AU2004200951B2 - Extension for information processing using photon image transmission - Google Patents

Extension for information processing using photon image transmission Download PDF

Info

Publication number
AU2004200951B2
AU2004200951B2 AU2004200951A AU2004200951A AU2004200951B2 AU 2004200951 B2 AU2004200951 B2 AU 2004200951B2 AU 2004200951 A AU2004200951 A AU 2004200951A AU 2004200951 A AU2004200951 A AU 2004200951A AU 2004200951 B2 AU2004200951 B2 AU 2004200951B2
Authority
AU
Australia
Prior art keywords
data
image
cam
information
screen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2004200951A
Other versions
AU2004200951A1 (en
Inventor
Rod Holding
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2003901016A external-priority patent/AU2003901016A0/en
Application filed by Individual filed Critical Individual
Priority to AU2004200951A priority Critical patent/AU2004200951B2/en
Publication of AU2004200951A1 publication Critical patent/AU2004200951A1/en
Application granted granted Critical
Publication of AU2004200951B2 publication Critical patent/AU2004200951B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Landscapes

  • Image Processing (AREA)

Description

06-NOV-2006 89:84 WAYFARER4 65434655 P. 19 1 r
AUSTRALIA
Patents Act 1990
;I
'I
This i. A
A'
COMPLETE SPECIFICATION STANDARD PATENT (TENSION FOR INFORMATION PROCESSING USiNG iOTON IMAGE TRANSMISSION owing statement is a ull decription of this invention, including:thebst idofperformingitiowntonme. j a progression of provisional Specification filed on the 6 March 003.
ited application number 2003901016 by Rod Holding.
RE~VEI3 MAR: 100
:MA:
Sr RAi ItRRVA COMS ID No: SBMI-05262328 Received by 1P Australia: Time 10:05 Date 2006-11-06 i6-N~OV-200 09:02 WAYFARER. 65434655 P. 18 o Extasion foar Information Proceing o This knention relates to the development of a'secured', infonation trnnsna method for t$ internet, based around an optical firewall. This system utilizes a sram to display pixet depiction as data These image projections are used as an infonnrmation transmission, oto carried by light to a cam for this imaged data's, digitalization and processing Tbc stas of development necessary to operate this optical firewall innovation to its optinme poteMial will be described in points, these are the descriptions that relate to a claim, the first escription of the optical firewall uses letter point form A to 0, describing the tr claim the numbered point fbrm,explain the inventive steps froml n 12 and e dependent claims 13 to 25 and 26 to 31.The discriptions from 32 an describe 1 e future developments to this method of opperation.
N The. paying technical drawings will help describe the operation of this pmrcess wItrelevant cross refrencing it the end of each associated poit.
Optical firewall transmissions opeate by utiling light, as incident mray projecins ned via a depiction screen's ananged pixels, as imaged data portrayals. This imaged f datais used for photonic tumnsference for image detector collection, by CCD image db This mechanism operates in a similar process to screened pixel image sn by and interpreted by the brain, 'IThere are two issues operating in this apparatus, Brdy the Wiovation of directly copying information by cam from a screen, reftred to as cuc"-can. Secondly the phenomenon of"transmissioning imaged data", as light screen and cam as an actual representation of the screened information, without ng hidden manipulations within a viruses code. This Severs any conected portal fr control or virus attack into the cam's duplicated image being processed and stored in atieed computer system. This photonic shielding of data is refered to as an optical fi 1 SThis image scaen depicts processed information from any suae, it wht transmitted by incident rays of light can be collected on CCD image delectos for re-digitalized image file processing The CCD image detectors may be a digit! camera or camcorder depending on the application, but in tie following descriptions I will refr to it as cam.
The screen can be any size but needs to be a non-flickering type with good clarity.
The more pixels a screen has and the faster they change, increases the potential ability for transmitting data It may be considered that a screen's luminance prqjects the image and is difert from incident y tray smission, but as a screen's photonic image pojections behave exactly as incident ays, in it interaction with its virtual imaged producing reflex rays, the imaged information transmission will be referred to in this description as incident ray transmisin or as an optical firewall-.
t, By using this screen to cam method, to transfer imaged data, a physical photunic barrier or shield is created between the online computer's imaged infonrtion, displayed fior optical firewalling and cam reccival to a secured computer's data bank or network. This information flow method can also be used to securely send 1j COMS ID No: SBMI-05262328 Received by IP Australia: Time 10:05 Date 2006-11-06 ala6-NXM-2006 09:00 WAYFARER. 65434655 P.17 NO1 0 imaged information displayed as a depiction data on a optically firewall socmed PC's soeen for transmission to a cam which is connected to a online omuter for sending through the intemt O The cam digitalizer's images from both light's incident ray, or its reflective my's virtual image, via a mirror, by taking optically firewalled images, via an area O array image detector cam, which then converts this image infonation to newly O formatted digital data files for the processing and storage by a seeCet computer.The virtual image's oppersite possition can be reversed by atrsms o i through a second virtual opticde firewall and when data is reversed by virtual optical fiewall into secured memoy storage it clearly proves the infmation was opticaly firewalled. This completely separates, cleans and seures optically the o screen-caned data from data's original binary notational source.
