Prezentare Cryptodata1 Compressed

Download as pdf or txt
Download as pdf or txt
You are on page 1of 90

Who is CryptoDATA ?

Founded in 2013, CryptoDATA represents a company providing IT solutions in cyber-


security, developed using blockchain technology and A.I systems. Our promise is to
offer users worldwide security based on decentralization. Our aim is that every person
could communicate freely and securely.

Where is CryptoDATA located ?


CryptoDATA has started its activity in Romania by developing the biggest encrypted
information processing data-center in Europe. In 2015, the company’s Headquarter
relocated to Bucharest, the capital of Romania, and opened a new data center for
processing. In 2018, by announcing the launch of the first encrypted smartphone
working on blockchain – IMPulse K1 and, also, by launching the innovative VOBP
technology, the company has expanded its activity in Stuttgart, Germany.
At the moment, the company has offices and work points in Singapore and UK, and
operates, also, through partners located in the USA, Canada, Russia, South Africa,
Colombia, Brazil, Australia, South Korea and India. Our company’s mission is to create a
decentralized community and to provide access to our innovative technology to all
people from every corner of the world.
Who owns CryptoDATA?
CryptoDATA is a private equity company entirely owned by its employees. The shareholding
system was implemented in 2019 through CryptoDATA Tech S.R.L. This system was created in
accordance with the blockchain’s functioning, the decision-making power in the company
being granted as 50% + 1 within the heads of departments. No governmental agency or
external organization owns shares in CryptoDATA.

Who controls and manages CryptoDATA?


CryptoDATA has a solid, efficient and innovative governance system. Each employee who is
promoted in a leadership position within a certain department automatically becomes a
shareholder with voting rights in the organization’s decision-making process. The CEO
position is held by one of the company’s founders, whose decisions are analyzed and approved
by the other shareholders before being implemented.
The shareholding committee exercises the decision-making authority for the corporate
strategy and operational management. It represents the highest entity responsible for the
corporate strategy, operations management and customer satisfaction.

Who does CryptoDATA work with?


Externally, we rely on our customers. They represent the core of the company, as we
continuously improve our work through their feedback, and everything we develop is for
providing innovative products designed to maintain the community secured and make its
members’ lives easier.
Internally, the most important component of the company is made up of its human resource.
Dedication represents the most illustrative quality of CryptoDATA’s work ethic. In this
company, the head of every department is actively involved in the mentorship of its members
in order for them to achieve professional evolution. Commitment and evolution are rewarded
by being accepted on the company’s shareholder board.
Core Values of CryptoDATA

Customers First
The activity of the CryptoDATA company is dedicated to the users’ requirements because, in
our conception, they represent the engine of the whole system. Our company aims to deliver
long-term value through increased receptivity towards the users’ community. The
decentralized community should have access to technology through simple means for easing
their activities.

Smart Innovation
Advanced technologies have opened the gates for a new industrial revolution through which
everything alters and develops with huge speed. These technologies open the way to a new
world, where all devices are intelligent, connected and communicating to ease our entire
activity. One of the main goals of our company is to bring innovation through its developed
products and services.

Privacy and Security


CryptoDATA has a very strict policy regarding privacy and security. Our developed
technologies and products have a proven track record in terms of protection and our cyber-
security practices have won our users’ and partners’ trust worldwide. Our solutions are and
always be oriented towards our users’ privacy and security, as our company’s statement -
“privacy is the new order” underlies their development.

Integrity and Transparency


These are our most important qualities within the company. CryptoDATA’s policy states that
these values should be applied both between the company’s employees, as well as within the
relationship with its customers. Transparency is one of our most important values because it
helps us keep our promises towards our users and partners and build a community based on
respect.

Speed and Experience


For conducting its activity, CryptoDATA has gathered experience in what concerns data
transfer’s protection and, also, efficient ways of approaching and developing different solutions
related to both internal and external projects. Both intelligent devices and users’ needs are
expanding with increasingly high speed, which leads to the opening up of new horizons in
terms of industrial development. At CryptoDATA, we constantly strive to innovate industrial
models and key technologies in order to provide top products and services that are
imperatively required to be elegant, user-friendly and safe, and, most importantly, developed
and delivered in accordance with the flow of the users’ needs.
What do we offer to the world?
We create value to our customers. Together
with our partners, we develop products
based on innovative technologies in order to
make our clients’ lives easier and to keep
them secured at the same time.

We ensure solutions for our customers’


projects. The company delivers a premium
service, that of transforming every client’s
idea into a finished product by, also,
providing solutions for production,
industrialization, sale and distribution.

We provide secure data transfer


technologies. The company’s main priority is
its users’ cyber-security and the protection
of their privacy. By implementing
CryptoDATA’s patented technology – the
VOBP, we have securely connected over
1500000 users worldwide in the year 2019.

We promote technology development and


global digitalization. CryptoDATA’s strategy
is the investment in the human resource to
help create innovative technology solutions.
An educated community revolutionizes the
world and favors work simplification.

We facilitate the creation of a decentralized


ecosystem. The exchange of information
represents the most important element in
an ecosystem’s development, and having
decision-making power upon that
exchange is the main element that favors
the consolidation of a decentralized
ecosystem.
The main characteristic of the modern world created. Our solutions to be implemented will
is speed - its speed to change and to evolve. remove all the imposed limitations of the
As a representative of CryptoDATA, I make current technologies.
sure, and assure you as well, that the
company’s promises to its customers are and From my point of view, electric power
will continue to be honored and that we will represents an infinite resource that everyone
pursue innovation through our technologies, has the right to produce, transfer or trade. The
products and services. implementation of the Bank of Energy digital
platform and Smart Battery Sharing concept
Our company’s mission is to overcome will eliminate the borders of mobility. Electric
technology’s limitations and share the social cars will no longer be conditioned by
progress with the entire community. recharging time and autonomy, smart
The technology of informational portable devices will no longer become
communications is developing fast, thus it immobile when we need to restore their
has become a necessity for both industries capacity, and electricity will become a digital
and corporations, as well as for any individual. asset similar to money and stocks.
Our goal is to create a global communication
network for data transfer so as to overcome The greatest challenge for us is the
the limitations of current technology. development and implementation of the
Blockchain Interplanetary Decentralized
Nowadays, the digital sphere represents a Data Communication [BIDDC] ecosystem.
new smart world that everyone is part of, This represents a complex objective which
whether being in the period of transition or could be accomplished through
active participation. Within this ecosystem, all determination and collaboration between the
devices are connected to one another - CryptoDATA’s team and the blockchain users.
smartphones, laptops, cars, homes, Our work is oriented towards Research and
everything. Development and towards instilling
knowledge to our users.
Having accumulated extensive experience The community’s mission is to share the
both in the blockchain and A.I. fields, information, educate other members of the
CryptoDATA dared to embark on the industry network and send us feedback concerning
of communication and information transfer their experience and needs.
in a unique way. The implementation of
blockchain algorithms in the The testing of the first satellite in the Globar-
communications system has led to the LINK network brings us closer to the BIDDC
development of the Voice Over Blockchain technology’s implementation and helps us
Protocol [VOBP] technology. This technology overcome the current barriers. This satellite
employs an innovative architecture which has network will provide users global coverage
taken information security to a new level. We with incredible speed which works on
consider that, currently, this is the most architecture based on complete security.
powerful and efficient data transfer algorithm
and, to strengthen our claim, our company is As we work towards our goals, we’ll always
offering a considerable amount of money to employ a high level of cyber-security and
whomever is able to prove otherwise, through users’ protection solutions’ development. Our
our recently launched hack-tournament. promise, and especially mine, is that we’ll
invest all the necessary resources for creating
Another necessity arising as a result of the an ecosystem that will provide privacy,
digitalization and development of global decentralization, security and innovation to
technology is represented by electric power. the people.
Every device in the world needs power in
order to fulfill the purpose for which it was
What is CryptoDATA?
A cutting-edge technology company focused on developing both internal and external
projects. CryptoDATA offers design, development and production solutions within a wide
range of fields.

Software Gaming
Our programming team develops software CryptoDATA develops both internal and
incorporating a complex architecture to external projects in the gaming industry,
offer solutions for every project’s with technologies usable in PC and Mobile
development. domains.

Graphic Design Economics


Our company can analyze the products’ In the digital era, transactional platforms’
objectives and visually develop a design development represents a requirement.
that offers a unique user-experience CryptoDATA develops platforms and offers
through engineering design, solutions for connecting financial resources
cinematographic effects, as well as app and with the digital world. The complete
web interface and design. As a result of the solution package for customers may
vast experience acquired by each team consist in: product analysis, identifying
member and of the wide variety of issues and target audiences and, also,
programs, CryptoDATA can provide prices and competitors’ analysis.
development solutions in design stages.

