![]() MuSIc (Standardized method of saving encrypted information)
专利摘要:
The MuSIc application offers a secure, free and low-tech solution to communication problems that may arise in the political or commercial field. The costs related to communication in the business world are in millions of euros, MuSIc offers the possibility to a company to reduce these drastically by offering a method of direct communication with its customers, tailor-made and in music. . In the politional and security domain, MuSIc allows an agent in the field to communicate in a secure and discreet way with his employer, to receive his orders in real time and encrypted in full view and in the knowledge of all. The MuSIc method foils by its musical aspect and the use of an encryption key the interception of the message as well as its direct listening by a third party. (= telephone listening) 公开号:BE1026992A9 申请号:E20190008 申请日:2019-01-29 公开日:2020-09-18 发明作者:Thomas Stassin 申请人:Thomas Stassin; IPC主号:
专利说明:
MuSlc (Uniform Method for Saving Encrypted Information) BE2019 / 0008 Description The MuSIc method (Uniform Method for Saving Encrypted Information) is an encryption method used to encrypt an alphanumeric message in musical notes or melody with a view to communicate securely between a transmitter To and one or more receiver (s) B. Once the message is encrypted, MuSIc will allow the recipient (s) of the message to translate the melody into text through the use of an encryption key stored on the receiving device (s). MuSIc includes a method as well as an Android-type application for translating the encrypted message. MuSlc works as follows; 1) Define the alphanumeric message to send; "attention police" example 2) Define the encryption key to use, comprising a letter as well as the musical note that will correspond to it; example "ADo" 3) Using this encryption key, subdivide the complete alphabet into four octaves; O1, O2, O3, O4 (4 octaves cover the entirety of the 26 letters of our alphabet) 4) Represent the musical notes corresponding to each letter of the word or phrase to be sent on a musical score 5) Send this series of musical notes or melody to the recipient (s) 6) The recipient (s) of the message will be able, using the secret encryption key received by the sender, to translate each note into a letter via MuSIc of the corresponding alphabet
权利要求:
Claims (3) [1] 1. The MuSlc encryption method, Android-type application MuSlc and its acronym (Standardized Method for Saving Encrypted Information). [2] 2. Relating to claim 1, the method of transforming a text message into musical notes according to the MuSlc encryption method, characterized by the addition of an acoustic recognition algorithm and a secure encryption key. [3] 3. Related to claim 2, the creation or transmission of an encryption key according to the MuSIc method.
类似技术:
公开号 | 公开日 | 专利标题 US20180212752A1|2018-07-26|End-To-End Secure Operations from a Natural Language Expression Shirvanian et al.2014|Wiretapping via mimicry: Short voice imitation man-in-the-middle attacks on crypto phones Bergh2007|Gender attitudes and modernization processes BE1026992A9|2020-09-18|MuSIc | EP2404404A1|2012-01-11|Method for securely drawing up a virtual multiparty contract capable of being physically represented Park et al.2019|It Wasn’t Me! Peissl2003|Surveillance and Security: A Dodgy Relationship 1 Weitzel2018|Audializing migrant bodies: Sound and security at the border Singh et al.2012|Digital image Steganalysis for computer forensic investigation Greenleaf2011|Global data privacy laws: Forty years of acceleration Husain et al.2016|Enhanced Audio LSB Steganography for Secure Communication Bucataru2018|Media Literacy and The Challenge of Fake News US11095621B2|2021-08-17|Selective cognitive security for communication data Dinesh et al.2016|Computations on Cipher Speech for Secure Biometrics Namazov2021|Emerging Political Feminism in Azerbaijan: The Most Visible Other Kassam2003|On Being a Scholar of Islam: Risks and Responsibilities Selim et al.2019|A CATALAN NUMBERS AND APPLICATIONS Beebe2021|A Complete Bibliography of Publications in Cryptologia GENÇOĞLU2021|Enhancing The Data Security by using Audio Steganography with Taylor Series Cryptosystem Sidiq et al.2019|An Overview on the Public Relations Strategic Management in Public Sector Organizations von zur Gathen2015|Chapter H People using cryptography Ballesteros Larrota2013|Methods of covert communication of speech signals based on a bio-inspired principle Freeman2012|The Telegraph and Personal Privacy: A Historical and Legal Perspective Shukla et al.2019|Tamperproof Evidence with Blockchain Nejjahi et al.2019|An Enhanced Method for Web Ontologies Encryption
同族专利:
公开号 | 公开日 BE1026992A1|2020-08-20| BE1026992B9|2020-09-21| BE1026992B1|2020-08-24|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
法律状态:
2020-10-12| FG| Patent granted|Effective date: 20200824 | 2021-10-06| MM| Lapsed because of non-payment of the annual fee|Effective date: 20210131 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 BE20190008A|BE1026992B9|2019-01-29|2019-01-29|MuSIc |BE20190008A| BE1026992B9|2019-01-29|2019-01-29|MuSIc | 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|