The present invention relates generally to the field of identity theft and more specifically, but not by way of limitation, to data mining of personally-identifying information found on the Internet.
Identity theft is a mounting concern in commercial transactions. This is particularly true in remote commercial transactions such as, for example, Internet-shopping transactions, that involve little or no direct personal contact between a consumer and a goods or services provider (GSP). It is commonplace for personally-identifying information (PII) to be compromised and utilized for identity theft such as, for example, in a remote commercial transaction. PII, as used herein, refers to information that can be used to uniquely identify, contact, or locate an individual person or can be used with other sources to uniquely identify, contact, or locate an individual person. PII may include, but is not limited to, social security numbers (SSN), bank or credit card account numbers, passwords, birth dates, and addresses. PII that has been obtained by or made available to a third party without proper authorization is referred to herein as compromised PII.
PII can be compromised in a myriad of ways. For example, record keeping for entities such as, for example, healthcare, governmental, financial, and educational institutions, is increasingly and sometimes exclusively electronic. Electronic record keeping introduces new risks for which the entities are frequently ill-equipped to handle. For example, PII is often compromised via stolen hardware, inadequate security procedures, security breaches, or employee carelessness or misconduct.
Another way that PII is frequently compromised is via “phishing.” Phishing is the process of attempting to acquire PII by masquerading as a trustworthy entity in an electronic communication. A common example of phishing is a fraudulent email that is made to appear as though it originates from a valid source such as, for example, a national bank. The fraudulent email may incorporate a uniform resource locator (URL) that re-directs its audience to a false website that appears to be a legitimate website for the valid source. In actuality, the false website may be a front for stealing PII as part of a spurious transaction. For example, the false website may request “confirmation” of PII such as, for example, a credit card number or a username and password. The PII may then be stored for later improper use such as, for example, identity theft in a remote commercial transaction.
At least 182,395 instances of phishing were recorded during 2009, as reported by antiphishing.org. This is a forty-two percent increase over a number recorded in 2008. More than 10,745 malicious domains were registered in 2009, which is an increase of fifty-two percent over 2008. Sometimes, a misleading link such as, for example, the URL for the false website described above, may actually originate from a legitimate website but cause traffic to be redirected to an illegitimate website. This type of scam is known as “pharming.”
Legislation to curb efforts to compromise PII are largely ineffective. For example, phishing and pharming activities originate from areas around the globe and are thus often protected from prosecution by a particular jurisdiction. Additionally, once PII is compromised, distribution of the compromised PII may be difficult or impossible to prevent. Web sites and forums dedicated to exchanging compromised PII are increasing rapidly in number. Some of these web sites and forums exchange compromised PII though email or secure direct uploads and downloads.
Identity theft resulting from compromised PII is costly to victims and companies alike. The Identity Fraud Survey Report created by Javelin Strategy & Research reported that in 2009 victims averaged a personal cost of $373 and 21 hours of time to resolve identity-theft issues. The annual cost of identity theft currently exceeds $200 billion worldwide. In addition, as a result of new legislation and litigation resulting from compromised PII, companies stand to suffer from lower profit margins, damaged credibility due to negative customer experiences, and eroded brand value. Identity theft also looms as a threat to the advancement of promising consumer-driven, self-service, and cost-savings technologies.
In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
In one embodiment, a computer-program product includes a computer-usable medium having computer-readable program code embodied therein. The computer-readable program code is adapted to be executed to implement a method. The method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
A more complete understanding of the method and apparatus of the present invention may be obtained by reference to the following Detailed Description when taken in conjunction with the accompanying Drawings wherein:
Although various embodiments of the method and apparatus of the present invention have been illustrated in the accompanying Drawings and described in the foregoing Detailed Description, it will be understood that the invention is not limited to the embodiments disclosed, but is capable of numerous rearrangements, modifications and substitutions without departing from the spirit of the invention as set forth herein.
As used herein, identity theft generally involves a use of PII that is not authorized by an owner of the PII. Identity theft may include, for example, an unauthorized change to PII or an unauthorized use of PII to access resources or to obtain credit or other benefits. Identity-theft information, as used herein, includes any information that may be used to facilitate discovery or prevention of identity theft. Identity-theft information may include, for example, compromised PII and information related to where or how compromised PII may be found. Identity-theft nomenclature, as used herein, refers to words, phrases, nicknames, numbers, and the like that are determined to be suggestive of identity-theft information or identity theft. In various embodiments, identity-theft may include nomenclature for multiple languages (e.g., English and non-English words).
In various embodiments, the flow 1000 may be initiated via the PWS 100. The PWS 100 may utilize, for example, search engines, web spiders, and keyword-matching features. In a typical embodiment, the search engines and the web spiders may be utilized to collect identity-theft information such as, for example, potential sources of compromised PII. The potential sources of compromised PII may include, for example, websites and forums that facilitate exchange of compromised PII (e.g., by identity thieves). Further, keyword-matching features may be leveraged to analyze the potential sources of identity-theft information using, for example, identity-theft nomenclature. Additionally, the PWS 100 is generally operable to identify and collect other identity-theft information such as, for example, compromised PII, uniform resource locators (URLs), and references to IRC chat rooms (i.e., channels). An illustrative embodiment of the PWS 100 will be described with respect to
In various embodiments, the flow 1000 may be initiated via the IRC bot 101. Oftentimes, compromised PII is exchanged via chat rooms (e.g., between identity thieves on IRC channels). In a typical embodiment, the IRC bot 101 is operable to crawl the Internet in search of chat rooms (e.g., IRC channels) that are frequented by identity thieves. In a typical embodiment, the IRC bot 101 is operable to monitor such chat rooms for identity-theft nomenclature. Furthermore, the IRC bot 101 is typically operable to identify and collect compromised PII. URLs, references to other IRC chat rooms, and other identity-theft information from such chat moms. Illustrative embodiments of the IRC bot 101 will be described with respect to
Oftentimes, if a particular user in a chat room is inactive for a certain period of time, the particular user may be timed out either automatically or by an administrator. In a typical embodiment, the IRC bot 101 may invoke auto-banning features that are operable to maintain an active status and thereby prevent time-out. The auto-banning features may involve simulating a human chat. For example, the auto-banning features may initiate a chat via a generic greeting, reproduce a single word from a monitored conversation, and the like. In a typical embodiment, the simulation of human chat may additionally cause an identity thief to reveal additional identity-theft information such as, for example, compromised PII or a URL to a potential source for compromised PII.
In various embodiments, the IRC bot 101 and the PWS 100 may operate collaboratively in the flow 1000. For example, the IRC bot 101 may provide identity-theft nomenclature such as email addresses, nicknames, and other information that may be used by an identity thief. The IRC bot 101 may further provide, for example, URLs to potential sources of compromised PII. In a typical embodiment, the PWS 100 may crawl the URLs provided by the IRC bot 101 and scan for identity-theft information. The PWS 100 may also search and crawl the Internet using the identity-theft nomenclature provided by the IRC bot 101. In a similar manner, the PWS 100 may discover and send identity-theft information such as, for example, chat rooms, to the IRC bot 101. In a typical embodiment, the IRC bot 101 may monitor the chat rooms provided by the PWS 100.
After identity-theft information is collected by the IRC bot 101 and the PWS 100, the collected identity-theft information may be processed at step 103. In a typical embodiment, the processing of the collected identity-theft information may include an extraction process, a validation process, and a normalization process. In various embodiments, the PWS 100 and the IRC bot 101 may yield extensive amounts of identity-theft information that includes, for example, webpage segments, IRC logs, text files, and the like. In a typical embodiment, the extraction process and the validation process operate to intelligently reduce an amount of the collected identity-theft information that is stored and utilized in subsequent steps of the flow 1000. In a typical embodiment, the normalization process ensures that the identity-theft information is stored efficiently and effectively.
In a typical embodiment, as part of the extraction process, the collected identity-theft information may be processed for compromised PII by one or more parsers that recognize common formats for PII. For example, a parser may identify token-separated data (e.g., tab-delimited data). Similarly, a parser may determine a column type for columns lacking a column header, for example, by analyzing data that is present in particular columns (e.g., recognizing a list of text strings as email addresses). Furthermore, a parser may identify multi-line labeled data such as, for example, “first name: John,” and various other labels that may be associated with compromised PII (e.g., recognizing “ccn.” “cc” or “credit card” as possible labels for credit-card information). Additionally, by way of further example, a parser may identify identity-theft information taken from encodings that may be present on cards such as, for example, credit cards, driver's licenses, and the like. The encodings may include, for example, track 1 and track 2 magnetic-stripe data.
Additionally, as part of the extraction process, rules may be enforced that require groups of fields to be present in particular compromised PII before allowing the particular compromised PII to be recorded. In a typical embodiment, the requirement that groups of fields be present has the benefit of reducing “false positives” within compromised PII. False positives may be considered elements of compromised PII that are not deemed to be sufficiently private or sufficiently important to merit recordation. In a typical embodiment, false positives may be removed from the collected identity-theft information. For example, an email address that is not accompanied by a password may be considered a false positive and not recorded. In a typical embodiment, a rule may be established that requires, for example, a username or email address to be accompanied by a password in order to be recorded.
In a typical embodiment, the validation process involves analyzing a source of the collected identity-theft information such as, for example, compromised PII, and determining if any elements of the compromised PII are false positives. For example, in a typical embodiment, genealogy websites, phone/address lookup websites, and website log files are common sources of false positives. Compromised PII that is mined from such websites, in a typical embodiment, may be considered false positives and removed from the collected identity-theft information. Conversely, compromised PII mined, for example, from known hacker websites and websites replete with identity-theft nomenclature, in a typical embodiment, may be protected from identification as false positives.
In a typical embodiment, the normalization process ensures that the collected identity-theft information such as, for example, compromised PII, is stored according to a standardized format. For example, standardized data structures and attributes may be established for names, credit-card numbers, and the like. In a typical embodiment, the normalization process facilitates matching, for example, elements of compromised PII to particular individuals to whom the elements correspond. In that way, reports and alerts based on the compromised PII may be more efficiently and more accurately generated. In a typical embodiment, after the extraction process, the validation process, and the normalization process, the collected identity-theft information is recorded in a database at step 104.
At step 105, in a typical embodiment, alerts and reports may be delivered based on, for example, compromised PII that is stored in the database at step 104. In some embodiments, the recordation of any elements of compromised PII at step 104 merits delivery of an alert to an individual to whom the elements correspond. In other embodiments, an individual may only be delivered an alert if, for example, certain elements or combinations of elements are discovered and recorded (e.g., credit-card information or social-security-number). In a typical embodiment, a particular individual may be able to pre-specify an alert-delivery method (e.g., email, telephone, etc.). After step 105, the flow 1000 ends.
In a typical embodiment, the PWS 200 receives identity-theft nomenclature and identity-theft websites as input from the database 203. The PWS 200 typically queries search engines 201 via keywords from the identity-theft nomenclature. Additionally, the PWS 200 typically crawls websites 202 and scans the websites 202 for the identity-theft nomenclature. In a typical embodiment, the websites 202 include the identity-theft websites received as input from the database 203 and websites identified via queries to the search engines 201. At step 206, compromised PII collected by the PWS 200 may be processed at a processing step 206 in a manner similar to that described with respect to step 103 of
As new websites and identity-theft nomenclature are added to the database 203 via, for example, the discovery process 204, the database 203 may be optimized via a performance-analysis process 205. In the performance-analysis 205, the identity-theft nomenclature is typically ranked according to a relative significance of compromised PII that is gleaned thereby. In a typical embodiment, the database 203 maintains, for each element of the identity-theft nomenclature, historical information related to compromised PII obtained via that element. In a typical embodiment, each element of the identity-theft nomenclature may be ranked, for example, according to an amount and/or a quality of the compromised PII obtained via that element.
The quality of the compromised PII may be determined, for example, by assigning weights based on a degree of sensitivity of particular elements of compromised PII. For example, in various embodiments, credit-card information and social security numbers may be assigned higher weights than, for example, website account information. In various embodiments, the amount of compromised PII may be, for example, an overall amount of compromised PII historically obtained via particular identity-theft nomenclature. Further, in various embodiments, the amount of compromised PII may be, for example, an amount of PII obtained via particular identity-theft nomenclature in a defined period of time. For example, in some embodiments, it may be advantageous to consider an amount of compromised PII obtained via particular identity-theft nomenclature within the last thirty days.
In a typical embodiment, a score may be computed for each element of identity-theft nomenclature based on, for example, an amount and/or a quality of the compromised PII that is gleaned thereby. In a typical embodiment, a scoring formula for generating the score is configurable. For example, weighting factors may be assigned to the amount and/or the quality of the compromised PII. In that way, greater or less weight may be assigned to the amount and/or the quality of the compromised PII, as may be desired for particular applications. Once scores are generated for each element of the identity-theft nomenclature, the identity-theft nomenclature may be ranked based on the scores.
