The present invention relates generally to nonvolatile memory employed in devices coupled to a host and particularly to such nonvolatile memory including a protected memory area for secure data storage and management.
As part of increased security measures, digital storage devices, such as those used with Personal Computers (PC) and otherwise, rightfully deserve their fair share of additional security, particularly when used in an Internet environment.
That is, files saves for all sorts of usage, such as photography, passwords, data in general, at times, need to be securely handled without any threat of invasion, manipulation or simply theft. Currently, digital storage devices, such as a Jumpdrive made by Lexar Media, Inc. of Fremont, Calif., does not include safety measure features to avoid wrongful manipulation of data stored therein. The important reason for implementing security on a secure removable storage device is that such devices are prone to getting lost because they are small and portable.
Thus, the need arises for a secure removable storage device for storing data or information in a safe and secure manner thereby avoiding wrongful manipulation or deletion of the stored data while allowing further secure application of the removable storage device in the environment of the Internet.
There is an additional need to personalize the storage device so that user-selected or program settings are automatically executed regardless of which host the storage device is connected thereto.
Briefly, an embodiment of the present invention includes a secure storage system includes a removable storage device having a secure storage area for storage of secure data and a public storage area and device port for coupling the removable storage device to a host, the removable storage device appearing, to the host, to be non-removable so that the secure storage area remains hidden and the secure data remains secure.
The foregoing and other objects, features and advantages of the present invention will be apparent from the following detailed description of the preferred embodiments which make reference to several figures of the drawing.
Referring now to
Also shown in
In one embodiment of the present invention, the device 12 includes flash or nonvolatile memory and particularly in the secure area 14 and the public area 16.
While the ‘autorun.inf’ file is known to Windows operating systems, the concept of executing, automatically, files listed in the ‘autorun.inf’ for removable devices is not known. That is, in prior art systems, Microsoft operating systems do not support the ‘autorun’ feature for devices that are removably connected to a host.
The way in which the ‘autorun’ feature supports the device 12 is by making the device 12 appear as a ‘non-removable’ device rather than a ‘removable’ device to the operating system. This entails changing the firmware that resides or is stored within the device 12 so that it returns the properties of the device 12 as that of a ‘non-removable’ device. Particularly, upon a Small Computer Systems Interface (SCSI) inquiry from a host, a response thereto, from the device 12, indicates that the latter is ‘non-removable’.
A further change is to create an ‘autorun.inf’ file in a root directory, or at 22 in
The host 24 is shown to be coupled to a monitor 28 through the connection 34 and to a mouse device 32 through the connection 38 and to a keyboard device 30 through the connection 36. Following the example of
Another example of the contents of the ‘autorun.inf’ program is presented in
When a user connects a removable storage device, such as the device 12, to a host, such as the host 24 of
This relieves the user from determining which program to execute and at the same time, a setup program is automatically invoked;
In operation, the first time a user connects the device 12 to the host 24, the user is asked to select an application to be executed automatically, at 56. The application that the user wishes to select can reside either in the host 24 or in the device 12.
In
The device 12 remembers the name and the location of the user-selected application, i.e. MS Word. Thus, if the user plugs the device 12 into a second host or a host other than the host 24, the user-selected application is launched onto the second host. The user-selectable application could reside on the device 12 or the host.
As an example, the application Word will most likely reside on the host. The device 12 only remembers the “location” or “path” of the program to be executed on a device plug-in. If the location of Word is the same for a host1 and a host2 (which is normally true, unless user installed the WORD application at a specific location), then Word will run automatically on host1 and host2. If the user-selectable program resides on the device 12, it will execute in any case.
In
Every time the user plugs the device 12 into the host 24, execution of the software program, launched from the ‘autorun.inf’ file, causes checking of the device file system for integrity, which is done with the help of a Microsoft-provided program called ‘chkdsk’.
If the chkdsk program finds errors on the device file system, the user is informed of the error(s) and asked, by the system 10, for acknowledgement to fix the errors.
