IL257040B - Systems and processes for executing private programs on untrusted computers - Google Patents
Systems and processes for executing private programs on untrusted computersInfo
- Publication number
- IL257040B IL257040B IL257040A IL25704018A IL257040B IL 257040 B IL257040 B IL 257040B IL 257040 A IL257040 A IL 257040A IL 25704018 A IL25704018 A IL 25704018A IL 257040 B IL257040 B IL 257040B
- Authority
- IL
- Israel
- Prior art keywords
- processes
- systems
- private programs
- untrusted computers
- executing private
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/046—Masking or blinding of operations, operands or results of the operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US14/804,713 US10110566B2 (en) | 2015-07-21 | 2015-07-21 | Systems and processes for executing private programs on untrusted computers |
| PCT/US2016/043117 WO2017015357A1 (en) | 2015-07-21 | 2016-07-20 | Systems and processes for executing private programs on untrusted computers |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| IL257040A IL257040A (en) | 2018-03-29 |
| IL257040B true IL257040B (en) | 2020-02-27 |
Family
ID=57834671
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| IL257040A IL257040B (en) | 2015-07-21 | 2018-01-21 | Systems and processes for executing private programs on untrusted computers |
Country Status (10)
| Country | Link |
|---|---|
| US (2) | US10110566B2 (enExample) |
| EP (1) | EP3326345B1 (enExample) |
| JP (1) | JP6880017B2 (enExample) |
| KR (1) | KR102315831B1 (enExample) |
| CN (1) | CN108476198B (enExample) |
| AU (1) | AU2016297559B2 (enExample) |
| CA (1) | CA2998323C (enExample) |
| DK (1) | DK3326345T3 (enExample) |
| IL (1) | IL257040B (enExample) |
| WO (1) | WO2017015357A1 (enExample) |
Families Citing this family (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10348503B2 (en) * | 2016-12-12 | 2019-07-09 | Sap Portals Israel Ltd. | Client side actions validation |
| CN111801670B (zh) * | 2017-12-18 | 2024-12-13 | 中佛罗里达大学研究基金会有限公司 | 操作在公共计算机上加密数据的代码的安全执行技术 |
| US11232224B2 (en) | 2018-03-15 | 2022-01-25 | Servicenow, Inc. | Database encryption |
| CN109446828B (zh) * | 2018-11-07 | 2020-10-13 | 北京邮电大学 | 一种安全多方计算方法及装置 |
| US11042634B2 (en) * | 2018-12-21 | 2021-06-22 | Fujitsu Limited | Determining information leakage of computer-readable programs |
| CN113632082B (zh) * | 2019-01-23 | 2025-11-28 | 皇家飞利浦有限公司 | 机器学习模型验证和认证 |
| WO2020240246A1 (en) * | 2019-05-29 | 2020-12-03 | Commissariat A L 'energie Atomique Et Aux Energies Alternatives | A computer-implemented method for obfuscating a program code |
| US11456855B2 (en) * | 2019-10-17 | 2022-09-27 | Arm Limited | Obfuscating data at-transit |
| US11973743B2 (en) | 2019-12-13 | 2024-04-30 | TripleBlind, Inc. | Systems and methods for providing a systemic error in artificial intelligence algorithms |
| US12149510B1 (en) | 2019-12-13 | 2024-11-19 | Tripleblind Holdings, Inc. | Systems and methods for providing a private multi-modal artificial intelligence platform |
| US11431688B2 (en) | 2019-12-13 | 2022-08-30 | TripleBlind, Inc. | Systems and methods for providing a modified loss function in federated-split learning |
| US11582203B2 (en) | 2019-12-13 | 2023-02-14 | TripleBlind, Inc. | Systems and methods for encrypting data and algorithms |
| US11853793B2 (en) | 2020-10-09 | 2023-12-26 | Samsung Electronics Co., Ltd. | Methods and system for on-device AI model parameter run-time protection |
| EP4050471A1 (en) | 2021-02-26 | 2022-08-31 | Zama SAS | Encrypted scalar multiplication |
| JPWO2023007633A1 (enExample) * | 2021-07-28 | 2023-02-02 | ||
