With consumers providing personal information more frequently to online websites and services, data breaches of that personal data held by companies are becoming more frequent. In general, a data breach occurs when personal information of customers is compromised. For example, a fraudster may hack into a customer database in order to access personal information of the customers, such as name, address, contact information, credit card or other billing information, secret questions and answers, social security number, etc.
In the event of a data breach, the breached company can perform remediation processes, but it would be advantageous for the company to prevent the breach from occurring, or at least identify the breach as soon as possible so such remediation processes can be performed before extensive damage to the identity of the company's customers has occurred.
Disclosed herein are systems and methods for pre-breach data monitoring that may be used to detect possible breaches of personal information, such as information of customers and/or employees of a company. For example, a pre-breach monitoring system may provide information to a requesting entity (e.g., a business) that is useful to predict portions of the company data (e.g., employee and/or customer information) that may not be secured well enough and other risks associated with data breaches, such as employees that may not be trustworthy.
Described herein, among other things, are systems and methods for enabling a requesting entity to request that a pre-breach system monitors one or more data sources in order to identify information associated with consumers affiliated with the requesting entity (e.g., customers and/or employees), and to then generate one or more data breach risk score that are usable to predict portions of the requesting entity's data that may not be secured well enough. In one embodiment, the requesting entity provides the pre-breach system with a file including identification information of a plurality of consumers (e.g., employees and/or customers of the requesting entity) and requests a comparative scan from a plurality of data sources. One or more breach risk scores may be generated based on the results from the comparative scan. The risk scores may then be provided to the requesting entity.
In one embodiment, a method of monitoring online data to predict or determine a risk of data breach associated with customers and/or employees of a requesting entity comprises receiving a scan list comprising information regarding a plurality of individuals associated with a requesting entity, periodically scanning a plurality of data sources for information regarding the individual on the scan list, identifying, for each of a plurality of data breach risk categories, a quantity of located data regarding the individuals, for each of the plurality of data breach risk categories, determining a difference between the quantity of located data and a quantity of located data identified in one or more previous scans of the plurality of data sources, and based on at least the determined differences for respective data breach risk categories, providing the requesting entity with an assessment of potential or actual data breach, wherein the assessment is usable to determine a likelihood of whether the requesting entity's data has been breached.
In one embodiment, the assessment of potential or actual data breaches includes a risk score for each of the data breach risk categories based on at least the determined difference for respective data breach risk categories. An overall risk score may be based on risk scores for each of the data breach risk categories. The overall risk score may be an average of the risk scores for each of the data breach risk categories. A first of the risk scores may be weighted more heavily in determining the overall risk score than a second of the risk scores.
In one embodiment, the plurality of data breach risk categories includes one or more of public internet, dark web, social media, sex offender, healthcare, or fraud risk. Public internet data sources may include any sites that are available via a typical browser, such as sites that are locatable by typing in a URL or locatable by an internet search engine (e.g., Google). Dark web data sources may include sites or other information on network hosts that are not widely accessible on the Internet, and may also be referred to as dark address space. Such dark web sites may have domains (e.g., .onion) that are only accessible with particular software or browsers (e.g., Tor). Because of the way some of these dark web browsers and hosts are configures, both the host serving out web pages and the requesting client may be obscured and not easily identifiable. Social media data sources may include any number of sites wherein users can share information, comments, interests, photographs, etc., either on a personal or professions level. Examples of currently available social media sites include Facebook, Twitter, LinkedIn, Pinterest, and countless others. Sex offender data sources may include government operated databases and/or private database that may include information from one or more governments and/or information obtained from other sources. Healthcare data sources include any data regarding health information of individuals, including HIPAA (Health Insurance Portability and Accountability Act) and non-HIPAA information. Healthcare data sources may include insurance sites, patient health records sites, health care provider sites, government healthcare sites, and/or any other data sources that may include information regarding health of individuals. In some embodiments, certain data sources may be associated with multiple risk categories. For example, a social media site may also include healthcare information and, thus, may be associated with both a social media and a healthcare category. Fraud risk data sources may include sites and/or services that provide information regarding risk of fraud associated with an individual. For example, a third party service may lookup information associated with an individual and provide back a fraud risk score (or simply “fraud score”) that indicates a likelihood that the person really is who they say they are and/or a risk of fraud being perpetrated by the individual.
In one embodiment, the periodic scanning is performed on a frequency determined by the requesting entity. The generated scores may indicate respective percentage changes between the quantity of located data and a quantity of located data identified in one or more previous scans of the plurality of data sources. The method may further comprises providing indications of one or more measures taken to improve the risks identified. The measures taken to improve the risks identified by one requesting entity may be compared with the measures taken by other businesses or requesting entities. The measures taken to improve the risks identified may be monitored periodically and correspond to a badge associated with the requesting entity.
In one embodiment, in response to determining that the assessment of potential or actual data breach is acceptable, the requesting entity is provided the ability to place a badge on information provided by the requesting entity, the badge indicating that the requesting entity has taken measures to reduce risks of data breach. The badge may be selected from a plurality of badges, wherein respective badges indicate various levels of measures taken to reduce risks of data breach and/or a current level of risk of data breach.
Embodiments of the disclosure will now be described with reference to the accompanying figures, wherein like numerals refer to like elements throughout. The terminology used in the description presented herein is not intended to be interpreted in any limited or restrictive manner, simply because it is being utilized in conjunction with a detailed description of certain specific embodiments of the disclosure. Furthermore, embodiments of the disclosure may include several novel features, no single one of which is solely responsible for its desirable attributes or which is essential to practicing the embodiments of the disclosure herein described.
The embodiments disclosed herein describe systems and methods for pre-data breach monitoring. A requesting entity, such as a business, may request generation of a one or more breach risk scores through a pre-data breach monitoring system (also referred to as “pre-breach system”) to predict portions of the requesting entity's data that may not be secured well enough and other risks associated with data breaches. One or more breach risk scores may be generated by comparing data provided by the requesting entity including identification information of a plurality of individual associated with the requesting entity, such as its customers or employees. The breach risk scores may be based on information from one or more data sources, which may be placed into risk categories. For example, data breach risk categories (or simply “risk categories) may include public internet, the Dark Web, social media sites, sex offender databases, heath care, fraudulent activity sites, or fraud risk score. Each of the risk categories may be associated with one or more data sources, such as website, databases, servers, or other data sources. Thus, information for a particular risk category may be retrieved from a plurality of data sources.
In one embodiment, a requesting entity, such as a business, may request generation of one or more data breach risk scores associated with respective risk categories. In one embodiment, such data breach risk scores may be calculated periodically, e.g. monthly, in order to periodically update risks associated with each of the data breach categories.
In one embodiment, changes in risk scores over a period of time may result in the requesting entity being rewarded a badge that reflects the positive improvement. For example, if a requesting entity has an overall risk score (e.g., based on multiple risk scores for respective risk categories) that has decreased by a certain percentage from a previous overall risk score (e.g., from a previous month), the requesting entity may be provided an opportunity to place a badge on the company's website, for example, to serve as an indication that the company is proactive in monitoring how its customers and/or employees data is used. Depending on the embodiment, different levels of badges may be provided to a requesting entity that are indicative of different measures taken by the requesting entity in monitoring for, remediating, and/or preventing breach of company data. In some embodiments, badges may be revoked or downgraded if the requesting entity fails to maintain a suitable level of risk (e.g., one or more risk scores must be maintained above threshold levels) in one or more data breach risk categories.
Example System Implementation
In one embodiment, the requesting entity 110 requests data breach risk scoring from the pre-breach system 130. In one embodiment, the requesting entity 110 provides the pre-breach system 130 with a scan list comprising one or more data structures including identification information of a plurality of its consumers (or employees) so that the pre-breach system 130 can identify potential misuses of those consumers' information. The pre-breach system 130 may perform (or initiate performance by one or more other computing systems) a scan of one or more data sources 100 for identification information on these respective consumers. The consumer information may include, for example, one or more of: Last Name, First Name, Middle Name, Generation Code, Social Security Number, Date of Birth, Phone Number, Drivers' License, State, Drivers' License Number, Street Address, City Name, State, Zip Code, account number or other custom data associated with an account of the consumer with the requesting entity, Credit card number, credit data, Email, and/or any other data. In one embodiment, the pre-breach system 130 may access and/or download information from multiple data sources and then compare the consumer information from the requesting entity with the accessed information in order to identify any matches. Once such comparisons are performed, the pre-breach system 130 may generate one or more data breach risk scores indicative of data breach risks in respective risk categories. The results may then be provided to the requesting entity 110 in various manners.
In one embodiment, the data sources 100 represent any online, offline, and/or other data sources and/or an entity that scans the various online, offline, and/or other data sources. Depending on the embodiment, data from any number of data sources 100 may be accessed by the pre-breach system 100, whether the pre-breach system 130 scans the data sources itself or receives the information (or summaries of the information) from certain data sources from a third-party entity that perform such scans. For example, a first data source may comprise the public internet, while a second data source may comprise the Dark Web. Other data sources may include data from social networks, sex offender databases, health care databases, fraud risk scoring systems, or any other type of data source that may contain consumer information.
In one embodiment, the data breach risk scores generated by the pre-breach system 130 are based on comparisons of data regarding individuals on the requesting entity's scan list with data regarding the same individuals from one or more previous scans. For example, the pre-breach system 130 may compare a quantity of matches of personal information for a particular requesting entity from a particular data source to the corresponding quantity of matches located in a previous scan in order to determine a risk score for a particular risk category. For example, if a scan list of 1,000 customers results in 50 matches of customer information located on social media sites, but in a previous scan only 40 matches of customer information were identified on social media sites, a risk score for the social media risk category may be calculated based on a comparison of the 40 matches to the 50 matches. For example, a percentage increase/decrease may be included in a data breach risk score.
In one embodiment, the assessment of potential or actual data breaches is performed at least partially manually. In other embodiments, the assessment of potential or actual data breaches is performed at least partially automatically by a computing device.
In one embodiment, the requesting entity 110 can request periodic scanning of customized data breach categories. For example, a requesting entity 110 may choose to have the pre-breach system 130 monitor and scan the public internet and the Dark Web for its consumers' information every month. Based on this periodic scanning, the requesting entity 110 can determine an increase or decrease in actual or potential data breach risks over a period (such as risk associated with respective risk categories, as well as an overall risk score that may be based on multiple category risk scores). Similarly, another requesting entity may request that the pre-breach system 130 scans additional data sources, possibly on a different frequency. Additionally, a requesting entity may establish rules for frequency of scanning different data sources such that data sources associated with a first risk category are scanned at a first frequency (e.g., weekly), while one or more data sources associated with a second risk category are scanned at a second frequency (e.g., quarterly).
In one embodiment, the data breach risk scores generated by the pre-breach system 130 over a period can be assessed and a percentage change may be calculated based on the increase or decrease in respective data breach risk scores. These percentage changes may correspond with a badge that may be awarded to a requesting entity 110 that has met certain requirements in addressing its data breach risks. Depending on the embodiment, this badge may be removed if the requesting entity fails to take continued action to address data breach risks identified.
Example Methods
At block 200, the pre-breach system 130 accesses a scan list from the requesting entity 110 that includes one or more data structures having identification information on a plurality of consumers (e.g., employees and/or customers of the requesting entity). Such information may include, for example, one or more of: Last Name, First Name, Middle Name, Generation Code, Social Security Number, Date of Birth, Phone Number, Drivers' License, State, Drivers' License Number, Street Address, City Name, State, Zip Code, account number or other custom data associated with an account of the consumer with the requesting entity, Credit card number, credit data, Email, and/or any other data. In some embodiments, the information can be accessed through one or more user interfaces provided to the requesting entity 110. Alternatively, the information may be accessed in other manners, such as via a batch process wherein a data structure including information regarding a plurality of consumers is transmitted by the requesting entity to the pre-breach system 130, such as daily, weekly, or monthly. The information may be included in any available file format, such as a database, spreadsheet, or markup language format.
At block 210, the pre-breach system 130 requests a scan for identification information on respective consumers and/or employees from one or more data sources 100. Depending on the embodiment, data may be requested by the pre-breach system 130 from any number of public or private data sources 100. For example, data sources 100 may be in various risk categories, such as public internet, the Dark Web, social networks, sex offender databases, health care databases, fraud risk scoring systems, or any other type of data that may include consumer information.
In some embodiments the pre-breach system 130 requests data from other entities, such as social networking and sex offender database scanning entities, in addition to (or replacement to) scanning of certain data sources, e.g., the public internet, that may be performed by the pre-breach system 130. In one embodiment, the pre-breach system 130 scans one or more data sources 100 for information regarding individuals on the scan list from the requesting entity 110 in order to identify indications of potential data breaches of the requesting entity's data 110.
At block 220, the pre-breach system 130 performs or requests fraud risk scoring of the plurality of consumers. The fraud risk score may be generated based on customer or employee information provided by the requesting entity 110. For example, the customer information may be provided to a fraud score provider and, in return, the pre-breach system 130 may receive fraud scores for respective individuals. In one embodiment, fraud risk scores (or simply “fraud scores”) may be provided by Experian's Precise ID and/or other fraud risk analysis systems.
At block 230, the pre-breach system 130 generates and/or receives data breach risk score, such as for respective data breach risk categories. Depending on the embodiment, fewer and/or additional data breach categories than note above may be used.
Depending on the embodiment, the data breach risk scores may be based on a quantity of information located in the scan associated with individuals on the scan list and/or on one or more analytical models that analyze the information associated with the individuals that was located. For example, the type of information located at a particular data sources may affect how heavily weighted the information is in determined one or more risk scores for respective risk categories. For example, if only a last name and first name of multiple consumers are located within data source associated with a public internet risk category, such information may have little or no effect on a the risk score for that category. However, if more sensitive information of consumers is identified, such as Social Security number, driver's license number, etc., such information may have a larger effect on a breach risk score for the risk category. In some embodiments, scanning of the data from one or more data sources includes looking for information that is unique (or substantially unique) to the requesting entity. Location of such unique information, such as account numbers, may be a strong indicator that the consumer information located with that unique information was leaked from the particular requesting entity. Thus, location of information that is unique to a particular requesting entity may result in a large effect (or weighting) on a data breach risk score for the risk category from which the unique information was located. With reference to fraud risk scores, a risk score for the fraud risk category may be based on changes in risk scores of the individuals on the scan list from one or more previous scans.
At block 240, the pre-breach system 130 analyzes the data breach risk scores, any generated data breach risk scores, and/or other data obtained or determined in view of scanning the data sources. In one embodiment, the pre-breach system 130 may provide the requesting entity with an indication of whether there is a potential or actual breach in the requesting entity's consumer information. For example, an overall data breach risk score may be calculated based on one or more calculated category risk scores and/or fraud risk scores for the consumers. Thus, in one embodiment an overall data breach risk score may be provided to the requesting entity as an indicator of a likelihood that information of the entities customers and/or employees has been compromised. In some embodiments, the pre-breach system 130 may provide an indication of likelihood that any located information regarding individuals on the scan list was leaked from the requesting entity or from another entity. Such a likelihood may be determined based on matching of information unique to the requesting entity and/or a quantity of individuals on the scan list for which information is located on a particular data source, possibly in a same area of the data source or even in a same order as on the scan list. In other embodiments, additional information may be provided to the requesting entity, such as the individual risk scores for various risk categories and/or indications of changes in risk scores over time.
At block 250, the pre-breach system 130 provides results from the analysis of to the requesting entity 110. In one embodiment, the pre-breach system 130 generates one or more reports for access by the requesting entity 110 detailing the consumer information that was assessed. In another embodiment, the requesting entity 110 may choose which risk categories to view on its detailed report. In some embodiments, the pre-breach system 130 provides the requesting entity 110 with charts comparing the selected data breach risk scores between two or more scanning periods.
The method of
In one embodiment, the pre-breach system 130 receives the fraud risk scores and accesses previous fraud risk scores generated for the requesting entity 110. In some embodiments, the periodically generated fraud risk scores are compared. The fraud risk scores may be compared to determine a percentage change in fraud risk scores (or other data breach categories) in each of one or more fraud risk score ranges, for example. In other embodiments, the fraud risk scores may be compared and converted into a risk score, such as a risk score that indicates a current fraud risk (e.g., cumulative across all the consumers) and/or a risk score that indicates a change in fraud risk scores over times, such as a comparison of a previous aggregate fraud risk score (e.g., average of fraud risk scores of all individuals on the scan list) with a current aggregate fraud risk score. Thus, in one embodiment, a data breach risk score for a fraud risk category may be calculated based on the change in fraud risk scores. In one embodiment, fraud risk scores are generated at least partially manually, such as by an individual. In other embodiments, fraud risk scores are generated at least partially automatically by a computing device.
