SE9804421D0 - Method of executing a security critical activity - Google Patents

Method of executing a security critical activity

Info

Publication number
SE9804421D0
SE9804421D0 SE9804421A SE9804421A SE9804421D0 SE 9804421 D0 SE9804421 D0 SE 9804421D0 SE 9804421 A SE9804421 A SE 9804421A SE 9804421 A SE9804421 A SE 9804421A SE 9804421 D0 SE9804421 D0 SE 9804421D0
Authority
SE
Sweden
Prior art keywords
critical activity
security critical
action
security
user
Prior art date
Application number
SE9804421A
Other languages
Swedish (sv)
Other versions
SE9804421L (en
SE520885C2 (en
Original Assignee
Myspace Ab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Myspace Ab filed Critical Myspace Ab
Priority to SE9804421A priority Critical patent/SE520885C2/en
Publication of SE9804421D0 publication Critical patent/SE9804421D0/en
Priority to EP99964913A priority patent/EP1151385A1/en
Priority to JP2000590064A priority patent/JP2002533814A/en
Priority to AU30942/00A priority patent/AU3094200A/en
Priority to PCT/SE1999/002422 priority patent/WO2000038072A1/en
Priority to IL14359599A priority patent/IL143595A0/en
Publication of SE9804421L publication Critical patent/SE9804421L/en
Priority to IL143595A priority patent/IL143595A/en
Publication of SE520885C2 publication Critical patent/SE520885C2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Abstract

The present invention relates to a method for executing a security critical activity in a security device (40), wherein the security critical activity is executed with user involvement. Each security critical activity is divided into a number of situations/actions, belonging either to a proxy letter group or a user involvement group. The processor (42) of the security device (40) starts the execution of an action of a security critical activity, and then checks if this situation/action can be handled by a proxy letter or shall be handled by a user. If the user or the proxy letter grants the situation/action the execution of the action is continued and ended. This is repeated until all actions of the security critical activity have been executed. If neither the user nor the proxy letter grants the situation/action the execution of the security critical activity will be stopped.
SE9804421A 1998-12-18 1998-12-18 Procedure for executing a security-critical activity using a proxy SE520885C2 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
SE9804421A SE520885C2 (en) 1998-12-18 1998-12-18 Procedure for executing a security-critical activity using a proxy
EP99964913A EP1151385A1 (en) 1998-12-18 1999-12-17 Method for executing a security critical activity
JP2000590064A JP2002533814A (en) 1998-12-18 1999-12-17 How to perform security critical functions
AU30942/00A AU3094200A (en) 1998-12-18 1999-12-17 Method for executing a security critical activity
PCT/SE1999/002422 WO2000038072A1 (en) 1998-12-18 1999-12-17 Method for executing a security critical activity
IL14359599A IL143595A0 (en) 1998-12-18 1999-12-17 Method for executing a security critical activity
IL143595A IL143595A (en) 1998-12-18 2001-06-05 Method for executing a security critical activity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
SE9804421A SE520885C2 (en) 1998-12-18 1998-12-18 Procedure for executing a security-critical activity using a proxy

Publications (3)

Publication Number Publication Date
SE9804421D0 true SE9804421D0 (en) 1998-12-18
SE9804421L SE9804421L (en) 2000-06-19
SE520885C2 SE520885C2 (en) 2003-09-09

Family

ID=20413748

Family Applications (1)

Application Number Title Priority Date Filing Date
SE9804421A SE520885C2 (en) 1998-12-18 1998-12-18 Procedure for executing a security-critical activity using a proxy

Country Status (6)

Country Link
EP (1) EP1151385A1 (en)
JP (1) JP2002533814A (en)
AU (1) AU3094200A (en)
IL (2) IL143595A0 (en)
SE (1) SE520885C2 (en)
WO (1) WO2000038072A1 (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07104803B2 (en) * 1984-07-30 1995-11-13 富士通株式会社 File deletion control method
US5272754A (en) * 1991-03-28 1993-12-21 Secure Computing Corporation Secure computer interface
IL103062A (en) * 1992-09-04 1996-08-04 Algorithmic Res Ltd Data processor security system
US5680452A (en) * 1993-10-18 1997-10-21 Tecsec Inc. Distributed cryptographic object method
SE9603962D0 (en) * 1996-10-30 1996-10-30 Christian Wettergren Device and method of communication
JPH10307745A (en) * 1997-05-08 1998-11-17 Fuji Xerox Co Ltd Document processing system

Also Published As

Publication number Publication date
WO2000038072A1 (en) 2000-06-29
JP2002533814A (en) 2002-10-08
SE9804421L (en) 2000-06-19
AU3094200A (en) 2000-07-12
IL143595A0 (en) 2002-04-21
IL143595A (en) 2006-10-05
SE520885C2 (en) 2003-09-09
EP1151385A1 (en) 2001-11-07

Similar Documents

Publication Publication Date Title
WO2000070426A8 (en) System for performing load management
ATE161980T1 (en) SYSTEM FOR OPERATING APPLICATION SOFTWARE IN A SAFETY-CRITICAL ENVIRONMENT
EP0947927A3 (en) A method and computer program product for monitoring performance of a program
GB0003920D0 (en) Computer system
ATE518180T1 (en) METHOD AND SYSTEM FOR SECURE EXECUTION OF UNRELIABLE CONTENT
NZ520422A (en) Information system where information is arranged by members, types and association
EP0855648A3 (en) Data processing with parallel or sequential execution of program instructions
WO2000036507A8 (en) Method for adapting migrating processes to host machines
BR8407106A (en) FUNCTION KEY, PERIPHERAL KEY BLOCK, KEYBOARD, MANIPULATOR AND TACTIL KEY
SE9804421D0 (en) Method of executing a security critical activity
Boehmer-Christiansen BLACK MIST AND ACID RAIN-SCIENCE AS FIG LEAF OF POLICY.
EP0270983A3 (en) Method for the parallel simulation of multiprocessor computer systems
EP0301695A3 (en) Data processing system
JPS52155751A (en) Elevator cage
JPS6421636A (en) Task management unit
KR830006736A (en) Initial Iprogram load method
Kethley Single and multiple machine scheduling to minimize total weighted late work: an empirical comparison of scheduling rules, algorithms and meta-heuristics using Taguchi loss functions
MX8436A (en) PLASTISOLES BASED ON STYRENE AND ACRYLONITRILE COPOLYMERS.
WO1999035568A3 (en) Isolation of resources from application in a process control system
EP0313817A3 (en) Method and apparatus for explicitly evaluating conditions in a data processor
郭大钧 THE NUMBER OF NONTRIVIAL SOLUTIONS TO HAMMERSTEIN NONLINEAR INTEGRAL EQUATIONS
EP0243084A3 (en) Computer system having delayed save on procedure calls
JPS6421541A (en) Queue management control system
BR9709416A (en) Method for preventing HIV transmission in infected cells
Varlaki et al. Identification of Raibman kernels in Zadeh functional series representation of nonlinear systems.

Legal Events

Date Code Title Description
NUG Patent has lapsed