SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Rivetz – A Block Chain Smartphone’s
Secret Sauce
Provable Cybersecurity with Block Chain
and Trusted Computing
Karl J. Weaver 魏卡爾
What is Rivetz Security Architecture all about?
• Rivetz Developer Tools – already built for TEE usage with ARM’s Trustzone and
all Global Platform compliant secure architectures.
• Rivetz delivers 3rd party digital asset protection services for multiple assets,
including a user’s bitcoin wallet with backup/restore, authentication services
across devices.
• We are pioneering the concept of Dual independent Roots of Trust per mobile
device with dual private key verification, authentication, attestation and
encryption processes utilizing our Rivetz Trusted Applications combining the
TEE and uSIM/eSIM security.
• We will Ensure the quality of your transactions, and help manage your assets
across your collection of Smart & Connected Mobile Devices
eUICC OS designed, embedded into Device Hardware
eUICC OS directly
embedded into
baseband chip, like
Qualcomm SPU, like
inSE
eSIM OS embedded
into M2M eUICC card
eSIM OS embedded into
eUICC SIM Module(MFF2)
UICC OS soft SIM
embedded into the TEE
+ ARM Trustzone
eSIM OS as soft
SIM using TEE to
port into ARM
Trustzone for
Tamper Resistant
Security
The term iUICC is a
new term for
embedding an
eUICC directly into
a mobile Apps
Processor chip in a
security container
NFC Controller chip
CLF with embedded
SE & eSIM Plug-in
Virtual
The Rivetz
Network
Registry &
Notary
Services
Collections
Management
Attestation &
Policy
Control
Confirm
Services
Migration
&
Recovery
Digital Asset
Management
Digital
Asset
Escrow
Threat
Detection and
Remediation
Identity
Services
Rivetz
Registrar
Utility Token
Services
Cyber
Deadbolt
Social Security
These are all the services that the
Rivetz toolkit natively supports.
Rivetz registrar is the TAM for all the
Rivetz network, trusted services
manager, trusted application
manager,
We want to put 3rd party services like
someone’s bitcoin wallet to help
backup/restore, authentication
services across devices,
• The Rivetz Toolkit is the collection of software, documentation, and support
which allows access to the Rivetz Network in mobile, desktop, and IoT
applications
• The Rivetz Toolkit enables trusted processing for device applications
• A special combination of hardware/firmware/software is used to create a protected environment for the
storage and use of hardened digital assets
• Access, Usage, and Recovery policies can be individually applied to these assets
• The V1.0 Rivetz Toolkit enables access to the Rivetz Registrar and the Rivetz Network Attestor
• Device Registration
• Service Provider Registration
• HDAs with {Policy}
• Device quality (health) metrics can be collected
• Changes to the device state can deny access to sensitive material
• Permits immutable device Wellness information to be recorded on the blockchain, alongside the actual
transaction
Rivetz Corp Developer Tool Kit
Decentralized Security
• Enabling a new model of shared control
• Reduce single points of failure
• Increase systems trust
• Enable new control models
• Reduce single vendor risk for critical systems
Introducing Dual Roots of trust
• An application for Sim / eSIM/eUICC and TEE
• Tee + eSIM provide advanced encryption and authentication
• Dual supply chains for key management
• Isolated roots of trust
• Bi-directional attestation
Shared control
• Trusted App in TEE
• Provides full attestation and key
management
• Provisioned through device enabled
trust network
• Applet in SIM/Esim
• Provides full attestation and key
management
• Provisioned through MNO trust
network
TEE
Rivet TA
Device Application
½ secret
APPLET
Rivetz
Applet
½ secret
SIM/UICC
APPLET
eSIM/eUICC
½ secret
TEE& uSIM/eSIM opportunitiesShared control
• Trusted App in TEE
• Provides full attestation and key
management
• Provisioned through device enabled