Hardware Blockchain
Our research and development center CryptoDATA is a blockchain technology
offers the possibility of developing pioneer. Our company delivers solutions
electronic equipment and industrial and strategies for the development and
machinery destined for both personal and understanding of this new technology.
industrial use. With the help of our team, you can develop
computing processing equipment,
software and, also, financial platforms that
employ blockchain technology.
DOMAINS OF ACTIVITY

Software Development

Software development represents the


key factor in the evolution of information
technologies, having an applicability
extended within every domain of
activity.
The concept of “software development” is
a very complex one and includes a series
of processes for carrying out a functional
project. Team CryptoDATA possesses all
the necessary resources for being able to
develop any type of software, both for
Electronic Equipment Development internally designed products, as well as
for the external ones.
Security Solutions Development

Cyber-security represents the practice of protecting systems, networks and programs against
digital attacks. These cyber-attacks are usually targeted at accessing, changing or destroying
sensitive information, extorting money from users or disrupting normal business processes.
Nowadays, applying efficient measures of cyber-security is extremely difficult because there
are more devices than people, so attackers are becoming more innovative.
Through its patented encryption technology - the Voice Over Blockchain Protocol [VOBP],
CryptoDATA provides the perfect solution for securing and encrypting the communication
channel between two connected devices. Identities’ decentralization offers total privacy
because the system doesn’t employ servers for information distribution and validation.

Game Development

The video gaming industry represents a niche that has been facing a very accelerated growth
over the past years due to the evolution of several areas of technology. Technological
advancement of computers and mobile phones, together with the high internet speed for data
transferring, has led to an increased supply and demand for video games.
Releasing a video game in its final form requires following a complex plan. CryptoDATA team
offers solutions and has all the necessary resources for developing video games and delivering
them in their final form. The company is substantially investing both in techniques’, as well as
in employees’ evolution for creating such complex platforms.
Graphic Development

The digital graphics domain has progressed so much that physical borders and limitations
have disappeared. The evolution of this technology has eased work, reduced execution time
and released visible outstanding results, both in the film industry, as well as in the marketing
industry.

Through its graphics department, CryptoDATA offers the possibility of developing projects
starting from their concept state up to the state of graphic reality and transposition into virtual
reality. Predicting a product’s final form is much easier now through the computing power
provided by Cloud - the data processing datacenter.

Financial Platform Development

Finance digitization has created a world full of new opportunities, however, even with this
technological evolution, these features are not easy to reach for all people. In addition to the
financial advice that CryptoDATA can offer, the company comes prepared, also, with a series
of solutions for developing, instructing and implementing different platforms in order to ease
both companies’, as well as individuals’ activities.
CryptoDATA’s most important projects have been gold and electricity digitization and its
placement on the market for being traded and exploited by every user, whether experienced
or not.

Autonomous Decentralized Network Systems

To help the current community and expand the technology across the Globe, CryptoDATA is
working on implementing the BIDDC communication system. The company’s aim is to
develop a decentralized satellite network named GLOBAR LINK. The launch of the first test
satellite KDCT01 is planned in Q3-2020.
The technologies developed for setting up and expanding this project have as main mission
the improvement by changing the current communication architecture between the
worldwide spread devices. The BIDDC infrastructure is based on the implementation of the B-
IPFS architecture, information processing being enabled with the help of the ZIXXAR artificial
intelligence chip.

Artificial Intelligence and Cloud Computing Research and Development

CryptoDATA is currently investing more and more resources in the A.I field in order to develop
innovative technologies. Together with both our partners and our services’ users, we are
building the largest decentralized network based on artificial intelligence that exploits both
data processing resources from CryptoDATA’s data-centers, as well as the resources of the
users’ devices.
The ZIXXAR chip working on the VOBP technology preserves the originality of the data. The
decentralized validation doesn’t allow data alteration, offering the self-repair function.
Electric Autonomous Vehicle Development

Technology development is a necessity for the evolution of humanity. For the CryptoDATA
team, the electric vehicle represents a revolutionary innovation in the automobile field and,
also, a great challenge.
Through the MOMENTUM models, our team brought solutions for some of the greatest deficits
of electric vehicles. These deficits have led to innovative technologies’ development that
became part of the MOMENTUM ecosystem. All MOMENTUM electric vehicles are equipped
with ultimate technologies developed by the CryptoDATA engineers to provide more safety,
security and driving ease for the improvement of our customers’ lives.
CryptoDATA wants to turn every device into a validation node, so that each user becomes an
active worker within the network. Thus, security becomes impenetrable given the data
encryption and validation by several members of the network. The innovative technology that
has been implemented into the MOMENTUM ecosystem is unique and revolutionizes the
entire automotive system.
AREA OF SERVICES

CryptoDATA exploits a wide range of programs and technologies for developing revolutionary
products. The many challenges that have arisen over time determined the team to expand its
development spectrum in order to achieve the desired goals. The most important assets of
every technology company are adaptability and progress. The company’s evolution is based
on determining and motivating its employees throughout their search for innovative solutions
for the new technologies’ implementation. All this time, CryptoDATA has gained the necessary
experience in using software applications and has expanded its activity’s orientation towards
different technologies that are useful for people.

Mobile App Development Industrial & Home Robotic Development


Android Software
IOS Hardware
Custom OS

Software development Network Architecture


Windows Hardware
Linux Software
IOS Custom Infrastructure

Custom OS Development Security Infrastructure


Mobile Servers
Computer Software
Industrial Devices Hardware
Custom systems

Drivers Development Update Services


Specific Mobile OS
Custom Computer OS
Application
Drivers
Test & Improvement solutions Hardware Equipment Development
Web Mobile Phones
Mobile Tablet
PC Computers
Game Platforms Processors
Financial Digital system Smartwatch
Cybersecurity ATM
Network Systems Communication Network
PCBA

Web Development Artificial Intelligence Development


Custom Database Neural Network
Concept & Design Machine Learning
Custom Architecture Deep Learning
Custom Architecture

Game Development Autonomous Equipment Development


Mobile Platform Vehicles
PC Platform Robots
Architecture Drones
Augmented Reality Networks
Virtual Reality Devices

Prototype and Product Development Cinema Development


Concept CGI Concept & Design
Construction Movie
Test Sound Composer
Industrial Script Creator
Mass Production

Electricity Systems Graphic Design & Concept


Green energy solutions UI & UX
Smart Energy Web Design
Animation
Programming Area

Java Raspberry Pi
Golang Swift
Typescript [ AngularJS, Value.js]
JavaScript HSL Shaders
Kotlin Cinema 4D
Flutter Zbrush
Python Houdini
Kubernetes DaVinci
Docker Blender
Sql Maya
Objective C Adobe Illustrator
C Adobe Photoshop
C++ Adobe Premiere Pro
C# Adobe After Effects
Typescript SketchUp
React JS Unreal Engine
React Native Unity Engine
HTML Augmented Reality
CSS VR
Unix Shell Scripting Motion 5
MATLAB Final Cut Pro
PHP Cubase
Arduino
Business Activity

CryptoDATA’s activity is oriented towards technology development and its implementation in


society for offering users a unique experience. The most important moments that turned
CryptoDATA into a global tech provider have been the datacenter’s transformation into
Europe’s biggest GPU data-processing Cloud Center and, also, the creation and
implementation of the Voice Over Blockchain Protocol [VOBP] technology into the IMPulse K1
smartphones.
As a development strategy, the company has invested into both keeping the existing
customers through satisfying their needs and, also, into turning prospects into customers. The
wide range of delivered products and services has been developed and implemented to make
people’s lives easier. Every technology, project and product launched by CryptoDATA has the
customer at the center of their operation. Our team is trying to bring awareness to its users
through recommendations and guides in order to keep them secured and informed about the
benefits of the company’s products, how they work and why they should rely on them.

Products & Services Distribution


What is IMPulse K1 ?
IMPulse K1 is the world’s first Blockchain smartphone that employs the Voice Over Blockchain
Protocol [VOBP] technology to secure information transfer and protect users’ data. IMPulse K1
is an encrypted smartphone that offers an outstanding user experience, the special design
highlighting its distinctiveness.

Impulse K1 Core Values

Privacy Decentralization
One of the core values of IMPulse K1 is IMPulse K1 doesn’t rely on one central point
privacy. You can rest assured; all your of authority like the traditional smartphone.
information is completely safe. When you Instead of being kept on a server, all
buy the phone, you use your Private Key to information is distributed across many
generate a unique number, which different devices, guaranteeing the privacy
represents your own digital ID. of our users.

