System and process for performing purchase transactions using tokens

Information

  • Patent Grant
  • 8751391
  • Patent Number
    8,751,391
  • Date Filed
    Monday, March 31, 2003
    22 years ago
  • Date Issued
    Tuesday, June 10, 2014
    11 years ago
Abstract
The invention relates to a method and process by which an existing and large network of devices can be used by consumers to authenticate themselves, and permits each consumer to apply any of the various payments mechanisms available to him. The existing broadly distributed network is active and passive radio frequency identification (“RFID”) devices held by consumers. Various types of accounts are linked to devices and allow users to perform various purchase transactions, as well as non-financial transactions.
Description
FIELD OF THE INVENTION

The present invention relates generally to authentication tokens used for performing purchase transactions and other functionality, and more specifically to radio frequency identification devices for performing purchase transactions with an automobile as a trusted entity.


BACKGROUND OF THE INVENTION

Technologically new payments mechanisms have often been frustrated by the famous ‘chicken or the egg’ conundrum. Until there are lots of consumers with the new devices, merchants are reluctant to pay the cost of installing new readers for the technology. Similarly, consumers are reluctant to carry new devices until there are enough merchants to accept them. Despite increasing fraud associated with criminals ‘stripping’ the information from magnetic-stripe cards, the card associations have failed to deploy more secure alternatives. Smartcards are just one example of the devices that have failed to gain traction. The invention described here addresses this conundrum.


RFID technology is very broadly used today. RFID devices are currently used to identify: cattle; packages; owners of vehicles and for payments (e.g. the 5 MM active Exxon Mobil SpeedPass users). The technology is available in two forms, active and passive RFID devices.


E-Z Pass is an example of an active RFID device. In order to permit cars to be recognized at speeds up to 200 MPH, such active RFID devices have a battery and in response to a signal from readers, transmit a signal that can be recognized from a distance of 40 meters from the reader. At such distances, it is important that only the intended vehicle is charged for the toll. As a consequence, a lot of technology is focused on tracking a particular vehicle within a specific lane of traffic.


One large implementation of RFID technology is connected to passive devices. Passive RFID devices have no battery. These devices contain chips and an antenna. When the passive RFID device is in proximity of a reader, usually within inches but can be feet away, the chip is activated by an RF signal sent by the reader. The reader's broadcast RF signal is captured by the passive device's antenna and generates sufficient electrical energy to activate the chip. The passive RFID chip is hardwired to respond in a particular way, to be recognized by the reader.


Payments using RFID devices are beginning to emerge, though there are two impediments: merchants have balked at the $5,000-15,000 cost of installing RFID readers, because there are few RFID enabled consumers; and, issuers are reluctant to distribute tokens (at a cost of $8 each) unless there are enough merchants to generate sizeable payments.


The leading RFID payments providers include EZPass, Speedpass, 2Scoot and Freedompay. The primary goals for these entities are: to broaden as quickly as possible the number of merchants that accept RFID tokens; and to permit consumers freedom to choose multiple payment alternatives with a single token.


Many of the Exxon Mobil gas stations are Speedpass enabled. In addition, a number of McDonalds restaurants in the Chicago area are now using Speedpass payments, and one grocery store chain began piloting Speedpass in late 2002. However, even with all this new development, RFID payments are still rare.


Other drawbacks may also be present.


SUMMARY OF THE INVENTION

Accordingly, one aspect of the invention is to address one or more of the drawbacks set forth above.


Automobiles (or active communications devices) could be certified as trustworthy in applying and enforcing policies and procedures that will provide an environment for secure payments and other transactions. Current automobile design, including the use of electronic engine controllers (each of which have their own unique electronic identity) could be adjusted to include such functionality, and permit each particular car to include with each payment assurance proferred to counterparties its cryptographic certification electronically. The certification, could be standardized so the counterparties could clearly understand the level of trust applicable to a particular car. The car could also act as a conduit, trusted because of its certification to pass the credentials of the RFID device through to counter parties.


According to an exemplary embodiment of the invention, a system for performing at least one payment transaction includes a token having a unique identifier associated with a user or key of a particular automobile, where the automobile is held out as an entity trusted by merchants and the token interacts with a reader in the automobile to perform the at least one payment transaction and at least one account associated with the token, where the at least one account makes payments as directed by interaction of the token and the automobile reader.


According to a further exemplary embodiment of the invention, a system for registering a token includes means for receiving a unique identifier from the token, where the token and the unique identifier are associated with a user or key of a particular automobile, the automobile is held out as an entity trusted by a merchant and the token interacts with a reader to perform the at least one payment transaction, means for creating at least one account associated with the token, where the account includes account information and makes payments as directed by interaction of the token and the reader, means for receiving terms for the at least one account and means for storing the account information and the terms of the at least one account.


By way of another exemplary embodiment, a process for registering a token is provided, where the process includes receiving a unique identifier from the token, where the token and the unique identifier are associated with a user or key of a particular automobile, the automobile is held out as an entity trusted by a merchant and the token interacts with a reader to perform the at least one payment transaction, creating at least one account associated with the token, where the account includes account information and makes payments as directed by interaction of the token and the reader, receiving terms for the at least one account and storing the account information and the terms of the at least one account.


Another embodiment of the invention provides a computer readable medium having code for causing a processor to register a token. The medium includes code for receiving a unique identifier from the token, where the token and the unique identifier are associated with a user or key of a particular automobile, the automobile is held out as an entity trusted by a merchant and the token interacts with a reader to perform the at least one payment transaction, code for creating at least one account associated with the token, where the account includes account information and makes payments as directed by interaction of the token and the reader, code for receiving terms for the at least one account and code for storing the account information and the terms of the at least one account.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 illustrates a system for performing purchase transactions with a token according to an embodiment of the invention.



FIG. 2 illustrates a system for a reader and register according to an embodiment of the invention.



FIG. 3 is a flow chart illustrating a process for performing token and account registration according to an embodiment of the invention.



FIG. 4 is a flow chart illustrating a process for performing token and account registration according to an embodiment of the invention.





DETAILED DESCRIPTION OF THE INVENTION

A system and process for using a token for performing purchase transactions is described. The system and process makes use of existing tokens distributed for other purposes or for purposes of payment, as well as newly distributed tokens, such as radio frequency identification devices, to perform purchase transactions. One technical effect of the invention is to provide a system and process for performing purchase transactions using, among other items, a radio frequency identification device, as set forth in the Brief Description of the Invention, above and as more fully described here in the Detailed Description of the Invention. Various aspects and components of this system and process are described below. While the present invention is described in terms of tokens, and radio frequency identification devices in particular, it is recognized that other types of tokens may also be used.


The invention relates to a method and process by which an existing and large network of devices, as well as newly distributed devices, can be used by consumers to authenticate themselves, and permits each consumer to apply any of the various payments mechanisms available to him. The existing broadly distributed network is active and passive radio frequency identification (“RFID”) devices held by consumers.



FIG. 1 illustrates a system for performing purchase transactions with a token according to an embodiment of the invention. System 100 includes a network 102, such as the internet, or other type of network. Reader 104 reads token 106. In the example illustrated in FIG. 1, token 106 is an RFID device and reader 104 is equipped to read the RFID. However, it is recognized that other tokens may also be used. Further, while only one of each item is described for the convenience of explanation, it is understood that multiple devices may be used within the system 100.


System 100 also includes a central controller 108 and a token account storage device 110. Central controller 108 connects with network 102 and interfaces between network 102 and token account storage device 110. Token account storage device 110, which may include one or more devices, stores information about the accounts associated with token 106. Each token 106 has a unique identifier associated with the token. Further, one or more accounts are associated with the token 106. Accounts may include a specific account associated solely with the token 106. This account may store funds, such as a stored value card, or may have a line of credit that is paid off periodically, such as a credit card. Further, other accounts may also be associated with the token 106, such as debit accounts, credit card accounts, and other types of financial accounts. Token account storage device 110 may communicate with funding sources 120 to perform the purchase transaction. According to an embodiment of the invention, payment may be made directly by a transfer of funds from the user of the token to the merchant operating the reader, such as by a transfer of funds from a financial account of the user to the financial account of the merchant. Thus, a direct payment may be made with relatively little time delay.


According to an embodiment of the invention, indirect payments may be made, with an entity trusted by a merchant serving to act as an intermediary guaranteeing payment. Payments are not made immediately, but the intermediary guarantees the merchant will be paid, thereby facilitating the performance of the purchase transaction. By way of example, an automobile manufacturer may provide a service (e.g., On Star provided by General Motors) to purchasers of the automobile that provides road-side assistance, navigation assistance, and the like. The service may also provide a guarantee of payment to a merchant on behalf of the automobile owner. The merchant than may move forward with the purchase transaction, while the actual payment is made at a later time.


According to an embodiment of the invention, funding sources 120 may include any source of funds, such as a bank, lender, company, or any other source of funding, such as institutions associated with financial accounts. Further, stored value device 122 may contain funds for performing purchase transactions. For example, funds from a financial account may be transferred into stored value device 122 and then accessed to perform a purchase transaction. According to an embodiment of the invention, funds from stored value device 122 may be used to perform certain types of purchase transactions (e.g., certain merchants, transactions below a certain monetary threshold, etc.). General entity 124 is accessed by token account storage 110 to enable other transactions to be performed, such as accessing medical records, and transferring information.


An example of passive RFID technology is the anti-theft technology used by auto companies. Historically, car keys depended on simple mechanical locking systems. Cars have increased in value, and now these simple mechanical systems provide inadequate security. Today, most cars use both a mechanical locking system and an RFID authentication system. In addition to the standard mechanical lock, car companies have provided a much more rigorous electronic protection mechanism. Keys contain RFID chips, and built into the ignition switch is an RFID reader. Even if the mechanical key is replicated, unless the RFID reader validates the key, the car will not start. The engine controller, an electronic chip buried deep within the engine itself, must recognize the RFID device or the engine will not start.


Many passive RFID tokens for the automotive industry use automotive anti-theft ‘cryptographic challenge/response protocol.’ This protocol used by auto companies does not rely on a singular ID number hardwired into every RFID device. However, that singular identity number is always accessible using a standards based (QS2000) protocol. It is that identity number that is used for all Speedpass and 2Scoot devices. The RFID identity number is unique and can be used to access any payments system available to the owner of the token. An RFID device may use a standard protocol to provide a transport mechanism for information, such as the frequency of the RFID device, etc. According to an embodiment of the invention, security protocol may also be proprietary to a receiver. However, non secret information may be available to all, such as that every RFID device has unique number and that the unique number is necessary for access.


Authentication list 118 determines if reader 104 and/or token 106 is authentic and permitted to perform transactions. Authentication list 118 may be used as security to reduce the chances of fraud. According to an embodiment of the invention, token 106 may include information about the address (e.g., interne address) of central controller 108. Reader 104 may then access central controller 108 to perform the purchase transaction. Authentication list 118 may be accessed to ensure that token 106 is allowed to perform a transaction. For example, authentication list 118 may contain a list of tokens 106 that are in good standing, or that are delinquent. While FIG. 1 illustrates authentication list 118 in communication with central controller 108, it is understood that authentication list 118 may be in communication with or resident on reader 104 and/or register/reader 112. Authentication list 118 may also ensure that reader 104 is allowed to access central controller 108. According to an embodiment of the invention, authentication list 118 may also include a list of authorized readers and register/readers that are permitted to access central controller 108.


System 100 of FIG. 1 also includes a register/reader 112. It is understood that while the reader 104, and the register/reader 112 are included in system 100, other types of readers and devices for token 106 to interact with network 102 may also be used. Further, various functionalities may be provided by register/reader 112 as necessary to implement one or more aspects of the present invention. Register/reader 112, described in greater detail in FIG. 2 below, enables a user to register a token, register a financial account to be associated with the token, provide terms for purchase transactions and other information.



FIG. 2 illustrates token 106 in communication with reader/register 112. According to an embodiment of the invention, reader/register includes a receiver 220, processor 222, display 224, input 226, printer 228, storage 230, bioinformatics reader 232 and input/output 234. According to the embodiment illustrated in FIG. 2, token 106 is an RFID device. Receiver 220 receives signals from token 106 and transmits signals to token 106. The signals are converted and sent to processor 222 for appropriate processing. Information from the processing may be displayed at display 224. Display 224 may include a RGB monitor or other manner of displaying information. For example, display 224 may display the amount of the purchase transaction, and, where token 106 has a plurality of accounts associated with it, a selection of which account to perform the purchase transaction. Other functionalities, such as a security and encryption, customer loyalty programs, and approval lists, may also be available in register/reader 112.


Input 226 enables a user to interact with register/reader 112. Input 226 may include a keyboard, touch-screen, mouse, number pad or other manner of inputting information. For example, where token 106 has a plurality of accounts associated with it, display 224 may display options for the financial accounts to perform the purchase transaction. The user can select the appropriate financial account using input 226. At the conclusion of the purchase transaction, a receipt may be printed by printer 228.


Information from the purchase transaction is stored in storage 230. Information may then be transmitted through input/output module 234 to the network. For example, information may be stored in storage 230 for a set period of time, and then communicated to purchase transaction account storage 116 (e.g., hourly, daily, weekly, monthly, etc.).


In addition, bio-metrics module 232 provides bio-metric information about the user of the token 106. Bio-metric module 232 may be a retina scan, a finger print reader or other manner of providing bio-metric information. According to an embodiment of the invention, for some information and transactions, it may be desirable for the user of token 106 to confirm his or her identity. This may be confirmed by providing bio-metric information, by entering a personal identification number (“PIN”) through input 226, or through other manners of confirmation.


For example, at a bank, office or store, a register/reader station for RFID tokens may have side-by-side a normal magnetic-stripe reader and a RFID reader. The process by which a credit card holder could register his personal car key may involve swiping the credit card, touching the RFID token, for example the car key, and presenting the credit card and signature, for validation by an attendant.


Invisible to the customer would be a pre-authorization check of the credit card, and registration of the card with the token's unique identification number. The registration will cause the particular credit card to become the default payment mechanism for the token. In addition to the signature check, other information could be captured at registration, e.g., social security number, mother's maiden name, address, car license plate number, etc. The goal of registering the token may be to obtain VISA, MasterCard, American Express, or other credit card approval that the token is as secure as a card present transaction and thus entitled to the same interchange. Additionally, registering the token may occur in a closed loop environment, where an outside financial network, such as credit card network, is not involved.


Central controller 114 of FIG. 1 also provides an interface between network 102 and account storage 116. Information from reader 104 and/or register/reader 112 is transmitted to central controller 114 to be stored in account storage 116. Information to be stored may include details regarding the purchase transaction, as well as other statistics. For example, purchase transaction information may be stored in account storage 116 for a set period of time, and then communicated to token account storage 110 to finalize the purchase transaction (e.g., daily, weekly, monthly, etc.). Alternatively, account storage 116 may communicate directly with funding sources 120 to finalize the purchase transaction.


The invention encompasses a means by which a consumer can register his RFID car key, to permit him to authenticate himself to a payments network and to execute payment transactions. Registration might be as simple as swiping his credit card, and immediately subsequently having his car key's RFID number read. At the same time, the owner of the car key can be asked for pertinent personal information. Some credit card companies may be more comfortable if the consumer executes a signature at the same time. A further means of assuring the correct user is registered would be to mail a temporary PIN to the credit cardholder's home address. Another means to verify the registration might be to validate with the department of motor vehicles that the registrant is in fact an owner of the specified vehicle. With one card registered to the RFID car key, it should be easy asynchronously to register his other bank/credit cards, so long as the mailing address is the same.



