The present invention relates to generating value-bearing indicia such as postage or ticket indicia. More specifically, the invention relates to an on-line system for validating and printing value-bearing indicia in a Wide Area Network (WAN) environment.
Value-bearing indicia (VBI) are used in a variety of transactions where a holder of a VBI is entitled to receive goods or services. The holder of the VBI surrenders the VBI in exchange for receiving the goods or services. Typical examples of transactions using VBI are using postage stamps to mail packages, using a ticket to gain access to board an airplane, and using traveler's checks to pay for goods and services.
Transactions involving VBI comprise at least two steps, a user purchases a VBI from an issuing entity such as a postage vendor or airline and then the user redeems the VBI at the time the user wants to take delivery of an item from the issuing entity or use a service provided by the issuing entity. Purchasing the VBI may require a secure method allowing the user to purchase a valid VBI from the issuing entity.
An example of purchasing a VBI from an issuing entity is the purchase of metered postage from the a postage vendor. A significant percentage of the United States Postal Service (USPS) revenue is from metered postage. Metered postage is generated by utilizing postage meters that print special marks, also known as postal indicia, on mail pieces. Generally, printing postage can be carried out by using mechanical postage meters or computer-based systems.
With respect to computer-based postage processing systems, the USPS under the Information-Based Indicia Program (IBIP) has published specifications for IBIP postage meters that identify a special purpose hardware device, known as a Postal Security Device (PSD) that is generally located at a user's site. The PSD, in conjunction with the user's personal computer and printer, may function as the IBIP postage meter. The USPS has published a number of documents describing the PSD specifications, the indicia specifications and other related and relevant information.
A significant drawback of existing hardware-based systems is that a new PSD must be locally provided to each new user, which involves significant cost. Furthermore, if the additional PSD breaks down, service calls must be made to the user location. In light of the drawbacks in hardware-based postage metering systems, a software-based system has been developed that does not require specialized hardware for each user. The software-based system meets the IBIP specifications for a PSD, using a centralized server-based implementation of PSDs and includes a database for all users' information. The software-based system, however, has brought about new challenges.
The software-based system should be able to handle secure communications between users and the database. In a hardware-based system, security is generally handled by the local hardware piece, that is unique to each user and includes a cryptographic module that encrypts that user's information.
Another example of purchasing a VBI from an issuing entity is the purchase of a ticket to access a service such as an airline flight. Typically, a user buys a ticket directly from an airline or indirectly through a ticketing agency. The user specifies a flight and the airline or ticketing agency generates the ticket. The ticket generation process reserves a seat for the user and creates a ticket that is given to the user.
A significant drawback of existing ticketing systems is that the user may need to take physical possession of the ticket before it can be used. Physical receipt of the ticket usually requires that the airline or ticket agency mail the ticket to the user. Alternatively, the user may accept receipt of the ticket at a location prior to redeeming the ticket when boarding the specified flight.
Therefore, a software based on-line ticketing system is needed that is capable of issuing a ticket directly to the user so that the user can print the ticket for themselves. Furthermore, the issued ticket must be capable of being validated when the user redeems the ticket.
According to the present invention, Value Bearing Indicium (VBI) are generated for on-line applications using a digital signature algorithm. A VBI is generated by hashing user information to create a message digest that is used to create a digital signature. The digital signature is combined with the user information to create a VBI that can be validated by a variety of stand-alone or on-line methods.
In one aspect of the invention, a data processing system receives validation information from a user via a computer network. The data processing system generates a value bearing indicium using the validation information and stores the value bearing indicium in a validation information database. The data processing system transmits the value bearing indicium to the user via the computer network. The value bearing indicium is redeemed by scanning the value bearing indicium using a scanning application. The accepts the value bearing indicium from a scanning application via the computer network and determines a validity status for the value bearing indicium using the validation information database. The data processing system then transmits the validity status to the scanning application.
In another aspect of the invention, a ticket is provided to a user via a computer network. A ticket server is operably coupled to a validation information database. A distributor server is operably coupled to the ticket server via the computer network. A user sends a ticket request to the distributor server via the computer network. The ticket server generates validation information from the ticket request and transmits the validation information to the user. The user transmits the validation information to the ticket server and the ticket server generates a ticket. The ticket is stored in the validation information database and transmitted to the user. The ticket is scanned by a scanning application and the scanned ticket is transmitted to the ticket server. The ticket server determines a validity status for the ticket by using the validation information database and transmits the validity status to the scanning application and the distributor server.