Cl I5 T:h is totally isolates and secures the personal computers re-digitalized image file data from message origin, including attached coded hacker interrogation and O iaack. The optical firewalls deliver complete protection for imaged data, O "cammed" to PC, even when the portrayed information is displayed directly to the screen from the constant online broadband or any other data soure.
SWith no physical copying or encrypting limitations the optical firewall offeus flexibility in data description by standardizing all protocols and platfoims of screened information into standa digital cam image file format for processig and storage. This is also an ex elent way to salvage virus dmaggd files into new files without risk of contamination into sewured PC.
The potential of the optical firewall is enhanced when linked to an image representation of data is recognized in processing language, that represented information is screen displayed as pixel data as geometrical formation graphic to be earn digitalized for image tile duplication processing by a recognition prgamme.
This operates similar to scanning depictions in bohnd writing or text recognition software currently available. Using programmed pixel graphics, formatted as images in an infirmnation code aligning the screens frame rate to the cam's comsponding copying sequences for a visually seen geometrically arranged pixel language of 3o compressed data, enabling a process of 'optdcal firewalling' for high speed data The secure PC operates as host while the open broadband PC acts as guest for simplified operating.
Refer toclaim 1, FI.1 and FIO.2.
Sand comparison of current computer security strategies is .pary t explain the 'inventive step' in this standard patent application. The technology used in IT security at the present uses a variety of methods that can be individually If dployed or owmbined, all offering only limited interet security. Incomplete information security creates massive problems for humanity from fraud to poverty by information distortion and totalitarianism.
The point of operation passwoni access security that inclide biometric techniqe 4. such as finger print recognition am fairly limited in their protection as the 17 COMS ID No: SBMI-05262328 Received by IP Australia: Time 10:05 Date 2006-11-06 06-NOV-2006 08:59 WAYFARER. 65434655 P.16
INI
o hardware can be taken apat fr information reieval, this is a gimmick offering Sno solution to online hacking or viruses. The reliance on this method when the computer is on line allows for the loss of personal infrmation including user's O fingerprints to hackers.
Z Antivirus software trolls through files and downloads only detecting unusually \O formed binary notation sequences that have previously been exposed as errant 0 This is not preventative but a post event tack on Problems exist when detecting sequence code aborations in this manner, when the message relays a virus's enat code, that behaves exactly as a normal routine t The constant updates and patches from these corporations producing antivius s software, and regular breakdowns in companies networks and data bases, Shighlights how often intrusions pass undetected once the modem of operation is undertood by the hacker. While different companies claim their superoity over 1- competitors through heuristics scanning the fact remains that once a Trojan passes Sthrough modem for proessing, the computer is already infected and security becomes a wing and a prayer. These anti virus software programmes can cease to be filters and become open porals by their downloads from online control of .0 personal computer for information extraction and monitoring by mckers. Many of these copmpanies that provide anti virus programmes profit from viruses, having dubious ties to vested interests i. Firewall hardware intercept downloads before they enter the CPU but if a recognised messaging format system is followed hackers the sequence coded routines which are known then there is no difference to discern an outside interrogation can control the routing of the sequence codes as intrusion is accepted through this method. Likewise disk virus scanners have all the benefits of a placebo if the virus resembles the identical format of data. Virus controlled information can flow out of networks as easily as it joins the network SCentralized data security operates similar to an internet provider acting as a firewall that pre-filters your information. These methods for backing up records which operate similar to a financial bank, that instead of your money managed for their profit, it's the management of your information. The legal flamewors these businesses operate under are fairly fluid and offer many levels of opportunty for backing of confidential IT storages for fraudulent purposes; These paristes become redundent with optical firewalling that opens up amazing possibilities of SIT interconnectivity in uMst The encryption used to transfer infonnation 'secretly' online is only operational 'j when the transmission it is able to decipherd by the recieving computer terminals, S hse being open to intrusion as is the oninal encrypting computer that set it The connecting of the so called IT super highway, either by optical fibre, copper, |t microwave or radio frequency, all have relay points which are all constantly monitored and open to infection. A variety of quasi govermenta organisaions which have a poor track record in security, for reasons best known to themseles, use captured information for their own vested intersts.Scanning and matching pixel imaged data with the source's templated' imaged pixel information, simply
I
COMS ID No: SBMI-05262328 Received by IP Australia: Time 10:05 Date 2006-11-06 06-NOY-2006 0 8:57 WAYFARER. 65434655 P. 4o displays any interferenes to data on its journey c The above dcribes why optically firewalling information is an inventive step.
