This disclosure relates to the field of medical device management, and particularly to systems and methods for secure authorization of medical devices.
Computing systems, such as medical devices that have processors and other computing components, execute software that controls the functions performed by the computing systems. Software is typically stored in a persistent data store (e.g., hard disk, flash memory, etc.), and loaded into volatile memory (e.g., random access memory or RAM) for execution. Computing systems often verify whether software is authorized prior to execution. For example, the computing system may determine whether a license has been obtained, authorizing execution of the software. If a valid license has been obtained, then execution of the software may be permitted. If no license has been obtained, then execution of the software may be blocked.
Various techniques for managing the operation of devices using threshold signature-based authorization are described herein. These techniques may include creating shares of digital signature generation keys, and assigning the shares to devices or individual components of devices. The shares may then be used to authorize performance of particular functions so long as a threshold number of shares—or a threshold amount of weighted shares—are available during the authorization procedure. For example, threshold signature-based authorization may be used to validate licenses, validate the presence of certain components, respond to security events, ensure devices are being used in the intended environment, etc. These and other embodiments are described in greater detail below with reference to
Throughout the drawings, reference numbers may be re-used to indicate correspondence between referenced elements. The drawings are provided to illustrate example embodiments described herein and are not intended to limit the scope of the disclosure.
The present disclosure is directed to managing device authorization through the use of digital signature thresholds. Individual components of a device, or individual devices in a network environment, are associated with separate shares of data from which a digital signature can be generated. For example, the shares of data may be used to generate shares of a digital signature, and the digital signature may be used to authorize performance of a function. The shares of data may be referred to as “secret shares,” or simply as “shares” for convenience. In an illustrative embodiment, a threshold number of secret shares are required in order to perform any private operation such as generating a digital signature, recovering secret data, etc. Therefore, an authorization process that relies on digital signature verification to determine that a function is authorized will only do so if a threshold number of secret shares are available at authorization time. If fewer than the threshold number of secret shares are available, then the requested function (or operation of the device as a whole) is blocked. In this way, a device can be required to maintain a threshold number of original or authorized components to continue using licensed software or to continue executing at all. In a similar manner, a device can be prohibited from operation unless a threshold number of connected devices participate in an authorization procedure, or a threshold number of components of the device participate in an authorization procedure.
Some aspects of the present disclosure relate to generating secret shares for individual components of a medical device (e.g., an infusion pump), and using the secret shares to determine whether to authorize a function of the medical device. In some embodiments, software may be installed on a medical device, and a valid license may be required in order to execute the software. During installation or initial licensing, the license may be tied to the current configuration of the medical device such that the software is only permitted to execute if at least a threshold number of components of the medical device remain the same. To enforce this licensing requirement, a different secret share can be assigned to various individual components of the device. For example, there may be n secret shares of such data generated, one for each of n different components of the device. When the software is to execute, an authorization procedure can be performed. An illustrative authorization procedure may involve: (1) generating a different portion or “signature share” of a digital signature using the same message and each of the secret shares associated with device components that are still present; (2) generating a digital signature using the signature shares; and (3) verifying the authenticity of the digital signature (e.g., verifying that the digital signature was generated using a threshold number of secret shares and the message). However, a valid digital signature may only be generated if there are at least a threshold number t of secret shares available at authorization time, where 0<t<n. If too many components have changed or been removed, then fewer than t secret shares may be obtained, a valid digital signature may not be generated, and the verification of the digital signature will fail. In this way, a medical device may be prevented from executing the software (or otherwise performing a now-unauthorized function) if the software has been copied onto a different device, or if some other event has occurred (e.g., the software may no longer be compatible with the medical device in the device's current configuration).
Additional aspects of the present disclosure relate to treating some device components differently than other device components during an authorization process. The mechanism by which the components are treated differently may be the use of weighting factors that are assigned to the components. The weighting factors may also be referred to simply as “weights” for convenience. In some embodiments, a particular component or subset of components may be determined to be more important than other components. The more important components may be assigned a higher weight than less important components. When an authorization process is subsequently performed, the various secret shares and weights associated with the device components currently available to the medical device may be obtained. In generating a digital signature from the weights and secret shares, a threshold amount of weighted secret shares may be required in order to generate a valid digital signature. For example, if relatively important component is not present but all other components are present, the authorization procedure will fail. However, if a comparatively less important component is not present but all other components are present, the authorization procedure may complete successfully. In this way, a medical device may be prevented from operating with too many replacements of critical components, critical replacement components that are not of the correct type, too few original or authorized versions of critical components, etc. Such limitations can improve safety and reliability. In some embodiments, the different components may be assigned different numbers of shares, rather than weights with different values, to indicate the relative importance of the components.
Further aspects of the present disclosure relate to group-based authorization of individual medical devices in a network environment. Group-based authorization may also be referred to as “swarm authentication.” In some embodiments, a medical device that is attempting to perform a particular function (e.g., connect to a network server or dispense medication) may be prohibited from doing so unless a threshold number of other medical devices are able to participate in the authorization. This can prevent malicious or otherwise undesirable use of a medical device that may be lost or stolen, because the medical device may not be operating in a network environment (e.g., a hospital or clinic) in which a threshold number of other devices are available to participate in the authorization procedure. For example, each medical device may be provided with or otherwise assigned a secret share. When a particular device attempts to perform a function that requires authorization, a network server can determine which other devices are connected to the network server, and obtain or otherwise access the secret shares for each of the available devices. If a threshold number of secret shares are available, a valid digital signature may be successfully generated, the digital signature may be successfully verified, and the device may then be authorized to perform the function. Otherwise, the device may be blocked from performing the function. Therefore, a medical device that has become lost or stolen may be prevented from operating because it may not be able to connect to the correct clinical network and the group-based authorization process may not be able to obtain the threshold number of secret shares.
Still further aspects of the present disclosure relate to system-wide participation in security authorization. A multi-component system, such as a medical device, may implement dynamically-weighted threshold-based authorization to authorize performance of particular functions (or operation of the device at all). For example, individual components of system may be assigned a starting weight or number of secret shares. As an individual component detects security events (e.g., invalid login attempts, system security override attempts, etc.), the component can dynamically lower the weight that it contributes to system-wide authorization. Other components may perform in a similar manner. When the system attempts to authorize performance of a particular function, a threshold number of weighted secret shares may be required in order to generate a valid digital signature and successfully authorize the function. If a threshold amount of weighted secret shares are not available due to dynamically lowered weights, the authorization process will fail. In this way, individual components of a system can actively participate in the authorization determinations made by the system, even if some components do not otherwise perform security functions.
Although aspects of some embodiments described in the disclosure will focus, for the purpose of illustration, on particular examples of devices, cryptographic secrets, threshold-based authorization algorithms, and the like, the examples are illustrative only and are not intended to be limiting. In some embodiments, the systems and methods described herein may be applied to additional or alternative devices, cryptographic secrets, threshold-based authorization algorithms, etc. Various aspects of the disclosure will now be described with regard to certain examples and embodiments, which are intended to illustrate but not limit the disclosure.
Overview of Example Network Environment
In some embodiments, a communication network 150 (also referred to simply as a “network”) may be a publicly-accessible network of linked networks, possibly operated by various distinct parties, such as the Internet. In some cases, the network 150 may be or include a private network, personal area network, local area network, wide area network, global area network, cable network, satellite network, cellular data network, etc., or a combination thereof, some or all of which may or may not have access to and/or from the Internet.
The device management system 100 may be a logical association of one or more computing devices for managing the generation and distribution of shares, performance of authorization procedures, and the like. For example, the device management system 100 can include one or more share managers 102. A share manager 102 may correspond to one or more server computing devices for generating secret shares and distributing the secret shares to the various devices 110 that use them. In some embodiments, the secret shares may also or alternatively be stored in a data store 106 corresponding to one or more data storage devices. The device management system 100 may also include one or more authorization managers 104. An authorization manager 104 may correspond to one or more computing devices configured to perform authorization procedures using the secret shares generated by the share manager 102.
In some embodiments, the features and services provided by the device management system 100 may be implemented as web services consumable via one or more communication networks. In further embodiments, the device management system 100 and/or individual components thereof may be provided by one or more virtual machines implemented in a hosted computing environment. The hosted computing environment may include one or more rapidly provisioned and released computing resources, such as computing devices, networking devices, and/or storage devices. A hosted computing environment may also be referred to as a “cloud” computing environment.
The devices 110 may correspond to any of a variety of devices that utilize or are subject to threshold-based authorization. Individual devices 110 may include various components 112, such as processors, network interface cards, volatile memory, long term storage, displays, and the like. Some or all of the components 112 may be associated with corresponding identifiers 114. For example, a processor component 112 may have a unique serial number that serves as the corresponding identifier 114. A memory component 112 may be associated with a different unique serial number that services as the corresponding identifier 114. A long-term storage component 112 (such as a disk drive) may be associated with its own unique serial number that serves as the corresponding identifier 114. In some embodiments, a component with a corresponding identifier may be a software component. For example, an operating system 122 may be stored in a data store 120 (such as a disk drive). The operating system 122 may be associated with its own unique identifier, as with the other components 112, and may therefore be treated similar to the other components 112 (e.g., assigned shares, weights, etc.). The data store 120 may be associated with its own unique identifier, as with the other components 112.
The devices 110 may also include components for performing secret share processing and/or authorization processes. In some embodiments, a device 110 may include a signature manager 130. The signature manager 130 may be a hardware-based component, or a software-based application or subsystem that runs on a processor of the device 110. The signature manager 130 may perform certain secret share processing and authorization processes, as described in greater detail below. For example, the signature manager 130 may access share data 124 and a verification key data 126 from the data store 120 for use in secret share processing and authorization processes. In some embodiments, the share data 124 and/or verification key data 126 may be stored in signature manager 130 or in some other secure location separate from the data store 120.
In some embodiments, the devices 110 may be or include medical devices, such as infusion pumps, with various components 112. For example, an infusion pump may include a motor controller unit (“MCU”) configured to control the motor that dispenses medication, a communications engine (“CE”) configured to manage network communications to/from the pump, operational software, and various other infusion pump-specific or medical-device specific components, any or all of which may be associated with respective identifiers 114. In addition, the devices 110 themselves may include different types of certain devices, such as different types of infusion pumps. Each type of infusion pump and even different versions of the same type of infusion pump may operate with a different operating system, use a different type of MCU and/or CE, etc.
Secret Share Generation and Distribution Process
At [A], the device 110 can determine identifiers for a set of n components of the device 110. The value of n may depend on the software being installed, the number of components 112 present in the device 110, requirements of the software, etc. For example, n may be 4, and the set of n components may include a processor, memory, network interface, and battery. Each of the components may have an identifier with which they are already associated (e.g., a serial number). In some embodiments, components may be assigned identifiers as part of the pre-authorization setup. The identifiers may be globally-unique identifiers, or identifiers that are unique for at least the type of component to which they are assigned (e.g., identifiers that, in combination with other data such as model numbers, provide substantially unique identification of the respective components).
At [13], the device 110 can send the identifiers to the device management system 100. For example, the device 110 may transmit the identifiers serially, asynchronously, or in a hatch to the device management system 100.
At [C], the share manager 102 or some other module or component of the device management system 100 generates secret shares, such as individual digital signature share generation keys. A different secret share may be generated for each of the n component identifiers that have been received. The secret shares may be generated such that at least a threshold number t (where n>=t>0) of the secret shares must be available in order to generate a digital signature and proceed with an authorization process. The share manager 102 may also generate a verification key that is used during the authorization process to verify a digital signature generated using signature shares that have been generated using the secret shares.
In some embodiments, secret shares may be generated using Lagrange interpolation and Shamir's secret sharing to determine a random polynomial function from which the secret shares are generated. The different secret shares may correspond to values of the polynomial function for different input values (e.g., x1, x2, . . . , xn). The digital signature generation key may correspond to a value of the polynomial function for a particular predetermined input value (e.g., x=0). At authorization time, if at least t secret shares are available (corresponding to at least t different values of the polynomial function for t different input values), then the polynomial function itself may be derived from the secret shares without any other prior knowledge of the polynomial function. The polynomial function may then be evaluated for the predetermined input value that is used to determine the digital signature generation key. If the digital signature generation key is correct, then a digital signature generated using the key will be verified using the verification key that is generated by the share manager 102. If at least t different secret shares are not available, then it may be impossible or computationally infeasible to determine the polynomial function or to otherwise derive the correct digital signature generation key. For example, if there are t−1 shares available, then there may be an infinite number of possible polynomial functions that could be derived from the shares.
The example generation of secret shares described herein is illustrative only, and is not intended to be exhaustive or limiting. In some embodiments, other methods for generating secret shares may be used, such as verifiable secret sharing, Blakely's secret sharing, and the like. Example secret sharing schemes are described in “Secret-Sharing Schemes: A Survey” by Amos Beimel, and “How to Share a Secret” by Adi Shamir, the contents of both of which are incorporated by reference herein and made part of this specification.
At [D], the share manager 102 or some other module or component of the device management system 100 can send share data representing the secret shares, and verification key data representing the verification key, to the device 110. For example, the share manager 102 may transmit the share data and verification key data serially, asynchronously, or in a batch to the device 110.
At [E], the device 110 can store the share data and the verification key data. For example, share data 124a . . . 124n representing secret shares associated with corresponding identifiers 114a . . . 114n, and verification key data 126 representing the verification key, may be stored in the data store 120. In some embodiments, the signature manager 130 may store the share data 124 and verification key data 126 in a secure manner. For example, the share data 124 may be stored such that it is inaccessible outside of the signature manager 130, or such that individual shares are only accessible by querying the signature manager 130 with a valid identifier.
Once the secret shares and verification key have been generated and stored, the device 110 may be ready to execute an authorization process to authorize execution of a particular function such as execution of licensed software.
Threshold-Based Authorization Process
The process 300 shown in
At block 304, the signature manager 130 or some other module or component of the device 110 can obtain identifiers for the components 112 that are present in the device 110. In some embodiments, the signature manager 130 can obtain identifiers 114 for all components 112 of the device 110, or for only certain components 112 (e.g., the n most important components, or the components specified for the function being authorized).
At block 306, the signature manager 130 or some other module or component of the device 110 can obtain secret shares for the identifiers obtained at block 304. In some embodiments the signature manager 130 can query the data store 120 for share data 124 representing the secret shares that correspond to the obtained identifiers 114. There may be more secret shares in the data store 120 than there are identifiers (e.g., if a component 112 was removed but not replaced), there may be more identifiers than secret shares in the data store 120 (e.g., if a component 112 was added without another component being removed), or there may be the same number of secret shares as components (e.g., no components have been added or removed at all or none without the same number of components being removed or added, respectively).
At block 308, the signature manager 130 or some other module or component of the device 110 can generate digital signature shares, also referred to simply as “signature shares,” using the secret shares retrieved above at block 306. In some embodiments, the signature manager 130 may generate a separate signature share using each secret share and the same data item. For example, a predefined encryption function may use a secret share to encrypt a data item, such as a message or some other token. The token may be a randomly-generated value, a token provided to the authorization process, or some other input that is to serve as the unencrypted message to be digitally signed. The token may be encrypted directly, or it may be processed first (e.g., a hash may be generated using a hashing algorithm). The output of the encryption function may be an encrypted version of the input value (or hashed input value). Illustratively, the signature manager 130 may use a first secret share to encrypt a token and generate a first signature share. The signature manager 130 may also use a second secret share to encrypt the same token and generate a second signature share. This process may be repeated for each available secret share to generate a set of signature shares from which a digital signature will be generated as described below.
At block 310, the signature manager 130 or some other module or component of the device 110 can obtain verification key data 126 representing the verification key to be used in verifying a digital signature generated using the signature shares generated using the secret shares.
At block 312, the signature manager 130 or some other module or component of the device 110 can generate a digital signature using the signature shares generated above at block 308. In some embodiments, signature shares may be combined to generate the digital signature. For example, signature shares may be multiplied or added together to obtain a digital signature, depending upon the digital signature thresholding scheme being used. Generally described, the signature shares may serve as input into a function that generates a digital signature using the signature shares. The output of the function may be an encrypted version of the token from which the signature shares were generated.
At block 314, the signature manager 130 or some other module or component of the device 110 can verify the digital signature using the verification key. In some embodiments, the signature manager 130 can decrypt the message, generated above at block 312, using a predefined decryption function and the verification key as the decryption key. If the decrypted message matches the original data item (or hash of the original data item), then the correct digital signature was determined. Otherwise, if the decrypted message does not match the original data item (or hash thereof), then an incorrect digital signature was determined.
At decision block 316, the signature manager 130 or some other module or component of the device 110 can determine whether the digital signature was verified above at block 314. If so, the process can proceed to block 318, where the function is authorized. For example, the software that is to be executed may be permitted to execute. If the signature manager 130 determines that the digital signature was not verified above at block 314, then the process may proceed to block 320, where the function is not authorized. For example, the software that is to be executed may not be permitted to execute.
At block 322 the process 300 can terminate.
Threshold-Based Authorization Using Weighted Secret Shares
At [1], the signature manager 130 or some other module or component of the device 110 can obtain identifiers for the components that are present in the device 110. In some embodiments, the signature manager 130 can obtain identifiers 114 for all components 112 of the device 110, or for only certain components 112 (e.g., the n most important components, or the components specified for the function being authorized).
At [2], the signature manager 130 or some other module or component of the device 110 can obtain secret shares and weights associated with the component identifiers obtained at [1]. The weights and secret shares may be obtained from a data store 120, a separate data store in the signature manager 130, or some other module or component of the device 110. In some embodiments, the weights and secret shares may have been set and stored on the device 110 when the device 110 was manufactured. For example, the manufacturer may determine the weights according to a heuristic that prioritizes some components over other components by assigning higher weights (e.g., weights between 0.75 and 1.0) to components deemed more important, and lower weight (e.g., weights between 0.5 and 0.75) to components deemed less important. Share data 124a . . . 124n representing secret shares, and weight data 402a . . . 402n representing weights, may be stored in the data store 120 or some other module or component of the device 110. In some embodiments, rather than using different weights to represent the relative importance of the components, the components may instead be assigned a different number of secret shares depending upon their relative importance (e.g., more important components may be assigned more secret shares than less important components). For example, if a component has a weight of 5, then there may be 5 different secret shares allotted to the component, while another component with a weight of 1 may have only 1 share allotted. The example weighting methods described herein are illustrative only, and are not intended to be limiting. In some embodiments, other methods for using weighted secret shares may be used.
At [3], the signature manager 130 or some other module or component of the device 110 can generate digital signature shares, if possible, using the secret shares and weights. In some embodiments, the signature manager 130 may generate a different signature share using the same token and each of the different secret shares, as described in greater detail above.
At [4], the signature manager 130 or some other module or component of the device 110 can generate a digital signature using the signature shares determined above. In some embodiments, a predefined function may use the signature shares to generate the digital signature. The output of the function may be an encrypted version of the input value (or hashed input value) from which the signature shares were generated.
