et al. Mar 2008 A1
20080155396 Dubinko et al. Jun 2008 A1
20080162116 Briggs et al. Jul 2008 A1
Foreign Referenced Citations (76)
Number Date Country
1160657 Dec 2001 EP
09160441 Dec 1995 JP
08234945 Sep 1996 JP
O9293036 Nov 1997 JP
O9330190 Dec 1997 JP
10013695 Jan 1998 JP
10154190 Jun 1998 JP
10240490 Sep 1998 JP
10269184 Oct 1998 JP
2000112691 Apr 2000 JP
2000174949 Jun 2000 JP
2000207108 Jul 2000 JP
2002259071 Feb 2001 JP
2001268296 Sep 2001 JP
200284383 Mar 2002 JP
2002140195 May 2002 JP
2002171380 Jun 2002 JP
2002175195 Jun 2002 JP
2002221877 Aug 2002 JP
2002236830 Aug 2002 JP
2002298049 Oct 2002 JP
2002312148 Oct 2002 JP
2002324049 Nov 2002 JP
2002330253 Nov 2002 JP
2002351644 Dec 2002 JP
2003022258 Jan 2003 JP
2003050781 Feb 2003 JP
2003157155 May 2003 JP
2003178023 Jun 2003 JP
2003196554 Jul 2003 JP
2003198792 Jul 2003 JP
2003208484 Jul 2003 JP
2003209644 Jul 2003 JP
2003216368 Jul 2003 JP
2003216395 Jul 2003 JP
2003223299 Aug 2003 JP
2003260853 Sep 2003 JP
2003281227 Oct 2003 JP
2003288179 Oct 2003 JP
2003308195 Oct 2003 JP
200430448 Jan 2004 JP
2004074530 Mar 2004 JP
2004088561 Mar 2004 JP
2004094313 Mar 2004 JP
2004128561 Apr 2004 JP
2004118549 May 2004 JP
2004164157 Jun 2004 JP
2004185396 Jul 2004 JP
2004213356 Jul 2004 JP
2004215309 Jul 2004 JP
2004222247 Aug 2004 JP
2004228686 Aug 2004 JP
2004228687 Aug 2004 JP
2004240752 Aug 2004 JP
2004246771 Sep 2004 JP
2004310326 Nov 2004 JP
2004310516 Nov 2004 JP
2004276271 Dec 2004 JP
2004358800 Dec 2004 JP
2005014591 Jan 2005 JP
2005033460 Feb 2005 JP
2005059496 Mar 2005 JP
2005070979 Mar 2005 JP
2005078278 Mar 2005 JP
2005084891 Mar 2005 JP
2005115543 Apr 2005 JP
2005004243 Jun 2005 JP
2005209059 Aug 2005 JP
2005219440 Aug 2005 JP
2005235034 Sep 2005 JP
2005269250 Sep 2005 JP
2006053905 Feb 2006 JP
2006140898 Jun 2006 JP
WO0118754 Mar 2001 WO
WO0133381 May 2001 WO
WO0198864 Dec 2001 WO
Non-Patent Literature Citations (312)
Entry
Ratha, N.K., Connell, J.H., Bolle, R.M. “Enhancing security and privacy in biometrics-based authentication systems”. IBM Systems Journal 40(3), pp. 614-634 (2001).
U.S. Appl. No. 10/962,248—Final Office Action dated Jun. 10, 2009.
U.S. Appl. No. 10/962,248—Non-Final Office Action dated Jan. 29, 2010.
U.S. Appl. No. 11/232,588—Non-Final Office Action dated Apr. 1, 2009.
U.S. Appl. No. 11/232,588—Final Office Action dated Nov. 27, 2009.
U.S. Appl. No. 10/961,793—Non-Final Office Action dated Jun. 24, 2009.
U.S. Appl. No. 10/961,793—Final Office Action dated Feb. 4, 2010.
U.S. Appl. No. 10/961,911—Non-Final Office Action dated Jun. 8, 2009.
U.S. Appl. No. 10/961,911—Non-Final Office Action dated Feb. 3, 2010.
U.S. Appl. No. 10/962,103—Non-Final Office Action dated Aug. 14, 2009.
U.S. Appl. No. 11/232,827—Final Office Action dated Jun. 4, 2009.
U.S. Appl. No. 11/232,827—Non-Final Office Action dated Dec. 1, 2009.
U.S. Appl. No. 11/233,202—Non-Final Office Action dated Jun. 9, 2009.
