The present disclosure relates generally to transaction security and, more specifically, to exemplary systems, methods, and computer-accessible mediums for using a transaction card to carry out a challenge response security protocol.
The development of electronic commerce has led to the convenience of consumers and businesses alike. Transactions may be conducted between and among parties from virtually any location and at any time. Use of cards such as credit and debit cards has enhanced the ability to conduct transactions over networks, as consumers may engage in purchase transactions, or conduct other business, merely by providing credentials including a name, a card number, and other data such as, for example, a card expiration date, a card security code, or a billing zip code.
But the increasing use of cards has also resulted in increased risk of fraud or theft. Despite efforts to make card-based transactions more secure, smart cards and other devices may often be vulnerable to replay attacks in which card and/or transaction information is intercepted and subsequently used in a fraudulent manner to carry out additional transactions.
An illustrative aspect of the invention provides a method of communicating with a transaction card having a card data processor, a near card field communication (NFC) interface, and a card memory having a unique card identifier stored therein. The method comprises establishing, by a user communication device, a first NFC session with the transaction card and transmitting, by the user communication device to the transaction card, an NFC data exchange format (NDEF) WRITE TAG command including session-specific; challenge information. The method further comprises transmitting, by the user communication device to the transaction card, an NDEF READ TAG command and receiving, by the user communication device from the transaction cant card-specific challenge response information. The method also comprises authenticating the transaction card using the challenge response information.
Another aspect of the invention provides a user communication device comprising a communication device data processor and an NFC interface in communication with the data processor. The NFC interface is configured for communication with one or more transaction cards. The user communication device further comprises a communication device memory accessible by the data processor and containing a card communication application with instructions to be carried out by the data processor. The communication application is configured to establish a first NEC session with a transaction card, and transmit, to the transaction card, an NDEF WRITE. TAG command including session-specific challenge information. The application is further configured to transmit, to the transaction card, an NDEF READ TAG command, receive, from the transaction card, card-specific challenge response information, and authenticate the transaction card.
Another aspect of the invention provides a transaction card comprising a card microprocessor, a near field communication (NFC) interface, and a card memory having a card identifier and one or more applets stored therein. The one or more applets include instructions for the card microprocessor to receive, from a user communication device via the NFC interface, an NDEF WRITE TAG command including challenge information and generate a digital signature using the challenge information. The one or more applets include further instructions to receive, from the user communication device via the NFC interface, an NDEF READ TAG command, and transmit, to the user communication device, the digital signature.
The following description of embodiments provides non-limiting representative examples referencing numerals to particularly describe features and teachings of different aspects of the invention. While the invention will be described in connection with particular embodiments and environments, it will be understood that the invention is not limited to these embodiments and environments. On the contrary, it is contemplated that various alternatives, modifications and equivalents are included within the spirit and scope of the invention as described. Further, the embodiments described should be recognized as being capable of separate implementation or of combination with other embodiments.
As used herein, the term “transaction card” refers to any identification or payment card associated with a user or user account. This may include, in particular, a credit card, debit card, or gift card, any of which may be issued by a service provider. Smart transaction cards are often used to carry out transactions through near field communication (NFC) or brief contact communication (e.g., “tapping”) with transaction processing devices. Because of inherent limitations in the transaction processing device, such cards may not be suitable for use in authentication, except as part of a low-level protocol.
The present invention provides an approach that enhances the value of a smart transaction card in carrying out a multi-factor security protocol. This approach involves a challenge response protocol that makes use of a user processing device's ability to transmit NFC data exchange format (NDEF) WRITE and READ commands to the transaction card. In methods of the invention, the user may establish an NFC communication session between the transaction card and the user device (e.g., by tapping or otherwise bringing the user device within communication range of the card). The user device transmits a WRITE NDEF to the transaction card. The transaction card reads the information from the WRITE command and uses it to create a digital signature. The user device then transmits a READ NDEF command to the transaction card, whereupon the transaction card transmits the digital signature to the user device. The signature may be accompanied by a certificate signed by a trusted authority. The user device may then itself validate the card signature or may pass the signature to a validation system. In either case, validation of the signature could be used for authentication of the presence of the transaction card and/or as an authentication factor in a multi-factor authentication of the user.
In some embodiments of the invention, the user communication device may be a merchant terminal or other device configured for carrying out financial and other transactions. Such merchant devise may be specifically configured for carrying out transactions based on an account associated with the transaction card and/or the transaction card administrator or processor. In other embodiments of the invention, the user communication device may be a mobile device, which may be associated with a user who is a holder of an account associated with the transaction card.
At S110 of the method M100, an NFC communication session is initiated between the user communication device and the transaction card. This will typically be accomplished by tapping the card to the user communication device or otherwise bringing the card to within NFC communication range of the user communication device. The action of initiating the NFC session may be taken as part of a purchase or other transaction that involves an account associated with the transaction card. In some embodiments, however, the action may be taken as part of an authentication or authorization protocol in conjunction with a transaction that does not otherwise involve an account associated with the transaction card. For example, a purchase may be made from a merchant using another card. The merchant may require authentication of the user/account holder using the smart transaction card, whereupon NFC communication can be established between a merchant terminal and the transaction card.
In some embodiments, the action of establishing NFC communication may be carried out in response to receiving an authentication request from a transaction processing server or authentication server. Such a request may, may be transmitted by the server in response to a request to carry out a transaction requiring verification of the presence of the transaction card or otherwise requiring authentication of the transaction card or the user. Upon receiving the authentication request, the user communication device may display or otherwise convey an instruction to initiate NFC communication with the transaction card.
In embodiments of the invention, the user communication device may include an application for transmitting standardized NDEF messages for communication with NFC-enabled devices. Such methods are used, in particular, for communication with standardized tags (e.g., Radio Frequency Identification (RFID) tags) and include “WRITE TAG” commands for assigning information to a tag and “READ TAG” commands for reading information from a tag. At S120 of the method M100, the user communication device transmits a WRITE TAG command to the transaction card. The WRITE TAG command includes challenge information for use by the transaction card in generating a challenge response. The challenge information may be or include information that is unique to the NFC session. This may include, for example, a one-time, random or pseudo-random or otherwise unpredictable number. The challenge information may be generated by the user communication device or by a requesting processing or authentication server. In some embodiments, the challenge information may be included in an authentication request received by the user communication device from a processing or authentication server. In other cases, the user communication device may transmit NFC session information to a requesting server and receive session-specific challenge information in return.
The user communication device transmits a READ TAG command to the transaction card at S130, and, at S140, receives a transmitted READ TAG response from the transaction card. In some embodiments of the invention, the READ TAG command must be sent to the transaction card within the same NFC communication session as the WRITE TAG command. In such embodiments, termination of the NFC session prior to the READ TAG command would result in termination without authentication of the transaction card. In these circumstances, card authentication would require a new NFC session and new challenge information. In other embodiments, however, the method M100 may include termination of the NFC session (e.g., by removal of the transaction card from NFC communication range) and initiation of a second NFC communication session prior to the action of transmitting the READ TAG command. In some embodiments, such termination and re-initiation of NFC communication may be an allowable occurrence while in others, it may be required.
Whether a single NFC session or multiple sessions are used, the method M100 may include a time limit for transmitting the READ TAG command. This time limit may be based on a predetermined maximum time interval between the transmitting of the WRITE TAG command and the transmitting of the READ TAG command. In embodiments where multiple NFC sessions are allowed or required, a maximum time interval between termination of the first session and initiation of the second session may be specified.
The READ TAG response includes challenge response information that is unique to the transaction card. This may include, for example, a card identifier. The challenge response information may be or include information that is generated by the transaction card's data processing chip using information that is permanently assigned and/or wired into a memory of the transaction card. In particular embodiments, the challenge response information may include information that is encrypted by the card data processing chip. The challenge response information may also include a digital authentication certificate from a trusted source. Such a certificate may be used as a public key in encrypting and decrypting the challenge response information.
At S150, the transaction card is authenticated using the challenge response information. In some embodiments, the authentication action may be carried out entirely by the user communication device. This may include comparing card-unique information to previously stored card information. Alternatively or in addition, authentication may include decrypting information encrypted by the transaction card data processor. Successful decryption would indicate a positive authentication of the transaction card. The foregoing approach may require, however, that one or more private encryption keys stored in the transaction card memory would also need to be available to the user communication device. To avoid this requirement, in some embodiments, the user communication device may transmit some or all of the challenge response information to an authentication-requesting server or directly to an authentication server having access to card-specific encryption keys. In such embodiments, the user communication device may receive back an authentication response indicating that the transaction card has been authenticated or that authentication failed.
In embodiments where authentication is carried out by the user communication device, the method M100 may further include transmitting the results of the authentication to a requesting processing server or authentication server.
At S230, the card data processor uses the challenge information to generate a challenge response. The challenge response information may be or include a card-unique and/or session-unique signature. In particular embodiments, the signature may be or include information from the challenge information that has been encrypted by the card processor using one or more card-unique encryption keys. A public key (e.g., a trusted source certificate) may also be used in the encryption. The challenge response may also include a card identifier and/or a public key used in the encryption of challenge information.
The card data processor receives a READ TAG command from the user communication device via the card NFC interface at S240 and transmits the challenge response back to the user communication device at S250.
With reference now to
The systems and components of the system 100 may be or include network-enabled computer devices and systems that are configured for processing account-related transactions. In particular, these systems may be configured to execute one or more software applications to, for example, receive data as input from an entity accessing the network-enabled computer system, process received data, transmit data over a network, and receive data over a network in order to process transactions originating from a merchant transaction device or an account holder's device. The various network-enabled computer systems may also include one or more software applications to transmit notifications to account holders (e.g., via the account holders' computer systems or mobile devices). It will be understood that the depiction in
In the example embodiments presented herein, an account holder may be any individual or entity that desires to conduct a transaction (which may be, but is not limited to a financial transaction) with a merchant using a transaction account. An account may be held by any place, location, object, entity, or other mechanism for holding money or performing transactions in any form, including, without limitation, electronic form. An account may be associated with one or more transaction cards such as, for example, a credit or debit card or a prepaid card.
The various components of the system 100 may, in particular, be configured for processing transactions involving the use of a transaction card such as the smart transaction card 150. The transaction card 150 may be any device having a processor configured for communicating via NFC and carrying out digital transactions and having a memory in which identification and encryption information can be stored. This may include chip-carrying transaction cards (“smart” cards), and mobile and non-mobile user computing devices. As illustrated in
The microprocessor chip 151 further includes an NFC interface 154 configured for establishing communication with the user device 110 or other devices when the card 150 is within a predetermined NFC range. In some embodiments, the NFC interface 154 may comprise a radio frequency identification chip configured to communicate via NFC or other short-range protocols. In some embodiments, the microprocessor chip 151 may include circuitry configured for communication with the user device 110 via other means such as Bluetooth, satellite, Wi-Fi, wired communications, and/or any combination of wireless and wired connections.
In particular embodiments, the memory 156 of the chip 151 microprocessor chip 151 may have stored therein one or more applets with instructions for generating encrypted information and transmitting it to a receiving device (e.g., the user device 110) via the NFC interface 154. Such encrypted information may be or include an encrypted verification block or signature that may be used by the user device 110 or the processing server 120 to authenticate and verify the presence of the transaction card 150.
The memory 156 may, in particular, have an authentication application stored therein having instructions for the data processor 152 to establish an NFC communication session with a user communication device 110 and receive, via the NFC interface 154, a WRITE TAG command transmitted by the user communication device 110. The application may be configured to recognize the WRITE TAG command as an authentication challenge and, upon such recognition, to generate a challenge response based on challenge information included therein. The challenge response may include challenge response information that is unique to the transaction card. This may include, for example, a card identifier. The challenge response information may be or include information that is generated by the data processor 152 using information that is permanently or temporarily stored in the card memory 156. In particular embodiments, the authentication application is configured to cause the processor 152 to generate a digital signature that may be unique to the transaction card 150 and/or the NFC session. The digital signature and/or other challenge response information may be or include a cryptogam encrypted using challenge information received in the WRITE TAG command by the card data processing chip. The cryptogram may be created by the processor 152 using one or more of the public and private encryption keys stored in the memory 156. The challenge response information may also include a digital authentication certificate retrieved from the memory 156.
The authentication application may also be configured to receive a READ TAG command via NFC from the user communication device 110. In response, the application may transmit the challenge response via the NFC interface 154. In some embodiments, the authentication application may be configured so that the action of generating a digital signature and/or other challenge response information is not carried out unless or until a READ TAG command is received. In such embodiments, the actions of generating the challenge response information and transmitting the challenge response information may both be done in response to receiving the READ TAG command. In some embodiments, either or both of these actions may be conditioned on a time interval between the WRITE TAG command and the READ TAG command being less than a specified maximum time interval. If the maximum time interval is exceeded, the microprocessor 152 may transmit a “timed out” error message to the user communication device 110 via the NFC interface 154.
In some embodiments, the authentication application may be configured to terminate the authentication procedure if the NFC session with the user communication device 110 is ended prior to receiving the READ TAG command. In other embodiments, the application may allow or require termination of the initial NFC session after the WRITE TAG command is received and subsequent establishment of a second NFC session in which the READ TAG command is received. As before, transmission of the challenge response may be conditioned on the READ TAG command being received within a maximum time interval after the WRITE TAG command.
The user communication device 110 may be any computer device or communications device including a server, a network appliance, a personal computer (PC), a workstation, and a mobile interface device such as a smart phone, smart pad, handheld PC, or personal digital assistant (PDA). The user communication device 110 may also be a transaction terminal (e.g., a merchant or bank terminal) used for carrying out financial transactions and other interactions with an account holder. The user device 110 includes an on-board data processor 111 in communication with a memory module 113, a user interface 114, a network communication interface 112, and an NFC interface 116. The user device 110 may optionally include an image capturing device 115 (e.g., a digital camera). The data processor 111 may include a microprocessor and associated processing circuitry, and can contain additional components, including processors, memories, error and parity/CRC checkers, data encoders, anticollision algorithms, controllers, command decoders, security primitives and tamper-proofing hardware, as necessary to perform the functions described herein. The memory 113 can be a read-only memory, write-once read-multiple memory or read/write memory, e.g., RAM, ROM and EEPROM, and the user device 110 can include one or more of these memories.
The user interface 114 of the device 110 includes a user input mechanism, which can be any device for entering information and instructions into the user device 110, such as a touch-screen, keyboard, mouse, cursor-control device, microphone, stylus, or digital camera. The user interface 114 may also include a display, which can be any type of device for presenting visual information such as a computer monitor, a flat panel display, and a mobile device screen, including liquid crystal displays, light-emitting diode displays, plasma panels, and cathode ray tube displays.
The network communication interface 112 is configured to establish and support wired or wireless data communication capability for connecting the device 110 to the network 105 or other communication network. The communication interface 112 can also be configured to support communication with a short-range wireless communication interface for communication via a short-range system such as Bluetooth.
The user device NFC interface 116 is configured for establishing near field communication with other NFC-enabled devices including, in particular, the data processing chip 151 of the transaction card 150. The NFC interface 116 is further configured for transmitting information to and receiving information transmitted by the data processing chip 151 via the chip NFC interface 154.
In embodiments of the invention, the memory 113 may have stored therein one or more applications usable by the data processor 111 to conduct and/or monitor transactions between the user device 110 and one or more processing servers 120 and authentication servers 130 over the network 105 and/or one or more merchant transaction terminals (not shown) via NFC, short-range communication, or the network 105. These applications may include instructions usable by the data processor 111 to identify transaction events, store event data in the memory 113, and communicate event data to the servers 120, 130. Some applications may also include instructions relating to receiving and interpreting instructions from the one or more processing servers 120 or the one or more authentication servers 130.
In particular embodiments, the memory 113 may include one or more applets configured for writing NDEF formatted information to NFC enabled tag devices (e.g., RFID tags) and/or for reading formatted information from such devices. These applets may include, in particular, instructions for executing a WRITE TAG command that causes formatted information to be transmitted to and stored in a memory of a receiving tag and instructions for executing a READ TAG command that causes formatted information to be transmitted by the tag and received by the user device 110. The memory 113 may also have stored therein a card communication application that can invoke the NDEF applets for use in a communication session with the transaction card 150. The card communication application may include instructions for the data processor 111 to establish a first NFC session with the transaction card 150 via the NFC interface 116 and then to transmit an NDEF WRITE TAG command to the transaction card 150 via the NFC interface 116. The application may also include instructions to assemble or receive session-specific challenge information that may be formatted for transmission via the NDEF WRITE TAG command. Such challenge information could include, for example, a session identifier or time stamp to differentiate the NFC session from other sessions. The challenge information may instead or in addition include information specific to an intended transaction card 150, the presence of which is required for completion of an authentication or authorization process. The challenge information may be generated by the data processor 111 using information received by the data processor 111 from a processing server 120 or authentication server 130 via the network communication interface 112 and/or information stored in the memory 113.
In some embodiments, the application may be configured to receive an authentication request from a transaction processing server 120 or authentication server 130. Such a request may, may be transmitted by the server in response to a request to carry out a transaction requiring verification of the presence of a particular transaction card 150 or otherwise requiring authentication of the transaction card 150 or the user. Such a request may include challenge information to be included in the WRITE TAG command. The application may be further configured to display information and instructions to the user of the user communication device 110 via the user interface 114. User instructions could include, for example, an instruction to initiate NFC communication with the transaction card 150.
