This application is related to U.S. Non-Provisional application Ser. No. 11/957,359, filed Dec. 14, 2007, entitled “Smart Card System and Docking Device With Ergonomic Fingerprint Sensor.”
Many modern pocket sized devices exist and are being developed that contain or have access to very sensitive information. Examples include cellular phones that can access a cellular network, smart cards, and other hand held pocket sized devices. If misappropriated, such devices can give an unauthorized user free phone system access, access to private telephone numbers and contact information, internet access, and access to other sensitive information. To improve security, fingerprint sensors are highly useful, however the size and cost of such sensors is often prohibitive in such very small, low-cost devices.
Although any type of fingerprint sensor with suitable size and robustness characteristics can be used for these applications, one class of fingerprint sensors that are particularly useful for ultra-small, low-cost devices are deep finger penetrating radio frequency (RF) based sensors. These are described in U.S. Pat. Nos. 7,099,496; 7,146,024; and U.S. Patent Publications US 2005/0244038 for “Finger Position Sensing Methods and Apparatus” to Benkley (now U.S. Pat. No. 7,463,756); US 2006/0083411 for “Finger Sensing Assemblies and Methods of Making” to Benkley; US 2005/0244039 for “Methods and Apparatus for Acquiring a Swiped Fingerprint Image” to Geoffroy and Buxton; and US 2007/0031011 for “Electronic Fingerprint Sensor with Differential Noise Cancellation” to Erhart, Keyvani, Benkley, and Jandu (now U.S. Pat. No. 7,460,697) and contents of these patents and patent applications are incorporated herein by reference. These types of sensors are commercially produced by Validity Sensors, Inc, San Jose Calif. This class of sensor mounts the sensing elements on a thin, flexible, and environmentally robust support, and the IC used to drive the sensor resides in a protected location some distance away from the sensing zone. Such sensors are particularly advantageous in applications where small sensor size and sensor robustness is critical.
Smart cards are an excellent example of a pocket sized, low-cost, portable device where fingerprint sensors would be particularly desirable. Smart cards are electronic devices, typically in the shape of a conventional wallet-sized thin rectangular credit card. Smart cards typically contain active electronic components, such an internal processor and secure memory, which is used to hold sensitive information. Smart cards are often used for financial transactions, such as purchasing products and services, or depositing or retrieving money from financial institutions. As a result, smart cards can be viewed as a portable means of transferring money, and in fact can be considered to be a higher functionality version of a credit card. Throughout this disclosure, the term “smart card” will be considered to also include such higher functionality credit cards as well. The incentive for unscrupulous users to illegitimately acquire and falsify smart cards (and smart credit cards) is thus quite high, and methods and systems to ensure smart card security are quite desirable.
One of the major ways that a smart card can be misused is through physical theft, where a smart card simply falls into the hands of an unauthorized user. Another common security breech is through electronic or security number theft, where the card itself is not misplaced, but its corresponding identification numbers and codes fall into the wrong hands.
In theory, both types of security breech may be prevented by incorporating fingerprint sensors into the smart card. If such sensors were present, legitimate users could verify their identity upon initial receipt of the card, and at certain key times thereafter, by fingerprint swipes. Although attractive, the technical challenges of implementing fingerprint sensors into smart cards are substantial. Although other sizes are quite possible, smart cards are often designed to meet the ISO/IEC 7810 standard for identification cards, such as the ID-1 standard which typically calls for thin credit-card-like rectangular dimensions of 85.60×53.98 mm (3⅜″×2⅛″) and thicknesses of only 0.76 mm (approximately 0.03″). Even if the thickness specification is relaxed to several mm, such as 5 mm or less, Fitting a fingerprint scanner and associated circuitry into such a small space is challenging. An additional problem is that smart cards typically are subjected to demanding environmental conditions, such as being stored and retrieved from a wallet for extended periods of time, any sensor and circuitry on such cards must be extremely robust.
Consider the engineering challenges: not only must the fingerprint sensor itself be paper thin and robust (which rules out many types of conventional but bulky or fragile fingerprint sensors), but the associated electronic circuitry, such as the processor, memory, any display device, electrical contact or communication device, and any battery used to power the unit must also be extremely thin. Small and thin batteries have correspondingly low amounts of stored energy. For example, a typical miniature battery might have a power capacity of only between 15 and 30 milliamp hours. Thus, in addition to small sensors, efficient sensor and sensor circuitry power utilization are also critical.
Here ergonomic factors also come into play. When not reading a fingerprint swipe, the smart card's fingerprint sensors and circuitry can be in a hibernation state and draw minimal amounts of power. However when reading a fingerprint swipe, fingerprint scanners require appreciable amounts of power. For example, a fingerprint scanner might draw 100 milliamps for two seconds during a swipe. For a 15 milliamp hour battery, the total reserve power is 54,000 milliamp seconds. Each swipe might consume as much as 200 milliamp seconds of power. Thus in some scenarios, a smart card's battery might be totally used up after only 270 fingerprint swipes.
Unfortunately improper fingerprint swipes often use as much power as proper fingerprint swipes. If, due to ergonomic issues, a user has to make repeated attempts to obtain a valid fingerprint swipe, battery life would suffer, and the practicality of such a smart card for routine, long-term, use would become minimal. Thus methods and devices to read fingerprint swipes quickly, accurately, and with minimal need for repeats due to improper user technique are highly useful.
Returning to the discussion of fingerprint sensing devices, a number of devices and techniques exist for sensing, capturing, and reconstructing the image of a fingerprint as it moves across a sensor array. Though many devices exist to sense and record an entire fingerprint, these devices tend to be relatively large. To save space and to be compatible with small portable devices, partial fingerprint sensing devices, such as the previously discussed Validity sensors, have been developed.
Partial fingerprint sensing devices have a sensing area that is smaller than the fingerprint area to be imaged. This is desirable because this type of sensor takes up much less space than a full fingerprint sensor, but to function properly, the user must move his finger and manually “swipe” it across the sensing area.
These sensing devices generally consist of one or more one-dimensional imaging arrays of sensors (imaging lines) disposed perpendicular to the axis of motion. For example, one common configuration used for a fingerprint sensing surface includes CCD (charge coupled devices) or C-MOS circuits. These components are embedded in a sensing surface to form a matrix of pressure sensing elements that generate signals in response to pressure applied to the surface by a finger. These signals are read by a processor and used to reconstruct the fingerprint of a user and to verify identification. Other devices include a matrix of optical sensors that read light reflected off of a person's finger and onto optical elements. The reflected light is converted to a signal that defines the fingerprint of the finger analyzed, and is used to reconstruct the fingerprint and to verify identification. As previously discussed, more modern devices, such as the Validity fingerprint sensors, are based on static or radio frequency (RF) devices configured to measure the intensity of electric fields conducted by finger ridges and valleys, such as deep finger penetrating radio frequency (RF) based sensing technology, and use this information to sense and create the fingerprint image.
As the finger surface is moved across the sensor, portions of the fingerprint are sensed and captured by the device. These data from these various portions is usually then stored in memory (working memory), and reconstructed using an electronic processor, such as a microprocessor, into a mosaic or overlapping image that recreates the entire fingerprint. Often the processor will then compare this mosaic image in working memory with an authorized fingerprint stored in fingerprint recognition memory, and determine if there is a match or not. If there is a match, the processor may then allow sensitive information (financial data, security codes, etc.) stored in secure memory to be accessed by external devices.
