Multiple image security features for identification documents and methods of making same

Information

  • Patent Grant
  • 8025239
  • Patent Number
    8,025,239
  • Date Filed
    Thursday, June 24, 2010
    14 years ago
  • Date Issued
    Tuesday, September 27, 2011
    13 years ago
Abstract
An identification document manufacturing method makes an identification document with an optically variable security feature by forming a lens structure in the document's lamination layer along with image information. The method provides image information arranged to include at least two different images. The method uses pressure to form a lens profile in a laminate, including combining the laminate with ink representing the image information to form the document. The document is formed together with the laminate and ink such that the lens profile enables display of the at least two different images when the document is viewed at different predetermined angles. An information bearing document comprises a core layer, an image layer depicting at least two different images, and a laminate layer. The laminate layer is pressed on the core layer such that it forms a lens profile that enables display of the at least two different images when the document is viewed at different predetermined angles.
Description
FIELD

The invention relates in general to an information-bearing laminar assembly suitable for use as an identification card, and more particularly, to an information-bearing laminar assembly having thereon a plurality of lenticular lens elements that provide a multiple image security feature.


BACKGROUND AND SUMMARY

Identification documents (hereafter “ID documents”) play a critical role in today's society. One example of an ID document is an identification card (“ID card”). ID documents are used on a daily basis—to prove identity, to verify age, to access a secure area, to evidence driving privileges, to cash a check, and so on. Airplane passengers are required to show an ID document during check in, security screening, and prior to boarding their flight. In addition, because we live in an ever-evolving cashless society, ID documents are used to make payments, access an ATM, debit an account, or make a payment, etc.


Many types of identification cards and documents, such as driving licenses, national or government identification cards, bank cards, credit cards, controlled access cards and smart cards, carry thereon certain items of information which relate to the identity of the bearer. Examples of such information include name, address, birth date, signature and photographic image; the cards or documents may in addition carry other variant data (i.e., data specific to a particular card or document, for example an employee number) and invariant data (i.e., data common to a large number of cards, for example the name of an employer). All of the cards described above will hereinafter be generically referred to as “ID documents”.


In the production of images useful in the field of identification documentation, it is oftentimes desirable to embody into a document (such as an ID card, drivers license, passport or the like) data or indicia representative of the document issuer (e.g., an official seal, or the name or mark of a company or educational institution) and data or indicia representative of the document bearer (e.g., a photographic likeness, name or address). Typically, a pattern, logo or other distinctive marking representative of the document issuer will serve as a means of verifying the authenticity, genuineness or valid issuance of the document. A photographic likeness or other data or indicia personal to the bearer will validate the right of access to certain facilities or the prior authorization to engage in commercial transactions and activities.


Identification documents, such as ID cards, having printed background security patterns, designs or logos and identification data personal to the card bearer have been known and are described, for example, in U.S. Pat. No. 3,758,970, issued Sep. 18, 1973 to M. Annenberg; in Great Britain Pat. No. 1,472,581, issued to G. A. O. Gesellschaft Fur Automation Und Organisation mbH, published Mar. 10, 1976; in International Patent Application PCT/GB82/00150, published Nov. 25, 1982 as Publication No. WO 82/04149; in U.S. Pat. No. 4,653,775, issued Mar. 31, 1987 to T. Raphael, et al.; in U.S. Pat. No. 4,738,949, issued Apr. 19, 1988 to G. S. Sethi, et al.; and in U.S. Pat. No. 5,261,987, issued Nov. 16, 1993 to J. W. Luening, et al. All of the aforementioned documents are hereby incorporated by reference.


The advent of commercial apparatus (printers) for producing dye images by thermal transfer has made relatively commonplace the production of color prints from electronic data acquired by a video camera. In general, this is accomplished by the acquisition of digital image information (electronic signals) representative of the red, green and blue content of an original, using color filters or other known means. These signals are then utilized to print an image onto a data carrier. For example, information can be printed using a printer having a plurality of small heating elements (e.g., pins) for imagewise heating of each of a series of donor sheets (respectively, carrying sublimable cyan, magenta and yellow dye). The donor sheets are brought into contact with an image-receiving element (which can, for example, be a substrate) which has a layer for receiving the dyes transferred imagewise from the donor sheets. Thermal dye transfer methods as aforesaid are known and described, for example, in U.S. Pat. No. 4,621,271, issued Nov. 4, 1986 to S. Brownstein and U.S. Pat. No. 5,024,989, issued Jun. 18, 1991 to Y. H. Chiang, et al. Each of these patents is hereby incorporated by reference.


Commercial systems for issuing ID documents are of two main types, namely so-called “central” issue (CI), and so-called “on-the-spot” or “over-the-counter” (OTC) issue.


CI type ID documents are not immediately provided to the bearer, but are later issued to the bearer from a central location. For example, in one type of CI environment, a bearer reports to a document station where data is collected, the data are forwarded to a central location where the card is produced, and the card is forwarded to the bearer, often by mail. Another illustrative example of a CI assembling process occurs in a setting where a driver passes a driving test, but then receives her license in the mail from a CI facility a short time later. Still another illustrative example of a CI assembling process occurs in a setting where a driver renews her license by mail or over the Internet, then receives a drivers license card through the mail.


Centrally issued identification documents can be produced from digitally stored information and generally comprise an opaque core material (also referred to as “substrate”), such as paper or plastic, sandwiched between two layers of clear plastic laminate, such as polyester, to protect the aforementioned items of information from wear, exposure to the elements and tampering. The materials used in such CI identification documents can offer the ultimate in durability. In addition, centrally issued digital identification documents generally offer a higher level of security than OTC identification documents because they offer the ability to pre-print the core of the central issue document with security features such as “micro-printing”, ultra-violet security features, security indicia and other features currently unique to centrally issued identification documents. Another security advantage with centrally issued documents is that the security features and/or secured materials used to make those features are centrally located, reducing the chances of loss or theft (as compared to having secured materials dispersed over a wide number of “on the spot” locations).


In addition, a CI assembling process can be more of a bulk process facility, in which many cards are produced in a centralized facility, one after another. The CI facility may, for example, process thousands of cards in a continuous manner. Because the processing occurs in bulk, CI can have an increase in efficiency as compared to some OTC processes, especially those OTC processes that run intermittently. Thus, CI processes can sometimes have a lower cost per ID document, if a large volume of ID documents are manufactured.


In contrast to CI identification documents, OTC identification documents are issued immediately to a bearer who is present at a document-issuing station. An OTC assembling process provides an ID document “on-the-spot”. (An illustrative example of an OTC assembling process is a Department of Motor Vehicles (“DMV”) setting where a driver's license is issued to person, on the spot, after a successful exam.). In some instances, the very nature of the OTC assembling process results in small, sometimes compact, printing and card assemblers for printing the ID document.


OTC identification documents of the types mentioned above can take a number of forms, depending on cost and desired features. Some OTC ID documents comprise highly plasticized polyvinyl chloride (PVC) or have a composite structure with polyester laminated to 0.5-2.0 mil (13-51 .mu.m) PVC film, which provides a suitable receiving layer for heat transferable dyes which form a photographic image, together with any variant or invariant data required for the identification of the bearer. These data are subsequently protected to varying degrees by clear, thin (0.125-0.250 mil, 3-6 .mu.m) overlay patches applied at the print head, holographic hot stamp foils (0.125-0.250 mil 3-6 .mu.m), or a clear polyester laminate (0.5-10 mil, 13-254 .mu.m) supporting common security features. These last two types of protective foil or laminate sometimes are applied at a laminating station separate from the print head. The choice of laminate dictates the degree of durability and security imparted to the system in protecting the image and other data.



FIGS. 1 and 2 illustrate a front view and cross-sectional view (taken along the A-A line), respectively, of an exemplary prior art identification (ID) document 10. In FIG. 1, the prior art ID document 1 includes a photographic image 12, a bar code 14 (which may contain information specific to the person whose image appears in photographic image 12 and/or information that is the same from ID document to ID document), variable personal information 16, such as an address, signature, and/or birthdate, and biometric information 18 associated with the person whose image appears in photographic image 12 (e.g., a fingerprint). Although not illustrated in FIG. 1, the ID document 10 can include a magnetic stripe (which, for example, can be on the rear side (not shown) of the ID document 10), and various security features, such as a security pattern (for example, a printed pattern comprising a tightly printed pattern of finely divided printed and unprinted areas in close proximity to each other, such as a fine-line printed security pattern as is used in the printing of banknote paper, stock certificates, and the like).


Referring to FIG. 2, the ID document 10 comprises a pre-printed core 20 (such as, for example, white polyvinyl chloride (PVC) material) that is, for example, about 25 mil thick. The core 20 is laminated with a transparent material, such as clear PVC material 22, which, by way of example, can be about 1-5 mil thick. The composite of the core 20 and clear PVC material 22 form a so-called “card blank” 25 that can be up to about 30 mils thick. Information 26a-c is printed on the card blank 25 using a method such as Dye Diffusion Thermal Transfer (“D2T2”) printing (described further in commonly assigned U.S. Pat. No. 6,066,594, which is incorporated hereto by reference in its entirety.) The information 26a-c can, for example, comprise an indicium or indicia, such as the invariant or nonvarying information common to a large number of identification documents, for example the name and logo of the organization issuing the documents. The information 26a-c may be formed by any known process capable of forming the indicium on the specific core material used.


To protect the information 26a-c that is printed, an additional layer of overlaminate 24 can be coupled to the card blank 25 and printing 26a-c using, for example, 1 mil of adhesive (not shown). The overlaminate 24 can be substantially transparent. Materials suitable for forming such protective layers are known to those skilled in the art of making identification documents and any of the conventional materials may be used provided they have sufficient transparency. Examples of usable materials for overlaminates include biaxially oriented polyester or other optically clear durable plastic film.


Because ID documents 10 can be used to enable and facilitate personal identification, it often is desirable to manufacture the ID document 10 in a manner to deter counterfeiting and/or fraudulent alteration. There are a number of known ways to increase the security of ID documents 10, including methods that incorporate additional information or security features and methods that adapt existing information on the card to help prevent or make evident fraud. For example, numerous types of laminations have been employed in which the information-bearing surface is heat or solvent-laminated to a transparent surface. The materials for and the process of lamination are selected such that if an attempt is made to uncover the information-bearing surface for amendment thereof, the surface is destroyed, defaced or otherwise rendered apparent the attempted intrusion.


While an identification card that essentially cannot be disassembled without being destroyed may provide suitable resistance against fraudulent alteration, it might not significantly challenge all attempts of counterfeiting. The counterfeiting of identification cards also can involve the fabrication and issuance of identification cards by persons not authorized to do so. Such counterfeiting presents additional and different security problems to the art. One possible way of preventing fraudulent fabrication and issuing could involve strict control over the possession of the materials and equipment involved in the fabrication of the identification card. In some instances, however, this approach is impractical and/or impossible, especially if any of the materials involved are commercially available and used in other applications.


One response to the counterfeiting problem has involved the integration of verification features that are difficult to copy by hand or by machine. One such verification feature is the use in the card of a signature of the card's issuer or bearer. Other verification features have involved, for example, the use of watermarks, biometric information, microprinting, fluorescent materials, fine line details, validation patterns or marking, and polarizing stripes. These verification features are integrated into an identification card in various ways and they may be visible or invisible in the finished card. If invisible, they can be detected by viewing the feature under conditions which render it visible. At least some of the verification features discussed above have been employed to help prevent and/or discourage counterfeiting. However, at least some of the features can be expensive and, in the case of features hidden from casual visual inspection, require specialized equipment and trained operator for authentication. It would be advantageous if an ID document included a security feature that would be difficult to reproduce either in a counterfeited document or by the fraudulent alteration of an original, but would for authentication require neither specialized equipment nor trained operators.


One possible solution to the desire to provide visible, self-authenticating security features on cards is using a so-called lenticular lens and lenticular image. A lenticular image is comprised of a sequence of images that are interlaced to form a singular image, where each individual image (or frame) is viewable at a different angle to the viewer when viewed through a lenticular lens. These various images are termed views.


For example, U.S. Pat. No. 4,869,946 (“the '946 patent”) issued Sep. 26, 1989 describes a tamperproof security card comprised of a transparent upper layer having narrow parallel lenses on the outer surface, and an image containing substrate, the two layers forming a lenticular system by which images on the substrate are selectively visible depending upon the angle from which the card is viewed. The disclosure of this patent, insofar as it relates to the structure and operation of lenticular systems, is incorporated herein by reference. The embodiments disclosed in the '946 patent appear to contemplate having lenticular lens material over the entire surface of a card. In addition, the '946 patent states that the individual data image which is to be viewed through the lenticular lens is formed by laying down a photographic emulsion on an image substrate layer by means of a lenticular system (col. 3, lines 11-20).


It can be difficult to print variable/personalized information on ID documents using known methods, especially if the variable/personalized information varies in type, size, and location from card to card and if it is not desired that the entire card incorporate a lenticular lens feature. Because registration of the image to the lens can be important in ensuring good transitions in image appearance from one view to another, known systems have used simpler lenticular lens features, such as using the same pair of images (e.g., a pair of logos) on every card. A number of known systems, such as the '946 patent, also utilize the lens itself as a means to lay down the image to be viewed by it. One prior art system even uses a laser to engrave an image through the lenticular lens. Using the lens to create an image can be impractical for high volume applications (such as the aforementioned CI systems), where variable image data is printed on a core or substrate and/or on a laminate affixed to the core or substrate. In some situations, using a lens to create an image might limit the quality of the resultant image, because the angle at which the information is written requires a high degree of precision, increasing manufacturing costs.


