This invention relates generally to mobile devices and more particularly to secure memory techniques on a mobile device.
Many known mobile devices support objects, such as by using Java to send, receive, or at least use data, voice, and/or multi-media (audio/video). These objects may be involved in sensitive information from cellular networks and with many different services. However, garbage collection operations presently performed on mobile devices have security deficiencies.
A non-limiting example of the deficiencies includes collection of unreachable objects. For example,
In accordance with the teachings disclosed herein, a secure garbage collection system is provided which includes a microprocessor, and an addressable storage, having a heap and a secure garbage collection software module capable of calling a wipe function. When the secure garbage collection software module has detected that objects in the heap are unreachable, it securely reclaims the memory they were using by calling the wipe function.
In another embodiment, the secure garbage collection may be triggered in many different ways, including but not limited to the steps of: waiting for a trigger, performing subsequent steps for all secure applications, requesting that a secure application unreference sensitive objects, perform secure garbage collecting, and determine if all secure applications have been processed.
a is a block diagram illustrating in greater detail the physical view of an example addressable storage of
b is a block diagram illustrating the logical view of
With reference now to the Figures,
The exemplary secure garbage collection system 300 of
Microprocessor software 140 includes a native wipe function 170. The native wipe function 170 can obliterate the data in a portion of addressable storage 120. Suitable functions in the ‘C’ programming language is the function ‘memset( )’, which could be used to write over data with all zeroes, all ones, or with random data to thwart sophisticated memory recovery techniques. Microprocessor software 140 also may include virtual machine software 200, having a secure garbage collector software module 205 capable of using native wipe function 170, as well as being able to access objects in heap 150 via reference table 160. Such software 140 may be used in many different implementation environments, such as object-oriented environments (e.g., Java).
Virtual machine software 200 is capable of interpreting virtual machine instructions found in software modules 210. A specific virtual machine software module (e.g., secure viewer application 220) is shown, and will be used as an example application which uses secure garbage collection techniques.
Secure viewer application 220, when executed by virtual machine software 200, results in viewer object 10V being allocated in heap 150, accessible via its corresponding @V 35V entry in reference table 160. Viewer object 10V could be, for instance, a user interface object which displays sensitive information in a sensitive object, such as object 10S. Viewer object 10V preferably dynamically generates sensitive object 10S from secure object 70E by authentication in viewer application 220.
For instance, if secure object 70E is an S/MIME encrypted message, then sensitive object 10S is a clear unencrypted version of the S/MIME message, dynamically generated by secure viewer application module 220, in this case an S/MIME e-mail viewer application, preferably by obtaining and applying a private key to encrypted S/MIME message object 70E.
Heap 150 may be partitioned so that sensitive objects, such as object 10S are distinguishable from secure objects, such as object 70E, as illustrated by regions 152 and 157 which respectively bound sensitive and secure portions of heap 150. It should be understood that many different partitioning configurations (or none at all) are possible with respect to handling sensitive and secure objects in order to fit the situation at hand.
Also shown is a portion of heap 150 which is unreachable, illustrated by region 155. Region 155 contains objects 10V′, 10S′ and 70E′ which are no longer referenced by other objects, and as such, are suitable for garbage collection. Notice that object 10S′ is both unreachable and sensitive, object 70E′ is both unreachable and secure, whereas object 10V′ is only unreachable.
Returning to the S/MIME viewer application 220 example, objects 10V′, 10S′ and 70E′ are unreachable, for instance if the S/MIME viewer application stopped displaying viewer 10V′ in response to a delete message user interface command. Thus, if viewer 10V′ was the only object having references to sensitive object 10S′ and 70E′, when the reference to 10V′ is lost, all three objects are candidates for garbage collection. Notice however that object 70E, although referenced by viewer 10V′, is still reachable and secure (e.g. encrypted S/MIME—perhaps because it was the previous message viewed by viewer 10V′ and was not deleted by the user).
Secure garbage collector module 205, once it has detected that objects 10V′, 10S′ and 70E′ are unreachable, securely reclaims the memory they were using by calling native wipe function 170 to wipe, at least object 10S′, as well as optionally objects 10V′ and 70E′. Optionally, all garbage collections use the wipe native function 170 thereby treating all objects as sensitive.
With reference to
b is a block diagram illustrating the logical view of
An object 10V that references object 10S and object 70E, are illustrated as they might appear somewhere in RAM 20 or Flash 80.
