WO2021015850A1 - Enhanced security - Google Patents
Enhanced security Download PDFInfo
- Publication number
- WO2021015850A1 WO2021015850A1 PCT/US2020/035027 US2020035027W WO2021015850A1 WO 2021015850 A1 WO2021015850 A1 WO 2021015850A1 US 2020035027 W US2020035027 W US 2020035027W WO 2021015850 A1 WO2021015850 A1 WO 2021015850A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- hardware
- matched
- random
- passphrase
- create
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
Definitions
- the current encryption programs on the market are not 100% effective and not secure on many ways.
- a piece of hardware specific to a computer such as authenticating the registered serial number or any other non-changing signature of the pieces of hardware.
- the matched passphrases can either have
- cybersecurity measures if used as a plug-in or any other method of connecting pieces of hardware A piece of hardware with perfect continuous encryption. A protected application launched from the hardware confirms the serial number or other numbers that are specific to the hardware in question. This will allow the computer to be verified and activate the drive. At time intervals the matched pieces of hardware create a random "passphrase" using a random number generator with the equation for PI calculating the next digit of PI as the matching "passphrase". The matched passphrases can either have the same numerical starting position in the decimal position of PI and calculate the next number or this same random number generator can be used to create a random password. You can use both. After a set interval of time this repeats and it verifies' the security of the matched devices and it creates great cybersecurity measures if used as a plug-in or any other method of connecting pieces of hardware.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
A piece of hardware with perfect continuous encryption. A protected application launched from the hardware confirms the serial number or other numbers that are specific to the hardware in question. This will allow the computer to be verified and activate the drive. At time intervals the matched pieces of hardware create a random "passphrase" using a random number generator with the equation for PI calculating the next digit of PI as the matching ''passphrase''. The matched passphrases can either have the same numerical starting position in the decimal position of PI and calculate the next number or this same random number generator can be used to create a random password. After a set interval of time this repeat, and it verifies the security of the matched devices and it creates great cybersecurity measures if used as a plug-in or any other method of connecting pieces of hardware.
Description
(A) Specification
Enhanced security
B: Cross Reference to Related Applications: 16/521, 582::07-24-2019::63/030, 908:: 05/27/2020 ( C ) Regarding Federally Sponsored Research or Development: Not Applicable
( D): Regarding The Names of The Parties To a Joint Research Agreement: Not Applicable
E: Incorporation by reference of material submitted on a compact disc or as a text file via the The Office Electronic Filing System (EFS-Web): not Applicable
F: Statement Regarding Prior Disclosures by The Inventor Or a Joint Inventor: Not Applicable
Background of invention:
A problem exists in the world in this digital age. That problem is the privacy. The current encryption programs on the market are not 100% effective and not secure on many ways. A piece of hardware specific to a computer, such as authenticating the registered serial number or any other non-changing signature of the pieces of hardware.
Brief Summary of Invention:
A piece of hardware with perfect continuous encryption. A protected application launched from the The pieces of hardware will then become active.
hardware confirms the serial number or other numbers that are specific to the hardware in question. Intended Use:
This will allow the computer to be verified and activate the drive. At time intervals the matched pieces An application that makes the computer present the serial number or any non changing signature with an of hardware create a random "passphrase" using a random number generator with the equation for PI application for continuous security and protection
calculating the next digit of PI as the matching "passphrase".
The matched passphrases can either have
the same numerical starting position in the decimal position of PI and calculate the next number or this
same random number generator can be used to create a random password.
You can use both. After a
set interval of time this repeats and it verifies the security of the matched devices and it creates great
cybersecurity measures if used as a plug-in or any other method of connecting pieces of hardware. A piece of hardware with perfect continuous encryption. A protected application launched from the hardware confirms the serial number or other numbers that are specific to the hardware in question. This will allow the computer to be verified and activate the drive. At time intervals the matched pieces of hardware create a random "passphrase" using a random number generator with the equation for PI calculating the next digit of PI as the matching "passphrase". The matched passphrases can either have the same numerical starting position in the decimal position of PI and calculate the next number or this same random number generator can be used to create a random password. You can use both. After a set interval of time this repeats and it verifies' the security of the matched devices and it creates great cybersecurity measures if used as a plug-in or any other method of connecting pieces of hardware.
(K): Claim or Claims: See Document "Claims"
(M): Sequence Listing: Not Applicable
(L): Abstract of Disclosure: See Document "Abstract"
Pictures: N/A
Claims
Claims
Enhanced Security
I: A piece of hardware with perfect continuous encryption.