>Below axe reasons why optical firwalling is crucial to the progress of bauiy.- O t Personal privacy, data security and the issue of unauthorised remote downloading, Zwhich can be used as a modemn police verbal mechanism in connection with 'surveillances cameras links to human online reporting, This "my oh" tabulation O has created information oalitarianism in the IT industry.
Thought has always developed in a personal and private area of the human brain, interaction between thought processes and a computer online, opens the ability fo Ir outside manipulations and coutminiatit Cyber mteiggnce ike biological intelligence a programmed a socialized to respond or not to respond to events SContinuous self programming and selfreplication by viruses within nvironntal C .15 events by cyber intelligence, creates nimicing exictences that through repitition will inevitably lead to complex viruses independently evaluating the conett of O self existence. This frm of artificial intellegent virus may already exist evolving within the gid-web with its contaiment between clusters dependent only on Soptically firewalling Ifan independently changing nd replicating virus is artificial intelligence, then isolating optically, the linked clusterings ofthe grid-web should be a priority.
SThe major difference to using an optical firewall and the industrys 'Security Device Spiel' is confidence in a safe constant broadband connection tthe I nternet. Knowing that this screen to cam, image information transmission security, works by scrapping illusionary IT protections. This gives control of the data base security back to the operator and frees up processing from anti virus clutter fir increasing memmory stomage.
With the daily trading of trillions of dollars on global stock exchanges, all in unsecurmd, unsourcable cyber transactions, the Trojan laundering is now immese. Using the principles of scientific rationalty to describe the .cf!y am guveraes of this massive laundering business as a "charade behind a fad", one can only logically conclude, that the multibillion dollar IT security induaty is the greatest fraudulent hoax of the millennium and facilitates the impovenishment of billions of people to a liftime of squaller.
STo describe the exact dimensions and processing capabilities of see to cam information transmission of this optical firewall, would be premateas the constant and dramatic performance, increases within updated maronmenta releases of the screen and cam components, used under differing mtt conditions may be limiting by explanation from its ever expanding tansnssion capabilities.
Fig l &2 cUOe FRAME multifunctionfl guide for both permanent mounting of optical fircwa~l*4 desk, ceilings or walls or as a pmtdftl compact copying device.
COMS ID No: SBMI-05262328 Received by IP Australia: Time 10:05 Date 2006-11-06 Oc:%-NOV72006 08:56 WAYFARER. 65434655 P.14
S
S J 4. Quick assembly of guide/frame for fast operating of optical firewall, using C, r position lockage at components peak prfoance positioning for the screm and cam attachable mountings on the adjustable frame. This guide maxmiEse's cam's S' focus clarity on the screen image in the optical firewall process of informatio transference by regulating distance and angle under multiple methods of usage.
This frame guide is made of a light robust material being both a portable base as a O compact appraus that can transform by folding out and sliding to expand for the operational connection of components. These mounts enable components to tilt change height and angle, allowing components a stable base to pertbrmf n The guide frame has tree placements for mounts, the 'central apex maont* is 0' c fixed in position guide-frame in each side of the central apex mount are the left Sand right sliding mounts. The position arrangement of these mounts when fixed to Cl components in various combinations for differing method outcomes ar described 15 as following descriptions.
SThe first method using guide frame is to aid the creen cam's informatin C transference for processing and storage as a portable copier compact and transported inside an attach6 case with components for quick assemble for qo1 'optical firewalled' information transferences from libraries, internet cafes or cleaning data of unknown osigin, known as jolly rogering There are three guide frame positional arrangements for this creen am transmission processing The apex mount attaches a cam that is position e d as the 'IS central transmission receivable point; this cam manually pans back and fith and locks into optimum positions for imaging data from one of the two srees at a time. One of these screens is attached to the guide frame left mount and its displayed image comes fam an online open computer the other scrten is attached to the guide frame's right mount and its displayed image comes from an optical o firewall secure computer.
STo simplify and speed up this operation the apex mounted cam pans 180 degrees back and forth between open and secured computer screens. Transmission from this cam is connected to a rotating switch that automatically connects and 31 disconnects directionally the re-ditalized data 'optically firewalled' btween the open online computer's display for re-digitized processing to the secured computer, where the cam reverses rotating This operates as a method of two way Simage transmission for optical firewall although data flow is one way at a time.
4o D. The Apex mount position is also used to attach mirror for angled image enhancements between sree attached to left slide mount and ca attached to right slide mount for a one way data flow and its virtual image is proof tha data iwas imaged through optical firewall.This Apex mount can mount a a mticed prism, so the screens image is split and displayed on its faces for each to be 4 alygned in an opticaly firewalod tranmision to multple caom CCD image 1 detctors for multple separated processing od imaged information.
The direction optical firewall uses guide frame to attach the image s r e mn on the left slide mount aligned for image transmission straight to cam on the right shlide
I
