Web Hosting Articles

  Home arrow Web Hosting Articles arrow Page 3 - What is the Information Card Foundatio...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

What is the Information Card Foundation (ICF)?
By: Brian Sutherland
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 4 stars4 stars4 stars4 stars4 stars / 2

    Table of Contents:
  • What is the Information Card Foundation (ICF)?
  • Sound Familiar? Well, Not Exactly...
  • When In Doubt, Farm It Out!
  • Will it Spread?

  • Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article




    What is the Information Card Foundation (ICF)? - When In Doubt, Farm It Out!

    (Page 3 of 4 )

    It's pretty obvious where all or most of the technology is coming from, since Microsoft has been working on this for at least a decade. What is not so obvious are the strange bedfellows that Microsoft now finds itself among, seeking support. To be specific, these are direct competitors. It also seems quite obvious that Microsoft realizes it can't always easily replace Internet-wide practices alone, just because it thinks it could; or more specifically yet again, should.

    After two decent attempts at completely revolutionizing the way people send secure information across the Internet, Microsoft wisely found support in industry heavyweights with enough power, resources and overall pull to renew this attempt, providing a more "objective" and "worldwide friendly" approach.

    The main difference between the ICF approach, and Microsoft's past angles of attack, is through establishing this three-part system (communications triangle). An initiating user would begin by synchronizing via an encrypted network and using an ID provider such as a credit card issuer or banking institution.

    Once this encrypted connection is established, the ICF proposes that the addition of a "reliant" party, much like a scholastic network, e-commerce site or other financial institution, to complete the secure triangle. This differs from using standard hard ID cards in your wallet because this model requires all three groups to be synchronized in real time, making the ideal data transaction.

    The ICF's primary goals are to support and guide both existing and future efforts to enable development of an open and trusted identify platform for the Internet that maximizes the control one holds over one's personal information. 

    Businesses and other organizations can benefit from the use of I-cards as well, to improve their relationships with vendors and users alike. This includes any number of groups, such as health care providers, government groups, and educational and financial institutions.

    More Web Hosting Articles Articles
    More By Brian Sutherland


    - Top Wordpress Plugins for SEO
    - Top Drupal Evaluation and Rating Modules
    - Free Network Monitoring Programs for Max Per...
    - E-store Hosting: Free Options for Beginners
    - Dropbox: The Ultimate File-Sharing and Synci...
    - Reviewing the Best Free Web Hosting Sites
    - Businesses Turn to Reseller Web Hosting for ...
    - Multiple Data Center Hosting
    - Web Hosting Goes Green
    - Web Hosting Technology Overview
    - Collaborate: An Examination of Tools for Gro...
    - Social Networking Security
    - Domain Names 101
    - Top Software to Help Manage Your Websites
    - The Evolution of Phishing

    Developer Shed Affiliates


    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap