CPC H04L 63/0428 (2013.01) [H04L 63/0884 (2013.01); H04L 63/20 (2013.01)] | 30 Claims |
1. A method comprising:
storing code within a secure vault, wherein the code is accessible based on identification proofing which includes a trust score based on user behavior analysis, wherein the user behavior analysis includes determining whether a mobile device is secure and has not been compromised based on actions, behavior and usage patterns detected by the mobile device, wherein the actions are detected based on an accelerometer within the mobile device including detecting that the mobile device was put down;
forming one or more building blocks using the code stored in the secure vault;
accessing the one or more building block modules; and
controlling access to the one or more building block modules with an orchestrator.
|