The invention relates to systems and methods for detecting various forms of session tampering and attempted fraud. More particularly, the invention herein relates to systems and methodologies that identify session hijacking and man-in-the-middle attacks during online transactions with financial institutions and e-commerce transactions.
Most online transactions involving the transmission of sensitive or confidential information require a high degree of certainty as to the identity of the parties involved. It is well known that members of the public access the Internet for the purpose of conducting financial transactions, online banking and purchasing of merchandise. These commercial systems suffer from a common disadvantage in that they rely on the transmission of sensitive information over unsecured network routes and lines during each transaction. While these systems often rely on encryption, password protection and other security options that are considered relatively safe, there remains significant risk of fraud, identify theft and misappropriation of information.
The Internet can be described generally as a wide area network of computers or devices that can be remotely located worldwide. The computers or devices are linked by a variety of communication links including telephone lines, cable television lines, satellite linkups, wireless networks and other telecommunication connections. Internet service providers (ISPs) provide their subscribers or end users with a link to the main backbone of the Internet. The computers and devices can connect to the Internet and are assigned IP addresses to uniquely identify them and set them apart. These computer or device IP addresses may be static or change (dynamic) during each Internet session. Each (user) session may involve some level of activity by a computer with an IP address on which a user spends time at a Web site. The number of user sessions on a site is often used in measuring the amount of traffic at a Web site. A site administrator usually determines the time frame of a user session between logging in and out, e.g., 10 minutes, before an online session is terminated or timed out due to user inactivity. However if the visitor performs some level of activity within selected time period, this can still be considered one or the same user session and any transactions conducted within that time frame would be considered part of a single session. When a user returns to the site to begin a log-in procedure, or after an allotted time period has expired, this would be considered another user session.
According to many marketing surveys, there is a relatively high percentage of companies and users who refrain from purchasing merchandise and conducting e-commerce over the Internet. There remains a persistent fear that credit card, account and other personal information will be intercepted online by a third party computer hacker and used illegally despite ongoing security efforts. This comes at great expense for users who become victims of identity theft and fraud. At the same time, online vendors and financial institutions are subject to additional risks in the course of transactions subject to illegal activity such as session tampering and session hijacking. Considering the numerous types of incidents that threaten security of enterprise systems and networks, attackers remain capable of modifying and manipulating or taking over online sessions to commit fraud and theft.
There is a need for online solutions that detect session manipulation or tampering so that fraud and the misappropriation or misuse of confidential information can be avoided.
The invention provides methods and systems related to the detection of session tampering and/or hijacking that can be used in an effort to prevent fraud. Various aspects of the invention can be appreciated individually or collectively to provide solutions against session tampering and/or hijacking.
An aspect of the invention provides methods and systems that collect multiple computer or device “fingerprints” during online visits to sites for banks, financial institutions or other companies that conduct transactions over the Internet. During the course of an online session, a Session Identifier (Session ID) can be assigned to facilitate the exchange of data between computers or devices (server/client). When a user accesses or visits an online account or site using a personal computer (PC) or any device connected to the Internet over HTTP protocol, a PC or device fingerprint corresponding to that computer or device and the relevant Session ID may be collected in accordance with this aspect of the invention.
A preferable embodiment of the invention may incorporate one or more steps of collecting computer or device fingerprints and Session IDs at various instances throughout an online session. For example, such information may be collected when a user navigates to a 4 log-in page, a page that concludes a transaction or HTML pages from a Web site that are common for online banking applications such as setting up new payees, changes of address (e-mail or street), and authorizing the wiring or transfer of money. By collecting fingerprints and/or Session ID information at several site locations or instances throughout a session, and by tracking the assigned Session ID for that particular session, incidents of session tampering or session hijacking can be detected so that appropriate responses may be conducted during the online session or post-session.
In another embodiment of the invention, methods of detecting session tampering are also provided that involve analysis of collected device fingerprints during different time intervals of an online session and/or at different portions of a web site being viewed. A preferable embodiment of the invention includes the analysis and comparison of PC fingerprints corresponding to a user device containing a relevant Session ID and other identifying information associated with the device.
Another aspect of the invention provides systems and methods for implementing secure transactions including but not limited to online purchases over the Internet. These solutions allow network or Internet users to more securely perform online transactions with other parties such as banking and financial institutions, vendors of merchandise and/or services or other transactions made over the Internet or a computer network. The occurrence of incidents involving electronic interception or session tampering or hijacking can be detected to alert companies who can thereby initiate responsive actions to prevent fraud, identify or credit card theft and financial loss.
Other goals and advantages of the invention will be further appreciated and understood when considered in conjunction with the following description and accompanying drawings. While the following description may contain specific details 5 describing particular embodiments of the invention, this should not be construed as limitations to the scope of the invention but rather as an exemplification of preferable embodiments. For each aspect of the invention, many variations are possible as known to those of ordinary skill in the art. A variety of changes and modifications can be made within the scope of the invention without departing from the spirit thereof.
All publications and patent applications mentioned in this specification are herein incorporated by reference to the same extent as if each individual publication or patent application was specifically and individually indicated to be incorporated by reference.
The illustrations included within this specification describe many of the advantages and features of the invention. It shall be understood that similar reference numerals and characters noted within the illustrations herein may designate the same or like features of the invention. The illustrations and features depicted herein are not necessarily drawn to scale.
The invention provides methods and apparatus for detecting session tampering and hijacking that can be applied to fraud prevention. Various aspects of the invention described herein may be applied to any of the particular applications set forth below. The invention may be applied as a standalone tool or as part of an integrated software solution against online fraud, identify theft and Internet security. The invention can be optionally integrated into existing business processes seamlessly and transparent to a user or an attacker (hacker). It shall be understood that different aspects of the invention can be appreciated individually, collectively or in combination with each other
Some Web servers generate Session IDs by simply incrementing static numbers. However, most servers use a variety of algorithms that involve more complex methods, such as factoring in the date and time of the visit, an IP address and other variables. In general, every time an Internet user visits a specific Web site, a new Session ID is assigned. Closing a Web browser and then reopening and visiting the site again using the same browser may generate a new Session ID. However, the same Session ID is sometimes maintained as long as the browser is open, even if the user leaves the site in question and returns. In some cases, Web servers terminate a session after a few minutes of inactivity and at a later time assign a new Session ID. If a Web browser is left active when visiting a site but nothing is entered for a predetermined time, e.g., 15 minutes, an existing Session ID can be discarded. When browsing continues later even at the same site, the user will be typically given another Session ID automatically. The use of Session IDs alone in their conventional form does not offer secure Web browsing.
Session IDs can be stolen using a variety of techniques: sniffing network traffic, using trojans on client PCs, using the HTTP referrer header where the identifier is stored in the query string parameters, and/or using script injectors such as cross-site scripting attacks where a malicious script is executed that redirects information intended for a legitimate user to the hacker instead. In addition, a Web browser may unknowingly send a URL containing a Session ID to an attacker. Hackers can also acquire Session IDs in other various ways including session prediction, stealing or brute force. Afterwards they can modify the exchange of information or do something else during an already existing session in what can be referred to as session tampering, or they can masquerade or pose as authorized users in forms of attacks that may be referred to as session hijacking. An increasingly more common kind of attack today is known as a man-in-the middle (MITM) attack. The attacker can observe the communication (e.g., by sniffing packets) between devices and collect and exploit the data that is transmitted.
Various aspects of the invention can be applied to guard against session tampering or hijacking during an exchange between different kinds of computers or user devices. Based on a comparison of a Session ID relative to a plurality of device fingerprints taken during a session, an authorized user may be distinguished from an attacker. When information is exchanged with an unauthorized device used by the attacker during an existing online session, it may be detectable in accordance with the concepts of the invention. It should be understood that reference to a client, device or personal computer (PC) herein includes any telecommunications device equipped with a browser which allows a user to access and interface with remote servers, particularly servers at Web sites on the Internet. These devices include but are not limited to cellular telephones, wireless handsets and telephones, personal digital assistants, palmtop/laptop or notebook computers and desktop PCs. It should also be recognized that the illustrated Web site server may include or be connected to a plurality of servers for a provider.
As shown in
During online sessions where the security of transmission between a client/server is compromised, an attacker hijacks or tampers with an already established session from another PC or device that would exhibit a different fingerprint. The established session between a user client and a Web server usually has an associated Session ID already assigned. The Session ID would include a piece of generated data to be used in network communications often over HTTP to identify a session or a series of related message exchanges. Session IDs often become necessary in cases where the communications infrastructure between computers uses a stateless protocol such as HTTP. For example, concepts of the invention can be applied to provide an e-commerce solution to detection intrusion by a hacker or thief. A Buyer who visits a Seller Web site may want to purchase a number of articles during a visit and place them during the interim in a virtual shopping cart. The Buyer can then finalize shopping by going to the site checkout page to effect payment. This typically involves an ongoing communication where a plurality of Web pages is requested by the client, and they are sent back by the server in turn. In such a situation, it is often important to keep track of the current state of the shopper cart, and a Session ID is one of the pieces of information used to achieve that goal. Once the Buyer finalizes an order or completes a certain activity, the Session ID may no longer be valid or and another session would be initiated with a new Session ID in order to purchase additional items. As described elsewhere herein, a plurality of user device fingerprints may be collected and compared to respective Session IDs with respect to online ordering and purchasing in order to detect session tampering or hijacking.