| US12288157B2 (en) | 2022-02-03 | 2025-04-29 | Selfiee Corporation | Systems and methods for quantifying data leakage from a split layer |
| US12086246B2 (en) * | 2022-07-01 | 2024-09-10 | Nxp B.V. | Method for protecting a machine learning model from a side channel attack |
| KR20240087103A (ko) * | 2022-12-12 | 2024-06-19 | 삼성전자주식회사 | 스토리지 장치 및 이를 포함하는 스토리지 시스템 |
Family Cites Families (79)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6067620A (en) * | 1996-07-30 | 2000-05-23 | Holden; James M. | Stand alone security device for computer networks |
| US6477648B1 (en) * | 1997-03-23 | 2002-11-05 | Novell, Inc. | Trusted workstation in a networked client/server computing system |
| US6957341B2 (en) * | 1998-05-14 | 2005-10-18 | Purdue Research Foundation | Method and system for secure computational outsourcing and disguise |
| US7430670B1 (en) | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
| AU2001243365A1 (en) * | 2000-03-02 | 2001-09-12 | Alarity Corporation | System and method for process protection |
| US7895643B2 (en) * | 2002-03-16 | 2011-02-22 | Trustedflow Systems, Inc. | Secure logic interlocking |
| US8220058B2 (en) * | 2003-09-25 | 2012-07-10 | Oracle America, Inc. | Rendering and encryption engine for application program obfuscation |
| US7353499B2 (en) * | 2003-09-25 | 2008-04-01 | Sun Microsystems, Inc. | Multiple instruction dispatch tables for application program obfuscation |
| US7363620B2 (en) * | 2003-09-25 | 2008-04-22 | Sun Microsystems, Inc. | Non-linear execution of application program instructions for application program obfuscation |
| US7415618B2 (en) * | 2003-09-25 | 2008-08-19 | Sun Microsystems, Inc. | Permutation of opcode values for application program obfuscation |
| US20050069138A1 (en) * | 2003-09-25 | 2005-03-31 | Sun Microsystems, Inc., A Delaware Corporation | Application program obfuscation |
| US9525666B2 (en) * | 2005-01-31 | 2016-12-20 | Unisys Corporation | Methods and systems for managing concurrent unsecured and cryptographically secure communications across unsecured networks |
| DE102005021749A1 (de) * | 2005-05-11 | 2006-11-16 | Fachhochschule Dortmund | Verfahren und Vorrichtung zur programmgesteuerten Informationsverarbeitung |
| JP5113169B2 (ja) * | 2006-07-12 | 2013-01-09 | イルデト・コーポレート・ビー・ヴイ | 暗号関数を難読化する方法およびシステム |
| US20090249492A1 (en) * | 2006-09-21 | 2009-10-01 | Hans Martin Boesgaard Sorensen | Fabrication of computer executable program files from source code |
| US9411976B2 (en) * | 2006-12-01 | 2016-08-09 | Maidsafe Foundation | Communication system and method |
| US9124650B2 (en) | 2006-12-13 | 2015-09-01 | Quickplay Media Inc. | Digital rights management in a mobile environment |
| US8538012B2 (en) * | 2007-03-14 | 2013-09-17 | Intel Corporation | Performing AES encryption or decryption in multiple modes with a single instruction |
| US8312518B1 (en) * | 2007-09-27 | 2012-11-13 | Avaya Inc. | Island of trust in a service-oriented environment |
| US8762736B1 (en) * | 2008-04-04 | 2014-06-24 | Massachusetts Institute Of Technology | One-time programs |
| US8209744B2 (en) * | 2008-05-16 | 2012-06-26 | Microsoft Corporation | Mobile device assisted secure computer network communication |
| US8171306B2 (en) * | 2008-11-05 | 2012-05-01 | Microsoft Corporation | Universal secure token for obfuscation and tamper resistance |
| EP2462507B1 (en) * | 2009-08-04 | 2019-07-24 | Carnegie Mellon University | Methods and apparatuses for user-verifiable trusted path in the presence of malware |
| US8347398B1 (en) * | 2009-09-23 | 2013-01-01 | Savvystuff Property Trust | Selected text obfuscation and encryption in a local, network and cloud computing environment |