At [5], the signature manager 130 or some other module or component of the device 110 can obtain the verification key data 126 representing the verification key to be used in verifying the digital signature that was generated using the signature shares.
At [6], the signature manager 130 or some other module or component of the device 110 can verify the message using the verification key obtained above. In some embodiments, the signature manager 130 can decrypt the message using a predefined decryption function and the verification key as the decryption key. If the decrypted message matches the original data item (or hash of the original data item), then the correct digital signature was determined. Otherwise, if the decrypted message does not match the original data item (or hash thereof), then an incorrect digital signature was determined.
At [7], the signature manager 130 or some other module or component of the device 110 can determine whether the digital signature was verified above at block 314. If so, the function (or operation of the device 110 itself) is authorized. For example, the device 110 may be permitted to enter a ready state in which the device 110 may be used normally. If the signature manager 130 determines that the digital signature was not verified, then the function (or operation of the device 110 itself) is not authorized. For example, the device 110 may enter a blocked state in which normal operation is blocked.
Threshold-Based Multi-Component Authorization
At [a], a device 110a attempts to connect to the application server 500 or perform some other network operation that requires the device 110a to first be authenticated. In some embodiments, the device 110a may be medical device, such as an infusion pump, and the application server 500 may be a related clinical system, such as an infusion control server. Illustratively, the infusion control server may instruct infusion pumps regarding the medication to be dispensed, the patient to be treated, the dosage to be infused, the security measures to be implemented, etc. Accordingly, the manufacturer of the infusion pumps may be interested in blocking operation of the infusion pumps (e.g., preventing the pumps from receiving medication dispensing information) unless and until the infusion pumps can first verify that they are part of a proper clinical environment, such as an environment with a threshold number of other such pumps.
At [b], the application server 500 may employ the services of the device management system 100 to authenticate the device 110a. The application server 500 may generate a token or other data to be signed by the device management system 100. The application server 500 may store or otherwise have access to a verification key that can be used to verify the signed message that is received from the device management system 100, as discussed in greater detail below. In some embodiments, the application server 500 may perform some or all of the functions described below as being performed by the device management system 100, or the device management system 100 may perform some or all of the function described as being performed by the application server 500. For example, the application server 500 and device management system 100 may be subsystems of a larger integrated system that includes one or more computing devices configured to perform the disclosed operations.
At [c], the device management system 100 can obtain identifiers and/or corresponding secret shares of the devices 110b . . . 110n that will participate in the multi-device authorization. For example, individual devices 110b . . . 110n can each provide their secret shares 504b . . . 504n to the device management system 100 when the devices 110b . . . 110n boot up, connect to the network environment, connect to the application server 500, are themselves authorized, or the like. As another example, the devices 110b . . . 110n can provide their identifiers 502b . . . 502n (e.g., serial numbers, internet protocol or “IP” addresses, media access control or “MAC” addresses, application-specific identifiers, etc.). The device management system 100 can use the identifiers at [d] to access secret shares corresponding to the devices. As a further example, the device management system 100 may retrieve secret shares and/or identifiers from the devices 110b . . . 110n in response to receiving a token and authentication request, from the application server 500.
The secret shares may be assigned to the devices when the devices are manufactured, when the devices are implemented in the network environment, as the devices are authenticated using a multi-device authorization process, etc. In some embodiments, secret shares may be assigned to devices for periods of time, or secret shares may be revoked in response to the occurrence of particular events. For example, a device 110b may be assigned a secret share for a predetermined or dynamically determined period of time (e.g., 1 hour, 1 day, 1 year, 1 network communication session, etc.) after which the device 110b must be reassigned a share or have its secret share renewed (e.g., upon completion of a multi-device authorization process for the device 110b).
At [e], the authorization manager 104 or some other module or component of the device management system 100 can generate signature shares, if possible, using the secret shares, as discussed in greater detail above. In some embodiments, a predefined encryption function may use individual secret shares to encrypt the same data item, generating a set of signature shares. The data item may be the token or other data received from the application server 500. The data item may be encrypted directly, or it may be processed first (e.g., a hash may be generated using a hashing algorithm). This process may be repeated for each available secret share as described above.
At [f], the authorization manager 104 or some other module or component of the device management system 100 can generate a digital signature using the signature shares determined above. A valid digital signature may only be generated if a threshold number of secret shares, corresponding to a threshold number of devices 110a . . . 110n, are available at the time the authorization process is performed. If there are fewer than the threshold number of secret shares, then a valid digital signature may be impossible or computationally infeasible to determine. In this instance, the authorization process may be aborted, and/or an error message or other failure message may be returned to the application server 500.
At [g], the authorization manager 104 or some other module or component of the device manager 100 can send the digital signature (e.g., the encrypted token) to the application server 500.
At [h], the application server 500 can access (e.g., in data store 520) verification key data 514 representing the verification key, and decrypt the message using a predefined decryption function and the verification key as the decryption key. If the decrypted message matches the original token that was sent to the device manager 100 (or data derived therefrom, such as a hash), then the correct digital signature was determined. In this instance, the device 110a may be considered authorized because at least a threshold number of other devices participated in the authorization process. Otherwise, if the decrypted message does not match the original data item (or hash thereof), then an incorrect digital signature was determined. In this instance, the application server 500 may block the device 110a from performing the function that the device 110a is attempting to perform because the device 110a has not been authorized. This may occur when fewer than a threshold number of devices participate in the process, such as when the device 110 is being used outside of an intended clinical environment (e.g., the device is lost, stolen, or sold).
Threshold-Based Security Enforcement Using Weighted Secret Shares
The displayed interactions may occur when a device 110 connects to the device management system 100 or otherwise attempts to perform a network operation. In some embodiments, threshold-based security enforcement may be used when the device 110 communicates with an application server, such as the application server 500 described above.
At [i], a security module (e.g., security module 602a or 602n) associated with a particular component e.g., component 112a or 112n, respectively) of the device 110 may determine that a security event has occurred. For example, the security module 602a may detect security events such as failed login attempts, medication or dosing alerts, security override events, repeated pings, network scanning activity, denial of service conditions, other alerts or errors, and the like. In some embodiments, the device 110 may be a medical device, such as an infusion pump. In this instance, the component 112a may be a component of the infusion pump, such as an MCU, and the security module 602a may be assigned to or integrated with the MCU. The security module 602a may detect security events such as invalid attempts to infuse medication, alerts indicating an attempt to infuse an unsafe dose, or the like.
At [ii], the security module 602a may modify the weight 604a based on the security event(s) that the security module 602a has detected. The degree to which the weight 604a is adjusted may be incremental, or it may be dynamically determined based on the particular event(s) detected. For example, the weight 604a may have a starting or default value (e.g., 1.0) when the device 110 begins operation. The security module 602a may be configured to lower the weight 604a by an incremental amount for each security risk that is detected (e.g., lower the weight by 0.05 for each failed login attempt, each medication dose alarm, etc.). As another example, the security module 602a may be configured to lower the weight by a varying amount depending upon the particular security risk identified (e.g., lower the weight by 0.1 after three failed login attempts, lower the weight by 0.2 after two medication dose alarms, etc.).
In some embodiments, the security module 602a may increase the weight 604a in response to certain events, after the passage of a predetermined or dynamically determined period of time, etc. For example, the security module 602a may increase the weight 604a after a period of time (e.g., 10 minutes, 1 hour, etc.) has passed without a negative security event occurring. As another example, the security module 602a may reset the weight 604a to its default value in response to an administrator logging into the system. In some embodiments, the security module 602a may only adjust a weight 604a between maximum and minimum values (e.g., the weight may not be permitted to fall below 0.0 or rise above 1.0).
The example security events, weighting factor values, and adjustment rules described herein are illustrative only, and are not intended to be limiting. In some embodiments, fewer, additional, and/or alternative events, weighting factor values, and adjustment rules may be used.
At [iii], the device 110 can attempt to perform a particular function, such as connect to the device management system 100 or perform some other network operation that requires the security status of the device 110 to first be validated. For example, if the device 110 is a medical device such as an infusion pump, the device may attempt to infuse medication, connect to a network server to obtain data regarding medications, doses, or patients, etc. Accordingly, the manufacturer of infusion pumps may be interested in blocking operation of the infusion pumps (e.g., preventing the pumps from receiving medication dispensing information) unless and until the security status of the infusion pumps can first be validated.
At [iv], the device management system 100 may generate a token or other data to be signed by the device 110. The device management system 100 may store or otherwise have access to a verification key that can be used to verify the signed message that is received from the device 110, as discussed in greater detail below.
At [v], the signature manager 130 or some other module or component of the device 110 can obtain identifiers and corresponding secret shares and weights for the components 112a . . . 112n. For example, the signature manager 130 may determine the identifiers 114a . . . 114n of the components 112a . . . 112n. The signature manager 130 may then obtain the corresponding secret shares 124a . . . 124n and weights 604a . . . 604n from the data store 120.
At [vi], the signature manager 130 or some other module or component of the device 110 can generate signature shares using the secret shares 124a . . . 124n and weights 604a . . . 604n, as discussed in greater detail above. A digital signature may then be generated using the signature shares. If the amount of weighted secret shares fails to satisfy the threshold amount, then a valid digital signature may be impossible or computationally infeasible to determine. In this instance, the authorization process may be aborted, and/or an error message or other failure message may be returned.
If a threshold number of signature shares are generated, the signature manager 130 can then generate the digital signature, as described in greater detail above.
At [vii], the device 110 can send the signed message (e.g., the encrypted token) to the device management system 100.
At [viii], the device management system 100 can obtain the verification key data 606 representing the verification key, and decrypt the message using a predefined decryption function and the verification key as the decryption key. If the decrypted message matches the original token that was sent to the device management system 100 (or data derived therefrom, such as a hash), then the correct digital signature was determined. In this instance, the device 110 may be considered to be in a secure state because at least a threshold amount of weighted secret shares, as maintained by the various components of the device 110, were available for the authorization process. Otherwise, if the decrypted message does not match the original data item (or hash thereof), then an incorrect digital signature was determined. In this instance, the device management system 100 may block the device 110 from communicating with the device management system 100, other network systems (e.g., application server 500), performing particular operations, etc.
Other Considerations
It is to be understood that not necessarily all objects or advantages may be achieved in accordance with any particular embodiment described herein. Thus, for example, those skilled in the art will recognize that certain embodiments may be configured to operate in a manner that achieves or optimizes one advantage or group of advantages as taught herein without necessarily achieving other objects or advantages as may be taught or suggested herein.
Many other variations than those described herein will be apparent from this disclosure. For example, depending on the embodiment, certain acts, events, or functions of any of the algorithms described herein can be performed in a different sequence, can be added, merged, or left out altogether (e.g., not all described acts or events are necessary for the practice of the algorithms). Moreover, in certain embodiments, acts or events can be performed concurrently, e.g., through multi-threaded processing, interrupt processing, or multiple processors or processor cores or on other parallel architectures, rather than sequentially. In addition, different tasks or processes can be performed by different machines and/or computing systems that can function together.
The various illustrative logical blocks, modules, and algorithm elements described in connection with the embodiments disclosed herein can be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, and elements have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. The described functionality can be implemented in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosure.
The various illustrative logical blocks and modules described in connection with the embodiments disclosed herein can be implemented or performed by a machine, such as a computer processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A computer processor can be a microprocessor, but in the alternative, the processor can be a controller, microcontroller, or state machine, combinations of the same, or the like. A processor can include electrical circuitry configured to process computer-executable instructions. In another embodiment, a processor includes an FPGA or other programmable device that performs logic operations without processing computer-executable instructions. A processor can also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. Although described herein primarily with respect to digital technology, a processor may also include primarily analog components. For example, some or all of the signal processing algorithms described herein may be implemented in analog circuitry or mixed analog and digital circuitry. A computing environment can include any type of computer system, including, but not limited to, a computer system based on a microprocessor, a mainframe computer, a digital signal processor, a portable computing device, a device controller, or a computational engine within an appliance, to name a few.
The elements of a method, process, or algorithm described in connection with the embodiments disclosed herein can be embodied directly in hardware, in a software module stored in one or more memory devices and executed by one or more processors, or in a combination of the two. A software module can reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD ROM, or any other form of non-transitory computer-readable storage medium, media, or physical computer storage known in the art. An example storage medium can be coupled to the processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium can be integral to the processor. The storage medium can be volatile or nonvolatile. The processor and the storage medium can reside in an ASIC. The ASIC can reside in a user terminal. In the alternative, the processor and the storage medium can reside as discrete components in a user terminal.
Conditional language used herein, such as, among others, “can,” “might,” “may,” “e.g.,” and the like, unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements, and/or states. Thus, such conditional language is not generally intended to imply that features, elements and/or states are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without author input or prompting, whether these features, elements and/or states are included or are to be performed in any particular embodiment. The terms “comprising,” “including,” “having,” and the like are synonymous and are used inclusively, in an open-ended fashion, and do not exclude additional elements, features, acts, operations, and so forth. Also, the term “or” is used in its inclusive sense (and not in its exclusive sense) so that when used, for example, to connect a list of elements, the term “or” means one, some, or all of the elements in the list. Further, the term “each,” as used herein, in addition to having its ordinary meaning, can mean any subset of a set of elements to which the term “each” is applied.
Disjunctive language such as the phrase “at least one of X, Y, or Z,” unless specifically stated otherwise, is otherwise understood with the context as used in general to present that an item, term, etc., may be either X, Y, or Z, or any combination thereof (e.g., X, Y, and/or Z). Thus, such disjunctive language is not generally intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z to each be present.
Unless otherwise explicitly stated, articles such as “a”, “an”, or “the” should generally be interpreted to include one or more described items. Accordingly, phrases such as “a device configured to” are intended to include one or more recited devices. Such one or more recited devices can also be collectively configured to carry out the stated recitations. For example, “a processor configured to carry out recitations A, B, and C” can include a first processor configured to carry out recitation A working in conjunction with a second processor configured to carry out recitations B and C.
While the above detailed description has shown, described, and pointed out novel features as applied to various embodiments, it will be understood that various omissions, substitutions, and changes in the form and details of the devices or algorithms illustrated can be made without departing from the spirit of the disclosure. As will be recognized, certain embodiments described herein can be implemented within a form that does not provide all of the features and benefits set forth herein, as some features can be used or practiced separately from others. All such modifications and variations are intended to be included herein within the scope of this disclosure. Further, additional embodiments created by combining any two or more features or techniques of one or more embodiments described herein are also intended to be included herein within the scope of this disclosure.
The present application is a continuation of International Patent Application No. PCT/US2020/031664, filed on May 6, 2020 and titled “Threshold Signature Based Medical Device Management,” which claims priority to U.S. Provisional Patent Application No. 62/845,115, filed on May 8, 2019 and titled “Threshold Signature Based Medical Device Management,” the contents of both of which are incorporated by reference herein.
