Systems and methods for time variable financial authentication

Information

  • Patent Grant
  • 9240089
  • Patent Number
    9,240,089
  • Date Filed
    Tuesday, June 30, 2009
    15 years ago
  • Date Issued
    Tuesday, January 19, 2016
    8 years ago
Abstract
The systems and methods of the invention provide a technique for authenticating a finance related transaction. The method may include providing a token which contains a token counter, the token counter periodically advancing to generate a changing token value, the token counter being synchronized to a base counter that generates an authenticating value; transforming the token value into a token output sequence using logic; and outputting at least part of the token output sequence to an authenticating authority, the authenticating authority having access to the authenticating value. Further, the method includes the authenticating authority verifying the validity of the transaction based on the token output sequence and the authenticating value, from which the authenticating authority obtains a verification sequence using the logic, the verifying the validity including the authenticating authority comparing the token output sequence to the verification sequence to determine if there is a match between the token output sequence and the verification sequence.
Description
BACKGROUND OF THE INVENTION

The present invention relates to systems and methods to perform authentication of a transaction between a requesting entity, in particular a customer, and an authenticating authority.


Since the ancient invention of money, problems of counterfeiting have existed. These problems have led to ever more sophisticated measures to make the injection of false tokens, representing value, from successfully being used in a transaction. When in much more recent times credit cards were introduced, such measures were incorporated. For example, in earlier times, only a check digit formed by a secret algorithm was used to validate card numbers, the number space being very sparsely occupied so that the chance of finding a valid card number was relatively low. Then thieves learned how to forge this digit. As a result secret cryptography-based codes were added to the cards and checked by the card issuer when charges to an account were made. These measures have been useful in reducing fraud until recently.


However, with the practice of merchants storing card numbers, including some of the codes, insecurely on the Internet, there have been enough thefts of these numbers so that fraud is becoming an increasingly difficult problem. Such fraud often occurs in cases where the cards are not physically present. Fraud is reduced somewhat where the card is physically present. That is, credit cards contain fraud avoidance devices like holograms which make counterfeiting of physical cards more difficult than counterfeiting numbers off the cards.


Further, rules designed to prohibit storing the secret codes have been ignored, even by large issuers and as a result a new way to prevent fraudulent card use for remote customers is becoming necessary. Smart cards using public key encryption have been introduced, but these have met with little acceptance, due to their need for gadgetry to read them, which is not widely available.


Known techniques in the area of time based codes reach back to ancient times, when the password of the day was common in military camps. The notion of using widely synchronized times to control functions dates at least to the philosophy of Gottfried Liebniz (coinventor of the calculus and a contemporary of Isaac Newton). During World War II, codebooks valid for a particular day were used by both sides. The use of time stamps in computer communication is almost as old as computing. An example of their use in authentication can be found in the Kerberos system (MIT, 1987). Financial transactions have been timestamped to avoid replay problems also.


However, known techniques fail to provide an approach to effectively use the advance of time as an effective authentication mechanism. The present invention addresses the above, as well as other problems, that are present in known techniques.


BRIEF SUMMARY OF THE INVENTION

The systems and methods of the invention provide a technique for authenticating a finance related transaction. The method may include providing a token which contains a token counter, the token counter periodically advancing to generate a changing token value, the token counter being synchronized to a base counter that generates an authenticating value; transforming the token value into a token output sequence using logic; and outputting at least part of the token output sequence to an authenticating authority, the authenticating authority having access to the authenticating value. Further, the method includes the authenticating authority verifying the validity of the transaction based on the token output sequence and the authenticating value, from which the authenticating authority obtains a verification sequence using the logic, the verifying the validity including the authenticating authority comparing the token output sequence to the verification sequence to determine if there is a match between the token output sequence and the verification sequence.





BRIEF DESCRIPTION OF THE DRAWINGS

The present invention can be more fully understood by reading the following detailed description together with the accompanying drawings, in which like reference indicators are used to designate like elements, and in which:



FIG. 1 is a diagram showing a token in accordance with one embodiment of the invention;



FIG. 2 is a block diagram showing a processing system in accordance with one embodiment of the invention;



FIG. 3 is a block diagram showing an authenticating authority in accordance with one embodiment of the invention;



FIG. 4 is a flowchart showing a “customer initiates transaction” process in accordance with one embodiment of the invention;



FIG. 5 is a flowchart showing the “perform authentication process” in accordance with one embodiment of the invention;



FIG. 6 is a flowchart showing the “perform verification process on the transaction” step of FIG. 5 in accordance with one embodiment of the invention;



FIG. 7 is a flowchart showing the “calculate ‘verification sequence’ based on device number and time of transaction” process of FIG. 6 in accordance with one embodiment of the invention;



FIG. 8 is a flowchart showing the “perform alternative processing to further process authorization” step of FIG. 6 in accordance with one embodiment of the invention;



FIG. 9 is a diagram showing a token in a flashlight in accordance with one embodiment of the invention; and



FIG. 10 is a block diagram showing a token using a twenty-four hour clock in accordance with one embodiment of the invention.





DETAILED DESCRIPTION OF THE INVENTION

Hereinafter, features in accordance with various embodiments of the invention will be described. As used herein, any term in the singular may be interpreted to be in the plural, and alternatively, any term in the plural may be interpreted to be in the singular.


The present invention supplies a display on a consumer device, in accordance with one embodiment of the invention. The display displays an authentication code that varies with time. The “time” is synchronized to a known base time. An authenticating authority, such as the issuer for credit cards for example, can determine whether the correct code is being sent to it for a particular consumer device and for a particular transaction time. The time variability is obscured by a secret process on the consumer device to prevent those not in possession of the secret process from figuring out the code sequence. As a result, the authenticating authority can decide whether the requested transaction comes from a valid source. Because the display number is variable, it cannot be recorded on the Internet or elsewhere in a form useful for theft, save for very limited durations. Further such recorded numbers cannot be used to aid in impersonating a holder of a consumer device, e.g., a credit card, for purposes of identity theft. Widespread use of this invention will make telephone, network, or other remote commerce safer for all involved.


The token, in accordance with one embodiment of the invention, may be issued by an authenticating authority. An “authenticating authority” as used herein means either a central authority or a distributed authority, for example. The authenticating authority is capable of deciding whether to authorize transactions where a token is provided as a way to check the validity of authorizations, i.e., to permit them. The authenticating authority possesses authority to perform transactions in the scope of the invention including authority to effect a payment or authorize some other financial or financial-related transaction.


In accordance with one embodiment of the invention, the invention uses what might be characterized as a token. The token is used to indicate authority to perform transactions. The token includes a token clock or token counter that can maintain synchronization with a reference clock, i.e., a base counter, during the lifetime of the token. This synchronization might be maintained to within one or a few times the interval between changes of identifier. In accordance with one embodiment of the invention, this might include a counter which “ticks”, i.e., changes value, one or a few times per day, for example.


Further, the token also includes a device or mechanism for performing a secret transform on the clock value. In accordance with one embodiment of the invention, this transformation might also involve some other separately observable attribute of the token, such as the credit card number or a cellular phone number. The token uses the secret transform, which is not available to the token holder, but that is reproducible by an authenticating authority. Further, the secret may be different for every such token so that if one is lost, only its secret is lost and other tokens remain secure. The result of this transform, or part of the result of the transform, is displayed by the token in such a way that the displayed number can be read by a person or device, i.e., whatever might read the token, and transmitted to an authenticating authority. Optionally, such an authority might demand that additional memorized digits or some other identifying indicia be supplied. This other indicia would further preclude use of a stolen token. That is, the token as described herein may be used with any other known authentication technique, as desired.


In accordance with one embodiment of the invention, the invention may be in the form so as to resemble a credit card. In addition to the existing credit card fields, i.e., such as magnetic stripe, for example, the card in accordance with one embodiment of the invention is provided with a small processor and battery. Further, the card includes a display that is visible on the card. The display shows a few digits computed by a secret process on the card. One such implementation might take a secret master key known to the issuer and encrypt the card account number and expiration with this master key. This diversified key then gets stored on the card. Further, it is noted that the diversified key may be different for each card.


As noted above, a clock computes a value that is transformed and then displayed on the token. That is, the token first reads the clock. The clock may be in the form of a counter of some type. For example, the clock for a certain batch of credit cards might advance based on the “hours since midnight on Jan. 1, 2001”. Further, the credit cards might be synchronized when issued. In accordance with one embodiment of the invention, the initial value generated by the clock is encrypted with the diversified key.


Further, only the low three decimal digits of the result are displayed on the display, for example, in accordance with one embodiment of the invention. Of course, it is appreciated that any number of digits or selection of digits may be used, as is desired. Physically, the invention will not pose a problem since there currently exists flexible numeric displays much thinner than credit cards. Should power be limited to drive such a display all the time for a few years, a pushbutton or other switch might be present to conserve power.


When the credit card holder of the token of the invention makes a phone purchase or a net purchase, for example, he or she then reads the display, and possibly recites some other digits she is given to retain or memorize, in accordance with one embodiment of the invention. For example, such other digits might be the fixed CVV code (card validation value) on the back of the credit card. The credit card holder then furnishes such information to a merchant. The merchant then sends the information to the issuer, or some other authenticating authority, for validation.


The authenticating authority receives the card number, timestamp of the transaction, the token value and any added data. The authenticating authority then derives the diversified key from the card number and the master secret the particular card holds and/or reads such information from storage. Further, the authenticating authority checks the timestamp supplied for sanity, i.e., performs a crude reasonableness test, and uses the timestamp to derive the expected on-card clock value. The authenticating authority then encrypts this clock value with the diversified key and compares with the value supplied by the customer.


So as to avoid clock drift problems, the authenticating authority may compare adjacent timeslot values for the comparison operation. The authenticating authority then treats these adjacent timeslot values as matches if one of them produces the same code as was reported. The exact number of these comparisons depends on expected maximum clock drift on card over the card lifetime, i.e., two to three years, for example, and may be varied as desired. For example if it is expected the clock might drift under an hour, and the clock changes value at midnight, then transactions after 11 PM might be compared also with the next day's code, and similarly transactions before 1 AM might be compared with the prior day's code. In this way the card user never sees any effects of the clock changing during his transaction.


In accordance with further aspects of the invention, as noted above, a variety of other values may be supplied to a token holder for use in authenticating transactions. These other values can be recorded by the authenticating authority, or alternatively, can be computed by such an operation as encrypting the card number with a second secret key and using part of such resulting number. This additional number is entered when making a transaction, along with the displayed number, by the cardholder. Such added information makes a token less useful to someone who stole the token, as they would have to guess the correct check digits or digits to fool the authenticating authority.


Further, it may be desirable for the values, which the token displays, to be related mathematically to some separate observable about the token, e.g., such as a cellular phone number. For example, a second identifier built into the token may be used mathematically for computation of the value displayed by the display on the token. For tokens of the nature of credit cards, the preferred implementation encrypts the card number. For tokens like cell phones, there is a phone ID number which could be used. Such practice would make it harder to forge tokens and will be found to be of particular use for tokens in which the internal state cannot be hidden well from users, i.e., the internal state meaning a cell phone number, for example. In those cases where the internal state cannot be hidden, it may be desired to use other identifiers, in addition to the token value described herein, in order to gain the added protection against fraud.


As described herein, one embodiment of the invention uses a token resembling a credit card. However, any of a wide variety of tokens may be used. Accordingly, as used herein a “token” means a device which is presented or which bears information which is presented by someone to set up a payment or similarly authorize some financial or financial-related transaction. Accordingly, a token of the invention may be in a wide variety of forms including a token in the form of a credit card, or a gasoline-buying “speedpass,” for example. Accordingly, the token in the invention may be in the form of credit card or debit card type device possessing a display to be read by the cardholder, a credit card type device having a magnetic strip, a radio frequency generating device, an infrared signal generating device, an audio signal generating device, a magnetic pattern generating device, and/or other devices for outputting a data signal, i.e., such as a PDA (personal digital assistance) outputting a data signal to a computer or to a cashier, for example.


Further, as described herein, the token of the invention generates a “display.” As used herein, a “display” means whatever sends information off the token for authentication checks. For credit card type tokens, the display might be some visible display. For other types of tokens, the display might be a radio or audio signal, or magnetic patterns, for example. Accordingly, a “display” in a token of the invention may illustratively be an LED (light emitting diode), an LCD (liquid crystal display), a magnetic strip, a radio frequency signal, an infrared signal, an audio signal, a magnetic pattern, any other data signal, or any other technique that may be used to convey information from the token to the merchant, and in turn to the authenticating authority, for example. As is appreciated, interim steps may be needed such as a human cardholder reading the token output sequence and inputting the token output sequence into a computer via a keyboard or to a human merchant verbally, for example.


As described in various examples herein, the token of the invention may be used in an interaction between a customer and a merchant. However, the token of the invention may be used in a variety of other situations between any of a wide variety of entities. For example, the treasurer of a corporation might use the token described herein to validate instructions to a bank, i.e., regarding a desired transaction, for example. Accordingly, the token of the invention might be used in conjunction with transactions between two banks or between any other institutions or entities, for example.