| US20110202765A1 (en) * | 2010-02-17 | 2011-08-18 | Microsoft Corporation | Securely move virtual machines between host servers |
| US9703586B2 (en) * | 2010-02-17 | 2017-07-11 | Microsoft Technology Licensing, Llc | Distribution control and tracking mechanism of virtual machine appliances |
| US8862895B2 (en) * | 2010-04-27 | 2014-10-14 | Fuji Xerox Co., Ltd. | Systems and methods for communication, storage, retrieval, and computation of simple statistics and logical operations on encrypted data |
| EP2577936A2 (en) * | 2010-05-28 | 2013-04-10 | Lawrence A. Laurich | Accelerator system for use with secure data storage |
| US20110296164A1 (en) * | 2010-05-28 | 2011-12-01 | Mcafee, Inc. | System and method for providing secure network services |
| ES2581548T3 (es) * | 2010-08-18 | 2016-09-06 | Security First Corp. | Sistemas y procedimientos para asegurar entornos informáticos de máquinas virtuales |
| US8681973B2 (en) * | 2010-09-15 | 2014-03-25 | At&T Intellectual Property I, L.P. | Methods, systems, and computer program products for performing homomorphic encryption and decryption on individual operations |
| US8762964B2 (en) | 2010-12-17 | 2014-06-24 | Cisco Technology, Inc. | Optimizing symbol manipulation language-based executable applications for distributed execution |
| US8700906B2 (en) * | 2011-01-14 | 2014-04-15 | Microsoft Corporation | Secure computing in multi-tenant data centers |
| US20120278872A1 (en) | 2011-04-27 | 2012-11-01 | Woelfel John Harold | System and method of federated authentication with reverse proxy |
| US9077525B2 (en) * | 2011-06-24 | 2015-07-07 | Microsoft Technology Licensing, Llc | User-controlled data encryption with obfuscated policy |
| WO2013009290A1 (en) * | 2011-07-11 | 2013-01-17 | Hewlett-Packard Development Company, Lp | Policy based data management |
| US20130019092A1 (en) * | 2011-07-14 | 2013-01-17 | Barracuda Inc. | System to Embed Enhanced Security / Privacy Functions Into a User Client |
| GB2497070B (en) * | 2011-11-17 | 2015-11-25 | Advanced Risc Mach Ltd | Cryptographic support instructions |
| EP2786292B1 (en) * | 2011-11-28 | 2016-06-08 | Porticor Ltd. | Methods and devices for securing keys for a non-secured, distributed environment with applications to virtualization and cloud-computing security and management |
| US9208319B2 (en) * | 2011-12-15 | 2015-12-08 | Microsoft Technology Licensing, Llc | Code base partitioning system |
| WO2013104969A1 (en) * | 2012-01-09 | 2013-07-18 | Koninklijke Philips N.V. | Virtual machine device having key driven obfuscation and method |
| US8615656B2 (en) * | 2012-01-09 | 2013-12-24 | The Mitre Corporation | Secure remote peripheral encryption tunnel |
| US9454666B2 (en) * | 2012-03-26 | 2016-09-27 | Irdeto B.V. | Method for protecting data |
| EP2645618A1 (en) * | 2012-03-30 | 2013-10-02 | British Telecommunications Public Limited Company | Method and system for network data access |
| EP2672672A1 (en) * | 2012-06-07 | 2013-12-11 | Alcatel-Lucent | Secure data processing |
| EP2672673B1 (en) * | 2012-06-07 | 2016-05-25 | Alcatel Lucent | Apparatus and method for secure data processing |
| US8656482B1 (en) * | 2012-08-20 | 2014-02-18 | Bitdefender IPR Management Ltd. | Secure communication using a trusted virtual machine |
| US20140195804A1 (en) * | 2012-10-12 | 2014-07-10 | Safelylocked, Llc | Techniques for secure data exchange |
| US9176838B2 (en) * | 2012-10-19 | 2015-11-03 | Intel Corporation | Encrypted data inspection in a network environment |
| GB2508894A (en) * | 2012-12-14 | 2014-06-18 | Ibm | Preventing a trusted boot device from being booted in a virtual machine |
