1. Field of the Invention
The present invention generally relates to digital communications networks and, more particularly, to the development of the properties of high levels of security and fault tolerance by active attack detection and real time establishment of compartmented security domains to permit network functionality in the presence of denial of service and other attacks.
2. Description of the Prior Art
Numerous technical developments and economic forces have led to the widespread use of distributed data processing systems in which numerous data processors, each of which may be capable of functioning independently, are connected by a network in order to share both data and hardware and software resources. The connectivity of the system may be hard wired over a local or wide area network or may use links which are more or less accessible to the public, such as the Internet which utilizes many common carrier communication links which may be made available to a given processor through various hardware interfaces. When such technical capabilities such as the development of the TCP/IP protocol were being initially developed, however, flexibility of interconnectivity, scalability and ease and reliability of data exchange were of paramount importance and the importance of security measures was not fully appreciated and left to be implemented at individual processors or individual resources to prevent access from other connected processors.
Of course, a given processor may be effectively connected to more than one network at a time and thus a publicly accessible network can be used to access another network, potentially through a sequence of processors. On the other hand, limiting access of processors to only secure or unsecure networks reduces functionality of the processor to levels which may be unacceptable clue to the reduction of accessible resources. It is also in the versatile nature of data processors that any security feature that may be devised may also be defeated and protection of sensitive resources is entirely grounded in the difficulty of defeating the security measures utilized. Further, as alluded to above, restriction of access is usually provided only at individual processors or resources (e.g. applications) and not within the network, itself.
As the use of TCP/IP networking has grown, techniques for exploiting a lack of security have been discovered, developed, implemented and widely shared in the hacker community worldwide. This circumstance presents a fundamental threat to the global network infrastructure that must be ameliorated if security of any network or connected resource is to be achieved.
Accordingly, there are numerous reports of increasingly sophisticated intruder attacks on both military and commercial computer systems. Computer attacks may take the form of gaining access to sensitive data (to either learn its contents or to corrupt it) resident on individual systems or in the form of a so-called virus or worm to damage or destroy processors or resources in a largely indiscriminate manner.
Yet another form of attack which is of increasing concern is the “denial of service” (DOS) attack in which normal network functions are demanded at rates approaching or exceeding system capacity to respond, thereby denying service to other requestors or otherwise disrupting other communications or services such as overloading telephone or power distribution networks. It has also been reported by numerous studies that many such attacks, regardless of form, are initiated by persons having some level of legitimate authorized access to the system attacked or at least a connected system.
Networks are inherently susceptible to attack by exploitation of security weaknesses in network protocols and infrastructure components. In addition to unauthorized viewing and modification of data, alluded to above, security controls of the operating systems and applications installed on the network may be circumvented, network firewalls (used extensively at network boundaries) may be penetrated, network functions may be disrupted, sessions of authorized users (after they have been authenticated) can be stolen and routing functions of the network can be disrupted to misdirect network data. A concerted attack on military network infrastructure can compromise military operations or force network shutdown. Identification and authentication (I&A) capabilities provided by recently developed forms of identification certificates does not provide technical mechanisms to respond to attacks against network protocols.
Traditionally, a three layered approach has been taken in an attempt to provide protection of networks. The first layer is the extensive use of firewalls to control access to the network from outside the network. However, firewalls become geometrically more difficult to manage as the number and variety of authorized accesses increases. This difficulty is particularly evident in military networks which become particularly susceptible to penetration through exploitation of errors in configuration of their access control rule set.
However, firewalls are not fully effective since the manner in which TCP/IP manages packet fragmentation can be exploited for “punching through” the packet filtering system of firewalls. “Session Hijacking”, although complex, can be automated to negate effective use of strong user authentication. Further, it is difficult to force all network access to be made only through the firewall. The availability of commercial modems that interface to digital PBX systems and the Remote Access Server included in Microsoft Windows (TM) software makes control of the use of dial-up connections to the network through firewalls impractical.