Security Innovation
The entire communication and file IMPulse K1 is the first smartphone to use
transfers are fully encrypted, from text blockchain technology in an innovative
messages, regular and video calls to way, its main purpose being to ensure every
photos, documents and video file transfers. user's safety. The VOBP technology is an
The end-to-end encryption eliminates third exclusive technology, accessible for
parties and only relies on peer-to-peer links, IMPulse K1 users only.
allowing only the smartphone’s user to
access their private information.
How Does it Work ?
IMPulse K1 is not only a regular smartphone, but an encrypted communication platform which
can perform the necessary functions in accordance with the users’ needs.
This platform incorporates all functions of a computer, mobile phone, data center and of a
connection and transfer node.
The IMPulse K1 Smartphone uses asymmetric communication algorithms that incorporates
blockchain’s innovative architecture.
In order to preserve users’ uniqueness, our smartphone employs the blockchain’s protocol for
configuring and protecting the encryption key. The IMPulse K1 represents only a node, all the
necessary information being accessed with the Private Key’s help.
The communication channel is peer to peer and employs the algorithms of blockchain
ecosystems for choosing the encryption methods, therefore having increased protection
through End to End encryption [E2EE].
The smartphone can be used in 2 ways:

The Regular Mode [SIM Card] The Encrypted Mode [VOBP]

IMPulse K1 can be used like any regular This mode offers users the unique
smartphone because it also fulfills the experience of communicating, working
functions of such devices. It can make a and transferring files in the most secure
stable connection with other way available on the market.
communication devices developed by In order to work in encrypted mode, the
different companies via SIM Card or phone incorporates in its architecture
Internet through applications such as many innovative technologies.
WhatsApp, Telegram, etc. VOBP is an encrypted communication
Communication channels are insecure technology that ensures a secure
because the connection of telephone connection between 2 or more IMPulse K1
providers is used. users. The blockchain architecture opens
Multimedia functions are included in the End-to-end encryption communication
IMPulse K1 platform to help the user in channels, the connection between users
everyday life. being peer-to-peer.
The smartphone supports the installation Final storage is based on B-IPFS
of applications compatible with Android technology and transforms IMPulse K1 into
and IOS systems depending on the external a secure portal to encrypted files using the
developers. Private Key.
Technology

Voice over Blockchain Protocol

VOBP is the cutting-edge security system that keeps data completely protected. Developed by
CryptoDATA engineers, Voice Over Blockchain Protocol combines knowledge in a variety of scientific
fields to increase smartphone security.

Master Key that allows each user to create Military security technology that ensures
unlimited phone numbers to be used user privacy. It encrypts location and then
within an infinity of organizations, all from a only reveals it to a user-chosen contact,
single device. Each organization can serve allowing for complete control over who
a distinct purpose, and always switching can access this information.
SIM cards is no longer necessary.

Decentralized, peer-to-peer network Guaranteed backup for the encrypted


enabling infinite global data storage, data stored in the blockchain, particularly
complete with backups and automatic useful in retrieving files from a lost
versioning - data isn't just safe, it's also IMPulse K1 phone . Thus , this system
resilient since it doesn't exist on a central enables user’s permanent access to their
server. Plus, file sharing is always secured secured data.
and communication always encrypted.

Technology for protection against cyber-attacks: it shields each unique private key from
unwanted access and encrypts all devices making attempts.
Private KEYS
The IMPulse K1 comes with physical keys that are unique for every device. The users Private
Key is part of the innovative CryptoDATA technology, used to access all the private
blockchain data, the user being verified and granted access based on it.
You can use the same key both for your IMPulse smartphone and your WHIM laptop.

UNIQUE Private KEY RED BACKUP KEY

Represents your Virtual Identity and it Described as the Master Key, it represents
helps you connect with other users when the heart of IMPulse K1, being the most
being inserted into the IMPulse K1 important component used for:
smartphone -Configuring New Unique Private Keys
The Unique Private Key provides you -Deleting Unique Private Keys
instant access to your information that is -Security changes within the user’s account
stored on blockchain and it is used for:
-Accessing the Vault application and its
functions 24 BACKUP WORDS
-Connecting your WISP identities
-Communicating securely with other Backup Words represent the main security
WHIM or IMPulse K1 Users through the element generated by the blockchain
WISP application when an account is created. These words
-Changing your Matrix IDs security settings recover lost data and enable the owner to
-Accessing your Photos, files and other have full access to the related identities or
from B-IPFS stored information information.
SOFTWARE
CryptoDATA OS

CryptoDATA OS is the operating system developed by CryptoDATA for the company’s


commercialized electronic equipment. It is a system purpose-built for enabling devices’
connection to Blockchain technology, its security being protected by WORM Guard, a software
integrated in the source code’s architecture.
This operating system uses the decentralized computing power cloud and Artificial
Intelligence in order to procure current information regarding the newly arisen cyber-threats
and needs.
The Update system is integrated into the CryptoDATA OS, representing a strongly-secured and
protected internal service. CryptoDATA develops its products’ software, applications, operating
system and update service internally only, the access of an external, third-party company or
partner not being granted. This security policy is rigorously respected in order to protect users’
identities and data integrity.
CryptoDATA’s developed operating system and applications are specially conceived to ensure
both user-protection and their needs’ satisfaction. The IMPulse K1 platform grants its users the
possibility of installing certain third-party applications available on regular smartphones that
employ the Android or IOS operating systems, to enable the communication with other
devices, as well. CryptoDATA OS comes together with the suite of CryptoDATA’s internally
developed and secured system applications.

VAULT STORE
Vault is a system application which CryptoDATA Store is a digital distribution
encrypts IMPulse K1’s Private Keys, creates platform developed and managed by
the users’ Blockchain account identities CryptoDATA Tech Co. This application
and enables the secured deposit of their allows IMPulse K1 users to browse,
digital assets. download and install apps designed by
CryptoDATA or by other priorly verified
developers.

WISP B-IPFS
WISP is a system application that B-IPFS is a service developed by
transforms the IMPulse K1 Smartphone into CryptoDATA that operates in a
a secure and private communication decentralized mode and can be accessed
platform due to the VOBP technology using the IMPulse K1 or WHIM devices. This
employed. The application’s user-friendly technology enables users to securely store
interface enables users to communicate via all their information and documents within
voice or video calls and transfer text the Blockchain, accessing them instantly
messages, files and documents in a private and through the Private Key’s identity.
accessible way.
CONTACTS MANAGER
“Contacts” is a system application developed by “Manager” is a system application that enables
CryptoDATA through which the users can users to securely batch uninstall and backup
securely access both the phone numbers and applications. The application quickly lists all the
the encrypted identities of their contacts. The applications installed on the IMPulse K1 device,
safe access to this application is ensured by the displaying information about each one of them,
Private Encryption Key. allowing users to decide whether to un-install,
backup or read detailed information about each
app.

MESSAGES WORKPLACE
“Messages” is a system application developed by “Workplace” is a system application integrated
CryptoDATA that allows the IMPulse K1 users to into the IMPulse K1 Smartphone that enables
communicate with other regular smartphone- users to store, sync and share work files easily
users. The app works only if a Nano-SIM card is and securely with the members of their
inserted into IMPulse K1. organizations. Any folder can be linked to a
This communication channel is not encrypted. Workplace Group to keep members updated as
The entire information-flow uses the SIM the users’ files and documents suffer
Network; therefore, users’ security and privacy modifications. When new people are added to
are affected by the intervention of a third-party the group, they will automatically get access to
network provider. the users’ shared folders.

B-EMAIL CALENDAR
“B-EMAIL” is a system application that “Calendar” is a system application with optional
transforms the IMPulse K1 Smartphone into a CalDAV synchronization that provides users
secured and private electronic mailing platform everything they need for organizing their daily
due to the VOBP technology employed. The schedule. This app enables the creation of
apps’ user-friendly interface enables users to recurring events and set-up of reminders, also
communicate and transfer messages, files, displaying week numbers. The Storage
documents and photos in a private and permission is needed only for exporting or
accessible way inside their organizations. importing events from .ics files. The Contacts
permission is needed only at importing
contacts’ birthdays and anniversaries.
GALLERY SETTINGS
Gallery is a system application developed by Settings is a system application developed by
CryptoDATA which stores all users’ photos and CryptoDATA which enables the configuration of
videos into a secured place. This application IMPulse K1. By accessing this application users
allows users to upload very fast all files in the can upgrade the operating system, set extra
blockchain Cloud. protection with more security options, connect
IMPulse K1 with other devices and customize
language and display.