U.S. Appl. No. 11/233,202—Final Office Action dated Jan. 15, 2010.
U.S. Appl. No. 11/233,201—Final Office Action dated Apr. 28, 2009.
U.S. Appl. No. 11/233,201—Non-Final Office Action dated Sep. 4, 2009.
U.S. Appl. No. 11/232,552—Final Office Action dated Jun. 24, 2009.
U.S. Appl. No. 11/232,552—Non-Final Office Action dated Dec. 24, 2009.
U.S. Appl. No. 11/233,270—Final Office Action dated Mar. 31, 2009.
U.S. Appl. No. 11/233,270—Final Office Action dated Nov. 27, 2009.
U.S. Appl. No. 11/465,699—Non-Final Office Action dated Sep. 17, 2008.
U.S. Appl. No. 11/465,699—Final Office Action dated Mar. 31, 2009.
U.S. Appl. No. 11/465,699—Final Office Action dated Nov. 27, 2009.
U.S. Appl. No. 11/465,722—Non-Final Office Action dated Dec. 24, 2009.
U.S. Appl. No. 11/241,501—Final Office Action dated May 13, 2009.
U.S. Appl. No. 11/241,501—Non-Final Office Action dated Feb. 9, 2010.
U.S. Appl. No. 11/241,497—Non-Final Office Action dated Oct. 6, 2009.
U.S. Appl. No. 11/241,011—Final Office Action dated Apr. 2, 2009.
U.S. Appl. No. 11/241,011—Non-Final Office Action dated Jan. 4, 2010.
U.S. Appl. No. 11/241,010—Final Office Action dated Mar. 20, 2009.
U.S. Appl. No. 11/241,071—Non-Final Office Action dated Aug. 19, 2009.
U.S. Appl. No. 11/241,447—Non-Final Office Action dated Jul. 22, 2009.
U.S. Appl. No. 11/241,498—Non-Final Office Action dated Dec. 10, 2009.
U.S. Appl. No. 11/240,039—Final Office Action dated Apr. 13, 2009.
U.S. Appl. No. 11/240,039—Non-Final Office Action dated Nov. 3, 2009.
U.S. Appl. No. 11/240,156—Non-Final Office Action dated Sep. 16, 2009.
U.S. Appl. No. 11/255,611—Notice of Allowance dated Aug. 10, 2009.
U.S. Appl. No. 11/256,479—Final Office Action dated Apr. 1, 2009.
U.S. Appl. No. 11/256,479—Non-Final Office Action dated Nov. 16, 2009.
U.S. Appl. No. 11/192,617—Non-Final Office Action dated Sep. 29, 2009.
U.S. Appl. No. 11/193,154—Non-Final Office Action dated Jun. 3, 2009.
U.S. Appl. No. 11/193,154—Final Office Action dated Dec. 7, 2009.
U.S. Appl. No. 11/192,630—Final Office Action dated Sep. 2, 2009.
U.S. Appl. No. 11/192,546—Final Office Action dated Jun. 30, 2009.
U.S. Appl. No. 11/192,546—Non-Final Office Action dated Nov. 24, 2009.
U.S. Appl. No. 11/193,077—Notice of Allowance dated Mar. 11, 2008.
U.S. Appl. No. 11/192,870—Non-Final Office Action dated Jul. 17, 2009.
U.S. Appl. No. 11/192,870—Final Office Action dated Jan. 4, 2010.
U.S. Appl. No. 11/192,865—Non-Final Office Action dated Aug. 20, 2009.
U.S. Appl. No. 11/192,836—Notice of Allowance dated Dec. 30, 2008.
U.S. Appl. No. 11/192,616—Non-Final Office Action dated Sep. 17, 2009.
U.S. Appl. No. 11/193,147—Notice of Allowance dated Dec. 30, 2008.
U.S. Appl. No. 11/192,868—Final Office Action dated Aug. 11, 2009.
U.S. Appl. No. 11/192,629—Final Office Action dated Jun. 26, 2009.
U.S. Appl. No. 11/192,629—Non-Final Office Action dated Jan. 15, 2010.
U.S. Appl. No. 11/193,151—Final Office Action dated Sep. 21, 2009.
U.S. Appl. No. 11/193,188—Final Office Action dated Aug. 5, 2009.
U.S. Appl. No. 11/192,824—Non-Final Office Action dated Sep. 18, 2009.
U.S. Appl. No. 11/193,140—Final Office Action dated May 18, 2009.