Number | Name | Date | Kind |
---|---|---|---|
4024864 | Davies et al. | May 1977 | A |
4055175 | Clemens et al. | Oct 1977 | A |
4151845 | Clemens | May 1979 | A |
4213454 | Shim | Jul 1980 | A |
4240438 | Updike et al. | Dec 1980 | A |
4280494 | Cosgrove et al. | Jul 1981 | A |
4308866 | Jeliffe | Jan 1982 | A |
4370983 | Lichtenstein et al. | Feb 1983 | A |
4373527 | Fischell | Feb 1983 | A |
4392849 | Petre et al. | Jul 1983 | A |
4395259 | Prestele et al. | Jul 1983 | A |
4457751 | Rodler | Jul 1984 | A |
4464170 | Clemens | Aug 1984 | A |
4469481 | Kobayashi | Sep 1984 | A |
4475901 | Kraegen et al. | Oct 1984 | A |
4494950 | Fischell | Jan 1985 | A |
4498843 | Schneider et al. | Feb 1985 | A |
4515584 | Abe et al. | May 1985 | A |
4526568 | Clemens et al. | Jul 1985 | A |
4529401 | Leslie et al. | Jul 1985 | A |
4543955 | Schroeppel | Oct 1985 | A |
4551133 | Zegers de Beyl et al. | Nov 1985 | A |
4553958 | LeCocq | Nov 1985 | A |
4559037 | Franetzki et al. | Dec 1985 | A |
4613937 | Batty | Sep 1986 | A |
4624661 | Arimond | Nov 1986 | A |
4633878 | Bombardieri | Jan 1987 | A |
4634426 | Kamen | Jan 1987 | A |
4634427 | Hannula et al. | Jan 1987 | A |
4674652 | Aten et al. | Jun 1987 | A |
4676776 | Howson et al. | Jun 1987 | A |
4679562 | Luksha | Jul 1987 | A |
4685903 | Cable et al. | Aug 1987 | A |
4695954 | Rose | Sep 1987 | A |
4696671 | Epstein et al. | Sep 1987 | A |
4714462 | DiDomenico | Dec 1987 | A |
4722734 | Kolin | Feb 1988 | A |
4730849 | Siegel | Mar 1988 | A |
4731051 | Fischell | Mar 1988 | A |
4741732 | Crankshaw et al. | May 1988 | A |
4756706 | Kerns et al. | Jul 1988 | A |
4776842 | Franetzki et al. | Oct 1988 | A |
4785969 | Mclaughlin | Nov 1988 | A |
4803625 | Fu et al. | Feb 1989 | A |
4835372 | Gombrich et al. | May 1989 | A |
4838275 | Lee | Jun 1989 | A |
4838856 | Mulreany et al. | Jun 1989 | A |
4838857 | Strowe et al. | Jun 1989 | A |
4854324 | Hirschman et al. | Aug 1989 | A |
4857716 | Gombrich et al. | Aug 1989 | A |
4858154 | Anderson et al. | Aug 1989 | A |
4898578 | Rubalcaba, Jr. | Feb 1990 | A |
4908017 | Howson et al. | Mar 1990 | A |
4933873 | Kaufman et al. | Jun 1990 | A |
4943279 | Samiotes et al. | Jul 1990 | A |
4946439 | Eggers | Aug 1990 | A |
4953745 | Rowlett | Sep 1990 | A |
4978335 | Arthur, III | Dec 1990 | A |
5000739 | Kulisz et al. | Mar 1991 | A |
5010473 | Jacobs | Apr 1991 | A |
5014698 | Cohen | May 1991 | A |
5016172 | Dessertine | May 1991 | A |
5026084 | Paisfield | Jun 1991 | A |
5034004 | Crankshaw | Jul 1991 | A |
5041086 | Koenig et al. | Aug 1991 | A |
5058161 | Weiss | Oct 1991 | A |
5078683 | Sancoff et al. | Jan 1992 | A |
5084828 | Kaufman et al. | Jan 1992 | A |
5088981 | Howson et al. | Feb 1992 | A |
5097505 | Weiss | Mar 1992 | A |
5100380 | Epstein et al. | Mar 1992 | A |
5102392 | Sakai et al. | Apr 1992 | A |
5104374 | Bishko et al. | Apr 1992 | A |
5109850 | Blanco et al. | May 1992 | A |
5131816 | Brown | Jul 1992 | A |
5142484 | Kaufman et al. | Aug 1992 | A |
5153827 | Coutre et al. | Oct 1992 | A |
5157640 | Backner | Oct 1992 | A |
5161222 | Montejo et al. | Nov 1992 | A |
5177993 | Beckman et al. | Jan 1993 | A |
5181910 | Scanlon | Jan 1993 | A |
5190522 | Wocicki et al. | Mar 1993 | A |
5199439 | Zimmerman et al. | Apr 1993 | A |
5200891 | Kehr et al. | Apr 1993 | A |
5216597 | Beckers | Jun 1993 | A |
5221268 | Barton et al. | Jun 1993 | A |
5230061 | Welch | Jul 1993 | A |
5243982 | Möstl et al. | Sep 1993 | A |
5244463 | Cordner, Jr. et al. | Sep 1993 | A |
5249260 | Nigawara et al. | Sep 1993 | A |
5254096 | Rondelet et al. | Oct 1993 | A |
5256156 | Kern et al. | Oct 1993 | A |
5256157 | Samiotes et al. | Oct 1993 | A |
5261702 | Mayfield | Nov 1993 | A |
5317506 | Coutre et al. | May 1994 | A |
5319355 | Russek | Jun 1994 | A |
5319363 | Welch et al. | Jun 1994 | A |
5330634 | Wong et al. | Jul 1994 | A |
5338157 | Blomquist | Aug 1994 | A |
5341476 | Lowell | Aug 1994 | A |
5364346 | Schrezenmeir | Nov 1994 | A |
5366346 | Danby | Nov 1994 | A |
5368562 | Blomquist et al. | Nov 1994 | A |
5373454 | Kanda et al. | Dec 1994 | A |
5376070 | Purvis et al. | Dec 1994 | A |
5378231 | Johnson et al. | Jan 1995 | A |
5389071 | Kawahara et al. | Feb 1995 | A |
5389078 | Zalesky et al. | Feb 1995 | A |
5417222 | Dempsey et al. | May 1995 | A |
5423748 | Uhala | Jun 1995 | A |
5429602 | Hauser | Jul 1995 | A |
5431627 | Pastrone et al. | Jul 1995 | A |
5432777 | Le Boudec et al. | Jul 1995 | A |
5445621 | Poli et al. | Aug 1995 | A |
5447164 | Shaya et al. | Sep 1995 | A |
5455851 | Chaco et al. | Oct 1995 | A |
5461365 | Schlager et al. | Oct 1995 | A |
5464392 | Epstein et al. | Nov 1995 | A |
5465082 | Chaco | Nov 1995 | A |
5485408 | Blomquist | Jan 1996 | A |
5486286 | Peterson et al. | Jan 1996 | A |
5493430 | Lu et al. | Feb 1996 | A |
5496273 | Pastrone et al. | Mar 1996 | A |
5505828 | Wong et al. | Apr 1996 | A |
5507288 | Bocker et al. | Apr 1996 | A |
5507786 | Morgan et al. | Apr 1996 | A |
5508499 | Ferrario | Apr 1996 | A |
5515713 | Saugues et al. | May 1996 | A |
5520637 | Pager et al. | May 1996 | A |
5522798 | Johnson et al. | Jun 1996 | A |
5547470 | Johnson et al. | Aug 1996 | A |
5554013 | Owens et al. | Sep 1996 | A |
5562615 | Nassif | Oct 1996 | A |
5577169 | Prezioso | Nov 1996 | A |
5582323 | Kurtenbach | Dec 1996 | A |
5582593 | Hultman | Dec 1996 | A |
5594786 | Chaco et al. | Jan 1997 | A |
5598519 | Narayanan | Jan 1997 | A |
5620608 | Rosa et al. | Apr 1997 | A |
5630710 | Tune et al. | May 1997 | A |
5636044 | Yuan et al. | Jun 1997 | A |
5643212 | Coutre et al. | Jul 1997 | A |
5651775 | Walker et al. | Jul 1997 | A |
5658131 | Aoki et al. | Aug 1997 | A |
5658250 | Blomquist et al. | Aug 1997 | A |
5665065 | Colman et al. | Sep 1997 | A |
5669877 | Blomquist | Sep 1997 | A |
5672154 | Sillén et al. | Sep 1997 | A |
5681285 | Ford et al. | Oct 1997 | A |
5685844 | Marttila | Nov 1997 | A |
5687717 | Halpern et al. | Nov 1997 | A |
5689229 | Chaco et al. | Nov 1997 | A |
5697899 | Hillman et al. | Dec 1997 | A |
5699509 | Gary et al. | Dec 1997 | A |
5708714 | Lopez et al. | Jan 1998 | A |
5713350 | Yokota et al. | Feb 1998 | A |
5713856 | Eggers et al. | Feb 1998 | A |
5718562 | Lawless et al. | Feb 1998 | A |
5719761 | Gatti et al. | Feb 1998 | A |
5733259 | Valcke et al. | Mar 1998 | A |
5738102 | Lemelson | Apr 1998 | A |
5744027 | Connell et al. | Apr 1998 | A |
5752621 | Passamante | May 1998 | A |
5754111 | Garcia | May 1998 | A |
5764034 | Bowman et al. | Jun 1998 | A |
5764159 | Neftel et al. | Jun 1998 | A |
5772635 | Dastur et al. | Jun 1998 | A |
5774865 | Glynn | Jun 1998 | A |
5778256 | Darbee | Jul 1998 | A |
5778345 | McCartney | Jul 1998 | A |
5781442 | Engleson et al. | Jul 1998 | A |
5782805 | Meinzer et al. | Jul 1998 | A |
5788669 | Peterson | Aug 1998 | A |
5797515 | Liff et al. | Aug 1998 | A |
5800387 | Duffy et al. | Sep 1998 | A |
5814015 | Gargano et al. | Sep 1998 | A |
5822544 | Chaco et al. | Oct 1998 | A |
5822715 | Worthington et al. | Oct 1998 | A |
5827179 | Lichter et al. | Oct 1998 | A |
5832448 | Brown | Nov 1998 | A |
5836910 | Duffy et al. | Nov 1998 | A |
5850344 | Conkright | Dec 1998 | A |
5867821 | Ballantyne et al. | Feb 1999 | A |
5870733 | Bass et al. | Feb 1999 | A |
5871465 | Vasko | Feb 1999 | A |
5873731 | Predergast | Feb 1999 | A |
5885245 | Lynch et al. | Mar 1999 | A |
5897493 | Brown | Apr 1999 | A |
5897498 | Canfield, II et al. | Apr 1999 | A |
5910252 | Truitt et al. | Jun 1999 | A |
5912818 | McGrady et al. | Jun 1999 | A |
5915240 | Karpf | Jun 1999 | A |
5920054 | Uber, III | Jul 1999 | A |
5920263 | Huttenhoff et al. | Jul 1999 | A |
5924074 | Evans | Jul 1999 | A |
5931764 | Freeman et al. | Aug 1999 | A |
5935099 | Peterson et al. | Aug 1999 | A |
5935106 | Olsen | Aug 1999 | A |
5941846 | Duffy et al. | Aug 1999 | A |
5956501 | Brown | Sep 1999 | A |
5957885 | Bollish et al. | Sep 1999 | A |
5960085 | de la Huerga | Sep 1999 | A |
5961448 | Swenson et al. | Oct 1999 | A |
5967559 | Abramowitz | Oct 1999 | A |
5971594 | Sahai et al. | Oct 1999 | A |
5975081 | Hood et al. | Nov 1999 | A |
5990838 | Burns et al. | Nov 1999 | A |
5997476 | Brown | Dec 1999 | A |
6000828 | Leet | Dec 1999 | A |
6003006 | Colella et al. | Dec 1999 | A |
6012034 | Hamparian et al. | Jan 2000 | A |
6017318 | Gauthier et al. | Jan 2000 | A |
6021392 | Lester et al. | Feb 2000 | A |
6024539 | Blomquist | Feb 2000 | A |
6024699 | Surwit et al. | Feb 2000 | A |
6032155 | de la Huerga | Feb 2000 | A |
6032676 | Moore | Mar 2000 | A |
6039251 | Holowko et al. | Mar 2000 | A |
6070761 | Bloom et al. | Jun 2000 | A |
6073106 | Rozen et al. | Jun 2000 | A |
6104295 | Gaisser et al. | Aug 2000 | A |
6112182 | Akers et al. | Aug 2000 | A |
6112323 | Meizlik et al. | Aug 2000 | A |
RE36871 | Epstein et al. | Sep 2000 | E |
6115365 | Newberg | Sep 2000 | A |
6115390 | Chuah | Sep 2000 | A |
6122536 | Sun et al. | Sep 2000 | A |
6126637 | Kriesel et al. | Oct 2000 | A |
6135949 | Russo et al. | Oct 2000 | A |
6150942 | O'Brien | Nov 2000 | A |
6151643 | Cheng et al. | Nov 2000 | A |
6157914 | Seto et al. | Dec 2000 | A |
6159147 | Lichter et al. | Dec 2000 | A |
6167567 | Chiles et al. | Dec 2000 | A |
6182667 | Hanks et al. | Feb 2001 | B1 |
6189105 | Lopes | Feb 2001 | B1 |
6195589 | Ketcham | Feb 2001 | B1 |
6208974 | Campbell et al. | Mar 2001 | B1 |
6222323 | Yamashita et al. | Apr 2001 | B1 |
6223440 | Rashman | May 2001 | B1 |
6226277 | Chuah | May 2001 | B1 |
6227371 | Song | May 2001 | B1 |
6234176 | Domae et al. | May 2001 | B1 |
6241704 | Peterson et al. | Jun 2001 | B1 |
6248067 | Causey, III et al. | Jun 2001 | B1 |
6249705 | Snell | Jun 2001 | B1 |
6257265 | Brunner et al. | Jul 2001 | B1 |
6259355 | Chaco et al. | Jul 2001 | B1 |
6269340 | Ford et al. | Jul 2001 | B1 |
6270455 | Brown | Aug 2001 | B1 |
6271813 | Palalau | Aug 2001 | B1 |
6277072 | Bardy | Aug 2001 | B1 |
6280380 | Bardy | Aug 2001 | B1 |
6283761 | Joao | Sep 2001 | B1 |
6285665 | Chuah | Sep 2001 | B1 |
6292860 | Cochcroft, Jr. | Sep 2001 | B1 |
6312378 | Bardy | Nov 2001 | B1 |
6327254 | Chuah | Dec 2001 | B1 |
6330008 | Razdow et al. | Dec 2001 | B1 |
6339718 | Zatezalo et al. | Jan 2002 | B1 |
6346886 | de la Huerga | Feb 2002 | B1 |
6363282 | Nichols et al. | Mar 2002 | B1 |
6371719 | Hildebrandt | Apr 2002 | B1 |
6377548 | Chuah | Apr 2002 | B1 |
6388951 | Matsumoto et al. | May 2002 | B1 |
6406426 | Reuss et al. | Jun 2002 | B1 |
6408330 | de la Huerga | Jun 2002 | B1 |
6418334 | Unger et al. | Jul 2002 | B1 |
6427088 | Bowman et al. | Jul 2002 | B1 |
6428483 | Carlebach | Aug 2002 | B1 |
6442432 | Lee | Aug 2002 | B2 |
6469991 | Chuah | Oct 2002 | B1 |
6475180 | Peterson et al. | Nov 2002 | B2 |
6482158 | Mault | Nov 2002 | B2 |
6485418 | Yasushi et al. | Nov 2002 | B2 |
6494694 | Lawless et al. | Dec 2002 | B2 |
6494831 | Koritzinsky | Dec 2002 | B1 |
6497680 | Holst et al. | Dec 2002 | B1 |
6514460 | Fendrock | Feb 2003 | B1 |
6517482 | Eiden et al. | Feb 2003 | B1 |
6519569 | White et al. | Feb 2003 | B1 |
6520930 | Critchlow et al. | Feb 2003 | B2 |
6540672 | Simonsen et al. | Apr 2003 | B1 |
6542902 | Dulong et al. | Apr 2003 | B2 |
6544212 | Galley et al. | Apr 2003 | B2 |
6544228 | Heitmeier | Apr 2003 | B1 |
6546350 | Hartmann et al. | Apr 2003 | B1 |
6551276 | Mann et al. | Apr 2003 | B1 |
6554798 | Mann et al. | Apr 2003 | B1 |
6558320 | Causey et al. | May 2003 | B1 |
6558351 | Steil et al. | May 2003 | B1 |
6565509 | Say et al. | May 2003 | B1 |
6567416 | Chuah | May 2003 | B1 |
6571294 | Simmon et al. | May 2003 | B2 |
6572542 | Houben et al. | Jun 2003 | B1 |
6572545 | Knobbe et al. | Jun 2003 | B2 |
6578002 | Derzay et al. | Jun 2003 | B1 |
6581117 | Klein et al. | Jun 2003 | B1 |
6587034 | Heiman et al. | Jul 2003 | B1 |
6589229 | Connelly et al. | Jul 2003 | B1 |
6599281 | Struys et al. | Jul 2003 | B1 |
6602191 | Quy | Aug 2003 | B2 |
6605072 | Struys et al. | Aug 2003 | B2 |
6628809 | Rowe et al. | Sep 2003 | B1 |
6631353 | Davis et al. | Oct 2003 | B1 |
6640246 | Gardy, Jr. et al. | Oct 2003 | B1 |
6641533 | Causey, III et al. | Nov 2003 | B2 |
6647299 | Bourget | Nov 2003 | B2 |
6652455 | Kocher | Nov 2003 | B1 |
6653937 | Nelson et al. | Nov 2003 | B2 |
6659947 | Carter et al. | Dec 2003 | B1 |
6669630 | Joliat et al. | Dec 2003 | B1 |
6671563 | Engleson et al. | Dec 2003 | B1 |
6673033 | Sciulli et al. | Jan 2004 | B1 |
6674403 | Gray et al. | Jan 2004 | B2 |
6681003 | Linder et al. | Jan 2004 | B2 |
6689091 | Bui et al. | Feb 2004 | B2 |
6692241 | Watanabe et al. | Feb 2004 | B2 |
6694191 | Starkweather et al. | Feb 2004 | B2 |
6694334 | DuLong et al. | Feb 2004 | B2 |
6721286 | Williams et al. | Apr 2004 | B1 |
6721582 | Trepagnier et al. | Apr 2004 | B2 |
6725200 | Rost | Apr 2004 | B1 |
6731989 | Engleson et al. | May 2004 | B2 |
6740072 | Starkweather et al. | May 2004 | B2 |
6751651 | Crockett | Jun 2004 | B2 |
6752787 | Causey, III et al. | Jun 2004 | B1 |
6753830 | Gelbman | Jun 2004 | B2 |
6758810 | Lebel et al. | Jul 2004 | B2 |
6773396 | Flach et al. | Aug 2004 | B2 |
6774786 | Havekost et al. | Aug 2004 | B1 |
6775577 | Cmkovich et al. | Aug 2004 | B2 |
6780156 | Haueter et al. | Aug 2004 | B2 |
6790198 | White et al. | Sep 2004 | B1 |
6792470 | Hakenberg et al. | Sep 2004 | B2 |
6796956 | Hartlaub et al. | Sep 2004 | B2 |
6799149 | Hartlaub | Sep 2004 | B2 |
6809653 | Mann et al. | Oct 2004 | B1 |
6811534 | Bowman, IV et al. | Nov 2004 | B2 |
6816605 | Rowe et al. | Nov 2004 | B2 |
6839753 | Biondi et al. | Jan 2005 | B2 |
6852104 | Blomquist | Feb 2005 | B2 |
6859134 | Heiman et al. | Feb 2005 | B1 |
6871211 | Labounty et al. | Mar 2005 | B2 |
6873268 | Lebel et al. | Mar 2005 | B2 |
6876303 | Reeder et al. | Apr 2005 | B2 |
6885881 | Leonhardt | Apr 2005 | B2 |
6891525 | Ogoro | May 2005 | B2 |
6892278 | Ebergen | May 2005 | B2 |
6899695 | Herrera | May 2005 | B2 |
6915170 | Engleson et al. | Jul 2005 | B2 |
6923763 | Kovatchev et al. | Aug 2005 | B1 |
6924781 | Gelbman | Aug 2005 | B1 |
6928338 | Buchser et al. | Aug 2005 | B1 |
6928490 | Bucholz et al. | Aug 2005 | B1 |
6936029 | Mann et al. | Aug 2005 | B2 |
