Abstract: A financial transaction network employs a shareholder network serviced by a host processor. The financial network maintains (n) number of mutual fund portfolios operating in different currencies. The host processor acts a communications switch validating incoming transaction requests and routing them to a central Transfer Agent system for execution. The host processor maintains central records that can be queried through the host. The Transfer Agent is responsible for updating the database. The financial network provides accessibility, speed and finality of settlement in transactions by using mutual fund shares in diverse currencies as substitutes for those currencies.
Abstract: A cap for a wide-mouth container has a short inner skirt and a longer outer skirt. The outer skirt has upper and lower internal locking beads which are preferably interrupted with gaps between bead sections. Above the lower locking bead is a circumferential score line. A portion of the outer skirt below the score line is cut away in a horizontal and then an arcuate slit to form a pull tab extending parallel to the score line. The pull tab is joined to the outer skirt by a frangible link. Various locations of said link are disclosed. The container neck is thin walled, having an internal top flange terminating in a first sealing surface which bears against the top of the inner skirt, a groove below the last-mentioned surface and a second sealing surface below the groove which also bears against the inner skirt. The neck also has upper and lower external beads each having shoulders on their lower edges under which the upper and lower internal locking beads of the cap seat.
Abstract: A tamper-resistant plastic cap and container neck are disclosed, the cap having a skirt with upper and lower internal beads separated by a circumferential first score line connected to a second score line extending to the lower edge of the skirt. The neck has external beads matching the skirt beads to hold the cap on the neck. By pulling upward on a tab depending from said lower edge adjacent said second score line, the lower part of the skirt may be torn away along the second and then the first score line. This leaves a reclosure cap held on the neck by the upper bead means. A thin flange projecting from the periphery of the cap is used to remove the cap in its reclosure mode. However, this flange is shaped with its underside slanting down-inward to merge with the exterior of the skirt. If one attempts to use the flange to pry off the cap in its original sealing mode, sufficient force cannot be applied. Various cap bead shapes are disclosed.
Abstract: To prevent tampering with the contents of containers, the neck of the container is formed with external beads with grooves under the lower surfaces of the beads. The cap has an outer skirt formed with internal beads which lock under the shoulders of the neck beads. Preferably, the cap has an inner skirt which seals against the inside of the container neck. To remove the cap, a score-line is formed extending upward from the bottom edge of the skirt and merging with a horizontal scoreline located between the two internal beads, so that one may grip a tab on the lower edge of the skirt, pull upward on the substantially vertically section and thence horizontally around the horizontal scoreline. Unless the skirt is thus torn, it cannot be removed from the neck and tearing of the skirt indicates tampering with the contents of the container.
Abstract: A method, using a public-key cryptosystem, for enabling a predetermined entity to monitor communications of users .?.suspected of unlawful activities while protecting the privacy of law-abiding users.!., wherein each user is assigned a pair of matching secret and public keys. According to the method, each user's secret key is broken into shares. Then, each user provides a plurality of "trustees" pieces of information. The pieces of information provided to each trustee enable that trustee to verify that such information includes a "share" of a secret key of some given public key. Each trustee can verify that the pieces of information provided include a share of the secret key without interaction with any other trustee or by sending messages to the user. Upon a predetermined request or condition, e.g., a court order authorizing the entity to monitor the communications of a user .?.suspected of unlawful activity.!., the trustees reveal to the entity the shares of the secret key of such user.