U.S. Appl. No. 11/193,140—Notice of Allowance dated Jan. 29, 2010.
U.S. Appl. No. 11/192,796—Non-Final Office Action dated Dec. 28, 2009.
U.S. Appl. No. 11/192,615—Non-Final Office Action dated Sep. 4, 2009.
U.S. Appl. No. 11/192,547—Final Office Action dated Jan. 15, 2010.
U.S. Appl. No. 11/192,467—Non-Final Office Action dated Nov. 13, 2009.
U.S. Appl. No. 11/255,333—Notice of Allowance dated Nov. 3, 2009.
U.S. Appl. No. 11/465,747—Non-Final Office Action dated Jun. 24, 2009.
U.S. Appl. No. 11/465,752—Non-Final Office Action dated Jun. 24, 2009.
U.S. Appl. No. 11/241,320—Non-Final Office Action dated Oct. 7, 2009.
U.S. Appl. No. 11/240,139—Non-Final Office Action dated Oct. 6, 2009.
U.S. Appl. No. 11/240,084—Final Office Action dated Apr. 15, 2009.
U.S. Appl. No. 11/240,084—Non-Final Office Action dated Dec. 16, 2009.
U.S. Appl. No. 11/218,033—Final Office Action dated Mar. 30, 2009.
U.S. Appl. No. 11/218,033—Non-Final Office Action dated Sep. 8, 2009.
U.S. Appl. No. 11/218,186—Non-Final Office Action dated Jun. 23, 2009.
U.S. Appl. No. 11/218,186—Final Office Action dated Feb. 1, 2010.
U.S. Appl. No. 11/562,342—Non-Final Office Action dated May 29, 2009.
U.S. Appl. No. 11/562,342—Final Office Action dated Dec. 21, 2009.
U.S. Appl. No. 11/685,046—Non-Final Office Action dated Jul. 8, 2009.
U.S. Appl. No. 11/685,046—Final Office Action dated Dec. 21, 2009.
JP Patent App. No. 2006-261563—Office Action filed for a related foreign application dated Jan. 19, 2010.
JP Patent App. No. 2006-207199—Office Action filed for a related foreign application dated Feb. 2, 2010.
JP Patent App. No. 2006-058600—Office Action filed for a related foreign application dated Aug. 18, 2009.
JP Patent App. No. 2005-295772—Office Action filed for a related foreign application dated Sep. 15, 2009.
JP Patent App. No. 2005-295772—Notice of Allowance filed for a related foreign application dated Dec. 15, 2009.
JP Patent App. No. 2006-207200—Office Action filed for a related foreign application dated Feb. 2, 2010.
JP Patent App. No. 2006-207194—Office Action filed for a related foreign application dated Jan. 12, 2010.
JP Patent App. No. 2006-261564—Office Action filed for a related foreign application dated Jan. 19, 2010.
JP Patent App. No. 2006-207199—Office Action filed for a related foreign application dated Nov. 17, 2009.
JP Patent App. No. 2007-225913—Office Action filed for a related foreign application dated Dec. 24, 2009.
JP Patent App. No. 2006-256442—Office Action filed for a related foreign application dated Jul. 14, 2009.
JP Patent App. No. 2006-207194—Office Action filed for a related foreign application dated Jun. 23, 2009.
F.D. Wright, Design Goals for an Internet Printing Protocol, Apr. 1999, pp. 1-43, http://tools.ietf.org/html/rfc2567.
R. Herriot, Internet Printing Protocol (IPP): Event Notifications and Subscriptions (Feb. 21, 2003, retrieved from http://tools.ietf.org/html/draft-ietf-ipp-not-spec-11 on Aug. 20, 2008, pp. 1-101).
T. Hastings, “Internet Printing Protocol/1.1: Model and Semantics” (Sep. 2000, retrieved from http://www.ietf.org/rfc/rfc291.txt on Sep. 18, 2008, pp. 1-210).
R. Herriot, Internet Printing Protocol (IPP): Event Notifications and Subscriptions, Jun. 21, 2004, http://tools.ietf.org/html/draft-ietf-ipp-not-spec-12, pp. 1-98.
Microsoft Corporation. Microsoft Computer Dictionary, Fifth Edition, 2002 Microsoft Press, pp. 487-488.
Gaedke, Martin et al. “A Modeling Approach to Federated Identity and Access Management”, May 2005 ACM.
FOLDOC. “relational database”, Jun. 2002, retrieved from <http://foldoc.org/index.cgi?query=relational+database>.