In a preferable embodiment of the invention, as illustrated in
Some preferable embodiments of the invention can be employed to defend against session hijacking by collecting PC fingerprints and Session ID information at multiple points of time or selected time intervals during an online banking session. Session hijacking has been described as the act of taking control of a user session after successfully obtaining or generating an authentication Session ID. Often times session hijacking involves an attacker using Session IDs captured by techniques involving brute force or reverse-engineering in order to seize control of a banking session and other Web application sessions while that session is still in progress.
A Session ID is often an identification string that is usually composed of a long, random, alpha-numeric string that is transmitted between host devices such as a client and a server. Session IDs are commonly stored in cookies, URLs and hidden fields of Web pages. A URL containing a Session ID might resemble something such like the following: http://www.123somesite.com/view/7AD30725122120803. In an HTML page, a Session ID may be stored as a hidden field and resemble something like the following: <input type=“hidden” name=“sessionID” value=“54321abcd”>. Alternatively, cookies can include Session ID information and can be set to expire (or be deleted) upon the closing of a Web browser. These are termed “session cookies” or “non-persistent” cookies typically. Cookies that last beyond a user's session are termed “persistent” cookies. Persistent cookies are usually stored in memory on a computer hard drive.
There are other known shortcomings or problems associated with employing Session IDs besides how they can be readily located by hackers. Many popular Web sites use algorithms based on easily predictable variables, such as time or IP address, in order to generate the Session IDs, causing their Session IDs to be predictable. If encryption is not used (typically SSL), Session IDs are transmitted in a clear and susceptible form that is susceptible to eavesdropping and session hijacking. In session hijacking attacks, an attacker usually takes over an already existing session that is underway. This may occur entirely unnoticed by the authorized user who may still believe an online session is ongoing. As described elsewhere herein, a client and server communication usually takes place across a network using IP-based communication methods. An attacker may use a computer and hacking software or tools to gain access to a connection between a legitimate client and Web server on the Internet, for example. The attacker can then inspect and capture traffic (packets) going over the network during an online session. By beating the client in replying back to the Web server with seemingly legitimate messages, the session may thus continue but with the attacking host computer. Accordingly, the session with the legitimate client can be dropped and the attacker can practically do anything that the legitimate client could accomplish.
Accordingly, this aspect of the invention presents comparative evidence of session hijacking when the same Session ID is used by different computers or devices that exhibit different fingerprints. A one-to-many relationship as between a Session ID and multiple device fingerprints would suggest that the online session was compromised so remedial action should be taken or required to prevent fraud or minimize risk of loss. In a preferable embodiment of the invention, a one-to-many relationship as between a Session ID and multiple IP addresses could be used to signal or identify the occurrence of session hijacking. The step of authentication can be performed numerous times during an online session rather than just at log-in to confirm user identities based on their device fingerprints for a corresponding Session ID in progress. It should be understood that device fingerprints may include an IP address component alone or with a combination of other parameters or characteristics of the device.
In another embodiment of the invention, methods of detecting session tampering are also provided. Attacks involving session tampering typically involve an attacker (or a computer program that runs on behalf of an attacker) doing something that allows the revelation or modification of the characteristics to an already established session.
Methods provided herein to detect session tampering may include an initial step of placing a plurality of fingerprint collectors in preselected or strategic locations on a Web site. A fingerprint collector may be described as a computer program residing in the memory of computer or server that is designed to extract device fingerprint information from the data or information exchanged between a (Web) server in order to identify a user device characteristic including but not limited to IP address information (see
As with other embodiments of the invention herein, another step according to this methodology may include placement of a session collector for collecting Session ID data on each page, which is provided by an established default mechanism for most Web sites to manage and identify user sessions. A session collector may be described as a computer program residing in the memory of computer or server that is designed to extract device Session ID information from the data or information exchanged between a (Web) server in order to identify a particular online session (see
Another aspect of the invention provides systems and methods for implementing secure transactions including but not limited to online purchases over the Internet. During preselected time intervals or pages at a Web site, a plurality of computer fingerprints may be collected throughout the session for the computer on which a consumer conducts a purchase online by using and entering credit card information. In addition, the computer fingerprints can be collected and compared to a Session ID number assigned to the session by an online merchant. When a selected fingerprint is determined to be different from the others collected during the session, the merchant will be able to suspect possible session tampering or hijacking. By collecting fingerprints and Session ID information in several locations of the site in accordance with this aspect of the invention, online retailers and others who are exposed to Internet fraud can identify when a session has been tampered with or hijacked by another device (hacker computer) that is using the same Session ID.
As shown in
Furthermore, for online banking applications, the first fingerprint may be taken while the user is logging-on from a home page. A Session ID can be then established for that session. Before allowing the user to perform online banking functions or activity including but not limited to withdrawing or transferring funds or changing passwords, the second fingerprint may be collected along with its corresponding Session ID information. Unlike conventional systems, this additional authentication step is performed again so that the comparison between fingerprints can be performed for that particular session relative to the same Session ID. When the fingerprints do not match, then the activity requested may be immediately denied and communicated to the user. For other applications of the invention, the transaction may be flagged for further review later by the financial institution. It may not be preferable often times to reveal to attackers at what point in time during a session was fraud suspected.
Another preferable embodiment of the invention provides post-session comparison of user or device fingerprints and Session IDs. This analysis allows the merchant to reject a transaction or to at least flag an incident so that further investigation can be conducted. For example, many financial institutions (e.g., Bank of America) build-in lag time or delay as to when financial activity such as electronic checking can be completed by a customer payor and mailed to a payee. An online customer may be advised of status such as the transaction is “pending” or “in progress” or “scheduled.” During this time, in addition to other desired procedural checks implemented by the financial institution, a series of customer transactions reports can be analyzed for possible fraud.
The invention herein provides methods and systems for fraud prevention and security relating to online sessions with users on a network or the Internet. It shall be understood that principles of the invention can be applied and modified for application with other fraud prevention and session monitoring systems and methods such as those described in published U.S. patent applications US 2002/0073046 (Ser. No. 09/875,795) and US 2004/0254890 (Ser. No. 10/444,506), which are each incorporated by reference herein in their entirety. Any of the aforementioned embodiments of the invention can be also integrated into existing business processes and state-of-the art security systems. For example, the invention may be applied to authentication systems that incorporate static (persistent) passwords that remain the same in between sessions and log-ins. Or, alternatively, various aspects of the invention can be applied to systems that provide a onetime password (OTP) that changes for each online session. The use of an OTP makes it more difficult usually to gain unauthorized access to restricted resources or online sessions. An OTP may be essentially a series of numbers or other characters generated by a mathematical algorithm (soft token) and/or displayed on a physical device (hard token) that is synchronized with an authentication server. Even with relatively secure sessions protected by OTP authentication, session tampering and/or hijacking is possible. Accordingly, multiple computer or device fingerprints can be collected as described above during multiple points or places during an online session authenticated with an OTP token so that a comparison can be made relative to particular Session ID.
It should be understood from the foregoing that, while particular implementations have been illustrated and described, various modifications can be made thereto and are contemplated herein. It is also not intended that the invention be limited by the specific examples provided within the specification. While the invention has been described with reference to the aforementioned specification, the descriptions and illustrations of the preferable embodiments herein are not meant to be construed in a limiting sense. Furthermore, it shall be understood that all aspects of the invention are not limited to the specific depictions, configurations or relative proportions set forth herein which depend upon a variety of conditions and variables. Various modifications in form and detail of the embodiments of the invention will be apparent to a person skilled in the art. It is therefore contemplated that the invention shall also cover any such modifications, variations and equivalents.