In block 300, the pre-breach system 130 receives the generated fraud risk scores, such as may be provided by a third-party fraud risk scoring system, such as Experian's Precise ID, or other similar fraud risk analysis systems. In one embodiment, the pre-breach system 130 generates fraud risk scores for consumers and/or generates aggregate fraud risk scores reflecting fraud risk across a requesting entity (or at least the individuals included in the scan list from the requesting entity).
In block 310, the pre-breach system 130 accesses previous fraud risk scores for the requesting entity 110. The previous fraud risk scores may be stored locally on the pre-breach system 130, may be entered by the requesting entity 110, or may be maintained/retrieved from other sources.
In block 320, the pre-breach system 130 compares the newly generated fraud risk scores with fraud risk scores previously generated for the individuals on the scan list. For example, individuals may be segmented into fraud risk ranges, such as a low, medium, and high fraud risk range, and totals of consumers within each of the segments may be calculated. Changes in the quantity of consumers in each of the fraud risk segments may then be determined on a periodic basis in order to detect changes over time in fraud risks associated with the individuals on the scan list.
In block 330, the pre-breach system 130 generates a data breach risk score based on the change in fraud risk scores over a period of time, such as comparison of quantities of consumers within respective fraud risk score segments compared to quantities of consumers within those same fraud risk score segments in one or more months. In some embodiments, this data breach risk score can be a percentage value, rating, or another indicator.
In block 340, the pre-breach system 130 periodically updates a data breach risk score for a fraud risk category based on a frequency setting that may be selected by the requesting entity. The risk score may be provided in the form of real-time notifications (e.g., in response to detecting a change in data breach risk scores for the requesting entity 110) and/or batch reports that are periodically provided to the requesting entity 110. In one embodiment, month to month changes in the data retrieved (and or derived) may be reported, as well as (or as an alternative to) a summary of the information located and/or the raw data located. For example, month-to-month changes in fraud risk scores (e.g., changes in numbers of fraud risk scores in particular ranges) may be reported.
In one embodiment, a requesting entity can ask for a determination of whether there has been a breach rather than signing up for a month-to-month (or other periodic) comparison. Once an actual breach has been determined, the requesting entity can request that the breach be tracked to a data source which holds its employee/customer information. The requesting entity can then follow up with that source to figure out how to resolve the issue.
As noted above, the method of
Sample Data Breach Risk Setup and Reporting
In some embodiments, the risk categories may be associated with separate costs, such as cost per consumer scanned within a particular risk category. For example, the public Internet risk category scan may cost $0.02 per consumer, while a dark web scan may cost $0.04 per consumer. Thus, the requesting entity may select the most appropriate risk categories in view of costs associated with performing the scan.
In one embodiment, the cost per consumer, and/or a total cost for a particular risk category (e.g., based on the actual number of consumers in the scan list and the cost per consumer for the respective risk category) may be provided on a user interface such as that shown in
In some embodiments, the report 500 includes data only in those risk categories that are scanned for the requesting entity, such as those risk categories that are selected using a user interface similar to
In other embodiments, the requesting entity 110 can customize how many previous periods or which specific periods it wishes the pre-breach system 130 to access. For example, a requesting entity can choose to view the change in its consumer information found through the public internet over a period of three month (e.g., rather than a default period of one month). In one embodiment, the user interface includes controls that allow the requesting entity to adjust the data shown to reflect less or additional data and/or to provide risk scores in different formats. Thus, the displayed data breach risk scores and/or reports may be customized by the requesting entity 110.
In the embodiment of
In the embodiment of
In
In one embodiment, the results from the periodically generated fraud risk scores may be displayed on a chart 600 demonstrating the comparison of fraud risk scores in a current period compared to a previous period. In
In other embodiments, fraud risk scores that are higher may indicate an increased risk of fraud. In other embodiments, changes in fraud risk scores (and/or other data breach risk scores) may be illustrated in different manners.
In other embodiments, the chart 600 may show another data breach risk category which has been selected by the requesting entity 110. Depending on the embodiment, the information provided in the chart 600 may be customized, such as by the data sources 100 scanned or the data breach risk categories selected by the requesting entity 110.
The chart 600 allows the requesting entity 110 to easily determine its progress in data breach protection and monitoring over a period of time. By examining the detailed report and the chart 600 in
Similar to chart 600 (
The chart 700 allows the requesting entity 110 to determine its progress in data breach protection and monitoring over a period of time. By examining the detailed report and the chart 700 in
Other types of graphics illustrating historical comparisons of fraud scores (and/or other data breach risk scores as discussed herein) may be provided also, such as a historical graph illustrating quantity of consumers within a 701-999 segment of fraud scores over a period of one year.
In
Depending on the embodiment, the number of social media uses may include uses of only certain types of consumer data and/or combinations of consumer data. For example, use of a consumer's name only may not be counted as a social media use in one embodiment, while use of a consumer's name and home address (or email address, phone number, and/or other items) may be counted as a social media use. Depending on the embodiment, the requesting entity may define rules for classifying data associated with customers/employees as hits that are to be included in the reporting analysis. Thus, a first requesting entity may determine that uses of only a consumer's first and last name should be counted in social media uses, while another requesting entity may determine that uses of only a consumer's first and last name should not be counted as social media uses.
In
In
As noted above with reference to
Badges
The badge 600 may also be awarded based on the change in one or more risk scores and/or overall risk scores. For example, a bronze badge may represent that the requesting entity 110 has a 5% decrease in its consumer information available within data sources 100, while a silver badge represents a 10% decrease and a gold badge represents a 20% or higher decrease. Thus, a badge may be placed on a requesting entity's website and/or other marketing materials, in order to signify that the requesting entity is taking appropriate care in monitoring for potential breaches of its customers and/or employees personal data.
In one embodiment, determining whether a badge should be provided to a requesting entity, or which badge should be provided, may be based on a comparison of risk scores of the requesting entity to risk scores of other entities, such as entities within the same or similar vertical market, having a similar number of employees, within a similar geographic region, or the like. For example, a relatively high public internet risk score for a particular requesting entity may not have a negative impact on the determination of a badge to provide to the requesting entity if the risk score is much lower than public internet risk scores for other entities within the same vertical market. Similarly, a low overall risk score for an entity (e.g., based on multiple category risk scores) may weigh against award of a badge if that low overall risk score is higher than overall risk scores for similar types of companies (e.g., similar vertical market).
Badges may encourage additional engagement by customers in view of a perceived sense of security provided by the requesting entity proactively monitoring for potential data breaches that is expressed by be badges. In some embodiments, qualifications for having a badge on a requesting entity's website may need to be periodically confirmed, such as in response to a monthly or quarterly scanning of data sources against the requesting entity's customer list and/or providing information to the provider of the pre-breach system regarding steps taken to reduce data breaches.
In one embodiment, the badge icon is obtained via a hyperlink to the data breach entity, which provides the appropriate badge for placement on the webpage when accessed by a consumer in view of most recent data breach risk scores (e.g. in comparison with previous data breach risk scores of the requesting entity). Thus, in this embodiment the level of actions taken by the requesting entity in detecting and remediating data breaches may be updated automatically and up-to-date badges may be provided in order to further encourage consumers to interface with the requesting entity. In some embodiments, badges may be entirely revoked/removed when there has been a failure to continue taking appropriate measures to prevent or remedy data breaches. The awarding of a badge may be determined manually in part or automatically by a computing system.
The pre-breach system of
The data breach risk score module 150 is configured to generate data breach risk scores for customers of the requesting entity 110, such as based on information provided by the requesting entity 110 regarding customers (and/or employees) and/or additional information (e.g., credit data) obtained regarding those individuals. In one embodiment, fraud risk scores (which may be used in generation of a data breach risk score for a fraud category) are provided by Experian's Precise ID product and/or are similar to those data breach risk scores.
The report generation module 145 analyzes the data of the data scanning module 165 and/or the data breach risk score module 150 and generates one or more reports to the requesting entity 110. Reports may be in the form of real-time notifications (e.g., in response to detecting a change in data breach risk for the requesting entity 110) and/or batch reports that are periodically provided to the requesting entity 110. In one embodiment, month to month changes in the data retrieved (and or derived) may be reported, as well as (or as an alternative to) a summary of the information located and/or the raw data located. For example, month-to-month changes in data breach risk scores (e.g., changes in numbers of data breach risk scores in particular ranges) may be reported.
Example Computing System
The pre-breach system 130 includes, for example, a personal computer that is IBM, Macintosh, or Linux/Unix compatible or a server or workstation. In one embodiment, the pre-breach system 130 comprises a server, a laptop computer, a cell phone, a personal digital assistant, a kiosk, or an audio player, for example. In one embodiment, the exemplary pre-breach system 130 includes one or more central processing unit (“CPU”) 155, which may each include a conventional or proprietary microprocessor.
The pre-breach system 130 further includes one or more mass storage devices 135, such as a hard drive, diskette, solid state drive, or optical media storage device. Typically, the modules of the pre-breach system 130 are connected to the computer using a standard based bus system. In different embodiments, the standard based bus system could be implemented in Peripheral Component Interconnect (“PCI”), Microchannel, Small Computer System Interface (“SCSI”), Industrial Standard Architecture (“ISA”) and Extended ISA (“EISA”) architectures, for example. In addition, the functionality provided for in the components and modules of the locator system 100 may be combined into fewer components and modules or further separated into additional components and modules.
