[go: up one dir, main page]

Puch et al., 2025 - Google Patents

Securing the Additive Manufacturing Process Chain

Puch et al., 2025

Document ID
481629689205490807
Author
Puch N
Dopfer S
Birkel L
Publication year
Publication venue
International Conference on Availability, Reliability and Security

External Links

Snippet

Additive Manufacturing (AM), commonly known as 3D printing, is a manufacturing process that creates parts layer by layer. This innovative technique is increasingly utilized across various applications, ranging from rapid prototyping to the production of safety-critical …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • G06F2221/0757Licence

Similar Documents

Publication Publication Date Title
US12306981B2 (en) System and method for data management and security for digital manufacturing
JP5639660B2 (en) Confirmable trust for data through the wrapper complex
TWI532355B (en) Trustworthy extensible markup language for trustworthy computing and data services
CN100535888C (en) Apparatus and method for supporting content exchange between different drm domains
US20190342077A1 (en) Apparatus and method for using blockchains to establish trust between nodes in industrial control systems or other systems
JP2021505097A (en) Device identification systems and methods for enrollment and registration of connected endpoint devices, as well as blockchain services
JP2021505098A (en) Systems and methods for recording device lifecycle transactions as a versioned block of a blockchain network using transaction connectors and broker services
Wegner et al. A new approach to cyberphysical security in industry 4.0
CN103186723B (en) The method and system of digital content security cooperation
Lohmöller et al. On the need for strong sovereignty in data ecosystems
CN117938509A (en) A method for encrypting and storing data of traditional Chinese medicine production line based on Hyperledger Fabric alliance chain
CN119995825B (en) Medicine information encryption and tamper-proof method based on blockchain and advanced encryption standard
Heiss et al. Trustworthy pre-processing of sensor data in data on-chaining workflows for blockchain-based IoT applications
Lu et al. Secure and real-time traceable data sharing in cloud-assisted IoT
Liang et al. Towards a reliable and accountable cyber supply chain in energy delivery system using blockchain
CN113592509B (en) Data tracing supervision method and system based on supply chain
Zaman et al. Handbook of research on trends and future directions in big data and web intelligence
Puch et al. Securing the Additive Manufacturing Process Chain
Zhao et al. $\mathsf {Trident} $: A Secure Framework for Flexible Artificial Intelligence Model Lifecycle Management in Public Clouds
Ryon et al. Field Loadable Software Confidentiality Protection
Johnson et al. Distributed energy resource cybersecurity standards development
Srivastava et al. Auditing of outsourced data integrity-a taxonomy
Nykänen Managing Production Network Security with OPC UA
CN117834247B (en) A BIM collaborative design method and system based on blockchain
Feng et al. Digital copyright protection system for oil and gas knowledge achievements based on blockchain