OASIS. “Security Assertion Markup Language (SAML) 2.0 Technical Overview”, Working Draft 01, Jul. 22, 2004, <http://www.oasis-open.org/committees/documents.php?wg—abbrev=security>.
Hartman, Bret et al. Mastering Web Services Security, 2003 Wiley Publishing, Inc., pp. 36-46.
U.S. Appl. No. 10/962,248—Office Action dated Aug. 19, 2008.
U.S. Appl. No. 10/961,793—Office Action dated Jun. 20, 2008.
U.S. Appl. No. 10/961,793—Office Action dated Dec. 19, 2008.
U.S. Appl. No. 10/961,911—Office Action dated Oct. 28, 2008.
U.S. Appl. No. 10/961,594—Office Action dated Dec. 3, 2008.
U.S. Appl. No. 10/961,594—Office Action dated Mar. 16, 2009.
U.S. Appl. No. 10/962,103—Office Action dated Jul. 9, 2008.
U.S. Appl. No. 10/962,103—Office Action dated Jan. 23, 2009.
U.S. Appl. No. 11/232,827—Office Action dated Dec. 5, 2008.
U.S. Appl. No. 11/233,202—Office Action dated Jun. 5, 2008.
U.S. Appl. No. 11/233,202—Office Action dated Dec. 1, 2008.
U.S. Appl. No. 11/233,201—Office Action dated Oct. 3, 2008.
U.S. Appl. No. 11/232,552—Office Action dated Nov. 18, 2008.
U.S. Appl. No. 11/233,270—Office Action dated Sep. 17, 2008.
U.S. Appl. No. 11/241,501—Office Action dated Oct. 23, 2008.
U.S. Appl. No. 11/241,497—Office Action dated Feb. 20, 2009.
U.S. Appl. No. 11/241,497—Office Action dated Aug. 27, 2008.
U.S. Appl. No. 11/241,011—Office Action dated Oct. 8, 2008.
U.S. Appl. No. 11/241,010—Office Action dated Oct. 9, 2008.
U.S. Appl. No. 11/241,071—Office Action dated Mar. 3, 2009.
U.S. Appl. No. 11/241,071—Office Action dated Sep. 19, 2008.
U.S. Appl. No. 11/241,447—Office Action dated Mar. 5, 2009.
U.S. Appl. No. 11/241,447—Office Action dated Sep. 15, 2008.
U.S. Appl. No. 11/241,498—Office Action dated Sep. 16, 2008.
U.S. Appl. No. 11/241,498—Office Action dated Mar. 5, 2009.
U.S. Appl. No. 11/240,039—Office Action dated Oct. 20, 2008.
U.S. Appl. No. 11/240,156—Office Action dated Aug. 28, 2008.
U.S. Appl. No. 11/240,156—Office Action dated Feb. 20, 2009.
U.S. Appl. No. 11/255,611—Office Action dated Mar. 12, 2009.
U.S. Appl. No. 11/256,479—Office Action dated Nov. 4, 2008.
U.S. Appl. No. 11/255,333—Office Action dated Mar. 13, 2009.
U.S. Appl. No. 11/193,154—Office Action dated Dec. 2, 2008.
U.S. Appl. No. 11/192,630—Office Action dated Jan. 21, 2009.
U.S. Appl. No. 11/192,546—Office Action dated Jan. 22, 2009.
U.S. Appl. No. 11/192,836—Office Action dated Jul. 9, 2008.
U.S. Appl. No. 11/193,147—Office Action dated Jul. 9, 2008.
U.S. Appl. No. 11/192,868—Office Action dated Feb. 2, 2009.
U.S. Appl. No. 11/192,629—Office Action dated Jan. 22, 2009.
U.S. Appl. No. 11/193,151—Office Action dated Feb. 23, 2009.
U.S. Appl. No. 11/193,188—Office Action dated Jan. 21, 2009.
U.S. Appl. No. 11/193,140—Office Action dated Nov. 18, 2008.
U.S. Appl. No. 11/192,796—Office Action dated Feb. 24, 2009.
U.S. Appl. No. 11/192,547—Office Action dated Feb. 5, 2009.
U.S. Appl. No. 11/240,084—Office Action dated Oct. 30, 2008.
U.S. Appl. No. 11/218,033—Office Action dated Sep. 12, 2008.
U.S. Appl. No. 10/961,911—Office Action dated Apr. 16, 2008.
