\

Applications

  1. Digital data over traditional media like Print and Voice
    • Telephone Number
    • FAX Number
    • Email Address
    • URL
    • Geographic Coordinate
    • Software Registration Keys
    • One Time Password (OTP)
      e.g. 2-Step verification keys
    • Substitute codes
      e.g. Alpha-Numeric content of barcodes & QR Codes
    • Encoded Identifiers
      e.g. YouTube video ID & Shortened URL ID
    • Small file and Raw data
    • Formatted data (only the value fields)
      e.g. a medical report

    – can be communicated as few words conveniently on:
    billboards, magazines, business cards, voice calls and announcements.
  2. Memorizable Clipboard across non connected systems
    Systems across which Copy-Paste is unavailable, WCodes can be used to conveniently transfer data.
    e.g. FF B2 7D 76 34 54 <> Mango America Coffee Milk
  3. Random Password
    Computer generated – high entropy, random passwords can be encoded into WCodes which are easy to remember.
  4. Complex Text
    Complex names and technical terms like computer commands can be communicated with simple WCodes.
  5. Foreign Language Text
    Foreign Language text, even those written in a different script, can be encoded into WCodes.
  6. Native Language Codes
    Native language words can be used to encode into WCode.
    Thus accessible to non-English speaking populace.
  7. Logographical WCodes
    Logographs can be used against words of a WCode.
  8. Hash verification
    Short pieces of digital data like file hash can be verified quickly.
    Also, a logographical representation of the hash can be used which will make the visual comparison much easier.
  9. Verified Communication
    With Checksum embedded in a WCode the received data can be verified.
  10. Resilient Communication
    Critical communication can be made resilient to errors by incorporating Data Correction techniques.
    The resultant WCode will be longer but data can be recovered in spite of 'some' errors in communication.
  11. Secure Communication
    Can be used to establish encrypted communication protected by scrambled or custom dictionary or by extremely secure asymmetric key algorithms.