Rivetz Corp. has announced it has joined the Trusted IoT Alliance, an open-source software foundation supporting a secure, scalable, interoperable and trusted IoT ecosystem. As a member of the Trusted IoT Alliance, Rivetz will collaborate with Fortune 500 companies and start-ups to develop and support the intersection of blockchain and IoT.
The Trusted IoT Alliance aims to increase interoperability and interworking whilst maintaining a blockchain-agnostic approach. The Alliance works with companies like Rivetz to develop standards, certification, technical advancements and business opportunities. This includes registering IoT devices and creating event logs on decentralized systems, creating an ecosystem that links cryptographic registration, identities, and metadata.
Steven Sprague, founder and CEO of Rivetz, remarked: “Rivetz looks forward to contributing to industry initiatives in order to bring enhanced device security to blockchain applications. Known devices in known conditions, whether protecting digital assets or creating or consuming provable data, are a fundamental capability to ensuring trust in decentralized applications. We engaged with the Trusted IoT Alliance because we believe it is the most appropriate forum to advance these types of capabilities in the blockchain community, working with the organizations who have a vested interest in ensuring the security of the entire ecosystem.”
Executive Director of the Trusted IoT Alliance, Zaki Manian said: “The Trusted IoT Alliance is pleased to have Rivetz as a member. Their Trusted Execution Environment technology has deep potential to link smart contracts with the physical world,”,
Rivetz’s RvT cybersecurity token provides verifiable security controls for cloud authentication, IoT, blockchain and legacy financial transactions. The RvT token enables multifactor authentication across devices to achieve provable security at the transaction and authentication level. The Rivetz solution leverages technology that is built in to many mobile devices to assure the keys and transactions cannot be altered or stolen by malware infecting the operating system.