Rivetz — The solution to cyber security

erika
erika
Aug 22, 2017 · 4 min read

Introduction:

We have a Rivetz solution available for global authorization and Identity network that combines to global technologies. The first is the fact that industries invest billions of dollars in devices which have trusted computing and global platform standards. The second is the blockchain technology which deals with decentralized storage and micro payments. Thus, to improve the data quality, it is also combines with TEE (Trusted Execution Environment) and allows hardware in every device for cyber security. It thus creates a trust which is not present in IoT (Internet of Things) devices. It protects keys, messages and ensures cyber-security control attestation of the health and identity of the device. In 2016, Rivetz was able to provide cyber security.

The Problem and Rivetz Solution:

The Problem:

The problem is that Desktop PCs do not have the required security. As a result, sensitive information flows across public networks. Cyber security tries to keep the privacy of data. There is increase in the use of mobile devices, blockchain and new cyber security is required. It could not prevent cyber-attacks, thus diminishing the quality of services. Cybercrime has been increasing rapidly. There are only 2 types of organizations: Those who are aware that they are being hacked and those who are still not aware of the same.

Rivetz solution:

In Rivetz, its Global Attestation and Identity Network checks the identity and integrity of the end device. Internet of Things is fast growing and has huge benefits. Rivetz creates a business case for the manufacturer of the device to provide security.

Rivetz solutions has three phases:

1. First Phase: The device is paired with cyber controls. The marketplace first takes into account the health and integrity hash and then validates external controls. It uses the RvT token for this purpose.

2. Second Phase: First the user selects a service that requires a health-check and a transaction ID is then created. It calculates relative health. It assigns it a the Rivetz token and then it is sent to the cyber security controller for verifying a match. The cyber security controller compares the reference health hash to the relative health hash and with a transaction ID delivers it to the GAIN network which verifies it.

3. Third Phase:

The third phase consists of the following steps:

1. A request is made to audit a transaction.

2. A transaction ID is used to locate a logged event.

3. Reference health has is received.

4. The owner gives the cyber control market place, the hash and transaction ID.

5. The owner accounts must be registered.

6. Register the device calculating from one to thousands.

7. Integrity measurements should be recorded.

8. It monitors the use of devices and checks that the data is accessed and removes and updates the devices.

Micro-payments for devices:

The RvT token has a device for setting decentralized services. Small transactions need a small device. It along with TEE try to provide security. Frauds cannot be detected easily. A device should be trusted. This can be got by gain. It along with TEE and cyber checkpoints builds control in respect of storage, processing and replacement. Attestation helps in this to facilitate transactions.

The application of Rivetz solution:

1. Multi-factor authentication: Rivetz uses multi-factor authentication tools which provide hardware security.

2. For ecommerce transactions: Rivetz takes part NIST NCCOE for retail ecommerce by attestation.

3. For online and offline cryptocurrency wallets: PIN entry is secured and it ensures protection with TEE for online and offline transactions.

4. Client private keys and process: Projects now are using blockchain and if you can steal the private key, you can steal the service as well. Rivetz gives a model for hardware protection.

5. Machine multisig: Sometimes for wallet protection, token system uses multi-signature wallets. Rivetz supports this facility. For all token transactions, the user will use his favourite service but this has to be consigned by the Rivetz Cybersecurity Controller in the TEE.

The Global Market:

The Global market statistics are as follows:

Global Market Statistics

RvT Tokens:

The use of promotional RvT tokens is:

1. Support third-party developers to promote ecosystem to be adopted.

2. Users should adopt eco-system.

3. For the above purposes, test tokens should be given.

4. Marketing should be supported.

5. Tokens and ecosystem should be promoted.

6. If service providers adopt the ecosystem, they should be rewarded.

About Rivetz — The Company:

Rivetz improves the quality and value of the provider to subscriber relationship. It uses TEE to protect secrets by built-in hardware. It is now into billion devices. Smartphones, tablets, laptops, computers contain hardware for safety. Now you can hold data secrets. It has developed a new model for data creation. The Department for Defense (DD) and Department of Homeland Security have made it earn over a million dollars.

Links:

Website: https://rivetzintl.com/

Whitepaper: https://rivetzintl.com/rvt-white-paper-1.02.pdf

Bitcoin URL and username: Erikalui

ANN: https://bitcointalk.org/index.php?topic=1993109.0

)
Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade