Network usage has risen dramatically within recent years. Consequently, network resources associated with a Network Service Provider (NSP) are correspondingly becoming over-burdened. While subscriptions for network usage may allow for unlimited access, this service model may be transitioning towards usage restrictions. Difficulties may arise when enforcing these usage restrictions because NSPs may wish to exclude certain traffic from these usage restrictions. For example, a NSP or a trusted third party of a NSP may offer a service that the NSP does not want the usage restrictions to apply. In such a service model, enforcing usage restrictions while allowing for exemptions may be problematic.
The following detailed description refers to the accompanying drawings. The same reference numbers in different drawings may identify the same or similar elements. Also, the following description does not limit the invention.
Implementations described herein may provide token-based crediting of network usage.
User 100 may be a subscriber of NSP 120 for network access. User 100 may access NSP 120 via usage enforcement component 110, and any other node or network via usage enforcement component 110, such as network 130 and CP 140. The subscription of user 100 for network access may include a usage restriction. Usage restriction will be discussed in greater detail below.
User device 105 may include a client entity. An entity may be defined as a device, such as a computer, a laptop, a personal digital assistant (PDA), or another type of computation or communication device, a process, a thread, or a fiber running or capable of running on one of these devices. In one embodiment, user device 105 may allow user 100 to communicate with usage enforcement component 110, and any node or network via usage enforcement component 110, such as NSP 120, network 130 and CP 140.
Usage enforcement component 110 may include an entry node (i.e., a network entry point (NEP)) to network 130. Usage enforcement component 110 may enforce a usage restriction associated with the network access of a user, such as user 100. A usage restriction, as used herein, may include any parameter associated with a connection and/or a utilization of a network resource. For example, a usage restriction may be a byte or bit limitation, or a time limitation. In one implementation, usage enforcement component 110 may be a server or a firewall-type device.
NSP 120 may include a node that provides network access to a subscriber, such as user 100, via usage enforcement component 110. NSP 120 may provide content and/or a service, in addition to network access. In one implementation, NSP 120 may include one or more servers with network node management capabilities that may be employed to control usage enforcement component 110.
Network 130 may include one or more series of points or nodes interconnected by communication paths or links. Network 130 may include any network characterized by the type of link (e.g., an optical network), by access (e.g., a private network), by spatial distance (e.g., a local-area network (LAN)), by protocol (e.g. a TCP/IP network), by connection (e.g., a switched network, such as a Public Switched Telephone Network (PSTN)), the Internet, etc. Network 130 may include a combination of networks. Network 130 may provide access to various services and/or content. Network 130 may be an intermediary network to other nodes and/or networks. User 100 may access CP 140 via network 130.
CP 140 may include a node capable of providing content and/or services. For example, CP 140 may provide video-on-demand (VOD) movies for download, access to periodicals, music, etc. In one implementation, CP 140 may be a trusted third party of NSP 120. In another implementation, CP 140 may not be a trusted third party of NSP 120.
Computer 210 may include any type of computer system, such as a mainframe, minicomputer, personal computer, or the like. Keyboard 220 may include any conventional keyboard or keypad that allows a user, such as user 100 to input information into computer 210. Pointing device 230 may include one or more conventional pointing devices, such as a mouse, a pen, a trackball, a glide pad, biometric pointing devices, or the like.
Monitor 240 may include any conventional device capable of displaying images to a user, such as user 100. Monitor 240 may, for example, include a cathode ray tube display, a liquid crystal display, a gas panel display, or the like. In alternative implementations, pointing device 230 may be integrated within monitor 240 through the use of touch-screen technology.
Although
Processor 320 may include any type of conventional processor or microprocessor that interprets and executes instructions. In alternative implementations, processor 320 may be implemented as a field programmable gate array (FPGA), application specific integrated circuit (ASIC), or the like.
Memory 330 may include a random access memory (RAM) or another dynamic storage device that stores information and instructions for execution by processor 320. Memory 320 may also be used to store temporary variables or other intermediate information during execution of instructions by processor 320.
ROM 340 may include a conventional ROM device and/or another static storage device that stores static information and instructions for processor 320. Storage device 350 may include a magnetic disk or optical disk and its corresponding drive and/or some other type of magnetic or optical recording medium and its corresponding drive for storing information and instructions.
