Sign In to Follow Application
View All Documents & Correspondence

“Invisible Zerobyte Data Security Technology, And Addon Os With Virtual Invisible Partitions”

Abstract: The present invention is related to a high-level data security in a better way from unauthorized access across the computer system where INVIdata Technology pioneers the establishment of a Virtual Invisible Partition (VIP) on the hard disk as an embedded Operating System “INVIos” and revolutionizing the landscape of data security. The INVIos acts as a standalone contemporary OS, or seamlessly integrating as an Addon Operating System, where it interacts with the current OS and file system to ensure a smooth user experience. Through the implementation of advanced modules such as INVIclean, INVIcrypt, INVIlayer, and INVIshare, along with robust protocols, the data is converted into INVIdata which guarantees data invisibility and invincibility for fortifying internal data security frameworks. In addition, its utilization of optimized memory management paradigms significantly bolsters system stability and performance, cementing the security and reliability of primary operating systems to unparalleled heights. FIG. 2

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
12 July 2023
Publication Number
29/2024
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application
Patent Number
Legal Status
Grant Date
2025-10-28
Renewal Date

Applicants

INVIDATA PVT. LTD.
“SHAKUN”, 87, TOSHIWAL LAYOUT, MURTIZAPUR ROAD, AKOLA, MAHARASHTRA, INDIA

Inventors

1. DILIP KUMAR RAI
House-77, Phase-2, Kailash Nagar, Govindpura Industrial Area, Bhopal, Madhya Pradesh

Specification

DESC:FIELD OF THE INVENTION

The present invention is related to Data security and memory management across multiple platforms from unauthorized access and more particularly, the present invention relates to an Invisible Unicode Programming Technology concept and/ or INVIdata Technology wherein embedded operating system (INVIos) acts as a standalone contemporary OS, or seamlessly integrating as an addon operating system. Wherein the data files converted into INVIdata which is an invisible format and zerobyte file size to give the protection against from unauthorized access.

BACKGROUND OF THE INVENTION

With the fast development of industrial information, industrializes and be more and more obvious with information-based convergence, Industry Control System is also improving integrated, interconnection and information system management level between system using newest computer networking technology. Protecting the business data is tougher because data is everywhere, attacker can get the organization’s data of transmission by attack means such as sniff or go-betweens, into and Organization’s data is distorted, therefore, result in the low problem of the safety of transmission Organization’s data.

In this digital world it is very important to secure information. With the devolvement of new technologies, the threat to data security has also increased very much. For any organization or business to run properly it is important to keep secrets or private data safe and protect organization data safe. We have methods to secure data as Hashing, Cryptography, Steganography and Encryption. But among these methods of data security Hashing (i.e. converting string or character into short fixed length value or key using some hash function) , Encryption ( i.e. converting data into another form or code that it became unreadable for unauthorized user) , Cryptography (Cryptography is a means of using codes to safeguard information and communications so that only those who are supposed to read and process it may do so.) and Steganography ( this technique is used to hide any message or data inside some file such as video , audio , image etc. ). Among all the techniques Encryption, Cryptography and Hashing is widely used in security of data. Steganography is not so popular. The existing system we have for data security is there are already many applications or software that provides data security. Even in today's software, we have different applications for different things. For steganography different applications are there and for cryptography different applications are there and for encryption and decryption there are also many applications which can fulfil our need. Major problem faced earlier was that many data security software or applications are there, but they provide only single layer security as encryption or steganography or cryptography. WhatsApp uses end to end encryption i.e., only authorized user can read message, but communication can be breached by intruder if he gets access to data, he can easily read it.

Normally, we have been using the few methods to secure the data like Authentication and Access Controls, Encryption, Firewalls and Network Security, Regular Updates and Patches, Employee Training and Awareness, Physical Security, Data Backup and Disaster Recovery, Regular Security Audits and Assessments, etc. Also, ensuring data security is an ongoing process, and it requires a comprehensive approach that considers both technical and human aspects of security. Regularly reviewing and updating your security measures is crucial to adapt to evolving threats and protect your data from unauthorized access.

Recently, Cryptography has been playing pivotal role in protecting data across systems in the world. It is a continuous process to update security primitives from time to time as the adversaries enhance their capabilities to break security systems. In the contemporary era, cyber-attacks are increased and there is highly diversified, heterogeneous and insecure space in the cyber world due to Internet of Things (IoT) and distributed applications. Moreover, there is assumed threat from post quantum era due to the power of computers that will be exploited by attackers.