Also illustrated is a reference table 30, situated somewhere in RAM 20. The reference table 30 has several storage elements (35V, 35S, 35E) of a fixed size “w” 37 to simplify the indexed access to storage elements. Each used storage element (35V, 35S, 35E) corresponds to an object (10V, 10S, 70E) which are located in an addressable space, here consisting of RAM 20 and Flash 80. For example object V 10V finds correspondence with storage element index “v” 35V, object E 70E finds correspondence with storage element index “e” 35E, whereas object S 10S finds correspondence with storage element index “s” 35S. The addresses (40V, 40S, 90E) of corresponding objects (10V, 10S, 70E) are stored in storage elements (35V, 35S, 35E) so that knowing the index of an object in the reference table 30 it is possible to obtain the address (40V, 40S, 90E) of an object (10V, 10S, 70E) respectively. This is done by first obtaining the address @R 50 of the reference table 30. Then, given an object's reference, such as “s” 55S for the example V object 10V, the address of the storage element @(R+v*w) 60V can be obtained by multiplying the index 55V “v” by the size “w” 37 of each storage element.
Since the “v” storage element 35V holds the address of the corresponding object V 10V, resolving the contents of the storage element 35V provides the address @V 40V of object V 10V in RAM 20. Similarly, the “s” storage element 35S, when resolved provides the address @S 40S of object 10S in RAM 20, and the “e” storage element 35E points to an address @E 90E of object 70E in Flash 80. Also shown is how each object (10V, 10S, 70E) contains within its format its “this reference” (55V, 55S, 55E) related to the reference table 30. Also shown is how, object V 10V contains within its format a reference “E” 65E to object E 70E, and a reference “S” 65S to object S 10S. This allows a runtime context within the scope of object V 10V to be able to access objects E 70E and 10S in the same way, regardless of the fact that object E 70E is situated at an address 90E in Flash 80 and objects V 70A is in RAM 20.
Object 10V could be a Secure Multipurpose Internet Mail Extensions (S/MIME) viewer, in which case object 70E could be a persisted (S/MIME) encrypted message, and object 10S could be the sensitive decrypted version of encrypted message 70E. Viewer object 10V could have generated sensitive object 10S from encrypted object 70E at the request of and after authenticating the user of viewer 10V—that is, the intended recipient of the S/MIME message.
With reference to
Step 420 includes performing subsequent steps for all secure applications. Secure applications may be selected by configuration, or may include all applications.
Step 430 includes requesting that a secure application unreference sensitive objects. Thus, this step helps ensure that the window of opportunity of an attacker is greatly limited in secure applications regardless of the trigger.
Step 440 includes securely garbage collecting. This step at least includes calling the native wipe function call, but may also include other actions, such as, but not limited to, cleaning out the system clipboard (if so equipped and configured). An exemplary method to carry out this step is discussed below with reference to
Step 450 includes determining if all secure applications have been processed. If all secure applications are clean (e.g., applications have no references to sensitive objects), then steps 430 and 440 are repeated for the remaining secure applications. Alternatively, if all secure applications are clean, then step 410 ensues and the method begins anew.
It is noted that the method of
With reference to
The method 500 of
Step 520 includes performing subsequent steps for all unreferenced objects in the heap. Step 530 includes determining if the unreferenced object is sensitive. As was described in reference to
Step 540 includes calling the native wipe function to obliterate the sensitive information in the unreferenced sensitive object. As was described in reference to
Step 550 includes reclaiming object memory. This step could be accomplished by a traditional garbage collector. By replacing all calls to the traditional garbage collector with calls to a secure garbage collector, secure garbage collection can be enabled in many existing methods and systems.
Step 560 includes determining if all unreferenced objects have been reclaimed. If this is determined, then the method ends. If not, then step 530 ensues to continue secure garbage collection.
