WO2014011128A2 - The method of authentication by characteristic virtual encryption - Google Patents
The method of authentication by characteristic virtual encryption Download PDFInfo
- Publication number
- WO2014011128A2 WO2014011128A2 PCT/TR2013/000188 TR2013000188W WO2014011128A2 WO 2014011128 A2 WO2014011128 A2 WO 2014011128A2 TR 2013000188 W TR2013000188 W TR 2013000188W WO 2014011128 A2 WO2014011128 A2 WO 2014011128A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- characteristic
- shall
- encryption
- computer
- person
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
- G06F21/608—Secure printing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Definitions
- This invention is to create encryption by characteristic color mixture through the method of authentication for persons and companies. It is to realize color mixture convenient for characteristic password in virtual environment. It is to use this software in all file and documents. It is related to method to determine to whom all documents and information written and prepaid belong in virtual environment through encryption created. A characteristic color password is assigned to persons in virtual environment by this method. The subject color mixture is used in texts, figures, patterns and pictures in all files and documents prepared in virtual environment. Thus it can be detected to which person the text written belongs.
- Purpose of this invention is to create characteristic virtual encryption by fingerprint, retina, tone of voice and features, palm vasculature of a person and other authentication methods of personal and knowledge by contact of a person to the sensor being connected to the computer.
- Authentication method is carried out by a characteristic virtual encryption ensuring detection to whom text written or files in computer environment belong by using characteristic color mixture.
- This software Another purpose of this software is to detect what kind of an encryption specific to a person is made in files prepared, when and who made and to reach a conclusion. In this software, it is to encrypt all the prepared file and documents by utilizing characteristic identity information of person and by creating color theme.
- Figure-1 Flow chart of characteristic virtual encryption and authentication method of the subject of invention.
- Numerical encryption is created through authentication by fingerprint, retina and palm vasculature of persons and other methods. Characteristic color mixture rates are determined by taking algorithm of numerical encryption values. The process how much should be mixed from which color is made from color scale as per contents of the mixture. Characteristic virtual encryption shall be created completely as a result all transactions. The color mixture used by each individual or companies becomes characteristic when a file is created. It shall prevent the cases such as copying, duplication and illegal use of file information by the virtue of this encryption. The invention is to create characteristic color determiner by the subject method and to encrypt all information in the worked file by this method. It provides making encryption in virtual environment and securing the file. It shall not cause worry in transfer of information since all studies are made in virtual environment.
- Sensor which is used in the method and a component of the method creates numerical password belonging to a person by identifying, fingerprint or retina or tone of voice of the person.
- Processor shall define shades and rates of colors for color mixture (red - green - blue) which is desired to create as per numerical password.
- Array, sequence and rates of colors shall always create a featured resolution since numerical encryption created is different each other.
- Monitor screen consists of pixels (points). Clarity increases as long as the more the number of pixels. Dots density is called as resolution. Three primary colors (red - green - blue) are used.
- person can select shade of color from color bar.
- the encryption to be created is made in appropriate with this color resolution.
- the subject function is made by algorithm of the processor.
- characteristic virtual encryption shall be made by ensuring creation of color in selected shade with fingerprint or retina identity information of the person.
- creation of billions of color theme shall be provided. Thus it shall perform encryption more efficiently.
- Another purpose of the method is to realize special color codes to individuals by authentication method.
- Specific color codes created are used as a character different than numeral, letter, symbol and special characters that we use in numerical encryption.
- Characteristic color mixture shall be made through specific color codes. Because millions of specific color code shall be used for characteristic encryption. A stronger encryption shall be created when these specific color codes are used instead of letter or numeral characteristics. Characteristic color mixture disintegration shall be impossible since algorithm of processor shall be more comprehensive.
- This method can be used easily in obtaining, keeping and transfer of very secret files and documents and in cryptology science. Since it consists variable parameters of specific color codes; the meanings attributed shall be different each other. Thus, the security shall be realized in communication networks at the top level. This method shall make a breakthrough in cryptology science by development.
- characteristic color theme by recording tone of voice to the microphone integrated to the computer.
- Security measures shall be created at the top level by using characteristic color theme in many fields such as user information and identifications, member information, internet banking, credit card information, online shopping sites. All our information shall have been secured by entering characteristic color theme to password space of member information. Recording of files, documents, electronic mails, photos and other information which are prepared in virtual environment by characteristic color theme and when necessary its sending shall be performed. It shall be understood that the files which are sent in this manner are encrypted even a small marking on these files. Recipient shall be aware that information is completely secured. Furthermore working files have a method providing storage in computed in encrypted manner.