Input device 360 may include one or more conventional mechanisms that permit an operator to input information to user device 105, such as keyboard 220, pointing device 230 (e.g., a mouse, a pen, and the like), one or more biometric mechanisms, such as a voice recognition device, etc. Output device 270 may include one or more conventional mechanisms that output information to the user, such as user 100, such as a display (e.g., monitor 240), a printer, a speaker, etc. Communication interface 380 may include any transceiver-like mechanism that enables user device 105 to communicate with other devices and/or systems, such as usage component 110, NSP 120, network 130, and CP 140. For example, communication interface 380 may include a modem.
Although
Input port 410 may include a mechanism for receiving incoming data. Output port 420 may include a mechanism for transmitting outgoing data.
Usage restriction logic 430 may include any logic capable of regulating the network access of user 100 based on a usage restriction. Logic, as used herein, is intended to be interpreted broadly to include software, hardware, or a combination of hardware and software. In one implementation, usage restriction logic 430 may regulate network access by referring to restriction database 440. Usage restriction logic 430 may be capable of generating usage data associated with a connection and/or usage of a network resource.
Restriction database 440 may include data for enforcing a usage restriction. Restriction database 440 may be stored on a computer readable medium, such as a hard drive, and accessible to usage restriction logic 430 and/or NSP 120.
Although
Subscriber ID field 510 may contain a string that identifies a subscriber, such as user 100. A string, as used herein, may include any sequence of symbols. For example, subscriber ID 510 may be a unique alphanumeric sequence, such as (DAS59999). Usage restriction type field 520 may contain a string that represents the type of restriction associated with a subscriber's network access. For example, a usage restriction may limit the amount of time or bandwidth a subscriber may utilize on a per connection basis, or for a period of time (e.g., daily, weekly, monthly, etc.). Thus, for example, as illustrated in
Although
Input port/output port 610 may include a mechanism for receiving incoming data and transmitting outgoing data. Network management logic 620 may include any logic capable of monitoring and/or managing the operation of usage enforcement component 110 and the data contained in master database 630. Network management logic 620 may also include logic capable of generating a usage token, as will be described in reference to
Master database 630 may include, among other things, subscriber information, usage restriction information, and content provider information. Master database 630 may also include content and/or service data that is accessible by a subscriber, such as user 100. Master database 630 will be described in greater detail in reference to
Although
Subscriber database 710 may include data associated with a subscriber of NSP 120, such as user 100. For example, subscriber database 710 may include personal information, such as name, address, and telephone number, billing information, credit card information, etc. Usage restriction database 720 may include data associated with enforcing a usage restriction associated with a subscriber of NSP 120. For example, usage restriction database 720 may include all the data stored in restriction database 440 of usage enforcement component 110. Usage restriction database 720 may also include additional usage restriction information (e.g., monitoring and tracking information generated by usage enforcement component 110). In addition, usage restriction database 720 may store usage tokens issued from CP 140, received from user 100, and copies of usage tokens issued from NSP 120.
Content provider database 730 may include data associated with content providers, such as CP 140. For example, content provider database 730 may include a CP ID, type of content and/or service provided by a CP, information related to credit that a CP may issue, such as amount and type of credit as it relates to a usage restriction, and expiration information. The content providers contained in content provider database 730 may each be a trusted third party of NSP 120. Content and service data may include a repository accessible by a subscriber, such as user 100. For example, content and service data may include news information, an e-mail service, etc.
Although
Input port/output port 810 may include any mechanism for receiving incoming data and transmitting outgoing data. Content logic 820 may include logic capable of controlling the operation of CP 140, including, among other things, controlling the access of content 830 by a user, such as user 100. Content logic 820 may include logic capable of generating a usage token having a usage credit based on user 100's access of content 830. Content logic 820 may also generate a usage token based on the data contained in usage token database 840.
