SlideShare a Scribd company logo
1 of 18
Property of Rivetz Corp.
Delivering a New Architecture for Security:
Blockchain + Trusted Computing
Property of Rivetz Corp.Property of Rivetz Corp.
The Blockchain ledger is secure but the instructions are not.
Block Chain Technology
•Provable events
•Time stamped
•One way
•Secure Crypto Chain
•Multi-SIG
Instructions
Keys
Data/Addres
s
Process
Malwar
eTheft
Man in
the
middle
Unknown
software
Property of Rivetz Corp.Property of Rivetz Corp.
The Goal
Authentication alone is no longer enough
Property of Rivetz Corp.Property of Rivetz Corp.
Decentralized security
Crown
Jewel
s
Property of Rivetz Corp.Property of Rivetz Corp.
Decentralized security
Crown
Jewel
s
Crown
Jewel
s
Crown
Jewels
Crown
Jewels
Crown
Jewels
Property of Rivetz Corp.Property of Rivetz Corp.
An observation
The Public Blockchain is censorship resistant
Is equivalent to
The Public Blockchain is Network Security resistant
Property of Rivetz Corp.Property of Rivetz Corp.
What is Trusted Execution
• A small highly assured operating environment isolated by hardware
from the primary operating system
• Can be remotely verified cryptographically to be unchanged
• Has a hardware root of trust that can’t be altered by software
• Is based on a number of industry standards
• Only processes code from known developers
• Can not be altered by software/malware loaded on the operating
system
Property of Rivetz Corp.
OPERATING SYSTEM TEE
ARM TrustZone®
enabled SoC
SMART CONNECTED DEVICE
Attestation APP Wallet
Security
Critical
Functions
API Call on
Security critical
Routine
Rivet
Secured
Critical Assets
Key assets exposed Key assets protected
Isolated
space for
handling
high value
assets
Rivetz and TEE
Property of Rivetz Corp.Property of Rivetz Corp.
RIVETZ
Connecting built-in security and APP developers
Trusted
Execution
Mobile Wallet
Chat / Voice
Storage
Cloud
Authentication
ApplicationsCapabilities
Secure Display
Key Storage
Secure PIN
Encryption / Decryption
Bio-metrics
Property of Rivetz Corp.Property of Rivetz Corp.
Attestation verification -- Assuring the internal capabilities are as expected
Anatomy of a secure instruction
Trusted Display -- What you see is what you sign
Trusted Input --Provable collection of consent From the user
Trusted Execution -- Protection of Private key and formation process
Property of Rivetz Corp.Property of Rivetz Corp.
The role of attestation
• Verification of the Rivetz TA and the underlying TEE match
previously registered measurements
• Start with what is possible and push for more
• Registration of reference measurements for service providers and
partners
• Rivetz.net as a policy enforcement point
• Encrypted API Calls are a potential policy enforcement point
Known devices providing provable instructions
Property of Rivetz Corp.Property of Rivetz Corp.
RvT The cybersecurity token
• Security at the transaction level
• multifactor authentication
• token models and blockchain
• IoT Instructions
• Policy controlled spend by the owner of the device
• Assure use of private keys
• Real-time verification of integrity
• Automated settlement for utility services
• On demand delivery of cybercontrols
• Metered model for service
• Improved compliance data
• Simplifying use
Property of Rivetz Corp.Property of Rivetz Corp.
Delivering a new
architecture for
security
Property of Rivetz Corp.Property of Rivetz Corp.
Machines need
Human Control
• Automatic payment in a controlled
environment
• TEE assures controlled access to a
utility token
• Owner sets and controls policy
• The policy engine is continuously
verified with each transaction
Providing the foundation for on
demand utilities provisioned by the
device for the device.
Property of Rivetz Corp.Property of Rivetz Corp.
RvT the
Cybersecurity
Token
• A new business model for
security
• Enabling existing installed
technology
• Evolving security from
watching to proving
• Tackling a global market
need
• Security for the token
power utilities of the future
Property of Rivetz Corp.Property of Rivetz Corp.
Demonstration
of prototype
Simple authentication built-in
Property of Rivetz Corp.Property of Rivetz Corp.
High assurance instructions
Multi-factor for machines
• Lays the compliance framework for Payment Security Directive 2 PSD2
• The foundation for cyber security controls in IoT
• Secure M to M controls
• Cybersecurity controls verified and recorded at the transaction layer
• Enabling provable cybersecurity controls for BYOD and Cloud
Known
user
Known
device
Known
condition
Assured
instruction
Property of Rivetz Corp.Property of Rivetz Corp.
Steven Sprague, CEO
Steven@rivetz.com
413-330-9100