The second layer of protection is strong user authentication such as biometric systems and digital certificates. However, such systems are costly and generally implemented on only the most sensitive systems and can, nevertheless, be rendered ineffective by session hijacking attacks, alluded to above, because of the inability of TCP/IP to authenticate the source address packets, to close out “half-open” connections and to protect the session sequence numbers contained in the TCP header.
The third layer of protection is to maintain separate networks for each level of security classification or class of access authorization and to depend on personnel clearances. This approach is extremely costly, limits the functionality of each separate system, presents problems of maintaining data integrity and provides no protection from misuse or damage by persons having access to any given system. Further, it is generally desirable to be able to accommodate both mandatory access control (MAC) in which access is controlled based on classification of the information or resource and discretionary access control (DAC) which is based on a correlation of anticipated user function and the nature of data that may be needed to perform that function. It can be readily appreciated that MAC and DAC may each be complex and overlap with much increased complexity, greatly multiplying the number of separate systems which may be required among which data integrity must be maintained.
Detection of an attack before substantial damage is done is often difficult, particularly when the attack is of the denial of service type. Viruses, for example, cannot be detected before at least some of their basic characteristics (e.g. a filename by which they are executed) is known; by which time the virus may have been widely proliferated, causing some degree of damage to each computer it has reached. A denial of service attack is, by its nature, indistinguishable from other intended functions of the system except for the volume of transactions it presents and possible similarities of requested services necessitated by the volume of requests required for a successful attack.
In general, when an attack is detected, at least a major portion of network services must be disrupted in order to respond to the attack. Therefore, achieving a degree of certainty that an attack is in progress commensurate with the magnitude of necessary system disruption often unacceptably delays action and thus does not acceptably limit damage or prevent access to critical data or resources.
In summary, enhancement of security in digital networks is extremely challenging in view of the weaknesses in protocols which cannot readily be changed. Most approaches proposed to date are extremely costly and compromise system functionality and utility while being difficult to implement in complex environments that cannot readily be modified. Proposals for security enhancements to date have also not been easily scalable, potentially functional across multiple networks or globally, adequately sensitive to potential attacks, capable of accurately and quickly isolating a fault or an attack and allowing error recovery or able to actively protect against attacks by authorized users, the currently most frequent source of system attacks.
It is therefore an object of the present invention to provide fault and potential attack encapsulation in a fine-grained manner in a digital communications network.
It is another object of the invention to provide error and damage limitation and recovery in a rapid and automatic manner in a digital communications network to rapidly restore the full functionality thereof quickly and with minimal disruption.
It is a further object of the invention to provide a global active response to faults and potential attacks in substantially real time while maintaining substantially undiminished network capabilities.
In order to accomplish these and other objects of the invention, a method of operating a digital network having nodes which have a locally hierarchical relationship is provided comprising steps of detecting a condition at a node and communicating the condition to a trusted node locally higher in the hierarchical relationship, collecting information regarding the condition through nodes at the same or higher hierarchical level as said trusted node, and controlling a response at the node in response to the information.
The foregoing and other objects, aspects and advantages will be better understood from the following detailed description of a preferred embodiment of the invention with reference to the drawings, in which:
Referring now to the drawings, and more particularly to
As will become clear from the following discussion, the present invention provides a secure, fault-tolerant network than can implement an arbitrary security policy with arbitrarily fine granularity and continue to provide service in the presence of a variety of hardware failures and security penetration attacks. This is accomplished by developing a networking subsystem by inclusion of enhancements which accommodate existing elements of network architecture and software and integrate fault tolerant extensions of object oriented programming architecture, strong encryption strong authentication at the node and data packet level and real-time active responses to detection of faults and attacks with enhanced sensitivity.
It should also be appreciated that while the preferred form of the invention will be discussed in the context of well-known standard protocols and a preferred common object request broker architecture (CORBA, an architecture that, including extensions such have been made commercially available by the assignee of the present invention under the name “Hardpack” for developing a high degree of fault tolerance, such as repairing or replacing software objects from other nodes when needed, as is summarized in the above-incorporated U. S. provisional patent application, enables modules of software, known as “objects” to communicate with one another) and common management information protocol (CMIP, an open system interconnection (OSI) standard protocol used with common management information services (CMIS) standard protocol) other architectures and protocols may be used to embody the invention.