In a typical embodiment, the PWS 200 may query the search engines 201 via keywords from the ranked identity-theft nomenclature in order to yield, for example, URLs to additional websites. The additional websites may be stored in the database 203. In a typical embodiment, the PWS 200 may crawl and scan the additional websites in a manner similar to that described above with regard to the websites 202. Further, compromised PII collected by the PWS 200 may be processed at a processing step 206 in a manner similar to that described with respect to step 103 of
In a typical embodiment, an IRC bot 302 receives URLs for IRC networks 303 as input from the database 301. The IRC bot 302 is generally similar to the IRC bot 101 of
Any compromised PII that is found by the IRC bot 302 is typically logged into an IRC log database 305. After being logged, in a typical embodiment, the compromised PII is processed at a processing step 306 in a manner similar to that described with respect to step 103 of
After the chat rooms are scanned by the IRC bot 400 as described with respect to
In a typical embodiment, the IRC log stored in the IRC log database 401 and the extracted compromised PII stored in the IRC dialog database 403 may be provided as inputs to the nomenclature-and-website discover process 404. In a typical embodiment, the nomenclature-and-website discover process 404 discovers new websites and identity-theft nomenclature that may be utilized, for example, by the IRC bot 400, to acquire additional identity-theft information. An illustrative embodiment of the nomenclature-and-website discovery process 404 will be described in more detail with respect to
In a typical embodiment, the IRC log stored in the IRC log database 401 may be provided as input to the chat-room-discovery process 405. Although not illustrated, in various embodiments, the extracted compromised PII stored in the IRC dialog database 403 may also be provided as input to the chat-room-discovery process 405. In a typical embodiment, the chat-room-discovery process 405 analyzes the IRC log in order to identify, for example, references to new chat rooms on IRC networks that may be sources of compromised PII. An illustrative embodiment of the chat-room-discovery process 405 will be described with respect to
After the discovery step 401A, an analysis step 402A may occur. In a typical embodiment, the analysis step 402A includes ranking a relative significance of identity-theft websites and forums that are stored, for example, in a database 403A. The identity-theft websites and forums include, for example, the new websites and forums identified at the discovery step 401A. The identity-theft websites and forums may be ranked in a manner similar to that described with respect to the ranking of identity-theft nomenclature in the performance-analysis process 205 of
In a typical embodiment, the IRC logs, the identity-theft nomenclature from the nomenclature database 403B and the chat rooms from the chat-room database 404B may serve as inputs to an analysis step 401B. At the analysis step 401B, the flow 4000B is typically operable to analyze the IRC logs to discover new chat rooms. For example, for a given IRC log, the flow 4000B may analyze a frequency of identity-theft nomenclature. In addition, by way of further example, the flow 4000B may determine how often particular chat rooms are referenced in a given IRC log. In various embodiments, if references to a particular chat room exceed a configurable threshold, the particular chat room may be recorded in a database 405B at step 402B. In some embodiments, the predetermined threshold for overall references may vary based on, for example, a frequency of identity-theft nomenclature in the given IRC log. For example, if the given IRC log has a high frequency of identity-theft nomenclature relative to a configurable value, a single reference may be sufficient for recordation in the database 405B.
In various embodiments, the analysis step 401B may further involve monitoring particular chat rooms from the chat-room database 404B. For example, as described with respect to the analysis step 402A of
One of ordinary skill in the art will appreciate that the server computer 502 may, in various embodiments, represent a plurality of server computers. For example, the PWS and the IRC bot may, in various embodiments, be resident and operating on distinct physical or virtual server computers. Likewise, in various embodiments, the PWS and the IRC bot may be resident and operating on one physical or virtual server computer. Furthermore, one of ordinary skill in the art will appreciate that the database 504 may, in various embodiments, represent either a single database or a plurality of databases.
The main memory 604 also may be used for storing temporary variables or other intermediate information during execution of the instructions to be executed by the processor 602. The computer system 600 further includes a read-only memory (ROM) 606 or other static storage device coupled to the bus 618 for storing static information and instructions for the processor 602. A computer-readable storage device 608, such as a magnetic disk or optical disk, is coupled to the bus 618 for storing information and instructions for the processor 602. The computer system 600 may be coupled via the bus 618 to a display 610, such as a liquid crystal display (LCD) or a cathode ray tube (CRT), for displaying information to a user. An input device 612, including, for example, alphanumeric and other keys, is coupled to the bus 618 for communicating information and command selections to the processor 602. Another type of user input device is a cursor control 614, such as a mouse, a trackball, or cursor direction keys for communicating direct information and command selections to the processor 602 and for controlling cursor movement on the display 610. The cursor control 614 typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow the device to specify positions in a plane.
The term “computer readable instructions” as used above refers to any instructions that may be performed by the processor 602 and/or other component of the computer system 600. Similarly, the term “computer readable medium” refers to any storage medium that may be used to store the computer readable instructions. Such a medium may take many forms, including, but not limited to, non volatile media, volatile media, and transmission media. Non-volatile media include, for example, optical or magnetic disks, such as the storage device 608. Volatile media includes dynamic memory, such as the main memory 604. Transmission media includes coaxial cables, copper wire, and fiber optics, including wires of the bus 618. Transmission media can also take the form of acoustic or light waves, such as those generated during radio frequency (RF) and infrared (IR) data communications. Common forms of computer readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD ROM. DVD, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, an EPROM, a FLASH EPROM, any other memory chip or cartridge, a carrier wave, or any other medium from which a computer can read.
Various forms of the computer readable media may be involved in carrying one or more sequences of one or more instructions to the processor 602 for execution. For example, the instructions may initially be borne on a magnetic disk of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem. A modem local to the computer system 600 can receive the data on the telephone line and use an infrared transmitter to convert the data to an infrared signal. An infrared detector coupled to the bus 618 can receive the data carried in the infrared signal and place the data on the bus 618. The bus 618 carries the data to the main memory 604, from which the processor 602 retrieves and executes the instructions. The instructions received by the main memory 604 may optionally be stored on the storage device 608 either before or after execution by the processor 602.
The computer system 600 may also include a communication interface 616 coupled to the bus 618. The communication interface 616 provides a two-way data communication coupling between the computer system 600 and a network. For example, the communication interface 616 may be an integrated services digital network (ISDN) card or a modem used to provide a data communication connection to a corresponding type of telephone line. As another example, the communication interface 616 may be a local area network (LAN) card used to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, the communication interface 616 sends and receives electrical, electromagnetic, optical, or other signals that carry digital data streams representing various types of information. The storage device 608 can further include instructions for carrying out various processes for image processing as described herein when executed by the processor 602. The storage device 608 can further include a database for storing data relative to same.
This patent application is a continuation of U.S. patent application Ser. No. 15/341,096, filed on Nov. 2, 2016, which is a continuation of U.S. patent application Ser. No. 14/929,835, filed on Nov. 2, 2015, which is a continuation of U.S. patent application Ser. No. 13/398,471, filed on Feb. 16, 2012, which claims priority from U.S. Provisional Application No. 61/444,433, filed on Feb. 18, 2011, all of which are hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
2074513 | Mills | Mar 1937 | A |
3316395 | Lavin et al. | Apr 1967 | A |
3752904 | Waterbury | Aug 1973 | A |
4163290 | Sutherlin et al. | Jul 1979 | A |
5274547 | Zoffel et al. | Dec 1993 | A |