trust network
• Applet in SIM/Esim
• Provides full attestation and key
management
• Provisioned through MNO trust
network
TEE
Rivet TA
Device Application
½ secret
APPLET
Rivetz
Applet
½ secret
SIM/UICC
APPLET
eSIM/eUICC
½ secret
Decentralized Security applications
• State of the art protection for
• Identity
• Blockchain applications
• Messaging
• IoT
• Enterprise
• Multiple trust authorities assure provable trust
• Enable strong GDPR controls
• Dramatically reduce the risk of supply chain failure
• Achieve higher assurance and certification levels
Blockchain delivered controls
• Enable decentralized controls for multiple
service providers
• Enable Supply chain reference measurements
• Enhance application operations and controls
• Reduce MNO Risk exposure
• Deliver new revenue streams and use cases
• Assured logging and controls from multiple
services and trust systems
The Rivetz Network provides:
• Device and Service Provider Registration
• Device Identity and Device Collections
• Hardened Digital Asset Protection
• Transaction Ledgering & Notary
• Device Health/Wellness
• Threat Detection and Remediation
• HDA backup/recovery/migration
• HDA escrow
The Rivetz Network intends to support a variety of trustworthy execution
technologies in the support of Hardened Digital Asset management:
• GP Compliant Trusted Execution Environments (TEE)
• Intel Software Guard Extensions (SGX)
• AMD Secure Encrypted Virtualization (SEV)
• Subscriber Identity Modules (SIM)
• Secure Elements (SE)
• Secure OS (Integrity, LynxSecure, etc)
• Software Obfuscation
• other native platform enclaves
The Rivetz Network offers a variety of RvT (token) usage models:
• Per Event
• Per Device
• Per Collection
• Per Enterprise
The Rivetz Network
APPLET
SIM/UICC
Secure
Element
Telefónica & Rivetz Collaborate on
Decentralized Security for Mobile Users
• RICHMOND, Mass., May 10, 2018 /PRNewswire/ -- Rivetz
Corp. and Telefónica today announced an agreement to
collaborate on the development of advanced mobile security
protocols for blockchain transactions and messaging. The
solution expects to leverage dual encryption, supporting
both the Trusted Execution Environment embedded by
multiple device manufacturers and the advanced encryption
on SIMs deployed by Telefónica.
• Rivetz Corp – www.rivetz.com
Karl J. Weaver 魏卡爾
OEM Biz Dev Director - China/Asia-Pacific Region
Rivetz Corp www.rivetz.com 电子邮件 : kweaver@rivetz.com 微信手机号码: +1-425-647-9315
Karl J. Weaver is a wireless and mobile device ecosystem specialist in the Smart Card sector of the wireless industry.
Karl is China/Asia-Pacific Business Development Director for Rivetz Corp to provide embedded mobile device
security of Smartphones for the Block Chain using Rivetz developer tools for the TEE. He recently worked as OEM
Biz Dev Director at ARM /Simulity Labs for design-in of eSIM and iSIM for On-Demand Connectivity (RSP) solutions
for IoT, M2M and Wearables smart and connected device manufacturers. Simulity was bought by ARM last July,
2017. Karl also spent 5 years working in China for Gemalto (and Trustonic) as Rainmaker for design in of embedded
Mobile NFC Payments & TEE security technologies to the OEM Smartphone/Tablet PC ecosystem. He is a Globally-
trained, bilingual Mandarin Chinese speaking senior mobility executive with vast experience selling wireless &
mobile device technologies from both sides of the Pacific Rim to the global OEM/ODM handset/tablet PC ecosystem
supply chain. He possess a B.S degree in Business Management from Salve Regina University, Certification in
Mandarin Chinese Language, Customs and Culture from National Taiwan Normal University – Mandarin Training
Center and Certification in Broadband wireless communications from University of Washington (Seattle). Many
presentations on Smartphone technologies can be viewed on You Tube, Youku and Tudou video streaming web sites
在优酷网站查询魏卡尔,谢了!