As will be discussed below, the basic principle of the invention is the use of a highly secure user transparent subsystem infrastructure which can detect failures and questionable activity and communicate, in a secure and encrypted form, the potential condition of a network node to adjacent nodes which can then isolate or encapsulate a potentially compromised node while rerouting normal network traffic to integrate the extended and fault tolerant CORBA architecture with strong encryption, enhanced intrusion detection and an effective security policy to support effective active responses to faults and potential attacks. This reporting supports fine-grained control of network access as well as logging of information concerning network activity and node status to limit damage, improve detection and facilitate recovery from a wide variety of failures and attacks.
As shown in
Locking devices are generally implemented on separate cards (a preferred form of which is known as a VME card) which are connectable to other circuits through a rack or “motherboard” arrangement or the like. Therefore, it is convenient to provide additional security structure at a location electrically between the two locking devices (e.g. connected to a common bus). In accordance with the invention, this is preferably accomplished with a processor on a separate card (represented by 113 of
Functionally, it should be appreciated that the processor arrangement 113 can implement any number of objects for fault or intrusion detection and which may be of any arbitrary design, including a number of algorithms which are commercially available for the purpose. Results of the execution of these objects can be communicated over normal network links to other nodes and used by manager objects to exercise any desired control over the locking devices, to implement any desired security policy (e.g. mandatory access control (MAC), Discretionary access control (DAC), and the like) and/or to log any desired information concerning the status or operations of any node through other managed objects at each node. More generally, managed objects include network interface managed objects, intrusion detection managed objects and network service managed objects.
All of these communications are preferably performed in a user transparent fashion at high bit rates and encrypted in accordance with any desired encryption algorithm (DES, DES-3 or Type 1 algorithms implemented in hardware for highest speed being preferred) which may also be altered and keys arbitrarily exchanged and altered by the same type of communications which are entirely transparent to all users and may be made arbitrarily difficult to intercept by any of a number of known techniques which will be evident to those skilled in the art. Further, each transmission or group of transmissions (for a given user) may be supplied with identification information (e.g. in the form of a stamp or the like) by processor 113, even if the user is not identified and any desired tracking or logging information may be transmitted to other nodes for error recovery and determination of the source of any detected potential attack as well as continuous monitoring and authentication of the source node for all communications, potentially to the data packet level.
These detection operations and communications may be conducted separately from normal user data communications traffic in substantially real time and communications performed at extremely high data rates potentially as great as or exceeding 10 Gbps since it is essentially only necessary for boards 113 at different network nodes to be compatible and communicate with each other and with complete independence from other user data communication processors connected to the network. High transmission bit rates and, preferably, transmission priority arrangements for such user transparent network infrastructure communications (e.g. preferentially communicated relative to user data communications) assist in assuring that network security control functions will be carried out even during denial of service (DOS) attacks. Accordingly, the processor card 113 is referred to as a security policy manager (SPM) card.
It should be appreciated that implementation of such capabilities in combination with routers which also support a high level of security (e.g. cards supporting audit, MAC, DAC, user identification and authentication security functions) enables active network response to security alerts and isolation of compromised nodes from uncompromised nodes in substantially real time (often referred to as log time since the actual time required is a fixed multiple of the logarithm of the number of the nodes secured and thus increases slowly as the number of nodes increases and the granularity of protection is made finer) as will be discussed in more detail below. Further details of the preferred implementation of this basic element of the invention are disclosed in greater detail in the above-incorporated, concurrently filed U.S. Patent Application.
Referring now to
For example, a communication link depicted by dashed line 430 could be used as a communication link through tier 405 with tier 407 above tier 403 or to place a node of tier 403 hierarchically above tier 405. Nevertheless, an organization containing communications links such as 430 may engender unjustified complexity although some advantages may accrue such as establishing further redundant communication paths and/or avoiding a top level of the hierarchy which might be an excessively attractive target for attack.
