COVERS OR COMPONENTS FOR CELL PHONES OR OTHER DIGITAL DEVICES FEATURING PHYSICAL CRYPTOGRAPHY TO FORWARD AND RECEIVE ENCRYPTED MESSAGES ON A TAMPER-PROOF BASIS
20220014925 · 2022-01-13
Inventors
- João Carlos Gomes De Oliveira (Santana de Parnaíba, BR)
- Procópio Gomes De Oliveira Netto (Santana de Parnaíba, BR)
- Felipe Gomes De Oliveira (Santana de Parnaíba, BR)
- Daniel Gomes De Oliveira (Santana de Parnaíba, BR)
Cpc classification
H04L9/38
ELECTRICITY
H04L63/0428
ELECTRICITY
H04L9/08
ELECTRICITY
H04M1/19
ELECTRICITY
G06F21/6209
PHYSICS
H04M1/7243
ELECTRICITY
International classification
H04W12/30
ELECTRICITY
H04W12/02
ELECTRICITY
Abstract
“COVERS OR COMPONENTS FOR CELL PHONES OR OTHER DIGITAL DEVICES FEATURING PHYSICAL CRYPTOGRAPHY TO FORWARD AND RECEIVE ENCRYPTED MESSAGES ON A TAMPER-PROOF BASIS”, more precisely, the present utility model addresses the use of physical cryptography for sending and receiving messages via cell phones or other digital devices (1), which allows messaging between two or more users, in a completely secure manner, without the possibility of message tampering or reading by third parties, since the decoding of the forwarded message takes place by overlaying (30) on the cell phone device or digital device (1) a key image cover (20) matching the forwarded matrix image (10).
Claims
1. “COVERS OR COMPONENTS FOR CELL PHONES OR OTHER DIGITAL DEVICES FEATURING PHYSICAL CRYPTOGRAPHY TO FORWARD AND RECEIVE ENCRYPTED MESSAGES ON A TAMPER-PROOF BASIS”, that uses physical cryptography to decode (40) messages, that allows messaging between two or more users, in a completely secure way, without the possibility of third parties tampering or reading the message, in that the sender types his message on his cell phone or other digital device (1), and this message is encrypted by a cryptography app (mobile application) currently on the market or computer software currently on the market, pre-installed on said cell phone or other digital device (1), forming a matrix image (10), being said matrix image (10) forwarded by any means to the message recipient, and this recipient, upon receiving the message with the matrix image (10), uses on the cell phone or digital device (1) a cover (20) containing the key image matching to the matrix image (10) sent, so as to view (40) said message.
2. “COVERS OR COMPONENTS FOR CELL PHONES OR OTHER DIGITAL DEVICES FEATURING PHYSICAL CRYPTOGRAPHY TO FORWARD AND RECEIVE ENCRYPTED MESSAGES ON A TAMPER-PROOF BASIS”, according to claim 1, in that the message to be forwarded is encrypted at the so by any app (mobile application) or computer software currently on the market, regardless of its security level, forming a matrix image (10), where this matrix image (10) can be forwarded to one or more recipients, by any means.
3. “COVERS OR COMPONENTS FOR CELL PHONES OR OTHER DIGITAL DEVICES FEATURING PHYSICAL CRYPTOGRAPHY TO FORWARD AND RECEIVE ENCRYPTED MESSAGES ON A TAMPER-PROOF BASIS”, according to claim 1, in that the recipient or recipients, upon receiving the message forwarded with the matrix image (10), place on (30) their cell phones or other digital devices (1), the cover (20) containing key image matching the matrix image (10) forwarded by the sender, and this cover (20) containing the key image allows viewing (40) the message sent.
4. “COVERS OR COMPONENTS FOR CELL PHONES OR OTHER DIGITAL DEVICES FEATURING PHYSICAL CRYPTOGRAPHY TO FORWARD AND RECEIVE ENCRYPTED MESSAGES ON A TAMPER-PROOF BASIS”, according to claim 1, in that a single message encrypted at the source may include different contents intended for several recipients, and each recipient, from his cover (20) containing the matching key image, although receiving the same matrix image (10), will view (40) a specific content, different from the content viewed by the other recipients.
5. “COVERS OR COMPONENTS FOR CELL PHONES OR OTHER DIGITAL DEVICES FEATURING PHYSICAL CRYPTOGRAPHY TO FORWARD AND RECEIVE ENCRYPTED MESSAGES ON A TAMPER-PROOF BASIS”, according to claim 1, in that the message recipient does not require, to view the message content, an app (mobile application) or computer software for cryptography or decoding pre-installed on his mobile device or digital device (1), since the received messages are decoded by overlaying (30) the cover (20) with the key image matching the forwarded matrix image (10).
6. “COVERS OR COMPONENTS FOR CELL PHONES OR OTHER DIGITAL DEVICES FEATURING PHYSICAL CRYPTOGRAPHY TO FORWARD AND RECEIVE ENCRYPTED MESSAGES ON A TAMPER-PROOF BASIS”, according to claim 1, in that the cover (20) containing the key image features a limited viewing angle, to prevent others from viewing the message content at an oblique angle.
