Cards transfer data to other cards using readers
Readers can also connect to the wifi, PCs or phones and can connect remotely or to a website!
Cards and readers have keys of all other cards and readers
and therefore do not need to access a server
cards and readers preserve the authenticity of e-notes
money can be safely passed on.
linking any offline transaction to transactions that have been reported to the server. This is what is patented and hat makes the system secure, as the server is able to discard any duplicated transaction.
Using our random hash signature ; enabling a longevity to the system whatever progress the quantum computers may do.
This is made possible by using our random hash signature which can use smaller keys enabling each card to hold enough encryption keys to communibicate with every reader . The compromission of the keys of a single card or a single reader will only affect the security of the compromised devices, while the scurity of transactions between other devices is not be affected.
A special memory protection feature unables the firmware of the devices to get the encryption keys autmoatcially deleted upon unathorised firmware upgrade. This deletion will prevent the device to be used for cash transactions until it gets uploaded with new valid keys and firmware.