Some other known systems print the multiple images on the lens itself, instead of on the substrate to which the lens attaches. Printing on the lens can make it difficult to achieve good registration between the lens and the image, which can result in poor image transition from one image to the other as image is viewed at varying angles. Printing on the lens also can limit the ability to handle images of varying sizes. Further, printing on a lens can be very difficult to do in high volume manufacturing environments such as making drivers licenses, because drivers licenses can have several formats which vary for different holders (e.g. under 21 driver, learners, and driver ID), and the aforementioned CI type driver license system can produce licenses for more than one state, which might involve using different art work and security features in different locations. It is inconvenient and expensive to have to change consumables (e.g., lens sheets) to enable varied printing.


It could be advantageous if the variable or personalized information associated with a card bearer could be used as a security feature, in a manner where the security feature is difficult to detect and/or duplicates, yet still able to be printable on the card at the time of card personalization. It could be advantageous if an identification document with a multiple image lenticular lens feature that uses personal information could be manufactured using conventional, inexpensive consumables already being used in the manufacture of identification documents (e.g., without requiring the use of expensive lenticular lens sheets). It further could be advantageous if an identification document could have a personalized full color multiple image lenticular lens feature.


The invention provides methods for making identification documents and identification documents with optically variable security features. One method provides image information arranged to include at least two different images. The method uses pressure to form a lens profile in a laminate, including combining the laminate with ink representing the image information to form the document. The document is formed together with the laminate and ink or dye such that the lens profile enables display of the at least two different images when the document is viewed at different predetermined angles.


An information bearing document comprises a core layer, an image layer depicting at least two different images, and a laminate layer. The laminate layer is pressed on the core layer such that it forms a lens profile that enables display of the at least two different images when the document is viewed at different predetermined angles.


Systems and methods are provided for making a secure ID card with multiple images. Printed information in the form of an interlaced image (which includes the interlacing of at least two images) is provided to an information-bearing layer. A substantially transparent film material is provided to substantially cover the information-bearing layer. A lens profile is embossed in a selected portion of the film material, such as the portion that at least partially covers the interlaced material. The portion of the interlaced image that is covered by the lenticular lens will present a different appearance depending on the angle at which the interlaced image is viewed. With the arrangement of the first embodiment, a secure ID card with multiple images security feature can be provided on a portion of the ID card while information on the other portions of the ID card are not obscured by the lenticular lens. In accordance with a further aspect of the invention, the lenticular lens can be fabricated prior to ID card construction and aligned with the ID card in order to provide the multiple images security feature on a portion of the ID card.


A method for making a secure ID card with multiple images is provided. Information is provided to an information bearing layer, the information constructed and arranged to be, capable of providing multiple images when printed information is viewed at different predetermined angles through an appropriate lens. At least a portion of the information is covered with a substantially a transparent film material. A lens profile is embossed on at least a second portion of the film material, the embossing forming a lens on the film material, the lens enabling the information to display multiple images when the information-bearing laminar assembly is viewed at different predetermined angles.


One embodiment provides an information bearing document having at least first side, the information bearing document comprising a core layer, an interlaced image, and a lenticular lens. The interlaced image is formed on the core layer, the interlaced image comprising at least two images constructed and arranged to provide at least two images when then interlaced image is viewed through a predetermined lenticular lens through at least two different predetermined angles. The lenticular lens is operably coupled to at least a portion of the interlaced image, the lenticular lens constructed and arranged be operable with the interlaced image to enable at least two images in the interlaced image to be viewable through the lenticular lens at two different angles.


The foregoing and other features and advantages of the present invention will be even more readily apparent from the following Detailed Description, which proceeds with reference to the accompanying drawings.





BRIEF DESCRIPTION OF THE DRAWINGS

The advantages, features, and aspects of embodiments of the invention will be more fully understood in conjunction with the following detailed description and accompanying drawings, wherein:



FIG. 1 is an illustrative example of a prior art identification document;



FIG. 2 is an illustrative cross section of the prior art identification document of FIG. 1, taken along the A-A line;



FIG. 3 is a view of an ID document illustrating the multiple images, in accordance with one embodiment of the invention;



FIG. 4 is a cross-sectional schematic view of the ID document of FIG. 3, taken generally across line 1C-1C of FIG. 3;



FIG. 5 is a top schematic view of the ID document of FIG. 3, viewed from a first angle;



FIG. 6 is a top schematic view the ID document of FIG. 3, viewed from a second angle;



FIGS. 7A-B are illustrative examples of a first security image, in original and pre-interlaced form, respectively, relevant to the creation of a multiple image security feature shown in the ID document of FIG. 3;



FIGS. 8A-8B are illustrative examples of a second security image, in original and pre-interlaced form, respectively, relevant to the creation of a multiple image security feature shown in the ID document of FIG. 3;



FIG. 9 is an illustrative example of a multiple image security feature created by interlacing the first and second security images of FIGS. 7A, 7B, 8A, and 8B, in accordance with one embodiment of the invention;



FIG. 10 is an illustrative flow chart showing a method for creating the multiple image security feature of FIG. 9, in accordance with one embodiment of the invention;



FIG. 11 is an illustrative diagram of a first central issue card production system that can be used to produce the ID document of FIG. 3, in accordance with one embodiment of the invention;



FIG. 12 is a detailed view of a portion of the embosser of FIG. 11;



FIGS. 13A-D are front, cross-sectional, enlarged, and perspective views, respectively of the lenticular die of the embosser of FIG. 11;



FIGS. 14A-D are cross-sectional, perspective, side, and edge views, respectively, of the insulator plate of the embosser of FIG. 11;



FIGS. 15A-D are top, cross-sectional, edge, and perspective views, respectively, of the heater bar of the insulator plate of FIGS. 14A-D and FIG. 11;



FIG. 16 is a flow chart of a first method for manufacturing the ID document of FIG. 3 using the system of FIG. 11, in accordance with one embodiment of the invention;



FIG. 17 is a flow chart of a second method for manufacturing the ID document of FIG. 3 in a central issue environment;



FIG. 18 is an illustrative diagram of a second central issue card production system that can be used to produce the ID document of FIG. 3, in accordance with one embodiment of the invention; and



FIG. 19 is an illustration of a portion of a laminate roll showing a laminate with lenticular lenses embossed thereon.





The drawings are not necessarily to scale, emphasis instead generally being placed upon illustrating the principles of the invention. In addition, in the figures, like numbers refer to like elements.


DETAILED DESCRIPTION OF THE INVENTION

In the foregoing discussion, the use of the word “ID document” is broadly defined and intended to include all types of ID documents, including (but not limited to), documents, magnetic disks, credit cards, bank cards, phone cards, stored value cards, prepaid cards, smart cards (e.g., cards that include one more semiconductor chips, such as memory devices, microprocessors, and microcontrollers), contact cards, contactless cards, proximity cards (e.g., radio frequency (RFID) cards), passports, driver's licenses, network access cards, employee badges, debit cards, security cards, visas, immigration documentation, national ID cards, citizenship cards, social security cards and badges, certificates, identification cards or documents, voter registration and/or identification cards, police ID cards, border crossing cards, security clearance badges and cards, gun permits, badges, gift certificates or cards, membership cards or badges, and tags. It is even contemplated that aspects of the invention may have applicability for devices such as compact disks, consumer products, knobs, keyboards, electronic components, etc., or any other suitable items or articles that may record information, images, and/or other data, which may be associated with a function and/or an object or other entity to be identified. Note also that, for the purposes of this disclosure, the terms “document,” “card,” “badge” and “documentation” are used interchangeably.


In addition, in the foregoing discussion, “identification” includes (but is not limited to) information, decoration, and any other purpose for which an indicia can be placed upon an article in the article's raw, partially prepared, or final state. Also, instead of ID documents, the inventive techniques can be employed with product tags, product packaging, business cards, bags, charts, maps, labels, etc., etc., particularly those items including marking of an laminate or over-laminate structure. The term ID document thus is broadly defined herein to include these tags, labels, packaging, cards, etc.


“Personalization”, “Personalized data” and “variable” data are used interchangeably herein, and refer at least to data, images, and information that is “personal to” or “specific to” a specific cardholder or group of cardholders. Personalized data can include data that is unique to a specific cardholder (such as biometric information, image information, serial numbers, Social Security Numbers, privileges a cardholder may have, etc.), but is not limited to unique data. Personalized data can include some data, such as birthdate, height, weight, eye color, address, etc., that are personal to a specific cardholder but not necessarily unique to that cardholder (for example, other cardholders might share the same personal data, such as birthdate). In at least some embodiments of the invention, personal/variable data can include some fixed data, as well.


“Laminate” and “overlaminate” include (but are not limited to) film and sheet products. Laminates usable with at least some embodiments of the invention include those which contain substantially transparent polymers and/or substantially transparent adhesives, or which have substantially transparent polymers and/or substantially transparent adhesives as a part of their structure, e.g., as an extruded feature. Examples of potentially usable laminates include at least polyester, polycarbonate, polystyrene, cellulose ester, polyolefin, polysulfone, and polyamide. Laminates can be made using either an amorphous or biaxially oriented polymer as well. The laminate can comprise a plurality of separate laminate layers, for example a boundary layer and/or a film layer. Other possibly usable laminates include security laminates, such as a transparent laminate material with proprietary security technology features and processes, which protects documents of value from counterfeiting, data alteration, photo substitution, duplication (including color photocopying), and simulation by use of materials and technologies that are commonly available. Laminates also can include thermosetting materials, such as epoxy. Laminates can include synthetic resin-impregnated or coated base materials composed of successive layers of material, bonded together via heat, pressure, and/or adhesive.


The material(s) from which a laminate is made may be transparent, but need not be. The degree of transparency of the laminate can, for example, be dictated by the information contained within the identification document, the particular colors and/or security features used, etc. The thickness of the laminate layers is not critical, although in some embodiments it may be preferred that the thickness of a laminate layer be about 1-20 mils. Lamination of any laminate layer(s) to any other layer of material (e.g., a core layer) can be accomplished using any conventional lamination process, and such processes are well known to those skilled in the production of articles such as identification documents. Of course, the types and structures of the laminates described herein are provided only by way of example, those skilled in the art will appreciated that many different types of laminates are usable in accordance with the invention. Various lamination processes are disclosed in assignee's U.S. Pat. Nos. 5,783,024, 6,007,660, 6,066,594, and 6,159,327. Other lamination processes are disclosed, e.g., in U.S. Pat. Nos. 6,283,188 and 6,003,581. Each of these U.S. patents is herein incorporated by reference.


For purposes of illustration, the following description will proceed with reference to ID document structures (such as TESLIN-core, multi-layered ID documents) and fused polycarbonate structures. It should be appreciated, however, that the present invention is not so limited. Indeed, as those skilled in the art will appreciate, the inventive techniques can be applied to many other structures formed in many different ways to provide a multiple image feature thereon. Generally, the invention has applicability for virtually any product which is to be printed and especially those products which need to be uniquely identified and/or protected against fraud and/or tampering. For example, at least some embodiments of the invention are usable to form multiple image features on articles formed from paper, wood, cardboard, paperboard, glass, metal, plastic, fabric, ceramic, rubber, along with many man-made materials, such as microporous materials, single phase materials, two phase materials, coated paper, synthetic paper (e.g., TYVEC, manufactured by Dupont Corp of Wilmington, Del.), foamed polypropylene film (including calcium carbonate foamed polypropylene film), plastic, polyolefin, polyester, polyethylenetelphthalate (PET), PET-G, PET-F, and polyvinyl chloride (PVC), and combinations thereof.


It is further anticipated that the invention could even have applicability in manufacturing articles which are to have a multiple image feature formed thereon, but where the multiple image feature is not necessarily provided as a security feature. For example, it is anticipated that the invention has applicability in forming decorative multiple image features and/or customized multiple image features.


In one embodiment, the invention provides a novel information-bearing laminar assembly that would be suitable for use as or incorporated into an identification document, such as the ID document 10 of FIG. 1. The information-bearing laminar assembly of this embodiment is characterized by the provision therein, as a security feature, a lenticular lens portion disposed on an outer transparent layer, which provides multiple images in conjunction with information printed on an information-bearing layer. In at least one embodiment, the multiple images include at least one image that includes variable/personal information. In at least one embodiment, the multiple images include at least one color image, such as a full color portrait.



FIG. 3 is a view of an information bearing laminar assembly 100 (also referred to as ID card 100) illustrating the multiple images, in accordance with one embodiment of the invention, and FIG. 4 is a cross-sectional schematic view of the ID card 100 of FIG. 3, taken generally across line 1C-1C of FIG. 3. Note that the view of FIG. 3, in which both of the variable images are visible, is not a view that necessarily can be seen by a user, but is merely provided to illustrate the juxtaposition and location of the multiple images. As the ID card 100 is rotated, the security images 130, 130′ appear to “disappear” as shown in FIGS. 5 and 6. The disappearance of the image is due to the focus of the lens in the areas of no print. As the ID card 100 is rotated about its horizontal axis, the focal point of the lens moves vertically up or down and oscillates between the two images. The lens feature magnifies the print located at this focal point, resulting in expanding the print to appear as a continuous single image. In at least one embodiment, instead of lines, individual dots (e.g., of ink or toner) could be used to represent the line and the feature would work in the same manner.


Referring to FIGS. 3 and 4, the ID card 100 includes an information-bearing layer 106 having a first surface 104. The first surface 104 includes a multiple image portion 120 which further includes first and second security images 130, 130′. For illustrative purposes only, the first security image 130 is shown as a reduced size portrait 130 (which, for security purposes, can match the standard size portrait 122), and the second security image 130′, is shown to be a birthdate. The first and second security images 130, 130′ can, however, be virtually any type of information that is useful and/or usable, given the type and use of the ID card 100. For example, the first and second security images 130, 130′ can be any pair chosen from information such as biometric information (e.g., fingerprint), signatures, birthdates, serial numbers, government identification numbers (e.g., Social Security Numbers), images of the bearer of the ID card 100, address, account number, security classification, expiration date, and the like. Although it is advantageous for security purposes that one or both of the first and second security images 130, 130′ include variable/personal information, in at least one embodiment it is not necessary that either (or both) security images comprise variable information. In one embodiment, for example, the first and second security images 130, 130′ could comprise nonvarying information, especially if the nonvarying information is printed using a substance (e.g., optically varying or non-visible ink) that increases the difficulty of copying the ID card 100. In one embodiment either or both of the security images could comprise pre-printed fixed or nonvarying information. Furthermore, those skilled in the art will appreciate that many different types of information (in fact, virtually any type of information) is usable. For example, in one embodiment of the invention, either or both of the security images are color images, such as single color images, pearlescent colors, rainbow colors, multicolors, and full colors.


