Secure unattended network authentication

Information

  • Patent Grant
  • 10860706
  • Patent Number
    10,860,706
  • Date Filed
    Monday, December 4, 2017
    6 years ago
  • Date Issued
    Tuesday, December 8, 2020
    3 years ago
Abstract
A system for secure network access by unattended devices is described. The system describes how unattended devices that have encrypted data at rest and/or require secure authentication to an open network may procure the access credentials for authentication and/or decryption. With these access credentials, then the unattended devices may exchange information with and/or receive updates from servers on the network.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS

The present application claims the benefit of U.S. patent application Ser. No. 14/695,923, filed on Apr. 24, 2015 and published as U.S. Pub. No. 2016/0314294 on Oct. 27, 2016. The foregoing patent application and patent publication are each hereby incorporated by reference their entirety.


FIELD OF THE INVENTION

The present invention relates to secure network access by unattended client devices.


BACKGROUND

Technological advances have made possible an ever-increasing number of different hardware electronic devices designed for all kinds of tasks. Almost all of these client devices involve some firmware, operating system software, and/or applications and/or program codes that require occasional updates or configuration changes. Some client devices may involve data collection and data processing that requires an exchange of information with servers on a network.


Depending upon the nature of the tasks involved, strong security may be required for some client devices. Such strong security may include encryption for the data on the client devices (data at rest) and/or for the data exchanged by the client devices (data in communication). The credentials for strong security on the client devices typically require external information involving users of the client devices, such as passwords, PINs, smartcards, or biometrics. When client devices are unattended, the credentials are not available and therefore prevent the client devices from receiving updates and or exchanging information with servers on the network. This is especially true in cases where the credentials for network access are frequently changing, such as in high security environments.


Current solutions to this problem are either labor intensive or compromise security. For example, when smartcards are required for authentication, such as in Department of Defense (DoD) or other comparable government applications, client devices must be operated by users in order to conduct the routine updates and or exchange of information. This user involvement is costly and labor intensive. Solutions where the credentials are stored on the client devices are less labor intensive but defeat the purpose of the strong security, unless some kind of tamper detection or tamper resistance is employed.


Accordingly, there is a need for a system where unattended client devices can securely procure the credentials for secure network access.


SUMMARY

Accordingly, one embodiment of the present invention discloses a system where an unattended first device sends a request for access credentials to a second device; the second device then sends a request for access credentials to a third device, exchanges pairing credentials with the third device, and if authenticated, receives access credentials from the third device, and sends the access credentials to the first device; the first device then sends the access credentials to a fourth device, and if validated, exchanges information with the fourth device.


Another exemplary embodiment of the present invention discloses a system where an unattended first device sends a request for access credentials to a second device; the second device sends the access credentials to the first device; the first device then sends the access credentials to a third device, and if validated, exchanges information with the third device.


The foregoing illustrative summary, as well as other exemplary objectives and/or advantages of the invention, and the manner in which the same are accomplished, are further explained within the following detailed description and its accompanying drawings.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1A and FIG. 1B are block diagrams of the hardware elements of the system in accordance embodiments of the disclosed subject matter.



FIG. 2A and FIG. 2B are schematics outlining the initial provisioning of pairing credentials in accordance with embodiments of the disclosed subject matter.



FIG. 3A and FIG. 3B are schematics detailing the procurement of access credentials by an unattended client device in accordance with embodiments of the disclosed subject matter.



FIG. 4A and FIG. 4B are block diagrams of the hardware elements of the system according to embodiments of the present invention.



FIG. 5A and FIG. 5B are schematics outlining the procurement of access credentials by an unattended client device according to embodiments of the present invention.





DETAILED DESCRIPTION

The present invention embraces the concept of unattended devices procuring access credentials for network access and/or data encryption so that updates may be received from servers and/or information exchanged with servers in a manner that does not compromise security or increase labor overhead.


In the present disclosure, “unattended” refers to the fact that the client device is not operated by a user who has authenticated to the device (by password, PIN, smartcard, biometric, etc.) at the time that the client device procures the access credentials necessary to allow the device to exchange information with and/or receive updates from servers on a network. Unattended client devices may procure access credentials by timed or triggered means that are well understood in the art, i.e. client devices may procure the access credentials according to a regular time schedule or in response to some triggering event, such as a notification of new data to exchange or the availability of a new update.


Also, in the present disclosure, “pairing credentials” refer to those credentials which authenticate the client device to a token server, and “access credentials” refer to those credentials which authenticate the client device to a server and/or decrypt an encrypted file system on the client device. The “access credential” includes, but is not limited to, a one-time password, a symmetric key, a public key along with its private key, for instance using the public key cryptography standards (PKCS) certificate formats, or the like.


Further, in the present disclosure, “authentication credentials” refer to those credentials which authenticate the client device and the secure credential device.


In the specification and/or figures, typical embodiments of the invention have been disclosed. The present invention is not limited to such exemplary embodiments. The use of the term “and/or” includes any and all combinations of one or more of the associated listed items. The figures are schematic representations and so are not necessarily drawn to scale. Unless otherwise noted, specific terms have been used in a generic and descriptive sense and not for purposes of limitation.



FIG. 1A illustrates an exemplary system 100 for one embodiment of the present invention. In general, the system 100 includes a client device (CD) 110, a secure credential device (SCD) 150, a token server (TS) 130, and a server (S) 140. The client device 110, secure credential device 150, token server 130, and server 140 may be implemented in any form of digital computer or mobile device. Digital computers may include, but are not limited to, laptops, desktops, workstations, fixed vehicle computers, vehicle mount computers, hazardous environment computers, rugged mobile computers, servers, blade servers, mainframes, other appropriate computers. Mobile devices may include, but are not limited to, cellular telephones, smart phones, personal digital assistants, tablets, pagers, two-way radios, netbooks, barcode scanners, radio frequency identification (RFID) readers, intelligent sensors, tracking devices, and other similar computing devices.


In some embodiments of the present invention, the client device 110, secure credential device 150, token server 130, and server 140 are connected via a network 170. The network 170 may be any type of wide area network (WAN), such as the Internet, Local Area Network (LAN), or the like, or any combination thereof, and may include wired components, such as Ethernet, wireless components, such as LTE, Wi-Fi, Bluetooth, or near field communication (NFC), or both wired and wireless components, collectively represented by the data links 172, 174, 176, and 178.


Note that while token server 130 and server 140 are illustrated in FIG. 1A, FIG. 1B, FIG. 4A, and FIG. 4B as individual single servers, each may alternatively be distributed across multiple servers having the respective functionality of the token server 130 and server 140. And still in other embodiments, the token server 130 and server 140 may also be combined into one single server or distributed across multiple servers having the overall combined functionality of token server 130 and server 140.


In general, the server 140 includes at least one processor 142 and associated memory 144 and a communication interface 148, such as wired Ethernet or wireless such as Wi-Fi, Bluetooth or NFC. The server 140 may also include additional components such as a storage component 146. The components of server 140 may be interconnected using one or more buses 141 and may be mounted on a motherboard (not shown) or some other appropriate configuration.


Similarly, in general, the token server 130 includes at least one processor 132 and associated memory 134 and a communication interface 138, such as wired Ethernet or wireless such as Wi-Fi, Bluetooth or NFC. The token server 130 may also include additional components such as a storage component 136. The components of token server 130 may be interconnected using one or more buses 131 and may be mounted on a motherboard (not shown) or some other appropriate configuration.


Further, in general, the secure credential device 150 includes at least one processor 152 and associated memory 154 and a communication interface 158, such as wired Ethernet or wireless such as Wi-Fi, Bluetooth or NFC. The secure credential device 150 may also include additional components such as a secure storage element 160 and slots/ports 156. The components of the secure credential device 150 may be interconnected using one or more buses 151 and may be mounted on a motherboard (not shown) or some other appropriate configuration. The secured credential device 150 has a wired communication channel 164 connecting it to the client device 110. The wired communication channel 164 may be USB, I2C, or other computer bus. In one embodiment, the wired communication channel 164 between the secure credential device 150 and the client device 110 can be protected by authentication; in this embodiment, the client device 110 stores the authentication credentials in the secure storage element 160 during an initial provisioning process that occurs while the client device 110 is still authenticated with a user. The secure credential device is also fixed in location 162, meaning that it is non-moveable.


The secure credential device 150 is built for tamper detection, tamper resistance, or both. In some embodiments, just specific components of the secure credential device 150 may be built for tamper detection, tamper resistance, or both, such as the secure storage element 160. Tamper detection methods include, but are not limited to, detection of ultraviolet fluorescent chemicals, detection of varying temperature, detection of varying clocking information, detection of varying voltage, and detection of varying electrical signals. Tamper resistance methods include, but are not limited to, the use of a potted material which would destroy one or more components of the secure credential device 150, such as the secure storage element 160, upon removal. Other tamper detection and tamper resistant methods are understood in the art and may be employed herein. In some embodiments, the secure credential device would report the detected tampering and might cause temporary or permanent disablement of the secure credential device. In yet other embodiments, where the secure storage element 160 of the secure credential device 150 implements tamper control that is acceptable and the communication interface 158 is wireless, the secure credential device 150 may further be designed to meet FIPS-140-2 by layering a protocol on top of the base wireless that uses validated encryption algorithms such as Advanced Encryption Standard (AES). In these embodiments, additional wireless encryption pairing credentials would be required between the secure credential device 150 and token server 130 to derive a link key for the validated encryption algorithm.


In one embodiment, the secure credential device 150 would be a dock for the client device 110. The dock would have the ability to cache access credentials and would include one or more mechanisms for providing user level authentication, including but not limited to: a common access card (CAC) reader, a touchscreen, a keypad, and a display for password entry. The dock further provides the recharging of the battery and ensures the essential constant power supply to the client device 110 during critical software and firmware updates.


In general, the client device 110 includes a processor 112 and associated memory 116 as well as a communication interface 122, such as wired Ethernet or wireless such as Wi-Fi, Bluetooth, or NFC. The client device 110 may include additional components such as a storage component 118 such as a hard drive or solid state drive, a location determination component 134 such as a Global Positioning System (GPS) chip, audio input component 124 such as a microphone, audio output component 128 such as a speaker, visual input component 126 such as a camera or barcode reader, visual output component 130 such as a display, and a user input component 120 such as a touchscreen, navigation shuttle, soft keys, or the like, and slots/ports 132 which may be used for smart card readers or for wired connections 164 with the secure credential device 150 over USB, I2C, or computer bus. The components of client device 110 may be interconnected using one or more buses 114 and may be mounted on a motherboard (not shown) or some other appropriate configuration.



FIG. 1B illustrates another embodiment of the present invention. The embodiment in FIG. 1B is similar to FIG. 1A with the exception that in FIG. 1B, the secure credential device 150 is internal to the client device 110. While FIG. 1B illustrates separate components for the client device 110 and secure credential device 150, in an alternative embodiment, the comparable components from the client device 110 and secure credential device 150 could be the same, i.e. processor 112 and 152, memory 116 and 154, communication interface 122 and 158, and communication link 172 and 178, and there may not be a need for slots/ports 132 and 156, since bus 114 and 151 may be the same. In some embodiments, the storage 118 and secure storage element 160 could also be the same, provided that the combination of the secure credential device 150 and client device 110 still allow for tamper detection, tamper resistance, or both.