As might be imagined, this process of scanning and fingerprint reconstruction requires extensive processing resources for retrieving the partial fingerprint data and running the algorithms need to reconstruct the entire fingerprint. Again this takes electrical power, which is problematic when battery size is limited. Thus again, methods and devices to improve the efficiency of this process are desirable. In particular, user interfaces, designs, and systems that encourage correct finger swipes are critical.
For example, in swipe sensors used for fingerprint imaging, it is important that a user properly align the finger along with the fingerprint sensor so that a high quality image can be captured. If, for example, a user swipes the finger at one or more improper angles, a poor fingerprint image may be captured. At a minimum, additional computational time and energy will be needed by any processor that attempts to interpret the image, and more likely, a rescan will be required, significantly lowering battery life and also inconveniencing the user.
Therefore, a need exists in the art for a useful fingerprint sensor system that can be incorporated in a small device, such as a smart card, that operates without excessive size, power, or processing computational resources. There further exists a need in the art for user interfaces and guidance devices to help insure that users will correctly use such devices. As will be seen, the invention accomplishes these functions in an elegant manner.
The present invention discloses a small unitized device with an embedded fingerprint reader, such as unitized smart card device, which also contains various ergonomic guides to help ensure that the fingerprint sensor is used (swiped) in a correct manner. Usually the smart card will additionally contain secure memory that contains confidential information, such as financial information, passwords, encryption information in the like. The smart card will also usually contain an onboard processor to run the fingerprint sensor, and this onboard processor will partially or fully unlock the contents of the smart card's secure memory if the card's onboard fingerprint sensor detects that an authorized user has accessed the device. The smart card may also contain a battery.
In some embodiments, the smart card will be designed to dock with an external docking station. This docking station may act to facilitate communication between the smart card's fingerprint sensor, onboard secure memory, and external computerized devices. The docking station may also recharge the smart card's battery. The docking station will usually itself be configured with slots or other openings to allow users to access the smart card's fingerprint sensor while the smart card is docked with the docking station. The docking station itself may also or alternatively contain ergonomic guides to help ensure that the smart card's fingerprint sensor is used (swiped) in a correct manner. This docking station may in turn function as part of a large stationary device, such as an automated teller machine (ATM), or it may function as part of a portable credit card reader (such as a wireless credit card reader that reads the credit card magnetic stripe), or other device.
In another embodiment, the smart card can be configured to be backwards compatible with a standard “dumb” credit card. In this alternative embodiment, the smart card can function either on a standalone basis, or with a standard “dumb” credit card magnetic strip reader. When an authorized user uses the card, the backwards compatible smart card either generates a visual credit card verification number, or alters its magnetic bits in order to be backwards compatible with telephone and internet web browser order entry systems, as well as older style magnetic strip reader systems.
Although this invention can work with a wide variety of partial fingerprint sensors, in order to give specific example, much of the discussion will focus on deep finger penetrating radio frequency (RF) sensing technology, such as those manufactured by Validity Sensors, Inc. Thus to begin, this technology will be discussed in more detail.
Validity partial fingerprint sensors measure the intensity of electric fields conducted by finger ridges and valleys, such as deep finger penetrating radio frequency (RF) based sensing technology, and use this information to sense and create the fingerprint image. These devices create sensing elements by creating a linear array composed of many miniature excitation electrodes, spaced at a high density, such as a density of approximately 500 electrodes per inch. The tips of these electrodes are separated from a single sensing electrode by a small sensor gap. The electrodes are electrically excited in a progressive scan pattern and the ridges and valleys of a finger pad alter the electrical properties (usually the capacitive properties) of the excitation electrode—sensing electrode interaction, and this in turn creates a detectable electrical signal. The electrodes and sensors are mounted on thin flexible printed circuit support, and these electrodes and sensors are usually excited and the sensor read by an integrated circuit chip (scanner chip, driver chip, scan IC) designed for this purpose. The end result is to create a one dimensional “image” of the portion of the finger pad immediately over the electrode array and sensor junction.
The main drawback of partial fingerprint sensors is that in order to obtain a valid fingerprint scan, the user must swipe his or her finger across the sensor surface in a relatively uniform manner. Unfortunately, due to various human factors issues, this usually isn't possible. In the real world, users will not swipe their fingers with a constant speed. Some will swipe more quickly than others, some may swipe at non-uniform speeds, and some may stop partially through a scan, and then resume. In order to account for this type of variation, modern partial fingerprint sensors often incorporate finger position sensors to determine, relative to the fingerprint sensor, how the overall finger position and speed varies during a finger swipe.
One type of finger position indicator, represented by U.S. Pat. No. 7,146,024, and Patent Publications US 2005/0244038 for “Finger Position Sensing Methods and Apparatus” to Benkley (now U.S. Pat. No. 7,463,756) and US 2005/0244039 for “Methods and Apparatus for Acquiring a Swiped Fingerprint Image” to Geoffroy and Buxton (the contents of which are incorporated herein by reference) detects relative finger position using a long array of electrical drive plate sensors. These plates sense the bulk of a finger (rather than the fine details of the fingerprint ridges), and thus sense the relative position of the finger relative to the linear array used for fingerprint sensing. A second type of fingerprint position indicator, represented by US 2007/0031011 for “Electronic Fingerprint Sensor with Differential Noise Cancellation” to Erhart, Keyvani, Benkley, and Jandu (now U.S. Pat. No. 7,460,697) (the contents of which are incorporated herein by reference), uses two linear partial fingerprint sensors, located about 400 microns apart. The two linear sensors use the slight timing differences that occur when a fingerprint swipe first hits one sensor and then the other sensor to detect when a fingerprint edge passes over the sensors. This technique can also detect relative speed of passage over the two partial sensors. This type of information can be used to deduce overall finger location during the course of a fingerprint swipe.
Examples of partial fingerprint readers equipped with finger location sensors include the Validity VFS131 and VFS201 sensors.
The VFS131 uses a series of electrical sensing plates to determine the relative position (location) of the bulk of the finger. In contrast to the electrodes used to determine the fine structure of the fingerprint ridges and valleys, these electrical sensing plates sense the location of the bulk of the finger, and are differentially excited as the finger moves up and down over the course of a finger swipe.
The VFS201 finger location sensor works by a different method. Instead of finger location plates, the VFS201 contains two linear fingerprint sensors, each parallel to each other, and each separated by a distance of about 400 microns from the other. These two fingerprint sensors can be used to deduce fingertip position and velocity because a finger tip or ridge will first pass over one sensor slightly before the other. The relative timing difference between a fingerprint pattern arriving at the first sensor, relative to the same pattern, can be used to derive finger speed. By keeping track of this finger speed history, the relative position of the sensor relative to the finger pad can be computed.
As the finger surface is moved across the sensor, portions of the fingerprint are sensed and captured by the device's one dimensional scanner, creating an array of one dimensional images indexed by order of data acquisition, and/or alternatively annotated with additional time and/or finger pad location information. Circuitry, such as a computer processor or microprocessor, then creates a full two-dimensional fingerprint image by creating a mosaic of these one dimensional partial fingerprint images.
