×

Methods and systems for secure and reliable identity-based computing

  • US 9,971,894 B2
  • Filed: 06/20/2017
  • Issued: 05/15/2018
  • Est. Priority Date: 03/15/2013
  • Status: Active Grant
First Claim
Patent Images

1. A system for establishing trustworthy, isolated, purposeful computing sessions based, at least in part, upon resource, and resource at least one of stakeholder human and stakeholder human agent, identity information sets, such system comprising:

  • one or more computing arrangements, including at least one processor, for use in providing at least one of one or more standardized (a) resources, and (b) specifications, that enable trustworthy, isolated, purposeful computing sessions, each comprising (a) an operating arrangement including at least one of a secure virtual machine, and a secure, other isolated sandbox, and (b) one or more resource arrangements that operate on such operating arrangement, and wherein each of such trustworthy, isolated, purposeful computing sessions operates at least in part in accordance with one or more user purpose fulfillment specifications,wherein such one or more computing arrangements are employed to provide such at least one of one or more standardized (a) resources, and (b) specifications, that, at least in part, enable specifying standardized, interoperably interpretable resource identity information one or more sets for each resource instance, such information one or more sets each comprising at least in part;

    (i) an identifier for such resource instance, and (ii) such resource instance'"'"'s associated attribute, information one or more sets,wherein at least a portion of such resource identity information one or more sets enables (i) identifying one or more resources for one or more trustworthy, isolated, purposeful computing sessions, and (ii) formulating one or more specifications for at least one of one or more secure virtual machines, and one or more secure, other isolated sandboxes, for such one or more trustworthy, isolated, purposeful computing sessions, in accordance with respective user purpose fulfillment specification information sets,wherein such trustworthy, isolated, purposeful computing sessions operate in accordance with respective standardized and interoperably interpretable session purposeful computing framework specification sets that enable the dynamic provisioning of respective such trustworthy, isolated, purposeful computing sessions, in response to users'"'"' instructions to activate their respective trustworthy, isolated, purposeful computing sessions, andwherein one or more resource operations in respective trustworthy resource arrangements operating on such at least one of one or more secure virtual machines, and one or more secure other isolated sandboxes, are at least one of authorized, limited in operation, and otherwise securely managed using one or more session operating rule information sets, at least in part, in accordance with respective user purpose fulfillment specifications, and in support of trustworthy, isolated, purposeful computing one or more sessions;

    wherein such one or more computing arrangements are employed to provide such at least one of one or more standardized (a) resources, and (b) specifications, that, at least in part, enable performing, using at least one biometric sensor, biometric identification of one or more at least one of stakeholder humans and stakeholder human agents, of stakeholder respective resources, wherein such at least one of biometrically acquired identification information, and information derived therefrom, is cryptographically, securely bound to stakeholders'"'"' at least one of respective resource associated identity information sets; and

    wherein such one or more computing arrangements are employed to provide such at least one of one or more standardized (a) resources, and (b) specifications, that, at least in part, enable employing at least one tamper resistant processing and memory arrangement for secure processing of at least one of (a) at least a portion of resource identity information, and (b) resource stakeholder identity information.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×