| US9535715B2 (en) * | 2012-12-14 | 2017-01-03 | Microsoft Technology Licensing, Llc | Booting from a trusted network image |
| US8909967B1 (en) * | 2012-12-31 | 2014-12-09 | Emc Corporation | Technique for secure computation |
| US9503268B2 (en) * | 2013-01-22 | 2016-11-22 | Amazon Technologies, Inc. | Securing results of privileged computing operations |
| US10063380B2 (en) * | 2013-01-22 | 2018-08-28 | Amazon Technologies, Inc. | Secure interface for invoking privileged operations |
| US9055038B1 (en) * | 2013-02-04 | 2015-06-09 | Stealth Software Technologies, Inc. | Apparatus, system, and method to garble programs |
| US9141823B2 (en) * | 2013-03-15 | 2015-09-22 | Veridicom, Sa De Cv | Abstraction layer for default encryption with orthogonal encryption logic session object; and automated authentication, with a method for online litigation |
| US9361456B2 (en) * | 2013-04-01 | 2016-06-07 | Uniquesoft, Llc | Secure computing device using a library of programs |
| US10275593B2 (en) * | 2013-04-01 | 2019-04-30 | Uniquesoft, Llc | Secure computing device using different central processing resources |
| US9104862B2 (en) * | 2013-04-01 | 2015-08-11 | Uniquesoft, Llc | Secure computing device using new software versions |
| US9424421B2 (en) | 2013-05-03 | 2016-08-23 | Visa International Service Association | Security engine for a secure operating environment |
| US9530009B2 (en) * | 2013-06-27 | 2016-12-27 | Visa International Service Association | Secure execution and update of application module code |
| EP3036680B1 (en) * | 2013-08-21 | 2018-07-18 | Intel Corporation | Processing data privately in the cloud |
| CN103559458B (zh) * | 2013-10-09 | 2016-08-17 | 广州华迅网络科技有限公司 | 数据散列获取方法及其系统 |
| US9235692B2 (en) * | 2013-12-13 | 2016-01-12 | International Business Machines Corporation | Secure application debugging |
| AU2015277000C1 (en) * | 2014-06-18 | 2019-11-28 | Visa International Service Association | Efficient methods for authenticated communication |
| CN111756533B (zh) * | 2014-08-29 | 2023-07-04 | 维萨国际服务协会 | 用于安全密码生成的系统、方法和存储介质 |
| US9584517B1 (en) * | 2014-09-03 | 2017-02-28 | Amazon Technologies, Inc. | Transforms within secure execution environments |
| CN104243166A (zh) * | 2014-09-05 | 2014-12-24 | 深圳市中兴移动通信有限公司 | 录音加密方法和装置 |
| US9735968B2 (en) * | 2014-10-20 | 2017-08-15 | Microsoft Technology Licensing, Llc | Trust service for a client device |
| CN107408072B (zh) * | 2014-12-16 | 2021-07-09 | 凯恩迪股份有限公司 | 用于随机化指令的方法、介质和装置 |
| WO2016131056A1 (en) * | 2015-02-13 | 2016-08-18 | Visa International Service Association | Confidential communication management |
| US9596263B1 (en) * | 2015-02-23 | 2017-03-14 | Amazon Technolgies, Inc. | Obfuscation and de-obfuscation of identifiers |
| US10484168B2 (en) * | 2015-03-02 | 2019-11-19 | Dell Products L.P. | Methods and systems for obfuscating data and computations defined in a secure distributed transaction ledger |
| US9712503B1 (en) * | 2015-03-23 | 2017-07-18 | Amazon Technologies, Inc. | Computing instance migration |
| US20160294794A1 (en) * | 2015-04-04 | 2016-10-06 | Aleksandar Mancic | Security System For Data Communications Including Key Management And Privacy |
| CA2982244C (en) * | 2015-04-14 | 2024-01-23 | Gigavation, Inc. | Paravirtualized security threat protection of a computer-driven system with networked devices |
| JP6397590B2 (ja) * | 2015-05-19 | 2018-09-26 | クリプトムーヴ, インコーポレイテッドCryptomove, Inc. | データ隠蔽によるセキュリティ |
| US20180089415A1 (en) * | 2015-06-11 | 2018-03-29 | International Business Machines Corporation | User trusted device for detecting a virtualized environment |
