Zero-Trust Security Primitives

By: Geeq  on Sep 14, 2022

Identity and Access Management (ICAM), and AI Trust, Risk, and Security Management (AI TRISM) are two areas that are in crisis today.

Geeq’s zero-trust protocol natively embeds all the principles for zero-trust security. Assets and data are microsegmented, defined by the user as tokens owned and controlled in their own accounts. Continuous authentication is managed by the owner’s account key, tied unambiguously to a responsible person (unlike the keys to a smart contract). Limit the blast radius is enforced when, if any damage is done by a stolen key, it only affects that person’s account and no one else’s.

Geeq is the cryptographic rail needed for zero-trust. Nothing and no one is extended the benefit of the doubt. All cryptographic checks for who-what-where-when are precisely defined. Only when all those conditions are checked on-chain and validated, are assets or data allowed to be moved.

Everything else fails securely.

This protocol is person, agent, and device agnostic. It scales by launching more chains, running the same protocol. Geeq provides a structural solution for verification for person-to-person, person-to-agent, and agent-to-agent transactions and marketplaces.