Telinov8, also known as Digital Chip Card Technology ("DCCT"), is a set of innovative telecommunications-based solutions for secure storage and wireless sharing of sensitive data or other data that require authentication.
This technology allows us to permanently insert metadata, text messages and files of any type into digital assets and wirelessly transfer data from device to device using sound or QR code as the carrier of information that underlies the transmission process.
What is a Telinov8 digital chip card?
What is a Telinov8 digital chip card?
At the heart of the Telinov8 ecosystem lies a digital chip card.
It is a digital asset that contains metadata, images, audio, video, PDF files, text messages, bank transactions, etc. built in and guarantees the fidelity and security of the way data is collected and transmitted.
The processor and memory units are integrated into a digital chip stored in the asset they form an integral part of.
Where and how do we use digital chip cards?
Where and how do we use digital chip cards?
The possibilities of applying the solutions provided by digital chip card technology are unlimited.
Here are the two types of Telinov8 digital cards that are primarily used for contactless data transfer between two devices:
An MP3 data file is an artificially produced MP3 audio file consisting of two components, an audio component and a data component;
A QR data file is a digital chip card with a QR code in the form of a 240x368 image consisting of a header with the card name and cardholder name and a QR code containing details that bring the card in direct correlation with the data stored on the remote database server.
MP3 data files and QR data files are the flywheels of audio-based data management ("ABDM") and QR-based data management ("QRBDM"), respectively.
Is data privacy protection guaranteed?
Is data privacy protection guaranteed?
Digital chip card technology ("DCCT") does not collect personal data from your devices.
On the remote server side, the service is powered by a cloud-based app that manages processes out of anyone's reach and without the possibility of manipulation.
On the client side, there is a web app that can be accessed through any web browser. There are no other apps to install and no need to use any of the pre-installed apps on your device. No registration for the service is required either.
Whether it's a smartphone, smartwatch, tablet or computer, your device will always be "DCCT-enabled". Both your privacy and the privacy of your data are fully guaranteed.
Is digital chip card technology eco-friendly?
Is digital chip card technology eco-friendly?
Absolutely. As our company strictly takes care that the technological solutions we provide are in line with the recommendations on nature conservation through protection, conservation and restoration of biodiversity, DCCT is claimed to have no harmful effects on ecosystems or the environment.
You don't have to order plastic cards to use DCCT, nor do you need additional exploitation or consumption of any environmentally harmful material.
Is digital chip card technology eligible for blockchain?
Is digital chip card technology eligible for blockchain?
Yes, it is.
A digital chip card is considered a self-verifying part of a blockchain that operates without the need for a central authority.
Instead of being locked within a single database, as is the case with centralized systems, audio and data components of digital chip cards are diversified throughout the blockchain and made available for as many computers connected to a shared peer-to-peer network as needed.
What are the multiple benefits of using digital chip card technology?
What are the multiple benefits of using digital chip card technology?
The innovative process of recording and encrypting data within MP3 data files and QR data files allows digital chip card technology ("DCCT") users to securely store and transfer sensitive and confidential information, documents, audio, video, images and text messages from device to device.
Over time, the ecosystem has been expanded with apps and services aimed at preserving data authenticity and content integrity, improving blockchain technology algorithms, providing secure channels for financial transactions, access control, copyright protection and more.
Where can digital chip card technology be used?
Where can digital chip card technology be used?
This technology can be used to pay for items in a store, withdraw money from cardless ATMs, create/mint Authentic digital assets, information/data sharing, in-store checks, after-sales product experiences, access control, track public participants, or bootstrap wireless connections.
What is Telinov8 WM?
What is Telinov8 WM?
Telinov8 WM is a desktop and cloud-based app and the driving force behind digital chip card technology ("DCCT").
It enables us to permanently insert metadata, images, audio, video, PDF files, text messages, or bank transactions directly into a digital asset, which can be of any size and any type, from small text files, Excel, Word, PDF documents and images to e-books, music albums, videos, movies and digital chip cards.
The inserted metadata and files are invisible, inaudible and in no way compromise the original file structure.
What data can we insert into a digital asset using Telinov8 WM?
What data can we insert into a digital asset using Telinov8 WM?
We can insert metadata, a text message or a file of any type, provided it is no larger than 1MB.
This is the approximate size of a file that can be embedded into a digital asset without compromising its original structure.
In addition to metadata, text messages and files, security tokens consisting of a hash code, IP address, digital signature, public key and timestamp are also built into the asset and guarantee the fidelity and security of the way data is collected and transmitted.
