DK3326345T3 - Systemer og fremgangsmåder til at eksekvere private programmer på ikke sikre computere - Google Patents
Systemer og fremgangsmåder til at eksekvere private programmer på ikke sikre computere Download PDFInfo
- Publication number
- DK3326345T3 DK3326345T3 DK16828463.6T DK16828463T DK3326345T3 DK 3326345 T3 DK3326345 T3 DK 3326345T3 DK 16828463 T DK16828463 T DK 16828463T DK 3326345 T3 DK3326345 T3 DK 3326345T3
- Authority
- DK
- Denmark
- Prior art keywords
- unsecure
- computers
- systems
- methods
- private programs
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/046—Masking or blinding of operations, operands or results of the operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/804,713 US10110566B2 (en) | 2015-07-21 | 2015-07-21 | Systems and processes for executing private programs on untrusted computers |
PCT/US2016/043117 WO2017015357A1 (en) | 2015-07-21 | 2016-07-20 | Systems and processes for executing private programs on untrusted computers |
Publications (1)
Publication Number | Publication Date |
---|---|
DK3326345T3 true DK3326345T3 (da) | 2021-10-11 |
Family
ID=57834671
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DK16828463.6T DK3326345T3 (da) | 2015-07-21 | 2016-07-20 | Systemer og fremgangsmåder til at eksekvere private programmer på ikke sikre computere |
Country Status (10)
Country | Link |
---|---|
US (2) | US10110566B2 (da) |
EP (1) | EP3326345B1 (da) |
JP (1) | JP6880017B2 (da) |
KR (1) | KR102315831B1 (da) |
CN (1) | CN108476198B (da) |
AU (1) | AU2016297559B2 (da) |
CA (1) | CA2998323C (da) |
DK (1) | DK3326345T3 (da) |
IL (1) | IL257040B (da) |
WO (1) | WO2017015357A1 (da) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10348503B2 (en) * | 2016-12-12 | 2019-07-09 | Sap Portals Israel Ltd. | Client side actions validation |
US11461435B2 (en) * | 2017-12-18 | 2022-10-04 | University Of Central Florida Research Foundation, Inc. | Techniques for securely executing code that operates on encrypted data on a public computer |
US11232224B2 (en) | 2018-03-15 | 2022-01-25 | Servicenow, Inc. | Database encryption |
CN109446828B (zh) * | 2018-11-07 | 2020-10-13 | 北京邮电大学 | 一种安全多方计算方法及装置 |
US11042634B2 (en) * | 2018-12-21 | 2021-06-22 | Fujitsu Limited | Determining information leakage of computer-readable programs |
WO2020240246A1 (en) * | 2019-05-29 | 2020-12-03 | Commissariat A L 'energie Atomique Et Aux Energies Alternatives | A computer-implemented method for obfuscating a program code |
US11431688B2 (en) | 2019-12-13 | 2022-08-30 | TripleBlind, Inc. | Systems and methods for providing a modified loss function in federated-split learning |
US11973743B2 (en) | 2019-12-13 | 2024-04-30 | TripleBlind, Inc. | Systems and methods for providing a systemic error in artificial intelligence algorithms |
US12026219B2 (en) | 2019-12-13 | 2024-07-02 | TripleBlind, Inc. | Systems and methods for efficient computations on split data and split algorithms |
US11853793B2 (en) | 2020-10-09 | 2023-12-26 | Samsung Electronics Co., Ltd. | Methods and system for on-device AI model parameter run-time protection |
EP4050471A1 (en) * | 2021-02-26 | 2022-08-31 | Zama SAS | Encrypted scalar multiplication |
WO2023007633A1 (ja) * | 2021-07-28 | 2023-02-02 | 富士通株式会社 | 制御方法、制御プログラム、ノード、およびシステム |
US12086246B2 (en) * | 2022-07-01 | 2024-09-10 | Nxp B.V. | Method for protecting a machine learning model from a side channel attack |
KR20240087103A (ko) * | 2022-12-12 | 2024-06-19 | 삼성전자주식회사 | 스토리지 장치 및 이를 포함하는 스토리지 시스템 |