This application is a continuation application of U.S. Ser. No. 15/655,045, filed on Jul. 20, 2017, which is a continuation application of U.S. Ser. No. 14/931,799, filed on Nov. 3, 2015, now U.S. Pat. No. 9,754,311, which is a continuation of U.S. Ser. No. 14/473,818, filed on Aug. 29, 2014, now U.S. Pat. No. 9,196,004, which is a continuation of U.S. Ser. No. 13/414,678, filed on Mar. 7, 2012, now U.S. Pat. No. 8,826,393, which is a continuation of U.S. Ser. No. 11/694,882, filed on Mar. 30, 2007, now U.S. Pat. No. 8,151,327, which claims the benefit of priority to U.S. Provisional Application Ser. No. 60/744,107, filed on Mar. 31, 2006, where all such applications are hereby incorporated herein by reference in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
4805222 | Young et al. | Feb 1989 | A |
4912761 | Tan et al. | Mar 1990 | A |
4924387 | Jeppesen | May 1990 | A |
5184849 | Taylor | Feb 1993 | A |
5491735 | Hsieh | Feb 1996 | A |
5519827 | Mizushima | May 1996 | A |
5521907 | Ennis, Jr. | May 1996 | A |
5557686 | Brown et al. | Sep 1996 | A |
5627886 | Bowman | May 1997 | A |
5679940 | Templeton et al. | Oct 1997 | A |
5721765 | Smith | Feb 1998 | A |
5724424 | Giffor | Mar 1998 | A |
5748740 | Curry et al. | May 1998 | A |
5748780 | Stolfo et al. | May 1998 | A |
5764275 | Lappington et al. | Jun 1998 | A |
5802156 | Felger | Sep 1998 | A |
5819226 | Gopinathan et al. | Oct 1998 | A |
5864620 | Pettitt | Jan 1999 | A |
5884289 | Anderson et al. | Mar 1999 | A |
5886334 | D'Entremont | Mar 1999 | A |
5892900 | Ginter et al. | Apr 1999 | A |
5894510 | Felger | Apr 1999 | A |
5899980 | Wilf et al. | May 1999 | A |
5903721 | Sixtus | May 1999 | A |
5933480 | Felger | Aug 1999 | A |
5960069 | Felger | Sep 1999 | A |
6009523 | Owaki et al. | Dec 1999 | A |
6029154 | Pettitt | Feb 2000 | A |
6029159 | Zorba et al. | Feb 2000 | A |
6062474 | Kroll | May 2000 | A |
6078907 | Lamm | Jun 2000 | A |
6092053 | Boesch et al. | Jul 2000 | A |
6094643 | Anderson et al. | Jul 2000 | A |
6105012 | Chang et al. | Aug 2000 | A |
6112240 | Pogue et al. | Aug 2000 | A |
6148407 | Aucsmith | Nov 2000 | A |
6151593 | Cho et al. | Nov 2000 | A |
6163604 | Baulier et al. | Dec 2000 | A |
6163771 | Walker et al. | Dec 2000 | A |
6164528 | Hills et al. | Dec 2000 | A |
6205436 | Rosenberg et al. | Mar 2001 | B1 |
6209104 | Jalili | Mar 2001 | B1 |
6216153 | Vortriede | Apr 2001 | B1 |
6223289 | Wall et al. | Apr 2001 | B1 |
6282276 | Felger | Aug 2001 | B1 |
6295605 | Dodder et al. | Sep 2001 | B1 |
6327384 | Hirao et al. | Dec 2001 | B1 |
6330546 | Gopinathan et al. | Dec 2001 | B1 |
6405922 | Kroll | Jun 2002 | B1 |
6442529 | Krishan et al. | Aug 2002 | B1 |
6442692 | Zilberman | Aug 2002 | B1 |
6457021 | Berkowitz et al. | Sep 2002 | B1 |
6480710 | Laybourn et al. | Nov 2002 | B1 |
6509847 | Anderson | Jan 2003 | B1 |
6523019 | Borthwick | Feb 2003 | B1 |
6546493 | Magdych et al. | Apr 2003 | B1 |
6553108 | Felger | Apr 2003 | B1 |
6560455 | Amin et al. | May 2003 | B2 |
6567099 | Dawson | May 2003 | B1 |
6597775 | Lawyer et al. | Jul 2003 | B2 |
6646765 | Barker et al. | Nov 2003 | B1 |
6678666 | Boulware | Jan 2004 | B1 |
6687390 | Avni et al. | Feb 2004 | B2 |
6687696 | Hofmann et al. | Feb 2004 | B2 |
6689055 | Mullen et al. | Feb 2004 | B1 |
6718363 | Ponte | Apr 2004 | B1 |
6745333 | Thomsen | Jun 2004 | B1 |
6803920 | Gossett et al. | Oct 2004 | B2 |
6804624 | Silverman | Oct 2004 | B2 |
6850606 | Lawyer et al. | Feb 2005 | B2 |
6892307 | Wood et al. | May 2005 | B1 |
6895507 | Tepler | May 2005 | B1 |
6895514 | Kermani | May 2005 | B1 |
6898709 | Teppler | May 2005 | B1 |
6908030 | Rajasekaran et al. | Jun 2005 | B2 |
6937569 | Sarkar et al. | Aug 2005 | B1 |
6947978 | Huffman | Sep 2005 | B2 |
6954532 | Handley et al. | Oct 2005 | B1 |
6957185 | Labaton | Oct 2005 | B1 |
6957339 | Shinzaki | Oct 2005 | B2 |
7002712 | Barker et al. | Feb 2006 | B2 |
7003670 | Heaven et al. | Feb 2006 | B2 |
7007174 | Wheeler et al. | Feb 2006 | B2 |
7013001 | Felger | Mar 2006 | B1 |
7027800 | Haumont et al. | Apr 2006 | B2 |
7039505 | Southard et al. | May 2006 | B1 |
7039699 | Narin et al. | May 2006 | B1 |
7043640 | Pritchard et al. | May 2006 | B2 |
7089310 | Ellerman et al. | Aug 2006 | B1 |
7089585 | Dharmarajan | Aug 2006 | B1 |
7096192 | Pettitt | Aug 2006 | B1 |
7100049 | Gasparini et al. | Aug 2006 | B2 |
7103570 | Morea et al. | Sep 2006 | B1 |
7120590 | Eisen et al. | Oct 2006 | B1 |
7130858 | Ciaramitaro et al. | Oct 2006 | B2 |
7143095 | Barrett | Nov 2006 | B2 |
7158622 | Lawyer et al. | Jan 2007 | B2 |
7165051 | Ronning | Jan 2007 | B2 |
7174454 | Roskind | Feb 2007 | B2 |
7191467 | Dujari et al. | Mar 2007 | B1 |
7197646 | Fritz et al. | Mar 2007 | B2 |
7221949 | Clough | May 2007 | B2 |
7225974 | Yamauchi | Jun 2007 | B2 |
7237717 | Rao et al. | Jul 2007 | B1 |
7249093 | King | Jul 2007 | B1 |
7251624 | Lee et al. | Jul 2007 | B1 |
7260837 | Abraham et al. | Aug 2007 | B2 |
7263492 | Suresh et al. | Aug 2007 | B1 |
7263506 | Lee et al. | Aug 2007 | B2 |
7272610 | Torres | Sep 2007 | B2 |
7272728 | Pierson et al. | Sep 2007 | B2 |
7292723 | Tedesco et al. | Nov 2007 | B2 |
7293096 | Foltak | Nov 2007 | B1 |
7296088 | Padmanabhan et al. | Nov 2007 | B1 |
7328216 | Hofmann et al. | Feb 2008 | B2 |
7330824 | Kanojia et al. | Feb 2008 | B1 |
7330871 | Barber | Feb 2008 | B2 |
7340045 | Felger | Mar 2008 | B2 |
7346551 | Pe Jimenez et al. | Mar 2008 | B2 |
7346775 | Gasparinl et al. | Mar 2008 | B2 |
7349955 | Korb et al. | Mar 2008 | B1 |
7359962 | Willebeek-Lemair et al. | Apr 2008 | B2 |
7363170 | Seul et al. | Apr 2008 | B2 |
7373669 | Eisen | May 2008 | B2 |
7376618 | Anderson et al. | May 2008 | B1 |
7379891 | Donner et al. | May 2008 | B1 |
7404087 | Teunen | Jun 2008 | B2 |
7401082 | Keene et al. | Jul 2008 | B2 |
7403922 | Lewis et al. | Jul 2008 | B1 |
7406441 | Kimura et al. | Jul 2008 | B2 |
7428587 | Rowland et al. | Sep 2008 | B2 |
7436780 | Stephens | Oct 2008 | B2 |
7438226 | Helsper et al. | Oct 2008 | B2 |
7447494 | Law et al. | Nov 2008 | B2 |
7451487 | Oliver et al. | Nov 2008 | B2 |
7457401 | Lawyer et al. | Nov 2008 | B2 |
7457823 | Shraim et al. | Nov 2008 | B2 |
7475242 | Baird et al. | Jan 2009 | B2 |
7478182 | Schweig | Jan 2009 | B2 |
7487350 | Utin | Feb 2009 | B2 |
7496752 | Yamaguchi et al. | Feb 2009 | B2 |
7497374 | Helsper et al. | Mar 2009 | B2 |
7502610 | Maher | Mar 2009 | B2 |
7502933 | Jakobsson et al. | Mar 2009 | B2 |
7526796 | Lulich et al. | Apr 2009 | B2 |
7543740 | Greene et al. | Jun 2009 | B2 |
7552090 | Barber | Jun 2009 | B1 |
7555458 | Felger | Jun 2009 | B1 |
7562221 | Nyström et al. | Jul 2009 | B2 |