These and other features, aspects, and advantages of the present invention will become better understood with regard to the following description, appended claims, and accompanying drawings where:
In one embodiment of the invention, an on-line value-bearing indicia printing system is based on a client/server architecture. Generally, in a system based on client/server architecture the server system delivers information to the client system. That is, the client system requests the services of a generally larger computer. In one embodiment, the client is a local personal computer and the server is a more powerful group of computers that house the information. The connection from the client to the server is made via a Local Area Network, a phone line or a TCP/IP based WAN on the Internet. Other forms of connections, such as wireless connection are possible. A primary reason to set up a client/server network is to allow many clients access to the same applications and files stored on the server system.
In one postage metering embodiment, the server system is remotely located in a separate location from the client. The server system is operably coupled to the client via the Internet.
In operation, a user uses the client system to transmit relevant information 112 to the server system. The server system generates a VBI 114 using a subset of the relevant information and transmits the VBI to the client system. The client system transmits the VBI 116 to the printer for printing. The user now has a hard copy of the VBI printed by the client system. The user takes the VBI and exchanges it for goods or services at another location.
A client software in association with a server software provides a graphical user interface (GUI) for interfacing with users and processing the information entered by the user. When a user activates a “print” button in a dialog box within the GUI, information such as the amount of the item or postage and other relevant data are transferred to the server. The PSD within a cryptographic device then generates a unique digital signature (discussed in more detail below) for the digital signature field of a postage indicium. Once all the other parameters required for the indicium are assembled, the indicium bitmap is generated and printed by the client software in accordance to the transmitted information.
In this embodiment, each client system 220a-220m includes a CPU 223, a keyboard 224, a mouse 225, a mass storage device 231, main computer memory 227, video memory 228, a communication interface 232a, and an input/output device 226 coupled and interacting via a communication bus. The data and images to be displayed on the monitor 230 are transferred first from the video memory 228 to the video amplifier 229 and then to the monitor 230. The communication interface 232a communicates with the servers 222a-222m via a network link 233a. The network link connects the client system to a local network 234. The local network 234 communicates with the Internet 221.
A client, preferably licensed by the USPS and registered with an IBIP vendor (such as Stamps.com), sends a request for authorization to print a desired amount of postage. The server system verifies that the client's account holds sufficient funds to cover the requested amount of postage, and if so, grants the request. The server system then sends authorization to the client system. The client system then sends image information for printing of a postal indicium for the granted amount to a printer so that the postal indicium is printed on an envelope or label.
Generation and verification of the indicium is carried out with a digital signature preferably using a Digital Signature Algorithm (DSA) as specified in the Digital Signature Standard (DSS) published as Federal Information Processing Standards Publication (FIPS PUB) 186 by the U.S. Department of Commerce/National Institute of Standards and Technology. The following steps describe the process of creation and verification of the indicium using a digital signature.
The subset of the relevant information is used to generate a 2-D barcode 248 to be printed along with a textual representation 246 of the digital signature. The combination of the subset of relevant information encoded as the 2-D barcode and the textual representation of the digital signature create a VBI 250 that may be printed and redeemed for goods or services by the user.
Redemption of the VBI requires verification of the VBI. The subset of relevant information is read 253 from the VBI 2-D barcode and processed 254 using a secure hash algorithm and a message digest is created 256. The digital signature is read 258 from the VBI and combined with the message digest and a public key 264 using a digital signal verification process 262. The digital signature process produces a binary output. Either the VBI is valid 266 or the VBI is invalid 268.
The use of a 2-D barcode and a textual representation for printing the subset of relevant information used to create the VBI and the resultant digital signature respectively is an exemplary embodiment of a VBI. Other methods of combining the subset of relevant information and the digital signature may be used to create the VBI. For example, both the subset of relevant information and the digital signature may be printed using a 2-D barcode or both may be printed using a textual representation. Furthermore, other methods of encoding the subset of relevant information and the resultant digital signature may be employed besides the exemplary textual and 2-D barcode encoding.
