The present invention relates to a modified Harvard architecture processor having data memory space mapped to program memory space and having protection for erroneous execution of data entries in the program memory space.
Processors, including microprocessors, digital signal processors and microcontrollers, operate by running software programs that are embodied in one or more series of program instructions stored in a memory. The processors run the software by fetching the program instructions from the series of program instructions, decoding the program instructions and executing them. In addition to program instructions, data is also stored in memory that is accessible by the processor. Generally, the program instructions process data by accessing data in memory, modifying the data and storing the modified data into memory.
One well-known architecture for processors is known as the Harvard architecture. In this architecture, data and program instructions are stored in separate memories that can be accessed simultaneously. Because of this simultaneous access, the Harvard architecture provides significant processing speed advantages over other architectures. A typical Harvard architecture processor that includes internal memory includes two separate memories, one for data, and one for program instructions. In order to expand the memory capacity of such a processor, memory external to the processor must be added. However, since a Harvard architecture processor has two separate memories, in order to expand both data memory and program instruction memory, two separate external memories must be added. This is a significant disadvantage when low-cost systems are being built.
A need arises for a processor having an architecture that provides the processing speed advantages of the Harvard architecture, but does not require two separate external memories in order to expand both data memory and program instruction memory. One solution to this problem is described in U.S. Pat. No. 6,728,856. The described processor has separate program memory space and data memory space, but provides the capability to map at least a portion of the program memory space to the data memory space. This allows most program instructions that are processed to obtain the speed advantages of simultaneous program instruction and data access. It also allows program memory space and data memory space to be expanded externally to the processor using only one external memory device that includes both program instructions and data.
However, a problem arises with this solution. Under some circumstances, the processor may fetch and attempt to execute an entry in the program memory space that has been mapped to the data memory space and which contains data, not a program instruction. Such a situation may occur, for example, as a result of a bug in the software that is being executed. Attempted execution of data that is not a program instruction may cause unpredictable results. A need arises for a technique by which attempted execution of data that is not a program instruction may be detected and recovered from.
The present invention is a method, and a processor implementing the method, that provides the capability to detect and recover from attempted execution of data that is not a program instruction in a processor in which at least a portion of a program memory space to a data memory space. This allows the processor to provide the speed advantages and expansion advantages without the risk of unpredictable program execution behavior.
According to the present invention, a method of operating a processor comprises the steps of: mapping at least a portion of a program memory space to a data memory space, storing an entry into the program memory space that is mapped to the data memory space, the entry comprising data and a protection opcode, fetching an entry from the program memory space, attempting to execute the fetched entry, trapping the protection opcode, vectoring to a trap handler, and executing the trap handler.
In one aspect of the present invention, the trap handler is an illegal instruction trap handler and the step of executing the trap handler comprises the steps of determining that the opcode is a protection opcode, and executing a software routine to handle the trap. The program memory space may be internal to the processor. The processor may be operably connected to an external memory device operable to store program instructions and data, the external memory device comprising program memory space.
In one aspect of the present invention, the trap handler is a protection trap handler. The program memory space may be internal to the processor. The processor may be operably connected to an external memory device operable to store program instructions and data, the external memory device comprising program memory space.
The above described features and advantages of the present invention will be more fully appreciated with reference to the detailed description and appended figures in which:
Overview of Processor Elements
The processor 100 includes a program memory 105, an instruction fetch/decode unit 110, instruction execution units 115 data memory and registers 120, peripherals 125, data I/O 130, and a program counter and loop control unit 135. The bus 150, which may include one or more common buses, communicates data between the units as shown.
The program memory 105 stores software embodied in program instructions for execution by the processor 100. The program memory 105 may comprise any type of nonvolatile memory such as a read only memory (ROM), a programmable read only memory (PROM), an electrically programmable or an electrically programmable and erasable read only memory (EPROM or EEPROM) or flash memory. In addition, the program memory 105 may be supplemented with external nonvolatile memory 145 as shown to increase the complexity of software available to the processor 100. Alternatively, the program memory may be volatile memory, which receives program instructions from, for example, an external non-volatile memory 145. When the program memory 105 is nonvolatile memory, the program memory may be programmed at the time of manufacturing the processor 100 or prior to or during implementation of the processor 100 within a system. In the latter scenario, the processor 100 may be programmed through a process called in-line serial programming.
