. . . "(a) To define a form of Secure Processor and Associated functions and protocols, which is designed to minimize its physical and computations resources by offloading functions to another Secure Processor that services it. (b) To define a framework of networked Secure Processors of that type that provides centralized storage, processing and distribution. (c) To define such a framework to support Pol" .