Content 830 may include a resource, such as content or a service that may be accessed by and/or provided to a user, such as user 100. For example, content 830 may include VOD movie content that is downloadable. Usage token database 840 may include information associated with the generation of a usage token, as will be described in greater detail in reference to
Although
Subscriber ID field 910 may contain, for example, two strings, such as a CP users ID and a users NSP ID. CP user ID may represent an ID of a user, such as user 100, which CP 140 may use in identifying the user before providing content and/or access. NSP users ID may represent an ID of a user that NSP 120 may use when providing network access. In some embodiments, CP users ID and NSP users ID may be identical. Usage restriction type field 920 may contain a string that represents the type of restriction associated with a subscriber's network access, as described above in reference to
Although
CP ID 1010 may include a string that identifies a CP, such as CP 140. For example, the string may include a network address or a name of a CP. User ID 1020 may include a string that identifies a user, such as user 100. For example, user ID 1020 may include a user account number associated with NSP 120. Amount of credit 1030 may include a string that represents a usage credit. For example, if the usage restriction is a time restriction, amount of credit 1030 may be a time period (e.g., 30 minutes) that represents a period of time that the user identified in user ID 1020 accessed content and/or a service provided by the CP identified in CP ID 1010. Date 1040 may include a string that represents a timestamp (e.g., month, day, year, hour, minute, and second) of when the user identified in user ID 1020 accessed content and/or a service provided by the CP identified in CP ID 1010. Expiration 1050 may include a string that represents an expiration for the usage credit contained in amount of credit 1030. For example, expiration 1050 may be a date (e.g., month, day, and year).
Although
Processing may begin with CP 140 detecting an event (Block 1102). For example, CP 140 may detect when user 100 logs into CP 140's site, when user 100 completes a download, or when user 100 purchases an item. In such instance, in one implementation, processing may continue in which CP 140 determines whether user 100 is a subscriber of NSP 120 (Block 1104). For example, when user 100 attempts to access content and/or a service provided by CP 140, CP 140 may require a login. In this way, CP 140 may be able to identify user 100 as a subscriber of NSP 120 by referring, for example, to usage token database 840. In such implementation, content logic 820 may compare the login information acquired from user 100 with subscriber ID field 910 of usage token database 840 to determine whether the login information matches an entry in subscriber ID field 910. In such an instance, CP 140 may determine that user 100 is a subscriber of NSP 120 when the login matches an entry.
If CP 140 determines that user 100 is not a subscriber of NSP 120 (Block 1104-NO), CP 140 may determine that no usage credit is to be issued to user 100 (Block 1106). If, on the other hand, CP 140 determines that user 100 is a subscriber of NSP 120 (Block 1104-YES), CP 140 may issue usage token 1000 that contains a usage credit (Block 1108).
As previously described above, an exemplary usage token, such as usage token 1000, may include CP ID 1010, user ID 1020, amount of credit 1030, date 1040, and expiration 1050. When issuing usage token 1000, CP 140 may include CP ID 1010, and obtain user ID 1020 from subscriber ID field 910 of usage token database 840, such as NSP user ID.
The manner in which CP 140 determines amount of credit 1030 for usage token 1000 may vary. For example, in one implementation, CP 140 may maintain usage restriction type 920 as it relates to each NSP 120 subscriber. In this way, CP 140 may monitor a usage that corresponds to the restriction that NSP 120 imposes on user 100. For example, if usage restriction type 920 is a time restriction, CP 140 may monitor the entire time user 100 accesses content and/or a service provided by CP 140 to obtain tracking information field 930. CP 140 may determine credit amount 940 based on tracking information field 930.
In another implementation, CP 140 may issue a certain amount of credit (e.g., a fixed credit amount), for example, each time user 100 accesses content and/or a service provided by CP 140, without CP 140 monitoring the usage by user 100. In other instances, CP 140 may issue a certain amount of credit based on one or more factors, such a duration of access, content accessed, etc.
In one implementation, CP 140 may determine date 1040 based on tracking information field 930. In another implementation, CP 140 may determine date 1040 based on a login time of user 100 or other information acquired during user 100's access to content and/or a service provided by CP 140. CP 140 may determine expiration 1050 based on information provided by NSP 120. For example, NSP 120 may indicate that a usage credit issued from CP 140 be valid for a certain period of time (e.g., a specific number of days or weeks) before expiring. In another implementation, CP 140 may determine expiration 1050 based on any number of factors, such as the content accessed.