The instruction fetch/decode unit 110 is coupled to the program memory 105, the instruction execution units 115, and the data memory 120. Coupled to the program memory 105 and the bus 150 is the program counter and loop control unit 135. The instruction fetch/decode unit 110 fetches the instructions from the program memory 105 specified by the address value contained in the program counter 135. The instruction fetch/decode unit 110 then decodes the fetched instructions and sends the decoded instructions to the appropriate execution unit 115. The instruction fetch/decode unit 110 may also send operand information including addresses of data to the data memory 120 and to functional elements that access the registers.
The program counter and loop control unit 135 includes a program counter register (not shown) which stores an address of the next instruction to be fetched. During normal instruction processing, the program counter register may be incremented to cause sequential instructions to be fetched. Alternatively, the program counter value may be altered by loading a new value into it via the bus 150. The new value may be derived based on decoding and executing a flow control instruction such as, for example, a branch instruction. In addition, the loop control portion of the program counter and loop control unit 135 may be used to provide repeat instruction processing and repeat loop control as further described below.
The instruction execution units 115 receive the decoded instructions from the instruction fetch/decode unit 110 and thereafter execute the decoded instructions. As part of this process, the execution units may retrieve one or two operands via the bus 150 and store the result into a register or memory location within the data memory 120. The execution units may include an arithmetic logic unit (ALU) such as those typically found in a microcontroller. The execution units may also include a digital signal processing engine, a floating point processor, an integer processor, or any other convenient execution unit. A preferred embodiment of the execution units and their interaction with the bus 150, which may include one or more buses, is presented in more detail below with reference to
The data memory and registers 120 are volatile memory and are used to store data used and generated by the execution units. The data memory 120 and program memory 105 are preferably separate memories for storing data and program instructions respectively. This format is a known generally as a Harvard architecture. It is noted, however, that according to the present invention, the architecture may be a Von-Neuman architecture or a modified Harvard architecture, which permits the use of some program space for data space. A dotted line is shown, for example, connecting the program memory 105 to the bus 150. This path may include logic for aligning data reads from program space such as, for example, during table reads from program space to data memory 120.
Referring again to
The data I/O unit 130 may include transceivers and other logic for interfacing with the external devices/systems 140. The data I/O unit 130 may further include functionality to permit in circuit serial programming of the Program memory through the data I/O unit 130.
The W registers 240 are general purpose address and/or data registers. The DSP engine 230 is coupled to both the X and Y memory buses and to the W registers 240. The DSP engine 230 may simultaneously fetch data from each the X and Y memory, execute instructions which operate on the simultaneously fetched data and write the result to an accumulator (not shown) and write a prior result to X or Y memory or to the W registers 240 within a single processor cycle.
In one embodiment, the ALU 270 may be coupled only to the X memory bus and may only fetch data from the X bus. However, the X and Y memories 210 and 220 may be addressed as a single memory space by the X address generator in order to make the data memory segregation transparent to the ALU 270. The memory locations within the X and Y memories may be addressed by values stored in the W registers 240.
Any processor clocking scheme may be implemented for fetching and executing instructions. A specific example follows, however, to illustrate an embodiment of the present invention. Each instruction cycle is comprised of four Q clock cycles Q1-Q4. The four phase Q cycles provide timing signals to coordinate the decode, read, process data and write data portions of each instruction cycle.