What is an invisible digital watermark?
What is an invisible digital watermark?
The file to be embedded into a digital asset acts as an invisible digital watermark that forms an integral part of the whole.
Digital watermark stands out as a professional and comprehensive way to protect copyright and to globally and reliably authenticate digital assets that are sold, bought, listened to, read, or viewed.
How can we read out the inserted data?
How can we read out the inserted data?
Telinov8 WM has the option to validate the watermarked digital asset, read out all the metadata you have entered, confirm the presence of security tokens and extract the watermark.
If the watermarked file has undergone any unexpected changes, an error will occur.
Where can we use Telinov8 WM?
Where can we use Telinov8 WM?
Telinov8 WM is an app designed for multiple purposes.
It can be used for copyright and intellectual property protection, for creating/minting Authentic digital assets (NFTs), as a universal metadata editor, to insert one file into a digital asset, for invisible digital watermarking, for secure data storage, for access control, as a repository for the file owner's accompanying material, etc.
What is audio-based data management technology ("ABDM")?
What is audio-based data management technology ("ABDM")?
Audio-based data management ("ABDM") is a solution for secure storage and wireless sharing of sensitive data or other data that requires authentication, as an alternative to conventional NFC (Near-field communication) technology.
ABDM enables computers, tablets, smartwatches and smartphones that are close to each other to communicate using sound as the carrier of information that underlies the transmission process.
What types of data can be stored and transmitted using ABDM?
What types of data can be stored and transmitted using ABDM?
You can share photos, audio and video files, documents, send text messages, or make secure payments.
ABDM is designed to store and transfer sensitive information and files limited to 1MB.
This is the approximate size of a file that can be embedded in another file without compromising its structure.
How do we transfer data from device to device?
How do we transfer data from device to device?
We need two devices, be they smartphones, tablets or computers. Data is wirelessly shared between them using sound as the carrier of information that underlies the transmission process. One of the devices generates (broadcasts) an audio signal and sends it through the speakers to the microphone of the other device, which should record that signal and forward it to the remote database server for further processing.
How close do devices need to be when transferring data?
How close do devices need to be when transferring data?
It is necessary to provide direct visibility between the two devices. The speaker of the device emitting the audio signal must be as close as possible to the microphone of the device receiving the signal to reduce the impact of ambient noise.
Does ABDM use smart cards?
Does ABDM use smart cards?
No, it doesn't and that is one of the biggest advantages of ABDM tehchnology.
You don't have to use any accessories such as smart cards or point-of-sale (POS) card readers, or install any app that could potentially compromise your privacy. Only use your personal device that you carry with you every day.
Whether it's a smartphone, smartwatch, tablet or computer, it will always be "ABDM-enabled".
What are the advantages of ABDM over NFC technology?
What are the advantages of ABDM over NFC technology?
The benefits of using ABDM over NFC and other similar technologies are numerous. Here are some of the most important ones:
ease and efficiency of use;
security of data transmission and storage, including data privacy protection;
there is no possibility of compromising data;
cost savings - no training is required to use ABDM and there are no additional costs for the purchase of equipment (POS terminals, etc.), because no additional equipment is required;
your device is always "ABDM-enabled".
What are the advantages of ABDM over QR codes?
What are the advantages of ABDM over QR codes?
A QR (Quick Response) code is a two-dimensional barcode that contains a large amount of data and can be quickly and easily encoded, generated or created, as well as decoded, read or scanned.
Although easy to use, QR codes have one major security flaw - no one knows in advance what lies behind the barcode image. A QR code can be created by anyone (the authenticity of a QR code cannot be verified) and any content can be placed in it, even malicious content.
You won't know what the content of the QR code is until you scan it, which is a bad recommendation for those for whom data security is a priority.
The exception is QR-based data management ("QRBDM") technology, which uses a QR code as the carrier of information, but the QR code here may only contain data that is used to connect a digital chip card to the remote database server and cannot be malicious.
Where is the data stored?
Where is the data stored?
Photos, audio and video files, documents, text messages, XML files and other items are encrypted and securely stored in digital chip cards, which are located both on the remote database server and on users' smartphones, tablets and hard drives.
What is an MP3 data file?
What is an MP3 data file?
An MP3 data file is an artificially produced MP3 audio file that consists of two components, an audio component and a data component. The audio component of an MP3 data file is the audio signal carrier.
It corresponds to the content contained in the data component of an MP3 data file and is accompanied by security tokens consisting of a hash code, an IP address, a digital signature, a public key, and a timestamp embedded in that file.