6945954 | Hochman et al. | Sep 2005 | B2 |
6948492 | Wemeling et al. | Sep 2005 | B2 |
6958677 | Carter | Oct 2005 | B1 |
6958691 | Anderson et al. | Oct 2005 | B1 |
6958705 | Lebel et al. | Oct 2005 | B2 |
6961448 | Nichols et al. | Nov 2005 | B2 |
6969352 | Chiang et al. | Nov 2005 | B2 |
6969865 | Duchon et al. | Nov 2005 | B2 |
6974437 | Lebel et al. | Dec 2005 | B2 |
6979326 | Mann et al. | Dec 2005 | B2 |
6980958 | Surwit et al. | Dec 2005 | B1 |
6985870 | Martucci et al. | Jan 2006 | B2 |
6986347 | Hickle | Jan 2006 | B2 |
6997880 | Carlebach et al. | Feb 2006 | B2 |
6997920 | Mann et al. | Feb 2006 | B2 |
6998984 | Zittrain | Feb 2006 | B1 |
7016752 | Ruben et al. | Mar 2006 | B1 |
7017293 | Riley | Mar 2006 | B2 |
7025743 | Mann et al. | Apr 2006 | B2 |
7029455 | Flaherty | Apr 2006 | B2 |
7038584 | Carter | May 2006 | B2 |
7060031 | Webb et al. | Jun 2006 | B2 |
7060059 | Keith et al. | Jun 2006 | B2 |
7069552 | Lindberg et al. | Jun 2006 | B2 |
7072725 | Bristol et al. | Jul 2006 | B2 |
7079035 | Bock et al. | Jul 2006 | B2 |
7092943 | Roese et al. | Aug 2006 | B2 |
7096072 | Engleson et al. | Aug 2006 | B2 |
7099809 | Dori | Aug 2006 | B2 |
7103419 | Engleson et al. | Sep 2006 | B2 |
7103578 | Beck et al. | Sep 2006 | B2 |
7107106 | Engleson et al. | Sep 2006 | B2 |
7108680 | Rohr et al. | Sep 2006 | B2 |
7109878 | Mann et al. | Sep 2006 | B2 |
7114002 | Okumura et al. | Sep 2006 | B1 |
7117041 | Engleson et al. | Oct 2006 | B2 |
7136645 | Hanson et al. | Nov 2006 | B2 |
7137964 | Flaherty | Nov 2006 | B2 |
7142190 | Martinez | Nov 2006 | B2 |
7150741 | Erickson et al. | Dec 2006 | B2 |
7153289 | Vasko | Dec 2006 | B2 |
7154397 | Zerhusen et al. | Dec 2006 | B2 |
7156807 | Carter et al. | Jan 2007 | B2 |
7158030 | Chung | Jan 2007 | B2 |
7161484 | Tsoukalis et al. | Jan 2007 | B2 |
7167755 | Seeberger et al. | Jan 2007 | B2 |
7167920 | Traversat | Jan 2007 | B2 |
7171277 | Engleson et al. | Jan 2007 | B2 |
7171492 | Borella et al. | Jan 2007 | B1 |
7181493 | English et al. | Feb 2007 | B2 |
7185288 | McKeever | Feb 2007 | B2 |
7193514 | Ritson | Mar 2007 | B2 |
7197025 | Chuah | Mar 2007 | B2 |
7201734 | Hickle | Apr 2007 | B2 |
7204823 | Estes et al. | Apr 2007 | B2 |
7213009 | Pestotnik | May 2007 | B2 |
7216802 | de la Huerga | May 2007 | B1 |
7220240 | Struys et al. | May 2007 | B2 |
7224979 | Singhal et al. | May 2007 | B2 |
7229430 | Hickle et al. | Jun 2007 | B2 |
7230529 | Ketcherside | Jun 2007 | B2 |
7236936 | White et al. | Jun 2007 | B2 |
7238164 | Childers et al. | Jul 2007 | B2 |
7247154 | Hickle | Jul 2007 | B2 |
7248239 | Dowling | Jul 2007 | B2 |
7250856 | Havekost et al. | Jul 2007 | B2 |
7255683 | Vanderveen et al. | Aug 2007 | B2 |
7256888 | Staehr et al. | Aug 2007 | B2 |
7258534 | Fathallah et al. | Aug 2007 | B2 |
7263213 | Rowe | Aug 2007 | B2 |
7267664 | Rizzo | Sep 2007 | B2 |
7267665 | Steil et al. | Sep 2007 | B2 |
7275156 | Balfanz et al. | Sep 2007 | B2 |
7278983 | Ireland et al. | Oct 2007 | B2 |
7289815 | Gfeller et al. | Oct 2007 | B2 |
7289948 | Mohri | Oct 2007 | B1 |
7293107 | Hanson et al. | Nov 2007 | B1 |
7295119 | Rappaport et al. | Nov 2007 | B2 |
7295556 | Roese et al. | Nov 2007 | B2 |
7301451 | Hastings | Nov 2007 | B2 |
7308300 | Toews et al. | Dec 2007 | B2 |
7315825 | Rosenfeld et al. | Jan 2008 | B2 |
7319386 | Collins, Jr. et al. | Jan 2008 | B2 |
7324000 | Zittrain et al. | Jan 2008 | B2 |
7327705 | Fletcher et al. | Feb 2008 | B2 |
7343224 | DiGianfilippo et al. | Mar 2008 | B2 |
7346025 | Bryson | Mar 2008 | B2 |
7347836 | Peterson et al. | Mar 2008 | B2 |
7354420 | Steil et al. | Apr 2008 | B2 |
7369897 | Boveja et al. | May 2008 | B2 |
7369948 | Ferenczi et al. | May 2008 | B1 |
7383088 | Spinelli et al. | Jun 2008 | B2 |
7384410 | Eggers et al. | Jun 2008 | B2 |
7398183 | Holland et al. | Jul 2008 | B2 |
7398279 | Muno, Jr. et al. | Jul 2008 | B2 |
7399277 | Saidara et al. | Jul 2008 | B2 |
7402153 | Steil et al. | Jul 2008 | B2 |
7420472 | Tran | Sep 2008 | B2 |
7432807 | Schmitt | Oct 2008 | B2 |
7436454 | Yamaguchi et al. | Oct 2008 | B2 |
7447643 | Olson | Nov 2008 | B1 |
7454314 | Holland et al. | Nov 2008 | B2 |
7457804 | Uber, III et al. | Nov 2008 | B2 |
7464040 | Joao | Dec 2008 | B2 |
7469213 | Rao | Dec 2008 | B1 |
7471994 | Ford et al. | Dec 2008 | B2 |
7483756 | Engleson et al. | Jan 2009 | B2 |
7489808 | Gerder | Feb 2009 | B2 |
7490021 | Holland et al. | Feb 2009 | B2 |
7490048 | Joao | Feb 2009 | B2 |
7491187 | Van Den Berghe et al. | Feb 2009 | B2 |
7519905 | Kougiouris et al. | Apr 2009 | B2 |
7523401 | Aldridge | Apr 2009 | B1 |
7524304 | Genosar | Apr 2009 | B2 |
7551078 | Carlson | Jun 2009 | B2 |
7559321 | Wermeling et al. | Jul 2009 | B2 |
7565197 | Haulbrich et al. | Jul 2009 | B2 |
7572230 | Neumann et al. | Aug 2009 | B2 |
7578802 | Hickle | Aug 2009 | B2 |
7621009 | Elhabashy | Nov 2009 | B2 |
D606533 | De Jong et al. | Dec 2009 | S |
7636718 | Steen et al. | Dec 2009 | B1 |
7640172 | Kuth | Dec 2009 | B2 |
7645258 | White et al. | Jan 2010 | B2 |
7647237 | Malave et al. | Jan 2010 | B2 |
7662124 | Duchon et al. | Feb 2010 | B2 |
7668731 | Martucci et al. | Feb 2010 | B2 |
7671733 | McNeal et al. | Mar 2010 | B2 |
7678071 | Lebel et al. | Mar 2010 | B2 |
7687678 | Jacobs | Mar 2010 | B2 |
7697994 | VanDanacker et al. | Apr 2010 | B2 |
7698239 | Lieuallen | Apr 2010 | B2 |
7705727 | Pestotnik | Apr 2010 | B2 |
7724147 | Brown et al. | May 2010 | B2 |
7739126 | Cave | Jun 2010 | B1 |
7746218 | Collins, Jr. | Jun 2010 | B2 |
7766873 | Moberg et al. | Aug 2010 | B2 |
7776029 | Whitehurst et al. | Aug 2010 | B2 |
7776031 | Hartlaub et al. | Aug 2010 | B2 |
7785313 | Mastrototaro | Aug 2010 | B2 |
7788369 | McAllen et al. | Aug 2010 | B2 |
7806852 | Jurson | Oct 2010 | B1 |
7806886 | Kanderian, Jr. et al. | Oct 2010 | B2 |
7826981 | Goode, Jr. et al. | Nov 2010 | B2 |
7835927 | Schlotterbeck et al. | Nov 2010 | B2 |
7836314 | Chieu | Nov 2010 | B2 |
7856276 | Ripart et al. | Dec 2010 | B2 |
7860583 | Condurso et al. | Dec 2010 | B2 |
7864771 | Tavares et al. | Jan 2011 | B2 |
7868754 | Salvat, Jr. | Jan 2011 | B2 |
7871394 | Halbert et al. | Jan 2011 | B2 |
7886231 | Hopermann et al. | Feb 2011 | B2 |
7895053 | Holland et al. | Feb 2011 | B2 |
7896842 | Palmroos et al. | Mar 2011 | B2 |
7899546 | Sieracki et al. | Mar 2011 | B2 |
7905710 | Wang et al. | Mar 2011 | B2 |
7920061 | Klein et al. | Apr 2011 | B2 |
7933780 | de la Huerga | Apr 2011 | B2 |
7938796 | Moubayed | May 2011 | B2 |
7945452 | Fathallah et al. | May 2011 | B2 |
7974714 | Hoffberg | Jul 2011 | B2 |
7976508 | Hoag | Jul 2011 | B2 |
7996241 | Zak | Aug 2011 | B2 |
8034026 | Grant | Oct 2011 | B2 |
8038593 | Friedman et al. | Oct 2011 | B2 |
8048040 | Kiani | Nov 2011 | B2 |
8060576 | Chan et al. | Nov 2011 | B2 |
8065161 | Howard et al. | Nov 2011 | B2 |
8066672 | Mandro | Nov 2011 | B2 |
8075514 | Butterfield et al. | Dec 2011 | B2 |
8078983 | Davis et al. | Dec 2011 | B2 |
8082018 | Duchon et al. | Dec 2011 | B2 |
8082312 | Chan et al. | Dec 2011 | B2 |
8095692 | Mehta et al. | Jan 2012 | B2 |
8126730 | Dicks et al. | Feb 2012 | B2 |
8147448 | Sundar et al. | Apr 2012 | B2 |
8149131 | Blornquist | Apr 2012 | B2 |
8169914 | Bajpai | May 2012 | B2 |
8171094 | Chan et al. | May 2012 | B2 |
8172798 | Hungerford et al. | May 2012 | B2 |
8185322 | Schroeder et al. | May 2012 | B2 |
8195478 | Petersen et al. | Jun 2012 | B2 |
8206350 | Mann et al. | Jun 2012 | B2 |
8219413 | Martinez et al. | Jul 2012 | B2 |
8231578 | Fathallah et al. | Jul 2012 | B2 |
8234128 | Martucci et al. | Jul 2012 | B2 |
8267892 | Spencer et al. | Sep 2012 | B2 |
8271106 | Wehba et al. | Sep 2012 | B2 |
8287495 | Michaud et al. | Oct 2012 | B2 |
8291337 | Gannin et al. | Oct 2012 | B2 |
8298184 | DiPerna et al. | Oct 2012 | B2 |
8312272 | Serenyl et al. | Nov 2012 | B1 |
8352290 | Bartz et al. | Jan 2013 | B2 |
8359338 | Butterfield et al. | Jan 2013 | B2 |
8380536 | Howard et al. | Feb 2013 | B2 |
8387112 | Ranjan et al. | Feb 2013 | B1 |
8394077 | Jacobson et al. | Mar 2013 | B2 |
8398592 | Leibner-Druska | Mar 2013 | B2 |
8403908 | Jacobson et al. | Mar 2013 | B2 |
8435206 | Evans et al. | May 2013 | B2 |
8449523 | Brukalo et al. | May 2013 | B2 |
8452953 | Buck et al. | May 2013 | B2 |
8453645 | Figueiredo et al. | Jun 2013 | B2 |
8472630 | Konrad et al. | Jun 2013 | B2 |
8480648 | Burnett et al. | Jul 2013 | B2 |
8486019 | White et al. | Jul 2013 | B2 |
8489427 | Simpson et al. | Jul 2013 | B2 |
8494879 | Davis et al. | Jul 2013 | B2 |
8504179 | Blomquist | Aug 2013 | B2 |
8517990 | Teel et al. | Aug 2013 | B2 |
8518021 | Stewart et al. | Aug 2013 | B2 |
8543416 | Palmroos et al. | Sep 2013 | B2 |
8551038 | Tsoukalis et al. | Oct 2013 | B2 |
8560345 | Wehba et al. | Oct 2013 | B2 |
8567681 | Borges et al. | Oct 2013 | B2 |
8577692 | Silkaitis et al. | Nov 2013 | B2 |
8579884 | Lanier et al. | Nov 2013 | B2 |
8626530 | Tran et al. | Jan 2014 | B1 |
8655676 | Wehba et al. | Feb 2014 | B2 |
8660860 | Wehba et al. | Feb 2014 | B2 |
8662388 | Belkin | Mar 2014 | B2 |
8666769 | Butler et al. | Mar 2014 | B2 |
8667293 | Birtwhistle et al. | Mar 2014 | B2 |
8687811 | Nierzwick et al. | Apr 2014 | B2 |
8700421 | Feng et al. | Apr 2014 | B2 |
8731960 | Butler et al. | May 2014 | B2 |
8768719 | Wehba et al. | Jul 2014 | B2 |
8771251 | Ruchti et al. | Jul 2014 | B2 |
8777894 | Butterfield et al. | Jul 2014 | B2 |
8777895 | Hsu et al. | Jul 2014 | B2 |
8799012 | Butler et al. | Aug 2014 | B2 |
8876793 | Ledford et al. | Nov 2014 | B2 |
8886316 | Juels | Nov 2014 | B1 |
8922330 | Moberg et al. | Dec 2014 | B2 |
8936565 | Chawla | Jan 2015 | B2 |
8945043 | Lee et al. | Feb 2015 | B2 |
8952794 | Bloomquist et al. | Feb 2015 | B2 |
8959617 | Newlin et al. | Feb 2015 | B2 |
8998100 | Halbert et al. | Apr 2015 | B2 |
9026370 | Rubalcaba et al. | May 2015 | B2 |
9069887 | Gupta et al. | Jun 2015 | B2 |
9077544 | Baker et al. | Jul 2015 | B2 |
9089642 | Murphy et al. | Jul 2015 | B2 |
9114217 | Sur et al. | Aug 2015 | B2 |
9123077 | Silkaitis et al. | Sep 2015 | B2 |
9192712 | DeBelser et al. | Nov 2015 | B2 |
9240002 | Hume et al. | Jan 2016 | B2 |
9292692 | Wallrabenstein | Mar 2016 | B2 |
9302035 | Marseille et al. | Apr 2016 | B2 |
9313154 | Son | Apr 2016 | B1 |
9381296 | Arrizza et al. | Jul 2016 | B2 |
9393362 | Cozmi et al. | Jul 2016 | B2 |
9430655 | Stockton | Aug 2016 | B1 |
9438580 | Kupper | Sep 2016 | B2 |
9483615 | Roberts | Nov 2016 | B2 |
9498583 | Sur et al. | Nov 2016 | B2 |
9539383 | Kohlbrecher | Jan 2017 | B2 |
9572923 | Howard et al. | Feb 2017 | B2 |
9594875 | Arrizza et al. | Mar 2017 | B2 |
9604000 | Wehba et al. | Mar 2017 | B2 |
9641432 | Jha et al. | May 2017 | B2 |
9649431 | Gray et al. | May 2017 | B2 |
9662436 | Belkin et al. | May 2017 | B2 |
9690909 | Stewart et al. | Jun 2017 | B2 |
9707341 | Dumas, III et al. | Jul 2017 | B2 |
9717845 | Istoc | Aug 2017 | B2 |
9724470 | Day et al. | Aug 2017 | B2 |
9764082 | Day et al. | Sep 2017 | B2 |
9886550 | Lee et al. | Feb 2018 | B2 |
9943269 | Muhsin et al. | Apr 2018 | B2 |
9967739 | Proennecke et al. | May 2018 | B2 |
9971871 | Arrizza et al. | May 2018 | B2 |
9995611 | Ruchti et al. | Jun 2018 | B2 |
10022498 | Ruchti et al. | Jul 2018 | B2 |
10042986 | Ruchti et al. | Aug 2018 | B2 |
10046112 | Oruklu et al. | Aug 2018 | B2 |
10166328 | Oruklu et al. | Jan 2019 | B2 |
10173008 | Simpson et al. | Jan 2019 | B2 |
10188849 | Fangrow | Jan 2019 | B2 |
10233179 | Ng et al. | Mar 2019 | B2 |
10238799 | Kohlbrecher | Mar 2019 | B2 |
10238801 | Wehba et al. | Mar 2019 | B2 |
10242060 | Butler et al. | Mar 2019 | B2 |
10300194 | Day et al. | May 2019 | B2 |
10311972 | Kohlbrecher et al. | Jun 2019 | B2 |
10314974 | Day et al. | Jun 2019 | B2 |
10333843 | Jha et al. | Jun 2019 | B2 |
10341866 | Spencer et al. | Jul 2019 | B1 |
10409995 | Wasiq | Sep 2019 | B1 |
10430761 | Hume et al. | Oct 2019 | B2 |
10434246 | Silkaitis et al. | Oct 2019 | B2 |
10438001 | Hariprasad | Oct 2019 | B1 |
10452842 | Dhondse | Oct 2019 | B2 |
10453157 | Kamen et al. | Oct 2019 | B2 |
10463788 | Day | Nov 2019 | B2 |
10516536 | Rommel | Dec 2019 | B2 |
10617815 | Day et al. | Apr 2020 | B2 |
10646651 | Day et al. | May 2020 | B2 |
10681207 | Johnson | Jun 2020 | B1 |
10692595 | Xavier et al. | Jun 2020 | B2 |
10728262 | Vaswani | Jul 2020 | B1 |
10740436 | Moskal et al. | Aug 2020 | B2 |
10741280 | Xavier et al. | Aug 2020 | B2 |
10757219 | Moskal | Aug 2020 | B2 |
10765799 | Belkin et al. | Sep 2020 | B2 |
10799632 | Kohlbrecher | Oct 2020 | B2 |
10812380 | Jha et al. | Oct 2020 | B2 |
10861592 | Xavier et al. | Dec 2020 | B2 |
10898641 | Day et al. | Jan 2021 | B2 |
10950339 | Xavier et al. | Mar 2021 | B2 |
10964428 | Xavier et al. | Mar 2021 | B2 |
11013861 | Wehba et al. | May 2021 | B2 |
11037668 | Ruchti et al. | Jun 2021 | B2 |
11052193 | Day et al. | Jul 2021 | B2 |
11139058 | Xavier et al. | Oct 2021 | B2 |
11151290 | Karakoyunlu | Oct 2021 | B2 |
11152108 | Xavier et al. | Oct 2021 | B2 |
11152109 | Xavier et al. | Oct 2021 | B2 |
11152110 | Xavier et al. | Oct 2021 | B2 |
11194810 | Butler et al. | Dec 2021 | B2 |
11235100 | Howard et al. | Feb 2022 | B2 |
11289183 | Kohlbrecher | Mar 2022 | B2 |
11309070 | Xavier et al. | Apr 2022 | B2 |
11328804 | Xavier et al. | May 2022 | B2 |
11328805 | Xavier et al. | May 2022 | B2 |
11373753 | Xavier et al. | Jun 2022 | B2 |
11437132 | Xavier et al. | Sep 2022 | B2 |
11470000 | Jha et al. | Oct 2022 | B2 |
11483402 | Xavier et al. | Oct 2022 | B2 |
11483403 | Xavier et al. | Oct 2022 | B2 |
11501877 | Kohlbrecher et al. | Nov 2022 | B2 |
11571508 | Jacobson et al. | Feb 2023 | B2 |
11574721 | Kohlbrecher | Feb 2023 | B2 |
11574737 | Dharwad et al. | Feb 2023 | B2 |
11587669 | Xavier et al. | Feb 2023 | B2 |
11590057 | Tagliamento et al. | Feb 2023 | B2 |
11594326 | Xavier et al. | Feb 2023 | B2 |
11605468 | Jacobson et al. | Mar 2023 | B2 |
11626205 | Arrizza et al. | Apr 2023 | B2 |
11628246 | Day et al. | Apr 2023 | B2 |
11628254 | Day et al. | Apr 2023 | B2 |
11654237 | Wehba et al. | May 2023 | B2 |
11670416 | Xavier et al. | Jun 2023 | B2 |
11763927 | Ruchti et al. | Sep 2023 | B2 |
11783935 | Xavier et al. | Oct 2023 | B2 |