According to one embodiment of the processor 100, the processor 100 concurrently performs two operations—it fetches the next instruction and executes the present instruction. Accordingly, the two processes occur simultaneously. The following sequence of events may comprise, for example, the fetch instruction cycle:
The following sequence of events may comprise, for example, the execute instruction cycle for a single operand instruction:
The following sequence of events may comprise, for example, the execute instruction cycle for a dual operand instruction using a data pre-fetch mechanism. These instructions pre-fetch the dual operands simultaneously from the X and Y data memories and store them into registers specified in the instruction. They simultaneously allow instruction execution on the operands fetched during the previous cycle.
An exemplary memory map of data space memory 300 is shown in
In the example shown in
Memory block 308 is shown in
External memory device 410 is connected to the external memory bus 412 of the processor. External memory device 410 includes external program/data memory space 414. Since all unused internal addresses are mapped externally to the external memory bus, data memory space mapped page 402 is also mapped to external data memory space mapped page 416, which is located in external program/data memory space 412. If external memory device 410 is a RAM, then data may be read from and written to external data memory space mapped page 416. External program/data space 414 may also include external program memory space 418, which may be separate from external data memory space mapped page 416, or which may overlap with external data memory space mapped page 416.
Since the program memory space may include data that is used when a portion of the program memory space is mapped to the data memory space, there is some danger that the processor will erroneously fetch and attempt to execute that data. This may happen, for example, when there is a bug in a software program that is executing on the processor that sets the program counter (PC) to a memory location in the program memory space that happens to be storing data. This problem can arise when data is stored in internal program memory space and is even more likely to arise when data is stored in an external memory device. The present invention includes a mechanism for detecting such erroneous accesses and provides the capability to handle such errors.
A block diagram of the data execution protection scheme of the present invention is shown in
A process 600 for detection and handling of erroneous execution of a data entry is shown in
In step 604, program memory space is mapped to data memory space by issuance of the proper program instructions. In step 606, the processor erroneously fetches and attempts to execute data that was stored in an entry in data memory space that was mapped from program memory space. Since the processor is fetching a program instruction, the processor treats the entry as a program instruction entry and fetches the entire 24 bits of the entry. The upper 8 bits of the entry are the protection opcode, while the lower 16 bits are the data in the entry. The processor attempts to execute the fetched entry, and in particular attempts to decode the protection opcode. In step 608, this attempted decode of the protection opcode causes a processor trap to occur. A trap can be considered to be a non-maskable, nestable interrupt. They provide a means by which erroneous operation can be corrected during software debug and during operation of the software. Upon occurrence of a trap, the execution flow of the processor is vectored to a trap handler in step 610. That is, the program counter of the processor is loaded with a value that points to the trap handler. The trap handler is a software routine that takes the appropriate corrective action upon occurrence of the trapped condition. The value is stored in an exception vector table that includes vectors for a variety of exception conditions, such as reset, stack overflow, address error, illegal instruction trap, arithmetic error, etc. Each entry in the exception vector table points to an exception handler that takes the appropriate action upon occurrence of the corresponding exception. In step 612, the trap handler deals with the error. Typically, the trap handler simply forces a reset of the processor. This would be done, for example, in an implementation in which a stand-alone application is executing in the processor. Since an attempt to execute a data entry is likely a result of a serious program error, performing a reset of the processor is often the best way of recovering from such an error. In an implementation in which there is an operating system controlling the processor, it may be possible to simply terminate the application program that caused the error and allow the operating system to recover from the error.
In a preferred embodiment, the illegal instruction trap vector is used to vector the processor to a routine that handles the attempted execution of a protection opcode. The protection opcode must be one of the possible 8 bit opcodes that is not used by any instruction of the processor. Attempted execution of this opcode will result in an illegal instruction trap. The illegal instruction trap handler must then examine the opcode that caused the illegal instruction trap, determine that the opcode is the protection opcode, and execute the appropriate software routines to handle the trap, which typically includes recovering from the error condition. Alternatively, there may be a defined protection trap that is separate from the illegal instruction trap. Attempted execution of the protection opcode will cause a protection trap to occur, rather than a general illegal instruction trap. Since the processor will have already determined the opcode that was attempted to be executed was the protection opcode, the protection trap then need only execute the appropriate software routines to handle the error condition.
