SE9804421D0 - Method of executing a security critical activity - Google Patents
Method of executing a security critical activityInfo
- Publication number
- SE9804421D0 SE9804421D0 SE9804421A SE9804421A SE9804421D0 SE 9804421 D0 SE9804421 D0 SE 9804421D0 SE 9804421 A SE9804421 A SE 9804421A SE 9804421 A SE9804421 A SE 9804421A SE 9804421 D0 SE9804421 D0 SE 9804421D0
- Authority
- SE
- Sweden
- Prior art keywords
- critical activity
- security critical
- action
- security
- user
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
Abstract
The present invention relates to a method for executing a security critical activity in a security device (40), wherein the security critical activity is executed with user involvement. Each security critical activity is divided into a number of situations/actions, belonging either to a proxy letter group or a user involvement group. The processor (42) of the security device (40) starts the execution of an action of a security critical activity, and then checks if this situation/action can be handled by a proxy letter or shall be handled by a user. If the user or the proxy letter grants the situation/action the execution of the action is continued and ended. This is repeated until all actions of the security critical activity have been executed. If neither the user nor the proxy letter grants the situation/action the execution of the security critical activity will be stopped.
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE9804421A SE520885C2 (en) | 1998-12-18 | 1998-12-18 | Procedure for executing a security-critical activity using a proxy |
EP99964913A EP1151385A1 (en) | 1998-12-18 | 1999-12-17 | Method for executing a security critical activity |
JP2000590064A JP2002533814A (en) | 1998-12-18 | 1999-12-17 | How to perform security critical functions |
AU30942/00A AU3094200A (en) | 1998-12-18 | 1999-12-17 | Method for executing a security critical activity |
PCT/SE1999/002422 WO2000038072A1 (en) | 1998-12-18 | 1999-12-17 | Method for executing a security critical activity |
IL14359599A IL143595A0 (en) | 1998-12-18 | 1999-12-17 | Method for executing a security critical activity |
IL143595A IL143595A (en) | 1998-12-18 | 2001-06-05 | Method for executing a security critical activity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE9804421A SE520885C2 (en) | 1998-12-18 | 1998-12-18 | Procedure for executing a security-critical activity using a proxy |
Publications (3)
Publication Number | Publication Date |
---|---|
SE9804421D0 true SE9804421D0 (en) | 1998-12-18 |
SE9804421L SE9804421L (en) | 2000-06-19 |
SE520885C2 SE520885C2 (en) | 2003-09-09 |
Family
ID=20413748
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SE9804421A SE520885C2 (en) | 1998-12-18 | 1998-12-18 | Procedure for executing a security-critical activity using a proxy |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1151385A1 (en) |
JP (1) | JP2002533814A (en) |
AU (1) | AU3094200A (en) |
IL (2) | IL143595A0 (en) |
SE (1) | SE520885C2 (en) |
WO (1) | WO2000038072A1 (en) |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07104803B2 (en) * | 1984-07-30 | 1995-11-13 | 富士通株式会社 | File deletion control method |
US5272754A (en) * | 1991-03-28 | 1993-12-21 | Secure Computing Corporation | Secure computer interface |
IL103062A (en) * | 1992-09-04 | 1996-08-04 | Algorithmic Res Ltd | Data processor security system |
US5680452A (en) * | 1993-10-18 | 1997-10-21 | Tecsec Inc. | Distributed cryptographic object method |
SE9603962D0 (en) * | 1996-10-30 | 1996-10-30 | Christian Wettergren | Device and method of communication |
JPH10307745A (en) * | 1997-05-08 | 1998-11-17 | Fuji Xerox Co Ltd | Document processing system |
-
1998
- 1998-12-18 SE SE9804421A patent/SE520885C2/en not_active IP Right Cessation
-
1999
- 1999-12-17 EP EP99964913A patent/EP1151385A1/en not_active Withdrawn
- 1999-12-17 IL IL14359599A patent/IL143595A0/en active IP Right Grant
- 1999-12-17 AU AU30942/00A patent/AU3094200A/en not_active Abandoned
- 1999-12-17 WO PCT/SE1999/002422 patent/WO2000038072A1/en active Application Filing
- 1999-12-17 JP JP2000590064A patent/JP2002533814A/en active Pending
-
2001
- 2001-06-05 IL IL143595A patent/IL143595A/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
WO2000038072A1 (en) | 2000-06-29 |
JP2002533814A (en) | 2002-10-08 |
SE9804421L (en) | 2000-06-19 |
AU3094200A (en) | 2000-07-12 |
IL143595A0 (en) | 2002-04-21 |
IL143595A (en) | 2006-10-05 |
SE520885C2 (en) | 2003-09-09 |
EP1151385A1 (en) | 2001-11-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2000070426A8 (en) | System for performing load management | |
ATE161980T1 (en) | SYSTEM FOR OPERATING APPLICATION SOFTWARE IN A SAFETY-CRITICAL ENVIRONMENT | |
EP0947927A3 (en) | A method and computer program product for monitoring performance of a program | |
GB0003920D0 (en) | Computer system | |
ATE518180T1 (en) | METHOD AND SYSTEM FOR SECURE EXECUTION OF UNRELIABLE CONTENT | |
NZ520422A (en) | Information system where information is arranged by members, types and association | |
EP0855648A3 (en) | Data processing with parallel or sequential execution of program instructions | |
WO2000036507A8 (en) | Method for adapting migrating processes to host machines | |
BR8407106A (en) | FUNCTION KEY, PERIPHERAL KEY BLOCK, KEYBOARD, MANIPULATOR AND TACTIL KEY | |
SE9804421D0 (en) | Method of executing a security critical activity | |
Boehmer-Christiansen | BLACK MIST AND ACID RAIN-SCIENCE AS FIG LEAF OF POLICY. | |
EP0270983A3 (en) | Method for the parallel simulation of multiprocessor computer systems | |
EP0301695A3 (en) | Data processing system | |
JPS52155751A (en) | Elevator cage | |
JPS6421636A (en) | Task management unit | |
KR830006736A (en) | Initial Iprogram load method | |
Kethley | Single and multiple machine scheduling to minimize total weighted late work: an empirical comparison of scheduling rules, algorithms and meta-heuristics using Taguchi loss functions | |
MX8436A (en) | PLASTISOLES BASED ON STYRENE AND ACRYLONITRILE COPOLYMERS. | |
WO1999035568A3 (en) | Isolation of resources from application in a process control system | |
EP0313817A3 (en) | Method and apparatus for explicitly evaluating conditions in a data processor | |
郭大钧 | THE NUMBER OF NONTRIVIAL SOLUTIONS TO HAMMERSTEIN NONLINEAR INTEGRAL EQUATIONS | |
EP0243084A3 (en) | Computer system having delayed save on procedure calls | |
JPS6421541A (en) | Queue management control system | |
BR9709416A (en) | Method for preventing HIV transmission in infected cells | |
Varlaki et al. | Identification of Raibman kernels in Zadeh functional series representation of nonlinear systems. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NUG | Patent has lapsed |