This application is a continuation-in-part of copending U.S. utility application entitled, “SYSTEMS AND METHODS FOR MANAGING RECORDERS FROM A CENTRAL POINT OF ADMINISTRATION,” having Ser. No. 11/359,325, filed on Feb. 22, 2006, which is entirely incorporated herein by reference.
The present invention is generally related to managing of recorders.
As shown in
Each computing device includes a recorder manager (not shown) that controls all components, alarms and other activities associated with a corresponding recorder. Notably, if a user has access to such a recorder at this level, the user has full control of all the features on the recorder. However, a user in branch 126 can control the features on the recorder 106, but cannot control the features on recorders 109, 113 in branches 129, 133. Thus, recorder control is somewhat segmented.
Disclosed is an enterprise manager that enables a centralized control of recorders. The enterprise manager can be deployed within a central application module, within a company premises, distributed across multiple geographic locations, and/or embedded into the network as a service on a network infrastructure, including legacy infrastructure and potentially VoIP-based infrastructure. The enterprise manager can provide security through setting access levels to individual roles and users. The enterprise manager can provide a hierarchical based management display of installed recorders, update authentication servers associated with a recorder from the enterprise manager, and implement reliable messaging to achieve a task. The enterprise manager can display alarms from all of the recorders in a hierarchical list, and copy recorder configuration across recorders. Such an enterprise manager can be administered at a centralized location and/or be embedded into a network as a service on the network and/or as intelligence in the network infrastructure.
Systems and methods for managing alarms from recorders are provided. An exemplary method comprises the steps of: receiving alarm alerts from one or more recorders by a central application module, the alarm alerts being operative to notify a user of a problem associated with the one or more recorders, storing the alarm alerts in an alarm database, and managing alarm alerts by the central application module so that a user can view the alarm alerts.
In some embodiments, a user may be able to easily and quickly advance (that is, drill down) to the recorder of interest responsive to receiving an alarm alert and take any necessary corrective action, such as reset the recorder or clear the alarms. The user can even review the various alarms, such as when the alarms were last triggered and how many alarms of that type have occurred.
Other systems, methods, features, and advantages of the present invention will be or become apparent to one with skill in the art upon examination of the following drawings and detailed description. It is intended that all such additional systems, methods, features, and advantages be included within this description, be within the scope of the present invention, and be protected by the accompanying claims. It is intended that all such additional systems, methods, features, and advantages included within this description, be within the scope of the present invention and be protected by the accompanying claims.
Many aspects of the invention can be better understood with reference to the following drawings. The components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present invention. Moreover, in the drawings, like reference numerals designate corresponding parts throughout the several views.
Disclosed herein are systems and methods for managing recorders in call center premises, such as through an enterprise manager. The enterprise manager enables a centralized control of recorders. The enterprise manager can be administered at a centralized location, e.g., within a company premises, in a single central application module, and/or embedded into a network as a service on the network and/or as intelligence in the network infrastructure.
Exemplary systems are first discussed with reference to the figures. Although these systems are described in detail, they are provided for purposes of illustration only and various modifications are feasible. After the exemplary systems have been described, examples of flow diagrams and sequence diagrams of the systems are provided to explain the manner in which a voice communication can be recorded.
Referring now in more detail to the figures,
The central application module 252 comprises a processing device 269, memory 253, one or more user interface devices 276, one or more input/output (I/O) devices 279, and one or more networking devices 283, each of which is connected to a local interface 273. The processing device 269 can include any custom made or commercially available processor, a central processing unit (CPU) or an auxiliary processor among several processors associated with the central application module 252, a semiconductor base microprocessor (in the form of microchip) or a macroprocessor. The memory 253 can include any one or a combination of volatile memory elements (e.g., random access memory (RAM), such as DRAM, SRAM, etc.) and non-volatile memory elements (e.g., ROM, hard drive, tape, CD-ROM, etc.).
The one or more user interface devices 276 comprise elements with which the user (e.g., user and supervisor) can interact with the central application module 252. Where the central application module 252 comprises a personal computer (e.g., desktop or laptop computer, or similar device), these components can comprise those typically used in conjunction with a PC such as a display device 287 (having display diagrams 287), headset device, keyboard, and mouse.
The one or more I/O devices 279 comprise components used to accelerate connection of the central application module 252 to other devices and therefore, for instance, comprise one or more serial, small computer system interface (SCSI), universal serial bus (USB), or IEEE 1394 (e.g., Firewall™) connection elements. The networking devices 283 comprise the various components used to transmit and/or receive data over the network 209, where provided. By way of example, the networking devices 283 include a device that communicates both inputs and outputs, for instance, a modular/demodular (e.g., modem), a radio frequency (RF), or infrared (IR) transceiver, a telephonic interface, a bridge, and a router, as well as a network card, etc.
Memory 253 normally comprises various programs (in software and/or firmware), including an operating system (O/S) 256, an enterprise manager 259, a persistence database 266, and a reliable messaging application 267. The O/S 256 controls the execution of programs, including the enterprise manager 259 and reliable messaging application 267, and provides scheduling, input/output control, file and data, management, memory management, communication control and related services. The enterprise manager 259 facilitates the management of recorders in the call center premises 203 as well as enterprise-wide security, events, and activities. Typically, a process of the enterprise manager 259 involves communicating with the recorder computing devices 217, 227 via the network 209 and managing the recorders, particularly configuring roles of users to have specific access rights with respect to the recorders. Operation of the enterprise manager 259 is described in relation to
The enterprise manager 259 can update authentication information with the recorder computing devices to communicate with a first authentication server 263 and a second authentication server 265. The operation of updating information with the recorder computing devices to communicate with a first authentication server 263 and a second authentication server 265 is described in relation to
The assigned roles for the users are transmitted to the recorder computing devices as shown at event 306. At event 309, the recorder computing device configures the roles of the users based on the information received from the enterprise manager. At event 313, the recorder computing devices confirm that the roles of the users are assigned, and at event 319, the administrator can logout of the system. At event 323, the users log into the recorder computing devices with assigned roles enabling the users to perform recorder administration features. At event 329, the users perform the roles that were assigned by the administrator, and at event 333, the users log out of the recorder computing devices. It should be noted that the role-based security method could be applied in a retailing or banking environment. For example, in a banking environment, a primary user, e.g., a parent, can allocate privileges to secondary users, e.g., his/her kids. The privileges could include being able to pay bills up to a certain amount of money or being able to only pay a certain credit card bill, for example.
The administrator can view available roles as shown in display diagram 289a by selecting file menu “General Setup” 403 and option “Roles Setup” 406. The display diagram 289a illustrates a list of available roles that includes fields such as role name 409, default role 413, description 416, and modules 419. A Yes/No text area in the default role field 413 indicates that the role is to be assigned to users if no other is assigned to the role. The modules field 419 indicates the level of security assigned to the role. Within each module, a subset of security levels exist. For example, administrator 423 does not require a user to be assigned to the role at all times and is assigned the following level of security: Authorization, Enterprise Management Tool, Integration Server Access, Organization, People, Personal Profile, System Management, and What If. Display diagram 289a includes action features 426 such as setting a default role 429, creating a new role from existing roles 433, creating new role 436, editing role 439, and deleting role 443.
Installation scope field 623 enables the administrator to assign and edit scopes granted to the user, such as one or more geographic locations or sites. In this example, the installation scope field provides a hierarchy list of geographic locations or sites. An enterprise site is the top level and a UK site is a sub-level of the enterprise site. Glasgow, London, and SC sites are sub-levels of the UK site. The administrator gave access rights of recorders (gl-rec1, gl-rec2, and gl-rec3) to the User within the Glasgow site. This would limit the user capabilities at the Glasgow site and the user would not be given access to non-selected sites, such as the London and SC sites. That said, the user might not be able to view the non-selected sites. Additionally or alternatively, the hierarchy list can be structured as business units. For example, an enterprise site is the top level and billing service and customer service sites are sub-levels.
At event 716, the enterprise manager instructs the recorder computing device to update the authentication server by using a second authentication server as a primary authentication server for the enterprise manager and the first authentication server as a secondary authentication server for the enterprise manager. At event 719, the recorder computing device configures to use the second authentication server as primary authentication server for the enterprise manager and the first authentication server as a secondary authentication server for the enterprise manager.