FIG. 2A illustrates one embodiment of the present invention where the token server pairing credentials are initially provisioned on the secure credential device 150 using out of band means. In Step 2A-1, the pairing credentials are provisioned on the secure credential device 150 by a user who manually enters the credentials, copies them from a thumb drive or flash drive, or transfers them using NFC. In Step 2A-2, the secure credential device 150 then securely stores the pairing credentials in the secure storage element 160 for use in future sessions.



FIG. 2B illustrates an alternative embodiment of the present invention where the token server pairing credentials are initially provisioned on the secure credential device by pairing with the token server 130. In step 2B-1, the secure credential device 150 sends a pairing request with initial credentials to the token server 130. In step 2B-2, the token server 130 accepts the pairing request, and in step 2B-3, the token server and secure credential device exchange pairing credentials (i.e. the pairing key). In step 2B-4, the secure credential device then stores the pairing credentials for use in future sessions.



FIG. 3A illustrates the communication flow between the elements of system 100 of FIGS. 1A and 1B where the client device 110 procures access credentials from the token server 130 through the secure credential device 150 for accessing server 140. In step 3A-1, the client device 110 sends a request for the access credentials to the secure credential device 150. In step 3A-2, the secure credential device 150 sends a request for the access credentials to the token server 130. The secure credential device 150 and token sever 130 exchange pairing credentials to authenticate (Step 3A-3), and if authenticated (Step 3A-4), the token server 130 sends the access credentials to the secure credential device 150. In step 3A-5, the secure credential device 150 then stores the access credentials for use in a future session. In other embodiments, the secure credential device 150 does not store the access credentials but obtains them from the token server 130 each time the client device 110 needs to access the server 140, such as might be required in highly secure environments when the access credentials may be changing with greater frequency. In step 3A-6, the secure credential device 150 then sends the access credentials to the client device 110, which then sends them to the server 140 (Step 3A-7). If the server validates the access credentials (Step 3A-8), then the client device 110 and server 140 exchange information (Step 3A-9). The information exchanged includes, but is not limited to, firmware updates, operating system updates, application and/or program code updates, configuration setting changes, and customer data exchange.



FIG. 3B illustrates another embodiment of the present invention. The embodiment in FIG. 3B is similar to FIG. 3A with the exception that in FIG. 3B, there is the added step 3B-9 where the access credentials are used to unlock the local encrypted file system on the client device 110 so that information may be exchanged with server 140.



FIG. 4A illustrates yet another embodiment of the present invention. In this embodiment, the secure credential device 150 is external to the client device 110 but does not contain a communication interface for communicating with the token server 130 as in FIG. 1A. Because the secure credential device cannot communicate with the token server 130, it must be initially provisioned with the access credentials, such as at the time of manufacture where the access credentials would be included in the operating system image installed on the secure credential device.



FIG. 4B illustrates another embodiment of the present invention. In this embodiment, the secure credential device 150 is internal to the client device 110. While FIG. 4B illustrates separate components for the client device 110 and secure credential device 150, in an alternative embodiment, the comparable components could be the same, i.e. processor 112 and 152, and memory 116 and 154, and there may not be a need for slots/ports 132 and 156, since bus 114 and 151 may be the same. In some embodiments, the storage 118 and secure storage element 160 could also be the same, provided that the combination of the secure credential device 150 and client device 110 still allow for tamper detection, tamper resistance, or both.



FIG. 5A illustrates the communication flow between the elements of system 100 of FIGS. 4A and 4B where the client device 110 procures access credentials from the secure credential device 150 for accessing server 140. In step 5A-1, the client device 110 sends a request for access credentials to the secure credential device 150. Because the secure credential device 150 has already been provisioned with the access credentials at time of manufacture (Step 5A-2), then the secure credential device 150 can just send the access credentials to the client device 110 (Step 5A-3) which then sends them to the server 140 (Step 5A-4). If the access credentials are validated (Step 5A-5), then the client device 110 and server 140 exchange information (Step 5A-6). As before, the information exchanged includes, but is not limited to, firmware updates, operating system updates, application and/or program code updates, configuration setting changes, and customer data exchange. In some embodiments, the secure credential device 150 could be equivalent to a smartcard that could be used to perform the symmetric or private key encryption.



FIG. 5B illustrates another embodiment of the present invention. The embodiment in FIG. 5B is similar to FIG. 5A with the exception that in FIG. 5B, there is the added step 5B-6 where the access credentials are used to unlock the local encrypted file system on the client device 110 so that information may be exchanged with server 140.


Several implementations have been described herein. However, it will be understood that various modifications may be made without departing from the spirit and scope of the invention.


Additionally, the communication flows in the schematics of the figures do not require the particular order shown or sequential order to achieve the specified results. Further, other steps may be provided or eliminated from the schematics and other components may be added to or removed from the described systems. These other implementations are within the scope of the claims.


The following represent exemplary embodiments of the present disclosure.


A1. A system, comprising:


an unattended first device comprising:

    • a first communication interface;
    • a first control system communicatively coupled to the first communication interface and comprising at least one first hardware processor and a first memory storing program codes operable to:
      • send a request to the second device for access credentials;
      • receive the access credentials;
      • send the access credentials to the fourth device; and
      • if the access credentials is validated,
    • exchange information with the fourth device.


a second device comprising:

    • a second communication interface;
    • a second secured storage element;
    • a second control system communicatively coupled to the second communication interface and comprising at least one second hardware processor and a second memory storing program codes operable to:
      • receive a request for the access credentials from the first device;
      • send a request for the access credentials to the third device;
      • exchange pairing credentials with the third device to authenticate with the third device;
      • if authenticated with the third device, receive the access credentials; and
      • send the access credentials to the first device;


a third device comprising:

    • a third communication interface;
    • a third control system communicatively coupled to the third communication interface and comprising at least one third hardware processor and a third memory storing program codes operable to:
      • receive a request for the access credentials from the second device;
      • exchange pairing credentials with the second device to authenticate with the second device;
      • if authenticated with the second device, send the access credentials to the second device; and


a fourth device comprising:

    • a fourth communication interface;
    • a fourth control system communicatively coupled to the fourth communication interface and comprising at least one fourth hardware processor and a fourth memory storing program codes operable to:
      • receive access credentials from the first device;
      • validate the access credentials; and
      • if validated, exchange information with the first device.


        A2. The system of embodiment A1, wherein the second device is internal to the first device.


        A3. The system of embodiment A1, further comprising the first device using the access credentials to decrypt an encrypted file system.


        A4. The system of embodiment A1, wherein the information exchanged between the fourth device and the first device comprises one of the group consisting of: information to update software on the first device, information to update firmware on the first device, information to update applications on the first device, information to update program codes on the first device, information to make configuration setting changes on the first device, information to update the operating system on the first device, and information pertaining to customer data.


        A5. The system of embodiment A1, wherein the pairing credentials stored in the second device are stored in a tamper resistant manner.


        A6. The system of embodiment A5, wherein the tamper resistant manner comprises use of potted material which would destroy one or more components of the second device upon removal.


        A7. The system of embodiment A1, wherein the pairing credentials stored in the second device are stored in a manner to provide for tamper detection.


        A8. The system of embodiment A7, wherein the manner to provide for tamper detection comprises one of the group consisting of: detection of ultraviolet fluorescent chemicals, detection of varying temperature, detection of varying clocking information, detection of varying voltage, and detection of varying electrical signals.


        A9. The system of embodiment A7, wherein the second device, upon tamper detection, is further operable to:
    • report the detected tampering; and
    • disable one or more components of the second device.


      A10. The system of embodiment A1, wherein the pairing credentials are stored according to National Institute of Standards and Technology (NIST) standards.


      A11. The system of embodiment A1, wherein the pairing credentials exchanged between the second and third device are exchanged by out-of-band means.


      A12. The system of embodiment A11, wherein the out-of-band means comprises one of the group consisting of: direct user input at the second and third devices, use of a thumb drive at the second and third devices, use of a universal serial bus (USB) cable between the second and third device, or use of wired Ethernet cable between the second and third device.


      A13. The system of embodiment A1, wherein the pairing credentials exchanged between the second and third device are exchanged by use of a wireless communication channel.


      A14. The system of embodiment A13, wherein the wireless communication channel comprises one of the group consisting of: Bluetooth and a near field communication (NFC).


      A15. The system of embodiment A14, wherein the wireless communication channel is secured with an encryption algorithm.


      A16. The system of embodiment A1, wherein the second device is a dock for the first device with at least one mechanism for providing user level authentication, wherein the mechanism for providing user level authentication is selected from the group consisting of: a common access card (CAC) reader, a touchscreen, a keypad, and a display for password entry.


      A17. The system of embodiment A1, wherein the access credentials comprise one of a group consisting of: a one-time password, a symmetric key, a public key along with its private key, and a public key cryptography standard (PKCS) certificate.


      A18. The system of embodiment A1, wherein the second device is further operable to:
    • send a pairing request with initial credentials to the third device;
    • receive an acceptance of the pairing request form the third device; and
    • exchange pairing credentials with the third device.


      A19. The system of embodiment A1, wherein the third device is further operable to:
    • receive a pairing request with initial credentials from the second device;
    • send an acceptance of the pairing request to the second device; and
    • exchange pairing credentials with the second device.


      A20. The system of embodiment A1, wherein the second device is further operable to:
    • store the access credentials.


      A21. The system of embodiment A20, wherein the access credentials are stored in a tamper resistant manner.


      A22. The system of embodiment A21, wherein the tamper resistant manner comprises use of potted material which would destroy one or more components of the second device upon removal.


      A23. The system of embodiment A20, wherein the access credentials are stored in a manner to provide for tamper detection.


      A24. The system of embodiment A23, wherein the manner to provide for tamper detection comprises: detection of ultraviolet fluorescent chemicals, detection of varying temperature, detection of varying clocking information, detection of varying voltage, and detection of varying electrical signals.


      A25. The system of embodiment A23, wherein the second device, upon tamper detection, is further operable to:
    • report the detected tampering; and
    • disable one or more components of the second device.


      B26. A system, comprising:
    • an unattended first device comprising:
      • a first communication interface;
      • a first control system communicatively coupled to the first communication interface and comprising at least one first hardware processor and a first memory storing program codes operable to:
        • send a request to the second device for access credentials;
        • receive the access credentials;
        • send the access credentials to the third device; and
        • if the access credentials are validated,
      • exchange information with the third device.
    • a second device comprising:
      • a second communication interface;
      • a second secured storage element;
      • a second control system communicatively coupled to the second communication interface and comprising at least one second hardware processor and a second memory storing program codes operable to:
        • receive a request for the access credentials from the first device; and
        • send the access credentials to the first device; and
    • a third device comprising:
      • a third communication interface;
      • a third control system communicatively coupled to the third communication interface and comprising at least one third hardware processor and a third memory storing program codes operable to:
        • receive the access credentials from the first device;
        • validate the access credentials; and
        • if validated, exchange information with the first device.


          B27. The system of embodiment B26, wherein the second device is internal to the first device.


          B28. The system of embodiment B26, further comprising the first device using the access credentials to decrypt an encrypted file system.


          B29. The system of embodiment B26, wherein the information exchanged between the third device and the first device comprises one of the group consisting of: information to update software on the first device, information to update firmware on the first device, information to update applications on the first device, information to update program codes on the first device, information to make configuration setting changes on the first device, information to update the operating system on the first device, and information pertaining to customer data.


          B30. The system of embodiment B26, wherein the second device stores the access credentials in a tamper resistant manner.


          B31. The system of embodiment B30, wherein the tamper resistant manner comprises use of potted material which would destroy one or more components of the second device upon removal.


          B32. The system of embodiment B30, wherein the second device stores the access credentials in a manner to provide for tamper detection.


