الاثنين، 24 نوفمبر 2014

Solution to CRIMES and Guns In USA




Solution to CRIMES and Guns In USA

Each bullet cartridge must have a unique serial number one engraved on the case and the same unique serial number printed on small plate put inside the projectile.
Each gun must have unique serial number on every single part of the gun.
Any body buys a gun his finger prints and eye scan is taken. Plus photo 8 of him. 4 show all of him from feet to head so the height is shown, Where one from the front two from the sides one from the back.
4 photo for his head. Where one from the front two from the sides one from the back.
Then the gun is registered and the bullets are registered under his name.
Then police can trace each bullet and each gun by one click on the computer.
After this system is up and running any person has any bullet or gun which is not registered in the system will be regarded as criminal and all crimes which happened will be regarded as if he has done them and put in jail for life.
This method will end all crimes once and for all. Since any gang or criminals caught with an unregistered gun or unregistered bullet will be put to life imprisonment.
Any body steal a gun or a single bullet will be regarded as someone planning to kill someone else. Therefore any body with stolen gun will be sentenced to life imprisonment.

This method will make all criminals to fear to carry any unregistered gun since they will face life imprisonment.

A period of lets say one year given to all people to register their guns. Then they hand all their bullets and get registered bullets.

This idea is rough, it can be improved and be much better.

All Americans must ask for this so we have a more safe society and safe schools.

Every one must retweet this idea so every one in America must know about it and all ask their congress men to vote for it.
Tweeter face book and instgram and all must be used to promote this idea so our America will be safe with no gangs no criminals no school shooting and no drunks shoot people from driving cars.

Since America is beautiful so let’s have a safe America.

If we Americans do not care for our America no one else will.


Each bullet can kill one man, child, and woman. Let’s register every single bullet in our America.
America always leads the world. The entire world will follow America and register all their bullets. Lets be an example where the world follow us.

To make this program really unique we must make special guns exclusively made for civilians where each gun has special shape distinguishable from all other guns.
This new gun must have a camera where when the safety latch is opened the camera starts to record the video and the sound.
Then the police will have a real evidence of what happened as video and voices and sounds and all.
We can take this idea great step forward where this camera has WiFi and SIM card so as soon as the safety latch is opened the camera starts to transmit video and sound where a special system and server record this video and sound and it roots it to the nearest police stations so the police can move immediately to the location since the gun owner states the address and police listen to his/her voice, plus the system can get the location of this SIM automatically.



All the technology we have we must put it in this gun so it will be a state of the art.
The firing pin is released by electronic mechanism so when a person presses the trigger the signal goes to the electronics then the electronic release the firing pin then the bullet is fired.
When the safety latch is opened the battery powers the electronics then it ask for a password or a finger print, when this is done then the gun is ready to fire.
So any gun when stolen the criminal who steals it can not use this gun since it is finger print oriented only the users which put there finger prints in this gun can fire it.
The magazine must be electronic compatible with this very gun only it will not work with any other gun. So each gun comes with 10 magazine s compatible only with this very gun. If it is used with other guns the gun electronic will never release the firing pin plus it will send a message to the system then the system roots it to the police that this gun is violating the rule. It sends the name the address the phone number to the police. The police immediately act on this grave incident. 

 The gun must have a battery with long life so it is charged once a year.
The bullets fixed in sealed magazine where all bullets barcodes are printed or engraved on this magazine. It has a special mechanism where it never let the bullets out but when inserted in this electronic gun.

  Any civilian has a gun different than this gun will be charged as a criminal and put to life imprisonment.


This idea will never work if a new law is not made where anybody has a gun which is not electronic he is regarded as terrorist attacking America. If a gang caught with different guns they are terrorists working to destroy America. Without such a law all these new electronic guns means nothing. We must put extreme laws to stop everyone terrorizing American society. Let’s make the 21st century the true beginning of America for this new age of safe society, where women feel safe at home and in streets and we have an America with no gangs with no mafia with no crimes.
 


New industry will evolve and this gun will be imported by all other counties with the new bar-coded bullets.
Specially made shape gun is mad for police with camera so when any policeman shoots any body every thing is recorded video and sound. So every thing will be clear and NO case like Ferguson will ever be in America any more.

This new gun will end crimes in American once and for all.
Let us all ask for this new gun and ask for the system where all people must be registered when buying this gun and these new special bullets.
Special small size gun is mad for women easily held in hand bags where they can defend themselves on the streets and at home where she can open the latch at home when she hears a burglar and shoots him with no fear since every thing is recorded by a camera.
All women will feel safer at home and outside home with his new gun.