Weitere ähnliche Inhalte

Was ist angesagt?

e-SIM Technology || Electronics || Hariharan K
e-SIM Technology || Electronics || Hariharan Ke-SIM Technology || Electronics || Hariharan K
e-SIM Technology || Electronics || Hariharan KHariharan Krishnan
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueDan Mårtensson
 
Creating a Truly Global Connectivity Solution - Is It Even Possible?
Creating a Truly Global Connectivity Solution - Is It Even Possible?Creating a Truly Global Connectivity Solution - Is It Even Possible?
Creating a Truly Global Connectivity Solution - Is It Even Possible?Dan Mårtensson
 
Understand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIUnderstand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIDan Mårtensson
 
Sim cards
Sim cardsSim cards
Sim cardsfaizlap
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular SystemsACMBangalore
 
Beginners: UICC & SIM
Beginners: UICC & SIMBeginners: UICC & SIM
Beginners: UICC & SIM3G4G
 
Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...
Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...
Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...Thibault Cantegrel
 
GSMA OneAPI Gateway Launch Presentation
GSMA OneAPI Gateway Launch PresentationGSMA OneAPI Gateway Launch Presentation
GSMA OneAPI Gateway Launch PresentationGSMA OneAPI Gateway
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureBaqar kazmi
 
MIPI DevCon 2020 | MIPI Alliance: Enabling the IoT Opportunity
MIPI DevCon 2020 | MIPI Alliance: Enabling the IoT Opportunity MIPI DevCon 2020 | MIPI Alliance: Enabling the IoT Opportunity
MIPI DevCon 2020 | MIPI Alliance: Enabling the IoT Opportunity MIPI Alliance
 
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 James Wu
 
Electric Guard Dog FAQ
Electric Guard Dog FAQElectric Guard Dog FAQ
Electric Guard Dog FAQhjames76
 
pygmyTITAN at MIPI Developers Conference
pygmyTITAN at MIPI Developers ConferencepygmyTITAN at MIPI Developers Conference
pygmyTITAN at MIPI Developers ConferenceNikola Nenadic
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & SecurityForgeRock
 
2011 Sales Presentation V6
2011 Sales Presentation V62011 Sales Presentation V6
2011 Sales Presentation V6tina_williams
 
Cradle Point Australia
Cradle Point AustraliaCradle Point Australia
Cradle Point AustraliaCalAnderson
 
Secure Element Solutions
Secure Element SolutionsSecure Element Solutions
Secure Element SolutionsUgo Chirico
 

Was ist angesagt? (20)

e-SIM Technology || Electronics || Hariharan K
e-SIM Technology || Electronics || Hariharan Ke-SIM Technology || Electronics || Hariharan K
e-SIM Technology || Electronics || Hariharan K
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value
 
Creating a Truly Global Connectivity Solution - Is It Even Possible?
Creating a Truly Global Connectivity Solution - Is It Even Possible?Creating a Truly Global Connectivity Solution - Is It Even Possible?
Creating a Truly Global Connectivity Solution - Is It Even Possible?
 
Understand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIUnderstand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROI
 
Sim cards
Sim cardsSim cards
Sim cards
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular Systems
 
Beginners: UICC & SIM
Beginners: UICC & SIMBeginners: UICC & SIM
Beginners: UICC & SIM
 
Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...
Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...
Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...
 