In one embodiment, an indicium generator hashes user information to create a message digest and generates a digital signature using the message digest. The above described PSD is an exemplary indicium generator useful for generating postal indicia. The PSD takes relevant information, such as the exemplary relevant postal information in the relevant information table 216 of
The PSD then uses the output of the hashing algorithm (first message digest) in conjunction with a private key to digitally sign a digital signature using DSA. It is generally impossible to retrieve the original message from the digitally signed message digest. DSA is a separate algorithm for digital signatures that cannot be used for encryption. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. A digital signature is represented in a computer as a string of binary digits. A digital signature is computed using a set of rules and a set of parameters such that the identity of the signatory and integrity of data can be verified. Signature generation makes use of a private key to generate a digital signature. Signature verification makes use of a public key which corresponds to, but is not the same as, the private key. Each user possesses a private key and public key pair. Private keys are never shared. Anyone can verify the signature of a user by employing that user's public key. The DSA authenticates the integrity of the signed data and the integrity of the signatory without encrypting the data, and without allowing the user to reconstruct the underlying data used to provide the digital signature. In this regard, the digital signature may be viewed as somewhat analogous to a human fingerprint that accurately identifies an individual but does not reveal the characteristics (e.g., height, weight, eye color) of the individual.
Referring again to
The verification of the digital signature is typically performed by the Postal service according to the following steps. The Postal Service scans the indicium printed on the mail piece including the digital signature with a barcode reader. The Post Office then reads the information in the table depicted in
The DSA verification process uses the second message digest, the scanned digital signature and the public key to verify the identity of the sender and that the data signed by the sender has not been changed. Note that there is no decryption involved in this process, and no comparison between decrypted information and human readable recipient address information appearing on the mail piece.
The process of signing a digital signature and verifying it is described in detail in FIPS PUB 186 entitled: “Digital Signature Standard” by U.S. Department of Commerce/National Institute of Standards and Technology.
As shown in the relevant information table of
In yet another embodiment, a “0” value is placed in the DDP field of the table of
In one embodiment, the digital signature 500 is created in plain text with an OCR-A (size I) standard and is placed to the left of the 2D barcode 502, as shown in
In another embodiment of the present invention, the digital signature 504 is created in plain text with an OCR-A (size I) standard and is placed below the 2D barcode 506, as shown in
The above described VBI generation and verification process is useful in a variety of applications. For example, the VBI generation and verification process can be used in on-line systems to issue postage, tickets, currency, vouchers, coupons and traveler's checks. An exemplary on-line postage system is described in U.S. patent application Ser. No. 09/163,993 filed Sep. 29, 1998, the contents of which are hereby incorporated by reference. The on-line postage system includes an authentication protocol that operates in conjunction with the USPS. The system utilizes on-line postage system software comprising user code that resides on a client system and controller code that resides on a server system. The on-line postage system allows a client to print a postal indicium at home, at the office, or any other desired place in a secure, convenient, inexpensive and fraud-free manner. The system comprises a user system electronically connected to a server system, which in turn is connected to a USPS system.
In one embodiment, the server system is remotely located in a separate location from the client. All communications between the client and the server are preferably accomplished via the Internet. Referring again to
The Server system 180 is designed in such a way that all of the business transactions are processed in the servers and not in the database. By locating the transaction processing in the servers, increases in the number of transactions can be easily handled by adding additional servers. Also, each transaction processed in the servers is stateless, meaning the application does not remember the specific hardware device the last transaction utilized. Because of this stateless transaction design, multiple machines can be added to each subsystem in order to handle increased loads. In one embodiment, load balancing hardware and software techniques are used to distribute traffic among the multiple servers.
Furthermore, each cryptographic module is a stateless device, meaning that a PSD package can be passed to any device because the application does not rely upon any information about what occurred with the previous PSD package. A PSD package for each cryptographic module includes all data needed to restore the PSD to its last known state when it is next loaded into a cryptographic module. This includes the items that the IBIP specifications require to be stored inside the PSD, information required to return the PSD to a valid state when the record is reloaded from the database, and data needed for record security and administrative purposes.
In one embodiment, the items included in a PSD package include ascending and descending registers, device ID, indicium key certificate serial number, licensing ZIP code, key token for the indicium signing key, the user secrets, key for encrypting user secrets, data and time of last transaction, the last challenge received from the client, the operational state of the PSD, expiration dates for keys, the passphrase repetition list and the like.