FIG. 3 is a flow chart illustrating a process for performing token and account registration according to an embodiment of the invention. At step 305, an RFID device is activated. Although the example illustrated in FIG. 3 used an RFID device as the token, it is understood that other types of tokens may also be used. Activation of an RFID device may include transmitting a signal to a passive RFID device, communicating with a server, or activating the appropriate power source in an active RFID device. According to an embodiment of the invention, activation of the token, such as an RFID device, occurs when the server recognizes the RFID device, thereby enabling purchase transactions and other transactions to be performed. While the process illustrated in FIG. 3 discloses certain steps performed in a particular order, it should be understood that the present invention may be practiced by adding one or more steps to the process, omitting steps within the process, and/or altering the order in which one or more steps are performed.


At step 310, the unique identification identifier is read, and an account is created for the RFID device at step 315. The terms of the account are established at step 320, and the account information is stored at step 325. Terms may include permissions to use the account, the amount of the purchase transaction authorization for the account, the priority of the account if more than one financial account is associated with the RFID device, or other terms for performing the purchase transaction. By way of illustrative example, terms for a particular account may include authorizing purchase transactions under a particular amount without requiring a validation or confirmation. By way of another illustrative example, certain accounts may not be valid at certain times of the day, or for certain merchants. By way of a further illustrative example, one account may be set as a default, such that unless otherwise selected by the user of the RFID device, the default financial account will be used to perform the purchase transaction. Other terms may also be used. By way of another example, certain transactions may be performed using a specific financial account (e.g., under $50) or those made at specific merchants or types of merchants (e.g., purchases at gas stations).


A financial account is registered at step 330. Financial accounts may include credit card accounts, bank accounts, debit accounts, or other type of monetary accounts direct or indirect. The financial account is associated with the RFID device and the unique identifier at step 335. By associating a financial account with the RFID device and the unique identifier, the financial account may be used to perform a purchase transaction.


At step 340, the terms of the financial account are established. The terms for the financial account may be the same as those set forth above. At step 345, the information for the financial account is stored. At step 350, a determination is made whether additional financial accounts are to be registered with the RFID device. If yes, the process returns to step 330 to register the financial account. If not, the process ends at step 355.



FIG. 4 is a flow chart illustrating a process for performing token and account registration according to an embodiment of the invention. At step 405, an RFID device is activated. Although the example illustrated in FIG. 4 used an RFID device as the token, it is understood that other types of tokens may also be used. Activation of an RFID device may include transmitting a signal to a passive RFID device, activating at a server or activating the appropriate power source in an active RFID device. While the process illustrated in FIG. 4 discloses certain steps performed in a particular order, it should be understood that the present invention may be practiced by adding one or more steps to the process, omitting steps within the process, and/or altering the order in which one or more steps are performed.


At step 410, the unique identification identifier is read. At step 415, the network protocol used for the particular purchase transaction is determined. According to an embodiment of the invention, different readers may operate on the same frequency, but use different protocols. A token, such as an RFID device, may be programmed in a specific protocol, and the reader may be programmed to determine what protocol is being used and process the information accordingly.


The purchase amount is generated at step 420. At step 425, the purchase transaction is authorized. Authentication may include inputting a PIN, providing bio-metric information, inputting a password, or other manner of authentication. Once authenticated, authorization may include confirming that a purchase transaction has been approved. According to an embodiment of the invention, authorization may be completed when the token is authorized at the server, such as central controller 108. As described previously in reference to FIG. 1, authentication list 118 determines if reader 104 and/or token 106 is authentic and permitted to perform transactions. Authentication list may be used as security to reduce the chances of fraud. According to an embodiment of the invention, token 106 may include information about the address (e.g., internet address) of central controller 108. Reader 104 may then access central controller 108 to perform the purchase transaction. Authentication list 118 may be accessed to ensure that token 106 is allowed to perform a transaction. For example, authentication list 118 may contain a list of tokens 106 that are in good standing, or that are delinquent. While FIG. 1 illustrates authentication list 118 in communication with central controller 108, it is understood that authentication list 118 may be in communication with or resident on reader 104 and/or register/reader 112. Authentication list 118 may also ensure that reader 104 is allowed to access central controller 108. According to an embodiment of the invention, authentication list 118 may also include a list of authorized readers and register/readers that are permitted to access central controller 108.


At step 430, a determination is made whether more than one financial account is associated with the RFID device. If only one financial account is associated with the RFID device, the account is charged for the purchase transaction at step 435. The account may be charged using any conventional process, such as that used for credit card and debit card transactions. Other manners for charging an account may also be used.


At step 450, the purchase transaction is then finalized. Finalizing the purchase transaction may include printing a receipt, confirming that the transaction has been made, or other steps used to conventionally finalize a purchase.


If there is more that one financial account associated with the RFID device, an account is selected at step 440 and the selected account is charged for the purchase transaction at step 445. Selecting an account may involve the user of the RFID device selecting the particular account, or, if no selection has been made, selecting the account designated as the default account. The account may be charged using any conventional process, such as that used for credit card and debit card transactions. Other manners for charging an account may also be used.


In the process of seeking authorization for a particular transaction, the account specified to be debited may not have adequate resources to cover the transaction. In that event, whether the account was funded on a pre-pay or post-pay basis, the Central Controller 108, could: (i) by prior arrangement, automatically top-up the account with additional resources by seeking additional credit/funds from a specified account; (ii) seek funds from any other default funding/credit accounts; or (iii) reject the transaction. Other processes may also be used.


Again, at step 450, the purchase transaction is then finalized. Finalizing the purchase transaction may include printing a receipt, confirming that the transaction has been made, or other steps used to conventionally finalize a purchase. The process then ends at step 455.


In addition to using the RFID car key or other token for making payments, the same authentication mechanism is useful generally to validate one's identity. For example, the RFID car key can be used to authenticate oneself to a virtual private network (“VPN”), or other secure networks, for physical access to premises, for buying and selling securities or other non-payment transactions, for purposes of timecards, for loyalty programs, or to one's medical insurer. The token can be used both with and without PIN, bio-metric, passwords or other identification confirmations. For lower value transactions, a consumer might choose the convenience of not requiring a PIN. For larger transactions, a consumer may choose to require the use of a PIN or bio-metric information.


Using a single device for multiple purposes will be much more convenient for consumers, who can begin to skinny down their wallets. If the token is lost, it is also easier for the consumer to revoke all his powers at once. The consumer can simply revoke the token's authorities and instantaneously all the powers of the token will be lost. As relevant information is already available, re-registering is eased as the new token need only be associated with the financial accounts.


Currently, most RFID devices operate at around 134 kHz. However, a new generation of RFID devices may operate at other frequencies, such as 13 MHz. Higher frequency devices may be less expensive to build and will permit higher bandwidth (i.e. quicker) communications. About 70% of the 40 million cars produced in 2001 were equipped with RFID anti-theft systems. The cars have an RFID reader in the ignition switch. Unless the electronic engine controller recognizes the car key's RFID token, the car will not start. According to an embodiment of the invention, various aspects of the RFID car keys make them useful as payment devices. First, each key has a unique ID number. Such car keys protect the owner's unique number much more securely than a magnetic stripe card. Second, there is a single, standard protocol that permits RFID readers to access the unique number on all RFID chips. Thus, standard RFID readers permit ordinary car keys to become trusted hardware authentication tokens. After a simple registration process, consumers may use their car keys to make payments at any store with an ordinary RFID reader.


According to an embodiment of the invention, a primary registration may require the physical presence of the token. Additional credit cards and other financial accounts with the same name and billing address could be added to the token at a registration station merely by swiping the new credit card and touching the token, one-after-the-other. Subsequent cards could also be added online, or by using a voice response unit (VRU) (though security may require some additional identification information).


Token owners can choose to use any of their available payment mechanisms at any merchant, and the owner's payment choices can be changed easily. The owner will make payment elections online or over a VRU and will be able to specify the mode of authentication required for different types of transactions, e.g. require a PIN for online or larger payments.


A token, such as an RFID device, will be accepted at any merchant that takes any RFID payments. In the simplest case, a consumer will simply bring the token close to the reader at checkout. The reader will automatically debit the payment account specified by the consumer. Consumers may specify more than one payment mechanism for a merchant. In that case, a merchant's payment wizard will select the payment mechanism with the lowest merchant discount. If the consumer has not specified a particular payment mechanism for a merchant, the default payment method will be charged.


Online purchases are also possible when a computer is equipped with an RFID reader. The incremental cost of adding that functionality to a personal computer (“PC”) may be minimal. With a widely deployed base of tokens, RFID enabled PCs can offer very substantial benefits in addition to secure payments. PCs equipped with RFID readers could be used to secure data on the PC, to access secure networks, for VPNs, for remote access, etc.


According to an embodiment of the invention, consumers may be able selectively to impose additional security protections. A PIN may be required for purchases at specific stores, or for amounts larger than a specified ceiling. Consumers may also choose to impose a daily or weekly maximum aggregate spending limit. Subordinate tokens may be restricted to purchases from specific stores, or for age appropriate materials (especially useful for online purchases).


By way of an example of an embodiment of the invention, a car might be sold with one master token, registered as the property of the owner of the car. Using the master token, the owner of a car might create, authorize or reject driving privileges, payment capabilities, etc., for other users of tokens to his car. The master token holder might act as the registration agent for subordinate tokens, and could also be empowered to revoke or suspend the powers for subordinate tokens. An additional validation check before registering a master token might be to compare the credit card billing address with the address of the registered owner of the vehicle.


Similarly, a token might be registered to the owner of a house fitted with an electronic RFID lock. The house master token could be used to register other authorized users of the house. Such registration might be very simple, e.g., touch the house master token, insert a PIN and then touch the subordinate token. Subordinate tokens might have time-limited efficacy, e.g., a teenager's token might not work after his curfew.


One aspect of the RFID functionality is their use for personalization, as well as for heavier payments and authorizations. Readers are not bound by the same constraints as the passive RFID devices (size, cost, etc.). Typical RFID readers will have some source of power and be connected to some device, network, or system that takes advantage of the RFID validation, e.g., POS, EPoS, ECR, fire wall, engine controller, physical lock to premises, etc. The RFID reader may be equipped with an antenna tuned to listen for faint signals at a specific frequency, e.g., 134 kHz. More complex RF communications could simply be enabled with software. The two-way, secure communication could use RF (with the same frequency as the passive RFID device or a different one), or other protocols such as Bluetooth or 802.11.


One manner for expanding the functionality of the passive RFID device is to link its powers to an active device. Such devices might include a wire line or cellular phone, computer, Blackberry, PDA or other similar device (hereinafter also referred to as “Active Communications Device”). Such Active Communications Devices typically have power, or access to power, one or more communications channels, a CPU that is much more powerful than the passive RFID, memory that can be dynamically accessed, data entry capability and a visual display. The passive RFID token that is validated might be electrically connected to the Active Communications Device; physically attached, but not electrically connected, e.g. RFID chip embedded in the faceplate of a cell phone; or, separate from the Active Communications Device. For example, when an Active Communications Device is a mobile telephone, an RFID device may be located in face plate of the telephone. The RFID device may be a passive device, and the mobile telephone may have an RFID reader. The mobile telephone then communicates the necessary information. Alternatively, the RFID device may be physically connected to the mobile telephone, such as by electrical leads. The link between the RFID and the Active Communications Device may be established at the manufacturer, or later, by direct or indirect contact with registration authority, or over a network. Other embodiments may also be used.


Once an authenticated passive RFID is recognized and accepted by an RFID reader, the holder of the RFID device could take advantage of that trusted authentication, to engage an active device capable of more complex, secure communications. The key step to achieve this result will be to transfer the passive RFID's trusted validation, to a more capable communications device. There are many different ways for that trust to be transferred, three different examples are disclosed here.


While two examples for linking, by prior arrangement, an authenticated passive RFID device to an Active Communications Device are disclosed below (i.e., Example 1 & Example 2), it is understood that other examples are also within the scope of the present invention.


EXAMPLE 1
Secure Linking of Passive RFID Devices to Active Communications Devices

Just as a passive RFID device can be registered to enable multiple payments modes (e.g., credit cards, debit and stored value accounts, etc.), and other non-payment authorizations; RFID devices can be securely linked to other devices, including Active Communications Devices. By registering a passive RFID device with an Active Communications Device's unique identifier, that Active Communications Device can inherit all the authentication and authorization capabilities of the passive RFID device. Thereafter, the holder of a passive RFID device could use it wherever it is convenient (e.g., where a merchant's POS is capable only of recognizing a passive RFID device) and would also use the same set of capabilities using his Active Communications Device to take advantage of less limited reader capabilities where available.


EXAMPLE 2
Shared Secret Linking Passive RFID Devices to Active Communications Devices

In the case of automotive security, during secure instantiation of each token, the engine controller communicates its secret to the token. The engine controller will start the car only for ‘friendly’ tokens that know its secret. For example, controller A (the engine controller) shares its secret with token B (the token). Because controller A controls distribution of its secret, controller A will trust all token Bs that know its secret.


To establish a link between a passive RFID device and an Active Communications Device that can be trusted by RFID readers may be somewhat more complex. In a first embodiment, the Active Communications Device may securely share its secret with the passive RFID device in a manner similar to the way that engine controllers instantiate tokens and in a carefully controlled circumstance. The passive RFID device subsequently may communicate to a RFID reader both the passive RFID device's unique identifier number and the Active Communications Device's shared secret. The RFID reader may then trust communications with the Active Communications Device that identified itself with the same secret. Alternatively, the Active Communications Device could be certified by a payment authority entrusted to pass RFID information for payment authorization.


In a second embodiment, an authenticated passive RFID device separately communicates to the RFID reader a secret. The RFID reader then can trust the Active Communications Device that knows the authenticated passive RFID device's secret. Based on the security model, the trust can be time limited (e.g. where the RFID reader will recognize the Active Communications Device only when the authenticated passive RFID device and C are used contemporaneously), or not.


EXAMPLE 3
Ad Hoc Linkage of Passive RFID Devices to Active Communications Devices

Linkage of a passive RFID device to an Active Communications Device by prior arrangement may be useful when that linkage is intended to be persistent. There are circumstances where such persistence is not desirable. For example, suppose in the future a driver rents a car and wishes to use his passive RFID token to pay tolls. Rental cars are used by many different people, persistent linkage of RFID devices personal to drivers present problems for such temporary connections. One means to provide for payment of tolls would be to take advantage of the driver's payment capability, by simply using a car's transmitter to broadcast that capability to the toll collectors. The system would work so long as the car validates the drivers ability to pay and is trusted as a payment agent or the transmitter can directly pass the driver's credentials.


Small, relatively inexpensive toll tags permit cars to be recognized and charged for tolls while traveling as fast as 200 MPH. Toll tags are active RFID devices, with batteries and the ability to transmit signals. Across the country, there are a plethora of divergent toll tag protocols that are not interoperable. It would be cheap and easy to build a single, multi-purpose electronic device to permit cars to communicate with all the various toll tag readers. If the car could authenticate a driver's ability to pay, drivers might travel across the country without ever stopping to pay cash for tolls.


Prior Registration with Toll Authorities.


Drivers could individually register with each different toll authority, or execute a single, multi-registration that covers many toll authorities. The toll registration could provide for a single stored value account, which would automatically be debited by each of the various toll authorities and topped-up using a single source of payment. The payment account could be linked to a single RFID device.


For each car enabled with the universal toll transmitter, drivers could authenticate themselves with their personal RFID token, and proceed through the speedier toll tag lines, no muss no fuss. Since most new cars already have RFID readers, it would be quite easy to enable a second site convenient to permit drivers to authenticate their passive RFID devices.


Ad Hoc Payment of Tolls.


If a passive RFID device has a broadly accepted payment mechanism attached, sometimes prior registration with the toll authorities might be avoided. The toll collector could optimistically accept the RFID number, and seek payment. Photographing the license plate or some similar mechanism could provide anti-fraud protection.