7577620 | Donner | Aug 2009 | B1 |
7581112 | Brown et al. | Aug 2009 | B2 |
7606560 | Labrou et al. | Oct 2009 | B2 |
7657626 | Zwicky | Feb 2010 | B1 |
7660902 | Graham et al. | Feb 2010 | B2 |
7665140 | Oliver et al. | Feb 2010 | B2 |
7665658 | Fields | Feb 2010 | B2 |
7673793 | Greene et al. | Mar 2010 | B2 |
7685629 | White et al. | Mar 2010 | B1 |
7698743 | Ohmori et al. | Apr 2010 | B2 |
7708200 | Helsper et al. | May 2010 | B2 |
7711846 | Padmanabhan et al. | May 2010 | B2 |
7735141 | Noel et al. | Jun 2010 | B1 |
7739402 | Roese et al. | Jun 2010 | B2 |
7739512 | Hawkes | Jun 2010 | B2 |
7743409 | Gonzalez et al. | Jun 2010 | B2 |
7752084 | Pettitt | Jul 2010 | B2 |
7756783 | Crooks | Jul 2010 | B2 |
7761379 | Zoldi et al. | Jul 2010 | B2 |
7778846 | Suresh et al. | Aug 2010 | B2 |
7813937 | Pathria et al. | Oct 2010 | B1 |
7813944 | Luk et al. | Oct 2010 | B1 |
7849029 | Crooks et al. | Dec 2010 | B2 |
7849307 | Roskind | Dec 2010 | B2 |
7853526 | Milana | Dec 2010 | B2 |
7853533 | Eisen | Dec 2010 | B2 |
7856372 | Ullah | Dec 2010 | B2 |
7860783 | Yang et al. | Dec 2010 | B2 |
7861260 | Shkedi | Dec 2010 | B2 |
7865427 | Wright et al. | Jan 2011 | B2 |
7882217 | Katzir | Feb 2011 | B2 |
7908223 | Klein et al. | Mar 2011 | B2 |
7908645 | Varghese et al. | Mar 2011 | B2 |
7930285 | Abraham et al. | Apr 2011 | B2 |
7933984 | Smith et al. | Apr 2011 | B1 |
7937467 | Barber | May 2011 | B2 |
7940929 | Sengupta | May 2011 | B1 |
7945494 | Williams | May 2011 | B2 |
7945515 | Zoldi et al. | May 2011 | B2 |
7949564 | Hughes et al. | May 2011 | B1 |
7958029 | Bobich et al. | Jun 2011 | B1 |
7958246 | Barber | Jun 2011 | B2 |
7961857 | Zoldi et al. | Jun 2011 | B2 |
7970701 | Lewis et al. | Jun 2011 | B2 |
7983691 | Wong et al. | Jul 2011 | B1 |
7991716 | Crooks et al. | Aug 2011 | B2 |
7995996 | Link, II et al. | Aug 2011 | B2 |
8001376 | Utin | Aug 2011 | B2 |
8001597 | Crooks | Aug 2011 | B2 |
8015614 | Matsuzaki et al. | Sep 2011 | B2 |
8015921 | Leppanen et al. | Sep 2011 | B2 |
8019678 | Wright et al. | Sep 2011 | B2 |
8020763 | Kowalchyk et al. | Sep 2011 | B1 |
8024266 | Barber | Sep 2011 | B1 |
8025220 | Zoldi et al. | Sep 2011 | B2 |
8027439 | Zoldi et al. | Sep 2011 | B2 |
8032448 | Anderson et al. | Oct 2011 | B2 |
8037097 | Guo et al. | Oct 2011 | B2 |
8037511 | Lundy et al. | Oct 2011 | B1 |
8041597 | Li et al. | Oct 2011 | B2 |
8042164 | Sheynblat et al. | Oct 2011 | B2 |
8046271 | Jimenez et al. | Oct 2011 | B2 |
8060922 | Crichton et al. | Nov 2011 | B2 |
8065233 | Lee et al. | Nov 2011 | B2 |
8090648 | Zoldi et al. | Jan 2012 | B2 |
8108378 | Ott, IV et al. | Jan 2012 | B2 |
8121962 | Vaiciulis et al. | Feb 2012 | B2 |
8122082 | Klein | Feb 2012 | B2 |
8126816 | Mu et al. | Feb 2012 | B2 |
8131615 | Diev et al. | Mar 2012 | B2 |
8140689 | Barber | Mar 2012 | B2 |
8141148 | Thomas et al. | Mar 2012 | B2 |
8145560 | Kulkarni et al. | Mar 2012 | B2 |
8145762 | Barber | Mar 2012 | B2 |
8150968 | Barber | Apr 2012 | B2 |
8151327 | Eisen | Apr 2012 | B2 |
8166068 | Stevens | Apr 2012 | B2 |
8175897 | Lee et al. | May 2012 | B2 |
8176178 | Thomas et al. | May 2012 | B2 |
8180686 | Ryu et al. | May 2012 | B2 |
8181015 | Roskind | May 2012 | B2 |
8185953 | Rothstein et al. | May 2012 | B2 |
8190513 | Felger | May 2012 | B2 |
8190529 | Abe et al. | May 2012 | B2 |
8191148 | Oliver et al. | May 2012 | B2 |
8201099 | Osbourn et al. | Jun 2012 | B1 |
8204833 | Mu et al. | Jun 2012 | B2 |
8209744 | Zhu et al. | Jun 2012 | B2 |
8209760 | Hardman | Jun 2012 | B1 |
8213898 | Choti et al. | Jul 2012 | B2 |
8214232 | Tyler et al. | Jul 2012 | B2 |
8214285 | Hu et al. | Jul 2012 | B2 |
8219415 | Tyler et al. | Jul 2012 | B2 |
8224348 | Bolon et al. | Jul 2012 | B2 |
8229844 | Felger | Jul 2012 | B2 |
8250631 | Iyengar et al. | Aug 2012 | B2 |
8266295 | Klein et al. | Sep 2012 | B2 |
8271891 | Osbourn et al. | Sep 2012 | B1 |
8280833 | Miltonberger | Oct 2012 | B2 |
8290838 | Thakur et al. | Oct 2012 | B1 |
8295898 | Ashfield et al. | Oct 2012 | B2 |
8296228 | Kloor | Oct 2012 | B1 |
8296229 | Yellin et al. | Oct 2012 | B1 |
8296245 | Barber et al. | Oct 2012 | B2 |
8296250 | Crooks et al. | Oct 2012 | B2 |
8306933 | Kawai et al. | Nov 2012 | B2 |
8307430 | Chen et al. | Nov 2012 | B1 |
8311907 | Klein et al. | Nov 2012 | B2 |
8321269 | Linden et al. | Nov 2012 | B2 |
8326759 | Hammad | Dec 2012 | B2 |
8326760 | Ma et al. | Dec 2012 | B2 |
8326763 | Zuili | Dec 2012 | B2 |
8332338 | Vaiciulis et al. | Dec 2012 | B2 |
8332522 | Barber | Dec 2012 | B2 |
8370253 | Grossman et al. | Feb 2013 | B1 |
8370638 | Duane et al. | Feb 2013 | B2 |
8380831 | Barber | Feb 2013 | B2 |
8392987 | Sasamura et al. | Mar 2013 | B2 |
8407112 | Walter | Mar 2013 | B2 |
8407798 | Lotem et al. | Mar 2013 | B1 |
8417587 | Jimenez et al. | Apr 2013 | B2 |
8423458 | Barber | Apr 2013 | B2 |
8424061 | Rosenor | Apr 2013 | B2 |
8429070 | Hu et al. | Apr 2013 | B2 |
8443202 | White et al. | May 2013 | B2 |
8452715 | Barber | May 2013 | B2 |
8453226 | Hammad | May 2013 | B2 |
8462161 | Barber | Jun 2013 | B1 |
8464290 | Beyda et al. | Jun 2013 | B2 |
8468582 | Kuang et al. | Jun 2013 | B2 |
8484470 | Sakakihara et al. | Jul 2013 | B2 |
8495714 | Jones et al. | Jul 2013 | B2 |
8516439 | Brass et al. | Aug 2013 | B2 |
8539070 | Barber | Sep 2013 | B2 |
8543522 | Ryman-Tubb et al. | Sep 2013 | B2 |
8548137 | Zoldi et al. | Oct 2013 | B2 |
8559607 | Zoldi et al. | Oct 2013 | B2 |
8567669 | Griegel et al. | Oct 2013 | B2 |
8588816 | Collins | Nov 2013 | B2 |
8601109 | Johannsen | Dec 2013 | B2 |
8611856 | Yan et al. | Dec 2013 | B2 |
8612854 | Eisen et al. | Dec 2013 | B2 |
8660539 | Khambete et al. | Feb 2014 | B2 |
8683561 | Utin | Mar 2014 | B2 |
8688543 | Dominguez | Apr 2014 | B2 |
8751815 | Lunde et al. | Jun 2014 | B2 |
8762283 | Gerber et al. | Jun 2014 | B2 |
8762574 | Barber | Jun 2014 | B2 |
8763113 | Thomas et al. | Jun 2014 | B2 |
8776225 | Pierson et al. | Jul 2014 | B2 |
8779981 | Eisen et al. | Jul 2014 | B2 |
8781975 | Bennett et al. | Jul 2014 | B2 |
8782783 | Thomas et al. | Jul 2014 | B2 |
8799458 | Barber | Aug 2014 | B2 |
8817984 | Miller et al. | Aug 2014 | B2 |
8826393 | Eisen | Sep 2014 | B2 |
8838478 | Kretz et al. | Sep 2014 | B2 |
8838967 | Mills et al. | Sep 2014 | B1 |
8862514 | Eisen | Oct 2014 | B2 |
8862526 | Miltonberger | Oct 2014 | B2 |
8881288 | Levy et al. | Nov 2014 | B1 |
8938671 | Eisen et al. | Jan 2015 | B2 |
8954560 | Johannsen | Feb 2015 | B2 |
8966276 | Nanopoulos et al. | Feb 2015 | B2 |
9060012 | Eisen | Jun 2015 | B2 |
9083735 | Reumann et al. | Jul 2015 | B2 |
9098617 | Pauley, Jr. et al. | Aug 2015 | B1 |
9112850 | Eisen | Aug 2015 | B1 |
