This is a continuation of application Ser. No. 927,309, filed on Nov. 5, 1986, now abandoned.
Number | Name | Date | Kind |
---|---|---|---|
2038878 | Strutt | Apr 1936 | |
2197028 | Wolff | Apr 1940 | |
2242246 | Lindsay et al. | Jun 1941 | |
2455376 | Lindsay | Dec 1948 | |
3041592 | Schmidt | Jun 1962 | |
3746863 | Pronovost | Jul 1973 | |
3763795 | Wetz, Jr. | Oct 1973 | |
3825920 | Nelson et al. | Jul 1974 | |
4051472 | Albanese et al. | Sep 1977 | |
4086586 | Spirig | Apr 1978 | |
4109233 | Erickson | Aug 1978 | |
4120389 | Erickson | Oct 1978 | |
4168396 | Best | Sep 1979 | |
4225859 | Zetting et al. | Sep 1980 | |
4236463 | Westcott | Dec 1980 | |
4382291 | Nakauchi | May 1983 | |
4403138 | Battarel et al. | Sep 1983 | |
4459583 | van der Walt et al. | Jul 1984 | |
4514720 | Oberstein et al. | Apr 1985 | |
4543565 | Oberstein et al. | Sep 1985 | |
4562306 | Chou et al. | Dec 1985 | |
4575621 | Dreifus | Mar 1986 | |
4588176 | Arnold et al. | Dec 1986 | |
4593384 | Kleijne | Jun 1986 | |
4691350 | Kleijne et al. | Sep 1987 | |
4783801 | Kaule | Nov 1988 | |
4811288 | Kleijne et al. | Mar 1989 |
Number | Date | Country |
---|---|---|
0142013 | May 1985 | EPX |
3023427 | Jan 1981 | DEX |
3247260 | Jun 1984 | DEX |
0640971 | Jan 1984 | CHX |
Entry |
---|
Chaum, David, "Design Concepts for Tamper Responding Systems", Advances in Cryptology/Proceedings of Crypto 83, 1984, pp. 387-392. |
Kent, Stephen T., "Protecting Externally Supplied Software in Small Computers", PhD Thesis, M.I.T., 1980. |
Price, W. L., "Physical of Transaction Devices", National Physical Laboratory, 1986. |
Purdy, George B. et al, "A Software Protection Scheme", IEEE, 1982. |
Simmons, Gustavus J., "How to (Selectively) Broadcast a Secret", IEEE, 1985. |
The Encryptor Products, Jones Futurex, Inc. |
"Secure Terminal Interface Module for Smart Card Applications", IBM Technical Disclosure Bulletin, vol. 28, No. 4, Sep. 1985, pp. 1488-1489. |
Number | Date | Country | |
---|---|---|---|
Parent | 927309 | Nov 1986 |