The card communication application may further include instructions for the data processor 111 to transmit an NDEF READ TAG command to the transaction card 150 and to receive formatted response information from the transaction card 150 in return. The response information may include a card identifier and/or challenge response information constructed by the transaction card 150 using the challenge information. The application may also include instructions for the data processor 111 to use the challenge response information to authenticate the transaction card 150. This may be accomplished by direct comparison of the challenge response information to expected response information stored in the memory 113 or received from a requesting processing server 120 or authentication server 130.
In some embodiments, the action to authenticate the transaction card 150 may include transmitting the challenge response information to the authentication server 130 and receiving an authentication response back from the authentication server 130. In some embodiments, the challenge response information may be transmitted directly to the authentication server 130 via the network 105. In other embodiments, the user communication device 110 may transmit the challenge response information to the processing server 120 via the network 105 and the processing server 120, in turn, transmits the challenge response information to the authentication server 130.
In some embodiments, the challenge response information authentication may include information encrypted by the transaction card using card or account-associated encryption keys. In such embodiments, the card communication application may be configured to retrieve the required encryption key(s) from the memory 113 and to use them to decrypt the encrypted information. The application may condition authentication of the card 150 on successful decryption of the challenge response information.
The communication application may be configured to, upon establishing an authentication result, transmit the authentication result to the processing server 120, the authentication server 130, or other requesting system via the network 105.
The processing server 120 is a system of one or more network-enabled processing servers configured for processing transactions for an account associated with the transaction card 150. The processing server 120 is configured for selective communication with one or more user communication devices 110 (e.g., account holder mobile or other devices and merchant transaction terminals) via the network 105. The processing server 120 may be configured to store and retrieve account and transaction information in an account information database (not shown) and transaction card information in the card information database 140. The processing server 120 may receive transaction processing requests from any of the user devices 110 and is configured to use information from such requests to make determinations as to whether the requested transaction should be processed.
In some embodiments, the processing server 120 may require verification of the presence of an authorized transaction card 150 in order to process a transaction. In some such embodiments, the processing server may transmit a verification request to a user communication device 110 that is associated with the card 150 or its associated account. In other embodiments, the processing server 120 may transmit the request to a user communication device 110 (e.g., a merchant terminal) that is associated with the transaction to be processed. In either case, the verification request includes instructions for the user communication device 110 to establish an NFC communication session between the user communication device 110 and the transaction card 150 for verifying that the card 150 is in the possession of the account holder and/or in the presence of the transaction requester. In some embodiments, the verification is conducted by the user communication device 110 and the processing system 120 merely receives a response from the device 110 indicating a verification result. In some embodiments, however, the user communication device 110 may not conduct the verification and, instead, transmits to the processing server 120 challenge response information received from the transaction card 150. The processing server 120 may be configured to use the challenge response information to complete the authentication/verification of the transaction card 150. In some embodiments, however, the processing server 120 may forward the challenge response information to the authentication server 130 for completion of the authentication/verification process.
In some embodiments, the processing server 120 may generate challenge information that may be included in the verification request for submission by the user communication device 110 to the card 150. The challenge information may include card and/or transaction specific information. It may instead or in addition include an unpredictable challenge value such as a random or pseudo-random number.
The authentication server 130 may be a system of one or more network-enabled processing servers configured for selective communication with the user communication device 110 and/or the processing server 120 via the network 105. The authentication processor 130 may also be able to access the card information database 140 via the network 105 either directly or through the processing server 120. The authentication server 130 may be configured for transmitting card authentication requests to and receiving authentication responses from the user communication device 110. The authentication server 130 may be configured to generate challenge information for inclusion in an authentication request. Such challenge information may be or include card-specific information obtained from the card database 140. The challenge information may also or instead include one-time request or transaction-specific information to be used by the transaction card 150 to generate challenge response information. The authentication server 130 may be further configured to receive an authentication request response from the user communication device 110, the response including challenge response information generated by the transaction card 150. The authentication server 130 may be configured to use the challenge response information to verify that such information was generated by the expected transaction card 150.
The card database 140 may have stored therein one or more data records associated with the transaction card 150. In some embodiments, these records may include one or more private encryption keys assigned to the transaction card 150 and stored in the card memory 156. The one or more encryption keys may be accessed by the processing server 120 or the authentication server 130 as needed for decryption of card-encrypted information included in the challenge response information. The processing server 120 and/or the authentication server 130 may be configured for using the decryption keys and one or more public keys associated with the transaction card to decrypt the card-encrypted information to verify that the challenge response information was provided by the expected transaction card 150. In some embodiments, a public encryption key may be part of or included with the challenge response information.