According to an embodiment of the invention, the systems and processes described in this invention may be implemented on any general or special purpose computational device, either as a standalone application or applications, or even across several general or special purpose computational devices connected over a network and as a group operating in a client-server mode. According to another embodiment of the invention, a computer-usable and writeable medium having a plurality of computer readable program code stored therein may be provided for practicing the process of the present invention. The process and system of the present invention may be implemented within a variety of operating systems, such as a Windows® operating system, various versions of a Unix-based operating system (e.g., a Hewlett Packard, a Red Hat, or a Linux version of a Unix-based operating system), or various versions of an AS/400-based operating system. For example, the computer-usable and writeable medium may be comprised of a CD ROM, a floppy disk, a hard disk, or any other computer-usable medium. One or more of the components of the system or systems embodying the present invention may comprise computer readable program code in the form of functional instructions stored in the computer-usable medium such that when the computer-usable medium is installed on the system or systems, those components cause the system to perform the functions described. The computer readable program code for the present invention may also be bundled with other computer readable program software. Also, only some of the components may be provided in computer-readable code.


Additionally, various entities and combinations of entities may employ a computer to implement the components performing the above-described functions. According to an embodiment of the invention, the computer may be a standard computer comprising an input device, an output device, a processor device, and a data storage device. According to other embodiments of the invention, various components may be computers in different departments within the same corporation or entity. Other computer configurations may also be used. According to another embodiment of the invention, various components may be separate entities such as corporations or limited liability companies. Other embodiments, in compliance with applicable laws and regulations, may also be used.


According to one specific embodiment of the present invention, the system may comprise components of a software system. The system may operate on a network and may be connected to other systems sharing a common database. Other hardware arrangements may also be provided.


Other embodiments, uses and advantages of the present invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. The specification and examples should be considered exemplary only. The intended scope of the invention is only limited by the claims appended hereto.


While the invention has been particularly shown and described within the framework of performing purchase transactions using a token from an automobile, it will be appreciated that variations and modifications can be effected by a person of ordinary skill in the art without departing from the scope of the invention. For example, one of ordinary skill in the art will recognize that various types of tokens may be used to perform purchase transactions and that other types of transactions may also be performed using a token. Furthermore, one of ordinary skill in the art will recognize that such processes and systems do not need to be restricted to the specific embodiments described herein.

Claims
  • 1. A method for performing at least one payment transaction comprising: registering, by a central controller comprising at least one computer processor, a Radio Frequency Identification (RFID) token of a consumer and a financial account of the consumer, said registering comprising:receiving, via a register station, a unique identifier of the RFID token;receiving, via the register station, account information for the financial account;validating the consumer;listing the RFID token as a trusted authenticated RFID token permitted to perform transactions; andstoring the unique identifier of the RFID token in association with the financial account so that the financial account can be used to perform said transactions using the unique identifier of the RFID token;transferring, via the central controller, trust associated with the trusted authenticated RFID token to an active communications device (ACD) for a limited time period, said transferring comprising:securely sharing, by the ACD, a secret of the ACD with the trusted authenticated RFID token;receiving from the trusted authenticated RFID token, via the register station, both the unique identifier of the trusted authenticated RFID token and the shared secret of the ACD; andstoring the shared secret of the ACD in association with the trusted authenticated RFID token so that the ACD is permitted to perform said transactions, as a trusted ACD, on behalf of the trusted authenticated RFID token for the limited time period; andsubsequent to said registering and said transferring and within the limited time period, performing at least one payment transaction using the trusted ACD, said performing comprising:communicating, by the trusted ACD, the secret shared with the trusted authenticated RFID token to a RFID reader of a payee;verifying, by the central controller, that the communicated secret is the shared secret of the ACD stored in association with the trusted authenticated RFID token; andif verified, making payment to the payee for a transaction amount from the financial account to a payee account.
  • 2. The method of claim 1, wherein the register station is located at a bank, an office or a store.
  • 3. The method of claim 1, wherein the RFID token is a passive device.
  • 4. The method of claim 1, wherein the RFID token is an active device.
  • 5. The method of claim 1, wherein the financial account is a stored value account, a debit account, or a credit card account.
  • 6. The method of claim 1, wherein the RFID token is a key of a particular automobile.
  • 7. The method of claim 6, wherein validating the consumer comprises: confirming with a department of motor vehicles that the consumer is an owner of the particular automobile.
  • 8. The method of claim 1, wherein validating the consumer comprises: receiving from the consumer a consumer signature or a temporary PIN that was mailed to the consumer.
  • 9. The method of claim 1, wherein the ACD is a cellular phone, a computer, or a personal digital assistant.
  • 10. The method of claim 1, wherein the ACD is an engine controller of an automobile.
  • 11. The method of claim 1, wherein the ACD is a toll transmitter that is accepted by a plurality of toll authorities.
  • 12. The method of claim 1, wherein the ACD is a toll transmitter, the payee is a toll authority, and the transaction amount is a toll payment amount.
PRIORITY

The present application claims priority to Provisional Application Ser. No. 60/368,155, filed on Mar. 29, 2002.

