PatentAuction.com lists patented inventions available for sale or licensing. Inventors can list their patented inventions (or patent pending) for sale. New inventions for sale are added on a daily basis !
Home    List your patent    My account     Help     Support us    

Cloud security: Final Solution Against Hacking and Viruses

[Category : - ELECTRONICS- Computers and computer accessories ]
[Viewed 3854 times]

Cloud Storage: Final Solution Against Hacking and Viruses

US patent 8112601
Each costumer who rents a specific size of the storage system of the Cloud storage system, where this specific size will consist from three parts or categories.
A and B and C categories. Where each category has specific properties and functions specified in my patent.

Properties of A and B and C categories

For the public.

Category A. will be read only.

Category B will be no read no write.

Category C will be read and partial write. Such as making comments and adding attachments.

For Low-to-Middle Management from the company which rents this portion of the Cloud storage.

Category A. will be read and write.

Category B will be no read no write.

Category C will be read and write.

Senior Management from the company which rents this portion of the Cloud storage.

Category A. will be read and write and delete.

Category B will be read and write and delete.

Category C will be read and write and delete.

To make this cloud storage system absolutely impenetrable, all computers must be registered with the company providing cloud storage services on its servers. Each computer serial number must be registered and categorized either as Lower-to-Middle Management Storage System or as Senior Management Cloud Storage System
Where Senior Management computers will be given all the options as explained above.
While the Lower-to-Middle Management computers will be given limited options as explained above.

Thus, corporate senior managers and decision makers will have all options and tools available to them to manage and manipulate stored data while lower and middle managers will have limited, specific options.

This patent requires that every single computer must have a robust encryption software. Consequently, all requests to access stored data in the cloud will be encrypted which include the computer serial numbers of the computer from which request is generated. Plus the password of the user.

Upon receiving a request and verifying the integrity of the computer from which the request is issued, a permission will be granted or denied to that specific computer according to its classification, whether it was classified as Senior Management computer or Low-to-Middle Management computer or whether this computer is permitted or not to carry out reading, writing or deletion operations. Consequently, the granted permission will allow that computer to carry out only the functions corresponding to classification.

Category A will be designated for storing only non-confidential data.
Category B is designated to storing confidential data, only senior managers and decision makers are allowed to access.
Category C is designated to permit the general public to write their comments.

This is a brief description of the patent. However, the storage categories can be increased to be more than three categories; in fact they can be increased to four, five, six or more, each having different specifications and properties. For instance, the Senior Management from the company renting storage from Cloud Storage System can be divided into several classes, say from class 1 to class 6, where each class can be granted specific powers to carry multiple operations of reading, writing and deletions.

It is vitally important to note that storage categories A, B and C are not fixed and unalterable. On the contrary, Senior managers can shift storage portions from any category and combine it with any other category.

In summary, this patent will put an end to hacking of stored confidential data since it deprives hackers the ability to access such stored data by denying them the ability to read and write stored data.

It will also prevent viruses from attacking stored data because it will prevent any virus from carrying writing operations in categories A and B. Only permission-granted managers will be able to do that.
Since category C only permits the public to write text or comments so virus can not come from that. But when the public are permitted to add attachments then viruses can be imbedded in those attachments. The viruses will be confined in category C only, since data can not move from one category to the other by itself.

A cloud storage system can meet the demands and needs of different customers. Here I explain when the specific size envisages three categories A and B and C. but it can be flexible enough to increase the number of categories by several factors to accommodate all the needs of all types of companies, for example it can be A and B and C and D and E and F etcetera. Where each category has different properties and different permeation groups from class 1 to class 6.
Each employee must have a password and each computer should an internally generated password which is automatically generated by the encryption software.
The Cloud storage system will receive three things that is:

1. The internally generated password which is automatically generated by the encryption software.
2. The employee password.
3. The computer serial number

Upon receiving all these three the permeation is granted.
It is possible to have much more complex system of passwords generated by the encryption software. To see such complex system of passwords please read my patent:

Methods for preventing software piracy
Link
This patent has many kinds of passwords.
Permanent Password, Hidden Password, Disposable Password, Complex Password, Remote Passwords Folder, Key Parts and Secret Codes.

Plus read my application. VIRTUAL MONEY SYSTEM
This patent has many kinds of passwords too.
Link

Therefore it is an important issue that we make a special program specialized in generating diversity of passwords coming and going between the cloud and the personal computer to make sure that this computer is not a hacker. Where at each login these passwords are not the same once.