          B33. The system of embodiment B32, wherein the manner to provide for tamper detection comprises: detection of ultraviolet fluorescent chemicals, detection of varying temperature, detection of varying clocking information, detection of varying voltage, and detection of varying electrical signals.


          B34. The system of embodiment B32, wherein the second device, upon tamper detection, is further operable to:
    • report the detected tampering; and
    • disable one or more components of the second device.


      B35. The system of embodiment B26, wherein the second device stores the access credentials according to NIST standards.


      B36. The system of embodiment B26, wherein the access credentials comprise one of a group consisting of: a one-time password, a symmetric key, a public key along with its private key, and a PKCS certificate format.


      B37. The system of embodiment B26, wherein the second device is initially provisioned with the access credentials.


      B38. The system of embodiment 37, wherein the initial provisioning comprises the inclusion of the access credentials in the operating system image installed on the second device.


To supplement the present disclosure, this application incorporates entirely by reference the following commonly assigned patents, patent application publications, and patent applications:

  • U.S. Pat. Nos. 6,832,725; 7,128,266;
  • U.S. Pat. Nos. 7,159,783; 7,413,127;
  • U.S. Pat. Nos. 7,726,575; 8,294,969;
  • U.S. Pat. Nos. 8,317,105; 8,322,622;
  • U.S. Pat. Nos. 8,366,005; 8,371,507;
  • U.S. Pat. Nos. 8,376,233; 8,381,979;
  • U.S. Pat. Nos. 8,390,909; 8,408,464;
  • U.S. Pat. Nos. 8,408,468; 8,408,469;
  • U.S. Pat. Nos. 8,424,768; 8,448,863;
  • U.S. Pat. Nos. 8,457,013; 8,459,557;
  • U.S. Pat. Nos. 8,469,272; 8,474,712;
  • U.S. Pat. Nos. 8,479,992; 8,490,877;
  • U.S. Pat. Nos. 8,517,271; 8,523,076;
  • U.S. Pat. Nos. 8,528,818; 8,544,737;
  • U.S. Pat. Nos. 8,548,242; 8,548,420;
  • U.S. Pat. Nos. 8,550,335; 8,550,354;
  • U.S. Pat. Nos. 8,550,357; 8,556,174;
  • U.S. Pat. Nos. 8,556,176; 8,556,177;
  • U.S. Pat. Nos. 8,559,767; 8,599,957;
  • U.S. Pat. Nos. 8,561,895; 8,561,903;
  • U.S. Pat. Nos. 8,561,905; 8,565,107;
  • U.S. Pat. Nos. 8,571,307; 8,579,200;
  • U.S. Pat. Nos. 8,583,924; 8,584,945;
  • U.S. Pat. Nos. 8,587,595; 8,587,697;
  • U.S. Pat. Nos. 8,588,869; 8,590,789;
  • U.S. Pat. Nos. 8,596,539; 8,596,542;
  • U.S. Pat. Nos. 8,596,543; 8,599,271;
  • U.S. Pat. Nos. 8,599,957; 8,600,158;
  • U.S. Pat. Nos. 8,600,167; 8,602,309;
  • U.S. Pat. Nos. 8,608,053; 8,608,071;
  • U.S. Pat. Nos. 8,611,309; 8,615,487;
  • U.S. Pat. Nos. 8,616,454; 8,621,123;
  • U.S. Pat. Nos. 8,622,303; 8,628,013;
  • U.S. Pat. Nos. 8,628,015; 8,628,016;
  • U.S. Pat. Nos. 8,629,926; 8,630,491;
  • U.S. Pat. Nos. 8,635,309; 8,636,200;
  • U.S. Pat. Nos. 8,636,212; 8,636,215;
  • U.S. Pat. Nos. 8,636,224; 8,638,806;
  • U.S. Pat. Nos. 8,640,958; 8,640,960;
  • U.S. Pat. Nos. 8,643,717; 8,646,692;
  • U.S. Pat. Nos. 8,646,694; 8,657,200;
  • U.S. Pat. Nos. 8,659,397; 8,668,149;
  • U.S. Pat. Nos. 8,678,285; 8,678,286;
  • U.S. Pat. Nos. 8,682,077; 8,687,282;
  • U.S. Pat. Nos. 8,692,927; 8,695,880;
  • U.S. Pat. Nos. 8,698,949; 8,717,494;
  • U.S. Pat. Nos. 8,717,494; 8,720,783;
  • U.S. Pat. Nos. 8,723,804; 8,723,904;
  • U.S. Pat. Nos. 8,727,223; U.S. Pat. No. D702,237;
  • U.S. Pat. Nos. 8,740,082; 8,740,085;
  • U.S. Pat. Nos. 8,746,563; 8,750,445;
  • U.S. Pat. Nos. 8,752,766; 8,756,059;
  • U.S. Pat. Nos. 8,757,495; 8,760,563;
  • U.S. Pat. Nos. 8,763,909; 8,777,108;
  • U.S. Pat. Nos. 8,777,109; 8,779,898;
  • U.S. Pat. Nos. 8,781,520; 8,783,573;
  • U.S. Pat. Nos. 8,789,757; 8,789,758;
  • U.S. Pat. Nos. 8,789,759; 8,794,520;
  • U.S. Pat. Nos. 8,794,522; 8,794,526;
  • U.S. Pat. Nos. 8,798,367; 8,807,431;
  • U.S. Pat. Nos. 8,807,432; 8,820,630;
  • International Publication No. 2013/163789;
  • International Publication No. 2013/173985;
  • International Publication No. 2014/019130;
  • International Publication No. 2014/110495;
  • U.S. Patent Application Publication No. 2008/0185432;
  • U.S. Patent Application Publication No. 2009/0134221;
  • U.S. Patent Application Publication No. 2010/0177080;
  • U.S. Patent Application Publication No. 2010/0177076;
  • U.S. Patent Application Publication No. 2010/0177707;
  • U.S. Patent Application Publication No. 2010/0177749;
  • U.S. Patent Application Publication No. 2011/0202554;
  • U.S. Patent Application Publication No. 2012/0111946;
  • U.S. Patent Application Publication No. 2012/0138685;
  • U.S. Patent Application Publication No. 2012/0168511;
  • U.S. Patent Application Publication No. 2012/0168512;
  • U.S. Patent Application Publication No. 2012/0193423;
  • U.S. Patent Application Publication No. 2012/0203647;
  • U.S. Patent Application Publication No. 2012/0223141;
  • U.S. Patent Application Publication No. 2012/0228382;
  • U.S. Patent Application Publication No. 2012/0248188;
  • U.S. Patent Application Publication No. 2013/0043312;
  • U.S. Patent Application Publication No. 2013/0056285;
  • U.S. Patent Application Publication No. 2013/0070322;
  • U.S. Patent Application Publication No. 2013/0075168;
  • U.S. Patent Application Publication No. 2013/0082104;
  • U.S. Patent Application Publication No. 2013/0175341;
  • U.S. Patent Application Publication No. 2013/0175343;
  • U.S. Patent Application Publication No. 2013/0200158;
  • U.S. Patent Application Publication No. 2013/0256418;
  • U.S. Patent Application Publication No. 2013/0257744;
  • U.S. Patent Application Publication No. 2013/0257759;
  • U.S. Patent Application Publication No. 2013/0270346;
  • U.S. Patent Application Publication No. 2013/0278425;
  • U.S. Patent Application Publication No. 2013/0287258;
  • U.S. Patent Application Publication No. 2013/0292475;
  • U.S. Patent Application Publication No. 2013/0292477;
  • U.S. Patent Application Publication No. 2013/0293539;
  • U.S. Patent Application Publication No. 2013/0293540;
  • U.S. Patent Application Publication No. 2013/0306728;
  • U.S. Patent Application Publication No. 2013/0306730;
  • U.S. Patent Application Publication No. 2013/0306731;
  • U.S. Patent Application Publication No. 2013/0307964;
  • U.S. Patent Application Publication No. 2013/0308625;
  • U.S. Patent Application Publication No. 2013/0313324;
  • U.S. Patent Application Publication No. 2013/0313325;
  • U.S. Patent Application Publication No. 2013/0341399;
  • U.S. Patent Application Publication No. 2013/0342717;
  • U.S. Patent Application Publication No. 2014/0001267;
  • U.S. Patent Application Publication No. 2014/0002828;
  • U.S. Patent Application Publication No. 2014/0008430;
  • U.S. Patent Application Publication No. 2014/0008439;
  • U.S. Patent Application Publication No. 2014/0025584;
  • U.S. Patent Application Publication No. 2014/0027518;
  • U.S. Patent Application Publication No. 2014/0034734;
  • U.S. Patent Application Publication No. 2014/0036848;
  • U.S. Patent Application Publication No. 2014/0039693;
  • U.S. Patent Application Publication No. 2014/0042814;
  • U.S. Patent Application Publication No. 2014/0049120;
  • U.S. Patent Application Publication No. 2014/0049635;
  • U.S. Patent Application Publication No. 2014/0061305;
  • U.S. Patent Application Publication No. 2014/0061306;
  • U.S. Patent Application Publication No. 2014/0063289;
  • U.S. Patent Application Publication No. 2014/0066136;
  • U.S. Patent Application Publication No. 2014/0067692;
  • U.S. Patent Application Publication No. 2014/0070005;
  • U.S. Patent Application Publication No. 2014/0071840;
  • U.S. Patent Application Publication No. 2014/0074746;
  • U.S. Patent Application Publication No. 2014/0075846;
  • U.S. Patent Application Publication No. 2014/0076974;
  • U.S. Patent Application Publication No. 2014/0078341;
  • U.S. Patent Application Publication No. 2014/0078342;
  • U.S. Patent Application Publication No. 2014/0078345;
  • U.S. Patent Application Publication No. 2014/0084068;
  • U.S. Patent Application Publication No. 2014/0097249;
  • U.S. Patent Application Publication No. 2014/0098792;
  • U.S. Patent Application Publication No. 2014/0100774;
  • U.S. Patent Application Publication No. 2014/0100813;
  • U.S. Patent Application Publication No. 2014/0103115;
  • U.S. Patent Application Publication No. 2014/0104413;
  • U.S. Patent Application Publication No. 2014/0104414;
  • U.S. Patent Application Publication No. 2014/0104416;
  • U.S. Patent Application Publication No. 2014/0104451;
  • U.S. Patent Application Publication No. 2014/0106594;
  • U.S. Patent Application Publication No. 2014/0106725;
  • U.S. Patent Application Publication No. 2014/0108010;
  • U.S. Patent Application Publication No. 2014/0108402;
  • U.S. Patent Application Publication No. 2014/0108682;
  • U.S. Patent Application Publication No. 2014/0110485;
  • U.S. Patent Application Publication No. 2014/0114530;
  • U.S. Patent Application Publication No. 2014/0124577;
  • U.S. Patent Application Publication No. 2014/0124579;
  • U.S. Patent Application Publication No. 2014/0125842;
  • U.S. Patent Application Publication No. 2014/0125853;
  • U.S. Patent Application Publication No. 2014/0125999;
  • U.S. Patent Application Publication No. 2014/0129378;
  • U.S. Patent Application Publication No. 2014/0131438;
  • U.S. Patent Application Publication No. 2014/0131441;
  • U.S. Patent Application Publication No. 2014/0131443;
  • U.S. Patent Application Publication No. 2014/0131444;
  • U.S. Patent Application Publication No. 2014/0131445;
  • U.S. Patent Application Publication No. 2014/0131448;
  • U.S. Patent Application Publication No. 2014/0133379;
  • U.S. Patent Application Publication No. 2014/0136208;
  • U.S. Patent Application Publication No. 2014/0140585;
  • U.S. Patent Application Publication No. 2014/0151453;
  • U.S. Patent Application Publication No. 2014/0152882;
  • U.S. Patent Application Publication No. 2014/0158770;
  • U.S. Patent Application Publication No. 2014/0159869;
  • U.S. Patent Application Publication No. 2014/0160329;
  • U.S. Patent Application Publication No. 2014/0166755;
  • U.S. Patent Application Publication No. 2014/0166757;
  • U.S. Patent Application Publication No. 2014/0166759;
  • U.S. Patent Application Publication No. 2014/0166760;
  • U.S. Patent Application Publication No. 2014/0166761;
  • U.S. Patent Application Publication No. 2014/0168787;
  • U.S. Patent Application Publication No. 2014/0175165;
  • U.S. Patent Application Publication No. 2014/0175169;
  • U.S. Patent Application Publication No. 2014/0175172;
  • U.S. Patent Application Publication No. 2014/0175174;
  • U.S. Patent Application Publication No. 2014/0191644;
  • U.S. Patent Application Publication No. 2014/0191913;
  • U.S. Patent Application Publication No. 2014/0197238;
  • U.S. Patent Application Publication No. 2014/0197239;
  • U.S. Patent Application Publication No. 2014/0197304;