US Referenced Citations (1201)
Number Name Date Kind
3230650 Orkin Jan 1966 A
3634669 Soumas et al. Jan 1972 A
3713235 Roberts Jan 1973 A
3855033 Staats Dec 1974 A
3938090 Borison et al. Feb 1976 A
3946206 Darjany Mar 1976 A
4022943 Erb et al. May 1977 A
4047033 Malmberg et al. Sep 1977 A
4058220 Torongo Nov 1977 A
D248203 Morse Jun 1978 S
4123747 Lancto et al. Oct 1978 A
4130881 Haessler et al. Dec 1978 A
4205780 Burns Jun 1980 A
4254474 Cooper et al. Mar 1981 A
D259048 Peterson Apr 1981 S
4264808 Owens et al. Apr 1981 A
4321672 Braun et al. Mar 1982 A
4338587 Chiappetti Jul 1982 A
4346442 Musmanno Aug 1982 A
4355372 Goldberg Oct 1982 A
4376978 Musmanno Mar 1983 A
4380699 Monnier et al. Apr 1983 A
4453074 Weinstein Jun 1984 A
4454414 Benton Jun 1984 A
4465206 Sorel et al. Aug 1984 A
4479995 Suzuki et al. Oct 1984 A
4545838 Minkus et al. Oct 1985 A
4575127 Michel Mar 1986 A
4575621 Dreifus Mar 1986 A
4597046 Musmanno et al. Jun 1986 A
4598367 DeFrancesco et al. Jul 1986 A
4605844 Haggan Aug 1986 A
4614861 Pavlov et al. Sep 1986 A
4634845 Riley Jan 1987 A
4642768 Roberts Feb 1987 A
4643452 Chang Feb 1987 A
4647714 Goto Mar 1987 A
4648189 Michel Mar 1987 A
4650981 Foletta Mar 1987 A
4669730 Small Jun 1987 A
4674042 Hernandez et al. Jun 1987 A
4674044 Kalmus et al. Jun 1987 A
4697072 Kawana Sep 1987 A
4700055 Kashkashian, Jr. Oct 1987 A
4701601 Francini et al. Oct 1987 A
4707594 Roth Nov 1987 A
4723212 O'Brien Feb 1988 A
4736294 Le Grand Apr 1988 A
4739478 Roberts et al. Apr 1988 A
4747620 Kay et al. May 1988 A
4750119 Robertson Jun 1988 A
4752676 Leonard et al. Jun 1988 A
4755661 Ruebsam Jul 1988 A
4760604 Cooper Jul 1988 A
4766539 Fox Aug 1988 A
4774663 Musmanno et al. Sep 1988 A
4777563 Teraoka et al. Oct 1988 A
4789928 Fujisaki Dec 1988 A
4817949 Bachman et al. Apr 1989 A
4822985 Boggan et al. Apr 1989 A
4831242 Englehardt May 1989 A
4831526 Luchs May 1989 A
4837422 Dethloff et al. Jun 1989 A
4845347 McCrindle Jul 1989 A
4851650 Kitade Jul 1989 A
4856857 Takeuchi et al. Aug 1989 A
4859187 Peterson Aug 1989 A
4859837 Halpern Aug 1989 A
4866545 LaManna et al. Sep 1989 A
4866634 Reboh Sep 1989 A
4870259 Boggan et al. Sep 1989 A
4882675 Nichtberger et al. Nov 1989 A
4897533 Lyszczarz Jan 1990 A
4897811 Scofield Jan 1990 A
D305887 Nishimura Feb 1990 S
4903201 Wagner Feb 1990 A
4906826 Spencer Mar 1990 A
4908521 Boggan et al. Mar 1990 A
4910672 Off Mar 1990 A
4928001 Masada May 1990 A
4931623 Nakamura et al. Jun 1990 A
4938830 Cannistra Jul 1990 A
4941090 McCarthy Jul 1990 A
4943707 Boggan Jul 1990 A
4948174 Thomson et al. Aug 1990 A
4953085 Atkins Aug 1990 A
D310386 Michels et al. Sep 1990 S
4954985 Yamazaki Sep 1990 A
4961142 Elliott et al. Oct 1990 A
4968873 Dethloff et al. Nov 1990 A
4972504 Daniel, Jr. Nov 1990 A
4975840 DeTore et al. Dec 1990 A
4977501 Lefevre Dec 1990 A
4978401 Bonomi Dec 1990 A
4992940 Dworkin Feb 1991 A
5025139 Halliburton, Jr. Jun 1991 A
5025372 Burton et al. Jun 1991 A
5041972 Frost Aug 1991 A
5049728 Rovin Sep 1991 A
5054096 Beizer Oct 1991 A
5072380 Randelman et al. Dec 1991 A
5093907 Hwong et al. Mar 1992 A
5095194 Barbanell Mar 1992 A
5117355 McCarthy May 1992 A
5121945 Thomson et al. Jun 1992 A
5122950 Mee Jun 1992 A
5146068 Ugawa et al. Sep 1992 A
5163098 Dahbura Nov 1992 A
5173851 Off et al. Dec 1992 A
5175416 Mansvelt Dec 1992 A
5175682 Higashiyama Dec 1992 A
5177342 Adams Jan 1993 A
5180901 Hiramatsu Jan 1993 A
5185697 Jacobs et al. Feb 1993 A
5187750 Behera Feb 1993 A
5191522 Bosco et al. Mar 1993 A
5192947 Neustein Mar 1993 A
5201010 Gabriel Apr 1993 A
5202286 Nakatani Apr 1993 A
5202826 McCarthy Apr 1993 A
5206488 Teicher Apr 1993 A
5206803 Vitagliano Apr 1993 A
5214700 Pinkas et al. May 1993 A
5218631 Katz Jun 1993 A
5220500 Baird Jun 1993 A
5220501 Lawlor Jun 1993 A
5227874 Von Kohorn Jul 1993 A
5231571 D'Agostino Jul 1993 A
5237620 Deaton Aug 1993 A
5239462 Jones Aug 1993 A
5245535 Weiss et al. Sep 1993 A
5257486 Holmwall Nov 1993 A
5276728 Pagliaroli et al. Jan 1994 A
5278751 Adiano Jan 1994 A
5287268 McCarthy Feb 1994 A
5287269 Dorrough et al. Feb 1994 A
5297026 Hoffman Mar 1994 A
5297032 Trojan et al. Mar 1994 A
5305196 Deaton et al. Apr 1994 A
5311594 Penzias May 1994 A
5321933 Seifert et al. Jun 1994 A
5326959 Perazza Jul 1994 A
5326960 Tannenbaum Jul 1994 A
5327508 Deaton et al. Jul 1994 A
5339239 Manabe et al. Aug 1994 A
5349633 Katz Sep 1994 A
5350906 Brody et al. Sep 1994 A
5351187 Hassett Sep 1994 A
5352877 Morley Oct 1994 A
5361062 Weiss et al. Nov 1994 A
5365575 Katz Nov 1994 A
5380046 Stephens Jan 1995 A
5381470 Cambray et al. Jan 1995 A
5382784 Eberhardt Jan 1995 A
5383113 Kight Jan 1995 A
5383687 Suess et al. Jan 1995 A
5388165 Gabriel Feb 1995 A
5396621 MacGregor et al. Mar 1995 A
5397881 Mannik Mar 1995 A
RE34915 Nichtberger et al. Apr 1995 E
5409092 Itako et al. Apr 1995 A
5412190 Kopesec May 1995 A
5412192 Hoss May 1995 A
5413341 Lieberman May 1995 A
5424524 Ruppert et al. Jun 1995 A
5430644 Deaton et al. Jul 1995 A
5432326 Noblett et al. Jul 1995 A
5440108 Tran et al. Aug 1995 A
5444794 Uhland Aug 1995 A
5444844 Inoue Aug 1995 A
5448471 Deaton et al. Sep 1995 A
5450477 Amarant et al. Sep 1995 A
5450491 McNair Sep 1995 A
5453601 Rosen Sep 1995 A
5455407 Rosen Oct 1995 A
5457305 Akel et al. Oct 1995 A
5459306 Stein et al. Oct 1995 A
5465206 Hilt et al. Nov 1995 A
5466919 Henry Nov 1995 A
5466920 Nair et al. Nov 1995 A
5471669 Lidman Nov 1995 A
5477038 Levine et al. Dec 1995 A
5477040 LaLonde Dec 1995 A
5481094 Suda Jan 1996 A
5481647 Brody Jan 1996 A
5482139 Rivalto Jan 1996 A
5483444 Malark Jan 1996 A
5483445 Pickering Jan 1996 A
5489123 Roshkoff Feb 1996 A
5490060 Malec Feb 1996 A
5495981 Warther Mar 1996 A
5500514 Veeneman et al. Mar 1996 A
5500890 Rogge et al. Mar 1996 A
5502805 Anderson et al. Mar 1996 A
5503891 Marshall et al. Apr 1996 A
5513102 Auriemma Apr 1996 A
5523942 Tyler Jun 1996 A
5530232 Taylor Jun 1996 A
5532689 Bueno Jul 1996 A
5537314 Kanter Jul 1996 A
5541583 Mandelbaum Jul 1996 A
5544086 Davis et al. Aug 1996 A
5546446 Tsunokawa et al. Aug 1996 A
5550734 Tater Aug 1996 A
5551021 Harada Aug 1996 A
5553120 Katz Sep 1996 A
5557092 Ackley et al. Sep 1996 A
5557516 Hogan Sep 1996 A
5563934 Eda Oct 1996 A
5578808 Taylor Nov 1996 A
5581064 Riley et al. Dec 1996 A
5583778 Wind Dec 1996 A
5583933 Mark Dec 1996 A
5585787 Wallerstein Dec 1996 A
5592560 Deaton et al. Jan 1997 A
5592590 Jolly Jan 1997 A
5603025 Tabb Feb 1997 A
5604542 Dedrick Feb 1997 A
5606496 D'Agostino Feb 1997 A
5608785 Kasday Mar 1997 A
5611052 Dykstra Mar 1997 A
5612868 Off et al. Mar 1997 A
5615109 Eder Mar 1997 A
5615341 Srikant Mar 1997 A
5617474 Ditzig et al. Apr 1997 A
5619558 Jheeta Apr 1997 A
5621812 Deaton et al. Apr 1997 A
5623591 Cseri Apr 1997 A
5637845 Kolls Jun 1997 A
5638457 Deaton et al. Jun 1997 A
5642279 Stone Jun 1997 A
5642485 Deaton et al. Jun 1997 A
5644723 Deaton et al. Jul 1997 A
5644727 Atkins Jul 1997 A
5649114 Deaton et al. Jul 1997 A
5649116 McCoy Jul 1997 A
5649117 Landry Jul 1997 A
5649118 Carlisle et al. Jul 1997 A
5650604 Marcous et al. Jul 1997 A
5652786 Rogers Jul 1997 A
5653914 Holmes et al. Aug 1997 A
5655085 Ryan Aug 1997 A
5657388 Weiss Aug 1997 A
5657437 Bishop et al. Aug 1997 A
5657460 Egan et al. Aug 1997 A
5659469 Deaton et al. Aug 1997 A
5659741 Eberhardt Aug 1997 A
5664110 Green et al. Sep 1997 A
5664127 Anderson et al. Sep 1997 A
5665953 Mazzamuto Sep 1997 A
5671363 Cristofich et al. Sep 1997 A
5675607 Alesio et al. Oct 1997 A
5675662 Deaton et al. Oct 1997 A
5675746 Marshall Oct 1997 A
5677521 Garrou Oct 1997 A
5677955 Doggett et al. Oct 1997 A
5680459 Hook et al. Oct 1997 A
5684291 Taskett Nov 1997 A
5687322 Deaton et al. Nov 1997 A
5689100 Carrithers et al. Nov 1997 A
5689650 McClelland et al. Nov 1997 A
5692132 Hogan Nov 1997 A
5696907 Tom Dec 1997 A
5698837 Furuta Dec 1997 A
5699528 Hogan Dec 1997 A
5703344 Bezy et al. Dec 1997 A
5704044 Tarter et al. Dec 1997 A
5704046 Hogan Dec 1997 A
5705798 Tarbox Jan 1998 A
5708422 Blonder et al. Jan 1998 A
5710886 Christensen et al. Jan 1998 A
5710887 Chelliah Jan 1998 A
5710889 Clark et al. Jan 1998 A
5715298 Rogers Feb 1998 A
5715399 Bezos Feb 1998 A
5717865 Stratmann Feb 1998 A
5717925 Harper et al. Feb 1998 A
5721768 Stimson et al. Feb 1998 A
5721847 Johnson Feb 1998 A
5726884 Sturgeon et al. Mar 1998 A
5727153 Powell Mar 1998 A
5727161 Purcell, Jr. Mar 1998 A
5728998 Novis et al. Mar 1998 A
5729693 Holda-Fleck Mar 1998 A
5732136 Murphree et al. Mar 1998 A
5732397 DeTore Mar 1998 A
5734838 Robinson Mar 1998 A
5737421 Audebert Apr 1998 A
5740549 Reilly et al. Apr 1998 A
5742775 King Apr 1998 A
5744787 Teicher Apr 1998 A
5745049 Akiyama et al. Apr 1998 A
5745555 Mark Apr 1998 A
5745706 Wolfberg et al. Apr 1998 A
5748737 Daggar May 1998 A
5749075 Toader et al. May 1998 A
5758328 Giovannoli May 1998 A
5764923 Tallman et al. Jun 1998 A
5765138 Aycock et al. Jun 1998 A
5765141 Spector Jun 1998 A
5765144 Larche Jun 1998 A
5768158 Adler et al. Jun 1998 A
5770843 Rose et al. Jun 1998 A
5770849 Novis et al. Jun 1998 A
5774870 Storey Jun 1998 A
5774878 Marshall Jun 1998 A
5774882 Keen Jun 1998 A
5774883 Andersen et al. Jun 1998 A
5777305 Smith et al. Jul 1998 A
5778067 Jones et al. Jul 1998 A
5787156 Katz Jul 1998 A
5787403 Randle Jul 1998 A
5787404 Fernandez-Holmann Jul 1998 A
5789733 Jachimowicz et al. Aug 1998 A
5790636 Marshall Aug 1998 A
5794207 Walker Aug 1998 A
5796827 Coppersmith et al. Aug 1998 A
5797133 Jones Aug 1998 A
5798950 Fitzgerald Aug 1998 A
5799087 Rosen Aug 1998 A
5799286 Morgan et al. Aug 1998 A
5802176 Audebert Sep 1998 A
5802502 Gell Sep 1998 A
5805719 Pare et al. Sep 1998 A
5806042 Kelly et al. Sep 1998 A
5806044 Powell Sep 1998 A
5806047 Hackel et al. Sep 1998 A
5809478 Greco Sep 1998 A
5812968 Hassan Sep 1998 A
5814796 Benson et al. Sep 1998 A
5815657 Williams et al. Sep 1998 A
5819234 Slavin et al. Oct 1998 A
5819237 Garman Oct 1998 A
5825871 Mark Oct 1998 A
5826243 Musmanno et al. Oct 1998 A
5832090 Raspotnik Nov 1998 A
5832457 O'Brien Nov 1998 A
5832488 Eberhardt Nov 1998 A
5835061 Stewart Nov 1998 A
5835576 Katz Nov 1998 A
5839113 Federau et al. Nov 1998 A
5842178 Giovannoli Nov 1998 A
5845259 West et al. Dec 1998 A
5845260 Nakano et al. Dec 1998 A
5848400 Chang Dec 1998 A
5852811 Atkins Dec 1998 A
5852812 Reeder Dec 1998 A
5857079 Claus et al. Jan 1999 A
5857175 Day Jan 1999 A
5857709 Chock Jan 1999 A
5859419 Wynn Jan 1999 A
5864609 Cross et al. Jan 1999 A
5864828 Atkins Jan 1999 A
5864830 Armetta et al. Jan 1999 A
RE36116 McCarthy Feb 1999 E
5870456 Rogers Feb 1999 A
5870718 Spector Feb 1999 A
5870721 Norris Feb 1999 A
5873096 Lim Feb 1999 A
5875437 Atkins Feb 1999 A
5877975 Jigour et al. Mar 1999 A
5878258 Pizi Mar 1999 A
5878403 Agrawal Mar 1999 A
5883377 Chapin, Jr. Mar 1999 A
5883810 Franklin et al. Mar 1999 A
5884278 Powell Mar 1999 A
5884285 Atkins Mar 1999 A
5887065 Audebert Mar 1999 A
5890138 Godin et al. Mar 1999 A
5890140 Clark et al. Mar 1999 A
H1794 Claus Apr 1999 H
D408054 Leedy, Jr. Apr 1999 S
5897620 Walker et al. Apr 1999 A
5897621 Boesch et al. Apr 1999 A
5901303 Chew May 1999 A
5903879 Mitchell May 1999 A
5905246 Fajkowski May 1999 A
5907142 Kelsey May 1999 A
5907350 Nemirofsky May 1999 A
5911135 Atkins Jun 1999 A
5911136 Atkins Jun 1999 A
5913202 Motoyama Jun 1999 A
5914472 Foladare et al. Jun 1999 A
5918217 Maggioncalda Jun 1999 A
5920629 Rosen Jul 1999 A
5920847 Kolling et al. Jul 1999 A
5920848 Schutzer et al. Jul 1999 A
5923734 Taskett Jul 1999 A
5926792 Koppes et al. Jul 1999 A
5926800 Baronowski et al. Jul 1999 A
5928082 Clapper, Jr. Jul 1999 A
5930217 Kayanuma Jul 1999 A
5930775 McCauley Jul 1999 A
5931764 Freeman et al. Aug 1999 A
5933817 Hucal Aug 1999 A
5936221 Corder et al. Aug 1999 A
5937068 Audebert Aug 1999 A
5940811 Norris Aug 1999 A
5940812 Tengel et al. Aug 1999 A
5946669 Polk Aug 1999 A
5949044 Walker et al. Sep 1999 A
5950175 Austin Sep 1999 A
5952641 Korshun Sep 1999 A
5953423 Rosen Sep 1999 A
5953710 Fleming Sep 1999 A
5955961 Wallerstein Sep 1999 A
5956695 Carrithers et al. Sep 1999 A
5960411 Hartman et al. Sep 1999 A
5963648 Rosen Oct 1999 A
5963925 Kolling et al. Oct 1999 A
5963953 Cram et al. Oct 1999 A
5970467 Alavi Oct 1999 A
5970469 Scroggie et al. Oct 1999 A
5970478 Walker et al. Oct 1999 A
5970479 Shepherd Oct 1999 A
5970480 Kalina Oct 1999 A
5974396 Anderson Oct 1999 A
5974399 Giuliani et al. Oct 1999 A
RE36365 Levine et al. Nov 1999 E
5978779 Stein et al. Nov 1999 A
5979757 Tracy Nov 1999 A
5983206 Oppenheimer Nov 1999 A
5984180 Albrecht Nov 1999 A
5984191 Chapin, Jr. Nov 1999 A
5987434 Libman Nov 1999 A
5988509 Taskett Nov 1999 A
5991413 Arditti et al. Nov 1999 A
5991736 Ferguson et al. Nov 1999 A
5991741 Speakman et al. Nov 1999 A
5991743 Irving et al. Nov 1999 A
5991748 Taskett Nov 1999 A
5991750 Watson Nov 1999 A
5995942 Smith et al. Nov 1999 A
5999596 Walker et al. Dec 1999 A
5999624 Hopkins Dec 1999 A
5999907 Donner Dec 1999 A
5999917 Facciani et al. Dec 1999 A
6000608 Dorf Dec 1999 A
6000832 Franklin et al. Dec 1999 A
6003762 Hayashida Dec 1999 A
6006205 Loeb et al. Dec 1999 A
6006988 Behrmann et al. Dec 1999 A
6008817 Gilmore, Jr. Dec 1999 A
6009415 Shurling et al. Dec 1999 A