Often the processor will then compare this recreated two dimensional full fingerprint, usually stored in working memory, with an authorized fingerprint stored in a fingerprint recognition memory, and determine if there is a match or not. Examples of such fingerprint matching software are disclosed in U.S. Pat. Nos. 7,020,591 and 7,194,392 by Wei et. al., this software is also commercially available from sources such as Cogent systems, Inc., South Pasadena, Calif.
If the scanned fingerprint matches the record of an authorized user, the processor then usually unlocks a secure memory or computer system and allows the user access. This enables various types of sensitive data and information (financial data, security codes, etc.), to be protected from unauthorized users, yet still be easily accessible to authorized users.
However such methods are still critically dependent upon user ergonomics. No amount of processing power can interpret a fingerprint image if the user has deviated too far from correct procedure.
Referring to
The smart card (100) includes a smart card casing (102) configured to seal the components of the smart card into a unitized case. Typically case (102) is substantially the size of a modern or common credit card wherein the dimensions of the device are substantially compatible with the 85.60 mm×53.98 mm×0.76 mm size standard for ISO/IEC 7810 established by the International Standards Organization (ISO) and the International Electrotechnical Commission (IEC) for identification cards and further wherein the card has an upper surface, a lower surface, and side surfaces. The smart card (100) includes a fingerprint sensor (104) (usually a partial fingerprint sensor) configured to sense the presence of a fingerprint, capture an image of the fingerprint, and store the fingerprint. Card (100) may optionally contain a thin battery (101) used to power the sensor (104) and optionally some of the other card electrical components. The smart card may or may not need a battery, wherein the smart card is configured to be powered when installed into a carrier. Alternatively, a battery may be included within the card, and may optionally be chargeable when installed within a carrier.
The sensor (104), which may be a deep finger penetrating RF based sensor or other type sensor, communicates with a processor (106) via a communication line (108) when a fingerprint image is captured. Such an image may be stored in working memory (109). In this example, memory (109) may be working memory (e.g. cache or RAM), fingerprint recognition memory (cache, RAM, Flash or other type of persistent memory), and secure memory (any type). This memory is designed to be accessed by the processor for processing or later transmission.
The communication line (108) is configured to receive data from the sensor (104), and process and store the data related to a fingerprint image. Also, the communication line (108) may receive control commands from a processor (often low current consumption microprocessor) for controlling the sensor (104). For example, a sensor (104) may be configured to sense the proximity of a finger when a user holds a fingerprint within proximity of the fingerprint sensor (104). In response, the processor may control the fingerprint sensor (i.e. power it up to full power) to receive an image of the fingerprint while a use swipes it across the sensor. The processor (106) will retrieve this fingerprint image information, as well as finger location information from the optional finger location sensing elements.
For example, the speed at which a user swipes a fingerprint across the sensor may be detected by sensor (104) or related fingerprint movement sensors, and transmitted to the processor (106) for use in reconstructing the fingerprint image. Furthermore, the direction of the fingerprint being swiped may also be detected by finger location sensors mounted on sensor (104) or related fingerprint movement sensors, and used by the processor to determine the direction at which the fingerprint swipes across the sensor. This information can be combined and stored in memory so that a proper image can be recorded of a fingerprint being swiped.
The processor (106) may perform the complete processing of such an image. Alternatively processor (106) may only partially or minimally reconstruct the image, and instead an exterior processor (not shown) may perform this and other operations, using data stored in working memory (109) in order to reconstruct the image of the fingerprint. For example, internal processor (106) may transmit information related to a user fingerprint via communication line (114) to a transmit and receive unit (116). Such a transmit and receive unit may in turn transmit the fingerprint sensor information via a communication line (117) to an electrical contact component (118). The electrical contact component (118) may be a direct electrical conductor contact system having electrical contacts (120) that may be connected to another device (such as a docking device) for receiving the fingerprint image information. Contact component (118) may also be used to receive power from an external power source, and use this power to directly power the smart card (100) and/or charge the battery (101) that powers the smart card (100).
Alternatively processor (106) will take the fingerprint mosaic from working memory (109) and compare this data with one or more authorized fingerprints stored in fingerprint recognition memory (109). If there is a match, processor (106) may then make sensitive information (financial data, identity data, cryptographic data, passwords, etc.) stored in secure memory (109) available to read or write to external devices. (In this drawing, for simplicity, figure (109) shows both working memory, fingerprint recognition memory, and secure memory denoted as a single box).
Alternatively, transmit/receive unit (116) may be a wireless radio frequency transmit/receive communication device, and optionally may be connected (122) to an antennae, such as an RF antennae (124), for wireless transmission to another device. As discussed in more detail below, this information may be transmitted to a device that is proximal to the smart card (100), such as a banking ATM machine, retail store smart card reader, or other device.
Other embodiments of the invention can be devised that make the smart card operate in a way that is backwards compatible with standard “dumb” magnetic strip credit cards. In these embodiments, transmit/receive unit (116) may be a unit that controls the magnetic properties of one or more bits on the card's magnetic strip. Alternatively, transmit/receive unit 116 may control a visual display (such as an electronic paper display mounted on the back of the card) that outputs an additional credit card verification number.
Using such backward compatible “smart cards”, a user may swipe a finger, and the backwards compatible smart card may emulate a dumb card by either changing the magnetic bits on a magnetic stripe on the back of the backward compatible smart card, or or alternatively displaying an additional credit card verification number on the back of the backwards compatible smart card. Using this technique, a backwards compatible smart card can be used as if it were a standard “dumb” credit card, and would not require any specialized smart card docking terminal. Such a card could either function with no terminal at all, or would function with an old style “dumb” credit card magnetic swipe terminal.
To function without any terminal at all, a user could make a telephone purchase by first reading the credit card number on the front of the card to the sales clerk at the other end of the telephone. When the clerk asks for the credit card verification number on the other side of the credit card, an authorized user could swipe his or her finger, and the backwards compatible smart card would verify the correct fingerprint, and then display the correct credit card verification number on the back of the card. However if an unauthorized user attempted to use the backwards compatible smart card over the phone, the card would fail to verify a correct fingerprint, and thus either display no verification number or alternatively display an incorrect verification number. The net effect is that the backwards compatible smart card functions like a dumb credit card that “magically” knows if it is being used by the correct user or not.
Alternatively, the backwards compatible smart card could be used in a standard magnetic strip reading credit card terminal. As an example, consider a user making a purchase at a store that has a standard magnetic strip reading credit card reader. The user could first swipe his or her finger over the backwards compatible smart card, and the card could read the fingerprint, verify that it was proper, and in turn could alter the magnetic configuration of one or more credit card identification data bits on a simulated “dumb credit card” magnetic strip on the back of the card. When the clerk swipes the card, the correct serial number will be transmitted. However if an unauthorized user attempted to swipe the card, the card would fail to verify the fingerprint, and instead would alter the data bits on the simulated “dumb credit card” magnetic strip on the back of the card to give either an invalid number, or a number indicating that the card is being used by an unauthorized user.
