1
Joseph R Everhart, Jeffrey G Osborn: Encryption system key distribution method and apparatus. AT&T Bell Laboratories, David H Tannenbaum, March 25, 1986: US04578531 (101 worldwide citation)

Encryption systems typically rely on the distribution of cipher keys between terminals for scrambling and unscrambling transmitted messages. Elaborate security precautions are necessary to protect the cipher keys since a compromise of the key could result in a compromise of the transmission. There i ...


2
Steven M Hoffberg: System and method for determining contingent relevance. Steven M Hoffberg Esq, Ostrolenk Faber, November 14, 2017: US09818136 (5 worldwide citation)

A system and method providing for communication and resolution of utility functions between participants, wherein the utility function is evaluated based on local information at the recipient to determine a cost value thereof. A user interface having express representation of both information elemen ...


3
Everhart Joseph R, Osborn Jeffrey G: Methode et appareil de distribution de cles pour systemes de chiffrement, Encryption system key distribution method and apparatus. Western Electric Company Incorporated, KIRBY EADES GALE BAKER, December 3, 1985: CA1197588

- 22 - ENCRYPTION SYSTEM KEY DISTRIBUTION METHOD AND APPARATUS Abstract Encryption systems typically rely on thedistribution of cipher keys between terminals forscrambling and unscrambling transmitted messages.Elaborate security precautions are necessary to protect thecipher keys since a compromise ...


4
Everhart Joseph Robert, Osborn Jeffrey George: Encryption system key distribution method and apparatus. Western Electric Company, HIRSCH A E Jr, December 22, 1983: WO/1983/004461

Encryption systems typically rely on the distribution of cipher keys between terminals for scrambling and unscrambling transmitted messages. Elaborate security precautions are necessary to protect the cipher keys since a compromise of the key could result in a compromise of the transmission. There i ...


5