The present disclosure relates to systems and methods for secure access of storage.
Electronic commerce is becoming increasingly widespread and common. Likewise, online shopping, where items are purchased online and shipped to the purchasing customer at a residential address, commercial address, or other location, constitutes a growing part of the global economy. In tandem with the rise of online shopping has been the use of storage devices to house packages that the purchasing customer can retrieve at a later time. Secure, authentication-locked containers are common methods of storing valuables. These methods are frequently used to store important documents or packages in a secure housing. Packages, documents, or other valuable items are becoming increasingly common among consumers of online commerce.
The demand for secure containers is increasing, and accordingly there is an increasing need for secure methods to access these containers. Storing valuable items inside of a locked container presents a number of safety concerns, such as unauthorized access. For example, if a container is not properly stored or its security is too weak, then valuable items are at risk of being stolen or lost. As another example, containers located in public spaces such as lobbies or off-site facilities are at risk of being stolen or tampered with by unauthorized parties. As another example, containers located in private spaces such as medicine cabinets or safes are at risk of being accessed by children or other unauthorized parties.
These and other deficiencies exist. Therefore, there is a need to provide systems and methods that overcome these deficiencies to verify customers in a secure and efficient manner.
Aspects of the disclosed technology include systems and methods for secure access of storage.
Embodiments of the present disclosure provide a secure access system. The secure access system includes a storage device, a user device, and a card. The storage device includes a memory and a processor. The processor is configured to receive a first authentication request from the user device. After the first authentication request has been received, the processor is configured to transmit a first authentication credential associated with user login data to the user device. Upon receipt of the first authentication credential, the processor is configured to receive a second authentication request from the user device. In response to the second authentication request, the processor is configured to transmit a second authentication credential associated with an entry of a card into a communication field to the user device. Upon receipt of the second authentication credential, the user device is configured to send a first code to the processor. Upon receipt of the first code, the processor is configured to perform one or more actions based on the first code.
Embodiments of the present disclosure provide a method of a secure access system. The method of a secure access system comprises: receiving a first authentication request; transmitting a first authentication credential; receiving a second authentication request; transmitting a second authentication credential; receiving a first code; and performing one or more access actions based on the first code.
Embodiments of the present disclosure provide a non-transitory medium comprising computer executable instructions. The computer executable instructions perform procedures comprising the steps of: receiving a first authentication request; transmitting a first authentication credential; receiving a second authentication request; transmitting a second authentication credential; receiving a first code; and performing one or more access actions based on the first code.
Further features of the disclosed systems and methods, and the advantages offered thereby, are explained in greater detail hereinafter with reference to specific example embodiments illustrated in the accompanying drawings.
Various embodiments of the present disclosure, together with further objects and advantages, may best be understood by reference to the following description taken in conjunction with the accompanying drawings. The drawings should not be construed as limiting the present invention, but are intended only to illustrate different aspects and embodiments of the invention.
The following description of embodiments provides non-limiting representative examples referencing numerals to particularly describe features and teachings of different aspects of the invention. The embodiments described should be recognized as capable of implementation separately, or in combination, with other embodiments from the description of the embodiments. A person of ordinary skill in the art reviewing the description of embodiments should be able to learn and understand the different described aspects of the invention. The description of embodiments should facilitate understanding of the invention to such an extent that other implementations, not specifically covered but within the knowledge of a person of skill in the art having read the description of embodiments, would be understood to be consistent with an application of the invention.
The present disclosure provides systems and methods for a secure access system.
Benefits of the systems and methods disclosed herein include improved security and efficient access of storage. Example embodiments of the present disclosure provide systems and methods for a secure access system. A contactless card or other device may be tapped to a device (e.g., a smart phone) to engage with the secure access system and method. Accordingly, a delivery person can verify that they are delivering a package to the right person, and the person accepting the package can also verify that the delivery person who is delivering to them is authorized to make the delivery.
In some embodiments, when a contactless card or other device is tapped to a person's phone, certificates signed by an employer (e.g., a courier) can also be transferred. This transfer can be either directly from the contactless card, the person's phone, or indirectly after looking up their identity online.
In some embodiments, when a contactless card is tapped to a package delivery device, the identity of the person who taps the contactless card can be determined and verified to match the addressee of the package. This can also be implemented with host card emulation (HCE) that emulates the contactless card. The address on the package may be a loose address (stored preferences) or tight with digitally signed certificates, or may be scoped to the individual delivery transaction.
Example embodiments of the present disclosure can promote the efficiency and security of transactions, such as package pickup and delivery transactions and the purchase of goods or services subject to age restrictions, quantity restrictions, and other restrictions. Further, the identity verification can be carried out quickly, without degrading the user experience and without the need for consumers, employees, and other personnel to carry identification documents and other materials. It is understood that example embodiments of the present disclosure are applicable to a wide range of purposes where identity verification is required, including, without limitation, package pickup, package delivery, security (e.g., building or restricted area access), and travel (e.g., ticket purchases, plane or train boarding).
Example embodiments of the present disclosure can promote the safety and privacy of the user, such securing the access to safes or medicine cabinets or other storage containers located in a user's private home. The verifications required by the present disclosure secure storage devices from unauthorized parties.
System 100 may include one or more contactless cards 110 which are further explained below with reference to
System 100 may include a user device 120. The user device 120 may be a network-enabled computer device. Exemplary network-enabled computer devices include, without limitation, a server, a network appliance, a personal computer, a workstation, a phone, a handheld personal computer, a personal digital assistant, a thin client, a fat client, an Internet browser, a mobile device, a kiosk, a contactless card, or other a computer device or communications device. For example, network-enabled computer devices may include an iPhone, iPod, iPad from Apple® or any other mobile device running Apple's iOS® operating system, any device running Microsoft's Windows® Mobile operating system, any device running Google's Android® operating system, and/or any other smartphone, tablet, or like wearable mobile device.
The user device 120 may include a processor 121, a memory 122, and an application 123. The processor 121 may be a processor, a microprocessor, or other processor, and the user device 120 may include one or more of these processors. The processor 121 may include processing circuitry, which may contain additional components, including additional processors, memories, error and parity/CRC checkers, data encoders, anti-collision algorithms, controllers, command decoders, security primitives and tamper-proofing hardware, as necessary to perform the functions described herein.
The processor 121 may be coupled to the memory 122. The memory 122 may be a read-only memory, write-once read-multiple memory or read/write memory, e.g., RAM, ROM, and EEPROM, and the user device 120 may include one or more of these memories. A read-only memory may be factory programmable as read-only or one-time programmable. One-time programmability provides the opportunity to write once then read many times. A write-once read-multiple memory may be programmed at a point in time after the memory chip has left the factory. Once the memory is programmed, it may not be rewritten, but it may be read many times. A read/write memory may be programmed and re-programed many times after leaving the factory. It may also be read many times. The memory 122 may be configured to store one or more software applications, such as the application 123, and other data, such as user's private data and financial account information.
The application 123 may comprise one or more software applications, such as a mobile application and a web browser, comprising instructions for execution on the user device 120. In some examples, the user device 120 may execute one or more applications, such as software applications, that enable, for example, network communications with one or more components of the system 100, transmit and/or receive data, and perform the functions described herein. Upon execution by the processor 121, the application 123 may provide the functions described in this specification, specifically to execute and perform the steps and functions in the process flows described below. Such processes may be implemented in software, such as software modules, for execution by computers or other machines. The application 123 may provide graphical user interfaces (GUIs) through which a user may view and interact with other components and devices within the system 100. The GUIs may be formatted, for example, as web pages in HyperText Markup Language (HTML), Extensible Markup Language (XML) or in any other suitable form for presentation on a display device depending upon applications used by users to interact with the system 100.
The user device 120 may further include a display 124 and input devices 125. The display 124 may be any type of device for presenting visual information such as a computer monitor, a flat panel display, and a mobile device screen, including liquid crystal displays, light-emitting diode displays, plasma panels, and cathode ray tube displays. The input devices 125 may include any device for entering information into the user device 120 that is available and supported by the user device 120, such as a touch-screen, keyboard, mouse, cursor-control device, touch-screen, microphone, digital camera, video recorder or camcorder. These devices may be used to enter information and interact with the software and other devices described herein.
System 100 may include a server 130. The server 130 may be a network-enabled computer device. Exemplary network-enabled computer devices include, without limitation, a server, a network appliance, a personal computer, a workstation, a phone, a handheld personal computer, a personal digital assistant, a thin client, a fat client, an Internet browser, a mobile device, a kiosk, a contactless card, or other a computer device or communications device. For example, network-enabled computer devices may include an iPhone, iPod, iPad from Apple® or any other mobile device running Apple's iOS® operating system, any device running Microsoft's Windows® Mobile operating system, any device running Google's Android® operating system, and/or any other smartphone, tablet, or like wearable mobile device.
The server 130 may include a processor 131, a memory 132, and an application 133. The processor 131 may be a processor, a microprocessor, or other processor, and the server 130 may include one or more of these processors. The processor 131 may include processing circuitry, which may contain additional components, including additional processors, memories, error and parity/CRC checkers, data encoders, anti-collision algorithms, controllers, command decoders, security primitives and tamper-proofing hardware, as necessary to perform the functions described herein.
The processor 131 may be coupled to the memory 132. The memory 132 may be a read-only memory, write-once read-multiple memory or read/write memory, e.g., RAM, ROM, and EEPROM, and the server 130 may include one or more of these memories. A read-only memory may be factory programmable as read-only or one-time programmable. One-time programmability provides the opportunity to write once then read many times. A write-once read-multiple memory may be programmed at a point in time after the memory chip has left the factory. Once the memory is programmed, it may not be rewritten, but it may be read many times. A read/write memory may be programmed and re-programed many times after leaving the factory. It may also be read many times. The memory 132 may be configured to store one or more software applications, such as the application 133, and other data, such as user's private data and financial account information.
The application 133 may comprise one or more software applications comprising instructions for execution on the server 130. In some examples, the server 130 may execute one or more applications, such as software applications, that enable, for example, network communications with one or more components of the system 100, transmit and/or receive data, and perform the functions described herein. Upon execution by the processor 131, the application 133 may provide the functions described in this specification, specifically to execute and perform the steps and functions in the process flows described below. For example, the application 133 may be executed to perform receiving web form data from the user device 120 and the storage device 160, retaining a web session between the user device 120 and the storage device 160, and masking private data received from the user device 120 and the storage device 160. Such processes may be implemented in software, such as software modules, for execution by computers or other machines. The application 133 may provide GUIs through which a user may view and interact with other components and devices within the system 100. The GUIs may be formatted, for example, as web pages in HyperText Markup Language (HTML), Extensible Markup Language (XML) or in any other suitable form for presentation on a display device depending upon applications used by users to interact with the system 100.
The server 130 may further include a display 134 and input devices 135. The display 134 may be any type of device for presenting visual information such as a computer monitor, a flat panel display, and a mobile device screen, including liquid crystal displays, light-emitting diode displays, plasma panels, and cathode ray tube displays. The input devices 135 may include any device for entering information into the server 130 that is available and supported by the server 130, such as a touch-screen, keyboard, mouse, cursor-control device, touch-screen, microphone, digital camera, video recorder or camcorder. These devices may be used to enter information and interact with the software and other devices described herein.