GSMA OneAPI Gateway Launch Presentation
GSMA OneAPI Gateway Launch PresentationGSMA OneAPI Gateway Launch Presentation
GSMA OneAPI Gateway Launch Presentation
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochure
 
6. mr. sastry vns idrbt
6. mr. sastry   vns idrbt6. mr. sastry   vns idrbt
6. mr. sastry vns idrbt
 
Introduction to SIM and USIM
Introduction to SIM and USIMIntroduction to SIM and USIM
Introduction to SIM and USIM
 
MIPI DevCon 2020 | MIPI Alliance: Enabling the IoT Opportunity
MIPI DevCon 2020 | MIPI Alliance: Enabling the IoT Opportunity MIPI DevCon 2020 | MIPI Alliance: Enabling the IoT Opportunity
MIPI DevCon 2020 | MIPI Alliance: Enabling the IoT Opportunity
 
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014
 
Electric Guard Dog FAQ
Electric Guard Dog FAQElectric Guard Dog FAQ
Electric Guard Dog FAQ
 
pygmyTITAN at MIPI Developers Conference
pygmyTITAN at MIPI Developers ConferencepygmyTITAN at MIPI Developers Conference
pygmyTITAN at MIPI Developers Conference
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & Security
 
2011 Sales Presentation V6
2011 Sales Presentation V62011 Sales Presentation V6
2011 Sales Presentation V6
 
Cradle Point Australia
Cradle Point AustraliaCradle Point Australia
Cradle Point Australia
 
Secure Element Solutions
Secure Element SolutionsSecure Element Solutions
Secure Element Solutions
 

Ähnlich wie Rivetz - A blockchain smartphone's secret sauce

Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Eurotech
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
how to implement an IoT architecture
how to implement an IoT architecturehow to implement an IoT architecture
how to implement an IoT architectureRoberto Siagri
 
Creating Provable Cybersecurity with Blockchain and Trusted Computing
Creating Provable Cybersecurity with Blockchain and Trusted ComputingCreating Provable Cybersecurity with Blockchain and Trusted Computing
Creating Provable Cybersecurity with Blockchain and Trusted ComputingRivetz
 
Symposium on Securing the IoT - Security is the future of IoT - mbed
Symposium on Securing the IoT - Security is the future of IoT - mbedSymposium on Securing the IoT - Security is the future of IoT - mbed
Symposium on Securing the IoT - Security is the future of IoT - mbedAustin Blackstone
 
Partner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud ComputingPartner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud ComputingAmazon Web Services
 
Delivering a New Architecture for Security: Blockchain + Trusted Computing
Delivering a New Architecture for Security: Blockchain + Trusted ComputingDelivering a New Architecture for Security: Blockchain + Trusted Computing
Delivering a New Architecture for Security: Blockchain + Trusted ComputingRivetz
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationCreus Moreira Carlos
 
Provable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsProvable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsRivetz
 
2017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f022017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f02Shawn Wells
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingChuck Speicher
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities DeckPete Wassell
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFFaleh M.
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformVertex Holdings
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionCisco Mobility
 

Ähnlich wie Rivetz - A blockchain smartphone's secret sauce (20)

Intro to rv t 1.0
Intro to rv t 1.0Intro to rv t 1.0
Intro to rv t 1.0
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Can I Trust the Cloud?
Can I Trust the Cloud?Can I Trust the Cloud?
Can I Trust the Cloud?
 
how to implement an IoT architecture
how to implement an IoT architecturehow to implement an IoT architecture
how to implement an IoT architecture
 
Creating Provable Cybersecurity with Blockchain and Trusted Computing
Creating Provable Cybersecurity with Blockchain and Trusted ComputingCreating Provable Cybersecurity with Blockchain and Trusted Computing
Creating Provable Cybersecurity with Blockchain and Trusted Computing
 
Symposium on Securing the IoT - Security is the future of IoT - mbed
Symposium on Securing the IoT - Security is the future of IoT - mbedSymposium on Securing the IoT - Security is the future of IoT - mbed
Symposium on Securing the IoT - Security is the future of IoT - mbed
 
Partner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud ComputingPartner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud Computing
 
Delivering a New Architecture for Security: Blockchain + Trusted Computing
Delivering a New Architecture for Security: Blockchain + Trusted ComputingDelivering a New Architecture for Security: Blockchain + Trusted Computing
Delivering a New Architecture for Security: Blockchain + Trusted Computing
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
 
