The present invention relates to the field of networking. More specifically, the present invention relates to the field of providing secure virtual private networks.
A Virtual Private Network (VPN) is a private network generally used by companies to transfer data over a public network. VPN packets are transferred over public networks such as the Internet using standard and typically insecure protocols. There are usually two components to a VPN, a secure internal network and an unsecure outside network. Secure networks are also referred to as private networks and unsecure networks are referred to as public networks. A firewall or some sort of security implementation is implemented between the internal network and the outside network to maintain security within the internal network. The firewall seeks to limit access to the internal network to those users with permission.
Attempts have been made to ensure that VPNs are secure. Some secure VPNs use cryptographic tunneling protocols to provide a number of security measures such as confidentiality to prevent snooping, sender authentication to prevent identity spoofing and message integrity to ensure messages are not manipulated. Tunneling allows data which is intended for a private network to be sent through a public network without the nodes of the public network knowing the data belongs to a private network. Tunneling is implemented by encapsulating the private network data and protocol information within public network transmission units so that the private network protocol information appears to be regular data to the public network. When implemented properly, VPNs like these create a relatively secure communication medium over unsecured networks.
Some VPNs rely on users to be secure by implementing spyware and virus scanners. These VPNs even check occasionally whether the spyware and virus scanners have been installed and are very limited in the efforts made to secure the network. However, if a user's device is not properly configured, the entire VPN's security could be compromised.
A secure virtual private network (VPN) is described herein. The secure VPN implements standard VPN software with diagnostics to ensure a client device coupling to the VPN is secure. The diagnostics include a policy, a library and an engine where the policy determines what the requirements are for permitting the client device to couple to the VPN. The library stores programs for checking if the client device has any problems. The engine gathers information related to the client device and executes the programs stored within the library. When a user attempts to couple to the VPN with a client device, the server initiates the policy, library and engine to check for issues, and then the user is informed of the issues and/or a mechanism automatically fixes the issues. After the client device is verified as secure, it is able to couple to the VPN for data transfers.
In one aspect, a system for providing a secure communications link between a server and a client device comprises a policy stored on the server, a library stored on the client device for storing information and an engine stored on the client device for using the policy and the library to detect and resolve one or more issues on the client device wherein detecting and resolving the one or more issues increases security on a communications link between the server and the client device. The library is an expert system library. The policy is for designating one or more objects to inspect. The policy is for determining the requirements needed to be met for a connection to be established. Information related to the policy is downloaded from the server to the client device. The policy contains groupings of sub-policies. The grouping of sub-policies include virtual private network checks, network checks, hotfix checks and system checks. The client device is a mobile device or a home user device. The information stored within the library includes one or more programs. The one or more programs stored within the library are wrapped in XML. The engine informs a user of the problems if the client device does not pass. The one or more issues discovered by the engine are automatically fixed or the engine optionally assists a user in fixing the issues manually. The client device and the server are coupled over a virtual private network. The communications link between the server and the client device forms a virtual private network.
In another aspect, a system for providing a secure communications link between a server and a client comprises a policy stored on the server wherein the policy is for designating one or more objects to inspect and for determining the requirements needed to be met for a connection to be established between the server and the client device, further wherein the policy is downloaded from the server to the client device, an expert system library stored on the client device for storing one or more programs and an engine stored on the client device for using the policy and the library to detect and resolve one or more issues on the client device wherein detecting and resolving the one or more issues increases security on a communications link between the server and the client device. The client device is a mobile device or a home user device. The one or more programs stored within the library are wrapped in XML. The policy contains groupings of sub-policies. The grouping of sub-policies include virtual private network checks, network checks, hotfix checks and system checks. The engine informs a user of the problems if the client device does not pass. The one or more issues discovered by the engine are automatically fixed or optionally the engine assists in fixing the one or more issues manually. The client device and the server are coupled over a virtual private network. The communications link between the server and the client device forms a virtual private network.