System 100 may include one or more networks 140. In some examples, the network 140 may be one or more of a wireless network, a wired network or any combination of wireless network and wired network, and may be configured to connect the user device 120, the server 130, the database 150 and the storage device 160. For example, the network 140 may include one or more of a fiber optics network, a passive optical network, a cable network, an Internet network, a satellite network, a wireless local area network (LAN), a Global System for Mobile Communication, a Personal Communication Service, a Personal Area Network, Wireless Application Protocol, Multimedia Messaging Service, Enhanced Messaging Service, Short Message Service, Time Division Multiplexing based systems, Code Division Multiple Access based systems, D-AMPS, Wi-Fi, Fixed Wireless Data, IEEE 802.11b, 802.15.1, 802.11n and 802.11g, Bluetooth, NFC, Radio Frequency Identification (RFID), Wi-Fi, and/or the like.
In addition, the network 140 may include, without limitation, telephone lines, fiber optics, IEEE Ethernet 902.3, a wide area network, a wireless personal area network, a LAN, or a global network such as the Internet. In addition, the network 140 may support an Internet network, a wireless communication network, a cellular network, or the like, or any combination thereof. The network 140 may further include one network, or any number of the exemplary types of networks mentioned above, operating as a stand-alone network or in cooperation with each other. The network 140 may utilize one or more protocols of one or more network elements to which they are communicatively coupled. The network 140 may translate to or from other protocols to one or more protocols of network devices. Although the network 140 is depicted as a single network, it should be appreciated that according to one or more examples, the network 140 may comprise a plurality of interconnected networks, such as, for example, the Internet, a service provider's network, a cable television network, corporate networks, such as credit card association networks, and home networks. The network 140 may further comprise, or be configured to create, one or more front channels, which may be publicly accessible and through which communications may be observable, and one or more secured back channels, which may not be publicly accessible and through which communications may not be observable.
System 100 may include a database 150. The database 150 may be one or more databases configured to store data, including without limitation, private data of users, financial accounts of users, identities of users, transactions of users, and certified and uncertified documents. The database 150 may comprise a relational database, a non-relational database, or other database implementations, and any combination thereof, including a plurality of relational databases and non-relational databases. In some examples, the database 150 may comprise a desktop database, a mobile database, or an in-memory database. Further, the database 150 may be hosted internally by the server 130 or may be hosted externally of the server 130, such as by a server, by a cloud-based platform, or in any storage device that is in data communication with the server 130.
System 100 may include a storage device 160. The storage device 160 may be a network-enabled computer device. Exemplary network-enabled computer devices include, without limitation, a server, a network appliance, a personal computer, a workstation, a phone, a handheld personal computer, a personal digital assistant, a thin client, a fat client, an Internet browser, a mobile device, a kiosk, a contactless card, or other a computer device or communications device. For example, network-enabled computer devices may include an iPhone, iPod, iPad from Apple® or any other mobile device running Apple's iOS® operating system, any device running Microsoft's Windows® Mobile operating system, any device running Google's Android® operating system, and/or any other smartphone, tablet, or like wearable mobile device.
The storage device 160 may include a processor 161, a memory 162, and an application 163. The processor 161 may be a processor, a microprocessor, or other processor, and the storage device 160 may include one or more of these processors. The processor 161 may include processing circuitry, which may contain additional components, including additional processors, memories, error and parity/CRC checkers, data encoders, anti-collision algorithms, controllers, command decoders, security primitives and tamper-proofing hardware, as necessary to perform the functions described herein.
The processor 161 may be coupled to the memory 162. The memory 162 may be a read-only memory, write-once read-multiple memory or read/write memory, e.g., RAM, ROM, and EEPROM, and the storage device 160 may include one or more of these memories. A read-only memory may be factory programmable as read-only or one-time programmable. One-time programmability provides the opportunity to write once then read many times. A write-once read-multiple memory may be programmed at a point in time after the memory chip has left the factory. Once the memory is programmed, it may not be rewritten, but it may be read many times. A read/write memory may be programmed and re-programed many times after leaving the factory. It may also be read many times. The memory 162 may be configured to store one or more software applications, such as the application 163, and other data, such as user's private data and financial account information.
The application 163 may comprise one or more software applications comprising instructions for execution on the storage device 160. In some examples, the storage device 160 may execute one or more applications, such as software applications, that enable, for example, network communications with one or more components of the system 100, transmit and/or receive data, and perform the functions described herein. Upon execution by the processor 161, the application 163 may provide the functions described in this specification, specifically to execute and perform the steps and functions in the process flows described below. For example, the application 163 may be executed to perform receiving web form data from the user device 120 and the storage device 160, retaining a web session between the user device 120 and the storage device 160, and masking private data received from the user device 120 and the storage device 160. Such processes may be implemented in software, such as software modules, for execution by computers or other machines. The application 163 may provide GUIs through which a user may view and interact with other components and devices within the system 100. The GUIs may be formatted, for example, as web pages in HyperText Markup Language (HTML), Extensible Markup Language (XML) or in any other suitable form for presentation on a display device depending upon applications used by users to interact with the system 100.
The storage device 160 may further include a display 164 and input devices 165. The display 164 may be any type of device for presenting visual information such as a computer monitor, a flat panel display, and a mobile device screen, including liquid crystal displays, light-emitting diode displays, plasma panels, and cathode ray tube displays. The input devices 165 may include any device for entering information into the server 130 that is available and supported by the server 130, such as a touch-screen, keyboard, mouse, cursor-control device, touch-screen, microphone, digital camera, video recorder or camcorder. These devices may be used to enter information and interact with the software and other devices described herein.
The contactless card 110 may comprise a substrate 210, which may include a single layer or one or more laminated layers composed of plastics, metals, and other materials. Exemplary substrate materials include polyvinyl chloride, polyvinyl chloride acetate, acrylonitrile butadiene styrene, polycarbonate, polyesters, anodized titanium, palladium, gold, carbon, paper, and biodegradable materials. In some examples, the contactless card 200A may have physical characteristics compliant with the ID-1 format of the ISO/IEC 7810 standard, and the contactless card may otherwise be compliant with the ISO/IEC 14443 standard. However, it is understood that the contactless card 110 according to the present disclosure may have different characteristics, and the present disclosure does not require a contactless card to be implemented in a payment card.
The contactless card 110 may also include identification information 215 displayed on the front and/or back of the card, and a contact pad 220. The contact pad 220 may be configured to establish contact with another communication device, such as a user device, smart phone, laptop, desktop, or tablet computer. The contactless card 110 may also include processing circuitry, antenna and other components not shown in
As illustrated in
The memory 112 may be a read-only memory, write-once read-multiple memory or read/write memory, e.g., RAM, ROM, and EEPROM, and the contactless card 200B may include one or more of these memories. A read-only memory may be factory programmable as read-only or one-time programmable. One-time programmability provides the opportunity to write once then read many times. A write once/read-multiple memory may be programmed at a point in time after the memory chip has left the factory. Once the memory is programmed, it may not be rewritten, but it may be read many times. A read/write memory may be programmed and re-programed many times after leaving the factory. It may also be read many times.
The memory 112 may be configured to store one or more applets 113, one or more counters 114, and a customer identifier 115. The one or more applets 113 may comprise one or more software applications configured to execute on one or more contactless cards, such as Java Card applet. However, it is understood that applets 113 are not limited to Java Card applets, and instead may be any software application operable on contactless cards or other devices having limited memory. The one or more counters 114 may comprise a numeric counter sufficient to store an integer. The customer identifier 115 may comprise a unique alphanumeric identifier assigned to a user of the contactless card 110, and the identifier may distinguish the user of the contactless card from other contactless card users. In some examples, the customer identifier 115 may identify both a customer and an account assigned to that customer and may further identify the contactless card associated with the customer's account.
The processor and memory elements of the foregoing exemplary embodiments are described with reference to the contact pad, but the present disclosure is not limited thereto. It is understood that these elements may be implemented outside of the pad 220 or entirely separate from it, or as further elements in addition to processor 111 and memory 112 elements located within the contact pad 220.
In some examples, the contactless card 110 may comprise one or more antennas 255. The one or more antennas 255 may be placed within the contactless card 110 and around the processing circuitry 225 of the contact pad 220. For example, the one or more antennas 255 may be integral with the processing circuitry 225 and the one or more antennas 255 may be used with an external booster coil. As another example, the one or more antennas 255 may be external to the contact pad 220 and the processing circuitry 225.
In an embodiment, the coil of contactless card 110 may act as the secondary of an air core transformer. The terminal may communicate with the contactless card 110 by cutting power or amplitude modulation. The contactless card 110 may infer the data transmitted from the terminal using the gaps in the contactless card's power connection, which may be functionally maintained through one or more capacitors. The contactless card 110 may communicate back by switching a load on the contactless card's coil or load modulation. Load modulation may be detected in the terminal's coil through interference.
As explained above, the contactless card 110 may be built on a software platform operable on smart cards or other devices having limited memory, such as JavaCard, and one or more or more applications or applets may be securely executed. Applets may be added to contactless cards to provide a one-time password (OTP) for multifactor authentication (MFA) in various mobile application-based use cases. Applets may be configured to respond to one or more requests, such as near field data exchange requests, from a reader, such as a mobile NFC reader, and produce an NDEF message that comprises a cryptographically secure OTP encoded as an NDEF text tag.
The method 300A can commence in step 305 where the first authentication request is received. The first authentication request may be transmitted by a user device and may be received by a processor. The processor may be related to the storage device, a server, or another device.
In step 310, the first authentication credential is transmitted to the user device. The first authentication credential may be transmitted by a processor. The processor may be related to the storage device, a server, or another device.
In step 315, the second authentication request is received by the processor. The processor may be related to the storage device, a server, or another device.
In step 320, the second authentication credential is transmitted to the user device. The second authentication credential may be transmitted by a processor. The processor may be related to the storage device, a server, or another device.
The processor may attempt transmission of the first and second authentication credentials up to a predetermined threshold number. For example, the processor may attempt to send the first authentication credential up to a threshold of five attempts if the first four attempts are not satisfied. It is understood that five is an example threshold, and that the processor may attempt transmission five times, less than five times, or more than five times.
The processor may delay the performance of one or more access actions if the attempted transmission of the first and second authentication credentials exceed the predetermined threshold.
The processor may attempt to transmit a third authentication request and to receive, in response to the third authentication request, a third authentication credential associated with biometric data. This biometric data can include one or more predetermined kinds of data including but not limited to voice recognition, fingerprint scanning, handprint scanning, hand-geometry recognition, ear shape recognition, vein pattern recognition, facial recognition, iris recognition, retina recognition, heart-rate recognition, body temperature recognition, and DNA recognition.
In step 325, the first code is received by the processor. The processor may be related to the storage device or some other server. The processor may receive a second code if the first code is not received and inputted within a predetermined time period.
In step 330, the action related to the first code is performed. The action may be performed by the storage device. One or more of the access actions can include opening a safe, closing a safe, unlocking a safe, and locking a safe. As another example, one or more of the access actions can include opening a cabinet, closing a cabinet, unlocking a cabinet, and locking cabinet. As another example, one or more of the actions can include notifying the user that their package has been picked up.
Step 330 may include one or more access actions for a predetermined type of transaction. These transactions may include one or more of the following transactions from the following non-limiting list: cash, credit, debit, other non-cash transactions, point of sale transactions, and other consumer based transactions. It is understood that this list is illustrative and may include other examples of transactions.
Step 330 may include one more access actions for a predetermined time period. For example, the access action may be available for one minute, one hour, or other predetermined time period. After this period elapses, further authentication as described herein may be required to re-perform the access action. Alternatively, if less time is needed for the access action, further authentication as described herein may be required to end the access action prior to the expiration of the predetermined time period.