The present invention provides a significant improvement in transaction security by providing enhanced security to the process of assuring the presence of an authenticated transaction card. By using session-specific information in combination with card-specific information to authenticate the presence of a particular account-associated card, the invention makes it difficult or impossible for an intercepting entity to use the information in a replay attack. The methods may be further enhanced by having the card itself encrypt session-specific information using private encryption keys available only from the card and a limited access card database.
It will be readily understood by those persons skilled in the art that the present invention is susceptible to broad utility and application. Many embodiments and adaptations of the present invention other than those herein described, as well as many variations, modifications and equivalent arrangements, will be apparent from or reasonably suggested by the present invention and foregoing description thereof, without departing from the substance or scope of the invention.
Number | Name | Date | Kind |
---|---|---|---|
4683553 | Mollier | Jul 1987 | A |
4827113 | Rikuna | May 1989 | A |
4910773 | Hazard et al. | Mar 1990 | A |
5036461 | Elliott et al. | Jul 1991 | A |
5363448 | Koopman, Jr. et al. | Nov 1994 | A |
5377270 | Koopman, Jr. et al. | Dec 1994 | A |
5533126 | Hazard | Jul 1996 | A |
5537314 | Kanter | Jul 1996 | A |
5592553 | Guski et al. | Jan 1997 | A |
5616901 | Crandall | Apr 1997 | A |
5666415 | Kaufman | Sep 1997 | A |
5764789 | Pare, Jr. et al. | Jun 1998 | A |
5768373 | Lohstroh et al. | Jun 1998 | A |
5778072 | Samar | Jul 1998 | A |
5796827 | Coppersmith et al. | Aug 1998 | A |
5832090 | Raspotnik | Nov 1998 | A |
5883810 | Franklin et al. | Mar 1999 | A |
5901874 | Deters | May 1999 | A |
5929413 | Gardner | Jul 1999 | A |
5960411 | Hartman et al. | Sep 1999 | A |
6021203 | Douceur et al. | Feb 2000 | A |
6049328 | Vanderheiden | Apr 2000 | A |
6058373 | Blinn et al. | May 2000 | A |
6061666 | Do et al. | May 2000 | A |
6105013 | Curry et al. | Aug 2000 | A |
6199114 | White et al. | Mar 2001 | B1 |
6199762 | Hohle | Mar 2001 | B1 |
6216227 | Goldstein et al. | Apr 2001 | B1 |
6227447 | Campisano | May 2001 | B1 |
6282522 | Davis et al. | Aug 2001 | B1 |
6324271 | Sawyer et al. | Nov 2001 | B1 |
6342844 | Rozin | Jan 2002 | B1 |
6367011 | Lee et al. | Apr 2002 | B1 |
6402028 | Graham, Jr. et al. | Jun 2002 | B1 |
6438550 | Doyle et al. | Aug 2002 | B1 |
6501847 | Helot et al. | Dec 2002 | B2 |
6631197 | Taenzer | Oct 2003 | B1 |
6641050 | Kelley et al. | Nov 2003 | B2 |
6655585 | Shinn | Dec 2003 | B2 |
6662020 | Aaro et al. | Dec 2003 | B1 |
6721706 | Strubbe et al. | Apr 2004 | B1 |
6731778 | Oda et al. | May 2004 | B1 |
6779115 | Naim | Aug 2004 | B1 |
6792533 | Jablon | Sep 2004 | B2 |
6829711 | Kwok et al. | Dec 2004 | B1 |
6834271 | Hodgson et al. | Dec 2004 | B1 |
6834795 | Rasmussen et al. | Dec 2004 | B1 |
6852031 | Rowe | Feb 2005 | B1 |
6865547 | Brake, Jr. et al. | Mar 2005 | B1 |
6873260 | Lancos et al. | Mar 2005 | B2 |
6877656 | Jaros et al. | Apr 2005 | B1 |
6889198 | Kawan | May 2005 | B2 |
6905411 | Nguyen et al. | Jun 2005 | B2 |
6910627 | Simpson-Young et al. | Jun 2005 | B1 |
6971031 | Haala | Nov 2005 | B2 |
6990588 | Yasukura | Jan 2006 | B1 |
7006986 | Sines et al. | Feb 2006 | B1 |
7085931 | Smith et al. | Aug 2006 | B1 |
7127605 | Montgomery et al. | Oct 2006 | B1 |
7128274 | Kelley et al. | Oct 2006 | B2 |
7140550 | Ramachandran | Nov 2006 | B2 |
7152045 | Hoffman | Dec 2006 | B2 |
7165727 | de Jong | Jan 2007 | B2 |
7175076 | Block et al. | Feb 2007 | B1 |
7202773 | Oba et al. | Apr 2007 | B1 |
7206806 | Pineau | Apr 2007 | B2 |
7232073 | de Jong | Jun 2007 | B1 |
7246752 | Brown | Jul 2007 | B2 |
7254569 | Goodman et al. | Aug 2007 | B2 |
7263507 | Brake, Jr. et al. | Aug 2007 | B1 |
7270276 | Vayssiere | Sep 2007 | B2 |
7278025 | Saito et al. | Oct 2007 | B2 |
7287692 | Patel et al. | Oct 2007 | B1 |
7290709 | Tsai et al. | Nov 2007 | B2 |
7306143 | Bonneau, Jr. et al. | Dec 2007 | B2 |
7319986 | Praisner et al. | Jan 2008 | B2 |
7325132 | Takayama et al. | Jan 2008 | B2 |
7373515 | Owen et al. | May 2008 | B2 |
7374099 | de Jong | May 2008 | B2 |
7375616 | Rowse et al. | May 2008 | B2 |
7380710 | Brown | Jun 2008 | B2 |
7424977 | Smets et al. | Sep 2008 | B2 |
7453439 | Kushler et al. | Nov 2008 | B1 |
7472829 | Brown | Jan 2009 | B2 |
7487357 | Smith et al. | Feb 2009 | B2 |
7568631 | Gibbs et al. | Aug 2009 | B2 |
7584153 | Brown et al. | Sep 2009 | B2 |
7597250 | Finn | Oct 2009 | B2 |
7628322 | Holtmanns et al. | Dec 2009 | B2 |
7652578 | Braun et al. | Jan 2010 | B2 |
7689832 | Talmor et al. | Mar 2010 | B2 |
7703142 | Wilson et al. | Apr 2010 | B1 |
7748609 | Sachdeva et al. | Jul 2010 | B2 |
7748617 | Gray | Jul 2010 | B2 |
7748636 | Finn | Jul 2010 | B2 |
7762457 | Bonalle et al. | Jul 2010 | B2 |
7789302 | Tame | Sep 2010 | B2 |
7793851 | Mullen | Sep 2010 | B2 |
7796013 | Murakami et al. | Sep 2010 | B2 |
7801799 | Brake, Jr. et al. | Sep 2010 | B1 |
7801829 | Gray et al. | Sep 2010 | B2 |
7805755 | Brown et al. | Sep 2010 | B2 |
7809643 | Phillips et al. | Oct 2010 | B2 |
7827115 | Weller et al. | Nov 2010 | B2 |
7828214 | Narendra et al. | Nov 2010 | B2 |
7848746 | Juels | Dec 2010 | B2 |
7882553 | Tuliani | Feb 2011 | B2 |
7900048 | Andersson | Mar 2011 | B2 |
7908216 | Davis et al. | Mar 2011 | B1 |
7922082 | Muscato | Apr 2011 | B2 |
7933589 | Mamdani et al. | Apr 2011 | B1 |
7949559 | Freiberg | May 2011 | B2 |
7954716 | Narendra et al. | Jun 2011 | B2 |
7954723 | Charrat | Jun 2011 | B2 |
7962369 | Rosenberg | Jun 2011 | B2 |
7993197 | Mamdani et al. | Aug 2011 | B2 |
8005426 | Huomo et al. | Aug 2011 | B2 |
8010405 | Bortolin et al. | Aug 2011 | B1 |
RE42762 | Shin | Sep 2011 | E |
8041954 | Plesman | Oct 2011 | B2 |
8060012 | Sklovsky et al. | Nov 2011 | B2 |
8074877 | Mullen et al. | Dec 2011 | B2 |
8082450 | Frey et al. | Dec 2011 | B2 |
8095113 | Kean et al. | Jan 2012 | B2 |
8099332 | Lemay et al. | Jan 2012 | B2 |
8103249 | Markison | Jan 2012 | B2 |
8108687 | Ellis et al. | Jan 2012 | B2 |
8127143 | Abdallah et al. | Feb 2012 | B2 |
8135648 | Oram et al. | Mar 2012 | B2 |
8140010 | Symons et al. | Mar 2012 | B2 |
8141136 | Lee et al. | Mar 2012 | B2 |
8150321 | Winter et al. | Apr 2012 | B2 |
8150767 | Wankmueller | Apr 2012 | B2 |
8186602 | Itay et al. | May 2012 | B2 |
8196131 | von Behren et al. | Jun 2012 | B1 |
8215563 | Levy et al. | Jul 2012 | B2 |
8224753 | Atef et al. | Jul 2012 | B2 |
8232879 | Davis | Jul 2012 | B2 |
8233841 | Griffin et al. | Jul 2012 | B2 |
8245292 | Buer | Aug 2012 | B2 |
8249654 | Zhu | Aug 2012 | B1 |
8266451 | Leydier et al. | Sep 2012 | B2 |
8285329 | Zhu | Oct 2012 | B1 |
8302872 | Mullen | Nov 2012 | B2 |
8312519 | Bailey et al. | Nov 2012 | B1 |
8316237 | Felsher et al. | Nov 2012 | B1 |
8332272 | Fisher | Dec 2012 | B2 |
8365988 | Medina, III et al. | Feb 2013 | B1 |