The checking is preferably done off the token, although a central authority's processing might be replaced in some cases by some combination of other processing with perhaps other tokens whose trust is established in other ways, e.g., such as biometrics, for example, to allow local checking of such tokens for authenticity. That is, the token of the invention may well be used in conjunction with other authentication checks, such as simply a credit card number, for example; and the authenticating authority may be made up of separate portions so as to collectively perform the verification process.


Hereinafter, further aspects of the systems and methods of the invention will be described with reference to the drawings. FIG. 1 is a diagram showing a token 100 in accordance with one embodiment of the invention. As shown in FIG. 1, the token 100 includes a device number 110. While the token 100 is shown in FIG. 1 as being similar to a credit card, it is appreciated that the token 100 may be in any of a wide variety of shapes and sizes.


As shown in FIG. 1, the token 100 also includes a magnetic strip 120. Further, the token 100 includes a token output sequence 130, i.e., a number, that is presented by a display 132. The token output sequence 130 is generated by the token 100 based on the progression of a clock, as described above, for example. In order to conserve energy of the token 100, the token output sequence 130 might not be displayed at all times. That is, the holder of the token 100, in accordance with one embodiment of the invention, presses the power display button 140 to display the token output sequence 130. Such action results in a token output sequence being displayed and visible to the holder. As shown in FIG. 1, the token 100 may also include a signature panel 150 to provide further verification of the veracity of the holder.


To explain further, the token output sequence 130 is generated using a token counter 160. The token counter 160 generates a token value. This token value is output within a token 100 to an encryption portion 170. The encryption portion 170 provides logic to process the token value to result in the token output sequence 130. Both the progression of the token counter 160 as well as the logic used in the encryption portion 170 is known and simulated by a verification or authenticating authority so as to verify a transaction by the holder of the token 100.


The embodiment of FIG. 1 utilizes a display 132 to display the token output sequence 130. However, is appreciated that the token output sequence 130 may be displayed using a variety of techniques, as is further described below. For example, the token output sequence 130 might be input into the magnetic strip 120, i.e., so as to be output to a merchant, for example.



FIG. 2 is a block diagram showing a processing system 10 in accordance with one embodiment of the invention. As shown in FIG. 2, the processing system 10 includes a customer token 100. Further, the processing system 10 includes a merchant entity 200 and an authenticating authority 300.


In accordance with one embodiment of the invention, the customer token 100 takes the form of the device shown in FIG. 1. Further, the merchant entity 200 may be in any of a wide variety of forms such as merchant disposed in a physical merchant store, an internet entity, a receiver such as on a toll road device, a telephone entity, as well as a wide variety of other arrangements, as should be appreciated. Further, as shown in FIG. 2, the token 100 may be disposed in a variety of devices, such as in a flashlight, key chain, cellular phone, a personal digital assistant, and/or a watch, for example.



FIG. 3 is a block diagram showing in further detail the authenticating authority 300. The authenticating authority 300 includes a general processing portion 310 and a general memory portion 320. The general processing portion 310 controls overall operations of the various components disposed in the authenticating authority 300. Further, the general memory portion 320 provides a wide variety of memory resources to the authenticating authority 300.


The authenticating authority 300 further includes an input portion 330. The input portion 330 inputs information necessary to verify a transaction performed using the token 100. Illustratively, the input portion 330 inputs a device number from a token, the time the transaction, as well as a token output sequence. The authenticating authority 300 further includes a base counter 350. The base counter 350 outputs an authenticating value based on the transaction time, which is received from the token 100. This authenticating value is created using processing performed in parallel to the token counter 160. Specifically, the base counter 350 simulates the output that the token counter 160 would have generated at the time of the transaction.


Further, the authenticating authority 300 includes an encryption portion 360. The encryption portion 360 calculates a verification sequence in the same secret logic as in the token 100. In the authenticating authority 300, the encryption portion 360 operates in conjunction with the secret logic memory portion 370 to generate the verification sequence. For example, the secret logic memory portion might use the device number to determine which logic to apply to the verification sequence, e.g., using a look-up table, for example.


In accordance with one embodiment of the invention, it is noted that the logic might use the device number in mathematical processing of the authenticating value, or, in the token, the logic might use the device number in mathematical processing of the token value.


Further, the authenticating authority 300 includes a comparison portion 380. The comparison portion 380 uses the verification sequence, which is generated within the authenticating authority 300, and compares such verification sequence with the input “token output sequence,” which is input from the token 100.



FIG. 4 is a flow chart showing a customer process in accordance with one embodiment of the invention. As shown in FIG. 4, the process starts in step 500 in which the customer initiates a transaction. After step 500, the process passes to step 510. In step 510, the customer reads, or in some other manner conveys, the device number to the merchant. Then, in step 520, with reference to the embodiment of the invention shown in FIG. 1, the customer presses the power display button. As a result, the token output sequence is displayed for viewing by the customer. Accordingly, in step 530, the customer reads the token output sequence to the merchant. In conjunction with step 530, the customer device, i.e., the token 100, for example, calculates the token output sequence based on a token value generated in the token, i.e., based on the progression of the clock in the token. After step 530 of FIG. 4, the process passes to step 540. In step 540, the customer input to the transaction is completed.



FIG. 5 is a flow chart showing an authenticating authority process in accordance with one embodiment of the invention. As shown in FIG. 5, the process starts in step 600 and passes to step 610. In step 610, the authenticating authority obtains the device number from the customer. Then, in step 620, the authenticating authority obtains the token output sequence number from the customer. After 620, the process passes to step 630. In step 630, the authenticating authority also inputs the time of the transaction, i.e., which may be obtained from the merchant in accordance with one embodiment of the invention. Accordingly, each of the items of information input in steps 610, 620 and 630 are obtained from the customer and/or the merchant and may typically be transmitted from the customer through the merchant so as to be input by the authenticating authority.


Returning to FIG. 5, after step 630, the process passes to step 640. In step 640, the authenticating authority performs a verification process on the transaction. FIG. 6 is a flowchart showing in further detail step 640. After step 640 of FIG. 5, the process passes to step 800. In step 800, the verification process is completed.


As noted above, FIG. 6 is a flowchart showing in further detail the “perform verification process on the transaction.” As shown in FIG. 6, the process starts in step 640 and passes to step 650. In step 650, the process, i.e., performed by the authenticating authority, calculates a “verification sequence” based on the device number and the time of transaction, which has been input. Then, in step 660, the authenticating authority compares the “token output sequence” input from the customer with the “verification sequence”. After step 650, the process passes to step 670.


In step 670, as shown in FIG. 6, the process determines whether the token output sequence that is input from the customer matches with the verification sequence that is generated within the authenticating authority. If yes, i.e., there is a match, then the process passes to step 672. In step 672, the transaction is authorized. After step 672, the process passes to step 699.


Alternatively, it may be the situation that in step 670, the token output sequence does not match with the verification sequence. As a result, the processes passes from step 670 to step 680. In step 680, an initial determination is made that the transaction is not authorized. However, this is merely an initial determination. That is, after step 680, the process passes to step 690. In step 690, the process performs alternative processing to further consider the authorization. That is, the process performs further processing to ascertain whether the transaction was indeed a valid transaction. FIG. 8 is a flowchart showing in further detail step 690. After 690 of FIG. 6, the process passes to step 699.


In step 699, the process may perform a supplemental transaction validation, as is necessary or desired. That is, it is appreciated that there may be other criteria that makes an authenticator decide to allow the transaction or not. For example suppose a transaction is coming supposedly from Seattle and the authenticating authority experienced a transaction, with the same token, from New York 10 minutes ago. The authenticating authority might want to decline this transaction even if the authorization number appeared to be correct. Likewise even if the transaction is not authorized, maybe the issuer will determine the electronics have glitched and he may use other information, ask the merchant for other information, or just warn the merchant and let the merchant decide whether to go ahead anyway, i.e., since the merchant will bear any loss. After step 699, the process passes to step 700. In step 700, the process returns to step 800 of FIG. 5.



FIG. 7 is a flowchart showing in further detail step 650 of FIG. 6 “calculate verification sequence based on device number and time of transaction.” After the sub-process of FIG. 7 starts, the process passes from step 650 to step 652. In step 652, the process determines the “authenticating value” based on the time of transaction. Then, in step 654, the process determines the “secret logic” based on the device number. That is, it is appreciated that different logics may be used for different devices. The device number, or some other identifying indicia that may be associated with a particular device, may be used to determine which logic should be applied by the authenticating authority. After step 654, the process passes to step 656. In step 656, the process proceeds with applying the secret logic to the “authenticating value” to determine, in turn, the “verification sequence”. After step 656, the process passes to step 658. In step 658, the process returns to step 660 of FIG. 6.



FIG. 8 is a flowchart showing in further detail the “perform alternative processing to further process authorization” step 690 of FIG. 6. In particular, the process of FIG. 8 relates to the situation where clock drift has occurred between the clock in the authenticating authority as compared with the clock in the token 100. Such drift between the clocks may result in an initial finding that a transaction is not valid. However, the process of FIG. 8 addresses a potential incorrect finding of an invalid transaction.


To explain, the process of FIG. 8 starts in step 690 and passes to step 692. In step 692, the process determines whether the time of transaction is near the beginning of a clock interval, i.e., is the time of the transaction near the time that the clock in the authenticating authority experienced a change. If yes in step 692, then the process passes to step 693. In step 693, the process recalculates the verification sequence based on the previous base counter setting. After step 693, the process passes to step 697.


Alternatively, in step 692, the process may have determined that the time of the transaction is not at the beginning of a clock interval. As a result, the process passes to step 694. In step 694, the process, as illustratively performed by the authenticating authority, determines whether the time of the transaction is near the end of a clock interval. If yes, then the process passes from step 694 to step 695. In step 695, the process recalculates the “verification sequence” based on the next base counter setting. Then, the process passes to step 697.


In step 697, the process determines whether the token output sequence input by the customer matches with the recalculated verification sequence. That is, step 697 checks whether the previous or the next clock setting of step 693 and step 695, respectively, result in a match between the token output sequence and the verification sequence. If yes, then the process passes to step 698. That is, if there is indeed a match then the transaction is authorized. After step 698, the process passes to step 698′. Alternatively, in step 697, there may still not be a match between the token output sequence input by the customer and the recalculated verification sequence. As a result, the process passes to step 697′ and the transaction is not authorized. After step 697′, the process passes to step 698′.


As noted above, in step 694 of FIG. 8, the process determines whether the time of the transaction is near the end of a clock interval. Further, step 692 determined if the transaction is near the beginning of a clock interval. If neither of the situations is present, then the process passes to step 696. In step 696, the process determines that the transaction is indeed not authorized. As a result, the process passes to step 698′. However, it is appreciated that more then the immediately adjacent intervals may be considered. For example if the clock advances relatively quickly, this results in a potential for substantial clock drift. As a result, it may be desired to check three, for example, (or as many as desired) intervals before the initially considered interval, as well as three subsequent intervals, for example.


In step 698′, the process returns to step 699 and then to step 700 of FIG. 6. As noted above, in step 700 of FIG. 6, the process returns to step 800 of FIG. 5 in which the verification process is terminated.


In accordance with a further embodiment of the invention, FIG. 9 is a diagram showing a token 100′ disposed in a flashlight 700. The token 100′ may operate in a similar manner to the token 100, as shown in FIG. 1. The flashlight 700 may include batteries 702. In accordance with one embodiment of the invention, the batteries 702 may power operations of the token 100′. As described above, the token 100′ generates a token output sequence, and transmits the token output sequence to a merchant 200. This transmission may be in a variety of forms, as is shown in FIG. 9. In turn, the merchant 200 outputs the token output sequence, as well as a time stamp and a token device number, which is also obtained from the token, to the authenticating entity 300.


In accordance with a yet further embodiment of the invention, FIG. 10 is a block diagram showing a token 800 that may operate in a similar manner to the token 100. The token 800 includes an encryption portion 870 and a display 880. The encryption portion 870 provides the logic to convert the token value into the token output sequence, as described above. This logic may take on a variety of forms so as to manipulate the token value, as is desired, i.e., such as a mathematical manipulation of the token value, for example. The token counter of the embodiment of FIG. 10 includes a clock 862 and a tick reduction portion 864. The clock may be a standard twenty-four hour clock, but may preferably be a digital clock, i.e., such that a digital output may be output to the tick reduction portion 864.


The tick reduction portion 864 works off the advancement of the clock 862 to generate the token values. However, the tick reduction portion 864 advances at a much slower rate. For example, for every 12 hours that the clock 862 advances, the tick reduction portion 864 may only advance once. As is noted above, such reduced advancement reduces the effects of clock drift between the token and the authenticating authority.


In accordance with further aspects of the invention, it is appreciated that the token value, the token output sequence, the authenticating value, and the verification sequence, for example, may be numbers, letters, symbols, punctuation and/or any other character set, for example. However, the particular composition of the token value, as well as the corresponding authenticating value, should be such that such values may advance in a routine manner.