CLOCK MERCHANT
“Clock” is a system application that includes all “Merchant” is a financial system application that
timing-related functions. This app enables users offers bank accounts in different currencies and
to set alarms, add timers, run a stopwatch and, enables users to make electronic payments fast
also, keep track of time around the world by and securely. The app also provides access to
displaying different time zones. cryptocurrencies.

MUSIC CAMERA
“Music” is a secure system application that “Camera” is a system application developed by
provides access to millions of songs. This CryptoDATA that enables users to capture their
application enables users to listen to music life’s moments through photos and videos, to
albums, playlists, and podcasts wherever they edit and store them privately and securely.
are, for free.

DOCUMENTS HELP
“Documents” is a system application that “Help” is a system application developed by
includes a suite of secure office programs CryptoDATA through which users can learn how
created by CryptoDATA made for easy unit to use their IMPulse K1 at maximum
access and a private office experience on the go. performance and discover all its functions from
the basics to the most advanced.
What is WHIM ?
WHIM is the first laptop that offers integral protection in accessing and transmitting data with
the help of the physical encryption key. The system architecture’s base is represented by the
[VOBP] technology. WHIM has a unique design and offers a particular experience for personal
and business organization use

WHIM Core Values

Privacy Decentralization
One of the core values of WHIM is privacy. WHIM doesn’t rely on one central point of
You can rest assured; all your information is authority like the traditional laptop. Instead
completely safe. When you buy the laptop, of being kept on a server, all information is
you use your Private Key to generate a distributed across many different devices,
unique number, which represents your guaranteeing the privacy of our users.
own digital ID.

Security Innovation
The entire communication and file WHIM is the first Laptop to use blockchain
transfers are fully encrypted, from text technology in an innovative way, its main
messages, regular and video calls to purpose being to ensure every user's safety.
photos, documents and video file transfers. The VOBP technology is an exclusive
The end-to-end encryption eliminates third technology, accessible for encrypted users
parties and only relies on peer-to-peer links, only.
allowing only the encrypted user to access
their private information.

Mobility
WHIM comes as an addition to the IMPulse K1 smartphone. The portal to the blockchain opens
the user account with the help of the Private KEY to have instant and secure access anytime
and anywhere.
How Does it Work ?
WHIM allows users to access the blockchain technologies in order to enjoy maximum product
performance.
VOBP is the communication protocol that opens the encrypted communication channel to
send messages, make video calls, send emails, documents and files.
B-IPFS is a technology made available as a service through WHIM or IMPulse. It is the
engineering that allows users to store on blockchain an infinite number of files. This service
allows you to work directly on files or allows them to be downloaded to your device using the
Private Key.
In order to provide complete protection to its users, WHIM comes with 2 different operating
systems on Hardware. Through this device we try to offer the connection of 2 ecosystems
necessary to the needs of people.

Regular Mode [ O.S ] Encrypted Mode [CryptoDATA O.S]

WHIM offers users the possibility to stay This mode offers users the unique experience of
connected with other devices that do not use communicating, working and transferring files
blockchain technology. It provides a separate in the most secure way available on the market.
storage to install the desired operating system In order to work in encrypted mode, the laptop
(Windows, Ubuntu, etc.) and to configure the incorporates in its architecture many innovative
device according to their needs. technologies.
Due to this feature, the user can install and VOBP is an encrypted communication
configure the laptop in the same way as any technology that ensures a secure connection
computer available on the market. This way of between 2 or more Whim and IMPulse K1 users.
operating offers WHIM a great advantage as this The blockchain architecture opens End-to-end
laptop can be used in any field of activity. encryption communication channels, the
connection between users being peer-to-peer.
Finisher storage is based on B-IPFS technology
and transforms WHIM into a secure portal to
encrypted files using Private Key.
Technology

Voice over Blockchain Protocol

VOBP is the cutting-edge security system that keeps data completely protected. Developed by
CryptoDATA engineers, Voice Over Blockchain Protocol combines knowledge in a variety of scientific
fields to increase smartphone security.

Master Key that allows each user to create Military security technology that ensures
unlimited phone numbers to be used user privacy. It encrypts location and then
within an infinity of organizations, all from a only reveals it to a user-chosen contact,
single device. Each organization can serve allowing for complete control over who
a distinct purpose, and always switching can access this information.
SIM cards is no longer necessary

Decentralized, peer-to-peer network Guaranteed backup for the encrypted


enabling infinite global data storage, data stored in the blockchain, particularly
complete with backups and automatic useful in retrieving files from a lost device
versioning - data isn't just safe, it's also . Thus, this system enable user’s
resilient since it doesn't exist on a central permanent access to their secured data .
server. Plus, file sharing is always secured
and communication always encrypted.

Technology for protection against cyber-attacks: it shields each unique private key from
unwanted access and encrypts all devices making attempts.
Private KEYS
The WHIM comes with physical keys that are unique for every device. The users Private Key is
part of the innovative CryptoDATA technology, used to access all the private blockchain data,
the user being verified and granted access based on it.
You can use the same key both for your IMPulse smartphone and your WHIM laptop.

UNIQUE Private KEY RED BACKUP KEY

Represents your Virtual Identity and it Described as the Master Key, it represents
helps you connect with other users when the heart of WHIM, being the most
being inserted into the WHIM Laptop important component used for:
The Unique Private Key provides you -Configuring New Unique Private Keys
instant access to your information that is -Deleting Unique Private Keys
stored on blockchain and it is used for: -Security changes within the user’s account
-Accessing the Vault application and its
functions 24 BACKUP WORDS
-Connecting your WISP identities;
-Communicating securely with other Backup Words represent the main security
WHIM or IMPulse K1 Users through the element generated by the blockchain
WISP application when an account is created. These words
-Changing your Matrix IDs security settings recover lost data and enable the owner to
-Accessing your Photos, files and other have full access to the related identities or
from B-IPFS stored information information
CryptoDATA OS

CryptoDATA OS is the operating system developed by CryptoDATA for the company’s


commercialized electronic equipment. It is a system purpose-built for enabling devices’
connection to Blockchain technology, its security being protected by WORM Guard, a software
integrated in the source code’s architecture.
This operating system uses the decentralized computing power cloud and Artificial
Intelligence in order to procure current information regarding the newly arisen cyber-threats
and needs.
The Update system is integrated into the CryptoDATA OS, representing a strongly-secured and
protected internal service. CryptoDATA develops its products’ software, applications, operating
system and update service internally only, the access of an external, third-party company or
partner not being granted. This security policy is rigorously respected in order to protect users’
identities and data integrity.
CryptoDATA’s developed operating system and applications are specially conceived to ensure
both user-protection and their needs’ satisfaction. The WHIM platform grants its users the
possibility of installing certain third-party applications available on regular computers that
employ the WINDOWS or Ubuntu operating systems, to enable the communication with other
devices, as well. CryptoDATA OS comes together with the suite of CryptoDATA’s internally
developed and secured system applications.

VAULT STORE
Vault is a system application which CryptoDATA Store is a digital distribution
encrypts WHIM’s Private Keys, creates the platform developed and managed by
users’ Blockchain account identities and CryptoDATA Tech Co. This application
enables the secured deposit of their digital allows WHIM users to browse, download
assets. and install apps designed by CryptoDATA
or by other priorly verified developers.

WISP B-IPFS
WISP is a system application that B-IPFS is a service developed by
transforms the WHIM Laptop into a secure CryptoDATA that operates in a
and private communication platform due decentralized mode and can be accessed
to the VOBP technology employed. The using the IMPulse K1 or WHIM devices. This
application’s user-friendly interface enables technology enables users to securely store
users to communicate via voice or video all their information and documents within
calls and transfer text messages, files and the Blockchain, accessing them instantly
documents in a private and accessible way. through the Private Key’s identity.
CONTACTS MANAGER
“Contacts” is a system application “Manager” is a system application that
developed by CryptoDATA through which enables users to securely batch uninstall
the users can securely access both the and backup applications. The application
phone numbers and the encrypted quickly lists all the applications installed on
identities of their contacts. The safe access the WHIM device, displaying information
to this application is ensured by the Private about each one of them, allowing users to
Encryption Key. decide whether to un-install, backup or
read detailed information about each app.

MESSAGES WORKPLACE
“Messages” is a system application “Workplace” is a system application
developed by CryptoDATA that allows the integrated into the WHIM Laptop that
WHIM users to communicate with other enables users to store, sync and share work
regular smartphone-users. The app works files easily and securely with the members
only if a Nano-SIM card is inserted into of their organizations. Any folder can be
WHIM SIM Card Slot. linked to a Workplace Group to keep
This communication channel is not members updated as the users’ files and
encrypted. The entire information-flow documents suffer modifications. When
uses the SIM Network; therefore, users’ new people are added to the group, they
security and privacy are affected by the will automatically get access to the users’
intervention of a third-party network shared folders.
provider.