More Related Content

What's hot

Wireless security body_cam_presentation__1_
Wireless security body_cam_presentation__1_Wireless security body_cam_presentation__1_
Wireless security body_cam_presentation__1_Brandon Albert
 
FIWARE Global Summit - Connecting to IoT
FIWARE Global Summit - Connecting to IoTFIWARE Global Summit - Connecting to IoT
FIWARE Global Summit - Connecting to IoTFIWARE
 
Cryptzone AppGate Technical Architecture
Cryptzone AppGate Technical ArchitectureCryptzone AppGate Technical Architecture
Cryptzone AppGate Technical ArchitectureCryptzone
 
Moby SIG Orchestration Security Summit Presentation
Moby SIG Orchestration Security Summit PresentationMoby SIG Orchestration Security Summit Presentation
Moby SIG Orchestration Security Summit PresentationDiogo Mónica
 
Istio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at ScaleIstio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at ScaleMofizur Rahman
 
Get Your **IT Together: Discover & Organize Your IT Assets
Get Your **IT Together: Discover & Organize Your IT AssetsGet Your **IT Together: Discover & Organize Your IT Assets
Get Your **IT Together: Discover & Organize Your IT AssetsSolarWinds
 
PLNOG14: SteelCentral NPM Solution - Tomasz Winiarski
PLNOG14: SteelCentral NPM Solution - Tomasz WiniarskiPLNOG14: SteelCentral NPM Solution - Tomasz Winiarski
PLNOG14: SteelCentral NPM Solution - Tomasz WiniarskiPROIDEA
 
Future Proofing your Data Center Network
Future Proofing your Data Center NetworkFuture Proofing your Data Center Network
Future Proofing your Data Center NetworkInnoTech
 
AFCEA Energy 2013 IT Symposium - Howerton Keynote
AFCEA Energy 2013 IT Symposium - Howerton KeynoteAFCEA Energy 2013 IT Symposium - Howerton Keynote
AFCEA Energy 2013 IT Symposium - Howerton KeynoteTravis Howerton
 
10 predictions for the Cloud Native platform and issues in 2021
10 predictions for the Cloud Native platform and issues in 202110 predictions for the Cloud Native platform and issues in 2021
10 predictions for the Cloud Native platform and issues in 2021Cheryl Hung
 
Distributed network monitoring of wireless networks (Mobility Field Day 1)
Distributed network monitoring of wireless networks (Mobility Field Day 1)Distributed network monitoring of wireless networks (Mobility Field Day 1)
Distributed network monitoring of wireless networks (Mobility Field Day 1)NetBeez, Inc.
 
GlobalSign's Hosted OCSP for IoT PKIs
GlobalSign's Hosted OCSP for IoT PKIsGlobalSign's Hosted OCSP for IoT PKIs
GlobalSign's Hosted OCSP for IoT PKIsGlobalSign
 
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...DATA SECURITY SOLUTIONS
 
NGINX KubeCon Copenhagen 2018
NGINX KubeCon Copenhagen 2018 NGINX KubeCon Copenhagen 2018
NGINX KubeCon Copenhagen 2018 NGINX, Inc.
 
MTLS in a Microservices World
MTLS in a Microservices WorldMTLS in a Microservices World
MTLS in a Microservices WorldDiogo Mónica
 
Webinar: How to troubleshoot bandwidth hogs and take action.
Webinar: How to troubleshoot bandwidth hogs and take action.Webinar: How to troubleshoot bandwidth hogs and take action.
Webinar: How to troubleshoot bandwidth hogs and take action.ManageEngine, Zoho Corporation
 
Automate Your Container Deployments Securely
Automate Your Container Deployments SecurelyAutomate Your Container Deployments Securely
Automate Your Container Deployments SecurelyDevOps.com
 

What's hot (20)

Wireless security body_cam_presentation__1_
Wireless security body_cam_presentation__1_Wireless security body_cam_presentation__1_
Wireless security body_cam_presentation__1_
 
FIWARE Global Summit - Connecting to IoT
FIWARE Global Summit - Connecting to IoTFIWARE Global Summit - Connecting to IoT
FIWARE Global Summit - Connecting to IoT
 
Cryptzone AppGate Technical Architecture
Cryptzone AppGate Technical ArchitectureCryptzone AppGate Technical Architecture
Cryptzone AppGate Technical Architecture
 