When objects (610, 612, 614) in the addressable storage memory 608 are detected as unreachable, a secure garbage collector module 616 securely reclaims the memory 608 the objects (610, 612, 614) were using by calling a wipe function 618. Optionally, all garbage collections use the wipe function 618 thereby treating all objects (610, 612, 614) as sensitive. However, it should be understood that the garbage collection module 616 may vary the type of objects the wipe function 618 may be used for. For example, the garbage collection module 616 may be configured to only use the wipe function 618 upon unreachable sensitive objects 610, or only upon unreachable secure objects 612, or combinations thereof. Moreover, the garbage collection module 616 may be configured to use the wipe function 618 upon unreachable objects of one or more software programs. Such approaches initiate secure garbage collection in order to prevent unauthorized access to sensitive information. Thus, secure garbage collection is initiated when an object (such as a sensitive object) becomes unreachable rather than only when memory becomes scarce.
Many different types of mobile devices may utilize the systems and methods disclosed herein, such as a wireless device shown in
Where the device 900 is enabled for two-way communications, the device 900 may incorporate a communication subsystem 911, including a receiver 912, a transmitter 914, and associated components such as one or more, preferably embedded or internal, antenna elements 916 and 918, local oscillators (LOs) 913, and a processing module such as a digital signal processor (DSP) 920. As will be apparent to those skilled in the field of communications, the particular design of the communication subsystem 911 will be dependent upon the communication network in which the device is intended to operate. For example, a device 900 destined for a North American market may include a communication subsystem 911 designed to operate within the Mobitex mobile communication system or DataTAC mobile communication system, whereas a device 900 intended for use in Europe may incorporate a General Packet Radio Service (GPRS) communication subsystem 911.
In general, the device 900 may acquire or generate secure and sensitive information through its interaction with cellular networks and the services the networks provide. Examples of cellular networks and services they provide include Code Division Multiple Access (CDMA) and Global Service Mobile (GSM) networks which provide for the most part voice and some data services. Voice services are typically compatible with plain old telephony service (POTS). Short Messaging Service (SMS) and Wireless Application Protocol (WAP) are available on some cellular networks. Data networks, such as MobiTex™, Datatac™, as well as advanced networks such as General Packet Radio Service (GPRS), and Universal Mobile Telecommunications System (UMTS), may allow an appropriately configured wireless mobile device to offer data services such as e-mail, web browsing, SMS, WAP, as well as PIM. Future networks may also offer video services. Thus, sources of sensitive information abound.
Network access requirements will also vary depending upon the type of network 919. For example, in the Mobitex and DataTAC networks, mobile devices such as 900 are registered on the network using a unique personal identification number or PIN associated with each device. In GPRS networks however, network access is associated with a subscriber or user of a device 900. A GPRS device therefore requires a subscriber identity module (not shown), commonly referred to as a SIM card, in order to operate on a GPRS network. Without a SIM card, a GPRS device will not be fully functional. Local or non-network communication functions (if any) may be operable, but the device 900 will be unable to carry out any functions involving communications over network 919. When required network registration or activation procedures have been completed, a device 900 may send and receive communication signals over the network 919. Signals received by the antenna 916 through a communication network 919 are input to the receiver 912, which may perform such common receiver functions as signal amplification, frequency down conversion, filtering, channel selection and the like, and in the example system shown in
The DSP 920 not only processes communication signals, but also provides for receiver and transmitter control. For example, the gains applied to communication signals in the receiver 912 and transmitter 914 may be adaptively controlled through automatic gain control algorithms implemented in the DSP 920.
The device 900 preferably includes a microprocessor 938, which controls the overall operation of the device. Communication functions, including at least data and voice communications, are performed through the communication subsystem 911. The microprocessor 938 also interacts with further device subsystems such as the display 922, flash memory 924, random access memory (RAM) 926, auxiliary input/output (I/O) subsystems 928, serial port 930, keyboard 932, speaker 934, microphone 936, a short-range communications subsystem 940 and any other device subsystems generally designated as 942.
Some of the subsystems shown in
Operating system software used by the microprocessor 938, which could be element 110 of
The microprocessor 938, in addition to its operating system functions, preferably enables execution of software applications on the device. A predetermined set of applications which control basic device operations, including at least data and voice communication applications for example, will normally be installed on the device 900 during manufacture. A preferred application that may be loaded onto the device may be a personal information manager (PIM) application having the ability to organize and manage data items relating to the device user such as, but not limited to e-mail, calendar events, voice mails, appointments, and task items. Naturally, one or more memory stores may be available on the device to facilitate storage of PIM data items on the device. Such PIM application would preferably have the ability to send and receive data items, via the wireless network. In a preferred embodiment, the PIM data items are seamlessly integrated, synchronized and updated, via the wireless network, with the device user's corresponding data items stored or associated with a host computer system. Further applications may also be loaded onto the device 900 through the network 919, an auxiliary I/O subsystem 928, serial port 930, short-range communications subsystem 940 or any other suitable subsystem 942, and installed by a user in the RAM 926 or preferably a non-volatile store (not shown) for execution by the microprocessor 938. Such flexibility in application installation increases the functionality of the device and may provide enhanced on-device functions, communication-related functions, or both. For example, secure communication applications may enable electronic commerce functions and other such financial transactions to be performed using the device 900.