B-EMAIL CALENDAR
“B-EMAIL” is a system application that “Calendar” is a system application with
transforms the WHIM Laptop into a optional CalDAV synchronization that
secured and private electronic mailing provides users everything they need for
platform due to the VOBP technology organizing their daily schedule. This app
employed. The apps’ user-friendly interface enables the creation of recurring events
enables users to communicate and transfer and set-up of reminders, also displaying
messages, files, documents and photos in a week numbers. The Storage permission is
private and accessible way inside their needed only for exporting or importing
organizations. events from .ics files. The Contacts
permission is needed only at importing
contacts’ birthdays and anniversaries.
GALLERY SETTINGS
Gallery is a system application developed Settings is a system application developed
by CryptoDATA which stores all users’ by CryptoDATA which enables the
photos and videos into a secured place. This configuration of WHIM. By accessing this
application allows users to upload very fast application users can upgrade the
all files in the blockchain Cloud. operating system, set extra protection with
more security options, connect WHIM with
other devices and customize language and
display.

CLOCK MERCHANT
“Clock” is a system application that includes “Merchant” is a financial system application
all timing-related functions. This app that offers bank accounts in different
enables users to set alarms, add timers, run currencies and enables users to make
a stopwatch and, also, keep track of time electronic payments fast and securely. The
around the world by displaying different app also provides access to
time zones. cryptocurrencies.

MUSIC CAMERA
“Music” is a secure system application that “Camera” is a system application developed
provides access to millions of songs. This by CryptoDATA that enables users to take
application enables users to listen to music photos and videos, to edit and store them
albums, playlists, and podcasts wherever privately and securely. This function allows
they are, for free. users to communicate live with other users
through communication channels.

HELP
DOCUMENTS “Help” is a system application developed by
“Documents” is a system application that CryptoDATA through which users can learn
includes a suite of secure office programs how to use their WHIM at maximum
created by CryptoDATA made for easy unit performance and discover all its functions
access and a private office experience on from the basics to the most advanced.
the go.
What is ZIXXAR
ZIXXAR is a device built on an artificial intelligence architecture that learns and develops
continuously in order to simulate human intelligence in any circumstances.

Why ZIXXAR
The adoption of the A.I. technology and its integration in ZIXXAR are aimed to develop and
improve consumers’ necessary services and to reduce the related operational costs. This
objective is attainable and can develop fast if the number of users, pieces of information and
applications increases.

ZIXXAR in CryptoDATA
CryptoDATA has launched the ZIXXAR artificial intelligence chip providing the edge
computing service for the company’s commercial devices. This is the first model of A.I. COP
developed by CryptoDATA which is used for deep learning, requiring a low resource
consumption and having a small size.
ZIXXAR is built to help small-sized devices achieve advanced deep learning technologies
through quantization tools and compilers. The ZIXXAR chip uses the blockchain architecture
in its operational algorithm, transforming every device into a secured validation node that
contributes to the stable and efficient functioning of the ecosystem.
Through the implementation of the Global digitalization concept in which all devices use the
ZIXXAR chip technology, CryptoDATA seeks the development of a new decentralized
community that will actively participate/work in the development of practical and innovative
technological solutions.

What is A.I
Artificial intelligence represents a machine’s ability to perceive and mimic human cognitive
functions. In order to achieve this, the machine must learn from detected patterns, adapt the
newly gathered information, take action and improve to become aware of the process.

The ZIXXAR architecture


The built-in multiprocessor system for computing uses an innovative methodology for
designing programmable processing cores with associated memories connected through
blockchain. This architecture is purpose-built for the instruments and devices that
communicate through VOBP.
This architecture was built for the general purpose of scientific computing and has been
adopted to fulfill the purposes of applications and platforms for transmission and processing
of encrypted signals. This increases the performance level of the integrated systems and
attains an efficient yield. The irregular memory system lowers power consumption and
software control provides real-time predictability for system calculations.
Applicability & Capabilities

The applicability of artificial intelligence is endless, as this technology can be integrated into
many different sectors and industries. CryptoDATA invests considerably in the development
and applicability of the ZIXXAR chip to facilitate the evolution of our society and ease users’
task performance.

Video and Photo Analysis SECURITY

By using the power and resources of cloud ZIXXAR employs an unsupervised learning
computing, the ZIXXAR chip is able to algorithm and develops self-protection
analyze images and to detect, perceive and techniques against cyber-threats. This
organize the content from those images. protection system is integrated into
Another additional integrated task that is in CryptoDATA’s commercial devices through
a continuous development process is to the WORM Guard software.
perceive images by associating them with ZIXXAR technology is able to test and
sounds in order to offer accurate forecasts. eliminate applications and software that
This technology can be implemented in can cause damage and are unsafe. As an
industries such as: additional property, ZIXXAR developed an
Medicine - for the analysis and auto-improving system to counterattack
interpretation of the results of X-rays or and eliminate cyber-threats.
generated tests;
The Military field - to discover hardly PRIVACY
identifiable dangerous objects; In order to comply with security standards
In the security of photographic objectives and to respect the rights regarding
by the automatic interpretation of the personal data, the ZIXXAR chip uses
images taken by surveillance cameras blockchain architecture for
In the analysis and efficiency of e- communication. This architecture is used
commerce and marketing systems. for secure and efficient encryption of the
channels and of the data used for the chips
to communicate. ZIXXAR represents a
huge node with a decentralized processor
that sends information continuously to
improve the encryption algorithm and
repel cyber-attacks.
Intelligent Urban Center
The intelligent urban center represents the concept regarding the cities of the future that
would be able to perform an infrastructure and resource management based on artificial
intelligence. The cloud computing system could be integrated through the B-IPFS
technology and materialized by the integration of ZIXXAR chips in all electronic devices.
The city’s central processing unit is decentralized and uses the blockchain algorithm for the
communication between devices and data recording. Through the machine learning and
deep learning algorithms, the system can automatically and efficiently perform a computing
power and energy resources self-management. Thus, the computing power can be declared
as infinite because devices are Globally connected and data integrity is verified in a
decentralized way.

APPLICABILITY
Traffic management
Surveillance system management and interpretation
Tax service management
Payment systems management
Resources and infrastructure management
Efficient channeling of resources for a sustainable development
Air traffic and transport services management
Provision of solutions through a highly-accurate predictability
Management of the security systems concerning the human-machine relationship
Correct and incorruptible management of the voting system
Protection of citizens’ identities
What is Bank of Energy [B.O.E]
The Bank of Energy represents an interconnected energy system, consisting of a set of
electromagnetic installations organized in a digital ecosystem in order to attain the
production, transmission and distribution of electrical energy on a Global scale.

The Ecosystem Bank of Energy


Electricity is the core element of modern economies, contributing to the electrical energy
services’ development. The demand for electrical energy will further increase due to
population growth, to the electrification of transport, living needs and industries, and to the
continuously increasing demand for digital devices.
In terms of social development, the Global demand for electric energy is 2,1% per year, leading
to an increase in the charging time of mobile devices and to the need for less polluting
technologies. The aforementioned growth of electrical energy demand is particularly high in
developing economies in which current government policies and market conditions require
the development of new and innovative technologies.
The need for the flexibility of power systems is growing even faster than the demand for
electrical energy due to the increase in the share of variable renewable resources and to the
growing demand concerning the operation of electric vehicles.
The integration of the Bank of Energy system is essential in order to facilitate the evolution of
mobility and to determine the fusion of digitalization and active energy, as the system is built
on the energy mix architecture.
Bank of Energy’s Architecture
The Bank of Energy system is built on several subsystems that can function independently,
however, having the possibility of improving their performance by employing encrypted
communication between one another.