U.S. Appl. No. 10/961,594—Office Action dated Jan. 7, 2008.
U.S. Appl. No. 11/193,077—Office Action dated Apr. 6, 2007.
U.S. Appl. No. 11/192,836—Office Action dated Dec. 5, 2007.
U.S. Appl. No. 11/192,836—Office Action dated Jul. 3, 2007.
U.S. Appl. No. 11/192,836—Office Action dated Jan. 30, 2007.
U.S. Appl. No. 11/193,147—Office Action dated Dec. 6, 2007.
U.S. Appl. No. 11/193,147—Office Action dated Jul. 23, 2007.
U.S. Appl. No. 11/193,147—Office Action dated Feb. 9, 2007.
Foreign Patent App. No. JP2006-058600—Office Action filed for a related foreign application dated Aug. 18, 2009 corresponding to U.S. Appl. No. 11/073,055.
Foreign Patent App. No. JP2006-207200—Office Action filed for a related foreign application dated Jun. 1, 2010 corresponding to U.S. Appl. No. 11/192,547.
Foreign Patent App. No. JP2006-207196—Office Action filed for a related foreign application dated Mar. 2, 2010 corresponding to U.S. Appl. No. 11/192,862.
Foreign Patent App. No. JP2006-256441—Office Action filed for a related foreign application dated Mar. 30, 2010 corresponding to U.S. Appl. No. 11/233,202.
Foreign Patent App. No. JP2006-207198—Office Action filed for a related foreign application dated Mar. 2, 2010 corresponding to U.S. Appl. No. 11/192,616.
U.S. Appl. No. 10/961,594—Final Office Action dated Apr. 2, 2010.
U.S. Appl. No. 10/962,103—Non-final Office Action dated May 14, 2010.
U.S. Appl. No. 11/232,827—Final Office Action dated Jun. 14, 2010.
U.S. Appl. No. 11/233,201—Final Office Action dated Jun. 3, 2010.
U.S. Appl. No. 11/232,588—Notice of Allowance dated Jun. 23, 2010.
U.S. Appl. No. 11/233,270—Non-final Office Action dated Jun. 9, 2010.
U.S. Appl. No. 11/465,699—Non-final Office Action dated Nov. 16, 2009.
U.S. Appl. No. 11/465,699—Final Office Action dated May 24, 2010.
U.S. Appl. No. 11/465,722—Final Office Action dated Apr. 30, 2010.
U.S. Appl. No. 11/241,011—Final Office Action dated Jun. 29, 2010.
U.S. Appl. No. 11/241,010—Non-final Office Action dated Apr. 15, 2010.
U.S. Appl. No. 11/241,071—Final Office Action dated Apr. 16, 2010.
U.S. Appl. No. 11/241,447—Final Office Action dated Apr. 1, 2010.
U.S. Appl. No. 11/240,039—Notice of Allowance dated Jun. 3, 2010.
U.S. Appl. No. 11/240,156—Final Office Action dated Mar. 31, 2010.
U.S. Appl. No. 11/256,479—Final Office Action dated May 13, 2010.
U.S. Appl. No. 11/192,617—Final Office Action dated Jun. 11, 2010.
U.S. Appl. No. 11/193,076—Non-final Office Action dated Apr. 5, 2010.
U.S. Appl. No. 11/192,630—Non-final Office Action dated Apr. 9, 2010.
U.S. Appl. No. 11/192,546—Final Office Action dated Jul. 14, 2010.
U.S. Appl. No. 11/192,937—First Action Interview Pilot Program Pre-Interview Communication dated Apr. 7, 2010.
U.S. Appl. No. 11/192,616—Final Office Action dated May 26, 2010.
U.S. Appl. No. 11/192,500—Non-final Office Action dated Jul. 21, 2010.
U.S. Appl. No. 11/192,868—Non-final Office Action dated May 19, 2010.
U.S. Appl. No. 11/193,188—Non-final Office Action dated Apr. 19, 2010.
U.S. Appl. No. 11/192,824—Non-final Office Action dated Mar. 1, 2010.
U.S. Appl. No. 11/192,615—Final Office Action dated Apr. 20, 2010.
U.S. Appl. No. 11/192,547—Non-final Office Action dated Jun. 25, 2010.
U.S. Appl. No. 11/192,467—Final Office Action dated Jun. 25, 2010.
U.S. Appl. No. 11/256,493—Non-final Office Action dated Mar. 9, 2010.
U.S. Appl. No. 11/465,752—Final Office Action dated Apr. 2, 2010.