Moby SIG Orchestration Security Summit Presentation
Moby SIG Orchestration Security Summit PresentationMoby SIG Orchestration Security Summit Presentation
Moby SIG Orchestration Security Summit Presentation
 
Istio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at ScaleIstio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at Scale
 
Get Your **IT Together: Discover & Organize Your IT Assets
Get Your **IT Together: Discover & Organize Your IT AssetsGet Your **IT Together: Discover & Organize Your IT Assets
Get Your **IT Together: Discover & Organize Your IT Assets
 
PLNOG14: SteelCentral NPM Solution - Tomasz Winiarski
PLNOG14: SteelCentral NPM Solution - Tomasz WiniarskiPLNOG14: SteelCentral NPM Solution - Tomasz Winiarski
PLNOG14: SteelCentral NPM Solution - Tomasz Winiarski
 
SDP Glossary v2.0
SDP Glossary v2.0 SDP Glossary v2.0
SDP Glossary v2.0
 
Future Proofing your Data Center Network
Future Proofing your Data Center NetworkFuture Proofing your Data Center Network
Future Proofing your Data Center Network
 
AFCEA Energy 2013 IT Symposium - Howerton Keynote
AFCEA Energy 2013 IT Symposium - Howerton KeynoteAFCEA Energy 2013 IT Symposium - Howerton Keynote
AFCEA Energy 2013 IT Symposium - Howerton Keynote
 
10 predictions for the Cloud Native platform and issues in 2021
10 predictions for the Cloud Native platform and issues in 202110 predictions for the Cloud Native platform and issues in 2021
10 predictions for the Cloud Native platform and issues in 2021
 
Distributed network monitoring of wireless networks (Mobility Field Day 1)
Distributed network monitoring of wireless networks (Mobility Field Day 1)Distributed network monitoring of wireless networks (Mobility Field Day 1)
Distributed network monitoring of wireless networks (Mobility Field Day 1)
 
GlobalSign's Hosted OCSP for IoT PKIs
GlobalSign's Hosted OCSP for IoT PKIsGlobalSign's Hosted OCSP for IoT PKIs
GlobalSign's Hosted OCSP for IoT PKIs
 
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
 
NGINX KubeCon Copenhagen 2018
NGINX KubeCon Copenhagen 2018 NGINX KubeCon Copenhagen 2018
NGINX KubeCon Copenhagen 2018
 
how to simulate ACI
how to simulate ACIhow to simulate ACI
how to simulate ACI
 
MTLS in a Microservices World
MTLS in a Microservices WorldMTLS in a Microservices World
MTLS in a Microservices World
 
Avi Network SDN meetup
Avi Network  SDN meetupAvi Network  SDN meetup
Avi Network SDN meetup
 
Webinar: How to troubleshoot bandwidth hogs and take action.
Webinar: How to troubleshoot bandwidth hogs and take action.Webinar: How to troubleshoot bandwidth hogs and take action.
Webinar: How to troubleshoot bandwidth hogs and take action.
 
Automate Your Container Deployments Securely
Automate Your Container Deployments SecurelyAutomate Your Container Deployments Securely
Automate Your Container Deployments Securely
 

Similar to Delivering a New Architecture for Security: Blockchain + Trusted Computing

Rivetz - A blockchain smartphone's secret sauce
Rivetz - A blockchain smartphone's secret sauceRivetz - A blockchain smartphone's secret sauce
Rivetz - A blockchain smartphone's secret sauceRivetz
 
Provable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsProvable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsRivetz
 
Manging Container Deployments at Scale
Manging Container Deployments at ScaleManging Container Deployments at Scale
Manging Container Deployments at ScaleMofizur Rahman
 
Cloud native Continuous Delivery
Cloud native Continuous DeliveryCloud native Continuous Delivery
Cloud native Continuous DeliveryChristian Deger
 
Hyperledger Fabric Update - June 2018
Hyperledger Fabric Update - June 2018Hyperledger Fabric Update - June 2018
Hyperledger Fabric Update - June 2018Arnaud Le Hors
 
Quick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, OpengearQuick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, OpengearMyNOG
 
Advanced Blockchain Technologies on Privacy & Scalability (All Things Open)
Advanced Blockchain Technologies on Privacy & Scalability (All Things Open) Advanced Blockchain Technologies on Privacy & Scalability (All Things Open)
Advanced Blockchain Technologies on Privacy & Scalability (All Things Open) Kaleido
 
Characerizing and Validating QoS in the Emerging IoT Network
Characerizing and Validating QoS in the Emerging IoT NetworkCharacerizing and Validating QoS in the Emerging IoT Network
Characerizing and Validating QoS in the Emerging IoT NetworkHans Ashlock
 