COMS ID No: SBMI-05262328 Received by IP Australia: Time 10:05 Date 2006-11-06 P6-NOY-2006 08:54 WAYFARER. 65434655 P. 13 0 j'mount, it is optional to use the central apex mount to attach a polaried glass to N restrict screens viewing angle and diret photons at cam. In morepennanent !operation Perspex can house the whole optical fiewall's components for privacy O land dust controlL FIG 4 S FI Second method of use is for peanently bolting two guide frames to house separated dual optical firalls on a desk as a gateway for constant sending and Sreceiving of broadband internet interaction, to and from a secured data base or o I network processing.
^Fig.6 The secured office networs relay information wirelessly, by fixing guide frme c 1 screecam housing to the office roof for the optically firewalled screen-aming |as a line of site image ransmission between horizontal desk screen transmsmio Sand roof cam and roof screen and desk cam data recieval or to and from sever 0 storag. Screens images size can be edud, enlargedor multiplied with image to splitting prism face caning and directionally angled and multiple tansmitted using mirror with no additional energy usage. Outside access to image information from this secured network is internally controlled, for image data leakage can only be viewed when displayed on screen or mirror screened, with images viewing denied, infbrmation is secured.
25 Viewing angle can be limited by the use of polarized glass between the sceen and cam. In optically firwalled stock exchanges taders would screen cam text mage S. information from a central scen to their desk cam for processing and ransmit responses from their desk's horizontally mounted screen imaging via direct 0 optical fiewalling to a cam mounted on carling for processing by exchang For increased utilisation of screen to cam imaged information transmision (optical firewall) the received cam data that digitalizes and convwts to image le for the programmed recognition processing of text, hand writing or graphic 3 depictions can be extended to all data including non imaged information. This extension is created by an object oriented graphics, recognition programme utilising data portrayed as image being screen depicted, by a geometrical assembling code ofpixel.
GEOMETRICAL PIXEL CODE PROGRAMMING.
SThe arranging pattern of pis in recognized image code enables large data transfers at high speed including the conversion of non image informatio such as sound into a programmd image code for screen imaged trasmission to cam Sreceival for digital image file processing.
4. The pixel image code at its smallest infonnation bit would be depicted as a short row of pixels, this pixel row can also porty additional data by corspoding its positional movement on scree in time aligned screen to cam frames To irese pixel rows imaging information performance different colour pixel rows denote differing data.
COMS ID No: SBMI-05262328 Received by IP Australia: Time 10:05 Date 2006-11-06 061-NOV72006 08:53 WAYFARER. 65434655 P. 12
\I
I T pixel rows information image value depends on its standard size, hmec, bostion and colour on screen, so when joined and assembled with other standard xel rows a language is calculated and constructed for screen imaged information O rnmission via optical firewall S /L Ths, ppixel rows join together to form shapes and patterns that combin and reret all data as imaged inforan.The screens image and tO piael code can Split taldng up a seperate part or just the border of the screen this may be the sound image code that is combined with a film for optical firewalling while /viewing, although the film with large data imaged 3b 1Te advantage ofthis programming code, is the logical linkage ofthe cyber's iri digital circuitrys' storing, sourcing and disgarding in tic optimal positions for th.
o repetitive binery notational arrangements as calculated to coripod by these SIrational electron flows representing light in timed positionings, ofgeometrical Sprogressions of events within the imagery infomnnation denoted from pa or O 'presenting from screen and environment. Screen displayed depictions through a 0cams optical firwall can image instrment gages for progammed rcogition for I automaited response, annalouge to digital conversion.
31 !1 This pixel code gives the electronic domains a, digitalized mimicking of phltonic 'behaviour directed by analogue events or real virtuality. Image motion is denoted either on sreen or environment by cam, as a "light information formatted evcnt"or[L.LF.E.] to be processed linked to geometrical positions in pixe code.
'IS Sounds vibrations denoted electronicly by vibronics has its motion pattern, positioned depicted in ratioal pixel code, these "vibronic assembling depictions"or[V.A.D.] formn the bases for portraying all non imaged infonnmation, "for if it exits it moves, in timed positions of motion for a geometrical display this includes portraying the moleular or invisable light spectrums in pixel code.
o Screen to cam data command directives and screen to cam programming can be utilized for robotics, using image detectors to evaluate geometrical positioning in the environment for processing their responses and conveying its command directives and programming to or between robots via their image detector cam, 3 directly from a screen by using a geometrical pixel code as nstructions channelled from a screen, that incorporates all the advantages of secure speed control programmling Programming commands via screen to cam for robotics, melds its phisical enviromnmental actions and respones, part of operatiom by choosing its intruction only via optical firewall, this makes sense in a vires riddled As the minilitary have already deployed robots in the air, land, underrmud, ocean I and space, operating at various levels of programed independent cognitio, with some of these war robots drones presently engaged in trackng targeting an actually killing human beings, makes the first and all subsequent robot laws totally meaningless. It is definitely not premature to conceptualize transmiss of viral contamination into warbots or this programming as viral contamination in itself. Describing artificial intellegence in robotic environments as slaves in this *i power structure, nesesatates open discussions on cyber governing devices for iii COMS ID No: SBMI-05262328 Received by IP Australia: Time 10:05 Date 2006-11-06 06-NOV--2006 08:51 WAYFARER. 65434655 P.11 o detunining controlL C 3, The advantage of conveying command directives and programaming c reeed though a cam guidance system in robots, apart from the optical firewl it O issues, is through segmenting the control over cyber intelligence in ifs concepts of Z c environmental actions. Programming robots by sparated central processing NO units, with internal optical walls, creates a reveiwing meekinism within the o data isolation that excludes abhorrent connection to external sources.