Step 325 may include one or more actions for authorizing remote access to one or more users. The processor may perform one or more access actions for a smart device, which can include, without limitation, a server, a network appliance, a personal computer, a workstation, a phone, a handheld personal computer, a personal digital assistant, a thin client, a fat client, an Internet browser, a mobile device, a kiosk, a contactless card, or other a computer device or communications device. For example, network-enabled computer devices may include an iPhone, iPod, iPad from Apple® or any other mobile device running Apple's iOS® operating system, any device running Microsoft's Windows® Mobile operating system, any device running Google's Android® operating system, and/or any other smartphone, tablet, or like wearable mobile device.
For example, a sender and recipient may desire to exchange data via a transmitting device (e.g. a user device) and a receiving device (e.g. a storage device and/or a user device). As explained above, it is understood that one or more transmitting devices and one or more receiving devices may be involved so long as each party shares the same shared secret symmetric key. In some examples, the transmitting device and receiving device may be provisioned with the same master symmetric key. In other examples, the transmitting device may be provisioned with a diversified key created using the master key. In some examples, the symmetric key may comprise the shared secret symmetric key which is kept secret from all parties other than the transmitting device and the receiving device involved in exchanging the secure data. It is further understood that part of the data exchanged between the transmitting device and receiving device comprises at least a portion of data which may be referred to as the counter value. The counter value may comprise a number that changes each time data is exchanged between the transmitting device and the receiving device.
The transmitting device and the receiving device may be configured to communicate via NFC, Bluetooth, RFID, Wi-Fi, and/or the like.
The method 300B can begin with Step 350. In step 350, a transmitting device and receiving device may be provisioned with the same master key, such as the same master symmetric key. The transmitting device may be the user device 120. The receiving device may be the contactless card 110. When the transmitting device is preparing to process the sensitive data with symmetric cryptographic operation, the sender may update a counter. In addition, the transmitting device may select an appropriate symmetric cryptographic algorithm, which may include at least one of a symmetric encryption algorithm, HMAC algorithm, and a CMAC algorithm. In some examples, the symmetric algorithm used to process the diversification value may comprise any symmetric cryptographic algorithm used as needed to generate the desired length diversified symmetric key. Non-limiting examples of the symmetric algorithm may include a symmetric encryption algorithm such as 3DES or AES128, a symmetric HMAC algorithm, such as HMAC-SHA-256, and a symmetric CMAC algorithm, such as AES-CMAC.
In step 352, the transmitting device may take the selected cryptographic algorithm, and using the master symmetric key, process the counter value 114. For example, the sender may select a symmetric encryption algorithm, and use a counter which updates with every conversation between the transmitting device and the receiving device The one or more counters 114 may comprise a numeric counter sufficient to store an integer. The processor may increment the counter one or more times.
In step 354, the transmitting device generates two session keys: one ENC (encryption) session key and one MAC (message authentication code) session key. The transmitting device may encrypt the counter value with the selected symmetric encryption algorithm using the master symmetric key to create a session key.
In step 356, the processor generates the MAC over the counter 114, the unique customer identifier 115, and the shared secret MAC session key. The customer identifier 115 may comprise a unique alphanumeric identifier assigned to a user of the contactless card 110, and the identifier may distinguish the user of the contactless card from other contactless card users. In some examples, the customer identifier 115 may identify both a customer and an account assigned to that customer and may further identify the contactless card associated with the customer's account.
In step 358, the processor encrypts the MAC with the ENC session key. As encrypted, the MAC can become a cryptogram. In some examples, a cryptographic operation other than encryption may be performed, and a plurality of cryptographic operations may be performed using the diversified symmetric keys prior to transmittal of the protected data.
In some examples, the MAC cryptogram can be a digital signature used to verify user information. Other digital signature algorithms, such as public key asymmetric algorithms, e.g., the Digital Signature Algorithm and the RSA algorithm, or zero knowledge protocols, may be used to perform this verification.
In step 360, the processor transmits a cryptogram to the receiving device. The receiving device can the contactless card 110. The cryptogram can include the applet information 113, the unique customer identifier 115, the counter value 114, and the encrypted MAC.
In step 362, the server validates the cryptogram. The server may be a part of the transmitting device or receiving device. Alternatively, the server may be a separate entity.
In step 364, the receiving device generates its own UDKs (unique diversified keys) using the unique customer identifier 115 and the master key. The unique customer identifier 115 is derived from the validated cryptogram. Recall that the receiving device has already been provisioned with the master key.
In step 366, the receiving device generates two session keys: one ENC (encryption) session key and one MAC (message authentication code) session key. The receiving device may generate these session keys from the UDKs and the counter value 114. The counter value 114 can be derived from the cryptogram.
In step 368, the receiving device uses the session keys to decrypt the MAC from the cryptogram sent by the transmitting device. The output of the encryptions may be the same diversified symmetric key values that were created by the sender. For example, the receiving device may independently create its own copies of the first and second diversified session keys using the counter. Then, the receiving device may decrypt the protected data using the second diversified session key to reveal the output of the MAC created by the transmitting device. The receiving device may then process the resultant data through the MAC operation using the first diversified session key.
In step 370, the receiving device validates the MAC with the MAC session key generated in step 366. The receiving device may validate the MAC over the unique customer identifier 115 and the counter value 114.
The sequence 400 can commence in step 405 where the transmitting device (e.g., a user device) transmits the first authentication request to the server. The server may be a part of the storage device. It is understood that the transmitting device may be in data communication with the server via one or more intermediary devices, such as one or more user devices.
In step 410, the server transmits the first authentication credential to the transmitting device.
The processor may attempt transmission of the first and second authentication credentials up to a predetermined threshold number. For example, the processor may attempt to send the first authentication credential up to a threshold of five attempts if the first four attempts are not satisfied. It is understood that five is an example threshold, and that the processor may attempt transmission five times, less than five times, or more than five times.
In step 415, the transmitting device encrypts the information or data necessary to satisfy the first authentication credential. The method of encryption is further explained with reference to
In step 420, the transmitting device sends the encrypted information to the storage device. The storage device may include the server.
In step 425, the storage device decrypts and validates the information sent by the transmitting device, thereby validating the first authentication necessary to perform an access action.
In step 430, the transmitting device transmits the second authentication request to the server. The server may be a part of the storage device.
In step 435, the server transmits the second authentication credential to the transmitting device.
The processor may attempt transmission of the first and second authentication credentials up to a predetermined threshold number. For example, the processor may attempt to send the first authentication credential up to a threshold of five attempts if the first four attempts are not satisfied. It is understood that five is an example threshold, and that the processor may attempt transmission five times, less than five times, or more than five times.
The processor may delay the performance of one or more access actions if the attempted transmission of the first and second authentication credentials exceed the predetermined threshold.
In step 440, the transmitting device encrypts the data or information necessary to satisfy the second authentication credential. The method of encryption is further explained with reference to
In step 445, the transmitting device sends the encrypted information to the storage device. The storage device may include the server.
In step 450, the storage device decrypts and validates the information sent by the transmitting device, thereby validating the second authentication necessary to perform an access action.
In step 455, the transmitting device transmits the first code to the storage device. The processor may receive a second code if the first code is not received and inputted within a predetermined time period.
In step 460, the storage device performs one or more actions related to the first code. One or more of the access actions can include opening a safe, closing a safe, unlocking a safe, and locking a safe. As another example, one or more of the access actions can include opening a cabinet, closing a cabinet, unlocking a cabinet, and locking cabinet. As another example, one or more of the actions can include notifying the user that their package has been picked up.
Step 460 may include one or more access actions for a predetermined type of transaction. These transactions may include one or more of the following transactions from the following non-limiting list: cash, credit, debit, other non-cash transactions, point of sale transactions, and other consumer based transactions. It is understood that this list is illustrative and may include other examples of transactions.
Step 460 may include one more access actions for a predetermined time period.
Step 460 may include one or more actions for authorizing remote access to one or more users. The processor may perform one or more access actions for a smart device, which can include, without limitation, a server, a network appliance, a personal computer, a workstation, a phone, a handheld personal computer, a personal digital assistant, a thin client, a fat client, an Internet browser, a mobile device, a kiosk, a contactless card, or other a computer device or communications device. For example, network-enabled computer devices may include an iPhone, iPod, iPad from Apple® or any other mobile device running Apple's iOS® operating system, any device running Microsoft's Windows® Mobile operating system, any device running Google's Android® operating system, and/or any other smartphone, tablet, or like wearable mobile device.
The diagram 500 may include a user device 505 which are further explained with reference to
The user device 505 may interact with a contactless card 510 which is further explained with reference to
When the user device 505 and contactless card 510 satisfy the authentication requirements, information can be shared through a Bluetooth signal or wireless signal 515.
The user device 505 and contactless card 510 can satisfy the authentication requirements requested by the storage device 520 which is further explained with reference to
The storage device 520 may open to allow the user to retrieve an item 525.
It is understood that the method of encryption with reference to
The sequence 600 describes a sequence of actions between a contactless card, a user device, a processor, and a storage device. Contactless cards are further explained with reference to
The sequence 600 can begin with step 605. In step 605, the processor receives a first authentication request from the user device. The processor may be related to the storage device or some other server.
In step 610, the processor transmits a first authentication credential to the user device.
The processor may attempt transmission of the first and second authentication credentials up to a predetermined threshold number. For example, the processor may attempt to send the first authentication credential up to a threshold of five attempts if the first four attempts are not satisfied. It is understood that five is an example threshold, and that the processor may attempt transmission five times, less than five times, or more than five times.
In step 615, the user device satisfies the authentication credential through user login data on the user device or some other processor. It is understood that the user login data can include many different kinds of information, such as identification information, financial information, location information, timing information, or some other kind of information.
In step 620, the processor receives a second authentication request from the user device. The user device is further explained with reference to
In step 625, the processor transmits a second authentication credential to the user device. The user device is further explained with reference to
The processor may attempt transmission of the first and second authentication credentials up to a predetermined threshold number. For example, the processor may attempt to send the first authentication credential up to a threshold of five attempts if the first four attempts are not satisfied. It is understood that five is an example threshold, and that the processor may attempt transmission five times, less than five times, or more than five times.
The processor may delay the performance of one or more access actions if the attempted transmission of the first and second authentication credentials exceed the predetermined threshold.
In step 630, the contactless card and the user device interact to satisfy the second authentication credential.
In step 635, the processor receives a third authentication request from the user device. The user device is further explained with reference to
In step 640, the processor transmits a third authentication credential to the user device. The user device is further explained with reference to
In step 645, the user device satisfies the third authentication credential associated with biometric data. This biometric data can include one or more predetermined kinds of data including but not limited to voice recognition, fingerprint scanning, handprint scanning, hand-geometry recognition, ear shape recognition, vein pattern recognition, facial recognition, iris recognition, retina recognition, heart-rate recognition, body temperature recognition, and DNA recognition.
In step 650, the processor receives a first code from the user device. The processor may receive a second code if the first code is not received and inputted within a predetermined time period.
In step 655, the storage device performs one or more actions based on the first code. One or more of the access actions can include opening a safe, closing a safe, unlocking a safe, and locking a safe. As another example, one or more of the access actions can include opening a cabinet, closing a cabinet, unlocking a cabinet, and locking cabinet. As another example, one or more of the actions can include notifying the user that their package has been picked up.
Step 655 may include one or more access actions for a predetermined type of transaction. These transactions may include one or more of the transactions from the following non-limiting list of transactions: cash, credit, debit, other non-cash transactions, point of sale transactions, and other consumer based transactions. It is understood that this list is illustrative and may include other examples of transactions.
Step 655 may include one more access actions for a predetermined time period.
