This application is a continuation of application Ser. No. 913,288, filed Sept. 30,1986, now abandoned.
Number | Name | Date | Kind |
---|---|---|---|
3806882 | Clarke | Apr 1974 | |
3896266 | Waterbury | Jul 1975 | |
3984637 | Caudill et al. | Oct 1976 | |
4096356 | Burtness et al. | Jun 1978 | |
4182933 | Rosenblum | Jan 1980 | |
4415767 | Gill et al. | Nov 1983 | |
4430728 | Beitel et al. | Feb 1984 | |
4475175 | Smith | Oct 1984 | |
4479122 | Redman et al. | Oct 1984 | |
4520233 | Smith | May 1985 | |
4531023 | Levine | Jul 1985 | |
4532377 | Zink | Jul 1985 | |
4604499 | Hughes | Aug 1986 |
Entry |
---|
J. T. Powers, Jr., "Switched Lines Access Restrictor", IBM Technical Disclosure Bulletin, vol. 22, No. 9, Feb., 1980, pp. 4196-4197. |
J. Smith, "Call-Back Schemes Ward Off Unwanted Access by Telephone", 8032 Electronics International, 57(1984)Mar., No. 5, N.Y., U.S.A., pp. 131-135. |
C. W. Beardsley, "Is Your Computer Insecure?", IEEE Spectrum, vol. 9, No. 1, Jan. 1972, pp. 67-78. |
Number | Date | Country | |
---|---|---|---|
Parent | 913288 | Sep 1986 |