As described above, the systems and methods of the invention rely upon time stamping in accordance with embodiments of the invention. Accordingly, a variety of techniques may be used to address different time zones. For example, one time zone may be designated as a standard and all time stamps converted to this standard.


As described above, methods and systems are disclosed which permit tokens used for finance to be checked for authenticity by having the tokens display an authentication code that varies with time, yet can be validated by the token validation authority. Because the authentication code changes, such codes may not readily be stored and stolen, as is a problem in existing codes. The invention reduces fraud for all involved where there is risk that a token might be a forgery.


It will be readily understood by those persons skilled in the art that the present invention is susceptible to broad utility and application. Many embodiments and adaptations of the present invention other than those herein described, as well as many variations, modifications and equivalent arrangements, will be apparent from or reasonably suggested by the present invention and foregoing description thereof, without departing from the substance or scope of the invention.


Accordingly, while the present invention has been described here in detail in relation to its exemplary embodiments, it is to be understood that this disclosure is only illustrative and exemplary of the present invention and is made to provide an enabling disclosure of the invention. Accordingly, the foregoing disclosure is not intended to be construed or to limit the present invention or otherwise to exclude any other such embodiments, adaptations, variations, modifications and equivalent arrangements.

Claims
  • 1. A system comprising: a credit card comprising a computer processor and having an account identifier and a display for displaying a number that changes based on a clock for use in a transaction, the computer processor generating the number by transforming a value associated with the clock using a key; anda device that receives only the account identifier and the number and transmits the account identifier, the number, and a timestamp of a transaction to an authenticating authority for authenticating the transaction;wherein the account identifier and the number are received as separate numbers, andwherein the number comprises at least one digit that does not change.
  • 2. The system of claim 1, further comprising: a token counter, the token counter periodically advancing to generate a changing token value, the token counter being synchronized to a base counter that generates an authenticating value, wherein the number is based at least in part on the token value.
  • 3. The system of claim 1, further comprising communicating the account identifier and the number wirelessly to the device.
  • 4. The system of claim 1, further comprising communicating the account identifier and the number to the device via a magnetic stripe of the credit card.
  • 5. The system of claim 1, wherein the credit card comprises a battery.
  • 6. The system of claim 1, wherein the number comprises at least a portion of a credit card number.
  • 7. The system of claim 1, wherein the number comprises an authentication code.
  • 8. The system of claim 1, wherein the clock is synchronized with a clock of the authenticating authority.
  • 9. The system of claim 1, wherein the credit card further comprises a manual switch.
  • 10. The system of claim 1, wherein the device reads the account identifier and the number from a magnetic strip on the credit card.
  • 11. The system of claim 1, wherein the account identifier and the number are unrelated.
  • 12. The system of claim 1, wherein the account identifier and the number are separately received in the same communication.
  • 13. The system of claim 1, wherein the device is provided by a party to the transaction.
  • 14. The system of claim 1, wherein the authenticating authority derives an expected on-card clock value from the timestamp.
  • 15. A method comprising: displaying, on a display of a payment card having an account identifier, a number for use in a transaction, the number generated by a computer processor by transforming a value associated with a clock using a key of the payment card; andreceiving, at a device, only the account identifier and the number from the payment card and transmitting the account identifier, the number, and a timestamp of a transaction to an authenticating authority for authenticating the transaction;wherein the account identifier and the number are received as separate numbers, andwherein the number comprises at least one digit that does not change.
  • 16. The method of claim 15, wherein the account identifier and the number are unrelated.
  • 17. The method of claim 15, wherein the device is provided by a party to the transaction.
  • 18. The method of claim 15, further comprising: the authenticating authority deriving an expected on-card clock value from the timestamp.
  • 19. A non-transitory machine readable medium, executable by a machine, that includes program logic imprinted thereon for performing the method comprising: displaying, on a display of a payment card having an account identifier, a number that changes based on a clock for use in a transaction, the number generated by a computer processor transforming a value associated with the clock using a key of the payment card; anda device that receives only the account identifier and the number from the payment card and transmits the account identifier, the periodically changing number, and a timestamp of a transaction to an authenticating authority for authenticating the transaction;wherein the account identifier and the periodically changing number are received as separate numbers, andwherein the number comprises at least one digit that does not change.
  • 20. The non-transitory machine readable medium of claim 19, wherein the account identifier and the number are unrelated.
  • 21. The non-transitory machine readable medium of claim 19, wherein the device is provided by a party to the transaction.
  • 22. The non-transitory machine readable medium of claim 19, wherein the authenticating authority derives an expected on-card clock value from the timestamp.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No. 10/419,107 filed Apr. 21, 2003, which is a continuation-in-part application (CIP) of U.S. application Ser. No. 10/105,471 filed Mar. 25, 2002, both of which are hereby incorporated herein by reference in their entireties.