11881297 | Xavier et al. | Jan 2024 | B2 |
11923076 | Xavier et al. | Mar 2024 | B2 |
20010016056 | Westphal et al. | Aug 2001 | A1 |
20010029178 | Criss et al. | Oct 2001 | A1 |
20010031944 | Peterson et al. | Oct 2001 | A1 |
20010032099 | Joao | Oct 2001 | A1 |
20010037060 | Thompson et al. | Nov 2001 | A1 |
20010044731 | Coffman et al. | Nov 2001 | A1 |
20010048027 | Walsh | Dec 2001 | A1 |
20010051787 | Haller et al. | Dec 2001 | A1 |
20010056358 | Dulong et al. | Dec 2001 | A1 |
20020010595 | Kapp | Jan 2002 | A1 |
20020013551 | Zaitsu et al. | Jan 2002 | A1 |
20020013723 | Mise | Jan 2002 | A1 |
20020015018 | Shimazu et al. | Feb 2002 | A1 |
20020019584 | Schulze et al. | Feb 2002 | A1 |
20020021700 | Hata et al. | Feb 2002 | A1 |
20020026103 | Norris et al. | Feb 2002 | A1 |
20020029776 | Blomquist | Mar 2002 | A1 |
20020032583 | Joao | Mar 2002 | A1 |
20020040208 | Flaherty et al. | Apr 2002 | A1 |
20020040282 | Bailey et al. | Apr 2002 | A1 |
20020044043 | Chaco et al. | Apr 2002 | A1 |
20020044059 | Reeder et al. | Apr 2002 | A1 |
20020082728 | Mueller et al. | Jun 2002 | A1 |
20020087115 | Hartlaub | Jul 2002 | A1 |
20020087116 | Hartlaub | Jul 2002 | A1 |
20020095486 | Bahl | Jul 2002 | A1 |
20020103675 | Vanelli | Aug 2002 | A1 |
20020123905 | Goodroe et al. | Sep 2002 | A1 |
20020143580 | Bristol et al. | Oct 2002 | A1 |
20020152239 | Bautista-Lloyd et al. | Oct 2002 | A1 |
20020154600 | Ido et al. | Oct 2002 | A1 |
20020173702 | Lebel et al. | Nov 2002 | A1 |
20020173875 | Wallace et al. | Nov 2002 | A1 |
20020193679 | Malave et al. | Dec 2002 | A1 |
20020194329 | Alling | Dec 2002 | A1 |
20030009244 | Engleson | Jan 2003 | A1 |
20030013959 | Grunwald et al. | Jan 2003 | A1 |
20030014222 | Klass et al. | Jan 2003 | A1 |
20030014817 | Gallant et al. | Jan 2003 | A1 |
20030025602 | Medema et al. | Feb 2003 | A1 |
20030028082 | Thompson | Feb 2003 | A1 |
20030036683 | Kehr et al. | Feb 2003 | A1 |
20030036744 | Struys et al. | Feb 2003 | A1 |
20030047126 | Tomaschko | Mar 2003 | A1 |
20030047600 | Nakanishi et al. | Mar 2003 | A1 |
20030050621 | Lebel et al. | Mar 2003 | A1 |
20030059750 | Bindler et al. | Mar 2003 | A1 |
20030060688 | Ciarniello et al. | Mar 2003 | A1 |
20030069963 | Jayant et al. | Apr 2003 | A1 |
20030079746 | Hickle | May 2003 | A1 |
20030097529 | Arimilli et al. | May 2003 | A1 |
20030104982 | Wittmann et al. | Jun 2003 | A1 |
20030105389 | Noonan et al. | Jun 2003 | A1 |
20030106553 | Vanderveen | Jun 2003 | A1 |
20030115358 | Yun | Jun 2003 | A1 |
20030120384 | Haitin et al. | Jun 2003 | A1 |
20030125662 | Bui | Jul 2003 | A1 |
20030130616 | Steil | Jul 2003 | A1 |
20030135087 | Hickle et al. | Jul 2003 | A1 |
20030139701 | White et al. | Jul 2003 | A1 |
20030140928 | Bui et al. | Jul 2003 | A1 |
20030140929 | Wilkes et al. | Jul 2003 | A1 |
20030141981 | Bui et al. | Jul 2003 | A1 |
20030143746 | Sage, Jr. | Jul 2003 | A1 |
20030144878 | Wilkes et al. | Jul 2003 | A1 |
20030158749 | Olchanski et al. | Aug 2003 | A1 |
20030187338 | Say et al. | Oct 2003 | A1 |
20030200116 | Forrester | Oct 2003 | A1 |
20030204416 | Acharya | Oct 2003 | A1 |
20030204781 | Peebles et al. | Oct 2003 | A1 |
20030212364 | Mann et al. | Nov 2003 | A1 |
20030212379 | Bylund et al. | Nov 2003 | A1 |
20030212821 | Gillies et al. | Nov 2003 | A1 |
20030216831 | Hart et al. | Nov 2003 | A1 |
20030217962 | Childers et al. | Nov 2003 | A1 |
20040008123 | Carrender et al. | Jan 2004 | A1 |
20040010786 | Cool et al. | Jan 2004 | A1 |
20040015132 | Brown | Jan 2004 | A1 |
20040019607 | Moubayed et al. | Jan 2004 | A1 |
20040030323 | Ullestad et al. | Feb 2004 | A1 |
20040039257 | Hickle | Feb 2004 | A1 |
20040057226 | Berthou et al. | Mar 2004 | A1 |
20040064341 | Langan et al. | Apr 2004 | A1 |
20040064342 | Browne et al. | Apr 2004 | A1 |
20040064435 | Moubayed et al. | Apr 2004 | A1 |
20040073161 | Tachibana | Apr 2004 | A1 |
20040073811 | Sanin | Apr 2004 | A1 |
20040077934 | Massad | Apr 2004 | A1 |
20040078231 | Wilkes et al. | Apr 2004 | A1 |
20040078236 | Stoodley et al. | Apr 2004 | A1 |
20040085186 | Eveland et al. | May 2004 | A1 |
20040104271 | Martucci et al. | Jun 2004 | A1 |
20040122530 | Hansen | Jun 2004 | A1 |
20040128162 | Schlotterbeck et al. | Jul 2004 | A1 |
20040128163 | Goodman et al. | Jul 2004 | A1 |
20040133441 | Brady et al. | Jul 2004 | A1 |
20040139004 | Cohen et al. | Jul 2004 | A1 |
20040145480 | Despotis | Jul 2004 | A1 |
20040147034 | Gore et al. | Jul 2004 | A1 |
20040167464 | Ireland et al. | Aug 2004 | A1 |
20040167465 | Kohler | Aug 2004 | A1 |
20040167804 | Simpson | Aug 2004 | A1 |
20040172222 | Simpson et al. | Sep 2004 | A1 |
20040172283 | Vanderveen | Sep 2004 | A1 |
20040172301 | Mihai et al. | Sep 2004 | A1 |
20040172302 | Martucci et al. | Sep 2004 | A1 |
20040176667 | Mihai et al. | Sep 2004 | A1 |
20040176980 | Bulitta et al. | Sep 2004 | A1 |
20040176984 | White et al. | Sep 2004 | A1 |
20040181314 | Zaleski | Sep 2004 | A1 |
20040189708 | Larcheveque et al. | Sep 2004 | A1 |
20040193325 | Bonderud | Sep 2004 | A1 |
20040193328 | Butterfield et al. | Sep 2004 | A1 |
20040204673 | Flaherty et al. | Oct 2004 | A1 |
20040215278 | Stegink et al. | Oct 2004 | A1 |
20040220517 | Starkweather et al. | Nov 2004 | A1 |
20040225252 | Gillespie et al. | Nov 2004 | A1 |
20040236240 | Kraus et al. | Nov 2004 | A1 |
20040243438 | Mintz | Dec 2004 | A1 |
20040254434 | Goodnow et al. | Dec 2004 | A1 |
20050010269 | Lebel et al. | Jan 2005 | A1 |
20050020886 | Hutchinson et al. | Jan 2005 | A1 |
20050021006 | Tonnies | Jan 2005 | A1 |
20050027560 | Cook | Feb 2005 | A1 |
20050027567 | Taha | Feb 2005 | A1 |
20050038311 | Kuth | Feb 2005 | A1 |
20050038669 | Sachdeva et al. | Feb 2005 | A1 |
20050038680 | McMahon | Feb 2005 | A1 |
20050040226 | Al-Sheikh | Feb 2005 | A1 |
20050043620 | Fallows et al. | Feb 2005 | A1 |
20050049910 | Lancaster et al. | Mar 2005 | A1 |
20050055242 | Bello et al. | Mar 2005 | A1 |
20050055244 | Mullan et al. | Mar 2005 | A1 |
20050065465 | Lebel et al. | Mar 2005 | A1 |
20050065817 | Mihai et al. | Mar 2005 | A1 |
20050075544 | Shapiro et al. | Apr 2005 | A1 |
20050080801 | Kothandaraman et al. | Apr 2005 | A1 |
20050086071 | Fox, Jr. et al. | Apr 2005 | A1 |
20050086072 | Fox | Apr 2005 | A1 |
20050088704 | Vaschillo et al. | Apr 2005 | A1 |
20050090808 | Malave et al. | Apr 2005 | A1 |
20050099624 | Staehr | May 2005 | A1 |
20050102162 | Blumenfeld | May 2005 | A1 |
20050102165 | Oshita et al. | May 2005 | A1 |
20050102167 | Kapoor | May 2005 | A1 |
20050102669 | Marney et al. | May 2005 | A1 |
20050107923 | Vanderveen | May 2005 | A1 |
20050108057 | Cohen et al. | May 2005 | A1 |
20050117529 | Ramos-Escano | Jun 2005 | A1 |
20050119788 | Engleson et al. | Jun 2005 | A1 |
20050119914 | Batch | Jun 2005 | A1 |
20050131739 | Rabinowitz et al. | Jun 2005 | A1 |
20050135306 | McAllen et al. | Jun 2005 | A1 |
20050137522 | Aoki | Jun 2005 | A1 |
20050137573 | McLaughlin | Jun 2005 | A1 |
20050138428 | McAllen et al. | Jun 2005 | A1 |
20050154769 | Eckart et al. | Jul 2005 | A1 |
20050160057 | Wefers et al. | Jul 2005 | A1 |
20050171503 | Van Den Berghe et al. | Aug 2005 | A1 |
20050171815 | Vanderveen | Aug 2005 | A1 |
20050177096 | Bollish et al. | Aug 2005 | A1 |
20050177395 | Blomquist | Aug 2005 | A1 |
20050182306 | Sloan | Aug 2005 | A1 |
20050182355 | Bui | Aug 2005 | A1 |
20050187950 | Parker | Aug 2005 | A1 |
20050192557 | Brauker et al. | Sep 2005 | A1 |
20050197554 | Polcha | Sep 2005 | A1 |
20050197621 | Poulsen et al. | Sep 2005 | A1 |
20050210037 | Wefers et al. | Sep 2005 | A1 |
20050216479 | Wefers et al. | Sep 2005 | A1 |
20050216480 | Wefers et al. | Sep 2005 | A1 |
20050223045 | Funahashi et al. | Oct 2005 | A1 |
20050224083 | Crass | Oct 2005 | A1 |
20050234746 | Funahashi | Oct 2005 | A1 |
20050240305 | Bogash et al. | Oct 2005 | A1 |
20050246416 | Blomquist | Nov 2005 | A1 |
20050251418 | Fox, Jr. et al. | Nov 2005 | A1 |
20050261660 | Choi | Nov 2005 | A1 |
20050273059 | Mernoe et al. | Dec 2005 | A1 |
20050273367 | Nourie et al. | Dec 2005 | A1 |
20050277873 | Stewart et al. | Dec 2005 | A1 |
20050277890 | Stewart et al. | Dec 2005 | A1 |
20050278194 | Holland et al. | Dec 2005 | A1 |
20060004772 | Hagan et al. | Jan 2006 | A1 |
20060009727 | O'Mahony et al. | Jan 2006 | A1 |
20060009734 | Martin | Jan 2006 | A1 |
20060010098 | Goodnow et al. | Jan 2006 | A1 |
20060042139 | Mendes | Mar 2006 | A1 |
20060047270 | Shelton | Mar 2006 | A1 |
20060053036 | Coffman et al. | Mar 2006 | A1 |
20060064020 | Burnes et al. | Mar 2006 | A1 |
20060074633 | Mahesh et al. | Apr 2006 | A1 |
20060074920 | Wefers et al. | Apr 2006 | A1 |
20060079831 | Gilbert | Apr 2006 | A1 |
20060089539 | Miodownik et al. | Apr 2006 | A1 |
20060089854 | Holland et al. | Apr 2006 | A1 |
20060089855 | Holland et al. | Apr 2006 | A1 |
20060100746 | Leibner-Druska | May 2006 | A1 |
20060100907 | Holland et al. | May 2006 | A1 |
20060106649 | Eggers et al. | May 2006 | A1 |
20060111943 | Wu | May 2006 | A1 |
20060116904 | Brem | Jun 2006 | A1 |
20060116907 | Rhodes et al. | Jun 2006 | A1 |
20060122481 | Sievenpiper et al. | Jun 2006 | A1 |
20060122867 | Eggers et al. | Jun 2006 | A1 |
20060129140 | Todd et al. | Jun 2006 | A1 |
20060129429 | Moubayed et al. | Jun 2006 | A1 |
20060129434 | Smitherman et al. | Jun 2006 | A1 |
20060129435 | Smitherman et al. | Jun 2006 | A1 |
20060136266 | Tarassenko et al. | Jun 2006 | A1 |
20060136271 | Eggers et al. | Jun 2006 | A1 |
20060143051 | Eggers et al. | Jun 2006 | A1 |
20060173260 | Gaoni et al. | Aug 2006 | A1 |
20060173406 | Hayes et al. | Aug 2006 | A1 |
20060173715 | Wang et al. | Aug 2006 | A1 |
20060173927 | Beyer et al. | Aug 2006 | A1 |
20060190302 | Eggers et al. | Aug 2006 | A1 |
20060195022 | Trepagnier et al. | Aug 2006 | A1 |
20060200007 | Brockway et al. | Sep 2006 | A1 |
20060200369 | Batch et al. | Sep 2006 | A1 |
20060211404 | Cromp et al. | Sep 2006 | A1 |
20060224141 | Rush et al. | Oct 2006 | A1 |
20060229918 | Fotsch et al. | Oct 2006 | A1 |
20060236373 | Graves et al. | Oct 2006 | A1 |
20060247606 | Batch | Nov 2006 | A1 |
20060253554 | Uwais | Nov 2006 | A1 |
20060258985 | Russell | Nov 2006 | A1 |
20060259327 | Hoag | Nov 2006 | A1 |
20060264895 | Flanders | Nov 2006 | A1 |
20060267753 | Hussey et al. | Nov 2006 | A1 |
20060268710 | Appanna et al. | Nov 2006 | A1 |
20060270971 | Gelfand et al. | Nov 2006 | A1 |
20060277206 | Bailey et al. | Dec 2006 | A1 |
20060287885 | Frick | Dec 2006 | A1 |
20070015972 | Wang et al. | Jan 2007 | A1 |
20070016443 | Wachman et al. | Jan 2007 | A1 |
20070021715 | Kohlbrenner et al. | Jan 2007 | A1 |
20070027506 | Stender et al. | Feb 2007 | A1 |
20070060796 | Kim | Mar 2007 | A1 |
20070060870 | Tolle et al. | Mar 2007 | A1 |
20070060871 | Istoc | Mar 2007 | A1 |
20070061393 | Moore | Mar 2007 | A1 |
20070065363 | Dalal et al. | Mar 2007 | A1 |
20070073419 | Sesay | Mar 2007 | A1 |
20070078314 | Grounsell | Apr 2007 | A1 |
20070083870 | Kanakogi | Apr 2007 | A1 |
20070088333 | Levin et al. | Apr 2007 | A1 |
20070093786 | Goldsmith et al. | Apr 2007 | A1 |
20070100665 | Brown | May 2007 | A1 |
20070100667 | Bardy | May 2007 | A1 |
20070106126 | Mannheimer et al. | May 2007 | A1 |
20070112298 | Mueller et al. | May 2007 | A1 |
20070116037 | Moore | May 2007 | A1 |
20070118405 | Campbell et al. | May 2007 | A1 |
20070135866 | Baker et al. | Jun 2007 | A1 |
20070136098 | Smythe et al. | Jun 2007 | A1 |
20070142822 | Remde | Jun 2007 | A1 |
20070156282 | Dunn | Jul 2007 | A1 |
20070156452 | Batch | Jul 2007 | A1 |
20070169008 | Varanasi et al. | Jul 2007 | A1 |
20070179448 | Lim et al. | Aug 2007 | A1 |
20070186923 | Poutiatine et al. | Aug 2007 | A1 |
20070191817 | Martin | Aug 2007 | A1 |
20070191973 | Holzbauer et al. | Aug 2007 | A1 |
20070213657 | Jennewine et al. | Sep 2007 | A1 |
20070213684 | Hickle et al. | Sep 2007 | A1 |
20070214003 | Holland et al. | Sep 2007 | A1 |
20070215545 | Bissler et al. | Sep 2007 | A1 |
20070232867 | Hansmann | Oct 2007 | A1 |
20070233035 | Wehba et al. | Oct 2007 | A1 |
20070233049 | Wehba et al. | Oct 2007 | A1 |
20070233206 | Frikart | Oct 2007 | A1 |
20070233520 | Wehba et al. | Oct 2007 | A1 |
20070240215 | Flores | Oct 2007 | A1 |
20070251835 | Mehta et al. | Nov 2007 | A1 |
20070253021 | Mehta et al. | Nov 2007 | A1 |
20070254593 | Jollota et al. | Nov 2007 | A1 |
20070255125 | Moberg et al. | Nov 2007 | A1 |
20070257788 | Carlson | Nov 2007 | A1 |
20070258395 | Jollota et al. | Nov 2007 | A1 |
20070299687 | Palmer et al. | Dec 2007 | A1 |
20070299695 | Jung et al. | Dec 2007 | A1 |
20080001771 | Faoro et al. | Jan 2008 | A1 |
20080004904 | Tran | Jan 2008 | A1 |
20080009684 | Corsetti et al. | Jan 2008 | A1 |
20080033361 | Evans et al. | Feb 2008 | A1 |
20080033966 | Wahl | Feb 2008 | A1 |
20080034323 | Blomquist | Feb 2008 | A1 |
20080041942 | Aissa | Feb 2008 | A1 |
20080052704 | Wysocki | Feb 2008 | A1 |
20080065007 | Peterson et al. | Mar 2008 | A1 |
20080065417 | Jung et al. | Mar 2008 | A1 |
20080071217 | Moubayed et al. | Mar 2008 | A1 |
20080071251 | Moubayed et al. | Mar 2008 | A1 |
20080086088 | Malcolm | Apr 2008 | A1 |
20080091466 | Butler et al. | Apr 2008 | A1 |
20080095339 | Elliott | Apr 2008 | A1 |
20080097289 | Steil et al. | Apr 2008 | A1 |
20080097552 | Dicks et al. | Apr 2008 | A1 |
20080126969 | Blomquist | May 2008 | A1 |
20080139907 | Rao et al. | Jun 2008 | A1 |
20080148047 | Appenzeller et al. | Jun 2008 | A1 |
20080149117 | Raghuram | Jun 2008 | A1 |
20080154177 | Moubayed et al. | Jun 2008 | A1 |
20080172337 | Banfield et al. | Jul 2008 | A1 |
20080184219 | Matsumoto | Jul 2008 | A1 |
20080188796 | Steil et al. | Aug 2008 | A1 |
20080214919 | Harmon et al. | Sep 2008 | A1 |
20080246748 | Cassidy et al. | Oct 2008 | A1 |
20080256305 | Kwon | Oct 2008 | A1 |
20080259926 | Tavares et al. | Oct 2008 | A1 |
20080262469 | Bristol et al. | Oct 2008 | A1 |
20080269714 | Mastrototaro et al. | Oct 2008 | A1 |
20080269723 | Mastrototaro et al. | Oct 2008 | A1 |
20080275384 | Mastrototaro et al. | Nov 2008 | A1 |
20080300572 | Rankers et al. | Dec 2008 | A1 |
20080301298 | Bernardi et al. | Dec 2008 | A1 |