The audio signal carrier provides cryptographic encryption (protection) of the MP3 data file and prevents alteration, loss, corruption or misuse of its contents along the way.
This encrypted data set and security tokens are used to establish reliable and secure channels for the transfer of files and information.
Why is an MP3 data file chosen to store data in it?
Why is an MP3 data file chosen to store data in it?
MP3 audio is chosen primarily for its convenient structure.
Each MP3 audio, by default, contains an audio component, and ABDM bases its data transfer algorithms on audio as the carrier of information necessary to meet the transmission requirements.
In addition, the audio component is used to locate, encrypt and decrypt the content contained in the data component of the MP3 file. Hence the name of the MP3 file "data", whose structure and composition are far more complex than that of an ordinary MP3 audio file.
Does ABDM use ID3 tags to store data in an MP3 data file?
Does ABDM use ID3 tags to store data in an MP3 data file?
No, it doesn't. The ABDM technique for storing files, information, documents, text and transaction messages is different from other solutions and is not publicly available.
Can the same MP3 data file be used more than once?
Can the same MP3 data file be used more than once?
MP3 data files are located both on the remote database server and on users' smartphones, tablets and hard drives.
The same MP3 data file can be used more than once, but a new MP3 data file can also be generated upon each new use, depending on what it is used for.
For example, if you are transferring information from your digital business card from phone to phone, it makes sense that each new recipient can download the entire MP3 data file that contains your business card and share it with as many clients and partners as possible.
On the other hand, if you send the payment instruction, the corresponding MP3 data file will be removed from the remote database server as soon as the transaction has been completed.
Why is this necessary? Because if someone records the audio signal used to transfer your confidential data, accidentally or intentionally, they will not be able to misuse that recording - it no longer corresponds to any file on the remote database server and can no longer be processed.
Can an MP3 data file be shared between different users?
Can an MP3 data file be shared between different users?
Yes, it can. If used multiple times, there are several ways to treat an MP3 data file. We can use it to initiate wireless data transfer between two devices, send as an e-mail attachment, or share via messaging apps such as Viber, Whatsapp, etc.
Can data be compromised during transmission?
Can data be compromised during transmission?
No, it can't. Even if an audio signal is intercepted during transmission, users are not exposed to any risk, as such information does not contain sensitive user data that could be compromised.
Can data be compromised after it's been stored?
Can data be compromised after it's been stored?
No, it can't. The audio signal locates, encrypts and digitally signs the files and information attached to the MP3 data file.
In addition, ABDM provides security tokens, which consist of a hash, IP address, timestamp, public key, and digital signature.
Security tokens can never be altered, removed, damaged or misused in any way.
They are permanently embedded in the MP3 data file and are responsible for verifying the authenticity and integrity of the data being stored and transmitted.
How do we initiate data transfer from device to device?
How do we initiate data transfer from device to device?
First and foremost, bring the devices close to each other.
To reduce the effects of ambient noise, make sure that the speaker of the device transmitting the audio signal ("transmitter") is as close as possible to the microphone of the device receiving the signal ("receiver").
Search for the MP3 audio file on the transmitter and keep playing it for at least 5 seconds while recording sound on the receiver.
When the recording is completed, the recorded data will be automatically forwarded to the remote database server for further processing.
What is QR-based data management technology ("QRBDM")?
What is QR-based data management technology ("QRBDM")?
QR-based data management ("QRBDM") is a solution for secure storage and wireless sharing of sensitive data or other data that requires authentication, as an alternative to conventional NFC (Near-field communication) technology.
QRBDM enables computers, tablets, smartwatches and smartphones that are close to each other to communicate using QR code as the carrier of information that underlies the transmission process.
What types of data can be stored and transmitted using QRBDM?
What types of data can be stored and transmitted using QRBDM?
You can share photos, audio and video files, documents, send text messages, or make secure payments.
QRBDM is designed to store and transfer sensitive information and files limited to 1MB.
This is the approximate size of a file that can be embedded in another file without compromising its structure.
How do we transfer data from device to device?
How do we transfer data from device to device?
We need two devices, be they smartphones, tablets or computers. Data is wirelessly shared between them using QR code as the carrier of information that underlies the transmission process.
A QR (Quick Response) code is a two-dimensional barcode that contains a large amount of data and can be quickly and easily encoded, generated or created, as well as decoded, read or scanned.
One of the devices displays the QR code, while the other sets the camera so that the QR code appears on the screen.