According to the invention, the smart card (100) may include visual or tactile guides (125), (126) configured to guide a user in swiping a fingerprint across the sensor (104). Such a guide may be tactile (e.g. raised three dimensionally in respect to the flat surface of the casing (102)). Such a guide may even be configured with moving elements, such as slides that can be raised by the user during a scan, and then retracted for easier storage. Alternatively the guides may simply be visual, such as guides printed onto the smart card, or displayed by active displays on the smart card.
Smart card (100) may also contain power or reset switches, such as a user activation switch (not shown), that changes the card from low power consumption (sleep mode) to a medium power consumption mode, in which the fingerprint sensors are looking for the commencement of a fingerprint swipe. Once the swipe begins, fingerprint sensor (104) may send a signal to processor (106) instructing the processor to switch sensor (104) into a high power consumption fingerprint swipe analysis mode. Alternatively this function may be done by other circuits (not shown).
The sensor (104) may simply lay roughly flat along the larger plane of the smart card, and be oriented to sensing fingerprint swipes applied along the larger plane of the smart card. However other configurations are possible. As an alternative example, sensor (104) may be oriented along the thin edge of the smart card, and sense fingerprint swipes applied along the thin edge of the smart card. In still other configurations, sensor (104) may be an extended sensor with extended sensing element 132, and may include an overlapping sensor that covers both the planar portion and the edge of the smart card 134.
In such a sensor, user may do a fingerprint swipe over the surface or the edge of the smart card, and the sensor may be configured to receive an image from either the surface or the edge of the smart card.
As previously discussed, visual or tactile ergonomic guides (130) may also be included to guide a user in proper use. In this configuration, the guides (130) visually or tactilely instruct a user to swipe the sensor along a surface of the card (100) in the direction shown (105), effectively guiding a user to hold a finger (103) flat against the card (100) so that a proper image may be recorded. In some cases, guides (130) may even contain sensors that detect proper and improper finger angles, and actively work in conjunction with processor (106) and an optional display device (speaker, or visual display) to give feedback to the user if the user's technique is improper.
In one embodiment, ergonomic guides (130) may be made with a thin flat display material, such as electronic paper (e-paper). Such an electronic paper display could work in conjunction with fingerprint sensors on device (104) and processor (106) to give the user visual feedback as to the user's finger swipe technique. Electronic paper displays, suitable for credit card sized devices, are produced by E Ink corporation, Cambridge Mass., and are discussed in more detail in U.S. Pat. Nos. 6,473,072; 6,738,050, and other patents.
Alternatively or additionally, ergonomic guides (126), (128) would guide a user to swipe the sensor in the correct and consistent direction. Using the combination of these guides, a user is guided to properly swipe the sensor. The guides (130) may point in the other direction, guiding a user to swipe the sensor in another direction. Which direction the sensor is swiped depends on the application. As previously discussed, guides (126), (128), (130) may be printed or visual guides, sensing guides, passive or active displays, or alternatively may be raised or depressed portions of the surface of (100) so as to provide tactile as well as visual guiding to the user.
Referring to
Referring to
Referring to
Referring to
In contrast,
Referring to
As can be seen in these
Referring now to
Referring to
In other configurations, guides (126), (128) can be configured to detect excess pressure, be connected to processor (106), and warn the user when the finger is being swiped across guides (126), (128), rather than between guides (126), (128), by either a visual display (for example, causing an LCD or LED or electronic paper display mounted on card (100) to show a warning) or alternatively an audible alarm by causing a miniature audio speaker, such as a piezoelectric speaker, mounted on card (100) to beep.
Referring to
Referring to
Thus, these guides are useful in guiding a user's finger to swipe the sensor in a manner that optimizes the capturing of the fingerprint surface (111). Those skilled in the art will understand that many other configurations similar to these are possible, and such configurations may be derived in light of these illustrations and this description. Those skilled in the art will also understand that variations are possible within the scope of the invention, of which the spirit and scope is defined by the appended claims and all equivalents.
Referring to
This docking station may derive both its own power and data connections through a standard connector, such as a Universal Serial Bus (USB) connector, IEEE 1394 connector, serial connector, parallel connector, SPI connector etc., or alternatively derive its own power and data connection by other means such as an independent connection to an external power supply, external batteries, or the like.
When used with a docking station and an external computer or terminal, the functionality of the system may be enhanced through the use of software. This software, which may reside on the external computer, may read fingerprint and security data from the smart card (transmitted via transmit/receive unit (116)), and in turn use this data for passwords, encrypting files, and, especially when used in conjunction with a database containing large number of other fingerprints and security data, also used for passports, voting systems, and other security and access functions such as entering into secure areas. Again, software such as disclosed in U.S. Pat. Nos. 7,020,591 and 7,194,392 by Wei et. al., and commercially available from sources such as Cogent systems, Inc., South Pasadena, Calif., or other fingerprint recognition software, is useful for these purposes.
The docking station may include an opening (408) that corresponds to the sensor (404), allowing a user to swipe the sensor (404) through the opening (408). Optionally, the docking station may include visual or tactile guides (410), (412), similar to the guides (128), (126) of
Referring to
Referring to
Referring to
Referring to
Such a docking station may be configured within a portable device, or can be configured in a stationary device such as a bank ATM or other system.
Referring to
Referring to
Referring to 5c, yet another embodiment of a docking station (518) is illustrated with an opening (520), where the opening is exposed further and is able to expose a sensor having a surface (522) and/or surface (524) so that the surface (526) can be swiped by a user. In operation, either surface (524) or (526) may be swiped depending on the application.
Referring to
Referring now to
Referring to
Referring to
Thus, the illustrations of
In addition to smart cards, the apparatus and method of the invention are useful for a broad range of other portable electronic devices where authentication is desired. In operation, the ergonomic guides discussed here enable the device to be used without a large number of unsuccessful fingerprint scans and waste of scarce onboard battery power. At the same time, the stored fingerprint and shared secret parameters discussed above can be used to more efficiently and quickly authenticate the device without the need to run the burdensome security key generation processes, and without compromising the level of security in the device. This makes the device ideal for a wide variety of electronic commerce and security applications.
In addition to the onboard computational circuitry used to run the sensor and assemble sufficient information to read the fingerprint, the invention may also involve a number of other computational functions to be performed by onboard electronic processing devices (microprocessors or combinatorial logic), such as RSA functions, secure key cryptography, public key cryptography (PKI), shared secrets, and other authentication functions. The microprocessor may be a specialized or dedicated microprocessor that is configured to perform particular tasks by executing machine-readable software code that defines the particular tasks. Often, the microprocessor may contain a core that is an ARM, MIPS, X86, 8051, MSP430, or other common microprocessor core. Some of these additional tasks may include accessing financial data or other data stored onboard memory (109) when the correct fingerprint has been provided, or accessing shared secrets (such as cryptographic shared secrets) onboard memory (109).
The smart card may or may not need a battery, wherein the smart card is configured to be powered when installed into a carrier. Alternatively, a battery may be included within the card, and may optionally be chargeable when installed within a carrier.