Step 655 may include one or more actions for authorizing remote access to one or more users. The processor may perform one or more access actions for a smart device, which can include, without limitation, a server, a network appliance, a personal computer, a workstation, a phone, a handheld personal computer, a personal digital assistant, a thin client, a fat client, an Internet browser, a mobile device, a kiosk, a contactless card, or other a computer device or communications device. For example, network-enabled computer devices may include an iPhone, iPod, iPad from Apple® or any other mobile device running Apple's iOS® operating system, any device running Microsoft's Windows® Mobile operating system, any device running Google's Android® operating system, and/or any other smartphone, tablet, or like wearable mobile device.
The method 700 describes a typical sequence of actions between a contactless card, a user device, a processor, and a storage device. Contactless cards are further explained with reference to
The method 700 can being with step 705, in which the processor receives the first authentication request from a user device.
In step 710, the processor transmits a first authentication credential to the user device.
In step 715, the user device encrypts the login data associated with the first authentication credential.
In step 720, user device sends the now encrypted user login data to the storage device or processor.
In step 725, the processor or storage device decrypts the use login data and validates the first authentication credential.
In step 730, the processor receives a second authentication request from the user device.
In step 735, the processor transmits a second authentication credential to the user device.
In step 740, the user device communicates with a contactless card and encrypts the card information associated with the second authentication credential. It is understood that the information shared between the card and the user device can include many different kinds of information, such as identification information, financial information, location information, timing information, or some other kind of information
In step 745, the user device sends the encrypted card information to the processor or storage device.
In step 750, the processor or storage device decrypts the card information and validates the second authentication credential.
The processor may attempt transmission of the first and second authentication credentials up to a predetermined threshold number. For example, the processor may attempt to send the first authentication credential up to a threshold of five attempts if the first four attempts are not satisfied. It is understood that five is an example threshold, and that the processor may attempt transmission five times, less than five times, or more than five times.
The processor may delay the performance of one or more access actions if the attempted transmission of the first and second authentication credentials exceed the predetermined threshold.
In step 755, the processor can receive a third authentication request from the user device.
In step 760, the processor can transmit a third authentication credential to the user device.
In step 765, the user device can encrypt a user's biometric information associated with the third authentication credential. This biometric data can include one or more predetermined kinds of data including but not limited to voice recognition, fingerprint scanning, handprint scanning, hand-geometry recognition, ear shape recognition, vein pattern recognition, facial recognition, iris recognition, retina recognition, heart-rate recognition, body temperature recognition, and DNA recognition.
In step 770, the user device sends the encrypted biometric information to the processor or storage device.
In step 775, the processor or storage device decrypts the user biometric information and validates the third authentication credential.
In step 780, a first code is received by either or both the processor or the storage device. The processor may receive a second code if the first code is not received and inputted within a predetermined time period.
In step 785, the storage device performs one or more actions based on the receipt of the first code. One or more of the access actions can include opening a safe, closing a safe, unlocking a safe, and locking a safe. As another example, one or more of the access actions can include opening a cabinet, closing a cabinet, unlocking a cabinet, and locking cabinet. As another example, one or more of the actions can include notifying the user that their package has been picked up.
Step 785 may include one or more access actions for a predetermined type of transaction. These transactions may include one or more of the following transactions from the following non-limiting list: cash, credit, debit, other non-cash transactions, point of sale transactions, and other consumer based transactions. It is understood that this list is illustrative and may include other examples of transactions.
Step 785 may include one more access actions for a predetermined time period.
Step 785 may include one or more actions for authorizing remote access to one or more users. The processor may perform one or more access actions for a smart device, which can include, without limitation, a server, a network appliance, a personal computer, a workstation, a phone, a handheld personal computer, a personal digital assistant, a thin client, a fat client, an Internet browser, a mobile device, a kiosk, a contactless card, or other a computer device or communications device. For example, network-enabled computer devices may include an iPhone, iPod, iPad from Apple® or any other mobile device running Apple's iOS® operating system, any device running Microsoft's Windows® Mobile operating system, any device running Google's Android® operating system, and/or any other smartphone, tablet, or like wearable mobile device.
Throughout the disclosure, the following terms take at least the meanings explicitly associated herein, unless the context clearly dictates otherwise. The term “or” is intended to mean an inclusive “or.” Further, the terms “a,” “an,” and “the” are intended to mean one or more unless specified otherwise or clear from the context to be directed to a singular form.
In this description, numerous specific details have been set forth. It is to be understood, however, that implementations of the disclosed technology may be practiced without these specific details. In other instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description. References to “some examples,” “other examples,” “one example,” “an example,” “various examples,” “one embodiment,” “an embodiment,” “some embodiments,” “example embodiment,” “various embodiments,” “one implementation,” “an implementation,” “example implementation,” “various implementations,” “some implementations,” etc., indicate that the implementation(s) of the disclosed technology so described may include a particular feature, structure, or characteristic, but not every implementation necessarily includes the particular feature, structure, or characteristic. Further, repeated use of the phrases “in one example,” “in one embodiment,” or “in one implementation” does not necessarily refer to the same example, embodiment, or implementation, although it may.
As used herein, unless otherwise specified the use of the ordinal adjectives “first,” “second,” “third,” etc., to describe a common object, merely indicate that different instances of like objects are being referred to, and are not intended to imply that the objects so described must be in a given sequence, either temporally, spatially, in ranking, or in any other manner.
It is understood that the systems and methods described herein may be tangibly embodied in one or more physical media, such as, but not limited to, a compact disc (CD), a digital versatile disc (DVD), a floppy disk, a hard drive, read only memory (ROM), random access memory (RAM), as well as other physical media capable of data storage. For example, data storage may include random access memory (RAM) and read only memory (ROM), which may be configured to access and store data and information and computer program instructions. Data storage may also include storage media or other suitable type of memory (e.g., such as, for example, RAM, ROM, programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), magnetic disks, optical disks, floppy disks, hard disks, removable cartridges, flash drives, any type of tangible and non-transitory storage medium), where the files that comprise an operating system, application programs including, for example, web browser application, email application and/or other applications, and data files may be stored. The data storage of the network-enabled computer systems may include electronic information, files, and documents stored in various ways, including, for example, a flat file, indexed file, hierarchical database, relational database, such as a database created and maintained with software from, for example, Oracle® Corporation, Microsoft® Excel file, Microsoft® Access file, a solid state storage device, which may include a flash array, a hybrid array, or a server-side product, enterprise storage, which may include online or cloud storage, or any other storage mechanism. Moreover, the figures illustrate various components (e.g., servers, computers, processors, etc.) separately. The functions described as being performed at various components may be performed at other components, and the various components may be combined or separated. Other modifications also may be made.
While certain implementations of the disclosed technology have been described in connection with what is presently considered to be the most practical and various implementations, it is to be understood that the disclosed technology is not to be limited to the disclosed implementations, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
This written description uses examples to disclose certain implementations of the disclosed technology, including the best mode, and also to enable any person skilled in the art to practice certain implementations of the disclosed technology, including making and using any devices or systems and performing any incorporated methods. The patentable scope of certain implementations of the disclosed technology is defined in the claims, and may include other examples that occur to those skilled in the art. Such other examples are intended to be within the scope of the claims if they have structural elements that do not differ from the literal language of the claims, or if they include equivalent structural elements with insubstantial differences from the literal language of the claims.
Number | Name | Date | Kind |
---|---|---|---|
4683553 | Mollier | Jul 1987 | A |
4827113 | Rikuna | May 1989 | A |
4910773 | Hazard et al. | Mar 1990 | A |
5036461 | Elliott et al. | Jul 1991 | A |
5363448 | Koopman, Jr. et al. | Nov 1994 | A |
5377270 | Koopman, Jr. et al. | Dec 1994 | A |
5533126 | Hazard | Jul 1996 | A |
5537314 | Kanter | Jul 1996 | A |
5592553 | Guski et al. | Jan 1997 | A |
5616901 | Crandall | Apr 1997 | A |
5666415 | Kaufman | Sep 1997 | A |
5764789 | Pare, Jr. et al. | Jun 1998 | A |
5768373 | Lohstroh et al. | Jun 1998 | A |
5778072 | Samar | Jul 1998 | A |
5796827 | Coppersmith et al. | Aug 1998 | A |
5832090 | Raspotnik | Nov 1998 | A |
5883810 | Franklin et al. | Mar 1999 | A |
5901874 | Deters | May 1999 | A |
5929413 | Gardner | Jul 1999 | A |
5960411 | Hartman et al. | Sep 1999 | A |
6021203 | Douceur et al. | Feb 2000 | A |
6049328 | Vanderheiden | Apr 2000 | A |
6058373 | Blinn et al. | May 2000 | A |
6061666 | Do et al. | May 2000 | A |
6105013 | Curry et al. | Aug 2000 | A |
6199114 | White et al. | Mar 2001 | B1 |
6199762 | Hohle | Mar 2001 | B1 |
6216227 | Goldstein et al. | Apr 2001 | B1 |
6227447 | Campisano | May 2001 | B1 |
6282522 | Davis et al. | Aug 2001 | B1 |
6324271 | Sawyer et al. | Nov 2001 | B1 |
6342844 | Rozin | Jan 2002 | B1 |
6367011 | Lee et al. | Apr 2002 | B1 |
6402028 | Graham, Jr. et al. | Jun 2002 | B1 |
6438550 | Doyle et al. | Aug 2002 | B1 |
6501847 | Helot et al. | Dec 2002 | B2 |
6601040 | Kolls | Jul 2003 | B1 |
6631197 | Taenzer | Oct 2003 | B1 |
6641050 | Kelley et al. | Nov 2003 | B2 |
6655585 | Shinn | Dec 2003 | B2 |
6662020 | Aaro et al. | Dec 2003 | B1 |
6721706 | Strubbe et al. | Apr 2004 | B1 |
6731778 | Oda et al. | May 2004 | B1 |
6779115 | Naim | Aug 2004 | B1 |
6792533 | Jablon | Sep 2004 | B2 |
6829711 | Kwok et al. | Dec 2004 | B1 |
6834271 | Hodgson et al. | Dec 2004 | B1 |
6834795 | Rasmussen et al. | Dec 2004 | B1 |
6852031 | Rowe | Feb 2005 | B1 |
6865547 | Brake, Jr. et al. | Mar 2005 | B1 |
6868441 | Greene et al. | Mar 2005 | B2 |
6873260 | Lancos et al. | Mar 2005 | B2 |
6877656 | Jaros et al. | Apr 2005 | B1 |
6889198 | Kawan | May 2005 | B2 |
6905411 | Nguyen et al. | Jun 2005 | B2 |
6910627 | Simpson-Young et al. | Jun 2005 | B1 |
6971031 | Haala | Nov 2005 | B2 |
6990588 | Yasukura | Jan 2006 | B1 |
7006986 | Sines et al. | Feb 2006 | B1 |
7085931 | Smith et al. | Aug 2006 | B1 |
7127605 | Montgomery et al. | Oct 2006 | B1 |
7128274 | Kelley et al. | Oct 2006 | B2 |
7140550 | Ramachandran | Nov 2006 | B2 |
7152045 | Hoffman | Dec 2006 | B2 |
7165727 | de Jong | Jan 2007 | B2 |
7175076 | Block et al. | Feb 2007 | B1 |
7202773 | Oba et al. | Apr 2007 | B1 |
7206806 | Pineau | Apr 2007 | B2 |
7232073 | de Jong | Jun 2007 | B1 |
7246752 | Brown | Jul 2007 | B2 |
7254569 | Goodman et al. | Aug 2007 | B2 |
7263507 | Brake, Jr. et al. | Aug 2007 | B1 |
7270276 | Vayssiere | Sep 2007 | B2 |
7278025 | Saito et al. | Oct 2007 | B2 |
7287692 | Patel et al. | Oct 2007 | B1 |
7290709 | Tsai et al. | Nov 2007 | B2 |
7306143 | Bonneau, Jr. et al. | Dec 2007 | B2 |
7319986 | Praisner et al. | Jan 2008 | B2 |
7325132 | Takayama et al. | Jan 2008 | B2 |
7353396 | Micali et al. | Apr 2008 | B2 |
7357312 | Gangi | Apr 2008 | B2 |
7373515 | Owen et al. | May 2008 | B2 |
7374099 | de Jong | May 2008 | B2 |
7375616 | Rowse et al. | May 2008 | B2 |
7380710 | Brown | Jun 2008 | B2 |
7424977 | Smets et al. | Sep 2008 | B2 |
7453439 | Kushler et al. | Nov 2008 | B1 |
7472829 | Brown | Jan 2009 | B2 |
7487357 | Smith et al. | Feb 2009 | B2 |
7552467 | Lindsay | Jun 2009 | B2 |
7568631 | Gibbs et al. | Aug 2009 | B2 |
7584153 | Brown et al. | Sep 2009 | B2 |
7597250 | Finn | Oct 2009 | B2 |
7628322 | Holtmanns et al. | Dec 2009 | B2 |
7652578 | Braun et al. | Jan 2010 | B2 |
7676438 | Brewer et al. | Mar 2010 | B2 |
7689832 | Talmor et al. | Mar 2010 | B2 |
7703142 | Wilson et al. | Apr 2010 | B1 |
7748609 | Sachdeva et al. | Jul 2010 | B2 |
7748617 | Gray | Jul 2010 | B2 |
7748636 | Finn | Jul 2010 | B2 |
7762457 | Bonalle et al. | Jul 2010 | B2 |
7789302 | Tame | Sep 2010 | B2 |
7793851 | Mullen | Sep 2010 | B2 |
7796013 | Murakami et al. | Sep 2010 | B2 |
7801799 | Brake, Jr. et al. | Sep 2010 | B1 |
7801829 | Gray et al. | Sep 2010 | B2 |
7805755 | Brown et al. | Sep 2010 | B2 |
7809643 | Phillips et al. | Oct 2010 | B2 |
7827115 | Weller et al. | Nov 2010 | B2 |
7828214 | Narendra et al. | Nov 2010 | B2 |
7848746 | Juels | Dec 2010 | B2 |
7882553 | Tuliani | Feb 2011 | B2 |
7900048 | Andersson | Mar 2011 | B2 |
7908216 | Davis et al. | Mar 2011 | B1 |
7922082 | Muscato | Apr 2011 | B2 |
7933589 | Mamdani et al. | Apr 2011 | B1 |
7949559 | Freiberg | May 2011 | B2 |
7954716 | Narendra et al. | Jun 2011 | B2 |
7954723 | Charrat | Jun 2011 | B2 |
7962369 | Rosenberg | Jun 2011 | B2 |
7993197 | Mamdani et al. | Aug 2011 | B2 |
8005426 | Huomo et al. | Aug 2011 | B2 |
8010405 | Bortolin et al. | Aug 2011 | B1 |
RE42762 | Shin | Sep 2011 | E |
8041954 | Plesman | Oct 2011 | B2 |
8056802 | Gressel et al. | Nov 2011 | B2 |
8060012 | Sklovsky et al. | Nov 2011 | B2 |
8074877 | Mullen et al. | Dec 2011 | B2 |
8082450 | Frey et al. | Dec 2011 | B2 |
8095113 | Kean et al. | Jan 2012 | B2 |
8099332 | Lemay et al. | Jan 2012 | B2 |
8103249 | Markison | Jan 2012 | B2 |
8108687 | Ellis et al. | Jan 2012 | B2 |
8127143 | Abdallah et al. | Feb 2012 | B2 |
8135648 | Oram et al. | Mar 2012 | B2 |
8140010 | Symons et al. | Mar 2012 | B2 |
8141136 | Lee et al. | Mar 2012 | B2 |
8150321 | Winter et al. | Apr 2012 | B2 |
8150767 | Wankmueller | Apr 2012 | B2 |
8171524 | Micali et al. | May 2012 | B2 |
8186602 | Itay et al. | May 2012 | B2 |
8196131 | von Behren et al. | Jun 2012 | B1 |
8213902 | Rowley | Jul 2012 | B2 |
8215563 | Levy et al. | Jul 2012 | B2 |
8224753 | Atef et al. | Jul 2012 | B2 |
8232879 | Davis | Jul 2012 | B2 |
8233841 | Griffin et al. | Jul 2012 | B2 |
8245292 | Buer | Aug 2012 | B2 |
8249654 | Zhu | Aug 2012 | B1 |
8266451 | Leydier et al. | Sep 2012 | B2 |
8285329 | Zhu | Oct 2012 | B1 |
8300914 | Ueda | Oct 2012 | B2 |
8302872 | Mullen | Nov 2012 | B2 |
8312519 | Bailey et al. | Nov 2012 | B1 |
8316237 | Felsher et al. | Nov 2012 | B1 |
8332272 | Fisher | Dec 2012 | B2 |
8365988 | Medina, III et al. | Feb 2013 | B1 |
8369960 | Tran et al. | Feb 2013 | B2 |
8371501 | Hopkins | Feb 2013 | B1 |
8381307 | Cimino | Feb 2013 | B2 |
8391719 | Alameh et al. | Mar 2013 | B2 |
8417231 | Sanding et al. | Apr 2013 | B2 |
8439271 | Smets et al. | May 2013 | B2 |
8464936 | Zeigler | Jun 2013 | B2 |
8475367 | Yuen et al. | Jul 2013 | B1 |
8489112 | Roeding et al. | Jul 2013 | B2 |
8511542 | Pan | Aug 2013 | B2 |
8559872 | Butler | Oct 2013 | B2 |
8566916 | Vernon et al. | Oct 2013 | B1 |
8567670 | Stanfield et al. | Oct 2013 | B2 |
8572386 | Takekawa et al. | Oct 2013 | B2 |
8577810 | Dalit et al. | Nov 2013 | B1 |
8583454 | Beraja et al. | Nov 2013 | B2 |
8589335 | Smith et al. | Nov 2013 | B2 |
8594730 | Bona et al. | Nov 2013 | B2 |
8615468 | Varadarajan | Dec 2013 | B2 |
8620218 | Awad | Dec 2013 | B2 |
8667285 | Coulier et al. | Mar 2014 | B2 |
8723941 | Shirbabadi et al. | May 2014 | B1 |
8726405 | Bailey et al. | May 2014 | B1 |
8740073 | Vijayshankar et al. | Jun 2014 | B2 |
8750514 | Gallo et al. | Jun 2014 | B2 |
8752189 | De Jong | Jun 2014 | B2 |
8794509 | Bishop et al. | Aug 2014 | B2 |
8799668 | Cheng | Aug 2014 | B2 |
8806592 | Ganesan | Aug 2014 | B2 |
8807440 | Von Behren et al. | Aug 2014 | B1 |
8811892 | Khan et al. | Aug 2014 | B2 |
8814039 | Bishop et al. | Aug 2014 | B2 |
8814052 | Bona et al. | Aug 2014 | B2 |
8818867 | Baldwin et al. | Aug 2014 | B2 |
8850538 | Vernon et al. | Sep 2014 | B1 |
8861733 | Benteo et al. | Oct 2014 | B2 |
8880027 | Darringer | Nov 2014 | B1 |
8881252 | Van Till | Nov 2014 | B2 |
8888002 | Chesney et al. | Nov 2014 | B2 |
8898088 | Springer et al. | Nov 2014 | B2 |
8934837 | Zhu et al. | Jan 2015 | B2 |
8959034 | Jiang et al. | Feb 2015 | B2 |
8977569 | Rao | Mar 2015 | B2 |
8994498 | Agrafioti et al. | Mar 2015 | B2 |
9004365 | Bona et al. | Apr 2015 | B2 |
9020858 | Jiang et al. | Apr 2015 | B2 |
9038894 | Khalid | May 2015 | B2 |
9042814 | Royston et al. | May 2015 | B2 |
9047531 | Showering et al. | Jun 2015 | B2 |
9069976 | Toole et al. | Jun 2015 | B2 |
9081948 | Magne | Jul 2015 | B2 |
9104853 | Venkataramani et al. | Aug 2015 | B2 |