U.S. Appl. No. 11/241,320—Final Office Action dated Jun. 17, 2010.
U.S. Appl. No. 11/240,139—Final Office Action dated Jun. 9, 2010.
U.S. Appl. No. 11/536,115—Non-final Office Action dated Jun. 15, 2010.
U.S. Appl. No. 11/218,033—Final Office Action dated May 14, 2010.
E. Uemukai Toshiaki, A WWW Browsing System in Remote Display Environments, IPSJ magazine, Information Processing Society of Japan, Publication Date: Sep. 15, 2000, vol. 41, No. 9, p. 2364 to 2373.
Foreign Patent App. No. JP2006256440—Office Action filed for a related foreign application dated Jun. 7, 2010 corresponding to U.S. Appl. No. 11/233,270.
Foreign Patent App. No. JP2006261564—Office Action filed for a related foreign application dated Jun. 15, 2010 corresponding to U.S. Appl. No. 11/241,010.
Foreign Patent App. No. JP2006207195—Office Action filed for a related foreign application dated Jul. 27, 2010 corresponding to U.S. Appl. No. 11/192,617.
U.S. Appl. No. 10/962,248—Final Office Action dated Aug. 17, 2010.
U.S. Appl. No. 10/961,594—Non-Final Office Action dated Sep. 15, 2010.
U.S. Appl. No. 11/233,202—Non-Final Office Action dated Jul. 27, 2010.
U.S. Appl. No. 11/233,201—Non-Final Office Action dated Sep. 15, 2010.
U.S. Appl. No. 11/232,552—Final Office Action dated Aug. 19, 2010.
U.S. Appl. No. 11/241,501—Final Office Action dated Jul. 22, 2010.
U.S. Appl. No. 11/241,497—Notice of Allowance dated Aug. 11, 2010.
U.S. Appl. No. 11/241,498—Final Office Action dated Jul. 22, 2010.
U.S. Appl. No. 11/192,862—Non-Final Office Action dated Jul. 26, 2010.
U.S. Appl. No. 11/192,937—Notice of Allowance dated Sep. 7, 2010.
U.S. Appl. No. 11/192,865—Final Office Action dated Mar. 4, 2010.
U.S. Appl. No. 11/192,865—Non-Final Office Action dated Sep. 2, 2010.
U.S. Appl. No. 11/192,629—Final Office Action dated Aug. 25, 2010.
U.S. Appl. No. 11/192,796—Notice of Allowance dated Sep. 10, 2010.
U.S. Appl. No. 11/256,493—Final Office Action dated Aug. 20, 2010.
U.S. Appl. No. 11/240,084—Final Office Action dated Aug. 6, 2010.
Canon USA, Inc.; MEAP Multifunctional Embedded Application Platform; Aug. 2004; http://developersuport.canon.com/Web—MEAP—Presentation.pdf.
Canon USA, Inc.; MEAP: FAQ; accessed on Jul. 2004, pub. date unknown; http://developersupport.canon.com/MEAP.htm.
Xerox, Inc.; Xerox FreeFlow digital workflow collection; 2003; http://www.xerox.com/downloads/usa/en/s/solutions—digital—workflow—whitepaper—sdk.pdf.
Ricoh Company, Ltd.; Ricoh's Medium-Term Management Plan; Mar. 19, 2002; http://www.ricoh.com/IR/data/pre/pdf/ir—pre2002.pdf.
Ricoh Company, Ltd.; White Paper: Embedded Software Architecture SDK; Jun. 25, 2003. http://www.ricoh-usa.com/products/concept/esa.asp?catname=ESA.
Hewlett-Packard Company; JetCAPS Scan2Folder; 2003; http://www.jetcaps.se/resources/datasheets/ds—scan2folder.pdf.
Hewlett-Packard Company; JetCAPS chai applications; Dec. 9, 2002; http://www.stethos.com/chai/data/d—us—chai.pdf.
Foreign Patent App. No. JP2006205150—Office Action filed for a related foreign application dated Sep. 28, 2010 corresponding to U.S. Appl. No. 11/192,500.
Foreign Patent App. No. JP2006207198—Office Action filed for a related foreign application dated Sep. 21, 2010 corresponding to U.S. Appl. No. 11/192,836.
Foreign Patent App. No. JP2006256441—Office Action filed for a related foreign application dated Nov. 9, 2010 corresponding to U.S. Appl. No. 11/233,202.