US Referenced Citations (1018)
Number Name Date Kind
3634669 Soumas Jan 1972 A
3653480 Yamamoto Apr 1972 A
3665162 Yamamoto May 1972 A
3713235 Roberts Jan 1973 A
3946206 Darjany Mar 1976 A
4047033 Malmberg et al. Sep 1977 A
4058220 Torongo Nov 1977 A
D248203 Morse Jun 1978 S
4123747 Lancto et al. Oct 1978 A
4130881 Haessler et al. Dec 1978 A
4200770 Hellman et al. Apr 1980 A
4218582 Hellman et al. Aug 1980 A
4223403 Konheim et al. Sep 1980 A
4321672 Braun Mar 1982 A
4338587 Chiappetti Jul 1982 A
4396985 Ohara Aug 1983 A
4424414 Hellman et al. Jan 1984 A
4453074 Weinstein Jun 1984 A
4454414 Benton Jun 1984 A
4465206 Sorel et al. Aug 1984 A
4523087 Benton Jun 1985 A
4529870 Chaum Jul 1985 A
4545838 Minkus et al. Oct 1985 A
4575621 Dreifus Mar 1986 A
4582985 Lofberg Apr 1986 A
4605844 Haggan Aug 1986 A
4614861 Pavlov et al. Sep 1986 A
4633036 Hellman et al. Dec 1986 A
4634845 Riley Jan 1987 A
4643452 Chang et al. Feb 1987 A
4650981 Foletta Mar 1987 A
4672377 Murphy Jun 1987 A
4689478 Hale et al. Aug 1987 A
4697072 Kawana Sep 1987 A
4700055 Kashkashian, Jr. Oct 1987 A
4701601 Francini et al. Oct 1987 A
4746787 Okada May 1988 A
4750119 Robertson Jun 1988 A
4752676 Leonard et al. Jun 1988 A
4754418 Hara Jun 1988 A
4766293 Boston Aug 1988 A
4766539 Fox Aug 1988 A
4789928 Fujisaki Dec 1988 A
4797913 Kaplan Jan 1989 A
4799156 Shavit Jan 1989 A
4812628 Boston Mar 1989 A
4822985 Boggan et al. Apr 1989 A
4823264 Deming Apr 1989 A
4831242 Englehardt May 1989 A
4831526 Luchs May 1989 A
4837422 Dethloff et al. Jun 1989 A
4851650 Kitade Jul 1989 A
4868376 Lessin et al. Sep 1989 A
4870259 Boggan et al. Sep 1989 A
4882675 Nichtberger et al. Nov 1989 A
4897533 Lyszczarz Jan 1990 A
D305887 Nishimura Feb 1990 S
4906826 Spencer Mar 1990 A
4908521 Boggan et al. Mar 1990 A
4923288 Allen et al. May 1990 A
4928001 Masada May 1990 A
4941090 McCarthy Jul 1990 A
4943707 Boggan Jul 1990 A
4953085 Atkins Aug 1990 A
4954985 Yamazaki Sep 1990 A
4961142 Elliott et al. Oct 1990 A
4968873 Dethloff et al. Nov 1990 A
4975840 DeTore et al. Dec 1990 A
4978401 Bonomi Dec 1990 A
4988849 Sasaki Jan 1991 A
4992940 Dworkin Feb 1991 A
5023904 Kaplan Jun 1991 A
5025372 Burton et al. Jun 1991 A
5049728 Rovin Sep 1991 A
5053607 Carrlson Oct 1991 A
5054096 Beizer Oct 1991 A
5055662 Hasegawa Oct 1991 A
5080748 Bonomi Jan 1992 A
5095194 Barbanell Mar 1992 A
5097115 Ogasawara et al. Mar 1992 A
5111395 Smith May 1992 A
5117355 McCarthy May 1992 A
5146068 Ugawa et al. Sep 1992 A
5163098 Duhbura Nov 1992 A
5175416 Mansvelt Dec 1992 A
5175682 Higashiyama Dec 1992 A
5177342 Adams Jan 1993 A
5180901 Hiramatsu Jan 1993 A
5185697 Jacobs et al. Feb 1993 A
5191522 Bosco et al. Mar 1993 A
5192947 Neustein Mar 1993 A
5202286 Nakatani Apr 1993 A
5202826 McCarthy Apr 1993 A
5206488 Teicher Apr 1993 A
5206803 Vitagliano Apr 1993 A
5214700 Pinkas et al. May 1993 A
5218631 Katz Jun 1993 A
5225664 Lijima Jul 1993 A
5225978 Peterson Jul 1993 A
5237159 Stephens Aug 1993 A
5237620 Deaton Aug 1993 A
5247190 Friend et al. Sep 1993 A
5276311 Hennige Jan 1994 A
5283829 Anderson Feb 1994 A
5287268 McCarthy Feb 1994 A
5287269 Dorrough et al. Feb 1994 A
5297026 Hoffman Mar 1994 A
5311594 Penzias May 1994 A
5317636 Vizcaino May 1994 A
5326959 Perazza Jul 1994 A
5326960 Tannenbaum Jul 1994 A
5328809 Holmes et al. Jul 1994 A
5336870 Hughes Aug 1994 A
5339239 Manabe et al. Aug 1994 A
5349633 Katz Sep 1994 A
5350906 Brody et al. Sep 1994 A
5352877 Morley Oct 1994 A
5359183 Skodlar Oct 1994 A
5361062 Weiss et al. Nov 1994 A
5365575 Katz Nov 1994 A
5367581 VanHorn Nov 1994 A
5373550 Campbell Dec 1994 A
5380046 Stephens Jan 1995 A
5382784 Eberhardt Jan 1995 A
5383113 Knight Jan 1995 A
5396417 Burks Mar 1995 A
5397881 Mannik Mar 1995 A
5399502 Friend et al. Mar 1995 A
5401827 Holmes et al. Mar 1995 A
5402474 Miller Mar 1995 A
RE34915 Nichtberger et al. Apr 1995 E
5409092 Itako et al. Apr 1995 A
5412190 Josephson May 1995 A
5420405 Chasek May 1995 A
5424524 Ruppert et al. Jun 1995 A
5424938 Wagner Jun 1995 A
5430644 Deaton Jul 1995 A
5432326 Noblett et al. Jul 1995 A
5444841 Glaser Aug 1995 A
5446740 Yien Aug 1995 A
5448471 Deaton Sep 1995 A
5450477 Amarant et al. Sep 1995 A
5450479 Alesio Sep 1995 A
5450491 McNair Sep 1995 A
5453601 Rosen Sep 1995 A
5455407 Rosen Oct 1995 A
5457305 Akel et al. Oct 1995 A
5459306 Stein et al. Oct 1995 A
5465206 Hilt et al. Nov 1995 A
5466919 Hovakimian Nov 1995 A
5466920 Nair et al. Nov 1995 A
5471669 Lidman Nov 1995 A
5477038 Levine et al. Dec 1995 A
5477040 Lalonde Dec 1995 A
5479494 Clitherow Dec 1995 A
5479532 Abel Dec 1995 A
5481094 Suda Jan 1996 A
5482139 Rivalto Jan 1996 A
5483444 Malark Jan 1996 A
5483445 Pickering Jan 1996 A
5484988 Hills Jan 1996 A
5489123 Roshkoff Feb 1996 A
5500514 Veeneman et al. Mar 1996 A
5503891 Marshall et al. Apr 1996 A
5504677 Pollin Apr 1996 A
5506691 Bednar Apr 1996 A
5511114 Stimson et al. Apr 1996 A
5511184 Lin Apr 1996 A
5512654 Holmes et al. Apr 1996 A
5513102 Auriemma Apr 1996 A
5513250 McAllister Apr 1996 A
5521363 Tannenbaum May 1996 A
5530232 Taylor Jun 1996 A
5530235 Stefik et al. Jun 1996 A
5537314 Kanter Jul 1996 A
5544040 Gerbaulet Aug 1996 A
5544086 Davis et al. Aug 1996 A
5544246 Mandelbaum et al. Aug 1996 A
5550358 Tait Aug 1996 A
5550734 Tarter Aug 1996 A
5551021 Harada Aug 1996 A
5553120 Katz Sep 1996 A
5557092 Ackley Sep 1996 A
5563934 Eda Oct 1996 A
5566330 Sheffield Oct 1996 A
5568489 Yien Oct 1996 A
5577109 Stimson et al. Nov 1996 A
5578808 Taylor Nov 1996 A
5581064 Riley et al. Dec 1996 A
5583759 Geer Dec 1996 A
5583933 Mark Dec 1996 A
5585787 Wallerstein Dec 1996 A
5590038 Pitroda Dec 1996 A
5592378 Cameron Jan 1997 A
5592553 Guski et al. Jan 1997 A
5592560 Deaton et al. Jan 1997 A
5604542 Dedrick Feb 1997 A
5608785 Kasday Mar 1997 A
5612868 Off Mar 1997 A
5613002 Kephart et al. Mar 1997 A
5619558 Jheeta Apr 1997 A
5621201 Langhans Apr 1997 A
5621787 McKoy et al. Apr 1997 A
5621812 Deaton et al. Apr 1997 A
5637845 Kolls Jun 1997 A
5638457 Deaton et al. Jun 1997 A
5640577 Scharmer Jun 1997 A
5642279 Stone Jun 1997 A
5642485 Deaton et al. Jun 1997 A
5644723 Deaton et al. Jul 1997 A
5644727 Atkins Jul 1997 A
5649114 Deaton et al. Jul 1997 A
5649117 Landry Jul 1997 A
5649118 Carlisle et al. Jul 1997 A
5650604 Marcous Jul 1997 A
5652786 Rogers Jul 1997 A
5653914 Holmes et al. Aug 1997 A
5659469 Deaton Aug 1997 A
5659741 Eberhardt Aug 1997 A
5664110 Green et al. Sep 1997 A
5664157 Takahira et al. Sep 1997 A
5665953 Mazzamuto Sep 1997 A
5672678 Holmes et al. Sep 1997 A
5675607 Alesio et al. Oct 1997 A
5675662 Deaton et al. Oct 1997 A
5677521 Garrou Oct 1997 A
5677955 Doggett et al. Oct 1997 A
5679938 Templeton Oct 1997 A
5679940 Templeton Oct 1997 A
5680459 Hook et al. Oct 1997 A
5684291 Taskett Nov 1997 A
5687322 Deaton et al. Nov 1997 A
5689100 Carrithers et al. Nov 1997 A
5689650 McClelland et al. Nov 1997 A
5692132 Hogan Nov 1997 A
5696907 Tom Dec 1997 A
5698837 Furuta Dec 1997 A
5699528 Hogan Dec 1997 A
5703344 Bezy et al. Dec 1997 A
5704046 Hogan Dec 1997 A
5705798 Tarbox Jan 1998 A
5708422 Blonder et al. Jan 1998 A
5710458 Iwasaki Jan 1998 A
5710886 Christensen et al. Jan 1998 A
5710887 Chelliah Jan 1998 A
5710889 Clark et al. Jan 1998 A
5715298 Rogers Feb 1998 A
5715314 Payne Feb 1998 A
5715399 Bezos Feb 1998 A
5717925 Harper et al. Feb 1998 A
5721768 Stimson et al. Feb 1998 A
5721781 Deo et al. Feb 1998 A
5724423 Khello Mar 1998 A
5724424 Gifford Mar 1998 A
5726884 Sturgeon et al. Mar 1998 A
5727153 Powell Mar 1998 A
5727249 Pollin Mar 1998 A
5728998 Novis et al. Mar 1998 A
5729693 Holda-Fleck Mar 1998 A
5732136 Murphree et al. Mar 1998 A
5734154 Jachimowicz et al. Mar 1998 A
5734838 Robinson Mar 1998 A
5736728 Matsubara Apr 1998 A
5737421 Audebert Apr 1998 A
5740549 Reilly et al. Apr 1998 A
5742775 King Apr 1998 A
5745049 Akiyama et al. Apr 1998 A
5745555 Mark Apr 1998 A
5745706 Wolfberg et al. Apr 1998 A
5748737 Daggar May 1998 A
5748780 Stolfo May 1998 A
5749075 Toader et al. May 1998 A
5760381 Stich et al. Jun 1998 A
5764770 Schipper et al. Jun 1998 A
5765138 Aycock et al. Jun 1998 A
5765141 Spector Jun 1998 A
5770843 Rose et al. Jun 1998 A
5770849 Novis et al. Jun 1998 A
5774870 Storey Jun 1998 A
5777305 Smith et al. Jul 1998 A
5777306 Masuda Jul 1998 A
5777903 Piosenka et al. Jul 1998 A
5778067 Jones et al. Jul 1998 A
5787156 Katz Jul 1998 A
5787404 Fernandez-Holmann Jul 1998 A
5789733 Jachimowicz et al. Aug 1998 A
5790636 Marshall Aug 1998 A
5793861 Haigh Aug 1998 A
5794207 Walker et al. Aug 1998 A
5794221 Engendorf Aug 1998 A
5796827 Coppersmith et al. Aug 1998 A
5798950 Fitzgerald Aug 1998 A
5799087 Rosen Aug 1998 A
5802176 Audebert Sep 1998 A
5802498 Comesanas Sep 1998 A
5805719 Pare et al. Sep 1998 A
5806042 Kelly et al. Sep 1998 A
5806044 Powell Sep 1998 A
5806045 Biorge Sep 1998 A
5807627 Friend et al. Sep 1998 A
5809478 Greco Sep 1998 A
5814796 Benson et al. Sep 1998 A
5815657 Williams et al. Sep 1998 A
5815658 Kuriyama Sep 1998 A
5819234 Slavin et al. Oct 1998 A
5819236 Josephson Oct 1998 A
5819237 Garman Oct 1998 A
5823463 Fissmann et al. Oct 1998 A
5825871 Mark Oct 1998 A
5826241 Stein Oct 1998 A
5826243 Musmanno et al. Oct 1998 A
5826245 Sandberg-Diment Oct 1998 A
5832090 Raspotnik Nov 1998 A
5832211 Blakley, III et al. Nov 1998 A
5832457 O'Brien Nov 1998 A
5832460 Bednar Nov 1998 A
5832463 Funk Nov 1998 A
5832464 Houvener Nov 1998 A
5832488 Eberhardt Nov 1998 A
5835061 Stewart Nov 1998 A
5835576 Katz Nov 1998 A
5835603 Coutts Nov 1998 A
5838812 Pare Nov 1998 A
5838903 Blakely, III et al. Nov 1998 A
5839113 Federau et al. Nov 1998 A
5845259 West et al. Dec 1998 A
5845260 Nakano et al. Dec 1998 A
5852811 Atkins Dec 1998 A
5852812 Reeder Dec 1998 A
5857079 Claus et al. Jan 1999 A
5857175 Day Jan 1999 A
5857709 Chock Jan 1999 A
5859419 Wynn Jan 1999 A
5862323 Blakley, III et al. Jan 1999 A
5864609 Cross et al. Jan 1999 A
5864828 Atkins Jan 1999 A
5864830 Armetta et al. Jan 1999 A
RE36116 McCarthy Feb 1999 E
5870456 Rogers Feb 1999 A
5870718 Spector Feb 1999 A
5870721 Norris Feb 1999 A
5870723 Pare Feb 1999 A
5870725 Bellinger Feb 1999 A
5872917 Hellman Feb 1999 A
5873072 Kight Feb 1999 A
5875437 Atkins Feb 1999 A
5881151 Yamamoto Mar 1999 A
5883377 Chapin, Jr. Mar 1999 A
5883810 Franklin et al. Mar 1999 A
5884271 Pitroda Mar 1999 A
5884278 Powell Mar 1999 A
5884285 Atkins Mar 1999 A
5884288 Chang Mar 1999 A
5887065 Audebert Mar 1999 A
5890138 Godin et al. Mar 1999 A
5890140 Clark et al. Mar 1999 A
5897620 Walker et al. Apr 1999 A
5897621 Boesch et al. Apr 1999 A
5897625 Gustin Apr 1999 A
5901303 Chew May 1999 A