20080320387 | Sasaki et al. | Dec 2008 | A1 |
20080320466 | Dias | Dec 2008 | A1 |
20090003554 | Katis et al. | Jan 2009 | A1 |
20090005703 | Fasciano | Jan 2009 | A1 |
20090005728 | Weinert et al. | Jan 2009 | A1 |
20090006061 | Thukral et al. | Jan 2009 | A1 |
20090006129 | Thukral | Jan 2009 | A1 |
20090006133 | Weinert | Jan 2009 | A1 |
20090018495 | Panduro | Jan 2009 | A1 |
20090036750 | Weinstein et al. | Feb 2009 | A1 |
20090051560 | Manning et al. | Feb 2009 | A1 |
20090054743 | Stewart | Feb 2009 | A1 |
20090054754 | McMahon et al. | Feb 2009 | A1 |
20090057399 | Sajkowsky | Mar 2009 | A1 |
20090063187 | Johnson et al. | Mar 2009 | A1 |
20090069785 | Miller et al. | Mar 2009 | A1 |
20090099867 | Newman | Apr 2009 | A1 |
20090135196 | Holland et al. | May 2009 | A1 |
20090143662 | Estes et al. | Jun 2009 | A1 |
20090149743 | Barron et al. | Jun 2009 | A1 |
20090150174 | Buck et al. | Jun 2009 | A1 |
20090150439 | Gejdos et al. | Jun 2009 | A1 |
20090150878 | Pathak et al. | Jun 2009 | A1 |
20090156991 | Roberts | Jun 2009 | A1 |
20090157695 | Roberts | Jun 2009 | A1 |
20090158274 | Roberts | Jun 2009 | A1 |
20090177146 | Nesbitt et al. | Jul 2009 | A1 |
20090177769 | Roberts | Jul 2009 | A1 |
20090177992 | Rubalcaba et al. | Jul 2009 | A1 |
20090183147 | Davis et al. | Jul 2009 | A1 |
20090209938 | Aalto-Setala | Aug 2009 | A1 |
20090210250 | Prax et al. | Aug 2009 | A1 |
20090221890 | Saffer et al. | Sep 2009 | A1 |
20090231249 | Wang et al. | Sep 2009 | A1 |
20090270833 | DeBelser | Oct 2009 | A1 |
20090275886 | Bloomquist et al. | Nov 2009 | A1 |
20090275896 | Kamen et al. | Nov 2009 | A1 |
20090284691 | Marhefka et al. | Nov 2009 | A1 |
20090292340 | Mass et al. | Nov 2009 | A1 |
20090306573 | Gagner et al. | Dec 2009 | A1 |
20090326340 | Wang | Dec 2009 | A1 |
20090326516 | Bangera et al. | Dec 2009 | A1 |
20100008377 | Hasti et al. | Jan 2010 | A1 |
20100022988 | Wochner | Jan 2010 | A1 |
20100036310 | Hillman | Feb 2010 | A1 |
20100056992 | Hayter | Mar 2010 | A1 |
20100083060 | Rahman | Apr 2010 | A1 |
20100095229 | Dixon et al. | Apr 2010 | A1 |
20100121170 | Rule | May 2010 | A1 |
20100121246 | Peters et al. | May 2010 | A1 |
20100121415 | Skelton et al. | May 2010 | A1 |
20100121654 | Portnoy et al. | May 2010 | A1 |
20100121752 | Banigan et al. | May 2010 | A1 |
20100130933 | Holland et al. | May 2010 | A1 |
20100131434 | Magent et al. | May 2010 | A1 |
20100138523 | Umess et al. | Jun 2010 | A1 |
20100146137 | Wu et al. | Jun 2010 | A1 |
20100156633 | Buck et al. | Jun 2010 | A1 |
20100160854 | Gauthier | Jun 2010 | A1 |
20100160860 | Celentano et al. | Jun 2010 | A1 |
20100174266 | Estes | Jul 2010 | A1 |
20100191525 | Rabenko et al. | Jul 2010 | A1 |
20100198034 | Thomas et al. | Aug 2010 | A1 |
20100198196 | Wei | Aug 2010 | A1 |
20100200506 | Ware et al. | Aug 2010 | A1 |
20100209268 | Davis | Aug 2010 | A1 |
20100212675 | Walling et al. | Aug 2010 | A1 |
20100217621 | Schoenberg | Aug 2010 | A1 |
20100234708 | Buck et al. | Sep 2010 | A1 |
20100250732 | Bucknell | Sep 2010 | A1 |
20100271479 | Heydlauf | Oct 2010 | A1 |
20100273738 | Valcke et al. | Oct 2010 | A1 |
20100274218 | Yodfat et al. | Oct 2010 | A1 |
20100280486 | Khair et al. | Nov 2010 | A1 |
20100292634 | Kircher | Nov 2010 | A1 |
20100298765 | Budiman et al. | Nov 2010 | A1 |
20100318025 | John | Dec 2010 | A1 |
20110001605 | Kiani et al. | Jan 2011 | A1 |
20110021898 | Wei et al. | Jan 2011 | A1 |
20110028885 | Eggers et al. | Feb 2011 | A1 |
20110040158 | Katz et al. | Feb 2011 | A1 |
20110060758 | Schlotterbeck et al. | Mar 2011 | A1 |
20110071844 | Cannon et al. | Mar 2011 | A1 |
20110072379 | Gannon | Mar 2011 | A1 |
20110078253 | Chan et al. | Mar 2011 | A1 |
20110078608 | Gannon et al. | Mar 2011 | A1 |
20110093284 | Dicks et al. | Apr 2011 | A1 |
20110099313 | Bolanowski | Apr 2011 | A1 |
20110125095 | Lebel et al. | May 2011 | A1 |
20110138185 | Ju et al. | Jun 2011 | A1 |
20110166628 | Jain | Jul 2011 | A1 |
20110175728 | Baker, Jr. | Jul 2011 | A1 |
20110178462 | Moberg et al. | Jul 2011 | A1 |
20110185010 | Shatsky et al. | Jul 2011 | A1 |
20110196748 | Caron et al. | Aug 2011 | A1 |
20110231216 | Fyke et al. | Sep 2011 | A1 |
20110252230 | Segre et al. | Oct 2011 | A1 |
20110257496 | Terashima et al. | Oct 2011 | A1 |
20110257798 | Ali et al. | Oct 2011 | A1 |
20110259954 | Bartz et al. | Oct 2011 | A1 |
20110264043 | Kotnick et al. | Oct 2011 | A1 |
20110264044 | Bartz et al. | Oct 2011 | A1 |
20110266221 | Ware et al. | Nov 2011 | A1 |
20110270045 | Lebel et al. | Nov 2011 | A1 |
20110275904 | Lebel et al. | Nov 2011 | A1 |
20110286457 | Ee | Nov 2011 | A1 |
20110289314 | Whitcomb | Nov 2011 | A1 |
20110289497 | Kiaie et al. | Nov 2011 | A1 |
20110295196 | Chazot et al. | Dec 2011 | A1 |
20110295341 | Estes et al. | Dec 2011 | A1 |
20110296051 | Vange | Dec 2011 | A1 |
20110296411 | Tang et al. | Dec 2011 | A1 |
20110313789 | Karmen et al. | Dec 2011 | A1 |
20110319813 | Kamen et al. | Dec 2011 | A1 |
20110320049 | Chossat et al. | Dec 2011 | A1 |
20120005680 | Dolby et al. | Jan 2012 | A1 |
20120011253 | Friedman et al. | Jan 2012 | A1 |
20120016305 | Jollota | Jan 2012 | A1 |
20120029941 | Malave et al. | Feb 2012 | A1 |
20120036102 | Fletcher et al. | Feb 2012 | A1 |
20120036550 | Rodriguez | Feb 2012 | A1 |
20120066501 | Xiong | Mar 2012 | A1 |
20120070045 | Vesper et al. | Mar 2012 | A1 |
20120095437 | Hemmerling | Apr 2012 | A1 |
20120112903 | Kaib et al. | May 2012 | A1 |
20120130198 | Beaule | May 2012 | A1 |
20120143116 | Ware et al. | Jun 2012 | A1 |
20120150556 | Galasso et al. | Jun 2012 | A1 |
20120157920 | Flachbart et al. | Jun 2012 | A1 |
20120179135 | Rinehart et al. | Jul 2012 | A1 |
20120179136 | Rinehart et al. | Jul 2012 | A1 |
20120185267 | Kamen et al. | Jul 2012 | A1 |
20120203177 | Lanier | Aug 2012 | A1 |
20120245554 | Kawamura | Sep 2012 | A1 |
20120259978 | Petersen et al. | Oct 2012 | A1 |
20120260012 | Gao-Saari et al. | Oct 2012 | A1 |
20120277716 | Ali et al. | Nov 2012 | A1 |
20120283630 | Lee et al. | Nov 2012 | A1 |
20120284734 | McQuaid et al. | Nov 2012 | A1 |
20120323212 | Murphy | Dec 2012 | A1 |
20120330380 | Corndorf | Dec 2012 | A1 |
20130006666 | Schneider | Jan 2013 | A1 |
20130006702 | Wu | Jan 2013 | A1 |
20130012877 | Debelser et al. | Jan 2013 | A1 |
20130012879 | Debelser et al. | Jan 2013 | A1 |
20130012880 | Blomquist | Jan 2013 | A1 |
20130015980 | Evans et al. | Jan 2013 | A1 |
20130036403 | Geist | Feb 2013 | A1 |
20130036412 | Birtwhistle et al. | Feb 2013 | A1 |
20130066265 | Grant | Mar 2013 | A1 |
20130072872 | Yodfat et al. | Mar 2013 | A1 |
20130091350 | Gluck | Apr 2013 | A1 |
20130096444 | Condurso et al. | Apr 2013 | A1 |
20130096648 | Benson | Apr 2013 | A1 |
20130102963 | Marsh et al. | Apr 2013 | A1 |
20130114594 | Van Zijst | May 2013 | A1 |
20130116578 | An | May 2013 | A1 |
20130138452 | Cork et al. | May 2013 | A1 |
20130144206 | Lee et al. | Jun 2013 | A1 |
20130150824 | Estes et al. | Jun 2013 | A1 |
20130167245 | Birtwhistle et al. | Jun 2013 | A1 |
20130173473 | Birtwhistle et al. | Jul 2013 | A1 |
20130191770 | Bartz et al. | Jul 2013 | A1 |
20130204188 | Kamen et al. | Aug 2013 | A1 |
20130218080 | Peterfreund et al. | Aug 2013 | A1 |
20130274669 | Stempfle et al. | Oct 2013 | A1 |
20130275539 | Gross et al. | Oct 2013 | A1 |
20130291116 | Homer | Oct 2013 | A1 |
20130296823 | Melker et al. | Nov 2013 | A1 |
20130296984 | Burnett et al. | Nov 2013 | A1 |
20130317753 | Kamen et al. | Nov 2013 | A1 |
20130346108 | Kamen et al. | Dec 2013 | A1 |
20140025392 | Chandrasenan | Jan 2014 | A1 |
20140142540 | Imhof | May 2014 | A1 |
20140142963 | Hill et al. | May 2014 | A1 |
20140163517 | Finan et al. | Jun 2014 | A1 |
20140172994 | Raumann et al. | Jun 2014 | A1 |
20140180711 | Kamen et al. | Jun 2014 | A1 |
20140197950 | Shupp et al. | Jul 2014 | A1 |
20140215490 | Mathur et al. | Jul 2014 | A1 |
20140257251 | Bush et al. | Sep 2014 | A1 |
20140266790 | Al-Ali et al. | Sep 2014 | A1 |
20140266794 | Brown et al. | Sep 2014 | A1 |
20140269643 | Sun | Sep 2014 | A1 |
20140276571 | Ludolph | Sep 2014 | A1 |
20140280522 | Watte | Sep 2014 | A1 |
20140288947 | Simpson et al. | Sep 2014 | A1 |
20140294177 | Shastry et al. | Oct 2014 | A1 |
20140297329 | Rock | Oct 2014 | A1 |
20140316819 | Dunsirn et al. | Oct 2014 | A1 |
20140318639 | Peret et al. | Oct 2014 | A1 |
20140366878 | Baron | Dec 2014 | A1 |
20140371543 | Steinhauer et al. | Dec 2014 | A1 |
20150005935 | Bae et al. | Jan 2015 | A1 |
20150006907 | Brouwer et al. | Jan 2015 | A1 |
20150045729 | Denzer et al. | Feb 2015 | A1 |
20150058960 | Schmoyer et al. | Feb 2015 | A1 |
20150066531 | Jacobson et al. | Mar 2015 | A1 |
20150081894 | Blomquist | Mar 2015 | A1 |
20150100038 | McCann et al. | Apr 2015 | A1 |
20150100787 | Westin et al. | Apr 2015 | A1 |
20150117234 | Raman et al. | Apr 2015 | A1 |
20150151051 | Tsoukalis | Jun 2015 | A1 |
20150161354 | Blomquist | Jun 2015 | A1 |
20150199192 | Borges et al. | Jul 2015 | A1 |
20150199485 | Borges et al. | Jul 2015 | A1 |
20150230760 | Schneider | Aug 2015 | A1 |
20150281128 | Sindhu | Oct 2015 | A1 |
20150325064 | Downey | Nov 2015 | A1 |
20150328396 | Adams et al. | Nov 2015 | A1 |
20150352301 | Stedman et al. | Dec 2015 | A1 |
20150371004 | Jones | Dec 2015 | A1 |
20150379237 | Mills et al. | Dec 2015 | A1 |
20160001003 | Perazzo et al. | Jan 2016 | A1 |
20160006695 | Prodoehl et al. | Jan 2016 | A1 |
20160015885 | Pananen et al. | Jan 2016 | A1 |
20160034655 | Gray et al. | Feb 2016 | A1 |
20160045661 | Gray et al. | Feb 2016 | A1 |
20160051749 | Istoc | Feb 2016 | A1 |
20160063471 | Kobres | Mar 2016 | A1 |
20160158437 | Biasi et al. | Jun 2016 | A1 |
20160228633 | Welsch et al. | Aug 2016 | A1 |
20160241391 | Fenster | Aug 2016 | A1 |
20160277152 | Xiang et al. | Sep 2016 | A1 |
20160285876 | Perez et al. | Sep 2016 | A1 |
20160317742 | Gannon et al. | Nov 2016 | A1 |
20160350513 | Jacobson et al. | Dec 2016 | A1 |
20160378618 | Cmielowski | Dec 2016 | A1 |
20170034277 | Jackson et al. | Feb 2017 | A1 |
20170063559 | Wallrabenstein | Mar 2017 | A1 |
20170099148 | Ochmanski et al. | Apr 2017 | A1 |
20170104645 | Wooton et al. | Apr 2017 | A1 |
20170111301 | Robinson | Apr 2017 | A1 |
20170140134 | Brough et al. | May 2017 | A1 |
20170146381 | Eckel et al. | May 2017 | A1 |
20170149567 | Moskal | May 2017 | A1 |
20170149929 | Moskal | May 2017 | A1 |
20170214762 | Swain et al. | Jul 2017 | A1 |
20170258401 | Volpe | Sep 2017 | A1 |
20170258986 | Tsoiukalis | Sep 2017 | A1 |
20170262590 | Karakosta et al. | Sep 2017 | A1 |
20170274140 | Howard et al. | Sep 2017 | A1 |
20170286637 | Arrizza et al. | Oct 2017 | A1 |
20170325091 | Freeman et al. | Nov 2017 | A1 |
20170351841 | Moskal | Dec 2017 | A1 |
20180063724 | Zhang et al. | Mar 2018 | A1 |
20180121613 | Connely, IV et al. | May 2018 | A1 |
20180122502 | Jones et al. | May 2018 | A1 |
20180126067 | Ledford et al. | May 2018 | A1 |
20180157821 | Fan | Jun 2018 | A1 |
20180181712 | Ensey et al. | Jun 2018 | A1 |
20180247712 | Muhsin et al. | Aug 2018 | A1 |
20180272117 | Fangrow | Sep 2018 | A1 |
20180278594 | Schiffman et al. | Sep 2018 | A1 |
20180317826 | Muhsin et al. | Nov 2018 | A1 |
20180322948 | Drost et al. | Nov 2018 | A1 |
20180359085 | Dervyn | Dec 2018 | A1 |
20190006044 | Brask | Jan 2019 | A1 |
20190030329 | Hannaman et al. | Jan 2019 | A1 |
20190036688 | Wasily et al. | Jan 2019 | A1 |
20190096518 | Pace | Mar 2019 | A1 |
20190132196 | Trivedi et al. | May 2019 | A1 |
20190147998 | Ruchti et al. | May 2019 | A1 |
20190166501 | Debates | May 2019 | A1 |
20190172590 | Vesto et al. | Jun 2019 | A1 |
20190207965 | Espinosa | Jul 2019 | A1 |
20190228863 | Dharwad et al. | Jul 2019 | A1 |
20190229982 | Ikuta et al. | Jul 2019 | A1 |
20190240405 | Wehba et al. | Aug 2019 | A1 |
20190243829 | Butler et al. | Aug 2019 | A1 |
20190244689 | Atkin | Aug 2019 | A1 |
20190245942 | Moskal | Aug 2019 | A1 |
20190269852 | Kohlbrecher | Sep 2019 | A1 |
20190311803 | Kohlbrecher et al. | Oct 2019 | A1 |
20190348160 | Heavelyn et al. | Nov 2019 | A1 |
20190392929 | Gassman | Dec 2019 | A1 |
20200023127 | Simpson et al. | Jan 2020 | A1 |
20200027541 | Xavier et al. | Jan 2020 | A1 |
20200027542 | Xavier et al. | Jan 2020 | A1 |
20200027543 | Xavier et al. | Jan 2020 | A1 |
20200027548 | Xavier et al. | Jan 2020 | A1 |
20200027549 | Xavier et al. | Jan 2020 | A1 |
20200027550 | Xavier et al. | Jan 2020 | A1 |
20200027551 | Xavier et al. | Jan 2020 | A1 |
20200028837 | Xavier et al. | Jan 2020 | A1 |
20200028914 | Xavier et al. | Jan 2020 | A1 |
20200035355 | Xavier et al. | Jan 2020 | A1 |
20200054825 | Kamen et al. | Feb 2020 | A1 |
20200061291 | Day et al. | Feb 2020 | A1 |
20200145332 | Jha et al. | May 2020 | A1 |
20200153627 | Wentz | May 2020 | A1 |
20200206413 | Silkaitis et al. | Jul 2020 | A1 |
20200220865 | Finger | Jul 2020 | A1 |
20200282139 | Susi | Sep 2020 | A1 |
20200334497 | Barrett et al. | Oct 2020 | A1 |
20200335194 | Jacobson et al. | Oct 2020 | A1 |
20200351376 | Moskal | Nov 2020 | A1 |
20200353168 | Keenan et al. | Nov 2020 | A1 |
20210014259 | Harris et al. | Jan 2021 | A1 |
20210045640 | Poltorak | Feb 2021 | A1 |
20210085855 | Belkin et al. | Mar 2021 | A1 |
20210252210 | Day et al. | Aug 2021 | A1 |
20210375421 | Ruchti et al. | Dec 2021 | A1 |
20210375438 | Xavier et al. | Dec 2021 | A1 |
20210409362 | Katis et al. | Dec 2021 | A1 |
20220023535 | Day | Jan 2022 | A1 |
20220037011 | Fryman | Feb 2022 | A1 |
20220037012 | Fryman | Feb 2022 | A1 |
20220051777 | Xavier et al. | Feb 2022 | A1 |
20220062541 | Kamen et al. | Mar 2022 | A1 |
20220129452 | Butler et al. | Apr 2022 | A1 |
20220139536 | Xavier et al. | May 2022 | A1 |
20220139537 | Xavier et al. | May 2022 | A1 |
20220139538 | Xavier et al. | May 2022 | A1 |
20220150307 | Walsh et al. | May 2022 | A1 |
20220165404 | Vivek et al. | May 2022 | A1 |
20220189605 | Kelly et al. | Jun 2022 | A1 |
20220223283 | Biasi et al. | Jul 2022 | A1 |
20220270736 | Kohlbrecher | Aug 2022 | A1 |
20220328175 | Arrizza et al. | Oct 2022 | A1 |
20220331513 | Howard et al. | Oct 2022 | A1 |
20220344023 | Xavier et al. | Oct 2022 | A1 |