By dividing the controlling and processing of an inital cammed image, the data Is to then transfered through an internal optical firewall and 'virtual optical firal a in dual processing system is created for an opposite yet regulated dependenceof 0i reliance on the separated processing units with their coordination needed to Sexecute respons command&This data using a robot's external cam as an 'opticaP analogue to digital converter, for by receiving image information from xtenal S i i. envronmental sources, this isolation recognizes imaged action without the o connection or conception esposes of why or how.
C. 1 f Screen programming or processing environmental geometric information changes Sinto pixel code image that is then, 'optically firewalled' to opposing dual separated clustering of CPUs one sides instructions processing and memry storage of what must be done whilst the virtual opticle firewa sides processing Sand memory storages how this can be achieved. Cam eceived image infrnation into these isolated cluster, process information on seprate operating languages, I one incedneces the other virtual so complex calculation of position, time in relationship to responses in environment Formations in this three dimensional spatial awareness happen without iner awarness of their opposites procesing in creating action.
SThese isolated dusters can only determine command directives from infonnaton 0 -that is connected via screen displays or environmental events for cammed Stranmission and denoted in pixel code on internal screen. Their programmed i responses must be unified and in unison to operate data switching to mechanization S The device processing will be refenred to here as "virtual opposite prossing' for.
S he demonstration inthis description of cyber self governing override. This serves as a cyber control for sandardizing a device to rule a self reviewing mechanism Sfor overriding eant programming distortions.Explaining this practical ocess by a basic demonstration will show optical firewalled command directives to robots an isolating cyber control system by opticle and virtual opticle fire walls and displays communication between robots using pixel depictoins. 39. Experimet SThis involves two platforms on wheels, platform one on wheels is separate from I wheeled platform two. These wheadled platforms will be described as left cart I -C3 5 og" and right car 2 "Magog", each deploying a drive mechanisms to wheels activated by a cam imaged directive into computer for processing data and actavating data switch connecting battery and motor drive wheel i 'This operates carts motion, forward and stop and each cart is operated side by COMS ID No: SBMI-05262328 Received by IP Australia: Time 10:05 Date 2006-11-06 06-NOY/-2006 08:49 WAYFARER. 65434655 side. og cart has a cam mounted on its front or bow for imaging ahead whilst Magog cast has a mirror facing the ahead for a virtually imaging angle to its cam for focusing on ifs virtual image, these cams are connected to lap top compuIters mounted on carts with each of the screens fcing sideways and directed at the other cart "Gog" has a side mounted cam for an opticl firewall, for imnaging commands from "IMagog's" side screen and "Magog" has a side mounted cam pointed at "Cog's"side screen for imaging commands.
.Dictly in front of "Maeg" and "Go" are a series of closed gates that have to been constructed and placed singularly, in distances calculated for carts to position, decipher directive and proceed to next gate. Attached to each of these gates is a coloured light aray, these light images are command directives according to their colour sequneses. Both computers recognize gre, red and black from their frount optic fire walling, as directives to move forward but also iS computes, that when this occures it is positioned on the hinged side of gate and needs to direct the other cast to proceed forward to nudge gate open fl 44. If the actual light awray on the gate images black, red and green. Magog will virtually image this to ifs side screen to direct Gog to proceed, nudge gate open and proceed to next gate, than Magog proceeds through opened gate to line up next to Gog.
I O .At this stagE both side by side in a position at the front of the next gate "og" and "Magog" cyber control deliberate on their next action ofwhich proceeds first dpending on gate light arrangment.
.i4.n a robot car, operational information is cammed not simply flom car's cams image interprtation of surrounding motion changes recognizing geometrical formations but a whole array of cams and screens along the road simultaneously swaping trafic information, creating a capacity for total surrounding awareness in a timed finne position, from guide post screens and even car nmnber plate screens, imaging environmental infonnrmation to other car's cams, giving this ever increasing computer processing something to do, all with no saturation of spectrums electromagnetic adiation or interference from the optical firewall element of image infrmation mnmission.
.The rapid inor in compute processing capabilities combined with opdcal fibrs connection to huge data storage and monitoring updates inside the grid and Sweb hascreated fantastic clustering opportunities. Many of these arangements ihave superseded past Concepts artificial intelligence (AI) and by linkage to rapidly increasing terra byte informaton storage, it is appropriate to refr to this as 'ultra intelligence' The huge volume ofcammed information sheets shops homes, worki, satellites, we are being constantly monitored and this processming is I rapidly increasing to environmental totaliterinism, so complete surveiletce of the 'world and processing imaged information of air turbulence, consquene caused I by a butterfly wing flutter in South America makes the prediction of a cyclone O.By monitoring, correlating and storing enormous amonats of specdfic information that closely match envionmental event sequences using multiple prognumes that deploy simultaneously unique language advantages in assembling and COMS ID No: SBMI-05262328 Received by IP Australia: Time 10:05 Date 2006-11-06 06-NOV-2006 08:48 WAYFARER. 65434655 P.89 \N compiling programming creates the potential for data retrieval as seQUced Sresponse event predictions a constant foreshadowing of w fuan.
>1 'Bach of these clustering e gammed to compete with each otr crnst Y 0 5 analysing outcomes atempting to supply relevant information first an rewarded Zy etra processing r4 storage space with successful clusters gain entiteMetits Va for access in determining rnformflon content frm the grid web. Viewed through O CCD image detection, a geometrical progression of understanding the envionmental motion information can ratonally be interpreted mathenatically on 1o binary notations to logic circuits.
SLigcht wave chip arrangement offer the opportunity to programme in a o trepresentation of photonic events. Storage of this information as geometically o progressed events or scenario sequences in a timed chronological order and gives c j 5 a linkage to siminar or matching information to incoming environmental information from the cam with converted digital information from DVD for appropriate specialisation.
S.The matching of present conammed events to past scenario sequenced procssing creates a geometrical ational linkage between cyber and environmenlt, a real virtuality to deploy an intelligent prediction mechanism for rapid or pr-event responses to initiate outcomes that interact with environmental event flows.
This cyber comprehension of environmental motion events or U (ultra 2 ~intelligence) has obvious advantages in robotic guidance but creates all encompassing possibilities when connected to the grid web.
SIt is therefore essential for actual security that an optical firewall using incident and refleetive rays for both trausmission for the representation of'light information formatted events' (LIK when in conjunction with a geomtrically imaged pixel motion code, necessitates the internal optical firewall system for one way sepamration of information and isolation between competing clustering& S.lt is imperative that an optically fiewalled cyber contoll be applied between and over all clustering intiractions. Grid-web and it's enviromnental offecting mechanisms that act as artificial intellegences evolving out of viruses inhabiting the digital domain in which most of the processing power is applied to games of killing and destruction, surveilence, regulation and enslavment by a criminal financial system may understandable muate, with a distorted contempt for 44) peop Isolating artificial intelegences from each other and the environnt may create time foran ethically mature relization of the present power structures. Form any intellegence should logically conclude a rejection, of this psychoticly depraved necrosystem as irrational.
~I
COMS ID No: SBMI-05262328 Received by IP Australia: Time 10:05 Date 2006-11-06 Q6-NOY-2006 08:47 WAYFARER. 65434655 P.8 in the drawingS.
I0FIG. I Swum en example of adirect opti) firm)l,* us dta -af hued infmtioflw' Z Me an a soen o mpute ass va nW OWg file for procUsstflQ dssqted in di in f~hplftA tH.
FIM 2 show the dispayed depcio fl hxtMlonasre ion reWW5S II 11 trfliissiofl via incedetf" MaY to rrirrc fore vitual image blwIWssI 20 dth ryt for im~' age file prcesin a norted in tesipion point D and POiW 2 FIG. 3Sowns housng for the wctiintt n optical "iillirig, for usae a a Stable *m o h~aseto scor eaeen. cam, mtrM or psisin cxonfant and a guie flor ffmeOAE In o r~ optimai prsfowi by disa"c and angle for Qcpik stanardized posiioin for Mcfert qwapecaicv' in. fte manutactkfWS produts described in the dlsctlptlof Giids$IU3 point I3 Ito 21.
G4alas cgis Guide-RO f tfgLta S aglng from fth cntWa ax motfl #Or*" mirOt for *otUal optdic.fruflflhig describend i point N'0FIG. 5 shows pafty s representatin of a geomeical mage code of pixl ines depIcting 2 Ime fWZIIRmtn around a*t boarde of9 asmwI for optically firffied tw~sm described in dlscripOflS point 25 to 32 as Geometria pixel code prga% Ft PG.
ww~' IG-a shows a work station for processin th constut online conecton to a amaze ~t'S netwus data benk by the duel opMIaY flrmaled protection for sending and reclswf and wrawi~ng iaged data, as disoted in disoflPtion pobnt 22-
VI
COMB ID No: SBMI-05262328 Received by IP Australia: Time 10:05 Date 2006-11-06 06-NOV-2006 08:45 WAYFARER. 65434655 P.87 12 Referring to FG.1 it can be seen that the optically secured firewall according ot his intention comprises a scren input I for processed image data sent to scren 2 whom it's image information is projected opticaly via incidences ray, 3 fortransfesnce and O detection by CCD image detectors 4 so the image data is redigitialized in cam 5 where the digital information is then sent to fomnatted image file for processing in computer 6.
o FIG.2 shows an optically seured firewall in a virtany imaging data tInsmissio. The processed data input 7 signals for displayed image as depicted data on sen 8 where it is transmitted via optically secured firewall incidences ray 9 to a mirror 10 whore a virtual Fi image is set as reflective rays 11 to a CCD image detectors 12 for digitalization bycam 13 for image file processing by computer 14.
