WO2014011128A2 - The method of authentication by characteristic virtual encryption - Google Patents

The method of authentication by characteristic virtual encryption Download PDF

Info

Publication number
WO2014011128A2
WO2014011128A2 PCT/TR2013/000188 TR2013000188W WO2014011128A2 WO 2014011128 A2 WO2014011128 A2 WO 2014011128A2 TR 2013000188 W TR2013000188 W TR 2013000188W WO 2014011128 A2 WO2014011128 A2 WO 2014011128A2
Authority
WO
WIPO (PCT)
Prior art keywords
characteristic
shall
encryption
computer
person
Prior art date
Application number
PCT/TR2013/000188
Other languages
English (en)
French (fr)
Other versions
WO2014011128A3 (en
Inventor
Yılmaz DAL
Original Assignee
Dal Yilmaz
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dal Yilmaz filed Critical Dal Yilmaz
Publication of WO2014011128A2 publication Critical patent/WO2014011128A2/en
Publication of WO2014011128A3 publication Critical patent/WO2014011128A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Definitions

  • This invention is to create encryption by characteristic color mixture through the method of authentication for persons and companies. It is to realize color mixture convenient for characteristic password in virtual environment. It is to use this software in all file and documents. It is related to method to determine to whom all documents and information written and prepaid belong in virtual environment through encryption created. A characteristic color password is assigned to persons in virtual environment by this method. The subject color mixture is used in texts, figures, patterns and pictures in all files and documents prepared in virtual environment. Thus it can be detected to which person the text written belongs.
  • Purpose of this invention is to create characteristic virtual encryption by fingerprint, retina, tone of voice and features, palm vasculature of a person and other authentication methods of personal and knowledge by contact of a person to the sensor being connected to the computer.
  • Authentication method is carried out by a characteristic virtual encryption ensuring detection to whom text written or files in computer environment belong by using characteristic color mixture.
  • This software Another purpose of this software is to detect what kind of an encryption specific to a person is made in files prepared, when and who made and to reach a conclusion. In this software, it is to encrypt all the prepared file and documents by utilizing characteristic identity information of person and by creating color theme.
  • Figure-1 Flow chart of characteristic virtual encryption and authentication method of the subject of invention.
  • Numerical encryption is created through authentication by fingerprint, retina and palm vasculature of persons and other methods. Characteristic color mixture rates are determined by taking algorithm of numerical encryption values. The process how much should be mixed from which color is made from color scale as per contents of the mixture. Characteristic virtual encryption shall be created completely as a result all transactions. The color mixture used by each individual or companies becomes characteristic when a file is created. It shall prevent the cases such as copying, duplication and illegal use of file information by the virtue of this encryption. The invention is to create characteristic color determiner by the subject method and to encrypt all information in the worked file by this method. It provides making encryption in virtual environment and securing the file. It shall not cause worry in transfer of information since all studies are made in virtual environment.
  • Sensor which is used in the method and a component of the method creates numerical password belonging to a person by identifying, fingerprint or retina or tone of voice of the person.
  • Processor shall define shades and rates of colors for color mixture (red - green - blue) which is desired to create as per numerical password.
  • Array, sequence and rates of colors shall always create a featured resolution since numerical encryption created is different each other.
  • Monitor screen consists of pixels (points). Clarity increases as long as the more the number of pixels. Dots density is called as resolution. Three primary colors (red - green - blue) are used.
  • person can select shade of color from color bar.
  • the encryption to be created is made in appropriate with this color resolution.
  • the subject function is made by algorithm of the processor.
  • characteristic virtual encryption shall be made by ensuring creation of color in selected shade with fingerprint or retina identity information of the person.
  • creation of billions of color theme shall be provided. Thus it shall perform encryption more efficiently.
  • Another purpose of the method is to realize special color codes to individuals by authentication method.
  • Specific color codes created are used as a character different than numeral, letter, symbol and special characters that we use in numerical encryption.
  • Characteristic color mixture shall be made through specific color codes. Because millions of specific color code shall be used for characteristic encryption. A stronger encryption shall be created when these specific color codes are used instead of letter or numeral characteristics. Characteristic color mixture disintegration shall be impossible since algorithm of processor shall be more comprehensive.
  • This method can be used easily in obtaining, keeping and transfer of very secret files and documents and in cryptology science. Since it consists variable parameters of specific color codes; the meanings attributed shall be different each other. Thus, the security shall be realized in communication networks at the top level. This method shall make a breakthrough in cryptology science by development.
  • characteristic color theme by recording tone of voice to the microphone integrated to the computer.
  • Security measures shall be created at the top level by using characteristic color theme in many fields such as user information and identifications, member information, internet banking, credit card information, online shopping sites. All our information shall have been secured by entering characteristic color theme to password space of member information. Recording of files, documents, electronic mails, photos and other information which are prepared in virtual environment by characteristic color theme and when necessary its sending shall be performed. It shall be understood that the files which are sent in this manner are encrypted even a small marking on these files. Recipient shall be aware that information is completely secured. Furthermore working files have a method providing storage in computed in encrypted manner.
  • Subject of this software is to encrypt and archive all studies with characteristic color mixture formed. Using of information open to sharing shall be permitted. Furthermore it shall provide to find origin of information when data in virtual environment is clicked.
  • Characteristic virtual encryption and authentication method which is subject of the invention shall be used in all files and documents created in the computer. It shall be used in scientific studies, distance education systems of universities, exam centers, patent works, state instructions and organizations and private sector. It shall be used in interstate correspondences, legal processes, notaries public, company papers, contracts, documents, title deed and archives. It shall be used in many fields such as commercial fields, stock exchange and financial centers, drug formula, forensic medicine reports. It shall be used easily in writings of daily newspaper and magazines published in digital environment, e-book and libraries, special websites of persons and corporations, shapes, patterns and pictures. It shall able to be used in all fields of cryptology communication materials, military security and intelligence fields, many valuable papers such as passport and identity card.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Biomedical Technology (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)
  • Collating Specific Patterns (AREA)
PCT/TR2013/000188 2012-07-12 2013-06-19 The method of authentication by characteristic virtual encryption WO2014011128A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
TR2012/08191 2012-07-12
TR2012/08191A TR201208191A2 (tr) 2012-07-12 2012-07-12 Karakteristik sanal şifreleme ile kimlik doğrulama yöntemi.