5323315 | Highbloom | Jun 1994 | A |
5414833 | Hershey et al. | May 1995 | A |
5454030 | de Oliveira et al. | Sep 1995 | A |
5504675 | Cragun et al. | Apr 1996 | A |
5563783 | Stolfo et al. | Oct 1996 | A |
5627886 | Bowman | May 1997 | A |
5679940 | Templeton et al. | Oct 1997 | A |
5696907 | Tom | Dec 1997 | A |
5696965 | Dedrick | Dec 1997 | A |
5739512 | Tognazzini | Apr 1998 | A |
5742775 | King | Apr 1998 | A |
5745654 | Titan | Apr 1998 | A |
5752242 | Havens | May 1998 | A |
5754632 | Smith | May 1998 | A |
5774868 | Cragun et al. | Jun 1998 | A |
5809478 | Greco et al. | Sep 1998 | A |
5819226 | Gopinathan et al. | Oct 1998 | A |
5819260 | Lu et al. | Oct 1998 | A |
5822741 | Fischthal | Oct 1998 | A |
5832068 | Smith | Nov 1998 | A |
5842178 | Giovannoli | Nov 1998 | A |
5870721 | Norris | Feb 1999 | A |
5872921 | Zahariev et al. | Feb 1999 | A |
5878403 | DeFrancesco | Mar 1999 | A |
5879297 | Haynor et al. | Mar 1999 | A |
5884289 | Anderson et al. | Mar 1999 | A |
5912839 | Ovshinslw et al. | Jun 1999 | A |
5913196 | Talmor et al. | Jun 1999 | A |
5943666 | Kleewein et al. | Aug 1999 | A |
5950179 | Buchanan et al. | Sep 1999 | A |
5987440 | O'Neil et al. | Nov 1999 | A |
5999907 | Donner | Dec 1999 | A |
5999940 | Ranger | Dec 1999 | A |
6023694 | Kouchi et al. | Feb 2000 | A |
6029139 | Cunningham et al. | Feb 2000 | A |
6029149 | Dykstra et al. | Feb 2000 | A |
6029154 | Pettitt | Feb 2000 | A |
6029194 | Tilt | Feb 2000 | A |
6044357 | Garg | Mar 2000 | A |
6055570 | Nielsen | Apr 2000 | A |
6094643 | Anderson et al. | Jul 2000 | A |
6119103 | Basch et al. | Sep 2000 | A |
6125985 | Amdahl et al. | Oct 2000 | A |
6142283 | Amdahl et al. | Nov 2000 | A |
6144988 | Kappel | Nov 2000 | A |
6157707 | Baulier et al. | Dec 2000 | A |
6182219 | Feldbau et al. | Jan 2001 | B1 |
6249228 | Shirk et al. | Jun 2001 | B1 |
6253203 | O'Flaherty et al. | Jun 2001 | B1 |
6254000 | Degen et al. | Jul 2001 | B1 |
6263447 | French et al. | Jul 2001 | B1 |
6269349 | Aieta et al. | Jul 2001 | B1 |
6282658 | French et al. | Aug 2001 | B2 |
6285983 | Jenkins | Sep 2001 | B1 |
6285987 | Roth et al. | Sep 2001 | B1 |
6292795 | Peters et al. | Sep 2001 | B1 |
6311169 | Duhon | Oct 2001 | B2 |
6317783 | Freishtat et al. | Nov 2001 | B1 |
6321339 | French et al. | Nov 2001 | B1 |
6330546 | Gopinathan et al. | Dec 2001 | B1 |
6397197 | Gindlesperger | May 2002 | B1 |
6418436 | Degen et al. | Jul 2002 | B1 |
6424956 | Werbos | Jul 2002 | B1 |
6448889 | Hudson | Sep 2002 | B1 |
6456984 | Demoff et al. | Sep 2002 | B1 |
6496936 | French et al. | Dec 2002 | B1 |
6505193 | Musgrave et al. | Jan 2003 | B1 |
6510415 | Talmor et al. | Jan 2003 | B1 |
6513018 | Culhane | Jan 2003 | B1 |
6532459 | Berson | Mar 2003 | B1 |
6542894 | Lee et al. | Apr 2003 | B1 |
6543683 | Hoffman | Apr 2003 | B2 |
6553495 | Johansson et al. | Apr 2003 | B1 |
6571334 | Feldbau et al. | May 2003 | B1 |
6597775 | Lawyer et al. | Jul 2003 | B2 |
6612488 | Suzuki | Sep 2003 | B2 |
6615193 | Kingdon et al. | Sep 2003 | B1 |
6658393 | Basch et al. | Dec 2003 | B1 |
6700220 | Bayeur et al. | Mar 2004 | B2 |
6714918 | Hillmer et al. | Mar 2004 | B2 |
6735572 | Landesmann | May 2004 | B2 |
6740875 | Ishikawa et al. | May 2004 | B1 |
6748426 | Shaffer et al. | Jun 2004 | B1 |
6751626 | Brown et al. | Jun 2004 | B2 |
6796497 | Benkert et al. | Sep 2004 | B2 |
6811082 | Wong | Nov 2004 | B2 |
6829711 | Kwok et al. | Dec 2004 | B1 |
6850606 | Lawyer et al. | Feb 2005 | B2 |
6857073 | French et al. | Feb 2005 | B2 |
6866586 | Oberberger et al. | Mar 2005 | B2 |
6871287 | Ellingson | Mar 2005 | B1 |
6873979 | Fishman et al. | Mar 2005 | B2 |
6898574 | Regan | May 2005 | B1 |
6907408 | Angel | Jun 2005 | B2 |
6908030 | Rajasekaran et al. | Jun 2005 | B2 |
6913194 | Suzuki | Jul 2005 | B2 |
6918038 | Smith et al. | Jul 2005 | B1 |
6920435 | Hoffman et al. | Jul 2005 | B2 |
6928546 | Nanavati et al. | Aug 2005 | B1 |
6930707 | Bates et al. | Aug 2005 | B2 |
6934849 | Kramer et al. | Aug 2005 | B2 |
6934858 | Woodhill | Aug 2005 | B2 |
6965881 | Brickell et al. | Nov 2005 | B1 |
6965997 | Dutta | Nov 2005 | B2 |
6973462 | Dattero et al. | Dec 2005 | B2 |
6973575 | Arnold | Dec 2005 | B2 |
6983381 | Jerdonek | Jan 2006 | B2 |
6983882 | Cassone | Jan 2006 | B2 |
6991174 | Zuili | Jan 2006 | B2 |
6993659 | Milgramm et al. | Jan 2006 | B2 |
7007174 | Wheeler et al. | Feb 2006 | B2 |
7028052 | Chapman et al. | Apr 2006 | B2 |
7035855 | Kilger et al. | Apr 2006 | B1 |
7069240 | Spero et al. | Jun 2006 | B2 |
7083090 | Zuili | Aug 2006 | B2 |
7089592 | Adjaoute et al. | Aug 2006 | B2 |
7092891 | Maus et al. | Aug 2006 | B2 |
7104444 | Suzuki | Sep 2006 | B2 |
7158622 | Lawyer et al. | Jan 2007 | B2 |
7162640 | Heath et al. | Jan 2007 | B2 |
7174335 | Kameda | Feb 2007 | B2 |
7188078 | Arnett et al. | Mar 2007 | B2 |
7203653 | McIntosh | Apr 2007 | B1 |
7212995 | Schulkins | May 2007 | B2 |
7222779 | Pineda-Sanchez et al. | May 2007 | B1 |
7225977 | Davis | Jun 2007 | B2 |
7234156 | French et al. | Jun 2007 | B2 |
7240059 | Bayliss et al. | Jul 2007 | B2 |
7240363 | Ellingson | Jul 2007 | B1 |
7246067 | Austin et al. | Jul 2007 | B2 |
7246740 | Swift et al. | Jul 2007 | B2 |
7254560 | Singhal | Aug 2007 | B2 |
7263506 | Lee et al. | Aug 2007 | B2 |
7272857 | Everhart | Sep 2007 | B1 |
7277869 | Starkman | Oct 2007 | B2 |
7277875 | Serrano-Morales et al. | Oct 2007 | B2 |
7283974 | Katz et al. | Oct 2007 | B2 |
7289607 | Bhargava et al. | Oct 2007 | B2 |
7290704 | Ball et al. | Nov 2007 | B1 |
7298873 | Miller, Jr. et al. | Nov 2007 | B2 |
7310743 | Gagne et al. | Dec 2007 | B1 |
7314162 | Carr et al. | Jan 2008 | B2 |
7314167 | Kiliccote | Jan 2008 | B1 |
7330871 | Barber | Feb 2008 | B2 |
7333635 | Tsantes et al. | Feb 2008 | B2 |
7340042 | Cluff et al. | Mar 2008 | B2 |
7343149 | Benco | Mar 2008 | B2 |
7356516 | Richey et al. | Apr 2008 | B2 |
7370044 | Mulhern et al. | May 2008 | B2 |
7370351 | Ramachandran et al. | May 2008 | B1 |
7376618 | Anderson et al. | May 2008 | B1 |
7383227 | Weinflash et al. | Jun 2008 | B2 |
7386448 | Poss et al. | Jun 2008 | B1 |
7386506 | Aoki et al. | Jun 2008 | B2 |
7392534 | Lu et al. | Jun 2008 | B2 |
7395273 | Khan et al. | Jul 2008 | B2 |
7398915 | Pineda-Sanchez et al. | Jul 2008 | B1 |
7418431 | Nies et al. | Aug 2008 | B1 |
7428509 | Klebanoff | Sep 2008 | B2 |
7433855 | Gavan et al. | Oct 2008 | B2 |
7433864 | Malik | Oct 2008 | B2 |
7438226 | Helsper et al. | Oct 2008 | B2 |
7444518 | Dharmarajan et al. | Oct 2008 | B1 |
7457401 | Lawyer et al. | Nov 2008 | B2 |
7458508 | Shao et al. | Dec 2008 | B1 |
7466235 | Kolb et al. | Dec 2008 | B1 |
7467401 | Cicchitto | Dec 2008 | B2 |
7480631 | Merced et al. | Jan 2009 | B1 |
7481363 | Zuili | Jan 2009 | B2 |
7490052 | Kilger et al. | Feb 2009 | B2 |
7490356 | Lieblich et al. | Feb 2009 | B2 |
7497374 | Helsper et al. | Mar 2009 | B2 |
7509117 | Yum | Mar 2009 | B2 |
7512221 | Toms | Mar 2009 | B2 |
7519558 | Ballard et al. | Apr 2009 | B2 |
7522060 | Tumperi et al. | Apr 2009 | B1 |
7533808 | Song et al. | May 2009 | B2 |
7536346 | Aliffi et al. | May 2009 | B2 |
7540021 | Page | May 2009 | B2 |
7542993 | Satterfield et al. | Jun 2009 | B2 |
7543739 | Brown et al. | Jun 2009 | B2 |
7543740 | Greene et al. | Jun 2009 | B2 |
7546271 | Chmielewski et al. | Jun 2009 | B1 |
7548886 | Kirkland et al. | Jun 2009 | B2 |
7552467 | Lindsay | Jun 2009 | B2 |
7562184 | Henmi et al. | Jul 2009 | B2 |
7562814 | Shao et al. | Jul 2009 | B1 |
7568616 | Zuili | Aug 2009 | B2 |
7575157 | Barnhardt et al. | Aug 2009 | B2 |
7580884 | Cook | Aug 2009 | B2 |
7581112 | Brown et al. | Aug 2009 | B2 |
7584146 | Duhon | Sep 2009 | B1 |
7587368 | Felsher | Sep 2009 | B2 |
7591425 | Zuili et al. | Sep 2009 | B1 |
7593891 | Kornegay et al. | Sep 2009 | B2 |
7606401 | Hoffman et al. | Oct 2009 | B2 |
7606790 | Levy | Oct 2009 | B2 |
7610216 | May et al. | Oct 2009 | B1 |
7610229 | Kornegay | Oct 2009 | B1 |
7610243 | Haggerty et al. | Oct 2009 | B2 |
7620596 | Knudson et al. | Nov 2009 | B2 |
7623844 | Herrmann et al. | Nov 2009 | B2 |
7630924 | Collins et al. | Dec 2009 | B1 |
7630932 | Danaher et al. | Dec 2009 | B2 |
7636853 | Cluts et al. | Dec 2009 | B2 |
7644868 | Hare | Jan 2010 | B2 |
7647344 | Skurtovich, Jr. et al. | Jan 2010 | B2 |
7647645 | Edeki et al. | Jan 2010 | B2 |
7653593 | Zarikian et al. | Jan 2010 | B2 |
7657431 | Hayakawa | Feb 2010 | B2 |
7668769 | Baker et al. | Feb 2010 | B2 |
7668840 | Bayliss et al. | Feb 2010 | B2 |
7668921 | Proux et al. | Feb 2010 | B2 |
7672865 | Kumar et al. | Mar 2010 | B2 |
7673793 | Greene et al. | Mar 2010 | B2 |
7676418 | Chung et al. | Mar 2010 | B1 |
7676433 | Ross et al. | Mar 2010 | B1 |
7685096 | Margolus et al. | Mar 2010 | B2 |
7686214 | Shao et al. | Mar 2010 | B1 |
7689007 | Bous et al. | Mar 2010 | B2 |
7689505 | Kasower | Mar 2010 | B2 |
7690032 | Peirce | Mar 2010 | B1 |
7701364 | Zilberman | Apr 2010 | B1 |
7702550 | Perg et al. | Apr 2010 | B2 |
7707163 | Anzalone et al. | Apr 2010 | B2 |
7708190 | Brandt et al. | May 2010 | B2 |
7708200 | Helsper et al. | May 2010 | B2 |
7711635 | Steele et al. | May 2010 | B2 |
7711636 | Robida et al. | May 2010 | B2 |
7720750 | Brody | May 2010 | B2 |
7725300 | Pinto et al. | May 2010 | B2 |
7734523 | Cui et al. | Jun 2010 | B1 |
7735125 | Alvarez et al. | Jun 2010 | B1 |
7742982 | Chaudhuri et al. | Jun 2010 | B2 |
7747520 | Livermore et al. | Jun 2010 | B2 |
7747521 | Serio | Jun 2010 | B2 |
7747559 | Leitner et al. | Jun 2010 | B2 |
7752084 | Pettitt | Jul 2010 | B2 |
7752236 | Williams et al. | Jul 2010 | B2 |
7752554 | Biggs et al. | Jul 2010 | B2 |
7756783 | Crooks | Jul 2010 | B2 |
7761379 | Zoldi et al. | Jul 2010 | B2 |
