Methods for secure enrollment and backup of personal identity credentials into electronic devices

Abstract
A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device.
Description
BACKGROUND OF THE INVENTION

1. Field of the Invention


This invention relates generally to the field of information security, and more particularly to an enrollment process for devices capable of storing and releasing personal identity credentials based on authentication of a human fingerprint.


2. Necessity of the Invention


Devices and applications that use biometric authentication are increasing in popularity and frequency of use in applications where information security and privacy is critical. The success rates of devices that use biometrics as a form of authorization are dependent on the accuracy of the process by which information is associated with the biometric; for example, it must not be possible for John Doe to intercept Jane Doe's enrollment process and enroll Jane Doe's credentials into a device with his fingerprint. A generalized enrollment process includes capturing a biometric sample, ensuring the legitimacy of the sample and the individual providing the sample, storing the biometric sample in the appropriate location in the device, and enabling access rights to the enrolled individual. If this enrollment process is performed incorrectly or ineffectively then the process of biometric authentication and the implicit guarantee of enhanced security are easily defeated.


A variety of portable electronic devices with biometric authentication are available to consumers. These include Hewlett Packard's iPAQ Pocket PC h5450, 3M-AiT's VeriMe, Privaris' BPID™ Security Device, and Sony's FIU-900 Puppy®. Each device is capable of storing fingerprints and performing on-board matching. Several of these products are configurable to allow use of cryptographic keys after proof of biometric identification. As discussed in the following section, ownership of cryptographic keys is typically used as a form of remote identification when individuals are communicating digitally. It is imperative, then, that the fingerprint is definitively linked to an individual, so that the cryptographic keys cannot be misused.


Furthermore, because the enrollment process must necessarily be stringent, and likely time-consuming, it is desirable to have a simple method of archiving and restoring enrolled credentials and fingerprints. Clearly the method must be inherently secure, because the entire enrollment process could be overridden by a compromise of the backup process.


DESCRIPTION OF THE RELATED ART

Public Key Infrastructure


The public key infrastructure (PKI) and digital certificates are very common and, when used correctly, can be used to guarantee a ‘cryptographic identity’ of an individual. The most common form of the PKI uses the RSA algorithm, which is now freely available to the public.


To use the PKI, an individual—Alice—applies for a digital certificate from a trusted authority. After a substantive background investigatory process, the trusted authority decides that Alice is who she claims to be and decides to issue a digital certificate. The certificate includes a public key, one half of an asymmetric key pair, which is assigned only to Alice. She retains the other half of the key pair, the private key. Due to the fundamental principles of public key cryptography, anything encrypted by the Alice's private key can only be decrypted using her public key, and vice versa. Alice is free to distribute the digital certificate and the public key to whomever she wishes.


When another individual, Bob, wishes to send a message to Alice, he encrypts it with her public key. Alice receives the encrypted message and uses her private key to decrypt it. Because Alice is the unique owner of her public key, Bob knows that she possesses the unique and accompanying private key. Additionally, Bob sees that a trusted authority, which he knows performs substantive background checks, issued the digital certificate issued to Alice. He is assured that the only person who can read the message is truly Alice. This assures one-way security.


However, Alice cannot be sure that Bob sent her the message, because her public key is freely accessible. To combat this problem, Bob also requests and receives a digital certificate from a trusted authority. Bob writes his message and then creates a digital signature for the message. He first creates a hash of the message; this process creates a fixed-length string that is unique to the message but cannot be used to deduce the message. He then encrypts this hash using his private key and appends the encrypted hash to his message. The message and encrypted hash are now encrypted with Alice's public key, and transmitted to her.


Alice first decrypts the message with her private key. She can now read the message, as described above. However, she also has the encrypted hash, which she can use to verify that Bob sent the message. She uses Bob's public key to decrypt the digital signature and obtain the hash. Alice then hashes the received message herself, using the same hash algorithm as Bob. If she obtains the same hash value as the one transmitted by Bob, she is assured that the message has not changed, and that he did actually send the message.


Enrollment Processes


3M-AiT's VeriMe stores a biometric template and a cryptographic private key for one user. When the user wishes to use the cryptographic private key, he or she must supply the correct biometric template. According to the VeriMe fact sheet, the private key is generated at the time of “secure registration” of the fingerprint. However, the fact sheet does not describe the secure registration or what it entails; it also does not discuss a secure backup and recovery process.


