Home Overview Future Potential FAQ Protocols Test Contact License
The future potential is truly extraordinary.

Privacy Protection - Single Sign-On - Simplified Identity Federation - Medical Records Security and Transportability - Improved Cyber-Security - Political Impact - Third World Development;
The future potential of the Trust Nexus is truly extraordinary.
Privacy Protection
One of the most important aspects of our technology is that we secure identity while protecting privacy.  Our technology provides a 100% privacy protection.  We do not store personal data, we simply store associations between public keys and digital credentials.  We change the mind set of authenticating using personal data; instead, we verify institutional validations.
If you are a member of the Secret Moose Lodge of Ottumwa, Iowa, your identity credential can be validated under the Trust Nexus without any detailed information about you or your organization being revealed.  We simply verify the institutional validation that was created when your credential was issued.
Under the Trust Nexus it is possible for users to create pseudo-identities and conduct financial transactions in complete anonymity.  Users are always in complete control.  They can create accounts with their "legal identity" or choose from one or more pseudo-identities that they have created for various purposes.
Additionally, under the Trust Nexus once a financial institution has provisioned a credential to a user's mobile device in a valid institutional process, the user can conduct secure financial transactions without revealing any information about the details of the financial credential or the user.  Through secure cryptographic processes the user's mobile device will receive the transaction details from the seller's web application (or retail POS terminal).  The user's financial credential UUID will be added to these transaction details which will be cryptographically signed with the user's private key and returned to the seller's web application.  The seller's web application verifies the data packet, signs the data packet with the seller's private key and sends the data packet, the user's signature block and the seller's signature block to the payment processor.  The payment processor verifies both signature blocks (with public keys on file) then sends the information to the financial institutions to processes the debits/credits.
When a financial institution receives a request for payment containing the data packet (which includes the user's financial credential UUID) and the user's signature block, the financial institution can easily verify the the legitimacy of the request because the financial institution created the original financial credential UUID (and the association with the user's UUID and public key) when the credential was provisioned to the user's mobile device in a valid institutional process.
When everything is done and the seller receives payment, the seller only knows that there is an association between the user's financial credential UUID and the user's public key.  All other information could remain private at the user's discretion.  The fact that the user's private key is secured on his/her mobile device and that the financial credential was provisioned in a valid institutional process, means that the seller, payment processor and financial institution can be certain that the financial credential and the user are valid or the user gave his/her mobile device and six digit HEX pin (1/16,777,216) to someone else.
Maintaining the associations ("users/credentials/public keys"; "sellers/financial accounts/public keys") will be the essential functionality of a worldwide identity infrastructure for financial transactions and other three party credentials (driver's licenses, passports, insurance credentials, etc.).  Paradoxically, this worldwide identity infrastructure will contain no personal data.
Single Sign-On
The systems of the Trust Nexus provide an efficient single sign-on process.  One of the goals of single sign-on is to eliminate the hassles (for both users and administrators) of managing multiple usernames and passwords.
Within the Trust Nexus a user will experience single sign on to his/her mobile device.  Once signed on, a user will be able to touch one button on his/her mobile device and securely authenticate to a web based or mobile application.
For users, the "One Touch Sign On"™ process is incredibly simple.
A user signs on to his/her mobile device by entering a six digit HEX pin.
Rather than entering a user name and password into a web form, under the Trust Nexus a user simply scrolls to the appropriate credential in the TNX Secure Mobile App and touches the credential icon.
One of the most significant benefits in using the Trust Nexus for single sign-on is that there are no administrative requirements for managing or coordinating passwords.  This process is far superior to other architectures for single sign on, especially the process provided by SAML.
Simplified Identity Federation
When utilizing the infrastructure created by the Trust Nexus it will be a very simple process for organizations to federate the identity of their users.  Click here for more details.
Medical Records Security and Transportability
The Trust Nexus will enable users to secure and instantly access their medical and insurance records.  This will greatly improve the efficiency of the world's health care system by, "streamlining patient interactions and enhancing patient satisfaction throughout the healthcare process."
Improved Cyber-Security
The source code for all systems within the Trust Nexus is available for a nominal license fee.  Corporations and government agencies will be able to install and manage their own infrastructure for user authentication and authorization.  Secure authentication removes THE major attack vector against information technology systems.
The credentials of the Trust Nexus will also make possible advanced system architecture proposed by computer scientist Peter G. Neumann; these advanced system architectures could eliminate most of the remaining attack vectors against information technology systems.
From a recent New York Times article: "One design approach that Dr. Neumannís research team is pursuing is known as a tagged architecture.  In effect, each piece of data in the experimental system must carry 'credentials' ó an encryption code that ensures that it is one that the system trusts.  If the data or programís papers are not in order, the computer wonít process them.  A related approach is called a capability architecture, which requires every software object in the system to carry special information that describes its access rights on the computer, which is checked by a special part of the processor."
Prior to the implementation of these advanced architectures, the credentials of the Trust Nexus will enable an efficient, cryptographically signed, "Whitelist" of executables that are allowed to run on a given system.
Political Impact
The Trust Nexus will greatly influence political events by reintroducing classical Greek democracy to the world.  Unlike current on-line polls that can be "spammed" multiple times by a single user or a group of users, on-line polls conducted under the Trust Nexus will be validated for user uniqueness.
Users could also volunteer to provide their demographic profiles to the on-line pollsters enabling political scientists to extricate more meaningful conclusions from their polls.  Ultimately, secure on-line voting will become a reality that will lead to an ever-increasing number of local, national and world plebiscites.  There will come a time in the near future when a consortium of major news organizations will call a worldwide election.
Third World Development
Stated as a fundamental principle of economics: Identity is the foundation of financial rights.
"In battling poverty in the developing world with affordable financial services, there is nothing quite as democratizing as the ubiquitous cellphone.  Few proponents of economic growth would quibble with the belief that banking is integral to the foundation that society is built on, but a full one billion of the globeís five billion cellphone owners have no access to financial services.  That makes mobile banking the perfect way to bring the unbanked and underbanked into societyís fold..."  [Waiting for the Call]
"Embracing the financial services ecosystem gives poor people the ability to leverage their existing wealth, to plan for the future better, to save resources and to interact outside of their neighborhood."  [Waiting for the Call]
The technologies of the Trust Nexus will bring secure financial services to the developing world and make it possible to directly provision resources to user's cellphones.  Corrupt governments will be bypassed.
© Copyright 2017 ~ Trust Nexus, Inc.
All technologies described here in are "Patent Pending".