I I : Derivative applications can be made to make this patent useful for signing into buildings, holding people responsible and many other possibilities.
I I I : A protected application launched from the hardware confirms the serial number or other numbers that are specific to the hardware in question. This will allow the computer to be verified and activate the drive.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/521,582 | 2019-07-24 | ||
US16/521,582 US20210029116A1 (en) | 2019-07-24 | 2019-07-24 | 6 Factor Authentication |
US202063030908P | 2020-05-27 | 2020-05-27 | |
US63/030,908 | 2020-05-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021015850A1 true WO2021015850A1 (en) | 2021-01-28 |
Family
ID=74192670
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2020/035027 WO2021015850A1 (en) | 2019-07-24 | 2020-05-29 | Enhanced security |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2021015850A1 (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060180660A1 (en) * | 2004-04-12 | 2006-08-17 | Gray R O | Electronic identification system |
US7437752B2 (en) * | 2002-09-23 | 2008-10-14 | Credant Technologies, Inc. | Client architecture for portable device with security policies |
US7549161B2 (en) * | 2001-06-28 | 2009-06-16 | Trek 2000 International Ltd. | Portable device having biometrics-based authentication capabilities |
US20090260002A1 (en) * | 2008-04-15 | 2009-10-15 | Volovic Gregory S | Software option selection and validation system |
US20130097694A1 (en) * | 2011-10-14 | 2013-04-18 | International Business Machines Corporation | Protecting an electronic device against unathorized hardware use |
US8984296B1 (en) * | 2009-03-29 | 2015-03-17 | Cypress Semiconductor Corporation | Device driver self authentication method and system |
-
2020
- 2020-05-29 WO PCT/US2020/035027 patent/WO2021015850A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7549161B2 (en) * | 2001-06-28 | 2009-06-16 | Trek 2000 International Ltd. | Portable device having biometrics-based authentication capabilities |
US7437752B2 (en) * | 2002-09-23 | 2008-10-14 | Credant Technologies, Inc. | Client architecture for portable device with security policies |
US20060180660A1 (en) * | 2004-04-12 | 2006-08-17 | Gray R O | Electronic identification system |
US20090260002A1 (en) * | 2008-04-15 | 2009-10-15 | Volovic Gregory S | Software option selection and validation system |
US8984296B1 (en) * | 2009-03-29 | 2015-03-17 | Cypress Semiconductor Corporation | Device driver self authentication method and system |
US20130097694A1 (en) * | 2011-10-14 | 2013-04-18 | International Business Machines Corporation | Protecting an electronic device against unathorized hardware use |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105939191B (en) | The client secure De-weight method of ciphertext data in a kind of cloud storage | |
CN106789041B (en) | A kind of credible block chain method of decentralization certificate | |
EP4404505A3 (en) | Computer-implemented system and method providing a decentralised protocol for the recovery of cryptographic assets | |
GB2538022A (en) | Multiple secrets in quorum based data processing | |
MX2010009925A (en) | A strong authentication token generating one-time passwords and signatures upon server credential verification. | |
TW200711436A (en) | Secure patch system | |
CA2551113A1 (en) | Authentication system for networked computer applications | |
EP3360279B1 (en) | Public key infrastructure&method of distribution | |
MX2019008693A (en) | Addressing a trusted execution environment using signing key. | |
CN102984156A (en) | Verifiable distributed privacy data comparing and sorting method and device | |
CN103338445A (en) | File encryption and decryption method and system | |
CN107204846B (en) | Digital signature generation method, system and node module | |
EP3395031A1 (en) | Method for storing data on a storage entity | |
US20160119317A1 (en) | Secured data channel authentication implying a shared secret | |
TW201612791A (en) | Anonymity authentication method in multi-server environments | |
CN103152178A (en) | Cloud computing verification method and system | |
CN105141631B (en) | The methods, devices and systems that a kind of terminal, server and account safety log in | |
AU2019319767B2 (en) | A method and system for securing data | |
WO2021015850A1 (en) | Enhanced security | |
WO2018038998A3 (en) | Vault appliance for identity verification and secure dispatch of rights | |
CN106789046B (en) | Method for realizing self-generating key pair | |
TW201319860A (en) | Product authentication based upon a hyperelliptic curve equation and a curve pairing function | |
CN107229874A (en) | A kind of method for realizing VR Key, device and server | |
Bhagyashri et al. | A survey on privacy preserving techniques for secure cloud storage | |
Gilsenan et al. | Decentralized backup and recovery of TOTP secrets |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20843712 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20843712 Country of ref document: EP Kind code of ref document: A1 |