Information matrix cryptogram
First Claim
1. A method of making the Information Matrix Cryptogram for anti-forgery, anti-counterfeiting, anti-piracy, authentication and verification relates to a system by sophistically integrating five technologies into a special coded matrix cryptogram that looks like a regular bitmap image, the method comprises:
- said data matrix technology;
means of defining and designing a special coded data matrix; and
said compression technology;
means of compressing the data in the special coded data matrix; and
said encryption technology;
means of encrypting the data in the special coded data matrix; and
said data allocating technology;
means of allocating the original data into the special coded data matrix; and
, said authentication technology. means of generating and appending special authentic codes to the special coded data matrix.
0 Assignments
0 Petitions
Accused Products
Abstract
In accordance with the present invention, there is provided a concept of the present invention is to use technology and methods of a special coded information matrix cryptogram with five integrated technologies to protect the original digital data from forgery, counterfeiting and pirating effectively. Five technologies comprise of data matrix bitmap technology, compression technology, encryption technology, data allocating technology and authentication technology. They can enhance the information matrix cryptogram with the special features to the strongest level of security. The concept of designing the system of the present invention is to be able to convert any data in any kind of formats and size into a special formatted and coded information matrix cryptogram. This cryptogram with a special authentic code is unique and infeasible to break. The design of the open technology of the present invention allows the user to have flexible applicable options to protect the any data in any kind of format in a very safe and secure way.
41 Citations
15 Claims
-
1. A method of making the Information Matrix Cryptogram for anti-forgery, anti-counterfeiting, anti-piracy, authentication and verification relates to a system by sophistically integrating five technologies into a special coded matrix cryptogram that looks like a regular bitmap image, the method comprises:
-
said data matrix technology;
means of defining and designing a special coded data matrix; and
said compression technology;
means of compressing the data in the special coded data matrix; and
said encryption technology;
means of encrypting the data in the special coded data matrix; and
said data allocating technology;
means of allocating the original data into the special coded data matrix; and
,said authentication technology. means of generating and appending special authentic codes to the special coded data matrix. - View Dependent Claims (8, 10, 11)
-
-
2. The open design method of the system of the present invention makes the system of the Information Matrix Cryptogram very flexible:
- the user has three options to choose according to the needs in the real world, said options comprise;
said Default Encryption for low level of encryption (up to 64 bits) and, said IMC Encryption Technology for high level of encryption (256 bits or more) and, said Customized Encryption technology such as AES, RSA, 3DES, PGP or any other encryption technology at the user'"'"'s choice.
- the user has three options to choose according to the needs in the real world, said options comprise;
-
3. A method of making a unique multi symmetric security key systems which comprises
said One-to-Many Security Key System for the general use; -
said One-to-One Security Key System for the top confidential data and the private use;
said Associated Security Key System for anti piracy and other special purpose. - View Dependent Claims (4, 5, 6, 7)
-
-
9. A method of making the multi effect of strengthening encryption, wherein:
-
said method of encrypting the cryptogram where the data sits as many times as necessary and this is called multi effect of strengthening encryption of the cryptogram, and according to the user'"'"'s need, they can be “
double effect of encryption”
or “
triple effect of encryption”
or “
quadruple effect of encryption” and
;
said method of making the multi effect encryption by using with either a different pair of the encoder key and the decoder key or simply use the same pair of key to encrypt the data matrix repeatedly, achieving the required level encryption and as well meeting with needs of the user, especially in situation that a data file should be viewed at the same time by more than two persons.
-
-
12. A method of delivering the encoder key and decoder key comprising:
-
said step 1, a encoder key or a decoder key will be encrypted in a steganographic images while the associated ID and password will be generated at the same time, and any images can be used as steganographic media to hide the encoder key and/or the decoder key;
the steganographic images where the encoder key or the decoder key is hidden can be downloaded from the sender'"'"'s server or sent by the e-mail or other means. The user retrieves the encoder key or the decoder key from the steganographic images and gets the associated ID and password separately.This delivery system of the security keys makes it very difficult for anyone who is not an authorized person to get the real encoder key or decoder key or their associated ID and password.
-
-
13. A method of increasing the security strength of the Information Matrix Cryptogram, wherein:
said method to allow the decoded file to be deleted immediately after the program for viewing the data file is closed. This function can be turned on or off at the user'"'"'s choice.
-
14. A method of verifying and authenticating the cryptogram, wherein
Said the cryptogram can be decoded only after the cryptogram is verified and authenticated by a decoder key. The original date will be retrieved immediately after the cryptogram is verified and authenticated correctly. Or A warning message of “ - This cryptogram is not original or altered. Please hold the person who present this file”
is displayed if the cryptogram fails to be verified and authenticated. At the same time the related program will be shut down immediately.
- This cryptogram is not original or altered. Please hold the person who present this file”
-
15. A method of limiting the power of the encoder key and decoder key, wherein:
said system of the present invention can control the capability that the encoder key and the decoder key in order to limit the power of the pairs of the encoder key and decoder, and the system can limit the size of the data file that the encoder key or decoder key is able to deal with, e.g. if a pair of encoder key and encoder is limited to process the data files of the size of no more than 100K, and then this pair of keys will not be able to process size of any data file over 100K. This feature can help the user simply by controlling the power of the encoder key and decoder key and control the size of the data file to be encrypted and save the budget to meet with the special need in real world.
Specification