support

Wallet – Sending Documents to Single Users or Lists

Wallet Security: Sending Documents to Individuals and Lists

The GenioSms Wallet is designed for high-stakes document sharing. Whether you are sending a file to a single recipient or a list of thousands, our system ensures that only verified users can access your data.

1. How to Distribute Secure Documents

Sending a file is as simple as inserting a shortcode into your SMS campaign.

The Identifier: Every document in your Wallet has a unique ID.
The Syntax: Simply include the tag `id_NN` (where `NN` is your document ID) in your message.
Automatic Linking: Our servers automatically convert this tag into a secure, personalized download link for every recipient.


2. Advanced Security Protocol: The Multi-Layer Shield

Our security goes beyond a simple password. We use a Zero-Trust approach to verify every access attempt.

Step-by-Step Authorization Flow:

1. Whitelisting: Only the phone numbers you explicitly authorize (via the Wallet panel) are allowed to trigger an access request.
2. Identity Challenge: The user clicks the link and must enter their phone number. If the number matches your authorized list, the system sends a One-Time Password (OTP).
3. Firewall Authorization (IP Whitelisting): Once the correct OTP is entered, our system identifies the user's IP Address. Our firewall then opens a temporary "tunnel" specifically for that IP.
4. Access Window: The IP remains authorized for approximately 30 minutes, after which the session expires and the "tunnel" is closed.

Why this is unhackable: Even if an unauthorized person knows your document ID or intercepts the link, they cannot receive an OTP because their number isn't on the authorized list. Even if they try to spoof the link, our firewall will block any IP that hasn't successfully passed the OTP verification.


3. Privacy First: Why Avoid WhatsApp or Email?

Traditional sharing channels are inherently insecure for sensitive business data.

The AI Threat: Files sent via WhatsApp or Email are scanned, indexed, and archived by AI systems for profiling and data mining.
Lawful Interception: Traditional channels are subject to interception. Because the GenioSms Wallet uses Point-to-Point IP Whitelisting, your data packets are only visible to the verified recipient's IP.
Data Sovereignty: With GenioSms, your documents remain in a secure vault, protected by a hardware-level firewall.


4. Real-World Scenarios

Example: The Authorized Recipient

Action: You send a document to `340 340 340`.
Result: The user enters their number, receives the OTP, and their IP is whitelisted. They view the file securely. All timestamps and IP logs are recorded in your dashboard for your audit trail.

Example: The Unauthorized Intruder

Action: An intruder discovers your document link and enters their number: `333 333 333`.
Result: The system recognizes the number is unauthorized. No OTP is sent. The intruder’s IP remains blocked by the firewall, and the document remains invisible.


Summary of Wallet Protection

Time-Limited Access: IP authorization expires after 30 minutes.
Audit Logging: Full logs of every access attempt, including timestamps and verified IPs.
Anti-AI Scanning: Your files are never indexed or read by third-party bots.

install_mobile
savings
quickreply
bar_chart
Products Guide Info Dashboard
Bulk messages sending Install application Recharge Login
Repeated message Wallet digital signature 3fg Sms api dev Register
Autoresponder Bulk messages sending Prices Language
Api Scheduled/repeated sms sending Privacy
Surveys Autoresponder General terms
Subscription Api Verify digital sign
Wallet Surveys Gateway sms app
Credits Subscription lists and structure
keyboard_double_arrow_up