If the device 12 does not have a file system, i.e. it is a ‘raw’ device, the user is asked as to whether he/she would like to format (create a file system) on the device 12. This is all done by execution of the software program that is launched from the ‘autorun.inf’ file.
In
Next, at 88, a determination is made as to whether or not the device 12 is ‘good’ or ‘bad’, i.e. its storage locations are capable of properly storing information or not. ChkDsk program verifies the file system integrity by validating the entries of File Allocation Table (FAT). Specifically “all” the entries of the File Allocation Table.
If the device 12 is determined not be healthy or ‘good’ and is ‘bad’, an error is returned by the ‘chkdsk’ program and the user is informed at step 90 and then asked whether or not the user wishes to attempt to fix errors on the device 12. If the user responds in the positive, or would like to attempt to fix errors, the process continues to step 92 at which time the ‘chkdsk’ program is re-executed with a fix option to try to fix the errors of the device 12.
If at 88 no errors are noted, the ‘chkdsk’ program causes a report to be generated to the user informing the latter that the device 12 is healthy or ‘good’, at step 94, and the process stops at 96.
If, at 90, the user decides not to fix the errors, the process stops at 98.
While not depicted in
In accordance with another embodiment of the present invention,
In the embodiment of the
The device 100 also includes a port 108 for coupling the device 100 to a host. In one embodiment of the present invention, the port 108 is a USB port although other types of interfaces may be used without departing from the scope and spirit of the present invention.
Another security measure is to have any data written to or programmed within the secure partition 102 to be encrypted prior to being stored therein. In fact, in operation, when a user wishes to store information within the device 102 that is intended to be secure, i.e. stored within the secure partition 102, through the use of a host, as the user types the information, the information is encrypted, in real-time, and then stored in the secure partition 102.
As previously indicated, the device 100 is known to the operating system, such as a Windows Operating System, as a non-removable device and it is for this reason that the device 100 may be partitioned.
Currently, prior art system partition a device but only by way of software. That is, a software program partitions memory or storage locations and then keeps track of the partitions throughout the use of the storage device. The drawback to such prior art systems is that once the storage device is formatted or re-formatted, the partition is lost and the device once again appears as non-partitioned until partitioned again by software. Another drawback is that the information kept within all partitions is lost during formatting, thus, no data or information is actually stored truly securely.
The embodiment of
The device 100 is originally shipped to the user with only a public area which contains the JDSecure20.exe program. The User creates a secure area 102 by using this program and establishes a password for accessing the secure area. A User can re-partition the device 100 by using JDSecure20.exe program. The partitioning of the device is done by JDSecure20.exe program after authenticating the user by way of a password which initially was created by the user.
Information in the secure area can be altered once the user has opened the secure area for use. Such information is encrypted and protected from deletion upon disconnecting the device from the host. It could be unprotected again, for altering data or the size of the secure area only by a known user by way of a password.
The way in which the secure partition 102 is kept hidden to the operating system is by hidden attributes, thus, preventing the operating system from having the capability to assign any drive letters to the partition.
The master boot record 106 maintains a memory map of the assignment or partitioning of the device 100 and maintains information about the number of partitions in the device 100 and the size of the partitions. The master boot record 106 is read-only in order to avoid un-authorized deletion of the secure area. The master boot record 106 is a read-only area, therefore, once the device 100 is partitioned once, the master boot record 106 cannot be written thereto or programmed again, thus, preventing unauthorized deletion of the secure partition 102, and effectively partitioning the device 100 in hardware.
Next, at step 116, the master boot record 106 is written thereto or programmed. Next, at 118, a determination is made as to whether or not a secure partition is desired to be created. In some cases, a user may wish not to have a secure partition because no data is intended to be confidential and the user perhaps wishes to conveniently write, re-write or copy the storage locations of the device without any limitations. In the latter case, no secure partition is created and the process returns at 124 and the storage locations of the device are all partitioned as public and a master boot record exists but need not be read-only because there is no secure area to protect from deletion. Upon creation of a secure partition, the master boot record is changed to reflect this new partition and also made read-only in order to prevent unauthorized deletion of the secure partition.