The pre-breach system 130 is generally controlled and coordinated by operating system software, such as Windows XP, Windows Vista, Windows 7, Windows Server, Unix, Linux, SunOS, Solaris, or other compatible operating systems. In Macintosh systems, the operating system may be any available operating system, such as MAC OS X. In other embodiments, the pre-breach system 130 may be controlled by a proprietary operating system. Conventional operating systems control and schedule computer processes for execution, perform memory management, provide file system, networking, I/O services, and provide a user interface, such as a graphical user interface (“GUI”), among other things.
The pre-breach system 130 may include one or more commonly available input/output (I/O) devices and interfaces 160, such as a keyboard, mouse, touchpad, and printer. In one embodiment, the I/O devices and interfaces 160 include one or more display devices, such as a monitor, that allows the visual presentation of data to a user. More particularly, a display device provides for the presentation of GUIs, application software data, and multimedia presentations, for example. The pre-breach system 130 may also include one or more multimedia devices 140, such as speakers, video cards, graphics accelerators, and microphones, for example.
In the embodiment of
According to
In the embodiment of
In general, the word “module,” as used herein, refers to logic embodied in hardware or firmware, or to a collection of software instructions, possibly having entry and exit points, written in a programming language, such as, for example, Java, Lua, C or C++. A software module may be compiled and linked into an executable program, installed in a dynamic link library, or may be written in an interpreted programming language such as, for example, BASIC, Perl, or Python. It will be appreciated that software modules may be callable from other modules or from themselves, and/or may be invoked in response to detected events or interrupts. Software modules configured for execution on computing devices may be provided on a computer readable medium, such as a compact disc, digital video disc, flash drive, or any other tangible medium. Such software code may be stored, partially or fully, on a memory device of the executing computing device, such as the pre-breach system 130, for execution by the computing device. Software instructions may be embedded in firmware, such as an EPROM. It will be further appreciated that hardware modules may be comprised of connected logic units, such as gates and flip-flops, and/or may be comprised of programmable units, such as programmable gate arrays or processors. The modules described herein are preferably implemented as software modules, but may be represented in hardware or firmware. Generally, the modules described herein refer to logical modules that may be combined with other modules or divided into sub-modules despite their physical organization or storage.
This application is a continuation of U.S. application Ser. No. 16/657,057, filed Oct. 18, 2019, which is a continuation of U.S. application Ser. No. 13/665,636, filed Oct. 31, 2012, which claims the benefit of U.S. Provisional Application No. 61/553,761, filed on Oct. 31, 2011, the disclosures of which are hereby incorporated by reference in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
2074513 | Mills | Mar 1937 | A |
3316395 | Lavin et al. | Apr 1967 | A |
3752904 | Waterbury | Aug 1973 | A |
4163290 | Sutherlin et al. | Jul 1979 | A |
5274547 | Zoffel et al. | Dec 1993 | A |
5323315 | Highbloom | Jun 1994 | A |
5386104 | Sime | Jan 1995 | A |
5414833 | Hershey et al. | May 1995 | A |
5454030 | de Oliveira et al. | Sep 1995 | A |
5504675 | Cragun et al. | Apr 1996 | A |
5563783 | Stolfo et al. | Oct 1996 | A |
5590038 | Pitroda | Dec 1996 | A |
5627886 | Bowman | May 1997 | A |
5640577 | Scharmer | Jun 1997 | A |
5659731 | Gustafson | Aug 1997 | A |
5666528 | Thai | Sep 1997 | A |
5679940 | Templeton et al. | Oct 1997 | A |
5696907 | Tom | Dec 1997 | A |
5696965 | Dedrick | Dec 1997 | A |
5739512 | Tognazzini | Apr 1998 | A |
5742775 | King | Apr 1998 | A |
5745654 | Titan | Apr 1998 | A |
5752242 | Havens | May 1998 | A |
5754632 | Smith | May 1998 | A |
5754939 | Herz et al. | May 1998 | A |
5774692 | Boyer et al. | Jun 1998 | A |
5774868 | Cragun et al. | Jun 1998 | A |
5793497 | Funk | Aug 1998 | A |
5797136 | Boyer et al. | Aug 1998 | A |
5809478 | Greco et al. | Sep 1998 | A |
5812840 | Shwartz | Sep 1998 | A |
5819226 | Gopinathan et al. | Oct 1998 | A |
5819260 | Lu et al. | Oct 1998 | A |
5822741 | Fischthal | Oct 1998 | A |
5822750 | Jou et al. | Oct 1998 | A |
5825884 | Zdepski et al. | Oct 1998 | A |
5828837 | Eikland | Oct 1998 | A |
5832068 | Smith | Nov 1998 | A |
5842178 | Giovannoli | Nov 1998 | A |
5844218 | Kawan et al. | Dec 1998 | A |
5870721 | Norris | Feb 1999 | A |
5872921 | Zahariev et al. | Feb 1999 | A |
5878403 | DeFrancesco | Mar 1999 | A |
5879297 | Haynor et al. | Mar 1999 | A |
5884289 | Anderson et al. | Mar 1999 | A |
5893090 | Friedman et al. | Apr 1999 | A |
5912839 | Ovshinsky et al. | Jun 1999 | A |
5913196 | Talmor et al. | Jun 1999 | A |
5943666 | Kleewein et al. | Aug 1999 | A |
5950179 | Buchanan et al. | Sep 1999 | A |
5956693 | Geerlings | Sep 1999 | A |
5961593 | Gabber et al. | Oct 1999 | A |
5963932 | Jakobsson et al. | Oct 1999 | A |
5987440 | O'Neil et al. | Nov 1999 | A |
5999907 | Donner | Dec 1999 | A |
5999940 | Ranger | Dec 1999 | A |
6023694 | Kouchi et al. | Feb 2000 | A |
6029139 | Cunningham et al. | Feb 2000 | A |
6029149 | Dykstra et al. | Feb 2000 | A |
6029154 | Pettitt | Feb 2000 | A |
6029194 | Tilt | Feb 2000 | A |
6038551 | Barlow et al. | Mar 2000 | A |
6044357 | Garg | Mar 2000 | A |
6055570 | Nielsen | Apr 2000 | A |
6073106 | Rozen et al. | Jun 2000 | A |
6073140 | Morgan et al. | Jun 2000 | A |
6094643 | Anderson et al. | Jul 2000 | A |
6119103 | Basch et al. | Sep 2000 | A |
6125985 | Amdahl et al. | Oct 2000 | A |
6142283 | Amdahl et al. | Nov 2000 | A |
6144957 | Cohen et al. | Nov 2000 | A |
6144988 | Kappel | Nov 2000 | A |
6157707 | Baulier et al. | Dec 2000 | A |
6182219 | Feldbau et al. | Jan 2001 | B1 |
6208720 | Curtis et al. | Mar 2001 | B1 |
6223171 | Chaudhuri et al. | Apr 2001 | B1 |
6249228 | Shirk et al. | Jun 2001 | B1 |
6253202 | Gilmour | Jun 2001 | B1 |
6253203 | O'Flaherty et al. | Jun 2001 | B1 |
6254000 | Degen et al. | Jul 2001 | B1 |
6263447 | French et al. | Jul 2001 | B1 |
6269349 | Aieta et al. | Jul 2001 | B1 |
6282658 | French et al. | Aug 2001 | B2 |
6285983 | Jenkins | Sep 2001 | B1 |
6285987 | Roth et al. | Sep 2001 | B1 |
6292795 | Peters et al. | Sep 2001 | B1 |
6304869 | Moore et al. | Oct 2001 | B1 |
6311169 | Duhon | Oct 2001 | B2 |
6317783 | Freishtat et al. | Nov 2001 | B1 |
6321339 | French et al. | Nov 2001 | B1 |
6330546 | Gopinathan et al. | Dec 2001 | B1 |
6339769 | Cochrane et al. | Jan 2002 | B1 |
6366903 | Agrawal et al. | Apr 2002 | B1 |
6397197 | Gindlesperger | May 2002 | B1 |
6418436 | Degen et al. | Jul 2002 | B1 |
6424956 | Werbos | Jul 2002 | B1 |
6448889 | Hudson | Sep 2002 | B1 |
6456984 | Demoff et al. | Sep 2002 | B1 |
6457012 | Jatkowski | Sep 2002 | B1 |
6463533 | Calamera et al. | Oct 2002 | B1 |
6496819 | Bello et al. | Dec 2002 | B1 |
6496936 | French et al. | Dec 2002 | B1 |
6505193 | Musgrave et al. | Jan 2003 | B1 |
6510415 | Talmor et al. | Jan 2003 | B1 |
6513018 | Culhane | Jan 2003 | B1 |
6523041 | Morgan et al. | Feb 2003 | B1 |
6532459 | Berson | Mar 2003 | B1 |
6542894 | Lee et al. | Apr 2003 | B1 |
6543683 | Hoffman | Apr 2003 | B2 |
6553495 | Johansson et al. | Apr 2003 | B1 |
6571334 | Feldbau et al. | May 2003 | B1 |
6574623 | Laung et al. | Jun 2003 | B1 |
6581059 | Barrett et al. | Jun 2003 | B1 |
6597775 | Lawyer et al. | Jul 2003 | B2 |
6601173 | Mohler | Jul 2003 | B1 |
6612488 | Suzuki | Sep 2003 | B2 |
6615193 | Kingdon et al. | Sep 2003 | B1 |
6658393 | Basch et al. | Dec 2003 | B1 |
6662023 | Helle | Dec 2003 | B1 |
6696941 | Baker | Feb 2004 | B2 |
6700220 | Bayeur et al. | Mar 2004 | B2 |
6714918 | Hillmer et al. | Mar 2004 | B2 |
6735572 | Landesmann | May 2004 | B2 |
6740875 | Ishikawa et al. | May 2004 | B1 |
6748426 | Shaffer et al. | Jun 2004 | B1 |
6751626 | Brown et al. | Jun 2004 | B2 |
6754665 | Futagami et al. | Jun 2004 | B1 |
6766946 | Iida et al. | Jul 2004 | B2 |
6796497 | Benkert et al. | Sep 2004 | B2 |
6804346 | Mewhinney | Oct 2004 | B1 |
6811082 | Wong | Nov 2004 | B2 |
6829711 | Kwok et al. | Dec 2004 | B1 |
6845448 | Chaganti et al. | Jan 2005 | B1 |
6850606 | Lawyer et al. | Feb 2005 | B2 |
6850895 | Brodersen et al. | Feb 2005 | B2 |
6857073 | French et al. | Feb 2005 | B2 |
6866586 | Oberberger et al. | Mar 2005 | B2 |
6871287 | Ellingson | Mar 2005 | B1 |
6873979 | Fishman et al. | Mar 2005 | B2 |
6898574 | Regan | May 2005 | B1 |
6907408 | Angel | Jun 2005 | B2 |
6908030 | Rajasekaran et al. | Jun 2005 | B2 |
6910624 | Natsuno | Jun 2005 | B1 |
6913194 | Suzuki | Jul 2005 | B2 |
6918038 | Smith et al. | Jul 2005 | B1 |
6920435 | Hoffman et al. | Jul 2005 | B2 |
6928546 | Nanavati et al. | Aug 2005 | B1 |
6930707 | Bates et al. | Aug 2005 | B2 |
6934849 | Kramer et al. | Aug 2005 | B2 |
6934858 | Woodhill | Aug 2005 | B2 |
6950858 | Ogami | Sep 2005 | B2 |
6965881 | Brickell et al. | Nov 2005 | B1 |
6965997 | Dutta | Nov 2005 | B2 |
6973462 | Dattero et al. | Dec 2005 | B2 |
6973575 | Arnold | Dec 2005 | B2 |
6983379 | Spalink et al. | Jan 2006 | B1 |
6983381 | Jerdonek | Jan 2006 | B2 |
6983882 | Cassone | Jan 2006 | B2 |
6985887 | Sunstein et al. | Jan 2006 | B1 |
6988085 | Hedy | Jan 2006 | B2 |
6991174 | Zuili | Jan 2006 | B2 |
6993659 | Milgramm et al. | Jan 2006 | B2 |
7003504 | Angus et al. | Feb 2006 | B1 |
7007174 | Wheeler et al. | Feb 2006 | B2 |
7028052 | Chapman et al. | Apr 2006 | B2 |
7035855 | Kilger et al. | Apr 2006 | B1 |
7046139 | Kuhn et al. | May 2006 | B2 |
7050989 | Hurt et al. | May 2006 | B1 |
7069240 | Spero et al. | Jun 2006 | B2 |
7082435 | Guzman et al. | Jul 2006 | B1 |
7083090 | Zuili | Aug 2006 | B2 |
7089592 | Adjaoute et al. | Aug 2006 | B2 |
7092891 | Maus et al. | Aug 2006 | B2 |
7104444 | Suzuki | Sep 2006 | B2 |
7158622 | Lawyer et al. | Jan 2007 | B2 |
7162640 | Heath et al. | Jan 2007 | B2 |
7174335 | Kameda | Feb 2007 | B2 |
7185016 | Rasmussen | Feb 2007 | B1 |
7188078 | Arnett et al. | Mar 2007 | B2 |
7200602 | Jonas | Apr 2007 | B2 |
7203653 | McIntosh | Apr 2007 | B1 |
7212995 | Schulkins | May 2007 | B2 |
7222779 | Pineda-Sanchez et al. | May 2007 | B1 |
7225977 | Davis | Jun 2007 | B2 |
7234156 | French et al. | Jun 2007 | B2 |
7234160 | Vogel et al. | Jun 2007 | B2 |
7240059 | Bayliss et al. | Jul 2007 | B2 |
7240363 | Ellingson | Jul 2007 | B1 |
7246067 | Austin et al. | Jul 2007 | B2 |
7246740 | Swift et al. | Jul 2007 | B2 |
7249048 | O'Flaherty | Jul 2007 | B1 |
7254560 | Singhal | Aug 2007 | B2 |
7263506 | Lee et al. | Aug 2007 | B2 |
7272591 | Ghazal et al. | Sep 2007 | B1 |
7272728 | Pierson et al. | Sep 2007 | B2 |
7272857 | Everhart | Sep 2007 | B1 |
7277869 | Starkman | Oct 2007 | B2 |
7277875 | Serrano-Morales et al. | Oct 2007 | B2 |
7277900 | Ganesh et al. | Oct 2007 | B1 |
7283974 | Katz et al. | Oct 2007 | B2 |
7289607 | Bhargava et al. | Oct 2007 | B2 |
7290704 | Ball et al. | Nov 2007 | B1 |
7298873 | Miller, Jr. et al. | Nov 2007 | B2 |
7310743 | Gagne et al. | Dec 2007 | B1 |
7314162 | Carr et al. | Jan 2008 | B2 |
7314167 | Kiliccote | Jan 2008 | B1 |
7330871 | Barber | Feb 2008 | B2 |
7333635 | Tsantes et al. | Feb 2008 | B2 |
7340042 | Cluff et al. | Mar 2008 | B2 |
7343149 | Benco | Mar 2008 | B2 |
7356516 | Richey et al. | Apr 2008 | B2 |
7370044 | Mulhern et al. | May 2008 | B2 |
7370351 | Ramachandran et al. | May 2008 | B1 |
7373335 | Cleghorn et al. | May 2008 | B2 |
7376618 | Anderson et al. | May 2008 | B1 |
7383227 | Weinflash et al. | Jun 2008 | B2 |
7383988 | Slonecker, Jr. | Jun 2008 | B2 |
7386448 | Poss et al. | Jun 2008 | B1 |
7386506 | Aoki et al. | Jun 2008 | B2 |
7392534 | Lu et al. | Jun 2008 | B2 |
7395273 | Khan et al. | Jul 2008 | B2 |
7398915 | Pineda-Sanchez et al. | Jul 2008 | B1 |
7403942 | Bayliss | Jul 2008 | B1 |
7406715 | Clapper | Jul 2008 | B2 |
7412228 | Barclay et al. | Aug 2008 | B2 |
7418431 | Nies et al. | Aug 2008 | B1 |
7421442 | Gelb et al. | Sep 2008 | B2 |
7424439 | Fayyad et al. | Sep 2008 | B1 |
7428509 | Klebanoff | Sep 2008 | B2 |
7433855 | Gavan et al. | Oct 2008 | B2 |
7433864 | Malik | Oct 2008 | B2 |
7438226 | Helsper et al. | Oct 2008 | B2 |
7444518 | Dharmarajan et al. | Oct 2008 | B1 |
7451113 | Kasower | Nov 2008 | B1 |
7457401 | Lawyer et al. | Nov 2008 | B2 |
7458508 | Shao et al. | Dec 2008 | B1 |
7460857 | Roach, Jr. | Dec 2008 | B2 |
7466235 | Kolb et al. | Dec 2008 | B1 |
7467127 | Baccash et al. | Dec 2008 | B1 |
7467401 | Cicchitto | Dec 2008 | B2 |
7478157 | Bohrer et al. | Jan 2009 | B2 |
7480631 | Merced et al. | Jan 2009 | B1 |
7481363 | Zuili | Jan 2009 | B2 |
7490052 | Kilger et al. | Feb 2009 | B2 |