- Subject of this software is to encrypt and archive all studies with characteristic color mixture formed. Using of information open to sharing shall be permitted. Furthermore it shall provide to find origin of information when data in virtual environment is clicked.
- Characteristic virtual encryption and authentication method which is subject of the invention shall be used in all files and documents created in the computer. It shall be used in scientific studies, distance education systems of universities, exam centers, patent works, state instructions and organizations and private sector. It shall be used in interstate correspondences, legal processes, notaries public, company papers, contracts, documents, title deed and archives. It shall be used in many fields such as commercial fields, stock exchange and financial centers, drug formula, forensic medicine reports. It shall be used easily in writings of daily newspaper and magazines published in digital environment, e-book and libraries, special websites of persons and corporations, shapes, patterns and pictures. It shall able to be used in all fields of cryptology communication materials, military security and intelligence fields, many valuable papers such as passport and identity card.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Biomedical Technology (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Document Processing Apparatus (AREA)
- Collating Specific Patterns (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TR2012/08191 | 2012-07-12 | ||
TR2012/08191A TR201208191A2 (tr) | 2012-07-12 | 2012-07-12 | Karakteristik sanal şifreleme ile kimlik doğrulama yöntemi. |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2014011128A2 true WO2014011128A2 (en) | 2014-01-16 |
WO2014011128A3 WO2014011128A3 (en) | 2014-03-06 |
Family
ID=47679843
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/TR2013/000188 WO2014011128A2 (en) | 2012-07-12 | 2013-06-19 | The method of authentication by characteristic virtual encryption |
Country Status (2)
Country | Link |
---|---|
TR (1) | TR201208191A2 (tr) |
WO (1) | WO2014011128A2 (tr) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1938995A2 (en) * | 2006-12-28 | 2008-07-02 | Brother Kogyo Kabushiki Kaisha | Image-forming system, image-forming apparatus, computer program, and image-forming method |
-
2012
- 2012-07-12 TR TR2012/08191A patent/TR201208191A2/tr unknown
-
2013
- 2013-06-19 WO PCT/TR2013/000188 patent/WO2014011128A2/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1938995A2 (en) * | 2006-12-28 | 2008-07-02 | Brother Kogyo Kabushiki Kaisha | Image-forming system, image-forming apparatus, computer program, and image-forming method |
Also Published As
Publication number | Publication date |
---|---|
WO2014011128A3 (en) | 2014-03-06 |
TR201208191A2 (tr) | 2012-12-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8666065B2 (en) | Real-time data encryption | |
US9369287B1 (en) | System and method for applying a digital signature and authenticating physical documents | |
Hakak et al. | Preserving content integrity of digital holy Quran: Survey and open challenges | |
US10855868B1 (en) | Systems, processes, and computer program products for detecting and verifying invisible information in documents | |
Ray | Ray’s scheme: Graphical password based hybrid authentication system for smart hand held devices | |
Bala Krishna et al. | Product authentication using QR codes: a mobile application to combat counterfeiting | |
Ramakrishnan et al. | Text steganography: a novel character‐level embedding algorithm using font attribute | |
Khan et al. | Cyber security using arabic captcha scheme. | |
Kumar et al. | Recent trends in text steganography with experimental study | |
Punithavathi et al. | Visual cryptography: A brief survey | |
Koley et al. | A novel approach of secret message passing through text steganography | |
Kaushik et al. | Zero-width text steganography in cybercrime attacks | |
US11157639B2 (en) | Systems, processes, and computer program products for authentication of documents based on invisible information in documents | |
Saraswat et al. | A review of digital image steganography | |
JP2009505133A (ja) | ピクセルを用いたデータの暗号化及び解読方法 | |
Patel et al. | Survey on Graphical Password Authentication System | |
CN106411888B (zh) | 签核文档加密装置与方法 | |
Chaudhary et al. | An elucidation on steganography and cryptography | |
Naser et al. | QR code based two-factor authentication to verify paper-based documents | |
Koley et al. | Number system oriented text steganography in various language for short messages | |
Shchegoleva et al. | New Technologies for Storing and Transferring Personal Data | |
Gupta et al. | A model for biometric security using visual cryptography | |
WO2014011128A2 (en) | The method of authentication by characteristic virtual encryption | |
CN110378080B (zh) | 一种带有版权保护机制的出版物 | |
Kazmi et al. | Unihach: unicode and hash function supported with counting and frequency recurrence of Arabic characters for Quranic text watermarking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13763329 Country of ref document: EP Kind code of ref document: A2 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22.04.2015) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13763329 Country of ref document: EP Kind code of ref document: A2 |