Note that the invention is not limited to using any specific inks or equipment to print any of the features, including the interlaced images described herein. Inks such as ultraviolet (UV), infrared (IR), etc. are usable in at least some embodiments of the invention, as well as inks that are toner-based and/or UV-curable. Further, in at least some embodiments of the invention, the equipment and/or printing presses used can include offset, digital variable offset, inkjet, laser toner-based, etc.


It also will be appreciated that the first and second security images 130, 130′, in at least some embodiments, can even comprise the same image or different forms of the same image. For example, the first security image 130 could be a front facing portrait of a card bearer and the second security image 130′ could be a profile image of the card bearer. In at least some embodiments, the first security image 130 could be a visible portrait image of a card bearer and the second security image 130′ could be the same portrait image of the card bearer, but printed in a non-visible ink (e.g., UV or IR ink) or an optically variable ink. Many different possible combinations are contemplated to be within the spirit and scope of the invention.


Referring again to FIGS. 3 and 4, the first surface 104 also can include other information, such as fixed information 19 (here, the name of the issuing authority) and variable/personal information, such as, a portrait 122, an address 16 and biometric information 18. Note that any or all of the variable/personal information could be part of the multiple image portion 120.



FIG. 5 is a top schematic view of the ID document of FIG. 3, viewed from a first angle, showing that only the first security image 130 is visible at the first angle. FIG. 6 is a top schematic view the ID document of FIG. 3, viewed from a second angle, showing that only the second security image 130′ is visible at the second angle.


Referring again to FIG. 4, it can be seen that the information-bearing inner layer 106 is disposed beneath a light transmissive outer laminate layer 102 having lenticules 116a through 116n formed thereon. The lenticules 116 and laminate layer 102 together form a lenticular lens. At time, in this specification, “lenticule” and “lenticular lens” may be used interchangeably. The illustrative embodiment of FIG. 4 illustrates that the information bearing inner layer 106 is interposed between two light transmissive outer layers 102 and 114, but not all embodiments of the invention require that there be light transmissive outer layers affixed to both surfaces of the information bearing inner layer 106.


In at least one embodiment, the information bearing inner layer 106 corresponds to a core layer (also referred to as a substrate) of an identification document. In at least one embodiment, the information bearing inner layer 106 is made from a substantially opaque material, such as TESLIN. Other rigid or semi-rigid planar materials can, of course, be used. Further, it will be appreciated that the invention can be adapted to work with many other materials used as an information bearing layer 106, such as thermoplastic, polymer, copolymer, polycarbonate, fused polycarbonate, polyester, amorphous polyester, polyolefin, silicon-filled polyolefin, foamed polypropylene film, polyvinyl chloride, polyethylene, thermoplastic resins, engineering thermoplastic, polyurethane, polyamide, polystyrene, expanded polypropylene, polypropylene, acrylonitrile butadiene styrene (ABS), ABS/PC, high impact polystyrene, polyethylene terephthalate (PET), PET-G, PET-F, polybutylene terephthalate PBT), acetal copolymer (POM), polyetherimide (PEI), polyacrylate, poly(4-vinylpyridine, poly(vinyl acetate), polyacrylonitrile, polymeric liquid crystal resin, polysulfone, polyether nitride, and polycaprolactone, and combinations thereof.


In the illustrated embodiment of FIG. 4, the two illustrated light-transmissive outer layers are adhered to the inner information-bearing layer 106 by two adhesive layers 110 and 112, respectively. The adhesives layers 110, 112 need not be provided separately, but could be already formed on the laminate layer 102. The first outer light-transmissive layer 102 is adhered to the inner information-bearing layer 106 by the first adhesive layer 110 and the second outer light transmissive layer 114 is adhered to the inner information-bearing layer 106 by the second adhesive layer 112. The outer layer 102 includes a series of parallel lenticular lenses 116a-116n (generally referred to as lenticular lens 116) which are formed as described below in conjunction with FIGS. 11-17.


In at least on embodiment, some of the 118a-118n includes variable/personal information and is provided on the surface 104 of inner information-bearing layer 106 that is used in cooperation with the lenticular lenses 116, to provide the multiple image optical effect. In at least one embodiment of the invention, the information 118 includes interlaced images that include a color portrait (the creation of such images is discussed further herein). The information 118 also could includes text or graphics that is representative of data desired to be displayed in the information bearing document, or any type of personal/variable data discussed herein. For example, textual data may include, but is not limited to, the name, address, state, or privileges of the holder of the document. Graphical data may include, but is not limited to, such items as a photographic image of the holder (in black and white, grayscale, or color) of the information bearing document, the seal of the state or corporation issuing the document, a trademark, or other security such as a complex geometric pattern.


One of ordinary skill in the art will appreciate that information 118 other than security images could be similarly provided on any surface on information-bearing inner layer 106 or outer layers 102 and 108. In addition, information could also be provided on either adhesive layer 110 and 112. Similarly, one of ordinary skill in the art will appreciate, in light of the teachings provided herein, that the information on certain of these surfaces would require the information to be printed using a reverse format. Further, one of skill in the art will appreciate that the information 118 could be distributed among a plurality of layers that lie beneath the lenticular lens layer 116. Thus, this disclosure is not intended to be limited to providing the information in a particular orientation or to a particular surface.


In addition, the information may be provided on the desired surface using any known techniques. For example, affixing the information could include any process in which a marking material is applied to a substrate to generate a permanent mark. Thus, one skilled in the art will appreciate that the invention can be adapted for color and/or black and white printing techniques, such as photogravure, flexographic and lithographic printing, printing by means of ink jet printers (using solid or liquid inks), phase change printers, laser printing, laser engraving and electro photographic printing. For example, laser engraved information could be provided on surface 104 of inner information-bearing layer 106 creating another level of security. Persons skilled in the printing art will appreciate that with some of these printing techniques, the “inks” used need not necessarily be conventional liquid inks but also could be solid phase change inks, solid colors, dyes, etc. This disclosure is intended to include any means of affixing the information to a particular desired surface.


The optimal dimensions of the lenticular lens formed by the laminate 102 and its lenticules 116a-116n for viewing the information 118 are at least in part dependent on and adapted to suit the thickness of the laminate layer 102, the thickness of the information printed 118, and the expected focal length with which the information 118 is to be viewed. For example, in an embodiment of the invention having a standard 30 mil thick identification card with D2T2 printing of variable information to a TESLIN core, which is to be viewed by a human at a distance of about one to two feet, the focal length is about 0.015 inches and depends on the distance between the edge of the lenticular lens and the information 118 printed on the core. In FIG. 4, the range of distances to consider is illustrated as “A” and “B” range from about 10 to 20 thousandths of an inch.


The number of lenticules 116 per inch ranges, in at least one embodiment of the invention, between about 45 to 100 lines per inch. As those skilled in the art will appreciate, the number of lenticules 116 required depends at least in part on the resultant size of the multiple image feature to be created, the number of images being interlaced to form it, and/or the desired “flipping” (e.g., gradual or quick) between and among the multiple images.


The lens 116 is preferably transparent at least where the underlying information 118 can be viewed. Underlying information 118 can be any information printed on the information bearing layer 106 or on any layers disposed between the information bearing layer 106 and the lens 116. Therefore, each document can be personalized for the cardholder. As is understood by those skilled in the art, the design of the lens 116 dictates the degree of rotation the ID card 100 needs for viewing the information. By rotating the ID card 100, the first and second security images 130, 130′ appear to a viewer to appear and disappear.


In one embodiment, lens 16a is designed to require a rotation of the ID card 100 to order to view the underlying information. Rotating the ID card 100 causes the underlying information to seem to appear and disappear as viewed through the lens 116, as shown in FIGS. 5 and 6. As will be described herein, the technique of printing the interlaced image on the information bearing layer 106 (e.g., a core layer in an identification card) instead of on the lens (formed by the laminate layer 102 and lenticules 116), enables the interlaced image to be printed with variable color information, if desired.


The lenticules 116 of FIG. 4 can be achieved in several ways, including by embossing the laminate material 102 after it is laminated to the information bearing layer 106 (which is described more fully in FIGS. 11-17), and by using a purchased lenticular lens sheet, such as one provided by Orasee Corporation of Duluth, Ga. The lenticules 116 can be achieved with any optical thermoplastic material including but not limited to polycarbonate, polyester, polyurethane, cellulose acetates, polystyrenes, polyvinyl chloride, and polyethylene. In at least one embodiment, the embossing process does not induce any crystallinity or marring of the surface. Some polyester materials show low levels of crystallinity during the embossing process. Generally, this can be overcome by processing conditions, but if crystallinity ensues the optical properties could be sacrificed by the reduction in transmission. Advantageously, the outer layers 102 and 114 are substantially optically clear within the visible spectrum. A suitable material is an amorphous polyethylene terephthalate (also referred to as “PET”) sheet 34, for example, the PET sheet sold by Transilwrap, of Franklin Park, Ill. under the trade name “TXP.” In general, PET material has good strength and flexibility and has high anti-abrasion properties. Other suitable materials include like polyesters, which are the reaction products of the polymerization of ethylene glycols with polycarboxylic acids.


For adhesive layers 104 and 108, in at least one embodiment of the invention a usable adhesive material is an ethylene-vinyl acetate adhesive such as KRTY, which is the commercial trade designation for an adhesive available from Transilwrap. Other heat- or pressure-activated adhesive can of course be utilized, the selection thereof depending on the nature of the processes by which the inner-information bearing layer 106 is to be coupled to the outer protective layers 102 and 114. For a heat-activated adhesive, one can employ an ethylene ethyl acrylate copolymer of an ethylene ethyl acrylate or mixture thereof, as well as any of a number of polyolefinic hot melts.



FIGS. 7A-B are illustrative examples of a first security image, in original and pre-interlaced form, respectively, relevant to the creation of a multiple image security feature shown in the ID document of FIG. 3. FIG. 7A shows a first security image 130 (the cross hatches shown are for illustrative purposes and do not necessarily represent what is shown in an image) before interlacing. FIG. 7B illustrates what is here termed a pre-interlaced first security image 132, representing the portion of first security image that is to be interlaced. The pre-interlaced first security image 132 is not necessarily an image that is separately created. Rather, the pre-interlaced first security image 132 represents one example showing the parts of the first security image 130 that could be used to create an interlace image that could be placed as information 118 on an ID card 100 that is viewable through the lenticules 116 affixed to the card (See FIGS. 3-6).



FIGS. 8A-8B are illustrative examples of a second security image 130′, in original and pre-interlaced form, respectively, relevant to the creation of a multiple image security feature shown in the ID document of FIG. 3. FIG. 8B is similar to FIG. 7B in that it illustrated a pre-interlaced second security image 132′, representing the portion of the second security image that is to be interlaced. The pre-interlaced second security image 132′ is not necessarily an image that is separately created. Rather, the pre-interlaced second security image 132′ represents one example showing the parts of the second security image 130′ that could be used to create an interlace image that could be placed as information 118 on an ID card 100 that is viewable through the lenticules 116 affixed to the card (See FIGS. 3-6).



FIG. 9 is an illustrative example of a multiple image security feature created by interlacing the first and second security images of FIGS. 7A, 7B, 8A, and 8B, in accordance with one embodiment of the invention, in the manner contemplated by the flow chart of FIG. 10, which is now described.



FIG. 10 is an illustrative flow chart showing a method for creating the multiple image security feature 120 of FIG. 9, in accordance with one embodiment of the invention. Although this flow chart describes the process for creating a multiple image security feature 120 that is made from two security images, those skilled in the art will appreciate that this method readily can be adapted to interlace more than two images. In addition, although the term “security image” is used in this discussion by way of example, it is not limited to including just image type files, but also characters/strings.


In step 200, the desired first and second security images are received (step 200) for this process. The security image can be virtually any type of image or data. For example, in at least one embodiment, the security image is a string of one or more characters, such as a birthdate. The string can be in any font or color, and can include fixed and/or variable information. The string can be supplied in many ways, such as from a database, entered by hand, or extracted from a file.


In at least one embodiment, the security image is part of an image that was captured from a subject, such as a facial portrait, a fingerprint, or a signature. For example, in at least one embodiment, several pieces of such information about a subject can be stored in an object file that is usable as a security image input. In one embodiment, the method of FIG. 10 receives information in the form of a personal object file called a .poff file (formerly known as a POLAROID object file). The following provide some further information about the .poff file format used in accordance with at least some embodiments of the invention


POFF Files


This file format is designed to encapsulate all the data needed to process an individual ID card. All the data needed to print and handle the card will be included in the file. This permits this file to be shipped as an entity across a network where it can be printed, displayed or verified without need for additional information. The specific fields and their order in text area are not specified, there is a provision for a separate block of labels for the fields for display purposes. The format is suitable for encoding on ‘smart cards’ as well as transmission and printing of the records.


The image file formats were chosen for their compatibility with the AAMVA standards and for their widespread acceptance as file formats in popular applications and libraries.


Notes:


AAMVA (American Association of Motor Vehicle Administrators) has begun work on a transmission standard for Image/Text data and is revising its best practices guide for image storage format. This format may have to be revised to conform with this new standard.


The AAMVA baseline standard for signatures is currently 8 bit grayscale (JPEG compressed), the standard also supports bi-level with CCITT group 3 or 4 as an accepted alternate. It needs to be determined with of these formats is preferred by the marketplace.