9118646 | Pierson et al. | Aug 2015 | B2 |
9191370 | Barber et al. | Nov 2015 | B2 |
9196004 | Eisen | Nov 2015 | B2 |
9203837 | Pierson et al. | Dec 2015 | B2 |
9294448 | Miller et al. | Mar 2016 | B2 |
9298677 | Tollinger et al. | Mar 2016 | B2 |
9332020 | Thomas et al. | May 2016 | B2 |
9361597 | Britton et al. | Jun 2016 | B2 |
9378500 | Jimenez et al. | Jun 2016 | B2 |
9390384 | Eisen | Jul 2016 | B2 |
9396331 | Eisen et al. | Jul 2016 | B2 |
9412123 | Eisen | Aug 2016 | B2 |
9514248 | Guan et al. | Dec 2016 | B1 |
9521161 | Reumann et al. | Dec 2016 | B2 |
9521551 | Eisen et al. | Dec 2016 | B2 |
9559852 | Miller et al. | Jan 2017 | B2 |
9633201 | Katz | Apr 2017 | B1 |
9703983 | Eisen et al. | Jul 2017 | B2 |
9754256 | Britton et al. | Sep 2017 | B2 |
9754311 | Eisen | Sep 2017 | B2 |
9781151 | McCorkendale et al. | Oct 2017 | B1 |
9785973 | Tollinger et al. | Oct 2017 | B2 |
9948629 | Eisen | Apr 2018 | B2 |
9990631 | Eisen | Jun 2018 | B2 |
10021099 | Eisen et al. | Jul 2018 | B2 |
10089679 | Eisen | Oct 2018 | B2 |
10091312 | Khanwalkar et al. | Oct 2018 | B1 |
10339306 | Katz | Jul 2019 | B1 |
10341344 | Eisen et al. | Jul 2019 | B2 |
20010011243 | Dembo et al. | Aug 2001 | A1 |
20010011304 | Wesigner et al. | Aug 2001 | A1 |
20010016840 | Hijikata et al. | Aug 2001 | A1 |
20010016876 | Kurth et al. | Aug 2001 | A1 |
20010034712 | Colvin | Oct 2001 | A1 |
20010046096 | Worden | Nov 2001 | A1 |
20020041328 | LeCompte et al. | Apr 2002 | A1 |
20020046157 | Solomon | Apr 2002 | A1 |
20020052852 | Bozeman | May 2002 | A1 |
20020056042 | van der Kaay et al. | May 2002 | A1 |
20020073046 | David | Jun 2002 | A1 |
20020073327 | Vellandi | Jun 2002 | A1 |
20020083079 | Meier et al. | Jun 2002 | A1 |
20020107853 | Hofmann et al. | Aug 2002 | A1 |
20020112171 | Ginter et al. | Aug 2002 | A1 |
20020128917 | Grounds | Sep 2002 | A1 |
20020138335 | Palmer et al. | Sep 2002 | A1 |
20020138577 | Teng et al. | Sep 2002 | A1 |
20020153424 | Li | Oct 2002 | A1 |
20020156724 | Levchin et al. | Oct 2002 | A1 |
20020156836 | Janosik, Jr. et al. | Oct 2002 | A1 |
20020166063 | Lachman et al. | Nov 2002 | A1 |
20020167965 | Beasley et al. | Nov 2002 | A1 |
20030002732 | Gossett et al. | Jan 2003 | A1 |
20030002740 | Melikian et al. | Jan 2003 | A1 |
20030014327 | Skantze | Jan 2003 | A1 |
20030033161 | Walker et al. | Feb 2003 | A1 |
20030033356 | Tran et al. | Feb 2003 | A1 |
20030070080 | Rosen | Apr 2003 | A1 |
20030074301 | Solomon | Apr 2003 | A1 |
20030076242 | Burns et al. | Apr 2003 | A1 |
20030105707 | Audebert et al. | Jun 2003 | A1 |
20030105854 | Thorsteinsson et al. | Jun 2003 | A1 |
20030115334 | Bhat et al. | Jun 2003 | A1 |
20030115481 | Baird et al. | Jun 2003 | A1 |
20030120543 | Carey | Jun 2003 | A1 |
20030120586 | Litty | Jun 2003 | A1 |
20030140258 | Nelson et al. | Jul 2003 | A1 |
20030154214 | Tu et al. | Aug 2003 | A1 |
20030158751 | Suresh et al. | Aug 2003 | A1 |
20030163359 | Kanesaka | Aug 2003 | A1 |
20030163398 | Yoshioka et al. | Aug 2003 | A1 |
20030163413 | Wiczkowski | Aug 2003 | A1 |
20030172036 | Feigenbaum | Sep 2003 | A1 |
20030182551 | Frantz et al. | Sep 2003 | A1 |
20030208684 | Camacho et al. | Nov 2003 | A1 |
20030212618 | Keyes | Nov 2003 | A1 |
20030233553 | Parks et al. | Dec 2003 | A1 |
20040001044 | Luciani et al. | Jan 2004 | A1 |
20040004733 | Barker et al. | Jan 2004 | A1 |
20040006553 | de Vries et al. | Jan 2004 | A1 |
20040010682 | Foster et al. | Jan 2004 | A1 |
20040027385 | Rekimoto et al. | Feb 2004 | A1 |
20040030912 | Merkle, Jr. et al. | Feb 2004 | A1 |
20040034652 | Hofmann et al. | Feb 2004 | A1 |
20040034794 | Mayer et al. | Feb 2004 | A1 |
20040073809 | Wing Keong | Apr 2004 | A1 |
20040088313 | Torres | May 2004 | A1 |
20040098618 | Kim et al. | May 2004 | A1 |
20040105431 | Monjas-Llorente | Jun 2004 | A1 |
20040111621 | Himberger et al. | Jun 2004 | A1 |
20040117321 | Sancho | Jun 2004 | A1 |
20040139008 | Mascavaage, III | Jul 2004 | A1 |
20040153644 | McCorkendale et al. | Aug 2004 | A1 |
20040159699 | Nelson | Aug 2004 | A1 |
20040166857 | Shim et al. | Aug 2004 | A1 |
20040171381 | Inselberg | Sep 2004 | A1 |
20040181598 | Paya et al. | Sep 2004 | A1 |
20040203750 | Cowdrey et al. | Oct 2004 | A1 |
20040230820 | Hui Hsu et al. | Nov 2004 | A1 |
20040236696 | Aoki et al. | Nov 2004 | A1 |
20040236702 | Fink et al. | Nov 2004 | A1 |
20040254890 | Sancho et al. | Dec 2004 | A1 |
20040260876 | Singh et al. | Dec 2004 | A1 |
20040260922 | Goodman et al. | Dec 2004 | A1 |
20050008148 | Jacobson | Jan 2005 | A1 |
20050015601 | Tabi | Jan 2005 | A1 |
20050022020 | Fremberg et al. | Jan 2005 | A1 |
20050033653 | Eisenberg et al. | Feb 2005 | A1 |
20050033703 | Holdsworth | Feb 2005 | A1 |
20050039034 | Doyle et al. | Feb 2005 | A1 |
20050039219 | Cooper et al. | Feb 2005 | A1 |
20050076230 | Redenbaugh et al. | Apr 2005 | A1 |
20050085931 | Willeby | Apr 2005 | A1 |
20050097320 | Golan et al. | May 2005 | A1 |
20050108177 | Sancho | May 2005 | A1 |
20050111054 | Umeda | May 2005 | A1 |
20050113092 | Coppinger et al. | May 2005 | A1 |
20050131826 | Cook | Jun 2005 | A1 |
20050154676 | Ronning et al. | Jul 2005 | A1 |
20050185225 | Brawn et al. | Aug 2005 | A1 |
20050188423 | Motsinger et al. | Aug 2005 | A1 |
20050204159 | Davis et al. | Sep 2005 | A1 |
20050210533 | Copeland et al. | Sep 2005 | A1 |
20050216278 | Eisen | Sep 2005 | A1 |
20050246551 | Dondl et al. | Nov 2005 | A1 |
20050278542 | Pierson et al. | Dec 2005 | A1 |
20060008779 | Shand et al. | Jan 2006 | A1 |
20060010072 | Eisen | Jan 2006 | A1 |
20060026669 | Zakas | Feb 2006 | A1 |
20060031938 | Choi | Feb 2006 | A1 |
20060048211 | Pierson et al. | Mar 2006 | A1 |
20060064346 | Steenstra et al. | Mar 2006 | A1 |
20060069619 | Walker et al. | Mar 2006 | A1 |
20060075492 | Golan et al. | Apr 2006 | A1 |
20060080263 | Willis et al. | Apr 2006 | A1 |
20060126829 | Lai | Jun 2006 | A1 |
20060130132 | Dharmarajan | Jun 2006 | A1 |
20060136294 | Linden et al. | Jun 2006 | A1 |
20060155985 | Canard et al. | Jul 2006 | A1 |
20060161501 | Waserstein et al. | Jul 2006 | A1 |
20060190331 | Tollinger et al. | Aug 2006 | A1 |
20060200855 | Willis | Sep 2006 | A1 |
20060200856 | Salowey et al. | Sep 2006 | A1 |
20060224898 | Ahmed | Oct 2006 | A1 |
20060237531 | Heffez et al. | Oct 2006 | A1 |
20060253327 | Morris et al. | Nov 2006 | A1 |
20060253328 | Kohli et al. | Nov 2006 | A1 |
20060264202 | Hagmeier et al. | Nov 2006 | A1 |
20060281541 | Nguyen et al. | Dec 2006 | A1 |
20060282660 | Varghese et al. | Dec 2006 | A1 |
20060284838 | Tsatalos et al. | Dec 2006 | A1 |
20060287902 | Helsper et al. | Dec 2006 | A1 |
20070011078 | Jain et al. | Jan 2007 | A1 |