20220375565 | Xavier et al. | Nov 2022 | A1 |
20220384059 | Xavier et al. | Dec 2022 | A1 |
20230009405 | Xavier et al. | Jan 2023 | A1 |
20230009417 | Xavier et al. | Jan 2023 | A1 |
20230139360 | Kohlbrecher et al. | May 2023 | A1 |
20230145267 | Xavier et al. | May 2023 | A1 |
20230147762 | Xavier et al. | May 2023 | A1 |
20230166026 | Jacobson et al. | Jun 2023 | A1 |
20230188465 | Jha et al. | Jun 2023 | A1 |
20230253108 | Dharwad et al. | Aug 2023 | A1 |
20230285660 | Day et al. | Sep 2023 | A1 |
20230298768 | Jacobson et al. | Sep 2023 | A1 |
20230320935 | Tagliamento | Oct 2023 | A1 |
20230321350 | Day | Oct 2023 | A1 |
20230321351 | Wehba et al. | Oct 2023 | A1 |
20230326570 | Kohlbrecher | Oct 2023 | A1 |
20230410989 | Xavier et al. | Dec 2023 | A1 |
20240038358 | Xavier et al. | Feb 2024 | A1 |
20240071606 | Xavier et al. | Feb 2024 | A1 |
Number | Date | Country |
---|---|---|
2004226440 | Oct 2004 | AU |
2004305087 | Jul 2005 | AU |
2 060 151 | Aug 1997 | CA |
2 125 300 | Oct 1999 | CA |
2 630 102 | Oct 2008 | CA |
2 687 587 | Dec 2008 | CA |
2 897 897 | Jul 2014 | CA |
2 898 825 | Jul 2014 | CA |
2 900 564 | Oct 2014 | CA |
2 606 968 | Jan 2020 | CA |
1759398 | Apr 2006 | CN |
102521474 | Jun 2012 | CN |
103816582 | May 2014 | CN |
103920206 | Jul 2014 | CN |
102300501 | Apr 2015 | CN |
104487976 | Apr 2015 | CN |
107810536 | Jan 2023 | CN |
31 12 762 | Jan 1983 | DE |
34 35 647 | Jul 1985 | DE |
198 44 252 | Mar 2000 | DE |
199 32 147 | Jan 2001 | DE |
103 52 456 | Jul 2005 | DE |
0 319 267 | Jun 1989 | EP |
0 380 061 | Aug 1990 | EP |
0 384 155 | Aug 1990 | EP |
0 460 533 | Dec 1991 | EP |
0 564 127 | Jun 1993 | EP |
0 633 035 | Jan 1995 | EP |
0 652 528 | May 1995 | EP |
0 672 427 | Sep 1995 | EP |
0 683 465 | Nov 1995 | EP |
0 880 936 | Dec 1998 | EP |
1050993 | Nov 2000 | EP |
1 157 711 | Nov 2001 | EP |
1 174 817 | Jan 2002 | EP |
0 664 102 | Apr 2002 | EP |
1 197 178 | Apr 2002 | EP |
0 830 775 | Aug 2002 | EP |
1 500 025 | Apr 2003 | EP |
1 487 171 | Jul 2007 | EP |
1 933 497 | Jun 2008 | EP |
2 026 223 | Feb 2009 | EP |
2 113 842 | Nov 2009 | EP |
2 228 004 | Sep 2010 | EP |
2 243 506 | Oct 2010 | EP |
2 410 448 | Jan 2012 | EP |
2 742 961 | Jun 2014 | EP |
2 874 087 | May 2015 | EP |
2 371 995 | Jan 2012 | ES |
2 717 919 | Sep 1995 | FR |
2 285 135 | Jun 1995 | GB |
04-161139 | Jun 1992 | JP |
07-502678 | Mar 1995 | JP |
11-500643 | Jan 1999 | JP |
2000-316820 | Nov 2000 | JP |
2002-531154 | Sep 2002 | JP |
2003-016183 | Jan 2003 | JP |
2003-296173 | Oct 2003 | JP |
2003-308586 | Oct 2003 | JP |
2005-021463 | Jan 2005 | JP |
2005-527284 | Sep 2005 | JP |
2005-284846 | Oct 2005 | JP |
2006-047319 | Feb 2006 | JP |
2006-520949 | Sep 2006 | JP |
2007-518479 | Jul 2007 | JP |
2007-525256 | Sep 2007 | JP |
2008-080036 | Apr 2008 | JP |
2008-516303 | May 2008 | JP |
2008-158622 | Jul 2008 | JP |
2008-529675 | Aug 2008 | JP |
2009-163534 | Jul 2009 | JP |
2010-502361 | Jan 2010 | JP |
2011-506048 | Mar 2011 | JP |
2012-011204 | Jan 2012 | JP |
2012-070991 | Apr 2012 | JP |
2012-523895 | Oct 2012 | JP |
2014-068283 | Apr 2014 | JP |
5647644 | Jan 2015 | JP |
200426656 | Dec 2004 | TW |
1631966 | Aug 2018 | TW |
WO 84001719 | May 1984 | WO |
WO 91016416 | Oct 1991 | WO |
WO 92010985 | Jul 1992 | WO |
WO 92013322 | Aug 1992 | WO |
WO 94005355 | Mar 1994 | WO |
WO 96008755 | Mar 1996 | WO |
WO 96025186 | Aug 1996 | WO |
WO 96025963 | Aug 1996 | WO |
WO 98012670 | Mar 1998 | WO |
WO 98019263 | May 1998 | WO |
WO 99051003 | Oct 1999 | WO |
WO 00013580 | Mar 2000 | WO |
WO 00053243 | Sep 2000 | WO |
WO 01014974 | Mar 2001 | WO |
WO 01033484 | May 2001 | WO |
WO 01045014 | Jun 2001 | WO |
WO 01083007 | Nov 2001 | WO |
WO 02005702 | Jan 2002 | WO |
WO 02036044 | May 2002 | WO |
WO 02049153 | Jun 2002 | WO |
WO 02049279 | Jun 2002 | WO |
WO 02069099 | Sep 2002 | WO |
WO 02081015 | Oct 2002 | WO |
WO 02088875 | Nov 2002 | WO |
WO 03006091 | Jan 2003 | WO |
WO 03023551 | Mar 2003 | WO |
WO 03050917 | Jun 2003 | WO |
WO 03091836 | Nov 2003 | WO |
WO 03094092 | Nov 2003 | WO |
WO 2004060455 | Jul 2004 | WO |
WO 2004070557 | Aug 2004 | WO |
WO 2004070562 | Aug 2004 | WO |
WO 2004072828 | Aug 2004 | WO |
WO 2005036447 | Apr 2005 | WO |
WO 2005050526 | Jun 2005 | WO |
WO 2005057175 | Jun 2005 | WO |
WO 2005066872 | Jul 2005 | WO |
WO 2007087443 | Aug 2007 | WO |
WO 2007117705 | Oct 2007 | WO |
WO 2007127879 | Nov 2007 | WO |
WO 2007127880 | Nov 2007 | WO |
WO 2008064254 | May 2008 | WO |
WO 2008067245 | Jun 2008 | WO |
WO 2008082854 | Jul 2008 | WO |
WO 2008088490 | Jul 2008 | WO |
WO 2008097316 | Aug 2008 | WO |
WO 2008103915 | Aug 2008 | WO |
WO 2008124478 | Oct 2008 | WO |
WO 2008134146 | Nov 2008 | WO |
WO 2009016504 | Feb 2009 | WO |
WO 2009023406 | Feb 2009 | WO |
WO 2009023407 | Feb 2009 | WO |
WO 2009023634 | Feb 2009 | WO |
WO 2009036327 | Mar 2009 | WO |
WO 2009049252 | Apr 2009 | WO |
WO 2010017279 | Feb 2010 | WO |
WO 2010033919 | Mar 2010 | WO |
WO 2010053703 | May 2010 | WO |
WO 2010075371 | Jul 2010 | WO |
WO 2010099313 | Sep 2010 | WO |
WO 2010114929 | Oct 2010 | WO |
WO 2010119409 | Oct 2010 | WO |
WO 2010124127 | Oct 2010 | WO |
WO 2010130992 | Nov 2010 | WO |
WO 2010135646 | Nov 2010 | WO |
WO 2010135654 | Nov 2010 | WO |
WO 2010135686 | Nov 2010 | WO |
WO 2011005633 | Jan 2011 | WO |
WO 2011022549 | Feb 2011 | WO |
WO 2012048833 | Apr 2012 | WO |
WO 2012049214 | Apr 2012 | WO |
WO 2012049218 | Apr 2012 | WO |
WO 2012120078 | Sep 2012 | WO |
WO 2012140547 | Oct 2012 | WO |
WO 2012164556 | Dec 2012 | WO |
WO 2012170942 | Dec 2012 | WO |
WO 2013045506 | Apr 2013 | WO |
WO 2014100736 | Jun 2014 | WO |
WO 2014131729 | Sep 2014 | WO |
WO 2014131730 | Sep 2014 | WO |
WO 2015047595 | Apr 2015 | WO |
WO 2015124569 | Aug 2015 | WO |
WO 2016179389 | Nov 2016 | WO |
WO 2019219290 | Nov 2019 | WO |
WO 00003344 | Jan 2020 | WO |
WO 2020227403 | Nov 2020 | WO |
WO 2021201884 | Oct 2021 | WO |
WO 2022006014 | Jan 2022 | WO |
WO 2022051230 | Mar 2022 | WO |
WO 2023159134 | Aug 2023 | WO |
Entry |
---|
M. Nojoumian and D. R. Stinson, “Social secret sharing in cloud computing using a new trust function,” 2012 Tenth Annual International Conference on Privacy, Security and Trust, 2012, pp. 161-167, doi: 10.1109/PST.2012.6297936. |
J. Yoo and J. H. Yi, “Code-Based Authentication Scheme for Lightweight Integrity Checking of Smart Vehicles,” in IEEE Access, vol. 6, pp. 46731-46741, 2018, doi: 10.1109/ACCESS.2018.2866626. |
International Search Report dated Jul. 20, 2020 for International Patent Application No. PCT/US2020/031664, filed May 6, 2020. |
Akridge, Jeannie, “New Pumps Outsmart User Error”, Healthcare Purchasing News, Apr. 2011, pp. 10, http://web.archive.org/web/20110426122450/http://www.hpnonline.com/inside/2011-04/1104-OR-Pumps.html. |
Alur et al., “Formal Specifications and Analysis of the Computer-Assisted Resuscitation Algorithm (CARA) Infusion Pump Control System”, International Journal on Software Tools for Technology Transfer, Feb. 2004, vol. 5, No. 4, pp. 308-319. |
Aragon, Daleen RN, Ph.D., CCRN, “Evaluation of Nursing Work Effort and Perceptions About Blood Glucose Testing in Tight Glycemic Control”, American Journal of Critical Care, Jul. 2006, vol. 15, No. 4, pp. 370-377. |
ASHP Advantage, “Improving Medication Safety in Health Systems Through Innovations in Automation Technology”, Proceedings of Educational Symposium and Educational Sessions during the 39th ASHP Midyear Clinical Meeting, Dec. 5-9, 2004, Orlando, FL, pp. 28. |
Beard et al., “Total Quality Pain Management: History, Background, Resources”, Abbott Laboratories, TQPM Survey History, available Feb. 2015 or earlier, pp. 1-3. |
Bektas et al., “Bluetooth Communication Employing Antenna Diversity”, Proceedings of Eight IEEE International Symposium on Computers and Communication, Jul. 2003, pp. 6. |
Bequette, Ph.D., “A Critical Assessment of Algorithms and Challenges in the Development of a Closed-Loop Artificial Pancreas”, Diabetes Technology & Therapeutics, Feb. 28, 2005, vol. 7, No. 1, pp. 28-47. |
Bequette, B. Wayne, Ph.D., “Analysis of Algorithms for Intensive Care Unit Blood Glucose Control”, Journal of Diabetes Science and Technology, Nov. 2007, vol. 1, No. 6, pp. 813-824. |
Braun, “Infusomat® Space and Accessories”, Instructions for Use, Nov. 2010, pp. 68. http://corp.bbraun.ee/Extranet/Infusioonipumbad/Kasutusjuhendid/Vanad/Kasutusjuhend-Infusomat_Space(vers688J,inglise_k).pdf. |
Brownlee, Seth, “Product Spotlight: The Plum A+ with Hospira MedNet Infusion System”, PP&P Magazine, Dec. 2005, vol. 2, No. 7, pp. 2. |
Cannon, MD et al., “Automated Heparin-Delivery System to Control Activated Partial Thromboplastin Time”, Circulation, Feb. 16, 1999, vol. 99, pp. 751-756. |
Cardinal Health, “Alaris® Syringe Pumps” Technical Service Manual, Copyright 2002-2006, Issue 9, pp. 1-88, http://www.frankshospitalworkshop.com/equipment/documents/infusion_pumps/service_manuals/Cardinal_Alaris_-_Service_Manual.pdf. |
“CareAware® Infusion Management”, Cerner Store, as printed May 12, 2011, pp. 3, https://store.cerner.com/items/7. |
Chen et al., “Enabling Location-Based Services on Wireless LANs”, The 11th IEEE International Conference on Networks, ICON 2003, Sep. 28-Oct. 1, 2003, pp. 567-572. |
“Computer Dictionary”, Microsoft Press, Third Edition, Microsoft Press, 1997, pp. 430 & 506. |
“Context-Free Grammar”, Wikipedia.org, as last modified Mar. 5, 2010 in 11 pages, https://en.wikipedia.org/w/index.php/?title=Context-free_grammar&oldid=347915989. |
Crawford, Anne J., MSN, RNC, “Building a Successful Quality Pain Service: Using Patient Satisfaction Data and the Clinical Practice Guideline”, USA, 1995, pp. 1-6. |
Crocker et al., “Augmented BNF for Syntax Specifications: ABNF”, Network Working Group, Standards Track, Jan. 2008, pp. 16. |
Davidson et al., “A Computer-Directed Intravenous Insulin System Shown to be Safe, Simple, and Effective in 120,618 h of Operation”, Diabetes Care, Oct. 2005, vol. 28, No. 10, pp. 2418-2423. |
Davies, T., “Cordless Data Acquisition in a Hospital Environment”, IEE Colloquium on Cordless Computing—Systems and User Experience, 1993, pp. 4. |
Dayhoff et al., “Medical Data Capture and Display: The Importance of Clinicians' Workstation Design”, AMIA, Inc., 1994, pp. 541-545. |
Diabetes Close Up, Close Concerns AACE Inpatient Management Conference Report, Consensus Development Conference on Inpatient Diabetes and Metabolic Control, Washington, D.C., Dec. 14-16, 2003, pp. 1-32. |
“Download”, Free On-Line Dictionary of Computing, as archived Jun. 16, 2010 in 1 page, http://web.archive.org/web/20100616010314/https://foldoc.org/download. |
East PhD et al., “Digital Electronic Communication Between ICU Ventilators and Computers and Printers”, Respiratory Care, Sep. 1992, vol. 37, No. 9, pp. 1113-1122. |
Einhorn, George W., “Total Quality Pain Management: A Computerized Quality Assessment Tool for Postoperative Pain Management”, Abbott Laboratories, Chicago, IL, Mar. 2, 2000, pp. 1-4. |
Eskew et al., “Using Innovative Technologies to Set New Safety Standards for the Infusion of Intravenous Medications”, Hospital Pharmacy, 2002, vol. 37, No. 11, pp. 1179-1189. |
Felleiter et al., “Data Processing in Prehospital Emergency Medicine”, International journal of Clinical Monitoring and Computing, Feb. 1995, vol. 12, No. 1, pp. 37-41. |
“File Verification”, Wikipedia.org, as last modified Oct. 11, 2011 in 2 pages, https://en.wikipedia.org/w/index.php?title=File_verification&oldid=455048290. |
Fogt et al., Development and Evaluation of a Glucose Analyzer for a Glucose-Controlled Insulin Infusion System (Biostator®), Clinical Chemistry, 1978, vol. 24, No. 8, pp. 1366-1372. |
Gabel et al., “Camp: A Common API for Measuring Performance”, 21st Large Installations System Administration Conference (LISA '07), 2007, pp. 49-61. |
Gage et al., “Automated Anesthesia Surgery Medical Record System”, International Journal of Clinical Monitoring and Computing, Dec. 1990, vol. 7, No. 4, pp. 259-263. |
Galt et al., “Personal Digital Assistant-Based Drug Information Sources: Potential to Improve Medication Safety”, Journal of Medical Library Association, Apr. 2005, vol. 93, No. 2, pp. 229-236. |
Gardner, Ph.D. et al., “Real Time Data Acquisition: Recommendations for the Medical Information Bus (MIB)”, 1992, pp. 813-817. |
“General-Purpose Infusion Pumps”, Health Devices, EXRI Institute, Oct. 1, 2002, vol. 31, No. 10, pp. 353-387. |
Givens et al., “Exploring the Internal State of User Interfaces by Combining Computer Vision Techniques with Grammatical Inference”, Proceedings of the 2013 International Conference on Software Engineering, San Francisco, CA, May 18-26, 2013, pp. 1165-1168. |
Glaeser, “A Hierarchical Minicomputer System for Continuous Post-Surgical Monitoring”, Computers and Biomedical Research, Aug. 31, 1975, pp. 336-361. |
Goldberg et al., “Clinical Results of an Updated Insulin Infusion Protocol in Critically Ill Patients”, Diabetes Spectrum, 2005, vol. 18, No. 3, pp. 188-191. |
Gomez et al., “CLAM: Connection-Less, Lightweight, and Multiway Communication Support for Distributed Computing”, Computer Science, 1997, vol. 1199, pp. 227-240. |
“GPS Tracker for Medical Equipment”, http://www.trackingsystem.com/forbusinesses/corporate-trackingsystem/1098-gps-tracker-formedicalequipment.html, Mar. 15, 2015, pp. 2. |
Graseby, “Model 3000/500 and Micro 3100/505: Volumetric Infusion Pump”, Technical Service Manual, Graseby Medical Ltd., Apr. 2002, Issue A, pp. 160. |
Graseby, “Model 3000/500 and Micro 3100/505: Volumetric Infusion Pump: Illustrated Parts List for Pump Serial Numbers from 3000 to 59,999”, Technical Service Manual, Graseby Medical Ltd., Apr. 2002, Issue A, pp. 71. |
Halpern et al., “Changes in Critical Care Beds and Occupancy in the United States 1985-2000: Differences Attributable to Hospital Size”, Critical Care Medical, Aug. 2006, vol. 34, No. 8, pp. 2105-2112. |
Hamann et al., “PUMPSIM: A Software Package for Simulating Computer-Controlled Drug Infusion Pumps”, Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 1990, vol. 12, No. 5, pp. 2019-2020. |