Typical US DMV Files Contain the Following Blocks


Text Block (tag 0x0001)


JPG Portrait Block (tag 0x0011 or tag 0x0211)


ID-3000 or TIF Signature Block (tag 0x0420 or 0x0520)


They may optionally include fingerprint blocks


File Format















Header



POFF
4 byte literal


Version
2 byte unsigned integer



(high byte major version low byte minor version)


Object Count
2 byte unsigned integer


File Length
4 byte unsigned integer


Directory Area



Directory Checksum
4 byte unsigned integer


Object Type Tag
2 byte unsigned integer [Beginning of directory]


Length of Object
4 byte unsigned integer


Offset of Object
4 byte unsigned integer [from beginning of file]


. . .
additional directory entrys


End of Directory Tag



Data Area



Object Type Tag
2 bytes [Included in length of object]


Object Checksum
4 bytes


Object Data



. . .
additional data sections










Checksums are the 32 bit unsigned integer sums of all the bytes in the checksum range, for data sections the checksum range is all the bytes that follow the checksum until the next object tag, for the directory area the checksum range is all the individual directory entrys (the length should be 6 times the object object count). The length in the header is the length of the original data object (it does not include the tag an the checksum).


Standard DMV File Layout


Header.


Directory


Text Data


Portrait


Signature


Data Formats


All numeric values are in Intel x86 format (byte order)


Color Images


Primary Format

    • .JPG (JPEG File Interchange Format)


Alternate Formats

    • .TIF (JPEG Compresessed TIFF)
    • ID-3000 Version 2.2+ Compatible format with marker codes


      B+W Images


.PCX (CCITT Group 3 or 4 Compatible Modes)


.JPG (8 bit grayscale JFIF compressed)


.TIF (Any B&W or Grayscale TIFF 6 Compatible File Format)


Text Data (or Labels)


.CSV (comma separated value)


A comma as data is represented by ESC, or by single quoting field


Two commas together indicates a blank field


All other characters must be printable ASCII Text (32-126,128-254)


Data Tags (16 Bits Unsigned Integer)
















Text
0x0001



Text Field Labels
0x0002



Double Byte Text
0x0101
(for use with Asian character sets)


Double Byte Labels
0x0102
(for use with Asian character sets)


Front Portrait
0x0011
JFIF (JPG File format)


Left View Portrait
0x0012
JFIF (JPG File format)


Right View Portrait
0x0013
JFIF (JPG File format)


Front Portrait
0x0111
TIFF


Left View Portrait
0x0112
TIFF


Right View Portrait
0x0113
TIFF


Front Portrait
0x0211
ID-3000


Left View Portrait
0x0212
ID-3000


Right View Portrait
0x0213
ID-3000


Signature
0x0020
Bi-Level PCX (group 3 or 4)


Signature
0x0120
Grayscale (JFIF Compressed)


Signature
0x0220
Grayscale (JTIF Compressed)


Signature
0x0320
ID-3000 Grayscale


Signature
0x0420
ID-3000 Binary


Signature
0x0520
TIFF (any TIFF 6.0 type)







Bitmap Fingerprint Data









Right Thumb
0x0030



Right Index Finger
0x0031



Rignt Middle Finger
0x0032



Right Ring Finger
0x0033



Right Little Finger
0x0034



Left Thumb
0x0038



Left Index Finger
0x0039



Left Middle Finger
0x003A



Left Ring Finger
0x003B



Left Little Finger
0x003C








Minutae Fingerprint Data









Right Thumb
0x0130



Right Index Finger
0x0131



Rignt Middle Finger
0x0132



Right Ring Finger
0x0133



Right Little Finger
0x0134



Left Thumb
0x0138



Left Index Finger
0x0139



Left Middle Finger
0x013A



Left Ring Finger
0x013B



Left Little Finger
0x013C








Digitial Signature Tags









CRC Method
0x0040



Polaroid Bingo Method
0x0041








Datastream Tags









PDF-417 Barcode Data
0x0050



End of Directory
0x00FF



User Definable Tags
0xFFxx
(where xx is 0x00-0xFF)





The Tag Patern 0x0Fxx is reserved for special operations.







Notes on Tag Types


The Digital signature tags are for improved file security. The system is a compromise between encrypting the actual data elements, and leaving the data unsecured. A Digital signature object contains a Digital Signature structure (defined elsewhere) that includes information about the specific object it protects. The original object is unchanged by the method, an application which wishes to validate the authenticity of an object builds the signature for the object and compares it to the value stored in the field.


The Datastream tags are used to represent data that is passed into the system for special purpose processing. They are used when the higher levels of the system do no have the ability to make sense of the data contained. An specific example of this would be when encrypted data is being passed in the system for printing as a barcode.


Now referring again to FIG. 10, virtually any type of pairing of different (or similar) types of files are possible with the pair of first and second security images. For example, in one embodiment, the first and second security images comprise a string (e.g., characters representing date of birth) and part of a personal object file, such a portrait image. In one embodiment, the first and second security images comprise a pair of personal object file data, such as a portrait and a signature. In at least one embodiment, the first and second security images comprise a personal object file data (e.g., a fingerprint image) and a standalone image, which could be a supplied image (e.g., a state seal or logo). Any of the information (strings, object files, images) can be fixed or variable, and those skilled in the art will appreciate that different types of cards will have differing security needs and, thus, may require different types of pairs of images.


Referring again to FIG. 10, if the first and second security images are not already in a predetermined standard size and bitmap form, the first and second security images are converted (step 205) to bitmap type files of a standard size. The size is dependent on the desired physical size of the multiple image feature on the card. In one embodiment, a software product usable to accomplish the conversion into a standard bitmapped image is the LEAD TOOLS 12.0 FOR WINDOWS 32 product available from Lead Technology, Inc., of Charlotte, N.C.


In step 210, an image row in the image is selected as a starting point to begin the interlacing. The image row can comprise of, for example a single row of pixels or can, for example, be multiple rows of pixels. The size of the image row depends on various factors, such as the design of the lens (e.g., lens dimensions), lens features (e.g., lenticules per inch), the size of the first security image, the size of the second security image, the degree of switching (fast or slow) between images that is desired, focal length, and surface quality.


For example, assume that a lenticular lens formed on the laminate 102 (FIG. 3) has about 90 lenticules (also referred to as “lines”) per inch (“lpi”). It is assumed, for the purposes of this example, that the lenticules are oriented so that they are horizontally aligned over a security image, although such an orientation is not limiting. In this same embodiment, the first security image may have a size of 450 pixels long by 450 pixels wide, with each pixel (assume square pixels) being about 0.0011 inches along in length along each side—an image about a half inch long and a half inch wide. For an image with those dimensions and a lenticular lens formed in laminate 102 having 90 lenticules per inch (or 45 lenticules per half inch), there will be a lenticule about every 0.011 inches, or about every 10 pixels. Thus, one type of interlacing for the security image is to alternate every 10 pixels (e.g., 10 pixels “on” in the image, 10 pixels “off for a first security image, and the reverse for the second security image). The inventors have determined, however, that the optimum interlacing for the security images used in ID documents is a 5 pixel on, 5 pixel off configuration. Referring again to step 210 of FIG. 10, the so-called row size would, in this example, be 10 pixels.


To determine a starting image row (that is, the row in the image where the method begins will begin the “on-off” interlacing, the method of FIG. 10 uses a one or more predetermined input parameters. In one embodiment, a user may have a choice, for example, of setting the interlacing to begin at the top of an image and work down, at the bottom and work up, somewhere in between and work up or down. This is, in one embodiment, a fixed parameter for all identification documents being manufactured in a given “batch” for example.


It is anticipated that the invention can be adapted to be able to determine the starting image row dynamically, based on the type and/or size of the first and/or second security images. For example, assume that the first security image is a full color image portrait having a first size and the second security image is a text string that can vary from user to user (e.g., an address) and thus may have a different “height” for different users (assuming that the text string could “wrap around” to fill the available image space. The method of FIG. 10 and particularly step 210 can be adapted to select a starting row for interlacing depending on the “height” of the second security image, to best provide a substantially complete interlacing between the first and second security images. Note also that varying the starting row can cause the image flip angle (or the viewable angle) to change.


Although not specifically addressed in the exampled discussed in connection with FIG. 10, step 210 of FIG. 10 also takes into account parameters such as desired size of resultant final interlaced image and desired fonts and font colors of any characters printed as part of final interlaced image. The font colors can include single colors, multiple colors, rainbows of colors, pearlescent colors, full colors, and the like, as desired.


In step 215 of FIG. 10, if the first and second images are the same size, the processing moves to step 230 (discussed below). Note that, in at least one embodiment, two images being the same “size” implies that the two images have the same height and width (in pixels). In this embodiment, if the first and second security images are not the same size, the interlaced image is created in a different file, but if the first and second images are the same size, the interlaced image is created by directly interlacing into one of the images (for purposes of example, we assume that image to be the first security image, but using the second works equally well). Generally, for images of unequal size, the smaller image is interlaced into the larger image.


If the first and second security images are different sized, an interlace file is defined (step 217) and the interlaced data is written to it from the first and second security images. The interlace file has a bitmap format. This begins by writing the desired starting image raw from the first security image to the interlace file (step 220). For example, if the first security image corresponded to the 450 by 450 example described above, the starting image row could be the first 10 rows of pixels in the first security image. Next, the desired starting image row (also, in this example, 10 rows of pixels) is written from the second security image (step 225). In one embodiment, this row is written in the interlace file to position directly adjacent to the row just written from the first security image. As shown in steps 225, 230, and 235 this process is alternated back and forth from the first to the second security image until the desired amount of interlacing is complete or one of the images “runs out” of rows of pixels. Note that the method of FIG. 10 can be adapted so that only partial interlacing (e.g., interlacing for, say, 40 lenticules worth of image) is required, so the process of steps 225 through 235 can stop when the desired amount of interlacing is desired.


If one of the images is out of rows, the rows in the other image continue to be written to the interlace file, alternating with rows of “blanks”, until there are either no rows of the image left or the desired interlacing is complete (step 240). In this embodiment, by “blank” it is meant that the other image will be overwritten with what ever background color (e.g., white, but need not be white) that the information bearing layer 106 is. The interlaced image file is then complete (step 245) and ready to be provided to a printer for printing on a card (step 250). In at least one embodiment, the resultant interlaced image file resembles the file shown in FIG. 9.


Referring again to step 215, if the first and second security images are the same size, it is not required to create a new interlaced image file (although in at least one embodiment it is contemplated that a new interlaced image file nonetheless can be created in a manner similar to that described in steps 217 through 250). Rather, one of the security images can be “turned into” an interlaced image file via steps 255 through 250. For purposes of example only, it is assumed here that the first security image is to be “turned into” the interlaced image file.


The starting image row in the first security image is retained (step 255) (note that starting image row and subsequent image rows are the same as defined above). The next image row in the first security image is overwritten with the starting image row from the second security image (step 260). This process continues (alternately overwriting the image rows in the first security image) until the desired degree of interlacing is achieved or all rows are interlaced (step 265). The resultant interlaced image will have a similar general appearance to the image of FIG. 9, but will show interlacing of two similarly sized images. As a result of steps 255 through 265, the first security image file has been converted to an interlaced image file (steps 270 and 275) and is ready to be printed on the substrate.


It will be appreciated by those of ordinary skill in the art that several print technologies including but not limited to indigo (variable offset) laser xerography (variable printing), offset printing (fixed printing) and inkjet (variable printing) can be used to print the information 118 (which can include the above mentioned interlaced image file) on the inner information-bearing layer 106. The information can be printed using dots or lines of varying colors to form text or images. The information also can comprise process colors or pantone colors. The multiple image features, can include personal information in a color format.


In one embodiment of the invention, the ID card 100 of FIG. 3 can be produced in a high volume central issue environment. FIG. 11 is an illustrative diagram of a first central issue card production system 500 that can be used to produce the ID document of FIG. 3, in accordance with one embodiment of the invention. The system 500 includes an imaging system 505, laminator and die cutter system 504, and a document production and control system 506.


The imaging system includes a back printer 508 for printing the back side of the card and a front printer 510 for printing the front side of the card. Each printer has its own high speed controller 514, 515. The laminate and die cutter system 504 includes a laminator 522, an embosser 524, a die cutter 558, and a laminator/die cutter/embosser controller 553. In one embodiment, the laminator/die cutter/embosser controller helps to implement the method of FIG. 10.


The document production control system includes central servers 540, a report station 534, a quality control station 536, and a mailer 530. The QC Station 536 and its associated bar code scanner (not shown) can be used by an operator to scan the bar code of a defective sheet or document. Keyboard entry can also be used to report or to check documents and sheets.


Production of the ID document begins at the Imaging System 505, where card substrates, such as preprinted TESLIN sheets 516, are fed into the back printer 508. The back sides of the TESLIN sheets 516 can be customized with desired information (e.g., restriction codes or other information unique to each document on the sheet). In addition, bar codes for tracking the documents through the production process can be added. As the TESLIN sheet enters the second section of the Imaging System 505, the front printer 510 prints appropriate portrait and signature images on the front of the documents based on personalized cardholder information stored in a file. The front printer 510 also prints the interlaced images (which, in one embodiment, comes from an interlaced image file accessible to the laminator/die cutter/embosser controller 553) on the front of the TESLIN sheets 516. Note that since a plurality of ID documents are being produced simultaneously, the front printer 510 can print an interlaced image file for each document onto the appropriate locations of the TESLIN sheets 516. The output of the front printer 510 are document sheets 550 printed on the front and back.


As completed sheets accumulate in the output hopper of the Imaging System 505, in one embodiment, an operator performs a visual inspection and transfers the completed sheets to the input hopper of the Laminating/Embossing/Die-Cutting System 504. Any sheets failing visual inspection can be brought to the QC station 536 where their bar code is scanned and production of a replacement automatically ordered. The failed sheets are then destroyed.