  • U.S. Patent Application Publication No. 2014/0203087;
  • U.S. Patent Application Publication No. 2014/0204268;
  • U.S. Patent Application Publication No. 2014/0214631;
  • U.S. Patent Application Publication No. 2014/0217166;
  • U.S. Patent Application Publication No. 2014/0217180;
  • U.S. patent application Ser. No. 13/367,978 for a Laser Scanning Module Employing an Elastomeric U-Hinge Based Laser Scanning Assembly, filed Feb. 7, 2012 (Feng et al.);
  • U.S. patent application Ser. No. 29/436,337 for an Electronic Device, filed Nov. 5, 2012 (Fitch et al.);
  • U.S. patent application Ser. No. 13/771,508 for an Optical Redirection Adapter, filed Feb. 20, 2013 (Anderson);
  • U.S. patent application Ser. No. 13/852,097 for a System and Method for Capturing and Preserving Vehicle Event Data, filed Mar. 28, 2013 (Barker et al.);
  • U.S. patent application Ser. No. 13/902,110 for a System and Method for Display of Information Using a Vehicle-Mount Computer, filed May 24, 2013 (Hollifield);
  • U.S. patent application Ser. No. 13/902,144, for a System and Method for Display of Information Using a Vehicle-Mount Computer, filed May 24, 2013 (Chamberlin);
  • U.S. patent application Ser. No. 13/902,242 for a System For Providing A Continuous Communication Link With A Symbol Reading Device, filed May 24, 2013 (Smith et al.);
  • U.S. patent application Ser. No. 13/912,262 for a Method of Error Correction for 3D Imaging Device, filed Jun. 7, 2013 (Jovanovski et al.);
  • U.S. patent application Ser. No. 13/912,702 for a System and Method for Reading Code Symbols at Long Range Using Source Power Control, filed Jun. 7, 2013 (Xian et al.);
  • U.S. patent application Ser. No. 29/458,405 for an Electronic Device, filed Jun. 19, 2013 (Fitch et al.);
  • U.S. patent application Ser. No. 13/922,339 for a System and Method for Reading Code Symbols Using a Variable Field of View, filed Jun. 20, 2013 (Xian et al.);
  • U.S. patent application Ser. No. 13/927,398 for a Code Symbol Reading System Having Adaptive Autofocus, filed Jun. 26, 2013 (Todeschini);
  • U.S. patent application Ser. No. 13/930,913 for a Mobile Device Having an Improved User Interface for Reading Code Symbols, filed Jun. 28, 2013 (Gelay et al.);
  • U.S. patent application Ser. No. 29/459,620 for an Electronic Device Enclosure, filed Jul. 2, 2013 (London et al.);
  • U.S. patent application Ser. No. 29/459,681 for an Electronic Device Enclosure, filed Jul. 2, 2013 (Chaney et al.);
  • U.S. patent application Ser. No. 13/933,415 for an Electronic Device Case, filed Jul. 2, 2013 (London et al.);
  • U.S. patent application Ser. No. 29/459,785 for a Scanner and Charging Base, filed Jul. 3, 2013 (Fitch et al.);
  • U.S. patent application Ser. No. 29/459,823 for a Scanner, filed Jul. 3, 2013 (Zhou et al.);
  • U.S. patent application Ser. No. 13/947,296 for a System and Method for Selectively Reading Code Symbols, filed Jul. 22, 2013 (Rueblinger et al.);
  • U.S. patent application Ser. No. 13/950,544 for a Code Symbol Reading System Having Adjustable Object Detection, filed Jul. 25, 2013 (Jiang);
  • U.S. patent application Ser. No. 13/961,408 for a Method for Manufacturing Laser Scanners, filed Aug. 7, 2013 (Saber et al.);
  • U.S. patent application Ser. No. 14/018,729 for a Method for Operating a Laser Scanner, filed Sep. 5, 2013 (Feng et al.);
  • U.S. patent application Ser. No. 14/019,616 for a Device Having Light Source to Reduce Surface Pathogens, filed Sep. 6, 2013 (Todeschini);
  • U.S. patent application Ser. No. 14/023,762 for a Handheld Indicia Reader Having Locking Endcap, filed Sep. 11, 2013 (Gannon);
  • U.S. patent application Ser. No. 14/035,474 for Augmented-Reality Signature Capture, filed Sep. 24, 2013 (Todeschini);
  • U.S. patent application Ser. No. 29/468,118 for an Electronic Device Case, filed Sep. 26, 2013 (Oberpriller et al.);
  • U.S. patent application Ser. No. 14/055,234 for Dimensioning System, filed Oct. 16, 2013 (Fletcher);
  • U.S. patent application Ser. No. 14/053,314 for Indicia Reader, filed Oct. 14, 2013 (Huck);
  • U.S. patent application Ser. No. 14/065,768 for Hybrid System and Method for Reading Indicia, filed Oct. 29, 2013 (Meier et al.);
  • U.S. patent application Ser. No. 14/074,746 for Self-Checkout Shopping System, filed Nov. 8, 2013 (Hejl et al.);
  • U.S. patent application Ser. No. 14/074,787 for Method and System for Configuring Mobile Devices via NFC Technology, filed Nov. 8, 2013 (Smith et al.);
  • U.S. patent application Ser. No. 14/087,190 for Optimal Range Indicators for Bar Code Validation, filed Nov. 22, 2013 (Hejl);
  • U.S. patent application Ser. No. 14/094,087 for Method and System for Communicating Information in an Digital Signal, filed Dec. 2, 2013 (Peake et al.);
  • U.S. patent application Ser. No. 14/101,965 for High Dynamic-Range Indicia Reading System, filed Dec. 10, 2013 (Xian);
  • U.S. patent application Ser. No. 14/150,393 for Indicia-reader Having Unitary Construction Scanner, filed Jan. 8, 2014 (Colavito et al.);
  • U.S. patent application Ser. No. 14/154,207 for Laser Barcode Scanner, filed Jan. 14, 2014 (Hou et al.);
  • U.S. patent application Ser. No. 14/165,980 for System and Method for Measuring Irregular Objects with a Single Camera filed Jan. 28, 2014 (Li et al.);
  • U.S. patent application Ser. No. 14/166,103 for Indicia Reading Terminal Including Optical Filter filed Jan. 28, 2014 (Lu et al.);
  • U.S. patent application Ser. No. 14/200,405 for Indicia Reader for Size-Limited Applications filed Mar. 7, 2014 (Feng et al.);
  • U.S. patent application Ser. No. 14/231,898 for Hand-Mounted Indicia-Reading Device with Finger Motion Triggering filed Apr. 1, 2014 (Van Horn et al.);
  • U.S. patent application Ser. No. 14/250,923 for Reading Apparatus Having Partial Frame Operating Mode filed Apr. 11, 2014, (Deng et al.);
  • U.S. patent application Ser. No. 14/257,174 for Imaging Terminal Having Data Compression filed Apr. 21, 2014, (Barber et al.);
  • U.S. patent application Ser. No. 14/257,364 for Docking System and Method Using Near Field Communication filed Apr. 21, 2014 (Showering);
  • U.S. patent application Ser. No. 14/264,173 for Autofocus Lens System for Indicia Readers filed Apr. 29, 2014 (Ackley et al.);
  • U.S. patent application Ser. No. 14/274,858 for Mobile Printer with Optional Battery Accessory filed May 12, 2014 (Marty et al.);
  • U.S. patent application Ser. No. 14/277,337 for MULTIPURPOSE OPTICAL READER, filed May 14, 2014 (Jovanovski et al.);
  • U.S. patent application Ser. No. 14/283,282 for TERMINAL HAVING ILLUMINATION AND FOCUS CONTROL filed May 21, 2014 (Liu et al.);
  • U.S. patent application Ser. No. 14/300,276 for METHOD AND SYSTEM FOR CONSIDERING INFORMATION ABOUT AN EXPECTED RESPONSE WHEN PERFORMING SPEECH RECOGNITION, filed Jun. 10, 2014 (Braho et al.);
  • U.S. patent application Ser. No. 14/305,153 for INDICIA READING SYSTEM EMPLOYING DIGITAL GAIN CONTROL filed Jun. 16, 2014 (Xian et al.);
  • U.S. patent application Ser. No. 14/310,226 for AUTOFOCUSING OPTICAL IMAGING DEVICE filed Jun. 20, 2014 (Koziol et al.);
  • U.S. patent application Ser. No. 14/327,722 for CUSTOMER FACING IMAGING SYSTEMS AND METHODS FOR OBTAINING IMAGES filed Jul. 10, 2014 (Oberpriller et al,);
  • U.S. patent application Ser. No. 14/327,827 for a MOBILE-PHONE ADAPTER FOR ELECTRONIC TRANSACTIONS, filed Jul. 10, 2014 (Hejl);
  • U.S. patent application Ser. No. 14/329,303 for CELL PHONE READING MODE USING IMAGE TIMER filed Jul. 11, 2014 (Coyle);
  • U.S. patent application Ser. No. 14/333,588 for SYMBOL READING SYSTEM WITH INTEGRATED SCALE BASE filed Jul. 17, 2014 (Barten);
  • U.S. patent application Ser. No. 14/334,934 for a SYSTEM AND METHOD FOR INDICIA VERIFICATION, filed Jul. 18, 2014 (Hejl);
  • U.S. patent application Ser. No. 14/336,188 for METHOD OF AND SYSTEM FOR DETECTING OBJECT WEIGHING INTERFERENCES, Filed Jul. 21, 2014 (Amundsen et al.);
  • U.S. patent application Ser. No. 14/339,708 for LASER SCANNING CODE SYMBOL READING SYSTEM, filed Jul. 24, 2014 (Xian et al.);
  • U.S. patent application Ser. No. 14/340,627 for an AXIALLY REINFORCED FLEXIBLE SCAN ELEMENT, filed Jul. 25, 2014 (Rueblinger et al.);
  • U.S. patent application Ser. No. 14/340,716 for an OPTICAL IMAGER AND METHOD FOR CORRELATING A MEDICATION PACKAGE WITH A PATIENT, filed Jul. 25, 2014 (Ellis);
  • U.S. patent application Ser. No. 14/342,544 for Imaging Based Barcode Scanner Engine with Multiple Elements Supported on a Common Printed Circuit Board filed Mar. 4, 2014 (Liu et al.);
  • U.S. patent application Ser. No. 14/345,735 for Optical Indicia Reading Terminal with Combined Illumination filed Mar. 19, 2014 (Ouyang);
  • U.S. patent application Ser. No. 14/336,188 for METHOD OF AND SYSTEM FOR DETECTING OBJECT WEIGHING INTERFERENCES, Filed Jul. 21, 2014 (Amundsen et al.);
  • U.S. patent application Ser. No. 14/355,613 for Optical Indicia Reading Terminal with Color Image Sensor filed May 1, 2014 (Lu et al.);
  • U.S. patent application Ser. No. 14/370,237 for WEB-BASED SCAN-TASK ENABLED SYSTEM AND METHOD OF AND APPARATUS FOR DEVELOPING AND DEPLOYING THE SAME ON A CLIENT-SERVER NETWORK filed Jul. 2, 2014 (Chen et al.);
  • U.S. patent application Ser. No. 14/370,267 for INDUSTRIAL DESIGN FOR CONSUMER DEVICE BASED SCANNING AND MOBILITY, filed Jul. 2, 2014 (Ma et al.);
  • U.S. patent application Ser. No. 14/376,472, for an ENCODED INFORMATION READING TERMINAL INCLUDING HTTP SERVER, filed Aug. 4, 2014 (Lu);
  • U.S. patent application Ser. No. 14/379,057 for METHOD OF USING CAMERA SENSOR INTERFACE TO TRANSFER MULTIPLE CHANNELS OF SCAN DATA USING AN IMAGE FORMAT filed Aug. 15, 2014 (Wang et al.);
  • U.S. patent application Ser. No. 14/452,697 for INTERACTIVE INDICIA READER, filed Aug. 6, 2014 (Todeschini);
  • U.S. patent application Ser. No. 14/453,019 for DIMENSIONING SYSTEM WITH GUIDED ALIGNMENT, filed Aug. 6, 2014 (Li et al.);
  • U.S. patent application Ser. No. 14/460,387 for APPARATUS FOR DISPLAYING BAR CODES FROM LIGHT EMITTING DISPLAY SURFACES filed Aug. 15, 2014 (Van Horn et al.);
  • U.S. patent application Ser. No. 14/460,829 for ENCODED INFORMATION READING TERMINAL WITH WIRELESS PATH SELECTON CAPABILITY, filed Aug. 15, 2014 (Wang et al.);
  • U.S. patent application Ser. No. 14/462,801 for MOBILE COMPUTING DEVICE WITH DATA COGNITION SOFTWARE, filed on Aug. 19, 2014 (Todeschini et al.);
  • U.S. patent application Ser. No. 14/446,387 for INDICIA READING TERMINAL PROCESSING PLURALITY OF FRAMES OF IMAGE DATA RESPONSIVELY TO TRIGGER SIGNAL ACTIVATION filed Jul. 30, 2014 (Wang et al.);
  • U.S. patent application Ser. No. 14/446,391 for MULTIFUNCTION POINT OF SALE APPARATUS WITH OPTICAL SIGNATURE CAPTURE filed Jul. 30, 2014 (Good et al.);
  • U.S. patent application Ser. No. 29/486,759 for an Imaging Terminal, filed Apr. 2, 2014 (Oberpriller et al.);
  • U.S. patent application Ser. No. 29/492,903 for an INDICIA SCANNER, filed Jun. 4, 2014 (Zhou et al.); and