Once scanned, the data is automatically forwarded to the remote database server for further processing.
How close do devices need to be when transferring data?
How close do devices need to be when transferring data?
It is necessary to provide direct visibility between the two devices.
The screen of the device that displays the QR code must be as close as possible to the camera of the device that scans the code to reduce the impact of ambient noise.
Does QRBDM use smart cards?
Does QRBDM use smart cards?
No, it doesn't and that is one of the biggest advantages of QRBDM tehchnology.
You don't have to use any accessories such as smart cards or point-of-sale (POS) card readers, or install any app that could potentially compromise your privacy. Only use your personal device that you carry with you every day.
Whether it's a smartphone, smartwatch, tablet or computer, it will always be "QRBDM-enabled".
What are the advantages of QRBDM over NFC technology?
What are the advantages of QRBDM over NFC technology?
The benefits of using QRBDM over NFC and other similar technologies are numerous. Here are some of the most important ones:
ease and efficiency of use;
security of data transmission and storage, including data privacy protection;
there is no possibility of compromising data;
cost savings - no training is required to use QRBDM and there are no additional costs for the purchase of equipment (POS terminals, etc.), because no additional equipment is required;
your device is always "QRBDM-enabled".
Where is the data stored?
Where is the data stored?
Photos, audio and video files, documents, text messages, XML files and other items are encrypted and securely stored in digital chip cards, which are located both on the remote database server and on users' smartphones, tablets and hard drives.
What is a QR data file?
What is a QR data file?
A QR data file is a digital chip card with a QR code in the form of a 240x368 image consisting of a header with the card name and cardholder name and a QR code containing details that bring the card in direct correlation with the data stored on the remote database server.
The header and the QR code are inseparably associated so that QR data file is considered indivisible for the purposes of its implementation.
In addition to metadata, text messages and files built into the card, security tokens consisting of a hash code, IP address, digital signature, public key and timestamp are also embedded in the card and guarantee the fidelity and security of the way data is collected and transmitted.
Can the same QR data file be used more than once?
Can the same QR data file be used more than once?
QR data files are located both on the remote database server and on users' smartphones, tablets and hard drives.
The same QR data file can be used more than once, but a new QR data file can also be generated upon each new use, depending on what it is used for.
For example, if you are transferring information from your digital business card from phone to phone, it makes sense that each new recipient can download the entire QR data file that contains your business card and share it with as many clients and partners as possible.
On the other hand, if you send the payment instruction, the corresponding QR data file will be removed from the remote database server as soon as the transaction has been completed.
Why is this necessary? Because if someone scans the QR code used to transfer your confidential data, accidentally or intentionally, they will not be able to misuse that scan - it no longer corresponds to any file on the remote database server and can no longer be processed.
Can an QR data file be shared between different users?
Can an QR data file be shared between different users?
Yes, it can. If used multiple times, there are several ways to treat an QR data file. We can use it to initiate wireless data transfer between two devices, send as an e-mail attachment, or share via messaging apps such as Viber, Whatsapp, etc.
Can data be compromised during transmission?
Can data be compromised during transmission?
No, it can't. Even if the QR code is intercepted during transmission, users are not exposed to any risk, as such information does not contain sensitive user data that could be compromised.
Can data be compromised after it's been stored?
Can data be compromised after it's been stored?
No, it can't. The QR code locates, encrypts and digitally signs the files and information attached to the QR data file.
In addition, QRBDM provides security tokens, which consist of a hash, IP address, timestamp, public key, and digital signature.
Security tokens can never be altered, removed, damaged or misused in any way.
They are permanently embedded in the QR data file and are responsible for verifying the authenticity and integrity of the data being stored and transmitted.
How do we initiate data transfer from device to device?
How do we initiate data transfer from device to device?
First and foremost, bring the devices close to each other.
To reduce the effects of ambient noise, make sure that the screen of the device that displays the QR code ("transmitter") is as close as possible to the camera of the device that scans the code ("receiver").
Search for the digital chip card that represents the QR data file on the transmitter.
At the same time, position the camera on the receiver so that the QR code from the data file appears on the screen.
Once scanned, the data is automatically forwarded to the remote database server for further processing.
#Set out for the future with ABDM
#Audio-based data management technology ("ABDM") allows computers, tablets, smartwatches and smartphones that are near each other to securely store and wirelessly share sensitive data or other data that require authentication, using sound as the carrier of information that underlies the data transmission process.
You can share photos, audio and video files, documents, send text messages, or make secure payments.