摘要 |
A technique is provided for authenticating a computing device to access a secured resource based on a persistent identity that is associated with the computing device. The persistent identity is maintained in an isolated region of the computing device. In one aspect, a secure identity processing area (SIPA) is provided within the computing device to contain the persistent identity.
|