Additionally or alternatively, if the recorder computing device cannot configure to use the second authentication server, the recorder computing device can automatically be configured to use the first authentication server. Additionally or alternatively, the enterprise manager saves the settings of the first authentication server and enables users to manually revert to the saved settings of the first authentication server if the recorder computing device cannot configure to use the second authentication server. The saved settings are transmitted to the recorder computing device, which configures to use the first authentication server.
Additionally or alternatively, the first authentication server can be configured as a primary authentication server for logging into the recorder manager and the second authentication server can be configured as the secondary authentication server for logging into the enterprise manager. Additionally or alternatively, the first authentication server can be configured as a primary authentication server for logging into the enterprise manager, and the recorder can be configured to communicate with the second authentication server for updating the authentication server of the recorders. Additionally or alternatively, the recorder can be configured to continue using the first authentication server as a primary authentication server and then use the second authentication server as a secondary authentication server.
At event 723, the recorder computing device confirms successful configuration to use the second authentication server with the enterprise manager. At event 725, the administrator logs out of the enterprise manager. At event 726, once the recorder computing device successfully configures to use the second authentication server, a recorder manager and/or the enterprise manager transmit login information to the recorder computing device. At event 736, the recorder computing device provides authentication information associated with the login information to the second authentication server pursuant to the enterprise manager updating the authentication server. At event 739, the second authentication server validates the authentication information and transmits validation information associated with authentication information to the recorder computing device.
If the second authentication server cannot validate the authentication information due to, for example, malfunction of the second authentication server, the recorder computing device detects the malfunction status and automatically configures to use the first authentication server and transmits the authentication information to the first authentication server. Additionally or alternatively, the enterprise manager can detect and indicate to a user that the second authentication server has malfunctioned. The enterprise manager enables the users to manually revert to saved settings of the first authentication server as mentioned above. Because the authentication process between the recorder computing device and the first authentication server had been successful before, the first authentication server should validate the authentication information associated with the login information. Either after event 733 or event 739, the recorder computing device confirms successful login with the enterprise manager as shown at event 741. An advantage, among others, is that this method provides two chances for the recorder computing device to authenticate the login information of the user, either at the second authentication server or the first authentication server, which potentially assures that the authentication process is successful. In other words, the method can prevent administrators from locking themselves out of the system.
It should be noted that the enterprise manager enables the user to monitor the authentication servers that have been successfully (or unsuccessfully) configured with the corresponding recorder computing device. That is, the enterprise manager can provide a list of authentication servers along with status information indicating whether the authentication servers have been successfully (or unsuccessfully) configured with the corresponding recorder computing device. Another advantage, among others, is that this method can provide an enterprise manager upgrade path that does not require having to physically go around to each recorder and manually update the recorder configuration.
Additionally or alternatively, the enterprise manager and the first authentication server are integrated in a first computing system, and the second authentication server and a second enterprise manager are integrated in a second computing system. After the recorder computing device has been reconfigured to communicate with the second computing system, the administrator can immediately use the second enterprise manager without having any downtime of the system for updating the recorder configuration.
The persistence database arranges and transmits the messages in sequential order to a reliable messaging application at events 806 and 809, respectively. Some messages are performed in sequential order so that intended tasks associated with the messages can be achieved. For example, a first task has three messages A, B, and C and a second task has four messages D, E, F, and G that are arranged in first and second sequential orders, respectively. The first and second tasks are achieved by completing the messages A, B, C, D, E, F, and G in sequential order. If instructions associated with the message A of the first task are performed and instructions associated with the message B of the first task cannot be performed, then the first task can not be achieved. If such happens, the persistence database stops transmitting the messages for the first task and begins to transmit the messages of the second task. The persistence database resumes transmitting the messages of the first and second tasks if the tasks are not achieved. The persistence database assures that the messages of the intended tasks are performed in blocks so that the associated tasks can be achieved.
The reliable messaging application transmits the messages to the recorder computing message at event 813. At event 816, the reliable messaging application provides status of the messages indicating whether the reliable messaging application transmitted the messages. For example, the status of the message could confirm that the message has been received and processed without error. At event 819, the recorder computing device receives the messages and confirms that performance of the messages was successful (or unsuccessful). At event 826, if the recorder computing device receives and performs the messages successfully, then the reliable messaging application communicates with the persistence database to delete the performed messages from the database. If the recorder computing device does not perform the messages successfully, the sequence returns to 809 in which the persistence database transmits the messages in sequential order, as indicated at event 829. An advantage, among others, of the reliable messaging operation is that the message can be performed even when the enterprise manager malfunctions. The reliable messaging application will continue to send the message until the message is successfully processed or deleted from the system by the user. Alternatively or additionally, the reliable messaging application can repeat transmitting of the messages for a certain number of times, e.g., 25 times. After the certain number of times, the reliable messaging application stops transmitting the messages and notifies the user via the display device 287 that the messages cannot be achieved.
Before a user can be assigned their roles within a call center premises, an administrator can create or edit sites, site groups, and users using the enterprise manager. Creating sites and site groups allows administrators to organize recorders according to their geographical or business needs. The administrator can assign the users privileges to access software installation configurations that are restricted to a sub-hierarchy of the enterprise manager. Privileges may also be restricted at the site group or site level. Site groups are collections of sites in the enterprise hierarchy that facilitate the administration and security for installed recorders. The display diagrams of
Each alarm can have different email profiles associated with it. Such email profiles can be used to indicate that an alarm notification is to be sent to an individual or group that is interested in that event. For example, a user who is managing an archive system might get notifications of events that are appropriate to that role. Each individual recorder manages the e-mailing of notification alerts and hence the profiles of each recorder can be different if so desired.
In other words, configuration and key parameter data can be copied from one source recording system to one or more target recording systems. The source data may be selected from a list of key functional areas, such as in the “Selected components to copy” section 1053. The configuration data is then applied to the target recorders in such a way as to update the configuration of the functional areas selected. Any data that is unique to a given recording system is maintained with only the non-unique data being updated. The source and target recording systems do not need to be identical in their capabilities. The configuration data will be applied to any available instances of the functional area to be configured on the target systems.
An advantage, among others, of this copying method is that a copy of the recorders configuration does not have to include all available components but selected components, as mentioned above. Another advantage, among others, is that the source recording systems may have different physical configurations than the target. Those components that are the same can be copied from the source recording system to the target recording system. Another advantage, among others, is that, in the case of functions where there may be multiple instances in the source recorder, the first in the configuration list is used.
Another advantage, among others, is where there are multiple instances of a feature to be configured in the source recorder, then all instances can be applied with the configuration data. For example, the configuration data from the first analog card in the source recorder can be applied to the 15 cards in the target recorder. Another advantage, among others, is that non-unique data can be copied to the source system, such as Card ID or Serial numbers. Another advantage, among others, is that the configuration copy is delivered through the guaranteed delivery process within the enterprise manager. Another advantage, among others, is that the status of the configuration copy and any failures are reported.
The enterprise manager allows an administrator to organize other recording assets under sites. A site is defined as a logical collection of remote components, while a site group is defined as a logical collection of sites. The enterprise manager can integrate other remote components spread across the enterprise such as an Audio Server, Central Archive Manager, Multimedia Server & BDR Server.
Additionally or alternatively, the enterprise manager enables a user to install one or more audio servers to a site and/or site group level, which allows an application layer to determine the location of the audio server for load balancing and proximity determination purposes. Additionally or alternatively, the enterprise manager enables an administrator to install one or more central archive manager (CAM) servers at a site and/or site group level, which allows the administrator to determine which recorders are associated with which CAM Server. This flexibility allows a company to distribute the load of archiving across multiple recorders on different servers. Each CAM server can run its own archival campaigns, which can be independent from CAM Servers.
Additionally or alternatively, a multimedia Post-processing (MMP) server can be configured on a specific recorder or installed on a separate server. The MMP server is capable of stitching contents recorded on different recorders, and converting the encoding of the recorded calls, for example. The enterprise manager allows registration of one or more MMP servers at a site and/or site group level. This allows an application layer to perform load balancing and perform least cost routing. Additionally or alternatively, multiple business device recorder (BDR) servers can be registered at a site and/or a site group level. Hence, to represent the relationship between the recorders and BDR servers, the enterprise manager can represent a topology between the recorders and BDR Servers.
It should be noted that the any process descriptions or blocks in flow charts should be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps in the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be emphasized that the above-described embodiments of the present invention are merely possible examples of implementations, merely set forth for a clear understanding of the principles of the invention. Many variations and modifications may be made to the above-described embodiments of the invention without departing substantially from the spirit and principles of the invention. All such modifications and variations are intended to be included herein within the scope of this disclosure and the present invention and protected by the following claims.
Number | Name | Date | Kind |
---|---|---|---|
3594919 | De Bell et al. | Jul 1971 | A |
3705271 | De Bell et al. | Dec 1972 | A |
4510351 | Costello et al. | Apr 1985 | A |
4684349 | Ferguson et al. | Aug 1987 | A |
4694483 | Cheung | Sep 1987 | A |
4763353 | Canale et al. | Aug 1988 | A |
4924488 | Kosich | May 1990 | A |
4953159 | Hayden et al. | Aug 1990 | A |
5016272 | Stubbs et al. | May 1991 | A |
5101402 | Chiu et al. | Mar 1992 | A |
5117225 | Wang | May 1992 | A |
5133081 | Mayo | Jul 1992 | A |
5210789 | Jeffus et al. | May 1993 | A |
5239460 | LaRoche | Aug 1993 | A |
5241625 | Epard et al. | Aug 1993 | A |
5267865 | Lee et al. | Dec 1993 | A |
5299260 | Shaio | Mar 1994 | A |
5311422 | Loftin et al. | May 1994 | A |
5315711 | Barone et al. | May 1994 | A |
5317628 | Misholi et al. | May 1994 | A |
5347306 | Nitta | Sep 1994 | A |
5388252 | Dreste et al. | Feb 1995 | A |
5396371 | Henits et al. | Mar 1995 | A |
5432715 | Shigematsu et al. | Jul 1995 | A |
5465286 | Clare et al. | Nov 1995 | A |
5475625 | Glaschick | Dec 1995 | A |
5485569 | Goldman et al. | Jan 1996 | A |
5491780 | Fyles et al. | Feb 1996 | A |
5499291 | Kepley | Mar 1996 | A |
5572652 | Robusto et al. | Nov 1996 | A |
5577112 | Cambray et al. | Nov 1996 | A |
5590171 | Howe et al. | Dec 1996 | A |
5597312 | Bloom et al. | Jan 1997 | A |
5619183 | Ziegra et al. | Apr 1997 | A |
5661778 | Hall et al. | Aug 1997 | A |
5696906 | Peters et al. | Dec 1997 | A |
5717879 | Moran et al. | Feb 1998 | A |
5721842 | Beasley et al. | Feb 1998 | A |
5742670 | Bennett | Apr 1998 | A |
5748499 | Trueblood | May 1998 | A |
5778182 | Cathey et al. | Jul 1998 | A |
5784452 | Carney | Jul 1998 | A |
5790798 | Beckett, II et al. | Aug 1998 | A |
5796952 | Davis et al. | Aug 1998 | A |
5809247 | Richardson et al. | Sep 1998 | A |
5809250 | Kisor | Sep 1998 | A |
5825869 | Brooks et al. | Oct 1998 | A |
5835572 | Richardson, Jr. et al. | Nov 1998 | A |
5862330 | Anupam et al. | Jan 1999 | A |
5864772 | Alvarado et al. | Jan 1999 | A |
5881225 | Worth | Mar 1999 | A |
5884032 | Bateman et al. | Mar 1999 | A |
5907680 | Nielsen | May 1999 | A |
5918214 | Perkowski | Jun 1999 | A |
5923746 | Baker et al. | Jul 1999 | A |
5933811 | Angles et al. | Aug 1999 | A |
5944791 | Scherpbier | Aug 1999 | A |
5948061 | Merriman et al. | Sep 1999 | A |
5958016 | Chang et al. | Sep 1999 | A |
5964836 | Rowe et al. | Oct 1999 | A |
5978648 | George et al. | Nov 1999 | A |
5982857 | Brady | Nov 1999 | A |
5987466 | Greer et al. | Nov 1999 | A |
5990852 | Szamrej | Nov 1999 | A |
5991373 | Pattison et al. | Nov 1999 | A |
5991796 | Anupam et al. | Nov 1999 | A |
6005932 | Bloom | Dec 1999 | A |
6009429 | Greer et al. | Dec 1999 | A |
6014134 | Bell et al. | Jan 2000 | A |
6014647 | Nizzari et al. | Jan 2000 | A |
6014666 | Helland et al. | Jan 2000 | A |
6018619 | Allard et al. | Jan 2000 | A |
6035332 | Ingrassia et al. | Mar 2000 | A |
6038544 | Machin et al. | Mar 2000 | A |
6039575 | L'Allier et al. | Mar 2000 | A |
6057841 | Thurlow et al. | May 2000 | A |
6058163 | Pattison et al. | May 2000 | A |
6061798 | Coley et al. | May 2000 | A |
6072860 | Kek et al. | Jun 2000 | A |
6076099 | Chen et al. | Jun 2000 | A |
6078894 | Clawson et al. | Jun 2000 | A |
6091712 | Pope et al. | Jul 2000 | A |
6108711 | Beck et al. | Aug 2000 | A |
6122665 | Bar et al. | Sep 2000 | A |
6122668 | Teng et al. | Sep 2000 | A |
6130668 | Stein | Oct 2000 | A |
6138139 | Beck et al. | Oct 2000 | A |
6144991 | England | Nov 2000 | A |
6146148 | Stuppy | Nov 2000 | A |
6151622 | Fraenkel et al. | Nov 2000 | A |
6154771 | Rangan et al. | Nov 2000 | A |
6157808 | Hollingsworth | Dec 2000 | A |
6171109 | Ohsuga | Jan 2001 | B1 |
6182094 | Humpleman et al. | Jan 2001 | B1 |
6195679 | Bauersfeld et al. | Feb 2001 | B1 |
6201948 | Cook et al. | Mar 2001 | B1 |
6202066 | Barkley et al. | Mar 2001 | B1 |
6211451 | Tohgi et al. | Apr 2001 | B1 |
6225993 | Lindblad et al. | May 2001 | B1 |
6230197 | Beck et al. | May 2001 | B1 |
6236977 | Verba et al. | May 2001 | B1 |
6244758 | Solymar et al. | Jun 2001 | B1 |
6282548 | Burner et al. | Aug 2001 | B1 |
6286030 | Wenig et al. | Sep 2001 | B1 |
6286046 | Bryant | Sep 2001 | B1 |
6288753 | DeNicola et al. | Sep 2001 | B1 |
6289340 | Purnam et al. | Sep 2001 | B1 |
6301462 | Freeman et al. | Oct 2001 | B1 |
6301573 | McIlwaine et al. | Oct 2001 | B1 |
6324282 | McIllwaine et al. | Nov 2001 | B1 |
6347374 | Drake et al. | Feb 2002 | B1 |
6351467 | Dillon | Feb 2002 | B1 |
6353851 | Anupam et al. | Mar 2002 | B1 |
6360250 | Anupam et al. | Mar 2002 | B1 |
6370574 | House et al. | Apr 2002 | B1 |
6404857 | Blair et al. | Jun 2002 | B1 |
6411989 | Anupam et al. | Jun 2002 | B1 |
6418471 | Shelton et al. | Jul 2002 | B1 |
6459787 | McIllwaine et al. | Oct 2002 | B2 |
6487195 | Choung et al. | Nov 2002 | B1 |
6493758 | McLain | Dec 2002 | B1 |
6502131 | Vaid et al. | Dec 2002 | B1 |
6510220 | Beckett, II et al. | Jan 2003 | B1 |
6535909 | Rust | Mar 2003 | B1 |
6542602 | Elazar | Apr 2003 | B1 |
6546405 | Gupta et al. | Apr 2003 | B2 |
6560328 | Bondarenko et al. | May 2003 | B1 |
6583806 | Ludwig et al. | Jun 2003 | B2 |
6600821 | Chan et al. | Jul 2003 | B1 |