5903881 Schrader May 1999 A
5905246 Fajkowski May 1999 A
5907142 Kelsey May 1999 A
5907350 Nemirofsky May 1999 A
5911135 Atkins Jun 1999 A
5911136 Atkins Jun 1999 A
5914472 Foladare et al. Jun 1999 A
5920629 Rosen Jul 1999 A
5920844 Hotta et al. Jul 1999 A
5920847 Kolling et al. Jul 1999 A
5923734 Taskett Jul 1999 A
5926800 Baronowski et al. Jul 1999 A
5930217 Kayanuma Jul 1999 A
5930778 Geer Jul 1999 A
5931764 Freeman et al. Aug 1999 A
5933817 Hucal Aug 1999 A
5937068 Audebert Aug 1999 A
5940811 Norris Aug 1999 A
5940844 Cahill Aug 1999 A
5943656 Crooks Aug 1999 A
5945653 Walker Aug 1999 A
5946669 Polk Aug 1999 A
5952641 Korshun Sep 1999 A
5953423 Rosen Sep 1999 A
5953710 Fleming Sep 1999 A
5955961 Wallerstein Sep 1999 A
5956695 Carrithers et al. Sep 1999 A
5963647 Downing Oct 1999 A
5963648 Rosen Oct 1999 A
5963925 Kolling et al. Oct 1999 A
5966698 Pollin Oct 1999 A
5970479 Shepherd Oct 1999 A
5970480 Kalina Oct 1999 A
5974399 Giuliani et al. Oct 1999 A
RE36365 Levine et al. Nov 1999 E
5978780 Watson Nov 1999 A
5984180 Albrecht Nov 1999 A
5984191 Chapin, Jr. Nov 1999 A
5987434 Libman Nov 1999 A
5988509 Taskett Nov 1999 A
5991413 Arditti et al. Nov 1999 A
5991743 Irving et al. Nov 1999 A
5991748 Taskett Nov 1999 A
5991750 Watson Nov 1999 A
5999596 Walker et al. Dec 1999 A
5999624 Hopkins Dec 1999 A
6000608 Dorf Dec 1999 A
6000832 Franklin et al. Dec 1999 A
6002383 Shimada Dec 1999 A
6003762 Hayashida Dec 1999 A
6004681 Epstein et al. Dec 1999 A
6006988 Behrmann et al. Dec 1999 A
6009415 Shurling et al. Dec 1999 A
6009442 Chen Dec 1999 A
6014636 Reeder Jan 2000 A
6014638 Burge et al. Jan 2000 A
6014645 Cunningham Jan 2000 A
6014749 Gloor et al. Jan 2000 A
6016476 Maes et al. Jan 2000 A
6016482 Molinari et al. Jan 2000 A
6016954 Abe et al. Jan 2000 A
6019284 Freeman et al. Feb 2000 A
6021189 Vu Feb 2000 A
6026370 Jermyn Feb 2000 A
6029139 Cunningham et al. Feb 2000 A
6029144 Barrett et al. Feb 2000 A
6029890 Austin Feb 2000 A
6032136 Brake, Jr. et al. Feb 2000 A
6032859 Muehlberger et al. Mar 2000 A
6036099 Leighton Mar 2000 A
6038292 Thomas Mar 2000 A
6038552 Fleischl et al. Mar 2000 A
6041315 Pollin Mar 2000 A
6042006 VanTiburg Mar 2000 A
6044360 Picciallo Mar 2000 A
6045042 Ohno Apr 2000 A
6045050 Ippolito et al. Apr 2000 A
6047067 Rosen Apr 2000 A
6047268 Bartoli et al. Apr 2000 A
6049463 O'Malley et al. Apr 2000 A
6049773 McCormack et al. Apr 2000 A
6049782 Gottesman et al. Apr 2000 A
6058378 Clark et al. May 2000 A
6064985 Anderson May 2000 A
6065675 Teicher May 2000 A
6068183 Freeman et al. May 2000 A
6069968 Shaw et al. May 2000 A
6070067 Nguyen et al. May 2000 A
6070147 Harms et al. May 2000 A
6070153 Simpson May 2000 A
6076068 DeLapa et al. Jun 2000 A
6076072 Libman Jun 2000 A
6078888 Johnson, Jr. Jun 2000 A
6078891 Riordan et al. Jun 2000 A
6088683 Jalili Jul 2000 A
6091817 Bertina et al. Jul 2000 A
6092056 Tull, Jr. et al. Jul 2000 A
6092192 Kanevsky et al. Jul 2000 A
6095412 Bertina et al. Aug 2000 A
6095416 Grant et al. Aug 2000 A
6098053 Slater Aug 2000 A
6105006 Davis et al. Aug 2000 A
6105011 Morrison, Jr. Aug 2000 A
6105865 Hardesty Aug 2000 A
6109525 Blomqvist et al. Aug 2000 A
6112191 Burke Aug 2000 A
6115458 Taskett Sep 2000 A
6119097 Ibarra Sep 2000 A
6119103 Basch et al. Sep 2000 A
6119107 Polk Sep 2000 A
6119932 Maloney et al. Sep 2000 A
6122623 Garman Sep 2000 A
6128598 Walker et al. Oct 2000 A
6128599 Walker et al. Oct 2000 A
6129274 Suzuki Oct 2000 A
6129572 Feldman et al. Oct 2000 A
6134309 Carson Oct 2000 A
6134536 Shepherd Oct 2000 A
6138917 Chapin, Jr. Oct 2000 A
6144848 Walsh Nov 2000 A
6145741 Wisdom et al. Nov 2000 A
6148297 Swor et al. Nov 2000 A
6161096 Bell Dec 2000 A
6163770 Gamble et al. Dec 2000 A
6163771 Walker et al. Dec 2000 A
6164533 Barton Dec 2000 A
6167385 Hartley-Urquhart Dec 2000 A
6169975 White et al. Jan 2001 B1
6170058 Kausik Jan 2001 B1
6173267 Cairns Jan 2001 B1
6182048 Osborn et al. Jan 2001 B1
6182220 Chen et al. Jan 2001 B1
6182894 Hackett et al. Feb 2001 B1
6185682 Tang Feb 2001 B1
6186793 Brubaker Feb 2001 B1
6188309 Levine Feb 2001 B1
6189787 Dorf Feb 2001 B1
6192113 Lorsch Feb 2001 B1
6192142 Pare et al. Feb 2001 B1
6195644 Bowie Feb 2001 B1
6195698 Lillibridge Feb 2001 B1
6202053 Christiansen et al. Mar 2001 B1
6209102 Hoover Mar 2001 B1
RE37122 Levine et al. Apr 2001 E
6213392 Zuppicich Apr 2001 B1
6219639 Bakis et al. Apr 2001 B1
6223143 Weinstock et al. Apr 2001 B1
6227447 Campisano May 2001 B1
6243688 Kalina Jun 2001 B1
6260758 Blumberg Jul 2001 B1
6263316 Khan et al. Jul 2001 B1
6263446 Kausik et al. Jul 2001 B1
6265977 Vega et al. Jul 2001 B1
6269348 Parre Jul 2001 B1
6278981 Dembo et al. Aug 2001 B1
6295344 Marshall Sep 2001 B1
6295522 Boesch Sep 2001 B1
6298336 Davis et al. Oct 2001 B1
6302444 Cobben Oct 2001 B1
6308268 Audebert Oct 2001 B1
6315195 Ramachandran Nov 2001 B1
6317834 Gennaro et al. Nov 2001 B1
6324524 Lent et al. Nov 2001 B1
6324526 D'Agostino Nov 2001 B1
6330546 Gopinathan et al. Dec 2001 B1
6336099 Barnett et al. Jan 2002 B1
6338048 Mori Jan 2002 B1
6338049 Walker Jan 2002 B1
6341724 Campisano Jan 2002 B2
6343743 Lamla Feb 2002 B1
6345261 Feidelson Feb 2002 B1
6345766 Taskett et al. Feb 2002 B1
6349291 Varma Feb 2002 B1
6360954 Barnardo Mar 2002 B1
6366220 Elliott Apr 2002 B1
6366682 Hoffman Apr 2002 B1
6373969 Adler Apr 2002 B1
6374230 Walker et al. Apr 2002 B1
6377669 Walker et al. Apr 2002 B1
6385591 Mankoff May 2002 B1
6385594 Lebda et al. May 2002 B1
6386444 Sullivan May 2002 B1
6397202 Higgins et al. May 2002 B1
6402039 Freeman et al. Jun 2002 B1
6405182 Cuervo Jun 2002 B1
6411933 Maes et al. Jun 2002 B1
6419161 Haddad Jul 2002 B1
6422459 Kawan Jul 2002 B1
6422462 Cohen Jul 2002 B1
6424029 Giesler Jul 2002 B1
6429927 Borza Aug 2002 B1
6434259 Hamid et al. Aug 2002 B1
D462477 Osborne Sep 2002 S
6446210 Borza Sep 2002 B1
6450407 Freeman et al. Sep 2002 B1
6463039 Ricci et al. Oct 2002 B1
6467684 Fite et al. Oct 2002 B2
6473500 Risafi et al. Oct 2002 B1
6481125 Pokrasoff Nov 2002 B1
6484144 Martin et al. Nov 2002 B2
6484148 Boyd Nov 2002 B1
6484428 Greenwald et al. Nov 2002 B1
D466929 Haas Dec 2002 S
D467271 Haas Dec 2002 S
D467272 Haas Dec 2002 S
6498861 Hamid et al. Dec 2002 B1
D468789 Arnold et al. Jan 2003 S
6505095 Kolls Jan 2003 B1
6505168 Rothman et al. Jan 2003 B1
6505780 Yassin et al. Jan 2003 B1
6507644 Henderson Jan 2003 B1
6507912 Matyas, Jr. et al. Jan 2003 B1
6529880 McKeen et al. Mar 2003 B1
6539363 Allgeier et al. Mar 2003 B1
D474235 Haas May 2003 S
6557750 Druse et al. May 2003 B1
6557766 Leighton May 2003 B1
6560578 Eldering May 2003 B2
6561657 Schofield May 2003 B1
6567786 Bibelnieks et al. May 2003 B1
6567821 Polk May 2003 B1
6574603 Dickson et al. Jun 2003 B1
6580814 Ittycheriah et al. Jun 2003 B1
6581839 Lasch et al. Jun 2003 B1
D476681 Al Amri Jul 2003 S
D477359 Haas Jul 2003 S
6592044 Wong et al. Jul 2003 B1
6601040 Kolls Jul 2003 B1
6601761 Katis Aug 2003 B1
6609111 Bell Aug 2003 B1
6609654 Anderson et al. Aug 2003 B1
6609658 Sehr Aug 2003 B1
RE38255 Levine et al. Sep 2003 E
6615189 Phillips et al. Sep 2003 B1
6615190 Slater Sep 2003 B1
6615352 Terao Sep 2003 B2
6625582 Richman et al. Sep 2003 B2
6631849 Blossom Oct 2003 B2
6641049 Luu Nov 2003 B2
6641050 Kelley et al. Nov 2003 B2
6651168 Kao et al. Nov 2003 B1
6668321 Nendell et al. Dec 2003 B2
6671673 Baseman et al. Dec 2003 B1
D485573 Li Jan 2004 S
6675127 LaBlanc et al. Jan 2004 B2
6675149 Ruffin et al. Jan 2004 B1
6685088 Royer Feb 2004 B1
6687222 Albert et al. Feb 2004 B1
6691916 Noyes Feb 2004 B2
6693544 Hebbecker Feb 2004 B1
6697947 Matyas, Jr. et al. Feb 2004 B1
6705518 Park et al. Mar 2004 B2
6718388 Yarborough et al. Apr 2004 B1
6726813 Kaule et al. Apr 2004 B2
6727802 Kelly Apr 2004 B2
6732919 Macklin et al. May 2004 B2
6735695 Gopalakrishnan et al. May 2004 B1
6742125 Gabber et al. May 2004 B1
6742704 Fitzmaurice et al. Jun 2004 B2
6745938 Sullivan Jun 2004 B2
6754640 Bozeman Jun 2004 B2
6757660 Canada et al. Jun 2004 B2
6757710 Reed Jun 2004 B2
D495736 Scharf Sep 2004 S
6793131 Hogan Sep 2004 B2
6793135 Ryoo Sep 2004 B1
6802008 Ikefuji et al. Oct 2004 B1
6804786 Chamley et al. Oct 2004 B1
6805287 Bishop Oct 2004 B2
6805288 Routhenstein et al. Oct 2004 B2
6805289 Noriega et al. Oct 2004 B2
6819219 Bolle et al. Nov 2004 B1
6845906 Royer Jan 2005 B2
6856973 Bott Feb 2005 B1
6857566 Wankmueller Feb 2005 B2
6865547 Brake, Jr. et al. Mar 2005 B1
6868426 Mankoff Mar 2005 B1
6876971 Burke Apr 2005 B1
D505450 Lauer et al. May 2005 S
6895383 Heinrich May 2005 B2
6895386 Bachman et al. May 2005 B1
6895391 Kausik May 2005 B1
6901372 Helzerman May 2005 B1
6908030 Rajasekaran et al. Jun 2005 B2
6912502 Buddle et al. Jun 2005 B1
6913193 Kawan Jul 2005 B1
6928427 Rajasekaran et al. Aug 2005 B2
6931382 Laage Aug 2005 B2
6938020 Nakajama Aug 2005 B2
6938156 Wheeler et al. Aug 2005 B2
6950940 Wheeler et al. Sep 2005 B2
6956950 Kausik Oct 2005 B2
6957337 Chainer et al. Oct 2005 B1
6970830 Samra et al. Nov 2005 B1
6978369 Wheeler et al. Dec 2005 B2
6983381 Jerdonek Jan 2006 B2
6999569 Risafi et al. Feb 2006 B2
6999943 Johnson et al. Feb 2006 B1
7006992 Packwood Feb 2006 B1
7013293 Kipnis Mar 2006 B1
7020782 Rajasekaran et al. Mar 2006 B2
7031939 Gallagher Apr 2006 B1
7047222 Bush May 2006 B1
7051001 Slater May 2006 B1
7051002 Keresman, III et al. May 2006 B2
7051925 Schwarz, Jr. May 2006 B2
7051929 Li May 2006 B2
7054842 James et al. May 2006 B2
7070095 Gandel et al. Jul 2006 B1
7072864 Brake, Jr. et al. Jul 2006 B2
7072909 Polk Jul 2006 B2
7082416 Anderson Jul 2006 B2
7089503 Bloomquist et al. Aug 2006 B1
7092905 Behrenbrinker et al. Aug 2006 B2
7092916 Diveley Aug 2006 B2
7093282 Hillhouse Aug 2006 B2
7099850 Mann Aug 2006 B1
7103576 Mann Sep 2006 B2
7104443 Paul et al. Sep 2006 B1
7107249 Dively Sep 2006 B2
7111789 Rajasekaran et al. Sep 2006 B2
7140036 Bhagavatula et al. Nov 2006 B2
7143174 Miller et al. Nov 2006 B2
D533220 Graves et al. Dec 2006 S
7149899 Pinkas Dec 2006 B2
7155614 Ellmore Dec 2006 B2
7163153 Blossom Jan 2007 B2
7165049 Slater Jan 2007 B2
7167565 Rajasekaran Jan 2007 B2
7181762 Jerdonek Feb 2007 B2
D538349 Hollands Mar 2007 S
7191952 Blossom Mar 2007 B2
7195154 Routhenstein Mar 2007 B2
7216091 Blandina et al. May 2007 B1
7225155 Polk May 2007 B1
7228565 Wolff et al. Jun 2007 B2
7243839 Beck et al. Jul 2007 B2
7249092 Dunn et al. Jul 2007 B2
7249099 Ling Jul 2007 B2
7252223 Schofield Aug 2007 B2
7254560 Singhal Aug 2007 B2
D551705 Mershon Sep 2007 S
7269021 Gundlach Sep 2007 B2
7272857 Everhart Sep 2007 B1
7287695 Wankmueller Oct 2007 B2
7295999 Simon et al. Nov 2007 B1
7306141 Schwarz Dec 2007 B1