Biometric Associates (BAI) produces a fingerprint sensor that can be embedded into a smartcard. The smartcard can then be used to perform local biometric authentication, like the devices described above. According to BAI's website, the cards can enroll up to eight users with the use of a BAI Enrollment Station. The Enrollment Station provides external equipment necessary to instruct the smartcard to start enrolling fingerprints and personal credentials. However, the published information does not describe a secure cryptographic process for accomplishing this. It also does not describe secure backup and recovery processes.


BRIEF SUMMARY OF THE INVENTION

The invention disclosed herein describes processes for securely enrolling personal identity credentials into devices with means for personal identification. For example, a handheld computer with a biometric sensor may use enrolled fingerprints to identify a user when he requests access to stored information. The enrollment of the fingerprint must tie the user definitively to the fingerprint so that future authorizations are valid.


The invention described herein provides a process for enrollment wherein a manufacturer of a personal identification device records serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. An enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device-maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment.


The methods described herein are directed to post-manufacturing processes for the device, as well as the enrollment itself. Additionally, the invention describes methods for securely archiving enrolled personal identity credentials. This is to allow users to restore previously validated credentials into a new device without requiring a completely new enrollment. Correspondingly, the invention describes the restoration process, in which the stored credentials are securely downloaded into the new device.





BRIEF DESCRIPTION OF DRAWINGS


FIG. 1: Post-manufacturing process

    • 101 Provide manufacturer's public key to device
    • 102 Generate key pair for device
    • 103 Provide device' public key and unique ID to manufacturer
    • 104 Create digital certificate for device
    • 105 Provide digital certificate to device
    • 106 Store device' public key and unique ID
    • 107 Disable device



FIG. 2: Enrollment

    • 201 Request permission from enrollment authority to enroll credentials into device
    • 202 Validate the request
    • 203 Present device' digital certificate
    • 204 Verify that device is true owner of the certificate
    • 205 Present enrollment authority's digital certificate
    • 206 Verify that enrollment authority is true owner of the certificate
    • 207 Create a session key
    • 208 Complete enrollment, encrypting with the session key



FIG. 3: Backup

    • 301 Create symmetric biometric encryption and decryption key
    • 302 Encrypt the biometric with the symmetric biometric encryption and decryption key
    • 303 Divide the symmetric biometric encryption and decryption key into two parts
    • 304 Encrypt first part with a passphrase
    • 305 Digitally sign second part with primary device' private key
    • 306 Encrypt digital signature and second part of symmetric biometric encryption and decryption key with the controller's public key
    • 307 Create symmetric personal identity credential encryption and decryption key
    • 308 Digitally sign personal identity credential with primary device' private key
    • 309 Encrypt credential with symmetric personal identity credential encryption and decryption key
    • 310 Divide symmetric personal identity credential encryption and decryption key
    • 311 Encrypt first part of symmetric personal identity credential encryption and decryption key with passphrase
    • 312 Digitally sign second part of symmetric personal identity credential encryption and decryption key with primary device' private key
    • 313 Encrypt digital signature and second part of symmetric personal identity credential encryption and decryption key with controller's public key
    • 314 Store the encrypted biometric, encrypted credentials, and encrypted symmetric biometric encryption and decryption key and symmetric personal identity credential encryption and decryption key in an electronic storage repository
    • 315 Provide user with a digital certificate containing the primary device' public key



FIG.4: Restoration

    • 301 Access the electronic storage repository
    • 302 Obtain both parts of the symmetric biometric encryption and decryption key
    • 303 Decrypt the first part with a passphrase
    • 304 Decrypt the second part and the digital signature with the controller's private key
    • 305 Verify the digital signature using the primary device' public key
    • 306 Combine both parts of the symmetric biometric encryption and decryption key
    • 307 Decrypt the biometric
    • 308 Store the biometric in the secondary device
    • 309 Obtain both parts of the symmetric personal identity credential encryption and decryption key
    • 310 Decrypt the first part with a passphrase
    • 311 Decrypt the second part and the digital signature with the controller's private key
    • 312 Verify the digital signature using the primary device' public key
    • 313 Combine both parts of the symmetric personal identity credential encryption and decryption key
    • 314 Decrypt the personal identity credential and the associated digital signature
    • 315 Verify the digital signature using the primary device' public key
    • 316 Store the personal identity credential in the secondary device






FIG. 1 is a flow chart illustrating the post-manufacturing process for a personal identification device.



