• Home
  • E-cash
  • E-Idendity
  • Plus
    • Home
    • E-cash
    • E-Idendity
  • Connectez-vous
  • Créer un compte

  • Réservations
  • Mon compte
  • Connecté en tant que :

  • filler@godaddy.com


  • Réservations
  • Mon compte
  • Se déconnecter

Connecté en tant que :

filler@godaddy.com

  • Home
  • E-cash
  • E-Idendity

Compte


  • Réservations
  • Mon compte
  • Se déconnecter


  • Connectez-vous
  • Réservations
  • Mon compte

Moneytak in detail..

hand to hand

Cards transfer data to other cards using readers

or through the web

Readers can also connect to the wifi, PCs or phones and can connect remotely  or to a website!

a secure thread

Cards and readers have keys of all other cards and readers

resilient to network crashes

and therefore do not need to access a server 

preserves cash

preserves cash

cards and readers preserve the authenticity  of e-notes

you can spend

preserves cash

money can be safely passed on.

How does it work ?

linking any offline transaction to transactions that have been reported to the server. This is what is patented and hat makes the system secure, as the server is able to discard any duplicated transaction.


Using our random hash signature ; enabling a longevity to the system  whatever progress the quantum computers may do.


This is made possible by using our random hash signature which  can use smaller keys enabling each card to hold enough encryption keys to communibicate with every reader . The compromission of the keys of a single card or a single reader will only affect the security of the compromised devices, while the scurity of transactions between  other devices  is not be affected.


A special memory protection feature unables the firmware of the devices to get the encryption keys autmoatcially deleted upon unathorised firmware upgrade. This deletion will prevent the device to be used for cash transactions until  it gets uploaded with new valid keys and firmware. 


Patents

US10643198B2  CN110443595B  FR3139396A1  FR3122749B1

Optimisé par

  • Quantum Safe Hash
  • Secured OTK
  • Secured QKD
  • Entangled Photons Trans
  • Secure Data Transmission
  • Teleportation
  • Indoor GPS
  • OTK Distribution
  • Spying Protection
  • Photonic Router

Ce site Web utilise les cookies.

Nous utilisons des cookies pour analyser le trafic du site Web et optimiser votre expérience du site. Lorsque vous acceptez notre utilisation des cookies, vos données seront agrégées avec toutes les autres données utilisateur.

RefuserAccepter