U.S. patent application Ser. No. 29/494,725 for an IN-COUNTER BARCODE SCANNER, filed Jun. 24, 2014 (Oberpriller et al.).


In the specification and/or figures, typical embodiments of the invention have been disclosed. The present invention is not limited to such exemplary embodiments. The use of the term “and/or” includes any and all combinations of one or more of the associated listed items. The figures are schematic representations and so are not necessarily drawn to scale. Unless otherwise noted, specific terms have been used in a generic and descriptive sense and not for purposes of limitation.

Claims
  • 1. A method of authenticating a client device to a server, the method comprising: receiving, at a secure credential device, a request for an access credential from the client device over a first communication channel, wherein the secure credential device comprises one or more tamper detection features or tamper resistant features;wherein the client device is plugged into the secure credential device,wherein the access credential is configured to facilitate authentication of the client device to the server to exchange information with the server, andwherein the secure credential device comprises a second communication channel configured to communicatively couple the secure credential device to a remote token server via a wide area network;sending the request for the access credential from the secure credential device to the remote token server using the second communication channel;exchanging a pairing credential between the secure credential device and the remote token server, wherein the pairing credential is configured to authenticate the secure credential device to the remote token server;in response to the remote token server authenticating the secure credential device, automatically receiving the access credential from the remote token server at the secure credential device, wherein the remote token server generates the access credential each time the client device initiates communication with the server;in response to the secure credential device receiving the access credential, sending the access credential from the secure credential device to the client device over the first communication channel;sending the access credential to the server for validation, the server comprising a server communication interface configured to communicatively couple the client device and the server; andin response to the server validating the access credential, exchanging information between the client device and the server using the server communication interface.
  • 2. The method of claim 1, wherein the client device comprises a mobile device.
  • 3. The method of claim 1, wherein the secure credential device comprises a docking station for the client device.
  • 4. The method of claim 1, wherein receiving, at the secure credential device, the request for the access credential takes place when the client device and the secure credential device are unattended.
  • 5. The method of claim 1, wherein sending the access credential to the server takes place when the client device and the secure credential device are unattended.
  • 6. The method of claim 1, wherein exchanging information between the client device and the server takes place when the client device and the secure credential device are unattended.
  • 7. The method of claim 1, further comprising storing the access credential in memory housed in the secure credential device for future use.
  • 8. The method of claim 1, wherein the access credential is initially provisioned in memory housed in the secure credential device.
  • 9. The method of claim 1, wherein the secure credential device is fixed in location or non-moveable.
  • 10. The method of claim 1, wherein the one or more tamper detection features comprises features configured to detect one or more of: ultraviolet fluorescent chemicals, varying temperature, varying clocking information, varying voltage, and varying electrical signals.
  • 11. The method of claim 1, wherein the one or more tamper resistant features comprises a potted material configured to destroy one or more components of the secure credential device.
  • 12. The method of claim 1, wherein exchanging information between the client device and the server comprises exchanging customer data between the client device and the server.
  • 13. The method of claim 1, wherein exchanging information between the client device and the server comprises the client device receiving an update from the server.
  • 14. A method of authenticating a mobile device to a remote server, the method comprising: receiving a first request for an access credential from the mobile device via a secure credential device, the secure credential device comprising a first communication interface configured to communicatively couple the mobile device and the secure credential device and a second communication interface configured to communicatively couple the secure credential device and a remote token server via a wide area network, wherein the secure credential device comprises one or more tamper detection features or tamper resistant features;wherein the access credential is configured to facilitate authentication of the mobile device to the remote server to exchange information with the remote server, andwherein the secure credential device is internal to the mobile device;sending a second request for the access credential from the secure credential device to the remote token server using the second communication interface;exchanging a pairing credential between the secure credential device and the remote token server, wherein the pairing credential is configured to authenticate the secure credential device to the remote token server;in response to the remote token server authenticating the secure credential device, automatically receiving the access credential from the remote token server at the secure credential device, wherein the remote token server generates the access credential each time the mobile device initiates communication with the remote server using the second communication interface;sending the access credential from the secure credential device to the mobile device using the first communication interface; wherein the remote server comprises a third communication interface configured to communicatively couple the mobile device and the remote server, andwherein the mobile device is configured to send the access credential to the remote server for validation using the third communication interface; andin response to the remote server validating the access credential, exchanging information between the remote server and the mobile device using the third communication interface, the information comprising customer data and updates.
  • 15. The method of claim 14, wherein one or more of: receiving the first request for the access credential from the mobile device, sending the second request for the access credential from the secure credential device to the remote token server, exchanging the pairing credential between the secure credential device and the remote token server, receiving the access credential from the remote token server at the secure credential device and sending the access credential from the secure credential device to the mobile device, takes place when the mobile device and the secure credential device are unattended.
  • 16. The method of claim 14, wherein exchanging information between the remote server and the mobile device takes place when the mobile device and the secure credential device are unattended.