In one embodiment, CP 140 may issue usage token 1000 to user 100. In another embodiment, CP 140 may issue usage token 1000 to NSP 120. In yet another embodiment, CP 140 may issue usage token 1000 to both NSP 120 and user 100. In still another embodiment, CP 140 may issue usage token 1000 to a third party associated with NSP 120 that may verify the authenticity of usage token 1000, or process usage token 1000 in relation to the usage restriction imposed by NSP 120, or for some other purpose.
Processing may begin with a user, such as user 100, receiving a usage token, such as usage token 1000, from a CP, such as CP 140 (Block 1202). In one embodiment, user 100 may receive usage token 1000 after user 100 completes his/her access to the content and/or the service provided by CP 140. In another embodiment, user 100 may receive usage token 1000 anytime during his/her access to the content and/or the service provided by CP 140. When user 100 receives usage token 1000, in one implementation, user 100 may be able to view the content of usage token 1000, such as amount of credit 1030. Alternatively, or additionally, user 100 may be able to save a copy of usage token 1000 for his/her records. In another implementation, user 100 may not be able to view the content of usage token 1000 and/or save a copy of usage token 1000. For example, usage token 1000 may be encrypted or some other security measures may be employed, as will be described in greater detail below.
User device 105 may forward usage token 1000 to NSP 120 (Block 1204). In one embodiment, user device 105 may forward usage token 1000 in response to an action by user 100. In another embodiment, user device 105 may be configured to automatically forward received usage tokens 1000 to NSP 120.
Processing may begin with an NSP, such as NSP 120, receiving a usage token, such as usage token 1000, from a user, such as user 100 (Block 1302). When the NSP 120 receives usage token, NSP 120 may determine whether the usage token information is correct (Block 1304).
For example, NSP 120 may confirm CP ID 1010 and user ID 1020 contained in usage token 1000. In one implementation, network management logic 620 may compare CP ID 1010 and user ID 1020 contained in the received usage token 1000 to the corresponding fields in usage restriction database 720 and content provider database 730, respectively, to determine whether CP ID 1010 and user ID 1020 are valid identifiers. Additionally, or alternatively, NSP 120 may confirm date 1040 based on tracking information contained in usage restriction database 720. Additionally, or alternatively, NSP 120 may confirm amount of credit 1030 and/or expiration 1050 based on content provider database 730 or other information relating to the arrangement between NSP 120 and CP 140 for issuing usage credit. Additionally, or alternatively, as will be described below, NSP 120 may employ security measures to ensure the correctness and accuracy of the information contained in usage token 1000.
If NSP 120 determines that the information contained in usage token 1000 is correct (Block 1304-YES), NSP 120 may apply the usage credit of usage token 1000 toward a usage restriction associated with user 100 (Block 1306). In one embodiment, network management logic 620 may update (e.g., apply a usage credit) to master database 600 and restriction database 440. For example, network management logic 620 may subtract amount of credit 1030 contained in usage token 1000 from a value in current usage 530 of restriction database 440 and usage restriction database 720 of master database 600 as it relates to the user identified in user ID 1020.
If NSP 120 determines that the information contained in usage token 1000 is not correct (Block 1304-NO), NSP 120 may not apply the usage credit toward a usage restriction associated with user 100 (Block 1308). For example, NSP 120 may discard usage token 1000. Alternatively or additionally, NSP 120 may notify user 100 that usage token 1000 has not been accepted.
Processing may begin with NSP 120 receiving a first usage token 1000 from CP 140 (Block 1402), and receiving a second usage token 1000 from user 100 (Block 1404). As previously mentioned, usage tokens may be stored in usage restriction database 720. In one implementation, network management logic 620 may sort incoming usage tokens based on CP ID 1010, user ID 1020 and date 1040 information contained in each usage token 1000. Based on this information, network management logic 620 may identify the first usage token 1000 from CP 140 and the second usage token 1000 from user 1000 in usage restriction database 720 as usage tokens that may be compared. Thus, when NSP 120 receives each usage token 1000, NSP 120 may compare the information contained in each usage token 1000 (Block 1406). For example, network management logic 620 may compare each field of usage token 1000 with the corresponding field of the other usage token 1000.
