abstract |
Embodiments herein may, in various embodiments, include some of the following highly reliable identity-related means for establishing, registering, issuing, and securely employing user computing arrangement resources as rewards for user set target contextual purposes: Evaluation, and management arrangement that employs all of the security computing resource sets. Systems and methods are applicable and include software and hardware implementations for identity firewalls; Awareness managers; Contextual purpose firewall frameworks for contextual, resource - related security, provisioning, isolation, restriction, and behavioral management; Live-biometric and perpetual environmental, assessment, and authentication technologies; Reputation systems and methods Assertions and facts Echo spear; Standardized and interoperable contextual object related expression systems and methods; Purpose related computing arrangement resources and related information management systems and methods, including contextual context identity management systems and methods, and the like. |