Method and System for Protecting Passwords Offline

20210218568 ยท 2021-07-15

    Inventors

    Cpc classification

    International classification

    Abstract

    A method and system for protecting passwords offline is disclosed. The invention being comprised of a notebook made from pages having grains of crushed calcium carbonate stone and a combo cipher marker and UV torch. The notebook contains tables and matrices to accommodate the ciphering process, a marker that contains transparent ink to hide passwords and a UV torch to exposes hidden passwords. The passwords themselves are encrypted by means of a process involving character mapping and key codes recorded into the notebook with the combo cipher marker and UV torch. These encrypted passwords remain invisible until the user shines the pages with the UV torch on the cap and passwords can then be retrieved and unscrambled. An object of the invention is to enhance password security by archiving them completely offline and off any electronic networks.

    Claims

    1.) A system for protecting passwords away from electronic networks comprised of the following parts: a) a cipher marker to hide passwords; b) a UV torch; to reveal hidden passwords; and b) a notebook.

    2.) The system for protecting passwords away from electronic networks of claim 1 wherein the notebook having a login information section, a personal information section, a private key section, a shieldcrypt section and a recovery phrase section.

    3.) The system for protecting passwords away from electronic networks of claim 1 wherein the notebook having pages made of grains of calcium carbonate stone and trace amounts of plastic as a binder

    4.) A method for protecting passwords away from electronic networks, the method comprised of the following steps: a) selecting a password; b) creating a hint; c) totaling password characters; d) inserting a private key; e) generating a cipher; f) mapping private keys; g) filling in empty boxes; h) unmapping and i) shining a UV light.

    5.) The method for protecting passwords away from electronic networks of claim 4 wherein selecting a password includes the step of a selecting at least 15 alphanumeric characters with no repeating characters.

    6.) The method for protecting passwords away from electronic networks of claim 4 wherein creating a hint includes the step of relating the hint to the password selected.

    7.) The method for protecting passwords away from electronic networks of claim 4 wherein inserting a private key includes the step of excluding a number of boxes randomly that total the same number of characters in the password.

    8.) The method for protecting passwords away from electronic networks of claim 4 wherein mapping includes the step of writing each cipher character into the corresponding password decryption key boxes that have the corresponding password characters already listed inside the boxes.

    9.) The method for protecting passwords away from electronic networks of claim 4 wherein unmapping includes the step of decrypting whereby a user identifies each box in the private key that has the corresponding password character already listed inside the boxes of the password decryption key and transfers the written characters into the empty private key boxes.

    10.) The method for protecting passwords away from electronic networks of claim 4 wherein shining a UV light includes the step of directing the UV light at a hidden password to allow a user to read it.

    Description

    BRIEF DESCRIPTION OF THE FIGURES

    [0009] The accompanying drawings, which are incorporated herein and form a part of the specification, illustrate some, but not the only or exclusive, examples of embodiments and/or features.

    [0010] FIG. 1 shows a perspective view of the invention.

    [0011] FIG. 2 shows a perspective view of the invention revealing hidden text.

    [0012] FIG. 3 shows a plan view of the identification section.

    [0013] FIG. 4 shows a plan view of the private key section.

    [0014] FIG. 5 shows a plan view of the shieldcrypt section. section.

    [0015] FIG. 6 shows a plan view of the recovery phrase section.

    [0016] FIG. 7 shows a plan view of the recovery phase section.

    [0017] Other aspects of the present invention shall be more readily understood when considered in conjunction with the accompanying drawings, and the following detailed description, neither of which should be considered limiting.

    DETAILED DESCRIPTION OF FIGURES

    [0018] In this description, the directional prepositions of up, upwardly, down, downwardly, front, back, top, upper, bottom, lower, left, right and other such terms refer to the invention as it is oriented and appears in the drawings and are used for convenience only; they are not intended to be limiting or to imply that the device has to be used or positioned in any particular orientation. Conventional components of the invention are elements that are well-known in the prior art and will not be discussed in detail for this disclosure.

    [0019] FIG. 1 shows a perspective view of the invention being comprised of combo cipher marker and UV torch 1 with activation button 4 and notebook 2. Pages in said notebook 2 made of but are not limited to grains of crushed stone, paper (comprised of calcium carbonate and trace amounts of plastic as a binder) and the like. FIG. 2 shows a perspective view of combo cipher marker and UV torch 1 dispensing transparent ink during writing and creating hidden text 3. The figure also revealing hidden text 3 by means of UV light illuminated by said activation button 4. FIG. 3 shows a plan view of the identification section 5 of notebook 2 allowing a user to record personal information such as but not limited to their name, address, telephone number, electronic mail address etc. FIG. 4 shows a plan view of the private key section 7 allowing a user to enter their private passcodes with said combo cipher marker and UV torch 1. FIG. 4A shows a login information section 25 having elements including but not limited to a username, password and two-factor authentication. FIG. 5 shows a plan view of the shieldcrypt section 11 wherein users encrypt their passcodes and includes places to record features such as but not limited to password hints, private keys 12, and password decryption key 13. FIG. 6 shows a plan view of the recovery phrase section.

    [0020] FIG. 7 shows a flow diagram of the invention process. Steps of this method include but are not limited to During encryption, user selects a password and writes it down on a worksheet in step 14. User writes password hint inside password hint section 12a on shieldcrypt form 11 in step 15. User totals actual characters in password in step 16. User inserts characters of private key (from bitcoin, etherium etc.) into private key section in step 17. While inserting the private key, the user excludes the number of boxes that represent the total number of characters in the password randomly in the private key section 12 and leaves these boxes empty in step 18. In step 19 user writes each excluded character under each character of the password on the worksheetthese are called ciphers. In step 20 user writes each cipher character into the corresponding password decryption key section 13 boxes that have the corresponding password characters already listed inside the boxes using a regular penthis is called mapping. User fills in all empty boxes in the password decryption key section 13 with random characters. Password is now encrypted in step 21 and protection is initiated in step 22. During decryption, user decrypts the private key section using the private key section 12. User identifies each box in the private key section 12 that has the corresponding password character already listed inside the boxes of the password decryption key section 13 and transfers the written characters into the empty private key section 12 boxes.

    [0021] It is additionally noted and anticipated that although the device is shown in its most simple form, various components and aspects of the device may be differently shaped or slightly modified when forming the invention herein. As such those skilled in the art will appreciate the descriptions and depictions set forth in this disclosure or merely meant to portray examples of preferred modes within the overall scope and intent of the invention, and are not to be considered limiting in any manner. While all of the fundamental characteristics and features of the invention have been shown and described herein, with reference to particular embodiments thereof, a latitude of modification, various changes and substitutions are intended in the foregoing disclosure and it will be apparent that in some instances, some features of the invention may be employed without a corresponding use of other features without departing from the scope of the invention as set forth. It should also be understood that various substitutions, modifications, and variations may be made by those skilled in the art without departing from the scope of the invention.