Unsupported browser

You are using an outdated browser. Please upgrade your browser to improve your experience.

Sign up for an Award

Participate with your entry in one of our professional or student awards.

Sign up for an award

Sign up for a Profile

Create your own profile and publish it in the iF WORLD DESIGN GUIDE.

Sign up for a profile

Learn more:

iF SOCIAL IMPACT PRIZE

Present your project for free and win your share of EUR 50,000 in prize money.

Publish your project

QK / Hacking Device

QK
QK

How do we protect the information by hacking them?
Protection of information is necessary in secret operation. Protection of secret information leads to protection of strategy of the operation.The QK device with the ability to execute the two processes of coding and pictography, follows three important goals:
1- Alteration of information of system memory card
2- Restoration of correct information in the system memory card
3- Notification of hacked digital systems to the main user
According to practical goals of QK device, it connects with other digital systems by electromagnetic waves.

University

IUST

IUST
Tehran, Iran

Roya Mohamadiha,
IUST