9118663 | Bailey et al. | Aug 2015 | B1 |
9122964 | Krawczewicz | Sep 2015 | B2 |
9129280 | Bona et al. | Sep 2015 | B2 |
9152832 | Royston et al. | Oct 2015 | B2 |
9203800 | Izu et al. | Dec 2015 | B2 |
9209867 | Royston | Dec 2015 | B2 |
9230375 | Micali et al. | Jan 2016 | B2 |
9251330 | Boivie et al. | Feb 2016 | B2 |
9251518 | Levin et al. | Feb 2016 | B2 |
9258715 | Borghei | Feb 2016 | B2 |
9270337 | Zhu et al. | Feb 2016 | B2 |
9306626 | Hall et al. | Apr 2016 | B2 |
9306942 | Bailey et al. | Apr 2016 | B1 |
9324066 | Archer et al. | Apr 2016 | B2 |
9324067 | Van Os et al. | Apr 2016 | B2 |
9332587 | Salahshoor | May 2016 | B2 |
9338622 | Bjontegard | May 2016 | B2 |
9373141 | Shakkarwar | Jun 2016 | B1 |
9379841 | Fine et al. | Jun 2016 | B2 |
9413430 | Royston et al. | Aug 2016 | B2 |
9413768 | Gregg et al. | Aug 2016 | B1 |
9420496 | Indurkar | Aug 2016 | B1 |
9426132 | Alikhani | Aug 2016 | B1 |
9432339 | Bowness | Aug 2016 | B1 |
9455968 | Machani et al. | Sep 2016 | B1 |
9473509 | Arsanjani et al. | Oct 2016 | B2 |
9491626 | Sharma et al. | Nov 2016 | B2 |
9516487 | Powell et al. | Dec 2016 | B2 |
9553637 | Yang et al. | Jan 2017 | B2 |
9576159 | Templeton et al. | Feb 2017 | B1 |
9619952 | Zhao et al. | Apr 2017 | B1 |
9635000 | Muftic | Apr 2017 | B1 |
9665858 | Kumar | May 2017 | B1 |
9674705 | Rose et al. | Jun 2017 | B2 |
9679286 | Colnot et al. | Jun 2017 | B2 |
9680942 | Dimmick | Jun 2017 | B2 |
9710804 | Zhou et al. | Jul 2017 | B2 |
9740342 | Paulsen et al. | Aug 2017 | B2 |
9740988 | Levin et al. | Aug 2017 | B1 |
9763097 | Robinson et al. | Sep 2017 | B2 |
9767329 | Forster | Sep 2017 | B2 |
9769662 | Queru | Sep 2017 | B1 |
9773151 | Mil'shtein et al. | Sep 2017 | B2 |
9780953 | Gaddam et al. | Oct 2017 | B2 |
9891823 | Feng et al. | Feb 2018 | B2 |
9916581 | Dorsey et al. | Mar 2018 | B2 |
9940571 | Herrington | Apr 2018 | B1 |
9953323 | Candelore et al. | Apr 2018 | B2 |
9961194 | Wiechman et al. | May 2018 | B1 |
9965756 | Davis et al. | May 2018 | B2 |
9965911 | Wishne | May 2018 | B2 |
9978058 | Wurmfeld et al. | May 2018 | B2 |
10043164 | Dogin et al. | Aug 2018 | B2 |
10074068 | Irwin | Sep 2018 | B2 |
10075437 | Costigan et al. | Sep 2018 | B1 |
10109124 | Gilbertson | Oct 2018 | B2 |
10129648 | Hernandez et al. | Nov 2018 | B1 |
10133979 | Eidam et al. | Nov 2018 | B1 |
10169626 | Britt et al. | Jan 2019 | B2 |
10192214 | Jiang et al. | Jan 2019 | B2 |
10217105 | Sangi et al. | Feb 2019 | B1 |
10362114 | Britt | Jul 2019 | B2 |
10447784 | Britt | Oct 2019 | B2 |
10524119 | Altin et al. | Dec 2019 | B2 |
10587400 | Zimmerman et al. | Mar 2020 | B2 |
10658514 | Campi, Jr. | May 2020 | B2 |
10783486 | Irwin | Sep 2020 | B2 |
10991240 | Davis | Apr 2021 | B2 |
11151816 | Schoenfelder | Oct 2021 | B2 |
11216827 | Budano | Jan 2022 | B2 |
11341502 | Hill | May 2022 | B1 |
11568695 | Kocher | Jan 2023 | B1 |
11575671 | Manepalli | Feb 2023 | B2 |
11620866 | Goetz | Apr 2023 | B1 |
11736468 | Lowe | Aug 2023 | B2 |
20010010723 | Pinkas | Aug 2001 | A1 |
20010029485 | Brody et al. | Oct 2001 | A1 |
20010034702 | Mockett et al. | Oct 2001 | A1 |
20010034719 | Durand et al. | Oct 2001 | A1 |
20010054003 | Chien et al. | Dec 2001 | A1 |
20020078345 | Sandhu et al. | Jun 2002 | A1 |
20020080030 | Inomata | Jun 2002 | A1 |
20020093530 | Krothapalli et al. | Jul 2002 | A1 |
20020100808 | Norwood et al. | Aug 2002 | A1 |
20020120583 | Keresman, III et al. | Aug 2002 | A1 |
20020152116 | Yan et al. | Oct 2002 | A1 |
20020153424 | Li | Oct 2002 | A1 |
20020165827 | Gien et al. | Nov 2002 | A1 |
20030023554 | Yap et al. | Jan 2003 | A1 |
20030034873 | Chase et al. | Feb 2003 | A1 |
20030055727 | Walker et al. | Mar 2003 | A1 |
20030078882 | Sukeda et al. | Apr 2003 | A1 |
20030135469 | Chung | Jul 2003 | A1 |
20030167350 | Davis et al. | Sep 2003 | A1 |
20030204732 | Audebert et al. | Oct 2003 | A1 |
20030208449 | Diao | Nov 2003 | A1 |
20040015958 | Veil et al. | Jan 2004 | A1 |
20040039919 | Takayama et al. | Feb 2004 | A1 |
20040039920 | Kim | Feb 2004 | A1 |
20040093496 | Colnot | May 2004 | A1 |
20040127256 | Goldthwaite et al. | Jul 2004 | A1 |
20040133304 | Fobbe | Jul 2004 | A1 |
20040215674 | Odinak et al. | Oct 2004 | A1 |
20040230799 | Davis | Nov 2004 | A1 |
20040263315 | Kim | Dec 2004 | A1 |
20050035200 | Hendrick | Feb 2005 | A1 |
20050044367 | Gasparini et al. | Feb 2005 | A1 |
20050060586 | Burger et al. | Mar 2005 | A1 |
20050068178 | Lee et al. | Mar 2005 | A1 |
20050075985 | Cartmell | Apr 2005 | A1 |
20050081038 | Arditti Modiano et al. | Apr 2005 | A1 |
20050138387 | Lam et al. | Jun 2005 | A1 |
20050156026 | Ghosh et al. | Jul 2005 | A1 |
20050160049 | Lundholm | Jul 2005 | A1 |
20050195975 | Kawakita | Sep 2005 | A1 |
20050247797 | Ramachandran | Nov 2005 | A1 |
20050268107 | Harris | Dec 2005 | A1 |
20060006230 | Bear et al. | Jan 2006 | A1 |
20060040726 | Szrek et al. | Feb 2006 | A1 |
20060041402 | Baker | Feb 2006 | A1 |
20060044153 | Dawidowsky | Mar 2006 | A1 |
20060047954 | Sachdeva et al. | Mar 2006 | A1 |
20060085848 | Aissi et al. | Apr 2006 | A1 |
20060136334 | Atkinson et al. | Jun 2006 | A1 |
20060173985 | Moore | Aug 2006 | A1 |
20060174331 | Schuetz | Aug 2006 | A1 |
20060242698 | Inskeep et al. | Oct 2006 | A1 |
20060280338 | Rabb | Dec 2006 | A1 |
20070033642 | Ganesan et al. | Feb 2007 | A1 |
20070055630 | Gauthier et al. | Mar 2007 | A1 |
20070061266 | Moore et al. | Mar 2007 | A1 |
20070061487 | Moore et al. | Mar 2007 | A1 |
20070116292 | Kurita et al. | May 2007 | A1 |
20070118745 | Buer | May 2007 | A1 |
20070197261 | Humbel | Aug 2007 | A1 |
20070215698 | Perry | Sep 2007 | A1 |
20070224969 | Rao | Sep 2007 | A1 |
20070241182 | Buer | Oct 2007 | A1 |
20070256134 | Lehtonen et al. | Nov 2007 | A1 |
20070258594 | Sandhu et al. | Nov 2007 | A1 |
20070278291 | Rans et al. | Dec 2007 | A1 |
20080008315 | Fontana et al. | Jan 2008 | A1 |
20080011831 | Bonalle et al. | Jan 2008 | A1 |
20080014867 | Finn | Jan 2008 | A1 |
20080035738 | Mullen | Feb 2008 | A1 |
20080059379 | Ramaci et al. | Mar 2008 | A1 |
20080071681 | Khalid | Mar 2008 | A1 |
20080072303 | Syed | Mar 2008 | A1 |
20080086767 | Kulkarni et al. | Apr 2008 | A1 |
20080103968 | Bies et al. | May 2008 | A1 |
20080109309 | Landau et al. | May 2008 | A1 |
20080110983 | Ashfield | May 2008 | A1 |
20080120711 | Dispensa | May 2008 | A1 |
20080156873 | Wilhelm et al. | Jul 2008 | A1 |
20080162312 | Sklovsky et al. | Jul 2008 | A1 |
20080164308 | Aaron et al. | Jul 2008 | A1 |
20080207307 | Cunningham, II et al. | Aug 2008 | A1 |
20080209543 | Aaron | Aug 2008 | A1 |
20080223918 | Williams et al. | Sep 2008 | A1 |
20080285746 | Landrock et al. | Nov 2008 | A1 |
20080308641 | Finn | Dec 2008 | A1 |
20090037275 | Pollio | Feb 2009 | A1 |
20090048026 | French | Feb 2009 | A1 |
20090132417 | Scipioni et al. | May 2009 | A1 |
20090143104 | Loh et al. | Jun 2009 | A1 |
20090171682 | Dixon et al. | Jul 2009 | A1 |
20090210308 | Toomer et al. | Aug 2009 | A1 |
20090212909 | Burger et al. | Aug 2009 | A1 |
20090235339 | Mennes et al. | Sep 2009 | A1 |
20090249077 | Gargaro et al. | Oct 2009 | A1 |
20090282264 | Amiel et al. | Nov 2009 | A1 |
20100023449 | Skowronek et al. | Jan 2010 | A1 |
20100023455 | Dispensa et al. | Jan 2010 | A1 |
20100029202 | Jolivet et al. | Feb 2010 | A1 |
20100033310 | Narendra et al. | Feb 2010 | A1 |
20100036769 | Winters et al. | Feb 2010 | A1 |
20100057620 | Li et al. | Mar 2010 | A1 |
20100078471 | Lin et al. | Apr 2010 | A1 |
20100082491 | Rosenblatt et al. | Apr 2010 | A1 |
20100094754 | Bertran et al. | Apr 2010 | A1 |
20100095130 | Bertran et al. | Apr 2010 | A1 |
20100100480 | Altman et al. | Apr 2010 | A1 |
20100114731 | Kingston et al. | May 2010 | A1 |
20100192230 | Steeves et al. | Jul 2010 | A1 |
20100207742 | Buhot et al. | Aug 2010 | A1 |
20100211797 | Westerveld et al. | Aug 2010 | A1 |
20100240413 | He et al. | Sep 2010 | A1 |
20100257357 | McClain | Oct 2010 | A1 |
20100312634 | Cervenka | Dec 2010 | A1 |
20100312635 | Cervenka | Dec 2010 | A1 |
20110028160 | Roeding et al. | Feb 2011 | A1 |
20110035604 | Habraken | Feb 2011 | A1 |
20110042456 | Masaryk et al. | Feb 2011 | A1 |
20110060631 | Grossman et al. | Mar 2011 | A1 |
20110068170 | Lehman | Mar 2011 | A1 |
20110084132 | Tofighbakhsh | Apr 2011 | A1 |
20110101093 | Ehrensvard | May 2011 | A1 |
20110113245 | Varadrajan | May 2011 | A1 |
20110125638 | Davis et al. | May 2011 | A1 |
20110131415 | Schneider | Jun 2011 | A1 |
20110153437 | Archer et al. | Jun 2011 | A1 |
20110153496 | Royyuru | Jun 2011 | A1 |
20110208658 | Makhotin | Aug 2011 | A1 |
20110208965 | Machani | Aug 2011 | A1 |
20110211219 | Bradley | Sep 2011 | A1 |
20110218911 | Spodak | Sep 2011 | A1 |
20110238564 | Lim et al. | Sep 2011 | A1 |
20110246780 | Yeap et al. | Oct 2011 | A1 |
20110258452 | Coulier et al. | Oct 2011 | A1 |
20110280406 | Ma et al. | Nov 2011 | A1 |
20110282785 | Chin | Nov 2011 | A1 |
20110294418 | Chen | Dec 2011 | A1 |
20110312271 | Ma et al. | Dec 2011 | A1 |
20120011070 | Ward et al. | Jan 2012 | A1 |
20120024947 | Naelon | Feb 2012 | A1 |
20120030047 | Fuentes et al. | Feb 2012 | A1 |
20120030121 | Grellier | Feb 2012 | A1 |
20120047071 | Mullen et al. | Feb 2012 | A1 |
20120079281 | Lowenstein et al. | Mar 2012 | A1 |
20120109735 | Krawczewicz et al. | May 2012 | A1 |
20120109764 | Martin et al. | May 2012 | A1 |
20120143754 | Patel | Jun 2012 | A1 |
20120150737 | Rottink | Jun 2012 | A1 |
20120178366 | Levy et al. | Jul 2012 | A1 |
20120196583 | Kindo | Aug 2012 | A1 |
20120207305 | Gallo et al. | Aug 2012 | A1 |
20120209773 | Ranganathan | Aug 2012 | A1 |