7490356 | Lieblich et al. | Feb 2009 | B2 |
7497374 | Helsper et al. | Mar 2009 | B2 |
7509117 | Yum | Mar 2009 | B2 |
7512221 | Toms | Mar 2009 | B2 |
7519558 | Ballard et al. | Apr 2009 | B2 |
7522060 | Tumperi et al. | Apr 2009 | B1 |
7529698 | Joao | May 2009 | B2 |
7533179 | Tarquini et al. | May 2009 | B2 |
7533808 | Song et al. | May 2009 | B2 |
7536346 | Aliffi et al. | May 2009 | B2 |
7540021 | Page | May 2009 | B2 |
7542993 | Satterfield et al. | Jun 2009 | B2 |
7543739 | Brown et al. | Jun 2009 | B2 |
7543740 | Greene et al. | Jun 2009 | B2 |
7546271 | Chmielewski et al. | Jun 2009 | B1 |
7548886 | Kirkland et al. | Jun 2009 | B2 |
7552467 | Lindsay | Jun 2009 | B2 |
7562093 | Gelb et al. | Jul 2009 | B2 |
7562184 | Henmi et al. | Jul 2009 | B2 |
7562814 | Shao et al. | Jul 2009 | B1 |
7568616 | Zuili | Aug 2009 | B2 |
7575157 | Barnhardt et al. | Aug 2009 | B2 |
7580884 | Cook | Aug 2009 | B2 |
7581112 | Brown et al. | Aug 2009 | B2 |
7584146 | Duhon | Sep 2009 | B1 |
7587366 | Grim, III et al. | Sep 2009 | B2 |
7587368 | Felsher | Sep 2009 | B2 |
7591425 | Zuili et al. | Sep 2009 | B1 |
7593889 | Raines et al. | Sep 2009 | B2 |
7593891 | Kornegay et al. | Sep 2009 | B2 |
7594019 | Clapper | Sep 2009 | B2 |
7603701 | Gaucas | Oct 2009 | B2 |
7606401 | Hoffman et al. | Oct 2009 | B2 |
7606725 | Robertson et al. | Oct 2009 | B2 |
7606790 | Levy | Oct 2009 | B2 |
7610216 | May et al. | Oct 2009 | B1 |
7610229 | Kornegay | Oct 2009 | B1 |
7610243 | Haggerty et al. | Oct 2009 | B2 |
7620596 | Knudson et al. | Nov 2009 | B2 |
7623844 | Herrmann et al. | Nov 2009 | B2 |
7630924 | Collins et al. | Dec 2009 | B1 |
7630932 | Danaher et al. | Dec 2009 | B2 |
7636853 | Cluts et al. | Dec 2009 | B2 |
7644868 | Hare | Jan 2010 | B2 |
7647344 | Skurtovich, Jr. et al. | Jan 2010 | B2 |
7647645 | Edeki et al. | Jan 2010 | B2 |
7653593 | Zarikian et al. | Jan 2010 | B2 |
7657431 | Hayakawa | Feb 2010 | B2 |
7668769 | Baker et al. | Feb 2010 | B2 |
7668840 | Bayliss et al. | Feb 2010 | B2 |
7668921 | Proux et al. | Feb 2010 | B2 |
7672865 | Kumar et al. | Mar 2010 | B2 |
7672924 | Scheurich et al. | Mar 2010 | B1 |
7672926 | Ghazal et al. | Mar 2010 | B2 |
7673793 | Greene et al. | Mar 2010 | B2 |
7676418 | Chung et al. | Mar 2010 | B1 |
7676433 | Ross et al. | Mar 2010 | B1 |
7685096 | Margolus et al. | Mar 2010 | B2 |
7686214 | Shao et al. | Mar 2010 | B1 |
7689007 | Bous et al. | Mar 2010 | B2 |
7689505 | Kasower | Mar 2010 | B2 |
7689506 | Fei et al. | Mar 2010 | B2 |
7690032 | Peirce | Mar 2010 | B1 |
7698445 | Fitzpatrick et al. | Apr 2010 | B2 |
7701364 | Zilberman | Apr 2010 | B1 |
7702550 | Perg et al. | Apr 2010 | B2 |
7707122 | Hull et al. | Apr 2010 | B2 |
7707163 | Anzalone et al. | Apr 2010 | B2 |
7708190 | Brandt et al. | May 2010 | B2 |
7708200 | Helsper et al. | May 2010 | B2 |
7711635 | Steele et al. | May 2010 | B2 |
7711636 | Robida et al. | May 2010 | B2 |
7720750 | Brody | May 2010 | B2 |
7725300 | Pinto et al. | May 2010 | B2 |
7734523 | Cui et al. | Jun 2010 | B1 |
7735125 | Alvarez et al. | Jun 2010 | B1 |
7739139 | Robertson et al. | Jun 2010 | B2 |
7739707 | Sie et al. | Jun 2010 | B2 |
7742982 | Chaudhuri et al. | Jun 2010 | B2 |
7747480 | Agresta et al. | Jun 2010 | B1 |
7747520 | Livermore et al. | Jun 2010 | B2 |
7747521 | Serio | Jun 2010 | B2 |
7747559 | Leitner et al. | Jun 2010 | B2 |
7752084 | Pettitt | Jul 2010 | B2 |
7752236 | Williams et al. | Jul 2010 | B2 |
7752554 | Biggs et al. | Jul 2010 | B2 |
7756783 | Crooks | Jul 2010 | B2 |
7761379 | Zoldi et al. | Jul 2010 | B2 |
7761384 | Madhogarhia | Jul 2010 | B2 |
7765311 | Itabashi et al. | Jul 2010 | B2 |
7769696 | Yoda | Aug 2010 | B2 |
7774270 | MacCloskey | Aug 2010 | B1 |
7778885 | Semprevivo et al. | Aug 2010 | B1 |
7779456 | Dennis et al. | Aug 2010 | B2 |
7779457 | Taylor | Aug 2010 | B2 |
7783281 | Cook et al. | Aug 2010 | B1 |
7783515 | Kumar et al. | Aug 2010 | B1 |
7787869 | Rice et al. | Aug 2010 | B2 |
7788184 | Kane | Aug 2010 | B2 |
7792715 | Kasower | Sep 2010 | B1 |
7792864 | Rice et al. | Sep 2010 | B1 |
7792903 | Fischer et al. | Sep 2010 | B2 |
7793835 | Coggeshall et al. | Sep 2010 | B1 |
7797725 | Lunt et al. | Sep 2010 | B2 |
7801811 | Merrell et al. | Sep 2010 | B1 |
7801828 | Candella et al. | Sep 2010 | B2 |
7802104 | Dickinson | Sep 2010 | B2 |
7805362 | Merrell et al. | Sep 2010 | B1 |
7805391 | Friedlander et al. | Sep 2010 | B2 |
7809797 | Cooley et al. | Oct 2010 | B2 |
7813944 | Luk et al. | Oct 2010 | B1 |
7827115 | Weller et al. | Nov 2010 | B2 |
7832006 | Chen et al. | Nov 2010 | B2 |
7835983 | Lefner et al. | Nov 2010 | B2 |
7840459 | Loftesness et al. | Nov 2010 | B1 |
7841004 | Balducci et al. | Nov 2010 | B1 |
7841008 | Cole et al. | Nov 2010 | B1 |
7844520 | Franklin | Nov 2010 | B1 |
7848987 | Haig | Dec 2010 | B2 |
7849029 | Crooks et al. | Dec 2010 | B2 |
7853493 | DeBie et al. | Dec 2010 | B2 |
7853518 | Cagan | Dec 2010 | B2 |
7853526 | Milana | Dec 2010 | B2 |
7853533 | Eisen | Dec 2010 | B2 |
7853998 | Blaisdell et al. | Dec 2010 | B2 |
7856397 | Whipple et al. | Dec 2010 | B2 |
7856494 | Kulkarni | Dec 2010 | B2 |
7860769 | Benson | Dec 2010 | B2 |
7860783 | Yang et al. | Dec 2010 | B2 |
7865427 | Wright et al. | Jan 2011 | B2 |
7865439 | Seifert et al. | Jan 2011 | B2 |
7865937 | White et al. | Jan 2011 | B1 |
7870078 | Clark et al. | Jan 2011 | B2 |
7870599 | Pemmaraju | Jan 2011 | B2 |
7873382 | Rydgren et al. | Jan 2011 | B2 |
7874488 | Parkinson | Jan 2011 | B2 |
7877304 | Coulter | Jan 2011 | B1 |
7877784 | Chow et al. | Jan 2011 | B2 |
7882548 | Heath et al. | Feb 2011 | B2 |
7890433 | Singhal | Feb 2011 | B2 |
7904360 | Evans | Mar 2011 | B2 |
7904367 | Chung et al. | Mar 2011 | B2 |
7908242 | Achanta | Mar 2011 | B1 |
7909246 | Hogg et al. | Mar 2011 | B2 |
7912865 | Akerman et al. | Mar 2011 | B2 |
7917715 | Tallman, Jr. | Mar 2011 | B2 |
7925582 | Kornegay et al. | Apr 2011 | B1 |
7929951 | Stevens et al. | Apr 2011 | B2 |
7933835 | Keane et al. | Apr 2011 | B2 |
7941363 | Tanaka et al. | May 2011 | B2 |
7945515 | Zoldi et al. | May 2011 | B2 |
7950577 | Daniel | May 2011 | B1 |
7958046 | Doerner et al. | Jun 2011 | B2 |
7961857 | Zoldi et al. | Jun 2011 | B2 |
7962404 | Metzger, II et al. | Jun 2011 | B1 |
7962467 | Howard et al. | Jun 2011 | B2 |
7970679 | Kasower | Jun 2011 | B2 |
7970698 | Gupta et al. | Jun 2011 | B2 |
7970701 | Lewis et al. | Jun 2011 | B2 |
7971246 | Emigh et al. | Jun 2011 | B1 |
7975299 | Balducci et al. | Jul 2011 | B1 |
7983932 | Kane | Jul 2011 | B2 |
7983976 | Nafeh et al. | Jul 2011 | B2 |
7983979 | Holland, IV | Jul 2011 | B2 |
7984849 | Berghel et al. | Jul 2011 | B2 |
7988043 | Davis | Aug 2011 | B2 |
7991201 | Bous et al. | Aug 2011 | B2 |
7991689 | Brunzell et al. | Aug 2011 | B1 |
7991716 | Crooks et al. | Aug 2011 | B2 |
7991751 | Peled et al. | Aug 2011 | B2 |
7991901 | Tarquini et al. | Aug 2011 | B2 |
7995994 | Khetawat et al. | Aug 2011 | B2 |
7996521 | Chamberlain et al. | Aug 2011 | B2 |
7996912 | Spalink et al. | Aug 2011 | B2 |
8001034 | Chung et al. | Aug 2011 | B2 |
8001042 | Brunzell et al. | Aug 2011 | B1 |
8001153 | Skurtovich, Jr. et al. | Aug 2011 | B2 |
8001597 | Crooks | Aug 2011 | B2 |
8005749 | Ginsberg | Aug 2011 | B2 |
8006291 | Headley et al. | Aug 2011 | B2 |
8009873 | Chapman | Aug 2011 | B2 |
8019678 | Wright et al. | Sep 2011 | B2 |
8020763 | Kowalchyk et al. | Sep 2011 | B1 |
8024263 | Zarikian et al. | Sep 2011 | B2 |
8024264 | Chaudhuri et al. | Sep 2011 | B2 |
8024271 | Grant | Sep 2011 | B2 |
8027439 | Zoldi et al. | Sep 2011 | B2 |
8027518 | Baker et al. | Sep 2011 | B2 |
8027947 | Hinsz et al. | Sep 2011 | B2 |
8028168 | Smithies et al. | Sep 2011 | B2 |
8028326 | Palmer et al. | Sep 2011 | B2 |
8028329 | Whitcomb | Sep 2011 | B2 |
8028896 | Carter et al. | Oct 2011 | B2 |
8032448 | Anderson et al. | Oct 2011 | B2 |
8032449 | Hu et al. | Oct 2011 | B2 |
8032927 | Ross | Oct 2011 | B2 |
8037097 | Guo et al. | Oct 2011 | B2 |
8037512 | Wright et al. | Oct 2011 | B2 |
8041597 | Li et al. | Oct 2011 | B2 |
8042159 | Basner et al. | Oct 2011 | B2 |
8042193 | Piliouras | Oct 2011 | B1 |
8049596 | Sato | Nov 2011 | B2 |
8055667 | Levy | Nov 2011 | B2 |
8056128 | Dingle et al. | Nov 2011 | B1 |
8058972 | Mohanty | Nov 2011 | B2 |
8060424 | Kasower | Nov 2011 | B2 |
8060915 | Voice et al. | Nov 2011 | B2 |
8060916 | Bajaj et al. | Nov 2011 | B2 |
8065233 | Lee et al. | Nov 2011 | B2 |
8065264 | Achanta | Nov 2011 | B1 |
8065525 | Zilberman | Nov 2011 | B2 |
8069053 | Gervais et al. | Nov 2011 | B2 |
8069084 | Mackouse | Nov 2011 | B2 |
8069256 | Rasti | Nov 2011 | B2 |
8069485 | Carter | Nov 2011 | B2 |
8073785 | Candella et al. | Dec 2011 | B1 |
8078569 | Kennel | Dec 2011 | B2 |
8090648 | Zoldi et al. | Jan 2012 | B2 |
8095458 | Peterson et al. | Jan 2012 | B2 |
8104679 | Brown | Jan 2012 | B2 |
8116731 | Buhrmann et al. | Feb 2012 | B2 |
8121962 | Vaiciulis et al. | Feb 2012 | B2 |
8127986 | Taylor et al. | Mar 2012 | B1 |
8131615 | Diev et al. | Mar 2012 | B2 |
8151327 | Eisen | Apr 2012 | B2 |
8195549 | Kasower | Jun 2012 | B2 |
8201257 | Andres et al. | Jun 2012 | B1 |
8204774 | Chwast et al. | Jun 2012 | B2 |
8214262 | Semprevivo et al. | Jul 2012 | B1 |
8214285 | Hu et al. | Jul 2012 | B2 |
8224723 | Bosch et al. | Jul 2012 | B2 |
8225395 | Atwood et al. | Jul 2012 | B2 |
8234498 | Britti et al. | Jul 2012 | B2 |
8239677 | Colson | Aug 2012 | B2 |
8244629 | Lewis et al. | Aug 2012 | B2 |
8255978 | Dick | Aug 2012 | B2 |
8260914 | Ranjan | Sep 2012 | B1 |
8280805 | Abrahams et al. | Oct 2012 | B1 |
8280833 | Miltonberger | Oct 2012 | B2 |
8285613 | Coulter | Oct 2012 | B1 |
8285636 | Curry et al. | Oct 2012 | B2 |
8296225 | Maddipati et al. | Oct 2012 | B2 |
8296229 | Yellin et al. | Oct 2012 | B1 |
8296250 | Crooks et al. | Oct 2012 | B2 |
8312033 | McMillan | Nov 2012 | B1 |
8321952 | Spalink et al. | Nov 2012 | B2 |
8332338 | Vaiciulis et al. | Dec 2012 | B2 |
8346593 | Fanelli | Jan 2013 | B2 |
8355896 | Kumar et al. | Jan 2013 | B2 |
8355967 | Debie et al. | Jan 2013 | B2 |
8359278 | Domenikos et al. | Jan 2013 | B2 |
8364588 | Celka et al. | Jan 2013 | B2 |
8374973 | Herbrich et al. | Feb 2013 | B2 |
8386377 | Xiong et al. | Feb 2013 | B1 |
8429070 | Hu et al. | Apr 2013 | B2 |
8463919 | Tarquini et al. | Jun 2013 | B2 |
8468090 | Lesandro et al. | Jun 2013 | B2 |
8478674 | Kapczynski et al. | Jul 2013 | B1 |
8489479 | Slater et al. | Jul 2013 | B2 |
8510329 | Balkir et al. | Aug 2013 | B2 |
8515828 | Wolf et al. | Aug 2013 | B1 |
8515844 | Kasower | Aug 2013 | B2 |
8516439 | Brass et al. | Aug 2013 | B2 |
8543499 | Haggerty et al. | Sep 2013 | B2 |
8548137 | Zoldi et al. | Oct 2013 | B2 |
8548903 | Becker | Oct 2013 | B2 |
8549590 | de Villiers Prichard et al. | Oct 2013 | B1 |
8559607 | Zoldi et al. | Oct 2013 | B2 |
8567669 | Griegel et al. | Oct 2013 | B2 |
8578496 | Krishnappa | Nov 2013 | B1 |
8583593 | Achanta | Nov 2013 | B1 |
8626671 | Federgreen | Jan 2014 | B2 |
8630938 | Cheng et al. | Jan 2014 | B2 |
8639920 | Stack et al. | Jan 2014 | B2 |
8645301 | Vaiciulis et al. | Feb 2014 | B2 |
8671115 | Skurtovich, Jr. et al. | Mar 2014 | B2 |
8676684 | Newman et al. | Mar 2014 | B2 |
8676726 | Hore et al. | Mar 2014 | B2 |
8682755 | Bucholz et al. | Mar 2014 | B2 |
8683586 | Crooks | Mar 2014 | B2 |
8694427 | Maddipati et al. | Apr 2014 | B2 |
8707445 | Sher-Jan et al. | Apr 2014 | B2 |
8725613 | Celka et al. | May 2014 | B1 |
8763133 | Sher-Jan et al. | Jun 2014 | B2 |
8776225 | Pierson et al. | Jul 2014 | B2 |
8781953 | Kasower | Jul 2014 | B2 |
8781975 | Bennett et al. | Jul 2014 | B2 |
8793777 | Colson | Jul 2014 | B2 |
8805836 | Hore et al. | Aug 2014 | B2 |
8812387 | Samler et al. | Aug 2014 | B1 |
8819793 | Gottschalk, Jr. | Aug 2014 | B2 |
8824648 | Zoldi et al. | Sep 2014 | B2 |
8826393 | Eisen | Sep 2014 | B2 |
8862514 | Eisen | Oct 2014 | B2 |
8862526 | Miltonberger | Oct 2014 | B2 |
8909664 | Hopkins | Dec 2014 | B2 |
8918891 | Coggeshall et al. | Dec 2014 | B2 |
8949981 | Trollope | Feb 2015 | B1 |
9118646 | Pierson et al. | Aug 2015 | B2 |
9191403 | Zoldi et al. | Nov 2015 | B2 |
9194899 | Zoldi et al. | Nov 2015 | B2 |
9196004 | Eisen | Nov 2015 | B2 |
9210156 | Little et al. | Dec 2015 | B1 |
9235728 | Gottschalk, Jr. et al. | Jan 2016 | B2 |
9251541 | Celka et al. | Feb 2016 | B2 |
9256624 | Skurtovich, Jr. et al. | Feb 2016 | B2 |
9280658 | Coggeshall et al. | Mar 2016 | B2 |
9361597 | Britton et al. | Jun 2016 | B2 |
9367520 | Zhao et al. | Jun 2016 | B2 |
9390384 | Eisen | Jul 2016 | B2 |
9412141 | Prichard et al. | Aug 2016 | B2 |
9483650 | Sher-Jan et al. | Nov 2016 | B2 |
9489497 | MaGill et al. | Nov 2016 | B2 |
9531738 | Zoldi et al. | Dec 2016 | B2 |
9558368 | Gottschalk, Jr. et al. | Jan 2017 | B2 |
9595066 | Samler et al. | Mar 2017 | B2 |
9652802 | Kasower | May 2017 | B1 |
9704195 | Zoldi | Jul 2017 | B2 |