7311244 Schwarz Dec 2007 B1
7312707 Bishop et al. Dec 2007 B1
7315843 Diveley et al. Jan 2008 B2
7324972 Oliver Jan 2008 B1
7328350 Hird Feb 2008 B2
7330836 Kausik Feb 2008 B2
7346567 Weeks Mar 2008 B2
7349866 Schwarz Mar 2008 B2
7353383 Skingle Apr 2008 B2
7357331 Blossom Apr 2008 B2
7363262 Reno Apr 2008 B2
7363492 Kuhlman et al. Apr 2008 B2
7363494 Brainard Apr 2008 B2
7392222 Hamilton et al. Jun 2008 B1
7392224 Bauer et al. Jun 2008 B1
7398248 Phillips et al. Jul 2008 B2
7401731 Pletz et al. Jul 2008 B1
7418728 Jerdonek Aug 2008 B2
7427033 Roskind Sep 2008 B1
7444672 Ellmore Oct 2008 B2
7448538 Fletcher Nov 2008 B2
7454794 Hibbard Nov 2008 B1
7461028 Wronski Dec 2008 B2
7461265 Ellmore Dec 2008 B2
7472171 Miller et al. Dec 2008 B2
7480631 Merced Jan 2009 B1
7493288 Biship et al. Feb 2009 B2
7502933 Jakobsson Mar 2009 B2
7506806 Bonalle et al. Mar 2009 B2
7526449 Blossom Apr 2009 B1
7591416 Blossom Sep 2009 B2
7599856 Agrawal et al. Oct 2009 B2
7606771 Keresman, III et al. Oct 2009 B2
7707089 Barton Apr 2010 B1
7711122 Allen et al. May 2010 B2
7716484 Kaliski May 2010 B1
7747866 Everhart Jun 2010 B1
7889753 Ekbal et al. Feb 2011 B2
8032438 Barton et al. Oct 2011 B1
20010001856 Gould et al. May 2001 A1
20010002487 Grawrock et al. May 2001 A1
20010011227 Ashery et al. Aug 2001 A1
20010011243 Dembo et al. Aug 2001 A1
20010011250 Paltenghe Aug 2001 A1
20010027389 Beverina et al. Oct 2001 A1
20010027441 Wankmueller Oct 2001 A1
20010032312 Runje et al. Oct 2001 A1
20010034647 Marks et al. Oct 2001 A1
20010034682 Knight et al. Oct 2001 A1
20010034720 Armes Oct 2001 A1
20010037315 Saliba et al. Nov 2001 A1
20010044293 Morgan Nov 2001 A1
20010047332 Gonen-Friedman et al. Nov 2001 A1
20010047342 Cuervo Nov 2001 A1
20010051917 Bissonette Dec 2001 A1
20010054003 Chien et al. Dec 2001 A1
20010056398 Scheirer Dec 2001 A1
20020019793 Frattalone Feb 2002 A1
20020019803 Muller Feb 2002 A1
20020023108 Daswani Feb 2002 A1
20020026416 Provinse Feb 2002 A1
20020026418 Koppel et al. Feb 2002 A1
20020032609 Wilkman Mar 2002 A1
20020046089 Zorn Apr 2002 A1
20020046169 Keresman, III et al. Apr 2002 A1
20020046255 Moore et al. Apr 2002 A1
20020062235 Wahlbin et al. May 2002 A1
20020062279 Behrenbrinker et al. May 2002 A1
20020065712 Kawan May 2002 A1
20020065720 Carswell et al. May 2002 A1
20020069104 Beach et al. Jun 2002 A1
20020073030 Offer et al. Jun 2002 A1
20020077964 Brody et al. Jun 2002 A1
20020077978 O'Leary et al. Jun 2002 A1
20020082990 Jones Jun 2002 A1
20020091572 Anderson et al. Jul 2002 A1
20020091631 Usui Jul 2002 A1
20020091632 Turock et al. Jul 2002 A1
20020091649 Anvekar et al. Jul 2002 A1
20020095365 Slavin et al. Jul 2002 A1
20020096570 Wong et al. Jul 2002 A1
20020099586 Bladen et al. Jul 2002 A1
20020099667 Diamandis et al. Jul 2002 A1
20020104878 Seifert et al. Aug 2002 A1
20020109435 Cotton, III Aug 2002 A1
20020111886 Chenevich et al. Aug 2002 A1
20020111916 Coronna et al. Aug 2002 A1
20020116271 Mankoff Aug 2002 A1
20020116330 Hed et al. Aug 2002 A1
20020117541 Biggar et al. Aug 2002 A1
20020120627 Mankoff Aug 2002 A1
20020120642 Fetherston Aug 2002 A1
20020120846 Stewart et al. Aug 2002 A1
20020128973 Kranzley Sep 2002 A1
20020129221 Borgin et al. Sep 2002 A1
20020138418 Zarin et al. Sep 2002 A1
20020139843 Park et al. Oct 2002 A1
20020143703 Razvan et al. Oct 2002 A1
20020145039 Carroll Oct 2002 A1
20020147662 Anderson Oct 2002 A1
20020147683 Capobianco et al. Oct 2002 A1
20020147691 Davis et al. Oct 2002 A1
20020152168 Neofytides et al. Oct 2002 A1
20020156723 Lilly et al. Oct 2002 A1
20020161702 Milberger et al. Oct 2002 A1
20020165771 Walker et al. Nov 2002 A1
20020165820 Anvekar et al. Nov 2002 A1
20020169664 Walker et al. Nov 2002 A1
20020169719 Dively et al. Nov 2002 A1
20020174016 Cuervo Nov 2002 A1
20020174018 Bunger et al. Nov 2002 A1
20020174030 Praisner et al. Nov 2002 A1
20020178025 Hansen et al. Nov 2002 A1
20020178063 Gravelle et al. Nov 2002 A1
20020190123 Anvekar et al. Dec 2002 A1
20020194081 Perkowski Dec 2002 A1
20020194124 Hobbs et al. Dec 2002 A1
20020198848 Michener Dec 2002 A1
20030004828 Epstein Jan 2003 A1
20030010831 Ye et al. Jan 2003 A1
20030018613 Oytac Jan 2003 A1
20030023549 Armes et al. Jan 2003 A1
20030028518 Mankoff Feb 2003 A1
20030031321 Mages et al. Feb 2003 A1
20030033211 Haines et al. Feb 2003 A1
20030033246 Slater Feb 2003 A1
20030033257 Wankmueller Feb 2003 A1
20030034388 Routhenstein et al. Feb 2003 A1
20030037262 Hillhouse Feb 2003 A1
20030040927 Sato et al. Feb 2003 A1
20030046249 Wu Mar 2003 A1
20030053609 Risafi et al. Mar 2003 A1
20030055780 Hansen et al. Mar 2003 A1
20030055782 Slater et al. Mar 2003 A1
20030061168 Routhenstein Mar 2003 A1
20030065624 James et al. Apr 2003 A1
20030074290 Clore Apr 2003 A1
20030084002 Ericson et al. May 2003 A1
20030085272 Andrews et al. May 2003 A1
20030085286 Kelley et al. May 2003 A1
20030101119 Persons et al. May 2003 A1
20030101131 Warren et al. May 2003 A1
20030105672 Epstein et al. Jun 2003 A1
20030105714 Alarcon-Luther et al. Jun 2003 A1
20030105981 Miller et al. Jun 2003 A1
20030110111 Nalebuff et al. Jun 2003 A1
20030115452 Sandhu et al. Jun 2003 A1
20030121969 Wankmueller Jul 2003 A1
20030130940 Hansen et al. Jul 2003 A1
20030130948 Algiene et al. Jul 2003 A1
20030135453 Caulfield et al. Jul 2003 A1
20030135459 Abelman et al. Jul 2003 A1
20030135462 Brake, Jr. et al. Jul 2003 A1
20030140004 O'Leary et al. Jul 2003 A1
20030144935 Sobek Jul 2003 A1
20030149660 Canfield Aug 2003 A1
20030154125 Mittal et al. Aug 2003 A1
20030154163 Phillips et al. Aug 2003 A1
20030163403 Chen et al. Aug 2003 A1
20030163416 Kitajima Aug 2003 A1
20030172040 Kemper et al. Sep 2003 A1
20030182246 Johnson et al. Sep 2003 A1
20030187787 Freund et al. Oct 2003 A1
20030195808 Brown et al. Oct 2003 A1
20030195842 Reece et al. Oct 2003 A1
20030200143 Walker et al. Oct 2003 A9
20030200179 Kwan Oct 2003 A1
20030200180 Phelan et al. Oct 2003 A1
20030204421 Houle et al. Oct 2003 A1
20030205616 Graves Nov 2003 A1
20030213843 Jackson Nov 2003 A1
20030216965 Libman Nov 2003 A1
20030217005 Drummond et al. Nov 2003 A1
20030217329 Good et al. Nov 2003 A1
20030218062 Noriega et al. Nov 2003 A1
20030218066 Fernandes et al. Nov 2003 A1
20030222136 Bolle et al. Dec 2003 A1
20030225623 Wankmueller Dec 2003 A1
20030229525 Callahan et al. Dec 2003 A1
20030233327 Keresman, III et al. Dec 2003 A1
20030236704 Antonucci Dec 2003 A1
20040024672 Brake, Jr. et al. Feb 2004 A1
20040024693 Lawrence Feb 2004 A1
20040030626 Libman Feb 2004 A1
20040039588 Libman Feb 2004 A1
20040049455 Mohsenzadeh Mar 2004 A1
20040059952 Newport et al. Mar 2004 A1
20040064332 Zou et al. Apr 2004 A1
20040064402 Dreyer et al. Apr 2004 A1
20040088238 Gilson et al. May 2004 A1
20040093296 Phelan et al. May 2004 A1
20040093303 Picciallo May 2004 A1
20040094624 Fernandes et al. May 2004 A1
20040098351 Duke May 2004 A1
20040103431 Davenport et al. May 2004 A1
20040118914 Smith et al. Jun 2004 A1
20040128186 Breslin et al. Jul 2004 A1
20040133787 Doughty et al. Jul 2004 A1
20040153400 Burke Aug 2004 A1
20040177045 Brown Sep 2004 A1
20040193539 Sullivan Sep 2004 A1
20040199474 Ritter Oct 2004 A1
20040215507 Levitt et al. Oct 2004 A1
20040225880 Mizrah Nov 2004 A1
20040230843 Jansen Nov 2004 A1
20040232223 Beenau et al. Nov 2004 A1
20040236688 Bozeman Nov 2004 A1
20040236819 Anati et al. Nov 2004 A1
20040239481 Beenau et al. Dec 2004 A1
20040242308 Gray Dec 2004 A1
20040243498 Duke Dec 2004 A1
20040252012 Beenau et al. Dec 2004 A1
20050021353 Aviles et al. Jan 2005 A1
20050021400 Postrel Jan 2005 A1
20050021457 Johnson et al. Jan 2005 A1
20050027649 Cech Feb 2005 A1
20050035192 Bonalle et al. Feb 2005 A1
20050035847 Bonalle et al. Feb 2005 A1
20050040242 Beenau et al. Feb 2005 A1
20050071230 Mankoff Mar 2005 A1
20050071637 Shirakawa Mar 2005 A1
20050075932 Mankoff Apr 2005 A1
20050077349 Bonalle et al. Apr 2005 A1
20050077350 Courtion et al. Apr 2005 A1
20050086160 Wong Apr 2005 A1
20050091138 Awatsu Apr 2005 A1
20050091492 Benson et al. Apr 2005 A1
20050102228 Srinivasan et al. May 2005 A1
20050108152 Tsoa-Lee et al. May 2005 A1
20050114883 Nagai et al. May 2005 A1
20050116024 Beenau et al. Jun 2005 A1
20050119979 Murshita et al. Jun 2005 A1
20050121512 Wankmueller Jun 2005 A1
20050125295 Tidwell et al. Jun 2005 A1
20050127164 Wankmueller Jun 2005 A1
20050137977 Wankmueller Jun 2005 A1
20050167488 Higgins et al. Aug 2005 A1
20050171842 Tien et al. Aug 2005 A1
20050171898 Bishop et al. Aug 2005 A1
20050171905 Wankmueller et al. Aug 2005 A1
20050179251 Wagoner et al. Aug 2005 A1
20050189427 Brown et al. Sep 2005 A1
20050193208 Charrette, III et al. Sep 2005 A1
20050199705 Beck et al. Sep 2005 A1
20050206499 Fisher Sep 2005 A1
20050216888 Drummond et al. Sep 2005 A1
20050234771 Register et al. Oct 2005 A1
20050269396 Schofield Dec 2005 A1
20050289044 Breslin et al. Dec 2005 A1
20050289052 Wankmueller Dec 2005 A1
20060005039 Hsieh Jan 2006 A1
20060020559 Steinmetz Jan 2006 A1
20060026092 Klein et al. Feb 2006 A1
20060031174 Steinmetz Feb 2006 A1
20060036553 Gupta et al. Feb 2006 A1
20060039733 Meyerhofer Feb 2006 A1
20060047573 Mitchell et al. Mar 2006 A1
20060047589 Grau Mar 2006 A1
20060074794 Nespola, Jr. Apr 2006 A1
20060081700 Li Apr 2006 A1
20060085334 Murphy Apr 2006 A1
20060106696 Carlson May 2006 A1
20060116903 Becerra Jun 2006 A1
20060116955 Strayer et al. Jun 2006 A1
20060122918 Graboske et al. Jun 2006 A1
20060131869 Brignull Jun 2006 A1
20060157557 Lee et al. Jul 2006 A1
20060224480 Bent et al. Oct 2006 A1
20060242057 Velarde Oct 2006 A1
20060249574 Brown et al. Nov 2006 A1
20060251478 Desmeules Nov 2006 A1
20060259766 Rasti Nov 2006 A1
20060261927 Kelly et al. Nov 2006 A1
20060269061 Balasubramanian et al. Nov 2006 A1
20060282382 Balasubramanian et al. Dec 2006 A1
20060289636 Hoblit Dec 2006 A1
20070034700 Poidomani et al. Feb 2007 A1
20070063025 Blossom et al. Mar 2007 A1
20070067827 Bhagavatula et al. Mar 2007 A1
20070118436 McDowell May 2007 A1
20070118470 Warren et al. May 2007 A1
20070136211 Brown et al. Jun 2007 A1
20070180491 Mevissen Aug 2007 A1
20070208671 Brown et al. Sep 2007 A1
20070215688 Routhenstein Sep 2007 A1
20070239622 Routhenstein Oct 2007 A1
20070265924 Schwarz, Jr. Nov 2007 A1
20070290034 Routhenstein Dec 2007 A1
20080005018 Powell Jan 2008 A1
20080027841 Eder Jan 2008 A1
20080029607 Mullen Feb 2008 A1
20080035738 Mullen Feb 2008 A1
20080046263 Sager Feb 2008 A1
20080054068 Mullen Mar 2008 A1
20080054079 Mullen Mar 2008 A1
20080054081 Mullen Mar 2008 A1
20080065555 Mullen Mar 2008 A1