FIG. 2 is a flow chart illustrating the process for enrolling personal identity credentials into the personal identification device.



FIG. 3 is a flow chart illustrating the backup process for securely storing personal identity credentials for future restoration.



FIG. 4 is a flow chart illustrating the restoration process.


DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

The following detailed description is of the best presently contemplated modes of carrying out the invention. This description is not to be taken in a limiting sense, but is made merely for the purpose of illustrating general principles of embodiments of the invention.


The invention disclosed herein provides a process for securely enrolling individuals into devices with means for personal identification via use of biometric authentication (hereafter referred to as ‘personal identification devices’). Because these devices are intended for use as trusted authentication devices, it is imperative that all of the information stored within the device be placed there in such a manner that it cannot be altered without proper authorization. There are two participants in the enrollment process, the manufacturer of the personal identification device and an enrollment authority.


The enrollment process includes identifying the device post-manufacturing and enrolling personal identity credentials and an associated biometric into the personal identification device. Furthermore, the invention also discloses methods for creating secure backup and recovery processes, such that an individual may securely store the enrolled information in an electronic storage repository, such as a hard drive. If his personal identification device fails he can use the recovery process to transfer the stored, enrolled information to a new device.


The two participants in the enrollment process must be definitely and separately identified for proper enrollment. The first participant in the enrollment system is the manufacturer of the personal identification device. The manufacturer is responsible for maintaining a database of unique identifiers, such as serial numbers, for all of the devices that it produces. This enables it later to determine if it manufactured a particular device. The second party is an enrollment authority, which is responsible for investigating, authorizing and performing individuals' requests for enrollment into a personal identification device. This participant may be a Department of Motor Vehicles, a building security officer, or any other person or organization responsible for issuing personal identification devices.


Initial Enrollment


This enrollment system uses the PKI described above. Each manufacturer and enrollment authority is provided with at least one asymmetric key pair that can be used for identification and encryption. The key pairs may be self generated, but the public key for each must be placed in a digital certificate signed by a trusted authority. Additionally, the manufacturer may wish to sign digital certificates owned by the enrollment authority as means for guaranteeing its approval of the enrollment authority.



FIG. 1 demonstrates the post-manufacturing process that begins the enrollment process for a personal identification device. Immediately following manufacturing, each personal identification device receives a public key possessed by its manufacturer (step 101). In the preferred embodiment this key is received as part of a digital certificate. The personal identification device can use this public key to verify the digital signature on messages transmitted from the manufacturer and accept them as legitimate instructions. This step requires that the manufacturing process be secure and tamper-resistant; receiving a key other than a trusted manufacturer's would directly compromise future security verifications.


The personal identification device now generates an asymmetric key pair for itself (step 102). The public key and the device's unique identifier are sent to the manufacturer (step 103). The manufacturer, or other legitimate certificate authority, generates a digital certificate for the device (step 104). This is now sent back to the device, and can be signed by the manufacturer as a token of its legitimacy (step 105). The manufacturer keeps a record of the device's public key and its unique identifier for future reference (step 106). At this point all functionality within the personal identification device is disabled, such that it is in a state waiting for future enrollment (step 107).


As seen in FIG. 2, upon receipt of a personal identification device, an individual requests enrollment rights from an enrollment authority (step 201). This may require that the individual be physically present in a specified location, or may be performed remotely. The enrollment authority may establish all rules pertaining to the applicant verification process. The security and authenticity of the personal identification device is only as good as that of the verification process, so it is anticipated that these processes will be as stringent as required by the end application.


After approving the applicant, the enrollment authority receives the personal identification device's digital certificate (steps 202 and 203). The enrollment authority validates the digital certificate by prompting the device to encrypt a predetermined string with its private key (step 204). The enrollment authority now decrypts the encrypted string using the public key stored in the device' digital certificate, and verifies that the decrypted string matches the predetermined string. At this point the personal identification device will receive and verify the validity of the enrollment authority's digital certificate (steps 206 and 206). It performs the same prompt and verification process described above, and can also verify the manufacturer's signature on the certificate if one exists. After confirming the legitimacy of the enrollment authority, the personal identification device creates a session key and securely releases it to the enrollment authority (step 207). The personal identification device and the enrollment authority can now communicate freely using the session key (step 208). The biometric may be downloaded into the personal identification device along with the personal identity credentials, or may alternatively be sensed locally using the device and stored locally. The enrollment process, at this stage, is application-dependent and requires the establishment of requisite credentials, etc., which are not covered within the scope of this invention.