As a result, the need for specific PSDs being attached to specific cryptographic modules is eliminated. A Postal Server subsystem provides cryptographic module management services that allow multiple cryptographic modules to exist and function on one server, so additional cryptographic modules can easily be installed on a server. This Postal Sever subsystem is easy to scale by adding more cryptographic modules and using commonly known Internet load-balancing techniques to route inbound requests to the new cryptographic modules.
Postage servers 132 provide indicium creation, account maintenance, and revenue protection functionality for the on-line postage system. The Postage servers 132 include several physical servers in several distinct logical groupings, or services as described below. The individual servers could be located within one facility, or in several facilities, physically separated by great distance but connected by secure communication links.
Cryptographic modules 134 are responsible for creating PSD packages and manipulating PSD package data to protect sensitive information from disclosure, generating the cryptographic components of the digital indicium, and securely adjusting the user registers. When a user wishes to print postage or purchase additional postage value, a user state is instantiated in the PSD implemented within one of the cryptographic modules 134. Database 130 includes all the data accessible on-line for indicium creation, account maintenance, and revenue protection processes. Postage servers 132, Database 130, and cryptographic modules 134 are maintained in a physically secured environment, such as a vault.
In one embodiment, as illustrated in
In one embodiment of the present invention, the cryptographic modules 52 are FIPS 140-1 certified hardware cards or other hardware that include firmware to implement PSD functionality in a cryptographically secure way. The cryptographic modules are inserted into any of the servers in the Postal Server Infrastructure. The cryptographic modules are responsible for creating PSDs and manipulating PSD data to generate and verify digitally signed indicia. Since the PSD data is created and signed by a private key known only to the card, the PSD data may be stored externally to the cryptographic modules without compromising security.
In one embodiment of the present invention, Postal Server 53 is a standalone server process that provides secure connections to both the clients and the server administration utilities, providing both client authentication and connection management functionality to the system. Postal Server 53 also houses postal-specific services that require high levels of security, such as purchasing postage or printing indicia. Postal Server 53 is comprised of at least one server, and the number of servers increases when more clients need to be authenticated, are purchasing postage or are printing postage indicia.
In one embodiment of the present invention, PXS 54 is a standalone server process that provides trusted plain-text access to in-vault components. PXS 54 hosts postal-specific services that are protected from access external to the vault via a firewall. The PostalX Services provide business logic for postal functions such as device authorization and postage purchase/register manipulation. The PXS services require cryptographic modules to perform all functions because the PXS services are vital to the system's integrity and are protected by encryption. The PXS services can be located on one physical server or multiple machines depending on the number of postal-specific transactions.
When a client system sends a postage print request to the server system, the request must be authenticated before the client system is allowed to print the postage, and while the postage is being printed. The client system sends a password (or passphrase) entered by a user to the server system for verification. If the password fails, a preferably asynchronous dynamic password verification method terminates the session and printing of postage is aborted. Also, the server system communicates with a system located at the USPS for verification and authentication purposes. The information processing components of the on-line postage system include a client system, a postage server system located in a highly secure facility, a USPS system and the Internet as the communication medium among those systems. The information processing equipment communicates over a secured communication line.
The on-line postage system does not require any special purpose hardware for the client or user system. The client system is implemented in the form of software that can be executed on a user computer (client system) allowing the user computer to function as a virtual postage meter. The software can only be executed for the purpose of printing the postage indicium when the user computer is in communication with a server computer located, for example, at a postage meter vendor's facility (server system). The server system is capable of communicating with one or more client systems simultaneously.
The above described VBI generation and verification process can be used in on-line systems to issue tickets. In one embodiment, an indicium generator is used to provide tickets for air travel. Functionally, the system may be broken down into two parts, itinerary generation and Passenger Validation Information (PVI).
The exemplary ticketing system includes the purchase and printout of a ticket, such as an airline itinerary with an associated indicium that contains PVI used for boarding purposes. An airline ticket is used as an example throughout this example, however, it is understood that the ticketing system of the present invention is not limited to printing airline tickets. The ticketing system is capable of printing all types of tickets and value-bearing items such as, tickets for entertainment events, coupons, checks, gift certificates, and the like.