For banks and vital organizations it is important to have very complex encryption software where it has 1000 encryption formula and a thousand inscription code, so we will have one million different inscription status at each long in.
Where at each login the encryption software scramble the:

1. Computer serial number
2. Inscription code: one of the one thousand available, chosen randomly.
3. Personal password
4. Automatically generated permanent password. Different for each computer.
5. Automatically generated one time use password. It is related to this particular personal computer related to its Computer serial number.


When the cloud system receive all these it de-encrypt it then verify it, when it is legitimate then it make sure it is legitimate by sending an Automatically generated one time use password to the personal computer the password software reads this password and sends another Automatically generated one time use password to the cloud system.
The cloud system receives it de-encrypt it then verify it, then the login is given to this particular computer according to its level of management.


The “Cloud” is a vague, indistinct and formless term giving the impression that it describes a random, bounder less state.
The “Cosmos” or the “Universe”, on the other hand, describe a structure where each star has its own distinct size and form plus having specific planetary system. Thus, the name the “Cosmos” should replace the currently used term the “Cloud” since companies will be renting specific stars in the “Cosmos” which includes many planetary systems. Companies will be able to designate a specific planet to store its data and assign it a specific managerial level.
This new “Cosmos” will be far more advanced than the current random “Cloud” nomenclature; In the Cosmos each company will shine as a star in the sky.


My three patents which Protect Cloud storage, phones & computers from hackers & viruses are mother & child & grandchild.
Mother: Patent No: 7724458 Hard disk drive with selectable reading and writing to/from different platter surfaces
Child: Patent No: 8112601 Data storage device with security feature
Grandchild: Appl. No.: 13/338091 SECURE DATA STORAGE DEVICE
The Mother (Patent No: 7724458) claims HDD. Using a hardware switch to perform the protection.
The Child (Patent No: 8112601) claims storage device, any kind of storage device which include HDD & SSD. Using a hardware switch to perform the protection.
The Grandchild: (Appl. No.: 13/338091 ) claims storage device, any kind of storage device which include HDD & SSD. Using a hardware electronics chips to perform the protection. Where the user via the keyboard of a computer or laptop keyboard controls the storage device read & write via the electronics chips.
In mobile phones the user controls the storage device read & write via the keypads of the mobile phones via the electronic chip.
The animations below I have done them for the Mother (Patent No: 7724458) it explains it for the HDD.
But is useful to understand the idea fully. So when you read the Grandchild text you will understand it immediately since it is the same idea but with small variations.
So please watch first the three animations below then read the text of the Grandchild then you will understand it so easily.
Grandchild: Appl. No.: 13/338091 SECURE DATA STORAGE DEVICE
Link
US patent 7724458 anti virus anti Hacker HDD three platters
Link

US patent 7724458 anti virus anti Hacker HDD five platters
Link

Hard disk drive with selectable reading and writing to/from different platter surfaces
Link

Data storage device with security feature
Link
US patent 8112601 protects all phones, Android and other types from hackers & viruses.
These patents will protect small businesses and personal computers and giant corporations like Banks Data, governments data, police data, hospital data, US Defence computers & Pentagon & military systems & ministries & car factories all kinds of fatories & TV stations radio stations & satalites & ship ports & airports
it is unpenetratable security system for every thing on this planet.
US patents 8112601 & 7724458 & 13/338091 protects phones & computers from hackers & viruses
Link

This set of my Three Patents will make a new laptop which will stop any virus and any hacker, if it is made and advertised on face book and tweeter and else, it will land slide this world and sell more than any laptop, since all people will buy it so they are certain that their OS and software’s will never be hit by a virus or a worm either to stop them from functioning or to slow them down. Plus there data is secure from hackers.
Plus all companies will buy them (banks, governments, police, research lab, hospitals, ministries, manufactures, etcetera) since they are sure no Hacker will steal their data.
if some investors take this patent and make this new laptop they will make tens of millions of profit (if not hundreds of millions) since this new laptop and desk top computer will land slide the entire world.
Not to mention mobile phones where all manufacturers will come to license these patents for their phones to stop viruses, and now the phone viruses has increased tremendously.
Jasim Alazzawi
Mobile: 00971508668762
E-mail: [Use the button below to contact me]



Financial information

outright sale







[ Home | List a patent | Manage your account | F.A.Q.|Terms of use | Contact us]

Copyright PatentAuction.com 2004-2017
Page created at 2024-03-29 9:20:58, Patent Auction Time.