8369960 | Tran et al. | Feb 2013 | B2 |
8371501 | Hopkins | Feb 2013 | B1 |
8381307 | Cimino | Feb 2013 | B2 |
8391719 | Alameh et al. | Mar 2013 | B2 |
8417231 | Sanding et al. | Apr 2013 | B2 |
8439271 | Smets et al. | May 2013 | B2 |
8475367 | Yuen et al. | Jul 2013 | B1 |
8489112 | Roeding et al. | Jul 2013 | B2 |
8511542 | Pan | Aug 2013 | B2 |
8559872 | Butler | Oct 2013 | B2 |
8566916 | Vernon et al. | Oct 2013 | B1 |
8567670 | Stanfield et al. | Oct 2013 | B2 |
8572386 | Takekawa et al. | Oct 2013 | B2 |
8577810 | Dalit et al. | Nov 2013 | B1 |
8583454 | Beraja et al. | Nov 2013 | B2 |
8589335 | Smith et al. | Nov 2013 | B2 |
8594730 | Bona et al. | Nov 2013 | B2 |
8615468 | Varadarajan | Dec 2013 | B2 |
8620218 | Awad | Dec 2013 | B2 |
8667285 | Coulier et al. | Mar 2014 | B2 |
8723941 | Shirbabadi et al. | May 2014 | B1 |
8726405 | Bailey et al. | May 2014 | B1 |
8740073 | Vijayshankar et al. | Jun 2014 | B2 |
8750514 | Gallo et al. | Jun 2014 | B2 |
8752189 | De Jong | Jun 2014 | B2 |
8794509 | Bishop et al. | Aug 2014 | B2 |
8799668 | Cheng | Aug 2014 | B2 |
8806592 | Ganesan | Aug 2014 | B2 |
8807440 | Von Behren et al. | Aug 2014 | B1 |
8811892 | Khan et al. | Aug 2014 | B2 |
8814039 | Bishop et al. | Aug 2014 | B2 |
8814052 | Bona et al. | Aug 2014 | B2 |
8818867 | Baldwin et al. | Aug 2014 | B2 |
8831509 | Moosavi et al. | Sep 2014 | B2 |
8850538 | Vernon et al. | Sep 2014 | B1 |
8861733 | Benteo et al. | Oct 2014 | B2 |
8880027 | Darringer | Nov 2014 | B1 |
8888002 | Chesney et al. | Nov 2014 | B2 |
8898088 | Springer et al. | Nov 2014 | B2 |
8934837 | Zhu et al. | Jan 2015 | B2 |
8977569 | Rao | Mar 2015 | B2 |
8994498 | Agrafioti et al. | Mar 2015 | B2 |
9004365 | Bona et al. | Apr 2015 | B2 |
9020423 | Naniyat et al. | Apr 2015 | B2 |
9038894 | Khalid | May 2015 | B2 |
9042814 | Royston et al. | May 2015 | B2 |
9047531 | Showering et al. | Jun 2015 | B2 |
9069976 | Toole et al. | Jun 2015 | B2 |
9077769 | Krzeminski et al. | Jul 2015 | B2 |
9081948 | Magne | Jul 2015 | B2 |
9104853 | Venkataramani et al. | Aug 2015 | B2 |
9118663 | Bailey et al. | Aug 2015 | B1 |
9122964 | Krawczewicz | Sep 2015 | B2 |
9129280 | Bona et al. | Sep 2015 | B2 |
9152832 | Royston et al. | Oct 2015 | B2 |
9203800 | Izu et al. | Dec 2015 | B2 |
9209867 | Royston | Dec 2015 | B2 |
9251330 | Boivie et al. | Feb 2016 | B2 |
9251518 | Levin et al. | Feb 2016 | B2 |
9258715 | Borghei | Feb 2016 | B2 |
9270337 | Zhu et al. | Feb 2016 | B2 |
9306626 | Hall et al. | Apr 2016 | B2 |
9306942 | Bailey et al. | Apr 2016 | B1 |
9324066 | Archer et al. | Apr 2016 | B2 |
9324067 | Van Os et al. | Apr 2016 | B2 |
9332587 | Salahshoor | May 2016 | B2 |
9338622 | Bjontegard | May 2016 | B2 |
9373141 | Shakkarwar | Jun 2016 | B1 |
9379841 | Fine et al. | Jun 2016 | B2 |
9385789 | Van Bosch et al. | Jul 2016 | B1 |
9413430 | Royston et al. | Aug 2016 | B2 |
9413768 | Gregg et al. | Aug 2016 | B1 |
9420496 | Indurkar | Aug 2016 | B1 |
9426132 | Alikhani | Aug 2016 | B1 |
9432339 | Bowness | Aug 2016 | B1 |
9455968 | Machani et al. | Sep 2016 | B1 |
9467203 | Yeh | Oct 2016 | B2 |
9473509 | Arsanjani et al. | Oct 2016 | B2 |
9491626 | Sharma et al. | Nov 2016 | B2 |
9553637 | Yang et al. | Jan 2017 | B2 |
9619952 | Zhao et al. | Apr 2017 | B1 |
9635000 | Muftic | Apr 2017 | B1 |
9665858 | Kumar | May 2017 | B1 |
9674705 | Rose et al. | Jun 2017 | B2 |
9679286 | Colnot et al. | Jun 2017 | B2 |
9680942 | Dimmick | Jun 2017 | B2 |
9710804 | Zhou et al. | Jul 2017 | B2 |
9740342 | Paulsen et al. | Aug 2017 | B2 |
9740988 | Levin et al. | Aug 2017 | B1 |
9763097 | Robinson et al. | Sep 2017 | B2 |
9767329 | Forster | Sep 2017 | B2 |
9769662 | Queru | Sep 2017 | B1 |
9773151 | Mil'shtein et al. | Sep 2017 | B2 |
9780953 | Gaddam et al. | Oct 2017 | B2 |
9891823 | Feng et al. | Feb 2018 | B2 |
9940571 | Herrington | Apr 2018 | B1 |
9953323 | Candelore et al. | Apr 2018 | B2 |
9961194 | Wiechman et al. | May 2018 | B1 |
9965756 | Davis et al. | May 2018 | B2 |
9965911 | Wishne | May 2018 | B2 |
9978058 | Wurmfeld et al. | May 2018 | B2 |
10031707 | Hamakawa | Jul 2018 | B2 |
10043164 | Dogin et al. | Aug 2018 | B2 |
10075437 | Costigan et al. | Sep 2018 | B1 |
10129648 | Hernandez et al. | Nov 2018 | B1 |
10133979 | Eidam et al. | Nov 2018 | B1 |
10217105 | Sangi et al. | Feb 2019 | B1 |
10749885 | Hoorvitch | Aug 2020 | B1 |
10909525 | Dhodapkar | Feb 2021 | B1 |
11361174 | Robshaw | Jun 2022 | B1 |
20010010723 | Pinkas | Aug 2001 | A1 |
20010029485 | Brody et al. | Oct 2001 | A1 |
20010034702 | Mockett et al. | Oct 2001 | A1 |
20010054003 | Chien et al. | Dec 2001 | A1 |
20020078345 | Sandhu et al. | Jun 2002 | A1 |
20020093530 | Krothapalli et al. | Jul 2002 | A1 |
20020100808 | Norwood et al. | Aug 2002 | A1 |
20020120583 | Keresman, III et al. | Aug 2002 | A1 |
20020152116 | Yan et al. | Oct 2002 | A1 |
20020153424 | Li | Oct 2002 | A1 |
20020165827 | Gien et al. | Nov 2002 | A1 |
20030023554 | Yap et al. | Jan 2003 | A1 |
20030034873 | Chase et al. | Feb 2003 | A1 |
20030055727 | Walker et al. | Mar 2003 | A1 |
20030078882 | Sukeda et al. | Apr 2003 | A1 |
20030167350 | Davis et al. | Sep 2003 | A1 |
20030208449 | Diao | Nov 2003 | A1 |
20040015958 | Veil et al. | Jan 2004 | A1 |
20040039919 | Takayama et al. | Feb 2004 | A1 |
20040127256 | Goldthwaite et al. | Jul 2004 | A1 |
20040215674 | Odinak et al. | Oct 2004 | A1 |
20040230799 | Davis | Nov 2004 | A1 |
20050044367 | Gasparini et al. | Feb 2005 | A1 |
20050075985 | Cartmell | Apr 2005 | A1 |
20050081038 | Arditti Modiano et al. | Apr 2005 | A1 |
20050138387 | Lam et al. | Jun 2005 | A1 |
20050156026 | Ghosh et al. | Jul 2005 | A1 |
20050160049 | Lundholm | Jul 2005 | A1 |
20050195975 | Kawakita | Sep 2005 | A1 |
20050225427 | Bell | Oct 2005 | A1 |
20050247797 | Ramachandran | Nov 2005 | A1 |
20060006230 | Bear et al. | Jan 2006 | A1 |
20060040726 | Szrek et al. | Feb 2006 | A1 |
20060041402 | Baker | Feb 2006 | A1 |
20060044153 | Dawidowsky | Mar 2006 | A1 |
20060047954 | Sachdeva et al. | Mar 2006 | A1 |
20060085848 | Aissi et al. | Apr 2006 | A1 |
20060136334 | Atkinson et al. | Jun 2006 | A1 |
20060173985 | Moore | Aug 2006 | A1 |
20060174331 | Schuetz | Aug 2006 | A1 |
20060242698 | Inskeep et al. | Oct 2006 | A1 |
20060280338 | Rabb | Dec 2006 | A1 |
20070033642 | Ganesan et al. | Feb 2007 | A1 |
20070055630 | Gauthier et al. | Mar 2007 | A1 |
20070061266 | Moore et al. | Mar 2007 | A1 |
20070061487 | Moore et al. | Mar 2007 | A1 |
20070116292 | Kurita et al. | May 2007 | A1 |
20070118745 | Buer | May 2007 | A1 |
20070123305 | Chen et al. | May 2007 | A1 |
20070197261 | Humbel | Aug 2007 | A1 |
20070224969 | Rao | Sep 2007 | A1 |
20070241182 | Buer | Oct 2007 | A1 |
20070256134 | Lehtonen et al. | Nov 2007 | A1 |
20070258594 | Sandhu et al. | Nov 2007 | A1 |
20070278291 | Rans et al. | Dec 2007 | A1 |
20080008315 | Fontana et al. | Jan 2008 | A1 |
20080011831 | Bonalle et al. | Jan 2008 | A1 |
20080014867 | Finn | Jan 2008 | A1 |
20080035738 | Mullen | Feb 2008 | A1 |
20080071681 | Khalid | Mar 2008 | A1 |
20080072303 | Syed | Mar 2008 | A1 |
20080086767 | Kulkarni et al. | Apr 2008 | A1 |
20080103968 | Bies et al. | May 2008 | A1 |
20080109309 | Landau et al. | May 2008 | A1 |