The microprocessor onboard either the card itself or the docking station may also be configured to operate and communicate with other devices such as direct memory access modules, memory storage devices, Internet related hardware, and other devices that relate to the transmission of data in accordance with the invention. The software code may be configured using software formats such as Java, C++, XML (Extensible Mark-up Language), AJAX, Perl, Ruby, assembly and other languages that may be used to define functions that relate to operations of devices required to carry out the functional operations related to the invention. The code may be written in different forms and styles, many of which are known to those skilled in the art. Different code formats, code configurations, styles and forms of software programs and other means of configuring code to define the operations of a microprocessor in accordance with the invention will not depart from the spirit and scope of the invention.
The smart card and the docking station may interact with other types of computers, such as networked computer servers. These devices normally include different types of memory, and the fingerprint data and shared secrets accessed by fingerprint data may be used in conjunction with these systems. When very fast operation, such as when scanning large numbers of different users simultaneously is desired, it may be advantageous for the networked computer servers to store corresponding fingerprint and shared secret data in cache memory. Cache memory devices are often included in such computers for use by the central processing unit as a very fast and convenient storage location for information that is frequently stored and retrieved.
Similarly, a persistent memory is also frequently used with such computers for maintaining information that is frequently retrieved by a central processing unit, but that is not often altered within the persistent memory, unlike the cache memory. Main memory is also usually included for storing and retrieving larger amounts of information such as data and software applications configured to perform functions according to the invention when executed by the central processing unit. These memory devices may be configured as random access memory (RAM), static random access memory (SRAM), dynamic random access memory (DRAM), flash memory, and other memory storage devices that may be accessed by a central processing unit to store and retrieve information. The invention is not limited to any particular type of memory device, or any commonly used protocol for storing and retrieving information to and from these memory devices respectively.
Although this embodiment is described and illustrated in the context of devices, systems and related methods of authenticating devices, the scope of the invention extends to other applications where such functions are useful. Furthermore, while the foregoing description has been with reference to particular embodiments of the invention, it will be appreciated that these are only illustrative of the invention and that changes may be made to those embodiments without departing from the principles of the invention.
Number | Name | Date | Kind |
---|---|---|---|
4151512 | Rigannati et al. | Apr 1979 | A |
4225850 | Chang et al. | Sep 1980 | A |
4310827 | Asi | Jan 1982 | A |
4353056 | Tsikos | Oct 1982 | A |
4405829 | Rivest et al. | Sep 1983 | A |
4525859 | Bowles et al. | Jun 1985 | A |
4550221 | Mabusth | Oct 1985 | A |
4580790 | Doose | Apr 1986 | A |
4582985 | Lofberg | Apr 1986 | A |
4758622 | Gosselin | Jul 1988 | A |
4817183 | Sparrow | Mar 1989 | A |
5076566 | Kriegel | Dec 1991 | A |
5109427 | Yang | Apr 1992 | A |
5140642 | Hsu et al. | Aug 1992 | A |
5305017 | Gerpheide | Apr 1994 | A |
5319323 | Fong | Jun 1994 | A |
5325442 | Knapp | Jun 1994 | A |
5420936 | Fitzpatrick et al. | May 1995 | A |
5422807 | Mitra et al. | Jun 1995 | A |
5456256 | Schneider et al. | Oct 1995 | A |
5543591 | Gillespie et al. | Aug 1996 | A |
5569901 | Bridgelall et al. | Oct 1996 | A |
5623552 | Lane | Apr 1997 | A |
5627316 | De Winter et al. | May 1997 | A |
5650842 | Maase et al. | Jul 1997 | A |
5717777 | Wong et al. | Feb 1998 | A |
5781651 | Hsiao et al. | Jul 1998 | A |
5801681 | Sayag | Sep 1998 | A |
5818956 | Tuli | Oct 1998 | A |
5838306 | O'Connor | Nov 1998 | A |
5848176 | Harra et al. | Dec 1998 | A |
5850450 | Schweitzer et al. | Dec 1998 | A |
5852670 | Setlak et al. | Dec 1998 | A |
5864296 | Upton | Jan 1999 | A |
5887343 | Salatino et al. | Mar 1999 | A |
5892824 | Beatson et al. | Apr 1999 | A |
5903225 | Schmitt et al. | May 1999 | A |
5915757 | Tsuyama et al. | Jun 1999 | A |
5920384 | Borza | Jul 1999 | A |
5920640 | Salatino et al. | Jul 1999 | A |
5940526 | Setlak et al. | Aug 1999 | A |
5963679 | Setlak | Oct 1999 | A |
5999637 | Toyoda et al. | Dec 1999 | A |
6002815 | Immega et al. | Dec 1999 | A |
6016355 | Dickinson et al. | Jan 2000 | A |
6052475 | Upton | Apr 2000 | A |
6067368 | Setlak et al. | May 2000 | A |
6073343 | Petrick et al. | Jun 2000 | A |
6076566 | Lowe | Jun 2000 | A |
6088585 | Schmitt et al. | Jul 2000 | A |
6098175 | Lee | Aug 2000 | A |
6118318 | Fifield et al. | Sep 2000 | A |