In a data communication mode, a received signal such as a text message or web page download will be processed by the communication subsystem 911 and input to the microprocessor 938, which will preferably further process the received signal for output to the display 922, or alternatively to an auxiliary I/O device 928. A user of device 900 may also compose data items such as e-mail messages for example, using the keyboard 932, which is preferably a complete alphanumeric keyboard or telephone-type keypad, in conjunction with the display 922 and possibly an auxiliary I/O device 928. Such composed items may then be transmitted over a communication network through the communication subsystem 911.
For voice communications, overall operation of the device 900 is substantially similar, except that received signals would preferably be output to a speaker 934 and signals for transmission would be generated by a microphone 936. Alternative voice or audio I/O subsystems such as a voice message recording subsystem may also be implemented on the device 900. Although voice or audio signal output is preferably accomplished primarily through the speaker 934, the display 922 may also be used to provide an indication of the identity of a calling party, the duration of a voice call, or other voice call related information for example.
The serial port 930, would normally be implemented in a personal digital assistant (PDA)-type communication device for which synchronization with a users desktop computer (not shown) may be desirable, but is an optional device component. Such a port 930 would enable a user to set preferences through an external device or software application and would extend the capabilities of the device by providing for information or software downloads to the device 900 other than through a wireless communication network. The alternate download path may for example be used to load an encryption key onto the device through a direct and thus reliable and trusted connection to thereby enable secure device communication.
A short-range communications subsystem 940 is a further optional component which may provide for communication between the device 900 and different systems or devices, which need not necessarily be similar devices. For example, the subsystem 940 may include an infrared device and associated circuits and components or a Bluetooth™ communication module to provide for communication with similarly-enabled systems and devices.
Having described in detail the preferred embodiments of the present invention, including the preferred methods of operation, it is to be understood that this operation could be carried out with different elements and steps. This preferred embodiment is presented only by way of example and is not meant to limit the scope of the present invention. This written description may enable those skilled in the art to make and use embodiments having alternative elements that likewise correspond to the elements of the invention. The intended scope of the invention thus includes other structures, systems or methods that do not differ from the literal language of the description, and further includes other structures, systems or methods with insubstantial differences from the literal language of the description.
This application is a continuation of U.S. patent application Ser. No. 12/702,635 filed on Feb. 9, 2010 entitled “System and Method of Secure Garbage Collection on a Mobile Device” , which is a continuation of U.S. Pat. No. 7,661,140 issued on Feb. 9, 2010 entitled “System and Method of Secure Garbage Collection on a Mobile Device” , which is a filing under 35 U.S.C. 371 of International Application No. PCT/CA2003/00402 filed on Mar. 20, 2003 entitled “System and Method of Secure Garbage Collection on a Mobile Device” , claiming priority to U.S. Provisional Application No. 60/365,515 filed on Mar. 20, 2002, all of which are incorporated by reference herein as if reproduced in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
