Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
ENHANCED SECURITY
Document Type and Number:
WIPO Patent Application WO/2021/015850
Kind Code:
A1
Abstract:
A piece of hardware with perfect continuous encryption. A protected application launched from the hardware confirms the serial number or other numbers that are specific to the hardware in question. This will allow the computer to be verified and activate the drive. At time intervals the matched pieces of hardware create a random "passphrase" using a random number generator with the equation for PI calculating the next digit of PI as the matching ''passphrase''. The matched passphrases can either have the same numerical starting position in the decimal position of PI and calculate the next number or this same random number generator can be used to create a random password. After a set interval of time this repeat, and it verifies the security of the matched devices and it creates great cybersecurity measures if used as a plug-in or any other method of connecting pieces of hardware.

Inventors:
DELAHOUSSAYE KEVIN (US)
Application Number:
PCT/US2020/035027
Publication Date:
January 28, 2021
Filing Date:
May 29, 2020
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
DELAHOUSSAYE KEVIN (US)
International Classes:
G06F21/00; G06K5/00
Foreign References:
US20060180660A12006-08-17
US20090260002A12009-10-15
US20130097694A12013-04-18
US8984296B12015-03-17
US7549161B22009-06-16
US7437752B22008-10-14
Download PDF:
Claims:
Claims

Enhanced Security

I: A piece of hardware with perfect continuous encryption.

I I : Derivative applications can be made to make this patent useful for signing into buildings, holding people responsible and many other possibilities.

I I I : A protected application launched from the hardware confirms the serial number or other numbers that are specific to the hardware in question. This will allow the computer to be verified and activate the drive.

AMENDED CLAIMS

received by the International Bureau on 10 November 2020 (10.11.2020)

Claims

Enhanced Security

1: A configuration of photoreceptors aligned with sources of electromagnetic radiation. The intensity of the photoreceptor outputs Is taken as a variable. This variable can be set to any other variable. As the output changes the output changes and gives different outputs of a variable.

2: A configuration of photoreceptors aligned with sources of electromagnetic radiation in which the outputs of the photoreceptor are meant to correspond to an inputted variable. As the series of outputs corresponding to the variable changing over time the input is changed with new information as the software is configured such that the input is a variable and its change over time can be represented with the change in output of the photoreceptor.

3: A configuration of photoreceptors entangled with a source of electromagnetic radiation in which the different photoreceptors act as qubits or bits that can have a measurement of different states more than on or off, or 1 or 0. The differing outputs of the photoreceptor-Electromagnetic radiation complex act as qubits that can change into many states other than 0 or 1. The totality of outputs can be taken to give a representation of the variable over the time programmed by the person controlling what the variable input stands for. Each output in each of complexes is measured such that all iterations of the variable changing over time are viewed.

Description:
(A) Specification

Enhanced security

B: Cross Reference to Related Applications: 16/521, 582::07-24-2019::63/030, 908:: 05/27/2020 ( C ) Regarding Federally Sponsored Research or Development: Not Applicable

( D): Regarding The Names of The Parties To a Joint Research Agreement: Not Applicable

E: Incorporation by reference of material submitted on a compact disc or as a text file via the The Office Electronic Filing System (EFS-Web): not Applicable

F: Statement Regarding Prior Disclosures by The Inventor Or a Joint Inventor: Not Applicable

Background of invention:

A problem exists in the world in this digital age. That problem is the privacy. The current encryption programs on the market are not 100% effective and not secure on many ways. A piece of hardware specific to a computer, such as authenticating the registered serial number or any other non-changing signature of the pieces of hardware.

Brief Summary of Invention:

A piece of hardware with perfect continuous encryption. A protected application launched from the The pieces of hardware will then become active.

hardware confirms the serial number or other numbers that are specific to the hardware in question. Intended Use:

This will allow the computer to be verified and activate the drive. At time intervals the matched pieces An application that makes the computer present the serial number or any non changing signature with an of hardware create a random "passphrase" using a random number generator with the equation for PI application for continuous security and protection

calculating the next digit of PI as the matching "passphrase". The matched passphrases can either have

the same numerical starting position in the decimal position of PI and calculate the next number or this

same random number generator can be used to create a random password.

You can use both. After a

set interval of time this repeats and it verifies the security of the matched devices and it creates great

cybersecurity measures if used as a plug-in or any other method of connecting pieces of hardware. A piece of hardware with perfect continuous encryption. A protected application launched from the hardware confirms the serial number or other numbers that are specific to the hardware in question. This will allow the computer to be verified and activate the drive. At time intervals the matched pieces of hardware create a random "passphrase" using a random number generator with the equation for PI calculating the next digit of PI as the matching "passphrase". The matched passphrases can either have the same numerical starting position in the decimal position of PI and calculate the next number or this same random number generator can be used to create a random password. You can use both. After a set interval of time this repeats and it verifies' the security of the matched devices and it creates great cybersecurity measures if used as a plug-in or any other method of connecting pieces of hardware.

(K): Claim or Claims: See Document "Claims"

(M): Sequence Listing: Not Applicable

(L): Abstract of Disclosure: See Document "Abstract"

Pictures: N/A