7761384 | Madhogarhia | Jul 2010 | B2 |
7774270 | MacCloskey | Aug 2010 | B1 |
7778885 | Semprevivo et al. | Aug 2010 | B1 |
7779456 | Dennis et al. | Aug 2010 | B2 |
7779457 | Taylor | Aug 2010 | B2 |
7783515 | Kumar et al. | Aug 2010 | B1 |
7788184 | Kane | Aug 2010 | B2 |
7792715 | Kasower | Sep 2010 | B1 |
7792864 | Rice et al. | Sep 2010 | B1 |
7793835 | Coggeshall et al. | Sep 2010 | B1 |
7801811 | Merrell et al. | Sep 2010 | B1 |
7801828 | Candella et al. | Sep 2010 | B2 |
7802104 | Dickinson | Sep 2010 | B2 |
7805362 | Merrell et al. | Sep 2010 | B1 |
7805391 | Friedlander et al. | Sep 2010 | B2 |
7813944 | Luk et al. | Oct 2010 | B1 |
7827115 | Weller et al. | Nov 2010 | B2 |
7832006 | Chen et al. | Nov 2010 | B2 |
7835983 | Lefner et al. | Nov 2010 | B2 |
7840459 | Loftesness et al. | Nov 2010 | B1 |
7841004 | Balducci et al. | Nov 2010 | B1 |
7844520 | Franklin | Nov 2010 | B1 |
7848987 | Haig | Dec 2010 | B2 |
7849029 | Crooks et al. | Dec 2010 | B2 |
7853518 | Cagan | Dec 2010 | B2 |
7853526 | Milana | Dec 2010 | B2 |
7853533 | Eisen | Dec 2010 | B2 |
7853998 | Blaisdell et al. | Dec 2010 | B2 |
7856397 | Whipple et al. | Dec 2010 | B2 |
7856494 | Kulkarni | Dec 2010 | B2 |
7860769 | Benson | Dec 2010 | B2 |
7860783 | Yang et al. | Dec 2010 | B2 |
7865427 | Wright et al. | Jan 2011 | B2 |
7865439 | Seifert et al. | Jan 2011 | B2 |
7865937 | White et al. | Jan 2011 | B1 |
7870078 | Clark et al. | Jan 2011 | B2 |
7870599 | Pemmaraju | Jan 2011 | B2 |
7874488 | Parkinson | Jan 2011 | B2 |
7877304 | Coulter | Jan 2011 | B1 |
7877784 | Chow et al. | Jan 2011 | B2 |
7882548 | Heath et al. | Feb 2011 | B2 |
7890433 | Singhal | Feb 2011 | B2 |
7904360 | Evans | Mar 2011 | B2 |
7904367 | Chung et al. | Mar 2011 | B2 |
7908242 | Achanta | Mar 2011 | B1 |
7909246 | Hogg et al. | Mar 2011 | B2 |
7912865 | Akerman et al. | Mar 2011 | B2 |
7917715 | Tallman, Jr. | Mar 2011 | B2 |
7925582 | Kornegay et al. | Apr 2011 | B1 |
7929951 | Stevens et al. | Apr 2011 | B2 |
7933835 | Keane et al. | Apr 2011 | B2 |
7941363 | Tanaka et al. | May 2011 | B2 |
7945515 | Zoldi et al. | May 2011 | B2 |
7950577 | Daniel | May 2011 | B1 |
7958046 | Doerner et al. | Jun 2011 | B2 |
7961857 | Zoldi et al. | Jun 2011 | B2 |
7962404 | Metzger, II et al. | Jun 2011 | B1 |
7962467 | Howard et al. | Jun 2011 | B2 |
7970679 | Kasower | Jun 2011 | B2 |
7970698 | Gupta et al. | Jun 2011 | B2 |
7970701 | Lewis et al. | Jun 2011 | B2 |
7971246 | Emigh et al. | Jun 2011 | B1 |
7975299 | Balducci et al. | Jul 2011 | B1 |
7983976 | Nafeh et al. | Jul 2011 | B2 |
7983979 | Holland, IV | Jul 2011 | B2 |
7984849 | Berghel et al. | Jul 2011 | B2 |
7988043 | Davis | Aug 2011 | B2 |
7991201 | Bous et al. | Aug 2011 | B2 |
7991689 | Brunzell et al. | Aug 2011 | B1 |
7991716 | Crooks et al. | Aug 2011 | B2 |
7995994 | Khetawat et al. | Aug 2011 | B2 |
7996521 | Chamberlain et al. | Aug 2011 | B2 |
8001034 | Chung et al. | Aug 2011 | B2 |
8001042 | Brunzell et al. | Aug 2011 | B1 |
8001153 | Skurtovich, Jr. et al. | Aug 2011 | B2 |
8001597 | Crooks | Aug 2011 | B2 |
8005749 | Ginsberg | Aug 2011 | B2 |
8006291 | Headley et al. | Aug 2011 | B2 |
8009873 | Chapman | Aug 2011 | B2 |
8019678 | Wright et al. | Sep 2011 | B2 |
8020763 | Kowalchyk et al. | Sep 2011 | B1 |
8024263 | Zarikian et al. | Sep 2011 | B2 |
8024271 | Grant | Sep 2011 | B2 |
8027439 | Zoldi et al. | Sep 2011 | B2 |
8027518 | Baker et al. | Sep 2011 | B2 |
8027947 | Hinsz et al. | Sep 2011 | B2 |
8028168 | Smithies et al. | Sep 2011 | B2 |
8028326 | Palmer et al. | Sep 2011 | B2 |
8028329 | Whitcomb | Sep 2011 | B2 |
8028896 | Carter et al. | Oct 2011 | B2 |
8032448 | Anderson et al. | Oct 2011 | B2 |
8032449 | Hu et al. | Oct 2011 | B2 |
8032927 | Ross | Oct 2011 | B2 |
8037097 | Guo et al. | Oct 2011 | B2 |
8037512 | Wright et al. | Oct 2011 | B2 |
8041597 | Li et al. | Oct 2011 | B2 |
8042159 | Basner et al. | Oct 2011 | B2 |
8042193 | Piliouras | Oct 2011 | B1 |
8049596 | Sato | Nov 2011 | B2 |
8055667 | Levy | Nov 2011 | B2 |
8056128 | Dingle et al. | Nov 2011 | B1 |
8058972 | Mohanty | Nov 2011 | B2 |
8060424 | Kasower | Nov 2011 | B2 |
8060915 | Voice et al. | Nov 2011 | B2 |
8060916 | Bajaj et al. | Nov 2011 | B2 |
8065233 | Lee et al. | Nov 2011 | B2 |
8065525 | Zilberman | Nov 2011 | B2 |
8069053 | Gervais et al. | Nov 2011 | B2 |
8069084 | Mackouse | Nov 2011 | B2 |
8069256 | Rasti | Nov 2011 | B2 |
8069485 | Carter | Nov 2011 | B2 |
8078569 | Kennel | Dec 2011 | B2 |
8090648 | Zoldi et al. | Jan 2012 | B2 |
8104679 | Brown | Jan 2012 | B2 |
8116731 | Buhrmann et al. | Feb 2012 | B2 |
8121962 | Vaiciulis et al. | Feb 2012 | B2 |
8131615 | Diev et al. | Mar 2012 | B2 |
8151327 | Eisen | Apr 2012 | B2 |
8195549 | Kasower | Jun 2012 | B2 |
8201257 | Andres et al. | Jun 2012 | B1 |
8204774 | Chwast et al. | Jun 2012 | B2 |
8214262 | Semprevivo et al. | Jul 2012 | B1 |
8214285 | Hu et al. | Jul 2012 | B2 |
8224723 | Bosch et al. | Jul 2012 | B2 |
8225395 | Atwood et al. | Jul 2012 | B2 |
8239677 | Colson | Aug 2012 | B2 |
8244629 | Lewis et al. | Aug 2012 | B2 |
8260914 | Ranjan | Sep 2012 | B1 |
8280805 | Abrahams et al. | Oct 2012 | B1 |
8280833 | Miltonberger | Oct 2012 | B2 |
8285613 | Coulter | Oct 2012 | B1 |
8285636 | Curry et al. | Oct 2012 | B2 |
8296225 | Maddipati et al. | Oct 2012 | B2 |
8296229 | Yellin et al. | Oct 2012 | B1 |
8296250 | Crooks et al. | Oct 2012 | B2 |
8332338 | Vaiciulis et al. | Dec 2012 | B2 |
8346593 | Fanelli | Jan 2013 | B2 |
8355896 | Kumar et al. | Jan 2013 | B2 |
8359278 | Domenikos et al. | Jan 2013 | B2 |
8364588 | Celka et al. | Jan 2013 | B2 |
8374973 | Herbrich et al. | Feb 2013 | B2 |
8386377 | Xiong et al. | Feb 2013 | B1 |
8429070 | Hu et al. | Apr 2013 | B2 |
8468090 | Lesandro et al. | Jun 2013 | B2 |
8489479 | Slater et al. | Jul 2013 | B2 |
8510329 | Balkir et al. | Aug 2013 | B2 |
8515844 | Kasower | Aug 2013 | B2 |
8543499 | Haggerty et al. | Sep 2013 | B2 |
8548137 | Zoldi et al. | Oct 2013 | B2 |
8549590 | De Villiers Prichard et al. | Oct 2013 | B1 |
8559607 | Zoldi et al. | Oct 2013 | B2 |
8567669 | Griegel et al. | Oct 2013 | B2 |
8578496 | Krishnappa | Nov 2013 | B1 |
8630938 | Cheng et al. | Jan 2014 | B2 |
8639920 | Stack et al. | Jan 2014 | B2 |
8645301 | Vaiciulis et al. | Feb 2014 | B2 |
8671115 | Skurtovich, Jr. et al. | Mar 2014 | B2 |
8676726 | Hore et al. | Mar 2014 | B2 |
8682755 | Bucholz et al. | Mar 2014 | B2 |
8683586 | Crooks | Mar 2014 | B2 |
8694427 | Maddipati et al. | Apr 2014 | B2 |
8725613 | Celka et al. | May 2014 | B1 |
8781953 | Kasower | Jul 2014 | B2 |
8781975 | Bennett et al. | Jul 2014 | B2 |
8793777 | Colson | Jul 2014 | B2 |
8805836 | Hore et al. | Aug 2014 | B2 |
8812387 | Samler et al. | Aug 2014 | B1 |
8819793 | Gottschalk, Jr. | Aug 2014 | B2 |
8824648 | Zoldi et al. | Sep 2014 | B2 |
8826393 | Eisen | Sep 2014 | B2 |
8862514 | Eisen | Oct 2014 | B2 |
8862526 | Miltonberger | Oct 2014 | B2 |
8918891 | Coggeshall et al. | Dec 2014 | B2 |
8949981 | Trollope et al. | Feb 2015 | B1 |
9191403 | Zoldi et al. | Nov 2015 | B2 |
9194899 | Zoldi et al. | Nov 2015 | B2 |
9196004 | Eisen | Nov 2015 | B2 |
9235728 | Gottschalk, Jr. et al. | Jan 2016 | B2 |
9251541 | Celka et al. | Feb 2016 | B2 |
9256624 | Skurtovich, Jr. et al. | Feb 2016 | B2 |
9280658 | Coggeshall et al. | Mar 2016 | B2 |
9361597 | Britton et al. | Jun 2016 | B2 |
9367520 | Zhao et al. | Jun 2016 | B2 |
9390384 | Eisen | Jul 2016 | B2 |
9412141 | Prichard et al. | Aug 2016 | B2 |
9531738 | Zoldi et al. | Dec 2016 | B2 |
9558368 | Gottschalk, Jr. et al. | Jan 2017 | B2 |
9595066 | Samler et al. | Mar 2017 | B2 |
9652802 | Kasower | May 2017 | B1 |
9704195 | Zoldi | Jul 2017 | B2 |
9710523 | Skurtovich, Jr. et al. | Jul 2017 | B2 |
9710868 | Gottschalk, Jr. et al. | Jul 2017 | B2 |
9754256 | Britton et al. | Sep 2017 | B2 |
9754311 | Eisen | Sep 2017 | B2 |
9773227 | Zoldi et al. | Sep 2017 | B2 |
9953321 | Zoldi et al. | Apr 2018 | B2 |
10043213 | Straub et al. | Aug 2018 | B2 |
10089679 | Eisen | Oct 2018 | B2 |
10089686 | Straub et al. | Oct 2018 | B2 |
10102530 | Zoldi et al. | Oct 2018 | B2 |
10115153 | Zoldi et al. | Oct 2018 | B2 |
10152736 | Yang et al. | Dec 2018 | B2 |
10217163 | Straub et al. | Feb 2019 | B2 |
10242540 | Chen et al. | Mar 2019 | B2 |
10339527 | Coleman et al. | Jul 2019 | B1 |
10373061 | Kennel et al. | Aug 2019 | B2 |
20010014868 | Herz et al. | Aug 2001 | A1 |
20010014878 | Mitra et al. | Aug 2001 | A1 |
20010027413 | Bhutta | Oct 2001 | A1 |
20010029470 | Schultz et al. | Oct 2001 | A1 |
20010034631 | Kiselik | Oct 2001 | A1 |
20010039523 | Iwamoto | Nov 2001 | A1 |
20020010684 | Moskowitz | Jan 2002 | A1 |
20020013899 | Faul | Jan 2002 | A1 |
20020019804 | Sutton | Feb 2002 | A1 |
20020019938 | Aarons | Feb 2002 | A1 |
20020032635 | Harris et al. | Mar 2002 | A1 |
20020040344 | Preiser et al. | Apr 2002 | A1 |
20020042879 | Gould et al. | Apr 2002 | A1 |
20020052841 | Guthrie et al. | May 2002 | A1 |
20020059521 | Tasler | May 2002 | A1 |
20020062185 | Runge et al. | May 2002 | A1 |
20020062281 | Singhal | May 2002 | A1 |
20020073044 | Singhal | Jun 2002 | A1 |
20020077178 | Oberberger et al. | Jun 2002 | A1 |
20020077964 | Brody et al. | Jun 2002 | A1 |
20020080256 | Bates et al. | Jun 2002 | A1 |
20020087460 | Hornung | Jul 2002 | A1 |
20020099649 | Lee et al. | Jul 2002 | A1 |
20020119824 | Allen | Aug 2002 | A1 |
20020130176 | Suzuki | Sep 2002 | A1 |
20020138417 | Lawrence | Sep 2002 | A1 |
20020138751 | Dutta | Sep 2002 | A1 |
20020147695 | Khedkar et al. | Oct 2002 | A1 |
20020156676 | Ahrens et al. | Oct 2002 | A1 |
20020161664 | Shaya et al. | Oct 2002 | A1 |
20020161711 | Sartor et al. | Oct 2002 | A1 |