4775932 | Oxley et al. | Oct 1988 | A |
4853842 | Thatte et al. | Aug 1989 | A |
4989137 | Oxley et al. | Jan 1991 | A |
5088036 | Ellis et al. | Feb 1992 | A |
5392432 | Engelstad et al. | Feb 1995 | A |
5485613 | Engelstad et al. | Jan 1996 | A |
5560003 | Nilsen et al. | Sep 1996 | A |
5819304 | Nilsen et al. | Oct 1998 | A |
5845298 | O'Connor et al. | Dec 1998 | A |
5960087 | Tribble et al. | Sep 1999 | A |
6012065 | Boucher et al. | Jan 2000 | A |
6049810 | Schwartz et al. | Apr 2000 | A |
6065020 | Dussud | May 2000 | A |
6081665 | Nilsen et al. | Jun 2000 | A |
6138005 | Park | Oct 2000 | A |
6209003 | Mattis et al. | Mar 2001 | B1 |
6349314 | Patel | Feb 2002 | B1 |
6453403 | Czajkowski | Sep 2002 | B1 |
6546546 | Van Doorn | Apr 2003 | B1 |
6654773 | Hills | Nov 2003 | B2 |
6662020 | Aaro et al. | Dec 2003 | B1 |
6662023 | Helle | Dec 2003 | B1 |
6701334 | Ye et al. | Mar 2004 | B1 |
6704489 | Kurauchi et al. | Mar 2004 | B1 |
6704756 | Wollrath et al. | Mar 2004 | B2 |
6804765 | Kolodner et al. | Oct 2004 | B2 |
6807169 | Mattathil | Oct 2004 | B2 |
6865657 | Traversat et al. | Mar 2005 | B1 |
6993588 | Davis et al. | Jan 2006 | B2 |
7013454 | Bush et al. | Mar 2006 | B2 |
7104445 | Little et al. | Sep 2006 | B2 |
7231199 | Adams et al. | Jun 2007 | B2 |
7243356 | Saulpaugh et al. | Jul 2007 | B1 |
7263700 | Bacon et al. | Aug 2007 | B1 |
7412518 | Duigou et al. | Aug 2008 | B1 |
7496957 | Howard et al. | Feb 2009 | B2 |
7543160 | Adams et al. | Jun 2009 | B2 |
7617264 | Garthwaite | Nov 2009 | B1 |
7620943 | Garthwaite | Nov 2009 | B1 |
20020055929 | Kolodner et al. | May 2002 | A1 |
20020107879 | Arnold et al. | Aug 2002 | A1 |
20020133533 | Czajkowski et al. | Sep 2002 | A1 |
20020138634 | Davis et al. | Sep 2002 | A1 |
20020147969 | Lethin et al. | Oct 2002 | A1 |
20020194245 | Simpson et al. | Dec 2002 | A1 |
20020194471 | Benantar et al. | Dec 2002 | A1 |
20030126462 | Howard et al. | Jul 2003 | A1 |
20050020315 | Robertson | Jan 2005 | A1 |
20050257043 | Adams et al. | Nov 2005 | A1 |
20060036849 | Brown et al. | Feb 2006 | A1 |
20060053306 | Adams et al. | Mar 2006 | A1 |
Number | Date | Country |
---|---|---|
2479526 | Sep 2003 | CA |
1411709 | Apr 2004 | EP |
1501330 | Jan 2005 | EP |
1633155 | Mar 2006 | EP |
0104744 | Jan 2001 | WO |
0190883 | Nov 2001 | WO |
03079196 | Sep 2003 | WO |
2005106676 | Nov 2005 | WO |
2008074123 | Jun 2008 | WO |
Entry |
---|
Canadian Office Action; Application No. 2,479,526; Jan. 17, 2013; 3 pages. |
Little, Herbert A., et al.; U.S. Appl. No. 11/614,561, filed Dec. 21, 2006; Title: System and Method to Force a Mobile Device into a Secure State. |
Little, Herbert A., et al.; U.S. Appl. No. 13/274,964, filed Oct. 17, 2011; Title: System and Method to Force a Mobile Device into a Secure State. |
Yeates, Stuart A., et al.; “Design of a Garbage Collector Using Design Patterns”; Sep. 25-28, 1997; 16 pages. |
Office Action dated Dec. 30, 2009; U.S. Appl. No. 11/614,561, filed Dec. 21, 2006; 28 pages. |
Final Office Action dated Jun. 8, 2010; U.S. Appl. No. 11/614,561, filed Dec. 21, 2006; 36 pages. |
Office Action dated Nov. 5, 2010; U.S. Appl. No. 11/614,561, filed Dec. 21, 2006; 42 pages. |
Notice of Allowance dated May 10, 2011; U.S. Appl. No. 11/614,561, filed Dec. 21, 2006; 9 pages. |