It should be noted that the network shown in
Therefore, routers monitoring traffic on the network can assign any of a number of convenient paths between any two nodes of the network. Conventional network protocols, in fact, allow a plurality of different paths that may be of differing latency to be employed for a given message with the bit packets being reassembled in proper order after receipt by the intended destination node. The invention provides the additional functionality of eliminating and substituting paths for isolation of questionable or compromised nodes at the portal or gateway to each node to maintain substantially full network functionality while preventing proliferation of faults or damage from attacks as well as the attacks themselves.
The locally hierarchical architecture described above greatly enhances security throughout the network since a response to an attack on one node will be controlled by another node which should respond correctly unless that node is simultaneously under attack, as well (prior faults throughout the network having been previously encapsulated and isolated). In such a case, a manager object at yet another node at a locally higher hierarchical level would control the active response, and so on, while establishing a plurality of secure sessions and security domains (e.g. depicted by links 427, 415, 418, 425 of
In the event of a security breach, the CMIP managers possess the ability (in the manager objects) to instruct the SPM device to enable and disable network ports to isolate network nodes or segments/sectors and to notify other trusted entities in the CMIP manager and managed object hierarchy of changes in trust for potentially contaminated or compromised network devices while the remainder of the trusted devices of the network continue to provide services over redundant links and newly defined and substituted security domains while denying connection requests from untrusted sources, as can be seen from a comparison of
These communications and routing control can be carried out very rapidly (about twenty milliseconds per tier or less) and thus an active response to a potential attack can be made in substantially real time and can be scaled to global size networks in log time. For example and as will be discussed in more detail below in connection with
By the same token, temporary disconnection of network segments or sectors to test for the origin and scope of an attack or to interrupt an attack may be made correspondingly short. Since the duration of any such disruption can be so short and the disruption thus minimized, very sensitive detection algorithms having relatively low initial confidence levels (but very rapid response) are tolerable for detection of potential attacks and to achieve a very high level of security. This capability provided by the present invention is particularly important is avoiding the effects of denial of service attacks which, by their nature, are difficult to distinguish from ordinary usage except by volume and possibly some similarity of transactions before such attacks are well under way and may have captured a significant portion of available resources.
Thus, an attack, to be successful, would require simultaneous attacks on virtually all nodes of the system, all nodes of the hierarchically highest tier of the system or an attack on the hierarchically highest node (if such a singular node is permitted in the network design; which is preferably avoided but should, in any case, be difficult to identify within the network since the relationships and dependencies in the network are identified only in the highly secure user-transparent communications between SPM cards which are preferably made difficult to intercept and analyze through high bit rate, low duty cycle transmissions and effective encryption). Such an attack would also need to be carried out simultaneously, if not synchronously, at both the communicating, network connected processor level and at the SPM processor level of at least a plurality of processors since the manager and managed objects of the SPM processors are effectively self-repairing by virtue of the CORBA extensions for fault tolerance alluded to above.
It should be understood that the above discussion of compartmentalizing a portion of the network to isolate the location of a fault or an attack is merely exemplary of many types of active responses to such a fault or attack of which the invention makes the network capable through integration of the extended CORBA architecture which supports fault tolerance, strong encryption with user transparent communications which are difficult to intercept or simulate, implementation of attack detection at a lower level of certainty/higher level of sensitivity and speed for log time response and a fully flexible security policy capability.
Referring now to
It should also be understood that while the depiction of the network of
In this regard, it should be appreciated that if the tiered hierarchy is maintained globally throughout the network, either in a planar or pyramidal organization, managed objects are only required for tiers 1 through N−1 and manager objects are only required for tiers 2 through N. It is also desirable that the manager objects in any tier be able to communicate with each other for various purposes (and, preferably and advantageously, through a hierarchically higher tier), examples of which will be discussed below. However, in a pyramidal arrangement where node 320 is of a higher hierarchical rank than any other node, such intra-tier communications will not be necessary (or possible) but other supervisory functions, the natures of which are unimportant to the successful practice of the invention and appropriate functions will, in any event, be evident to those skilled in the art, may be desirable in the manager objects of node 320.