6134340 | Hsu et al. | Oct 2000 | A |
6157722 | Lerner et al. | Dec 2000 | A |
6161213 | Lofstrom | Dec 2000 | A |
6175407 | Santor | Jan 2001 | B1 |
6182076 | Yu et al. | Jan 2001 | B1 |
6182892 | Angelo et al. | Feb 2001 | B1 |
6185318 | Jain et al. | Feb 2001 | B1 |
6234031 | Suga | May 2001 | B1 |
6241288 | Bergenek et al. | Jun 2001 | B1 |
6259108 | Antonelli et al. | Jul 2001 | B1 |
6289114 | Mainguet | Sep 2001 | B1 |
6292272 | Okauchi et al. | Sep 2001 | B1 |
6317508 | Kramer et al. | Nov 2001 | B1 |
6320394 | Tartagni | Nov 2001 | B1 |
6325285 | Baratelli | Dec 2001 | B1 |
6332193 | Glass et al. | Dec 2001 | B1 |
6333989 | Borza | Dec 2001 | B1 |
6337919 | Dunton | Jan 2002 | B1 |
6346739 | Lepert et al. | Feb 2002 | B1 |
6347040 | Fries et al. | Feb 2002 | B1 |
6357663 | Takahashi et al. | Mar 2002 | B1 |
6360004 | Akizuki | Mar 2002 | B1 |
6362633 | Tartagni | Mar 2002 | B1 |
6392636 | Ferrari et al. | May 2002 | B1 |
6399994 | Shobu | Jun 2002 | B2 |
6400836 | Senior | Jun 2002 | B2 |
6408087 | Kramer | Jun 2002 | B1 |
6473072 | Comiskey et al. | Oct 2002 | B1 |
6509501 | Eicken et al. | Jan 2003 | B2 |
6525547 | Hayes | Feb 2003 | B2 |
6525932 | Ohnishi et al. | Feb 2003 | B1 |
6539101 | Black | Mar 2003 | B1 |
6580816 | Kramer et al. | Jun 2003 | B2 |
6597289 | Sabatini | Jul 2003 | B2 |
6631201 | Dickinson et al. | Oct 2003 | B1 |
6643389 | Raynal et al. | Nov 2003 | B1 |
6672174 | Deconde et al. | Jan 2004 | B2 |
6710461 | Chou et al. | Mar 2004 | B2 |
6738050 | Comiskey et al. | May 2004 | B2 |
6741729 | Bjorn et al. | May 2004 | B2 |
6757002 | Oross et al. | Jun 2004 | B1 |
6766040 | Catalano et al. | Jul 2004 | B1 |
6785407 | Tschudi et al. | Aug 2004 | B1 |
6836230 | Le Pailleur et al. | Dec 2004 | B2 |
6838905 | Doyle | Jan 2005 | B1 |
6873356 | Kanbe et al. | Mar 2005 | B1 |
6886104 | McClurg et al. | Apr 2005 | B1 |
6897002 | Teraoka et al. | May 2005 | B2 |
6898299 | Brooks | May 2005 | B1 |
6924496 | Manansala | Aug 2005 | B2 |
6937748 | Schneider et al. | Aug 2005 | B1 |
6941001 | Bolle et al. | Sep 2005 | B1 |
6941810 | Okada | Sep 2005 | B2 |
6950540 | Higuchi | Sep 2005 | B2 |
6959874 | Bardwell | Nov 2005 | B2 |
6963626 | Shaeffer et al. | Nov 2005 | B1 |
6970584 | O'Gorman et al. | Nov 2005 | B2 |
6980672 | Saito et al. | Dec 2005 | B2 |
6983882 | Cassone | Jan 2006 | B2 |
7013030 | Wong et al. | Mar 2006 | B2 |
7020591 | Wei et al. | Mar 2006 | B1 |
7030860 | Hsu et al. | Apr 2006 | B1 |
7031670 | May | Apr 2006 | B2 |
7035443 | Wong | Apr 2006 | B2 |
7042535 | Katoh et al. | May 2006 | B2 |
7043061 | Hamid et al. | May 2006 | B2 |
7043644 | DeBruine | May 2006 | B2 |
7046230 | Zadesky et al. | May 2006 | B2 |
7064743 | Nishikawa | Jun 2006 | B2 |
7099496 | Benkley, III | Aug 2006 | B2 |
7110574 | Haruki et al. | Sep 2006 | B2 |
7110577 | Tschud | Sep 2006 | B1 |
7113622 | Hamid | Sep 2006 | B2 |
7126389 | McRae et al. | Oct 2006 | B1 |
7129926 | Mathiassen et al. | Oct 2006 | B2 |
7136514 | Wong | Nov 2006 | B1 |
7146024 | Benkley, III | Dec 2006 | B2 |
7146026 | Russon et al. | Dec 2006 | B2 |
7146029 | Manansala | Dec 2006 | B2 |
7184581 | Johansen et al. | Feb 2007 | B2 |
7190816 | Mitsuyu et al. | Mar 2007 | B2 |
7194392 | Tuken et al. | Mar 2007 | B2 |
7197168 | Russo | Mar 2007 | B2 |
7200250 | Chou | Apr 2007 | B2 |
7251351 | Mathiassen et al. | Jul 2007 | B2 |
7258279 | Schneider et al. | Aug 2007 | B2 |
7260246 | Fujii | Aug 2007 | B2 |
7263212 | Kawabe | Aug 2007 | B2 |
7263213 | Rowe | Aug 2007 | B2 |
7289649 | Walley et al. | Oct 2007 | B1 |
7290323 | Deconde et al. | Nov 2007 | B2 |
7308121 | Mathiassen et al. | Dec 2007 | B2 |
7308122 | McClurg et al. | Dec 2007 | B2 |
7321672 | Sasaki et al. | Jan 2008 | B2 |
7356169 | Hamid | Apr 2008 | B2 |
7360688 | Harris | Apr 2008 | B1 |
7369685 | DeLeon | May 2008 | B2 |
7379569 | Chikazawa et al. | May 2008 | B2 |
7408135 | Fujieda | Aug 2008 | B2 |
7409876 | Ganapathi et al. | Aug 2008 | B2 |
7412083 | Takahashi | Aug 2008 | B2 |
7424618 | Roy et al. | Sep 2008 | B2 |
7447339 | Mimura et al. | Nov 2008 | B2 |
7447911 | Chou et al. | Nov 2008 | B2 |
7460697 | Erhart et al. | Dec 2008 | B2 |
7463756 | Benkley | Dec 2008 | B2 |
7505611 | Fyke | Mar 2009 | B2 |
7505613 | Russo | Mar 2009 | B2 |
7565548 | Fiske et al. | Jul 2009 | B2 |
7574022 | Russo | Aug 2009 | B2 |
7596832 | Hsieh et al. | Oct 2009 | B2 |
7643950 | Getzin et al. | Jan 2010 | B1 |
7646897 | Fyke | Jan 2010 | B2 |
7681232 | Nordentoft et al. | Mar 2010 | B2 |
7689013 | Shinzaki | Mar 2010 | B2 |
7706581 | Drews et al. | Apr 2010 | B2 |
7733697 | Picca et al. | Jun 2010 | B2 |
7751601 | Benkley | Jul 2010 | B2 |
7843438 | Onoda | Nov 2010 | B2 |
7848798 | Martinsen et al. | Dec 2010 | B2 |
7899216 | Watanabe et al. | Mar 2011 | B2 |
7953258 | Dean et al. | May 2011 | B2 |
7953259 | McClurg | May 2011 | B2 |
8005276 | Dean et al. | Aug 2011 | B2 |
8031916 | Abiko et al. | Oct 2011 | B2 |
8077935 | Geoffroy et al. | Dec 2011 | B2 |
8107212 | Nelson et al. | Jan 2012 | B2 |
8116540 | Dean et al. | Feb 2012 | B2 |
8131026 | Benkley et al. | Mar 2012 | B2 |
8165355 | Benkley et al. | Apr 2012 | B2 |
8175345 | Gardner | May 2012 | B2 |
8204281 | Satya et al. | Jun 2012 | B2 |
20010026636 | Mainget | Oct 2001 | A1 |