| US9667606B2 (en) * | 2015-07-01 | 2017-05-30 | Cyphermatrix, Inc. | Systems, methods and computer readable medium to implement secured computational infrastructure for cloud and data center environments |
-
2015
- 2015-07-21 US US14/804,713 patent/US10110566B2/en active Active
-
2016
- 2016-07-20 CN CN201680054703.XA patent/CN108476198B/zh active Active
- 2016-07-20 EP EP16828463.6A patent/EP3326345B1/en active Active
- 2016-07-20 CA CA2998323A patent/CA2998323C/en active Active
- 2016-07-20 WO PCT/US2016/043117 patent/WO2017015357A1/en not_active Ceased
- 2016-07-20 JP JP2018523361A patent/JP6880017B2/ja active Active
- 2016-07-20 KR KR1020187005125A patent/KR102315831B1/ko active Active
- 2016-07-20 AU AU2016297559A patent/AU2016297559B2/en active Active
- 2016-07-20 DK DK16828463.6T patent/DK3326345T3/da active
-
2018
- 2018-01-21 IL IL257040A patent/IL257040B/en active IP Right Grant
- 2018-09-28 US US16/146,212 patent/US10652216B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| EP3326345A1 (en) | 2018-05-30 |
| EP3326345B1 (en) | 2021-10-06 |
| EP3326345A4 (en) | 2019-03-27 |
| US10110566B2 (en) | 2018-10-23 |
| KR20180084732A (ko) | 2018-07-25 |
| CN108476198A (zh) | 2018-08-31 |
| US10652216B2 (en) | 2020-05-12 |
| AU2016297559B2 (en) | 2020-09-03 |
| CA2998323A1 (en) | 2017-01-26 |
| JP6880017B2 (ja) | 2021-06-02 |
| US20190044915A1 (en) | 2019-02-07 |
| KR102315831B1 (ko) | 2021-10-22 |
| US20170026342A1 (en) | 2017-01-26 |
| CA2998323C (en) | 2022-06-07 |
| WO2017015357A1 (en) | 2017-01-26 |
| DK3326345T3 (da) | 2021-10-11 |
| JP2018522291A (ja) | 2018-08-09 |
| IL257040A (en) | 2018-03-29 |
| AU2016297559A1 (en) | 2018-03-15 |
| CN108476198B (zh) | 2020-09-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| IL257040B (en) | Systems and processes for executing private programs on untrusted computers | |
| EP3138231B8 (en) | Secure computing systems and methods | |
| PL3563235T3 (pl) | Systemy, sposoby i aparaty do obliczania heterogenicznego | |
| GB201621068D0 (en) | Edge computing system | |
| GB201613109D0 (en) | Computer implemented method and system | |
| SG11201706269QA (en) | Methods and systems for order processing | |
| GB201608179D0 (en) | Systems and methods for computing device protection | |
| SG11201706120YA (en) | Human-computer interaction method and system based on knowledge graph | |
| SG11201607004QA (en) | Substrate processing system and substrate processing method | |
| IL255883B (en) | Verification methods and systems | |
| SI3523723T1 (sl) | Visoko učinkovit računalniški sistem in postopek | |
| SG11201710329TA (en) | Substrate processing system and substrate processing method | |
| SG11201704498QA (en) | Computing systems and methods | |
| EP3276542A4 (en) | Processing system and program | |
| EP3304944A4 (en) | Self-locating computing devices, systems, and methods | |
| EP3252691A4 (en) | System and program | |
| GB2545662B (en) | Fastener system and assembly | |
| GB201612612D0 (en) | Computing system and method of operating the computing system | |
| GB201607402D0 (en) | Systems, devices, and methods for distributed processing | |
| GB201512418D0 (en) | Methods,devices,systems and computer programs products | |
| AU2015902028A0 (en) | Computing systems and methods | |
| GB201617951D0 (en) | Computer implemented method and system | |
| GB201513317D0 (en) | Methods, devices, systems and computer program products | |
| GB201504160D0 (en) | Methods, devices, systems and computer program products | |
| GB201504226D0 (en) | Methods,devices,systems and computer program products |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FF | Patent granted | ||
| KB | Patent renewed |