InvestorsHub Logo
icon url

aleajactaest

12/11/10 12:41 PM

#202609 RE: ExPatriate57 #202608

Hi exP,

Equipment is just the envelope. The correspondence is the thing that is valuable.

In time, we'll be accessing all of our data, wherever it is stored, using multiple pieces of equipment.

The data will be stored in third party servers - in the cloud, on the corporate network, at the bank etc - and on our own devices. All over the place.

To get all of these things working together in ways that permit transparent access and that don't breach security protocols requires a framework that is sufficiently robust in every device to meet the minimum requirements necessary to protect, store and manage the underlying data.

In time, as each category of equipment meets the trust threshold in an open environment, the need for a managing framework detaches from the individual component (eg the secured drive or the trust chip), from the unique piece of equipment (the phone, the PC etc), from the individual service network (whether it be a mobile or a cable network) and attaches to the individual/group and their data set across all their devices in a converged network.

The first step is to get corporations to see that perimeter security isn't enough to protect their VPNs. The final step is the trust matrix. Wave's set themselves up in a place that links everything together.
icon url

awk

12/11/10 2:42 PM

#202617 RE: ExPatriate57 #202608

Ramsey, well done!

In effect then a mobile phone needs two distinctly separate forms of hardware-based identity (or ownership):

1. SIM module (implemented in all mobile phones by the service provider...e.g. Verizon) that secures the account holder's identity to the service provider establishing a authorized device relationship between the service provider and the mobile phone account holder.

2. MTM (mobile TPM) that permits the mobile phone account holder (e.g. a corporation) to take ownership of the device for the purpose of controlling internet-based access to their network (e.g. a VPN). In other words, only mobile phones properly credentialed with an MTM will be permitted to access the corporate VPN (VPN access is internet-based), identical in concept to establishing TPM-based ownership of a PC.