However, if at 118, it is determined that a secure partition is intended to be created, the process continues to step 120 at which point such a partition is created with a size reflecting the size indicated at step 114. Next, at step 122, the master boot record, which by now, has been programmed using vendor unique commands to include the partitioning information, is protected to be read-only and even then using vendor unique commands only.
If a secure partition is created, it is marked as hidden by Microsoft operating system features and in particular, the attribute 0x16 in the master boot record 106. In this manner, the operating system is prevented from assigning a drive letter to the storage device in which the secure partition resides. The secure partition also becomes ‘firmware protected’ such that only vendor unique commands can be sent to the secure partition to prevent unauthorized deletion of the partition.
Next, the concept of encryption, in real-time or ‘on-the-fly’ will be discussed, as referred to briefly earlier. The data or information stored in the secure partition of a storage device may be encrypted ‘on-the-fly’ so that only the encrypted data is stored within the secure partition and the data, itself, in its raw form or without encryption is not stored anywhere. An example of this is provided with reference to
In
The application layer 130 includes application programs available to a user, examples of which include the Windows Explorer, Word, Outlook, etc. The application layer 130 is apparent to the user during his/her use, thus, it is designated as being within the user mode, whereas, the remaining structures of
Again referring to a previous example, assuming that the application being used is Word and thus included in the application layer 130, the input or information provided by the user, through the use of a keyboard or otherwise, is encrypted as soon as it is recognized as having been input by the system. The encryption is performed by the device driver 134.
The FAT 132 identifies the location of the Word program and the device driver 134 encrypts the information input by the user. A ‘driver’, as used herein, is generally a program that facilitates communication between hardware and software, i.e. it enables a particular software program to communicate to a particular hardware device.
The information encrypted by the driver 124 is communicated to yet another driver, namely the storage driver 136 (sometimes referred to as mass storage driver), which ultimately causes storage of the encrypted information within the device 138 and particularly within the secure partition of the device 138. In this manner, the data or information input by the user is not stored in its raw form (without encryption) anywhere, thus, maintaining the information securely while causing ‘on-the-fly’ or real-time encryption of data.
In one embodiment of the present invention, the device driver employs a 256 bit encryption algorithm as set forth by the American Encryption Standard (AES) and known to those of ordinary skill in the art, however, any other types of encryption algorithms may be employed without departing from the scope and spirit of the present invention.
When information that was input is accessed by the user, it is decrypted by the device driver 134 using the same algorithm as that used to encrypt data and then provided to the user. Data is first retrieved by the storage driver 136 from the device 138, in its encrypted form, then decrypted by the driver 134 and then provided to the user.
The device 140 is shown to also include a disk storage area 144 visible, i.e. read and writable, to the operating system, a master boot record 106 and a port 146, which in one embodiment of the present invention may be a USB port for communicating with a host. Application software uses vendor unique commands to store/retrieve confidential user profile information to and from the reserve memory area 142.
System software encrypts data “on-the-fly” going into the reserved memory area 142 providing additional level of security for confidential user information and decrypts data, which is requested out of the reserved memory area. This is discussed in greater detail hereinabove. The embodiment of
The manufacturer of the device 140 determines vendor unique commands and uses the same in a firmware program to read and write information to the reserve memory area 142. This keeps the information stored within the reserve memory area 142 confidential and can include such information as user profile, fingerprint templates, password provided by the user to access the secure partition, user's web links and associated ‘user name’ and ‘password’ pairs to access web accounts and/or encrypted security key used to encrypt the reserve memory area 142.
Fingerprint templates are stored fingerprint information used to verify a valid user by comparing the user's fingerprint information to the fingerprint templates searching for a match. The user, at one time, performs a fingerprint swipe and the user's fingerprint information is then stored within the reserve memory area 142.
A ‘key’ as used herein refers to an electronic number that is generated from a random key generator, which makes the key a unique number not readily repeated when another random number is generated and not readily known due to its random nature. The encryption technique employed is similar to that discussed hereinabove.
Perhaps some figures showing the way in which keys are generated is helpful at this time. Referring back to
Next, at step 174, the primary key and a master key, which is another random number are encrypted using known encryption techniques and an encrypted master key is generated.
At step 180, the encrypted master key is read and at step 184, the user's old password is obtained. At step 182, the read encrypted master key is decrypted using the old password that is obtained at 184 and by processing the steps discussed in
At step 183, a key schedule is generated using an AES decrypt key module or software program for use in decrypting the encrypted master key. Next, at step 185, the encrypted master key at 187 is decrypted to generate a master key, which is obviously based on the old password.
The encryption device driver 134 of
Although the present invention has been described in terms of specific embodiments, it is anticipated that alterations and modifications thereof will no doubt become apparent to those more skilled in the art.
This application claims the benefit of a previously filed U.S. Provisional Patent Application No. 60/567,132, filed on Apr. 30, 2004 and entitled “Direct Secondary Device Interface By A Host”, the disclosure of which is hereby incorporated by reference as though set forth in full.
Number | Name | Date | Kind |
---|---|---|---|
4099069 | Cricchi et al. | Jul 1978 | A |
4130900 | Watanabe | Dec 1978 | A |
4210959 | Wozniak | Jul 1980 | A |
4309627 | Tabata | Jan 1982 | A |
4355376 | Gould | Oct 1982 | A |
4398248 | Hsia et al. | Aug 1983 | A |
4405952 | Slakmon | Sep 1983 | A |
4414627 | Nakamura | Nov 1983 | A |
4450559 | Bond et al. | May 1984 | A |
4456971 | Fukuda et al. | Jun 1984 | A |
4468730 | Dodd et al. | Aug 1984 | A |
4473878 | Zolnowsky et al. | Sep 1984 | A |
4476526 | Dodd | Oct 1984 | A |
4498146 | Martinez | Feb 1985 | A |
4525839 | Nozawa et al. | Jun 1985 | A |
4532590 | Wallach et al. | Jul 1985 | A |
4609833 | Gutterman | Sep 1986 | A |
4616311 | Sato | Oct 1986 | A |
4654847 | Dutton | Mar 1987 | A |
4710871 | Belknap et al. | Dec 1987 | A |
4746998 | Robinson et al. | May 1988 | A |
4748320 | Yorimoto et al. | May 1988 | A |
4757474 | Fukushi et al. | Jul 1988 | A |
4774700 | Satoh et al. | Sep 1988 | A |
4780855 | Iida et al. | Oct 1988 | A |
4788665 | Fukuda et al. | Nov 1988 | A |
4797543 | Watanabe | Jan 1989 | A |
4800520 | Iijima | Jan 1989 | A |
4829169 | Watanabe | May 1989 | A |
4843224 | Ohta et al. | Jun 1989 | A |
4896262 | Wayama et al. | Jan 1990 | A |
4914529 | Bonke | Apr 1990 | A |
4920518 | Nakamura et al. | Apr 1990 | A |
4924331 | Robinson et al. | May 1990 | A |
4943745 | Watanabe et al. | Jul 1990 | A |
4953122 | Williams | Aug 1990 | A |
4970642 | Yamamura | Nov 1990 | A |
