Lek ؋ $ ƒ $ ₼ $ $ Br BZ$ $ $b KM P лв R$ $ ៛ $ $ $ ¥ $ ₡ kn ₱ Kč kr RD$ $ £ $ € £ $ ¢ £ Q £ $ L $ Ft kr ₹ Rp ﷼ £ ₪ J$ ¥ £ лв ₩ ₩ лв ₭ £ $ ден RM ₨ $ ₮ MT $ ₨ ƒ $ C$ ₦ kr ﷼ ₨ B/. Gs S/. ₱ zł ﷼ lei ₽ £ ﷼ Дин. ₨ $ $ S R ₨ kr CHF $ £ NT$ ฿ TT$ ₺ $ ₴ £ $ $U лв Bs ₫ ﷼ Z$
Trust Nexus ~ Secure Mobile Identity / Money
Home Overview Distributed Ledgers Finance Future Potential FAQ Test Contact License
The future potential of the Trust Nexus is truly extraordinary.

Privacy Protection ~ Single Sign-On ~ Simplified Federation ~ Cyber-Security ~
Political Impact ~ Third World Development ~
The future potential of the Trust Nexus is truly extraordinary.
Privacy Protection
One of the most important aspects of our technology is that we secure identity while protecting privacy.  Our technology provides a 100% privacy protection.
An organization can maintain complete control of its authentication process under the Trust Nexus.  Our infrastructure technology can exist as an insulated microcosm within corporations or government agencies when there is no need for third party validation of credentials (e.g., a corporation or government agency simply wants to authenticate its own users).  When third parties must rely on credentials (e.g., drivers licenses, passports, financial credentials, insurance credentials, etc.) there will be a public identity infrastructure that will be managed through The Worldwide Distributed Ledger for Credential Providers
We do not store personal data.  We simply store associations between public keys and credential providers.  We change the mind set of authenticating using personal data; instead, the only thing that matters is an institutional validation represented by a cryptographically valid digital credentials.
If you are a member of the Secret Moose Lodge of Ottumwa, Iowa, your digital credential can be validated under the Trust Nexus without any detailed information about you or your organization being revealed. 
Under the Trust Nexus it is possible for users to create pseudo-identities and conduct financial transactions in complete anonymity.  Users are always in complete control.  They can create accounts with their "legal identity" or choose from one or more pseudo-identities that they have created for various purposes.
Under the Trust Nexus the user's credentials cannot be accessed if his/her mobile device is lost or stolen.  We have solved this problem without needing access to the secure element of the mobile device.  We do not use password based encryption so a brute force attack would not be successful.  There are no dependencies on "phone lock" OS processes which can be incredibly weak. [refA] [refB]  The dependencies are on independent cryptographic processes.
Single Sign-On
The systems of the Trust Nexus provide an efficient single sign-on process.  One of the goals of single sign-on is to eliminate the hassles (for both users and administrators) of managing multiple usernames and passwords.
Within the Trust Nexus a user will experience single sign on to his/her mobile device.  Once signed on, a user will be able to touch a button on his/her mobile device and securely authenticate to a web based or mobile application.
For users, the "One Touch Sign On"™ process is incredibly simple.
A user signs on to his/her mobile device by entering a six digit HEX pin.
Rather than entering a user name and password into a web form, under the Trust Nexus a user simply touches the "Sign On" button.
One of the most significant benefits in using the Trust Nexus for single sign-on is that there are no administrative requirements for managing or coordinating passwords.  This process is far superior to other architectures for single sign on, especially the process provided by SAML.
Simplified Identity Federation
When utilizing the infrastructure created by the Trust Nexus it will be a very simple process for organizations to federate the identity of their users.
From the credential provider's viewpoint the only difference between creating a standard credential and creating a federated credential is that a simple REST call is made to retrieve user information.  The REST call will return a transactionUuidSigned by the user's credential provider and also return a data package (user profile, public key, etc.) for the user.
Medical Records Security and Transportability
The Trust Nexus will enable users to secure and instantly access their medical and insurance records.  This will greatly improve the efficiency of the world's health care system by, "streamlining patient interactions and enhancing patient satisfaction throughout the healthcare process."
Improved Cyber-Security
The source code for all systems within the Trust Nexus is available for download.  Corporations and government agencies will be able to install and manage their own infrastructure for user authentication and authorization.  Secure authentication removes THE major attack vector against information technology systems.
The credentials of the Trust Nexus will also make possible advanced system architecture proposed by computer scientist Peter G. Neumann; these advanced system architectures could eliminate most of the remaining attack vectors against information technology systems.
From a recent New York Times article: "One design approach that Dr. Neumannís research team is pursuing is known as a tagged architecture.  In effect, each piece of data in the experimental system must carry 'credentials' ó an encryption code that ensures that it is one that the system trusts.  If the data or programís papers are not in order, the computer wonít process them.  A related approach is called a capability architecture, which requires every software object in the system to carry special information that describes its access rights on the computer, which is checked by a special part of the processor."
Political Impact
The Trust Nexus will greatly influence political events by reintroducing classical Greek democracy to the world.  Unlike current on-line polls that can be "spammed" multiple times by a single user or a group of users, on-line polls conducted under the Trust Nexus will be validated for user uniqueness.
Users could also volunteer to provide their demographic profiles to the on-line pollsters enabling political scientists to extricate more meaningful conclusions from their polls.  Ultimately, secure on-line voting will become a reality that will lead to an ever-increasing number of local, national and world plebiscites.  There will come a time in the near future when a consortium of major news organizations will call a worldwide referendum.
Third World Development
Stated as a fundamental principle of economics: Identity is the foundation of financial rights.
"In battling poverty in the developing world with affordable financial services, there is nothing quite as democratizing as the ubiquitous cellphone.  Few proponents of economic growth would quibble with the belief that banking is integral to the foundation that society is built on, but a full one billion of the globeís five billion cellphone owners have no access to financial services.  That makes mobile banking the perfect way to bring the unbanked and underbanked into societyís fold..."  [Waiting for the Call]
"Embracing the financial services ecosystem gives poor people the ability to leverage their existing wealth, to plan for the future better, to save resources and to interact outside of their neighborhood."  [Waiting for the Call]
The technologies of the Trust Nexus will bring secure financial services to the developing world and make it possible to directly provision resources to user's cellphones.  Corrupt governments will be bypassed.
© Copyright 2018 ~ Trust Nexus, Inc.
All technologies described here in are "Patent Pending".