In one embodiment, if the information contained in the second usage token 1000 received from user 100 matches the information contained in usage token 1000 received from CP 140 (Block 1408-YES), NSP 120 may determine to apply the usage credit of usage token 1000 received from CP 140 (Block 1410). In one embodiment, network management logic 620 may update (e.g., apply a usage credit) to master database 600 and restriction database 440. For example, network management logic 620 may subtract amount of credit 1030 contained in usage token 1000 from current usage 530 of restriction database 440 and master database 600 as it relates to the user identified in user ID 1020.
If, on the other hand, the information contained in the second usage token 1000 received from user 100 is different from the information contained in the first usage token 1000 received from CP 140 (Block 1408-NO), NSP 120 may determine not to apply the usage credit of either usage token 1000 (Block 1412). For example, in this situation, NSP 120 may discard usage token 1000. Alternatively or additionally, NSP 120 may notify user 100 and/or CP 140 that the first and/or the second usage tokens 1000 have been rejected.
As with any form of electronic communication, issues of fraud may arise. Accordingly, security measures may be implemented with respect to the exemplary processes described above in reference to
Various methods may be employed to maintain security and prevent fraud. For example, an authentication procedure (e.g., peer entity authentication or data-origin authentication) may be implemented to assure that the communicating entity is the entity that it claims to be. For example, when CP 140 issues usage token 1000 to NSP 120, peer entity authentication may be employed to provide CP 140 and NSP 120 confidence in the identity of the other. Additionally, or alternatively, a data integrity procedure may be employed to assure that usage token 1000 contains, for example, no modifications, insertions, and/or deletions. For example, when NSP 120 issues usage token 1000 to user 100, a message authentication code may added to usage token 1000 so when user 100 forwards usage token 1000 back to NSP 120, NSP 120 may determine the data integrity of usage token 1000. Additionally, or alternatively, a non-repudiation procedure may be employed to protect against denial by one of the parties involved in the communication of having participated in the communication. For example, when CP 140 issues usage token 1000 to NSP 120, a non-repudiation (origin) procedure may be employed to provide proof that usage token 1000 was sent by CP 140.
In one implementation, for example, CP 140 may issue the same usage token 1000 to NSP 120 and user 100, as described above. CP 140 may include a hash code in usage token 1000 issued to NSP 120. When NSP 120 receives usage token 1000 from user 100 and usage token 1000 from CP 140, NSP 120 may confirm the authenticity of usage token 1000 from user 100 by comparing user's 100 usage token 1000 to usage token 1000 from CP 140. In addition, NSP 120 may compare a hash code of user's 100 usage token 1000 to the hash code in usage token from CP 140. When user's 100 usage token 1000 fails the comparison, NSP 120 may reject user's 100 usage token 1000, and not apply any usage credit.
NSP 120 may also implement other security measures, such as providing a secure authenticated channel for transmission of usage token 1000, so as to prevent, for example, spoofing.
It is to be understood, with reference to
As illustrated in
As illustrated in
As illustrated in
User 100 may request a service from CP 140, such as downloading a movie, as illustrated by communication (1). CP 140 may provide the content to user 100 together with usage token 1000 in communication (2a). Usage token 1000 may include a fixed usage credit of 36 Megabytes (MB). That is, the usage credit of 36 MB may be more or less than the file size of the movie downloaded by user 100. Additionally, CP 140 may provide usage token 1000 to NSP 120 in communication (2b). NSP 120 may be monitoring the network usage of user 100 via usage enforcement component 110 in communication (3). User 100 may send usage token 1000 to NSP 120 in communication (4). NSP 120 may compare usage token 1000 sent by CP 140 to usage token 100 sent by user device 105. In this example, NSP 120 may determine that usage tokens 1000 match. NSP 120 may credit the usage credit to the account of user 100 in communication (5) (e.g., to master database 630) and communication (6) (e.g., to restriction database 440).