In the embodiment described above, internal program memory is organized as a plurality of 24 bit entries, each of which may contain a 16 bit data entry and an 8 bit protection opcode. The present invention also contemplates a number of additional and alternative embodiments. For example, an external memory may be used in which 24 bit entries are stored. In this embodiment, a 24 bit entry may contain a 16 bit data entry and an 8 bit protection opcode. If the external memory is a non-volatile memory, then the data entries and protection opcodes, along with any program instructions, may be stored in the external memory during the production process. If the external memory is a volatile memory, then the data entries and the protection opcodes must be stored to the external memory by the processor.
Alternatively, data entries may be stored in the external memory as 16 bit data entries, without protection opcodes. In this embodiment, the external memory may be connected to the processor using a memory bus configuration that is aware that the data entries are 16 bits. For example, the memory bus connected to the external memory may be 16 bits wide, rather than the 24 bits wide that would be needed for program instructions. As another example, the address range of the external memory that is mapped to data memory may be used by the processor to identify a portion of the external memory that is storing data entries rather than program entries. In either example, the processor can detect an attempted program instruction access of the external memory or the portion of external memory that is storing data entries. Upon detection of such an attempted access, the processor may directly perform a protection trap. Alternatively, the processor may simply force a protection opcode onto the top 8 bits of the program instruction bus, which will also cause a protection trap to be performed.
While specific embodiments of the present invention have been illustrated and described, it will be understood by those having ordinary skill in the art that changes may be made to those embodiments without departing from the spirit and scope of the invention. For example, the present invention has been described in terms of 16 bit data entries, 24 bit program instruction entries, and 8 bit opcodes. However, one of skill in the art will recognize that such specific values are only examples, and that other arrangements and numbers of bits may be used without departing from the spirit and scope of the invention. The present invention contemplates any and all such alternative arrangements and numbers of bits.
This application is a continuation of U.S. patent application Ser. No. 09/870,460, which was filed on Jun. 1, 2001, by Michael Catherwood entitled “Modified Harvard Architecture Processor Having Data Memory Space Mapped To Program Memory Space With Erroneous Execution Protection, which is now U.S. Pat. No. 7,007,172.”
| Number | Name | Date | Kind |
