Blockchain-Based IoT Solutions

0
750
Advertisement

Rivetz Corp. announced it has joined the Trusted IoT Alliance, an open-source software foundation supporting a secure, scalable, interoperable, and trusted IoT ecosystem. As a member of the Trusted IoT Alliance, Rivetz will collaborate with Fortune 500 companies and startups to develop and support the intersection of blockchain and IoT.

The Trusted IoT Alliance aims to increase interoperability and interworking, while maintaining a blockchain-agnostic philosophy. The Alliance works with companies like Rivetz to develop standards, certification, technical advancements, and business opportunities. This includes registering IoT devices and creating event logs on decentralized systems, creating an ecosystem that links cryptographic registration, identities, and metadata.

Advertisement

“Rivetz looks forward to contributing to industry initiatives in order to bring enhanced device security to blockchain applications,” said Steven Sprague, founder and CEO of Rivetz.  “Known devices in known conditions, whether protecting digital assets or creating or consuming provable data, are a fundamental capability to ensuring trust in decentralized applications.  We engaged with the Trusted IoT Alliance because we believe it is the most appropriate forum to advance these types of capabilities in the blockchain community, working with the organizations who have a vested interest in ensuring the security of the entire ecosystem.”

“The Trusted IoT Alliance is pleased to have Rivetz as a member. Their Trusted Execution Environment technology has deep potential to link smart contracts with the physical world,” said Zaki Manian, Executive Director of the Trusted IoT Alliance.

Rivetz’s RvT cybersecurity token provides verifiable security controls for cloud authentication, IoT, blockchain, and legacy financial transactions. The RvT token enables multi-factor authentication across devices, to achieve provable security at the transaction and authentication level. The Rivetz solution leverages technology that is already built in to hundreds of millions of mobile devices to assure the keys and transactions can not be altered or stolen by malware infecting the operating system.   Read more…

Syeda Beenish

Advertisement

SHARE YOUR THOUGHTS & COMMENTS

Please enter your comment!
Please enter your name here