Abstract:
A method for allowing a financial transaction to be performed using a electronic system, the method comprising interrogating an electronic transaction terminal with an electronic security device to obtain an integrity metric for the electronic financial transaction terminal; determining if the transaction terminal is a trusted terminal based upon the integrity metric; allowing financial transaction data to be input into the transaction terminal if the transaction terminal is identified as a trusted terminal.
Abstract:
A method of investigating misdemeanour within a data processing system is provided. An investigator is given an anonymous authenticated identity on a trusted computing device such that a trustworthy record of transactions can be created. The investigator can participate in the transaction.
Abstract:
A trusted computing environment 100, wherein each computing device 112 to 118 holds a policy specifying the degree to which it can trust the other devices in the environment 100. The policies are updated by an assessor 110 which receives reports from trusted components 120 in the computing devices 112 to 118 which identify the trustworthiness of the computing devices 112 to 118.
Abstract:
A computing platform rents a computing environment to execute a process supplied from a user device. Integrity of the computing platform is verified using a trusted device which obtains an integrity metric particularly of the host operating system during start up. The computing environment is confirmed as being suitable for the requirements of the process, and then verified ideally again using an integrity metric of the computing environment produced by the trusted device. The user process is then supplied from the user device to the computing environment.
Abstract:
A user apparatus 10 forms a user identity such as in a trusted platform module 11, and captures at least one profile characteristic in a capture unit 12. An enquiry apparatus 20 sends a request to the user apparatus 10. In response, a profile unit 13 forms a user self-profile by combining the formed user identity with one or more selected profile characteristics of interest to the enquirer. Advantageously, the user profile is formed at the user apparatus, and sent on request to the remote enquiry apparatus. The user therefore maintains strong control of the user profile, and overhead such as data storage at the enquiry apparatus is decreased.
Abstract:
A voice call system and a method and apparatus for identifying a voice caller are disclosed. The system includes a call originator apparatus 10 and a called party apparatus 20. At least one trusted user identity is formed at the call originator apparatus 10, ideally in a trusted platform module 12 configured according to a Trusted Computing Platform Alliance (TCPA) specification. The called party apparatus 20 checks the trusted user identity when establishing a new voice call. Advantageously, an identity of the voice caller using the call originator apparatus is confirmed in a reliable and trustworthy manner, even when the voice call is transported over an inherently insecure medium, e.g. an open computing system like the internet 30. Preferred embodiments of the invention use IP telephony, such as SIP (session initiation protocol) or H.323 standard voice telephony.
Abstract:
A service-provider 600 including a physically and logically protected computing environment 401, and a user space 402 accepts a request 604 to provide a private virtual room for a particular purpose from a customer or multiple customers 606. At 702, it checks the legitimacy of the proposed purpose and seeks input about the criteria for filtering the participants. Providing the legitimacy of the proposed purposes are verified, at 703 the service-provider 600 sets up the private virtual room 608 which provides a secure environment within which participants can communicate electronically. At 704, the service-provider 600 receives requests from potential participants 610 to enter the virtual room 608, and its filters the participants 610 to ensure they meet previously-defined criteria.
Abstract:
Apparatus and method for providing a secure environment enabling remote agents to interact with an electronic service are described. The electronic service runs in a first physically and logically protected computing environment. Each agent, acting on behalf of a respective client, runs in a separate physically and logically protected computing environment or compartment.
Abstract:
In order to facilitate a user's ability to trust a computing environment, a trusted computing device (2) is arranged to challenge other devices in the computing environment and to record a log of the facilities available within the computing environment and an indication of whether those facilities are trustworthy. A new user (40) entering the computing environment can obtain the log from the trusted computing device in order to ascertain the status of the environment. Alternatively any device can hold data concerning platforms in its vicinity and its operation can be authenticated by the trusted device.
Abstract:
Computer apparatus comprising a receiver for receiving an integrity metric for a computer entity via a trusted device associated with the computer entity, the integrity metric having values for a plurality of characteristics associated with the computer entity; a controller for assigning a trust level to the computer entity from a plurality of trust levels, wherein the assigned trust level is based upon the value of at least one of the characteristics of the received integrity metric.