Data loss prevention, Confidential Computing, TEE, confidential computing enclave, Safe AI Act, confidential AI, Data Security, Data Confidentiality Secrets
Fig. 2 exhibits the next embodiment on the invention. As an alternative for the P2P configuration explained before, the 2nd embodiment or perhaps the centrally brokered program comprises a central server device (also called credential server) that mediates all transactions and communication amongst the involved parties and in addition serves to be