Rivetz is a “first-mover” with patent pending cybersecurity services and capabilities that leverage the
Trusted Execution Environment (TEE). By providing a vault to isolate and protect keys and encrypted material from apps, malware, users, and hackers, Rivetz can provide a truly safe experience for accessing all digital services – maximizing the quality and value of the provider-to-subscriber relationship.
The application of the Rivetz solution
Rivetz has developed several internal services that leverage the attestation architecture and a generalpurpose developer environment that will enable integration of these capabilities into any third-party applications. The Rivetz solution is designed to operate across the market and support isolated executionon both ARM and Intel architecture devices. Simple applications provide the foundation that will enable more advanced solutions in the future.
Rivetz expects to partner with several of the existing and emerging token projects to assure cybersecurity is built-in from the beginning. Most token projects have a private key that could benefit from new models of protection from theft or misuse. The clear benefits of conflicts and limitations of the integration of enterprise controls for decentralized networks.
Following are descriptions of a few general-purpose use cases.
Multi-factor authentication with provable cybersecurity controls
Many companies have implemented multifactor authentication as part of their projects. Rivetz provides the tools to enhance these solutions using provable hardware security. The attestation services will enable integration of external checks such as geolocation and enterprise status to be verified before authentication is confirmed to the service. Rivetz supports a 2FA capability today and this will be the initial service to support the RvT token capability with full attestation support.
A global market for RvT tokens
The market for RvT Tokens is vast and would be utilized by both currently shipped devices and future
security chip and device sales. Driven by global cybercrime, regulations and the mushrooming IoT market,
there is a mandate for a better solution to security.
A growing demand for improved cybersecurity is crystal clear in Cybersecurity’s recent report.
Cybersecurity Ventures, a firm that delivers cybersecurity market data, insights, and groundbreaking
predictions to a global audience of CEOs, CIOs CSOs, venture capitalists, and government cyber defense
leaders, predicts cybercrime will continue rising and cost businesses globally more than $6 trillion annually
by 2021. The firm forecasts that global spending on cybersecurity products and services will exceed $1
trillion cumulatively over the next five years, from 2017 to 2021. In 2017, Cybersecurity Ventures expects
the global cybersecurity market to be worth more than $120 billion, having grown roughly 35 times over
13 years. The firm further expects 12-15 percent year-over-year market growth through 2021.3
The current mobile market with Trusted Execution Environment (TEE) capability is over one billion shipped
devices. Combined with an estimated one billion enterprise grade PCs deployed, this creates a market of
over two billion devices with the ability to upgrade to Rivetz improved security.
Looking ahead, the opportunity grows even more rapidly when the explosive IoT market is added to PC
and mobile device sales. The RvT Token business model encourages chip manufacturers like Intel and
Infineon to include the RvT Token when selling their chips or device to manufacturers like Lenovo, Dell,
and Samsung, to include it in the PC or mobile phone.
The Rivetz Global Attestation and Identity Network has the potential to deliver improved and provable security to a number of major global markets, including:
Internet of Things
• Strong device identity and registration prevents cloning or rogue devices
• Peer-to-peer provable encryption and assured messages
• Verifiable condition to detect and prevent tampering of distributed devices
• Enabling a global social network of machines
• Trusted data
Cloud Authentication and Access
• Tamper-proof identity protected by measured trust hardware
• Secure display assuring what you see is what you send
• Secure multifactor authentication anchored in provable hardware
• A simpler safer user experience. (Logging on is like pushing the “send button”) secure, simple and protected by hardware in the device
Machine Automated Money With Policy
• Secure source of funds that can be autonomously used by the device
• Assurance that transactions are only executed according to the owner's policy for the device
• Secure model for on demand services and instant access to capabilities as required
• Simplify new models for on-demand access to cloud capabilities and services.
• Provide an extendable economic model for secure transaction on IoT
Cybersecurity Controls for Smart Contracts and Blockchain
• Provable/measured protections of the private key and transaction data
• Embedding proof that a specific device with measured controls requested a specific blockchain transaction
• Enabling privacy on the chain or in contracts by tokenizing recorded data and personal information
• Securing oracle data for smart contracts
Internet of Things
• Strong device identity and registration prevents cloning or rogue devices
• Peer-to-peer provable encryption and assured messages
• Verifiable condition to detect and prevent tampering of distributed devices
• Enabling a global social network of machines
• Trusted data
Cloud Authentication and Access
• Tamper-proof identity protected by measured trust hardware
• Secure display assuring what you see is what you send
• Secure multifactor authentication anchored in provable hardware
• A simpler safer user experience. (Logging on is like pushing the “send button”) secure, simple and protected by hardware in the device
Machine Automated Money With Policy
• Secure source of funds that can be autonomously used by the device
• Assurance that transactions are only executed according to the owner's policy for the device
• Secure model for on demand services and instant access to capabilities as required
• Simplify new models for on-demand access to cloud capabilities and services.
• Provide an extendable economic model for secure transaction on IoT
Cybersecurity Controls for Smart Contracts and Blockchain
• Provable/measured protections of the private key and transaction data
• Embedding proof that a specific device with measured controls requested a specific blockchain transaction
• Enabling privacy on the chain or in contracts by tokenizing recorded data and personal information
• Securing oracle data for smart contracts
1.4 CrowdSale Detail
Bitcointalk Profil :https://bitcointalk.org/index.php?action=profile;u=931526



0 komentar
Posting Komentar