6606657 | Zilberstein et al. | Aug 2003 | B1 |
6636256 | Passman et al. | Oct 2003 | B1 |
6662228 | Limsico | Dec 2003 | B1 |
6665644 | Kanevsky et al. | Dec 2003 | B1 |
6674447 | Chiang et al. | Jan 2004 | B1 |
6683633 | Holtzblatt et al. | Jan 2004 | B2 |
6697858 | Ezerzer et al. | Feb 2004 | B1 |
6724887 | Eilbacher et al. | Apr 2004 | B1 |
6738456 | Wrona et al. | May 2004 | B2 |
6757361 | Blair et al. | Jun 2004 | B2 |
6772167 | Snavely et al. | Aug 2004 | B1 |
6772396 | Cronin et al. | Aug 2004 | B1 |
6775377 | McIllwaine et al. | Aug 2004 | B2 |
6792575 | Samaniego et al. | Sep 2004 | B1 |
6810414 | Brittain | Oct 2004 | B1 |
6820083 | Nagy et al. | Nov 2004 | B1 |
6823384 | Wilson et al. | Nov 2004 | B1 |
6870916 | Henrikson et al. | Mar 2005 | B2 |
6901438 | Davis et al. | May 2005 | B1 |
6931402 | Pereira, III | Aug 2005 | B1 |
6959078 | Eilbacher et al. | Oct 2005 | B1 |
6965886 | Govrin et al. | Nov 2005 | B2 |
7181017 | Nagel et al. | Feb 2007 | B1 |
7254606 | Hamada | Aug 2007 | B2 |
7418490 | Zhang et al. | Aug 2008 | B1 |
7418727 | Lin et al. | Aug 2008 | B2 |
7424494 | Jiang et al. | Sep 2008 | B2 |
7529925 | Harkins | May 2009 | B2 |
7548539 | Kouretas et al. | Jun 2009 | B2 |
7581145 | Nagamine | Aug 2009 | B2 |
7685206 | Mathew et al. | Mar 2010 | B1 |
20010000962 | Rajan | May 2001 | A1 |
20010032335 | Jones | Oct 2001 | A1 |
20010043697 | Cox et al. | Nov 2001 | A1 |
20020026590 | Kusunoki | Feb 2002 | A1 |
20020026592 | Gavrila et al. | Feb 2002 | A1 |
20020038363 | MacLean | Mar 2002 | A1 |
20020052948 | Baudu et al. | May 2002 | A1 |
20020065911 | von Klopp et al. | May 2002 | A1 |
20020065912 | Catchpole et al. | May 2002 | A1 |
20020128925 | Angeles | Sep 2002 | A1 |
20020143925 | Pricer et al. | Oct 2002 | A1 |
20020165954 | Eshghi et al. | Nov 2002 | A1 |
20030055883 | Wiles et al. | Mar 2003 | A1 |
20030078932 | Kaiserwerth et al. | Apr 2003 | A1 |
20030079020 | Gourraud et al. | Apr 2003 | A1 |
20030087629 | Juitt et al. | May 2003 | A1 |
20030105974 | Griffin et al. | Jun 2003 | A1 |
20030107591 | Jameson | Jun 2003 | A1 |
20030144900 | Whitmer | Jul 2003 | A1 |
20030154240 | Nygren et al. | Aug 2003 | A1 |
20030163737 | Roskind | Aug 2003 | A1 |
20040100507 | Hayner et al. | May 2004 | A1 |
20040165717 | McIlwaine et al. | Aug 2004 | A1 |
20050015775 | Russell et al. | Jan 2005 | A1 |
20050021982 | Popp et al. | Jan 2005 | A1 |
20050066160 | Parham et al. | Mar 2005 | A1 |
20050091595 | Shappell et al. | Apr 2005 | A1 |
20050135609 | Lee et al. | Jun 2005 | A1 |
20050144186 | Hesselink et al. | Jun 2005 | A1 |
20050242948 | Tarr | Nov 2005 | A1 |
20060089932 | Buehler et al. | Apr 2006 | A1 |
20060143286 | Aoki et al. | Jun 2006 | A1 |
20060218394 | Yang | Sep 2006 | A1 |
20070100829 | Allen et al. | May 2007 | A1 |
Number | Date | Country |
---|---|---|
0453128 | Oct 1991 | EP |
0773687 | May 1997 | EP |
0989720 | Mar 2000 | EP |
2369263 | May 2002 | GB |
WO 9843380 | Nov 1998 | WO |
WO 0016207 | Mar 2000 | WO |