In another aspect, a method of securing a communications link between a server and a client device comprises coupling the client device with the server, establishing a limited network connection between the client device and the server, downloading a policy from the server to the client device, running a diagnostics engine utilizing a library on the client device and establishing a secure network connection if the diagnostics engine completes without any issues. The library is an expert system library. The limited network connection is sufficient to receive the policy. The method further comprises posting a list of issues when the diagnostics engine fails. The method further comprises automatically fixing or optionally assist in manually fixing one or more issues when diagnostics engine fails. Automatically fixing the one or more issues is selected from the group consisting of downloading applications, downloading application updates, downloading patches, running applications and modifying a registry. The method further comprises adding custom tools within the library. Running the diagnostics engine includes checking for network issues and system issues. The communications link between the server and the client device forms a virtual private network.
In yet another aspect, a network of devices for establishing a secure virtual private network comprises a private network containing one or more secure devices, wherein at least one of the one or more secure devices is a server for storing a diagnostics policy and one or more client devices coupled to the private network through a public network, wherein the one or more client devices contain a diagnostics engine and a diagnostics library. Information related to the diagnostics policy is downloaded to the one or more client devices. The one or more client devices are not able to access the private network without being verified using the diagnostics policy, the diagnostics engine and the diagnostics library. The client devices are selected from the group consisting of personal computers, PDAs, cell phones, laptop computers, thin clients or Apple personal computers, mp3 players and gaining consoles. The diagnostics library is an expert system library. The diagnostics policy is for designating one or more objects to inspect. The diagnostics policy is for determining the requirements needed to be met for a connection to be established. The diagnostics policy contains groupings of sub-policies. The grouping of sub-policies include virtual private network checks, network checks, hotfix checks and system checks. The diagnostics library includes one or more programs. The one or more programs stored within the diagnostics library are wrapped in XML. The diagnostics engine informs a user of issues if the client device does not pass. Issues discovered by the diagnostics engine are automatically fixed or optionally the engine assists in fixing the one or more issues manually.
A virtual private network (VPN) with additional security is described herein. The secure VPN implements standard VPN software with added diagnostics to ensure a client device coupling to the VPN is secure. The added diagnostics implement a policy, a library and an engine. The diagnostics policy is stored on a server and determines the required components/configuration for a client device to couple to the VPN. When the client device initiates contact with the server, the diagnostics policy or a representation of the policy such as a code is downloaded to the client device for interaction with the diagnostics engine. The diagnostics engine which is stored on the client device executes one or more programs stored within the diagnostics library according to the diagnostics policy. The diagnostics library which is also stored on the client device stores the programs for checking the client device's status. When a client device attempts to couple to the VPN, the server initiates the policy, library and engine to check for security issues, and then either the user is informed of the issues and manually corrects them or a mechanism automatically fixes the problems. Automatically fixing problems or issues includes, but is not limited to downloading applications, downloading application updates, downloading patches, running applications and modifying a registry. After the client device is verified as secure, it is able to couple to the private/secure network for data transfers.
The client device 102 contains a VPN Client software 104, a diagnostics engine 106 and a diagnostics library 108. In some embodiments, the VPN Client software 104 is part of the standard VPN software such as the software provided by Microsoft®. The diagnostics engine 106 and the diagnostics library 108 operate together with the downloaded diagnostics policy 118. The diagnostics engine 106 implements one or more programs 120 stored within the diagnostics library 108. Based on the diagnostics policy 118, the diagnostics engine 106 determines which programs to run within the diagnostics library 108. After the programs specified by the diagnostics policy 118 are executed, if no issues or errors were found on the client device 102, then the client device 102 is considered sufficiently secure and is given access to the secure network 112. If the client device 102 is missing a required component, then access is denied until either a user corrects the problem or an automatic fix is implemented.
In some embodiments, a diagnostics policy includes different levels of requirements. For example, “crucial,” “preferred” and “suggested” are separate levels where “crucial” items are the only requirements that determine if a client device is able to access the secure network, and the “preferred” and “suggested” elements are simply checked for but are not necessary. In addition to checking for the “preferred” and “suggested” elements, a report is issued to the user of the client device regarding the status of the elements, so they are aware of the security of their client device. Then the user is able to take further action if desired. As described above, the diagnostics policy is configured and stored on the server initially, but a copy of it or information relating to the policy is downloaded to the client device when the client device attempts to access the secure network. Once downloaded to the client device, the diagnostics library and diagnostics engine utilize the diagnostics policy to determine which checks to perform.