The foregoing description of implementations provides illustration, but is not intended to be exhaustive or to limit the implementations to the precise form disclosed. It is to be appreciated that the foregoing description may provide a simple solution that would allow for tracking of a user's network usage and providing for an exemption to a usage restriction without the need to track a content provider's or a service provider's network address. Modifications and variations are possible in light of the above teachings or may be acquired from practice of the teachings. For example, the usage tokens may be issued by other components and/or entities than those discussed herein. For example, a content provider may utilize a trusted party's services to issue usage tokens.
For example, while series of blocks and/or acts have been described with regard to processes illustrated in
It will be apparent that aspects described herein may be implemented in many different forms of software, firmware, and hardware in the implementations illustrated in the figures. The actual software code or specialized control hardware used to implement aspects does not limit the invention. Thus, the operation and behavior of the aspects were described without reference to the specific software code—it being understood that software and control hardware can be designed to implement the aspects based on the description herein.
No element, act, or instruction used in the present application should be construed as critical or essential to the implementations described herein unless explicitly described as such. Also, as used herein, the article “a”, “an”, and “the” are intended to include one or more items. Where only one item is intended, the term “one” or similar language is used. Further, the phrase “based on” is intended to mean “based, at least in part, on” unless explicitly stated otherwise. As used herein, the term “and/or” includes any and all combinations of one or more of the associated list items.
Number | Name | Date | Kind |
---|---|---|---|
5392280 | Zheng | Feb 1995 | A |
5481542 | Logston et al. | Jan 1996 | A |
5559798 | Clarkson et al. | Sep 1996 | A |
5752041 | Fosdick | May 1998 | A |
5835711 | Chang et al. | Nov 1998 | A |
6075789 | Kasslin et al. | Jun 2000 | A |
6081518 | Bowman-Amuah | Jun 2000 | A |
6147975 | Bowman-Amuah | Nov 2000 | A |
6396531 | Gerszberg et al. | May 2002 | B1 |
6418558 | Roberts et al. | Jul 2002 | B1 |
6510516 | Benson et al. | Jan 2003 | B1 |
6587865 | Kimbrel et al. | Jul 2003 | B1 |
6606744 | Mikurak | Aug 2003 | B1 |
6704576 | Brachman et al. | Mar 2004 | B1 |
6823385 | McKinnon et al. | Nov 2004 | B2 |
6834341 | Bahl et al. | Dec 2004 | B1 |
6845106 | McKinnon et al. | Jan 2005 | B2 |
6850533 | Gerszberg et al. | Feb 2005 | B2 |
6883095 | Sandhu et al. | Apr 2005 | B2 |
6898711 | Bauman et al. | May 2005 | B1 |
6940980 | Sandhu et al. | Sep 2005 | B2 |
6944166 | Perinpanathan et al. | Sep 2005 | B1 |
6993044 | McKinnon et al. | Jan 2006 | B2 |
7017041 | Sandhu et al. | Mar 2006 | B2 |
7031708 | Sarkkinen et al. | Apr 2006 | B2 |
7032241 | Venkatachary et al. | Apr 2006 | B1 |
7039037 | Wang et al. | May 2006 | B2 |
7139247 | Desai et al. | Nov 2006 | B2 |
7146630 | Dravida et al. | Dec 2006 | B2 |
7149450 | Takemura | Dec 2006 | B2 |
7174568 | Chatani et al. | Feb 2007 | B2 |
