Systems and methods enabling a resource assertion environment for evaluating the appropriateness of computer resources for user purposes
First Claim
Patent Images
1. A system for secure and reliable publishing of, and subsequent use of, resource characterizing structured identification and assertion information sets, such structured identification and assertion information sets securely (a) specified and published by respective subject matter identification and assertion information set stakeholders, and (b) subsequently respectively used by computing arrangement end-users in determination of the suitability of using respective computer resources in fulfillment of such end-users'"'"' corresponding purposes, such system comprising:
- a computing processor and memory arrangement for providing at least one of one or more standardized (a) resources and (b) specifications, to at least in part enable;
operating an at least in part standardized, interoperable, and secure resource identification and descriptive assertion information environment, wherein standardization at least in part ensures computer resource structured identification and assertion information set interoperability,wherein such structured identification and assertion information sets are published by such sets'"'"' respective stakeholders for subsequent use by computing arrangement end-users, and wherein each such published information set comprises securely specified and associated resource identification and assertion information components, wherein each such published information set comprises at least in part;
a. an identification and assertion information set suitability to purpose component, wherein such information set component comprises, at least in part, (i) a purpose expression and (ii) an associated suitability to expressed purpose value expressed in a standardized form,b. a subject matter resource identifier component,c. an identification and assertion information set stakeholder person'"'"'s identifying information component, acquired at least in part through use of at least one at least in part biometric hardware sensor arrangement,d. at least one attribute information component descriptive of such stakeholder person, such attribute information component comprising a securely governed, non-biometric, stakeholder characterizing, verifiable fact information set for subsequent use by identification and assertion information set end-users, ande. at least one validation rule set component for end-user verification of such non-biometric fact information set of such stakeholder person, such verification performed using at least one hardware tamper resistant processing and memory arrangement for secure validation rule set fact testing;
wherein such structured identification and assertion information sets are at least in part cryptographically bound to their respective identification and assertion information set subject matter resources and/or resource identifiers;
wherein such identification and assertion information sets specified by such stakeholders, and used by such end-users, are employed in a distributed purposeful computing environment comprising personal computing arrangements and one or more network service arrangements, wherein such personal computing arrangements and such one or more network service arrangements are configured to support securely specifying and/or using such structured identification and assertion information sets through the use of tamper resistant processing and memory, wherein such secure tamper resistant specifying and/or using enables securely governed identification and assertion information set publishing and usage activities, such activities performed using respective computing arrangements of such distributed purposeful computing environment comprising personal computing, and network service, arrangements; and
wherein computing arrangement end-users use such identification and assertion information sets at least in part to respectively evaluate the suitability of one or more candidate computer resources for respective such end-users'"'"' purposes.
2 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer-readable storage medium configured to facilitate user purpose in a computing architecture.
99 Citations
22 Claims
-
1. A system for secure and reliable publishing of, and subsequent use of, resource characterizing structured identification and assertion information sets, such structured identification and assertion information sets securely (a) specified and published by respective subject matter identification and assertion information set stakeholders, and (b) subsequently respectively used by computing arrangement end-users in determination of the suitability of using respective computer resources in fulfillment of such end-users'"'"' corresponding purposes, such system comprising:
a computing processor and memory arrangement for providing at least one of one or more standardized (a) resources and (b) specifications, to at least in part enable; operating an at least in part standardized, interoperable, and secure resource identification and descriptive assertion information environment, wherein standardization at least in part ensures computer resource structured identification and assertion information set interoperability, wherein such structured identification and assertion information sets are published by such sets'"'"' respective stakeholders for subsequent use by computing arrangement end-users, and wherein each such published information set comprises securely specified and associated resource identification and assertion information components, wherein each such published information set comprises at least in part; a. an identification and assertion information set suitability to purpose component, wherein such information set component comprises, at least in part, (i) a purpose expression and (ii) an associated suitability to expressed purpose value expressed in a standardized form, b. a subject matter resource identifier component, c. an identification and assertion information set stakeholder person'"'"'s identifying information component, acquired at least in part through use of at least one at least in part biometric hardware sensor arrangement, d. at least one attribute information component descriptive of such stakeholder person, such attribute information component comprising a securely governed, non-biometric, stakeholder characterizing, verifiable fact information set for subsequent use by identification and assertion information set end-users, and e. at least one validation rule set component for end-user verification of such non-biometric fact information set of such stakeholder person, such verification performed using at least one hardware tamper resistant processing and memory arrangement for secure validation rule set fact testing; wherein such structured identification and assertion information sets are at least in part cryptographically bound to their respective identification and assertion information set subject matter resources and/or resource identifiers; wherein such identification and assertion information sets specified by such stakeholders, and used by such end-users, are employed in a distributed purposeful computing environment comprising personal computing arrangements and one or more network service arrangements, wherein such personal computing arrangements and such one or more network service arrangements are configured to support securely specifying and/or using such structured identification and assertion information sets through the use of tamper resistant processing and memory, wherein such secure tamper resistant specifying and/or using enables securely governed identification and assertion information set publishing and usage activities, such activities performed using respective computing arrangements of such distributed purposeful computing environment comprising personal computing, and network service, arrangements; and wherein computing arrangement end-users use such identification and assertion information sets at least in part to respectively evaluate the suitability of one or more candidate computer resources for respective such end-users'"'"' purposes. - View Dependent Claims (2, 3, 4, 5, 6, 9, 10, 11)