In the exemplary case of airline tickets, PVI includes fields such as ticket number, passenger name, seat number, flight number, etc. The user experience happens in the context of a standard web browser. A web site is provided that allows a user to purchase an airline ticket. After purchasing the ticket, the user is presented with an itinerary with an image of an indicium that contains the PVI associated with that ticket. The user is able to print out the web page using the standard print functionality provided by the browser.
The second part of the system includes the user interaction at the boarding gate. A standalone boarding application that interfaces with a scanner, for example, a Metanetics IR2000 scanner is presented. The printed page is scanned using the scanner, and the application displays the relevant PVI embedded in the indicium. Additionally, on a first time scan of the indicium, the application indicates that the passenger is cleared for boarding. Subsequent scans of the same indicium shows that the boarding pass has already been used. A scan of an indicium NOT generated by the system presents a “not valid indicium” message to the user indicating that the scanned indicium is not in the inventory database.
The following section describes the design and data flow to implement the functional requirements of one embodiment the system. This design eliminates the need for the system to host an application to generate indicia directly onto the web server data store. This minimizes coding and deployment efforts.
The indicium generator is operably coupled via the Internet 221 to a distributor Web server 700. The distributor Web server provides a user interface in the form of a Web site for the purchase of tickets. The distributor Web server also supplies the business rules controlling the purchase of tickets by a user. A Web browser running on an end-user's machine 707 is operably coupled to the distributor Web server via the Internet. A user uses the Web site hosted by the distributor Web server to purchase a ticket that is printed on a printer device 902.
A scanning machine 800 is operably coupled to a scanning device 900 for scanning tickets and operably coupled to the indicium generator server via the Internet. The scanning machine scans the ticket and contacts the indicium generator server to determine that the scanned ticket is valid.
A web server 700 hosts a web site that allows a user to navigate and purchase 702 a ticket. The web server is responsible for the Look and Feel (L&F) of the web site.
The web server, after application processing logic relevant to ticket reservation and generation, may generate a web page 704 with itinerary information, marketing data, and link to the indicium graphic. The link references an indicium generator web server 706 with sufficient parameters (PVI plus any other relevant reference data) in order to later generate the associated indicium image.
A browser hosted by end user machine 707 then displays the resultant page, resolving 708 the indicium link with the indicium generator server.
Upon receiving the request for the indicium image, the indicium generator web server enters the associated PVI data and other relevant data into the Indicium generator database 710 for later reference. After storing the data, the server generates the indicium image based on the PVI data.
The indicium image is returned 712 back to the browser for display within the itinerary page. At this point the user may print the page.
A scanning computer 800 hosts an application that interfaces with a scanner, such as a Metanetics IR2000 scanner. The application is responsible for providing a user interface to display the PVI data. Upon scanning the indicium, the PVI data from the indicium is extracted, and forwarded 802 to an indicium generator server 706 for processing.
Upon receiving the request, the indicium generator server application logic validates 804 the indicium data for referential integrity and existence within an indicium generator database 710. If the indicium has not already been redeemed, it is marked as redeemed.
If the PVI is being used for the first time, the indicium generator server sends a command 806 to the ticket distributor server to indicate the associated passenger has boarded the plane.
The indicium generator server returns a result 808 back to the scanning application indicating one of three possible events: valid PVI, PVI already redeemed; or invalid PVI data. The scan utility displays the contents of the indicium and the server result.
It will be recognized by those skilled in the art that various modifications may be made to the illustrated and other embodiments of the invention described above, without departing from the broad inventive scope thereof. It will be understood therefore that the invention is not limited to the particular embodiments or arrangements disclosed, but is rather intended to cover any changes, adaptations or modifications which are within the scope and spirit of the invention.
This application claims the benefit of U.S. Provisional Application No. 60/183,927 filed Feb. 22, 2000, and U.S. Provisional Application No. 60/182,935 filed Feb. 16, 2000, which are hereby incorporated by reference as if set forth in full herein.