20120238206 | Singh et al. | Sep 2012 | A1 |
20120239560 | Pourfallah et al. | Sep 2012 | A1 |
20120252350 | Steinmetz et al. | Oct 2012 | A1 |
20120254394 | Barras | Oct 2012 | A1 |
20120284194 | Liu et al. | Nov 2012 | A1 |
20120290472 | Mullen et al. | Nov 2012 | A1 |
20120296818 | Nuzzi et al. | Nov 2012 | A1 |
20120316992 | Oborne | Dec 2012 | A1 |
20120317035 | Royyuru et al. | Dec 2012 | A1 |
20120317628 | Yeager | Dec 2012 | A1 |
20120330787 | Hanson et al. | Dec 2012 | A1 |
20120330788 | Hanson et al. | Dec 2012 | A1 |
20130005245 | Royston | Jan 2013 | A1 |
20130008956 | Ashfield | Jan 2013 | A1 |
20130026229 | Jarman et al. | Jan 2013 | A1 |
20130048713 | Pan | Feb 2013 | A1 |
20130054474 | Yeager | Feb 2013 | A1 |
20130065564 | Conner et al. | Mar 2013 | A1 |
20130080228 | Fisher | Mar 2013 | A1 |
20130080229 | Fisher | Mar 2013 | A1 |
20130099587 | Lou | Apr 2013 | A1 |
20130104251 | Moore et al. | Apr 2013 | A1 |
20130106576 | Hinman et al. | May 2013 | A1 |
20130119130 | Braams | May 2013 | A1 |
20130130614 | Busch-Sorensen | May 2013 | A1 |
20130144793 | Royston | Jun 2013 | A1 |
20130171929 | Adams et al. | Jul 2013 | A1 |
20130173405 | Gouessant | Jul 2013 | A1 |
20130179351 | Wallner | Jul 2013 | A1 |
20130185772 | Jaudon et al. | Jul 2013 | A1 |
20130191279 | Calman et al. | Jul 2013 | A1 |
20130200999 | Spodak et al. | Aug 2013 | A1 |
20130216108 | Hwang et al. | Aug 2013 | A1 |
20130226791 | Springer et al. | Aug 2013 | A1 |
20130226796 | Jiang et al. | Aug 2013 | A1 |
20130232082 | Krawczewicz et al. | Sep 2013 | A1 |
20130238894 | Ferg et al. | Sep 2013 | A1 |
20130264386 | Greenspan | Oct 2013 | A1 |
20130282360 | Shimota et al. | Oct 2013 | A1 |
20130303085 | Boucher et al. | Nov 2013 | A1 |
20130304651 | Smith | Nov 2013 | A1 |
20130312082 | Izu et al. | Nov 2013 | A1 |
20130314593 | Reznik et al. | Nov 2013 | A1 |
20130317986 | Tucker | Nov 2013 | A1 |
20130344857 | Berionne et al. | Dec 2013 | A1 |
20140002238 | Taveau et al. | Jan 2014 | A1 |
20140019352 | Shrivastava | Jan 2014 | A1 |
20140027506 | Heo et al. | Jan 2014 | A1 |
20140032409 | Rosano | Jan 2014 | A1 |
20140032410 | Georgiev et al. | Jan 2014 | A1 |
20140035721 | Heppe | Feb 2014 | A1 |
20140040120 | Cho et al. | Feb 2014 | A1 |
20140040139 | Brudnicki et al. | Feb 2014 | A1 |
20140040147 | Varadarakan et al. | Feb 2014 | A1 |
20140047235 | Lessiak et al. | Feb 2014 | A1 |
20140067690 | Pitroda et al. | Mar 2014 | A1 |
20140074637 | Hammad | Mar 2014 | A1 |
20140074655 | Lim et al. | Mar 2014 | A1 |
20140081720 | Wu | Mar 2014 | A1 |
20140138435 | Khalid | May 2014 | A1 |
20140171034 | Aleksin et al. | Jun 2014 | A1 |
20140171039 | Bjontegard | Jun 2014 | A1 |
20140172700 | Teuwen et al. | Jun 2014 | A1 |
20140180851 | Fisher | Jun 2014 | A1 |
20140208112 | McDonald et al. | Jul 2014 | A1 |
20140214674 | Narula | Jul 2014 | A1 |
20140229375 | Zaytzsev et al. | Aug 2014 | A1 |
20140245391 | Adenuga | Aug 2014 | A1 |
20140256251 | Caceres et al. | Sep 2014 | A1 |
20140258099 | Rosano | Sep 2014 | A1 |
20140258113 | Gauthier et al. | Sep 2014 | A1 |
20140258125 | Gerber et al. | Sep 2014 | A1 |
20140274179 | Zhu et al. | Sep 2014 | A1 |
20140279479 | Maniar et al. | Sep 2014 | A1 |
20140282993 | Van Till | Sep 2014 | A1 |
20140337235 | Van Heerden et al. | Nov 2014 | A1 |
20140339315 | Ko | Nov 2014 | A1 |
20140346860 | Aubry et al. | Nov 2014 | A1 |
20140365780 | Movassaghi | Dec 2014 | A1 |
20140379361 | Mahadkar et al. | Dec 2014 | A1 |
20150012444 | Brown et al. | Jan 2015 | A1 |
20150019442 | Hird et al. | Jan 2015 | A1 |
20150032635 | Guise | Jan 2015 | A1 |
20150067793 | Robison, Jr. | Mar 2015 | A1 |
20150071486 | Rhoads et al. | Mar 2015 | A1 |
20150088757 | Zhou et al. | Mar 2015 | A1 |
20150089586 | Ballesteros | Mar 2015 | A1 |
20150134452 | Williams | May 2015 | A1 |
20150140960 | Powell et al. | May 2015 | A1 |
20150154595 | Collinge et al. | Jun 2015 | A1 |
20150170138 | Rao | Jun 2015 | A1 |
20150178724 | Ngo et al. | Jun 2015 | A1 |
20150186871 | Laracey | Jul 2015 | A1 |
20150205379 | Mag et al. | Jul 2015 | A1 |
20150287031 | Radu et al. | Oct 2015 | A1 |
20150302409 | Malek | Oct 2015 | A1 |
20150317626 | Ran et al. | Nov 2015 | A1 |
20150332266 | Friedlander et al. | Nov 2015 | A1 |
20150339474 | Paz et al. | Nov 2015 | A1 |
20150356801 | Nitu et al. | Dec 2015 | A1 |
20150371234 | Huang et al. | Dec 2015 | A1 |
20160012465 | Sharp | Jan 2016 | A1 |
20160026997 | Tsui et al. | Jan 2016 | A1 |
20160048913 | Rausaria et al. | Feb 2016 | A1 |
20160055480 | Shah | Feb 2016 | A1 |
20160057619 | Lopez | Feb 2016 | A1 |
20160065370 | Le Saint et al. | Mar 2016 | A1 |
20160066732 | Sarvestani | Mar 2016 | A1 |
20160087957 | Shah et al. | Mar 2016 | A1 |
20160092696 | Guglani et al. | Mar 2016 | A1 |
20160148193 | Kelley et al. | May 2016 | A1 |
20160232523 | Venot et al. | Aug 2016 | A1 |
20160239672 | Khan et al. | Aug 2016 | A1 |
20160253651 | Park et al. | Sep 2016 | A1 |
20160255072 | Liu | Sep 2016 | A1 |
20160267486 | Mitra et al. | Sep 2016 | A1 |
20160277383 | Guyomarc'h et al. | Sep 2016 | A1 |
20160277388 | Lowe et al. | Sep 2016 | A1 |
20160307187 | Guo et al. | Oct 2016 | A1 |
20160307189 | Zarakas et al. | Oct 2016 | A1 |
20160314472 | Ashfield | Oct 2016 | A1 |
20160330027 | Ebrahimi | Nov 2016 | A1 |
20160335531 | Mullen et al. | Nov 2016 | A1 |
20160335822 | Ogishi et al. | Nov 2016 | A1 |
20160379217 | Hammad | Dec 2016 | A1 |
20170004502 | Quentin et al. | Jan 2017 | A1 |
20170011395 | Pillai et al. | Jan 2017 | A1 |
20170011406 | Tunnell et al. | Jan 2017 | A1 |
20170017957 | Radu | Jan 2017 | A1 |
20170017964 | Janefalkar et al. | Jan 2017 | A1 |
20170024716 | Jiam et al. | Jan 2017 | A1 |
20170039566 | Schipperheijn | Feb 2017 | A1 |
20170041759 | Gantert et al. | Feb 2017 | A1 |
20170068950 | Kwon | Mar 2017 | A1 |
20170103388 | Pillai et al. | Apr 2017 | A1 |
20170103647 | Davis | Apr 2017 | A1 |
20170104739 | Lansler et al. | Apr 2017 | A1 |
20170109509 | Baghdasaryan | Apr 2017 | A1 |
20170109730 | Locke et al. | Apr 2017 | A1 |
20170116447 | Cimino et al. | Apr 2017 | A1 |
20170124568 | Moghadam | May 2017 | A1 |
20170140379 | Deck | May 2017 | A1 |
20170154328 | Zarakas et al. | Jun 2017 | A1 |
20170154333 | Gleeson et al. | Jun 2017 | A1 |
20170180134 | King | Jun 2017 | A1 |
20170221047 | Veerasangappa Kadi et al. | Aug 2017 | A1 |
20170230189 | Toll et al. | Aug 2017 | A1 |
20170237301 | Elad et al. | Aug 2017 | A1 |
20170249451 | Andreeva | Aug 2017 | A1 |
20170289127 | Hendrick | Oct 2017 | A1 |
20170295013 | Claes | Oct 2017 | A1 |
20170316696 | Bartel | Nov 2017 | A1 |
20170317834 | Smith et al. | Nov 2017 | A1 |
20170330173 | Woo et al. | Nov 2017 | A1 |
20170374070 | Shah et al. | Dec 2017 | A1 |
20180005238 | Hammad et al. | Jan 2018 | A1 |
20180034507 | Wobak et al. | Feb 2018 | A1 |
20180039986 | Essebag et al. | Feb 2018 | A1 |
20180068316 | Essebag et al. | Mar 2018 | A1 |
20180129945 | Saxena et al. | May 2018 | A1 |
20180160255 | Park | Jun 2018 | A1 |
20180191501 | Lindemann | Jul 2018 | A1 |
20180205712 | Versteeg et al. | Jul 2018 | A1 |
20180240106 | Garrett et al. | Aug 2018 | A1 |
20180254909 | Hancock | Sep 2018 | A1 |
20180262891 | Wu | Sep 2018 | A1 |
20180268132 | Buer et al. | Sep 2018 | A1 |
20180270214 | Caterino et al. | Sep 2018 | A1 |
20180294959 | Traynor et al. | Oct 2018 | A1 |
20180300716 | Carlson | Oct 2018 | A1 |
20180302396 | Camenisch et al. | Oct 2018 | A1 |
20180315050 | Hammad | Nov 2018 | A1 |
20180316666 | Koved et al. | Nov 2018 | A1 |
20180322486 | Deliwala et al. | Nov 2018 | A1 |
20180359100 | Gaddam et al. | Dec 2018 | A1 |
20180375659 | Kozma | Dec 2018 | A1 |
20190014107 | George | Jan 2019 | A1 |
20190019375 | Foley | Jan 2019 | A1 |
20190036678 | Ahmed | Jan 2019 | A1 |
20190147554 | Chintala | May 2019 | A1 |
20190238517 | D'Agostino et al. | Aug 2019 | A1 |
20200104826 | Rule | Apr 2020 | A1 |
20200104891 | Rule | Apr 2020 | A1 |
20200286085 | Mestre et al. | Sep 2020 | A1 |
20200322800 | Ozanian | Oct 2020 | A1 |
20210035063 | Cartwright | Feb 2021 | A1 |
20210084021 | Gibson | Mar 2021 | A1 |
20210134421 | Mousseau | May 2021 | A1 |
20210176062 | Chitalia et al. | Jun 2021 | A1 |
20210266737 | Burke | Aug 2021 | A1 |
20210297412 | Thayyilsubramanian | Sep 2021 | A1 |
20210304862 | Moreno | Sep 2021 | A1 |
20210385248 | Ilincic | Dec 2021 | A1 |
20220217306 | Ratnakaram | Jul 2022 | A1 |
20230115246 | Budman | Apr 2023 | A1 |
Number | Date | Country |
---|---|---|
3010336 | Jul 2017 | CA |
101192295 | Jun 2008 | CN |
103023643 | Apr 2013 | CN |
103417202 | Dec 2013 | CN |
1 085 424 | Mar 2001 | EP |
1 223 565 | Jul 2002 | EP |
1 265 186 | Dec 2002 | EP |
1 783 919 | May 2007 | EP |
2 852 070 | Jan 2009 | EP |
2 139 196 | Dec 2009 | EP |
1 469 419 | Feb 2012 | EP |
3 070 632 | Sep 2016 | EP |
2 457 221 | Aug 2009 | GB |
2 516 861 | Feb 2015 | GB |
2 543 612 | Apr 2017 | GB |
2 551 907 | Jan 2018 | GB |
101508320 | Apr 2015 | KR |
WO 0049586 | Aug 2000 | WO |
WO 2006070189 | Jul 2006 | WO |
WO 2008055170 | May 2008 | WO |
WO 2009025605 | Feb 2009 | WO |
WO 2010049252 | May 2010 | WO |
WO 2011112158 | Sep 2011 | WO |
WO 2012001624 | Jan 2012 | WO |
WO 2013039395 | Mar 2013 | WO |
WO 2013155562 | Oct 2013 | WO |
WO 2013192358 | Dec 2013 | WO |
WO 2014043278 | Mar 2014 | WO |
WO 2014170741 | Oct 2014 | WO |
WO 2015179649 | Nov 2015 | WO |
WO 2015183818 | Dec 2015 | WO |
WO 2016097718 | Jun 2016 | WO |
WO 2016160816 | Oct 2016 | WO |
WO 2016168394 | Oct 2016 | WO |
WO 2017042375 | Mar 2017 | WO |
WO 2017042400 | Mar 2017 | WO |
WO 2017157859 | Sep 2017 | WO |
WO 2017208063 | Dec 2017 | WO |