6014634 Scroggie et al. Jan 2000 A
6014636 Reeder Jan 2000 A
6014638 Burge et al. Jan 2000 A
6014645 Cunningham Jan 2000 A
6014749 Gloor et al. Jan 2000 A
6016482 Molinari et al. Jan 2000 A
6016954 Abe et al. Jan 2000 A
6018718 Walker et al. Jan 2000 A
6018722 Ray et al. Jan 2000 A
6021189 Vu Feb 2000 A
6021397 Jones et al. Feb 2000 A
6025283 Roberts Feb 2000 A
6025774 Forbes Feb 2000 A
6026370 Jermyn Feb 2000 A
6029139 Cunningham et al. Feb 2000 A
6029144 Barrett et al. Feb 2000 A
6029153 Bauchner et al. Feb 2000 A
6029195 Herz Feb 2000 A
6029890 Austin Feb 2000 A
6032125 Ando Feb 2000 A
6032136 Brake, Jr. et al. Feb 2000 A
6032859 Muehlberger et al. Mar 2000 A
6036099 Leighton Mar 2000 A
6038292 Thomas Mar 2000 A
6038552 Fleischl et al. Mar 2000 A
6041314 Davis Mar 2000 A
6041315 Pollin Mar 2000 A
6044360 Picciallo Mar 2000 A
6044371 Person et al. Mar 2000 A
6045050 Ippolito et al. Apr 2000 A
6047067 Rosen Apr 2000 A
6047268 Bartoli et al. Apr 2000 A
6048271 Barcelou Apr 2000 A
6049773 McCormack et al. Apr 2000 A
6049782 Gottesman et al. Apr 2000 A
6055510 Henrick Apr 2000 A
6055517 Friend et al. Apr 2000 A
6055573 Gardenswartz et al. Apr 2000 A
6058378 Clark et al. May 2000 A
6061660 Eggleston et al. May 2000 A
6064985 Anderson May 2000 A
6065675 Teicher May 2000 A
6068183 Freeman et al. May 2000 A
6070067 Nguyen et al. May 2000 A
6070147 Harms et al. May 2000 A
6070153 Simpson May 2000 A
D427167 Iwasaki Jun 2000 S
6073115 Marshall Jun 2000 A
6076068 DeLapa et al. Jun 2000 A
6076072 Libman Jun 2000 A
6078888 Johnson, Jr. Jun 2000 A
6078891 Riordan et al. Jun 2000 A
6078892 Anderson et al. Jun 2000 A
6078901 Ching Jun 2000 A
6085976 Sehr Jul 2000 A
6088686 Walker et al. Jul 2000 A
6089284 Kaehler et al. Jul 2000 A
6092050 Lungren et al. Jul 2000 A
6092056 Tull, Jr. et al. Jul 2000 A
6092057 Zimmermann et al. Jul 2000 A
6095416 Grant et al. Aug 2000 A
6097391 Wilcox Aug 2000 A
6098053 Slater Aug 2000 A
6105006 Davis et al. Aug 2000 A
6105007 Norris Aug 2000 A
6105008 Davis et al. Aug 2000 A
6105009 Cuervo Aug 2000 A
6105011 Morrison, Jr. Aug 2000 A
6105865 Hardesty Aug 2000 A
6108641 Kenna et al. Aug 2000 A
6109525 Blomqvist et al. Aug 2000 A
6112190 Fletcher et al. Aug 2000 A
6112191 Burke Aug 2000 A
6115458 Taskett Sep 2000 A
6119097 Ibarra Sep 2000 A
6119103 Basch et al. Sep 2000 A
6119107 Polk Sep 2000 A
6119932 Maloney et al. Sep 2000 A
6122623 Garman Sep 2000 A
6128598 Walker et al. Oct 2000 A
6128599 Walker et al. Oct 2000 A
6129274 Suzuki Oct 2000 A
6129572 Feldman et al. Oct 2000 A
6134309 Carson Oct 2000 A
6134536 Shepherd Oct 2000 A
6138911 Fredregill et al. Oct 2000 A
6138917 Chapin, Jr. Oct 2000 A
6141666 Tobin Oct 2000 A
6142640 Schofield Nov 2000 A
6144848 Walsh et al. Nov 2000 A
6145741 Wisdom et al. Nov 2000 A
6148293 King Nov 2000 A
6148297 Swor et al. Nov 2000 A
6154731 Monks et al. Nov 2000 A
6161096 Bell Dec 2000 A
6163770 Gamble et al. Dec 2000 A
6163771 Walker et al. Dec 2000 A
6164533 Barton Dec 2000 A
6164548 Curiel Dec 2000 A
6167385 Hartley-Urquhart Dec 2000 A
6169975 White et al. Jan 2001 B1
6173267 Cairns Jan 2001 B1
6173270 Cristofich et al. Jan 2001 B1
6179211 Green et al. Jan 2001 B1
6182048 Osborn et al. Jan 2001 B1
6182059 Angotti et al. Jan 2001 B1
6182894 Hackett et al. Feb 2001 B1
6185541 Scroggie et al. Feb 2001 B1
6185582 Zellweger et al. Feb 2001 B1
6186793 Brubaker Feb 2001 B1
6188309 Levine Feb 2001 B1
6188403 Sacerdoti et al. Feb 2001 B1
6188405 Czerwinski et al. Feb 2001 B1
6188993 Eng et al. Feb 2001 B1
6189787 Dorf Feb 2001 B1
6192113 Lorsch Feb 2001 B1
6192142 Pare, Jr. et al. Feb 2001 B1
6195092 Dhond et al. Feb 2001 B1
6195644 Bowie Feb 2001 B1
6195648 Simon et al. Feb 2001 B1
6199077 Inala et al. Mar 2001 B1
6202053 Christiansen et al. Mar 2001 B1
6202054 Lawlor et al. Mar 2001 B1
6205453 Tucker et al. Mar 2001 B1
RE37122 Levine et al. Apr 2001 E
6212494 Boguraev Apr 2001 B1
6213392 Zuppichich Apr 2001 B1
6222557 Pulley, IV et al. Apr 2001 B1
6222914 McMullin Apr 2001 B1
6223143 Weinstock et al. Apr 2001 B1
D442627 Webb et al. May 2001 S
6227445 Brookner May 2001 B1
6227447 Campisano May 2001 B1
6227972 Walker et al. May 2001 B1
6236978 Tuzhilin May 2001 B1
6243093 Czerwinski et al. Jun 2001 B1
6243688 Kalina Jun 2001 B1
6249775 Freeman et al. Jun 2001 B1
6256649 Mackinlay et al. Jul 2001 B1
6260758 Blumberg Jul 2001 B1
6263316 Khan et al. Jul 2001 B1
6263320 Danilunas et al. Jul 2001 B1
6265977 Vega et al. Jul 2001 B1
6267292 Walker et al. Jul 2001 B1
6269346 Cristofich et al. Jul 2001 B1
6271863 Bose et al. Aug 2001 B1
6278981 Dembo et al. Aug 2001 B1
6278996 Richardson et al. Aug 2001 B1
6282516 Giullani Aug 2001 B1
6282522 Davis et al. Aug 2001 B1
6282551 Anderson et al. Aug 2001 B1
6289322 Kitchen et al. Sep 2001 B1
6292786 Deaton et al. Sep 2001 B1
6295344 Marshall Sep 2001 B1
6295522 Boesch Sep 2001 B1
D449336 Webb et al. Oct 2001 S
6308268 Audebert Oct 2001 B1
6308887 Korman et al. Oct 2001 B1
6311144 Abu El Ata Oct 2001 B1
6315193 Hogan Nov 2001 B1
6315195 Ramachandran Nov 2001 B1
6317726 O'Shaughnessy Nov 2001 B1
6317750 Tortolani et al. Nov 2001 B1
6321212 Lange Nov 2001 B1
6324524 Lent et al. Nov 2001 B1
6324526 D'Agostino Nov 2001 B1
6327573 Walker et al. Dec 2001 B1
6327575 Katz Dec 2001 B1
6330543 Kepecs Dec 2001 B1
6330546 Gopinathan et al. Dec 2001 B1
6330551 Burchetta et al. Dec 2001 B1
6336099 Barnett et al. Jan 2002 B1
6338048 Mori Jan 2002 B1
6341724 Campisano Jan 2002 B2
6343743 Lamla Feb 2002 B1
6344108 Von Medvey et al. Feb 2002 B1
6345261 Feidelson Feb 2002 B1
6345766 Taskett et al. Feb 2002 B1
6349290 Horowitz et al. Feb 2002 B1
6349291 Varma Feb 2002 B1
6349972 Geiger et al. Feb 2002 B1
6351735 Deaton et al. Feb 2002 B1
6360188 Freidman et al. Mar 2002 B1
6360954 Barnardo Mar 2002 B1
6363393 Ribitzky Mar 2002 B1
6366220 Elliott Apr 2002 B1
6366967 Wagner Apr 2002 B1
6373969 Adler Apr 2002 B1
6374230 Walker et al. Apr 2002 B1
6377669 Walker et al. Apr 2002 B1
6377935 Deaton et al. Apr 2002 B1
6382677 Kaule et al. May 2002 B1
6385591 Mankoff May 2002 B1
6385594 Lebda et al. May 2002 B1
6386444 Sullivan May 2002 B1
6397202 Higgins et al. May 2002 B1
6402039 Freeman et al. Jun 2002 B1
6405181 Lent et al. Jun 2002 B2
6405182 Cuervo Jun 2002 B1
6405204 Baker et al. Jun 2002 B1
6409593 Petrecca Jun 2002 B1
6411939 Parsons Jun 2002 B1
6411947 Rice et al. Jun 2002 B1
6419161 Haddad Jul 2002 B1
6422459 Kawan Jul 2002 B1
6422462 Cohen Jul 2002 B1
6424029 Giesler Jul 2002 B1
6424949 Deaton et al. Jul 2002 B1
6429927 Borza Aug 2002 B1
6434259 Hamid et al. Aug 2002 B1
D462477 Osborne Sep 2002 S
6446210 Borza Sep 2002 B1
6450407 Freeman et al. Sep 2002 B1
6452613 Lefebvre et al. Sep 2002 B1
6454647 Woodbury, Jr. Sep 2002 B1
6456981 Dejaeger et al. Sep 2002 B1
6463039 Ricci et al. Oct 2002 B1
6467684 Fite et al. Oct 2002 B2
6471128 Corcoran et al. Oct 2002 B1
6473500 Risafi et al. Oct 2002 B1
6481125 Pokrasoff Nov 2002 B1
6484144 Martin et al. Nov 2002 B2
6484146 Day et al. Nov 2002 B2
6484148 Boyd Nov 2002 B1
6484428 Greenwald et al. Nov 2002 B1
D466929 Haas Dec 2002 S
D467271 Haas Dec 2002 S
D467272 Haas Dec 2002 S
6490568 Omara et al. Dec 2002 B1
6490569 Grune et al. Dec 2002 B1
6491782 Jaynes Dec 2002 B1
6496832 Chi et al. Dec 2002 B2
6498861 Hamid et al. Dec 2002 B1
6502080 Eichorst et al. Dec 2002 B1
D468789 Arnold et al. Jan 2003 S
6505095 Kolls Jan 2003 B1
6505168 Rothman et al. Jan 2003 B1
6505780 Yassin et al. Jan 2003 B1
6507644 Henderson et al. Jan 2003 B1
6513018 Culhane Jan 2003 B1
6513019 Lewis Jan 2003 B2
6529880 McKeen et al. Mar 2003 B1
6553113 Dhir et al. Apr 2003 B1
6557039 Leong et al. Apr 2003 B1
D474235 Haas May 2003 S
6557750 Druse et al. May 2003 B1
6557766 Leighton May 2003 B1
6558255 Walker et al. May 2003 B2
6560578 Eldering May 2003 B2
6560581 Fox et al. May 2003 B1
6561657 Schofield May 2003 B1
6567786 Bibelnieks et al. May 2003 B1
6567791 Lent et al. May 2003 B2
6567821 Polk May 2003 B1
6574603 Dickson et al. Jun 2003 B1
6575361 Graves et al. Jun 2003 B1
6581839 Lasch et al. Jun 2003 B1
6581845 Ye Jun 2003 B2
D476681 Al Amri Jul 2003 S
D476683 Kilburn Jul 2003 S
D477359 Haas Jul 2003 S
6592044 Wong et al. Jul 2003 B1
6594640 Postrel Jul 2003 B1
6597379 Morris et al. Jul 2003 B1
6601040 Kolls Jul 2003 B1
6601044 Wallman Jul 2003 B1
6601761 Katis Aug 2003 B1
6607127 Wong Aug 2003 B2
6609111 Bell Aug 2003 B1
6609113 O'Leary et al. Aug 2003 B1
6609654 Anderson et al. Aug 2003 B1
6609658 Sehr Aug 2003 B1
RE38255 Levine et al. Sep 2003 E
6615189 Phillips et al. Sep 2003 B1
6615190 Slater Sep 2003 B1
6624752 Klitsgaard et al. Sep 2003 B2
6625582 Richman et al. Sep 2003 B2
D481068 Blossom et al. Oct 2003 S
6631849 Blossom Oct 2003 B2
6641049 Luu Nov 2003 B2
6641050 Kelley et al. Nov 2003 B2
6644551 Clayman et al. Nov 2003 B2
6647374 Kansal Nov 2003 B2
6655587 Andrews et al. Dec 2003 B2
6655598 Curiel Dec 2003 B1
6659259 Knox et al. Dec 2003 B2
6671673 Baseman et al. Dec 2003 B1
D485573 Li Jan 2004 S
6675127 LaBlanc et al. Jan 2004 B2
6675149 Ruffin et al. Jan 2004 B1
6693544 Hebbecker Feb 2004 B1
6705518 Park et al. Mar 2004 B2
6715797 Curiel Apr 2004 B2
6725257 Cansler et al. Apr 2004 B1
6726813 Kaule et al. Apr 2004 B2
6727802 Kelly et al. Apr 2004 B2
6732919 Macklin et al. May 2004 B2
6741975 Nakisa et al. May 2004 B1
6742125 Gabber et al. May 2004 B1
D490840 Arakaki et al. Jun 2004 S
D491186 Arakaki et al. Jun 2004 S
D491953 Arakaki et al. Jun 2004 S
6742704 Fitzmaurice et al. Jun 2004 B2
6745938 Sullivan Jun 2004 B2
6757660 Canada et al. Jun 2004 B2
6757710 Reed Jun 2004 B2
D493195 Creighton Jul 2004 S
6764014 Lasch et al. Jul 2004 B2
6785661 Mandler et al. Aug 2004 B1
D495736 Scharf Sep 2004 S
D496365 Liu et al. Sep 2004 S
6793131 Hogan Sep 2004 B2
6793135 Ryoo Sep 2004 B1
6802008 Ikefuji et al. Oct 2004 B1
6805287 Bishop Oct 2004 B2
6805288 Routhenstein et al. Oct 2004 B2
6805289 Noriega et al. Oct 2004 B2
D498236 Liu et al. Nov 2004 S
6814282 Seifert et al. Nov 2004 B2
6820061 Postrel Nov 2004 B2
6829586 Postrel Dec 2004 B2
6834796 Anvekar et al. Dec 2004 B2
6842739 Postrel Jan 2005 B2
6845906 Royer et al. Jan 2005 B2
6850923 Nakisa et al. Feb 2005 B1
6856973 Bott Feb 2005 B1
6865547 Brake, Jr. et al. Mar 2005 B1
6868426 Mankoff Mar 2005 B1
6876971 Burke Apr 2005 B1
6880084 Brittenham et al. Apr 2005 B1
6885994 Scroggie et al. Apr 2005 B1
6886046 Stutz et al. Apr 2005 B2
D505450 Lauer et al. May 2005 S
6886741 Salveson May 2005 B1
6892052 Kotola et al. May 2005 B2
6892187 Phillips et al. May 2005 B2
6895383 Heinrich May 2005 B2
6895386 Bachman et al. May 2005 B1
6901372 Helzerman May 2005 B1
6912502 Buddle et al. Jun 2005 B1
6913193 Kawan Jul 2005 B1
6924026 Jaynes Aug 2005 B2
6931382 Laage et al. Aug 2005 B2
6942156 Ohta et al. Sep 2005 B2
6942569 Petrecca Sep 2005 B2
6945453 Schwarz Jr. Sep 2005 B1
6947898 Postrel Sep 2005 B2
6954741 Burchetta et al. Oct 2005 B1
6961710 Yanagisawa et al. Nov 2005 B1
6970830 Samra et al. Nov 2005 B1
6978369 Wheeler et al. Dec 2005 B2
6985880 Hodgdon et al. Jan 2006 B1
6999569 Risafi et al. Feb 2006 B2
6999938 Libman Feb 2006 B1
6999943 Johnson et al. Feb 2006 B1
7006992 Packwood Feb 2006 B1
7014110 Minowa et al. Mar 2006 B2
7024374 Day et al. Apr 2006 B1
7025256 Drummond et al. Apr 2006 B1
7031939 Gallagher et al. Apr 2006 B1
7039600 Meek et al. May 2006 B1
7047222 Bush May 2006 B1
7050996 Blagg et al. May 2006 B1
7051001 Slater May 2006 B1
7051925 Schwarz, Jr. May 2006 B2
7051929 Li May 2006 B2
7054842 James et al. May 2006 B2
7063924 Kaminsky et al. Jun 2006 B2
7070095 Gandel et al. Jul 2006 B1
7072864 Brake, Jr. et al. Jul 2006 B2
7072909 Polk Jul 2006 B2
7076465 Blagg et al. Jul 2006 B1
7082416 Anderson Jul 2006 B2
7083084 Graves et al. Aug 2006 B2
7089202 McNamar et al. Aug 2006 B1
7089503 Bloomquist et al. Aug 2006 B1
7092905 Behrenbrinker et al. Aug 2006 B2
7092916 Diveley et al. Aug 2006 B2
7104443 Paul et al. Sep 2006 B1
7107249 Dively et al. Sep 2006 B2
7113914 Spielmann et al. Sep 2006 B1
D530741 Blossom Oct 2006 S
7120601 Chen et al. Oct 2006 B2
7128272 Doublet Oct 2006 B2
D533220 Graves et al. Dec 2006 S
7156301 Bonalle et al. Jan 2007 B1
7163153 Blossom Jan 2007 B2
7165049 Slater Jan 2007 B2
7167844 Leong et al. Jan 2007 B1
7181427 DeFrancesco et al. Feb 2007 B1
7184973 Monteleone et al. Feb 2007 B2
D538349 Hollands Mar 2007 S
7191952 Blossom Mar 2007 B2
7195154 Routhenstein Mar 2007 B2
7216091 Blandina et al. May 2007 B1
7216099 Chen et al. May 2007 B2
7225155 Polk May 2007 B1
7228155 Saunders Jun 2007 B2
7239226 Berardi et al. Jul 2007 B2
7243839 Beck et al. Jul 2007 B2
7249092 Dunn et al. Jul 2007 B2
7249112 Berardi et al. Jul 2007 B2
7252223 Schofield Aug 2007 B2
7252226 Risafi et al. Aug 2007 B2
7254560 Singhal Aug 2007 B2
D551705 Mershon Sep 2007 S
7266524 Butcher, III Sep 2007 B1
7275160 Pearson et al. Sep 2007 B2
7295999 Simon et al. Nov 2007 B1
7306141 Schwarz, Jr. Dec 2007 B1
7306163 Scholz et al. Dec 2007 B2
7310617 Cunningham Dec 2007 B1
7311244 Schwarz, Jr. Dec 2007 B1
7312707 Bishop et al. Dec 2007 B1
7315843 Diveley et al. Jan 2008 B2
D562888 Brown Feb 2008 S
7346567 Weeks Mar 2008 B2
7349866 Schwarz, Jr. Mar 2008 B2