  • 17. A system for authenticating a mobile device to a remote server, the system comprising: a secure credential device in communication with the mobile device, the secure credential device comprising a first communication interface configured to communicatively couple the mobile device and the secure credential device, wherein the secure credential device is configured to receive a first request for an access credential from the mobile device using the first communication interface, the access credential is configured to facilitate authentication of the mobile device to a remote server to exchange information with the remote server when the mobile device is unattended;wherein the secure credential device comprises one or more tamper detection features or tamper resistant features;a remote token server configured to provide the access credential to the secure credential device, the secure credential device comprising a second communication interface configured to communicatively couple the secure credential device and the remote token server via a wide area network, wherein the secure credential device is configured to send a second request for the access credential to the remote token server using the second communication interface,wherein to receive the access credential from the remote token server using the second communication interface, the remote token server and the secure credential device are configured to exchange a pairing credential to authenticate the secure credential device,wherein the remote token server is configured to: generate the access credential each time the mobile device initiates communication with the remote server; andsend the access credential to the secure credential device when the remote token server authenticates the secure credential device, andwherein the secure credential device is configured to send the access credential to the mobile device using the first communication interface after having received the access credential from the remote token server; andthe remote server, wherein the remote server is configured to exchange information with the mobile device when the mobile device is unattended,the remote server comprises a third communication interface configured to communicatively couple the mobile device and the remote server,wherein the mobile device is configured to send the access credential to the remote server using the third communication interface when the mobile device is unattended, the mobile device having received the access credential from the secure credential device,wherein the remote server and the mobile device are configured to exchange information using the third communication interface when the mobile device is unattended and in response to the remote server validating the access credential, andwherein the information comprises customer data and updates.
  • 18. The system of claim 17, wherein the secure credential device further comprises a memory for storing the access credential for future use.
  • 19. The system of claim 18, wherein exchanging information between the client device and the remote server comprises the mobile device receiving an update from the remote server.
US Referenced Citations (675)
Number Name Date Kind
6832725 Gardiner et al. Dec 2004 B2
6976062 Denby et al. Dec 2005 B1
7128266 Zhu et al. Oct 2006 B2
7159783 Walczyk et al. Jan 2007 B2
7270275 Moreland Sep 2007 B1
7413127 Ehrhart et al. Aug 2008 B2
7726575 Wang et al. Jun 2010 B2
8065724 Waltenberg et al. Nov 2011 B2
8294969 Plesko Oct 2012 B2
8317105 Kotlarsky et al. Nov 2012 B2
8322622 Liu Dec 2012 B2
8366005 Kotlarsky et al. Feb 2013 B2
8371507 Haggerty et al. Feb 2013 B2
8376233 Van Horn et al. Feb 2013 B2
8381979 Franz Feb 2013 B2
8390909 Plesko Mar 2013 B2
8408464 Zhu et al. Apr 2013 B2
8408468 Horn et al. Apr 2013 B2
8408469 Good Apr 2013 B2
8424768 Rueblinger et al. Apr 2013 B2
8448863 Xian et al. May 2013 B2
8457013 Essinger et al. Jun 2013 B2
8459557 Havens et al. Jun 2013 B2
8469272 Kearney Jun 2013 B2
8474712 Kearney et al. Jul 2013 B2
8479992 Kotlarsky et al. Jul 2013 B2
8490877 Kearney Jul 2013 B2
8504505 Mintah Aug 2013 B2
8517271 Kotlarsky et al. Aug 2013 B2
8523076 Good Sep 2013 B2
8528818 Ehrhart et al. Sep 2013 B2
8544737 Gomez et al. Oct 2013 B2
8548420 Grunow et al. Oct 2013 B2
8550335 Samek et al. Oct 2013 B2
8550354 Gannon et al. Oct 2013 B2
8550357 Kearney Oct 2013 B2
8556174 Kosecki et al. Oct 2013 B2
8556176 Van Horn et al. Oct 2013 B2
8556177 Hussey et al. Oct 2013 B2
8559767 Barber et al. Oct 2013 B2
8561895 Gomez et al. Oct 2013 B2
8561903 Sauerwein Oct 2013 B2
8561905 Edmonds et al. Oct 2013 B2
8565107 Pease et al. Oct 2013 B2
8571307 Li et al. Oct 2013 B2
8579200 Samek et al. Nov 2013 B2
8583924 Caballero et al. Nov 2013 B2
8584945 Wang et al. Nov 2013 B2
8587595 Wang Nov 2013 B2
8587697 Hussey et al. Nov 2013 B2
8588869 Sauerwein et al. Nov 2013 B2
8590789 Nahill et al. Nov 2013 B2
8596539 Havens et al. Dec 2013 B2
8596542 Havens et al. Dec 2013 B2
8596543 Havens et al. Dec 2013 B2
8599271 Havens et al. Dec 2013 B2
8599957 Peake et al. Dec 2013 B2
8600158 Li et al. Dec 2013 B2
8600167 Showering Dec 2013 B2
8602309 Longacre et al. Dec 2013 B2
8608053 Meier et al. Dec 2013 B2
8608071 Liu et al. Dec 2013 B2
8611309 Wang et al. Dec 2013 B2
8615487 Gomez et al. Dec 2013 B2
8621123 Caballero Dec 2013 B2
8622303 Meier et al. Jan 2014 B2
8628013 Ding Jan 2014 B2
8628015 Wang et al. Jan 2014 B2
8628016 Winegar Jan 2014 B2
8629926 Wang Jan 2014 B2
8630491 Longacre et al. Jan 2014 B2
8635309 Berthiaume et al. Jan 2014 B2
8636200 Kearney Jan 2014 B2
8636212 Nahill et al. Jan 2014 B2
8636215 Ding et al. Jan 2014 B2
8636224 Wang Jan 2014 B2
8638806 Wang et al. Jan 2014 B2
8640958 Lu et al. Feb 2014 B2
8640960 Wang et al. Feb 2014 B2
8643717 Li et al. Feb 2014 B2
8646692 Meier et al. Feb 2014 B2
8646694 Wang et al. Feb 2014 B2
8657200 Ren et al. Feb 2014 B2
8659397 Vargo et al. Feb 2014 B2
8668149 Good Mar 2014 B2
8678285 Kearney Mar 2014 B2
8678286 Smith et al. Mar 2014 B2
8682077 Longacre Mar 2014 B1
D702237 Oberpriller et al. Apr 2014 S
8687282 Feng et al. Apr 2014 B2
8692927 Pease et al. Apr 2014 B2
8695880 Bremer et al. Apr 2014 B2
8698949 Grunow et al. Apr 2014 B2
8702000 Barber et al. Apr 2014 B2
8717494 Gannon May 2014 B2
8720783 Biss et al. May 2014 B2
8723804 Fletcher et al. May 2014 B2
8723904 Marty et al. May 2014 B2
8727223 Wang May 2014 B2
8736909 Sato et al. May 2014 B2
8740082 Wilz Jun 2014 B2
8740085 Furlong et al. Jun 2014 B2
8746563 Hennick et al. Jun 2014 B2
8750445 Peake et al. Jun 2014 B2
8752766 Xian et al. Jun 2014 B2
8756059 Braho et al. Jun 2014 B2
8757495 Qu et al. Jun 2014 B2
8760563 Koziol et al. Jun 2014 B2
8763909 Reed et al. Jul 2014 B2
8777108 Coyle Jul 2014 B2
8777109 Oberpriller et al. Jul 2014 B2
8779898 Havens et al. Jul 2014 B2
8781520 Payne et al. Jul 2014 B2
8783573 Havens et al. Jul 2014 B2
8789757 Barten Jul 2014 B2
8789758 Hawley et al. Jul 2014 B2
8789759 Xian et al. Jul 2014 B2
8794520 Wang et al. Aug 2014 B2
8794522 Ehrhart Aug 2014 B2
8794525 Amundsen et al. Aug 2014 B2
8794526 Wang et al. Aug 2014 B2
8798367 Ellis Aug 2014 B2
8807431 Wang et al. Aug 2014 B2
8807432 Van Horn et al. Aug 2014 B2
8820630 Qu et al. Sep 2014 B2
8822848 Meagher Sep 2014 B2
8824692 Sheerin et al. Sep 2014 B2
8824696 Braho Sep 2014 B2
8842849 Wahl et al. Sep 2014 B2
8844822 Kotlarsky et al. Sep 2014 B2
8844823 Fritz et al. Sep 2014 B2
8849019 Li et al. Sep 2014 B2
D716285 Chaney et al. Oct 2014 S
8851383 Yeakley et al. Oct 2014 B2
8854633 Laffargue Oct 2014 B2
8866963 Grunow et al. Oct 2014 B2
8868421 Braho et al. Oct 2014 B2
8868519 Maloy et al. Oct 2014 B2
8868802 Barten Oct 2014 B2
8868803 Caballero Oct 2014 B2
8870074 Gannon Oct 2014 B1
8879639 Sauerwein Nov 2014 B2
8880426 Smith Nov 2014 B2
8881983 Havens et al. Nov 2014 B2
8881987 Wang Nov 2014 B2
8903172 Smith Dec 2014 B2
8908995 Benos et al. Dec 2014 B2
8910870 Li et al. Dec 2014 B2
8910875 Ren et al. Dec 2014 B2
8914290 Hendrickson et al. Dec 2014 B2
8914788 Pettinelli et al. Dec 2014 B2
8915439 Feng et al. Dec 2014 B2
8915444 Havens et al. Dec 2014 B2
8916789 Woodburn Dec 2014 B2
8918250 Hollifield Dec 2014 B2
8918564 Caballero Dec 2014 B2
8925818 Kosecki et al. Jan 2015 B2
8939374 Jovanovski et al. Jan 2015 B2
8942480 Ellis Jan 2015 B2
8944313 Williams et al. Feb 2015 B2
8944327 Meier et al. Feb 2015 B2
8944332 Harding et al. Feb 2015 B2
8950678 Germaine et al. Feb 2015 B2
D723560 Zhou et al. Mar 2015 S
8967468 Gomez et al. Mar 2015 B2
8971346 Sevier Mar 2015 B2
8976030 Cunningham et al. Mar 2015 B2
8976368 Akel et al. Mar 2015 B2
8978981 Guan Mar 2015 B2
8978983 Bremer et al. Mar 2015 B2
8978984 Hennick et al. Mar 2015 B2
8985456 Zhu et al. Mar 2015 B2
8985457 Soule et al. Mar 2015 B2
8985459 Kearney et al. Mar 2015 B2
8985461 Gelay et al. Mar 2015 B2
8988578 Showering Mar 2015 B2
8988590 Gillet et al. Mar 2015 B2
8991704 Hopper et al. Mar 2015 B2
8996194 Davis et al. Mar 2015 B2
8996384 Funyak et al. Mar 2015 B2
8998091 Edmonds et al. Apr 2015 B2
9002641 Showering Apr 2015 B2
9007368 Laffargue et al. Apr 2015 B2
9010641 Qu et al. Apr 2015 B2
9015513 Murawski et al. Apr 2015 B2
9016576 Brady et al. Apr 2015 B2
D730357 Fitch et al. May 2015 S
9022288 Nahill et al. May 2015 B2
9030964 Essinger et al. May 2015 B2
9033240 Smith et al. May 2015 B2
9033242 Gillet et al. May 2015 B2
9036054 Koziol et al. May 2015 B2
9037344 Chamberlin May 2015 B2
9038911 Xian et al. May 2015 B2
9038915 Smith May 2015 B2
D730901 Oberpriller et al. Jun 2015 S
D730902 Fitch et al. Jun 2015 S
D733112 Chaney et al. Jun 2015 S
9047098 Barten Jun 2015 B2
9047359 Caballero et al. Jun 2015 B2
9047420 Caballero Jun 2015 B2
9047525 Barber Jun 2015 B2
9047531 Showering et al. Jun 2015 B2
9049640 Wang et al. Jun 2015 B2
9053055 Caballero Jun 2015 B2
9053378 Hou et al. Jun 2015 B1
9053380 Xian et al. Jun 2015 B2
9057641 Amundsen et al. Jun 2015 B2
9058526 Powilleit Jun 2015 B2
9061527 Tobin et al. Jun 2015 B2
9064165 Havens et al. Jun 2015 B2
9064167 Xian et al. Jun 2015 B2
9064168 Todeschini et al. Jun 2015 B2
9064254 Todeschini et al. Jun 2015 B2