When the document sheets 550 are about to enter the Laminating/Embossing/Die-Cutting System 504, automatic scanners confirm that the front and back sheets 550 match, that sheets 550 have not stuck together, and that the sheets 550 are right side up. After the scanning process, the laminator 522 applies the desired laminate material (e.g., polyester) on both sides (front and back) material to all sheets to form a continuous web of laminated sheets. The embosser 524 then embosses the laminate to form the lenticules 116 (FIG. 3). In at least one embodiment, registration marks printed on one or both sides of the sheets 550 help to precisely orient the embosser 524 so that the lenticular lens feature is correctly formed on the interlaced images 120 printed on the sheets 550. More details about the embosser 524 are provided below.


The web of laminated sheets leaves the embosser then passes into the die cutter 558, which cuts the sheet into individual documents. After the ID documents are produced and given a final quality control inspection, they are fed into the mailer 530. The mailer prints the applicant's address on the card holder and inserts the ID document into the holder. The holder is then inserted into an envelope for mailing



FIG. 12 is a detailed view of the section 526 of the embosser 524 of FIG. 11. This detailed view shows that an embosser in accordance with one embodiment of the invention includes a plurality of lenticular dies 554, an insulator plate 544, and a heater bar 542 in the insulator plate. The heater bar 542 in the insulator plate helps to keep the die 554 laminate at a temperature suitable for the deformation necessary to produce lenticules during embossing.


Although not visible in FIG. 12, the embosser 524 is capable of up and down motion 548 to accomplish the embossing process (the techniques for doing this are not described here and assumed to be within the abilities of one skilled in the art). Various parameters, such as time, temperature, pressure, stroke of the press and die design, can be adapted to optimize the operation of embosser 524 for a given ID document, laminate, and lenticule size. For example, in one embodiment, when using polycarbonate materials, the embosser 524 uses a temperature of 425 degrees Fahrenheit for 5 seconds at a pressure of 20 PSIG (lb/in2 on the gauge) is used. When using a PET material a temperature of 275 degrees Fahrenheit for 5 seconds and a pressure of 20 PSIG is used. The stroke of the press is set so that the die 554 only enters the surface of the laminate so as to emboss the lenticules. If the stroke is too large then the card deformation will be excessive. Stroke time and temperature are interrelated because of a minimum amount of heat is required to form the lenses 116. The higher the die 218 temperature the lower the time required to form the lens and vice versa. Pressure and stroke of the press 216 are adjusted to minimize card deformation. Deformation can occur throughout the ID card 100 thickness and show on the back of the card or at the edges of the card. By optimizing these adjustments, these effects are reduced to make an acceptable ID card 100.


The plurality of lenticular dies 554 enable the embossing of a corresponding plurality of ID documents that pass through in the ID document orientation direction 552. Specifically, each lenticular die 554 is capable of creating a plurality of lenticules on the laminate that covers each interlaced image printed on respective ID document. In the embodiment shown in FIG. 12, there are 7 lenticular dies 554 that can substantially simultaneously emboss 7 different ID documents that are part of the printed sheets 550. It will be appreciated, however, that the laminator 524 of FIGS. 11 and 12 also could be adapted to emboss a single ID document at a time (e.g., with no subsequent die cutting), or to emboss documents passed through in a form other than sheets to be die cut, such as a 1 by n web (where n is the number of ID documents) passing through the embosser 524.



FIGS. 13A-D are illustrative top, cross-sectional, enlarged, and isometric views, respectively of the lenticular die 554 of the embosser of FIG. 11. The lenticular die 554 can be formed from many different materials, including metals, ceramics, composites, and the like.


The quality of the surface of die 554 can have a significant impact on the quality and “on off” effect of the lenticules that it forms. For instance, if a rough surface is generated from the manufacturing process of the embossing die 554, the rough surface could be transferred to the lenticular lens 116 and the functionality could suffer, accordingly. Note also that various machining processes can be used do create different depths of the sinusoidal patterns of the die 554 shown in FIG. 13(c). In one embodiment, an electrical discharge machining (EDM) processes are used make the die 218 having a surface roughness of #16 or better.


In one embodiment, the resultant lenticules formed by the die 554 can be improved by electroplating the die 554 with various materials such as TEFLON, Polyond, Ni-plating, Cu plating or Cr-plating. As those skilled in the art will appreciate, the plating depends on the die material and the compatibility of the plating material.


In one embodiment the die 554 can be plated then coated over the plating with a polytetrafluoroethylene coating to reduce, the adhesion of the die 554 to the laminate. Referring to FIGS. 3 and 13, the upper light-transmissive outer layers 102 material might require some mold release agents to prevent the die 218 from sticking to the ID card 100 after the embossing process. When the die 554, begins to ascend from the ID card 100 surface, the die 554 can adhere to the ID card 100, the ID card 100 and lens 116 will deform and produce a poor product. The level of mold release is a factor in formulating a material that would optimize this process. Exterior mold release agents can be used in conjunction with internal mold releases to improve the process. The type of exterior mold release will also have an effect.


For purposes of further illustration, FIGS. 14A-D are cross-sectional, perspective, side, and edge views, respectively, of the insulator plate of the embosser of FIG. 11, and FIGS. 15A-D are top, cross-sectional, edge, and perspective views, respectively, of the heater bar of the insulator plate of FIGS. 14A-D and FIG. 11. The insulator plate and heater bar can be formed of any suitable materials, including mild steel (CRS), glastherm, and high temperature insulating material.



FIG. 16 is a flow chart of a first method for manufacturing the ID document of FIG. 3 using the system of FIG. 11, in accordance with one embodiment of the invention. The detailed description of these method steps already has been done in connection with the description accompanying FIGS. 3, 10, 11, 12, and 13, and is not repeated here.


The above described embodiments were provided to illustrate one aspect of the invention, in which a multiple imaged ID document having a lenticular lens feature can be manufactured by laminating the ID document then embossing a lenticular lens into the laminate. It should be understood, however, that the invention is not limited solely to forming a lenticular lens after lamination in the above-described manner. Those skilled in the art will appreciate that lenticules can be formed after lamination in many different ways. For example, in at least some embodiments of the invention the lenticules 116 of the identification documents described herein can be created by physically removing some of the laminate to achieve the desired shape, such as by etching, engraving, milling, scratching, stamping, abrading, bending, filing, cutting, inscribing, and the like. The removal of the laminate can be done using any known tooling, through chemical processes (e.g., chemical etching) or by a laser. It also is contemplated that in at least some embodiments of the invention, a mold could be used to form the laminate into lenticules as the laminate is applied to the information bearing layer 106.


It is unclear at the time of filing whether roll laminates containing an extrusion formed lens or laminate with previously formed lenses and respective registration marks for later lamination processes to form ID documents are available. However, the invention proposes a method to make such a roll laminate, below.


In another aspect of the invention, the formation of lenticules 116 on the laminate 102 occurs prior to the laminating of the laminate to the information bearing layer 106. For example, embossing of the laminate 102 with lenticules can occur prior to lamination. In one embodiment, a multiple imaged ID document can be formed by using sheets of laminate having lenticular lenses already formed thereon. A separate process step can be used to form the lenticular lenses on the laminate. This embodiment of the invention can be achieved using a system similar to the system shown in FIG. 11. Instead of providing an embosser 524, however, a system of this aspect provides a roll of laminate material that includes lenticular lenses formed thereon. Advantageously, the laminate having lenticular lenses formed thereon also includes registration marks within the laminate, to assist in accurately registering the lenticular lens to the interlaced image as the laminate is laminated to the image.


For example, FIG. 17 is a flow chart of a method for manufacturing the ID document of FIG. 3 in a central issue environment where the creation of lenticules on the laminate 103 occurs prior to lamination, FIG. 18 is an illustrative diagram of a second central issue card production system 500′ that can be used to produce the ID document of FIG. 3 in accordance with the method of FIG. 17, and FIG. 19 is an illustration of a portion of a laminate roll 800 showing laminate having lenticular lenses 116 formed thereon.


Referring to FIG. 17, laminate is provided (step 700). The laminate can be any laminate described previously that also is capable of being formed into lenticules. As will be readily understood by those in the art, the laminate can be provided in any usable form, such as pellet, powder, hot melt, and the like. The laminate is extruded (step 703) in a manner known to those skilled in the art, and then the laminate is processed so that predetermined areas of the laminate have lenticular lens features (such as the lenticules 116 of FIGS. 3 and 4) formed thereon. In one embodiment, the processing of the laminate comprises using one or more known processes to form or emboss the lenticular shapes into predetermined areas of the laminate, prior to the laminate being laminated to the card. Such processes can, for example include embossing rollers, vacuum drums, vacuum forming dies, in line corrugators and shapers, cutters, punches, etc., all of which are described, e.g., on pages 354-360 of Sidney Levy and James F. Carley, Plastics Extrusion Technology Handbook (2nd ed., New York, 1989). Further, one or more methods detailed in the following U.S. patents also may be useable, in at least some embodiments of the invention, for forming the lenticules in the laminate: U.S. Pat. Nos. 2,815,310, 3,496,263, 4,765,656, 5,560,799. The contents of these patents are incorporated by reference in their entirety. It also will be appreciated by those skilled in the art that prior to lamination to the card, certain laminates can have lenticules formed thereon by etching, engraving, milling, scratching, stamping, abrading, bending, filing, cutting, inscribing, and the like.


Referring again to FIG. 17, after the lens(es) are formed in the laminate, registration information is applied to the laminate (710), to ensure that the laminate is appropriately aligned to the information bearing document(s) to which it is attached. FIG. 19 is an illustration of a portion of a sheet of laminate roll 800 prior to step 715. In FIG. 19, it can be seen that a plurality of lenticular lenses 116 are formed in a registered fashion on the sheet of laminate 800. The sheet of laminate 800 in this example has been formed with divider lines 800 thereon, to further assist the later registration and lamination to the information bearing layer 106. The dotted lines 810 are provided for illustrative purposes only (these lines are not necessarily on the laminate) to show where the divisions between ID documents lie. A registration mark 812 is provided on one side of the laminate 800 also will assist when the laminate 800 is later coupled to the information bearing layer 106.


In at least one embodiment, the sheet of laminate 800 is part of a larger sheet of laminate that is eventually rolled (step 715) so that it can be used as the special laminate 559 of FIG. 18. Referring to FIGS. 17 and 18, when the documents 550 are fed to the laminator 522, the laminate is aligned so that each respective lenticular lens 116 is appropriately aligned to a corresponding multiple image feature on the information bearing layer 106. (step 720). The identification documents can then be laminated (step 725) and die cut (step 730) as described previously.


It should be understood that the lenticular multiple image information of at least some embodiments of the invention can be provided in any color, not only black. This is accomplished at least in part because the interlaced image is printed directly on the card and is produced using the original images. If the original images are in color then the interlaced image can have the same color replicated therein.


Having described and illustrated the principles of the technology with reference to specific implementations, it will be recognized that the technology can be implemented in many other, different, forms.


Although certain words, languages, phrases, terminology, and product brands have been used herein to describe the various features of the embodiments of the invention, their use is not intended as limiting. Use of a given word, phrase, language, terminology, or product brand is intended to include all grammatical, literal, scientific, technical, and functional equivalents. The terminology used herein is for the purpose of description and not limitation.


The technology disclosed herein can be used in combination with other technologies. Examples include the technology detailed in the following applications, the disclosures of which are incorporated herein by reference: Ser. No. 09/747,735 (filed Dec. 22, 2000), Ser. No. 09/969,200 (filed Oct. 2, 2001). Also, instead of ID documents, the inventive techniques can be employed with product tags, product packaging, business cards, bags, charts, maps, labels, etc., etc., particularly those items including engraving of an over-laminate structure. The term ID document is broadly defined herein to include these tags, labels, packaging, cards, etc. In addition, while some of the examples above are disclosed with specific core components, it is noted that-laminates can be sensitized for use with other core components.


To provide a comprehensive disclosure without unduly lengthening the specification, applicant hereby incorporates by reference each of the patents and patent applications referenced above.


The particular combinations of elements and features in the above-detailed embodiments are exemplary only; the interchanging and substitution of these teachings with other teachings in this and the incorporated-by-reference patents/applications are also expressly contemplated. As those skilled in the art will recognize, variations, modifications, and other implementations of what is described herein can occur to those of ordinary skill in the art without departing from the spirit and the scope of the invention as claimed. Accordingly, the foregoing description is by way of example only and is not intended as limiting. The invention's scope is defined in the following claims and the equivalents thereto.

Claims
  • 1. A computerized method of preparing and printing an identification document, the method being performed by execution of computer readable program code by a controller of a computer system, the method comprising the steps of: the computer system providing image information to a printer, the information relating to the printing to be applied to the identification document, the image information being arranged to include at least a first and a second interleaved different images;wherein the at least first and second interleaved images are formed by:(a) dividing each of the at least first and second images into a selected number of rows of image portions;(b) creating an interface file for receiving the interleaved images;(c) selecting a first image row to be interleaved from the first of the at least first and second images;(d) writing the first image row from the first image to the interfaced file;(e) writing a second image row from the second image to the interfaced file adjacent to the image row from the first image;(f) repeating steps (d) and (e) until all the selected number of rows from the at least first and the second image portions have been interleaved in the interfaced file;printing the at least first and second interleaved different images onto an image layer of an identification document substrate;applying a laminate over the image layer;using pressure to emboss a lens profile into the laminate; and,wherein, the document formed of the at least two interleaved different images in the image layer and the lens profile enables display of each one of the at least the first and second different interleaved images when the document is viewed at different predetermined angles, the lens profile including lens elements that direct light to the at least different first and second images at different corresponding viewing angles causing the at least first and second different images to appear and disappear with changing viewing angles.
  • 2. The method of claim 1 wherein the image information represents variable information associated with a bearer of the document.
  • 3. The method of claim 1 wherein ink or dye of different colors is used to form colored image information.
  • 4. The method of claim 1 wherein at least one of the two different images comprises an image of the bearer.
  • 5. The method of claim 1 wherein the lens elements are formed as lenticules.
  • 6. The method of claim 5 wherein the lenticules are aligned with the rows of interleaved images on the image layer.
  • 7. The method of claim 1 wherein laser engraving forms the image information.
RELATED APPLICATION DATA

This application is a continuation of U.S. patent application Ser. No. 10/991,354, filed Nov. 16, 2004, now U.S. Pat. No. 7,744,001 which is a continuation of U.S. patent application Ser. No. 10/325,434, filed Dec. 18, 2002, now U.S. Pat. No. 6,817,530 which claims priority to Application Nos. 60/344,718, filed Dec. 24, 2001, 60/344,683, filed Dec. 24, 2001, and 60/341,569, filed Dec. 18, 2001, which are incorporated herein by reference in their entirety. The present application is related to U.S. patent application Ser. No. 09/747,735, filed Dec. 22, 2000, Ser. No. 09/602,313, filed Jun. 23, 2000, and Ser. No. 10/094,593, filed Mar. 6, 2002, U.S. Provisional Patent Application No. 60/358,321, filed Feb. 19, 2002, as well as U.S. Pat. No. 6,066,594. Each of the above U.S. Patent documents is herein incorporated by reference.