20020173994 | Ferguson, III | Nov 2002 | A1 |
20020178112 | Goeller et al. | Nov 2002 | A1 |
20020184509 | Scheidt et al. | Dec 2002 | A1 |
20020188544 | Wizon et al. | Dec 2002 | A1 |
20030004879 | Demoff et al. | Jan 2003 | A1 |
20030009426 | Ruiz-Sanchez | Jan 2003 | A1 |
20030018549 | Fei et al. | Jan 2003 | A1 |
20030033261 | Knegendorf | Feb 2003 | A1 |
20030046554 | Leydier et al. | Mar 2003 | A1 |
20030048904 | Wang et al. | Mar 2003 | A1 |
20030050882 | Degen et al. | Mar 2003 | A1 |
20030057278 | Wong | Mar 2003 | A1 |
20030061163 | Duffield | Mar 2003 | A1 |
20030065563 | Elliott et al. | Apr 2003 | A1 |
20030070101 | Buscemi | Apr 2003 | A1 |
20030078877 | Beirne et al. | Apr 2003 | A1 |
20030093366 | Halper et al. | May 2003 | A1 |
20030097320 | Gordon | May 2003 | A1 |
20030105696 | Kalotay et al. | Jun 2003 | A1 |
20030115133 | Bian | Jun 2003 | A1 |
20030143980 | Choi et al. | Jul 2003 | A1 |
20030149744 | Bierre et al. | Aug 2003 | A1 |
20030153299 | Perfit et al. | Aug 2003 | A1 |
20030158751 | Suresh et al. | Aug 2003 | A1 |
20030158960 | Engberg | Aug 2003 | A1 |
20030182214 | Taylor | Sep 2003 | A1 |
20030195859 | Lawrence | Oct 2003 | A1 |
20030200447 | Sjoblom | Oct 2003 | A1 |
20030208428 | Raynes et al. | Nov 2003 | A1 |
20030222500 | Bayeur et al. | Dec 2003 | A1 |
20030225656 | Aberman et al. | Dec 2003 | A1 |
20030225692 | Bosch et al. | Dec 2003 | A1 |
20030225742 | Tenner et al. | Dec 2003 | A1 |
20030233278 | Marshall | Dec 2003 | A1 |
20040004117 | Suzuki | Jan 2004 | A1 |
20040005912 | Hubbe et al. | Jan 2004 | A1 |
20040010698 | Rolfe | Jan 2004 | A1 |
20040024709 | Yu et al. | Feb 2004 | A1 |
20040026496 | Zuili | Feb 2004 | A1 |
20040030649 | Nelson et al. | Feb 2004 | A1 |
20040039586 | Garvey et al. | Feb 2004 | A1 |
20040054619 | Watson et al. | Mar 2004 | A1 |
20040059653 | Verkuylen et al. | Mar 2004 | A1 |
20040064401 | Palaghita et al. | Apr 2004 | A1 |
20040078324 | Lonnberg et al. | Apr 2004 | A1 |
20040103147 | Flesher et al. | May 2004 | A1 |
20040107363 | Monteverde | Jun 2004 | A1 |
20040110119 | Riconda et al. | Jun 2004 | A1 |
20040111305 | Gavan et al. | Jun 2004 | A1 |
20040111335 | Black et al. | Jun 2004 | A1 |
20040117235 | Shacham | Jun 2004 | A1 |
20040128227 | Whipple et al. | Jul 2004 | A1 |
20040128232 | Descloux | Jul 2004 | A1 |
20040133440 | Carolan et al. | Jul 2004 | A1 |
20040143526 | Monasterio et al. | Jul 2004 | A1 |
20040149820 | Zuili | Aug 2004 | A1 |
20040149827 | Zuili | Aug 2004 | A1 |
20040153330 | Miller et al. | Aug 2004 | A1 |
20040153656 | Cluts et al. | Aug 2004 | A1 |
20040153663 | Clark et al. | Aug 2004 | A1 |
20040158520 | Noh | Aug 2004 | A1 |
20040158523 | Dort | Aug 2004 | A1 |
20040158723 | Root | Aug 2004 | A1 |
20040167793 | Masuoka et al. | Aug 2004 | A1 |
20040177046 | Ogram | Sep 2004 | A1 |
20040193538 | Raines | Sep 2004 | A1 |
20040199456 | Flint et al. | Oct 2004 | A1 |
20040199462 | Starrs | Oct 2004 | A1 |
20040204948 | Singletary et al. | Oct 2004 | A1 |
20040225594 | Nolan, III et al. | Nov 2004 | A1 |
20040230448 | Schaich | Nov 2004 | A1 |
20040230527 | Hansen et al. | Nov 2004 | A1 |
20040230538 | Clifton et al. | Nov 2004 | A1 |
20040234117 | Tibor | Nov 2004 | A1 |
20040243514 | Wankmueller | Dec 2004 | A1 |
20040243518 | Clifton et al. | Dec 2004 | A1 |
20040243567 | Levy | Dec 2004 | A1 |
20040250085 | Tattan et al. | Dec 2004 | A1 |
20040254868 | Kirkland et al. | Dec 2004 | A1 |
20040255127 | Arnouse | Dec 2004 | A1 |
20040260922 | Goodman et al. | Dec 2004 | A1 |
20050001028 | Zuili | Jan 2005 | A1 |
20050005168 | Dick | Jan 2005 | A1 |
20050010513 | Duckworth et al. | Jan 2005 | A1 |
20050010780 | Kane et al. | Jan 2005 | A1 |
20050021476 | Candella et al. | Jan 2005 | A1 |
20050021519 | Ghouri | Jan 2005 | A1 |
20050027983 | Klawon | Feb 2005 | A1 |
20050038726 | Salomon et al. | Feb 2005 | A1 |
20050038737 | Norris | Feb 2005 | A1 |
20050050577 | Westbrook et al. | Mar 2005 | A1 |
20050058262 | Timmins et al. | Mar 2005 | A1 |
20050065874 | Lefner et al. | Mar 2005 | A1 |
20050065950 | Chaganti et al. | Mar 2005 | A1 |
20050071282 | Lu et al. | Mar 2005 | A1 |
20050075985 | Cartmell | Apr 2005 | A1 |
20050081052 | Washington | Apr 2005 | A1 |
20050086161 | Gallant | Apr 2005 | A1 |
20050091164 | Varble | Apr 2005 | A1 |
20050097039 | Kulcsar et al. | May 2005 | A1 |
20050097051 | Madill, Jr. et al. | May 2005 | A1 |
20050097364 | Edeki et al. | May 2005 | A1 |
20050102206 | Savasoglu et al. | May 2005 | A1 |
20050105719 | Huda | May 2005 | A1 |
20050125226 | Magee | Jun 2005 | A1 |
20050125686 | Brandt | Jun 2005 | A1 |
20050138391 | Mandalia et al. | Jun 2005 | A1 |
20050144143 | Freiberg | Jun 2005 | A1 |
20050154664 | Guy et al. | Jul 2005 | A1 |
20050154665 | Kerr | Jul 2005 | A1 |
20050154671 | Doan et al. | Jul 2005 | A1 |
20050165667 | Cox | Jul 2005 | A1 |
20050197953 | Broadbent et al. | Sep 2005 | A1 |
20050203885 | Chenevich et al. | Sep 2005 | A1 |
20050216953 | Ellingson | Sep 2005 | A1 |
20050229007 | Bolle et al. | Oct 2005 | A1 |
20050240578 | Biederman et al. | Oct 2005 | A1 |
20050242173 | Suzuki | Nov 2005 | A1 |
20050251474 | Shinn et al. | Nov 2005 | A1 |
20050256809 | Sadri | Nov 2005 | A1 |
20050262014 | Fickes | Nov 2005 | A1 |
20050273333 | Morin et al. | Dec 2005 | A1 |
20050278542 | Pierson et al. | Dec 2005 | A1 |
20050279827 | Mascavage et al. | Dec 2005 | A1 |
20050279869 | Barklage | Dec 2005 | A1 |
20060004622 | Fanelli | Jan 2006 | A1 |
20060004663 | Singhal | Jan 2006 | A1 |
20060014129 | Coleman et al. | Jan 2006 | A1 |
20060032909 | Seegar | Feb 2006 | A1 |
20060041464 | Powers et al. | Feb 2006 | A1 |
20060045105 | Dobosz et al. | Mar 2006 | A1 |
20060047605 | Ahmad | Mar 2006 | A1 |
20060059073 | Walzak | Mar 2006 | A1 |
20060059110 | Madhok et al. | Mar 2006 | A1 |
20060064374 | Helsper et al. | Mar 2006 | A1 |
20060074798 | Din et al. | Apr 2006 | A1 |
20060074986 | Mallalieu et al. | Apr 2006 | A1 |
20060080230 | Freiberg | Apr 2006 | A1 |
20060080263 | Willis et al. | Apr 2006 | A1 |
20060089905 | Song et al. | Apr 2006 | A1 |
20060101508 | Taylor | May 2006 | A1 |
20060106605 | Saunders et al. | May 2006 | A1 |
20060112279 | Cohen et al. | May 2006 | A1 |
20060112280 | Cohen et al. | May 2006 | A1 |
20060129428 | Wennberg | Jun 2006 | A1 |
20060129481 | Bhatt et al. | Jun 2006 | A1 |
20060129840 | Milgramm et al. | Jun 2006 | A1 |
20060131390 | Kim | Jun 2006 | A1 |
20060136332 | Ziegler | Jun 2006 | A1 |
20060140460 | Coutts | Jun 2006 | A1 |
20060143073 | Engel et al. | Jun 2006 | A1 |
20060144924 | Stover | Jul 2006 | A1 |
20060149580 | Helsper et al. | Jul 2006 | A1 |
20060149674 | Cook et al. | Jul 2006 | A1 |
20060161435 | Atef et al. | Jul 2006 | A1 |
20060173776 | Shalley et al. | Aug 2006 | A1 |
20060173792 | Glass | Aug 2006 | A1 |
20060177226 | Ellis, III | Aug 2006 | A1 |
20060178971 | Owen et al. | Aug 2006 | A1 |
20060179004 | Fuchs | Aug 2006 | A1 |
20060195351 | Bayburtian | Aug 2006 | A1 |
20060200855 | Willis | Sep 2006 | A1 |
20060202012 | Grano et al. | Sep 2006 | A1 |
20060204051 | Holland, IV | Sep 2006 | A1 |
20060206725 | Milgramm et al. | Sep 2006 | A1 |
20060212386 | Willey et al. | Sep 2006 | A1 |
20060218069 | Aberman et al. | Sep 2006 | A1 |
20060229961 | Lyftogt et al. | Oct 2006 | A1 |
20060239512 | Petrillo | Oct 2006 | A1 |
20060239513 | Song et al. | Oct 2006 | A1 |
20060242046 | Haggerty et al. | Oct 2006 | A1 |
20060242047 | Haggerty et al. | Oct 2006 | A1 |
20060253358 | Delgrosso et al. | Nov 2006 | A1 |
20060253583 | Dixon et al. | Nov 2006 | A1 |
20060255914 | Westman | Nov 2006 | A1 |
20060262929 | Vatanen et al. | Nov 2006 | A1 |
20060265243 | Racho et al. | Nov 2006 | A1 |
20060271456 | Romain et al. | Nov 2006 | A1 |
20060271457 | Romain et al. | Nov 2006 | A1 |
20060271633 | Adler | Nov 2006 | A1 |
20060273158 | Suzuki | Dec 2006 | A1 |
20060277043 | Tomes et al. | Dec 2006 | A1 |
20060282285 | Helsper et al. | Dec 2006 | A1 |
20060282372 | Endres et al. | Dec 2006 | A1 |
20060282395 | Leibowitz | Dec 2006 | A1 |
20060287765 | Kraft | Dec 2006 | A1 |
20060287902 | Helsper et al. | Dec 2006 | A1 |
20060288090 | Kraft | Dec 2006 | A1 |
20060294023 | Lu | Dec 2006 | A1 |
20070005508 | Chiang | Jan 2007 | A1 |
20070011100 | Libin et al. | Jan 2007 | A1 |
20070016500 | Chatterji et al. | Jan 2007 | A1 |
20070016521 | Wang | Jan 2007 | A1 |
20070016522 | Wang | Jan 2007 | A1 |
20070022141 | Singleton et al. | Jan 2007 | A1 |
20070038483 | Wood | Feb 2007 | A1 |
20070038568 | Greene et al. | Feb 2007 | A1 |
20070040017 | Kozlay | Feb 2007 | A1 |
20070040019 | Berghel et al. | Feb 2007 | A1 |
20070043577 | Kasower | Feb 2007 | A1 |
20070047770 | Swope et al. | Mar 2007 | A1 |
20070048765 | Abramson | Mar 2007 | A1 |
20070050638 | Rasti | Mar 2007 | A1 |
20070059442 | Sabeta | Mar 2007 | A1 |
20070061273 | Greene et al. | Mar 2007 | A1 |
20070067207 | Haggerty et al. | Mar 2007 | A1 |
20070067297 | Kublickis | Mar 2007 | A1 |
20070072190 | Aggarwal | Mar 2007 | A1 |
20070073622 | Kane | Mar 2007 | A1 |
20070073630 | Greene et al. | Mar 2007 | A1 |
20070078786 | Bous et al. | Apr 2007 | A1 |
20070078908 | Rohatgi et al. | Apr 2007 | A1 |
20070078985 | Shao et al. | Apr 2007 | A1 |
20070083460 | Bachenheimer | Apr 2007 | A1 |
20070087795 | Aletto et al. | Apr 2007 | A1 |
20070093234 | Willis et al. | Apr 2007 | A1 |
20070094137 | Phillips et al. | Apr 2007 | A1 |
20070094264 | Nair | Apr 2007 | A1 |
20070100774 | Abdon | May 2007 | A1 |
20070106517 | Cluff et al. | May 2007 | A1 |
20070106582 | Baker et al. | May 2007 | A1 |
20070106611 | Larsen | May 2007 | A1 |
20070107050 | Selvarajan | May 2007 | A1 |
20070109103 | Jedrey et al. | May 2007 | A1 |