Provable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsProvable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain Transactions
 
2017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f022017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f02
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platform
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
 

Kürzlich hochgeladen

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Kürzlich hochgeladen (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Rivetz - A blockchain smartphone's secret sauce

  • 1. Rivetz – A Block Chain Smartphone’s Secret Sauce Provable Cybersecurity with Block Chain and Trusted Computing Karl J. Weaver 魏卡爾
  • 2. What is Rivetz Security Architecture all about? • Rivetz Developer Tools – already built for TEE usage with ARM’s Trustzone and all Global Platform compliant secure architectures. • Rivetz delivers 3rd party digital asset protection services for multiple assets, including a user’s bitcoin wallet with backup/restore, authentication services across devices. • We are pioneering the concept of Dual independent Roots of Trust per mobile device with dual private key verification, authentication, attestation and encryption processes utilizing our Rivetz Trusted Applications combining the TEE and uSIM/eSIM security. • We will Ensure the quality of your transactions, and help manage your assets across your collection of Smart & Connected Mobile Devices
  • 3. eUICC OS designed, embedded into Device Hardware eUICC OS directly embedded into baseband chip, like Qualcomm SPU, like inSE eSIM OS embedded into M2M eUICC card eSIM OS embedded into eUICC SIM Module(MFF2) UICC OS soft SIM embedded into the TEE + ARM Trustzone eSIM OS as soft SIM using TEE to port into ARM Trustzone for Tamper Resistant Security The term iUICC is a new term for embedding an eUICC directly into a mobile Apps Processor chip in a security container NFC Controller chip CLF with embedded SE & eSIM Plug-in Virtual
  • 4. The Rivetz Network Registry & Notary Services Collections Management Attestation & Policy Control Confirm Services Migration & Recovery Digital Asset Management Digital Asset Escrow Threat Detection and Remediation Identity Services Rivetz Registrar Utility Token Services Cyber Deadbolt Social Security These are all the services that the Rivetz toolkit natively supports. Rivetz registrar is the TAM for all the Rivetz network, trusted services manager, trusted application manager, We want to put 3rd party services like someone’s bitcoin wallet to help backup/restore, authentication services across devices,
  • 5. • The Rivetz Toolkit is the collection of software, documentation, and support which allows access to the Rivetz Network in mobile, desktop, and IoT applications • The Rivetz Toolkit enables trusted processing for device applications • A special combination of hardware/firmware/software is used to create a protected environment for the storage and use of hardened digital assets • Access, Usage, and Recovery policies can be individually applied to these assets • The V1.0 Rivetz Toolkit enables access to the Rivetz Registrar and the Rivetz Network Attestor • Device Registration • Service Provider Registration • HDAs with {Policy} • Device quality (health) metrics can be collected • Changes to the device state can deny access to sensitive material • Permits immutable device Wellness information to be recorded on the blockchain, alongside the actual transaction Rivetz Corp Developer Tool Kit
  • 6. Decentralized Security • Enabling a new model of shared control • Reduce single points of failure • Increase systems trust • Enable new control models • Reduce single vendor risk for critical systems
  • 7. Introducing Dual Roots of trust • An application for Sim / eSIM/eUICC and TEE • Tee + eSIM provide advanced encryption and authentication • Dual supply chains for key management • Isolated roots of trust • Bi-directional attestation
  • 8.
  • 9. Shared control • Trusted App in TEE • Provides full attestation and key management • Provisioned through device enabled trust network • Applet in SIM/Esim • Provides full attestation and key management • Provisioned through MNO trust network TEE Rivet TA Device Application ½ secret APPLET Rivetz Applet ½ secret SIM/UICC APPLET eSIM/eUICC ½ secret