20070030528 | Quaeler et al. | Feb 2007 | A1 |
20070038568 | Greene et al. | Feb 2007 | A1 |
20070043837 | Kruse et al. | Feb 2007 | A1 |
20070061211 | Ramer et al. | Mar 2007 | A1 |
20070061273 | Greene et al. | Mar 2007 | A1 |
20070073630 | Greene et al. | Mar 2007 | A1 |
20070094594 | Matichuk et al. | Apr 2007 | A1 |
20070097076 | Gross | May 2007 | A1 |
20070097976 | Wood et al. | May 2007 | A1 |
20070101405 | Engle et al. | May 2007 | A1 |
20070107059 | Chasin et al. | May 2007 | A1 |
20070118892 | Sastry et al. | May 2007 | A1 |
20070124246 | Lawyer et al. | May 2007 | A1 |
20070162763 | Bender et al. | Jul 2007 | A1 |
20070198410 | Labgold et al. | Aug 2007 | A1 |
20070199054 | Florencio et al. | Aug 2007 | A1 |
20070204044 | Rice et al. | Aug 2007 | A1 |
20070214151 | Scott et al. | Sep 2007 | A1 |
20070220594 | Tulsyan | Sep 2007 | A1 |
20070233599 | Ganesan et al. | Oct 2007 | A1 |
20070234070 | Horning et al. | Oct 2007 | A1 |
20070239604 | O'Connell et al. | Oct 2007 | A1 |
20070239606 | Eisen | Oct 2007 | A1 |
20070255821 | Ge et al. | Nov 2007 | A1 |
20070266257 | Camaisa et al. | Nov 2007 | A1 |
20070271466 | Mak | Nov 2007 | A1 |
20070294401 | Shkedi | Dec 2007 | A1 |
20080002725 | Alicherry et al. | Jan 2008 | A1 |
20080005394 | Crooks | Jan 2008 | A1 |
20080010367 | Cheng et al. | Jan 2008 | A1 |
20080010678 | Burdette et al. | Jan 2008 | A1 |
20080015988 | Brown et al. | Jan 2008 | A1 |
20080021801 | Song et al. | Jan 2008 | A1 |
20080040653 | Levine | Feb 2008 | A1 |
20080040802 | Pierson et al. | Feb 2008 | A1 |
20080046562 | Butler | Feb 2008 | A1 |
20080052629 | Phillips et al. | Feb 2008 | A1 |
20080098222 | Zilberman | Apr 2008 | A1 |
20080101277 | Taylor | May 2008 | A1 |
20080104070 | Lonchar | May 2008 | A1 |
20080104672 | Lunde et al. | May 2008 | A1 |
20080104684 | Lunde et al. | May 2008 | A1 |
20080120195 | Shakkarwar | May 2008 | A1 |
20080120214 | Steele et al. | May 2008 | A1 |
20080133420 | Barber | Jun 2008 | A1 |
20080162200 | O'Sullivan et al. | Jul 2008 | A1 |
20080162202 | Khanna et al. | Jul 2008 | A1 |
20080162475 | Meggs | Jul 2008 | A1 |
20080163128 | Callanan et al. | Jul 2008 | A1 |
20080184372 | Hoshina | Jul 2008 | A1 |
20080189790 | Park | Aug 2008 | A1 |
20080191007 | Keay | Aug 2008 | A1 |
20080201214 | Aaron | Aug 2008 | A1 |
20080204788 | Kelly et al. | Aug 2008 | A1 |
20080222706 | Renaud et al. | Sep 2008 | A1 |
20080235623 | Li | Sep 2008 | A1 |
20080239365 | Salgado et al. | Oct 2008 | A1 |
20080249820 | Pathria et al. | Oct 2008 | A1 |
20080281606 | Kitts | Nov 2008 | A1 |
20080281941 | Park et al. | Nov 2008 | A1 |
20080288299 | Schultz | Nov 2008 | A1 |
20080301281 | Wang et al. | Dec 2008 | A1 |
20080306830 | Lasa et al. | Dec 2008 | A1 |
20080313079 | Van Bosch et al. | Dec 2008 | A1 |
20080319774 | O'Sullivan et al. | Dec 2008 | A1 |
20080319841 | Oliver et al. | Dec 2008 | A1 |
20090018940 | Wang et al. | Jan 2009 | A1 |
20090024971 | Willner et al. | Jan 2009 | A1 |
20090037213 | Eisen | Feb 2009 | A1 |
20090044279 | Crawford et al. | Feb 2009 | A1 |
20090044282 | Govindaraju | Feb 2009 | A1 |
20090055398 | Zhu et al. | Feb 2009 | A1 |
20090070664 | Gavin et al. | Mar 2009 | A1 |
20090089869 | Varghese | Apr 2009 | A1 |
20090106413 | Salo | Apr 2009 | A1 |
20090138590 | Lee et al. | May 2009 | A1 |
20090157417 | Bradley et al. | Jun 2009 | A1 |
20090164269 | Gupta et al. | Jun 2009 | A1 |
20090177692 | Chagoly et al. | Jul 2009 | A1 |
20090183010 | Schnell et al. | Jul 2009 | A1 |
20090205031 | Sato et al. | Aug 2009 | A1 |
20090222308 | Zoldi et al. | Sep 2009 | A1 |
20090228585 | Kosbab et al. | Sep 2009 | A1 |
20090234738 | Britton et al. | Sep 2009 | A1 |
20090241174 | Rajan et al. | Sep 2009 | A1 |
20090260064 | McDowell et al. | Oct 2009 | A1 |
20090265773 | Schultz | Oct 2009 | A1 |
20090271306 | Pierson | Oct 2009 | A1 |
20090307141 | Kongalath et al. | Oct 2009 | A1 |
20090280777 | Doherty | Nov 2009 | A1 |
20090292568 | Khosravani et al. | Nov 2009 | A1 |
20090293128 | Lippmann et al. | Nov 2009 | A1 |
20090296907 | Vendrow et al. | Dec 2009 | A1 |
20090298480 | Khambete et al. | Dec 2009 | A1 |
20090307119 | Ahles et al. | Dec 2009 | A1 |
20090313134 | Faith et al. | Dec 2009 | A1 |
20100004965 | Eisen | Jan 2010 | A1 |
20100005013 | Uriarte | Jan 2010 | A1 |
20100030641 | Ibenforth | Feb 2010 | A1 |
20100030777 | Panwar et al. | Feb 2010 | A1 |
20100057623 | Kapur et al. | Mar 2010 | A1 |
20100070606 | Shenfield et al. | Mar 2010 | A1 |
20100082972 | Benco et al. | Apr 2010 | A1 |
20100094767 | Miltonberger | Apr 2010 | A1 |
20100094768 | Miltonberger | Apr 2010 | A1 |
20100106611 | Paulsen et al. | Apr 2010 | A1 |
20100107225 | Spencer et al. | Apr 2010 | A1 |
20100121716 | Golan | May 2010 | A1 |
20100138299 | Preston et al. | Jun 2010 | A1 |
20100145960 | Casteel et al. | Jun 2010 | A1 |
20100153540 | Li et al. | Jun 2010 | A1 |
20100157848 | Das et al. | Jun 2010 | A1 |
20100161424 | Sylvain | Jun 2010 | A1 |
20100161566 | Adair et al. | Jun 2010 | A1 |
20100169157 | Muhonen et al. | Jul 2010 | A1 |
20100169192 | Zoldi et al. | Jul 2010 | A1 |
20100192082 | Sodah | Jul 2010 | A1 |
20100199332 | Bachmann et al. | Aug 2010 | A1 |
20100199338 | Craddock et al. | Aug 2010 | A1 |
20100211464 | Zhu et al. | Aug 2010 | A1 |
20100223105 | Gassewitz et al. | Sep 2010 | A1 |
20100223145 | Dragt | Sep 2010 | A1 |
20100228625 | Priyadarshan et al. | Sep 2010 | A1 |
20100228638 | Mikan et al. | Sep 2010 | A1 |
20100257065 | Gupta et al. | Oct 2010 | A1 |
20100274678 | Rolf et al. | Oct 2010 | A1 |
20100293094 | Kolkowitz et al. | Nov 2010 | A1 |
20100306827 | Esteve Balducci et al. | Dec 2010 | A1 |
20100321296 | Gross | Dec 2010 | A1 |
20100333170 | Cox et al. | Dec 2010 | A1 |
20110022483 | Hammad | Jan 2011 | A1 |
20110022517 | Hammad | Jan 2011 | A1 |
20110035302 | Martell et al. | Feb 2011 | A1 |
20110047072 | Ciurea | Feb 2011 | A1 |
20110082768 | Eisen | Apr 2011 | A1 |
20110112901 | Fried et al. | May 2011 | A1 |
20110161228 | Suzuki et al. | Jun 2011 | A1 |
20110173281 | Smith | Jul 2011 | A1 |
20110184778 | Graepel et al. | Jul 2011 | A1 |
20110194679 | Patisaul et al. | Aug 2011 | A1 |
20110225091 | Plastina et al. | Sep 2011 | A1 |
20110238575 | Nightengale et al. | Sep 2011 | A1 |
20110251951 | Kolkowitz et al. | Oct 2011 | A1 |
20110258118 | Ciurea | Oct 2011 | A1 |
20110282778 | Wright et al. | Nov 2011 | A1 |
20110288932 | Marks et al. | Nov 2011 | A1 |
20110302087 | Crooks | Dec 2011 | A1 |
20110302096 | Lowry | Dec 2011 | A1 |
20110307341 | Zohar et al. | Dec 2011 | A1 |
20110314557 | Marshall | Dec 2011 | A1 |
20120022883 | Morrison | Jan 2012 | A1 |
20120030083 | Newman et al. | Feb 2012 | A1 |
