This is a continuation of application Ser. No. 881,485 filed 7-1-86, which is a continuation of application Ser. No. 402,702, filed 7-28-82.
Number | Name | Date | Kind |
---|---|---|---|
3291808 | Ehrat | Dec 1966 | |
3614316 | Andrews et al. | Oct 1971 | |
3659046 | Angeleri et al. | Apr 1972 | |
3866217 | Bennett, Jr. | Feb 1975 | |
4047008 | Perkins | Sep 1977 | |
4109856 | Van Beveren et al. | Aug 1978 | |
4145508 | Ehrat | Mar 1979 | |
4171513 | Otey et al. | Oct 1979 | |
4172963 | Belcher et al. | Oct 1979 | |
4176246 | Gaetzi | Nov 1979 | |
4264781 | Oosterbaan et al. | Aug 1981 | |
4304962 | Fracassi et al. | Dec 1981 | |
4329545 | Westermayer | May 1982 | |
4341925 | Doland | Jul 1982 | |
4434322 | Ferrell | Feb 1984 | |
4484027 | Lee et al. | Nov 1984 | |
4493046 | Watanabe | Jan 1985 |
Entry |
---|
Carl H. Meyer and Stephen M. Matyas, Generation, Distribution, and Installation of Cryptographic Keys, Chapt. 6, Cryptography: A New Dimension in Computer Data Security, IBM Corp., N.Y., pp. 300, 316, 317, 1978, 1982. |
Number | Date | Country | |
---|---|---|---|
Parent | 881485 | Jul 1986 | |
Parent | 402702 | Jul 1982 |