4970727 | Miyawaki et al. | Nov 1990 | A |
5070474 | Tuma et al. | Dec 1991 | A |
5093785 | Iijima | Mar 1992 | A |
5168465 | Harari | Dec 1992 | A |
5198380 | Harari | Mar 1993 | A |
5200959 | Gross et al. | Apr 1993 | A |
5218695 | Noveck et al. | Jun 1993 | A |
5220518 | Haq | Jun 1993 | A |
5226168 | Kobayashi et al. | Jul 1993 | A |
5227714 | Lou | Jul 1993 | A |
5253351 | Yamamoto et al. | Oct 1993 | A |
5267218 | Elbert | Nov 1993 | A |
5268318 | Harari | Dec 1993 | A |
5268870 | Harari | Dec 1993 | A |
5270979 | Harari et al. | Dec 1993 | A |
5293560 | Harari | Mar 1994 | A |
5297148 | Harari et al. | Mar 1994 | A |
5303198 | Adachi et al. | Apr 1994 | A |
5305276 | Uenoyama | Apr 1994 | A |
5305278 | Inoue | Apr 1994 | A |
5315541 | Harari et al. | May 1994 | A |
5315558 | Hag | May 1994 | A |
5329491 | Brown et al. | Jul 1994 | A |
5337275 | Garner | Aug 1994 | A |
5341330 | Wells et al. | Aug 1994 | A |
5341339 | Wells | Aug 1994 | A |
5341341 | Fukazo | Aug 1994 | A |
5353256 | Fandrich et al. | Oct 1994 | A |
5357475 | Hasbun et al. | Oct 1994 | A |
5359569 | Fujita et al. | Oct 1994 | A |
5365127 | Manley | Nov 1994 | A |
5369615 | Harari et al. | Nov 1994 | A |
5371702 | Nakai et al. | Dec 1994 | A |
5381539 | Yanai et al. | Jan 1995 | A |
5382839 | Shinohara | Jan 1995 | A |
5384743 | Rouy | Jan 1995 | A |
5388083 | Assar et al. | Feb 1995 | A |
5396468 | Harari et al. | Mar 1995 | A |
5404485 | Ban | Apr 1995 | A |
5406527 | Honma | Apr 1995 | A |
5418752 | Harari et al. | May 1995 | A |
5422842 | Cernea et al. | Jun 1995 | A |
5422856 | Sasaki et al. | Jun 1995 | A |
5428621 | Mehrotra et al. | Jun 1995 | A |
5430682 | Ishikawa et al. | Jul 1995 | A |
5430859 | Norman et al. | Jul 1995 | A |
5431330 | Wieres | Jul 1995 | A |
5434825 | Harari | Jul 1995 | A |
5438573 | Mangan et al. | Aug 1995 | A |
5465235 | Miyamoto | Nov 1995 | A |
5465338 | Clay | Nov 1995 | A |
5471478 | Mangan et al. | Nov 1995 | A |
5473765 | Gibbons et al. | Dec 1995 | A |
5479638 | Assar et al. | Dec 1995 | A |
5485595 | Assar et al. | Jan 1996 | A |
5490117 | Oda et al. | Feb 1996 | A |
5495442 | Cernea et al. | Feb 1996 | A |
5504760 | Harari et al. | Apr 1996 | A |
5508971 | Cernea et al. | Apr 1996 | A |
5513138 | Manabe et al. | Apr 1996 | A |
5515333 | Fujita et al. | May 1996 | A |
5519847 | Fandrich et al. | May 1996 | A |
5523980 | Sakui et al. | Jun 1996 | A |
5524230 | Sakaue et al. | Jun 1996 | A |
5530673 | Tobita et al. | Jun 1996 | A |
5530828 | Kaki et al. | Jun 1996 | A |
5530938 | Akasaka et al. | Jun 1996 | A |
5532962 | Auclair et al. | Jul 1996 | A |
5532964 | Cernea et al. | Jul 1996 | A |
5534456 | Yuan et al. | Jul 1996 | A |
5535328 | Harari et al. | Jul 1996 | A |
5541551 | Brehner et al. | Jul 1996 | A |