Recharge Point [R.P] The Payment System [P.S]


The RPs represent the physical centers in In order to be accessed under any
different locations where users have the circumstances, Bank of Energy has
possibility of recharging their electronic multiple payment systems. Thereby,
devices from mobile phones to electric services can be paid by card, virtual
automobiles. currency, electrical energy within the
trading system or through financial
services like Revolut or PayPal. In order to
Power Bank Rack [P.B.R] increase the system’s security, transactions
are recorded in the blockchain are
The P.B.R. represents the electricity validated through a decentralized system.
charging station. Although small-sized, this
device provides many possibilities for
electrical energy distribution. The Power Distribution Channels [D.S]
Bank Tack can store different types of
recharging modules, but can also be The recharging modules’ distribution
connected directly to the electric service employs an algorithm built on a
automobiles or electronic devices to decentralized architecture. Distribution
provide them with electrical energy. management is performed by artificial
intelligence in order for it to be efficient and
resources to be directed to meet the high
Power Bank Module [P.B.M] speed and low cost.
The available distribution channels enable
The P.B.M. is the recharging mobile device. the user to access the necessary energy at
It consists of a battery varying in sizes and any time and in any circumstances. The
capacities that offers efficient control and user can receive the necessary resources by
protection for the devices to which it is Drone transport, from other nearby users
connected. There are several types of who have additional energy or from
P.B.Ms depending on the user’s needs. passenger or food transport services.

The System’s Interface [UI & UX] Communication Channels [C.C]


The UX/UI system’s interface is purpose- Communication between devices is
built so that the user could access the Bank achieved through the VOBP technology,
of Energy system from smart devices. This therefore communication channels are
interface presents two usage modes - the fully secured. By using these innovative
searching and accessing the P.B.M. mode methods, the user’s identity remains
and the for trading electricity through protected and system frauds are
virtual assets mode. The interface is eliminated.
developed for any type of operating system
like Android, IOS, Windows, Ubuntu, thus
being available to everyone, or it can be
accessed through autonomous vehicles
with artificial intelligence.
Electric Vehicle

General Terms
An electric Vehicle is an automobile that is propelled by one or more electric motors, using
energy stored in rechargeable batteries. Electric cars are a variety of electric vehicles (EV). The
term "electric vehicle" refers to any vehicle that uses electric motors for propulsion, while
"electric car" generally refers to highway-capable automobiles powered by electricity.
Just as there are a variety of technologies available in conventional vehicles, plug-in electric
vehicles (also known as electric cars or EVs) have different capabilities that can
accommodate different drivers’ needs. A major feature of EVs is that drivers can plug them in
to charge from an off-board electric power source. This distinguishes them from hybrid
electric vehicles, which supplement an internal combustion engine with battery power but
cannot be plugged in.
There are two basic types of EVs: all-electric vehicles (AEVs) and plug-in hybrid electric
vehicles (PHEVs). AEVs include Battery Electric Vehicles (BEVs) and Fuel Cell Electric Vehicles
(FCEVs). In addition to charging from the electrical grid, both types are charged in part by
regenerative braking, which generates electricity from some of the energy normally lost
when braking. Which type of vehicle will fit your lifestyle depends on your needs and driving
habits

Types of Electric Vehicles

EVs (also known as plug-in electric vehicles) derive all or part of their power from electricity
supplied by the electric grid. They include AEVs and PHEVs.

AEVs (all-electric vehicles) are powered by one or more electric motors. They receive electricity
by plugging into the grid and store it in batteries. They consume no petroleum-based fuel and
produce no tailpipe emissions. AEVs include Battery Electric Vehicles (BEVs) and Fuel Cell
Electric Vehicles (FCEVs).

PHEVs (plug-in hybrid electric vehicles) use batteries to power an electric motor, plug into the
electric grid to charge, and use a petroleum-based or alternative fuel to power the internal
combustion engine. Some types of PHEVs are also called extended-range electric vehicles
(EREVs).

Advantages Disadvantages
Environment-Friendly Recharge stations
Less cost Electricity cost
More efficient Short range
Improved safety Long recharge time
Energy security Silence
Instant power Battery replacement
Safe to drive Expensive
Low maintenance Securit
Reduce noise pollution
What is
VOBP is a new age security system that ensures users a complete protection of their data
Developed by the CryptoDATA engineers, the Voice Over Blockchain Protocol manages to
efficiently combine strong elements and knowledge gathered from a variety of scientific fields
to increase the security of your communication devices.

How does it work? becomes a new encryption Key added as


an appendix to the previous one.
Voice Over Blockchain [VOBP] is a In this modern world’s digital era, the
communication protocol that uses Internet is omnipresent and imperative for
Blockchain technology in order to attain every action. The VOBP service operates on
the encryption of the users’ data and of the the Internet, as well, therefore it’s covered
communication channels. Globally, the connection being stable and
The Encryption Type continuous.
The VOBP’s architecture is built on
asymmetric and continuous encryption
Security
that is embedded on a blockchain protocol
selected based on the fastest response According to the tests performed by
time. The encryption is structured on different entities, the VOBP technology is
several levels and uses the unique Private currently the safest method of data transfer
Key. and communication.
The full encryption, the decentralized
Transfer Speed verification and the asymmetric transfer
through an infinite number of channels
Data transfer uses more than one channel, provide users complete security.
because all data is divided into millions of Decentralized user verification through
pieces, encrypted by specific algorithms well-defined algorithms eliminates fraud
and sent through the fastest blockchain at and increases security. Users’ privacy
that time. represents the main objective of VOBP
This architecture leads to an incredibly technology, therefore every identity that is
short transfer time and increases data’s generated in the system is unique and
security and level of protection. validated by a decentralized computer
system.
Coverage and communication
The communication can only be VOBP vs Current technologies
established between 2 devices using VOBP Files and data are transferred securely and
technology, so the devices must be their encryption and decryption are made
registered, identified and verified by the using the users' UNIQUE Private Key.
blockchain. The network load through the transferred
In order to open the communication data volume is very well balanced because
channel and be identified, the users have to there are used several communication
connect their Private Keys every time. channels and data packing employs the
The communication channel is secured Merkle Tree algorithm which underlies the
with End to End Encryption [E2EE] and Blockchain system.
uses peer-to- peer[P2P] data transfer. No The authenticity of information is verified
transmitted information will be verified by by a decentralized computer system,
a third party, nor decrypted or interpreted. computers that are owned by the
To increase security, each sent message network’s members. This system follows
clear rules and is incorruptible at all times.
What is
Matrix ID is an innovative technology created by CryptoDATA, that revolutionizes the
procedure in which a person creates an account for any platform: e-mail, phone, account,
device or identification number.

How does it work? Privacy and security

The Matrix Id allows users to create an Matrix IDs are utilized by users as virtual
infinite number of unique and private identities through which they can
accounts, that can be used to communicate or access their own digital
communicate, but also to transmit information. The access and
information in an encrypted and secured administration of identities are granted
manner. only to the person who created them. All
the information stored by the identities in
question is encrypted by the unique Private
Blockchain and information key and can be accessed with the Public
Blockchain is a transparent, public, Key.
decentralized and secured ledger that The anonymity and protection of the users
stores information in an efficient, verifiable is done by the blockchain in a decentralized
and permanent way. By applying these way, and so, the blockchain does not verify
properties on a structure, we create an the data of the individual, it verifies the
innovative architecture. integrity and validity of the virtual
This ledger enables the adding, but not the identities.
modification or duplication of information.
Within a Blockchain there can be created Matrix ID vs. Current Technology
an infinite number of identities by the
addition of new blocks. Digitalization is increasing exponentially
The information that appears in the system and the need for a new technology that
is verified in a permanent and offers absolute security and control over
decentralized way by the members of the information has led to the emergence of
network, even if it is viable or not, and the MATRIX ID technology.
result (hash?) is registered in a new block. The easiness of using this feature provides
Thus, every information is integrated and a unique experience to every user, thanks
generates effects only after validation. to the possibility to access and control their
information from anywhere with the
Unique Private Key.
The uniqueness of identities Users can create and configure multiple
Within the blockchain system, every block unique accounts, which they can utilize
is unique because it contains both the according to their personal and business
previous and the registered information. needs. Matrix Ids can have multiple
Thus, every identity generated has a unique functionalities:
identification code, which means that there can store and access digital currency
can be no other information with the same funds or deposits;
source code, this property eliminating can be used as phone numbers, email
fraud and identity theft. accounts or other identification codes;
can access encrypted and secure
information;

The security of every identity is very


impressive, mostly because the validation
and verification are done entirely by the
decentralized blockchain system.
What is
The BR-LINK is a data recovery software that accesses blockchain technology to maintain
direct contact with the user and its virtual identity. BR-Link is also the interface that
permanently tracks the data associated with the Matrix ID of a user.