|---|---|---|---|
| 3771146 | Cottton et al. | Nov 1973 | A |
| 3781810 | Downing | Dec 1973 | A |
| 3886524 | Appelt | May 1975 | A |
| 3930253 | Maida | Dec 1975 | A |
| 4025771 | Lynch, Jr. et al. | May 1977 | A |
| 4074353 | Woods et al. | Feb 1978 | A |
| 4090250 | Carlson et al. | May 1978 | A |
| 4323981 | Nakamura | Apr 1982 | A |
| 4379338 | Nishitani et al. | Apr 1983 | A |
| 4398244 | Chu et al. | Aug 1983 | A |
| 4408274 | Wheatley et al. | Oct 1983 | A |
| 4451885 | Gerson et al. | May 1984 | A |
| 4472788 | Yamazaki | Sep 1984 | A |
| 4481576 | Bicknell | Nov 1984 | A |
| 4488252 | Vassar | Dec 1984 | A |
| 4511990 | Hagiwara et al. | Apr 1985 | A |
| 4556938 | Parker et al. | Dec 1985 | A |
| 4615005 | Maejima et al. | Sep 1986 | A |
| 4626988 | George | Dec 1986 | A |
| 4709324 | Kloker | Nov 1987 | A |
| 4730248 | Watanabe et al. | Mar 1988 | A |
| 4742479 | Kloker et al. | May 1988 | A |
| 4768149 | Konopik et al. | Aug 1988 | A |
| 4779191 | Greenblatt | Oct 1988 | A |
| 4782457 | Cline | Nov 1988 | A |
| 4800524 | Roesgen | Jan 1989 | A |
| 4807172 | Nukiyama | Feb 1989 | A |
| 4829420 | Stahle | May 1989 | A |
| 4829460 | Ito | May 1989 | A |
| 4839846 | Hirose et al. | Jun 1989 | A |
| 4841468 | Miller et al. | Jun 1989 | A |
| 4872128 | Shimizu | Oct 1989 | A |
| 4882701 | Ishii | Nov 1989 | A |
| 4926371 | Vassilliadis et al. | May 1990 | A |
| 4941120 | Brown et al. | Jul 1990 | A |
| 4943940 | New | Jul 1990 | A |
| 4945507 | Ishida et al. | Jul 1990 | A |
| 4959776 | Deerfield et al. | Sep 1990 | A |
| 4977533 | Miyabayashi et al. | Dec 1990 | A |
| 4984213 | Abdoo et al. | Jan 1991 | A |
| 5007020 | Inskeep | Apr 1991 | A |
| 5012441 | Retter | Apr 1991 | A |
| 5032986 | Pathak et al. | Jul 1991 | A |
| 5034887 | Yasui et al. | Jul 1991 | A |
| 5038310 | Akagiri et al. | Aug 1991 | A |
| 5040178 | Lindsay et al. | Aug 1991 | A |
| 5056004 | Ohde et al. | Oct 1991 | A |
| 5099445 | Studor et al. | Mar 1992 | A |
| 5101484 | Kohn | Mar 1992 | A |
| 5117498 | Miller et al. | May 1992 | A |
| 5121431 | Wiener | Jun 1992 | A |
| 5122981 | Taniguchi | Jun 1992 | A |
| 5155823 | Tsue | Oct 1992 | A |
| 5177373 | Nakamura | Jan 1993 | A |
| 5197023 | Nakayama | Mar 1993 | A |
| 5197140 | Balmer | Mar 1993 | A |
| 5206940 | Murakami et al. | Apr 1993 | A |
| 5212662 | Cocanougher et al. | May 1993 | A |
| 5218239 | Boomer | Jun 1993 | A |
| 5239654 | Ing-Simmons et al. | Aug 1993 | A |
| 5276634 | Suzuki et al. | Jan 1994 | A |
| 5282153 | Bartkowiak et al. | Jan 1994 | A |
| 5327543 | Miura et al. | Jul 1994 | A |
| 5327566 | Forsyth | Jul 1994 | A |
| 5375080 | Davies | Dec 1994 | A |
| 5379240 | Byrne | Jan 1995 | A |
| 5386563 | Thomas | Jan 1995 | A |
| 5392435 | Masui et al. | Feb 1995 | A |
| 5418976 | Iida | May 1995 | A |
| 5422805 | McIntyre et al. | Jun 1995 | A |
| 5432943 | Mitsuishi | Jul 1995 | A |
| 5448703 | Amini et al. | Sep 1995 | A |
| 5448706 | Fleming et al. | Sep 1995 | A |