  • 10. TEE& uSIM/eSIM opportunitiesShared control • Trusted App in TEE • Provides full attestation and key management • Provisioned through device enabled trust network • Applet in SIM/Esim • Provides full attestation and key management • Provisioned through MNO trust network TEE Rivet TA Device Application ½ secret APPLET Rivetz Applet ½ secret SIM/UICC APPLET eSIM/eUICC ½ secret
  • 11. Decentralized Security applications • State of the art protection for • Identity • Blockchain applications • Messaging • IoT • Enterprise • Multiple trust authorities assure provable trust • Enable strong GDPR controls • Dramatically reduce the risk of supply chain failure • Achieve higher assurance and certification levels
  • 12. Blockchain delivered controls • Enable decentralized controls for multiple service providers • Enable Supply chain reference measurements • Enhance application operations and controls • Reduce MNO Risk exposure • Deliver new revenue streams and use cases • Assured logging and controls from multiple services and trust systems
  • 13. The Rivetz Network provides: • Device and Service Provider Registration • Device Identity and Device Collections • Hardened Digital Asset Protection • Transaction Ledgering & Notary • Device Health/Wellness • Threat Detection and Remediation • HDA backup/recovery/migration • HDA escrow The Rivetz Network intends to support a variety of trustworthy execution technologies in the support of Hardened Digital Asset management: • GP Compliant Trusted Execution Environments (TEE) • Intel Software Guard Extensions (SGX) • AMD Secure Encrypted Virtualization (SEV) • Subscriber Identity Modules (SIM) • Secure Elements (SE) • Secure OS (Integrity, LynxSecure, etc) • Software Obfuscation • other native platform enclaves The Rivetz Network offers a variety of RvT (token) usage models: • Per Event • Per Device • Per Collection • Per Enterprise The Rivetz Network APPLET SIM/UICC Secure Element
  • 14. Telefónica & Rivetz Collaborate on Decentralized Security for Mobile Users • RICHMOND, Mass., May 10, 2018 /PRNewswire/ -- Rivetz Corp. and Telefónica today announced an agreement to collaborate on the development of advanced mobile security protocols for blockchain transactions and messaging. The solution expects to leverage dual encryption, supporting both the Trusted Execution Environment embedded by multiple device manufacturers and the advanced encryption on SIMs deployed by Telefónica. • Rivetz Corp – www.rivetz.com
  • 15. Karl J. Weaver 魏卡爾 OEM Biz Dev Director - China/Asia-Pacific Region Rivetz Corp www.rivetz.com 电子邮件 : kweaver@rivetz.com 微信手机号码: +1-425-647-9315 Karl J. Weaver is a wireless and mobile device ecosystem specialist in the Smart Card sector of the wireless industry. Karl is China/Asia-Pacific Business Development Director for Rivetz Corp to provide embedded mobile device security of Smartphones for the Block Chain using Rivetz developer tools for the TEE. He recently worked as OEM Biz Dev Director at ARM /Simulity Labs for design-in of eSIM and iSIM for On-Demand Connectivity (RSP) solutions for IoT, M2M and Wearables smart and connected device manufacturers. Simulity was bought by ARM last July, 2017. Karl also spent 5 years working in China for Gemalto (and Trustonic) as Rainmaker for design in of embedded Mobile NFC Payments & TEE security technologies to the OEM Smartphone/Tablet PC ecosystem. He is a Globally- trained, bilingual Mandarin Chinese speaking senior mobility executive with vast experience selling wireless & mobile device technologies from both sides of the Pacific Rim to the global OEM/ODM handset/tablet PC ecosystem supply chain. He possess a B.S degree in Business Management from Salve Regina University, Certification in Mandarin Chinese Language, Customs and Culture from National Taiwan Normal University – Mandarin Training Center and Certification in Broadband wireless communications from University of Washington (Seattle). Many presentations on Smartphone technologies can be viewed on You Tube, Youku and Tudou video streaming web sites 在优酷网站查询魏卡尔,谢了!