Cloud native Continuous Delivery
Cloud native Continuous DeliveryCloud native Continuous Delivery
Cloud native Continuous DeliveryChristian Deger
 
CQRS and Event Sourcing for IoT applications
CQRS and Event Sourcing for IoT applicationsCQRS and Event Sourcing for IoT applications
CQRS and Event Sourcing for IoT applicationsMichael Blackstock
 
Aegis QC + Product Overview.pdf
Aegis QC + Product Overview.pdfAegis QC + Product Overview.pdf
Aegis QC + Product Overview.pdfnathan239786
 
Blockchain in the enterprise
Blockchain in the enterpriseBlockchain in the enterprise
Blockchain in the enterpriseJesus Rodriguez
 
Advanced Blockchain Technologies on Privacy and Scalability
Advanced Blockchain Technologies on Privacy and ScalabilityAdvanced Blockchain Technologies on Privacy and Scalability
Advanced Blockchain Technologies on Privacy and ScalabilityAll Things Open
 
Tamas blummer presentation
Tamas blummer presentationTamas blummer presentation
Tamas blummer presentationMecklerMedia
 
Deep Dive on Amazon Managed Blockchain
Deep Dive on Amazon Managed BlockchainDeep Dive on Amazon Managed Blockchain
Deep Dive on Amazon Managed BlockchainAmazon Web Services
 

Similar to Delivering a New Architecture for Security: Blockchain + Trusted Computing (20)

Rivetz - A blockchain smartphone's secret sauce
Rivetz - A blockchain smartphone's secret sauceRivetz - A blockchain smartphone's secret sauce
Rivetz - A blockchain smartphone's secret sauce
 
Provable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsProvable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain Transactions
 
Webinar- Internet of Things: Application Frameworks in IoT
Webinar- Internet of Things: Application Frameworks in IoTWebinar- Internet of Things: Application Frameworks in IoT
Webinar- Internet of Things: Application Frameworks in IoT
 
Manging Container Deployments at Scale
Manging Container Deployments at ScaleManging Container Deployments at Scale
Manging Container Deployments at Scale
 
Cloud native Continuous Delivery
Cloud native Continuous DeliveryCloud native Continuous Delivery
Cloud native Continuous Delivery
 
Was ist ein Service Mesh und wie funktioniert es?
Was ist ein Service Mesh und wie funktioniert es?Was ist ein Service Mesh und wie funktioniert es?
Was ist ein Service Mesh und wie funktioniert es?
 
Hyperledger Fabric Update - June 2018
Hyperledger Fabric Update - June 2018Hyperledger Fabric Update - June 2018
Hyperledger Fabric Update - June 2018
 
Quick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, OpengearQuick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, Opengear
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Advanced Blockchain Technologies on Privacy & Scalability (All Things Open)
Advanced Blockchain Technologies on Privacy & Scalability (All Things Open) Advanced Blockchain Technologies on Privacy & Scalability (All Things Open)
Advanced Blockchain Technologies on Privacy & Scalability (All Things Open)
 
Attacking VPN's
Attacking VPN'sAttacking VPN's
Attacking VPN's
 
Characerizing and Validating QoS in the Emerging IoT Network
Characerizing and Validating QoS in the Emerging IoT NetworkCharacerizing and Validating QoS in the Emerging IoT Network
Characerizing and Validating QoS in the Emerging IoT Network
 
Cloud native Continuous Delivery
Cloud native Continuous DeliveryCloud native Continuous Delivery
Cloud native Continuous Delivery
 
CQRS and Event Sourcing for IoT applications
CQRS and Event Sourcing for IoT applicationsCQRS and Event Sourcing for IoT applications
CQRS and Event Sourcing for IoT applications
 
Aegis QC + Product Overview.pdf
Aegis QC + Product Overview.pdfAegis QC + Product Overview.pdf
Aegis QC + Product Overview.pdf
 
Blockchain in the enterprise
Blockchain in the enterpriseBlockchain in the enterprise
Blockchain in the enterprise
 
Advanced Blockchain Technologies on Privacy and Scalability
Advanced Blockchain Technologies on Privacy and ScalabilityAdvanced Blockchain Technologies on Privacy and Scalability
Advanced Blockchain Technologies on Privacy and Scalability
 
Tamas blummer presentation
Tamas blummer presentationTamas blummer presentation
Tamas blummer presentation
 
Deep Dive on Amazon Managed Blockchain
Deep Dive on Amazon Managed BlockchainDeep Dive on Amazon Managed Blockchain
Deep Dive on Amazon Managed Blockchain
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Delivering a New Architecture for Security: Blockchain + Trusted Computing