20080110983 | Ashfield | May 2008 | A1 |
20080120711 | Dispensa | May 2008 | A1 |
20080156873 | Wilhelm et al. | Jul 2008 | A1 |
20080162312 | Sklovsky et al. | Jul 2008 | A1 |
20080164308 | Aaron et al. | Jul 2008 | A1 |
20080207307 | Cunningham, II et al. | Aug 2008 | A1 |
20080209543 | Aaron | Aug 2008 | A1 |
20080223918 | Williams et al. | Sep 2008 | A1 |
20080285746 | Landrock et al. | Nov 2008 | A1 |
20080308641 | Finn | Dec 2008 | A1 |
20090037275 | Pollio | Feb 2009 | A1 |
20090048026 | French | Feb 2009 | A1 |
20090132417 | Scipioni et al. | May 2009 | A1 |
20090143104 | Loh et al. | Jun 2009 | A1 |
20090171682 | Dixon et al. | Jul 2009 | A1 |
20090210308 | Toomer et al. | Aug 2009 | A1 |
20090235339 | Mennes et al. | Sep 2009 | A1 |
20090249077 | Gargaro et al. | Oct 2009 | A1 |
20090282264 | Amiel et al. | Nov 2009 | A1 |
20100023449 | Skowronek et al. | Jan 2010 | A1 |
20100023455 | Dispensa et al. | Jan 2010 | A1 |
20100029202 | Jolivet et al. | Feb 2010 | A1 |
20100033310 | Narendra et al. | Feb 2010 | A1 |
20100036769 | Winters et al. | Feb 2010 | A1 |
20100078471 | Lin et al. | Apr 2010 | A1 |
20100082491 | Rosenblatt et al. | Apr 2010 | A1 |
20100094754 | Bertran et al. | Apr 2010 | A1 |
20100095130 | Bertran et al. | Apr 2010 | A1 |
20100100480 | Altman et al. | Apr 2010 | A1 |
20100114731 | Kingston et al. | May 2010 | A1 |
20100192230 | Steeves et al. | Jul 2010 | A1 |
20100207742 | Buhot et al. | Aug 2010 | A1 |
20100211797 | Westerveld et al. | Aug 2010 | A1 |
20100240413 | He et al. | Sep 2010 | A1 |
20100257357 | McClain | Oct 2010 | A1 |
20100312634 | Cervenka | Dec 2010 | A1 |
20100312635 | Cervenka | Dec 2010 | A1 |
20110028160 | Roeding et al. | Feb 2011 | A1 |
20110035604 | Habraken | Feb 2011 | A1 |
20110060631 | Grossman et al. | Mar 2011 | A1 |
20110068170 | Lehman | Mar 2011 | A1 |
20110084132 | Tofighbakhsh | Apr 2011 | A1 |
20110101093 | Ehrensvard | May 2011 | A1 |
20110113245 | Varadrajan | May 2011 | A1 |
20110125638 | Davis et al. | May 2011 | A1 |
20110131415 | Schneider | Jun 2011 | A1 |
20110134044 | Carapelli | Jun 2011 | A1 |
20110153437 | Archer et al. | Jun 2011 | A1 |
20110153496 | Royyuru | Jun 2011 | A1 |
20110208658 | Makhotin | Aug 2011 | A1 |
20110208965 | Machani | Aug 2011 | A1 |
20110211219 | Bradley | Sep 2011 | A1 |
20110218911 | Spodak | Sep 2011 | A1 |
20110238564 | Lim et al. | Sep 2011 | A1 |
20110246780 | Yeap et al. | Oct 2011 | A1 |
20110258452 | Coulier et al. | Oct 2011 | A1 |
20110280406 | Ma et al. | Nov 2011 | A1 |
20110282785 | Chin | Nov 2011 | A1 |
20110294418 | Chen | Dec 2011 | A1 |
20110312271 | Ma et al. | Dec 2011 | A1 |
20120024947 | Naelon | Feb 2012 | A1 |
20120030047 | Fuentes et al. | Feb 2012 | A1 |
20120030121 | Grellier | Feb 2012 | A1 |
20120047071 | Mullen et al. | Feb 2012 | A1 |
20120077432 | Rose et al. | Mar 2012 | A1 |
20120079281 | Lowenstein et al. | Mar 2012 | A1 |
20120109735 | Krawczewicz et al. | May 2012 | A1 |
20120109764 | Martin et al. | May 2012 | A1 |
20120143754 | Patel | Jun 2012 | A1 |
20120150737 | Rottink | Jun 2012 | A1 |
20120178366 | Levy et al. | Jul 2012 | A1 |
20120196583 | Kindo | Aug 2012 | A1 |
20120207305 | Gallo et al. | Aug 2012 | A1 |
20120209773 | Ranganathan | Aug 2012 | A1 |
20120220221 | Moosavi et al. | Aug 2012 | A1 |
20120238206 | Singh et al. | Sep 2012 | A1 |
20120239560 | Pourfallah et al. | Sep 2012 | A1 |
20120252350 | Steinmetz et al. | Oct 2012 | A1 |
20120254394 | Barras | Oct 2012 | A1 |
20120271380 | Roberts | Oct 2012 | A1 |
20120284194 | Liu et al. | Nov 2012 | A1 |
20120290472 | Mullen et al. | Nov 2012 | A1 |
20120296818 | Nuzzi et al. | Nov 2012 | A1 |
20120316992 | Oborne | Dec 2012 | A1 |
20120317035 | Royyuru et al. | Dec 2012 | A1 |
20120317628 | Yeager | Dec 2012 | A1 |
20130005245 | Royston | Jan 2013 | A1 |
20130008956 | Ashfield | Jan 2013 | A1 |
20130026229 | Jarman et al. | Jan 2013 | A1 |
20130048713 | Pan | Feb 2013 | A1 |
20130054474 | Yeager | Feb 2013 | A1 |
20130065564 | Conner et al. | Mar 2013 | A1 |
20130080228 | Fisher | Mar 2013 | A1 |
20130080229 | Fisher | Mar 2013 | A1 |
20130099587 | Lou | Apr 2013 | A1 |
20130104251 | Moore et al. | Apr 2013 | A1 |
20130106576 | Hinman et al. | May 2013 | A1 |
20130119130 | Braams | May 2013 | A1 |
20130130614 | Busch-Sorensen | May 2013 | A1 |
20130144793 | Royston | Jun 2013 | A1 |
20130171929 | Adams et al. | Jul 2013 | A1 |
20130179351 | Wallner | Jul 2013 | A1 |
20130185772 | Jaudon et al. | Jul 2013 | A1 |
20130191279 | Calman et al. | Jul 2013 | A1 |
20130196594 | Moosavi | Aug 2013 | A1 |
20130196595 | Byrne et al. | Aug 2013 | A1 |
20130200999 | Spodak et al. | Aug 2013 | A1 |
20130216108 | Hwang et al. | Aug 2013 | A1 |
20130226791 | Springer et al. | Aug 2013 | A1 |
20130226796 | Jiang et al. | Aug 2013 | A1 |
20130232082 | Krawczewicz et al. | Sep 2013 | A1 |
20130238894 | Ferg et al. | Sep 2013 | A1 |
20130268687 | Schrecker | Oct 2013 | A1 |
20130282360 | Shimota et al. | Oct 2013 | A1 |
20130303085 | Boucher et al. | Nov 2013 | A1 |
20130304651 | Smith | Nov 2013 | A1 |
20130312082 | Izu et al. | Nov 2013 | A1 |
20130314334 | Leica et al. | Nov 2013 | A1 |
20130314593 | Reznik et al. | Nov 2013 | A1 |
20130344804 | Chen et al. | Dec 2013 | A1 |
20130344857 | Berionne et al. | Dec 2013 | A1 |
20140002238 | Taveau et al. | Jan 2014 | A1 |
20140019352 | Shrivastava | Jan 2014 | A1 |
20140027506 | Heo et al. | Jan 2014 | A1 |
20140032409 | Rosano | Jan 2014 | A1 |
20140032410 | Georgiev et al. | Jan 2014 | A1 |
20140040120 | Cho et al. | Feb 2014 | A1 |
20140040139 | Brudnicki et al. | Feb 2014 | A1 |
20140040147 | Varadarakan et al. | Feb 2014 | A1 |
20140047235 | Lessiak et al. | Feb 2014 | A1 |
20140067690 | Pitroda et al. | Mar 2014 | A1 |
20140074637 | Hammad | Mar 2014 | A1 |
20140074655 | Lim et al. | Mar 2014 | A1 |
20140081720 | Wu | Mar 2014 | A1 |
20140138435 | Khalid | May 2014 | A1 |
20140141717 | Hsiao et al. | May 2014 | A1 |
20140171034 | Aleksin et al. | Jun 2014 | A1 |
20140171039 | Bjontegard | Jun 2014 | A1 |
20140172700 | Teuwen et al. | Jun 2014 | A1 |
20140180851 | Fisher | Jun 2014 | A1 |
20140208112 | McDonald et al. | Jul 2014 | A1 |
20140214674 | Narula | Jul 2014 | A1 |
20140220888 | Shimshoni | Aug 2014 | A1 |
20140229375 | Zaytzsev et al. | Aug 2014 | A1 |
20140245391 | Adenuga | Aug 2014 | A1 |
20140256251 | Caceres et al. | Sep 2014 | A1 |
20140258099 | Rosano | Sep 2014 | A1 |
20140258113 | Gauthier et al. | Sep 2014 | A1 |
20140258125 | Gerber et al. | Sep 2014 | A1 |
20140274179 | Zhu et al. | Sep 2014 | A1 |
20140279479 | Maniar et al. | Sep 2014 | A1 |
20140337235 | Van Heerden et al. | Nov 2014 | A1 |
20140339315 | Ko | Nov 2014 | A1 |
20140346860 | Aubry et al. | Nov 2014 | A1 |
20140365780 | Movassaghi | Dec 2014 | A1 |
20140379361 | Mahadkar et al. | Dec 2014 | A1 |
20150012444 | Brown et al. | Jan 2015 | A1 |
20150032635 | Guise | Jan 2015 | A1 |
20150071486 | Rhoads et al. | Mar 2015 | A1 |
20150088757 | Zhou et al. | Mar 2015 | A1 |
20150089586 | Ballesteros | Mar 2015 | A1 |
20150134452 | Williams | May 2015 | A1 |
20150140960 | Powell et al. | May 2015 | A1 |
20150154595 | Collinge et al. | Jun 2015 | A1 |
20150170138 | Rao | Jun 2015 | A1 |
20150178724 | Ngo et al. | Jun 2015 | A1 |