As described above with reference to
The ability to create layered security domains (by which management communications traffic is separated user data traffic and is maintained transparent to users) is fully generalized in accordance with the principles of the invention at both the node or terminal processor (e.g. 119 of
For example, in links between client C and Server S and a potential attack A is detected at node 330, the scenarios discussed above in regard to
If, however, node 331 was simultaneously attacked (A′), the user transparent signals (depicted by dashed double arrows) would be communicated to a node 332 and/or 333 of the next higher tier, and so on, and diagnositics (e.g. as described in regard to nodes 334 and 335) and control manager objects run at other nodes of the tier at which a trusted node is found.
Thus, control and diagnostics can always be found unless simultaneous attacks are made on all nodes of at least three tiers of the network, while the organization of the tiers and connectivity of the nodes is hidden by user transparent and secure communications between the SPMs which also have the capability to detect “foreign” SPMs or connections since each link between SPMs is a secure domain. By the same token, any node or group of nodes can be rapidly isolated and the attack or fault compartmentalized very quickly in log time since communication, fault evaluation and control can be communicated through the user transparent signals between SPMs in about 20 milliseconds per tier or less. Known search techniques (e.g. binary trees) can propagate search and control to encapsulate any attack to affected nodes in very short log time even for extremely large and even global networks.
It should also be appreciated that the isolation provided in accordance with the invention allows the offending or questionable communications to be pushed back by interrupting communications not only with the connected nodes of the network depicted in
Additionally, the ability to define security domains and secure sessions (and trust levels thereof) can be used not only to compartmentalize and isolate faults but can establish virtual private networks (VPNs) somewhat similar to the third layer of protection provided by physically isolated systems described above except that the connectivity is user or administrator defined and may be altered at will to include resources at desired nodes, as depicted at 340, while locking out all communications from other potential links. VPNs can be based, for example, on existing hardware and software products that implement to IPSec protocol suite and invoked by the user transparent communications and the above-described CORBA extensions.
The above-described security functions are fully available within the virtual private network including the ability to detect the connection of a “foreign” node communication in any security domain in the VPN, as described above, if included in the managed objects of included nodes, as would generally be the case. Of course, communications through some nodes not necessarily included in the VPN (e.g. nodes 341, 342) may be necessary but such communications do not lessen security of the VPN since connection is made through locked routers. Redundant connections are provided and supervision is conducted in the manner described above at yet additional nodes in other layers; providing plural layers of protection around the VPN. Thus a VPN provided in accordance with the principles of the invention is significantly more secure than a physically isolated network since protection is provided against session hijacking and attacks by authorized users.
It should be appreciated that the invention can develop defined VPNs in log time since the mechanism for defining the security domains is substantially the same as for compartmentalization and isolation but for the origin (e.g. with a user or administrator) of the VPN definitions. A useful application is to provide security for critical resources through the security policy manager during normal network operation and to switch to VPNs if an attack is detected in the network or critical segments thereof. This switching to VPNs would have the effect of terminating service to users having authorization for less than all of the resources of nodes in the VPN and effectively increase protection against attacks by authorized users.
In view of the foregoing, it is seen that the invention provides a capability of dynamic active response in log time to detected security events and fault conditions while allowing tailoring of responses in a manner commensurate with risk and system disturbance required to fully and effectively address any attack. The response may be offensive, defensive or both and the actions; taken may be flexibly defined and timed since the function of the invention to detect attacks and initiate active responses is entirely independent of the conditions detected and the nature of the responses. This active response capability is integrated with and leveraged by all components of the architecture of the invention as implemented within an arbitrary network and with arbitrarily fine granularity.
While the invention has been described in terms of a single preferred embodiment, those skilled in the art will recognize that the invention can be practiced with modification within the spirit and scope of the appended claims.