Family Cites Families (79)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6067620A (en) * | 1996-07-30 | 2000-05-23 | Holden; James M. | Stand alone security device for computer networks |
US6477648B1 (en) * | 1997-03-23 | 2002-11-05 | Novell, Inc. | Trusted workstation in a networked client/server computing system |
US6957341B2 (en) * | 1998-05-14 | 2005-10-18 | Purdue Research Foundation | Method and system for secure computational outsourcing and disguise |
US7430670B1 (en) | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
AU2001243365A1 (en) * | 2000-03-02 | 2001-09-12 | Alarity Corporation | System and method for process protection |
US7305704B2 (en) * | 2002-03-16 | 2007-12-04 | Trustedflow Systems, Inc. | Management of trusted flow system |
US8220058B2 (en) * | 2003-09-25 | 2012-07-10 | Oracle America, Inc. | Rendering and encryption engine for application program obfuscation |
US20050069138A1 (en) * | 2003-09-25 | 2005-03-31 | Sun Microsystems, Inc., A Delaware Corporation | Application program obfuscation |
US7353499B2 (en) * | 2003-09-25 | 2008-04-01 | Sun Microsystems, Inc. | Multiple instruction dispatch tables for application program obfuscation |
US7363620B2 (en) * | 2003-09-25 | 2008-04-22 | Sun Microsystems, Inc. | Non-linear execution of application program instructions for application program obfuscation |
US7415618B2 (en) * | 2003-09-25 | 2008-08-19 | Sun Microsystems, Inc. | Permutation of opcode values for application program obfuscation |
US9525666B2 (en) * | 2005-01-31 | 2016-12-20 | Unisys Corporation | Methods and systems for managing concurrent unsecured and cryptographically secure communications across unsecured networks |
DE102005021749A1 (de) * | 2005-05-11 | 2006-11-16 | Fachhochschule Dortmund | Verfahren und Vorrichtung zur programmgesteuerten Informationsverarbeitung |
US8700915B2 (en) * | 2006-07-12 | 2014-04-15 | Irdeto Corporate B.V. | Method and system for verifying authenticity of at least part of an execution environment for executing a computer module |
US20090249492A1 (en) * | 2006-09-21 | 2009-10-01 | Hans Martin Boesgaard Sorensen | Fabrication of computer executable program files from source code |
US9411976B2 (en) * | 2006-12-01 | 2016-08-09 | Maidsafe Foundation | Communication system and method |
US9124650B2 (en) | 2006-12-13 | 2015-09-01 | Quickplay Media Inc. | Digital rights management in a mobile environment |
US8538012B2 (en) * | 2007-03-14 | 2013-09-17 | Intel Corporation | Performing AES encryption or decryption in multiple modes with a single instruction |
US8312518B1 (en) * | 2007-09-27 | 2012-11-13 | Avaya Inc. | Island of trust in a service-oriented environment |
US8762736B1 (en) * | 2008-04-04 | 2014-06-24 | Massachusetts Institute Of Technology | One-time programs |
US8209744B2 (en) * | 2008-05-16 | 2012-06-26 | Microsoft Corporation | Mobile device assisted secure computer network communication |
US8171306B2 (en) * | 2008-11-05 | 2012-05-01 | Microsoft Corporation | Universal secure token for obfuscation and tamper resistance |
EP2462507B1 (en) * | 2009-08-04 | 2019-07-24 | Carnegie Mellon University | Methods and apparatuses for user-verifiable trusted path in the presence of malware |
US8347398B1 (en) * | 2009-09-23 | 2013-01-01 | Savvystuff Property Trust | Selected text obfuscation and encryption in a local, network and cloud computing environment |
US9703586B2 (en) * | 2010-02-17 | 2017-07-11 | Microsoft Technology Licensing, Llc | Distribution control and tracking mechanism of virtual machine appliances |
US20110202765A1 (en) * | 2010-02-17 | 2011-08-18 | Microsoft Corporation | Securely move virtual machines between host servers |