5544118 | Harari | Aug 1996 | A |
5544356 | Robinson | Aug 1996 | A |
5552698 | Tai et al. | Sep 1996 | A |
5554553 | Harari | Sep 1996 | A |
5563825 | Cernea et al. | Oct 1996 | A |
5566314 | DeMarco et al. | Oct 1996 | A |
5568439 | Harari | Oct 1996 | A |
5572466 | Sukegawa | Nov 1996 | A |
5579502 | Konishi et al. | Nov 1996 | A |
5581723 | Hasbun et al. | Dec 1996 | A |
5583812 | Harari | Dec 1996 | A |
5592415 | Kato et al. | Jan 1997 | A |
5592420 | Cernea et al. | Jan 1997 | A |
5596526 | Assar et al. | Jan 1997 | A |
5598370 | Niisima et al. | Jan 1997 | A |
5602987 | Harari et al. | Feb 1997 | A |
5603001 | Sukegawa et al. | Feb 1997 | A |
5606660 | Estakhri et al. | Feb 1997 | A |
5611067 | Okamoto et al. | Mar 1997 | A |
5640528 | Harney et al. | Jun 1997 | A |
5642312 | Harari | Jun 1997 | A |
5648929 | Miyamoto | Jul 1997 | A |
5663901 | Wallace et al. | Sep 1997 | A |
5693570 | Cernea et al. | Dec 1997 | A |
5712819 | Harari | Jan 1998 | A |
5719808 | Harari et al. | Feb 1998 | A |
5723990 | Roohparvar | Mar 1998 | A |
5734567 | Griffiths et al. | Mar 1998 | A |
5745418 | Ma et al. | Apr 1998 | A |
5754567 | Norman | May 1998 | A |
5757712 | Nagel et al. | May 1998 | A |
5758100 | Odisho | May 1998 | A |
5761117 | Uchino et al. | Jun 1998 | A |
5768190 | Tanaka et al. | Jun 1998 | A |
5768195 | Nakamura et al. | Jun 1998 | A |
5773901 | Kanter | Jun 1998 | A |
5778418 | Auclair et al. | Jul 1998 | A |
5781478 | Takeeuchi et al. | Jul 1998 | A |
5787445 | Daberko | Jul 1998 | A |
5787484 | Norman | Jul 1998 | A |
RE35881 | Barrett et al. | Aug 1998 | E |
5799168 | Ban | Aug 1998 | A |
5802551 | Komatsu et al. | Sep 1998 | A |
5809515 | Kaki et al. | Sep 1998 | A |
5809558 | Matthews et al. | Sep 1998 | A |
5809560 | Schneider | Sep 1998 | A |
5818350 | Estakhri et al. | Oct 1998 | A |
5818781 | Estakhri et al. | Oct 1998 | A |
5822245 | Gupta et al. | Oct 1998 | A |
5822252 | Lee et al. | Oct 1998 | A |
5822781 | Wells et al. | Oct 1998 | A |
5831929 | Manning | Nov 1998 | A |
5835935 | Estakhri et al. | Nov 1998 | A |
5838614 | Estakhri et al. | Nov 1998 | A |
5845313 | Estakhri et al. | Dec 1998 | A |
5847552 | Brown | Dec 1998 | A |
5860083 | Sukeawa | Jan 1999 | A |
5860124 | Matthews et al. | Jan 1999 | A |
5862099 | Gannage et al. | Jan 1999 | A |
5890192 | Lee et al. | Mar 1999 | A |
5901086 | Wang et al. | May 1999 | A |
5907856 | Estakhri et al. | May 1999 | A |
5909586 | Anderson | Jun 1999 | A |
5920884 | Jennings, III et al. | Jul 1999 | A |
5924113 | Estakhri et al. | Jul 1999 | A |
5928370 | Asnaashari | Jul 1999 | A |
5930815 | Estakhri et al. | Jul 1999 | A |
5933368 | Ma et al. | Aug 1999 | A |
5933846 | Endo | Aug 1999 | A |
5936971 | Harari et al. | Aug 1999 | A |
5937425 | Ban | Aug 1999 | A |