7287275 | Moskowitz | Oct 2007 | B2 |
7305697 | Alao et al. | Dec 2007 | B2 |
7418433 | Sako et al. | Aug 2008 | B2 |
7450531 | Iyer et al. | Nov 2008 | B2 |
7451217 | Wardrop | Nov 2008 | B2 |
7466652 | Lau et al. | Dec 2008 | B2 |
7552093 | Levin et al. | Jun 2009 | B2 |
7552192 | Carmichael | Jun 2009 | B2 |
7577660 | Ohtani | Aug 2009 | B2 |
7656797 | Khasnabish et al. | Feb 2010 | B2 |
7685597 | Czajkowski et al. | Mar 2010 | B1 |
7716240 | Lim | May 2010 | B2 |
7814076 | Sack et al. | Oct 2010 | B2 |
20020046255 | Moore et al. | Apr 2002 | A1 |
20020075844 | Hagen | Jun 2002 | A1 |
20020078344 | Sandhu et al. | Jun 2002 | A1 |
20020091645 | Tohyama | Jul 2002 | A1 |
20020116488 | Subramanian et al. | Aug 2002 | A1 |
20020118699 | McKinnon et al. | Aug 2002 | A1 |
20020129123 | Johnson et al. | Sep 2002 | A1 |
20020186844 | Levy et al. | Dec 2002 | A1 |
20030028622 | Inoue et al. | Feb 2003 | A1 |
20030074312 | White | Apr 2003 | A1 |
20030172145 | Nguyen | Sep 2003 | A1 |
20030211860 | Sarkkinen et al. | Nov 2003 | A1 |
20030212800 | Jones et al. | Nov 2003 | A1 |
20030217362 | Summers et al. | Nov 2003 | A1 |
20040010705 | Sako et al. | Jan 2004 | A1 |
20040088510 | Hori | May 2004 | A1 |
20040122958 | Wardrop | Jun 2004 | A1 |
20040151184 | Wang et al. | Aug 2004 | A1 |
20040199472 | Dobbins | Oct 2004 | A1 |
20040199667 | Dobbins | Oct 2004 | A1 |
20040258094 | Bashan et al. | Dec 2004 | A1 |
20040261094 | Huslak et al. | Dec 2004 | A1 |
20050044228 | Birkestrand et al. | Feb 2005 | A1 |
20050066200 | Bahl et al. | Mar 2005 | A1 |
20050108395 | Brey et al. | May 2005 | A1 |
20050154923 | Lok et al. | Jul 2005 | A1 |
20050243726 | Narendran | Nov 2005 | A1 |
20060059565 | Green et al. | Mar 2006 | A1 |
20060072144 | Dowling et al. | Apr 2006 | A1 |
20060072541 | Pecus | Apr 2006 | A1 |
20060088011 | Iyer et al. | Apr 2006 | A1 |
20060112016 | Ishibashi | May 2006 | A1 |
20060122900 | Bean et al. | Jun 2006 | A1 |
20060123455 | Pai et al. | Jun 2006 | A1 |
20060168614 | Salas et al. | Jul 2006 | A1 |
20060236384 | Lindholm et al. | Oct 2006 | A1 |
20070078777 | Demartini et al. | Apr 2007 | A1 |
20070118414 | Asaki et al. | May 2007 | A1 |
20070203714 | McEnroe et al. | Aug 2007 | A1 |
20070226785 | Chow et al. | Sep 2007 | A1 |
20070258361 | McEwen | Nov 2007 | A1 |
20080005156 | Edwards et al. | Jan 2008 | A1 |
20080010124 | Paek et al. | Jan 2008 | A1 |
20080013470 | Kopplin | Jan 2008 | A1 |
20080049630 | Kozisek et al. | Feb 2008 | A1 |
20080060084 | Gappa et al. | Mar 2008 | A1 |
20080077794 | Arnold et al. | Mar 2008 | A1 |
20080092239 | Sitrick et al. | Apr 2008 | A1 |
20080172730 | Sandhu et al. | Jul 2008 | A1 |
20080177663 | Gupta et al. | Jul 2008 | A1 |
20080208715 | Hod et al. | Aug 2008 | A1 |
20080209491 | Hasek | Aug 2008 | A1 |
20080235746 | Peters et al. | Sep 2008 | A1 |
20080279183 | Wiley et al. | Nov 2008 | A1 |
20080287098 | Kim | Nov 2008 | A1 |
20080289023 | Wardrop | Nov 2008 | A1 |
20090070454 | McKinnon et al. | Mar 2009 | A1 |
20100017867 | Fascenda | Jan 2010 | A1 |
20100031021 | Arnold et al. | Feb 2010 | A1 |
20100228613 | Anderson et al. | Sep 2010 | A1 |
20100250546 | Shuster | Sep 2010 | A1 |
Number | Date | Country |
---|---|---|
2397731 | Jul 2004 | GB |
Number | Date | Country | |
---|---|---|---|
20090019155 A1 | Jan 2009 | US |