The Rivetz Network


Learn about the problem we solve.

Devices power chains. If you remember anything here, remember that devices power chains.

In the transition to blockchain-based applications for government, finance, healthcare, loyalty programs, and many consumer services, we benefit from the openness, trustworthiness, and immutability that the blockchain brings. The reliability and security of the application engines that we interact with is assured by the inherent characteristics of the distributed blockchain and by implementations based on open-source software with peer reviewed distributed by myriad computer nodes participating in the protocol. This creates a permanent recording of all transactions, with the promise of perpetual execution of smart contracts.

A blockchain performs what you ask it to – reliably and repeatedly.

Blockchains implement instructions. A blockchain is presented with a request to perform a transaction. Blockchains are instructed to perform these operations based on cryptographically signed requests, where a cryptographic secret (referred to as a private key) is used to authorize a message. Blockchains can recognize a private key but cannot determine a valid key from an unauthorized copy. As we transition to the reliability and security of blockchain applications, we must ensure that we protect our private keys.

Blockchains were initially developed to address currency, one of the few applications where true anonymity generally is desired. However, most every other blockchain application will want to evaluate the correctness of the device and its user. This will require forensic auditability, not only of the transaction, but also to validate the identity, capability, and current health of the device instructing the blockchain. Known device, known user, known condition.

The smartphone is anticipated to be the largest holder of private keys in the new blockchain economy. As carriers develop and deploy enhanced connectivity services, including the support for other connected devices such as autos and our homes, and the digital user eases into these new and more reliable services, the most widely connected consumer device will continue to be the application point of interactions.

Smartphones hold keys. Smartphones must be protected.

Devices power blockchains. Rivetz protects devices.