The diagnostics library is a library of programs related to computer security issues to test computer systems for the existence of security concerns and problems and then to provide remediation solutions for each discovered issue or problem. As described above, security issues relate to virus/spyware scanners, hardware/software configurations, network configurations, operating systems and any other computing concern that is able to compromise system and network security. In some embodiments the diagnostics library is an expert system library.
Each security issue is described discretely within the diagnostics library. The issues, when stored in a format usable by the diagnostics engine on the client device, are able to be processed serially, meaning one problem at a time. In an alternative embodiment, problems are processed in parallel, meaning at the same time. The diagnostics library stores one or more discrete programs for analyzing and handling each discrete issue.
The discrete programs execute desired tasks and are able to remediate certain issues. For example, a function virus_scanner determines if the client device has a virus scanner installed. Furthermore, with additional coding, the function virus_scanner also checks when the virus scanner was last updated to ensure that it is up-to-date. If the virus_scanner function fails, then depending on the desired remedy, either a message is sent to the client device so that the user is able to take appropriate action and/or the virus_scanner function automatically takes the necessary action such as triggering the virus scanner software to retrieve updates.
The diagnostics engine utilizes the diagnostics policy and the discrete programs within the diagnostics library to interrogate the client device for possible security issues. The information obtained by the interrogation is used in conjunction with the diagnostics library and the diagnostics policy to ascertain whether there are problems on the client device and whether the client device is secure enough to access the secure network.
The diagnostics engine uses a scripting language to interact with the diagnostics library. Although very complex tasks are being performed at times, the resultant script language is simplified for easy modification and interoperability. Then, beneath the scripting language is a more complex language which performs the underlying tasks necessary to remedy whatever situation exists. The scripts are generally less complex than the underlying programs to provide simplicity of interaction with the user interface. The underlying programs are necessary to interact with the system's hardware and software, thus need to have the specific abilities to accomplish such tasks. The scripts take the information from the programs and return a condition status. In some embodiments, the condition status is binary-type value such as “true” or “false,” “1” or “0” or a similar value. In other embodiments, the condition status is a string, ASCII value or other value representing status.
Contained within the diagnostics library is information describing the resolution of problems. The descriptions range from simple to complex and are able to include a variety of data such as user instructions on problem resolution or scripts which automatically resolve the client device problem. Resolutions include, but are not limited to, adding/removing/updating software, modifying invalid configuration information, installation of patches and others.
There are a wide range of problem conditions that the client system is able to detect in the step 410. The following are examples of problem conditions tested by the diagnostics engine that could compromise a system; however, they are not meant to limit the invention in any way. Software is tested for problems such as problematic software patch revisions, incompatible software packages, problematic software installations and problematic software package un/de-installations. The operating system is also checked, such as Windows® registry corruption and existing performance issues. Environmental issues are investigated such as low disk space or hardware errors. Network issues are checked such as interface errors, DNS or IP configuration problems, IP routing failures and ISP network performance. Other important elements of a secure system are investigated such as detecting viruses, driver problems and security vulnerabilities. Any issues that could create system instability and insecurity are also able to be investigated.
The diagnostics engine is client-based software, pre-installed or downloaded onto the client device. The diagnostics engine also interprets the data structure received from the diagnostics library of functions. The functions primarily access information about a user's system or remediate the system. For example, one function is able to query an operating system to determine if it has a certain patch installed, and another function is able to install the patch. The diagnostics engine is also responsible for reporting problems found. Other functions of the diagnostics engine in conjunction with the diagnostics library include, but are not limited to, accessing hardware error counts, reading/writing the Windows® registry, accessing software modules and version/patch levels, moving, copying and removing files from the file system, reading operating system environment such as memory and disk space, updating virtual memory configurations and many other functions to maintain a stable and secure environment.
The diagnostics library utilizes a plug-in architecture. Each diagnostics library record has functionality of a discrete program such that each entry is able to be added to the diagnostics library without affecting the other diagnostics library entries and updated or removed from the diagnostics library with no effect on the other problem records. Such a plug-in architecture allows multiple authors to maintain different problem records independently of simultaneous work being done on other problem records.