US Referenced Citations (768)
Number Name Date Kind
60442 Tufts Dec 1866 A
1094593 Reed Apr 1914 A
1472581 Britt Oct 1923 A
2815310 Anderson Dec 1957 A
3225457 Schure Dec 1965 A
3413171 Hannon Nov 1968 A
3496262 Long et al. Feb 1970 A
3496263 Nakayama et al. Feb 1970 A
3569619 Simjian Mar 1971 A
3571957 Cumming et al. Mar 1971 A
3582439 Thomas Jun 1971 A
3601913 Pollock Aug 1971 A
3614839 Thomas Oct 1971 A
3647275 Ward Mar 1972 A
3665162 Yamamoto et al. May 1972 A
3703628 Philipson, Jr. Nov 1972 A
3758970 Annenberg Sep 1973 A
3802101 Scantlin Apr 1974 A
3805238 Rothfjell Apr 1974 A
3838444 Loughlin et al. Sep 1974 A
3845391 Crosby Oct 1974 A
3914877 Hines Oct 1975 A
3922074 Ikegami et al. Nov 1975 A
3936613 Nishigori et al. Feb 1976 A
3953869 Wah Lo et al. Apr 1976 A
3956595 Sobanski May 1976 A
3961956 Fukuda et al. Jun 1976 A
3984624 Waggener Oct 1976 A
4009337 Sakai et al. Feb 1977 A
4022983 Braun et al. May 1977 A
4069487 Kasai et al. Jan 1978 A
4096015 Kawamata et al. Jun 1978 A
4119361 Greenaway Oct 1978 A
4213038 Silverman et al. Jul 1980 A
4225967 Miwa et al. Sep 1980 A
4230990 Lert, Jr. et al. Oct 1980 A
4231113 Blasbalg Oct 1980 A
4238849 Gassmann Dec 1980 A
4252995 Schmidt et al. Feb 1981 A
4304809 Moraw et al. Dec 1981 A
4313197 Maxemchuk Jan 1982 A
4313984 Moraw et al. Feb 1982 A
4324421 Moraw et al. Apr 1982 A
4356052 Moraw et al. Oct 1982 A
4359633 Bianco Nov 1982 A
4367488 Leventer et al. Jan 1983 A
4379947 Warner Apr 1983 A
4380027 Leventer et al. Apr 1983 A
4395600 Lundy et al. Jul 1983 A
4417784 Knop et al. Nov 1983 A
4423415 Goldman Dec 1983 A
4425642 Moses et al. Jan 1984 A
4450024 Haghiri-Tehrani et al. May 1984 A
4476468 Goldman Oct 1984 A
4485470 Reali Nov 1984 A
4504084 Jauch Mar 1985 A
4506148 Berthold et al. Mar 1985 A
4528588 Lofberg Jul 1985 A
4532508 Ruell Jul 1985 A
4536013 Haghiri-Therani et al. Aug 1985 A
4547804 Greenberg Oct 1985 A
4553261 Froessl Nov 1985 A
4568824 Gareis et al. Feb 1986 A
4579754 Maurer et al. Apr 1986 A
4590366 Rothfjell May 1986 A
4595950 Lofberg Jun 1986 A
4617216 Haghiri-Tehrani et al. Oct 1986 A
4621271 Brownstein Nov 1986 A
4637051 Clark Jan 1987 A
4652722 Stone et al. Mar 1987 A
4653775 Raphael et al. Mar 1987 A
4653862 Morozumi Mar 1987 A
4654867 Labedz et al. Mar 1987 A
4660221 Dlugos Apr 1987 A
4663518 Borror et al. May 1987 A
4665431 Cooper May 1987 A
4672605 Hustig et al. Jun 1987 A
4675746 Tetrick et al. Jun 1987 A
4677435 D'Agraives et al. Jun 1987 A
4679154 Blanford Jul 1987 A
4682794 Margolin Jul 1987 A
4689477 Goldman Aug 1987 A
4703476 Howard Oct 1987 A
4711690 Haghiri-Tehrani Dec 1987 A
4712103 Gotanda Dec 1987 A
4718106 Weinblatt Jan 1988 A
4725462 Kimura Feb 1988 A
4736405 Akiyama Apr 1988 A
4738949 Sethi et al. Apr 1988 A
4739377 Allen Apr 1988 A
4750173 Bluthgen Jun 1988 A
4765656 Becker et al. Aug 1988 A
4766026 Lass et al. Aug 1988 A
4775901 Nakano Oct 1988 A
4776013 Kafri et al. Oct 1988 A
4790566 Boissier et al. Dec 1988 A
4790703 Wing Dec 1988 A
4804949 Faulkerson Feb 1989 A
4805020 Greenberg Feb 1989 A
4807031 Broughton et al. Feb 1989 A
4809321 Morganstein et al. Feb 1989 A
4811357 Betts et al. Mar 1989 A
4811408 Goldman Mar 1989 A
4820912 Samyn Apr 1989 A
4835517 van der Gracht et al. May 1989 A
4855827 Best Aug 1989 A
4864618 Wright et al. Sep 1989 A
4866771 Bain Sep 1989 A
4869946 Clay Sep 1989 A
4876617 Best et al. Oct 1989 A
4879747 Leighton et al. Nov 1989 A
4884139 Pommier Nov 1989 A
4888798 Earnest Dec 1989 A
4889749 Ohashi et al. Dec 1989 A
4893336 Wuthnow Jan 1990 A
4894110 Lass et al. Jan 1990 A
4903301 Kondo et al. Feb 1990 A
4908836 Rushforth et al. Mar 1990 A
4908873 Philibert et al. Mar 1990 A
4921278 Shiang et al. May 1990 A
4935335 Fotland Jun 1990 A
4939515 Adelson Jul 1990 A
4941150 Iwasaki Jul 1990 A
4943973 Werner Jul 1990 A
4943976 Ishigaki Jul 1990 A
4944036 Hyatt Jul 1990 A
4947028 Gorog Aug 1990 A
4963998 Maufe Oct 1990 A
4965827 McDonald Oct 1990 A
4967273 Greenberg Oct 1990 A
4968063 McConville et al. Nov 1990 A
4969041 O'Grady et al. Nov 1990 A
4972471 Gross et al. Nov 1990 A
4972476 Nathans Nov 1990 A
4977594 Shear Dec 1990 A
4979210 Nagata et al. Dec 1990 A
4990759 Gloton et al. Feb 1991 A
4993068 Piosenka et al. Feb 1991 A
4994831 Marandi Feb 1991 A
4994926 Gordon et al. Feb 1991 A
4996530 Hilton Feb 1991 A
5010405 Schreiber et al. Apr 1991 A
5013900 Hoppe May 1991 A
5023907 Johnson et al. Jun 1991 A
5024989 Chiang et al. Jun 1991 A
5027401 Soltesz Jun 1991 A
5036513 Greenblatt Jul 1991 A
5040208 Jolissaint Aug 1991 A
5046087 Sakai Sep 1991 A
5051835 Bruehl et al. Sep 1991 A
5053608 Senanayake Oct 1991 A
5053956 Donald et al. Oct 1991 A
5060981 Fossum et al. Oct 1991 A
5063446 Gibson Nov 1991 A
5073899 Collier et al. Dec 1991 A
5079648 Maufe Jan 1992 A
5086469 Gupta et al. Feb 1992 A
5093147 Andrus et al. Mar 1992 A
5095196 Miyata Mar 1992 A
5103459 Gilhousen et al. Apr 1992 A
5113445 Wang May 1992 A
5113518 Durst, Jr. et al. May 1992 A
5128779 Mallik Jul 1992 A
5138712 Corbin Aug 1992 A
5146457 Veldhuis et al. Sep 1992 A
5148498 Resnikoff et al. Sep 1992 A
5150409 Elsner Sep 1992 A
5161210 Druyvesteyn et al. Nov 1992 A
5166676 Milheiser Nov 1992 A
5169707 Faykish et al. Dec 1992 A
5171625 Newton Dec 1992 A
5173840 Kodai et al. Dec 1992 A
5181786 Hujink Jan 1993 A
5185736 Tyrrell et al. Feb 1993 A
5199081 Saito et al. Mar 1993 A
5200822 Bronfin et al. Apr 1993 A
5208450 Uenishi et al. May 1993 A
5212551 Conanan May 1993 A
5213337 Sherman May 1993 A
5216543 Calhoun Jun 1993 A
5228056 Schilling Jul 1993 A
5237164 Takada Aug 1993 A
5239108 Yokoyama et al. Aug 1993 A
5243423 DeJean et al. Sep 1993 A
5245329 Gokcebay Sep 1993 A
5253078 Balkanski et al. Oct 1993 A
5258998 Koide Nov 1993 A
5259025 Monroe et al. Nov 1993 A
5260582 Danek et al. Nov 1993 A
5261987 Luening et al. Nov 1993 A
5262860 Fitzpatrick et al. Nov 1993 A
5267334 Normille et al. Nov 1993 A
5267755 Yamauchi et al. Dec 1993 A
5276478 Morton Jan 1994 A
5280537 Sugiyama et al. Jan 1994 A
5284364 Jain Feb 1994 A
5288976 Citron et al. Feb 1994 A
5291243 Heckman et al. Mar 1994 A
5291302 Gordon et al. Mar 1994 A
5293399 Hefti Mar 1994 A
5294774 Stone Mar 1994 A
5295203 Krause et al. Mar 1994 A
5298922 Merkle et al. Mar 1994 A
5299019 Pack et al. Mar 1994 A
5301981 Nesis Apr 1994 A
5304513 Haghiri-Tehrani et al. Apr 1994 A
5305400 Butera Apr 1994 A
5315098 Tow May 1994 A
5319453 Copriviza et al. Jun 1994 A
5319724 Blonstein et al. Jun 1994 A
5319735 Preuss et al. Jun 1994 A
5321751 Ray et al. Jun 1994 A
5325167 Melen Jun 1994 A
5334573 Schild Aug 1994 A
5336657 Egashira et al. Aug 1994 A
5336871 Colgate, Jr. Aug 1994 A
5337361 Wang et al. Aug 1994 A
5351302 Leighton et al. Sep 1994 A
5363212 Taniuchi et al. Nov 1994 A
5374976 Spannenburg Dec 1994 A
5379345 Greenberg Jan 1995 A
5380695 Chiang et al. Jan 1995 A
5384846 Berson et al. Jan 1995 A
5385371 Izawa Jan 1995 A
5387013 Yamauchi et al. Feb 1995 A
5393099 D'Amato Feb 1995 A
5394274 Kahn Feb 1995 A
5396559 McGrew Mar 1995 A
5404377 Moses Apr 1995 A
5404537 Olnowich et al. Apr 1995 A
5408542 Callahan Apr 1995 A
5422963 Chen et al. Jun 1995 A
5422995 Aoki et al. Jun 1995 A
5428607 Hiller et al. Jun 1995 A
5428731 Powers, III Jun 1995 A
5432329 Colgate, Jr. et al. Jul 1995 A
5432870 Schwartz Jul 1995 A
5434908 Klein Jul 1995 A
5436970 Ray et al. Jul 1995 A
5446273 Leslie Aug 1995 A
5448050 Kostizak Sep 1995 A
5448053 Rhoads Sep 1995 A
5449200 Andric et al. Sep 1995 A
5450490 Jensen et al. Sep 1995 A
5454598 Wicker Oct 1995 A
5458713 Ojster Oct 1995 A
5459584 Gordon et al. Oct 1995 A
5463209 Figh et al. Oct 1995 A
5463212 Oshima et al. Oct 1995 A
5467169 Morikawa Nov 1995 A
5467388 Redd, Jr. et al. Nov 1995 A
5469506 Berson et al. Nov 1995 A
5471533 Wang et al. Nov 1995 A
5473631 Moses Dec 1995 A
5479168 Johnson et al. Dec 1995 A
5479188 Moriyama Dec 1995 A
5481377 Udagawa et al. Jan 1996 A
5488664 Shamir Jan 1996 A
5490217 Wang et al. Feb 1996 A
5493677 Balogh et al. Feb 1996 A
5495411 Ananda Feb 1996 A
5495581 Tsai Feb 1996 A
5496071 Walsh Mar 1996 A
5499294 Friedman Mar 1996 A
5502576 Ramsay et al. Mar 1996 A
5505494 Belluci et al. Apr 1996 A
5506697 Li et al. Apr 1996 A
5515081 Vasilik May 1996 A
5515451 Tsuji et al. May 1996 A
5524933 Kunt et al. Jun 1996 A
5526524 Madduri Jun 1996 A
5528222 Moskowitz et al. Jun 1996 A
5530751 Morris Jun 1996 A
5530759 Braudaway et al. Jun 1996 A
5530852 Meske, Jr. et al. Jun 1996 A
5533102 Robinson et al. Jul 1996 A
5534372 Koshizuka et al. Jul 1996 A
5548645 Ananda Aug 1996 A
5550346 Andriash et al. Aug 1996 A
5553143 Ross et al. Sep 1996 A
5557412 Saito et al. Sep 1996 A
5560799 Jacobsen Oct 1996 A
5568555 Shamir Oct 1996 A
5574804 Olschafskie et al. Nov 1996 A
5577111 Iida et al. Nov 1996 A
5579479 Plum Nov 1996 A
5579694 Mailloux Dec 1996 A
5583918 Nakagawa Dec 1996 A
5594226 Steger Jan 1997 A