20120030757 | Baikalov et al. | Feb 2012 | A1 |
20120030771 | Pierson et al. | Feb 2012 | A1 |
20120036042 | Graylin et al. | Feb 2012 | A1 |
20120041841 | Hu et al. | Feb 2012 | A1 |
20120054136 | Maulik | Mar 2012 | A1 |
20120054847 | Schultz et al. | Mar 2012 | A1 |
20120084203 | Mehew et al. | Apr 2012 | A1 |
20120084860 | Cao et al. | Apr 2012 | A1 |
20120094639 | Carlson et al. | Apr 2012 | A1 |
20120096557 | Britton et al. | Apr 2012 | A1 |
20120101939 | Kasower | Apr 2012 | A1 |
20120150742 | Poon et al. | Jun 2012 | A1 |
20120150750 | Law et al. | Jun 2012 | A1 |
20120157062 | Kim et al. | Jun 2012 | A1 |
20120158586 | Ganti et al. | Jun 2012 | A1 |
20120166533 | Rubinstein et al. | Jun 2012 | A1 |
20120173465 | Hore et al. | Jul 2012 | A1 |
20120179558 | Fischer | Jul 2012 | A1 |
20120197981 | Chan | Aug 2012 | A1 |
20120204262 | Thomas et al. | Aug 2012 | A1 |
20120215896 | Johannsen | Aug 2012 | A1 |
20120216282 | Pappu et al. | Aug 2012 | A1 |
20120221470 | Lyon | Aug 2012 | A1 |
20120222111 | Oliver et al. | Aug 2012 | A1 |
20120233665 | Ranganathan et al. | Sep 2012 | A1 |
20120239553 | Gonen et al. | Sep 2012 | A1 |
20120239574 | Smith et al. | Sep 2012 | A1 |
20120239774 | Tola et al. | Sep 2012 | A1 |
20120278127 | Kirakosyan et al. | Nov 2012 | A1 |
20120295580 | Corner | Nov 2012 | A1 |
20120297380 | Colbert et al. | Nov 2012 | A1 |
20120311162 | Paulsen et al. | Dec 2012 | A1 |
20120323788 | Keresman et al. | Dec 2012 | A1 |
20120323836 | Wright et al. | Dec 2012 | A1 |
20120330787 | Hanson et al. | Dec 2012 | A1 |
20130006743 | Moore et al. | Jan 2013 | A1 |
20130018789 | Kaufmann | Jan 2013 | A1 |
20130018791 | Mendicino et al. | Jan 2013 | A1 |
20130024300 | Choudhuri et al. | Jan 2013 | A1 |
20130036304 | Lin et al. | Feb 2013 | A1 |
20130040603 | Stahlberg et al. | Feb 2013 | A1 |
20130042298 | Plaza Fonseca et al. | Feb 2013 | A1 |
20130055388 | Thomas et al. | Feb 2013 | A1 |
20130073463 | Dimmick et al. | Mar 2013 | A1 |
20130073473 | Heath | Mar 2013 | A1 |
20130085841 | Singleton et al. | Apr 2013 | A1 |
20130097673 | Meehan et al. | Apr 2013 | A1 |
20130097701 | Moyle et al. | Apr 2013 | A1 |
20130103482 | Song et al. | Apr 2013 | A1 |
20130103629 | Vaiciulis et al. | Apr 2013 | A1 |
20130110637 | Bott | May 2013 | A1 |
20130111592 | Zhu et al. | May 2013 | A1 |
20130117832 | Gandhi | May 2013 | A1 |
20130144539 | Allen et al. | Jun 2013 | A1 |
20130148525 | Cuadra Sanchez et al. | Jun 2013 | A1 |
20130159195 | Kirillin et al. | Jun 2013 | A1 |
20130185764 | Krstić et al. | Jul 2013 | A1 |
20130197998 | Buhrmann et al. | Aug 2013 | A1 |
20130198066 | Wall et al. | Aug 2013 | A1 |
20130226717 | Ahluwalia et al. | Aug 2013 | A1 |
20130273879 | Eisen et al. | Oct 2013 | A1 |
20130339186 | French | Dec 2013 | A1 |
20140032902 | Agrawal et al. | Jan 2014 | A1 |
20140114821 | Yoshioka et al. | Apr 2014 | A1 |
20140120864 | Manolarakis et al. | May 2014 | A1 |
20140122343 | Einav et al. | May 2014 | A1 |
20140258125 | Gerber et al. | Sep 2014 | A1 |
20140289867 | Bukai | Sep 2014 | A1 |
20140361926 | Eisen et al. | Dec 2014 | A1 |
20150026027 | Priess et al. | Jan 2015 | A1 |
20150046989 | Oberheide et al. | Feb 2015 | A1 |
20150106270 | Burrell et al. | Apr 2015 | A1 |
20150127825 | Johannsen | May 2015 | A1 |
20150186901 | Miltonberger | Jul 2015 | A1 |
20150193769 | Barber | Jul 2015 | A1 |
20150193821 | Izumori et al. | Jul 2015 | A1 |
20150205978 | Eisen et al. | Jul 2015 | A1 |
20150242861 | Baldassano | Aug 2015 | A9 |
20150254658 | Bondesen et al. | Sep 2015 | A1 |
20150294316 | Eisen | Oct 2015 | A1 |
20150350856 | Circosta et al. | Dec 2015 | A1 |
20160019546 | Eisen | Jan 2016 | A1 |
20160021084 | Eisen | Jan 2016 | A1 |
20160034954 | Tollinger et al. | Feb 2016 | A1 |
20160125461 | Sivaramakrishnan et al. | May 2016 | A1 |
20160246581 | Jimenez et al. | Aug 2016 | A1 |
20160321701 | Artman et al. | Nov 2016 | A1 |
20160328710 | Britton et al. | Nov 2016 | A1 |
20170039571 | Eisen | Feb 2017 | A1 |
20170142106 | Eisen et al. | May 2017 | A1 |
20180089459 | Eisen et al. | Mar 2018 | A1 |
20180108029 | Sinha et al. | Apr 2018 | A1 |
20180121915 | Britton et al. | May 2018 | A1 |
20180262478 | Eisen | Sep 2018 | A1 |
20180322500 | Eisen | Nov 2018 | A1 |
20190028472 | Eisen | Jan 2019 | A1 |
Number | Date | Country |
---|---|---|
0 418 144 | Mar 1991 | EP |
0 645 692 | Mar 1995 | EP |
0 923 039 | Jun 1999 | EP |
1 067 792 | Jan 2001 | EP |
1 209 935 | May 2002 | EP |
1 256 911 | Nov 2002 | EP |
1 201 070 | Jun 2006 | EP |
1 703 382 | Sep 2006 | EP |
1 197 032 | Aug 2007 | EP |
2 154 891 | Feb 2010 | EP |
2 491 101 | Nov 2012 | GB |
2 492 604 | Jan 2013 | GB |
05-257602 | Oct 1993 | JP |
2000-020467 | Jan 2000 | JP |
2000-099250 | Apr 2000 | JP |
2000-137755 | May 2000 | JP |
2000-242582 | Sep 2000 | JP |
2000-276281 | Oct 2000 | JP |
2002-007697 | Jan 2002 | JP |
2002-297869 | Oct 2002 | JP |
2003-050910 | Feb 2003 | JP |
2005-063216 | Mar 2005 | JP |
2005-115644 | Apr 2005 | JP |
2005-135431 | May 2005 | JP |
2006-004333 | Jan 2006 | JP |
2007-272520 | Oct 2007 | JP |
2007-282249 | Oct 2007 | JP |
2008-022298 | Jan 2008 | JP |
2008-065363 | Mar 2008 | JP |
2008-171315 | Jul 2008 | JP |
2008-535124 | Aug 2008 | JP |
2008-243008 | Oct 2008 | JP |
2008-257434 | Oct 2008 | JP |
2008-269229 | Nov 2008 | JP |
2009-048538 | Mar 2009 | JP |
2009-122880 | Jun 2009 | JP |
2009-175984 | Aug 2009 | JP |
2010-020728 | Jan 2010 | JP |
2010-061254 | Mar 2010 | JP |
2010-122955 | Jun 2010 | JP |
2010-122956 | Jun 2010 | JP |
2010-225040 | Oct 2010 | JP |
2010-250664 | Nov 2010 | JP |
2011-065531 | Mar 2011 | JP |
2011-134252 | Jul 2011 | JP |
2011-159307 | Aug 2011 | JP |
2012-234503 | Nov 2012 | JP |
5216932 | Jun 2013 | JP |
10-1999-0015738 | Mar 1999 | KR |
10-0645983 | Nov 2006 | KR |
10-2008-0044558 | May 2008 | KR |
10-2009-0051977 | Sep 2009 | KR |
10-2010-0085888 | Jul 2010 | KR |
WO 96041488 | Dec 1996 | WO |
WO 97003410 | Jan 1997 | WO |
WO 99050775 | Oct 1999 | WO |
WO 01011450 | Feb 2001 | WO |
WO 01033520 | May 2001 | WO |
WO 01095550 | Dec 2001 | WO |
WO 01097134 | Dec 2001 | WO |
WO 02001462 | Jan 2002 | WO |
WO 02071176 | Sep 2002 | WO |
WO 02091226 | Nov 2002 | WO |
WO 03017155 | Feb 2003 | WO |
WO 03025868 | Mar 2003 | WO |
WO 03075197 | Sep 2003 | WO |
WO 03075197 | Dec 2003 | WO |
WO 02037219 | May 2004 | WO |
WO 2004038997 | May 2004 | WO |
WO 2005038818 | Apr 2005 | WO |
WO 2005099166 | Oct 2005 | WO |
WO 2006135367 | Dec 2006 | WO |
WO 2007001394 | Jan 2007 | WO |
WO 2007045818 | Apr 2007 | WO |
WO 2007072238 | Jun 2007 | WO |
WO 2007075573 | Jul 2007 | WO |
WO 2008029828 | Mar 2008 | WO |