This application claims priority of U.S. provisional Application Ser. No. 60/248,906, filed Nov. 15, 2000, and assigned to the assignee of the present application, as does concurrently filed related application Ser. No. 09/973,769 both of which are hereby fully incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
4279034 | Baxter | Jul 1981 | A |
4527270 | Sweeton | Jul 1985 | A |
4556972 | Chan et al. | Dec 1985 | A |
4622546 | Sfarti et al. | Nov 1986 | A |
4879716 | McNally et al. | Nov 1989 | A |
5003531 | Farinholt et al. | Mar 1991 | A |
5027342 | Boulton et al. | Jun 1991 | A |
5193192 | Seberger | Mar 1993 | A |
5214778 | Glider et al. | May 1993 | A |
5247664 | Thompson et al. | Sep 1993 | A |
5280577 | Trevett et al. | Jan 1994 | A |
5319776 | Hile et al. | Jun 1994 | A |
5379289 | DeSouza et al. | Jan 1995 | A |
5414833 | Hershey et al. | May 1995 | A |
5511213 | Correa | Apr 1996 | A |
5513345 | Sato et al. | Apr 1996 | A |
5600784 | Bissett et al. | Feb 1997 | A |
5606668 | Shwed | Feb 1997 | A |
5621889 | Lermuzeaux et al. | Apr 1997 | A |
5649215 | Itoh | Jul 1997 | A |
5655068 | Opoczynski | Aug 1997 | A |
5666479 | Kashimoto et al. | Sep 1997 | A |
5684957 | Kondo et al. | Nov 1997 | A |
5696486 | Poliquin et al. | Dec 1997 | A |
5737526 | Periasamy et al. | Apr 1998 | A |
5742771 | Fontaine | Apr 1998 | A |
5798706 | Kraemer et al. | Aug 1998 | A |
5805801 | Holloway et al. | Sep 1998 | A |
5815647 | Buckland et al. | Sep 1998 | A |
5832227 | Anderson et al. | Nov 1998 | A |
5848410 | Walls et al. | Dec 1998 | A |
5850515 | Lo et al. | Dec 1998 | A |
5905859 | Holloway et al. | May 1999 | A |
5919257 | Trostle | Jul 1999 | A |
5919258 | Kayashima et al. | Jul 1999 | A |
5920698 | Ben-Michael et al. | Jul 1999 | A |
5922049 | Radia et al. | Jul 1999 | A |
5958015 | Dascalu | Sep 1999 | A |
5969632 | Diamant et al. | Oct 1999 | A |
5982890 | Akatsu | Nov 1999 | A |
5991881 | Conklin et al. | Nov 1999 | A |
5995963 | Nanba et al. | Nov 1999 | A |
6000045 | Lewis | Dec 1999 | A |
6006019 | Takei | Dec 1999 | A |
6021510 | Nachenberg | Feb 2000 | A |
6083276 | Davidson et al. | Jul 2000 | A |
6094731 | Waldin et al. | Jul 2000 | A |
6119236 | Shipley | Sep 2000 | A |
6151624 | Teare et al. | Nov 2000 | A |
6167448 | Hemphill et al. | Dec 2000 | A |
6173333 | Jolitz et al. | Jan 2001 | B1 |
6182029 | Friedman | Jan 2001 | B1 |
6233704 | Scott et al. | May 2001 | B1 |
6279113 | Validya | Aug 2001 | B1 |
6282546 | Gleichauf et al. | Aug 2001 | B1 |
6295276 | Datta et al. | Sep 2001 | B1 |
6301668 | Gleichauf et al. | Oct 2001 | B1 |
6304973 | Williams | Oct 2001 | B1 |
6321338 | Porras et al. | Nov 2001 | B1 |
6363489 | Comay et al. | Mar 2002 | B1 |
6366934 | Cheng et al. | Apr 2002 | B1 |