5594809 Kopec et al. Jan 1997 A
5602377 Beller et al. Feb 1997 A
5612943 Moses et al. Mar 1997 A
5613004 Cooperman et al. Mar 1997 A
5617119 Briggs et al. Apr 1997 A
5619557 Van Berkum Apr 1997 A
5621810 Suzuki et al. Apr 1997 A
5629980 Stefik et al. May 1997 A
5633119 Burberry et al. May 1997 A
5633489 Dvorkis et al. May 1997 A
5634012 Stefik et al. May 1997 A
5635012 Belluci et al. Jun 1997 A
5635697 Shellhammer et al. Jun 1997 A
5636276 Brugger Jun 1997 A
5636292 Rhoads Jun 1997 A
5636874 Singer Jun 1997 A
5638443 Stefik et al. Jun 1997 A
5640193 Wellner Jun 1997 A
5640647 Hube Jun 1997 A
5640677 Karlsson Jun 1997 A
5646697 Kurashige Jul 1997 A
5646997 Barton Jul 1997 A
5646999 Saito Jul 1997 A
5651054 Dunn et al. Jul 1997 A
5652626 Kawakami et al. Jul 1997 A
5652714 Peterson et al. Jul 1997 A
5657462 Brouwer et al. Aug 1997 A
5659164 Schmid et al. Aug 1997 A
5659626 Ort et al. Aug 1997 A
5659628 Tachikawa et al. Aug 1997 A
5659726 Sandford, II et al. Aug 1997 A
5661574 Kawana Aug 1997 A
5663766 Sizer, II Sep 1997 A
5664018 Leighton Sep 1997 A
5665951 Newman et al. Sep 1997 A
5668636 Beach et al. Sep 1997 A
5671277 Ikenoue et al. Sep 1997 A
5671282 Wolff et al. Sep 1997 A
5673316 Auerbach et al. Sep 1997 A
5680223 Cooper et al. Oct 1997 A
5681356 Barak et al. Oct 1997 A
5684885 Cass et al. Nov 1997 A
5687236 Moskowitz et al. Nov 1997 A
5689620 Kopec et al. Nov 1997 A
5689623 Pinard Nov 1997 A
5694471 Chen et al. Dec 1997 A
5696594 Saito et al. Dec 1997 A
5697006 Taguchi et al. Dec 1997 A
5700037 Keller Dec 1997 A
5706364 Kopec et al. Jan 1998 A
5710834 Rhoads Jan 1998 A
5712731 Drinkwater et al. Jan 1998 A
5715403 Stefik Feb 1998 A
5717940 Peairs Feb 1998 A
5721781 Deo et al. Feb 1998 A
5721788 Powell et al. Feb 1998 A
5726685 Kuth et al. Mar 1998 A
5734119 France et al. Mar 1998 A
5734752 Knox Mar 1998 A
5738024 Winegar Apr 1998 A
5742685 Berson et al. Apr 1998 A
5742845 Wagner Apr 1998 A
5745569 Moskowitz et al. Apr 1998 A
5745604 Rhoads Apr 1998 A
5748763 Rhoads May 1998 A
5748783 Rhoads May 1998 A
5751795 Hassler et al. May 1998 A
5754675 Valadier May 1998 A
5760386 Ward Jun 1998 A
5761686 Bloomberg Jun 1998 A
5763868 Kubota et al. Jun 1998 A
5765152 Erickson Jun 1998 A
5765176 Bloomberg Jun 1998 A
5767496 Swartz et al. Jun 1998 A
5768426 Rhoads Jun 1998 A
5774067 Olnowich et al. Jun 1998 A
5774452 Wolosewicz Jun 1998 A
5776278 Tuttle et al. Jul 1998 A
5778102 Sandford, II et al. Jul 1998 A
5783024 Forkert Jul 1998 A
5786587 Colgate, Jr. Jul 1998 A
5787186 Schroeder Jul 1998 A
5788285 Wicker Aug 1998 A
5790662 Valerij et al. Aug 1998 A
5790693 Graves et al. Aug 1998 A
5790703 Wang Aug 1998 A
5799092 Kristol et al. Aug 1998 A
5801687 Peterson et al. Sep 1998 A
5804803 Cragun et al. Sep 1998 A
5805587 Norris et al. Sep 1998 A
5808758 Solmsdorf Sep 1998 A
5809128 McMullin Sep 1998 A
5809139 Girod et al. Sep 1998 A
5809317 Kogan et al. Sep 1998 A
5809633 Mundigl et al. Sep 1998 A
5812551 Tsukazoe et al. Sep 1998 A
5818441 Throckmorton et al. Oct 1998 A
5822432 Moskowitz et al. Oct 1998 A
5822436 Rhoads Oct 1998 A
5824715 Hayashihara et al. Oct 1998 A
5825867 Epler et al. Oct 1998 A
5825892 Braudaway et al. Oct 1998 A
5828325 Wolosewicz et al. Oct 1998 A
5832119 Rhoads Nov 1998 A
5832186 Kawana Nov 1998 A
5838458 Tsai Nov 1998 A
5841886 Rhoads Nov 1998 A
5841978 Rhoads Nov 1998 A
5845281 Benson et al. Dec 1998 A
5848413 Wolff Dec 1998 A
5848424 Scheinkman et al. Dec 1998 A
5852673 Young Dec 1998 A
5856661 Finkelstein et al. Jan 1999 A
5857038 Owada et al. Jan 1999 A
5859935 Johnson et al. Jan 1999 A
5861662 Candelore Jan 1999 A
5862218 Steinberg Jan 1999 A
5862260 Rhoads Jan 1999 A
5864622 Marcus Jan 1999 A
5864623 Messina et al. Jan 1999 A
5869819 Knowles et al. Feb 1999 A
5871615 Harris Feb 1999 A
5872589 Morales Feb 1999 A
5875249 Mintzer et al. Feb 1999 A
5879502 Gustafson Mar 1999 A
5888624 Haghiri et al. Mar 1999 A
5892661 Stafford et al. Apr 1999 A
5892900 Ginter et al. Apr 1999 A
5893101 Balogh et al. Apr 1999 A
5893908 Cullen et al. Apr 1999 A
5893910 Martineau et al. Apr 1999 A
5900608 Iida May 1999 A
5901224 Hecht May 1999 A
5902353 Reber et al. May 1999 A
5903340 Lawandy et al. May 1999 A
5903729 Reber et al. May 1999 A
5905248 Russell et al. May 1999 A
5905251 Knowles May 1999 A
5905800 Moskowitz et al. May 1999 A
5905819 Daly May 1999 A
5907141 Deaville et al. May 1999 A
5907149 Marckini May 1999 A
5909209 Dickinson Jun 1999 A
5912767 Lee Jun 1999 A
5912974 Holloway et al. Jun 1999 A
5913210 Call Jun 1999 A
5915027 Cox et al. Jun 1999 A
5918213 Bernard et al. Jun 1999 A
5918214 Perkowski Jun 1999 A
5919730 Gasper et al. Jul 1999 A
5920861 Hall et al. Jul 1999 A
5920878 DeMont Jul 1999 A
5926822 Garman Jul 1999 A
5930369 Cox et al. Jul 1999 A
5930377 Powell et al. Jul 1999 A
5930767 Reber et al. Jul 1999 A
5932863 Rathus et al. Aug 1999 A
5933798 Linnartz Aug 1999 A
5933829 Durst et al. Aug 1999 A
5938726 Reber et al. Aug 1999 A
5938727 Ikeda Aug 1999 A
5939695 Nelson Aug 1999 A
5939699 Perttunen et al. Aug 1999 A
5940595 Reber et al. Aug 1999 A
5943422 Van Wie et al. Aug 1999 A
5946414 Cass et al. Aug 1999 A
5949055 Fleet et al. Sep 1999 A
5950173 Perkowski Sep 1999 A
5951055 Mowry, Jr. Sep 1999 A
5953710 Fleming Sep 1999 A
5955021 Tiffany, III Sep 1999 A
5955961 Wallerstein Sep 1999 A
5960081 Vynne et al. Sep 1999 A
5960103 Graves et al. Sep 1999 A
5962073 Timmer Oct 1999 A
5962834 Markman Oct 1999 A
5962840 Haghiri-Tehrani et al. Oct 1999 A
5963916 Kaplan Oct 1999 A
5969324 Reber et al. Oct 1999 A
5971277 Cragun et al. Oct 1999 A
5974141 Saito Oct 1999 A
5974548 Adams Oct 1999 A
5978013 Jones et al. Nov 1999 A
5978477 Hull et al. Nov 1999 A
5978773 Hudetz et al. Nov 1999 A
5979757 Tracy et al. Nov 1999 A
5979941 Mosher, Jr. et al. Nov 1999 A
5983218 Syeda-Mahmood Nov 1999 A
5984366 Priddy Nov 1999 A
5986651 Reber et al. Nov 1999 A
5991876 Johnson et al. Nov 1999 A
5994710 Knee et al. Nov 1999 A
5995978 Cullen et al. Nov 1999 A
6000607 Ohki et al. Dec 1999 A
6003581 Aihara Dec 1999 A
6006226 Cullen et al. Dec 1999 A
6012641 Watada Jan 2000 A
6016225 Anderson Jan 2000 A
6022905 Harris et al. Feb 2000 A
6024287 Takai et al. Feb 2000 A
6036094 Goldman et al. Mar 2000 A
6036099 Leighton Mar 2000 A
6045656 Foster et al. Apr 2000 A
6046808 Fateley Apr 2000 A
6047888 Dethloff Apr 2000 A
6049055 Fannash et al. Apr 2000 A
6049463 O'Malley et al. Apr 2000 A
6052486 Knowlton et al. Apr 2000 A
6054021 Kurrle et al. Apr 2000 A
6064764 Bhaskaran et al. May 2000 A
6066594 Gunn et al. May 2000 A
6073854 Bravenec et al. Jun 2000 A
6081793 Challener et al. Jun 2000 A
6085205 Peairs et al. Jul 2000 A
6085976 Sehr Jul 2000 A
6094483 Fridrich et al. Jul 2000 A
6095566 Yamamoto et al. Aug 2000 A
6100804 Brady et al. Aug 2000 A
6101602 Fridrich Aug 2000 A
6104812 Koltai et al. Aug 2000 A
6110864 Lu Aug 2000 A
6111506 Yap et al. Aug 2000 A
6122403 Rhoads Sep 2000 A
6128411 Knox Oct 2000 A
6131161 Linnartz Oct 2000 A
6136752 Paz-Pujalt et al. Oct 2000 A
6138151 Reber et al. Oct 2000 A
6141753 Zhao et al. Oct 2000 A
6146032 Dunham Nov 2000 A
6157330 Bruekers et al. Dec 2000 A
6158658 Barclay Dec 2000 A
6159327 Forkert Dec 2000 A
6160526 Hirai et al. Dec 2000 A
6163842 Barton Dec 2000 A
6164534 Rathus et al. Dec 2000 A
6182090 Peairs Jan 2001 B1
6183018 Braun et al. Feb 2001 B1
6185042 Lomb et al. Feb 2001 B1
6185312 Nakamura et al. Feb 2001 B1
6185316 Buffam Feb 2001 B1
6185683 Ginter et al. Feb 2001 B1
6192138 Yamadaji Feb 2001 B1
6193163 Fehrman et al. Feb 2001 B1
6196460 Shin Mar 2001 B1
6199048 Hudetz et al. Mar 2001 B1
6199073 Peairs et al. Mar 2001 B1
6199144 Arora et al. Mar 2001 B1
6201879 Bender et al. Mar 2001 B1
6202932 Rapeli Mar 2001 B1
6205249 Moskowitz Mar 2001 B1
6219439 Burger Apr 2001 B1
6233347 Chen et al. May 2001 B1
6233684 Stefik et al. May 2001 B1
6234537 Gutmann et al. May 2001 B1
6243480 Zhao et al. Jun 2001 B1
6244514 Otto Jun 2001 B1
6246775 Nakamura et al. Jun 2001 B1
6246777 Agarwal et al. Jun 2001 B1
6247644 Horne et al. Jun 2001 B1
6249226 Harrison et al. Jun 2001 B1
6250554 Leo et al. Jun 2001 B1
6256736 Coppersmith et al. Jul 2001 B1
6257486 Teicher et al. Jul 2001 B1
6272176 Srinivasan Aug 2001 B1
6272248 Saitoh et al. Aug 2001 B1
6272634 Tewfik et al. Aug 2001 B1
6277232 Wang et al. Aug 2001 B1
6281165 Cranford Aug 2001 B1
6283188 Maynard et al. Sep 2001 B1
6285776 Rhoads Sep 2001 B1
6286036 Rhoads Sep 2001 B1
6286761 Wen Sep 2001 B1
6289108 Rhoads Sep 2001 B1
6292092 Chow et al. Sep 2001 B1
6295391 Rudd et al. Sep 2001 B1
6301363 Mowry, Jr. Oct 2001 B1
6302444 Cobben Oct 2001 B1
6304345 Patton et al. Oct 2001 B1
6311214 Rhoads Oct 2001 B1
6314192 Chen et al. Nov 2001 B1
6314457 Schena et al. Nov 2001 B1
6320675 Sakaki et al. Nov 2001 B1
6321981 Ray et al. Nov 2001 B1
6324091 Gryko et al. Nov 2001 B1
6324573 Rhoads Nov 2001 B1