US8862895B2 (en) * | 2010-04-27 | 2014-10-14 | Fuji Xerox Co., Ltd. | Systems and methods for communication, storage, retrieval, and computation of simple statistics and logical operations on encrypted data |
WO2011150346A2 (en) * | 2010-05-28 | 2011-12-01 | Laurich Lawrence A | Accelerator system for use with secure data storage |
US20110296164A1 (en) * | 2010-05-28 | 2011-12-01 | Mcafee, Inc. | System and method for providing secure network services |
WO2012024508A2 (en) * | 2010-08-18 | 2012-02-23 | Matthew Staker | Systems and methods for securing virtual machine computing environments |
US8681973B2 (en) * | 2010-09-15 | 2014-03-25 | At&T Intellectual Property I, L.P. | Methods, systems, and computer program products for performing homomorphic encryption and decryption on individual operations |
US8762964B2 (en) | 2010-12-17 | 2014-06-24 | Cisco Technology, Inc. | Optimizing symbol manipulation language-based executable applications for distributed execution |
US8700906B2 (en) * | 2011-01-14 | 2014-04-15 | Microsoft Corporation | Secure computing in multi-tenant data centers |
CA2775427A1 (en) | 2011-04-27 | 2012-10-27 | Perspecsys Inc. | System and method of data interception and conversion in a proxy |
US9077525B2 (en) * | 2011-06-24 | 2015-07-07 | Microsoft Technology Licensing, Llc | User-controlled data encryption with obfuscated policy |
WO2013009290A1 (en) * | 2011-07-11 | 2013-01-17 | Hewlett-Packard Development Company, Lp | Policy based data management |
US20130019092A1 (en) * | 2011-07-14 | 2013-01-17 | Barracuda Inc. | System to Embed Enhanced Security / Privacy Functions Into a User Client |
GB2497070B (en) * | 2011-11-17 | 2015-11-25 | Advanced Risc Mach Ltd | Cryptographic support instructions |
WO2013080204A1 (en) * | 2011-11-28 | 2013-06-06 | Porticor Ltd. | Methods and devices for securing keys for a non-secured, distributed environment with applications to virtualization and cloud-computing security and management |
US9208319B2 (en) * | 2011-12-15 | 2015-12-08 | Microsoft Technology Licensing, Llc | Code base partitioning system |
EP2803009B1 (en) * | 2012-01-09 | 2019-11-20 | Koninklijke Philips N.V. | Virtual machine device having key driven obfuscation and method |
US8615656B2 (en) * | 2012-01-09 | 2013-12-24 | The Mitre Corporation | Secure remote peripheral encryption tunnel |
US9454666B2 (en) * | 2012-03-26 | 2016-09-27 | Irdeto B.V. | Method for protecting data |
EP2645618A1 (en) * | 2012-03-30 | 2013-10-02 | British Telecommunications Public Limited Company | Method and system for network data access |
EP2672672A1 (en) * | 2012-06-07 | 2013-12-11 | Alcatel-Lucent | Secure data processing |
EP2672673B1 (en) * | 2012-06-07 | 2016-05-25 | Alcatel Lucent | Apparatus and method for secure data processing |
US8656482B1 (en) * | 2012-08-20 | 2014-02-18 | Bitdefender IPR Management Ltd. | Secure communication using a trusted virtual machine |
US20140195804A1 (en) * | 2012-10-12 | 2014-07-10 | Safelylocked, Llc | Techniques for secure data exchange |
US9176838B2 (en) * | 2012-10-19 | 2015-11-03 | Intel Corporation | Encrypted data inspection in a network environment |
US9535715B2 (en) * | 2012-12-14 | 2017-01-03 | Microsoft Technology Licensing, Llc | Booting from a trusted network image |
GB2508894A (en) * | 2012-12-14 | 2014-06-18 | Ibm | Preventing a trusted boot device from being booted in a virtual machine |
US8909967B1 (en) * | 2012-12-31 | 2014-12-09 | Emc Corporation | Technique for secure computation |
US10063380B2 (en) * | 2013-01-22 | 2018-08-28 | Amazon Technologies, Inc. | Secure interface for invoking privileged operations |