The diagnostics library data structure includes procedural language elements including, but not limited to, boolean logic, string manipulation, flow control verbs and simple match functions. The language provides a system interpretation tightly integrated with the operating system. The language is used to create powerful and flexible mechanisms to test for the existence of problem conditions. For example the following language function tests the Windows® registry for the existence of a value:
The example language checks if the HotFix (Patch) is installed by analyzing the value of the Windows® registry value at Q312895. If the value is not an error, then the Microsoft® patch is installed. Further, the routine is able to check for one or more code modules which are supposed to be updated by this patch. If the code module version is less than the correct value, then the registry has the patch recorded as installed, but the actual code module could be below the correct value, which would mean the patch was installed but the installation failed.
The language interpreter, part of the diagnostics engine, contains a set of functions which are called the Diagnostics Library Data Language. The functions are specific to operating environments, but operate the same for the Diagnostics Library Data Language. The operating environments where the functions reside could include Microsoft® Windows®, Microsoft® CE, Unix, Linux, handheld operating systems, cell phone operating systems as well as others. The function portability allows the present invention to be implemented across many different platforms.
Since the functions are created in the specific operating system environment, the functions are able to reach into the operating system environments to retrieve specific and detailed data. Examples of such functions include, but are not limited to: Read Windows Registry Value, Check Device Error Counter Values, Check File System Organizations and Structures, Check File Modules and File Version Values, Check for Installation of Specific Applications, Read Environmental Values and Counters, Read Windows Event Log Entries as well as other functions to retrieve specific data.
To utilize the present invention, a user with an already secure client device experiences minor differences from a standard connection to a VPN. The minor differences include additional time for verifying that the client device is sufficiently secure. However, since the client device is already secure, lengthy updates and reconfigurations do not occur. If the client device is mostly secure, then the user will experience some delay. Preferably, the process of verifying security is relatively fast to ensure users are not waiting a long time for a connection to be established. If a user has a client device that is deemed unsecure, the engine and library inform the user of the issues and/or automatically remediate the problems. Depending on how extensive the problems are, the process could take a few seconds to many hours. For example, downloading the newest update for a virus scanner would likely take a few minutes, but if a user does not even have a virus scanner nor a spyware scanner, there are network configuration issues and a number of hotfixes are needed for the operating system, the process would be much longer. After the issues are addressed, the client will be sufficiently secure to connect to the VPN without compromising security for the VPN.
In operation, the present invention ensures that a client device is secure when coupling to a VPN. When the client device attempts to establish a connection with the VPN, a policy is downloaded from a server within the VPN to the client device. The policy includes the requirements necessary for the client to be able to couple for data transfer with the VPN. After the policy is downloaded, an engine and a library on the client device implement the policy where the engine takes the policy requirements and runs programs corresponding to the policy within the library. The programs relate to security issues that could compromise the VPN such as determining if a virus scanner is installed and updated. The engine and library continue checking the requirements of the policy and then report the issues discovered. In some embodiments, the library includes automatic remediation scripts to fix the issues automatically. If the engine and library return without any errors or concerns, then the client device passes and is considered secure enough to couple to the VPN for further data transfers and communications.
The present invention has been described in terms of specific embodiments incorporating details to facilitate the understanding of principles of construction and operation of the invention. Such reference herein to specific embodiments and details thereof is not intended to limit the scope of the claims appended hereto. It will be readily apparent to one skilled in the art that other various modifications may be made in the embodiment chosen for illustration without departing from the spirit and scope of the invention as defined by the claims.