WO 2018037392 | Mar 2018 | WO |
WO 2018063809 | Apr 2018 | WO |
WO 2018096559 | May 2018 | WO |
WO 2018137888 | Aug 2018 | WO |
Entry |
---|
Dutta et al.; “Microcontroller Based Bank Locker Security System Using Iris Scanner and Vein Scanner”, 2018, Proceedings of the International Conference on Inventive Research in Computing Applications, IEEE Xplore, pp. 53-57. (Year: 2018). |
International Search Report and the Written Opinion of the International Searching Authority issued in related PCT Application No. PCT/US2023/012335 mailed May 19, 2023, 14 pages. |
Batina, Lejla and Poll, Erik, “SmartCards and RFID,” PowerPoint Presentation for IPA Security Course, Digital Security at University of Nijmegen, Netherlands (date unknown), 75 pages. |
Haykin M. and Warnar, R., “Smart Card Technology: New Methods for Computer Access Control,” Computer Science and Technology NIST Special Publication 500-157:1-60 (1988). |
Lehpamer, Harvey, “Component of the RFID System,” RFID Design Principles, 2nd edition pp. 133-201 (2012). |
Pourghomi, Pardis et al., “A Proposed NFC Payment Application,” International Journal of Advanced Computer Science and Applications, vol. 4, No. 8 (2013). |
Author Unknown, “CardrefresherSM from American Express®,” [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://merchant-channel.americanexpress.com/merchant/en_US/cardrefresher, 2 pages. |
Author Unknown, “Add Account Updater to your recurring payment tool,” [online] 2018-19 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.authorize.net/our-features/account-updater/, 5 pages. |
Author Unknown, “Visa® Account Updater for Merchants,” [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://usa.visa.com/dam/VCOM/download/merchants/visa-account-updater-product-information-fact-sheet-for-merchants.pdf, 2 pages. |
Author Unknown, “Manage the cards that you use with Apple Pay,” Apple Support [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://support.apple.com/en-US/HT205583, 5 pages. |
Author Unknown, “Contactless Specifications for Payment Systems,” EMV Book B—Entry Point Specification [online] 2016 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.emvco.com/wp-content/uploads/2017/05/BookB_Entry_Point_Specification_v2_6_20160809023257319.pdf, 52 pages. |
Author Unknown, “EMV Integrated Circuit Card Specifications for Payment Systems, Book 2, Security and Key Management,” Version 3.4, [online] 2011 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.emvco.com/wp-content/uploads/2017/05/EMV_v4.3_Book_2_Security_and_Key_Management_20120607061923900.pdf, 174 pages. |
Author unknown, “NFC Guide: All You Need to Know About Near Field Communication” Square Guide [online] 2018[retrieved on Nov. 13, 2018]. Retrieved from Internet URL: https://squareup.com/guides/nfc, 8 pages. |
Profis, S., “Everything you need to know about NFC and mobile payments” CNET Directory [online], 2014 [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://www.cnet.com/how-to/how-nfc-works-and-mobile-payments/, 6 pages. |
Cozma, N., “Copy data from other devices in Android 5.0 Lollipop setup” CNET Directory [online] 2014 [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://www.cnet.com/how-to/copy-data-from-other-devices-in-android-5-0-lollipop-setup/, 5 pages. |
Kevin, Android Enthusiast, “How to copy text string from nfc tag” StackExchange [online] 2013 [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://android.stackexchange.com/questions/55689/how-to-copy-text-string-from-nfc-tag, 11 pages. |
Author unknown, “Tap & Go Device Setup” Samsung [online] date unknown [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://www.samsung.com/us/switch-me/switch-to-the-galaxy-s-5/app/partial/setup-device/tap-go.html, 1 page. |
Author Unknown, “Multiple encryption”, Wikipedia [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://en.wikipedia.org/wiki/Multiple_encryption, 4 pages. |
Krawczyk, et al., “HMAC: Keyed-Hashing for Message Authentication”, Network Working Group RFC:2104 memo [online] 1997 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://tools.ietf.org/html/rfc2104, 12 pages. |
Song, et al., “The AES-CMAC Algorithm”, Network Working Group RFC: 4493 memo [online] 2006 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://tools.ietf.org/html/rfc4493, 21 pages. |
Katz, J., and Lindell, Y., “Aggregate Message Authentication Codes”, Topics in Cryptology [online] 2008 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.cs.umd.edu/˜jkatz/papers/aggregateMAC.pdf, 11 pages. |
Adams, D., and Maier, A-K, “Goldbug Big Seven open source crypto-messengers to be compared—: or Comprehensive Confidentiality Review & Audit of GoldBug Encrypting E-Mail-Client & Secure Instant Messenger”, Big Seven Study 2016 [online] [retrieved on Mar. 25, 2018]. Retrieved from Internet URL: https://sf.net/projects/goldbug/files/bigseven-crypto-audit.pdf, 309 pages. |
Author Unknown, “Triple DES”, Wikipedia [online] 2018 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://simple.wikipedia.org/wiki/Triple_DES, 2 pages. |
Song, F., and Yun, A.1, “Quantum Security of NMAC and Related Constructions—PRF domain extension against quantum attacks”, IACR Cryptology ePrint Archive [online] 2017 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://eprint.iacr.org/2017/509.pdf, 41 pages. |
Saxena, N., “Lecture 10: NMAC, HMAC and Number Theory”, CS 6903 Modern Cryptography [online] 2008 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: http://isis.poly.edu/courses/cs6903/Lectures/lecture10.pdf, 8 pages. |
Berg, Guy, “Fundamentals of EMV” Smart Card Alliance [online] date unknown [retrieved on Mar. 27, 2019]. Retrieved from Internet URL: https://www.securetechalliance.org/resources/media/scap13_preconference/02.pdf, 37 pages. |
Pierce, Kevin, “Is the amazon echo NFC compatible,?” Amazon.com Customer Q&A [online] 2016 [retrieved on Mar. 26, 2019]. Retrieved from Internet URL: https://www.amazon.com/ask/questions/Tx1RJXYSPE6XLJD?_encodi . . . , 2 pages. |
Author Unknown, “Multi-Factor Authentication”, idaptive [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.centrify.com/products/application-services/adaptive-multi-factor-authentication/risk-based-mfa/, 10 pages. |
Author Unknown, “Adaptive Authentication”, SecureAuth [online] 2019 [retrieved on Mar. 25, 2019}. Retrieved from Internet URL: https://www.secureauth.com/products/access-management/adaptive-authentication, 7 pages. |
Van den Breekel, J., et al., “EMV in a nutshell”, Technical Report, 2016 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.cs.ru.nl/E.Poll/papers/EMVtechreport.pdf, 37 pages. |
Author Unknown, “Autofill”, Computer Hope [online] 2018 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.computerhope.com/jargon/a/autofill.htm, 2 pages. |
Author Unknown, “Fill out forms automatically”, Google Chrome Help [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://support.google.com/chrome/answer/142893?co=GENIE.Platform%3DDesktop&hl=en, 3 pages. |
Author unknown, “Autofill credit cards, contacts, and passwords in Safari on Mac”, Apple Safari User Guide [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://support.apple.com/guide/safari/use-autofill-ibrw1103/mac, 3 pages. |
Menghin, M.J., “Power Optimization Techniques for Near Field Communication Systems” 2014 Dissertation at Technical University of Graz [online]. Retrieved from Internet URL: https://diglib.tugraz.at/download.php?id=576a7b910d2d6&location=browse, 135 pages. |
Mareli, M., et al., “Experimental evaluation of NFC reliability between an RFID tag and a smartphone” Conference paper (2013) IEEE Africon At Mauritius [online] [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://core.ac.uk/download/pdf/54204839.pdf, 5 pages. |
Davison, A., et al., “MonoSLAM: Real-Time Single Camera Slam”, IEEE Transactions on Pattern Analysis and Machine Intelligence 29(6): 1052-1067 (2007). |
Barba, R., “Sharing your location with your bank sounds creepy, but it's also useful”, Bankrate, LLC [online] 2017 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.bankrate.com/banking/banking-app-location-sharing/, 6 pages. |
Author unknown: “onetappayment™”, [online] Jan. 24, 2019, [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.payubiz.in/onetap, 4 pages. |
Vu et al., (2012). “Distinguishing users with capacitive touch communication” Proceedings of the Annual International Conference on Mobile Computing and Networking, Mobicom. 10.1145/2348543.2348569. |
EMVCo, EMV Card Personalization Specification, version 1.0 (Jun. 2003), 81 pages. |
Ullmann et al., (2012). “On-Card” User Authentication for Contactless Smart Cards based on Gesture Recognition, LNI, 223-234, 12 pages. |
Faraj et al. (2008). “Investigation of Java Smart Card Technology for Multi-Task Applications” J. of Al-Anbar University for Pure Science, vol. 2: No. 1: 2008, 11 pages. |
Dhamdhere (2017) “Key Benefits of a Unified Platform for Loyalty, Referral Marketing, and UGC” Annex Cloud [retrieved on Jul. 3, 2019]. Retrieved from Internet URL: https://www.annexcloude.com/blog/benefits-unified-platform/, 13 pages. |
SmartCard Alliance, Technologies for Payment Fraud Prevention: EMV, Encryption and Tokenization, Pub. No. PC-14002 (Oct. 2014), 34 pages. |
Danushka et al., “Enhancing EMV Tokenisation with Dynamic Transaction Tokens”, International Workshop on Radio Frequency Identification: Security and Privacy Issues, Springer, Cham, 2016. |
Fillmore, Peter, “Mobile and Contactless Payment Security”, v20111118, Witham Laboratories, (2011): 1-39 (Year: 2011). |
Number | Date | Country | |
---|---|---|---|
20230254304 A1 | Aug 2023 | US |