Number | Name | Date | Kind |
---|---|---|---|
3688276 | Quinn | Aug 1972 | A |
4447890 | Duwel et al. | May 1984 | A |
4725718 | Sansone et al. | Feb 1988 | A |
4743747 | Fougere et al. | May 1988 | A |
4757537 | Edelmann et al. | Jul 1988 | A |
4775246 | Edelmann et al. | Oct 1988 | A |
4802218 | Wright et al. | Jan 1989 | A |
4812994 | Taylor et al. | Mar 1989 | A |
4831555 | Sansone et al. | May 1989 | A |
4837702 | Obrea | Jun 1989 | A |
4853865 | Sansone et al. | Aug 1989 | A |
4900903 | Wright et al. | Feb 1990 | A |
4900904 | Wright et al. | Feb 1990 | A |
4908770 | Breault et al. | Mar 1990 | A |
4933849 | Connell et al. | Jun 1990 | A |
4935961 | Gargiulo et al. | Jun 1990 | A |
4949381 | Pastor | Aug 1990 | A |
4980542 | Jackson et al. | Dec 1990 | A |
5048085 | Abraham et al. | Sep 1991 | A |
5058008 | Schumacher | Oct 1991 | A |
5075865 | Kawamura et al. | Dec 1991 | A |
5111030 | Brasington et al. | May 1992 | A |
5142577 | Pastor | Aug 1992 | A |
5181245 | Jones | Jan 1993 | A |
5241483 | Porret et al. | Aug 1993 | A |
5265221 | Miller | Nov 1993 | A |
5319562 | Whitehouse | Jun 1994 | A |
5325519 | Long et al. | Jun 1994 | A |
5341505 | Whitehouse | Aug 1994 | A |
5377268 | Hunter | Dec 1994 | A |
5384886 | Rourke | Jan 1995 | A |
5390251 | Pastor et al. | Feb 1995 | A |
5448641 | Pintsov et al. | Sep 1995 | A |
5454038 | Cordery et al. | Sep 1995 | A |
5471925 | Heinrich et al. | Dec 1995 | A |
5561795 | Sarkar | Oct 1996 | A |
5570465 | Tsakanikas | Oct 1996 | A |
5598477 | Berson | Jan 1997 | A |
5600562 | Guenther | Feb 1997 | A |
5621797 | Rosen | Apr 1997 | A |
5655023 | Cordery et al. | Aug 1997 | A |
5659616 | Sudia | Aug 1997 | A |
5666421 | Pastor et al. | Sep 1997 | A |
5668897 | Stolfo | Sep 1997 | A |
5671146 | Windel et al. | Sep 1997 | A |
5680629 | Slayden et al. | Oct 1997 | A |
5684951 | Goldman et al. | Nov 1997 | A |
5715314 | Payne et al. | Feb 1998 | A |
5729734 | Parker et al. | Mar 1998 | A |
5742683 | Lee et al. | Apr 1998 | A |
5768132 | Cordery et al. | Jun 1998 | A |
5781438 | Lee et al. | Jul 1998 | A |
5781634 | Cordery et al. | Jul 1998 | A |
5793867 | Cordery et al. | Aug 1998 | A |
5796841 | Cordery et al. | Aug 1998 | A |
5801944 | Kara | Sep 1998 | A |
5812990 | Ryan, Jr. et al. | Sep 1998 | A |
5812991 | Kara | Sep 1998 | A |
5819240 | Kara | Oct 1998 | A |
5822739 | Kara | Oct 1998 | A |
5825893 | Kara | Oct 1998 | A |
5867578 | Brickell et al. | Feb 1999 | A |
5871288 | Ryan, Jr. et al. | Feb 1999 | A |
5917924 | Herbert | Jun 1999 | A |
5918234 | Shah et al. | Jun 1999 | A |
5930796 | Pierce et al. | Jul 1999 | A |
5940383 | Willkie | Aug 1999 | A |
5953427 | Cordery et al. | Sep 1999 | A |
5956404 | Schneier et al. | Sep 1999 | A |
5960411 | Hartman et al. | Sep 1999 | A |
5978484 | Apperson et al. | Nov 1999 | A |
5983227 | Nazem et al. | Nov 1999 | A |
5987441 | Lee et al. | Nov 1999 | A |
5988897 | Pierce et al. | Nov 1999 | A |
6005945 | Whitehouse | Dec 1999 | A |
6009417 | Brookner et al. | Dec 1999 | A |