Restoration Processes


It may be necessary in some cases to provide a backup of at least one enrolled personal identity credential and biometric. The backup may be used in the event that the personal identification device fails, such that the individual may re-enroll a new personal identification device without undergoing the entire process described above; these devicees are referred to as the ‘primary personal identification device’ and the ‘secondary personal identification device,’ respectively.


Backup


There are two distinct parts of the restoration process. The first part describes a method for archiving the enrolled personal identity credential, which allows an enrolled individual to securely store his personal identity credential and biometric to a user-accessible computer disk or other electronic storage repository. This data is only accessible with permission from a device manufacturer, an enrollment authority, or a recovery authority, as specified by the implementer of the system. In the primary embodiment, this system controller will be the manufacturer of the primary personal identification device. The second part of the restoration process describes a method for restoring the stored data to the secondary personal identification device.


As seen in FIG. 3, the primary personal identification device generates a symmetric biometric encryption and decryption key (step 301). This key is used for encrypting a digital representation of the enrolled biometric (step 302), which can be used to unlock the archived personal identity credential(s). After encryption of the biometric, the symmetric biometric encryption and decryption key is divided into two unique and distinct parts (step 303); the scheme of separation may be selected at the discretion of the system implementer. The first part of the symmetric biometric encryption and decryption key is encrypted with a user-selected passphrase (step 304). The second part of the symmetric biometric encryption and decryption key is signed by a private key possessed by the primary personal identification device (step 305), and is then encrypted with a public key owned by the system controller (step 306). As described above, in this embodiment the system controller is the primary personal identification device manufacturer. Using the manufacturer's public key forces an individual to request restoration privileges from the manufacturer during restoration, because the individual needs the manufacturer to decrypt the data with its private key. This is discussed in further detail below.


The primary personal identification device then generates a symmetric personal identity credential encryption and decryption key (step 307), which is used for encrypting at least one enrolled personal identity credential. The primary personal identification device first digitally signs the personal identity credential, using a private key (step 308), and then encrypts the personal identity credential and associated digital signature (step 309). Similarly to the scheme described above, the symmetric personal identity credential encryption and decryption key is divided (step 310) into two unique and distinct parts. The first part is encrypted with a user-selected passphrase (step 311), which may or may not be the same passphrase as used above. The second part is again signed by the device' private key (step 312) and encrypted with the manufacturer's public key (step 313).


All of the encrypted and/or signed data—the biometric, the symmetric biometric encryption and decryption key, the personal identity credential, and the symmetric personal identity credential encryption and decryption key—are now stored in an electronic storage repository (step 314). In typical embodiments the electronic storage repository could be a computer hard drive, floppy disk, or network drive. The primary personal identification device releases its digital certificate to the individual for future use of its public key (step 315).


Restoration


As seen in FIG. 4, when an individual receives a secondary personal identification device, and wishes to restore data from a primary personal identification device, he must access the electronic storage repository (step 401). The individual must first acquire the two encrypted and/or signed parts of the symmetric biometric encryption and decryption key (step 402). The secondary personal identification device decrypts the first part of the symmetric biometric encryption and decryption key with the user's passphrase (step 403). It then requests the system controller, the manufacturer of the primary personal identification device, to decrypt the second part of the symmetric biometric encryption and decryption key and the associated digital signature using its (the manufacturer's) private key (step 404). Once the data has been decrypted, the secondary personal identification device verifies the digital signature using a public key possessed by the primary personal identification device (step 405). The two parts of the symmetric biometric encryption and decryption key are now combined appropriately (step 406), and can be used to decrypt the biometric (step 407). The biometric is now stored in an appropriate location within the secondary personal identification device (step 408).