6325420 Zhang et al. Dec 2001 B1
6330976 Dymetman et al. Dec 2001 B1
6332031 Rhoads et al. Dec 2001 B1
6332194 Bloom et al. Dec 2001 B1
6334187 Kadono Dec 2001 B1
6334721 Horigane Jan 2002 B1
6335688 Sweatte Jan 2002 B1
6336117 Massarani Jan 2002 B1
6343138 Rhoads Jan 2002 B1
6351815 Adams Feb 2002 B1
6354630 Zhang et al. Mar 2002 B1
6356363 Cooper et al. Mar 2002 B1
6357664 Zercher Mar 2002 B1
6367013 Bisbee et al. Apr 2002 B1
6373965 Liang Apr 2002 B1
6385330 Powell et al. May 2002 B1
6389151 Carr et al. May 2002 B1
6390362 Martin May 2002 B1
6390375 Kayanakis May 2002 B2
6394358 Thaxton et al. May 2002 B1
6404643 Chung Jun 2002 B1
6404926 Miyahara et al. Jun 2002 B1
6408082 Rhoads et al. Jun 2002 B1
6411725 Rhoads Jun 2002 B1
6418154 Kneip et al. Jul 2002 B1
6421013 Chung Jul 2002 B1
6424029 Giesler Jul 2002 B1
6424249 Houvener Jul 2002 B1
6424725 Rhoads et al. Jul 2002 B1
6430306 Slocum et al. Aug 2002 B2
6430307 Souma et al. Aug 2002 B1
6438251 Yamaguchi Aug 2002 B1
6441380 Lawandy Aug 2002 B1
6442284 Gustafson et al. Aug 2002 B1
6445468 Tsai Sep 2002 B1
6463416 Messina Oct 2002 B1
6466329 Mukai Oct 2002 B1
6478228 Ikefuji et al. Nov 2002 B1
6481753 Van Boom et al. Nov 2002 B2
6482495 Kohama et al. Nov 2002 B1
6485319 Bricaud et al. Nov 2002 B2
6487301 Zhao Nov 2002 B1
6505160 Levy et al. Jan 2003 B1
6513717 Hannigan Feb 2003 B2
6522770 Seder et al. Feb 2003 B1
6536665 Ray et al. Mar 2003 B1
6542933 Durst, Jr. et al. Apr 2003 B1
6546112 Rhoads Apr 2003 B1
6553494 Glass Apr 2003 B1
6577746 Evans et al. Jun 2003 B1
6580815 Grajewski et al. Jun 2003 B1
6580819 Rhoads Jun 2003 B1
6581839 Lasch et al. Jun 2003 B1
6591249 Zoka Jul 2003 B2
6608911 Lofgren et al. Aug 2003 B2
6614914 Rhoads et al. Sep 2003 B1
6638635 Hattori et al. Oct 2003 B2
6650761 Rodriguez et al. Nov 2003 B1
6679425 Sheppard et al. Jan 2004 B1
6681028 Rodriguez et al. Jan 2004 B2
6687345 Swartz et al. Feb 2004 B1
6698653 Diamond et al. Mar 2004 B1
6715797 Curiel Apr 2004 B2
6728397 McNeal Apr 2004 B2
6748533 Wu et al. Jun 2004 B1
6751336 Zhao Jun 2004 B2
6752432 Richardson Jun 2004 B1
6754822 Zhao Jun 2004 B1
6758394 Maskatiya et al. Jul 2004 B2
6764014 Lasch et al. Jul 2004 B2
6771981 Zalewski et al. Aug 2004 B1
6782116 Zhao et al. Aug 2004 B1
6786397 Silverbrook et al. Sep 2004 B2
6788800 Carr et al. Sep 2004 B1
6803114 Vere et al. Oct 2004 B1
6804376 Rhoads et al. Oct 2004 B2
6804378 Rhoads Oct 2004 B2
6817530 Labrec et al. Nov 2004 B2
6823075 Perry Nov 2004 B2
6827277 Bloomberg et al. Dec 2004 B2
6829368 Meyer et al. Dec 2004 B2
6843422 Jones et al. Jan 2005 B2
6869023 Hawes Mar 2005 B2
6883716 De Jong Apr 2005 B1
6900767 Hattori May 2005 B2
6923378 Jones et al. Aug 2005 B2
6926203 Sehr Aug 2005 B1
6944650 Urien Sep 2005 B1
6947571 Rhoads et al. Sep 2005 B1
6958346 Stoltefuss et al. Oct 2005 B2
6959098 Alattar Oct 2005 B1
6970573 Carr et al. Nov 2005 B2
6978036 Alattar et al. Dec 2005 B2
6999936 Sehr Feb 2006 B2
7024563 Shimosato et al. Apr 2006 B2
7043052 Rhoads May 2006 B2
7044395 Davis et al. May 2006 B1
7072526 Sakuramoto Jul 2006 B2
7086666 Richardson Aug 2006 B2
7113596 Rhoads Sep 2006 B2
7152786 Brundage et al. Dec 2006 B2
7159116 Moskowitz Jan 2007 B2
7167844 Leong et al. Jan 2007 B1
7171018 Rhoads et al. Jan 2007 B2
7181042 Tian Feb 2007 B2
7185201 Rhoads et al. Feb 2007 B2
7191156 Seder Mar 2007 B1
7194106 Brundage et al. Mar 2007 B2
7199456 Krappe et al. Apr 2007 B2
7206820 Rhoads et al. Apr 2007 B1
7209573 Evans et al. Apr 2007 B2
7278580 Jones et al. Oct 2007 B2
7289643 Brunk et al. Oct 2007 B2
20010001854 Schena et al. May 2001 A1
20010002035 Kayanakis May 2001 A1
20010005837 Kojo Jun 2001 A1
20010006585 Horigane Jul 2001 A1
20010007975 Nyberg et al. Jul 2001 A1
20010014169 Liang Aug 2001 A1
20010021144 Oshima et al. Sep 2001 A1
20010022667 Yoda Sep 2001 A1
20010023421 Numao et al. Sep 2001 A1
20010024510 Iwamura Sep 2001 A1
20010026377 Ikegami Oct 2001 A1
20010028727 Naito et al. Oct 2001 A1
20010030759 Hayashi et al. Oct 2001 A1
20010030761 Ideyama Oct 2001 A1
20010033674 Chen et al. Oct 2001 A1
20010037309 Vrain Nov 2001 A1
20010037313 Lofgren et al. Nov 2001 A1
20010037455 Lawandy et al. Nov 2001 A1
20010040980 Yamaguchi Nov 2001 A1
20010043362 Hull et al. Nov 2001 A1
20010047426 Hunter Nov 2001 A1
20010052076 Kadono Dec 2001 A1
20010053235 Sato Dec 2001 A1
20010054149 Kawaguchi et al. Dec 2001 A1
20010054644 Liang Dec 2001 A1
20010056468 Okayasu et al. Dec 2001 A1
20020012446 Tanaka Jan 2002 A1
20020015509 Nakamura et al. Feb 2002 A1
20020018879 Barnhart et al. Feb 2002 A1
20020021001 Stratford et al. Feb 2002 A1
20020021824 Reed et al. Feb 2002 A1
20020023218 Lawandy et al. Feb 2002 A1
20020027359 Cobben et al. Mar 2002 A1
20020027612 Brill et al. Mar 2002 A1
20020027674 Tokunaga et al. Mar 2002 A1
20020031241 Kawaguchi et al. Mar 2002 A1
20020037093 Murphy Mar 2002 A1
20020040433 Kondo Apr 2002 A1
20020046171 Hoshino Apr 2002 A1
20020051162 Kawaguchi et al. May 2002 A1
20020057431 Fateley et al. May 2002 A1
20020067844 Reed et al. Jun 2002 A1
20020070280 Ikefuji et al. Jun 2002 A1
20020072989 Van De Sluis Jun 2002 A1
20020073317 Hars Jun 2002 A1
20020077983 Tagashira Jun 2002 A1
20020080271 Eveleens et al. Jun 2002 A1
20020080396 Silverbrook et al. Jun 2002 A1
20020080964 Stone et al. Jun 2002 A1
20020099943 Rodriguez et al. Jul 2002 A1
20020105654 Goltsos Aug 2002 A1
20020114013 Hyakutake et al. Aug 2002 A1
20020116508 Khan et al. Aug 2002 A1
20020118394 Mckinley et al. Aug 2002 A1
20020136459 Imagawa et al. Sep 2002 A1
20020150277 Nishimoto et al. Oct 2002 A1
20020163633 Cohen Nov 2002 A1
20020170966 Hannigan et al. Nov 2002 A1
20020176600 Rhoads et al. Nov 2002 A1
20020187215 Trapani et al. Dec 2002 A1
20030002710 Rhoads Jan 2003 A1
20030005304 Lawandy et al. Jan 2003 A1
20030012562 Lawandy et al. Jan 2003 A1
20030032033 Anglin et al. Feb 2003 A1
20030038174 Jones Feb 2003 A1
20030040957 Rodriguez et al. Feb 2003 A1
20030056104 Carr et al. Mar 2003 A1
20030099379 Monk et al. May 2003 A1
20030102660 Rhoads Jun 2003 A1
20030105762 McCaffrey et al. Jun 2003 A1
20030126121 Khan et al. Jul 2003 A1
20030140025 Daum Jul 2003 A1
20030171939 Yagesh et al. Sep 2003 A1
20040020992 Lasch et al. Feb 2004 A1
20040041804 Ives et al. Mar 2004 A1
20040064415 Abdallah et al. Apr 2004 A1
20040181671 Brundage et al. Sep 2004 A1
20050063562 Brunk et al. Mar 2005 A1
20050072849 Jones Apr 2005 A1
20050094848 Carr et al. May 2005 A1
20050109850 Jones May 2005 A1
Foreign Referenced Citations (94)
Number Date Country
2235002 Dec 1998 CA
2943436 May 1981 DE
3806411 Sep 1989 DE
058482 Aug 1982 EP
372601 Jun 1990 EP
411232 Feb 1991 EP
441702 Aug 1991 EP
479295 Apr 1992 EP
493091 Jul 1992 EP
581317 Feb 1994 EP
590884 Apr 1994 EP
629972 Dec 1994 EP
642060 Mar 1995 EP
650146 Apr 1995 EP
705022 Apr 1996 EP
705025 Apr 1996 EP
0736860 Oct 1996 EP
0975147 Jan 2000 EP
0991014 Apr 2000 EP
991014 Apr 2000 EP
991047 Apr 2000 EP
1035503 Sep 2000 EP
1046515 Oct 2000 EP
1077570 Feb 2001 EP
1117246 Jul 2001 EP
1134710 Sep 2001 EP
1137244 Sep 2001 EP
1147495 Oct 2001 EP
1152592 Nov 2001 EP
1173001 Jan 2002 EP
1209897 May 2002 EP
1472581 May 1977 GB
2063018 May 1981 GB
2067871 Jul 1981 GB
2196167 Apr 1988 GB
2204984 Nov 1988 GB
2325765 Dec 1998 GB
2344482 Jun 2000 GB
2346110 Aug 2000 GB
2360659 Sep 2001 GB
3185585 Aug 1991 JP
4-248771 Sep 1992 JP
5242217 Sep 1993 JP
07093567 Apr 1995 JP
07108786 Apr 1995 JP
7115474 May 1995 JP
08-50598 Feb 1996 JP
10171758 Jun 1998 JP
10177613 Jun 1998 JP
11259620 Sep 1999 JP
WO-8204149 Nov 1982 WO
WO-8908915 Sep 1989 WO
WO-9427228 Nov 1994 WO
WO-9510835 Apr 1995 WO
WO-9513597 May 1995 WO
WO-9514289 May 1995 WO
WO-9520291 Jul 1995 WO
WO-9603286 Feb 1996 WO
WO-9626494 Aug 1996 WO
WO-9627259 Sep 1996 WO
WO-9636163 Nov 1996 WO
WO-9743736 Nov 1997 WO
WO-9814887 Apr 1998 WO
WO-9819869 May 1998 WO
WO-9820411 May 1998 WO
WO-9820642 May 1998 WO
WO-9824050 Jun 1998 WO
WO-9840823 Sep 1998 WO
WO-9849813 Nov 1998 WO
WO-9924934 May 1999 WO
WO-9934277 Jul 1999 WO
WO-0043216 Jul 2000 WO
WO-0105075 Jan 2001 WO
WO-0108405 Feb 2001 WO
WO-0139121 May 2001 WO
WO-0143080 Jun 2001 WO
WO-0172030 Sep 2001 WO
WO-0173997 Oct 2001 WO
WO-0175629 Oct 2001 WO
WO-0188883 Nov 2001 WO
WO-0197128 Dec 2001 WO
WO-0197175 Dec 2001 WO
WO-0203328 Jan 2002 WO
WO-0203385 Jan 2002 WO
WO-0219269 Mar 2002 WO
WO-0221846 Mar 2002 WO
WO-0223481 Mar 2002 WO
WO-0225599 Mar 2002 WO
WO-0227618 Apr 2002 WO
WO-0227720 Apr 2002 WO
WO-0239719 May 2002 WO
WO-02053499 Jul 2002 WO
WO-02095677 Nov 2002 WO
WO-03005291 Jan 2003 WO
Related Publications (1)
Number Date Country
20110000967 A1 Jan 2011 US
Provisional Applications (3)
Number Date Country
60341569 Dec 2001 US
60344683 Dec 2001 US
60344718 Dec 2001 US
Continuations (2)
Number Date Country
Parent 10991354 Nov 2004 US
Child 12822910 US
Parent 10325434 Dec 2002 US
Child 10991354 US