Foreign Patent App. No. JP2006256440—Office Action filed for a related foreign application dated Oct. 19, 2010 corresponding to U.S. Appl. No. 11/233,270.
U.S. Appl. No. 10/961,793—Non-Final Office Action dated Oct. 28, 2010.
U.S. Appl. No. 10/961,911—Final Office Action dated Oct. 20, 2010.
U.S. Appl. No. 11/233,270—Notice of Allowance dated Nov. 30, 2010.
U.S. Appl. No. 11/241,010—Final Office Action dated Oct. 15, 2010.
U.S. Appl. No. 11/240,156—Non-Final Office Action dated Nov. 10, 2010.
U.S. Appl. No. 11/256,479—Non-Final Office Action dated Nov. 23, 2010.
U.S. Appl. No. 11/193,152—Non-Final Office Action dated Mar. 1, 2010.
U.S. Appl. No. 11/193,152—Final Office Action dated Nov. 18, 2010.
U.S. Appl. No. 11/193,151—Non-Final Office Action dated Mar. 29, 2010.
U.S. Appl. No. 11/193,151—Final Office Action dated Nov. 2, 2010.
U.S. Appl. No. 11/192,824—Final Office Action dated Oct. 22, 2010.
U.S. Appl. No. 11/465,747—Final Office Action dated Mar. 9, 2010.
U.S. Appl. No. 11/241,447—Non-Final Office Action dated Dec. 8, 2010.
U.S. Appl. No. 11/193,076—Final Office Action dated Jan. 6, 2011.
U.S. Appl. No. 11/192,630—Final Office Action dated Dec. 8, 2010.
U.S. Appl. No. 11/192,868—Final Office Action dated Dec. 8, 2010.
U.S. Appl. No. 11/193,188—Final Office Action dated Dec. 8, 2010.
U.S. Appl. No. 11/192,615—Non-Final Office Action dated Jan. 4, 2011.
U.S. Appl. No. 11/192,467—Notice of Allowance dated Dec. 22, 2010.
U.S. Appl. No. 11/465,747—Notice of Allowance dated Dec. 28, 2010.
Foreign Patent App. No. JP2006205159—Japanese Office Action filed for a related foreign application dated Sep. 27, 2011 corresponding to U.S. Appl. No. 11/192,500.
U.S. Appl. No. 11/232,552—Final Office Action dated Aug. 5, 2011.
U.S. Appl. No. 11/465,722—Non-Final Office Action dated Aug. 5, 2011.
U.S. Appl. No. 11/192,862—Non-Final Office Action dated Oct. 13, 2011.
U.S. Appl. No. 11/192,870—Final Office Action dated Aug. 8, 2011.
U.S. Appl. No. 11/192,500—Non-Final Office Action dated Sep. 30, 2011.
U.S. Appl. No. 11/192,615—Final Office Action dated Oct. 11, 2011.
U.S. Appl. No. 11/465,752—Final Office Action dated Oct. 31, 2011.
U.S. Appl. No. 10/961,594—Notice of Allowance dated Oct. 13, 2011.
U.S. Appl. No. 11/465,699—Notice of Allowance dated Sep. 30, 2011.
U.S. Appl. No. 11/241,011—Notice of Allowance dated Sep. 6, 2011.
U.S. Appl. No. 11/192,617—Notice of Allowance dated Oct. 11, 2011.
U.S. Appl. No. 11/193,076—Notice of Allowance dated Oct. 11, 2011.
U.S. Appl. No. 11/192,546—Notice of Allowance dated Aug. 30, 2011.
U.S. Appl. No. 11/192,616—Notice of Allowance dated Oct. 11, 2011.
U.S. Appl. No. 11/193,151—Notice of Allowance dated Aug. 22, 2011.
U.S. Appl. No. 11/241,320—Notice of Allowance dated Oct. 11, 2011.
U.S. Appl. No. 11/240,139—Notice of Allowance dated Oct. 11, 2011.
U.S. Appl. No. 11/240,084—Notice of Allowance dated Oct. 11, 2011.
U.S. Appl. No. 11/218,033—Notice of Allowance dated Oct. 11, 2011.
U.S. Appl. No. 11/218,186—Notice of Allowance dated Oct. 11, 2011.
Foreign Patent App. No. JP2006261563—Interrogation Report filed for a related foreign application dated Jun. 7, 2011 corresponding to U.S. Appl. No. 11/241,501.