WO 2008054849 | May 2008 | WO |
WO 2009132148 | Oct 2009 | WO |
WO 2012054646 | Apr 2012 | WO |
WO 2012061801 | May 2012 | WO |
WO 2012142121 | Oct 2012 | WO |
WO 2012142584 | Oct 2012 | WO |
WO 2013006538 | Jan 2013 | WO |
WO 2013142722 | Sep 2013 | WO |
WO 2014022813 | Feb 2014 | WO |
WO 2014078569 | May 2014 | WO |
Entry |
---|
U.S. Appl. No. 11/694,882, U.S. Pat. No. 8,151,327, Systems and Methods for Detection of Session Tampering and Fraud Prevention, filed Nov. 3, 2015. |
U.S. Appl. No. 13/414,678, U.S. Pat. No. 8,826,393, Systems and Methods for Detection of Session Tampering and Fraud Prevention, filed Aug. 29, 2014. |
U.S. Appl. No. 14/473,818, U.S. Pat. No. 9,196,004, Systems and Methods for Detection of Session Tampering and Fraud Prevention, filed Mar. 7, 2012. |
U.S. Appl. No. 14/931,799, U.S. Pat. No. 9,754,311, Systems and Methods for Detection of Session Tampering and Fraud Prevention, filed Mar. 30, 2007. |
U.S. Appl. No. 15/655,045, U.S. Pat. No. 10,089,679, Systems and Methods for Detection of Session Tampering and Fraud Prevention, filed Jul. 20, 2017. |
Banking Services Newsletter, “Keeping You Up-to-Date on Banking Developments Throughout the UC System”, University of California, Office of the President, Banking Services Group, Newsletter 1, Dec. 2005, p. 1. |
Bharosa, “Bharosa Authenticator”, http://www.bharosa.com/authenticator.html, Jan. 18, 2007, pp. 3. |
Bharosa, “Bharosa Announces Online Authentication Solution to Counter Check 21-Based Fraud”, http://www.bharosa.com/news/PR-110705.html, Jan. 18, 2007, pp. 2. |
Darlin, Damon, “Opening the Door on the Credit Report and Throwing Away the Lock”, http://www.nytimes.com/2006/03/18/business/yourmoney/18money.html, The New York Times, Saturday Mar. 18, 2006, pp. 2. |
Derfler, Jr. et al, “How Networks Work”, Millennium Edition, Que Corporation, Indianapolis, IN, Sep. 2000, pp. 230. |
Gralla, Preston, “How the Internet Works”, Millennium Edition, Que Corporation, Indianapolis, IN, Aug. 1999, pp. 329. |
Gueye et al., “Constraint-Based Geolocation of Internet Hosts”, ACM Internet Measurement Conference 2004, Oct. 25-27, 2004, Taormina, Sicily, Italy, vol. 14, No. 6, pp. 288-293. |
“ISO 8583”, Wikipedia, http://en.wikipedia.org/wiki/ISO_8583, dated Apr. 13, 2015 in 14 pages. |
Kohno et al., “Remote Physical Device Fingerprinting”, Proceedings of 2005 IEEE Symposium on Security and Privacy, May 8-11, 2005, Oakland, CA, pp. 211-225. |
Manavoglu et al., “Probabilistic User Behavior Models”, ICDM, Third IEEE International Conference on Data Mining, Nov. 19-22, 2003, pp. 203-210. |
TechWeb, “Wells Fargo Intros Anti-Theft Alerts”, http://www.techweb.com/wire/166404177, Aug. 1, 2005, pp. 1. |
“UPIC Marketing Guide—The Clearing House”, http://www.upic.com/infofiles/UPIC_Marketing_Guide.pdf, as printed Dec. 19, 2006. pp. 1-16. |
White, Ron, “How Computers Work”, Millennium Edition, Que Corporation, Indianapolis, IN, Sep. 1999, pp. 284. |
Official Communication in European Patent Application No. 05818903.6, dated Dec. 23, 2011. |
Official Communication in European Patent Application No. 05818903.6, dated Mar. 18, 2014. |
Official Communication in European Patent Application No. 05818903.6, dated Jul. 18, 2017. |
International Search Report and Written Opinion for Application No. PCT/US2005/035532, dated Oct. 29, 2007. |
International Preliminary Report on Patentability and Written Opinion for Application No. PCT/US2005/035532, dated Jan. 9, 2008. |
Official Communication in European Patent Application No. 6845722.5, dated Mar. 13, 2009. |
Official Communication in European Patent Application No. 8159110.9, dated Oct. 27, 2008. |
Official Communication in European Patent Application No. 8159110.9, dated Mar. 22, 2010. |
International Search Report and Written Opinion for Application No. PCT/US2006/048251, dated Feb. 26, 2008. |
International Preliminary Report on Patentability and Written Opinion for Application No. PCT/US2006/048251, dated Jun. 18, 2008. |
International Search Report and Written Opinion for Application No. PCT/US2007/065776, dated Jul. 3, 2008. |
International Preliminary Report on Patentability and Written Opinion for Application No. PCT/US2007/065776, dated Sep. 30, 2008. |
International Search Report and Written Opinion received in PCT Application No. PCT/US2005/020750, dated Jun. 13, 2008. |
International Preliminary Report on Patentability and Written Opinion received in PCT Application No. PCT/US2005/020750, dated Jul. 1, 2008. |
Official Communication in European Patent Application No. 08165224.0, dated Nov. 15, 2010. |
Supplementary European Search Report for Application No. EP09735653, dated Dec. 16, 2011. |
Official Communication for Application No. EP09735653, dated Jan. 4, 2013. |
International Search Report and Written Opinion for Application No. PCT/US2009/041462, dated Dec. 1, 2009. |
International Preliminary Report on Patentability and Written Opinion for Application No. PCT/US2009/041462, dated Nov. 4, 2010. |
International Search Report and Written Opinion for Application No. PCT/US2011/056948, dated Apr. 18, 2012. |
International Preliminary Report on Patentability in Application No. PCT/US2011/056948, dated May 2, 2013. |
International Search Report and Written Opinion for Application No. PCT/US2013/033357, dated Jul. 10, 2013. |
International Preliminary Report on Patentability in Application No. PCT/US2013/033357, dated Sep. 23, 2014. |
International Search Report and Written Opinion for Application No. PCT/US2013/053495, dated Nov. 22, 2013. |
International Preliminary Report on Patentability in Application No. PCT/US2013/053495, dated Feb. 3, 2015. |
International Search Report and Written Opinion for Application No. PCT/US2013/070146, dated Mar. 3, 2014. |
International Preliminary Report on Patentability in Application No. PCT/US2013/070146, dated May 28, 2015. |
Provisional Application as filed in U.S. Appl. No. 61/324,312, dated Apr. 15, 2010 in 15 pages. |
Summons to Attend Oral Proceedings received in European Application No. EP09735653, dated Oct. 7, 2016. |
The Knightmare, “Secrets of a Super Hacker”, Loompanics Unlimited, Port Townsend, Washington, 1994, pp. 233. |
Number | Date | Country | |
---|---|---|---|
20190066192 A1 | Feb 2019 | US |
Number | Date | Country | |
---|---|---|---|
60744107 | Mar 2006 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15655045 | Jul 2017 | US |
Child | 16115411 | US | |
Parent | 14931799 | Nov 2015 | US |
Child | 15655045 | US | |
Parent | 14473818 | Aug 2014 | US |
Child | 14931799 | US | |
Parent | 13414678 | Mar 2012 | US |
Child | 14473818 | US | |
Parent | 11694882 | Mar 2007 | US |
Child | 13414678 | US |