7357331 Blossom Apr 2008 B2
7359880 Abel et al. Apr 2008 B2
7392221 Nabe Jun 2008 B2
7392222 Hamilton et al. Jun 2008 B1
7392224 Bauer et al. Jun 2008 B1
7398241 Fay et al. Jul 2008 B2
7398248 Phillips et al. Jul 2008 B2
7401049 Hobbs et al. Jul 2008 B2
7409364 Barton et al. Aug 2008 B1
D576671 Field et al. Sep 2008 S
D582476 Field et al. Dec 2008 S
D582977 Field et al. Dec 2008 S
7461028 Wronski, Jr. Dec 2008 B2
7479320 Keller et al. Jan 2009 B2
7493288 Biship et al. Feb 2009 B2
7494057 Lasch et al. Feb 2009 B2
7502758 Burke Mar 2009 B2
7503503 Riedl et al. Mar 2009 B2
7506806 Bonalle et al. Mar 2009 B2
7530491 Lasch et al. May 2009 B2
7588184 Gandel et al. Sep 2009 B2
7591416 Blossom Sep 2009 B2
D602522 Field et al. Oct 2009 S
D602986 Skelding et al. Oct 2009 S
7606730 Antonucci Oct 2009 B2
7660763 Brake, Jr. et al. Feb 2010 B1
7676425 Noles Mar 2010 B1
7707111 Brake, Jr. et al. Apr 2010 B2
20010001856 Gould et al. May 2001 A1
20010002487 Grawrock et al. May 2001 A1
20010011227 Ashery et al. Aug 2001 A1
20010011243 Dembo et al. Aug 2001 A1
20010014868 Herz et al. Aug 2001 A1
20010027389 Beverina et al. Oct 2001 A1
20010027437 Turbeville et al. Oct 2001 A1
20010027441 Wankmueller Oct 2001 A1
20010032312 Runje et al. Oct 2001 A1
20010034647 Marks et al. Oct 2001 A1
20010034663 Teveler et al. Oct 2001 A1
20010034682 Knight et al. Oct 2001 A1
20010034684 Cushing et al. Oct 2001 A1
20010037276 Kelly et al. Nov 2001 A1
20010037315 Saliba et al. Nov 2001 A1
20010038033 Habib Nov 2001 A1
20010044293 Morgan Nov 2001 A1
20010044733 Lee et al. Nov 2001 A1
20010047332 Gonen-Friedman et al. Nov 2001 A1
20010047342 Cuervo Nov 2001 A1
20010051917 Bissonette et al. Dec 2001 A1
20010054003 Chien et al. Dec 2001 A1
20010056398 Scheirer Dec 2001 A1
20020007313 Mai et al. Jan 2002 A1
20020007330 Kumar et al. Jan 2002 A1
20020010591 Pomerance Jan 2002 A1
20020013751 Facciani et al. Jan 2002 A1
20020019791 Goss et al. Feb 2002 A1
20020019793 Frattalone Feb 2002 A1
20020019802 Malme et al. Feb 2002 A1
20020019803 Muller Feb 2002 A1
20020023032 Pearson et al. Feb 2002 A1
20020026416 Provinse Feb 2002 A1
20020026418 Koppel et al. Feb 2002 A1
20020032609 Wilkman Mar 2002 A1
20020035527 Corrin Mar 2002 A1
20020046089 Zorn Apr 2002 A1
20020046255 Moore et al. Apr 2002 A1
20020059139 Evans May 2002 A1
20020062235 Wahlbin et al. May 2002 A1
20020062249 Iannacci May 2002 A1
20020062279 Behrenbrinker et al. May 2002 A1
20020065712 Kawan et al. May 2002 A1
20020065720 Carswell et al. May 2002 A1
20020067373 Roe et al. Jun 2002 A1
20020069122 Yun et al. Jun 2002 A1
20020073005 Welnicki et al. Jun 2002 A1
20020073030 Offer Jun 2002 A1
20020077964 Brody et al. Jun 2002 A1
20020077978 O'Leary et al. Jun 2002 A1
20020078086 Alden et al. Jun 2002 A1
20020082990 Jones Jun 2002 A1
20020091572 Anderson et al. Jul 2002 A1
20020091631 Usui Jul 2002 A1
20020091632 Turock et al. Jul 2002 A1
20020091649 Anvekar et al. Jul 2002 A1
20020095365 Slavin et al. Jul 2002 A1
20020099586 Bladen et al. Jul 2002 A1
20020099667 Diamandis et al. Jul 2002 A1
20020103852 Pushka Aug 2002 A1
20020104878 Seifert et al. Aug 2002 A1
20020111850 Smrcka et al. Aug 2002 A1
20020111886 Chenevich et al. Aug 2002 A1
20020111890 Sloan et al. Aug 2002 A1
20020111916 Coronna et al. Aug 2002 A1
20020116271 Mankoff Aug 2002 A1
20020116330 Hed et al. Aug 2002 A1
20020117541 Biggar et al. Aug 2002 A1
20020120627 Mankoff Aug 2002 A1
20020120642 Fetherston Aug 2002 A1
20020129221 Borgin et al. Sep 2002 A1
20020133383 Chao et al. Sep 2002 A1
20020133461 Ramachandran Sep 2002 A1
20020138418 Zarin et al. Sep 2002 A1
20020143703 Razvan et al. Oct 2002 A1
20020145039 Carroll Oct 2002 A1
20020147662 Anderson Oct 2002 A1
20020147668 Smith et al. Oct 2002 A1
20020147683 Capobianco et al. Oct 2002 A1
20020152168 Neofytides et al. Oct 2002 A1
20020156723 Lilly et al. Oct 2002 A1
20020161699 Okamoto et al. Oct 2002 A1
20020161702 Milberger et al. Oct 2002 A1
20020165771 Walker et al. Nov 2002 A1
20020165820 Anvekar et al. Nov 2002 A1
20020169719 Dively et al. Nov 2002 A1
20020174016 Cuervo Nov 2002 A1
20020174018 Bunger et al. Nov 2002 A1
20020174030 Praisner et al. Nov 2002 A1
20020178025 Hansen et al. Nov 2002 A1
20020178063 Gravelle et al. Nov 2002 A1
20020190123 Anvekar et al. Dec 2002 A1
20020194081 Perkowski Dec 2002 A1
20020194098 Stiff et al. Dec 2002 A1
20020198797 Cooper et al. Dec 2002 A1
20020198848 Michener Dec 2002 A1
20030004828 Epstein Jan 2003 A1
20030010831 Ye Jan 2003 A1
20030018492 Carlson Jan 2003 A1
20030018613 Oytac Jan 2003 A1
20030023549 Armes et al. Jan 2003 A1
20030028466 Jenson et al. Feb 2003 A1
20030028483 Sanders et al. Feb 2003 A1
20030028518 Mankoff Feb 2003 A1
20030031321 Mages Feb 2003 A1
20030033211 Haines et al. Feb 2003 A1
20030033246 Slater Feb 2003 A1
20030034388 Routhenstein et al. Feb 2003 A1
20030040927 Sato et al. Feb 2003 A1
20030040959 Fei et al. Feb 2003 A1
20030046249 Wu Mar 2003 A1
20030046542 Chen et al. Mar 2003 A1
20030053609 Risafi et al. Mar 2003 A1
20030055780 Hansen et al. Mar 2003 A1
20030055782 Slater Mar 2003 A1
20030061132 Yu, Sr. et al. Mar 2003 A1
20030061137 Leung et al. Mar 2003 A1
20030061157 Hirka et al. Mar 2003 A1
20030061168 Routhenstein Mar 2003 A1
20030065624 James et al. Apr 2003 A1
20030074167 Browne et al. Apr 2003 A1
20030074290 Clore Apr 2003 A1
20030078815 Parsons Apr 2003 A1
20030085272 Andrews et al. May 2003 A1
20030085286 Kelley et al. May 2003 A1
20030093351 Sarabanchong May 2003 A1
20030101119 Parsons et al. May 2003 A1
20030105672 Epstein et al. Jun 2003 A1
20030105714 Alarcon Luther et al. Jun 2003 A1
20030110111 Nalebuff et al. Jun 2003 A1
20030120571 Blagg Jun 2003 A1
20030126017 Rau et al. Jul 2003 A1
20030130940 Hansen et al. Jul 2003 A1
20030130948 Algiene et al. Jul 2003 A1
20030135453 Caulfield et al. Jul 2003 A1
20030135459 Abelman et al. Jul 2003 A1
20030135462 Brake, Jr. et al. Jul 2003 A1
20030140004 O'Leary et al. Jul 2003 A1
20030144935 Sobek Jul 2003 A1
20030149660 Canfield Aug 2003 A1
20030154125 Mittal et al. Aug 2003 A1
20030154163 Phillips et al. Aug 2003 A1
20030163403 Chen et al. Aug 2003 A1
20030163416 Kitajima Aug 2003 A1
20030167218 Field et al. Sep 2003 A1
20030167220 Schoen et al. Sep 2003 A1
20030172040 Kemper et al. Sep 2003 A1
20030182218 Blagg Sep 2003 A1
20030182246 Johnson et al. Sep 2003 A1
20030195808 Brown et al. Oct 2003 A1
20030195842 Reece Oct 2003 A1
20030200143 Walker et al. Oct 2003 A9
20030200179 Kwan Oct 2003 A1
20030200180 Phelan et al. Oct 2003 A1
20030204421 Houle et al. Oct 2003 A1
20030205616 Graves Nov 2003 A1
20030212628 Kuttan et al. Nov 2003 A1
20030213843 Jackson Nov 2003 A1
20030216965 Libman Nov 2003 A1
20030217005 Drummond et al. Nov 2003 A1
20030217329 Good Nov 2003 A1
20030218062 Noriega et al. Nov 2003 A1
20030218066 Fernandes et al. Nov 2003 A1
20030222136 Bolle et al. Dec 2003 A1
20030229525 Callahan et al. Dec 2003 A1
20030229582 Sherman et al. Dec 2003 A1
20040024672 Brake, Jr. et al. Feb 2004 A1
20040024693 Lawrence Feb 2004 A1
20040029569 Khan et al. Feb 2004 A1
20040030626 Libman Feb 2004 A1
20040039588 Libman Feb 2004 A1
20040049451 Berardi et al. Mar 2004 A1
20040049452 Blagg Mar 2004 A1
20040054610 Amstutz et al. Mar 2004 A1
20040054622 Strayer et al. Mar 2004 A1
20040059952 Newport et al. Mar 2004 A1
20040064332 Zou et al. Apr 2004 A1
20040064402 Dreyer et al. Apr 2004 A1
20040078328 Talbert et al. Apr 2004 A1
20040088236 Manning May 2004 A1
20040088238 Gilson et al. May 2004 A1
20040093296 Phelan et al. May 2004 A1
20040093303 Picciallo May 2004 A1
20040094624 Fernandes et al. May 2004 A1
20040098351 Duke May 2004 A1
20040103431 Davenport et al. May 2004 A1
20040117202 Winklevoss et al. Jun 2004 A1
20040117300 Jones et al. Jun 2004 A1
20040118914 Smith et al. Jun 2004 A1
20040122736 Strock et al. Jun 2004 A1
20040128186 Breslin et al. Jul 2004 A1
20040128195 Sorem Jul 2004 A1
20040128217 Friedman et al. Jul 2004 A1
20040133787 Doughty et al. Jul 2004 A1
20040149544 Dal Ferro Aug 2004 A1
20040155101 Royer et al. Aug 2004 A1
20040158517 Mahaney et al. Aug 2004 A1
20040159700 Khan et al. Aug 2004 A1
20040172350 Atkinson et al. Sep 2004 A1
20040186773 George et al. Sep 2004 A1
20040193539 Sullivan Sep 2004 A1
20040210498 Freund Oct 2004 A1
20040215507 Levitt et al. Oct 2004 A1
20040232223 Beenau et al. Nov 2004 A1
20040236641 Abbott et al. Nov 2004 A1
20040236688 Bozeman Nov 2004 A1
20040239481 Beenau Dec 2004 A1
20040242308 Gray Dec 2004 A1
20040243498 Duke Dec 2004 A1
20040252012 Beenau et al. Dec 2004 A1
20040267651 Jenson et al. Dec 2004 A1
20050004855 Jenson et al. Jan 2005 A1
20050004856 Brose et al. Jan 2005 A1
20050010510 Brose et al. Jan 2005 A1
20050021353 Aviles et al. Jan 2005 A1
20050021400 Postrel Jan 2005 A1
20050021457 Johnson et al. Jan 2005 A1
20050027632 Zeitoun et al. Feb 2005 A1
20050027649 Cech Feb 2005 A1
20050033619 Barnes et al. Feb 2005 A1
20050035192 Bonalle et al. Feb 2005 A1
20050035847 Bonalle et al. Feb 2005 A1
20050040242 Beenau et al. Feb 2005 A1
20050049950 Johnson Mar 2005 A1
20050060252 Doddington Mar 2005 A1
20050060260 Masuda et al. Mar 2005 A1
20050065877 Cleary et al. Mar 2005 A1
20050071230 Mankoff Mar 2005 A1
20050075932 Mankoff Apr 2005 A1
20050077349 Bonalle et al. Apr 2005 A1
20050077350 Courtion et al. Apr 2005 A1
20050086160 Wong et al. Apr 2005 A1
20050091138 Awatsu Apr 2005 A1
20050091492 Benson et al. Apr 2005 A1
20050102228 Srinivasan et al. May 2005 A1
20050108152 Tsoa-Lee et al. May 2005 A1
20050114883 Nagai et al. May 2005 A1
20050116024 Beenau et al. Jun 2005 A1
20050119979 Murashita et al. Jun 2005 A1
20050144108 Loeper Jun 2005 A1
20050165695 Berardi et al. Jul 2005 A1
20050167488 Higgins et al. Aug 2005 A1
20050171842 Tien et al. Aug 2005 A1
20050171898 Bishop et al. Aug 2005 A1
20050179251 Wagoner et al. Aug 2005 A1
20050189427 Brown et al. Sep 2005 A1
20050199705 Beck et al. Sep 2005 A1
20050206499 Fisher Sep 2005 A1
20050216888 Drummond et al. Sep 2005 A1
20050234771 Register et al. Oct 2005 A1
20050269396 Schofield Dec 2005 A1
20050289044 Breslin et al. Dec 2005 A1
20060020542 Litle Jan 2006 A1
20060026092 Klein et al. Feb 2006 A1
20060036543 Blagg et al. Feb 2006 A1
20060036553 Gupta et al. Feb 2006 A1
20060039733 Meyerhofer Feb 2006 A1
20060041540 Shannon Feb 2006 A1
20060047573 Mitchell et al. Mar 2006 A1
20060047589 Grau Mar 2006 A1
20060074794 Nespola, Jr. Apr 2006 A1
20060085334 Murphy Apr 2006 A1
20060106696 Carlson May 2006 A1
20060116903 Becerra Jun 2006 A1
20060116995 Strayer et al. Jun 2006 A1
20060122918 Graboske et al. Jun 2006 A1
20060131869 Brignull Jun 2006 A1
20060157557 Lee et al. Jul 2006 A1
20060178937 Rau et al. Aug 2006 A1
20060224480 Bent et al. Oct 2006 A1
20060242057 Velarde Oct 2006 A1
20060249574 Brown et al. Nov 2006 A1
20060251478 Desmeules Nov 2006 A1
20060259364 Strock et al. Nov 2006 A1
20060261927 Kelly et al. Nov 2006 A1
20060289636 Hoblit Dec 2006 A1
20070020443 Lo Jan 2007 A1
20070034700 Poidomani et al. Feb 2007 A1
20070063025 Blossom Mar 2007 A1
20070078719 Schmitt et al. Apr 2007 A1
20070094084 Rau et al. Apr 2007 A1
20070094154 Rau et al. Apr 2007 A1
20070136211 Brown et al. Jun 2007 A1
20070156530 Schmitt et al. Jul 2007 A1
20070203825 Hanifin et al. Aug 2007 A1
20070208671 Brown et al. Sep 2007 A1
20070215688 Routhenstein Sep 2007 A1
20070228144 Knackstedt et al. Oct 2007 A1
20070265924 Schwarz Nov 2007 A1
20080005018 Powell Jan 2008 A1
20080010202 Schwarz Jan 2008 A1
20080021841 Rau et al. Jan 2008 A1
20080027841 Eder Jan 2008 A1
20080177659 Lacey et al. Jul 2008 A1
20080187770 Funicelli et al. Aug 2008 A1
20080230600 Black et al. Sep 2008 A1
20080245865 Mosteller Oct 2008 A1
20080301041 Bruk Dec 2008 A1
20090043651 Schwarz Feb 2009 A1
20090048972 Bierer et al. Feb 2009 A1
20090150370 Christensen et al. Jun 2009 A1
20090192906 Rau et al. Jul 2009 A1
20090230195 Lasch et al. Sep 2009 A1
20090240620 Kendrick et al. Sep 2009 A1
20090242645 Komatsu et al. Oct 2009 A1
20090250522 Williams et al. Oct 2009 A1
20090261161 Blossom Oct 2009 A1
20090265275 Everhart Oct 2009 A1
20090271853 Everhart Oct 2009 A1
20100030675 Hanan et al. Feb 2010 A1
20100030697 Goodrich et al. Feb 2010 A1
Foreign Referenced Citations (47)
Number Date Country
2293321 Dec 1998 CA
0597316 May 1994 EP
0843292 May 1998 EP
0855659 Jul 1998 EP
959440 Nov 1999 EP
2275654 Sep 1994 GB
2376787 Dec 2002 GB
2377071 Dec 2002 GB
2377314 Jan 2003 GB
64-87397 Mar 1989 JP
3-114879 May 1991 JP
4-073193 Mar 1992 JP
4-201392 Jul 1992 JP
5-011676 Jan 1993 JP
8-080680 Mar 1996 JP
8-096098 Apr 1996 JP
10-116016 May 1998 JP
2000-113151 Apr 2000 JP
2002-163589 Jun 2002 JP
2002-259933 Sep 2002 JP
2002-366015 Dec 2002 JP
2005-246658 Sep 2005 JP
2008-015071 Jan 2008 JP
WO 9429112 Dec 1994 WO
WO 97-20692 Jun 1997 WO
WO 9741673 Nov 1997 WO
WO 9810368 Mar 1998 WO
WO 9859307 Dec 1998 WO
WO 9905633 Feb 1999 WO
WO 9927479 Jun 1999 WO
WO 99-54841 Oct 1999 WO
WO 0002256 Jan 2000 WO
WO 0118699 Mar 2001 WO
WO 0169347 Sep 2001 WO
WO 0169347 Sep 2001 WO
WO 0169347 Sep 2001 WO
WO 0188659 Nov 2001 WO
WO 02069212 Sep 2002 WO
WO 2005-043277 May 2005 WO
WO 2005-101975 Nov 2005 WO
WO 2006-060370 Jun 2006 WO