The individual now obtains the two encrypted and/or signed parts of the symmetric personal identity credential encryption and decryption key (step 409). Similarly to the process described above, the secondary personal identification device decrypts the first part of the symmetric personal identity credential encryption and decryption key using a user-selected passphrase (step 410). It now requests the system controller, the manufacturer of the primary personal identification device, to decrypt the second part of the symmetric personal identity credential encryption and decryption key and the accompanying digital signature using its private key (step 411). Again, the secondary personal identification device verifies the digital signature using a public key possessed by the primary personal identification device (step 412). The two parts of the key are reconstructed to form one key (step 413). The key is now used to decrypt the personal identity credential and the associated digital signature (step 414), and the signature is verified using a public key owned by the primary personal identification device (step 415). The decrypted personal identity credential can now be stored appropriately within the secondary personal identification device (step 416).


While the description above refers to particular embodiments of the present invention, it will be understood that many modifications may be made without departing from the spirit thereof. The accompanying claims are intended to cover such modifications as would fall within the true scope and spirit of the present invention.

Claims
  • 1. A method for initializing a Personal Identification Device (PID) before biometric enrollment, the method comprising: receiving a unique identifier at a PID;receiving at the PID a manufacturer's public key following manufacture of the PID and before a biometric data associated with enrollment is received;generating an asymmetric key pair at the PID;sending the generated PID's public key and the unique identifier to the manufacturer;receiving at the PID a digital certificate of the PID generated by the manufacturer; anddisabling all functionality within the PID such that the PID is in a state waiting for future biometric enrollment by an enrollment authority.
  • 2. The method of claim 1, wherein the asymmetric key pair includes the generated PID's public key, the method further comprising: sending the generated PID's public key from the PID to a party different than the manufacturer.
  • 3. The method of claim 1, wherein the receiving the digital certificate is based on the manufacturer's public key and the unique identifier.
  • 4. The method of claim 1, wherein the unique identifier is associated with the asymmetric key pair includes the generated PID's public key and the generated PID's private key.
  • 5. The method of claim 1, wherein the digital certificate includes the manufacturer's public key.
  • 6. The method of claim 1, wherein the receiving the manufacturer's public key is from the manufacturer of the PID and separate from the enrollment party authorized to enable enrollment of the biometric data at the PID.
  • 7. The method of claim 1, wherein the PID is configured to enroll the biometric data from a party different from the manufacturer of the PID after the receiving at the PID the digital certificate.
  • 8. The method of claim 1, wherein the digital certificate includes data associated with the PID.
RELATED U.S. APPLICATION DATA

This application claims priority under 35 USC 119(e) of provisional patent application Ser. No. 60/401,399 filed on Aug. 6, 2002 entitled, “A Secure Enrollment Process for a Biometrically Authenticated, Portable Electronic Device,” which is hereby incorporated by reference in its entirety.

