This is a continuation of application Ser. No. 881,485 filed 7-1-86, which is a continuation of application Ser. No. 402,702, filed 7-28-82.
| Number | Name | Date | Kind |
|---|---|---|---|
| 3291808 | Ehrat | Dec 1966 | |
| 3614316 | Andrews et al. | Oct 1971 | |
| 3659046 | Angeleri et al. | Apr 1972 | |
| 3866217 | Bennett, Jr. | Feb 1975 | |
| 4047008 | Perkins | Sep 1977 | |
| 4109856 | Van Beveren et al. | Aug 1978 | |
| 4145508 | Ehrat | Mar 1979 | |
| 4171513 | Otey et al. | Oct 1979 | |
| 4172963 | Belcher et al. | Oct 1979 | |
| 4176246 | Gaetzi | Nov 1979 | |
| 4264781 | Oosterbaan et al. | Aug 1981 | |
| 4304962 | Fracassi et al. | Dec 1981 | |
| 4329545 | Westermayer | May 1982 | |
| 4341925 | Doland | Jul 1982 | |
| 4434322 | Ferrell | Feb 1984 | |
| 4484027 | Lee et al. | Nov 1984 | |
| 4493046 | Watanabe | Jan 1985 |
| Entry |
|---|
| Carl H. Meyer and Stephen M. Matyas, Generation, Distribution, and Installation of Cryptographic Keys, Chapt. 6, Cryptography: A New Dimension in Computer Data Security, IBM Corp., N.Y., pp. 300, 316, 317, 1978, 1982. |
| Number | Date | Country | |
|---|---|---|---|
| Parent | 881485 | Jul 1986 | |
| Parent | 402702 | Jul 1982 |