| 5450027 | Gabara | Sep 1995 | A |
| 5463749 | Wertheizer et al. | Oct 1995 | A |
| 5469377 | Amano | Nov 1995 | A |
| 5471600 | Nakamoto | Nov 1995 | A |
| 5497340 | Uramoto et al. | Mar 1996 | A |
| 5499380 | Iwata et al. | Mar 1996 | A |
| 5504916 | Murakami et al. | Apr 1996 | A |
| 5517436 | Andreas et al. | May 1996 | A |
| 5525874 | Mallarapu et al. | Jun 1996 | A |
| 5548544 | Matheny et al. | Aug 1996 | A |
| 5561384 | Reents et al. | Oct 1996 | A |
| 5561619 | Watanabe et al. | Oct 1996 | A |
| 5564028 | Swoboda et al. | Oct 1996 | A |
| 5568380 | Broadnax et al. | Oct 1996 | A |
| 5568412 | Han et al. | Oct 1996 | A |
| 5596760 | Ueda | Jan 1997 | A |
| 5600813 | Nakagawa et al. | Feb 1997 | A |
| 5611061 | Yasuda | Mar 1997 | A |
| 5619711 | Anderson | Apr 1997 | A |
| 5623646 | Clarke | Apr 1997 | A |
| 5638524 | Kiuchi et al. | Jun 1997 | A |
| 5642516 | Hedayat et al. | Jun 1997 | A |
| 5649146 | Riou | Jul 1997 | A |
| 5651121 | Davies | Jul 1997 | A |
| 5657484 | Scarra | Aug 1997 | A |
| 5659700 | Chen et al. | Aug 1997 | A |
| 5682339 | Tam | Oct 1997 | A |
| 5689693 | White | Nov 1997 | A |
| 5694350 | Wolrich et al. | Dec 1997 | A |
| 5696711 | Makineni | Dec 1997 | A |
| 5701493 | Jaggar | Dec 1997 | A |
| 5706460 | Craig et al. | Jan 1998 | A |
| 5706466 | Dockser | Jan 1998 | A |
| 5715470 | Asano et al. | Feb 1998 | A |
| 5737570 | Koch | Apr 1998 | A |
| 5740095 | Parant | Apr 1998 | A |
| 5740419 | Potter | Apr 1998 | A |
| 5740451 | Muraki et al. | Apr 1998 | A |
| 5748516 | Goddard et al. | May 1998 | A |
| 5748970 | Miyaji et al. | May 1998 | A |
| 5764555 | McPherson et al. | Jun 1998 | A |
| 5765216 | Weng et al. | Jun 1998 | A |
| 5765218 | Ozawa et al. | Jun 1998 | A |
| 5774711 | Henry et al. | Jun 1998 | A |
| 5778237 | Yamamoto et al. | Jul 1998 | A |
| 5778416 | Harrison et al. | Jul 1998 | A |
| 5790443 | Shen et al. | Aug 1998 | A |
| 5808926 | Gorshtein et al. | Sep 1998 | A |
| 5812439 | Hansen | Sep 1998 | A |
| 5812868 | Moyer et al. | Sep 1998 | A |
| 5815693 | McDermott et al. | Sep 1998 | A |
| 5825730 | Nishida et al. | Oct 1998 | A |
| 5826072 | Knapp et al. | Oct 1998 | A |
| 5826096 | Baxter | Oct 1998 | A |
| 5828875 | Halvarsson et al. | Oct 1998 | A |
| 5862065 | Muthusamy | Jan 1999 | A |
| 5867726 | Ohsuga et al. | Feb 1999 | A |
| 5875342 | Temple | Feb 1999 | A |
| 5880984 | Burchfiel et al. | Mar 1999 | A |
| 5892697 | Brakefield | Apr 1999 | A |
| 5892699 | Duncan et al. | Apr 1999 | A |
| 5894428 | Harada | Apr 1999 | A |
| 5900683 | Rinehart et al. | May 1999 | A |
| 5909385 | Nishiyama et al. | Jun 1999 | A |
| 5917741 | Ng | Jun 1999 | A |
| 5918252 | Chen et al. | Jun 1999 | A |
| 5930159 | Wong | Jul 1999 | A |
| 5930503 | Drees | Jul 1999 | A |
| 5936870 | Im | Aug 1999 | A |
| 5937199 | Temple | Aug 1999 | A |
| 5938759 | Kamijo | Aug 1999 | A |
| 5941940 | Prasad et al. | Aug 1999 | A |
| 5943249 | Handlogten | Aug 1999 | A |
