WO2021015850A1 - Enhanced security - Google Patents

Enhanced security Download PDF

Info

Publication number
WO2021015850A1
WO2021015850A1 PCT/US2020/035027 US2020035027W WO2021015850A1 WO 2021015850 A1 WO2021015850 A1 WO 2021015850A1 US 2020035027 W US2020035027 W US 2020035027W WO 2021015850 A1 WO2021015850 A1 WO 2021015850A1
Authority
WO
WIPO (PCT)
Prior art keywords
hardware
matched
random
passphrase
create
Prior art date
Application number
PCT/US2020/035027
Other languages
French (fr)
Inventor
Kevin DELAHOUSSAYE
Original Assignee
Delahoussaye Kevin
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US16/521,582 external-priority patent/US20210029116A1/en
Application filed by Delahoussaye Kevin filed Critical Delahoussaye Kevin
Publication of WO2021015850A1 publication Critical patent/WO2021015850A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user

Definitions

  • the current encryption programs on the market are not 100% effective and not secure on many ways.
  • a piece of hardware specific to a computer such as authenticating the registered serial number or any other non-changing signature of the pieces of hardware.
  • the matched passphrases can either have
  • cybersecurity measures if used as a plug-in or any other method of connecting pieces of hardware A piece of hardware with perfect continuous encryption. A protected application launched from the hardware confirms the serial number or other numbers that are specific to the hardware in question. This will allow the computer to be verified and activate the drive. At time intervals the matched pieces of hardware create a random "passphrase" using a random number generator with the equation for PI calculating the next digit of PI as the matching "passphrase". The matched passphrases can either have the same numerical starting position in the decimal position of PI and calculate the next number or this same random number generator can be used to create a random password. You can use both. After a set interval of time this repeats and it verifies' the security of the matched devices and it creates great cybersecurity measures if used as a plug-in or any other method of connecting pieces of hardware.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

A piece of hardware with perfect continuous encryption. A protected application launched from the hardware confirms the serial number or other numbers that are specific to the hardware in question. This will allow the computer to be verified and activate the drive. At time intervals the matched pieces of hardware create a random "passphrase" using a random number generator with the equation for PI calculating the next digit of PI as the matching ''passphrase''. The matched passphrases can either have the same numerical starting position in the decimal position of PI and calculate the next number or this same random number generator can be used to create a random password. After a set interval of time this repeat, and it verifies the security of the matched devices and it creates great cybersecurity measures if used as a plug-in or any other method of connecting pieces of hardware.

Description

(A) Specification
Enhanced security
B: Cross Reference to Related Applications: 16/521, 582::07-24-2019::63/030, 908:: 05/27/2020 ( C ) Regarding Federally Sponsored Research or Development: Not Applicable
( D): Regarding The Names of The Parties To a Joint Research Agreement: Not Applicable
E: Incorporation by reference of material submitted on a compact disc or as a text file via the The Office Electronic Filing System (EFS-Web): not Applicable
F: Statement Regarding Prior Disclosures by The Inventor Or a Joint Inventor: Not Applicable
Background of invention:
A problem exists in the world in this digital age. That problem is the privacy. The current encryption programs on the market are not 100% effective and not secure on many ways. A piece of hardware specific to a computer, such as authenticating the registered serial number or any other non-changing signature of the pieces of hardware.
Brief Summary of Invention:
A piece of hardware with perfect continuous encryption. A protected application launched from the The pieces of hardware will then become active.
hardware confirms the serial number or other numbers that are specific to the hardware in question. Intended Use:
This will allow the computer to be verified and activate the drive. At time intervals the matched pieces An application that makes the computer present the serial number or any non changing signature with an of hardware create a random "passphrase" using a random number generator with the equation for PI application for continuous security and protection
calculating the next digit of PI as the matching "passphrase". The matched passphrases can either have
the same numerical starting position in the decimal position of PI and calculate the next number or this
same random number generator can be used to create a random password.
You can use both. After a
set interval of time this repeats and it verifies the security of the matched devices and it creates great
cybersecurity measures if used as a plug-in or any other method of connecting pieces of hardware. A piece of hardware with perfect continuous encryption. A protected application launched from the hardware confirms the serial number or other numbers that are specific to the hardware in question. This will allow the computer to be verified and activate the drive. At time intervals the matched pieces of hardware create a random "passphrase" using a random number generator with the equation for PI calculating the next digit of PI as the matching "passphrase". The matched passphrases can either have the same numerical starting position in the decimal position of PI and calculate the next number or this same random number generator can be used to create a random password. You can use both. After a set interval of time this repeats and it verifies' the security of the matched devices and it creates great cybersecurity measures if used as a plug-in or any other method of connecting pieces of hardware.
(K): Claim or Claims: See Document "Claims"
(M): Sequence Listing: Not Applicable
(L): Abstract of Disclosure: See Document "Abstract"
Pictures: N/A

