E-cash Application

Since 2020, Carrousel Digital has been committed to digital security by providing solutions to security flaws that are still overlooked. Carrousel Digital has therefore developed various processes to improve cybersecurity: these processes have been patented, testifying their novelty.

 

What is the Moneytak cash application?

 

Carrousel have developed the Moneytak POC application which enables cash transfer by simply placing two phones running the app back‑to‑back. This allows users to spend or share their cash in any situation, even when the network is down or permanently offline, by passing it to another person with the same app, or by using it over the internet.

 

Once the network is online, the Moneytak app can be used like any other payment app, or to credit the money it holds to the user’s bank account.

 

This app could also be used to pay with credits, for example, health credits that have been provided to pay for a medical service and it can also be enhanced to carry the associated service report.

moneytak.fr/english

This application benefits from the Random Hash technology, as well transaction chaining. It uses the NFC capability of phones to transfer money once the amount has been entered and the two devices are placed back‑to‑back.

carrouseldigital.com

Can you please describe the other technics?

 

They each address a different problem and implement different technologies, sometimes very innovative, sometimes more traditional:

  The post-quantum vulnerability in electronic signatures is addressed by an electronic signature using one-time keys and no encryption mechanism.
  The distribution of single-use keys for peer-to-peer use within a community is addressed by the so-called single-use key distribution patent, allowing network-less operations when necessary.
  The chaining of transactions is carried out in offline mode making it possible to trace the history of financial transactions carried out in offline mode and thus allowing them to be checked a posteriori.
  The security of encryption keys is addressed by a patent relating to an electronic circuit that 'automatically' erases a memory space (containing encryption keys) when the data in another memory space (containing the code of a software) is modified, rendering hardware whose firmware would have been fraudulently uncovered unusable.
   A mechanism automatically obfuscates the screen when a spy camera or a second person is detected in its field of vision, thereby securing the entry and use of PIN codes.
  A mechanism for transmitting information by entangled photons makes it possible to communicate in post-quantum security by optical fibres or by satellite.
  An optical router allows the use of a photonic network for workstations, where a simple fibre connection of said stations to a single optical router suffices.
  A geolocation system that uses electromagnetic waves in the UHF to longwave range makes it possible to locate the counterparty of an online transaction, or a user, even when they are indoors.
 

This newsletter was distributed by Government Technology published by Public Sector Information Ltd

We are processing your data under legitimate interest. For more information visit the ICO guidance. Your data may be provided to customers to enhance engagement  between buyers and suppliers in a B2G and B2B context.

To see our GDPR statement please click here. To unsubscribe click here