WO 2006-105092 Oct 2006 WO
WO 2006-116772 Nov 2006 WO
WO 2007-115725 Oct 2007 WO
WO 2008-021381 Feb 2008 WO
WO 2008-021382 Feb 2008 WO
WO 2009-023817 Feb 2009 WO
Non-Patent Literature Citations (231)
Entry
Anonymous, “Two chips can be better than one”, Card Technology; New York, May 2001, p. 40, 2pgs.
International Search Report for PCT/US03/09500, filing date Mar. 31, 2003, pp. 1-3.
Roger et al., A Credit Scoring Model to Evaluate the Credit Worthiness of Credit Card Applicants, Developments in Marketing Science, vol. 5, 1982.
Pourmokhtar, A Hedge Fund Primer Version 0.1, www.emf.net/?farzin/hedgefund.html, printed Jul. 24, 2002, 5 pages.
At Your Request, www.wingspanbank.com, Sep. 28, 1999.
CSU/DSU (Channel Service Unit/Data Service Unit), CTI (Computer-Telephony Integration), pp. 208-210.
Markese, Can You Trust Mutual Fund Rankings?, Consumers' Research Magazine, vol. 76, No. 10, Research Library, Oct. 1993, p. 20.
Taylor et al., Card Issuers Turn to Scoring as They Face Increasing Risk, Financial Services Report, vol. 8, No. 15, Jul. 24, 1991, p. 1.
Quinn, Credit Card Issuers Keeping a Closer Watch on How You Pay Bills, Washington Post, Staying Ahead, Business Section P6, Apr. 25, 1988, 1 page.
Friedland, Credit Scoring Digs Deeper into Data, Credit World, vol. 84, No. 5, May 1996, pp. 19-23.
Credit Scoring New Markets, Bank Technology News, vol. 9, No. 7, Jul. 1996, p. 1.
Derivatives Primer, CEIBA, Association for Financial Professionals, Committee on Investment of Employee Benefit Assets, Dec. 2001.
Cumby et al., Evaluating the Performance of International Mutual Funds, The Journal of Finance, vol. 45, No. 2, Jun. 1990, pp. 497-521.
Jameson, Expanding Risk Management Strategies: Key to Future Survival, Credit World, vol. 84, No. 5, May 1996, pp. 16-18.
FreeMarkets, printed on Apr. 26, 1999.
Armstrong, Fund of Funds: Perfect Solution or Dangerous Shortcut?, Investor Solutions, Inc., www.investorsolutions.com, printed Jul. 24, 2002.
GS-Calc 6.0.1.1.; JPS Development; http://download.com, printed Sep. 3, 2003.
Gottfried et al., Graphical definitions: making spreadsheets visual through direct manipulation and gestures, Visual Languages, 1997, Proceedings, 1997 IEEE Sympsium on, Sep. 23-26, 1997, pp. 246-253, Abstract.
Hedge Fund Primer—The Basics, KSP Capital Management LLC, information@kspcapital.com, printed Jul. 24, 2002, 18 pages.
Hedge Fund Primer About Fund of Funds, Links Securities LLC, www.hedgefund.net/prime—fof.php3, 2002, 2 pages.
Kneis, Hedge Fund Strategies: A Primer, Canadianhedgewatch, p. 3.
Buchner et al., HotDoc: a flexible framework for spatial composition, Visual Languages, 1997, Proceedings, 1997 IEEE Sympsium, Abstract, Sep. 23-26, 1997, pp. 92-99.
Asch, How the RMA/Fair Isaac credit-scoring model was built, Journal of Commercial Lending, vol. 77, No. 10, Jun. 1995, pp. 10-16.
Huddling With William Bernstein: Small Town Doctor, Investing Pro.
Snyder et al., Identifying design requirements using analysis structures, Aerospace and Electronics Conference, 1991, NAECON, 1991, vol. 2, Abstract, May 20-24, 1991, pp. 786-792.
Meredith, Internet bank moves closer to virtual reality, USA Today, May 5, 1995.
Internet, Lending Tree, Mortgage Apply Online in Minutes, www.lendingtree.com, 7 pages, printed Feb. 1, 1999.
Makuch, Managing Consumer Credit Delinquency in the US Economy: A Multi-Billion Dollar Management Science Application, Interfaces, Feb. 1992, pp. 90-109.
Bogle, Mutual Funds at the Millennium: Fund Directors and Fund Myths, The Vanguard Group to the '40 Act Institute of PLI (Practicing Law Institute), New York, NY, May 15, 2000, 15 pages.
Davenport et al., Numbers—a medium that counts [spreadsheet software]; Computer Graphics and Applications; IEEE; vol. 11; Issue 4; Abstract, Jul. 1991, pp. 39-44.
Opportunity Knocks at Scoring's Door, Collection and Credit Risk, vol. 2, No. 4, Apr. 1997, p. 53.
Stolte et al., Polaris: a system for query, analysis, and visualization of multidimensional relational databases; Visualization and Computer Graphics; IEEE Transactions on; vol. 8; Issue 1; Abstract, Jan./Mar. 2002, pp. 52-65.
Primer: Derivatives Instruments, Derivatives Study Center, www.econstrat.org/dscinstruments.htm, printed Jul. 24, 2002, 8 pages.
Chi et al., Principles for information visualization spreadsheets; Computer Graphics and Applications; IEEE; vol. 18; Issue 4; Abstract, Jul./Aug. 1998, pp. 92-99.
Product Data Integration Technologies, Inc., Step Integratin Authors, printed on Apr. 26, 1999.
Sullivan, Scoring Borrower Risk, Mortage Banking, vol. 55, No. 2, Nov. 1994, pp. 94-98.
Spreadsheet Mapper; www.panopticon.com., printed Oct. 1, 2003.
TCS 4.20; Telsys sas; http://download.com, printed Sep. 30, 2003.
McLaughlin, Tapping Web to Search for Right Fund—FundProfiler Speeds Search, Boston Herald, Boston, MA, Dec. 16, 1999, p. 70.
Carey, The Sub-Prime Credit Market: Identifying Good Risks for Unsecured Cards, Credit World, vol. 85, No. 1, Sep. 1996, pp. 13-15.
Portner, There Must be a Better Way, Mortgage Banking, vol. 53, No. 2, Nov. 1, 1992, pp. 12-22.
Trading and Capital-Markets Activities Manual, Instrument Profiles: Structured Notes, Federal Reserve System, The Turin Group, www.toerien.com/books/manual/4040.htm, printed Jul. 24, 2002, 14 pages.
Storms, Phillip, Using Mortgage Credit to Achieve Client Objectives, Journal of Financial Planning, ISSN/ISBN: 10403981, Proquest Document Id: 10403981, vol. 9, Issue 5, 9 pages, Oct. 1996.
Hickman, Using Software to Soften Big-Time Competition, Bank Systems and Technology, vol. 31, No. 8, Jun. 1994, pp. 38-40.
Spoerri, Visual tools for information retrieval; Visual Languages; 1993; Proceedings; 1993 IEEE Symposium on; pp. 160-168; Abstract.
Spirer, When Bad Credit Behavior Becomes the Norm, Credit World, vol. 85, Iss. 6, Jul./Aug. 1997, p. 18.
Why a Fund of Funds?, Altegris Investments, www.managedinvestments.com/hedge—fund—of—funds, printed Jul. 24, 2002.
Anonymous, Kmart Mastercard—cardweb.com 2000.
Anonymous, Two Chips Can Be Better Than One.
Hinds, Michael, Making the Most of Fast Falling Mortgage Rates.
Jazzy Jeff, Credit Card Commentaries; cardoffers.com 2003.
Reid, Alice, Metro Ready to Use High Tech Far System; Selling.
“In Time of Need: A National Strategy for Disaster Relief Cards,” prepared by JPMorgan Chase Treasury Services—Public Sector, Jan. 26, 2007.
5500—FDIC General Counsel's Opinion No. 8—Stored Value Cards, 61 Fed. Reg. 40490, http//www,fdic.gov/regulations/laws/rules/5500-500.html, Aug. 2, 1996.
Song, A Card That Asks for Id, Time Magazine, Apr. 12, 2004, 1 page.
A Store Card Issuer Looks for Lift from Electronic Gift Certificates, Credit Card News, Feb. 1, 1995, 2 pages.
Claessens, et al., A Tangled World Wide Web of Security Issues, First Monday, retrieved from the internet at http//www.firstmonday.org/issues/issue7—3/claessens, retrieved from the internet on Oct. 6, 2006.
Anonymous, CardTrak Online, Coca-Cola ATM money Cards, Apr. 4, 1997.
Hotchkiss, ATM's at the head of their class, Bank Marketing, vol. 29, No. 3, Mar. 1997, pp. 26-32.
Edwards, ATMs The Hot New Media Buy, ABA Banking Journal, Mar. 1999, pp. 58, 60.
Abstract to 2007 JPMorgan Chase Disaster Response Card National Strategy Plan Abstract, Jan. 26, 2007.
Siegel, Joel G., et. al., Accounting Handbook (1995).
American Express Incentive Services, Incentive, Sep. 1996, p. 126.
Fickenscher, Amex Prepaid Offering is Latest Card for Firms Regarding Employees, American Banker, vol. 161, No. 151, Aug. 8, 1996, pp. 1-2.
Neumann, An Enhanced Neural Network Technique for Software Risk Analysis, IEEE Transactions on Software Engineering, vol. 28, No. 9, Sep. 1, 2002, pp. 904-912.
The State of Arkansas, Arkansas Code of 1987 Annotated (1999).
Associates First Capital Corporation, Hoover's Inc., The Industry Standard the Newsmagazine of the Internet Economy, thestandard.net/companies/company-display, Apr. 6, 1999.
Anonymous, Association of Inventive Gift Certificate Suppliers, Aug. 1, 1995.
Authorization of Financial Agent and Terms of Performance, Debit Card Application for Houston, Texas, Sep. 1991, acs00277412.
E-Loan, Auto Loan Rates, (1997).
Award Card Comparison, JA7922, Nov. 1, 1995.
Plotnick, Jennifer, Bakersfield Calif Investors Explore Buying Rental Property Apr. 11, 2004.
Brehl, Banks issue cash-card pledge, The Toronto Star, Oct. 9, 1997, 1 page.
Block, Valerie, Blockbuster running test of a stored value card, The American Banker, Sep. 1, 1995.
Board of Governors of the Federal Reserve System—Report to the Congress on the Application of the Electronic Fund Transfer Act to Electronic Stored-Value Products, May 1997, acs00098020.
Meece, Boatman's Prepaid Cards for Worker-Incentive Firm, American Banker, Jul. 2, 1996, p. 12.
Boatmen's Floats Stored Value into the Employee Incentive Waters, Debit Card News, vol. 2, Issue 2, Jul. 16, 1996, 3 pages.
CES/NaBANCO introduces stored value card technology blockbuster video is first merchant partner, Business Wire, Inc., Jan. 15, 1996.
Cheney, How Effective Were the Financial Saftey Nets in the Aftermath of Katrina, HurricaneKatrinaJan06, Jan. 2006.
Card Based Award Systems, JA8309, Nov. 1, 1995.
CardEx Incentives, www.cardex.com, Apr. 6, 1999.
CardFlash, Apr. 5, 2005.
Vandenengel, Cards on the Internet Advertising on a $3 Bill, Industry Intelligence, Feb. 1, 1995, pp. 46-48.
Kutler, Cash Card Creator Looking Beyond Mondex, Feb. 9, 1995.
Rosen, Cash Just Isn't Flexible Enough Shops of the Future Will Only Take Cards, Daily Express, Technology Section, Feb. 10, 1995, 1 page.
Bank, Cash, Check,Charge—What's Next?, Seattle Times, Mar. 6, 1995.
Morgan et al., Categorizing Risks for Risk Ranking, vol. 20, No. 1, Jun. 22, 2005, pp. 49-58.
Common electronic purse specifications, Business Requirements, Version 6.0, Dec. 1998.
Guidotti, Comparing Environmental risks a Consultative Approach to Setting Priorities at the Community Level, Public Health Rev 1994, vol. 22, Jun. 16, 2005, pp. 321-337.
Britt, Competing in Auto Lending, America's Community Banker, vol. 5, No. 11, Nov. 1, 1996, pp. 33-37.
Haddad, Charles, et. al., Congratulations, Grads—You're Bankrupt; A Marketing Blitz Buries Kids in Plastic and Debt, May 2001.
Consortium created to manage common electronic purse specification, Cardtech Securtech, Chicago, www.visa.com/av/news/PRmisc051199.vhtml, May 11, 1999.
Hight, Jim, Consulting Services, www.strategies-tactics.com, Oct. 15, 2002.
Nora Wood, Corporate Spotlight, Incentive, Dec. 1997, 4 pages.
Mobasher et al., Creating Adaptive Web Sites Through Usage-Based Clustering of URLs, Knowledge and Data Engineering Exchange Workshop, Chicago, IL and Los Alamitos, CA, 1999, pp. 19-25.
Lamond, Credit Card Transactions Real World and Online, Paying by Credit Card-Real World and Online, http//www.virtualschool.edu/mon/ElectronicProperty/klamond/credit, printed Jul. 8, 2005, 17 pages.
D.C. Area Safeway Stores Look for Increase in Sales Volume and Revenue with Cards, Card News, vol. 6, No. 25, Dec. 30, 1991, pp. 7-9.
CardFlash, Cardweb.Com, Daily Payment Card News (2004).
Sherer, Paul M., Deals & Deal Makers: Web Ventures Seek to Facilitate Business Credit, Private Equity, Nov. 8, 1999.
Debit Card News—Paperless Trail Leads Debit to a Check-Free Payroll Program, vol. 3, No. 12, Dec. 16, 1997.
Debit Card Services—Invitation for Expressions of Interest, Jul. 1991, acs00277422.
Piskora, Debit Cards Seen Poised for New Markets, American Banker, Credit/Debit/ATMs, Mar. 7, 1995, p. 16.
Debit and Stored Value Cards for Government: A Growing Trend but States Could Do More, A Survey and White paper of the EBT Industry Council, Nov. 2006.
Definition of Store-Value Card, Wikipedia, retrieved from the internet at http//en.wikipedia.org/wiki/Stored-value—card, retrieved from the internet on Apr. 16, 2007.
Direct Payment Card, International EBT Pilot Evaluation Pilot Evaluation—Argentina, Jan. 1996, acs00277456.
Lennox, Graeme, Don't Be Tempted by the Urge to Splurge: Zero Rates Sound Great But You'll Pay Dearly in the End, Jul. 2001.
E-Z Pass, Web page, http//www.ezpass.com-Disc—portNewYork.html, Nov. 12, 2001.
E-Z Pass, Web page, http \\www.ezpass.com-Disc—ny—annual.html, Nov. 12, 2001.
E-Z Pass, Web page, http \\www.ezpass.com-frameMain.html, Nov. 12, 2001.
E-Z Pass, Web page, http \\www.ezpass.com-whatis.html, Nov. 12, 2001.
Eight Keys to Making the Right Choice, Incentive, Dec. 1996, 9 pages.
D. O'Mahony, Electronic Payment System, 1997, Artech House, XP002137255, p. 7-11.
Business Times, Electronic Purse Can Free You from ATM Drag, Business Times, www.btimes.co.za, printed Feb. 23, 2001, 1 page.
Electronic Purse, SCIA (Smart Card Industry Association), About Smart Cards, www.scia.org, printed Feb. 23, 2001, 1 page.
Sanchez-Klein, Electronic purse alliance planned, Computerworld Online News, Jul. 29, 1998, printed Feb. 23, 2001, 2 pages.
Electronic purse card to be launched tomorrow, New Straits Times, News Clippings, Sep. 18, 1999, printed Feb. 23, 2001, 3 pages.
Exclusively Yours From Maritz . . . The MasterCard Card Ultimate Incentive, Incentive, Oct. 1995, 3 pages.