9710523 | Skurtovich, Jr. et al. | Jul 2017 | B2 |
9710868 | Gottschalk, Jr. et al. | Jul 2017 | B2 |
9754256 | Britton et al. | Sep 2017 | B2 |
9754311 | Eisen | Sep 2017 | B2 |
9760885 | Ramalingam et al. | Sep 2017 | B1 |
9773227 | Zoldi et al. | Sep 2017 | B2 |
9781147 | Sher-Jan et al. | Oct 2017 | B2 |
9953321 | Zoldi et al. | Apr 2018 | B2 |
10043213 | Straub et al. | Aug 2018 | B2 |
10089679 | Eisen | Oct 2018 | B2 |
10089686 | Straub et al. | Oct 2018 | B2 |
10102530 | Zoldi et al. | Oct 2018 | B2 |
10115153 | Zoldi et al. | Oct 2018 | B2 |
10152736 | Yang et al. | Dec 2018 | B2 |
10217163 | Straub et al. | Feb 2019 | B2 |
10242540 | Chen et al. | Mar 2019 | B2 |
10339527 | Coleman et al. | Jul 2019 | B1 |
10373061 | Kennel et al. | Aug 2019 | B2 |
10430604 | Spinelli et al. | Oct 2019 | B2 |
10438308 | Prichard et al. | Oct 2019 | B2 |
10497034 | Yang et al. | Dec 2019 | B2 |
10510025 | Zoldi et al. | Dec 2019 | B2 |
10528948 | Zoldi et al. | Jan 2020 | B2 |
10579938 | Zoldi et al. | Mar 2020 | B2 |
10592982 | Samler et al. | Mar 2020 | B2 |
10593004 | Gottschalk, Jr. et al. | Mar 2020 | B2 |
10692058 | Zoldi et al. | Jun 2020 | B2 |
10699028 | Kennedy et al. | Jun 2020 | B1 |
10713711 | Zoldi | Jul 2020 | B2 |
10769290 | Crawford et al. | Sep 2020 | B2 |
10791136 | Zoldi et al. | Sep 2020 | B2 |
10896381 | Zoldi et al. | Jan 2021 | B2 |
10896472 | Stack et al. | Jan 2021 | B1 |
10902426 | Zoldi et al. | Jan 2021 | B2 |
10909617 | Kasower | Feb 2021 | B2 |
10977363 | Leitner et al. | Apr 2021 | B2 |
10990979 | Coleman et al. | Apr 2021 | B1 |
10999298 | Eisen | May 2021 | B2 |
11023963 | Zoldi et al. | Jun 2021 | B2 |
11030562 | Dean et al. | Jun 2021 | B1 |
11037229 | Zoldi et al. | Jun 2021 | B2 |
20010000536 | Tarin | Apr 2001 | A1 |
20010014868 | Herz et al. | Aug 2001 | A1 |
20010014878 | Mitra et al. | Aug 2001 | A1 |
20010027413 | Bhutta | Oct 2001 | A1 |
20010029470 | Schultz et al. | Oct 2001 | A1 |
20010034631 | Kiselik | Oct 2001 | A1 |
20010039523 | Iwamoto | Nov 2001 | A1 |
20010039532 | Coleman, Jr. et al. | Nov 2001 | A1 |
20010049620 | Blasko | Dec 2001 | A1 |
20020004736 | Roundtree et al. | Jan 2002 | A1 |
20020010664 | Rabideau et al. | Jan 2002 | A1 |
20020010684 | Moskowitz | Jan 2002 | A1 |
20020010701 | Kosciuszko | Jan 2002 | A1 |
20020013899 | Faul | Jan 2002 | A1 |
20020019804 | Sutton | Feb 2002 | A1 |
20020019938 | Aarons | Feb 2002 | A1 |
20020026519 | Itabashi et al. | Feb 2002 | A1 |
20020032635 | Harris et al. | Mar 2002 | A1 |
20020035684 | Vogel et al. | Mar 2002 | A1 |
20020040344 | Preiser et al. | Apr 2002 | A1 |
20020042879 | Gould et al. | Apr 2002 | A1 |
20020049738 | Epstein | Apr 2002 | A1 |
20020052841 | Guthrie et al. | May 2002 | A1 |
20020052884 | Farber et al. | May 2002 | A1 |
20020059521 | Tasler | May 2002 | A1 |
20020062185 | Runge et al. | May 2002 | A1 |
20020062281 | Singhal | May 2002 | A1 |
20020069122 | Yun et al. | Jun 2002 | A1 |
20020073044 | Singhal | Jun 2002 | A1 |
20020077178 | Oberberger et al. | Jun 2002 | A1 |
20020077964 | Brody et al. | Jun 2002 | A1 |
20020080256 | Bates et al. | Jun 2002 | A1 |
20020087460 | Hornung | Jul 2002 | A1 |
20020091650 | Ellis | Jul 2002 | A1 |
20020099649 | Lee et al. | Jul 2002 | A1 |
20020099824 | Bender et al. | Jul 2002 | A1 |
20020111910 | Walsh | Aug 2002 | A1 |
20020119824 | Allen | Aug 2002 | A1 |
20020128962 | Kasower | Sep 2002 | A1 |
20020130176 | Suzuki | Sep 2002 | A1 |
20020138417 | Lawrence | Sep 2002 | A1 |
20020138751 | Dutta | Sep 2002 | A1 |
20020147695 | Khedkar et al. | Oct 2002 | A1 |
20020156676 | Ahrens et al. | Oct 2002 | A1 |
20020161664 | Shaya et al. | Oct 2002 | A1 |
20020161711 | Sartor et al. | Oct 2002 | A1 |
20020169747 | Chapman et al. | Nov 2002 | A1 |
20020173994 | Ferguson, III | Nov 2002 | A1 |
20020178112 | Goeller et al. | Nov 2002 | A1 |
20020184509 | Scheidt et al. | Dec 2002 | A1 |
20020188544 | Wizon et al. | Dec 2002 | A1 |
20020198824 | Cook | Dec 2002 | A1 |
20030004879 | Demoff et al. | Jan 2003 | A1 |
20030009418 | Green et al. | Jan 2003 | A1 |
20030009426 | Ruiz-Sanchez | Jan 2003 | A1 |
20030018549 | Fei et al. | Jan 2003 | A1 |
20030033261 | Knegendorf | Feb 2003 | A1 |
20030046554 | Leydier et al. | Mar 2003 | A1 |
20030048904 | Wang et al. | Mar 2003 | A1 |
20030050882 | Degen et al. | Mar 2003 | A1 |
20030057278 | Wong | Mar 2003 | A1 |
20030061163 | Durfield | Mar 2003 | A1 |
20030065563 | Elliott et al. | Apr 2003 | A1 |
20030070101 | Buscemi | Apr 2003 | A1 |
20030078877 | Beirne et al. | Apr 2003 | A1 |
20030093366 | Halper et al. | May 2003 | A1 |
20030097320 | Gordon | May 2003 | A1 |
20030097342 | Whittingtom | May 2003 | A1 |
20030105696 | Kalotay et al. | Jun 2003 | A1 |
20030115133 | Bian | Jun 2003 | A1 |
20030143980 | Choi et al. | Jul 2003 | A1 |
20030149744 | Bierre et al. | Aug 2003 | A1 |
20030153299 | Perfit et al. | Aug 2003 | A1 |
20030158751 | Suresh et al. | Aug 2003 | A1 |
20030158960 | Engberg | Aug 2003 | A1 |
20030163416 | Kitajima | Aug 2003 | A1 |
20030182214 | Taylor | Sep 2003 | A1 |
20030195859 | Lawrence | Oct 2003 | A1 |
20030200447 | Sjoblom | Oct 2003 | A1 |
20030208428 | Raynes et al. | Nov 2003 | A1 |
20030212654 | Harper et al. | Nov 2003 | A1 |
20030222500 | Bayeur et al. | Dec 2003 | A1 |
20030225656 | Aberman et al. | Dec 2003 | A1 |
20030225692 | Bosch et al. | Dec 2003 | A1 |
20030225742 | Tenner et al. | Dec 2003 | A1 |
20030229892 | Sardera | Dec 2003 | A1 |
20030233278 | Marshall | Dec 2003 | A1 |
20030236738 | Lange et al. | Dec 2003 | A1 |
20040004117 | Suzuki | Jan 2004 | A1 |
20040005912 | Hubbe et al. | Jan 2004 | A1 |
20040006488 | Fitall et al. | Jan 2004 | A1 |
20040010698 | Rolfe | Jan 2004 | A1 |
20040024709 | Yu et al. | Feb 2004 | A1 |
20040026496 | Zuili | Feb 2004 | A1 |
20040030649 | Nelson et al. | Feb 2004 | A1 |
20040039586 | Garvey et al. | Feb 2004 | A1 |
20040044628 | Mathew et al. | Mar 2004 | A1 |
20040054619 | Watson et al. | Mar 2004 | A1 |
20040059653 | Verkuylen et al. | Mar 2004 | A1 |
20040064401 | Palaghita et al. | Apr 2004 | A1 |
20040078324 | Lonnberg et al. | Apr 2004 | A1 |
20040098625 | Lagadec et al. | May 2004 | A1 |
20040103147 | Flesher et al. | May 2004 | A1 |
20040107363 | Monteverde | Jun 2004 | A1 |
20040110119 | Riconda et al. | Jun 2004 | A1 |
20040111305 | Gavan et al. | Jun 2004 | A1 |
20040111335 | Black et al. | Jun 2004 | A1 |
20040111358 | Lange et al. | Jun 2004 | A1 |
20040117235 | Shacham | Jun 2004 | A1 |
20040128227 | Whipple et al. | Jul 2004 | A1 |
20040128232 | Descloux | Jul 2004 | A1 |
20040133440 | Carolan et al. | Jul 2004 | A1 |
20040139025 | Coleman | Jul 2004 | A1 |
20040143526 | Monasterio et al. | Jul 2004 | A1 |
20040149820 | Zuili | Aug 2004 | A1 |
20040149827 | Zuili | Aug 2004 | A1 |
20040153330 | Miller et al. | Aug 2004 | A1 |
20040153448 | Cheng et al. | Aug 2004 | A1 |
20040153521 | Kogo | Aug 2004 | A1 |
20040153656 | Gluts et al. | Aug 2004 | A1 |
20040158520 | Noh | Aug 2004 | A1 |
20040158523 | Dort | Aug 2004 | A1 |
20040158723 | Root | Aug 2004 | A1 |
20040167793 | Masuoka et al. | Aug 2004 | A1 |
20040177046 | Ogram | Sep 2004 | A1 |
20040193538 | Raines | Sep 2004 | A1 |
20040199456 | Flint et al. | Oct 2004 | A1 |
20040199462 | Starrs | Oct 2004 | A1 |
20040199789 | Shaw et al. | Oct 2004 | A1 |
20040204948 | Singletary et al. | Oct 2004 | A1 |
20040220896 | Finlay et al. | Nov 2004 | A1 |
20040225594 | Nolan, III et al. | Nov 2004 | A1 |
20040230448 | Schaich | Nov 2004 | A1 |
20040230527 | Hansen et al. | Nov 2004 | A1 |
20040230534 | McGough | Nov 2004 | A1 |
20040230538 | Clifton et al. | Nov 2004 | A1 |
20040234117 | Tibor | Nov 2004 | A1 |
20040243514 | Wankmueller | Dec 2004 | A1 |
20040243518 | Clifton et al. | Dec 2004 | A1 |
20040243567 | Levy | Dec 2004 | A1 |
20040250085 | Tattan et al. | Dec 2004 | A1 |
20040255127 | Arnouse | Dec 2004 | A1 |
20040260922 | Goodman et al. | Dec 2004 | A1 |
20050001028 | Zuili | Jan 2005 | A1 |
20050005168 | Dick | Jan 2005 | A1 |
20050010513 | Duckworth et al. | Jan 2005 | A1 |
20050010780 | Kane et al. | Jan 2005 | A1 |
20050021476 | Candella et al. | Jan 2005 | A1 |
20050021519 | Ghouri | Jan 2005 | A1 |
20050027983 | Klawon | Feb 2005 | A1 |
20050027995 | Menschik et al. | Feb 2005 | A1 |
20050038726 | Salomon et al. | Feb 2005 | A1 |
20050038737 | Norris | Feb 2005 | A1 |
20050039086 | Krishnamurthy et al. | Feb 2005 | A1 |
20050049991 | Aggarwal | Mar 2005 | A1 |
20050050577 | Westbrook et al. | Mar 2005 | A1 |
20050055231 | Lee | Mar 2005 | A1 |
20050058262 | Timmins et al. | Mar 2005 | A1 |
20050065874 | Lefner et al. | Mar 2005 | A1 |
20050065950 | Chaganti et al. | Mar 2005 | A1 |
20050071282 | Lu et al. | Mar 2005 | A1 |
20050075985 | Cartmell | Apr 2005 | A1 |
20050081052 | Washington | Apr 2005 | A1 |
20050086161 | Gallant | Apr 2005 | A1 |
20050091164 | Varble | Apr 2005 | A1 |
20050097039 | Kulcsar et al. | May 2005 | A1 |
20050097051 | Madill, Jr. et al. | May 2005 | A1 |
20050097364 | Edeki et al. | May 2005 | A1 |
20050102206 | Savasoglu et al. | May 2005 | A1 |
20050105719 | Huda | May 2005 | A1 |
20050125226 | Magee | Jun 2005 | A1 |
20050125686 | Brandt | Jun 2005 | A1 |
20050137899 | Davies et al. | Jun 2005 | A1 |
20050138391 | Mandalia et al. | Jun 2005 | A1 |
20050144143 | Freiberg | Jun 2005 | A1 |
20050154664 | Guy et al. | Jul 2005 | A1 |
20050154665 | Kerr | Jul 2005 | A1 |
20050154671 | Doan et al. | Jul 2005 | A1 |
20050165667 | Cox | Jul 2005 | A1 |
20050187948 | Monitzer et al. | Aug 2005 | A1 |
20050192008 | Desai et al. | Sep 2005 | A1 |
20050197953 | Broadbent et al. | Sep 2005 | A1 |
20050203885 | Chenevich et al. | Sep 2005 | A1 |
20050216953 | Ellingson | Sep 2005 | A1 |
20050229007 | Bolle et al. | Oct 2005 | A1 |
20050240578 | Biederman et al. | Oct 2005 | A1 |
20050242173 | Suzuki | Nov 2005 | A1 |
20050246338 | Bird | Nov 2005 | A1 |
20050251474 | Shinn et al. | Nov 2005 | A1 |
20050256809 | Sadri | Nov 2005 | A1 |
20050262014 | Fickes | Nov 2005 | A1 |
20050262158 | Sauermann | Nov 2005 | A1 |
20050273333 | Morin et al. | Dec 2005 | A1 |
20050273442 | Bennett et al. | Dec 2005 | A1 |
20050278542 | Pierson et al. | Dec 2005 | A1 |
20050279827 | Mascavage et al. | Dec 2005 | A1 |
20050279869 | Barklage | Dec 2005 | A1 |
20060004663 | Singhal | Jan 2006 | A1 |
20060014129 | Coleman et al. | Jan 2006 | A1 |
20060020611 | Gilbert et al. | Jan 2006 | A1 |
20060020814 | Lieblich | Jan 2006 | A1 |
20060032909 | Seegar | Feb 2006 | A1 |
20060041464 | Powers et al. | Feb 2006 | A1 |
20060045105 | Dobosz et al. | Mar 2006 | A1 |
20060047605 | Ahmad | Mar 2006 | A1 |
20060059073 | Walzak | Mar 2006 | A1 |
20060059110 | Madhok et al. | Mar 2006 | A1 |
20060064374 | Helsper et al. | Mar 2006 | A1 |
20060074798 | Din et al. | Apr 2006 | A1 |
20060074986 | Mallalieu et al. | Apr 2006 | A1 |
20060074991 | Lussier et al. | Apr 2006 | A1 |
20060080230 | Freiberg | Apr 2006 | A1 |
20060080263 | Willis et al. | Apr 2006 | A1 |
20060085454 | Blegen et al. | Apr 2006 | A1 |
20060089905 | Song et al. | Apr 2006 | A1 |
20060101508 | Taylor | May 2006 | A1 |
20060106605 | Saunders et al. | May 2006 | A1 |
20060112279 | Cohen et al. | May 2006 | A1 |
20060112280 | Cohen et al. | May 2006 | A1 |
20060129428 | Wennberg | Jun 2006 | A1 |
20060129481 | Bhatt et al. | Jun 2006 | A1 |
20060129840 | Milgramm et al. | Jun 2006 | A1 |
20060131390 | Kim | Jun 2006 | A1 |
20060136332 | Ziegler | Jun 2006 | A1 |
20060140460 | Coutts | Jun 2006 | A1 |
20060143073 | Engel et al. | Jun 2006 | A1 |
20060144924 | Stover | Jul 2006 | A1 |
20060149580 | Helsper et al. | Jul 2006 | A1 |
20060149674 | Cook et al. | Jul 2006 | A1 |
20060155573 | Hartunian | Jul 2006 | A1 |
20060161435 | Atef et al. | Jul 2006 | A1 |
20060161592 | Ertoz et al. | Jul 2006 | A1 |
20060173776 | Shalley et al. | Aug 2006 | A1 |
20060173792 | Glass | Aug 2006 | A1 |
20060177226 | Ellis, III | Aug 2006 | A1 |
20060178971 | Owen et al. | Aug 2006 | A1 |
20060179004 | Fuchs | Aug 2006 | A1 |
20060184440 | Britti et al. | Aug 2006 | A1 |
20060184585 | Grear et al. | Aug 2006 | A1 |
20060195351 | Bayburtian | Aug 2006 | A1 |
20060200855 | Willis | Sep 2006 | A1 |
20060202012 | Grano et al. | Sep 2006 | A1 |
20060204051 | Holland, IV | Sep 2006 | A1 |
20060206725 | Milgramm et al. | Sep 2006 | A1 |
20060212386 | Willey et al. | Sep 2006 | A1 |
20060218069 | Aberman et al. | Sep 2006 | A1 |
20060229961 | Lyftogt et al. | Oct 2006 | A1 |
20060239512 | Petrillo | Oct 2006 | A1 |
20060239513 | Song et al. | Oct 2006 | A1 |
20060242046 | Haggerty et al. | Oct 2006 | A1 |
20060242047 | Haggerty et al. | Oct 2006 | A1 |
20060253358 | Delgrosso et al. | Nov 2006 | A1 |
20060253583 | Dixon et al. | Nov 2006 | A1 |
20060255914 | Westman | Nov 2006 | A1 |
20060262929 | Vatanen et al. | Nov 2006 | A1 |
20060265243 | Racho et al. | Nov 2006 | A1 |
20060271456 | Romain et al. | Nov 2006 | A1 |