It is a war against crime in America lets win this war. We can do it. We have the technology to do it what we need is the will.
Lets all say good by for crimes in America.



 

الاثنين، 17 نوفمبر 2014

US patent: Cloud storage. Complete & final solution from hackers and viruses




 Cloud Storage: Final Solution Against Hacking and Viruses

US patent 8112601

Each costumer who rents a specific size of the storage system of the Cloud storage system, where this specific size will consist from three parts or categories.
A and B and C categories. Where each category has specific properties and functions specified in my patent.

Properties of A and B and C categories

For the public.

Category A. will be read only.

Category B will be no read no write.

Category C will be read and partial write. Such as making comments and adding attachments.

For Low-to-Middle Management from the company which rents this portion of the Cloud storage.

Category A. will be read and write.

Category B will be no read no write.

Category C will be read and write.

Senior Management from the company which rents this portion of the Cloud storage.

Category A. will be read and write and delete.

Category B  will be read and write and delete.

Category C will be read and write and delete.

To make this cloud storage system absolutely impenetrable, all computers must be registered with the company providing cloud storage services on its servers. Each computer serial number must be registered and categorized either as Lower-to-Middle Management Storage System or as Senior Management Cloud Storage System
Where Senior Management computers will be given all the options as explained above.
While the Lower-to-Middle Management computers will be given limited options as explained above.

Thus, corporate senior managers and decision makers will have all options and tools available to them to manage and manipulate stored data while lower and middle managers will have limited, specific options.

This patent requires that every single computer must have a robust encryption software. Consequently, all requests to access stored data in the cloud will be encrypted which include the computer serial numbers of the computer from which request is generated. Plus the password of the user.

Upon receiving a request and verifying the integrity of the computer from which the request is issued, a permission will be granted or denied to that specific computer according to its classification, whether it was classified as Senior Management computer or Low-to-Middle Management computer or whether this computer is permitted or not to carry out reading, writing or deletion operations. Consequently, the granted permission will allow that computer to carry out only the functions corresponding to classification.

Category A will be designated for storing only non-confidential data.
Category B is designated to storing confidential data, only senior managers and decision makers are allowed to access.
Category C is designated to permit the general public to write their comments.



This is a brief description of the patent. However, the storage categories can be increased to be more than three categories; in fact they can be increased to four, five, six or more, each having different specifications and properties. For instance, the Senior Management from the company renting storage from Cloud Storage System can be divided into several classes, say from class 1 to class 6, where each class can be granted specific powers to carry multiple operations of reading, writing and deletions.

It is vitally important to note that storage categories A, B and C are not fixed and unalterable. On the contrary, Senior managers can shift storage portions from any category and combine it with any other category.

In summary, this patent will put an end to hacking of stored confidential data since it deprives hackers the ability to access such stored data by denying them the ability to read and write stored data.

It will also prevent viruses from attacking stored data because it will prevent any virus from carrying writing operations in categories A and B. Only permission-granted managers will be able to do that.
Since category C only permits the public to write text or comments so virus can not come from that. But when the public are permitted to add attachments then viruses can be imbedded in those attachments. The viruses will be confined in category C only, since data can not move from one category to the other by itself.

A cloud storage system can meet the demands and needs of different customers. Here I explain when the specific size envisages three categories A and B and C. but it can be flexible enough to increase the number of categories by several factors to accommodate all the needs of all types of companies, for example it can be A and B and C and D and E and F etcetera. Where each category has different properties and different permeation groups from class 1 to class 6.
Each employee  must have a password and each computer should have an internally generated password which is automatically generated by the  encryption software.
The Cloud storage system will receive three things that is:

  1. The internally generated password which is automatically generated by the encryption software.
  2. The employee password.
  3. The computer serial number


Upon receiving all these three the permeation is granted.
It is possible to have much more complex system of passwords generated by the encryption software. To see such complex system of passwords please read my patent:
This patent has many kinds of passwords.
Permanent Password, Hidden Password, Disposable Password, Complex Password, Remote Passwords Folder, Key Parts and Secret Codes.

Plus read my application. VIRTUAL MONEY SYSTEM
This patent has many kinds of passwords too.

Therefore it is an important issue that we make a special program specialized in generating diversity of passwords coming and going between the cloud and the personal computer to make sure that this computer is not a hacker. Where at each login these passwords are not the same once.

For banks and vital organizations it is important to have very complex encryption software where it has 1000 encryption formula and a thousand inscription code, so we will have one million different inscription status at each long in.
Where at each login the encryption software scramble the:

  1. Computer serial number
  2. Inscription code: one of the one thousand available, chosen randomly.
  3. Personal password
  4. Automatically generated permanent password. Different for each computer.
  5. Automatically generated one time use password. It is related to this particular personal computer related to its Computer serial number.


When the cloud system receive all these it de-encrypt it then verify it, when it is legitimate then it make sure it is legitimate by sending an Automatically generated one time use password to the personal computer the password software reads this password and sends another Automatically generated one time use password to the cloud system.
The cloud system receives it de-encrypt it then verify it, then the login is given to this particular computer according to its level of management.



The “Cloud” is a vague, indistinct and formless term giving the impression that it describes a random, bounder less state.
The “Cosmos” or the “Universe”, on the other hand, describe a structure where each star has its own distinct size and form plus having specific planetary system. Thus, the name the “Cosmos” should replace the currently used term the “Cloud” since companies will be renting specific stars in the “Cosmos” which includes many planetary systems. Companies will be able to designate a specific planet to store its data and assign it a specific managerial level.
This new “Cosmos” will be far more advanced than the current random “Cloud” nomenclature; In the Cosmos each company will shine as a star in the sky.





My three patents which Protect Cloud storage, phones & computers from hackers & viruses are mother & child & grandchild.
Mother:  Patent No: 7724458 Hard disk drive with selectable reading and writing to/from different platter surfaces
Child:  Patent No: 8112601   Data storage device with security feature
Grandchild:   Appl. No.: 13/338091   SECURE DATA STORAGE DEVICE
The Mother (Patent No: 7724458) claims HDD. Using a hardware switch to perform the protection.
The Child (Patent No: 8112601)   claims storage device, any kind of storage device which include HDD & SSD. Using a hardware switch to perform the protection.
The  Grandchild:   (Appl. No.: 13/338091 )   claims storage device, any kind of storage device which include HDD & SSD. Using a hardware electronics chips to perform the protection. Where the user via the keyboard of a computer or laptop keyboard controls the storage device read & write via the electronics chips.
In mobile phones the user controls the storage device read & write via the keypads of the mobile phones via the electronic chip.
The animations below I have done them for the Mother (Patent No: 7724458) it explains it for the HDD.
But is useful to understand the idea fully. So when you read the Grandchild text you will understand it immediately since it is the same idea but with small variations.
So please watch first the three animations below then read the text of the Grandchild then you will understand it so easily.
Grandchild:   Appl. No.: 13/338091   SECURE DATA STORAGE DEVICE
http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=/netahtml/PTO/srchnum.html&r=1&f=G&l=50&s1=20120099219.PGNR.&OS=DN/20120099219&RS=DN/20120099219
US patent 7724458 anti virus anti Hacker HDD three platters 
http://www.youtube.com/watch?v=M8fFAnSNkwo 

US patent 7724458 anti virus anti Hacker HDD five platters 
http://www.youtube.com/watch?v=LYsAKZR7RL4 

Hard disk drive with selectable reading and writing to/from different platter surfaces 
http://patft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=7724458.PN.&OS=PN/7724458&RS=PN/7724458 

Data storage device with security feature 
http://patft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=8112601.PN.&OS=PN/8112601&RS=PN/8112601 
US patent 8112601 protects all phones, Android and other types from hackers & viruses.
These patents will protect small businesses and personal computers and giant corporations like Banks Data, governments data, police data, hospital data, US Defence computers & Pentagon & military systems & ministries & car factories all kinds of fatories & TV stations radio stations & satalites & ship ports & airports
it is unpenetratable security system for every thing on this planet.
US patents 8112601 & 7724458 & 13/338091 protects phones & computers from hackers & viruses
http://brisam9.blogspot.ae/2013/12/us-patent-8112601-solve-security.html

This set of my Three Patents will make a new laptop which will stop any virus and any hacker, if it is made and advertised on face book and tweeter and else, it will land slide this world and sell more than any laptop, since all people will buy it so they are certain that their OS and software’s will never be hit by a virus or a worm either to stop them from functioning or to slow them down. Plus there data is secure from hackers.
Plus all companies will buy them (banks, governments, police, research lab, hospitals, ministries, manufactures, etcetera) since they are sure no Hacker will steal their data.
if some investors take this patent and make this new laptop they will make tens of millions of profit (if not hundreds of millions) since this new laptop and desk top computer will land slide the entire world.
Not to mention mobile phones where all manufacturers will come to license these patents for their phones to stop viruses, and now the phone viruses has increased tremendously.
Jasim Alazzawi
Mobile: 00971508668762
E-mail:    brysam2@yahoo.co.uk