Hasegawa et al., “On a Portable Memory Device for Physical Activities and Informations of Maternal Perception”, Journal of Perinatal Medicine, 1988, vol. 16, No. 4, pp. 349-356. |
Hawley et al., “Clinical Implementation of an Automated Medical Information Bus in an Intensive Care Unit”, Proceedings of the Annual Symposium on Computer Application in Medical Care, Nov. 9, 1988, pp. 621-624. |
Hayes-Roth et al., “Guardian: A Prototype Intelligent Agent for Intensive-Care Monitoring”, Artificial Intelligence in Medicine, vol. 4, Dec. 31, 1992, pp. 165-185. |
Hospira, GemStar® Pain Management Infusion System 9-084-PR1-2-2, www.hospira.com/products/gemstar_painmanagement.aspx, Jan. 28, 2010, pp. 1-2. |
Introducing Abbott TQPM (Total Quality Pain Management), Abbott Laboratories, Abbott Park, IL, May 2000, pp. 1-4. |
“Infusion Pump”, Wikipedia.org, as last modified Mar. 27, 2014, in 3 pages, https://web.archive.org/web/20140703024932/https://en.wikipedia.org/wiki/Infusion_pump. |
Isaka et al., “Control Strategies for Arterial Blood Pressure Regulation”, IEEE Transactions on Biomedical Engineering, Apr. 1993, vol. 40, No. 4, pp. 353-363. |
Johnson et al., “Using BCMA Software to Improve Patient Safety in Veterans Administration Medical Centers”, Journal of Healthcare Information Management, Dec. 6, 2004, vol. 16, No. 1, pp. 46-51. |
Kent Displays, “Reflex™ Electronic Skins”, Product Brief 25127B, 2009, pp. 2. |
Kent Displays, “Reflex Electronic Skins Engineering Evaluation Kit”, 25136A, Mar. 10, 2009. |
Lefkowitz et al., “A Trial of the Use of Bar Code Technology to Restructure a Drug Distribution and Administration System”, Hospital Pharmacy, Mar. 31, 1991, vol. 26, No. 3, pp. 239-242. |
Lenssen et al., “Bright Color Electronic Paper Technology and Applications”, IDS '09 Publication EP1-2 (Phillips Research), 2009, pp. 529-532. |
Leveson, Nancy, “Medical Devices: The Therac-25”, Appendix A, University of Washington, 1995, pp. 49. |
Linkens, D.A. “Computer Control for Patient Care”, Computer Control of Real-Time Processes, IEE Control Engineering Series 41, 1990, Ch. 13, pp. 216-238. |
Mako Hill et al., “The Official Ubuntu Book”, Shoeisha Co., Ltd., 1st Edition, Jun. 11, 2007, pp. 115 to 125. |
Marshall, et al., “New Microprocessor-Based Insulin Controller”, IEEE Transactions on Biomedical Engineering, Nov. 1983, vol. BME-30, No. 11, pp. 689-695. |
Martino et al., “Automation of a Medical Intensive Care Environment with a Flexible Configuration of Computer Systems”, Proceedings of the Annual Symposium on Computer Application in Medical Care, Nov. 5, 1980, vol. 3, pp. 1562-1568. |
Matsunaga et al., “On the Use of Machine Learning to Predict the Time and Resources Consumed by Applications”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing (CCGrid), May 17-20, 2010, pp. 495-504. |
Mauseth et al., “Proposed Clinical Application for Tuning Fuzzy Logic Controller of Artificial Pancreas Utilizing a Personalization Factor”, Journal of Diabetes Science and Technology, Jul. 2010, vol. 4, No. 4, pp. 913-922. |
Medfusion™, “Medfusion Syringe Infusion Pump Model 4000”, Operator's Manual, Software Version V1.1, Sep. 2011, pp. 154. http://www.medfusionpump.com/assets/literature/manuals/Operators_Manual_4000_40-5760-51A.pdf. |
Metnitz et al., “Computer Assisted Data Analysis in Intensive Care: the ICDEV Project-Development of a Scientific Database System for Intensive Care”, International Journal of Clinical Monitoring and Computing, Aug. 1995, vol. 12, No. 3, pp. 147-159. |
Micrel Medical Devices, “MP Daily +” http://web.archive.org/web/20130803235715/http://www.micrelmed.com/index.aspx?productid=9 as archived Aug. 3, 2013 in 1 page. |
Moghissi, Etie, MD, FACP, FACE, “Hyperglycemia in Hospitalized Patients”, A Supplement to ACP Hospitalist, Jun. 15, 2008, pp. 32. |
Murray, Jr. et al., “Automated Drug Identification System (during surgery)”, IEEE Proceedings of Southeastcon '91, Apr. 7-10, 1991, pp. 265. |
Nicholson et al., “‘Smart’ Infusion Apparatus for Computation and Automated Delivery of Loading, Tapering, and Maintenance Infusion Regimens of Lidocaine, Procainamide, and Theophylline”, Proceedings of The Seventh Annual Symposium on Computer Applications in Medical Care, Oct. 1983, pp. 212-213. |
Nolan et al., “The P1073 Medical Information Bus Standard: Overview and Benefits for Clinical Users”, 1990, pp. 216-219. |
Omnilink Systems, Inc., “Portable Medical Equipment Tracking”, http://www.omnilink.com/portablemedicalequipmenttracking/, Mar. 15, 2015, pp. 2. |
O'Shea, Kristen L., “Infusion Management: Working Smarter, Not Harder”, Hospital Pharmacy, Apr. 2013, vol. 48, No. 3, pp. S1-S14. |
Package Management in Debian GNU/Linux, Debian GNU/Linux Expert Desktop Use Special, Giutsu-Hyohron Co., Ltd., First Edition, Sep. 25, 2004, pp. 183-185. |
Passos et al., “Distributed Software Platform for Automation and Control of General Anaesthesia”, Eighth International Symposium on Parallel and Distributed Computing, ISPDC '09, Jun. 30-Jul. 4, 2009, pp. 8. |
Philips, “IntelliSpace Event Management and IntelliVue Patient Monitoring”, Release 10, 2011, http://incenter.medical.philips.com/doclib/enc/fetch/2000/4504/577242/577243/577247/582646/583147/8359175/Philips_Patient_Monitoring_and_IntelliSpace_Event_Management_Interoperability.pdf%3fnodeid%3d8508574%26vernum%3d-2, pp. 2. |
Pretty et al., “Hypoglycemia Detection in Critical Care Using Continuous Glucose Monitors: An in Silico Proof of Concept Analysis”, Journal of Diabetes Science and Technology, Jan. 2010, vol. 4, No. 1, pp. 15-24. |
Rappoport, Arthur E., “A Hospital Patient and Laboratory machine-Readable Identification System (MRIS) Revisited”, Journal of Medical Systems, Apr. 1984, vol. 8, Nos. 1/2, pp. 133-156. |
Ritchie et al., “A Microcomputer Based Controller for Neuromuscular Block During Surgery”, Annals of Biomedical Engineering, Jan. 1985, vol. 13, No. 1, pp. 3-15. |
Saager et al., “Computer-Guided Versus Standard Protocol for Insulin Administration in Diabetic Patients Undergoing Cardiac Surgery”, Annual Meeting of the American Society of Critical Care Anesthesiologists, Oct. 13, 2006. |
Sanders et al., “The Computer in a Programmable Implantable Medication System (PIMS)”, Proceedings of the Annual Symposium on Computer Application in Medical Care, Nov. 2, 1982, pp. 682-685. |
Schilling et al., “Optimizing Outcomes! Error Prevention and Evidence-Based Practice with IV Medications”, A Pro-Ce Publication, Hospira, Inc., Feb. 6, 2012, pp. 56. |
Schulze et al., “Advanced Sensors Technology Survey”, Final Report, Feb. 10, 1992, pp. 161. |
Scott, et al., “Using Bar-Code Technology to Capture Clinical Intervention Data in a Hospital with a Stand-Alone Pharmacy Computer System”, Mar. 15, 1996, American Journal of Health-System Pharmacy, vol. 53, No. 6, pp. 651-654. |
Sebald et al., “Numerical Analysis of a Comprehensive in Silico Subcutaneous Insulin Absorption Compartmental Model”, 31st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Sep. 2-6, 2009, pp. 3901-3904. |
Shabot, M. Michael, “Standardized Acquisition of Bedside Data: The IEEE P1073 Medical Information Bus”, International Journal of Clinical Monitoring and Computing, vol. 6, Sep. 27, 1989, pp. 197-204. |
Sheppard, Louis, Ph.D., “Automation of the Infusion of Drugs Using Feedback Control”, Journal of Cardiothoracic and Vascular Anesthesia, Feb. 28, 1989, vol. 3, No. 1, pp. 1-3. |
Sheppard, Louis, Ph.D., “Computer Control of the Infusion of Vasoactive Drugs”, Annals of Biomedical Engineering, Jul. 1980, vol. 8, No. 4-6, pp. 431-444. |
Sheppard, Louis, Ph.D., “The Application of Computers to the Measurement, Analysis, and Treatment of Patients Following Cardiac Surgical Procedures”, The University of Alabama in Birmingham, Oct. 31, 1977, pp. 297-300. |
Sheppard, Louis, Ph.D., “The Computer in the Care of Critically Ill Patients”, Proceedings of the IEEE, Sep. 1979, vol. 67, No. 9, pp. 1300-1306. |
“Sigma Spectrum: Operator's Manual”, Oct. 2009, pp. 72. http://static.medonecapital.com/manuals/userManuals/Sigma-Spectrum-Operator-Manual-October-2009.pdf. |
Simonsen, Michael Ph.D., POC Testing, New Monitoring Strategies on Fast Growth Paths in European Healthcare Arenas, Biomedical Business & Technology, Jan. 2007, vol. 30, No. 1, pp. 1-36. |
Siv-Lee et al., “Implementation of Wireless ‘Intelligent’ Pump IV Infusion Technology in a Not-for-Profit Academic Hospital Setting”, Hospital Pharmacy, Sep. 2007, vol. 42, No. 9, pp. 832-840. http://www.thomasland.com/hpj4209-832.pdf. |
Slack, W.V., “Information Technologies for Transforming Health Care”, https://www.andrew.cmu.edu/course/90-853/medis.dir/otadocs.dir/03ch2.pdf, Ch. 2, 1995, pp. 29-78. |
Smith, Joe, “Infusion Pump Informatics”, CatalyzeCare: Transforming Healthcare, as printed May 12, 2011, pp. 2. |
Sodders, Lisa, “VA Center Keeps Medicine in Right Hands”, The Capital—Journal, Dec. 4, 1999, pp. 1-2. |
“Software Versioning”, Wikipedia.org, dated Oct. 16, 2011 in 11 pages, https://en.wikipedia.org/w/index.php?title=Software_versioning&oldid=455859110. |
Stitt, F.W., “The Problem-Oriented Medical Synopsis: a Patient-Centered Clinical Information System”, Proceedings of the Annual Symposium on Computer Application in Medical Care, 1994, pp. 88-92. |
Stokowski, Laura A. RN, MS, “Using Technology to Improve Medication Safety in the Newborn Intensive Care Unit”, Advances in Neonatal Care, Dec. 2001, vol. 1, No. 2, pp. 70-83. |
Sutton et al., “The Syntax and Semantics of the PROforma Guideline Modeling Language”, Journal of the American Medical Informatics Association, Sep./Oct. 2003, vol. 10, No. 5, pp. 433-443. |
Szeinbach et al., “Automated Dispensing Technologies: Effect on Managed Care”, Journal of Managed Care Pharmacy (JMCP), Sep./Oct. 1995, vol. 1, No. 2, pp. 121-127. |
Szolovits et al., “Guardian Angel: Patient-Centered Health Information Systems”, Technical Report MIT/LCS/TR-604, Massachusetts Institute of Technology Laboratory for Computer Science, May 1994, pp. 39. |
Van Den Berghe, M.D., Ph.D., et al., “Intensive Insulin Therapy in Critically Ill Patients”, The New England Journal of Medicine, Nov. 8, 2001, vol. 345, No. 19, pp. 1359-1367. |
Van Den Berghe, M.D., Ph.D., et al., “Intensive Insulin Therapy in the Medical ICU”, The New England Journal of Medicine, Feb. 2, 2006, vol. 354, No. 5, pp. 449-461. |
Van Der Maas et al., “Requirements for Medical Modeling Languages”, Journal of the American Medical Informatics Association, Mar./Apr. 2001, vol. 8, No. 2, pp. 146-162. |
Villalobos et al., “Computerized System in Intensive Care medicine”, Medical Informatics, vol. 11, No. 3, 1986, pp. 269-275. |
Wilkins et al., “A Regular Language: The Annotated Case Report Form”, PPD Inc., PharmaSUG2011—Paper CD18, 2011, pp. 1-9. |
Ying et al., “Regulating Mean Arterial Pressure in Postsurgical Cardiac Patients. A Fuzzy Logic System to Control Administration of Sodium Nitroprusside”, IEEE Engineering in Medicine and Biology Magazine, vol. 13, No. 5, Nov.-Dec. 1994, pp. 671-677. |
Yue, Ying Kwan, “A Healthcare Failure Mode and Effect Analysis on the Safety of Secondary Infusions”, Thesis, Institute of Biomaterials and Biomedical Engineering, University of Toronto, 2012, pp. 168. |
Yurkonis et al., “Computer Simulation of Adaptive Drug Infusion”, IEEE Transactions on Biomedical Engineering, vol. BME-34, No. 8, Aug. 1987, pp. 633-635. |
Zakariah et al., “Combination of Biphasic Transmittance Waveform with Blood Procalcitonin Levels for Diagnosis of Sepsis in Acutely Ill Patients”, Critical Care Medicine, 2008, vol. 36, No. 5, pp. 1507-1512. |
Ahn et al., “Towards Scalable Authentication in Health Services”, Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Jun. 2002, pp. 83-88. |
Bellare et al., “Security Proofs for Identity-Based Identification and Signature Schemes”, Lecture Notes in Computer Science, Jan. 2009, vol. 22, No. 1, pp. 18. |
Block, Alexander, “Secret Sharing and 1-11 Threshold Signatures with BLS”, Jul. 2, 2018, https://blog.dash.org/secret-sharing-and-threshold-signatures-with-bls-954d1587b5f, in 8 pages. |
Doesburg et al., “Improved Usability of a Multi-Infusion Setup Using a Centralized Control Interface: A Task-Based Usability Test”, Aug. 11, 2017, PLoS ONE, vol. 12, No. 8, pp. 10. |
Edworthy, Judy, “Medical Audible Alarms: A Review”, Journal of the American Medical Informatics Association, vol. 20, No. 3, 2013, pp. 584-589. |
Gutwin et al., “Gone But Not Forgotten: Designing for Disconnection in Synchronous Groupware”, CSCW 2010, Feb. 6-10, 2010, Savannah, Georgia, USA., pp. 179-188. |
Huang et al., “Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing”, vol. 6, Jul. 2018, pp. 36584-36594. |
Li et al., “Hijacking an Insulin Pump: Security Attacks and Defenses for a Diabetes Therapy System”, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, 2011, pp. 150-156. |
“McKesson Automation and ALARIS Medical Systems Developing Point-of-Care Bar Coding Solution to Improve IV Medication Safety”, PR Newswire, NY, Dec. 9, 2002, pp. 4. |
Michienzi, Kelly, “Managing Drug Library Updates”, Pharmacy Purchasing Products, https://www.pppmag.com/article/1061, Feb. 2012, vol. 9, pp. 22-23. |
“Sigma Spectrum: Operator's Manual”, May 15, 2008, pp. 63. <https://usme.com/content/manuals/sigma-spectrum-operator-manual.pdf>. |
Solapurkar et al., “Building Secure Healthcare Services Using OAuth 2.0 and JSON Web Token in IOT Cloud Scenario”, Dec. 2016, 2nd International Conference on Contemporary Computing and Informatics, pp. 99-10. |
“TCG TPM v2.0 Provisioning Guidance”, Reference, Version 1, Revision 1, Mar. 15, 2017, pp. 1-43. |
Murphy, Robert, “The Design of Safety-Critical Medical Infusion Devices”, May 30, 2007, Doctor of Philosophy submission, pp. 317. |
Rahmani et al., “Smart e-Health Gateway: Bringing Intelligence to Internet-of-Things Based Ubiquitous Healthcare Systems”, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), Jul. 2015, pp. 826-834. |
Number | Date | Country | |
---|---|---|---|
20200353167 A1 | Nov 2020 | US |
Number | Date | Country | |
---|---|---|---|
62845115 | May 2019 | US |
Number | Date | Country | |
---|---|---|---|
Parent | PCT/US2020/031664 | May 2020 | WO |
Child | 16869404 | US |