20070110282 | Millsapp | May 2007 | A1 |
20070112667 | Rucker | May 2007 | A1 |
20070112668 | Celano et al. | May 2007 | A1 |
20070118393 | Rosen et al. | May 2007 | A1 |
20070124270 | Page | May 2007 | A1 |
20070155411 | Morrison | Jul 2007 | A1 |
20070157299 | Hare | Jul 2007 | A1 |
20070168246 | Haggerty et al. | Jul 2007 | A1 |
20070168480 | Biggs et al. | Jul 2007 | A1 |
20070174208 | Black et al. | Jul 2007 | A1 |
20070179903 | Seinfeld et al. | Aug 2007 | A1 |
20070180209 | Tallman | Aug 2007 | A1 |
20070180263 | Delgrosso et al. | Aug 2007 | A1 |
20070186276 | McRae et al. | Aug 2007 | A1 |
20070192248 | West | Aug 2007 | A1 |
20070192853 | Shraim et al. | Aug 2007 | A1 |
20070198410 | Labgold et al. | Aug 2007 | A1 |
20070205266 | Carr et al. | Sep 2007 | A1 |
20070208669 | Rivette et al. | Sep 2007 | A1 |
20070214037 | Shubert et al. | Sep 2007 | A1 |
20070214365 | Cornett et al. | Sep 2007 | A1 |
20070219928 | Madhogarhia | Sep 2007 | A1 |
20070220594 | Tulsyan | Sep 2007 | A1 |
20070226093 | Chan et al. | Sep 2007 | A1 |
20070226129 | Liao et al. | Sep 2007 | A1 |
20070233614 | McNelley et al. | Oct 2007 | A1 |
20070234427 | Gardner et al. | Oct 2007 | A1 |
20070244782 | Chimento | Oct 2007 | A1 |
20070244807 | Andringa et al. | Oct 2007 | A1 |
20070250704 | Hallam-Baker | Oct 2007 | A1 |
20070250920 | Lindsay | Oct 2007 | A1 |
20070266439 | Kraft | Nov 2007 | A1 |
20070282730 | Carpenter et al. | Dec 2007 | A1 |
20070288355 | Roland et al. | Dec 2007 | A1 |
20070288360 | Seeklus | Dec 2007 | A1 |
20070288559 | Parsadayan | Dec 2007 | A1 |
20070291995 | Rivera | Dec 2007 | A1 |
20070292006 | Johnson | Dec 2007 | A1 |
20070294104 | Boaz et al. | Dec 2007 | A1 |
20070299759 | Kelly | Dec 2007 | A1 |
20080010203 | Grant | Jan 2008 | A1 |
20080010683 | Baddour et al. | Jan 2008 | A1 |
20080010687 | Gonen et al. | Jan 2008 | A1 |
20080015887 | Drabek et al. | Jan 2008 | A1 |
20080021804 | Deckoff | Jan 2008 | A1 |
20080027857 | Benson | Jan 2008 | A1 |
20080027858 | Benson | Jan 2008 | A1 |
20080052182 | Marshall | Feb 2008 | A1 |
20080059236 | Cartier | Mar 2008 | A1 |
20080059352 | Chandran | Mar 2008 | A1 |
20080059364 | Tidwell et al. | Mar 2008 | A1 |
20080059366 | Fou | Mar 2008 | A1 |
20080063172 | Ahuja et al. | Mar 2008 | A1 |
20080066188 | Kwak | Mar 2008 | A1 |
20080071882 | Hering et al. | Mar 2008 | A1 |
20080076386 | Khetawat et al. | Mar 2008 | A1 |
20080077526 | Arumugam | Mar 2008 | A1 |
20080098222 | Zilberman | Apr 2008 | A1 |
20080103798 | Domenikos et al. | May 2008 | A1 |
20080103799 | Domenikos et al. | May 2008 | A1 |
20080103800 | Domenikos et al. | May 2008 | A1 |
20080103811 | Sosa | May 2008 | A1 |
20080103972 | Lanc | May 2008 | A1 |
20080104021 | Cai et al. | May 2008 | A1 |
20080104672 | Lunde et al. | May 2008 | A1 |
20080114837 | Biggs et al. | May 2008 | A1 |
20080120237 | Lin | May 2008 | A1 |
20080126116 | Singhai | May 2008 | A1 |
20080126233 | Hogan | May 2008 | A1 |
20080140576 | Lewis et al. | Jun 2008 | A1 |
20080147454 | Walker et al. | Jun 2008 | A1 |
20080154758 | Schattmaier et al. | Jun 2008 | A1 |
20080162383 | Kraft | Jul 2008 | A1 |
20080167883 | Thavildar Khazaneh | Jul 2008 | A1 |
20080175360 | Schwarz et al. | Jul 2008 | A1 |
20080177655 | Zalik | Jul 2008 | A1 |
20080177841 | Sinn et al. | Jul 2008 | A1 |
20080189789 | Lamontagne | Aug 2008 | A1 |
20080208548 | Metzger et al. | Aug 2008 | A1 |
20080208610 | Thomas et al. | Aug 2008 | A1 |
20080208726 | Tsantes et al. | Aug 2008 | A1 |
20080217400 | Portano | Sep 2008 | A1 |
20080228635 | Megdal et al. | Sep 2008 | A1 |
20080243680 | Megdal et al. | Oct 2008 | A1 |
20080244717 | Jelatis et al. | Oct 2008 | A1 |
20080255922 | Feldman et al. | Oct 2008 | A1 |
20080255992 | Lin | Oct 2008 | A1 |
20080256613 | Grover | Oct 2008 | A1 |
20080281737 | Fajardo | Nov 2008 | A1 |
20080281743 | Pettit | Nov 2008 | A1 |
20080288382 | Smith et al. | Nov 2008 | A1 |
20080288430 | Friedlander et al. | Nov 2008 | A1 |
20080288790 | Wilson | Nov 2008 | A1 |
20080294540 | Celka et al. | Nov 2008 | A1 |
20080294689 | Metzger et al. | Nov 2008 | A1 |
20080296367 | Parkinson | Dec 2008 | A1 |
20080296382 | Connell, II et al. | Dec 2008 | A1 |
20080300877 | Gilbert et al. | Dec 2008 | A1 |
20080319889 | Hammad | Dec 2008 | A1 |
20090007220 | Ormazabal et al. | Jan 2009 | A1 |
20090018934 | Peng et al. | Jan 2009 | A1 |
20090021349 | Errico et al. | Jan 2009 | A1 |
20090024417 | Marks et al. | Jan 2009 | A1 |
20090024505 | Patel et al. | Jan 2009 | A1 |
20090024636 | Shiloh | Jan 2009 | A1 |
20090024663 | McGovern | Jan 2009 | A1 |
20090026270 | Connell, II et al. | Jan 2009 | A1 |
20090043637 | Eder | Feb 2009 | A1 |
20090044279 | Crawford et al. | Feb 2009 | A1 |
20090048957 | Celano | Feb 2009 | A1 |
20090079539 | Johnson | Mar 2009 | A1 |
20090094311 | Awadallah et al. | Apr 2009 | A1 |
20090099960 | Robida et al. | Apr 2009 | A1 |
20090106153 | Ezra | Apr 2009 | A1 |
20090106846 | Dupray et al. | Apr 2009 | A1 |
20090112650 | Iwane | Apr 2009 | A1 |
20090119106 | Rajakumar et al. | May 2009 | A1 |
20090119299 | Rhodes | May 2009 | A1 |
20090125369 | Kloostra et al. | May 2009 | A1 |
20090125439 | Zarikian et al. | May 2009 | A1 |
20090125463 | Hido | May 2009 | A1 |
20090126013 | Atwood et al. | May 2009 | A1 |
20090138391 | Dudley et al. | May 2009 | A1 |
20090141318 | Hughes | Jun 2009 | A1 |
20090151005 | Bell et al. | Jun 2009 | A1 |
20090158404 | Hahn et al. | Jun 2009 | A1 |
20090164380 | Brown | Jun 2009 | A1 |
20090172815 | Gu et al. | Jul 2009 | A1 |
20090182653 | Zimiles | Jul 2009 | A1 |
20090199264 | Lang | Aug 2009 | A1 |
20090204457 | Buhrmann et al. | Aug 2009 | A1 |
20090205032 | Hinton et al. | Aug 2009 | A1 |
20090206993 | Di Mambro et al. | Aug 2009 | A1 |
20090216560 | Siegel | Aug 2009 | A1 |
20090222308 | Zoldi et al. | Sep 2009 | A1 |
20090222362 | Stood et al. | Sep 2009 | A1 |
20090222373 | Choudhuri et al. | Sep 2009 | A1 |
20090222374 | Choudhuri et al. | Sep 2009 | A1 |
20090222375 | Choudhuri et al. | Sep 2009 | A1 |
20090222376 | Choudhuri et al. | Sep 2009 | A1 |
20090222377 | Choudhuri et al. | Sep 2009 | A1 |
20090222378 | Choudhuri et al. | Sep 2009 | A1 |
20090222379 | Choudhuri et al. | Sep 2009 | A1 |
20090222380 | Choudhuri et al. | Sep 2009 | A1 |
20090222897 | Carow et al. | Sep 2009 | A1 |
20090224875 | Rabinowitz et al. | Sep 2009 | A1 |
20090224889 | Aggarwal et al. | Sep 2009 | A1 |
20090226056 | Vlachos et al. | Sep 2009 | A1 |
20090240609 | Cho et al. | Sep 2009 | A1 |
20090241168 | Readshaw | Sep 2009 | A1 |
20090241173 | Troyansky | Sep 2009 | A1 |
20090248198 | Siegel et al. | Oct 2009 | A1 |
20090248497 | Hueter | Oct 2009 | A1 |
20090248567 | Haggerty et al. | Oct 2009 | A1 |
20090248568 | Haggerty et al. | Oct 2009 | A1 |
20090248569 | Haggerty et al. | Oct 2009 | A1 |
20090248570 | Haggerty et al. | Oct 2009 | A1 |
20090248571 | Haggerty et al. | Oct 2009 | A1 |
20090248572 | Haggerty et al. | Oct 2009 | A1 |
20090248573 | Haggerty et al. | Oct 2009 | A1 |
20090254476 | Sharma et al. | Oct 2009 | A1 |
20090254484 | Forero et al. | Oct 2009 | A1 |
20090257595 | de Cesare et al. | Oct 2009 | A1 |
20090259470 | Chang | Oct 2009 | A1 |
20090259560 | Bachenheimer | Oct 2009 | A1 |
20090259588 | Lindsay | Oct 2009 | A1 |
20090259855 | de Cesare et al. | Oct 2009 | A1 |
20090261189 | Ellis, Jr. | Oct 2009 | A1 |
20090270126 | Liu | Oct 2009 | A1 |
20090271265 | Lay et al. | Oct 2009 | A1 |
20090271617 | Song et al. | Oct 2009 | A1 |
20090272801 | Connell, II et al. | Nov 2009 | A1 |
20090276244 | Baldwin, Jr. et al. | Nov 2009 | A1 |
20090281945 | Shakkarwar | Nov 2009 | A1 |
20090281951 | Shakkarwar | Nov 2009 | A1 |
20090289110 | Regen et al. | Nov 2009 | A1 |
20090300066 | Guo et al. | Dec 2009 | A1 |
20090307778 | Mardikar | Dec 2009 | A1 |
20090326972 | Washington | Dec 2009 | A1 |
20090328173 | Jakobson et al. | Dec 2009 | A1 |
20100004965 | Eisen | Jan 2010 | A1 |
20100024037 | Grzymala-Busse et al. | Jan 2010 | A1 |
20100030677 | Melik-Aslanian et al. | Feb 2010 | A1 |
20100031030 | Kao et al. | Feb 2010 | A1 |
20100037147 | Champion et al. | Feb 2010 | A1 |
20100037308 | Lin et al. | Feb 2010 | A1 |
20100042526 | Martinov | Feb 2010 | A1 |
20100043055 | Baumgart | Feb 2010 | A1 |
20100070620 | Awadallah et al. | Mar 2010 | A1 |
20100077006 | El Emam et al. | Mar 2010 | A1 |
20100085146 | Johnson | Apr 2010 | A1 |
20100088233 | Tattan et al. | Apr 2010 | A1 |
20100088338 | Pavoni, Jr. et al. | Apr 2010 | A1 |
20100094664 | Bush et al. | Apr 2010 | A1 |
20100094767 | Miltonberger | Apr 2010 | A1 |
20100094768 | Miltonberger | Apr 2010 | A1 |
20100094910 | Bayliss | Apr 2010 | A1 |
20100095357 | Willis et al. | Apr 2010 | A1 |
20100100406 | Lim | Apr 2010 | A1 |
20100100945 | Ozzie et al. | Apr 2010 | A1 |
20100107225 | Spencer et al. | Apr 2010 | A1 |
20100114724 | Ghosh et al. | May 2010 | A1 |
20100114744 | Gonen | May 2010 | A1 |
20100121767 | Coulter et al. | May 2010 | A1 |
20100130172 | Vendrow et al. | May 2010 | A1 |
20100131273 | Aley-Raz et al. | May 2010 | A1 |
20100132043 | Bjorn et al. | May 2010 | A1 |
20100145836 | Baker et al. | Jun 2010 | A1 |
20100145847 | Zarikian et al. | Jun 2010 | A1 |
20100158207 | Dhawan et al. | Jun 2010 | A1 |
20100169210 | Bous et al. | Jul 2010 | A1 |
20100169947 | Sarmah et al. | Jul 2010 | A1 |
20100188684 | Kumara | Jul 2010 | A1 |
20100205662 | Ibrahim et al. | Aug 2010 | A1 |
20100217837 | Ansari et al. | Aug 2010 | A1 |
20100218255 | Ritman et al. | Aug 2010 | A1 |
20100228649 | Pettitt | Sep 2010 | A1 |
20100228657 | Kagarlis | Sep 2010 | A1 |
20100229225 | Sarmah et al. | Sep 2010 | A1 |
20100229230 | Edeki et al. | Sep 2010 | A1 |
20100229245 | Singhal | Sep 2010 | A1 |
20100241501 | Marshall | Sep 2010 | A1 |
20100250364 | Song et al. | Sep 2010 | A1 |
20100250411 | Ogrodski | Sep 2010 | A1 |
20100250509 | Andersen | Sep 2010 | A1 |
20100250955 | Trevithick et al. | Sep 2010 | A1 |
20100268557 | Faith et al. | Oct 2010 | A1 |
20100274679 | Hammad | Oct 2010 | A1 |
20100275265 | Fiske et al. | Oct 2010 | A1 |
20100293090 | Domenikos et al. | Nov 2010 | A1 |
20100293114 | Khan et al. | Nov 2010 | A1 |
20100302157 | Zilberman | Dec 2010 | A1 |
20100306101 | Lefner et al. | Dec 2010 | A1 |
20100313273 | Freas | Dec 2010 | A1 |
20100325035 | Hilgers et al. | Dec 2010 | A1 |
20100325442 | Petrone et al. | Dec 2010 | A1 |
20100332292 | Anderson | Dec 2010 | A1 |
20100332362 | Ramsey et al. | Dec 2010 | A1 |
20110004498 | Readshaw | Jan 2011 | A1 |
20110016042 | Cho et al. | Jan 2011 | A1 |
20110040983 | Grzymala-Busse et al. | Feb 2011 | A1 |
20110047071 | Choudhuri et al. | Feb 2011 | A1 |
20110060905 | Stack et al. | Mar 2011 | A1 |
20110066547 | Clark et al. | Mar 2011 | A1 |
20110082768 | Eisen | Apr 2011 | A1 |
20110093383 | Haggerty et al. | Apr 2011 | A1 |
20110112958 | Haggerty et al. | May 2011 | A1 |
20110119291 | Rice | May 2011 | A1 |
20110126024 | Beatson et al. | May 2011 | A1 |
20110126275 | Anderson et al. | May 2011 | A1 |
20110145899 | Cao et al. | Jun 2011 | A1 |
20110166988 | Coulter | Jul 2011 | A1 |
20110184838 | Winters et al. | Jul 2011 | A1 |
20110184851 | Megdal et al. | Jul 2011 | A1 |
20110196791 | Dominguez | Aug 2011 | A1 |
20110238566 | Santos | Sep 2011 | A1 |
20110260832 | Ross et al. | Oct 2011 | A1 |
20110276496 | Neville et al. | Nov 2011 | A1 |
20110282778 | Wright et al. | Nov 2011 | A1 |
20110289032 | Crooks et al. | Nov 2011 | A1 |
20110289322 | Rasti | Nov 2011 | A1 |
20110295721 | MacDonald | Dec 2011 | A1 |
20110295750 | Rammal | Dec 2011 | A1 |
20110296529 | Bhanoo et al. | Dec 2011 | A1 |
20110302412 | Deng et al. | Dec 2011 | A1 |
20110302641 | Hald et al. | Dec 2011 | A1 |
20120030080 | Slater et al. | Feb 2012 | A1 |
20120030083 | Newman et al. | Feb 2012 | A1 |
20120030771 | Pierson et al. | Feb 2012 | A1 |
20120066073 | Dilip et al. | Mar 2012 | A1 |
20120101939 | Kasower | Apr 2012 | A1 |
20120158574 | Brunzell et al. | Jun 2012 | A1 |
20120158654 | Behren et al. | Jun 2012 | A1 |
20120198556 | Patel et al. | Aug 2012 | A1 |
20120215682 | Lent et al. | Aug 2012 | A1 |
20120278227 | Kolo et al. | Nov 2012 | A1 |
20120290660 | Rao et al. | Nov 2012 | A1 |
20130004033 | Trugenberger et al. | Jan 2013 | A1 |
20130185293 | Boback | Jul 2013 | A1 |
20130218797 | Prichard et al. | Aug 2013 | A1 |
20140007238 | Magee et al. | Jan 2014 | A1 |
20140058910 | Abeles | Feb 2014 | A1 |
20140149304 | Bucholz et al. | May 2014 | A1 |
20150186901 | Miltonberger | Jul 2015 | A1 |
20150199784 | Straub et al. | Jul 2015 | A1 |
20150295924 | Gottschalk, Jr. | Oct 2015 | A1 |
20160012561 | Lappenbusch et al. | Jan 2016 | A1 |
20160063645 | Houseworth et al. | Mar 2016 | A1 |
20160071208 | Straub et al. | Mar 2016 | A1 |
20160086262 | Straub et al. | Mar 2016 | A1 |
20160328814 | Prichard et al. | Nov 2016 | A1 |
20160344758 | Cohen et al. | Nov 2016 | A1 |
20170099314 | Klatt et al. | Apr 2017 | A1 |
20170278182 | Kasower | Sep 2017 | A1 |
20170287065 | Samler et al. | Oct 2017 | A1 |
20170374076 | Pierson et al. | Dec 2017 | A1 |
20180101890 | Eisen | Apr 2018 | A1 |
20180322572 | Straub et al. | Nov 2018 | A1 |
Number | Date | Country |
---|---|---|
91 08 341 | Oct 1991 | DE |
0 554 083 | Aug 1993 | EP |
2 392 748 | Mar 2004 | GB |
10-2004-0034063 | Apr 2004 | KR |
256569 | Jun 2006 | TW |
WO 94006103 | Mar 1994 | WO |
WO 96041488 | Dec 1996 | WO |
WO 00055778 | Sep 2000 | WO |
WO 00055789 | Sep 2000 | WO |
WO 00055790 | Sep 2000 | WO |
WO 01011522 | Feb 2001 | WO |
WO 02027610 | Apr 2002 | WO |
WO 02097563 | Dec 2002 | WO |
WO 03071388 | Aug 2003 | WO |
WO 02037219 | May 2004 | WO |
WO 2004046882 | Jun 2004 | WO |
WO 2006069199 | Jun 2006 | WO |
WO 2007106393 | Sep 2007 | WO |
WO 2008054403 | May 2008 | WO |
WO 2008054849 | May 2008 | WO |
WO 2008147918 | Dec 2008 | WO |
WO 2009062111 | May 2009 | WO |
WO 2009117518 | Sep 2009 | WO |
WO 2011044036 | Apr 2011 | WO |
WO 2012054646 | Apr 2012 | WO |
WO 2012112781 | Aug 2012 | WO |
WO 2013026343 | Feb 2013 | WO |
WO 2013126281 | Aug 2013 | WO |
WO 2014008079 | Jan 2014 | WO |
WO 2014008247 | Jan 2014 | WO |
WO 2014150987 | Sep 2014 | WO |
Entry |
---|
AAD et al., “NRC Data Collection and the Privacy by Design Principles”, IEEE, Nov. 2010, pp. 5. |
Haglund, Christoffer, “Two-Factor Authentication With a Mobile Phone”, Fox Technologies, Uppsala, Department of Information Technology, Nov. 2, 2007, pp. 62. |
Khan, Muhammad Khurram, PhD., “An Efficient and Secure Remote Mutual Authentication Scheme with Smart Cards” IEEE International Symposium on Biometrics & Security Technologies (ISBAST), Apr. 23-24, 2008, pp. 1-6. |
Lefebvre et al., “A Robust Soft Hash Algorithm for Digital Image Signature”, International Conference on Image Processing 2:11 (ICIP), vol. 3, Oct. 2003, pp. 495-498. |
International Search Report and Written Opinion for Application No. PCT/US2012/025456, dated May 21, 2012. |
International Search Report and Written Opinion for Application No. PCT/US2011/033940, dated Aug. 22, 2011. |
“Fraud Alert | Learn How”. Fight Identity Theft. http://www.fightidentitytheft.com/flag,html, accessed on Nov. 5, 2009. |
LifeLock, “Personal Identity Theft Protection & Identity Theft Products,” http://www.lifelock.com/lifelock-for-people, accessed Nov. 5, 2007. |
Official Communication in Canadian Patent Application No. 2,827,478, dated May 31, 2018. |
TheMorningCall.Com, “Cheap Ways to Foil Identity Theft,” www.mcall.com/business/columnists/all-karp.5920748jul01.0 . . . , published Jul. 1, 2007. |
U.S. Appl. No. 13/398,471, U.S. Pat. No. 9,235,728, System and Methods for Identifying Compromised Personally Identifiable Information on the Internet, filed Feb. 16, 2012. |
U.S. Appl. No. 14/929,835, U.S. Pat. No. 9,558,368, System and Methods for Identifying Compromised Personally Identifiable Information on the Internet, filed Nov. 2, 2015. |
U.S. Appl. No. 15/341,096, U.S. Pat. No. 9,710,868, System and Methods for Identifying Compromised Personally Identifiable Information on the Internet, filed Nov. 2, 2016. |
Extended European Search Report for Application No. EP18207755, dated Dec. 13, 2018. |
U.S. Appl. No. 12/705,489, filed Feb. 12, 2010, Bargoli et al. |
U.S. Appl. No. 12/705,511, filed Feb. 12, 2010, Bargoli et al. |
U.S. Appl. No. 09/557,252, filed Apr. 24, 2000, Page. |
“A New Approach to Fraud Solutions”, BasePoint Science Solving Fraud, pp. 8, 2006. |
“Arizona Company Has Found Key in Stopping ID Theft,” PR Newswire, New York, Aug. 10, 2005 http://proquest.umi.com/pqdweb?did=880104711&sid=1&Fmt=3&clientId=19649&RQT=309&Vname=PQD. |
ABC News Now: Money Matters, as broadcasted Nov. 15, 2005 with guest Todd Davis (CEO of Lifelock), pp. 6. |
Anonymous, “Feedback”, Credit Management, ABI/INFORM Global, Sep. 2006, pp. 6. |
“Beverly Hills Man Convicted of Operating ‘Bust-Out’ Schemes that Caused More than $8 Million in Losses”, Department of Justice, Jul. 25, 2006, 2 Pgs. |
Bielski, Lauren, “Will you Spend to Thwart ID Theft?” ABA Banking Journal, Apr. 2005, pp. 54, 56-57, 60. |
BlueCava, “What We Do”, http://www.bluecava.com/what-we-do/, printed Nov. 5, 2012 in 3 pages. |
“Bust-Out Schemes”, Visual Analytics Inc. Technical Product Support, Newsletter vol. 4, Issue 1, Jan. 2005, pp. 7. |
Chores & Allowances, “Do Kids Have Credit Reports?” Oct. 15, 2007, http://choresandallowances.blogspot.com/2007/10/do-kids-have-credit-reports.html, pp. 5. |
Cowie, Norman, “Warning Bells & the Bust-Out”, Business Credit, Jul. 1, 2000, pp. 5. |
Cullen, Terri; “The Wall Street Journal Complete Identity Theft Guidebook:How to Protect Yourself from the Most Pervasive Crime in America”; Chapter 3, pp. 59-79; Jul. 10, 2007. |
“Data Loss Prevention (DLP) Software”, http://www.symantec.com/data-loss-prevention/ printed Apr. 8, 2013 in 8 pages. |
“Data Protection”, http://compliantprocessing.com/data-protection/ printed Apr. 8, 2013 in 4 pages. |
Day, Jo and Kevin; “ID-ology: A Planner's Guide to Identity Theft”; Journal of Financial Planning:Tech Talk; pp. 36-38; Sep. 2004. |
eFunds Corporation, “Data & Decisioning: Debit Report” printed Apr. 1, 2007, http://www.efunds.com/web/industry-solutions/financial-services/frm-debit-report/htm in 1 page. |
Equifax; “Equifax Credit Watch”; https://www.econsumer.equifax.co.uk/consumer/uk/sitepage.ehtml, dated Jun. 27, 2007 on www.archive.org. |
Experian Team, “Impact on Credit Scores of Inquiries for an Auto Loan,” Ask Experian, Mar. 1, 2009, pp. 5. |
“Fair Isaac Introduces Falcon One System to Combat Fraud at Every Customer Interaction”, Business Wire, May 5, 2005, pp. 3. |
“Fair Isaac Offers New Fraud Tool”, National Mortgage News & Source Media, Inc., Jun. 13, 2005, pp. 2. |
FamilySecure.com, “Frequently Asked Questions”, http://www.familysecure.com/FAQ.aspx as archived Jul. 15, 2007 in 3 pages. |
FamilySecure.com; “Identity Theft Protection for the Whole Family | FamilySecure.com” http://www.familysecure.com/, as retrieved on Nov. 5, 2009. |
“Fighting the New Face of Fraud”, FinanceTech, http://www.financetech.com/showArticle.jhtml?articleID=167100405, Aug. 2, 2005. |
“FinExtra, Basepoint Analytics Introduces Predictive Technology for Mortgage Fraud”, Oct. 5, 2005, pp. 3. |
Fisher, Joseph, “Access to Fair Credit Reports: Current Practices and Proposed Legislation,” American Business Law Journal, Fall 1981, vol. 19, No. 3, p. 319. |
Gibbs, Adrienne; “Protecting Your Children from Identity Theft,” Nov. 25, 2008, http://www.creditcards.com/credit-card-news/identity-ID-theft-and-kids-children-1282.php, pp. 4. |
“GLBA Compliance and FFIEC Compliance” http://www.trustwave.com/financial-services.php printed Apr. 8, 2013 in 1 page. |
Gordon et al., “Identity Fraud: A Critical National and Global Threat,” LexisNexis, Oct. 28, 2003, pp. 1-48. |
Herzberg, Amir, “Payments and Banking with Mobile Personal Devices,” Communications of the ACM, May 2003, vol. 46, No. 5, pp. 53-58. |
“ID Analytics ID Network”, from www.idanalytics.com, as retrieved from Internet Archive, dated Nov. 20, 2005 or earlier; attached as “ID Network (IDNb)”, pp. 8. |
ID Cops, www.idcops.com; retrieved from www.archive.org any linkage Feb. 16, 2007. |
ID Theft Assist, “Do You Know Where Your Child's Credit Is?”, Nov. 26, 2007, http://www.idtheftassist.com/pages/story14, pp. 3. |
“ID Thieves These Days Want Your Number, Not Your Name”, The Columbus Dispatch, Columbus, Ohio, http://www.dispatch.com/content/stories/business/2014/08/03/id-thieves-these-days-want-your-number-not-your-name.html, Aug. 3, 2014 in 2 pages. |
Identity Theft Resource Center; Fact Sheet 120 A—To Order a Credit Report for a Child; Fact Sheets, Victim Resources; Apr. 30, 2007. |
“Identity Thieves Beware: Lifelock Introduces Nation's First Guaranteed Proactive Solution to Identity Theft Protection,” PR Newswire, New York, Jun. 13, 2005 http://proquest.umi.com/pqdweb?did=852869731&sid=1&Fmt=3&clientId=19649&RQT=309&Vname=PQD. |
“Industry News, New Technology Identifies Mortgage Fraud: Basepoint Analytics Launches FraudMark”, Inman News, American Land Title Association, Oct. 5, 2005, pp. 1. |
Information Brokers of America, “Information Brokers of America Child Identity Theft Protection” http://web.archive.org/web/20080706135451/http://iboainfo.com/child-order.html as archived Jul. 6, 2008 in 1 page. |
Information Brokers of America, “Safeguard Your Child's Credit”, http://web.archive.org/web/20071215210406/http://www.iboainfo.com/child-id-protect.html as archived Dec. 15, 2007 in 1 page. |
“Intersections, Inc. Identity Guard”, from www.intersections.com and www.identityguard.com, as retrieved from Internet Archive, dated Nov. 25, 2005 or earlier; attached as “Identity Guard (IDG)”, pp. 7. |
Iovation, Device Identification & Device Fingerprinting, http://www.iovation.com/risk-management/device-identification printed Nov. 5, 2012 in 6 pages. |
Jacob et al., A Case Study of Checking Account Inquiries and Closures in Chicago, The Center for Financial Services Innovation, Nov. 2006. |
Karlan et al., “Observing Unobservables:Identifying Information Asymmetries with a Consumer Credit Field Experiment”, Jun. 17, 2006, pp. 58, http://aida.econ.yale.edu/karlan/papers/ObservingUnobservables.KarlanZinman.pdf. |
Lamons, Bob, “Be Smart: Offer Inquiry Qualification Services,” Marketing News, ABI/Inform Global, Nov. 6, 1995, vol. 29, No. 23, pp. 13. |
Lee, Timothy B., “How America's Broken Tax System Makes Identity Theft Easy”, http://www.vox.com/2014/4/14/5608072/how-americas-broken-tax-system-makes-identity-theft-easy, Apr. 14, 2014, pp. 10. |
Lee, W.A.; “Experian, on Deal Hunt, Nets Identity Theft Insurer”, American Banker: The Financial Services Daily, Jun. 4, 2003, New York, NY, 1 page. |
LifeLock, “How LifeLock Works,” http://www.lifelock.com/lifelock-for-people printed Mar. 14, 2008 in 1 page. |
LifeLock, “LifeLock Launches First ID Theft Prevention Program for the Protection of Children,” Press Release, Oct. 14, 2005, http://www.lifelock.com/about-us/press-room/2005-press-releases/lifelock-protection-for-children. |
LifeLock; “How Can LifeLock Protect My Kids and Family?” http://www.lifelock.com/lifelock-for-people/how-we-do-it/how-can-lifelock-protect-my-kids-and-family printed Mar. 14, 2008 in 1 page. |
LifeLock, Various Pages, www.lifelock.com/, 2007. |
My Call Credit http://www.mycallcredit.com/products.asp?product=ALR dated Dec. 10, 2005 on www.archive.org. |
My Call Credit http://www.mycallcredit.com/rewrite.asp?display=faq dated Dec. 10, 2005 on www.archive.org. |
MyReceipts, http://www.myreceipts.com/, printed Oct. 16, 2012 in 1 page. |
MyReceipts—How it Works, http://www.myreceipts.com/howItWorks.do, printed Oct. 16, 2012 in 1 page. |
National Alert Registry Launches RegisteredOffendersList.org to Provide Information on Registered Sex Offenders, May 16, 2005, pp. 2, http://www.prweb.com/printer/240437.htm accessed on Oct. 18, 2011. |
National Alert Registry Offers Free Child Safety “Safe From Harm” DVD and Child Identification Kit , Oct. 24, 2006. pp. 2, http://www.prleap.com/pr/53170 accessed on Oct. 18, 2011. |
National Alert Registry website titled, “Does a sexual offender live in your neighborhood”, Oct. 22, 2006, pp. 2, http://web.archive.org/wb/20061022204835/http://www.nationallertregistry.com/ accessed on Oct. 13, 2011. |
Ogg, Erica, “Apple Cracks Down on UDID Use”, http://gigaom.com/apple/apple-cracks-down-on-udid-use/ printed Nov. 5, 2012 in 5 Pages. |
Organizing Maniac's Blog—Online Receipts Provided by MyQuickReceipts.com, http://organizingmaniacs.wordpress.com/2011/01/12/online-receipts-provided-by-myquickreceipts.com/ dated Jan. 12, 2011 printed Oct. 16, 2012 in 3 pages. |
Pagano, et al., “Information Sharing in Credit Markets,” Dec. 1993, The Journal of Finance, vol. 48, No. 5, pp. 1693-1718. |
Partnoy, Frank, Rethinking Regulation of Credit Rating Agencies: An Institutional Investor Perspective, Council of Institutional Investors, Apr. 2009, pp. 21. |
Planet Receipt—Home, http://www.planetreceipt.com/home printed Oct. 16, 2012 in 1 page. |
Planet Receipt—Solutions & Features, http://www.planetreceipt.com/solutions-features printed Oct. 16, 2012 in 2 pages. |
Press Release—“Helping Families Protect Against Identity Theft—Experian Announces FamilySecure.com; Parents and guardians are alerted for signs of potential identity theft for them and their children; product features an industry-leading $2 million guarantee”; PR Newswire; Irvine, CA; Oct. 1, 2007. |
Privacy Rights Clearinghouse, “Identity Theft: What to do if it Happens to You,” http://web.archive.org/web/19990218180542/http://privacyrights.org/fs/fs17a.htm printed Feb. 18, 1999. |
Quinn, Tom, “Low Credit Inquiries Affect Your Credit Score”, Credit.com, May 2, 2011, pp. 2. |
Rivera, Barbara, “New Tools for Combating Income Tax Refund Fraud”, https://gcn.com/Articles/2014/05/08/Insight-tax-fraud-tools.aspx?Page=1, May 8, 2014, pp. 3. |
Scholastic Inc.:Parent's Request for Information http://web.archive.org/web/20070210091055/http://www.scholastic.com/inforequest/index.htm as archived Feb. 10, 2007 in 1 page. |
Scholastic Inc.:Privacy Policy http://web.archive.org/web/20070127214753/http://www.scholastic.com/privacy.htm as archived Jan. 27, 2007 in 3 pages. |
ShoeBoxed, https://www.shoeboxed.com/sbx-home/ printed Oct. 16, 2012 in 4 pages. |
Singletary, Michelle, “The Littlest Victims of ID Theft”, The Washington Post, The Color of Money, Oct. 4, 2007. |
Sumner, Anthony, “Tackling The Issue of Bust-Out Fraud”, Retail Banker International, Jul. 24, 2007, pp. 4. |
Sumner, Anthony, “Tackling the Issue of Bust-Out Fraud”, Experian: Decision Analytics, Dec. 18, 2007, pp. 24. |
Sumner, Anthony, “Tackling the Issue of Bust-Out Fraud”, e-News, Experian: Decision Analytics, pp. 4, [Originally Published in Retail Banker International Magazine Jul. 24, 2007]. |
“TransUnion—Child Identity Theft Inquiry”, TransUnion, http://www.transunion.com/corporate/personal/fraudIdentityTheft/fraudPrevention/childIDInquiry.page as printed Nov. 5, 2009 in 4 pages. |
Truston, “Checking if your Child is an ID Theft Victim can be Stressful,” as posted by Michelle Pastor on Jan. 22, 2007 at http://www.mytruston.com/blog/credit/checking_if_your_child_is_an_id_theft_vi.html. |
Vamosi, Robert, “How to Handle ID Fraud's Youngest Victims,” Nov. 21, 2008, http://news.cnet.com/8301-10789_3-10105303-57.html. |
Webpage printed out from http://www.jpmorgan.com/cm/ContentServer?c=TS_Content&pagename=jpmorgan%2Fts%2FTS_Content%2FGeneral&cid=1139403950394 on Mar. 20, 2008, Feb. 13, 2006, New York, NY. |
Wilson, Andrea, “Escaping the Alcatraz of Collections and Charge-Offs”, http://www.transactionworld.net/articles/2003/october/riskMgmt1.asp, Oct. 2003. |
International Search Report and Written Opinion for Application No. PCT/US2007/06070, dated Nov. 10, 2008. |
International Search Report and Written Opinion for Application No. PCT/US2008/064594, dated Oct. 30, 2008. |
International Preliminary Report and Written Opinion in PCT/US2008/064594, dated Dec. 10, 2009. |
International Search Report and Written Opinion for Application No. PCT/US09/37565, dated May 12, 2009. |
Official Communication in Australian Patent Application No. 2012217565, dated May 12, 2017. |
Official Communication in Canadian Patent Application No. 2,827,478, dated Jun. 29, 2017. |
Extended European Search Report for Application No. EP12747205, dated Sep. 25, 2014. |
Supplementary European Search Report for Application No. EP12747205, dated Jun. 19, 2015. |
International Preliminary Report on Patentability in Application No. PCT/US2012/025456, dated Aug. 21, 2013. |
Official Communication in Australian Patent Application No. 2017203586, dated Jun. 18, 2019. |
Official Communication in Canadian Patent Application No. 2,827,478, dated Mar. 27, 2019. |
Number | Date | Country | |
---|---|---|---|
20180130157 A1 | May 2018 | US |
Number | Date | Country | |
---|---|---|---|
61444433 | Feb 2011 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15341096 | Nov 2016 | US |
Child | 15625883 | US | |
Parent | 14929835 | Nov 2015 | US |
Child | 15341096 | US | |
Parent | 13398471 | Feb 2012 | US |
Child | 14929835 | US |