The present application is a continuation of U.S. patent application Ser. No. 11/525,728, filed Sep. 22, 2006, and entitled “SECURE VIRTUAL PRIVATE NETWORK UTILIZING A DIAGNOSTICS POLICY AND DIAGNOSTICS ENGINE TO ESTABLISH A SECURE NETWORK CONNECTION,” which is hereby incorporated by reference. U.S. patent application Ser. No. 11/440,563, filed on May 24, 2006, and entitled “COMPUTER HARDWARE AND SOFTWARE DIAGNOSTIC AND REPORT SYSTEM”, U.S. patent application Ser. No. 11/368,214, filed on Mar. 2, 2006, now U.S. Pat. No. 7,512,584, and entitled “COMPUTER HARDWARE AND SOFTWARE DIAGNOSTIC AND REPORT SYSTEM” which claims priority under 35 U.S.C. §119(e) of the co-owned U.S. Provisional Patent Application, Ser. No. 60/658,970, filed Mar. 4, 2005, and entitled “PRE-INSTALL COMPLIANCE AND CENTRAL PROBLEM DISCOVERY SYSTEM” are all hereby incorporated by reference. The following co-owned, U.S. patent application Ser. No. 11/368,212 filed Mar. 2, 2006, now U.S. Pat. No. 7,624,086, and entitled PRE-INSTALL COMPLIANCE SYSTEM is also incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
4870704 | Leete | Sep 1989 | A |
5602990 | Leete | Feb 1997 | A |
5649196 | Woodhill et al. | Jul 1997 | A |
5659743 | Adams et al. | Aug 1997 | A |
5787409 | Seiffert et al. | Jul 1998 | A |
5802364 | Senator | Sep 1998 | A |
5812751 | Ekrot | Sep 1998 | A |
5835911 | Nakagawa et al. | Nov 1998 | A |
5897635 | Torres et al. | Apr 1999 | A |
5933647 | Aronberg | Aug 1999 | A |
5950010 | Hesse et al. | Sep 1999 | A |
5974547 | Klimenko | Oct 1999 | A |
6012152 | Douik et al. | Jan 2000 | A |
6029196 | Lenz | Feb 2000 | A |
6067582 | Smith et al. | May 2000 | A |
6144959 | Anderson et al. | Nov 2000 | A |
6170065 | Kobata et al. | Jan 2001 | B1 |
6189101 | Dusenbury, Jr. | Feb 2001 | B1 |
6209089 | Selitrennikoff et al. | Mar 2001 | B1 |
6212660 | Joeressen et al. | Apr 2001 | B1 |
6282711 | Halpern et al. | Aug 2001 | B1 |
6301612 | Selitrennikoff et al. | Oct 2001 | B1 |
6317761 | Landsman et al. | Nov 2001 | B1 |
6349137 | Hunt et al. | Feb 2002 | B1 |
6356915 | Chtchetkine et al. | Mar 2002 | B1 |
6363400 | Chtchetkine et al. | Mar 2002 | B1 |
6366296 | Boreczky et al. | Apr 2002 | B1 |
6378035 | Parry et al. | Apr 2002 | B1 |
6421777 | Pierre-Louis et al. | Jul 2002 | B1 |
6449658 | Lafe et al. | Sep 2002 | B1 |
6459499 | Tomat | Oct 2002 | B1 |
6463530 | Sposato | Oct 2002 | B1 |
6473794 | Guheen et al. | Oct 2002 | B1 |
6477531 | Sullivan et al. | Nov 2002 | B1 |
6490677 | Aguilar et al. | Dec 2002 | B1 |
6536037 | Guheen et al. | Mar 2003 | B1 |
6553375 | Huang et al. | Apr 2003 | B1 |
6556950 | Schwenke et al. | Apr 2003 | B1 |
6606744 | Mikurak | Aug 2003 | B1 |
6625651 | Swartz et al. | Sep 2003 | B1 |
6625754 | Aguilar et al. | Sep 2003 | B1 |
6636857 | Thomas et al. | Oct 2003 | B2 |
6654797 | Kamper | Nov 2003 | B1 |
6654801 | Mann et al. | Nov 2003 | B2 |
6694375 | Beddus et al. | Feb 2004 | B1 |
6697852 | Ryu | Feb 2004 | B1 |
6704886 | Gill et al. | Mar 2004 | B1 |
6718464 | Cromer et al. | Apr 2004 | B2 |
6728530 | Heinonen et al. | Apr 2004 | B1 |