20060271457 | Romain et al. | Nov 2006 | A1 |
20060271633 | Adler | Nov 2006 | A1 |
20060273158 | Suzuki | Dec 2006 | A1 |
20060277043 | Tomes et al. | Dec 2006 | A1 |
20060277092 | Williams | Dec 2006 | A1 |
20060282285 | Helsper et al. | Dec 2006 | A1 |
20060282372 | Endres et al. | Dec 2006 | A1 |
20060282395 | Leibowitz | Dec 2006 | A1 |
20060287765 | Kraft | Dec 2006 | A1 |
20060288090 | Kraft | Dec 2006 | A1 |
20060294023 | Lu | Dec 2006 | A1 |
20070005508 | Chiang | Jan 2007 | A1 |
20070011100 | Libin et al. | Jan 2007 | A1 |
20070016500 | Chatterji et al. | Jan 2007 | A1 |
20070016521 | Wang | Jan 2007 | A1 |
20070016522 | Wang | Jan 2007 | A1 |
20070022141 | Singleton et al. | Jan 2007 | A1 |
20070022297 | Britti et al. | Jan 2007 | A1 |
20070038483 | Wood | Feb 2007 | A1 |
20070038497 | Britti et al. | Feb 2007 | A1 |
20070038568 | Greene et al. | Feb 2007 | A1 |
20070040017 | Kozlay | Feb 2007 | A1 |
20070040019 | Berghel et al. | Feb 2007 | A1 |
20070043577 | Kasower | Feb 2007 | A1 |
20070047770 | Swope et al. | Mar 2007 | A1 |
20070048765 | Abramson | Mar 2007 | A1 |
20070050638 | Rasti | Mar 2007 | A1 |
20070059442 | Sabeta | Mar 2007 | A1 |
20070061273 | Greene et al. | Mar 2007 | A1 |
20070067207 | Haggerty et al. | Mar 2007 | A1 |
20070067297 | Kublickis | Mar 2007 | A1 |
20070067437 | Sindambiwe | Mar 2007 | A1 |
20070072190 | Aggarwal | Mar 2007 | A1 |
20070073622 | Kane | Mar 2007 | A1 |
20070073630 | Greene et al. | Mar 2007 | A1 |
20070078786 | Bous et al. | Apr 2007 | A1 |
20070078908 | Rohatgi et al. | Apr 2007 | A1 |
20070078985 | Shao et al. | Apr 2007 | A1 |
20070083460 | Bachenheimer | Apr 2007 | A1 |
20070087795 | Aletto et al. | Apr 2007 | A1 |
20070093234 | Willis et al. | Apr 2007 | A1 |
20070094137 | Phillips et al. | Apr 2007 | A1 |
20070094264 | Nair | Apr 2007 | A1 |
20070100774 | Abdon | May 2007 | A1 |
20070106582 | Baker et al. | May 2007 | A1 |
20070106611 | Larsen | May 2007 | A1 |
20070107050 | Selvarajan | May 2007 | A1 |
20070109103 | Jedrey et al. | May 2007 | A1 |
20070110282 | Millsapp | May 2007 | A1 |
20070112667 | Rucker | May 2007 | A1 |
20070112668 | Celano et al. | May 2007 | A1 |
20070118393 | Rosen et al. | May 2007 | A1 |
20070130070 | Williams | Jun 2007 | A1 |
20070155411 | Morrison | Jul 2007 | A1 |
20070157299 | Hare | Jul 2007 | A1 |
20070160458 | Yen | Jul 2007 | A1 |
20070168246 | Haggerty et al. | Jul 2007 | A1 |
20070168480 | Biggs et al. | Jul 2007 | A1 |
20070174208 | Black et al. | Jul 2007 | A1 |
20070179903 | Seinfeld et al. | Aug 2007 | A1 |
20070180209 | Tallman | Aug 2007 | A1 |
20070180263 | Delgrosso et al. | Aug 2007 | A1 |
20070186276 | McRae et al. | Aug 2007 | A1 |
20070192248 | West | Aug 2007 | A1 |
20070192853 | Shraim et al. | Aug 2007 | A1 |
20070198410 | Labgold et al. | Aug 2007 | A1 |
20070205266 | Carr et al. | Sep 2007 | A1 |
20070208669 | Rivette et al. | Sep 2007 | A1 |
20070214037 | Shubert et al. | Sep 2007 | A1 |
20070214365 | Cornett et al. | Sep 2007 | A1 |
20070219928 | Madhogarhia | Sep 2007 | A1 |
20070220594 | Tulsyan | Sep 2007 | A1 |
20070220611 | Socolow et al. | Sep 2007 | A1 |
20070226093 | Chan et al. | Sep 2007 | A1 |
20070226129 | Liao et al. | Sep 2007 | A1 |
20070233614 | McNelley et al. | Oct 2007 | A1 |
20070234427 | Gardner et al. | Oct 2007 | A1 |
20070244782 | Chimento | Oct 2007 | A1 |
20070244807 | Andringa et al. | Oct 2007 | A1 |
20070250459 | Schwarz et al. | Oct 2007 | A1 |
20070250704 | Hallam-Baker | Oct 2007 | A1 |
20070250920 | Lindsay | Oct 2007 | A1 |
20070261114 | Pomerantsev | Nov 2007 | A1 |
20070266439 | Kraft | Nov 2007 | A1 |
20070282730 | Carpenter et al. | Dec 2007 | A1 |
20070288355 | Roland et al. | Dec 2007 | A1 |
20070288360 | Seeklus | Dec 2007 | A1 |
20070288559 | Parsadayan | Dec 2007 | A1 |
20070291995 | Rivera | Dec 2007 | A1 |
20070292006 | Johnson | Dec 2007 | A1 |
20070294104 | Boaz et al. | Dec 2007 | A1 |
20070299759 | Kelly | Dec 2007 | A1 |
20080010203 | Grant | Jan 2008 | A1 |
20080010206 | Coleman | Jan 2008 | A1 |
20080010683 | Baddour et al. | Jan 2008 | A1 |
20080010687 | Gonen et al. | Jan 2008 | A1 |
20080015887 | Drabek et al. | Jan 2008 | A1 |
20080021804 | Deckoff | Jan 2008 | A1 |
20080027857 | Benson | Jan 2008 | A1 |
20080027858 | Benson | Jan 2008 | A1 |
20080033742 | Bernasconi | Feb 2008 | A1 |
20080052182 | Marshall | Feb 2008 | A1 |
20080052244 | Tsuei et al. | Feb 2008 | A1 |
20080059224 | Schechter | Mar 2008 | A1 |
20080059236 | Cartier | Mar 2008 | A1 |
20080059352 | Chandran | Mar 2008 | A1 |
20080059364 | Tidwell et al. | Mar 2008 | A1 |
20080059366 | Fou | Mar 2008 | A1 |
20080059449 | Webster et al. | Mar 2008 | A1 |
20080063172 | Ahuja et al. | Mar 2008 | A1 |
20080066188 | Kwak | Mar 2008 | A1 |
20080071882 | Hering et al. | Mar 2008 | A1 |
20080076386 | Khetawat et al. | Mar 2008 | A1 |
20080077526 | Arumugam | Mar 2008 | A1 |
20080098222 | Zilberman | Apr 2008 | A1 |
20080103798 | Domenikos et al. | May 2008 | A1 |
20080103799 | Domenikos et al. | May 2008 | A1 |
20080103800 | Domenikos | May 2008 | A1 |
20080103811 | Sosa | May 2008 | A1 |
20080103972 | Lanc | May 2008 | A1 |
20080104021 | Cai et al. | May 2008 | A1 |
20080104672 | Lunde et al. | May 2008 | A1 |
20080109875 | Kraft | May 2008 | A1 |
20080114837 | Biggs et al. | May 2008 | A1 |
20080115191 | Kim et al. | May 2008 | A1 |
20080120237 | Lin | May 2008 | A1 |
20080126116 | Singhai | May 2008 | A1 |
20080126233 | Hogan | May 2008 | A1 |
20080140576 | Lewis et al. | Jun 2008 | A1 |
20080147454 | Walker et al. | Jun 2008 | A1 |
20080154758 | Schattmaier et al. | Jun 2008 | A1 |
20080162202 | Khanna et al. | Jul 2008 | A1 |
20080162383 | Kraft | Jul 2008 | A1 |
20080167883 | Thavildar Khazaneh | Jul 2008 | A1 |
20080175360 | Schwarz et al. | Jul 2008 | A1 |
20080177655 | Zalik | Jul 2008 | A1 |
20080177841 | Sinn et al. | Jul 2008 | A1 |
20080189789 | Lamontagne | Aug 2008 | A1 |
20080195548 | Chu et al. | Aug 2008 | A1 |
20080205655 | Wilkins et al. | Aug 2008 | A1 |
20080208548 | Metzger et al. | Aug 2008 | A1 |
20080208610 | Thomas et al. | Aug 2008 | A1 |
20080208726 | Tsantes et al. | Aug 2008 | A1 |
20080208873 | Boehmer | Aug 2008 | A1 |
20080217400 | Portano | Sep 2008 | A1 |
20080228635 | Megdal et al. | Sep 2008 | A1 |
20080228775 | Abhyanker et al. | Sep 2008 | A1 |
20080243680 | Megdal et al. | Oct 2008 | A1 |
20080244717 | Jelatis et al. | Oct 2008 | A1 |
20080255922 | Feldman et al. | Oct 2008 | A1 |
20080255992 | Lin | Oct 2008 | A1 |
20080256613 | Grover | Oct 2008 | A1 |
20080263058 | Peden | Oct 2008 | A1 |
20080270209 | Mauseth et al. | Oct 2008 | A1 |
20080281737 | Fajardo | Nov 2008 | A1 |
20080281743 | Pettit | Nov 2008 | A1 |
20080282324 | Hoal | Nov 2008 | A1 |
20080288382 | Smith et al. | Nov 2008 | A1 |
20080288430 | Friedlander et al. | Nov 2008 | A1 |
20080288790 | Wilson | Nov 2008 | A1 |
20080294540 | Celka et al. | Nov 2008 | A1 |
20080294689 | Metzger et al. | Nov 2008 | A1 |
20080296367 | Parkinson | Dec 2008 | A1 |
20080296382 | Connell, II et al. | Dec 2008 | A1 |
20080300877 | Gilbert et al. | Dec 2008 | A1 |
20080306750 | Wunder et al. | Dec 2008 | A1 |
20080319889 | Hammad | Dec 2008 | A1 |
20080320575 | Gelb et al. | Dec 2008 | A1 |
20090007220 | Ormazabal et al. | Jan 2009 | A1 |
20090018934 | Peng et al. | Jan 2009 | A1 |
20090021349 | Errico et al. | Jan 2009 | A1 |
20090024417 | Marks et al. | Jan 2009 | A1 |
20090024505 | Patel et al. | Jan 2009 | A1 |
20090024636 | Shiloh | Jan 2009 | A1 |
20090024663 | McGovern | Jan 2009 | A1 |
20090026270 | Connell, II et al. | Jan 2009 | A1 |
20090031426 | Dal Lago et al. | Jan 2009 | A1 |
20090043637 | Eder | Feb 2009 | A1 |
20090043691 | Kasower | Feb 2009 | A1 |
20090044279 | Crawford et al. | Feb 2009 | A1 |
20090048877 | Binns et al. | Feb 2009 | A1 |
20090048957 | Celano | Feb 2009 | A1 |
20090055894 | Lorsch | Feb 2009 | A1 |
20090079539 | Johnson | Mar 2009 | A1 |
20090094311 | Awadallah et al. | Apr 2009 | A1 |
20090094674 | Schwartz et al. | Apr 2009 | A1 |
20090099960 | Robida et al. | Apr 2009 | A1 |
20090106150 | Pelegero et al. | Apr 2009 | A1 |
20090106153 | Ezra | Apr 2009 | A1 |
20090106846 | Dupray et al. | Apr 2009 | A1 |
20090112650 | Iwane | Apr 2009 | A1 |
20090119106 | Rajakumar et al. | May 2009 | A1 |
20090119299 | Rhodes | May 2009 | A1 |
20090125369 | Kloostra et al. | May 2009 | A1 |
20090125439 | Zarikian et al. | May 2009 | A1 |
20090125463 | Hido | May 2009 | A1 |
20090126013 | Atwood et al. | May 2009 | A1 |
20090138335 | Lieberman | May 2009 | A1 |
20090138391 | Dudley et al. | May 2009 | A1 |
20090141318 | Hughes | Jun 2009 | A1 |
20090150166 | Leite et al. | Jun 2009 | A1 |
20090150238 | Marsh et al. | Jun 2009 | A1 |
20090151005 | Bell et al. | Jun 2009 | A1 |
20090158404 | Hahn et al. | Jun 2009 | A1 |
20090164380 | Brown | Jun 2009 | A1 |
20090172815 | Gu et al. | Jul 2009 | A1 |
20090177670 | Grenier et al. | Jul 2009 | A1 |
20090182653 | Zimiles | Jul 2009 | A1 |
20090183259 | Rinek et al. | Jul 2009 | A1 |
20090199264 | Lang | Aug 2009 | A1 |
20090205032 | Hinton et al. | Aug 2009 | A1 |
20090206993 | Di Mambro et al. | Aug 2009 | A1 |
20090216560 | Siegel | Aug 2009 | A1 |
20090216747 | Li et al. | Aug 2009 | A1 |
20090217342 | Nadler | Aug 2009 | A1 |
20090222308 | Zoldi et al. | Sep 2009 | A1 |
20090222362 | Stood et al. | Sep 2009 | A1 |
20090222373 | Choudhuri et al. | Sep 2009 | A1 |
20090222374 | Choudhuri et al. | Sep 2009 | A1 |
20090222375 | Choudhuri et al. | Sep 2009 | A1 |
20090222376 | Choudhuri et al. | Sep 2009 | A1 |
20090222377 | Choudhuri et al. | Sep 2009 | A1 |
20090222378 | Choudhuri et al. | Sep 2009 | A1 |
20090222379 | Choudhuri et al. | Sep 2009 | A1 |
20090222380 | Choudhuri et al. | Sep 2009 | A1 |
20090222897 | Carow et al. | Sep 2009 | A1 |
20090224875 | Rabinowitz et al. | Sep 2009 | A1 |
20090224889 | Aggarwal et al. | Sep 2009 | A1 |
20090226056 | Vlachos et al. | Sep 2009 | A1 |
20090234665 | Conkel | Sep 2009 | A1 |
20090234738 | Britton et al. | Sep 2009 | A1 |
20090240609 | Cho et al. | Sep 2009 | A1 |
20090241168 | Readshaw | Sep 2009 | A1 |
20090241173 | Troyansky | Sep 2009 | A1 |
20090248198 | Siegel et al. | Oct 2009 | A1 |
20090248497 | Hueter | Oct 2009 | A1 |
20090248567 | Haggerty et al. | Oct 2009 | A1 |
20090248568 | Haggerty et al. | Oct 2009 | A1 |
20090248569 | Haggerty et al. | Oct 2009 | A1 |
20090248570 | Haggerty et al. | Oct 2009 | A1 |
20090248571 | Haggerty et al. | Oct 2009 | A1 |
20090248572 | Haggerty et al. | Oct 2009 | A1 |
20090248573 | Haggerty et al. | Oct 2009 | A1 |
20090249451 | Su et al. | Oct 2009 | A1 |
20090254476 | Sharma et al. | Oct 2009 | A1 |
20090254484 | Forero et al. | Oct 2009 | A1 |
20090254656 | Vignisson et al. | Oct 2009 | A1 |
20090254971 | Herz et al. | Oct 2009 | A1 |
20090257595 | De Cesare et al. | Oct 2009 | A1 |
20090259470 | Chang | Oct 2009 | A1 |
20090259560 | Bachenheimer | Oct 2009 | A1 |
20090259588 | Lindsay | Oct 2009 | A1 |
20090259855 | de Cesare et al. | Oct 2009 | A1 |
20090261189 | Ellis, Jr. | Oct 2009 | A1 |
20090270126 | Liu | Oct 2009 | A1 |
20090271265 | Lay et al. | Oct 2009 | A1 |
20090271617 | Song et al. | Oct 2009 | A1 |
20090272801 | Connell, II et al. | Nov 2009 | A1 |
20090276244 | Baldwin, Jr. et al. | Nov 2009 | A1 |
20090281945 | Shakkarwar | Nov 2009 | A1 |
20090281951 | Shakkarwar | Nov 2009 | A1 |
20090289110 | Regen et al. | Nov 2009 | A1 |
20090300066 | Guo et al. | Dec 2009 | A1 |
20090307778 | Mardikar | Dec 2009 | A1 |
20090326972 | Washington | Dec 2009 | A1 |
20090327054 | Yao et al. | Dec 2009 | A1 |
20090328173 | Jakobson et al. | Dec 2009 | A1 |
20100024037 | Grzymala-Busse et al. | Jan 2010 | A1 |
20100030677 | Melik-Aslanian et al. | Feb 2010 | A1 |
20100031030 | Kao et al. | Feb 2010 | A1 |
20100037147 | Champion et al. | Feb 2010 | A1 |
20100037308 | Lin et al. | Feb 2010 | A1 |
20100042526 | Martinov | Feb 2010 | A1 |
20100043055 | Baumgart | Feb 2010 | A1 |
20100049803 | Ogilvie et al. | Feb 2010 | A1 |
20100070620 | Awadallah et al. | Mar 2010 | A1 |
20100077006 | El Emam et al. | Mar 2010 | A1 |
20100085146 | Johnson | Apr 2010 | A1 |
20100088233 | Tattan et al. | Apr 2010 | A1 |
20100088338 | Pavoni, Jr. et al. | Apr 2010 | A1 |
20100094664 | Bush et al. | Apr 2010 | A1 |
20100094758 | Chamberlain et al. | Apr 2010 | A1 |
20100094767 | Miltonberger | Apr 2010 | A1 |
20100094768 | Miltonberger | Apr 2010 | A1 |
20100094910 | Bayliss | Apr 2010 | A1 |
20100095357 | Willis et al. | Apr 2010 | A1 |
20100100406 | Lim | Apr 2010 | A1 |
20100100945 | Ozzie et al. | Apr 2010 | A1 |
20100107225 | Spencer et al. | Apr 2010 | A1 |
20100114724 | Ghosh et al. | May 2010 | A1 |
20100114744 | Gonen | May 2010 | A1 |
20100121767 | Coulter et al. | May 2010 | A1 |
20100130172 | Vendrow et al. | May 2010 | A1 |
20100131273 | Aley-Raz et al. | May 2010 | A1 |
20100132043 | Bjorn et al. | May 2010 | A1 |