9066032 Wang Jun 2015 B2
9070032 Corcoran Jun 2015 B2
D734339 Zhou et al. Jul 2015 S
D734751 Oberpriller et al. Jul 2015 S
9076459 Braho et al. Jul 2015 B2
9079423 Bouverie et al. Jul 2015 B2
9080856 Laffargue Jul 2015 B2
9082023 Feng et al. Jul 2015 B2
9084032 Rautiola et al. Jul 2015 B2
9087250 Coyle Jul 2015 B2
9092681 Havens et al. Jul 2015 B2
9092682 Wilz et al. Jul 2015 B2
9092683 Koziol et al. Jul 2015 B2
9093141 Liu Jul 2015 B2
9098763 Lu et al. Aug 2015 B2
9104929 Todeschini Aug 2015 B2
9104934 Li et al. Aug 2015 B2
9107484 Chaney Aug 2015 B2
9111159 Liu et al. Aug 2015 B2
9111166 Cunningham Aug 2015 B2
9135483 Liu et al. Sep 2015 B2
9137009 Gardiner Sep 2015 B1
9141839 Xian et al. Sep 2015 B2
9147096 Wang Sep 2015 B2
9148474 Skvoretz Sep 2015 B2
9158000 Sauerwein Oct 2015 B2
9158340 Reed et al. Oct 2015 B2
9158953 Gillet et al. Oct 2015 B2
9159059 Daddabbo et al. Oct 2015 B2
9165174 Huck Oct 2015 B2
9171543 Emerick et al. Oct 2015 B2
9183425 Wang Nov 2015 B2
9189669 Zhu et al. Nov 2015 B2
9195844 Todeschini et al. Nov 2015 B2
9202458 Braho et al. Dec 2015 B2
9208366 Liu Dec 2015 B2
9208367 Wang Dec 2015 B2
9219836 Bouverie et al. Dec 2015 B2
9224022 Ackley et al. Dec 2015 B2
9224024 Bremer et al. Dec 2015 B2
9224027 Van Horn et al. Dec 2015 B2
D747321 London et al. Jan 2016 S
9230140 Ackley Jan 2016 B1
9235553 Fitch et al. Jan 2016 B2
9239950 Fletcher Jan 2016 B2
9245492 Ackley et al. Jan 2016 B2
9443123 Hejl Jan 2016 B2
9248640 Heng Feb 2016 B2
9250652 London et al. Feb 2016 B2
9250712 Todeschini Feb 2016 B1
9251411 Todeschini Feb 2016 B2
9258033 Showering Feb 2016 B2
9262633 Todeschini et al. Feb 2016 B1
9262660 Lu et al. Feb 2016 B2
9262662 Chen et al. Feb 2016 B2
9269036 Bremer Feb 2016 B2
9270782 Hala et al. Feb 2016 B2
9274812 Doren et al. Mar 2016 B2
9275388 Havens et al. Mar 2016 B2
9277668 Feng et al. Mar 2016 B2
9280693 Feng et al. Mar 2016 B2
9286496 Smith Mar 2016 B2
9297900 Jiang Mar 2016 B2
9298964 Li et al. Mar 2016 B2
9301427 Feng et al. Mar 2016 B2
9304376 Anderson Apr 2016 B2
9310609 Rueblinger et al. Apr 2016 B2
9313377 Todeschini et al. Apr 2016 B2
9317037 Byford et al. Apr 2016 B2
D757009 Oberpriller et al. May 2016 S
9342723 Liu et al. May 2016 B2
9342724 McCloskey May 2016 B2
9361882 Ressler et al. Jun 2016 B2
9365381 Colonel et al. Jun 2016 B2
9373018 Colavito et al. Jun 2016 B2
9375945 Bowles Jun 2016 B1
9378403 Wang et al. Jun 2016 B2
D760719 Zhou et al. Jul 2016 S
9360304 Chang et al. Jul 2016 B2
9383848 Daghigh Jul 2016 B2
9384374 Bianconi Jul 2016 B2
9390596 Todeschini Jul 2016 B1
D762604 Fitch et al. Aug 2016 S
D762647 Fitch et al. Aug 2016 S
9411386 Sauerwein Aug 2016 B2
9412242 Van Horn et al. Aug 2016 B2
9418269 Havens et al. Aug 2016 B2
9418270 Van Volkinburg et al. Aug 2016 B2
9423318 Lui et al. Aug 2016 B2
D766244 Zhou et al. Sep 2016 S
9443222 Singel et al. Sep 2016 B2
9454689 McCloskey et al. Sep 2016 B2
9464885 Lloyd et al. Oct 2016 B2
9465967 Xian et al. Oct 2016 B2
9478113 Xie et al. Oct 2016 B2
9478983 Kather et al. Oct 2016 B2
D771631 Fitch et al. Nov 2016 S
9481186 Bouverie et al. Nov 2016 B2
9488986 Solanki Nov 2016 B1
9489782 Payne et al. Nov 2016 B2
9490540 Davies et al. Nov 2016 B1
9491729 Rautiola et al. Nov 2016 B2
9497092 Gomez et al. Nov 2016 B2
9507974 Todeschini Nov 2016 B1
9519814 Cudzilo Dec 2016 B2
9521331 Bessettes et al. Dec 2016 B2
9530038 Xian et al. Dec 2016 B2
D777166 Bidwell et al. Jan 2017 S
9558386 Yeakley Jan 2017 B2
9572901 Todeschini Feb 2017 B2
9606581 Howe et al. Mar 2017 B1
D783601 Schulte et al. Apr 2017 S
D785617 Bidwell et al. May 2017 S
D785636 Oberpriller et al. May 2017 S
9646189 Lu et al. May 2017 B2
9646191 Unemyr et al. May 2017 B2
9652648 Ackley et al. May 2017 B2
9652653 Todeschini et al. May 2017 B2
9656487 Ho et al. May 2017 B2
9659198 Giordano et al. May 2017 B2
D790505 Vargo et al. Jun 2017 S
D790546 Zhou et al. Jun 2017 S
D790553 Fitch et al. Jun 2017 S
9680282 Hanenburg Jun 2017 B2
9697401 Feng et al. Jul 2017 B2
9701140 Alaganchetty et al. Jul 2017 B1
20020063035 Blad May 2002 A1
20050109841 Ryan May 2005 A1
20050246470 Brenner Nov 2005 A1
20060149323 Merry Jul 2006 A1
20070063048 Havens et al. Mar 2007 A1
20070101403 Kubler May 2007 A1
20080014867 Finn Jan 2008 A1
20080168544 von Krogh Jul 2008 A1
20090134221 Zhu et al. May 2009 A1
20100177076 Essinger et al. Jul 2010 A1
20100177080 Essinger et al. Jul 2010 A1
20100177707 Essinger et al. Jul 2010 A1
20100177749 Essinger et al. Jul 2010 A1
20110169999 Grunow et al. Jul 2011 A1
20110202554 Powilleit et al. Aug 2011 A1
20110246773 Sidle Oct 2011 A1
20110249394 Nielsen Oct 2011 A1
20120111946 Golant May 2012 A1
20120168512 Kotlarsky et al. Jul 2012 A1
20120193423 Samek Aug 2012 A1
20120203647 Smith Aug 2012 A1
20120223141 Good et al. Sep 2012 A1
20130043312 Van Horn Feb 2013 A1
20130075168 Amundsen et al. Mar 2013 A1
20130175341 Kearney et al. Jul 2013 A1
20130175343 Good Jul 2013 A1
20130257744 Daghigh et al. Oct 2013 A1
20130257759 Daghigh Oct 2013 A1
20130270346 Xian et al. Oct 2013 A1
20130287258 Kearney Oct 2013 A1
20130292475 Kotlarsky et al. Nov 2013 A1
20130292477 Hennick et al. Nov 2013 A1
20130293539 Hunt et al. Nov 2013 A1
20130293540 Laffargue et al. Nov 2013 A1
20130306728 Thuries et al. Nov 2013 A1
20130306731 Pedraro Nov 2013 A1
20130307964 Bremer et al. Nov 2013 A1
20130308625 Park et al. Nov 2013 A1
20130313324 Koziol et al. Nov 2013 A1
20130332524 Fiala et al. Dec 2013 A1
20130342717 Havens et al. Dec 2013 A1
20140001267 Giordano et al. Jan 2014 A1
20140002828 Laffargue et al. Jan 2014 A1
20140008439 Wang Jan 2014 A1
20140025584 Liu et al. Jan 2014 A1
20140100813 Showering Jan 2014 A1
20140034734 Sauerwein Feb 2014 A1
20140036848 Pease et al. Feb 2014 A1
20140039693 Havens et al. Feb 2014 A1
20140049120 Kohtz et al. Feb 2014 A1
20140049635 Laffargue et al. Feb 2014 A1
20140061306 Wu et al. Mar 2014 A1
20140063289 Hussey et al. Mar 2014 A1
20140066136 Sauerwein et al. Mar 2014 A1
20140067692 Ye et al. Mar 2014 A1
20140070005 Nahill et al. Mar 2014 A1
20140071840 Venancio Mar 2014 A1
20140074746 Wang Mar 2014 A1
20140076974 Havens et al. Mar 2014 A1
20140078341 Havens et al. Mar 2014 A1
20140078342 Li et al. Mar 2014 A1
20140078345 Showering Mar 2014 A1
20140098792 Wang et al. Apr 2014 A1
20140100774 Showering Apr 2014 A1
20140103115 Meier et al. Apr 2014 A1
20140104413 McCloskey et al. Apr 2014 A1
20140104414 McCloskey et al. Apr 2014 A1
20140104416 Giordano et al. Apr 2014 A1
20140106725 Sauerwein Apr 2014 A1
20140108010 Maltseff et al. Apr 2014 A1
20140108402 Gomez et al. Apr 2014 A1
20140108682 Caballero Apr 2014 A1
20140110485 Toa et al. Apr 2014 A1
20140114530 Fitch et al. Apr 2014 A1
20140121438 Long et al. May 2014 A1
20140121445 Fontenot et al. May 2014 A1
20140124577 Wang et al. May 2014 A1
20140124579 Ding May 2014 A1
20140125842 Winegar May 2014 A1
20140125853 Wang May 2014 A1
20140125999 Longacre et al. May 2014 A1
20140129378 Richardson May 2014 A1
20140131438 Kearney May 2014 A1
20140131441 Nahill et al. May 2014 A1
20140131443 Smith May 2014 A1
20140131444 Wang May 2014 A1
20140131445 Ding et al. May 2014 A1
20140133379 Wang et al. May 2014 A1
20140136208 Maltseff et al. May 2014 A1
20140140585 Wang May 2014 A1
20140151453 Meier et al. Jun 2014 A1
20140152882 Samek et al. Jun 2014 A1
20140158770 Sevier et al. Jun 2014 A1
20140159869 Zumsteg et al. Jun 2014 A1
20140166755 Liu et al. Jun 2014 A1
20140166757 Smith Jun 2014 A1
20140166759 Liu et al. Jun 2014 A1
20140168787 Wang et al. Jun 2014 A1
20140175165 Havens et al. Jun 2014 A1
20140175172 Jovanovski et al. Jun 2014 A1
20140181955 Rosati Jun 2014 A1
20140191913 Ge et al. Jul 2014 A1
20140197239 Havens et al. Jul 2014 A1
20140197304 Feng et al. Jul 2014 A1
20140204268 Grunow et al. Jul 2014 A1
20140214631 Hansen Jul 2014 A1
20140217166 Berthiaume et al. Aug 2014 A1
20140217180 Liu Aug 2014 A1
20140231500 Ehrhart et al. Aug 2014 A1
20140245021 Nagai Aug 2014 A1
20140247315 Marty et al. Sep 2014 A1
20140263493 Amurgis et al. Sep 2014 A1
20140263645 Smith et al. Sep 2014 A1
20140270196 Braho et al. Sep 2014 A1
20140270229 Braho Sep 2014 A1
20140278387 DiGregorio Sep 2014 A1
20140282210 Bianconi Sep 2014 A1
20140288933 Braho et al. Sep 2014 A1
20140297058 Barker et al. Oct 2014 A1
20140299665 Barber et al. Oct 2014 A1
20140312121 Lu et al. Oct 2014 A1
20140319221 Oberpriller et al. Oct 2014 A1
20140326787 Barten Nov 2014 A1
20140332590 Wang et al. Nov 2014 A1
20140351317 Smith et al. Nov 2014 A1
20140353373 Van et al. Dec 2014 A1
20140361073 Qu et al. Dec 2014 A1
20140362184 Jovanovski et al. Dec 2014 A1
20140363015 Braho Dec 2014 A1
20140369511 Sheerin et al. Dec 2014 A1
20140374483 Lu Dec 2014 A1
20140374485 Xian et al. Dec 2014 A1
20150001301 Ouyang Jan 2015 A1
20150009338 Laffargue et al. Jan 2015 A1
20150014416 Kotlarsky et al. Jan 2015 A1
20150021397 Rueblinger et al. Jan 2015 A1