6010156 | Block | Jan 2000 | A |
6026385 | Harvey et al. | Feb 2000 | A |
6049671 | Slivka et al. | Apr 2000 | A |
6058384 | Pierce et al. | May 2000 | A |
6061671 | Baker et al. | May 2000 | A |
6064993 | Ryan, Jr. | May 2000 | A |
6065117 | White | May 2000 | A |
6070150 | Remington et al. | May 2000 | A |
6081810 | Rosenzweig et al. | Jun 2000 | A |
6098058 | Gravell et al. | Aug 2000 | A |
6105063 | Hayes, Jr. | Aug 2000 | A |
6134582 | Kennedy | Oct 2000 | A |
6151591 | Pierce et al. | Nov 2000 | A |
6161139 | Win et al. | Dec 2000 | A |
6164528 | Hills et al. | Dec 2000 | A |
6173209 | Laval et al. | Jan 2001 | B1 |
6192349 | Husemann et al. | Feb 2001 | B1 |
6223166 | Kay | Apr 2001 | B1 |
6226752 | Gupta et al. | May 2001 | B1 |
6233565 | Lewis et al. | May 2001 | B1 |
6233568 | Kara | May 2001 | B1 |
6249777 | Kara et al. | Jun 2001 | B1 |
6275824 | O'Flaherty et al. | Aug 2001 | B1 |
6286098 | Wenig et al. | Sep 2001 | B1 |
6324523 | Killeen, Jr. et al. | Nov 2001 | B1 |
6341274 | Leon | Jan 2002 | B1 |
6353926 | Parthesarathy et al. | Mar 2002 | B1 |
6367013 | Bisbee et al. | Apr 2002 | B1 |
6381589 | Leon | Apr 2002 | B1 |
6385654 | Tanaka | May 2002 | B1 |
6385731 | Ananda | May 2002 | B2 |
6408286 | Heiden | Jun 2002 | B1 |
6415983 | Ulvr et al. | Jul 2002 | B1 |
6424954 | Leon | Jul 2002 | B1 |
6427021 | Fischer et al. | Jul 2002 | B1 |
6446204 | Pang et al. | Sep 2002 | B1 |
6466921 | Cordery et al. | Oct 2002 | B1 |
6473743 | Ryan, Jr. | Oct 2002 | B1 |
6505773 | Palmer et al. | Jan 2003 | B1 |
6546377 | Gravell et al. | Apr 2003 | B1 |
6567794 | Cordery et al. | May 2003 | B1 |
6587880 | Saigo et al. | Jul 2003 | B1 |
6636983 | Levi | Oct 2003 | B1 |
6972859 | Patton et al. | Dec 2005 | B1 |
20010034716 | Goodwin | Oct 2001 | A1 |
20010037320 | Allport et al. | Nov 2001 | A1 |
20010055388 | Kaliski, Jr. | Dec 2001 | A1 |
20020023057 | Goodwin et al. | Feb 2002 | A1 |
20020046193 | Bator et al. | Apr 2002 | A1 |
20020095383 | Mengin et al. | Jul 2002 | A1 |
20030078893 | Shah et al. | Apr 2003 | A1 |
20030130954 | Carr et al. | Jul 2003 | A1 |
20050114712 | Devine et al. | May 2005 | A1 |
Number | Date | Country |
---|---|---|
19823907 | Dec 1999 | DE |
0 360 225 | Mar 1990 | EP |
0 576 113 | Dec 1993 | EP |
0 604 146 | Jun 1994 | EP |
0 604 148 | Jun 1994 | EP |
0 647 925 | Dec 1995 | EP |
0 604 146 | Nov 1997 | EP |
0 840 258 | May 1998 | EP |
0 854 448 | Jul 1998 | EP |
0 892 367 | Jan 1999 | EP |
0 927 958 | Jul 1999 | EP |
0 927 963 | Jul 1999 | EP |
0 948 158 | Oct 1999 | EP |
2318486 | Apr 1998 | GB |
WO 9427258 | Nov 1994 | WO |
WO 9813790 | Apr 1998 | WO |
WO 9857302 | Dec 1998 | WO |
WO 9857460 | Dec 1998 | WO |
WO 9918514 | Apr 1999 | WO |
WO 0019382 | Apr 2000 | WO |
WO 0070503 | Nov 2000 | WO |
WO 0150227 | Jul 2001 | WO |
Number | Date | Country | |
---|---|---|---|
20010034716 A1 | Oct 2001 | US |
Number | Date | Country | |
---|---|---|---|
60183927 | Feb 2000 | US | |
60182935 | Feb 2000 | US |