20100145836 | Baker et al. | Jun 2010 | A1 |
20100145840 | Kasower | Jun 2010 | A1 |
20100158207 | Dhawan et al. | Jun 2010 | A1 |
20100169210 | Bous et al. | Jul 2010 | A1 |
20100169947 | Sarmah et al. | Jul 2010 | A1 |
20100174813 | Hildreth et al. | Jul 2010 | A1 |
20100185546 | Pollard | Jul 2010 | A1 |
20100188684 | Kumara | Jul 2010 | A1 |
20100205662 | Ibrahim et al. | Aug 2010 | A1 |
20100217837 | Ansari et al. | Aug 2010 | A1 |
20100218255 | Ritman et al. | Aug 2010 | A1 |
20100228649 | Pettitt | Sep 2010 | A1 |
20100228657 | Kagarlis | Sep 2010 | A1 |
20100229225 | Sarmah et al. | Sep 2010 | A1 |
20100229230 | Edeki et al. | Sep 2010 | A1 |
20100229245 | Singhal | Sep 2010 | A1 |
20100241501 | Marshall | Sep 2010 | A1 |
20100250364 | Song et al. | Sep 2010 | A1 |
20100250411 | Rodski | Sep 2010 | A1 |
20100250509 | Andersen | Sep 2010 | A1 |
20100250955 | Trevithick et al. | Sep 2010 | A1 |
20100257577 | Grandison et al. | Oct 2010 | A1 |
20100268557 | Faith et al. | Oct 2010 | A1 |
20100268660 | Ekdahl | Oct 2010 | A1 |
20100274679 | Hammad | Oct 2010 | A1 |
20100274734 | Chung et al. | Oct 2010 | A1 |
20100275265 | Fiske et al. | Oct 2010 | A1 |
20100280882 | Faith et al. | Nov 2010 | A1 |
20100293090 | Domenikos | Nov 2010 | A1 |
20100293114 | Khan et al. | Nov 2010 | A1 |
20100302157 | Zilberman | Dec 2010 | A1 |
20100306101 | Lefner et al. | Dec 2010 | A1 |
20100313273 | Freas | Dec 2010 | A1 |
20100325035 | Hilgers et al. | Dec 2010 | A1 |
20100325442 | Petrone et al. | Dec 2010 | A1 |
20100332292 | Anderson | Dec 2010 | A1 |
20100332362 | Ramsey et al. | Dec 2010 | A1 |
20110004498 | Readshaw | Jan 2011 | A1 |
20110016042 | Cho et al. | Jan 2011 | A1 |
20110040629 | Chiu et al. | Feb 2011 | A1 |
20110040983 | Grzymala-Busse et al. | Feb 2011 | A1 |
20110047071 | Choudhuri et al. | Feb 2011 | A1 |
20110060905 | Stack et al. | Mar 2011 | A1 |
20110066547 | Clark et al. | Mar 2011 | A1 |
20110082768 | Eisen | Apr 2011 | A1 |
20110093383 | Haggerty et al. | Apr 2011 | A1 |
20110112958 | Haggerty et al. | May 2011 | A1 |
20110119291 | Rice | May 2011 | A1 |
20110126024 | Beatson et al. | May 2011 | A1 |
20110126275 | Anderson et al. | May 2011 | A1 |
20110131123 | Griffin | Jun 2011 | A1 |
20110145899 | Cao et al. | Jun 2011 | A1 |
20110164746 | Nice et al. | Jul 2011 | A1 |
20110166988 | Coulter | Jul 2011 | A1 |
20110178899 | Huszar | Jul 2011 | A1 |
20110184838 | Winters et al. | Jul 2011 | A1 |
20110184851 | Megdal et al. | Jul 2011 | A1 |
20110196791 | Dominguez | Aug 2011 | A1 |
20110219421 | Ullman et al. | Sep 2011 | A1 |
20110238566 | Santos | Sep 2011 | A1 |
20110260832 | Ross et al. | Oct 2011 | A1 |
20110276496 | Neville et al. | Nov 2011 | A1 |
20110282778 | Wright et al. | Nov 2011 | A1 |
20110289032 | Crooks et al. | Nov 2011 | A1 |
20110289322 | Rasti | Nov 2011 | A1 |
20110295721 | MacDonald | Dec 2011 | A1 |
20110295750 | Rammal | Dec 2011 | A1 |
20110296529 | Bhanoo et al. | Dec 2011 | A1 |
20110302412 | Deng et al. | Dec 2011 | A1 |
20110302641 | Hald et al. | Dec 2011 | A1 |
20120017266 | DiChiara et al. | Jan 2012 | A1 |
20120030080 | Slater et al. | Feb 2012 | A1 |
20120030771 | Pierson et al. | Feb 2012 | A1 |
20120036352 | Tovar et al. | Feb 2012 | A1 |
20120054592 | Jaffe et al. | Mar 2012 | A1 |
20120066073 | Dilip et al. | Mar 2012 | A1 |
20120066084 | Sneyders | Mar 2012 | A1 |
20120101939 | Kasower | Apr 2012 | A1 |
20120158574 | Brunzell et al. | Jun 2012 | A1 |
20120158654 | Behren et al. | Jun 2012 | A1 |
20120198556 | Patel | Aug 2012 | A1 |
20120215682 | Lent et al. | Aug 2012 | A1 |
20120278227 | Kolo et al. | Nov 2012 | A1 |
20120278249 | Duggal et al. | Nov 2012 | A1 |
20120290660 | Rao et al. | Nov 2012 | A1 |
20130004033 | Trugenberger et al. | Jan 2013 | A1 |
20130018811 | Britti et al. | Jan 2013 | A1 |
20130031624 | Britti et al. | Jan 2013 | A1 |
20130132060 | Badhe | May 2013 | A1 |
20130132151 | Stibel et al. | May 2013 | A1 |
20130173450 | Celka et al. | Jul 2013 | A1 |
20130185293 | Boback | Jul 2013 | A1 |
20130211986 | Debie et al. | Aug 2013 | A1 |
20130218797 | Prichard et al. | Aug 2013 | A1 |
20130332342 | Kasower | Dec 2013 | A1 |
20140007238 | Magee et al. | Jan 2014 | A1 |
20140058910 | Abeles | Feb 2014 | A1 |
20140149304 | Bucholz et al. | May 2014 | A1 |
20140214636 | Rajsky | Jul 2014 | A1 |
20140283097 | Allen et al. | Sep 2014 | A1 |
20140304822 | Sher-Jan et al. | Oct 2014 | A1 |
20150142595 | Acuña-Rohter | May 2015 | A1 |
20150161529 | Kondaji et al. | Jun 2015 | A1 |
20150186901 | Miltonberger | Jul 2015 | A1 |
20150199784 | Straub et al. | Jul 2015 | A1 |
20150295924 | Gottschalk, Jr. | Oct 2015 | A1 |
20160012561 | Lappenbusch et al. | Jan 2016 | A1 |
20160063278 | Kraska et al. | Mar 2016 | A1 |
20160063645 | Houseworth et al. | Mar 2016 | A1 |
20160071208 | Straub et al. | Mar 2016 | A1 |
20160086262 | Straub et al. | Mar 2016 | A1 |
20160210450 | Su | Jul 2016 | A1 |
20160328814 | Prichard et al. | Nov 2016 | A1 |
20160344758 | Cohen et al. | Nov 2016 | A1 |
20160379011 | Koike et al. | Dec 2016 | A1 |
20170099314 | Klatt et al. | Apr 2017 | A1 |
20170177683 | Koike et al. | Jun 2017 | A1 |
20170206376 | Sher-Jan | Jul 2017 | A1 |
20170270629 | Fitzgerald | Sep 2017 | A1 |
20170278182 | Kasower | Sep 2017 | A1 |
20170287065 | Samler et al. | Oct 2017 | A1 |
20170357971 | Pitz et al. | Dec 2017 | A1 |
20170374076 | Pierson et al. | Dec 2017 | A1 |
20180004978 | Hebert et al. | Jan 2018 | A1 |
20180130157 | Gottschalk, Jr. et al. | May 2018 | A1 |
20180322572 | Straub et al. | Nov 2018 | A1 |
20190073676 | Wang | Mar 2019 | A1 |
20190164173 | Liu et al. | May 2019 | A1 |
20190228178 | Sharma et al. | Jul 2019 | A1 |
20190311366 | Zoldi et al. | Oct 2019 | A1 |
20190377896 | Spinelli et al. | Dec 2019 | A1 |
20200134629 | Zoldi et al. | Apr 2020 | A1 |
20200143465 | Chilaka et al. | May 2020 | A1 |
20200145436 | Brown et al. | May 2020 | A1 |
20200151628 | Zoldi et al. | May 2020 | A1 |
20200242615 | Chandra et al. | Jul 2020 | A1 |
20200293684 | Harris et al. | Sep 2020 | A1 |
20200380112 | Allen | Dec 2020 | A1 |
20200396246 | Zoldi et al. | Dec 2020 | A1 |
20210021631 | Okutan et al. | Jan 2021 | A1 |
20210150532 | Zhang et al. | May 2021 | A1 |
Number | Date | Country |
---|---|---|
3 058 653 | Apr 2020 | CA |
104877993 | Sep 2015 | CN |
91 08 341 | Oct 1991 | DE |
0 554 083 | Aug 1993 | EP |
2 939 361 | Oct 2019 | EP |
2 384 087 | Jul 2003 | GB |
2 392 748 | Mar 2004 | GB |
2 518 099 | Mar 2015 | GB |
2011-134252 | Jul 2011 | JP |
5191376 | May 2013 | JP |
10-2004-0034063 | Apr 2004 | KR |
I256569 | Jun 2006 | TW |
WO 94006103 | Mar 1994 | WO |
WO 96041488 | Dec 1996 | WO |
WO 00055778 | Sep 2000 | WO |
WO 00055789 | Sep 2000 | WO |
WO 00055790 | Sep 2000 | WO |
WO 01011522 | Feb 2001 | WO |
WO 01084281 | Nov 2001 | WO |
WO 02027610 | Apr 2002 | WO |
WO 02097563 | Dec 2002 | WO |
WO 03071388 | Aug 2003 | WO |
WO 02037219 | May 2004 | WO |
WO 2004046882 | Jun 2004 | WO |
WO 2006069199 | Jun 2006 | WO |
WO 2007001394 | Jan 2007 | WO |
WO 2008054403 | May 2008 | WO |
WO 2008054849 | May 2008 | WO |
WO 2008147918 | Dec 2008 | WO |
WO 2009062111 | May 2009 | WO |
WO 2009117518 | Sep 2009 | WO |
WO 2010132492 | Nov 2010 | WO |
WO 2011044036 | Apr 2011 | WO |
WO 2012054646 | Apr 2012 | WO |
WO 2012112781 | Aug 2012 | WO |
WO 2013026343 | Feb 2013 | WO |
WO 2013126281 | Aug 2013 | WO |
WO 2014008079 | Jan 2014 | WO |
WO 2014008247 | Jan 2014 | WO |
WO 2014150987 | Sep 2014 | WO |
WO 2018175440 | Sep 2018 | WO |
WO 2018208770 | Nov 2018 | WO |
WO 2019006272 | Jan 2019 | WO |
WO 2019050864 | Mar 2019 | WO |
Entry |
---|
The Scourge of Internet Personal Data Collection; 2013 International Conference on Availability, Reliability and Security (pp. 821-828); Esma Aimeur, Manuel Lafond; Sep. 2, 2013. (Year: 2013). |
Exploring User Behavior and Cybersecurity Knowledge—An experimental study in Online Shopping; 2018 16th Annual Conference on Privacy, Security and Trust (PST) (pp. 1-10); Ghada El Haddad, Amin Shahab, Esma Aimeur; Aug. 28, 2018. (Year: 2018). |
U.S. Appl. No. 09/557,252, filed Apr. 24, 2000, Page. |
U.S. Appl. No. 12/705,489, filed Feb. 12, 2010, Bargoli et al. |
U.S. Appl. No. 12/705,511, filed Feb. 12, 2010, Bargoli et al. |
“A New Approach to Fraud Solutions”, BasePoint Science Solving Fraud, pp. 8, 2006. |
Aad et al., “NRC Data Collection and the Privacy by Design Principles”, IEEE, Nov. 2010, pp. 5. |
“Arizona Company Has Found Key in Stopping ID Theft,” PR Newswire, New York, Aug. 10, 2005 http://proquest.umi.com/pqdweb?did-880104711&sid=1&Fmt=3&clientId=19649&RQT=309&Vname=PQD. |
ABC News Now:Money Matters, as broadcasted Nov. 15, 2005 with guest Todd Davis (CEO of Lifelock), pp. 6. |
AlSalamah et al., “Security Risk Management in Online System”, 2017 5th International Conference on Applied Computing and Information Technology/4th International Conference on Computational Science/Intelligence and Applied lnformatics/2nd International Conference on Big Data, Cloud Computing, Data Science & Engineering, 2017, pp. 119-124. |
Anonymous, “Feedback”, Credit Management, ABI/INFORM Global, Sep. 2006, pp. 6. |
“Beverly Hills Man Convicted of Operating ‘Bust-Out’ Schemes that Caused More than $8 Million in Losses”, Department of Justice, Jul. 25, 2006, 2 Pgs. |
Bielski, Lauren, “Will you Spend to Thwart ID Theft?” ABA Banking Journal, Apr. 2005, pp. 54, 56-57, 60. |
BlueCava, “What We Do”, http://www.bluecava.com/what-we-do/, printed Nov. 5, 2012 in 3 pages. |
“Bust-Out Schemes”, Visual Analytics Inc. Technical Product Support, Newsletter vol. 4, Issue 1, Jan. 2005, pp. 7. |
Chores & Allowances, “Do Kids Have Credit Reports?” Oct. 15, 2007, http://choresandallowances.blogspot.com/2007/10/do-kids-have-credit-reports.html, pp. 5. |
CreditSesame; “FAQ's”; http://www.creditsesame.com/how-we-help/faqs/#cb printed Dec. 5, 2011 in 8 pages. |
CreditSesame; “Promote Your Financial Responsibility to Get an Edge in Life”; http://www.creditsesame.com/credit-badge/ printed Dec. 2, 2011 in 1 page. |
Cowie, Norman, “Warning Bells & ‘The Bust-Out’”, Business Credit, Jul. 1, 2000, pp. 5. |
Cullen, Terri; “The Wall Street Journal Complete Identity Theft Guidebook:How to Protect Yourself from the Most Pervasive Crime in America”; Chapter 3, pp. 59-79; Jul. 10, 2007. |
“Data Loss Prevention (DLP) Software”, http://www.symantec.com/data-loss-prevention/ printed Apr. 8, 2013 in 8 pages. |
“Data Protection”, http://compliantprocessing.com/data-protection/ printed Apr. 8, 2013 in 4 pages. |
Day, Jo and Kevin; “ID-ology: A Planner's Guide to Identity Theft”; Journal of Financial Planning:Tech Talk; pp. 36-38; Sep. 2004. |
EFunds Corporation, “Data & Decisioning: Debit Report” printed Apr. 1, 2007, http://www.efunds.com/web/industry-solutions/financial-services/frm-debit-report/htm in 1 page. |
Elmasri et al., “Fundamentals of Database Systems, Third Edition (Excerpts)”, Jun. 2000, pp. 253, 261, 268-270, 278-280, 585, 595. |
Equifax; “Equifax Credit Watch”; https://www.econsumer.equifax.co.uk/consumer/uk/sitepage.ehtml, dated Jun. 27, 2007 on www.archive.org. |
Ettorre, “Paul Kahn on Exceptional Marketing,” Management Review, vol. 83, No. 11, Nov. 1994, pp. 48-51. |
Experian Team, “Impact on Credit Scores of Inquiries for an Auto Loan,” Ask Experian, Mar. 1, 2009, pp. 5. |
“Fair Isaac Introduces Falcon One System to Combat Fraud at Every Customer Interaction”, Business Wire, May 5, 2005, pp. 3. |
“Fair Isaac Offers New Fraud Tool”, National Mortgage News & Source Media, Inc., Jun. 13, 2005, pp. 2. |
Familysecure.com, “Frequently Asked Questions”, http://www.familysecure.com/FAQ.aspx as archived Jul. 15, 2007 in 3 pages. |
FamilySecure.com; “Identity Theft Protection for the Whole Family | FamilySecure.com” http://www.familysecure.com/, as retrieved on Nov. 5, 2009. |
“Fighting the New Face of Fraud”, FinanceTech, http://www.financetech.com/showArticle.jhtml?articleID=167100405, Aug. 2, 2005. |
“FinExtra, Basepoint Analytics Introduces Predictive Technology for Mortgage Fraud”, Oct. 5, 2005, pp. 3. |
Fisher, Joseph, “Access to Fair Credit Reports: Current Practices and Proposed Legislation,” American Business Law Journal, Fall 1981, vol. 19, No. 3, p. 319. |
“Fraud Alert | Learn How”. Fight Identity Theft. http://www.fightidentitytheft.com/flag.html, accessed on Nov. 5, 2009. |
Garcia-Molina et al., “Database Systems: The Complete Book”, Prentice Hall, Inc., Ch. 15, Oct. 1, 2001, pp. 713-715. |
Gibbs, Adrienne; “Protecting Your Children from Identity Theft,” Nov. 25, 2008, http://www.creditcards.com/credit-card-news/identity-ID-theft-and-kids-children-1282.php, pp. 4. |
“GLBA Compliance and FFIEC Compliance” http://www.trustwave.com/financial-services.php printed Apr. 8, 2013 in 1 page. |
Gordon et al., “Identity Fraud: A Critical National and Global Threat,” LexisNexis, Oct. 28, 2003, pp. 1-48. |