Publications (2)

Publication Number Publication Date
WO2014011128A2 true WO2014011128A2 (en) 2014-01-16
WO2014011128A3 WO2014011128A3 (en) 2014-03-06

Family

ID=47679843

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/TR2013/000188 WO2014011128A2 (en) 2012-07-12 2013-06-19 The method of authentication by characteristic virtual encryption

Country Status (2)

Country Link
TR (1) TR201208191A2 (tr)
WO (1) WO2014011128A2 (tr)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1938995A2 (en) * 2006-12-28 2008-07-02 Brother Kogyo Kabushiki Kaisha Image-forming system, image-forming apparatus, computer program, and image-forming method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1938995A2 (en) * 2006-12-28 2008-07-02 Brother Kogyo Kabushiki Kaisha Image-forming system, image-forming apparatus, computer program, and image-forming method

Also Published As

Publication number Publication date
WO2014011128A3 (en) 2014-03-06
TR201208191A2 (tr) 2012-12-21

Similar Documents

Publication Publication Date Title
US8666065B2 (en) Real-time data encryption
US9369287B1 (en) System and method for applying a digital signature and authenticating physical documents
Hakak et al. Preserving content integrity of digital holy Quran: Survey and open challenges
US10855868B1 (en) Systems, processes, and computer program products for detecting and verifying invisible information in documents
Ray Ray’s scheme: Graphical password based hybrid authentication system for smart hand held devices
Bala Krishna et al. Product authentication using QR codes: a mobile application to combat counterfeiting
Ramakrishnan et al. Text steganography: a novel character‐level embedding algorithm using font attribute
Khan et al. Cyber security using arabic captcha scheme.
Kumar et al. Recent trends in text steganography with experimental study
Punithavathi et al. Visual cryptography: A brief survey
Koley et al. A novel approach of secret message passing through text steganography
Kaushik et al. Zero-width text steganography in cybercrime attacks
US11157639B2 (en) Systems, processes, and computer program products for authentication of documents based on invisible information in documents
Saraswat et al. A review of digital image steganography
JP2009505133A (ja) ピクセルを用いたデータの暗号化及び解読方法
Patel et al. Survey on Graphical Password Authentication System
CN106411888B (zh) 签核文档加密装置与方法
Chaudhary et al. An elucidation on steganography and cryptography
Naser et al. QR code based two-factor authentication to verify paper-based documents
Koley et al. Number system oriented text steganography in various language for short messages
Shchegoleva et al. New Technologies for Storing and Transferring Personal Data
Gupta et al. A model for biometric security using visual cryptography
WO2014011128A2 (en) The method of authentication by characteristic virtual encryption
CN110378080B (zh) 一种带有版权保护机制的出版物
Kazmi et al. Unihach: unicode and hash function supported with counting and frequency recurrence of Arabic characters for Quranic text watermarking

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13763329

Country of ref document: EP

Kind code of ref document: A2

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22.04.2015)

122 Ep: pct application non-entry in european phase

Ref document number: 13763329

Country of ref document: EP

Kind code of ref document: A2