Kueea and users
Resources called kueea (uncountable) are entities on behalf of which tasks are executed and resources are managed. Kueea do not necessarily represent living beings. Think of it as a mask a human puts on when interacting with others. Organizations also have kueea – their public image. Basically, anything that can act within the system is a kueea.
The term user refers to a physical being (usually a human) which interacts with a system terminal machine, by which it issues commands to its kueea to do things within the system.
Kueea are globally unique resources, generated independently by users and then registered with a Kueea Network in order to be recognized. Users themselves are the sole authoritative source of information about their kueea, although there is a third-party trust anchor involved. The trust anchor certifies the method of authenticating a kueea.
Authentication is generally based on asymmetric cryptography, in which case the trust anchor is needed to certifiy an association between a kueea and a public key.
A user resource is a collection of private kueea data. The user resource should be stored on a device one carries with oneself. It could be a pendrive or some other removable storage device. The data should never be stored on a publicly accessible storage medium.
When someone wants to use the system, the person interacts with a system terminal and points the system to its user resource. The system then asks the user to provide information required to access kueea credentials stored in the user resource. When the data is successfully accessed, the system requests the user to provide a system shell and select the default kueea for the session.
Shells are designed so that users may freely switch between their kueea within the same, currently active user session.