How does it work? The identity user can access the


information by rewriting a new Private Key
The BR-LINK is an algorithm built on a using the 24 backup words.
complex structure that includes
overlapping layers. This technology ensures
the safe and continuous operation of the
Speed and coverage
entire system. Data transfer uses multiple channels of
communication through several
Portability and Mobility blockchains. This architecture makes
information to be accessed instantly and
Nowadays, mobility is a very important security to be impenetrable. The BR-Link
factor in the digital era evolution. The BR- service uses the Internet to operate and this
Link is a software designed for users to factor ensures a global connection and
access the blockchain identity and all continuous operation.
associated information. Identity retrieval is
achieved simply by entering the 24 unique
words generated when the identity was
Security and Privacy
created. Integral encryption, decentralized
This simple and efficient method offers the verification and asymmetric transfer made
users the portability and mobility they need through an infinite number of channels
to perform their tasks. offer users absolute security.
Decentralized user verification through
Blockchain and decentralization well-defined algorithms eliminates fraud
and increases security. The exclusive 24
BR-LINK uses blockchain technology to words and identity are generated by the
record and access information. blockchain at the time of user registration.
Decentralization increases the security and All user information is encrypted with the
confidentiality of the data and ensures an Private Key and can be accessed with the
on-going functional system. backup words anytime and anywhere.
Blockchain is a transparent, public,
decentralized and secured ledger that
stores information in an efficient, verifiable
What does Worm Guard offer to the
and permanent way. By applying these world?
properties on a structure, we create an
innovative architecture. The user-created An easy and secure method that helps
identity is registered in the blocks in the users to access and retrieve data and
blockchain. The validity of the identities is identity.
verified in a decentralized mode by other Secure software with high transfer
users’ devices through an encryption speed and efficient operation.
algorithm. An interface easily accessible to users
without having any programming
knowledge.
What is
Worm Guard is a software specially created by the CryptoDATA team, that protects all the
devices that are put available for the users by the company.

Role Artificial intelligence plays an important


role in the protection system because it
Verifies system integrity and protects uses passive learning (Unsupervised
against cyber-attacks. learning) and automatically adapts
Repairs the software part of any device in according to the threats it receives.
which it is installed and that has been Therefore, the system develops better
affected by cyber-attacks, with the help of tactics while fighting against threats, but
Artificial Intelligence. also efficiently manages the resources in
Maintains Privacy by encrypting and order to have optimal consumption.
protecting files and device locations.
Blocks user access to channels and
applications that can affect the integrity
Security and Protection
and security of the devices. Encrypts and Worm Guard is specially developed to
counteracts threats that affect devices protect users' devices, eliminating threats
protected by it. in an ingenious way. It uses an algorithm
based on artificial intelligence that makes
How does it work? the system to develop new tactics for both
its protection and the security of other
Along with the modernization and devices.
technical advancements of our smart Worm Guard uses 3 working modes that it
gadgets, might appear many cyber threats automatically manages:
that can affect the integrity of the users' Defensive mode is used to protect systems
devices. For a healthy and continuous in the event of an attack.
development, CryptoDATA launched a Preventive mode is a new way in which
security software for all its devices, called Worm Guard tests the channels and
WORM Guard. sources that intervene on the devices or
with the ones which the devices will come
Blockchain and Decentralization into contact.
The Offensive mode is specially designed to
Blockchain is a transparent, public, maintain a healthy network. Worm GUARD
decentralized and secure ledger that not only prevents threats, but also
records information in an efficient, counteracts in order to eliminate them. It
verifiable and permanent way. WORM uses encryption to disable any unsafe or
Guard is a software that integrates malicious source.
blockchain framework with all network
users in a decentralized way. The
computing power of all devices is used to
What does Worm Guard offer to the
encrypt information, to discover threats world?
and eliminate them.
Device protection without requiring user
intervention in the remediation mode.
Artificial Intelligence Verification of the sources with which
Cyber-attacks are a true digital threat and the devices will come into contact.
they come in many forms and all at the Self-Learning and Developing Threat
same time. In order to cope with these Control Techniques, which means that
attacks, Worm Guard uses artificial users are permanently protected
intelligence in a cloud system to increase regardless of new threats.
power and internal protection measures.
What is
The B-IPFS is a new technology that works on an efficient structure regarding data transfers
and storage. B-IPFS changes the resource allocation mode by transforming each user into a
node. This system is based on a decentralized distribution and encrypted communication.

How does it work? information are being transferred through


them.
The B-IPFS architecture offers an The transfer time is reduced for 2 reasons: 1)
innovative and valuable way of transferring - data packets are transferred
data between the users of a network, simultaneously on several channels and
mostly because it is a global network that 2) - the transfer is made from the nearest
eliminates current infrastructure problems. devices. It is an automatic load - balance of
In this system, each user or device becomes the network in which all online users
both a distribution server and a verification actively participate.
server.
Coverage and Uptime
Upload and Download
B-IPFS works with the Internet, so it is a
In a standard system, the files are uploaded global service. The most important aspect
to the central servers and the information in the operation of a network and servers is
download is made by default rites from the that the availability time is permanent and
same central server. at 100% of capacity.
The B-IPFS does not use central servers, Information is distributed in the blockchain
because each device is transformed into a registry and it becomes active on all
server, which makes available an encrypted devices, therefore it is being recorded in
and well-defined storage space. The files encrypted blocks. This architecture involves
are distributed randomly between network all devices and it has a redundant
users, that means that one file is being automatic system. The information
placed in several nodes. Download and circulates automatically between the active
access is done through the fastest route devices in the ones that become active so
using the unique Private Key. that it is available 100% of the time. The
advantages of this network is that each
Speed and transfer time user or device helps to keep and distribute
the information.
In the digital age, mobility and speed are
essential for evolution and performing
tasks better. The B-IPFS technology
Security and Privacy
changed the approach of transferring and The biggest threat in the digital age is how
accessing files and information. the information is being transmitted. The
This technology uses the same blockchain main ways where security can be affected
transfer algorithms as Voice Over are: attacks on communication channels
Blockchain Protocol. Information is divided and on storage servers or on devices that
into smaller portions and it is encrypted communicate.
with the help of the unique Private Key, and B-IPFS represents a decentralized system
then it’s recorded in a block on a secure and each device in the system is also a user
communication channel. The information and server, which makes the attack much
is available on every active device in the harder to perform. The communication
network channels are open randomly and there are
This algorithm increases the transfer speed multiple ways to make the information
because several communication channels impossible to intercept.
are being used at the same time and bits of Encrypting information with the unique
Private Key provides unbeatable system
security because the attack must be Therefore, the risk of a security attack is
performed on all devices and blockchain at impossible to perform.
the same time. The blockchain verifies the Each device, being both server and user,
integrity of the data, and any modification creates an automatic balance for the
on it is valid only with the acceptance of 51% information transfer. The network
of the validators. This architecture makes B- maintains an active communication flow
IPFS impossible to affect from a security and thus the transfer speed is high and
point of view, by the existing means. constant.
Through the decentralized architecture, B-
IPFS maintains the information valid 100%
B-IPFS VS Current technologies of the time, eliminating the risk of failure
and inactivity of transfer and validation
The B-IPFS does not use a central server, all functions.
devices are both servers and users.
What is Raptor SKA?
Raptor SKA represents the addition that makes the Momentum Huvra’s carbon fiber chassis
unique. This system enables the vehicle’s frame so-called ‘adaptability’ in the event of a
collision.
The role of the Raptor SKA system is to absorb as much energy as possible in case of a frontal
or lateral impact, in order to increase the security level of the vehicle. Therefore, this is a
CryptoDATA genuine and innovative vehicle passive safety system.
How does it work?

The core element of the Raptor SKA system (chassis) systems. Moreover, the direction
is the “EAC” (Energy Absorbing Cartridge). of the system- controlled deformation is 6
Each EAC presents two relatively rigid degrees down, so it pushes up the chassis
plates at each end and the active material, to increase chances of overcoming the
a cylindrically shaped high-end absorbing obstacle.
foam. Even if the impact is extremely violent or
The entire system contains four additional the incidence direction is straight,
subassemblies, two in front and two on the generating great lateral efforts, then the
sides of the vehicle. In order to fulfill its carbon tubes and the entire system could
purpose, each aggregate should be located be deformed, but in a controlled manner,
between the impact bars and the carbon keeping safe the carbon fiber chassis and,
fiber chassis, otherwise stated, between the most importantly, the driver.
potential hazard and the Momentum The lateral aggregates of the Raptor SKA
Huvra’s driver. system are less complex. These
For the two front aggregates, the subassemblies consist of an impact bar and
cartridges are arranged in four series of four six EACs on each side of the vehicle.
EACs each. Here, each row of four EACs is In case of a lateral impact, the rigid bar
placed in a carbon tube, fixed inside the distributes the effort along its entire length
carbon chassis front lobes. A common and, consequently, the six EACs take over
impact bar, connected to four piston- the effort in parallel.
mountings, pushes the cartridges inside According to the simulations, the Raptor
the tubes in the event of a frontal impact SKA system is capable of a dimensional
and squeezes the energy-absorbing foam. compensation around 300 mm in case of
Two rigid pillars provide a stable base front impact and 75 mm for lateral impact,
between the elastic (EAC series) and rigid without any damage of the chassis.
Where is the Innovation?
In terms of the passive safety systems in automotive industry, the Raptor SKA concept claims
to be a top-level solution. Even if all of the important automakers implemented passive safety
items, such as reinforced carbon fiber monocoque and vehicle deformation control, there is no
similar system on the market that enables not only the passengers’ safety, but the car chassis’
as well, involving minimum costs.
However, the fact that the concept revolves around one key element, the EAC, that can be
used whether in front or on the sides of the vehicle, gives the system a high level of modularity.
In conclusion, a system exclusively created for a precise purpose, as the foam and cartridges
of the Raptor SKA system, will always be preferable instead of trying to find best compromise
related materials, geometry and impact dynamics in case of an unfortunate incident.

