howard_b_golden I would respectfully offer this. "In order to realize this security model fully, hardware must also be nexus-aware, and processors must include the Secure Software Component (SSC), also known as the Trusted Platform Module (TPM). These hardware modules can perform cryptographic operations and store cryptographic keys. The Trusted Computing Group (TCG), in which Intel and Microsoft are major partners, has already generated and approved the standards for this module." http://www.intel.com/cd/ids/developer/asmo-na/eng/97003.htm?page=4
Where are you proposing the cryptographic keys be stored? Without a TPM how can they be passed from PC to PC in a trusted manner? How is the attestation being done so that PC2 knows that the iCard info from PC1 hasn't been altered? Isn't it absolutely essential that I be able to attest that both the information and the source are trusted?
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.