Device security and application security leader Trustonic today announces the integration of its Trusted Execution Environment (TEE)* APIs into Rivetz’s flagship software development kit for securing blockchain-based applications. The use of Trustonic’s APIs means that developers using the Rivetz platform will automatically have access to the decentralized cyber security protections and controls required when developing blockchain, IoT and cloud applications for high-risk industries such as financial services, legal and healthcare.
The integration of Trustonic’s technology into the Rivetz platform means that the private keys and instructions in applications can be executed in an area protected from the device’s normal operating system. This is necessary because rich operating systems (OS) have software and hardware vulnerabilities, which can be exploited by hackers and malware looking to take control of applications or to steal sensitive data. The Rivetz Authenticator uses the Trustonic TEE to provide advanced security capabilities such as storing and creating two-factor codes in a device’s hardware, which provides greater levels of security than software protection alone. Along with an encrypted backup and restore feature, this provides the user with a safer alternative to SMS and other software-only two-factor authentication methods.
Ben Cade, CEO of Trustonic, adds: “Foundational, end-to-end security built in at the hardware level is crucial to protect both consumers and enterprises. Blockchain will enable transformational use cases that unlock tremendous market potential and value, so robust security and trust is essential. We look forward to continuing to enable and support Rivetz as they deliver a new level of truly secure blockchain apps to the market.”
The Rivetz solution is compatible with the 1.5 billion+ Trustonic-enabled devices that have already been deployed in the market, providing developers with simple tools to enhance their applications and offer a simpler and safer solution for the user. The new models of frictionless commerce will both protect users’ identity and improve their privacy on the network.