  • 1. Property of Rivetz Corp. Delivering a New Architecture for Security: Blockchain + Trusted Computing
  • 2. Property of Rivetz Corp.Property of Rivetz Corp. The Blockchain ledger is secure but the instructions are not. Block Chain Technology •Provable events •Time stamped •One way •Secure Crypto Chain •Multi-SIG Instructions Keys Data/Addres s Process Malwar eTheft Man in the middle Unknown software
  • 3. Property of Rivetz Corp.Property of Rivetz Corp. The Goal Authentication alone is no longer enough
  • 4. Property of Rivetz Corp.Property of Rivetz Corp. Decentralized security Crown Jewel s
  • 5. Property of Rivetz Corp.Property of Rivetz Corp. Decentralized security Crown Jewel s Crown Jewel s Crown Jewels Crown Jewels Crown Jewels
  • 6. Property of Rivetz Corp.Property of Rivetz Corp. An observation The Public Blockchain is censorship resistant Is equivalent to The Public Blockchain is Network Security resistant
  • 7. Property of Rivetz Corp.Property of Rivetz Corp. What is Trusted Execution • A small highly assured operating environment isolated by hardware from the primary operating system • Can be remotely verified cryptographically to be unchanged • Has a hardware root of trust that can’t be altered by software • Is based on a number of industry standards • Only processes code from known developers • Can not be altered by software/malware loaded on the operating system
  • 8. Property of Rivetz Corp. OPERATING SYSTEM TEE ARM TrustZone® enabled SoC SMART CONNECTED DEVICE Attestation APP Wallet Security Critical Functions API Call on Security critical Routine Rivet Secured Critical Assets Key assets exposed Key assets protected Isolated space for handling high value assets Rivetz and TEE
  • 9. Property of Rivetz Corp.Property of Rivetz Corp. RIVETZ Connecting built-in security and APP developers Trusted Execution Mobile Wallet Chat / Voice Storage Cloud Authentication ApplicationsCapabilities Secure Display Key Storage Secure PIN Encryption / Decryption Bio-metrics
  • 10. Property of Rivetz Corp.Property of Rivetz Corp. Attestation verification -- Assuring the internal capabilities are as expected Anatomy of a secure instruction Trusted Display -- What you see is what you sign Trusted Input --Provable collection of consent From the user Trusted Execution -- Protection of Private key and formation process
  • 11. Property of Rivetz Corp.Property of Rivetz Corp. The role of attestation • Verification of the Rivetz TA and the underlying TEE match previously registered measurements • Start with what is possible and push for more • Registration of reference measurements for service providers and partners • Rivetz.net as a policy enforcement point • Encrypted API Calls are a potential policy enforcement point Known devices providing provable instructions
  • 12. Property of Rivetz Corp.Property of Rivetz Corp. RvT The cybersecurity token • Security at the transaction level • multifactor authentication • token models and blockchain • IoT Instructions • Policy controlled spend by the owner of the device • Assure use of private keys • Real-time verification of integrity • Automated settlement for utility services • On demand delivery of cybercontrols • Metered model for service • Improved compliance data • Simplifying use
  • 13. Property of Rivetz Corp.Property of Rivetz Corp. Delivering a new architecture for security
  • 14. Property of Rivetz Corp.Property of Rivetz Corp. Machines need Human Control • Automatic payment in a controlled environment • TEE assures controlled access to a utility token • Owner sets and controls policy • The policy engine is continuously verified with each transaction Providing the foundation for on demand utilities provisioned by the device for the device.
  • 15. Property of Rivetz Corp.Property of Rivetz Corp. RvT the Cybersecurity Token • A new business model for security • Enabling existing installed technology • Evolving security from watching to proving • Tackling a global market need • Security for the token power utilities of the future
  • 16. Property of Rivetz Corp.Property of Rivetz Corp. Demonstration of prototype Simple authentication built-in
  • 17. Property of Rivetz Corp.Property of Rivetz Corp. High assurance instructions Multi-factor for machines • Lays the compliance framework for Payment Security Directive 2 PSD2 • The foundation for cyber security controls in IoT • Secure M to M controls • Cybersecurity controls verified and recorded at the transaction layer • Enabling provable cybersecurity controls for BYOD and Cloud Known user Known device Known condition Assured instruction
  • 18. Property of Rivetz Corp.Property of Rivetz Corp. Steven Sprague, CEO Steven@rivetz.com 413-330-9100