FOIA # Sep. 2, 2012 Responsive Records Book #11, Mar. 12, 2009, acs00279715.
FOIA # Sep. 2, 2012 Responsive Records Book #2, Mar. 12, 2009, acs00277515.
FOIA # Sep. 2, 2012 Responsive Records Book #3, Mar. 12, 2009, acs00277531.
FOIA # Sep. 2, 2012 Responsive Records Book #5, Mar. 12, 2009, acs00278229.
FOIA # Sep. 2, 2012 Responsive Records Book #7, Mar. 12, 2009, acs00278754.
Block, First Data Subsidiary Creates Payroll Card for the Bankless, LexisNexis Academic, Credit/Debit/ATMs, p. 10, Mar. 21, 1997.
First Data markets stored-value cards, Cards International, Jan. 30, 1996, p. 5.
First USA—Activate Today and Get One Hour Free Calling Card Calls, Call 1-800-555-2535, First USA, 6 pages (1997).
First USA—Call 1(800)335-2453 to Receive One Free Hour of Domestic Long Distance Calling (No Strings Attached), pages (1997).
First USA Platinum Connect, First USA Bank, First USA Promotional Mailing, Oct. 1997, 6 pages.
First Union Issues Smart Cards to Fort Benning Recruits, CardFax, vol. 1999, No. 60, Mar. 26, 1999, 1 page.
Norris, First data unit develops blockbuster cash card, Omaha World Hearld Sunrise Edition, Business Section, Jan. 19, 1996, p. 16.
Roberts, Leigh, Fnb and Nedcor Launch Into the New Era of Smart Card Banking Nov. 15, 1998.
E-Loan, Frequently Asked Questions (2001).
Frequently asked questions, Ecard, www.eregard.com, printed Sep. 23, 2001, 7 pages.
Glossman, et al.,, Glossman, et al., Citicorp Company Report, Report No. 1647151, p. 8 of 16, May 9, 1987.
Ostroff, Jeff, Guide to Buying New Cars, ed Cars, Dealer Scams (2001).
Hamey, Kenneth, Hamey, Home Asset Management Accounts Link Mortgages Equity Lines [Final Edition], The Washington Post, Oct. 5, 2002.
Hargreaves, The Evaluation of the Expanded EBT Demonstration in Maryland, Final Report, May 1994, acs00092018.
Machlis, Have it the smart way Burger King program drives smart-card use, Computerworld, printed Feb. 23, 2001, 1 page.
Here's the calling convenience you asked for 1-800-call-ATT . . . For All Calls, AT&T, Appendix A for Card Carriers, 1999, 7 pages.
Hoovers, General Mills, Inc. Corporate Profile relied upon to show the history of the company, http/cobrands.hoovers.com/global/cobrands/proquest/history.xhtml?COID=10639, Jul. 12, 2005, 2 pages.
How Is It Different?, JA8331, Jul. 2000.
Konrad, IBM Had a Bunch of Unusual Ideas in 2003, www.philly.com; printed Jan. 21, 2004, posted on Jan. 13, 2004, 2 pages.
Incenticard, Bellsouth, JA8329, Jul. 2000.
Judy Quinn, Incentive Cards Explained, Incentive, Dec. 1995, 5 pages.
Incentive Firms Find Debit Cards a Rewarding Experience (Off-line debit card issuers converge efforts with companies looking for effective incentives to boost employee productivity and to motivate individuals to buy their products), Debit Card News, vol. 3, No. 11, Nov. 28, 1997.
Vincent Alonzo, Incentive Marketing . . .Three If by Smart Card, Incentive Sep. 1995, p. 11.
Incentive gift Card Another way to give the gift of choice!, Incentive, Aug. 1995, 2 pages.
Coulton, Incentives Field Moving to Card-Based Series 14, American Banker, Mar. 26, 1998, 3 pages.
Introducing SpendingMoney(TM), Armetta Marketing & Design Product Concept Report, Oct. 9, 1996, 15 pages.
Introducing the First USA Platinum Connect Card, First USA Promotional Mailing, Dec. 1997, 2 pages.
Request Information for Electronic Benefit Transfer (EBT) Services Dept. of Health and Human Services Aug. 2006—Final JPM DHHS 2006—Final (2006).
Alaska Hoing Finance Corporation Quarterly Unaudited Financial Statements with Summarized Financial Information for Jun. 30, 2004, and Request for Information Banking Services, Bates Nos. ACS-00000143-ACS-00000231, Mar. 31, 2005.
Kilian-Kehr, Roger, Kilian-Kehr, Mobile Security with Smartcards, Dissertation, Apr. 8, 2002.
Key Bank Holiday Offer, http//www.key.com/swiftgift/home.html, printed Apr. 5, 1999.
Kibble-Smith Statement to Hoe Committee on Ways and Means, Apr. 5, 2006.
Kleege, Stephen, Kleege, Visa Unveils CoBranding Offensive (Visa International, Visa U.S.A. Inc.), American Banker, v. 159, n. 43, Mar. 4, 1994 (www.dialogclassic.com/MainFrame.jsp, pp. 1-3)
Lewis, David, Lewis, Mortgage Lending Optimized, IntternetWeek, Issue 858, Apr. 23, 2001.
LexisNexis Academic, Debit Card Innovation, vol. XXXV, No. 5, p. 2, May 1997.
LexisNexis Academic, Debit Cards Payroll Card Ups Fees, Future Banker, p. 18, Oct. 6, 1997.
LexisNexis Academic, NTS' TransPay Debit Card Helps Remote and Unbanked Employees Get Funds Quicker, Financial News, Mar. 18, 1997.
Power, Denise, Loehmann's Compiles Shopper Data Via Credit Card, vol. 28, No. 3, pp. 6, Jan. 1998.
MailFrontier Survey Finds that Consumers Hold Financial Institutions Accountable for Online Identitiy Theft, www.mailfrontier.com, Palo Alto, CA, Nov. 2004.
O'Conner, Maritz Gets MasterCard's Stamp of Approval, Business Travel News, Aug. 19, 1996, 2 pages.
Maritz, Incentive, Jun. 1996, p. 111.
Meridian Award Cards, JA8251 (1995).
Meridian-the leader in card marketing, JA8343 (1995).
Meridicard vs. Debit Cards, JA7917 (1995).
Clark, Microsoft, Visa to Jointly Develop PC Electronic-Shopping Software, The Wall Street Journal, Nov. 9, 1994, WSJ B9.
Modification # 1 to the Authorization of the Financial Agent and Terms of Performance, Sep. 30, 1993, acs00277482.
Modification # 2 to the Authorization of the Financial Agent and Terms of Performance, Mar. 25, 1994, acs00277490.
Modification # 3 to the Authorization of the Financial Agent and Terms of Performance, Feb. 25, 1995, acs00277500.
Modification # 4 to the Authorization of the Financial Agent and Terms of Performance, Apr. 1, 1996, acs00277507.
More Retailers Turn to Co-Branding, Chain Store Age Executive with Shopping Center Age, Feb. 1, 1995, 3 pages.
New 1-800-Call-ATT Campaign Promotes One Number For All Calls, AT&T Marketing, News Release, www.att.com/press/0297/970217.csa.htm, Feb. 17, 1997, 2 pages.
Schwab, Charles, Now 7 Ways for a better Total Return for Your Money Schwat 1, The Inventor's Asset Management Account, Charles R. Schwab, Charles Schwab & Co., Inc., 16 pages (1987).
Allen et al., Overview of Smart Cards and the Industry, Smart Cards Seizing Strategic Business Opportunities, Chapter 1, p. 2-20, Irwin Professional Publishing, 1997.
Paper or Plastic? With these three incentives, The Choice is Yours, Incentive, Feb. 1996, 2 pages.
Feldman, Judy, Pay by Check Over the Phone or Net, Oct. 1999.
Dugas, Payroll May Ask Paper or Plastic?, USA Today, 3B, Aug. 14, 2001, 1 page.
Youll, James, Peer to Peer Transactions in Agent Mediated Electronic Commerce, Aug. 2001.
Wolf, Harold A., Personal Finance (1981).
Proton world and Europay to co-operate in creation of new CEPS-compliant e-purse application, Press Release 1999, Waterloo, Belgium, Jun. 28, 1999, 2 pages.
Brown et al., Purchasing Card Magic Eli Lilly Finds Accounts Payable Flying High With Plastic, Corporate Cashflow, vol. 15, No. 12, Nov. 1994, 2 pages.
Purse Application for Cross Border Use in Euro, Cordis, Pace 1st 1999-11531 Pace, www.cordis.lu, printed Feb. 23, 2001, 3 pages.
SK100 Smart Card Electronic Purse Balance Reader, SK100 Balance Reader, http//perso.wanadoo.fr, printed Feb. 23, 2001, 1 page.
Miller, Section E.2.1 Kerberos Authentication and Authorization System, Project Athena, Cambridge, MA, Dec. 21, 1987, 39 pages.
Sessums, Unbanked Citizens Draw Government Attention, vol. 9, No. 4, (1997) acs00280762.
Souccar, Smart Cards 1st Union Smart Card Pilot Enlists a Second Army Base, American Banker, Digital Frontiers, vol. 164, No. 61, Mar. 31, 1999, 3 pages.
Smart Cards Big Brother's Little Helpers, The Privacy Committee of New South Wales, No. 66, Aug. 1995.
Unknown, Smart Cards Forging Into Credit Card Market, vol. 10, Issue 6, Apr. 1995.
Smart card for loyalty and e-purse applications eclipses capability of conventional mag-stripe cards, Press Release, www.1.sib.com, Apr. 21, 1997, printed Feb. 23, 2001, 3 pages.
SmartAxis Load Cash on to your E-Purse Card, Supported Currencies and Schemes, www.smartaxis.co.uk, printed Feb. 23, 2001, 9 pages.
Spurgin, Sopininmon! or What's Happening in the Retail Credit Card Environment, Credit World Journal, vol. 85, No. 4, Mar. 1, 1997, pp. 20-23.
Lacker, Stored Value Cards Costly Private Substitutions for Government Currency, Economic Quarterly, 1996, Economic Quarterly, v82, n3, p1 (25), ISSN 1069-7225, 17 pages.
Lazarony, Stuck for a gift? Give a prepaid credit card, www.bankrate.com, Dec. 21, 1998, 1 page.
Rossman, Kenneth, Summary Appraisal of Real Property, Feb. 15, 2002.
Key, Swift Gift 'Wows' Internet Shoppers, PR Newswire, www.key.com/swiftgift/home.html, Dec. 2, 1998, 1 page.
American Bankers Association, The Bank Credit Card Business (1996).
The Campus Card Conundrum, Card Technology, Journal ISSN 1093-1279, p. 25+, Feb. 1998, pp. 1-8.
The Electronic Purse Reaches the Car Park, http \\docs.vircom.net/mobility/parking, printed Feb. 23, 2001, 2 pages.
The Evolution of a New Consumerism, Chain Store Age, vol. 73, Jun. 1997, pp. 8-9.
The Federal Transit Administration, TCRP Report 32 Multipurpose Transit Payment Media, Chapter 2 Multipurpose Fare Payment Overview, p. 10-20 (1998).
Stoughton, The Gift of Credit, www.washingtonpost.com/wp-srv/business, Dec. 14, 1998.
Nilson, H. Spencer, The Nilson Report, Issue 680, Nov. 1998.
Nora Wood, The Power of the Card, Incentive, Jul. 1997, 6 pages.
Stuber, The electronic purse an overview of recent development and issues, Bank of Canada, Technical Report No. 74, www.bankofcanada.ca, Jan. 1996, printed Feb. 23, 2001, 2 pages.
Understanding the benefits Smartcity offers a number of important benefits to both the card issuers and their customers, http//www.icl.com/smartcards/benefits.htm, printed Feb. 27, 2001, 2 pages.
Langheinrich et al., Unintrusive Customization Techniques for Web Advertising, Computer Networks, vol. 31, 1999, pp. 1259-1272.
Universal Card free lifetime membership extended 3 months, AT&T Marketing, www.att.com/press/0297/970217.csa.html, Dec. 4, 1990, 2 pages.
Unknown, Unknown, Thai Smart Card to Expand Abroad (Smart Loyalty's Smart Bonus Program has 300,000 Cardholders in Thailand, the company plans to expand into markets that include Australia and Malaysia), Cards International, n. 183 p. 5, Sep. 22, 1997.
Yee, Bennet, Using Secure Coprocessors, School of Computer Science Carnegie Mellon University, May 1994.
Vivo Tech, ViVOtech, Inc. RF-Based Contactless Payment: A more convenient way to pay, Apr. 2004.
Visa Cash—Where can I get it?, www.visa-asia.com/pd/cash/where.html, Feb. 23, 2001.
Visa Cash, www.visa-asia.com/pd/cash/main.html, Feb. 23, 2001.
Visa International and SERMEPA Announce Plans for Cross Border Visa Cash Based on CEPS, www.visa.com/av/news/praaamisc111699.vhtml, Nov. 16, 1999.
Visa first to launch electronic purse load via GSM mobile phone, www.cellular.co.za, Johannesburg, ZA, printed Feb. 23, 2001, 4 pages.
Visa releases visa cash electronic purse specifications based on CEPS, www.visa.com/av/news/PRaamisc042099.vhtml, San Francisco, Apr. 20, 1999.
Hansell, Visa to unveil electronic purse cards, New York Times, printed Feb. 23, 2001, 2 pages.
Wood, John et al., Electronic Transfer of Government Benefits, Federal Reserve Bulletin, pp. 203-217, Apr. 1997.
Welcome to Card Express CardEx, CardEx website archived by web.archive on Oct. 31, 1996, http//web.archive.org/web/*/http//www.cardex.com, retrieve Oct. 18, 2003, 7 pages.
Welcome to Card Express, The CardEx Incentive Card, as disclosed in the CardEx web site archived by web.archive.org on Feb. 7, 1998, http//web.archive.org/web/*/http//www.cardex.com, retrieve Oct. 18, 2003, 8 pages.
Swiftgift, Welcome to Swiftgift, www.swiftgiftcard.com, Dec. 8, 1998, 10 pages.
Bowen, Cathy, Welfare Agencies Seek Aid From Smart Cards, Oct. 7, 2002.
Wells Fargo Blazes New Trail for Homeowners, Oct. 2002.
Wenninger et al., The Electronic Purse, Current Issues in Economics and Finance, vol. 1, No. 1, Apr. 1995, acs00098037.
Kenneth Hein, What's the Deal?, Incentive, Jul. 1998, 7 pages.
Machlis et al., Will smart cards replace ATMS?, Computerworld, printed Feb. 23, 2001, 3 pages.
Unknown, HyperSecur Corporation's HyperProximity Technology Now Available on ST16HF52 Microprocessor Chip From STMicroelectronics Business and High Tech Editors CardTech/SecurTech 2000, Business Wire. New York: May 2, 2000. pp. 1.
Pullar-Strecker, Kiwi card converts unlikely to lead smart revolution; Little support for changes to risk allocation; [2 Edition] Puilar-Strecker Tom. Dominion. Wellington. New Zealand, pp. IT. 6, Apr. 25, 2000.
Redman, Mondex trial whets consumers' e-cash appetite Russell Redman. Bank Systems & Technology, New York, vol. 37, 155. 6; p. 16, 1 pp. 5, Jun. 2000.
Church, Technology Takes the Toll Church, Vernon M. Popular Science. New York, vol. 240, Issue 3; p. 78, 3 pgs, Mar. 1992.
Reid, “Metro ready to use High Tech Fare System, Selling Smart Cards from Internet Site to Initiate Era of Cashless Commuting”, The Washington Post, Washington DC, pp. B02, Mar. 12, 1999.
Related Publications (1)
Number Date Country
20030187787 A1 Oct 2003 US
Provisional Applications (1)
Number Date Country
60368155 Mar 2002 US