Notice of Allowance dated Jun. 20, 2011; U.S. Appl. No. 11/614,561, filed Dec. 21, 2006; 11 pages. |
Notice of Allowance dated Apr. 29, 2013; U.S. Appl. No. 13/274,964, filed Oct. 17, 2011; 32 pages. |
PCT International Search Report; Application No. PCT/CA2006/002093; Aug. 21, 2007; 3 pages. |
PCT Written Opinion of the International Searching Authority; Application No. PCT/CA2006/002093; Aug. 21, 2007; 5 pages. |
Canadian Office Action; Application No. 2,671,824; May 16, 2012; 2 pages. |
Canadian Notice of Allowance; Application No. 2,671,824; Jan. 28, 2013; 1 page. |
European Extended Search Report; Application No. 06840520; May 21, 2010; 8 pages. |
European Examination Report; Application No. 06840520; Nov. 15, 2011; 5 pages. |
Little, Herbert A., et al.; U.S. Appl. No. 10/508,187, filed Sep. 17, 2004; Title: System and Method of Secure Garbage Collection on a Mobile Device. |
Little, Herbert A., et al.; U.S. Appl. No. 12/702,635, filed Feb. 9, 2010; Title: System and Method of Secure Garbage Collection on a Mobile Device. |
Yeates, Stuart A., et al.,; “Design Patterns in Garbage Collection”; Technology of Object-Oreinted Languages and Systems; Nov. 24, 1997; 19 pages. |
Mathiske, Bernd, et al.; “Automatic Persistent Memory Management for the SpotlessTM Virtual Machine on the Palm Connected Organizer”; Jun. 2000; 24 pages. |
Research in Motion Limited; “BlackberryTM Security for Lotus DominoTM”; Version 2.0 with Service Pack 2; 2001; 14 pages. |
Sun Microsystems; “J2ME Building Blocks for Mobile Devices”; May 19, 2000; 44 pages. |
Friesen, Jeff, et al.; “Trash Talk, Part 1—Java Recycles It's Memory Through Garbage Collection”; Dec. 7, 2001; 10 pages. |
Office Action dated Aug. 19, 2008; U.S. Appl. No. 10/508,187, filed Sep. 17, 2004; 18 pages. |
Office Action dated May 18, 2009; U.S. Appl. No. 10/508,187, filed Sep. 17, 2004; 16 pages. |
Notice of Allowance dated Sep. 21, 2009; U.S. Appl. No. 10/508,187, filed Sep. 17, 2004; 10 pages. |
Office Action dated Jun. 24, 2011; U.S. Appl. No. 12/702,635, filed Feb. 9, 2010; 14 pages. |
Final Office Action dated Nov. 1, 2011; U.S. Appl. No. 12/702,635, filed Feb. 9, 2010; 9 pages. |
Advisory Action dated Jan. 9, 2012; U.S. Appl. No. 12/702,635, filed Feb. 9, 2010; 3 pages. |
Notice of Allowance dated May 25, 2012; U.S. Appl. No. 12/702,635, filed Feb. 9, 2010; 16 pages. |
PCT International Search Report; Application No. PCT/CA2003/00402; Jan. 26, 2004; 5 pages. |
PCT International Preliminary Examination Report; Application No. PCT/CA2003/00402; Aug. 20, 2004; 14 pages. |
Canadian Office Action; Application No. 2,479,526; Nov. 16, 2009; 3 pages. |
Canadian Office Action; Application No. 2,479,526; Mar. 17, 2008; 3 pages. |
Canadian Office Action; Application No. 2,479,526; Mar. 7, 2011; 3 pages. |
Chinese Office Action; Application No. 03811230.2; Mar. 10, 2006; 10 pages. |
European Examination Report; Application No. 03711735.5; Sep. 14, 2005; 7 pages. |
European Examination Report; Application No. 03711735.5; Aug. 22, 2006; 3 pages. |
Indian Office Action; Application No. 2791/DELNP/2004; Feb. 7, 2006; 2 pages. |
Indian Office Action; Application No. 2791/DELNP/2004; Nov. 15, 2006; 1 page. |
Japanese Office Action; Application No. 2009-161991; Sep. 15, 2011; 7 pages. |
Canadian Office Action; Application No. 2,479,526; Feb. 25, 2014; 2 pages. |
European Examination Report; Application No. 03711735.5; Aug. 19, 2014; 9 pages. |
Number | Date | Country | |
---|---|---|---|
20120290809 A1 | Nov 2012 | US |
Number | Date | Country | |
---|---|---|---|
60365515 | Mar 2002 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12702635 | Feb 2010 | US |
Child | 13556959 | US | |
Parent | 10508187 | US | |
Child | 12702635 | US |