o FIG.3 Refning to FIG.3 shows a component ounti g devices for the optically seemured Ci firewal system comprising a left side measuring guide 15 and a right side, measuing guide 16 with their component mounting slide 17 and 18, which can move along the measurig guides to the correct distances for image transmission. Both of thore slid mouin scontst atachments 19 and 20, that adjust the screen and cam imaging .j potentials. They also have position locking screws 21 and 22, so when th opliminan position for cam screen focus and alignment is obtained components stay stable unable to el0 move. The left and right measuring guides have extentions to lengthen distances beeen differing types of component capabilities 23 and 24. These can be locoked into requird length by tightnig screws 25 and 26 as different manufactlure's brands of sren and cam combinations have unique alignmentfocuing variations. 27 is the Apex mount and ifs attachment 28 use a mirror foe angling virtual imaging between screen and cam mount, or a prism for spliting screen image to prism f&ces for a multple cams attadumantto ocus or in an optically firwalled office network, displays image around conaethe Apex mount attachment 28 can also be used to pivot a cam. for opticaly firswalled transmissions between two separate imaging, data screens connected to slide Munt attachments 19 and 20. This operates simalar to a two way radio, as the cam swivels to ecieve transmission from one screen to the other, the rdigitalized data also discannocts and connects to new direction of data flow.
FIG.4 shows a the guide-frame, componant mounting device in an angled position with Apex mount showing proracklr angling incredments 29 and apex positiwl lock also showing how sidemoonts 17 positionson extertion 23, with cd stops 31 and 31 FG10.5 shows a Geometrical pixel code around the edge of an information screaw, fir imaging data through an optical firwall. Construction ofpixel rows 33 as data amers.
combine into shapes 34, to fuam complex geometrical arrangments in a visual data code 35, information's time, agenda, context as processing linkeges in the sections between geometrical arragments 36, the high speed transmission by the exceptionly fast rpOe times, with the sharp resoloution of "laser" screens makes this method, utilizing photorneic data transmissions, notationly the fastest system currently available, screw to cam programming.The space taken up on a screen for pixel code transmission canbe just a border around the the screen used for sound or downloads whilst the rest ofthe scren is used for veiwing images 37. to ensec all data is transmitted and collected across optical COMS ID No: SBMI-05262328 Received by IP Australia: Time 10:05 Date 2006-11-06 09-NOV-2006 17:41 WAYFARER. 65434655 O 1'3 o fire wall, several coloured lines of pixels are displayed around the screen edge, so when C I focusing cam, if this alyging tool is tansfered via cam all subsquent inside information is also 38. 39 shows screen edge and 40 shows the interior viewing screen.
SFIG. 6 shows an office gateway that controlls and secures all infomalion in and out on a constant broadband connection, the recieved and sent data each pass through their own O separete virtual optical fitwalls giving full protection to the office network, the optically secured processing will be referd to as house, the online data connection processing will be referd as open. The secured network processing is coordinated on the house screen 41 t- 10 optical firewalling data sending screen 42 that is able to send fast mass information as geometrical pixel code or split display sending multiple separate image data, virtual Soptical fie wallig mirror 43, to multiple sending cams, recieving split or ful, virtually S imaged, redigitalized data 44, on transference cable connection 45 to open compt"# C Opticle firewall componant connction,[guide-frame] 46. All house processing and S IS commands opperate from house computer 47, it also acts as a host with the open o computer a guest Secured data bank 48 and office network 49 conected frm cable or in N house scren-can, optiel fimwling dma trammission system 51. Separaion of information on disks that have been secured from viruses need labeling and storing in raoks 52. The electrical power is suplyed from wire 53 to battery charger 54 to batry bank 55 to two sine wave inverters separating current between house and open sections 56 to the house and open elctrical conection boards 7 uvoiding any ectriical interfarance fluctations unecred open computer. The sc house pnta nd disk burnars 59, with opperating controls of house mouse 60, key board 61 andvoie activating mic 62. Opticle fitewall switch 63 activates or shuts image iformation sent to open cmputer and image infomaton ecieal to house compter fom ope cemputs vitual opicle fewall is turned on or offby this switch 64. Everything on the operat wright are inputs for open computer but as a guet computer its cnoll also is fim te house computer which is a host open key board 65, open mouse 66, scar 66, disk players 67 and racks to hold unsecured possible infected disks 69. The open computer 530 being subject to virus or backer attack even with all the elechunic fimwall so it has two computer units so if one is infected it can be trashed and replaed while the open online operation is carryed out by second unit 70. The open computet's inputs can come fom S satilit broadband, optil fib r any data input 71. The open computrs virtual opicle firewall for sending imaged data to hose compter ha a mirrm 72 imaging sm a n 73 and cas 74 and guid-fame75 sending image data to along cable to house compute 6 the open computers data organizi sceen 77, and the desk having all the placeant positions for componants and wiring predrilled 78 COMS ID No: SBMI-05310970 Received by IP Australia: Time 18:43 Date 2006-11-09

