Since 2020, Carrousel Digital has been committed to digital security by providing solutions to security flaws that are still overlooked. Carrousel Digital has therefore developed various processes to improve cybersecurity: these processes have been patented, testifying their novelty.
|
|
|
Can you please provide more details on your Moneytak cash application?
|
We have developed the Moneytak POC application that transmits cash by tapping two phones bearing the app. This enables you to use your cash in any situation even when the network is down or when the network is always off, passing it on to someone with the same app, or indeed on the internet.
|
|
|
Once the network is on, the Moneytak app can be used as all other payment apps, or to credit the money it holds to the user’s bank account.
This app could also be used to pay with Credits, for instance health credits that would be provided to pay for a medical act and also be enhanced to carry the report on such act.
This application benefits from the Random Hash technology as well the transaction chaining. It uses the NFC capability of our phones so that money is transferred after the amount has been put in and the two phones are placed back-to-back.
|
Can you please describe the other technics?
|
They each address a different problem and implement different technologies, sometimes very innovative, sometimes more traditional:
|
• | | The post-quantum vulnerability in electronic signatures is addressed by an electronic signature using one-time keys and no encryption mechanism. |
• | | The distribution of single-use keys for peer-to-peer use within a community is addressed by the so-called single-use key distribution patent, allowing network less operations when necessary. |
• | | the chaining of transactions carried out in offline mode making it possible to trace the history of financial transactions carried out in offline mode and thus allowing them to be checked a posteriori. |
• | | The security of encryption keys is addressed by a patent relating to an electronic circuit that 'automatically' erases a memory space (containing encryption keys) when the data in another memory space (containing the code of a software) is modified, rendering unusable hardware whose firmware would have been fraudulently uncovered |
• | | a mechanism for obfuscating a screen, as soon as a spy camera or a second person approaches the screen field of vision is detected, makes it possible to secure the use of PIN codes. |
• | | A mechanism for transmitting information by entangled photons makes it possible to communicate in post-quantum security by optical fibres or by satellite. |
• | | an optical router allowing the use of a photonic network for workstations, where a simple fibre connection of said stations to a single optical router suffices. |
• | | a geolocation system using electromagnetic waves in the range of UHF to longwave, making it possible to geolocate the counterparty of an online transaction or a user, even when indoors. |
|
|
|
|