- Digital data over traditional media like Print and Voice
- Telephone Number
- FAX Number
- Email Address
- URL
- Geographic Coordinate
- Software Registration Keys
- One Time Password (OTP)e.g. 2-Step verification keys
- Substitute codese.g. Alpha-Numeric content of barcodes & QR Codes
- Encoded Identifierse.g. YouTube video ID & Shortened URL ID
- Small file and Raw data
- Formatted data (only the value fields)e.g. a medical report
– can be communicated as few words conveniently on:billboards, magazines, business cards, voice calls and announcements. - Memorizable Clipboard across non connected systemsSystems across which Copy-Paste is unavailable, WCodes can be used to conveniently transfer data.e.g. FF B2 7D 76 34 54 <> Mango America Coffee Milk
- Random PasswordComputer generated – high entropy, random passwords can be encoded into WCodes which are easy to remember.
- Complex TextComplex names and technical terms like computer commands can be communicated with simple WCodes.
- Foreign Language TextForeign Language text, even those written in a different script, can be encoded into WCodes.
- Native Language CodesNative language words can be used to encode into WCode.
Thus accessible to non-English speaking populace. - Logographical WCodesLogographs can be used against words of a WCode.
- Hash verificationShort pieces of digital data like file hash can be verified quickly.
Also, a logographical representation of the hash can be used which will make the visual comparison much easier. - Verified CommunicationWith Checksum embedded in a WCode the received data can be verified.
- Resilient CommunicationCritical communication can be made resilient to errors by incorporating Data Correction techniques.
The resultant WCode will be longer but data can be recovered in spite of 'some' errors in communication. - Secure CommunicationCan be used to establish encrypted communication protected by scrambled or custom dictionary or by extremely secure asymmetric key algorithms.
Error!
⌂
\