20150186871 | Laracey | Jul 2015 | A1 |
20150205379 | Mag et al. | Jul 2015 | A1 |
20150302409 | Malek | Oct 2015 | A1 |
20150317626 | Ran et al. | Nov 2015 | A1 |
20150332266 | Friedlander et al. | Nov 2015 | A1 |
20150339474 | Paz et al. | Nov 2015 | A1 |
20150341745 | Deluca | Nov 2015 | A1 |
20150371234 | Huang et al. | Dec 2015 | A1 |
20160012465 | Sharp | Jan 2016 | A1 |
20160026997 | Tsui et al. | Jan 2016 | A1 |
20160042207 | Inotay et al. | Feb 2016 | A1 |
20160048913 | Rausaria et al. | Feb 2016 | A1 |
20160055480 | Shah | Feb 2016 | A1 |
20160057619 | Lopez | Feb 2016 | A1 |
20160065370 | Le Saint et al. | Mar 2016 | A1 |
20160087957 | Shah et al. | Mar 2016 | A1 |
20160092696 | Guglani et al. | Mar 2016 | A1 |
20160105290 | Khalil | Apr 2016 | A1 |
20160148193 | Kelley et al. | May 2016 | A1 |
20160232523 | Venot et al. | Aug 2016 | A1 |
20160239672 | Khan et al. | Aug 2016 | A1 |
20160253651 | Park et al. | Sep 2016 | A1 |
20160255072 | Liu | Sep 2016 | A1 |
20160267486 | Mitra et al. | Sep 2016 | A1 |
20160277383 | Guyomarc'h et al. | Sep 2016 | A1 |
20160277388 | Lowe et al. | Sep 2016 | A1 |
20160307187 | Guo et al. | Oct 2016 | A1 |
20160307189 | Zarakas et al. | Oct 2016 | A1 |
20160314472 | Ashfield | Oct 2016 | A1 |
20160330027 | Ebrahimi | Nov 2016 | A1 |
20160335531 | Mullen et al. | Nov 2016 | A1 |
20160379217 | Hammad | Dec 2016 | A1 |
20170004502 | Quentin et al. | Jan 2017 | A1 |
20170011395 | Pillai et al. | Jan 2017 | A1 |
20170011406 | Tunnell et al. | Jan 2017 | A1 |
20170017957 | Radu | Jan 2017 | A1 |
20170017964 | Janefalkar et al. | Jan 2017 | A1 |
20170024716 | Jiam et al. | Jan 2017 | A1 |
20170039566 | Schipperheijn | Feb 2017 | A1 |
20170041759 | Gantert et al. | Feb 2017 | A1 |
20170068950 | Kwon | Mar 2017 | A1 |
20170103388 | Pillai et al. | Apr 2017 | A1 |
20170104739 | Lansler et al. | Apr 2017 | A1 |
20170109509 | Baghdasaryan | Apr 2017 | A1 |
20170109730 | Locke et al. | Apr 2017 | A1 |
20170116447 | Cimino et al. | Apr 2017 | A1 |
20170124568 | Moghadam | May 2017 | A1 |
20170140379 | Deck | May 2017 | A1 |
20170154328 | Zarakas et al. | Jun 2017 | A1 |
20170154333 | Gleeson et al. | Jun 2017 | A1 |
20170180134 | King | Jun 2017 | A1 |
20170230189 | Toll et al. | Aug 2017 | A1 |
20170237301 | Elad et al. | Aug 2017 | A1 |
20170289127 | Hendrick | Oct 2017 | A1 |
20170295013 | Claes | Oct 2017 | A1 |
20170316696 | Bartel | Nov 2017 | A1 |
20170317834 | Smith et al. | Nov 2017 | A1 |
20170330173 | Woo et al. | Nov 2017 | A1 |
20170374070 | Shah et al. | Dec 2017 | A1 |
20180034507 | Wobak et al. | Feb 2018 | A1 |
20180039986 | Essebag et al. | Feb 2018 | A1 |
20180068316 | Essebag et al. | Mar 2018 | A1 |
20180129945 | Saxena et al. | May 2018 | A1 |
20180160255 | Park | Jun 2018 | A1 |
20180191501 | Lindemann | Jul 2018 | A1 |
20180205712 | Versteeg et al. | Jul 2018 | A1 |
20180240106 | Garrett et al. | Aug 2018 | A1 |
20180254909 | Hancock | Sep 2018 | A1 |
20180262336 | Fujiwara | Sep 2018 | A1 |
20180268132 | Buer et al. | Sep 2018 | A1 |
20180270214 | Caterino et al. | Sep 2018 | A1 |
20180294959 | Traynor et al. | Oct 2018 | A1 |
20180300716 | Carlson | Oct 2018 | A1 |
20180302396 | Camenisch et al. | Oct 2018 | A1 |
20180315050 | Hammad | Nov 2018 | A1 |
20180316666 | Koved et al. | Nov 2018 | A1 |
20180322486 | Deliwala et al. | Nov 2018 | A1 |
20180359100 | Gaddam et al. | Dec 2018 | A1 |
20190014107 | George | Jan 2019 | A1 |
20190019375 | Foley | Jan 2019 | A1 |
20190036678 | Ahmed | Jan 2019 | A1 |
20190064834 | Adams | Feb 2019 | A1 |
20190238517 | D'Agostino et al. | Aug 2019 | A1 |
20190385429 | Pochtar | Dec 2019 | A1 |
20200092087 | Hillan et al. | Mar 2020 | A1 |
Number | Date | Country |
---|---|---|
2014200248 | Jul 2014 | AU |
3010336 | Jul 2017 | CA |
101192295 | Jun 2008 | CN |
103023643 | Apr 2013 | CN |
103417202 | Dec 2013 | CN |
10 2005 062763 | Jul 2007 | DE |
1 085 424 | Mar 2001 | EP |
1 223 565 | Jul 2002 | EP |
1 265 186 | Dec 2002 | EP |
1 783 919 | May 2007 | EP |
2 852 070 | Jan 2009 | EP |
2 139 196 | Dec 2009 | EP |
1 469 419 | Feb 2012 | EP |
2495883 | May 2013 | EP |
2663110 | Nov 2013 | EP |
2667641 | Nov 2013 | EP |
2 457 221 | Aug 2009 | GB |
2 516 861 | Feb 2015 | GB |
2 551 907 | Jan 2018 | GB |
2015023450 | Feb 2015 | JP |
101362818 | Feb 2014 | KR |
20140063987 | May 2014 | KR |
101508320 | Apr 2015 | KR |
WO 0049586 | Aug 2000 | WO |
WO 2006070189 | Jul 2006 | WO |
WO 2008055170 | May 2008 | WO |
WO 2009025605 | Feb 2009 | WO |
WO 2010049252 | May 2010 | WO |
WO 2011112158 | Sep 2011 | WO |
WO 2012001624 | Jan 2012 | WO |
WO 2012037690 | Mar 2012 | WO |
2012140308 | Oct 2012 | WO |
WO 2013039395 | Mar 2013 | WO |
WO 2013155562 | Oct 2013 | WO |
WO 2013192358 | Dec 2013 | WO |
WO 2014043278 | Mar 2014 | WO |
WO 2014170741 | Oct 2014 | WO |
WO 2015179649 | Nov 2015 | WO |
WO 2015183818 | Dec 2015 | WO |
2016014784 | Jan 2016 | WO |
WO 2016097718 | Jun 2016 | WO |
WO 2016160816 | Oct 2016 | WO |
WO 2016168394 | Oct 2016 | WO |
WO 2017042375 | Mar 2017 | WO |
WO 2017042400 | Mar 2017 | WO |
WO 2017157859 | Sep 2017 | WO |
WO 2017208063 | Dec 2017 | WO |
WO 2018063809 | Apr 2018 | WO |
WO 2018137888 | Aug 2018 | WO |
Entry |
---|
EPCglobal Inc., EPC™ Radio-Frequency Identity Protocols Generation-2 UHF RFID, dated Apr. 2015, pp. 1-152, downloaded from the Internet on Dec. 15, 2022 at URL: https://www.gs1.org/sites/default/files/docs/epc/Gen2_Protocol_Standard.pdf (Year: 2015). |
NFC Forum, Inc., NFC Data Exchange Format (NDEF), dated Jun. 2006, pp. 1-25, downloaded from the Internet on Dec. 15, 2022 at URL: http://sweet.ua.pt/andre.zuquete/Aulas/IRFID/11-12/docs/NFC%20Data%20Exchange%20Format%20(NDEF).pdf (Year: 2006). |
Batina, Lejla and Poll, Erik, “SmartCards and RFID,” PowerPoint Presentation for IPA Security Course, Digital Security at University of Nijmegen, Netherlands (date unknown), 75 pages. |
Haykin M. and Warnar, R., “Smart Card Technology: New Methods for Computer Access Control,” Computer Science and Technology NIST Special Publication 500-157:1-60 (1988). |
Lehpamer, Harvey, “Component of the RFID System,” RFID Design Principles, 2nd edition pp. 133-201 (2012). |
Pourghomi, Pardis et al., “A Proposed NFC Payment Application,” International Journal of Advanced Computer Science and Applications, vol. 4, No. 8 (2013). |
Author Unknown, “CardrefresherSM from American Express®,” [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://merchant-channel.americanexpress.com/merchant/en_US/cardrefresher, 2 pages. |
Author Unknown, “Add Account Updater to your recurring payment tool,” [online] 2018-19 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.authorize.net/our-features/account-updater/, 5 pages. |
Author Unknown, “Visa® Account Updater for Merchants,” [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://usa.visa.com/dam/VCOM/download/merchants/visa-account-updater-product-information-fact-sheet-for-merchants.pdf, 2 pages. |
Author Unknown, “Manage the cards that you use with Apple Pay,” Apple Support [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://support.apple.com/en-US/HT205583, 5 pages. |