US Referenced Citations (115)
Number Name Date Kind
4993068 Piosenka et al. Feb 1991 A
5053608 Senanayake Oct 1991 A
5131038 Puhl et al. Jul 1992 A
5280527 Gullman et al. Jan 1994 A
5469506 Berson et al. Nov 1995 A
5526428 Arnold Jun 1996 A
5591949 Bernstein Jan 1997 A
5613012 Hoffman et al. Mar 1997 A
5615277 Hoffman Mar 1997 A
5659616 Sudia Aug 1997 A
5805719 Pare, Jr. et al. Sep 1998 A
5838812 Pare, Jr. et al. Nov 1998 A
5870723 Pare, Jr. et al. Feb 1999 A
5872848 Romney et al. Feb 1999 A
5920640 Salatino et al. Jul 1999 A
5930804 Yu et al. Jul 1999 A
5952641 Korshun Sep 1999 A
5991408 Pearson et al. Nov 1999 A
6038666 Hsu et al. Mar 2000 A
6041410 Hsu et al. Mar 2000 A
6076167 Borza Jun 2000 A
6084968 Kennedy et al. Jul 2000 A
6154879 Pare, Jr. et al. Nov 2000 A
6167517 Gilchrist et al. Dec 2000 A
6181803 Davis Jan 2001 B1
6182221 Hsu et al. Jan 2001 B1
6185316 Buffam Feb 2001 B1
6202151 Musgrave et al. Mar 2001 B1
6219793 Li et al. Apr 2001 B1
6256737 Bianco et al. Jul 2001 B1
6268788 Gray Jul 2001 B1
6282649 Lambert et al. Aug 2001 B1
6317834 Gennaro et al. Nov 2001 B1
6353889 Hollingshead Mar 2002 B1
6366682 Hoffman et al. Apr 2002 B1
6367017 Gray Apr 2002 B1
6397198 Hoffman et al. May 2002 B1
6446210 Borza Sep 2002 B1
6466781 Bromba et al. Oct 2002 B1
6484260 Scott et al. Nov 2002 B1
6487662 Kharon et al. Nov 2002 B1
6490680 Scheidt et al. Dec 2002 B1
6505193 Musgrave et al. Jan 2003 B1
6529885 Johnson Mar 2003 B1
6532298 Cambier et al. Mar 2003 B1
6581161 Byford Jun 2003 B1
6609198 Wood et al. Aug 2003 B1
6615264 Stoltz et al. Sep 2003 B1
6618806 Brown et al. Sep 2003 B1
6636973 Novoa et al. Oct 2003 B1
6657538 Ritter Dec 2003 B1
6662166 Pare, Jr. et al. Dec 2003 B2
6668332 McNeil Dec 2003 B1
6671808 Abbott et al. Dec 2003 B1
6681034 Russo Jan 2004 B1
6719200 Wiebe Apr 2004 B1
6728881 Karamchetty Apr 2004 B1
6735695 Gopalakrishnan et al. May 2004 B1
6751734 Uchida Jun 2004 B1
6757411 Chau Jun 2004 B2
6765470 Shinzaki Jul 2004 B2
6766040 Catalano et al. Jul 2004 B1
6775776 Vogt et al. Aug 2004 B1
6786397 Silverbrook et al. Sep 2004 B2
6819219 Bolle et al. Nov 2004 B1
6832317 Strongin et al. Dec 2004 B1
6836843 Seroussi et al. Dec 2004 B2
6839688 Drummond et al. Jan 2005 B2
6844660 Scott Jan 2005 B2
6848052 Hamid et al. Jan 2005 B2
6850147 Prokoski et al. Feb 2005 B2
6850252 Hoffberg Feb 2005 B1
6853739 Kyle Feb 2005 B2
6853988 Dickinson et al. Feb 2005 B1
6857073 French et al. Feb 2005 B2
6862443 Witte Mar 2005 B2
6870946 Teng et al. Mar 2005 B1
6870966 Silverbrook et al. Mar 2005 B1
6871193 Campbell et al. Mar 2005 B1
6871287 Ellingson Mar 2005 B1
6871784 Jayaratne Mar 2005 B2
6876757 Yau et al. Apr 2005 B2
6877097 Hamid et al. Apr 2005 B2
6879243 Booth et al. Apr 2005 B1
6879966 Lapsley et al. Apr 2005 B1
6880749 Green et al. Apr 2005 B1
6880750 Pentel Apr 2005 B2
6883709 Joseph Apr 2005 B2
6886096 Appenzeller et al. Apr 2005 B2
6886101 Glazer et al. Apr 2005 B2
6886104 McClurg et al. Apr 2005 B1
6888445 Gotfried et al. May 2005 B2
6898577 Johnson May 2005 B1
6901154 Dunn May 2005 B2
6901155 Xia et al. May 2005 B2
6901266 Henderson May 2005 B2
6901382 Richards et al. May 2005 B1
6957337 Chainer et al. Oct 2005 B1
6963659 Tumey et al. Nov 2005 B2
6985502 Bunton Jan 2006 B2
7024562 Flink et al. Apr 2006 B1
7035442 Ha et al. Apr 2006 B2
7069444 Lowensohn et al. Jun 2006 B2
20020003892 Iwanaga Jan 2002 A1
20020023217 Wheeler et al. Feb 2002 A1
20020034319 Tumey et al. Mar 2002 A1
20020056043 Glass May 2002 A1
20020087857 Tsao et al. Jul 2002 A1
20020104006 Boate et al. Aug 2002 A1
20020129251 Itakura et al. Sep 2002 A1
20020174344 Ting Nov 2002 A1
20030101349 Wang May 2003 A1
20030115475 Russo et al. Jun 2003 A1
20030115490 Russo et al. Jun 2003 A1
20030200257 Milgramm et al. Oct 2003 A1
Related Publications (1)
Number Date Country
20040139329 A1 Jul 2004 US
Provisional Applications (1)
Number Date Country
60401399 Aug 2002 US