5953737 | Estakhri et al. | Sep 1999 | A |
5956473 | Ma et al. | Sep 1999 | A |
5959926 | Jones et al. | Sep 1999 | A |
5966727 | Nishino | Oct 1999 | A |
5986933 | Takeuchi et al. | Nov 1999 | A |
5987563 | Itoh et al. | Nov 1999 | A |
5987573 | Hiraka | Nov 1999 | A |
5991849 | Yamada et al. | Nov 1999 | A |
6011322 | Stumfall et al. | Jan 2000 | A |
6011323 | Camp | Jan 2000 | A |
6018265 | Keshtbod | Jan 2000 | A |
6021408 | Ledain et al. | Feb 2000 | A |
6026020 | Matsubara et al. | Feb 2000 | A |
6026027 | Terrell, II et al. | Feb 2000 | A |
6034897 | Estakhri et al. | Mar 2000 | A |
6035357 | Sakaki | Mar 2000 | A |
6040997 | Estakhri | Mar 2000 | A |
6047352 | Lakhani et al. | Apr 2000 | A |
6055184 | Acharya et al. | Apr 2000 | A |
6055188 | Takeuchi et al. | Apr 2000 | A |
6069827 | Sinclair | May 2000 | A |
6072796 | Christensen et al. | Jun 2000 | A |
6076137 | Asnaashari | Jun 2000 | A |
6081447 | Lofgren et al. | Jun 2000 | A |
6081878 | Estakhri et al. | Jun 2000 | A |
6084483 | Keshtbod | Jul 2000 | A |
6097666 | Sakui et al. | Aug 2000 | A |
6115785 | Estakhri et al. | Sep 2000 | A |
6122195 | Estakhri et al. | Sep 2000 | A |
6125424 | Komatsu et al. | Sep 2000 | A |
6125435 | Estakhri et al. | Sep 2000 | A |
6128695 | Estakhri et al. | Oct 2000 | A |
6134145 | Wong | Oct 2000 | A |
6134151 | Estakhri et al. | Oct 2000 | A |
6141249 | Estakhri et al. | Oct 2000 | A |
6145051 | Estakhri et al. | Nov 2000 | A |
6151247 | Estakhri et al. | Nov 2000 | A |
6172906 | Estakhri et al. | Jan 2001 | B1 |
6173362 | Yoda | Jan 2001 | B1 |
6181118 | Meehan et al. | Jan 2001 | B1 |
6182162 | Estakhri et al. | Jan 2001 | B1 |
6202138 | Estakhri et al. | Mar 2001 | B1 |
6223308 | Estakhri et al. | Apr 2001 | B1 |
6226708 | McGoldrick et al. | May 2001 | B1 |
6230234 | Estakhri et al. | May 2001 | B1 |
6262918 | Estakhri et al. | Jul 2001 | B1 |
6272610 | Katayama et al. | Aug 2001 | B1 |
6275436 | Tobita et al. | Aug 2001 | B1 |
6279069 | Robinson et al. | Aug 2001 | B1 |
6279114 | Toombs et al. | Aug 2001 | B1 |
6285607 | Sinclair | Sep 2001 | B1 |
6327639 | Asnaashari | Dec 2001 | B1 |
6345367 | Sinclair | Feb 2002 | B1 |
6374337 | Estakhri | Apr 2002 | B1 |
6393513 | Estakhri et al. | May 2002 | B2 |
6397314 | Estakhri et al. | May 2002 | B1 |
6411546 | Estakhri et al. | Jun 2002 | B1 |
6467021 | Sinclair | Oct 2002 | B1 |
6490649 | Sinclair | Dec 2002 | B2 |
6567307 | Estakhri | May 2003 | B1 |
6578127 | Sinclair | Jun 2003 | B1 |
6587382 | Estakhri et al. | Jul 2003 | B1 |
6711059 | Sinclair et al. | Mar 2004 | B2 |
6725321 | Sinclair et al. | Apr 2004 | B1 |
6728851 | Estakhri et al. | Apr 2004 | B1 |
6751155 | Gorobets | Jun 2004 | B2 |
6757800 | Estakhri et al. | Jun 2004 | B1 |
6813678 | Sinclair et al. | Nov 2004 | B1 |