7. “COVERS OR COMPONENTS FOR CELL PHONES OR OTHER DIGITAL DEVICES FEATURING PHYSICAL CRYPTOGRAPHY TO FORWARD AND RECEIVE ENCRYPTED MESSAGES ON A TAMPER-PROOF BASIS”, according to claim 1, in that the message can be typed through a secondary keypad (60) with sealed hardware, either fastened or not to the cell phone or digital device (1), and may even be retractable, with the sender typing the message normally on this secondary keypad (60) with sealed hardware, and this message is encrypted by forming the matrix image (10) and temporarily recorded on said sealed hardware installed inside said secondary keypad (60), and this sealed hardware encrypts and sends the message already encrypted to the mobile device or digital device (1) of the sender, through Bluetooth or physical connection, and the mobile device or digital device (1) of the sender sends the message already encrypted to the recipient(s), through any message-sending means.
8. “COVERS OR COMPONENTS FOR CELL PHONES OR OTHER DIGITAL DEVICES FEATURING PHYSICAL CRYPTOGRAPHY TO FORWARD AND RECEIVE ENCRYPTED MESSAGES ON A TAMPER-PROOF BASIS”, according to claim 1, in that viewing (40) the correct content of the forwarded message is impossible without the cover (20) containing the key image matching to the forwarded matrix image (10).
9. “COVERS OR COMPONENTS FOR CELL PHONES OR OTHER DIGITAL DEVICES FEATURING PHYSICAL CRYPTOGRAPHY TO FORWARD AND RECEIVE ENCRYPTED MESSAGES ON A TAMPER-PROOF BASIS”, according to claim 1, in that not using the cover (20) matching the forwarded matrix image (10) results in the display of a message different (50) from the one originally forwarded.
Description
DESCRIPTION OF THE FIGURES
[0027] Augmenting the present description, so as to provide better understanding of the features hereof, and pursuant to a preferred embodiment hereof, the description is followed by a set of drawings, where, as an example, although not limiting, the following was depicted:—
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035]
DETAILED DESCRIPTION OF THE SUBJECT MATTER
[0036] Referring to the illustrated drawings, the present privilege refers to a new setup in “COVERS OR COMPONENTS FOR CELL PHONES OR OTHER DIGITAL DEVICES FEATURING PHYSICAL CRYPTOGRAPHY TO FORWARD AND RECEIVE ENCRYPTED MESSAGES ON A TAMPER-PROOF BASIS”; more precisely, the present utility model addresses the use of physical cryptography, for sending and receiving messages by cell phones or other digital devices (1), which allows the exchange of messages between two or more users, on a completely secure manner, without the possibility of tampering or reading of the message by third parties.
[0037] According to the present, the message sender types his message on his cell phone or other digital device (1), and this message is encrypted by a cryptography app (mobile application) currently in the market or a computer program currently in the market, pre-installed on the cell phone or digital device (1), forming a matrix image (10), and forwards this message to the message recipient.
[0038] To decode the encrypted message, the message recipient does not need any cryptography app or computer software pre-installed on his cell phone or other digital device (1), and, when receiving the message with the matrix image (10) sent by the sender, overlays (30) the cover (20) on his cell phone or other digital device (1) with the key image corresponding to the matrix image (10) sent by the sender, being able to view (40) the message received.
[0039] The sender of the encrypted message informs the recipient of said message, and the key image layer (20) matching the matrix image (10) that said recipient should use to view (40) the forwarded message.
[0040] Should a cover (20) with the key image different from that informed by the message sender be used, said message will not be decoded, or it may be mistakenly decoded, generating a message (50) other than the message sent. Different layers (20) producing different messages for more than one user from the same and single initial message is also possible.
[0041] This utility model also allows the sender to forward the same message to an unlimited number of recipients, provided that these recipients have the cover (20) with the correct key image matching the forwarded matrix image (10).
[0042] To encrypt the message, the sender may use any app (mobile application) or computer software existing on the market and pre-installed on his mobile device or digital device (1), since reading the message will not depend on the cryptography program, but on the correct and message-specific decoding layer (20), matching the forwarded matrix image (10).
[0043] The sender can also encrypt several different messages from a single typed message, and forward them to several recipients, with each individual recipient decoding their specific message, according to the cover (20) of the key image indicated to them, with the correct viewing (40).
[0044] The message can also be typed through a secondary keypad (60) with sealed hardware, either fastened or not to the cell phone or digital device (1), and may even be retractable, with the sender typing the message normally on this secondary keypad (60) with sealed hardware, and this message is encrypted and temporarily recorded on said sealed hardware installed inside said secondary keypad (60), and this sealed hardware encrypts and sends the message already encrypted to the mobile device or digital device (1) of the sender, through Bluetooth or physical connection, and the mobile device or digital device (1) of the sender sends the message already encrypted to the recipient(s), through any message-sending means.
[0045] Upon receiving the message, the recipient(s) receive(s) the indication of which key image should be used, and overlay(s) the respective key image cover (20) on the screen of their mobile device or digital device (1), decoding the forwarded message and enabling its correct viewing (40). Using a key image cover (20) not matching the forwarded matrix image (10) will result in the display of a message (50) other than the one forwarded.
[0046] The recipient does not need to have an encryption or decryption app or computer software pre-installed on his cell phone or digital device (1), as the decryption is done physically by overlaying (30) the cover (20) with the key image matching the forwarded matrix image (10). Without the cover (20) containing the key image matching the forwarded matrix image (10), viewing (40) the correct content of the forwarded message is impossible.
[0047] Of course, when the present utility model is put into practice, modifications may be introduced with regard to certain construction and shape details, without entailing a departure from the fundamental principles, which are clearly substantiated in the claim framework, being thus understood that the terminology used was not intended as a limitation.