Foreign Patent App. No. JP2006207200—Interrogation Report filed for a related foreign application dated Mar. 8, 2011 corresponding to U.S. Appl. No. 11/192,615.
U.S. Appl. No. 10/961,594—Final Office Action dated May 19, 2011.
U.S. Appl. No. 11/232,827—Non-Final Office Action dated May 26, 2011.
U.S. Appl. No. 11/233,202—Final Office Action dated Mar. 23, 2011.
U.S. Appl. No. 11/465,699—Non-Final Office Action dated Mar. 23, 2011.
U.S. Appl. No. 11/241,011—Non-Final Office Action dated Feb. 17, 2011.
U.S. Appl. No. 11/192,617—Non-Final Office Action dated Jun. 9, 2011.
U.S. Appl. No. 11/192,546—Non-Final Office Action dated Feb. 17, 2011.
U.S. Appl. No. 11/192,862—Final Office Action dated Mar. 21, 2011.
U.S. Appl. No. 11/192,870—Non-Final Office Action dated Feb. 22, 2011.
U.S. Appl. No. 11/192,616—Non-Final Office Action dated Jun. 9, 2011.
U.S. Appl. No. 11/192,500—Final Office Action dated Mar. 21, 2011.
U.S. Appl. No. 11/193,151—Non-Final Office Action dated Mar. 16, 2011.
U.S. Appl. No. 11/192,824—Non-Final Office Action dated Jun. 9, 2011.
U.S. Appl. No. 11/192,547—Final Office Action dated Mar. 7, 2011.
U.S. Appl. No. 11/465,752—Non-Final Office Action dated Apr. 1, 2011.
U.S. Appl. No. 11/241,320—Non-Final Office Action dated Jun. 9, 2011.
U.S. Appl. No. 11/240,139—Non-Final Office Action dated Jun. 10, 2011.
U.S. Appl. No. 11/240,084—Non-Final Office Action dated May 12, 2011.
U.S. Appl. No. 11/536,115—Final Office Action dated Mar. 10, 2011.
U.S. Appl. No. 11/218,033—Non-Final Office Action dated Jun. 9, 2011.
U.S. Appl. No. 11/218,186—Non-Final Office Action dated Jun. 16, 2011.
U.S. Appl. No. 10/962,248—Notice of Allowance dated Apr. 1, 2011.
U.S. Appl. No. 10/961,793—Notice of Allowance dated Jun. 10, 2011.
U.S. Appl. No. 10/962,103—Notice of Allowance dated Feb. 22, 2011.
U.S. Appl. No. 11/233,201—Notice of Allowance dated Jun. 24, 2011.
U.S. Appl. No. 11/241,501—Notice of Allowance dated Feb. 17, 2011.
U.S. Appl. No. 11/241,010—Notice of Allowance dated May 27, 2011.
U.S. Appl. No. 11/241,071—Notice of Allowance dated May 3, 2011.
U.S. Appl. No. 11/241,447—Notice of Allowance dated Jul. 13, 2011.
U.S. Appl. No. 11/241,498—Notice of Allowance dated Apr. 1, 2011.
U.S. Appl. No. 11/240,156—Notice of Allowance dated Jul. 12, 2011.
U.S. Appl. No. 11/256,479—Notice of Allowance dated Jul. 13, 2011.
U.S. Appl. No. 11/192,630—Notice of Allowance dated May 31, 2011.
U.S. Appl. No. 11/192,865—Notice of Allowance dated May 19, 2011.
U.S. Appl. No. 11/192,868—Notice of Allowance dated Apr. 29, 2011.
U.S. Appl. No. 11/193,152—Notice of Allowance dated Apr. 8, 2011.
U.S. Appl. No. 11/192,629—Notice of Allowance dated Apr. 11, 2011.
U.S. Appl. No. 11/192,824—Notice of Allowance dated Apr. 20, 2011.
U.S. Appl. No. 11/256,493—Notice of Allowance dated Apr. 15, 2011.
U.S. Appl. No. 11/232,827—Notice of Allowance dated Dec. 1, 2011.
U.S. Appl. No. 11/232,552—Notice of Allowance dated Jan. 20, 2012.
U.S. Appl. No. 11/465,722—Final Office Action dated Feb. 5, 2011.
U.S. Appl. No. 11/465,752—Notice of Allowance dated Feb. 14, 2012.
U.S. Appl. No. 11/536,115—Non-final Office Action dated Feb. 24, 2012.
Related Publications (1)
Number Date Country
20060198653 A1 Sep 2006 US