6898662 | Gorobets | May 2005 | B2 |
6912618 | Estakhri et al. | Jun 2005 | B2 |
6950918 | Estakhri | Sep 2005 | B1 |
6957295 | Estakhri | Oct 2005 | B1 |
6973519 | Estakhri et al. | Dec 2005 | B1 |
6978342 | Estakhri et al. | Dec 2005 | B1 |
7000064 | Payne et al. | Feb 2006 | B2 |
20030033471 | Lin et al. | Feb 2003 | A1 |
20040068631 | Ukeda et al. | Apr 2004 | A1 |
20040103288 | Ziv et al. | May 2004 | A1 |
20040228487 | Maeda et al. | Nov 2004 | A1 |
20060236409 | Kuehnel et al. | Oct 2006 | A1 |
Number | Date | Country |
---|---|---|
0 557 723 | Jan 1987 | AU |
0 220 718 | May 1987 | EP |
0 243 503 | Nov 1987 | EP |
0 392 895 | Oct 1990 | EP |
0 424 191 | Apr 1991 | EP |
0 489 204 | Jun 1992 | EP |
0 522 780 | Jan 1993 | EP |
0 522 780 | Jan 1993 | EP |
0 544 252 | Jun 1993 | EP |
0 613 151 | Aug 1994 | EP |
0 617 363 | Sep 1994 | EP |
0 619 541 | Oct 1994 | EP |
0 663 636 | Jul 1995 | EP |
0 686 976 | Dec 1995 | EP |
0 897 579 | Jul 2000 | EP |
0 891 580 | Nov 2000 | EP |
0 896 669 | Nov 2000 | EP |
0 852 766 | May 2001 | EP |
0 852 765 | Sep 2001 | EP |
0 722 585 | May 2002 | EP |
0 910 826 | Jun 2002 | EP |
0 691 008 | Nov 2002 | EP |
0 861 468 | Apr 2003 | EP |
0 978 040 | May 2004 | EP |
1 157 328 | May 2005 | EP |
93 01908 | Aug 1993 | FR |
2 251 323 | Jul 1992 | GB |
2 291 990 | Feb 1996 | GB |
2 291 991 | Jul 1996 | GB |
2 297 637 | Jul 1996 | GB |
2 304 428 | Mar 1997 | GB |
2 348 991 | Dec 2002 | GB |
2 351 822 | Jan 2003 | GB |
2 384 337 | Jul 2003 | GB |
2 384 883 | Oct 2005 | GB |
2 384 338 | Nov 2005 | GB |
2 384 072 | Dec 2005 | GB |
2 411 499 | Feb 2006 | GB |
117881 | May 2003 | IS |
59-45695 (A) | Sep 1982 | JP |
58-215794 (A) | Dec 1983 | JP |
58-215795 (A) | Dec 1983 | JP |
59-162695 (A) | Mar 1984 | JP |
60-212900 | Oct 1985 | JP |
61-96598 (A) | May 1986 | JP |
62-283496 (A) | Dec 1987 | JP |
62-283497 (A) | Dec 1987 | JP |
63-183700 (A) | Jul 1988 | JP |
1-138694 | May 1989 | JP |
3-228377 | Oct 1991 | JP |
4-57295 | Feb 1992 | JP |
4-254994 | Sep 1992 | JP |
4-268284 | Sep 1992 | JP |
4-278297 | Oct 1992 | JP |
4-332999 (A) | Nov 1992 | JP |
5-128877 | May 1993 | JP |
5-282883 | Oct 1993 | JP |
6-36578 | Feb 1994 | JP |
6-124175 | May 1994 | JP |
6-124231 | May 1994 | JP |
6-131889 | May 1994 | JP |
6-132747 | May 1994 | JP |
6-149395 | May 1994 | JP |
6-266596 | Sep 1994 | JP |
7-93499 | Apr 1995 | JP |
7-311708 | Apr 1995 | JP |
8-18018 | Jan 1996 | JP |
8-69696 | Mar 1996 | JP |
9-147581 | Jun 1997 | JP |
1388877 | Apr 1988 | SU |
1408439 | Jul 1988 | SU |
1515164 | Oct 1989 | SU |
1541619 | Feb 1990 | SU |
1573458 | Jun 1990 | SU |
1686449 | Oct 1991 | SU |
9400628 | Feb 1984 | WO |
WO 9420906 | Sep 1994 | WO |
Number | Date | Country | |
---|---|---|---|
60567132 | Apr 2004 | US |