Standalone hardware bitcoin client: even more anonymity and reliability for bitcoin
Radio enabled smartcards as a self-sustainable wireless media: no recharge and no immediate internet connection needed

The reliability of the Bitcoin system is assured primarily by encryption. The system's main vulnerability is the Bitcoin wallet, created as a file on the computer. If a hacker (or a computer virus) gains access to the computer and can read this file, he (it) will be able to transfer all the money to his (its) anonymous account where it will be nearly impossible to find. It will also be impossible to prove to anyone that you did not voluntarily transfer the money to your own anonymous account.

Our Bitcoincard, a stand-alone device that in effect acts as an electronic wallet, can be used to hide the wallet in a safe place (outside the computer, making it inaccessible to hackers).

It is worth noting in this regard that:

digital signature keys are created and stored inside the card, and never leave it;
the card does not have an operating system or the ability to download additional software, which protects the card from attacks by viruses;
the exchange protocol with the outside world is simple and protected by encryption;
if the card is lost, the money it contains is also irrecoverably lost;
the card is completely anonymous;
the card has unmatched energy efficiency, and does not need to be charged;
the card has unprecedented processing power for an ordinary smart card;
the cards can perform peer to peer transactions using their own radio protocol in the absence of any communications infrastructure;
the cards should periodically come close to any gateway in order to synchronize their state with the global bitcoin system.

In essence, Bitcoincards are Bitcoin clients and support the following operations:

creation of an electronic wallet (addresses);
receipt of coins from Bitcoin clients;
transfer of coins to Bitcoin clients;
transfer of coins from card to card (bypassing the Bitcoin system during transfer, but having all transactions subsequently recorded in the system and verified by it).