The Trusted Execution Environment
Think of the TEE as a private “vault” inside your phone’s hardware – but instead of software (like apps and iOS/Android), it’s already built into your phone (the hardware). Inside of this vault, everything is isolated. No apps or software or operating system can see what’s inside. This could be your secrets, your passwords, keys, or any other private information.
RvT: The Rivet Token
Rivetz uses the RvT token and blockchain to cryptographically prove that the vault in your phone is secure, all the way from the manufacturer to your pocket. The RvT blockchain can perform a health check, verifying that your vault’s integrity is intact, and that transactions you send are exactly the ones you intended. Fundamentally, RvT creates an ecosystem for cybersecurity micropayments. Your banks use RvT to verify identify for withdrawing funds. Your local store uses RvT to protect its supply chain. Through RvT, everyday society and actions are securely powered by the blockchain.
Attestation, Health and Integrity
The Rivetz system binds the health and integrity of the device to a transaction. When you make an important transaction, the device’s health is checked against its healthy condition. Have malware on your phone? Connected to a malicious WiFi hotspot? Rivetz ensures that your transaction will not go through until your device health is restored and it can proceed safely.
Bringing It Together
Proof of ownership of the RvT token private key will allow forensic proof that the transactions were completed from a known device. The blockchain maintains proof that you connected to the services you intended to connect to, and that your device passed the require security tests. This can work in everything from the most basic applications – such as the verification that a private message is actually private – to identity verification in banking or enterprise.
- Protects customers mobile devices from being exposed and securely manages secrets, passwords, keys, and other private information on mobile device
- Is built on Trusted Execution Environment (TEE), a private hardware “vault” on phone that is completely independent from the operating system and has already been delivered on over a billion devices containing ARM-compatible processors
- Is built on existing trusted computing technology already deployed by Rivetz Corp., which has been done over the last three years to prototype advanced transaction and security capabilities
Verified 0%
Attention. There is a risk that unverified members are not actually members of the team
Verified 0%
Attention. There is a risk that unverified members are not actually members of the team
This offer is based solely on information provided by the offeror and other publicly available sources.
The token sale or exchange event is completely independent of ICOholder. ICOholder is not involved in any way, including technical support or promotion.
We list token sales from entities with which we have no relationship to help users track overall activity within the token sector. This information is not intended as advice, and you should seek professional or specialist guidance or conduct your own due diligence before making any decisions based on our content.
Any terms and conditions regarding token acquisition are solely between contributors and the token issuer. ICOholder is not the seller of these tokens.
ICOholder is not legally responsible for any representations made by third parties about any token sale. Any claims for breach of contract must be directed against the listed token issuing entity.
If you have concerns about the nature, legality, or propriety of a token sale or the involved individuals, please contact info@icoholder.com with detailed information.