-
7. A system for secure reliable publishing of, and subsequent use of, resource characterizing structured identification and assertion information sets, such structured identification and assertion information sets securely (a) specified and published by respective subject matter identification and assertion information set asserters, and (b) subsequently respectively used by computing arrangement end-users in determination of the suitability of using respective computer resources in fulfillment of such end-users'"'"' corresponding purposes, such system comprising:
a computing processor and memory arrangement for providing at least one of one or more standardized (a) resources and (b) specifications, to at least in part enable; operating an at least in part standardized, interoperable, and secure resource identification and descriptive assertion information environment, wherein standardization at least in part ensures computer resource structured identification and assertion information set interoperability, wherein such providing enables a computing processor and memory arrangement supporting; specifying identification and assertion information sets by respective asserters, wherein each such identification and assertion information set specifies at least in part; i. an assertion regarding a uniquely identified subject matter, using at least one hardware tamper resistant processing and memory arrangement, wherein such subject matter is a resource set, ii. an environment wide, unique identifier for such identification and assertion information set, iii. a unique identifier for an assertion asserter of such identification and assertion information set, such identifier, at least in part, based upon biometric identification of such asserter, using at least one at least in part biometric hardware sensor arrangement, iv. one or more asserted characteristics associated with such assertion asserter, using at least one hardware tamper resistant processing and memory arrangement,
wherein such one or more asserted characteristics are any one or more of asserted attribute types comprising;
a) asserter trustworthiness as associated with one or more purpose expressions,
b) asserter reliability as associated with one or more purpose expressions,
c) asserter affinity group membership, and
d) at least one of one or more professional and expertise credentials of such identified asserter, andv. at least one validation rule set for validating such one or more asserted characteristics associated with such assertion asserter, wherein;
a) such validating uses at least one test procedure,
b) computing arrangement end-users are independently evaluating respective resources for their respective purposes, and
c) at least a portion of such validating is performed using at least one hardware tamper resistant processing and memory arrangement;wherein each such identification and assertion information set is uniquely identified through use of a standardized, interoperably interpretable identification schema compliant with such computing arrangement at least one of one or more standardized (a) resources and (b) specifications, and wherein identification information from such uniquely identified identification and assertion information set'"'"'s unique identifier is interoperably interpretable by plural independent parties; wherein such identification and assertion information sets are at least in part cryptographically bound to their respective identification and assertion information set subject matter resources and/or resource identifiers; wherein such identification and assertion information sets specified by such asserters, and used by such end-users, are employed in a distributed purposeful computing environment comprising personal computing arrangements and one or more network service arrangements, wherein such personal computing arrangements and such one or more network service arrangements are configured to support securely specifying and/or using such structured identification and assertion information sets through the use of tamper resistant processing and memory, wherein such secure tamper resistant specifying and/or using enables securely governed identification and assertion information set publishing and usage activities, such activities performed using respective computing arrangements of such distributed purposeful computing environment comprising personal computing, and network service, arrangements; and wherein computing arrangement end-users use such identification and assertion information sets at least in part to respectively evaluate the suitability of one or more candidate computer resources for respective such end-users'"'"' purposes. - View Dependent Claims (8)
-
12. A method for secure and reliable publishing of, and subsequent use of, resource characterizing structured identification and assertion information sets, such structured identification and assertion information sets securely (a) specified and published by respective subject matter identification and assertion information set stakeholders, and (b) subsequently respectively used by computing arrangement end-users in determination of the suitability of using respective computer resources in fulfillment of such end-users'"'"' corresponding purposes, such method comprising:
providing, through use of a computing processor and memory arrangement, at least one of one or more standardized (a) resources and (b) specifications, to at least in part enable; operating an at least in part standardized, interoperable, and secure resource identification and descriptive assertion information environment, wherein standardization at least in part ensures computer resource structured identification and assertion information set interoperability, wherein such structured identification and assertion information sets are published by such sets'"'"' respective stakeholders for subsequent use by computing arrangement end-users, and wherein each such published information set comprises securely specified and associated resource identification and assertion information components, wherein each such published information set comprises at least in part components produced by; a. securely specifying an identification and assertion information set suitability to purpose component, wherein such information set component comprises, at least in part, (i) a purpose expression and (ii) an associated suitability to expressed purpose value expressed in a standardized form, b. securely specifying a subject matter resource identifier component, c. identifying and specifying an identification and assertion information set stakeholder person'"'"'s identifying information component, acquired at least in part through use of at least one at least in part biometric hardware sensor arrangement, d. specifying at least one non-biometric attribute information component descriptive of such stakeholder person, such attribute information component comprising a securely governed, non-biometric, stakeholder characterizing, verifiable fact information set for subsequent use by identification and assertion information set end-users, and e. securely specifying at least one validation rule set component for end-user verification of such non-biometric fact information set of such stakeholder person, such verification performed using at least one hardware tamper resistant processing and memory arrangement for secure validation rule set fact testing; wherein such structured identification and assertion information sets are at least in part cryptographically bound to their respective identification and assertion information set subject matter resources and/or resource identifiers; wherein such identification and assertion information sets specified by such stakeholders, and used by such end-users, are employed in a distributed purposeful computing environment comprising personal computing arrangements and one or more network service arrangements, wherein such personal computing arrangements and such one or more network service arrangements are configured to support securely specifying and/or using such structured identification and assertion information sets through the use of tamper resistant processing and memory, wherein such secure tamper resistant specifying and/or using enables securely governed identification and assertion information set publishing and usage activities, such activities performed using respective computing arrangements of such distributed purposeful computing environment comprising personal computing, and network service, arrangements; and wherein computing arrangement end-users use such identification and assertion information sets at least in part to respectively evaluate the suitability of one or more candidate computer resources for respective such end-users'"'"' purposes. - View Dependent Claims (13, 14, 15, 16, 17, 20, 21, 22)
-
18. A method for secure and reliable publishing of, and subsequent use of, resource characterizing structured identification and assertion information sets, such structured identification and assertion information sets securely (a) specified and published by respective subject matter identification and assertion information set asserters, and (b) subsequently respectively used by computing arrangement end-users in determination of the suitability of using respective computer resources in fulfillment of such end-users'"'"' corresponding purposes, such method comprising:
providing, through use of a computing processor and memory arrangement, at least one of one or more standardized (a) resources and (b) specifications, to at least in part enable; operating an at least in part standardized, interoperable, and secure resource identification and descriptive assertion information environment, wherein standardization at least in part ensures computer resource structured identification and assertion information set interoperability, wherein such providing enables a computing processor and memory arrangement supporting; specifying identification and assertion information sets by respective asserters, wherein each such identification and assertion information set specifies at least in part; i. an assertion regarding a uniquely identified subject matter, using at least one hardware tamper resistant processing and memory arrangement, wherein such subject matter is a resource set, ii. an environment wide, unique identifier for such identification and assertion information set, iii. a unique identifier for an assertion asserter of such identification and assertion information set, such identifier, at least in part, based upon biometric identification of such asserter, using at least one at least in part biometric hardware sensor arrangement, iv. one or more asserted characteristics associated with such assertion asserter, using at least one hardware tamper resistant processing and memory arrangement,
wherein such one or more asserted characteristics are any one or more of asserted attribute types comprising;
a) asserter trustworthiness as associated with one or more purpose expressions,
b) asserter reliability as associated with one or more purpose expressions,
c) asserter affinity group membership, and
d) at least one of one or more professional and expertise credentials of such identified asserter, andv. at least one validation rule set for validating such one or more asserted characteristics associated with such assertion asserter, wherein;
a) such validating uses at least one test procedure,
b) computing arrangement end-users are independently evaluating respective resources for their respective purposes, and
c) at least a portion of such validating is performed using at least one hardware tamper resistant processing and memory arrangement;wherein each such identification and assertion information set is uniquely identified through use of a standardized, interoperably interpretable identification schema compliant with such computing arrangement at least one of one or more standardized (a) resources and (b) specifications, and wherein identification information from such uniquely identified identification and assertion information set'"'"'s unique identifier is interoperably interpretable by plural independent parties; wherein such identification and assertion information sets are at least in part cryptographically bound to their respective identification and assertion information set subject matter resources and/or resource identifiers; wherein such identification and assertion information sets specified by such asserters, and used by such end-users, are employed in a distributed purposeful computing environment comprising personal computing arrangements and one or more network service arrangements, wherein such personal computing arrangements and such one or more network service arrangements are configured to support securely specifying and/or using such structured identification and assertion information sets through the use of tamper resistant processing and memory, wherein such secure tamper resistant specifying and/or using enables securely governed identification and assertion information set publishing and usage activities, such activities performed using respective computing arrangements of such distributed purposeful computing environment comprising personal computing, and network service, arrangements; and wherein computing arrangement end-users use such identification and assertion information sets at least in part to respectively evaluate the suitability of one or more candidate computer resources for respective such end-users'"'"' purposes. - View Dependent Claims (19)
Specification