US9503268B2 (en) * | 2013-01-22 | 2016-11-22 | Amazon Technologies, Inc. | Securing results of privileged computing operations |
US9055038B1 (en) * | 2013-02-04 | 2015-06-09 | Stealth Software Technologies, Inc. | Apparatus, system, and method to garble programs |
US9141823B2 (en) * | 2013-03-15 | 2015-09-22 | Veridicom, Sa De Cv | Abstraction layer for default encryption with orthogonal encryption logic session object; and automated authentication, with a method for online litigation |
US9104862B2 (en) * | 2013-04-01 | 2015-08-11 | Uniquesoft, Llc | Secure computing device using new software versions |
US9361456B2 (en) * | 2013-04-01 | 2016-06-07 | Uniquesoft, Llc | Secure computing device using a library of programs |
US10275593B2 (en) * | 2013-04-01 | 2019-04-30 | Uniquesoft, Llc | Secure computing device using different central processing resources |
US9424421B2 (en) | 2013-05-03 | 2016-08-23 | Visa International Service Association | Security engine for a secure operating environment |
US9558358B2 (en) * | 2013-06-27 | 2017-01-31 | Visa International Service Association | Random number generator in a virtualized environment |
WO2015026336A1 (en) * | 2013-08-21 | 2015-02-26 | Intel Corporation | Processing data privately in the cloud |
CN103559458B (zh) * | 2013-10-09 | 2016-08-17 | 广州华迅网络科技有限公司 | 数据散列获取方法及其系统 |
US9235692B2 (en) * | 2013-12-13 | 2016-01-12 | International Business Machines Corporation | Secure application debugging |
AU2015277000C1 (en) * | 2014-06-18 | 2019-11-28 | Visa International Service Association | Efficient methods for authenticated communication |
CN106797311B (zh) * | 2014-08-29 | 2020-07-14 | 维萨国际服务协会 | 用于安全密码生成的系统、方法和存储介质 |
US9584517B1 (en) * | 2014-09-03 | 2017-02-28 | Amazon Technologies, Inc. | Transforms within secure execution environments |
CN104243166A (zh) * | 2014-09-05 | 2014-12-24 | 深圳市中兴移动通信有限公司 | 录音加密方法和装置 |
US9735968B2 (en) * | 2014-10-20 | 2017-08-15 | Microsoft Technology Licensing, Llc | Trust service for a client device |
KR102490331B1 (ko) * | 2014-12-16 | 2023-01-18 | 킨디 인코포레이티드 | 컴퓨터 인스트럭션 세트, 메모리 레지스터 및 포인터를 랜덤화하기 위한 방법 및 장치 |
WO2016131056A1 (en) * | 2015-02-13 | 2016-08-18 | Visa International Service Association | Confidential communication management |
US9596263B1 (en) * | 2015-02-23 | 2017-03-14 | Amazon Technolgies, Inc. | Obfuscation and de-obfuscation of identifiers |
US10484168B2 (en) * | 2015-03-02 | 2019-11-19 | Dell Products L.P. | Methods and systems for obfuscating data and computations defined in a secure distributed transaction ledger |
US9712503B1 (en) * | 2015-03-23 | 2017-07-18 | Amazon Technologies, Inc. | Computing instance migration |
WO2016164275A1 (en) * | 2015-04-04 | 2016-10-13 | Eric Greenberg | Security system for data communications including key management and privacy |
CA2982244C (en) * | 2015-04-14 | 2024-01-23 | Gigavation, Inc. | Paravirtualized security threat protection of a computer-driven system with networked devices |
SG11201804478VA (en) * | 2015-05-19 | 2018-06-28 | Cryptomove Inc | Security via data concealment |
US20180089415A1 (en) * | 2015-06-11 | 2018-03-29 | International Business Machines Corporation | User trusted device for detecting a virtualized environment |
US9667606B2 (en) * | 2015-07-01 | 2017-05-30 | Cyphermatrix, Inc. | Systems, methods and computer readable medium to implement secured computational infrastructure for cloud and data center environments |
-
2015
- 2015-07-21 US US14/804,713 patent/US10110566B2/en active Active
-
2016
