WO/2019/152421 | CONTEXT PROFILING FOR MALWARE DETECTION |
JP2004364315 | METHOD AND FRAMEWORK FOR INTEGRATING A PLURALITY OF NETWORK POLICIES |
JP2006332990 | PERSONAL VIDEO IMAGE CIRCULATING SYSTEM |
US20060180660A1 | 2006-08-17 | |||
US20090260002A1 | 2009-10-15 | |||
US20130097694A1 | 2013-04-18 | |||
US8984296B1 | 2015-03-17 | |||
US7549161B2 | 2009-06-16 | |||
US7437752B2 | 2008-10-14 |
Claims Enhanced Security I: A piece of hardware with perfect continuous encryption. I I : Derivative applications can be made to make this patent useful for signing into buildings, holding people responsible and many other possibilities. I I I : A protected application launched from the hardware confirms the serial number or other numbers that are specific to the hardware in question. This will allow the computer to be verified and activate the drive. |
AMENDED CLAIMS received by the International Bureau on 10 November 2020 (10.11.2020) Claims Enhanced Security 1: A configuration of photoreceptors aligned with sources of electromagnetic radiation. The intensity of the photoreceptor outputs Is taken as a variable. This variable can be set to any other variable. As the output changes the output changes and gives different outputs of a variable. 2: A configuration of photoreceptors aligned with sources of electromagnetic radiation in which the outputs of the photoreceptor are meant to correspond to an inputted variable. As the series of outputs corresponding to the variable changing over time the input is changed with new information as the software is configured such that the input is a variable and its change over time can be represented with the change in output of the photoreceptor. 3: A configuration of photoreceptors entangled with a source of electromagnetic radiation in which the different photoreceptors act as qubits or bits that can have a measurement of different states more than on or off, or 1 or 0. The differing outputs of the photoreceptor-Electromagnetic radiation complex act as qubits that can change into many states other than 0 or 1. The totality of outputs can be taken to give a representation of the variable over the time programmed by the person controlling what the variable input stands for. Each output in each of complexes is measured such that all iterations of the variable changing over time are viewed. |
Enhanced security
B: Cross Reference to Related Applications: 16/521, 582::07-24-2019::63/030, 908:: 05/27/2020 ( C ) Regarding Federally Sponsored Research or Development: Not Applicable
( D): Regarding The Names of The Parties To a Joint Research Agreement: Not Applicable
E: Incorporation by reference of material submitted on a compact disc or as a text file via the The Office Electronic Filing System (EFS-Web): not Applicable
F: Statement Regarding Prior Disclosures by The Inventor Or a Joint Inventor: Not Applicable
Background of invention:
A problem exists in the world in this digital age. That problem is the privacy. The current encryption programs on the market are not 100% effective and not secure on many ways. A piece of hardware specific to a computer, such as authenticating the registered serial number or any other non-changing signature of the pieces of hardware.
Brief Summary of Invention:
A piece of hardware with perfect continuous encryption. A protected application launched from the The pieces of hardware will then become active.
hardware confirms the serial number or other numbers that are specific to the hardware in question. Intended Use:
This will allow the computer to be verified and activate the drive. At time intervals the matched pieces An application that makes the computer present the serial number or any non changing signature with an of hardware create a random "passphrase" using a random number generator with the equation for PI application for continuous security and protection
calculating the next digit of PI as the matching "passphrase". The matched passphrases can either have
the same numerical starting position in the decimal position of PI and calculate the next number or this
same random number generator can be used to create a random password.
You can use both. After a
set interval of time this repeats and it verifies the security of the matched devices and it creates great
cybersecurity measures if used as a plug-in or any other method of connecting pieces of hardware. A piece of hardware with perfect continuous encryption. A protected application launched from the hardware confirms the serial number or other numbers that are specific to the hardware in question. This will allow the computer to be verified and activate the drive. At time intervals the matched pieces of hardware create a random "passphrase" using a random number generator with the equation for PI calculating the next digit of PI as the matching "passphrase". The matched passphrases can either have the same numerical starting position in the decimal position of PI and calculate the next number or this same random number generator can be used to create a random password. You can use both. After a set interval of time this repeats and it verifies' the security of the matched devices and it creates great cybersecurity measures if used as a plug-in or any other method of connecting pieces of hardware.
(K): Claim or Claims: See Document "Claims"
(M): Sequence Listing: Not Applicable
(L): Abstract of Disclosure: See Document "Abstract"
Pictures: N/A
Next Patent: AMBIGUITY RESOLUTION WITH DIALOGUE SEARCH HISTORY