Claims

Claims
Enhanced Security
I: A piece of hardware with perfect continuous encryption.
I I : Derivative applications can be made to make this patent useful for signing into buildings, holding people responsible and many other possibilities.
I I I : A protected application launched from the hardware confirms the serial number or other numbers that are specific to the hardware in question. This will allow the computer to be verified and activate the drive.
PCT/US2020/035027 2019-07-24 2020-05-29 Enhanced security WO2021015850A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US16/521,582 2019-07-24
US16/521,582 US20210029116A1 (en) 2019-07-24 2019-07-24 6 Factor Authentication
US202063030908P 2020-05-27 2020-05-27
US63/030,908 2020-05-27

Publications (1)

Publication Number Publication Date
WO2021015850A1 true WO2021015850A1 (en) 2021-01-28

Family

ID=74192670

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2020/035027 WO2021015850A1 (en) 2019-07-24 2020-05-29 Enhanced security

Country Status (1)

Country Link
WO (1) WO2021015850A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060180660A1 (en) * 2004-04-12 2006-08-17 Gray R O Electronic identification system
US7437752B2 (en) * 2002-09-23 2008-10-14 Credant Technologies, Inc. Client architecture for portable device with security policies
US7549161B2 (en) * 2001-06-28 2009-06-16 Trek 2000 International Ltd. Portable device having biometrics-based authentication capabilities
US20090260002A1 (en) * 2008-04-15 2009-10-15 Volovic Gregory S Software option selection and validation system
US20130097694A1 (en) * 2011-10-14 2013-04-18 International Business Machines Corporation Protecting an electronic device against unathorized hardware use
US8984296B1 (en) * 2009-03-29 2015-03-17 Cypress Semiconductor Corporation Device driver self authentication method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7549161B2 (en) * 2001-06-28 2009-06-16 Trek 2000 International Ltd. Portable device having biometrics-based authentication capabilities
US7437752B2 (en) * 2002-09-23 2008-10-14 Credant Technologies, Inc. Client architecture for portable device with security policies
US20060180660A1 (en) * 2004-04-12 2006-08-17 Gray R O Electronic identification system
US20090260002A1 (en) * 2008-04-15 2009-10-15 Volovic Gregory S Software option selection and validation system
US8984296B1 (en) * 2009-03-29 2015-03-17 Cypress Semiconductor Corporation Device driver self authentication method and system
US20130097694A1 (en) * 2011-10-14 2013-04-18 International Business Machines Corporation Protecting an electronic device against unathorized hardware use

Similar Documents

Publication Publication Date Title
CN105939191B (en) The client secure De-weight method of ciphertext data in a kind of cloud storage
CN106789041B (en) A kind of credible block chain method of decentralization certificate
EP4404505A3 (en) Computer-implemented system and method providing a decentralised protocol for the recovery of cryptographic assets
GB2538022A (en) Multiple secrets in quorum based data processing
MX2010009925A (en) A strong authentication token generating one-time passwords and signatures upon server credential verification.
TW200711436A (en) Secure patch system
CA2551113A1 (en) Authentication system for networked computer applications
EP3360279B1 (en) Public key infrastructure&method of distribution
MX2019008693A (en) Addressing a trusted execution environment using signing key.
CN102984156A (en) Verifiable distributed privacy data comparing and sorting method and device
CN103338445A (en) File encryption and decryption method and system
CN107204846B (en) Digital signature generation method, system and node module
EP3395031A1 (en) Method for storing data on a storage entity
US20160119317A1 (en) Secured data channel authentication implying a shared secret
TW201612791A (en) Anonymity authentication method in multi-server environments
CN103152178A (en) Cloud computing verification method and system
CN105141631B (en) The methods, devices and systems that a kind of terminal, server and account safety log in
AU2019319767B2 (en) A method and system for securing data
WO2021015850A1 (en) Enhanced security
WO2018038998A3 (en) Vault appliance for identity verification and secure dispatch of rights
CN106789046B (en) Method for realizing self-generating key pair
TW201319860A (en) Product authentication based upon a hyperelliptic curve equation and a curve pairing function
CN107229874A (en) A kind of method for realizing VR Key, device and server
Bhagyashri et al. A survey on privacy preserving techniques for secure cloud storage
Gilsenan et al. Decentralized backup and recovery of TOTP secrets

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20843712

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20843712

Country of ref document: EP

Kind code of ref document: A1