20010030644 | Allport | Oct 2001 | A1 |
20010036299 | Senior | Nov 2001 | A1 |
20010043728 | Kramer et al. | Nov 2001 | A1 |
20020025062 | Black | Feb 2002 | A1 |
20020061125 | Fujii | May 2002 | A1 |
20020064892 | Lepert et al. | May 2002 | A1 |
20020067845 | Griffis | Jun 2002 | A1 |
20020073046 | David | Jun 2002 | A1 |
20020089044 | Simmons et al. | Jul 2002 | A1 |
20020089410 | Janiak et al. | Jul 2002 | A1 |
20020096731 | Wu et al. | Jul 2002 | A1 |
20020122026 | Bergstrom | Sep 2002 | A1 |
20020126516 | Jeon | Sep 2002 | A1 |
20020133725 | Roy et al. | Sep 2002 | A1 |
20020152048 | Hayes | Oct 2002 | A1 |
20020181749 | Matsumoto et al. | Dec 2002 | A1 |
20030002717 | Hamid | Jan 2003 | A1 |
20030002719 | Hamid et al. | Jan 2003 | A1 |
20030021495 | Cheng | Jan 2003 | A1 |
20030035570 | Benkley | Feb 2003 | A1 |
20030063782 | Acharya et al. | Apr 2003 | A1 |
20030068072 | Hamid | Apr 2003 | A1 |
20030076301 | Tsuk et al. | Apr 2003 | A1 |
20030076303 | Huppi | Apr 2003 | A1 |
20030095096 | Robbin et al. | May 2003 | A1 |
20030095690 | Su et al. | May 2003 | A1 |
20030102874 | Lane et al. | Jun 2003 | A1 |
20030123714 | O'Gorman et al. | Jul 2003 | A1 |
20030123715 | Uchida | Jul 2003 | A1 |
20030141959 | Keogh et al. | Jul 2003 | A1 |
20030147015 | Katoh et al. | Aug 2003 | A1 |
20030161510 | Fujii | Aug 2003 | A1 |
20030161512 | Mathiassen et al. | Aug 2003 | A1 |
20030169228 | Mathiassen et al. | Sep 2003 | A1 |
20030174871 | Yoshioka et al. | Sep 2003 | A1 |
20030186157 | Teraoka et al. | Oct 2003 | A1 |
20030209293 | Sako et al. | Nov 2003 | A1 |
20030224553 | Manansala | Dec 2003 | A1 |
20040012773 | Puttkammer | Jan 2004 | A1 |
20040017934 | Kocher et al. | Jan 2004 | A1 |
20040022001 | Chu et al. | Feb 2004 | A1 |
20040042642 | Bolle et al. | Mar 2004 | A1 |
20040050930 | Rowe | Mar 2004 | A1 |
20040066613 | Leitao | Apr 2004 | A1 |
20040076313 | Bronstein et al. | Apr 2004 | A1 |
20040081339 | Benkley | Apr 2004 | A1 |
20040096086 | Miyasaka et al. | May 2004 | A1 |
20040113956 | Bellwood et al. | Jun 2004 | A1 |
20040120400 | Linzer | Jun 2004 | A1 |
20040125993 | Zhao et al. | Jul 2004 | A1 |
20040129787 | Saito | Jul 2004 | A1 |
20040136612 | Meister et al. | Jul 2004 | A1 |
20040155752 | Radke | Aug 2004 | A1 |
20040172339 | Snelgrove et al. | Sep 2004 | A1 |
20040179718 | Chou | Sep 2004 | A1 |
20040184641 | Nagasaka et al. | Sep 2004 | A1 |
20040190761 | Lee | Sep 2004 | A1 |
20040208346 | Baharav et al. | Oct 2004 | A1 |
20040208347 | Baharav et al. | Oct 2004 | A1 |
20040208348 | Baharav et al. | Oct 2004 | A1 |
20040213441 | Tschudi | Oct 2004 | A1 |
20040215689 | Dooley et al. | Oct 2004 | A1 |
20040228505 | Sugimoto | Nov 2004 | A1 |
20040228508 | Shigeta | Nov 2004 | A1 |
20040240712 | Rowe et al. | Dec 2004 | A1 |
20040252867 | Lan et al. | Dec 2004 | A1 |
20050031174 | Ryhanen et al. | Feb 2005 | A1 |
20050036665 | Higuchi | Feb 2005 | A1 |
20050047485 | Khayrallah et al. | Mar 2005 | A1 |
20050100196 | Scott et al. | May 2005 | A1 |
20050100938 | Hofmann et al. | May 2005 | A1 |
20050109835 | Jacoby et al. | May 2005 | A1 |
20050110103 | Setlak | May 2005 | A1 |
20050111708 | Chou | May 2005 | A1 |
20050123176 | Ishii et al. | Jun 2005 | A1 |
20050129291 | Boshra | Jun 2005 | A1 |
20050136200 | Durell et al. | Jun 2005 | A1 |
20050139656 | Arnouse | Jun 2005 | A1 |
20050139685 | Kozlay | Jun 2005 | A1 |
20050162402 | Watanachote | Jul 2005 | A1 |
20050169503 | Howell et al. | Aug 2005 | A1 |
20050174015 | Scott et al. | Aug 2005 | A1 |
20050210271 | Chou et al. | Sep 2005 | A1 |
20050219200 | Weng | Oct 2005 | A1 |
20050220329 | Payne et al. | Oct 2005 | A1 |
20050231213 | Chou et al. | Oct 2005 | A1 |
20050238212 | Du et al. | Oct 2005 | A1 |
20050244038 | Benkley | Nov 2005 | A1 |
20050244039 | Geoffroy et al. | Nov 2005 | A1 |
20050247559 | Frey et al. | Nov 2005 | A1 |
20050249386 | Juh | Nov 2005 | A1 |
20050258952 | Utter et al. | Nov 2005 | A1 |
20050269402 | Spitzer et al. | Dec 2005 | A1 |
20060006224 | Modi | Jan 2006 | A1 |
20060055500 | Burke et al. | Mar 2006 | A1 |
20060066572 | Yumoto et al. | Mar 2006 | A1 |
20060076926 | Lee | Apr 2006 | A1 |
20060078176 | Abiko et al. | Apr 2006 | A1 |
20060083411 | Benkley | Apr 2006 | A1 |
20060110537 | Huang et al. | May 2006 | A1 |
20060140461 | Kim et al. | Jun 2006 | A1 |
20060144953 | Takao | Jul 2006 | A1 |
20060170528 | Funushige et al. | Aug 2006 | A1 |
20060187200 | Martin | Aug 2006 | A1 |
20060210082 | Devadas et al. | Sep 2006 | A1 |
20060214512 | Iwata | Sep 2006 | A1 |
20060239514 | Watanabe et al. | Oct 2006 | A1 |
20060249008 | Luther | Nov 2006 | A1 |
20060259873 | Mister | Nov 2006 | A1 |
20060261174 | Zellner et al. | Nov 2006 | A1 |
20060267385 | Steenwyk et al. | Nov 2006 | A1 |
20060271793 | Devadas et al. | Nov 2006 | A1 |
20060287963 | Steeves et al. | Dec 2006 | A1 |
20070031011 | Erhart et al. | Feb 2007 | A1 |
20070036400 | Watanabe et al. | Feb 2007 | A1 |
20070057763 | Blattner et al. | Mar 2007 | A1 |
20070067828 | Bychkov | Mar 2007 | A1 |
20070076926 | Schneider et al. | Apr 2007 | A1 |
20070076951 | Tanaka et al. | Apr 2007 | A1 |
20070086634 | Setlak et al. | Apr 2007 | A1 |
20070090312 | Stallinga et al. | Apr 2007 | A1 |