| 5944816 | Dutton et al. | Aug 1999 | A |
| 5951627 | Kiamilev et al. | Sep 1999 | A |
| 5951679 | Anderson et al. | Sep 1999 | A |
| 5974549 | Golan | Oct 1999 | A |
| 5978825 | Divine et al. | Nov 1999 | A |
| 5983333 | Kolagotla et al. | Nov 1999 | A |
| 5991787 | Abel et al. | Nov 1999 | A |
| 5991868 | Kamiyama et al. | Nov 1999 | A |
| 5996067 | White | Nov 1999 | A |
| 6009454 | Dummermuth | Dec 1999 | A |
| 6014723 | Tremblay et al. | Jan 2000 | A |
| 6018757 | Wong | Jan 2000 | A |
| 6026489 | Wachi et al. | Feb 2000 | A |
| 6044392 | Anderson et al. | Mar 2000 | A |
| 6044434 | Oliver | Mar 2000 | A |
| 6049858 | Kolagotia et al. | Apr 2000 | A |
| 6055619 | North et al. | Apr 2000 | A |
| 6058409 | Kozaki et al. | May 2000 | A |
| 6058410 | Sharangpani | May 2000 | A |
| 6058464 | Taylor | May 2000 | A |
| 6061711 | Song et al. | May 2000 | A |
| 6061780 | Shippy et al. | May 2000 | A |
| 6061783 | Harriman | May 2000 | A |
| 6076154 | Van Eijndhoven et al. | Jun 2000 | A |
| 6084880 | Bailey et al. | Jul 2000 | A |
| 6101521 | Kosiec | Aug 2000 | A |
| 6101599 | Wright et al. | Aug 2000 | A |
| 6115732 | Oberman et al. | Sep 2000 | A |
| 6128728 | Dowling | Oct 2000 | A |
| 6134574 | Oberman et al. | Oct 2000 | A |
| 6144980 | Oberman | Nov 2000 | A |
| 6145049 | Wong | Nov 2000 | A |
| 6181151 | Wasson | Jan 2001 | B1 |
| 6202163 | Gabzdyl et al. | Mar 2001 | B1 |
| 6205467 | Lambrecht et al. | Mar 2001 | B1 |
| 6209086 | Chi et al. | Mar 2001 | B1 |
| 6243786 | Huang et al. | Jun 2001 | B1 |
| 6243804 | Cheng | Jun 2001 | B1 |
| 6260162 | Typaldos et al. | Jul 2001 | B1 |
| 6282637 | Chan et al. | Aug 2001 | B1 |
| 6292866 | Zaiki et al. | Sep 2001 | B1 |
| 6295574 | MacDonald | Sep 2001 | B1 |
| 6300800 | Schmitt et al. | Oct 2001 | B1 |
| 6315200 | Silverbrook et al. | Nov 2001 | B1 |
| 6356970 | Killian et al. | Mar 2002 | B1 |
| 6377619 | Denk et al. | Apr 2002 | B1 |
| 6397318 | Peh | May 2002 | B1 |
| 6412081 | Koscal et al. | Jun 2002 | B1 |
| 6487654 | Dowling | Nov 2002 | B2 |
| 6523108 | James et al. | Feb 2003 | B1 |
| 6564238 | Kim et al. | May 2003 | B1 |
| 6633970 | Clift et al. | Oct 2003 | B1 |
| 6658578 | Laurenti et al. | Dec 2003 | B1 |
| 6681280 | Miyake et al. | Jan 2004 | B1 |
| 6694398 | Zhao et al. | Feb 2004 | B1 |
| 6728856 | Grosbach et al. | Apr 2004 | B2 |
| 6751742 | Duhault et al. | Jun 2004 | B1 |
| 6763478 | Bui | Jul 2004 | B1 |
| 7069470 | Wilding et al. | Jun 2006 | B2 |
| 20020194466 | Catherwood et al. | Dec 2002 | A1 |
| 20030093656 | Masse et al. | May 2003 | A1 |
| Number | Date | Country |
|---|---|---|
| 0 554 917 | Aug 1993 | EP |
| 0 855 643 | Jul 1998 | EP |
| 0 992 888 | Dec 2000 | EP |
| 0 992 889 | Dec 2000 | EP |
| 01037124 | Feb 1989 | JP |
| 9611443 | Apr 1996 | WO |
| Number | Date | Country | |
|---|---|---|---|
| 20050210284 A1 | Sep 2005 | US |
| Number | Date | Country | |
|---|---|---|---|
| Parent | 09870460 | Jun 2001 | US |
| Child | 11135527 | US |