6370648 | Diep | Apr 2002 | B1 |
6374207 | Li et al. | Apr 2002 | B1 |
6393386 | Zager et al. | May 2002 | B1 |
6405318 | Rowland | Jun 2002 | B1 |
6408311 | Baisley et al. | Jun 2002 | B1 |
6418446 | Lection et al. | Jul 2002 | B1 |
6421656 | Cheng et al. | Jul 2002 | B1 |
6446110 | Lection et al. | Sep 2002 | B1 |
6684335 | Epstein et al. | Jan 2004 | B1 |
6697950 | Ko | Feb 2004 | B1 |
6792546 | Shanklin et al. | Sep 2004 | B1 |
6862588 | Beged-Dov et al. | Mar 2005 | B2 |
20010056504 | Kuznetsov | Dec 2001 | A1 |
20020010715 | Chinn et al. | Jan 2002 | A1 |
20020013710 | Shimakawa | Jan 2002 | A1 |
20020035619 | Dougherty et al. | Mar 2002 | A1 |
20020038320 | Brook | Mar 2002 | A1 |
20020059528 | Dapp | May 2002 | A1 |
20020066035 | Dapp | May 2002 | A1 |
20020069318 | Chow et al. | Jun 2002 | A1 |
20020073091 | Jain et al. | Jun 2002 | A1 |
20020073119 | Richard | Jun 2002 | A1 |
20020082886 | Manganaris et al. | Jun 2002 | A1 |
20020083343 | Crosbie et al. | Jun 2002 | A1 |
20020087882 | Schneier et al. | Jul 2002 | A1 |
20020091999 | Guinart | Jul 2002 | A1 |
20020099710 | Papierniak | Jul 2002 | A1 |
20020099715 | Jahnke et al. | Jul 2002 | A1 |
20020099734 | Yassin et al. | Jul 2002 | A1 |
20020103829 | Manning et al. | Aug 2002 | A1 |
20020108059 | Canion et al. | Aug 2002 | A1 |
20020111963 | Gebert et al. | Aug 2002 | A1 |
20020111965 | Kutter | Aug 2002 | A1 |
20020112224 | Cox | Aug 2002 | A1 |
20020116550 | Hansen | Aug 2002 | A1 |
20020116585 | Scherr | Aug 2002 | A1 |
20020116644 | Richard | Aug 2002 | A1 |
20020120697 | Generous et al. | Aug 2002 | A1 |
20020122054 | Hind et al. | Sep 2002 | A1 |
20020133484 | Chau et al. | Sep 2002 | A1 |
20020143819 | Han et al. | Oct 2002 | A1 |
20020152244 | Dean et al. | Oct 2002 | A1 |
20020156772 | Chau et al. | Oct 2002 | A1 |
20020165872 | Meltzer et al. | Nov 2002 | A1 |
20030041302 | McDonald | Feb 2003 | A1 |
20030229846 | Sethi et al. | Dec 2003 | A1 |
20040025118 | Renner | Feb 2004 | A1 |
20040073870 | Fuh et al. | Apr 2004 | A1 |
20040083221 | Dapp et al. | Apr 2004 | A1 |
20040083387 | Dapp et al. | Apr 2004 | A1 |
20040083466 | Dapp et al. | Apr 2004 | A1 |
20040172234 | Dapp et al. | Sep 2004 | A1 |
20040194016 | Liggitt | Sep 2004 | A1 |
20050039124 | Chu et al. | Feb 2005 | A1 |
20050177543 | Chen et al. | Aug 2005 | A1 |
Number | Date | Country |
---|---|---|
2307529 | Sep 2001 | CA |
2000-112860 | Apr 2000 | JP |
2000-341324 | Dec 2000 | JP |
2002-526830 | Aug 2002 | JP |
2003-521779 | Jul 2003 | JP |
WO 0211399 | Feb 2002 | WO |
WO 02095543 | Nov 2002 | WO |
Number | Date | Country | |
---|---|---|---|
20020059528 A1 | May 2002 | US |
Number | Date | Country | |
---|---|---|---|
60248906 | Nov 2000 | US |