20070138299 | Mitra | Jun 2007 | A1 |
20070160269 | Kuo | Jul 2007 | A1 |
20070180261 | Akkermans et al. | Aug 2007 | A1 |
20070196002 | Choi et al. | Aug 2007 | A1 |
20070198141 | Moore | Aug 2007 | A1 |
20070198435 | Siegal et al. | Aug 2007 | A1 |
20070228154 | Tran | Oct 2007 | A1 |
20070237366 | Maletsky | Oct 2007 | A1 |
20070248249 | Stoianov | Oct 2007 | A1 |
20080002867 | Mathiassen et al. | Jan 2008 | A1 |
20080013805 | Sengupta et al. | Jan 2008 | A1 |
20080019578 | Saito et al. | Jan 2008 | A1 |
20080049987 | Champagne et al. | Feb 2008 | A1 |
20080049989 | Iseri et al. | Feb 2008 | A1 |
20080063245 | Benkley et al. | Mar 2008 | A1 |
20080069412 | Champagne et al. | Mar 2008 | A1 |
20080126260 | Cox et al. | May 2008 | A1 |
20080169345 | Keane et al. | Jul 2008 | A1 |
20080170695 | Adler et al. | Jul 2008 | A1 |
20080175450 | Scott et al. | Jul 2008 | A1 |
20080178008 | Takahashi et al. | Jul 2008 | A1 |
20080179112 | Qin et al. | Jul 2008 | A1 |
20080185429 | Saville | Aug 2008 | A1 |
20080201265 | Hewton | Aug 2008 | A1 |
20080205714 | Benkley et al. | Aug 2008 | A1 |
20080219521 | Benkley et al. | Sep 2008 | A1 |
20080222049 | Loomis et al. | Sep 2008 | A1 |
20080223925 | Saito et al. | Sep 2008 | A1 |
20080226132 | Gardner | Sep 2008 | A1 |
20080240523 | Benkley et al. | Oct 2008 | A1 |
20080244277 | Orsini et al. | Oct 2008 | A1 |
20080267462 | Nelson et al. | Oct 2008 | A1 |
20080279373 | Erhart et al. | Nov 2008 | A1 |
20080317290 | Tazoe | Dec 2008 | A1 |
20090130369 | Huang et al. | May 2009 | A1 |
20090153297 | Gardner | Jun 2009 | A1 |
20090154779 | Satyan et al. | Jun 2009 | A1 |
20090155456 | Benkley et al. | Jun 2009 | A1 |
20090169071 | Bond et al. | Jul 2009 | A1 |
20090174974 | Huang et al. | Jul 2009 | A1 |
20090237135 | Ramaraju et al. | Sep 2009 | A1 |
20090252384 | Dean et al. | Oct 2009 | A1 |
20090252385 | Dean et al. | Oct 2009 | A1 |
20090252386 | Dean et al. | Oct 2009 | A1 |
20090279742 | Abiko | Nov 2009 | A1 |
20090319435 | Little et al. | Dec 2009 | A1 |
20090324028 | Russo | Dec 2009 | A1 |
20100026451 | Erhart et al. | Feb 2010 | A1 |
20100045705 | Vertegaal et al. | Feb 2010 | A1 |
20100083000 | Kesanupalli et al. | Apr 2010 | A1 |
20100119124 | Satyan | May 2010 | A1 |
20100123675 | Ippel | May 2010 | A1 |
20100127366 | Bond et al. | May 2010 | A1 |
20100176823 | Thompson et al. | Jul 2010 | A1 |
20100176892 | Thompson et al. | Jul 2010 | A1 |
20100177940 | Dean et al. | Jul 2010 | A1 |
20100180136 | Thompson et al. | Jul 2010 | A1 |
20100189314 | Benkley et al. | Jul 2010 | A1 |
20100208953 | Gardner et al. | Aug 2010 | A1 |
20100244166 | Shibuta et al. | Sep 2010 | A1 |
20100272329 | Benkley | Oct 2010 | A1 |
20100284565 | Benkley et al. | Nov 2010 | A1 |
20110002461 | Erhart et al. | Jan 2011 | A1 |
20110018556 | Le et al. | Jan 2011 | A1 |
20110102567 | Erhart | May 2011 | A1 |
20110102569 | Erhart | May 2011 | A1 |
20110175703 | Benkley | Jul 2011 | A1 |
20110176307 | Fan et al. | Jul 2011 | A1 |
20110182486 | Valfridsson et al. | Jul 2011 | A1 |
20110214924 | Perezselsky et al. | Sep 2011 | A1 |
20110267298 | Erhart et al. | Nov 2011 | A1 |
20110298711 | Dean et al. | Dec 2011 | A1 |
20110304001 | Erhart et al. | Dec 2011 | A1 |
20120044639 | Garcia | Feb 2012 | A1 |
Number | Date | Country |
---|---|---|
2213813 | Oct 1973 | DE |
0929028 | Jan 1998 | EP |
0905646 | Mar 1999 | EP |
0973123 | Jan 2000 | EP |
1018697 | Jul 2000 | EP |
1139301 | Oct 2001 | EP |
1531419 | May 2005 | EP |
1533759 | May 2005 | EP |
1538548 | Jun 2005 | EP |
1624399 | Feb 2006 | EP |
1775674 | Apr 2007 | EP |
1939788 | Jul 2008 | EP |
2331613 | May 1999 | GB |
2480919 | Dec 2011 | GB |
01094418 | Apr 1989 | JP |
04158434 | Jun 1992 | JP |
2005011002 | Jan 2005 | JP |
2005242856 | Sep 2005 | JP |
2007305097 | Nov 2007 | JP |
200606745 | Feb 2006 | TW |
200620140 | Jun 2006 | TW |
200629167 | Aug 2006 | TW |
WO 9003620 | Apr 1990 | WO |
WO 9858342 | Dec 1998 | WO |
WO 99028701 | Jun 1999 | WO |
WO 9943258 | Sep 1999 | WO |
WO 0122349 | Mar 2001 | WO |
WO 0194902 | Dec 2001 | WO |
WO 0194902 | Dec 2001 | WO |
WO 0195304 | Dec 2001 | WO |
WO 0211066 | Feb 2002 | WO |
WO 0247018 | Jun 2002 | WO |
WO 0247018 | Jun 2002 | WO |
WO 02061668 | Aug 2002 | WO |
WO 02077907 | Oct 2002 | WO |
WO 03063054 | Jul 2003 | WO |
WO 03075210 | Sep 2003 | WO |
WO 2004066194 | Aug 2004 | WO |
WO 2004066693 | Aug 2004 | WO |
WO 2005104012 | Nov 2005 | WO |
WO 2005106774 | Nov 2005 | WO |
WO 2005106774 | Nov 2005 | WO |
WO 2006040724 | Apr 2006 | WO |
WO 2006041780 | Apr 2006 | WO |
WO 2007011607 | Jan 2007 | WO |
WO 2008033264 | Mar 2008 | WO |
WO 2008033264 | Mar 2008 | WO |
WO 2008033265 | Jun 2008 | WO |
WO 2008033265 | Jun 2008 | WO |
WO 2008137287 | Nov 2008 | WO |
WO 2009002599 | Dec 2008 | WO |
WO 2009002599 | Dec 2008 | WO |
WO 2009029257 | Jun 2009 | WO |
WO 2009079219 | Jun 2009 | WO |
WO 2009079221 | Jun 2009 | WO |
WO 2009079257 | Jun 2009 | WO |
WO 2009079262 | Jun 2009 | WO |
WO 2010034036 | Mar 2010 | WO |
WO 2010036445 | Apr 2010 | WO |
WO 2010143597 | Dec 2010 | WO |
WO 2011088248 | Jan 2011 | WO |
WO2011088252 | Jan 2011 | WO |
WO 2011053797 | May 2011 | WO |
Number | Date | Country | |
---|---|---|---|
20090153297 A1 | Jun 2009 | US |