Haglund, Christoffer, “Two-Factor Authentication with a Mobile Phone”, Fox Technologies, Uppsala, Department of Information Technology, Nov. 2, 2007, pp. 62. |
Herzberg, Amir, “Payments and Banking with Mobile Personal Devices,” Communications of the ACM, May 2003, vol. 46, No. 5, pp. 53-58. |
“ID Analytics ID Network”, from www.idanalytics.com, as retrieved from www.archive.org, dated Nov. 20, 2005 or earlier; attached as “ID Network (IDN)”, pp. 8. |
ID Cops, www.idcops.com; retrieved from www.archive.org any linkage Feb. 16, 2007. |
ID Theft Assist, “Do You Know Where Your Child's Credit Is?”, Nov. 26, 2007, http://www.idtheftassist.com/pages/story14, pp. 3. |
“ID Thieves These Days Want Your Number Not Your Name”, The Columbus Dispatch, Columbus, Ohio, http://www.dispatch.com/content/stories/business/2014/08/03/id-thieves-these-days-want-your-number-not-your-name.html, Aug. 3, 2014 in 2 pages. |
Identity Theft Resource Center; Fact Sheet 120 A—To Order a Credit Report for a Child; Fact Sheets, Victim Resources; Apr. 30, 2007. |
“Identity Thieves Beware: Lifelock Introduces Nation's First Guaranteed Proactive Solution to Identity Theft Protection,” PR Newswire, New York, Jun. 13, 2005 http://proquest.umi.com/pqdweb?did=852869731&sid=1&Fmt=3&clientid=19649&RQT=309&Vname=PQD. |
Ideon, Credit-Card Registry that Bellyflopped this Year, Is Drawing some Bottom-Fishers, The Wall Street Journal, Aug. 21, 1995, pp. C2. |
“Industry News, New Technology Identifies Mortgage Fraud: Basepoint Analytics Launches FraudMark”, Inman News, American Land Title Association, Oct. 5, 2005, pp. 1. |
Information Brokers of America, “Information Brokers of America Child Identity Theft Protection” http://web.archive.org/web/20080706135451/http://iboainfo.com/child-order.html as archived Jul. 6, 2008 in 1 page. |
Information Brokers of America, “Safeguard Your Child's Credit”, http://web.archive.org/web/20071215210406/http://www.iboainfo.com/child-id-protect.html as archived Dec. 15, 2007 in 1 page. |
“Intelligent Miner Applications Guide”, IBM Corp., Apr. 2, 1999, Chapters 4-7, pp. 33-132. |
“Intersections, Inc. Identity Guard”, from www.intersections.com and www.identityguard.com, as retrieved from Internet Archive, dated Nov. 25, 2005 or earlier; attached as “Identity Guard (IDG)”, pp. 7. |
Iovation, Device Identification & Device Fingerprinting, http://www.iovation.com/risk-management/device-identification printed Nov. 5, 2012 in 6 pages. |
Jacob et al., A Case Study of Checking Account Inquiries and Closures in Chicago, The Center for Financial Services Innovation, Nov. 2006. |
Jin et al., “Network Security Risks in Online Banking”, 2005 International Conference on Wireless Communications, Networking and Mobile Computing, Jan. 2005, vol. 2, pp. 1229-1234. |
Karlan et al., “Observing Unobservables:ldentifying Information Asymmetries with a Consumer Credit Field Experiment”, Jun. 17, 2006, pp. 58, http://aida.econ.yale.edu/karlan/papers/ObservingUnobservables.KarlanZinman.pdf. |
Khan, Muhammad Khurram, PhD., “An Efficient and Secure Remote Mutual Authentication Scheme with Smart Cards” IEEE International Symposium on Biometrics & Security Technologies (ISBAST), Apr. 23-24, 2008, pp. 1-6. |
Lamons, Bob, “Be Smart: Offer Inquiry Qualification Services,” Marketing News, ABI/Inform Global, Nov. 6, 1995, vol. 29, No. 23, pp. 13. |
Lee, Timothy B., “How America's Broken Tax System Makes Identity Theft Easy”, http://www.vox.com/2014/4/14/5608072/how-americas-broken-tax-system-makes-identity-theft-easy, Apr. 14, 2014, pp. 10. |
Lee, W.A.; “Experian, on Deal Hunt, Nets Identity Theft Insurer”, American Banker: The Financial Services Daily, Jun. 4, 2003, New York, NY, 1 page. |
Lefebvre et al., “A Robust Soft Hash Algorithm for Digital Image Signature”, International Conference on Image Processing 2:11 (ICIP), vol. 3, Oct. 2003, pp. 495-498. |
Lifelock, “How LifeLock Works,” http://www.lifelock.com/lifelock-for-people printed Mar. 14, 2008 in 1 page. |
Lifelock, “LifeLock Launches First ID Theft Prevention Program for the Protection of Children,” Press Release, Oct. 14, 2005, http://www.lifelock.com/about-us/press-room/2005-press-releases/lifelock-protection-for-children. |
LifeLock; “How Can LifeLock Protect My Kids and Family?” http://www.lifelock.com/lifelock-for-people/how-we-do-it/how-can-lifelock-protect-my-kids-and-family printed Mar. 14, 2008 in 1 page. |
Lifelock, “Personal Identity Theft Protection & Identity Theft Products,” http://www.lifelock.com/lifelock-for-people, accessed Nov. 5, 2007. |
Lifelock, Various Pages, www.lifelock.com/, Jan. 9, 2007, pp. 49. |
My Call Credit http://www.mycallcredit.com/products.asp?product=ALR dated Dec. 10, 2005 on www.archive.org. |
My Call Credit http://www.mycallcredit.com/rewrite.asp?display=faq dated Dec. 10, 2005 on www.archive.org. |
MyReceipts, http://www.myreceipts.com/, printed Oct. 16, 2012 in 1 page. |
MyReceipts—How it Works, http://www.myreceipts.com/howItWorks.do, printed Oct. 16, 2012 in 1 page. |
National Alert Registry Launches RegisteredOffendersList.org to Provide Information on Registered Sex Offenders, May 16, 2005, pp. 2, http://www.prweb.com/printer/240437.htm accessed on Oct. 18, 2011. |
National Alert Registry Offers Free Child Safety “Safe From Harm” DVD and Child Identification Kit, Oct. 24, 2006. pp. 2, http://www.prleap.com/pr/53170 accessed on Oct. 18, 2011. |
National Alert Registry website titled, “Does a sexual offender live in your neighborhood”, Oct. 22, 2006, pp. 2, http://web.archive.org/wb/20061022204835/http://www.nationallertregistry.com/ accessed on Oct. 13, 2011. |
Ogg, Erica, “Apple Cracks Down on UDID Use”, http://gigaom.com/apple/apple-cracks-down-on-udid-use/ printed Nov. 5, 2012 in 5 Pages. |
Organizing Maniac's Blog—Online Receipts Provided by MyQuickReceipts.com, http://organizingmaniacs.wordpress.com/2011/01/12/online-receipts-provided-by-myquickreceipts.com/ dated Jan. 12, 2011 printed Oct. 16, 2012 in 3 pages. |
Pagano, et al., “Information Sharing in Credit Markets,” Dec. 1993, The Journal of Finance, vol. 48, No. 5, pp. 1693-1718. |
Partnoy, Frank, Rethinking Regulation of Credit Rating Agencies: An Institutional Investor Perspective, Council of Institutional Investors, Apr. 2009, pp. 21. |
Planet Receipt—Home, http://www.planetreceipt.com/home printed Oct. 16, 2012 in 1 page. |
Planet Receipt—Solutions & Features, http://www.planetreceipt.com/solutions-features printed Oct. 16, 2012 in 2 pages. |
“PremierGuide Announces Release 3.0 of Local Search Platform”, Business Wire, Mar. 4, 2004, Palo Alto, CA, p. 5574. |
Press Release—“Helping Families Protect Against Identity Theft—Experian Announces FamilySecure.com; Parents and guardians are alerted for signs of potential identity theft for them and their children; product features an industry-leading $2 million guarantee”; PR Newswire; Irvine, CA; Oct. 1, 2007. |
Privacy Rights Clearinghouse, “Identity Theft: What to do if it Happens to You,” http://web.archive.org/web/19990218180542/http://privacyrights.org/fs/fs 17a.htm printed Feb. 18, 1999. |
Quinn, Tom, “Low Credit Inquiries Affect Your Credit Score”, Credit.com, May 2, 2011, pp. 2. |
Rivera, Barbara, “New Tools for Combating Income Tax Refund Fraud”, https://gcn.com/Articles/2014/05/08/lnsight-tax-fraud-tools.aspx?Page=1, May 8, 2014, pp. 3. |
Scholastic Inc.:Parent's Request for Information http://web.archive.org/web/20070210091055/http://www.scholastic.com/inforequest/index.htm as archived Feb. 10, 2007 in 1 page. |
Scholastic Inc.Privacy Policy http://web.archive.org/web/20070127214753/http://www.scholastic.com/privacy.htm as archived Jan. 27, 2007 in 3 pages. |
Shoeboxed, https://www.shoeboxed.com/sbx-home/ printed Oct. 16, 2012 in 4 pages. |
Singletary, Michelle, “The Littlest Victims of ID Theft”, The Washington Post, The Color of Money, Oct. 4, 2007. |
Sumner, Anthony, “Tackling the Issue of Bust-Out Fraud”, Retail Banker International, Jul. 24, 2007, pp. 4. |
Sumner, Anthony, “Tackling the Issue of Bust-Out Fraud”, Experian: Decision Analytics, Dec. 18, 2007, pp. 24. |
Sumner, Anthony, “Tackling the Issue of Bust-Out Fraud”, e-News, Experian: Decision Analytics, pp. 4, [Originally Published in Retail Banker International Magazine Jul. 24, 2007]. |
“The Return Review: Program Increases Fraud Detection; However, Full Retirement of the Electronic Fraud Detection System Will be Delayed”, Treasury Inspector General for Tax Administration, Sep. 25, 2017, Reference No. 2017-20-080, pp. 27. |
Themorningcall.Com, “Cheap Ways to Foil Identity Theft,” www.mcall.com/business/columnists/all-karp.5920748jul01,0 . . . , published Jul. 1, 2007. |
“TransUnion—Child Identity Theft Inquiry”, TransUnion, http://www.transunion.com/corporate/personal/fraudIdentityTheft/fraudPrevention/childIDInquiry.page as printed Nov. 5, 2009 in 4 pages. |
Truston, “Checking if your Child is an ID Theft Victim can be Stressful,” as posted by Michelle Pastor on Jan. 22, 2007 at http://www.mytruston.com/blog/credit/checking_if_your_child_is_an_id_theft_vi.html. |
Vamosi, Robert, “Howto Handle ID Fraud's Youngest Victims,” Nov. 21, 2008, http://news.cnet.com/8301-10789_3-10105303-57.html. |
Various Posts from the http://www.2p.wrox.com Forums: http://web.archive.org/web/2005045221950/http://p2p.wrox.com/topic.asp?TOPIC_ID=6513, dated Nov. 15, 2003-Oct. 7, 2004. |
Web Page posted at: http://web.archive.org/web20040805124909/http://www.oracle.com/technology/sample_codete/tech/pl_sql/htdocs/x/Case/start.htm, pp. 1 and 4 of the webpages posted on Jan. 7, 2003. |
Webpage printed out from http://www.jpmorgan.com/cm/ContentServer?c=TS_Content&pagename=jpmorgan%2Fts%2FTS_Content%2FGeneral&cid=1139403950394 on Mar. 20, 2008, Feb. 13, 2006, New York, NY. |
Wilson, Andrea, “Escaping the Alcatraz of Collections and Charge-Offs”, http://www.transactionworld.net/articles/2003/october/riskMgmt1.asp, Oct. 2003. |
International Search Report and Written Opinion for Application No. PCT/US2007/06070, dated Nov. 10, 2008. |
International Search Report and Written Opinion for Application No. PCT/US2008/064594, dated Oct. 30, 2008. |
International Preliminary Report and Written Opinion in PCT/US2008/064594, dated Dec. 10, 2009. |
International Search Report and Written Opinion for Application No. PCT/US09/60393, dated Dec. 23, 2009. |
International Search Report and Written Opinion for Application No. PCT/US09/37565, dated May 12, 2009. |
International Search Report and Written Opinion for Application No. PCT/US2010/034434, dated Jun. 23, 2010. |
International Preliminary Report on Patentability for Application No. PCT/US2010/034434, dated Feb. 4, 2014. |
Official Communication in Australian Patent Application No. 2012217565, dated May 12, 2017. |
Official Communication in Australian Patent Application No. 2017203586, dated Jun. 18, 2019. |
Official Communication in Australian Patent Application No. 2019279982, dated Dec. 19, 2019. |
Official Communication in Canadian Patent Application No. 2,827,478, dated Jun. 29, 2017. |
Official Communication in Canadian Patent Application No. 2,827,478, dated May 31, 2018. |
Official Communication in Canadian Patent Application No. 2,827,478, dated Mar. 27, 2019. |
Extended European Search Report for Application No. EP12747205, dated Sep. 25, 2014. |
Supplementary European Search Report for Application No. EP12747205, dated Jun. 19, 2015. |
Extended European Search Report for Application No. EP18748000, dated Dec. 13, 2018. |
International Search Report and Written Opinion for Application No. PCT/US2012/025456, dated May 21, 2012. |
International Preliminary Report on Patentability in Application No. PCT/US2012/025456, dated Aug. 21, 2013. |
International Search Report and Written Opinion for Application No. PCT/US2011/033940, dated Aug. 22, 2011. |
Allard et al., “Safe Realization of the Generalization Privacy Mechanism”, 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp. 8. |
“Dealing with Measurement Noise (A Gentle Introduction to Noise Filtering)”, Chemical and Process Engineering, University of Newcastle Upon Tyne, https://web.archive.org/web/20000418021742/http://lorien.ncl.ac.uk/ming/filter/filewma.htm, Archived Apr. 18, 2000, pp. 3. |
El Kalam et al., “Personal Data Anonymization for Security and Privacy in Collaborative Environments”, 2005 IEEE, pp. 56-61. |
Ribeiro et al., “Privacy Protection with Pseudonumization and Anonumization in a Health IoT System”, Results from OCARIoT, 2019 IEEE, pp. 904-908. |
U.S. Appl. No. 13/665,636, Pre-Data Breach Monitoring, filed Oct. 31, 2012. |
U.S. Appl. No. 16/657,057, U.S. Pat. No. 11,030,562, Pre-Data Breach Monitoring, Oct. 18, 2019. |
Number | Date | Country | |
---|---|---|---|
61553761 | Oct 2011 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16657057 | Oct 2019 | US |
Child | 17313775 | US | |
Parent | 13665636 | Oct 2012 | US |
Child | 16657057 | US |