20140196107 | SECURE DIGITAL COMMUNICATIONS - Policies are used when performing a transaction between a first and a second device, the first device having an established trusted communication relation with a first trusted device and the second device having an established trusted communication relation with a second trusted device, and the first and the second trusted device each having an established trusted communication relation with a third trusted device. A policy defines a set of constructs for creating rules to control the boundaries of a transaction. The policy defines role definition stipulating what interacting identities must have been validated as for the transaction to occur. The policy also defines a set of digest method algorithms or data referral methods to be used in the transaction. | 07-10-2014 |