20150028102 Ren et al. Jan 2015 A1
20150028104 Ma et al. Jan 2015 A1
20150029002 Yeakley et al. Jan 2015 A1
20150032709 Maloy et al. Jan 2015 A1
20150039309 Braho et al. Feb 2015 A1
20150040378 Saber et al. Feb 2015 A1
20150044964 Khan Feb 2015 A1
20150048168 Fritz et al. Feb 2015 A1
20150049347 Laffargue et al. Feb 2015 A1
20150051992 Smith Feb 2015 A1
20150053766 Havens et al. Feb 2015 A1
20150053769 Thuries et al. Feb 2015 A1
20150062366 Liu et al. Mar 2015 A1
20150063215 Wang Mar 2015 A1
20150069130 Gannon Mar 2015 A1
20150071818 Scheuren et al. Mar 2015 A1
20150083800 Li et al. Mar 2015 A1
20150088522 Hendrickson et al. Mar 2015 A1
20150096872 Woodburn Apr 2015 A1
20150099557 Pettinelli et al. Apr 2015 A1
20150100196 Hollifield Apr 2015 A1
20150115035 Meier et al. Apr 2015 A1
20150126110 Ashley May 2015 A1
20150127791 Kosecki et al. May 2015 A1
20150128116 Chen et al. May 2015 A1
20150129659 Feng et al. May 2015 A1
20150133047 Smith et al. May 2015 A1
20150134470 Hejl et al. May 2015 A1
20150136851 Harding et al. May 2015 A1
20150142492 Kumar May 2015 A1
20150144692 Hejl May 2015 A1
20150144698 Teng et al. May 2015 A1
20150149946 Benos et al. May 2015 A1
20150161415 Kreft Jun 2015 A1
20150161429 Xian Jun 2015 A1
20150169925 Chen et al. Jun 2015 A1
20150169929 Williams et al. Jun 2015 A1
20150186703 Chen et al. Jul 2015 A1
20150188891 Grange Jul 2015 A1
20150193644 Kearney et al. Jul 2015 A1
20150199957 Funyak et al. Jul 2015 A1
20150204671 Showering Jul 2015 A1
20150210199 Payne Jul 2015 A1
20150213433 Khan Jul 2015 A1
20150220753 Zhu et al. Aug 2015 A1
20150254485 Feng et al. Sep 2015 A1
20150286252 Barone Oct 2015 A1
20150303993 Showering Oct 2015 A1
20150310243 Ackley Oct 2015 A1
20150310389 Crimm et al. Oct 2015 A1
20150327012 Bian et al. Nov 2015 A1
20160014251 Hejl Jan 2016 A1
20160040982 Li et al. Feb 2016 A1
20160042241 Todeschini Feb 2016 A1
20160048461 Marinelli Feb 2016 A1
20160057230 Todeschini et al. Feb 2016 A1
20160062473 Bouchat et al. Mar 2016 A1
20160092805 Geisler et al. Mar 2016 A1
20160101936 Chamberlin Apr 2016 A1
20160102975 McCloskey et al. Apr 2016 A1
20160104019 Todeschini et al. Apr 2016 A1
20160104274 Jovanovski et al. Apr 2016 A1
20160109219 Ackley et al. Apr 2016 A1
20160109220 Laffargue Apr 2016 A1
20160109224 Thuries et al. Apr 2016 A1
20160112631 Ackley et al. Apr 2016 A1
20160112643 Laffargue et al. Apr 2016 A1
20160117627 Raj et al. Apr 2016 A1
20160124516 Schoon et al. May 2016 A1
20160125217 Todeschini May 2016 A1
20160125342 Miller et al. May 2016 A1
20160133253 Braho et al. May 2016 A1
20160171597 Todeschini Jun 2016 A1
20160171666 McCloskey Jun 2016 A1
20160171720 Todeschini Jun 2016 A1
20160171775 Todeschini et al. Jun 2016 A1
20160171777 Todeschini et al. Jun 2016 A1
20160174674 Oberpriller et al. Jun 2016 A1
20160178479 Goldsmith Jun 2016 A1
20160178685 Young et al. Jun 2016 A1
20160178707 Young et al. Jun 2016 A1
20160179132 Harr et al. Jun 2016 A1
20160179143 Bidwell et al. Jun 2016 A1
20160179368 Roeder Jun 2016 A1
20160179378 Kent et al. Jun 2016 A1
20160180130 Bremer Jun 2016 A1
20160180133 Oberpriller et al. Jun 2016 A1
20160180136 Meier et al. Jun 2016 A1
20160180594 Todeschini Jun 2016 A1
20160180663 McMahan et al. Jun 2016 A1
20160180678 Ackley et al. Jun 2016 A1
20160180713 Bernhardt et al. Jun 2016 A1
20160185136 Ng et al. Jun 2016 A1
20160185291 Chamberlin Jun 2016 A1
20160186926 Oberpriller et al. Jun 2016 A1
20160188861 Todeschini Jun 2016 A1
20160188939 Sailors et al. Jun 2016 A1
20160188940 Lu et al. Jun 2016 A1
20160188941 Todeschini et al. Jun 2016 A1
20160188942 Good et al. Jun 2016 A1
20160188943 Linwood Jun 2016 A1
20160188944 Wilz et al. Jun 2016 A1
20160189076 Mellott et al. Jun 2016 A1
20160189087 Morton et al. Jun 2016 A1
20160189088 Percorari et al. Jun 2016 A1
20160189092 George et al. Jun 2016 A1
20160189284 Mellott et al. Jun 2016 A1
20160189288 Todeschini Jun 2016 A1
20160189366 Chamberlin et al. Jun 2016 A1
20160189443 Smith Jun 2016 A1
20160189447 Valenzuela Jun 2016 A1
20160189489 Au et al. Jun 2016 A1
20160191684 DiPiazza et al. Jun 2016 A1
20160192051 DiPiazza et al. Jun 2016 A1
20160125873 Braho et al. Jul 2016 A1
20160202951 Pike et al. Jul 2016 A1
20160202958 Zabel et al. Jul 2016 A1
20160202959 Doubleday et al. Jul 2016 A1
20160203021 Pike et al. Jul 2016 A1
20160203429 Mellott et al. Jul 2016 A1
20160203797 Pike et al. Jul 2016 A1
20160203820 Zabel et al. Jul 2016 A1
20160204623 Haggert et al. Jul 2016 A1
20160204636 Allen et al. Jul 2016 A1
20160204638 Miraglia et al. Jul 2016 A1
20160316190 McCloskey et al. Jul 2016 A1
20160227912 Oberpriller et al. Aug 2016 A1
20160232891 Pecorari Aug 2016 A1
20160239657 Loughlin-McHugh Aug 2016 A1
20160253660 D'Alisa Sep 2016 A1
20160292477 Bidwell Oct 2016 A1
20160294779 Yeakley et al. Oct 2016 A1
20160306769 Kohtz et al. Oct 2016 A1
20160314276 Sewell et al. Oct 2016 A1
20160314294 Kubler et al. Oct 2016 A1
20160323310 Todeschini et al. Nov 2016 A1
20160325677 Fitch et al. Nov 2016 A1
20160327614 Young et al. Nov 2016 A1
20160327930 Charpentier et al. Nov 2016 A1
20160328762 Pape Nov 2016 A1
20160330218 Hussey et al. Nov 2016 A1
20160343163 Venkatesha et al. Nov 2016 A1
20160343176 Ackley Nov 2016 A1
20160364914 Todeschini Dec 2016 A1
20160370220 Ackley et al. Dec 2016 A1
20160372282 Bandringa Dec 2016 A1
20160373847 Vargo et al. Dec 2016 A1
20160377414 Thuries et al. Dec 2016 A1
20160377417 Jovanovski et al. Dec 2016 A1
20170010141 Ackley Jan 2017 A1
20170010328 Mullen et al. Jan 2017 A1
20170010780 Waldron et al. Jan 2017 A1
20170016714 Laffargue et al. Jan 2017 A1
20170018094 Todeschini Jan 2017 A1
20170046603 Lee et al. Feb 2017 A1
20170047864 Stang et al. Feb 2017 A1
20170053146 Liu et al. Feb 2017 A1
20170053147 Geramine et al. Feb 2017 A1
20170053647 Nichols et al. Feb 2017 A1
20170055606 Xu et al. Mar 2017 A1
20170060316 Larson Mar 2017 A1
20170061961 Nichols et al. Mar 2017 A1
20170064634 Van Horn et al. Mar 2017 A1
20170083730 Feng et al. Mar 2017 A1
20170091502 Furlong et al. Mar 2017 A1
20170091706 Lloyd et al. Mar 2017 A1
20170091741 Todeschini Mar 2017 A1
20170091904 Ventress Mar 2017 A1
20170092908 Chaney Mar 2017 A1
20170094238 Germaine et al. Mar 2017 A1
20170098947 Wolski Apr 2017 A1
20170100949 Celinder et al. Apr 2017 A1
20170108838 Todeschinie et al. Apr 2017 A1
20170108895 Chamberlin et al. Apr 2017 A1
20170118355 Wong et al. Apr 2017 A1
20170123598 Phan et al. May 2017 A1
20170124369 Rueblinger et al. May 2017 A1
20170124396 Todeschini et al. May 2017 A1
20170124687 McCloskey et al. May 2017 A1
20170126873 McGary et al. May 2017 A1
20170126904 d'Armancourt et al. May 2017 A1
20170139012 Smith May 2017 A1
20170140329 Bernhardt et al. May 2017 A1
20170140731 Smith May 2017 A1
20170147847 Berggren et al. May 2017 A1
20170150124 Thuries May 2017 A1
20170169198 Nichols Jun 2017 A1
20170171035 Lu et al. Jun 2017 A1
20170171703 Maheswaranathan Jun 2017 A1
20170171803 Maheswaranathan Jun 2017 A1
20170180359 Wolski et al. Jun 2017 A1
20170180577 Nguon et al. Jun 2017 A1
20170181299 Shi et al. Jun 2017 A1
20170190192 Delario et al. Jul 2017 A1
20170193432 Bernhardt Jul 2017 A1
20170193461 Jonas et al. Jul 2017 A1
20170193727 Van Horn et al. Jul 2017 A1
20170200108 Au et al. Jul 2017 A1
20170200275 McCloskey et al. Jul 2017 A1
Foreign Referenced Citations (3)
Number Date Country
2013173985 Nov 2013 WO
2013163789 Nov 2013 WO
2014110495 Jul 2014 WO
Non-Patent Literature Citations (12)
Entry
NPL Search (Google Scholar) (Year: 2020).
Advisory Action (PTOL-303) dated May 19, 2017 for U.S. Appl. No. 14/695,923.
Final Rejection dated Feb. 8, 2017 for U.S. Appl. No. 14/695,923.
Final Rejection dated Jul. 26, 2018 for U.S. Appl. No. 14/695,923.
Non-Final Rejection dated Aug. 11, 2016 for U.S. Appl. No. 14/695,923.
Non-Final Rejection dated Jul. 3, 2017 for U.S. Appl. No. 14/695,923.
U.S. Patent Application for a Laser Scanning Module Employing an Elastomeric U-Hinge Based Laser Scanning Assembly, filed Feb. 7, 2012 (Feng et al.), U.S. Appl. No. 13/367,978.
U.S. Patent Application for Multifunction Point of Sale Apparatus With Optical Signature Capture filed Jul. 30, 2014 (Good et al.); 37 pages, U.S. Appl. No. 14/446,391.
U.S. Patent Application for Multipurpose Optical Reader, filed May 14, 2014 (Jovanovski et al.); 59 pages, U.S. Appl. No. 14/277,337.
U.S. Patent Application for Terminal Having Illumination and Focus Control filed May 21, 2014 (Liu et al.); 31 pages, U.S. Appl. No. 14/283,282.
U.S. Patent Application Reading Apparatus Having Partial Frame Operating Mode filed Apr. 11, 2014, (Deng et al.), U.S. Appl. No. 14/250,923.
Applicant Initiated Interview Summary (PTOL-413) dated Mar. 6, 2017 for U.S. Appl. No. 14/695,923.
Related Publications (1)
Number Date Country
20180101675 A1 Apr 2018 US
Continuations (1)
Number Date Country
Parent 14695923 Apr 2015 US
Child 15830641 US