20080154770 Rutherford Jun 2008 A1
20080177659 Lacey et al. Jul 2008 A1
20080230600 Black et al. Sep 2008 A1
20080281722 Balasubramanian et al. Nov 2008 A1
20080288396 Siggers et al. Nov 2008 A1
20080302869 Mullen Dec 2008 A1
20080302876 Mullen Dec 2008 A1
20090048972 Bierer et al. Feb 2009 A1
20090100508 Labaton Apr 2009 A1
20090119205 Keresman, III et al. May 2009 A1
20090185687 Wankmueller Jul 2009 A1
20090265275 Everhart et al. Oct 2009 A1
20090265460 Balasubramanian et al. Oct 2009 A1
20090271853 Everhart et al. Oct 2009 A1
Foreign Referenced Citations (33)
Number Date Country
2293321 Dec 1998 CA
197 31 293 Jan 1999 DE
0 590 861 Apr 1996 EP
0843292 May 1998 EP
0855659 Jul 1998 EP
0959440 Nov 1999 EP
0 884 877 Dec 1999 EP
2275654 Sep 1994 GB
2376787 Dec 2002 GB
2377071 Dec 2002 GB
2377314 Jan 2003 GB
WO 9116691 Oct 1991 WO
WO 9608783 Mar 1993 WO
WO 9308545 Apr 1993 WO
WO 9429112 Dec 1994 WO
WO 9741673 Nov 1997 WO
WO 9837524 Aug 1998 WO
WO 9859307 Dec 1998 WO
WO 9905633 Feb 1999 WO
WO 9954841 Oct 1999 WO
WO 0062458 Oct 2000 WO
WO 0118699 Mar 2001 WO
WO 0169347 Sep 2001 WO
WO 0169347 Sep 2001 WO
WO 0169347 Sep 2001 WO
WO 0188659 Nov 2001 WO
WO 2005043277 May 2005 WO
WO 2005101975 Nov 2005 WO
WO 2006060370 Jun 2006 WO
WO 2006081525 Aug 2006 WO
WO 2006105092 Oct 2006 WO
WO 2006116772 Nov 2006 WO
WO 2008021382 Feb 2008 WO
Non-Patent Literature Citations (176)
Entry
5500—FDIC General Counsel's Opinion No. 8—Stored Value Cards, 61 Fed. Reg. 40490, http://www.fdic.gov/regulations/laws/rules/5500-500.html, Aug. 2, 1996.
Song, A Card That Asks for ID, Time Magazine, Apr. 12, 2004, 1 page.
A Store Card Issuer Looks for Lift from Electronic Gift Certificates, Credit Card News, Feb. 1, 1995, 2 pages.
Claessens, et al., A Tangled World Wide Web of Security Issues, First Monday, retrieved from the internet at http://www.firstmonday.org/issues/issue7—3/claessens, retrieved from the internet on Oct. 6, 2006.
Hotchkiss, ATM's at the head of their class, Bank Marketing, vol. 29, No. 3, Mar. 1997, pp. 26-32.
Edwards, ATMs The Hot New Media Buy, ABA Banking Journal, Mar. 1999, pp. 58, 60.
American Express Incentive Services, Incentive, Sep. 1996, p. 126.
Fickenscher, Amex Prepaid Offering is Latest Card for Firms Regarding Employees, American Banker, vol. 161, No. 151, Aug. 8, 1996, pp. 1-2.
Neumann, An Enhanced Neural Network Technique for Software Risk Analysis, IEEE Transactions on Software Engineering, vol. 28, No. 9, Sep. 1, 2002, pp. 904-912.
Associates First Capital Corporation, Hoover's Inc., The Industry Standard: The Newsmagazine of the Internet Economy, thestandard.net/companies/company-display, Apr. 6, 1999.
Award Card Comparison, JA7922.
Brehl, Banks issue cash-card pledge, The Toronto Star, Oct. 9, 1997, 1 page.
Block, Valerie, Blockbuster running test of a stored value card, The American Banker, Sep. 1, 1995.
Meece, Boatman's Prepaid Cards for Worker-Incentive Firm, American Banker, Jul. 2, 1996, p. 12.
Boatmen's Floats Stored Value into the Employee Incentive Waters, Debit Card News, vol. 2, Issue 2, Jul. 16, 1996, 3 pages.
CES/NaBANCO introduces stored value card technology blockbuster video is first merchant partner, Business Wire, Inc., Jan. 15, 1996.
Card Based Award Systems, JA8309.
CardEx Incentives, www.cardex.com, Apr. 6, 1999.
CardFlash, Apr. 5, 2005.
Vandenengel, Cards on the Internet: Advertising on a $3 Bill, Industry Intelligence, Feb. 1, 1995, pp. 46-48.
Kutler, Cash Card Creator Looking Beyond Mondex, Feb. 9, 1995.
Rosen, Cash Just Isn't Flexible Enough: Shops of the Future Will Only Take Cards, Daily Express, Technology Section, Feb. 10, 1995, 1 page.
Bank, Cash, Check,Charge—What's Next?, Seattle Times, Mar. 6, 1995.
Morgan et al., Categorizing Risks for Risk Ranking, vol. 20, No. 1, Jun. 22, 2005, pp. 49-58.
Common electronic purse specifications, Business Requirements, Version 6.0, Dec. 1998.
Guidotti, Comparing Environmental risks: A Consultative Approach to Setting Priorities at the Community Level, Public Health Rev 1994, vol. 22, Jun. 16, 2005, pp. 321-337.
Britt, Competing in Auto Lending, America's Community Banker, vol. 5, No. 11, Nov. 1, 1996, pp. 33-37.
Consortium created to manage common electronic purse specification, Cardtech Securtech, Chicago, www.visa.com/av/news/PRmisc051199.vhtml, May 11, 1999.
Hight, Jim, Consulting Services, www.strategies-tactics.com.
Mobasher et al., Creating Adaptive Web Sites Through Usage-Based Clustering of URLs, Knowledge and Data Engineering Exchange Workshop, Chicago, IL and Los Alamitos, CA, 1999, pp. 19-25.
Lamond, Credit Card Transactions Real World and Online, Paying by Credit Card-Real World and Online, http://www.virtualschool.edu/mon/ElectronicProperty/klamond/credit, printed Jul. 8, 2005, 17 pages.
D.C. Area Safeway Stores Look for Increase in Sales Volume and Revenue with Cards, Card News, vol. 6, No. 25, Dec. 30, 1991, pp. 7-9.
Piskora, Debit Cards Seen Poised for New Markets, American Banker, Credit/Debit/ATMs, Mar. 7, 1995, p. 16.
Definition of Store-Value Card, Wikipedia, retrieved from the internet at http://en.wikipedia.org/wiki/Stored-value—card, retrieved from the internet on Apr. 16, 2007.
E-Z Pass, Web page, http://www.ezpass.com-Disc—portNewYork.html, Nov. 12, 2001.
E-Z Pass, Web page, http: \ \www.ezpass.com-Disc—ny—annual.html, Nov. 12, 2001.
E-Z Pass, Web page, http: \ \ www.ezpass.com-frameMain.html, Nov. 12, 2001.
E-Z Pass, Web page, http: \ \www.ezpass.com-whatis.html, Nov. 12, 2001.
Eight Keys to Making the Right Choice, Incentive, Dec. 1996, 9 pages.
D. O'Mahony, Electronic Payment System, 1997, Artech House, XP002137255, p. 7-11.
Business Times, Electronic Purse Can Free You from ATM Drag, Business Times, www.btimes.co.za, printed Feb. 23, 2001, 1 page.
Electronic Purse, SCIA (Smart Card Industry Association), About Smart Cards, www.scia.org, printed Feb. 23, 2001, 1 page.
Sanchez-Klein, Electronic purse alliance planned, Computerworld Online News, Jul. 29, 1998, printed Feb. 23, 2001, 2 pages.
Electronic purse card to be launched tomorrow, New Straits Times, News Clippings, Sep. 18, 1999, printed Feb. 23, 2001, 3 pages.
Exclusively Yours From Maritz . . . The MasterCard Card Ultimate Incentive, Incentive, Oct. 1995, 3 pages.
Block, First Data Subsidiary Creates Payroll Card for the Bankless, LexisNexis Academic, Credit/Debit/ATMs, p. 10, Mar. 21, 1997.
First Data markets stored-value cards, Cards International, Jan. 30, 1996, p. 5.
First USA—Activate Today and Get One Hour Free Calling Card Calls, Call 1-800-555-2535, First USA, 6 pages.
First USA—Call 1(800)335-2453 to Receive One Free Hour of Domestic Long Distance Calling (No Strings Attached), First USA, 6 pages.
First USA Platinum Connect, First USA Bank, First USA Promotional Mailing, Oct. 1997, 6 pages.
First Union Issues Smart Cards to Fort Benning Recruits, CardFax, vol. 1999, No. 60, Mar. 26, 1999, 1 page.
Norris, First data unit develops blockbuster cash card, Omaha World Hearld Sunrise Edition, Business Section, Jan. 19, 1996, p. 16.
Frequently asked questions, ECARD, www.eregard.com, printed Sep. 23, 2001, 7 pages.
Glossman, et al.,, Glossman, et al., Citicorp Company Report, Report No. 1647151, p. 8 of 16.
Here's the calling convenience you asked for: 1-800-call-ATT . . . For All Calls, AT&T, Appendix A: for Card Carriers, 1999, 7 pages.
Hamey, Kenneth, Home Asset Management Accounts Link Mortgages Equity Lines.
Hoovers, General Mills, Inc. Corporate Profile relied upon to show the history of the company, http:/cobrands.hoovers.com/global/cobrands/proquest/history.xhtml?COID=10639, Jul. 12, 2005, 2 pages.
How Is It Different?, JA8331.
Konrad, IBM Had a Bunch of Unusual Ideas in 2003, www.philly.com, printed Jan. 21, 2004, posted on Jan. 13, 2004, 2 pages.
Incenticard, Bellsouth, JA8329.
Judy Quinn, Incentive Cards Explained, Incentive, Dec. 1995, 5 pages.
Incentive Firms Find Debit Cards a Rewarding Experience (Off-line debit card issuers converge efforts with companies looking for effective incentives to boost employee productivity and to motivate individuals to buy their products), Debit Card News, Vol.
Incentive gift Card: Another way to give the gift of choice!, Incentive, Aug. 1995, 2 pages.
Coulton, Incentives Field Moving to Card-Based Series 14, American Banker, Mar. 26, 1998, 3 pages.
Introducing SpendingMoney(TM), Armetta: Marketing & Design Product Concept Report, Oct. 9, 1996, 15 pages.
Introducing the First USA Platinum Connect Card, First USA Promotional Mailing, Dec. 1997, 2 pages.
Key Bank Holiday Offer, http://www.key.com/swiftgift/home.html, printed Apr. 5, 1999.
LexisNexis Academic, Debit Card Innovation, vol. XXXV, No. 5, p. 2, May 1997.
LexisNexis Academic, Debit Cards: Payroll Card Ups Fees, Future Banker, p. 18, Oct. 6, 1997.
LexisNexis Academic, NTS' TransPay Debit Card Helps Remote and Unbanked Employees Get Funds Quicker, Financial News, Mar. 18, 1997.
O'Conner, Maritz Gets MasterCard's Stamp of Approval, Business Travel News, Aug. 19, 1996, 2 pages.
Maritz, Incentive, Jun. 1996, p. 111.
Meridian Award Cards, JA8251.
Meridian—the leader in card marketing, JA8343.
Meridicard vs. Debit Cards, JA7917.
Clark, Microsoft, Visa to Jointly Develop PC Electronic-Shopping Software, The Wall Street Journal, Nov. 9, 1994, WSJ B9.
More Retailers Turn to Co-Branding, Chain Store Age Executive with Shopping Center Age, Feb. 1, 1995, 3 pages.
Bogle, Mutual Funds at the Millennium: Fund Directors and Fund Myths, The Vanguard Group to the '40 Act Institute of PLI (Practicing Law Institute), New York, NY, May 15, 2000, 15 pages.
New 1-800-CALL-ATT Campaign Promotes One Number for All Calls, AT&T Marketing, News Release, www.att.com/press/0297/970217.csa.htm, Feb. 17, 1997, 2 pages.
Schwab, Charles, Now 7 Ways for a better Total Return for Your Money; Schwat 1, The Inventor's Asset Management Account, Charles R. Schwab, Charles Schwab & Co., Inc., 16 pages.
Allen et al., Overview of Smart Cards and the Industry, Smart Cards: Seizing Strategic Business Opportunities, Chapter 1, p. 2-20, Irwin Professional Publishing, 1997.
Dugas, Payroll May Ask: Paper or Plastic?, USA Today, 3B, Aug. 14, 2001, 1 page.
Proton world and Europay to co-operate in creation of new CEPS-compliant e-purse application, Press Release 1999, Waterloo, Belgium, Jun. 28, 1999, 2 pages.
Brown et al., Purchasing Card Magic: Eli Lilly Finds Accounts Payable Flying High With Plastic, Corporate Cashflow, vol. 15, No. 12, Nov. 1994, 2 pages.
Purse Application for Cross Border Use in Euro, Cordis, Pace 1st 1999-11531 Pace, www.cordis.lu, printed Feb. 23, 2001, 3 pages.