6735625 | Ponna | May 2004 | B1 |
6751658 | Haun et al. | Jun 2004 | B1 |
6757729 | Devarakonda et al. | Jun 2004 | B1 |
6816462 | Booth, III et al. | Nov 2004 | B1 |
6816882 | Conner et al. | Nov 2004 | B1 |
6871210 | Subramanian | Mar 2005 | B1 |
6880108 | Gusler et al. | Apr 2005 | B1 |
6885481 | Dawe | Apr 2005 | B1 |
6886020 | Zahavi et al. | Apr 2005 | B1 |
6915343 | Brewer et al. | Jul 2005 | B1 |
6954853 | Wang | Oct 2005 | B2 |
6954930 | Drake et al. | Oct 2005 | B2 |
6959235 | Abdel-Malek et al. | Oct 2005 | B1 |
6985967 | Hipp | Jan 2006 | B1 |
7003560 | Mullen et al. | Feb 2006 | B1 |
7003663 | Lagosanto et al. | Feb 2006 | B2 |
7058698 | Chatterjee et al. | Jun 2006 | B2 |
7080118 | Hildebrand | Jul 2006 | B2 |
7143307 | Witte et al. | Nov 2006 | B1 |
7149698 | Guheen et al. | Dec 2006 | B2 |
7175078 | Ban et al. | Feb 2007 | B2 |
7178166 | Taylor et al. | Feb 2007 | B1 |
7194445 | Chan et al. | Mar 2007 | B2 |
7200779 | Coss, Jr. et al. | Apr 2007 | B1 |
7210143 | Or et al. | Apr 2007 | B2 |
7237122 | Kadam et al. | Jun 2007 | B2 |
7287053 | Bodin | Oct 2007 | B2 |
7328367 | Ukai et al. | Feb 2008 | B2 |
7337311 | Chen et al. | Feb 2008 | B2 |
7392046 | Leib et al. | Jun 2008 | B2 |
7401125 | Uchida et al. | Jul 2008 | B1 |
7480822 | Arbon et al. | Jan 2009 | B1 |
7512584 | Keith | Mar 2009 | B2 |
7627694 | Streenivasan et al. | Dec 2009 | B2 |
7698487 | Rothman et al. | Apr 2010 | B2 |
7788524 | Wing et al. | Aug 2010 | B2 |
20010037323 | Moulton et al. | Nov 2001 | A1 |
20010049793 | Sugimoto | Dec 2001 | A1 |
20020013827 | Edstrom et al. | Jan 2002 | A1 |
20020035674 | Vetrivelkumaran et al. | Mar 2002 | A1 |
20020049764 | Boothby et al. | Apr 2002 | A1 |
20020083183 | Pujare et al. | Jun 2002 | A1 |
20020087625 | Toll et al. | Jul 2002 | A1 |
20020087963 | Eylon et al. | Jul 2002 | A1 |
20020091763 | Shah et al. | Jul 2002 | A1 |
20020094868 | Tuck | Jul 2002 | A1 |
20020104080 | Woodard et al. | Aug 2002 | A1 |
20020107920 | Hotti | Aug 2002 | A1 |
20020116585 | Scherr | Aug 2002 | A1 |
20020124092 | Urien | Sep 2002 | A1 |
20020138640 | Raz | Sep 2002 | A1 |
20020157089 | Patel et al. | Oct 2002 | A1 |
20020161868 | Paul et al. | Oct 2002 | A1 |
20020188941 | Cicciarelli et al. | Dec 2002 | A1 |
20030005096 | Paul et al. | Jan 2003 | A1 |
20030033379 | Civanlar et al. | Feb 2003 | A1 |
20030036882 | Harper et al. | Feb 2003 | A1 |
20030037328 | Cicciarelli et al. | Feb 2003 | A1 |
20030041136 | Cheline et al. | Feb 2003 | A1 |
20030046371 | Falkner | Mar 2003 | A1 |
20030051128 | Rodriguez et al. | Mar 2003 | A1 |
20030055878 | Fletcher et al. | Mar 2003 | A1 |
20030078960 | Murren et al. | Apr 2003 | A1 |
20030110188 | Howard et al. | Jun 2003 | A1 |
20030126242 | Chang | Jul 2003 | A1 |
20030191730 | Adkins et al. | Oct 2003 | A1 |
20030204562 | Hwang | Oct 2003 | A1 |
20030233383 | Koskimies | Dec 2003 | A1 |
20030233493 | Boldon et al. | Dec 2003 | A1 |
20040010716 | Childress | Jan 2004 | A1 |
20040068554 | Bales et al. | Apr 2004 | A1 |
20040073787 | Ban et al. | Apr 2004 | A1 |
