Puch et al., 2025 - Google Patents
Securing the Additive Manufacturing Process ChainPuch et al., 2025
- Document ID
- 481629689205490807
- Author
- Puch N
- Dopfer S
- Birkel L
- Publication year
- Publication venue
- International Conference on Availability, Reliability and Security
External Links
Snippet
Additive Manufacturing (AM), commonly known as 3D printing, is a manufacturing process that creates parts layer by layer. This innovative technique is increasingly utilized across various applications, ranging from rapid prototyping to the production of safety-critical …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0757—Licence
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12306981B2 (en) | System and method for data management and security for digital manufacturing | |
| JP5639660B2 (en) | Confirmable trust for data through the wrapper complex | |
| TWI532355B (en) | Trustworthy extensible markup language for trustworthy computing and data services | |
| CN100535888C (en) | Apparatus and method for supporting content exchange between different drm domains | |
| US20190342077A1 (en) | Apparatus and method for using blockchains to establish trust between nodes in industrial control systems or other systems | |
| JP2021505097A (en) | Device identification systems and methods for enrollment and registration of connected endpoint devices, as well as blockchain services | |
| JP2021505098A (en) | Systems and methods for recording device lifecycle transactions as a versioned block of a blockchain network using transaction connectors and broker services | |
| Wegner et al. | A new approach to cyberphysical security in industry 4.0 | |
| CN103186723B (en) | The method and system of digital content security cooperation | |
| Lohmöller et al. | On the need for strong sovereignty in data ecosystems | |
| CN117938509A (en) | A method for encrypting and storing data of traditional Chinese medicine production line based on Hyperledger Fabric alliance chain | |
| CN119995825B (en) | Medicine information encryption and tamper-proof method based on blockchain and advanced encryption standard | |
| Heiss et al. | Trustworthy pre-processing of sensor data in data on-chaining workflows for blockchain-based IoT applications | |
| Lu et al. | Secure and real-time traceable data sharing in cloud-assisted IoT | |
| Liang et al. | Towards a reliable and accountable cyber supply chain in energy delivery system using blockchain | |
| CN113592509B (en) | Data tracing supervision method and system based on supply chain | |
| Zaman et al. | Handbook of research on trends and future directions in big data and web intelligence | |
| Puch et al. | Securing the Additive Manufacturing Process Chain | |
| Zhao et al. | $\mathsf {Trident} $: A Secure Framework for Flexible Artificial Intelligence Model Lifecycle Management in Public Clouds | |
| Ryon et al. | Field Loadable Software Confidentiality Protection | |
| Johnson et al. | Distributed energy resource cybersecurity standards development | |
| Srivastava et al. | Auditing of outsourced data integrity-a taxonomy | |
| Nykänen | Managing Production Network Security with OPC UA | |
| CN117834247B (en) | A BIM collaborative design method and system based on blockchain | |
| Feng et al. | Digital copyright protection system for oil and gas knowledge achievements based on blockchain |