Bharat Projects by GNA
  • BHARAT PROJECTS WHITEPAPER
  • Welcome to Bharat Projects
  • Abstract
  • Introduction
  • Mission & Vision
  • Project Overview
  • BHARAT TOKENS
    • BTSC
      • Tokenomics
      • BTSC Market Strategy Characteristics
  • Main Business Pillars
  • TECHNOLOGY & SERVICE
    • Technology
      • Quantum Cryptography Technology
      • Blockchain Integration
      • Replace QKD
      • Post-Quantum Cryptography
      • Conclusion
      • Quantum chip
    • Service
      • Bharat Smart Wallet
      • Bharat AirFi
      • Smart City
      • Smart Battery & Generators
  • ROADMAP
    • Roadmap
      • 2023
      • 2024
      • 2024 Q3~Q4
      • 2025 Q1~Q4
      • 2026 Q1~Q4
  • PUBLIC INFORMATION
    • Official Website
    • Social Media & Community
    • Partners
  • Privacy Policy
  • Disclaimer
Powered by GitBook
On this page
  • GNA quantum chip device + Biometric authentication
  • Overview
  • Features
  • Significant Benefits of Incorporating Biometric Authentication into USB Devices
  • Features
  • Use Cases
  • Main causes of hacking and countermeasures
  • Authentication performed on terminals and servers used in the India project
  1. TECHNOLOGY & SERVICE
  2. Technology

Quantum chip

GNA Quantum Encryption Device System

PreviousConclusionNextService

Last updated 3 months ago

GNA quantum chip device + Biometric authentication

Overview

Quantum cryptography is the technology that will take next generation financial formats to the next level. GNA uses quantum true randomness, which takes advantage of the randomness and secrecy of subatomic behavior caused by spontaneously collapsing quantum phenomena. With this system, we have completed an authentication system that is theoretically impossible to hack using current digital networks. We can finally unparalyze the traditional financial system.

The GNA device is equipped with a GNA quantum encryption chip with quantum characteristics, has an advanced quantum design, and is USB-connectable and easy to handle.

Features

・70 trillion random numbers are generated per second.

・Random number generators can be small and compact.

・The cryptographic algorithm required for encryption is a privately developed proprietary technology.

・Quantum encryption communication can be easily performed by pairing devices using GNA.

・By linking with the ETH blockchain, it is possible to prevent unauthorized login and authentication 100%. Financial grade database, quantum encryption of transactions.

・GNA is quantum resistant.

・Not to mention various devices. Cloud server and on-premises available.

As mentioned above, integration with the ETH blockchain is possible.

The system becomes more robust by combining with blockchain technology.

The authentication technology adopts biometric authentication, inherently incorporating identity verification into the system.

Significant Benefits of Incorporating Biometric Authentication into USB Devices

As mentioned earlier, despite having excellent CBDC and security technology, unforeseen incidents such as counterfeiting, misuse, or theft may still occur at times.

We have measures in place to handle unforeseen incidents with peace of mind.

Features

This USB device enables touchless payments like Suica (NFC) and credit cards on payment terminals. By confirming fingerprint vein authentication during payment, it ensures high security while facilitating smooth transactions. Attaching this device to items like keychains allows for payments even without a mobile phone.

Use Cases

For instance, in case of losing your mobile phone while traveling, purchasing a new one nearby and inserting this USB device will revive the phone, restore data, and reconstruct quantum cryptographic pairing. Moreover, even if unable to make payments without a mobile phone, linking credit cards or Suica to this USB device enables purchasing a new phone. This significantly reduces credit risks and asset loss risks while abroad.

Non-Japanese users can also utilize this USB device for touchless payments similar to Suica (NFC) or credit cards, serving as a convenient wallet and payment terminal. As such, there is expected swift demand for this solution.

Therefore, the introduction of this system can provide a safe and convenient digital payment environment, simultaneously enhancing user satisfaction and security.

This allows secure connections with banking systems.

Furthermore, it can bring robust security to personal information management systems requiring essential identity verification, such as the My Number system.

Main causes of hacking and countermeasures

What you need to know to prevent 1) VPN hacking, 2) hacking when connecting to the internet connection to a payment terminal, and 3) hacking of bank tokens.

Countermeasures for Hacking

Response Details

1. Preventing Reuse of ID and Password

Use quantum random numbers for one-time use only

2. Setting Password Expiry Period

Use one-time quantum random numbers each time

3. Implementing Two-Factor Authentication

Input within the chip to eliminate the need for external input

4. Avoiding Easily Guessable Passwords

Use quantum random numbers that never repeat the same value

Our quantum random number generator can always generate different random numbers and solve these problems!

Authentication performed on terminals and servers used in the India project

① The device where the quantum random number generator is installed can be a PC, mobile device, or server, but for the purpose of explaining the principle, we will explain the case where it is installed in a token.

Authentication performed on the terminal and server side used in the India project uses quantum phenomenon random numbers, so first use a secure computer that is not connected to the internet, and use Token A (terminal side) and Token B (server side). ) stores a pair of quantum phenomenon random numbers.

② After the initial data exchange described above, start the authentication process.

The screen displayed on the terminal is encrypted using Token A data from the server, which is then decrypted and displayed on the terminal side. With this method, the screen created by the hacker will no longer be displayed.

To enter the authentication screen displayed on the terminal, enter the quantum phenomenon random number generated with Token A. This eliminates the need for data input from human memory and prevents fraud. *Details of communication procedures and encryption/decryption procedures will be disclosed based on the contract.

It's very easy to use. All you have to do is attach the quantum device. What's more, it protects against 100% hacker attacks. This Quantum cryptography cannot be broken even using quantum computers.

This quantum cryptography does not use a code. it is a “quantum phenomenon”, so it is impossible to decipher the code.

GNA Quantum chip β ver. image
Fingerprint vein authentication system