- 2016-07-20 WO PCT/US2016/043117 patent/WO2017015357A1/en active Application Filing
- 2016-07-20 EP EP16828463.6A patent/EP3326345B1/en active Active
- 2016-07-20 KR KR1020187005125A patent/KR102315831B1/ko active IP Right Grant
- 2016-07-20 CN CN201680054703.XA patent/CN108476198B/zh active Active
- 2016-07-20 AU AU2016297559A patent/AU2016297559B2/en active Active
- 2016-07-20 CA CA2998323A patent/CA2998323C/en active Active
- 2016-07-20 JP JP2018523361A patent/JP6880017B2/ja active Active
- 2016-07-20 DK DK16828463.6T patent/DK3326345T3/da active
-
2018
- 2018-01-21 IL IL257040A patent/IL257040B/en active IP Right Grant
- 2018-09-28 US US16/146,212 patent/US10652216B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US10652216B2 (en) | 2020-05-12 |
KR102315831B1 (ko) | 2021-10-22 |
IL257040A (en) | 2018-03-29 |
US20170026342A1 (en) | 2017-01-26 |
JP6880017B2 (ja) | 2021-06-02 |
US20190044915A1 (en) | 2019-02-07 |
CA2998323C (en) | 2022-06-07 |
AU2016297559A1 (en) | 2018-03-15 |
CN108476198B (zh) | 2020-09-22 |
KR20180084732A (ko) | 2018-07-25 |
EP3326345A4 (en) | 2019-03-27 |
EP3326345A1 (en) | 2018-05-30 |
AU2016297559B2 (en) | 2020-09-03 |
IL257040B (en) | 2020-02-27 |
CA2998323A1 (en) | 2017-01-26 |
EP3326345B1 (en) | 2021-10-06 |
US10110566B2 (en) | 2018-10-23 |
JP2018522291A (ja) | 2018-08-09 |
CN108476198A (zh) | 2018-08-31 |
WO2017015357A1 (en) | 2017-01-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DK3326345T3 (da) | Systemer og fremgangsmåder til at eksekvere private programmer på ikke sikre computere | |
KR20180084980A (ko) | 진단 장치, 컴퓨터 프로그램, 및 진단 시스템 | |
DK4238496T3 (da) | Systemer og fremgangsmåder til transkutan analytsensor | |
DK3270944T3 (da) | Optimerede leverspecifikke ekspressionssystemer til FVIII og FIX | |
DK3265947T3 (da) | Fremgangsmåde og system til kryptering | |
DK3234152T3 (da) | Svampegenommodificeringssystemer og anvendelsesfremgangsmåder | |
DK3241418T3 (da) | Varmebortledningssystemer og -fremgangsmåder til datacenter | |
DK3252650T3 (da) | Anonymiseringsbehandlingsindretning, anonymiseringsbehandlingsfremgangsmåde og program | |
DK3129912T3 (da) | Fremgangsmåde og system til sikring af data | |
DK3028042T3 (da) | Automatiserede anordninger, systemer og fremgangsmåder til fremstilling af væv | |
FI20145671A (fi) | Kannettava laite aktiviteetin seuraamiseksi ja siihen liittyvä menetelmä | |
DK3359773T3 (da) | Datasystemer, anordninger og fremgangsmåder | |
BR112016028195A2 (pt) | sistemas e métodos de distribuição concorrente de múltiplos toques | |
SG11201607650QA (en) | Systems and methods for detecting copied computer code using fingerprints | |
DK3318001T3 (da) | Fremgangsmåder og indretninger til håndtering af hash-tree-baserede datasignaturer | |
DK3231131T3 (da) | System og fremgangsmåde til at erstatte fælles identificerende data | |
DK3227715T3 (da) | Fremgangsmåder og systemer til positionssporing | |
BR112017008674A2 (pt) | método de processamento de solicitação de gravação, processador, e computador | |
KR20180084908A (ko) | 콘텐츠 관리 시스템, 및 콘텐츠 관리방법 | |
DK3093809T3 (da) | Systemer og fremgangsmåder til tilstandsmaskinforvaltning | |
DK3191997T3 (da) | Systemer og fremgangsmåder til hybridhardware-autentificering | |
JP2018045457A5 (ja) | コンピュータシステム及びプログラム | |
EP3286649A4 (en) | System and method for securing a computer system against malicious actions by utilizing virtualized elements | |
GB201415938D0 (en) | Distributed Identity Validation Method System And Computer Program | |
EP3461123A4 (en) | PROGRAM, COMPUTER DEVICE, PROGRAM EXECUTION METHOD, AND COMPUTER SYSTEM |