SK100 Smart Card Electronic Purse Balance Reader, SK100 Balance Reader, http://perso.wanadoo.fr, printed Feb. 23, 2001, 1 page.
Souccar, Smart Cards: 1st Union Smart Card Pilot Enlists a Second Army Base, American Banker, Digital Frontiers, vol. 164, No. 61, Mar. 31, 1999, 3 pages.
Smart Cards: Big Brother's Little Helpers, The Privacy Committee of New South Wales, No. 66, Aug. 1995.
Smart card for loyalty and e-purse applications eclipses capability of conventional mag-stripe cards, Press Release, www.1.sib.com, Apr. 21, 1997, printed Feb. 23, 2001, 3 pages.
SmartAxis: Load Cash on to your E-Purse Card, Supported Currencies and Schemes, www.smartaxis.co.uk, printed Feb. 23, 2001, 9 pages.
Spurgin, Sopininmon! or What's Happening in the Retail Credit Card Environment, Credit World Journal, vol. 85, No. 4, Mar. 1, 1997, pp. 20-23.
Lacker, Stored Value Cards: Costly Private Substitutions for Government Currency, Economic Quarterly, 1996, Economic Quarterly, v82, n3, p1 (25), ISSN: 1069-7225, 17 pages.
Lazarony, Stuck for a gift? Give a prepaid credit card, www.bankrate.com, Dec. 21, 1998, 1 page.
Rossman, Kenneth, Summary Appraisal of Real Property.
Key, Swift Gift ‘Wows’ Internet Shoppers, PR Newswire, www.key.com/swiftgift/home.html, Dec. 2, 1998,1 page.
The Campus Card Conundrum, Card Technology, Journal ISSN: 1093-1279, p. 25+, Feb. 1998, pp. 1-8.
Electronic Purse Reaches the Car Park, http: \\docs.vircom.net/mobility/parking, printed Feb. 23, 2001, 2 pages.
The Evolution of a New Consumerism, Chain Store Age, vol. 73, Jun. 1997, pp. 8-9.
The Federal Transit Administration, TCRP Report 32 Multipurpose Transit Payment Media, Chapter 2 Multipurpose Fare Payment: Overview, p. 10-20.
Stoughton, The Gift of Credit, www.washingtonpost.com/wp-srv/business, Dec. 14, 1998.
Nora Wood, The Power of the Card, Incentive, Jul. 1997, 6 pages.
Stuber, The electronic purse: An overview of recent development and issues, Bank of Canada, Technical Report No. 74, www.bankofcanada.ca, Jan. 1996, printed Feb. 23, 2001, 2 pages.
Understanding the benefits: Smartcity offers a number of important benefits to both the card issuers and their customers, http://www.icl.com/smartcards/benefits.htm, printed Feb. 27, 2001, 2 pages.
Langheinrich et al., Unintrusive Customization Techniques for Web Advertising, Computer Networks, vol. 31, 1999, pp. 1259-1272.
Universal Card free lifetime membership extended 3 months, AT&T Marketing, www.att.com/press/0297/970217.csa.html, Dec. 4, 1990, 2 pages.
Visa Cash—Where can I get it?, www.visa-asia.com/pd/cash/where.html, Feb. 23, 2001.
Visa Cash, www.visa-asia.com/pd/cash/main.html, Feb. 23, 2001.
Visa International and Sermepa Announce Plans for Cross Border Visa Cash Based on CEPS, www.visa.com/av/news/praaamisc111699.vhtml, Nov. 16, 1999.
Visa first to launch electronic purse load via GSM mobile phone, www.cellular.co.za, Johannesburg, ZA, printed Feb. 23, 2001, 4 pages.
Visa releases visa cash electronic purse specifications based on CEPS, www.visa.com/avinews/PRaamisc042099.vhtml, San Francisco, Apr. 20, 1999.
Welcome to Card Express CardEx, CardEx website archived by web.archive on Oct. 31, 1996, http://web.archive.org/web/*/http://www.cardex.com, retrieve Oct. 18, 2003, 7 pages.
Welcome to Card Express, The CardEx Incentive Card, as disclosed in the CardEx web site archived by web.archive.org on Feb. 7, 1998, http://web.archive.org/web/*/http://www.cardex.com, retrieve Oct. 18, 2003, 8 pages.
Swiftgift, Welcome to Swiftgift, www.swiftgiftcard.com, Dec. 8, 1998, 10 pages.
Wells Fargo Blazes New Trail for Homeowners.
Kenneth Hein, What's the Deal?, Incentive, Jul. 1998, 7 pages.
“Caesar Cipher,” Answers.com, http://www.answers.com/topic/caesar-cipher (9 pages).
“Daily Payment Card News,” CardFlash at CardWeb.com, Oct. 13, 2005 (3 pages).
“Handy future for online security,” BBC News, Oct. 17, 2002 (2 pages).
“Online Fraud,” CardFlash, Apr. 26, 2005 (1 page).
“Paypal sells anti-fraud token,” CardLine, Feb. 12, 2007 (1 page).
“Visa takes step with digital display card,” CardLine, Dec. 5, 2006 (1 page).
“Web of Deceit,” Analysis: Finextra Research, Mar. 11, 2005 (2 pages).
A Case Study of Authenticated and Secure File Transfer the Iowa Campaign Finance Reporting System (1997).
Abstract to 2007 JPMorgan Chase Disaster Response Card National Strategy Plan Abstract, Jan. 20, 2007.
American Express and Starwood Launch The New Starwood Preferred Guest SM Credit Card from American Express, Jun. 19, 2001.
Authorization of Financial Agent and Terms of Performance, Debit Card Application for Houston, Texas, Sep. 1991, acs00277412.
Coca-Cola ATM Money Cards, ACS 012, Apr. 8, 2009.
Crawford, J. “Paying with RFID, Smart Cards, and Biometrics,” 2002 (4 pages).
Dam, K. et al. “Cryptography's Role in Securing the Information Society,” Committee to Study National Cryptography Policy, National Research Council 1996 (24 pages).
Debit and Stored Value Cards for Government: A Growing Trend but States Could Do More, A Survey and White paper of The EBT Industry Council, Nov. 2006.
Debit Card News—Paperless Trail Leads Debit to a Check-Free Payroll Program, vol. 3, No. 12, Dec. 16, 1997.
Debit Card Services—Invitation for Expressions of Interest, Jul. 1991, acs00277422.
Digital Signatures—An Overview pp. 87-94 (1979).
Direct Payment Card, International EBT Pilot Evaluation Pilot Evaluation—Argentina, Jan. 1996, acs00277456.
Electronic Payment System, 1997, Artech House, XP002137255, p. 7-11.
Evers, J. “A password for your credit cards,” CNET news, Aug. 2, 2006 (2 pages).
Frank, Beyond Direct Mail, Credit Card Management, vol. 9, Issue 5, Aug. 1996, 4 pages.
Gallant, The Hartford Offers Quick Claim Payment Solution for Customers in Katrina's Path, Sep. 15, 2005.
Gamble, R. “There's a New Wildcard for Payables,” Treasury & Risk Management, Sep. 2006 (3 pages).
Graham-Rowe, D. “Security hole closes Microsoft Passport” Nov. 2001 (1 page).
Hansell, Visa to unveil electronic purse cards, New York Times, printed Feb. 23, 2001, 2 pages.
Image-based transaction processing the banking industry's challenge for the 1990s and beyond (1989) acs01039270.
Incentive Cards Explained, Incentive, Dec. 1995, 5 pages.
Information Processor Personal Computer PC has Message Display Unit Which Displays Message Stored in Help Table Corresponding to Indicated Button When Event Process Unit Detects that there is Indication to Button Selected to Override, Aug. 29, 1997.
Innovative Credit Card Fashions Take Hold Customized Plastic Good for Firms but Users Should Beware, Jun. 13, 1996.
Jazzy Jeff, Credit Card Commentaries cardoffers.com (2003).
Kennell, R., “Establishing the Genuinity of Remote Computer Systems,” 12th USENIX Security Symposium, Aug. 2003, pp. 295-310 (17 pages).
Kilian-Kehr, Mobile Security with Smartcards, Dissertation, Apr. 8, 2002.
Kingson, J., “Banks test ID device for online security,” The New York Times, Dec. 23, 2004, (3 pages).
Kiwi Card Converts Unlikely to Lead Smart Revolution Little Support for Changes to Risk Allocation, Apr. 25, 2000.
Kmart Mastercard—cardweb.com (2000).
Lemos, R. “Two-factor authentication won't stop ID theft,” silicon.com, Mar. 16, 2005 (2 pages).
Machlis, Have it the smart way: Burger King program drives smart-card use, Computerworld, printed Feb. 23, 2001, 1 page.
MailFrontier Survey Finds that Consumers Hold Financial Institutions Accountable for Online Identitiy Theft, www.mailfrontier.com, Palo Alto, CA, Nov. 2004.
McIellan, V. “Re: Token based OTP: SafeWord or SecurID?” Dec. 6, 2000 (6 pages).
Miller, Section E.2.1: Kerberos Authentication and Authorization System, Project Athena, Cambridge, MA, Dec. 21, 1987, 39 pages.
Nora Wood, Corporate Spotlight, Incentive, Dec. 1997, 4 pages.
Overview of Smart Cards and the Industry, Smart Cards Seizing Strategic Business Opportunities, Chapter 1, p. 2-20, Irwin Professional Publishing, 1997.
Paper or Plastic? With these three incentives, The Choice is Yours, Incentive, Feb. 1996, 2 pages.
Price, Joanne et al. U.S. Appl. No. 60/133,577, filed May 11, 1999.
Rankl, Smart Card Handbook, Second Edition (1999).
Schwartz, J., “Graduate Cryptographers Unlock Code of Thiefproof Car Key,” The New York Times, Jan. 29, 2005, (3 pages).
Shankar, U., et al. “Side effects are not sufficient to authenticate software,” 13th USENIX Security Symposium, Aug. 2004, pp. 89-101 (13 pages).
Stiffened Card with Integrated Circuit, Aug. 1986.
The Power of the Card, Incentive, Jul. 1997, 6 pages.
Vincent Alonzo, Incentive Marketing . . . Three if by Smart Card, Incentive Sep. 1995, p. 11.
ViVOtech, Inc. RF-Based Contactless Payment a more convenient way to pay, Apr. 2004.
Wenninger et al., The Electronic Purse, Current Issues in Economics and Finance, vol. 1, No. 1, Apr. 1995, acs00098037.
Youll, Peer to Peer Transactions in Agent Mediated Electronic Commerce, Aug. 10, 2001.
Zdancewic, S. et al. “Secure Program Partitioning” Computer Science Department, Cornell University, Oct. 18, 2001 (35 pages).
Webster's Third International Dictionary, Unabridged, Merriam Webster, Inc., 1993. Retrieved Online Apr. 2009 at: http://lionreference.chadwyck.com/searchFulltext.do?id=17982789&idType=offset&divLevel=2&queryId=../session/1239138092—7973&area=mwd&forward=refshelf&trail=refsh.
Collins English Dictionary. London: Collins 2000, Credo Reference Online, Retrieved on Apr. 3, 2009 at: http://www.credoreference.com/entry/2668411.
Webster's Third International Dictionary, Unabridged, Merriam Webster, Inc., 1993. Retrieved Online Apr. 2009 at: http://lionreference.chadwyck.com/searchFulltext.do?id=35018654&idType=offset&divLevel=../session/1238803679—11620&area=mwd&forward=refshelf&trail=refsh.
Collins English Dictionary, London: Collins (2000) Credo Reference, Retrieved Online Apr. 2009 at: http://www.credoreference.com/entry/2668579.
Webster's Third International Dictionary, Unabridged, Merriam Webster, Inc., 1993. Retrieved Online Apr. 2009 at http://lionreference.chadwyck.com/searchFulltext.do?id=35018654&idType=offset&divLevel=2&queryId=../session/1238803679—11620&area=mwd&forward=refshelf&trail=refsh.
Collins English Dictionary, London: Collins (2000) Credo Reference, Retrieved Online Apr. 2009 at: http://www.credoreference.com/entry/2645829/.
Related Publications (1)
Number Date Country
20090271853 A1 Oct 2009 US
Continuations (1)
Number Date Country
Parent 10419107 Apr 2003 US
Child 12495006 US
Continuation in Parts (1)
Number Date Country
Parent 10105471 Mar 2002 US
Child 10419107 US