METHODS AND SYSTEMS FOR SECURE AND RELIABLE IDENTITY-BASED COMPUTING
First Claim
1. A method for establishing a highly reliable, persistent, identity-based computing environment employing a computing arrangement comprising at least in part one or more computing systems, the method comprising:
- establishing standardized and interoperable specifications for generating, using, and/or authenticating reliable resource identities;
generating at least one reliable resource identity for a specific resource in compliance with the specifications;
securely associating the at least one reliable resource identity with the specified resource; and
performing at least one computing action involving the specified resource, wherein the identity of the specified resource is assured to one or more parties involved in the computing action as reliable based at least in part on the at least one reliable resource identity.
1 Assignment
0 Petitions
Accused Products
Abstract
The embodiments herein provide a secure computing resource set identification, evaluation, and management arrangement, employing in various embodiments some or all of the following highly reliable identity related means to establish, register, publish and securely employ user computing arrangement resources in satisfaction of user set target contextual purposes. Systems and methods may include, as applicable, software and hardware implementations for Identity Firewalls; Awareness Managers; Contextual Purpose Firewall Frameworks for situationally germane resource usage related security, provisioning, isolation, constraining, and operational management; liveness biometric, and assiduous environmental, evaluation and authentication techniques; Repute systems and methods assertion and fact ecosphere; standardized and interoperable contextual purpose related expression systems and methods; purpose related computing arrangement resource and related information management systems and methods, including situational contextual identity management systems and methods; and/or the like.
456 Citations
15 Claims
-
1. A method for establishing a highly reliable, persistent, identity-based computing environment employing a computing arrangement comprising at least in part one or more computing systems, the method comprising:
-
establishing standardized and interoperable specifications for generating, using, and/or authenticating reliable resource identities; generating at least one reliable resource identity for a specific resource in compliance with the specifications; securely associating the at least one reliable resource identity with the specified resource; and performing at least one computing action involving the specified resource, wherein the identity of the specified resource is assured to one or more parties involved in the computing action as reliable based at least in part on the at least one reliable resource identity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A hardened identity security device for secure and highly reliable, persistent resource identification, the appliance comprising:
-
secure hardened packaging enclosure arrangement; at least one secure communication arrangement for communicating with a remote administrative and/or cloud service identity arrangement; at least one of sensor, and unpredictable emitter emission, instruction control arrangement; a secure clock arrangement for at least time stamping sensor and emitter related information; at least one memory arrangement storing at least a portion of sensor and/or emitter related information; and at least one logic control arrangement. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A Contextual Purpose Firewall Framework (CPFF) arrangement comprising:
-
a secure packaging hardware arrangement; a securely provided specification set for enabling a contextual purpose computing session resource set; a secure processing arrangement within the secure packaging hardware arrangement for processing the securely provided specification set; instruction information for initiating a secure contextual purpose computing session responsive to the securely provided specification set that at least one of; isolates at least a portion of one or more of the enabled resources from non-contextual computing session one or more resources, and constrains the resource set enabled for such computing session responsive to such securely provided specification set.
-
Specification