20040093492 | Daude et al. | May 2004 | A1 |
20040104927 | Husain et al. | Jun 2004 | A1 |
20040107273 | Biran et al. | Jun 2004 | A1 |
20040123153 | Wright et al. | Jun 2004 | A1 |
20040148306 | Moulton et al. | Jul 2004 | A1 |
20040180721 | Rowe | Sep 2004 | A1 |
20040193876 | Donley | Sep 2004 | A1 |
20040201604 | Kraenzel et al. | Oct 2004 | A1 |
20040236843 | Wing et al. | Nov 2004 | A1 |
20040243928 | Hesmer et al. | Dec 2004 | A1 |
20050027846 | Wolfe et al. | Feb 2005 | A1 |
20050033808 | Cheng et al. | Feb 2005 | A1 |
20050044197 | Lai | Feb 2005 | A1 |
20050044544 | Slivka et al. | Feb 2005 | A1 |
20050108297 | Rollin et al. | May 2005 | A1 |
20050108546 | Lehew et al. | May 2005 | A1 |
20050108593 | Purushothaman et al. | May 2005 | A1 |
20050144218 | Heintz | Jun 2005 | A1 |
20050149729 | Zimmer et al. | Jul 2005 | A1 |
20050160289 | Shay | Jul 2005 | A1 |
20050193245 | Hayden et al. | Sep 2005 | A1 |
20050198196 | Bohn et al. | Sep 2005 | A1 |
20050216524 | Gomes et al. | Sep 2005 | A1 |
20050216902 | Schaefer | Sep 2005 | A1 |
20050256952 | Mouhanna et al. | Nov 2005 | A1 |
20050262503 | Kane | Nov 2005 | A1 |
20050268145 | Hufferd et al. | Dec 2005 | A1 |
20050273486 | Keith | Dec 2005 | A1 |
20050283606 | Williams | Dec 2005 | A1 |
20060021040 | Boulanger et al. | Jan 2006 | A1 |
20060031377 | Ng et al. | Feb 2006 | A1 |
20060031407 | Dispensa et al. | Feb 2006 | A1 |
20060031529 | Keith | Feb 2006 | A1 |
20060041641 | Breiter et al. | Feb 2006 | A1 |
20060041759 | Kaliski et al. | Feb 2006 | A1 |
20060047716 | Keith | Mar 2006 | A1 |
20060047946 | Keith | Mar 2006 | A1 |
20060074943 | Nakano et al. | Apr 2006 | A1 |
20060095705 | Wichelman et al. | May 2006 | A1 |
20060129459 | Mendelsohn | Jun 2006 | A1 |
20060143709 | Brooks et al. | Jun 2006 | A1 |
20060179061 | D'Souza et al. | Aug 2006 | A1 |
20060224544 | Keith | Oct 2006 | A1 |
20060224545 | Keith | Oct 2006 | A1 |
20060233310 | Adams, Jr. et al. | Oct 2006 | A1 |
20070078982 | Aidun et al. | Apr 2007 | A1 |
20070143374 | D'Souza et al. | Jun 2007 | A1 |
20070174658 | Takamoto et al. | Jul 2007 | A1 |
20070174690 | Kambara et al. | Jul 2007 | A1 |
20070185936 | Derk et al. | Aug 2007 | A1 |
20070233633 | Keith | Oct 2007 | A1 |
20070239905 | Banerjee et al. | Oct 2007 | A1 |
20070271290 | Keith | Nov 2007 | A1 |
20070271428 | Atluri | Nov 2007 | A1 |
20070274315 | Keith | Nov 2007 | A1 |
20070276836 | Chatterjee et al. | Nov 2007 | A1 |
20080034019 | Cisler | Feb 2008 | A1 |
20080034071 | Wilkinson et al. | Feb 2008 | A1 |
20080077622 | Keith | Mar 2008 | A1 |
20080077630 | Keith | Mar 2008 | A1 |
20080209142 | Obernuefemann | Aug 2008 | A1 |
20080216168 | Larson et al. | Sep 2008 | A1 |
20080294860 | Stakutis et al. | Nov 2008 | A1 |
20080313632 | Kumar et al. | Dec 2008 | A1 |
20090094362 | Huff | Apr 2009 | A1 |
20100050011 | Takamoto et al. | Feb 2010 | A1 |
Number | Date | Country | |
---|---|---|---|
20110047118 A1 | Feb 2011 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11525728 | Sep 2006 | US |
Child | 12916438 | US |