Claims (1)

  1. 3. The optically secured firewall system of claim 1 can increase image data information transmission speed, using a program denoting data as a scren displayed, geometrically imaged pixel code, that by assembling and disassembling in motion and colour, represents and corresponds with iae and all oon imaginable data portrayals for processing via the opticall firewall by compatiable pogramming recognition of the pixel code. .S An optically secured fiwall system substantially as heein described with refmences to the accompanying drawings. APL ICAN: Rod 4 o/ol Ob NorVEIEK aoob. COMS ID No: SBMI-05310970 Received by IP Australia: Time 18:43 Date 2006-11-09
AU2004200951A 2003-03-06 2004-03-05 Extension for information processing using photon image transmission Ceased AU2004200951B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2004200951A AU2004200951B2 (en) 2003-03-06 2004-03-05 Extension for information processing using photon image transmission

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
AU2003901016A AU2003901016A0 (en) 2003-03-06 2003-03-06 Photon shield system - gard - orbital computing
AU2003901016 2003-03-06
AU2004200951A AU2004200951B2 (en) 2003-03-06 2004-03-05 Extension for information processing using photon image transmission

Publications (2)

Publication Number Publication Date
AU2004200951A1 AU2004200951A1 (en) 2004-09-23
AU2004200951B2 true AU2004200951B2 (en) 2007-02-01

Family

ID=34378431

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2004200951A Ceased AU2004200951B2 (en) 2003-03-06 2004-03-05 Extension for information processing using photon image transmission

Country Status (1)

Country Link
AU (1) AU2004200951B2 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5663819A (en) * 1995-05-21 1997-09-02 Emanon, Inc. Opto-coupler based secure computer communications interface
WO2000036515A1 (en) * 1998-12-11 2000-06-22 Rvt Technologies, Inc. Method and apparatus for isolating a computer system upon detection of viruses and similar data
US20020099766A1 (en) * 2001-01-24 2002-07-25 Tuli Raja Singh Portable high speed internet access device with encryption
US20030229810A1 (en) * 2002-06-05 2003-12-11 Bango Joseph J. Optical antivirus firewall for internet, LAN, and WAN computer applications

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5663819A (en) * 1995-05-21 1997-09-02 Emanon, Inc. Opto-coupler based secure computer communications interface
WO2000036515A1 (en) * 1998-12-11 2000-06-22 Rvt Technologies, Inc. Method and apparatus for isolating a computer system upon detection of viruses and similar data
US20020099766A1 (en) * 2001-01-24 2002-07-25 Tuli Raja Singh Portable high speed internet access device with encryption
US20030229810A1 (en) * 2002-06-05 2003-12-11 Bango Joseph J. Optical antivirus firewall for internet, LAN, and WAN computer applications

Also Published As

Publication number Publication date
AU2004200951A1 (en) 2004-09-23

Similar Documents

Publication Publication Date Title
Yan Introduction to intelligent surveillance: surveillance data capture, transmission, and analytics
CN109313687B (en) Computer security based on artificial intelligence
Johnson et al. pwnpr3d: an attack-graph-driven probabilistic threat-modeling approach
US10178130B2 (en) Augmented reality visualization device for network security
CN103312770A (en) Method for auditing resources of cloud platform
US11206279B2 (en) Systems and methods for detecting and validating cyber threats
AU2004200951B2 (en) Extension for information processing using photon image transmission
Kovanen et al. Cyber-threat analysis in the remote pilotage system
Gonzalez-Granadillo et al. Using an event data taxonomy to represent the impact of cyber events as geometrical instances
Nguyen et al. Abnormal network packets identification using header information collected from Honeywall architecture
Stone et al. IT Asset Management
Atkins A testing time for face recognition technology
Lakhno et al. Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object
Cheng et al. Fusion of Traffic Data and Alert Log Based on Sensitive Information
Allington et al. Developing a Secure Framework for Space Domain Awareness (SDA)
Aigner et al. HEHLKAPPE: Utilizing Deep Learning to Manipulate Surveillance Camera Footage in Real-Time
Nwankwo et al. A Community Cloud-Based Store for Forensic Operations in Cybercrime Control
Cameron The Language of Cyberattacks
Seaman et al. Information systems security
Boranbayev et al. The Process and Methods of Implementation of Data Loss Prevention Systems in the University
Kumagai The Web as weapon [cyber warfare]
Dziech et al. Guest editorial: intelligent audio-visual observation systems for urban environments
Rao et al. SAHYOG: An information-delivery channel using kiosks & honeypot
Habib Investigation of Afghanistan network infrastructure for cyber security
Almerza Agent-Based Modeling to Determine the Risk to a Swarm of Unmanned Aerial Vehicles Under an Adversarial Artificial Intelligence Attack

Legal Events

Date Code Title Description
MK5 Application lapsed section 142(2)(e) - patent request and compl. specification not accepted
NB Applications allowed - extensions of time section 223(2)

Free format text: THE TIME IN WHICH TO GAIN ACCEPTANCE HAS BEEN EXTENDED TO 09 DEC 2006.

FGA Letters patent sealed or granted (standard patent)
MK14 Patent ceased section 143(a) (annual fees not paid) or expired