Author Unknown, “Contactless Specifications for Payment Systems,” EMV Book B—Entry Point Specification [online] 2016 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.emvco.com/wp-content/uploads/2017/05/BookB_Entry_Point_Specification_v2_6_20160809023257319.pdf, 52 pages. |
Author Unknown, “EMV Integrated Circuit Card Specifications for Payment Systems, Book 2, Security and Key Management,” Version 3.4, [online] 2011 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.emvco.com/wp-content/uploads/2017/05/EMV_v4.3_Book_2_Security_and_Key_Management_20120607061923900.pdf, 174 pages. |
Author unknown, “NFC Guide: All You Need to Know About Near Field Communication” Square Guide [online] 2018 [retrieved on Nov. 13, 2018]. Retrieved from Internet URL: https://squareup.com/guides/nfc, 8 pages. |
Profis, S., “Everything you need to know about NFC and mobile payments” CNET Directory [online], 2014 [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://www.cnet.com/how-to/how-nfc-works-and-mobile-payments/, 6 pages. |
Cozma, N., “Copy data from other devices in Android 5.0 Lollipop setup” CNET Directory [online] 2014 [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://www.cnet.com/how-to/copy-data-from-other-devices-in-android-5-0-lollipop-setup/, 5 pages. |
Kevin, Android Enthusiast, “How to copy text string from nfc tag” StackExchange [online] 2013 [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://android.stackexchange.com/questions/55689/how-to-copy-text-string-from-nfc-tag, 11 pages. |
Author unknown, “Tap & Go Device Setup” Samsung [online] date unknown [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://www.samsung.com/us/switch-me/switch-to-the-galaxy-s-5/app/partial/setup-device/tap-go.html, 1 page. |
Author Unknown, “Multiple encryption”, Wikipedia [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://en.wikipedia.org/wiki/Multiple_encryption, 4 pages. |
Krawczyk, et al., “HMAC: Keyed-Hashing for Message Authentication”, Network Working Group RFC:2104 memo [online] 1997 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://tools.ietf.org/html/rfc2104, 12 pages. |
Song, et al., “The AES-CMAC Algorithm”, Network Working Group RFC: 4493 memo [online] 2006 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://tools.ietf.org/html/rfc4493, 21 pages. |
Katz, J., and Lindell, Y., “Aggregate Message Authentication Codes”, Topics in Cryptology [online] 2008 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.cs.umd.edu/˜jkatz/papers/aggregateMAC.pdf, 11 pages. |
Adams, D., and Maier, A-K, “Goldbug BIG SEVEN open source crypto-messengers to be compared—: or Comprehensive Confidentiality Review & Audit of GoldBug Encrypting E-Mail-Client & Secure Instant Messenger”, Big Seven Study 2016 [online] [retrieved on Mar. 25, 2018]. Retrieved from Internet URL: https://sf.net/projects/goldbug/files/bigseven-crypto-audit.pdf, 309 pages. |
Author Unknown, “Triple DES”, Wikipedia [online] 2018 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://simple.wikipedia.org/wiki/Triple_DES, 2 pages. |
Song, F., and Yun, A.l, “Quantum Security of NMAC and Related Constructions—PRF domain extension against quantum attacks”, IACR Cryptology ePrint Archive [online] 2017 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://eprint.iacr.org/2017/509.pdf, 41 pages. |
Saxena, N., “Lecture 10: NMAC, HMAC and Number Theory”, CS 6903 Modern Cryptography [online] 2008 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: http://isis.poly.edu/courses/cs6903/Lectures/lecture10.pdf, 8 pages. |
Berg, Guy, “Fundamentals of EMV” Smart Card Alliance [online] date unknown [retrieved on Mar. 27, 2019]. Retrieved from Internet URL: https://www.securetechalliance.org/resources/media/scap13_preconference/02.pdf, 37 pages. |
Pierce, Kevin, “Is the amazon echo NFC compatible,?” Amazon.com Customer Q&A [online] 2016 [retrieved on Mar. 26, 2019]. Retrieved from Internet URL: https://www.amazon.com/ask/questions/Tx1RJXYSPE6XLJD ?_encodi . . . , 2 pages. |
Author Unknown, “Multi-Factor Authentication”, idaptive [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.centrify.com/products/application-services/adaptive-multi-factor-authentication/risk-based-mfa/, 10 pages. |
Author Unknown, “Adaptive Authentication”, SecureAuth [online] 2019 [retrieved on Mar. 25, 2019}. Retrieved from Internet URL: https://www.secureauth.com/products/access-management/adaptive-authentication, 7 pages. |
Van den Breekel, J., et al., “EMV in a nutshell”, Technical Report, 2016 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.cs.ru.nl/E.Poll/papers/EMVtechreport.pdf, 37 pages. |
Author Unknown, “Autofill”, Computer Hope [online] 2018 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.computerhope.com/jargon/a/autofill.htm, 2 pages. |
Author Unknown, “Fill out forms automatically”, Google Chrome Help [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://support.google.com/chrome/answer/142893?co=GENIE.Platform%3DDesktop&hl=en, 3 pages. |
Author unknown, “Autofill credit cards, contacts, and passwords in Safari on Mac”, Apple Safari User Guide [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://support.apple.com/guide/safari/use-autofill-ibrw1103/mac, 3 pages. |
Menghin, M.J., “Power Optimization Techniques for Near Field Communication Systems” 2014 Dissertation at Technical University of Graz [online]. Retrieved from Internet URL: https://diglib.tugraz.at/download.php?id=576a7b910d2d6&location=browse, 135 pages. |
Mareli, M., et al., “Experimental evaluation of NFC reliability between an RFID tag and a smartphone” Conference paper (2013) IEEE Africon At Mauritius [online] [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://core.ac.uk/download/pdf/54204839.pdf, 5 pages. |
Davison, A., et al., “MonoSLAM: Real-Time Single Camera Slam”, IEEE Transactions on Pattern Analysis and Machine Intelligence 29(6): 1052-1067 (2007). |
Barba, R., “Sharing your location with your bank sounds creepy, but it's also useful”, Bankrate, LLC [online] 2017 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.bankrate.com/banking/banking-app-location-sharing/, 6 pages. |
Author unknown: “onetappaymentTM”, [online] Jan. 24, 2019, [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.payubiz.in/onetap, 4 pages. |
Vu et al., (2012). “Distinguishing users with capacitive touch communication” Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM. 10.1145/2348543.2348569. |
EMVco, EMV Card Personalization Specification, version 1.0 (Jun. 2003), 81 pages. |
Ullmann et al., (2012). “On-Card” User Authentication for Contactless Smart Cards based on Gesture Recognition, LNI, 223-234, 12 pages. |
Faraj et al. (2008). “Investigation of Java Smart Card Technology for Multi-Task Applications” J. of Al-Anbar University for Pure Science, vol. 2: No. 1: 2008, 11 pages. |
Dhamdhere (2017) “Key Benefits of a Unified Platform for Loyalty, Referral Marketing, and UGC” Annex Cloud [retrieved on Jul. 3, 2019]. Retrieved from Internet URL: https://www.annexcloude.com/blog/benefits-unified-platform/, 13 pages. |
International Search Report and the Written Opinion of the International Searching Authority issued in related PCT Application No. PCT/US2022/021088 mailed Jun. 29, 2022, 12 pages. |
Number | Date | Country | |
---|---|---|---|
20220311627 A1 | Sep 2022 | US |