What are the Advantages?

High safety level due to the EAC’s foam The best protection for the carbon fiber
purposely designed to absorb as much chassis in case of soft or medium impacts.
energy as possible at the time of the The rolling chassis is probably the most
impact; expensive item in the Momentum Huvra
vehicle and a non-reusable post-accident
The secondary passive safety function, part (in case of damage), hence this feature
which allows the chassis to go slightly up, represents a great advantage;
compensating the dynamic loading of the
front axis during breaking, improving the The second level of protection in case of a
impact dynamics and, finally, increasing major incident when the passive elements
the chances of survival in case of a frontal of the system would have collapsed in a
impact; controlled manner (when the foam in all
EACs would have already collapsed);
The modularity of the system, produced by
the EAC component used in both front and The system’s attribute of integrating
lateral subassemblies. This advantage, simultaneously both user-friendliness and
together with the economical EAC efficiency.
manufacturing, brings up the cost-
effectiveness advantage of this system;
CryptoDATA’s Vision, Mission & Strategies

Our company’s mission is to bring technology development and digitalization to every person
and organization for creating a smart and completely connected world.
In our vision, access to information through connectivity is and should be a basic right that
underlies human progress for helping economic growth and, consequently, improving the
standard of living.
The success of good connectivity is given by the transparency of the services provided to
customers. Users should have the right to decide what and how it is happening while being
protected by the technology they use.
For an immediate acquiring and fast assimilation of the new launched technologies,
CryptoDATA should understand its customers’ needs in order to provide a personalized
experience to each and every one of them.
The coordination and collaboration between CryptoDATA and its users will stimulate a fast and
large-scale innovation of technology. Thereby, a personalized experience will be available to
everyone while respecting both the user’s and company’s uniqueness.

Unlimited Access through The launch of the VOBP and B-IPFS


Digitization technologies and, also, their
implementation in the physical products -
Data and information can be found IMPulse K1 and WHIM, have shown to both
everywhere. Our mission, as technology the company’s members and to the people
promoters, it to integrate everything in the that the future is about mobility and secure
form of intelligent platforms using the access. Through the launch of these
blockchain technology, but at the same products, we managed to overcome the
time, to preserve uniqueness through difficulty of bringing both unlimited access
decentralization. and security into one system.
For keeping up with fast changes and with In CryptoDATA’s vision, autonomy can be
the large flow of information, CryptoDATA approached in two equally important ways
had to incorporate all these and adapt its that can be treated both independently
strategies, organizational structures, and together.
processes, research and development, as In terms of electronic products, we can
well as marketing and services. refer to autonomy as both the duration of
In the company’s operating policy, the use, as well as the possibility of making
implementation of digital platforms is decisions by themselves. CryptoDATA has
absolutely necessary and we consider that channeled its resources into research and
without decentralized and fast access, a development to facilitate both conditions.
successful digital transformation cannot The current limits imposed by the
take place. operating life have been exceeded by the
development of the Bank of Energy
The Future Means Mobility and concept and Smart Battery Sharing
Autonomy technology. The implementation of this
concept has led to the emergence of a new
Digitization without mobility is impossible. battery patent and a decentralized digital
All products and services should ensure platform for energy use and transfer.
people’s instant access at any time and Being a new concept and quite difficult to
from anywhere. CryptoDATA’s mission is to understand by most users, artificial
develop products and services that can intelligence has been adopted, adapted
overcome the challenges brought by the and implemented by CryptoDATA in its
users’ needs. developed products. This A. I. has created
the need of a very high computing power future technologies as BIDDC and
and a new architecture for transferring and GlobarLink, but also in technologies that, at
storing information. In order to face these the moment, are in the concept stage, such
new challenges, the development of data- as Smart City.
centers for data and cloud service The main mission of our company remains,
processing was necessary. Through all to a however, channeled on the user’s
huge computing power and necessary technology acquisition. For us, the user
mobility. represents the core of the whole ecosystem
The development of the A.I. Zixxar chip and all the work done by our company is
represents a great asset to users because it based on providing a unique experience in
offers them a unique experience and accordance with the customers’ needs and
makes their life easier. This technology has requirements. In order to achieve a
been introduced into the autonomous successful implementation, our mission is
drive ecosystem and implemented in the based on the user’s proper acquisition,
Momentum automobile. Its communication and use of technologies
implementation will also take place in with the help of CryptoDATA.

Industry Trends
Advanced technologies, especially A.I and Cloud Computing, were developed during the
fourth Industrial Revolution. These technologies open the door to a new world where
everything has senses and intelligence and everything is connected, leading to great changes
in our way of living, working, learning and communicating. Every economy, industry and user
should and will employ these intelligent connectivity technologies in order to overcome the
limits and borders of development and evolution more quickly.
In the era of technology, industries within every field of activity explore the methods of
developing products and services that have the user’s needs as their core functioning element.

Smart devices must WORK for new architecture is built around


users’ needs only. smartphones, accessible through tablets,
personal computers, portables, TVs,
As smart devices become more widely speakers and car devices incorporating IoT
used, bundled with a multitude of control over home appliances, lighting,
applications, we want to share, manage security, audiovisual and surveillance
and secure our information in more ways systems. This strong connectivity of smart
than ever before. New technologies, devices creates an intelligent user-focused
especially the A.I, enable our devices to be ecosystem that knows what users need.
more intelligent, so they can provide us an
increasingly efficient help. Building a new communication
Traditionally, smartphones, smart home network
appliances and smart speakers function
independently, storing data and applying As a technology provider, CryptoDATA
new features locally. A. I will change this by considers that it is the company’s
connecting these devices to one another responsibility to build an ecosystem based
for enabling more power through on security and innovation that offers users
connectivity, synergy and knowledge. The all the necessary freedom. Together with
our partners and our network’s users, the New opportunities always bring up new
technology of the future could digitize the challenges. The technologies developed by
entire world in a unique way. the involved communities need to be
All people’s products and needs tend embraced by both CryptoDATA and all
towards digitization, the need for technology users. Every digital space
intelligent machines becoming more and should be used to the maximum in order
more urgent. Analyzing all these trends, not to miss the growth opportunity. This
CryptoDATA invests important resources development and knowledge of
for the implementation of the BIDDC technologies will help the protection of
network for the users’ benefit. both global and individual economies as
we move on a smart growth’s fast track. It is
necessary for us to be working together in
New Technologies: Blockchain and order to build secure and reliable networks,
Cloud Computing to ensure a continuous connection, but also
innovative applications and platforms.
As the digital industry and human needs
evolve, CryptoDATA invests in the Electricity Future Energy of Smart
development of innovative algorithms that Mobility
can exponentially increase computing
speed and data transfer. Because of the At the same time with the development of
increasing diversity of applications, data technology and global digitization, a new
becomes more and more complex and the need has emerged - the need for electricity.
implementation of blockchain technology As the digital future is near, the industry’s
is required. trend is to develop new technologies based
All these future-oriented developed on electricity, energy that should be clean,
architectures need low energy renewable and infinite. CryptoDATA makes
consumption, also, maximum research and invests many resources in the
performance. The algorithms implemented development of smart energy technologies
for processing power use high-quality and concepts.
GPUs, but, also, A.I chips. Discoveries on One of the fast-developing branches is the
quantum computing and neuromorphic automotive industry that tends to change
computing will take computing power to a its activity and implement mobility through
new level, however, these technologies’ electricity. CryptoDATA team works on
implementation still requires much more implementing the concept of Smart
research and development. Energy Sharing [SES] in order to eliminate
Digital Collaboration in a the existing borders and revolutionize the
Decentralized Way industry.

You might also like