There are many security algorithms that are being used. For instance, AES is widely used algorithm. It has been used for number of years in order to perform data encryption and decryption for security. It is understood that security is not one-time effort. There is need for continuously improving security primitives. With the changes in the computing world, there is need for change in cryptography. It does mean that the computational power of computers has something to do with security. With quantum computers that are realized in near future, attackers might try that computational power to break existing security systems.

There is a requirement for a better and more simplistic solution to overcome the limitation of the existing in the art for data protection. Therefore, the present invention provides an INVIdata technology wherein data is converted into INVIdata which is invisible, functionally 0-byte file size, non-accessible, non-copiable, non-corruptible, non-traceable, non-deletable, non-transferable and non-hackable. The main advantage of the invention is that the hacker cannot even detect the INVIdata where functional file size is 0 bytes. Therefore, the hacker cannot hack the data or break the security even after the years and years trials.

OBJECT OF THE INVENTION

The main object of the present invention is to provide a high-level and efficient data security by using an Invisible Unicode Programming Technology concept or INVIdata Technology as a safeguard to users and their files, data, and information from malicious software, hackers and unauthorized persons.

Another object of the present invention is to provide a memory management across multiple platforms by creating a Virtual Invisible partition as an INVIos on the hard disk for revolutionizing the landscape of data security.

Another object of the present invention is to store an INVIdata into embedded operating system - INVIos which acts as a standalone contemporary OS or seamlessly integrating as an addon Operating system with current OS to ensure a smooth user experience.

One another object of the present invention is to provide an INVIdata Technology where the data is protected through the INVIfile, INVIos, INVIclean, INVIcrypt, INVIlayer and INVIshare features.

Another object of the present invention is to provide the feature of sharing the file via to authorized users only.

Another object of the present invention is to provide the high-level data security from unauthorized access where the data is invisible, functionally 0-byte file size, non-accessible, non-copiable, non-corruptible, non-traceable, non-deletable, non-transferable and non-hackable.

Yet another object of the present invention is to provide the invisible data with functionally 0 byte file size to the user or any hackers in the Virtual Invisible Partition.

SUMMARY OF THE INVENTION

The present invention is related to an INVIdata technology which is one stop solution of data security and optimised memory management for a revolutionary advancement in operating system design, enabling users to interact seamlessly across diverse platforms. Where the INVIdata is invisible, functionally 0-byte file size, non-accessible, non-copiable, non-corruptible, non-traceable, non-deletable, non-transferable and non-hackable.

In accordance with one aspect of the invention, the present invention provides embedded INVIos as a Virtual Invisible Partition (VIP) for memory management on the hard disk for revolutionizing the landscape of data security. By segregating critical information within this secure partition INVIos fortifies the defence against unauthorised access and cyber threats. Where INVIdata is stored in INVIos using INVIfile memory management.

In accordance with one aspect of the invention, the INVIdata technology is implemented through advanced features such as INVIclean, INVIcrypt, INVIlayer, and INVIshare, along with robust protocols where INVIdata guarantees data invisibility and invincibility, thereby fortifying internal data security frameworks. Where an Invisible Unicode Programming Technology has been used in which any type of data files converted into an invisible format and zerobyte size.

BRIEF DESCRIPTION OF THE DRAWINGS

In the figures, similar components and/or features may have the same reference label. Further, various components of the same type may be distinguished by following the reference label with a second label that distinguishes among the similar components. If only the first reference label is used in the specification, the description applies to any one of the similar components having the same first reference label irrespective of the second reference label.

FIG. 1 illustrates a block diagram of an Invisible Zerobyte Data Technology system to provide efficient data protection, in accordance to one or more embodiment of the present invention.

FIG. 2 illustrates a block diagram of INVIdata technology features, in accordance to one or more embodiment of the present invention.

FIG. 3 illustrates a flow diagram to provide efficient data protection on based of INVIdata technology in accordance with embodiments of the present invention.

FIG. 4 illustrates a flow diagram to retrieve and convert INVIdata into data in accordance with embodiments of the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

For the purpose of promoting an understanding of the principles of the invention, reference will now be made to the embodiment illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended, such alterations and further modifications in the illustrated system and/or method, and such further applications of the principles of the invention as illustrated therein being contemplated as would normally occur to one skilled in the art to which the invention relates.

Although the present invention has been described in its preferred embodiment. Embodiments of the techniques introduced here include various steps and operations, which have been described below. The main concept of guiding the present invention is to provide the Data security and memory management across multiple platforms from unauthorized access by using an Invisible Unicode Programming Technology based on INVIdata Technology concept.

The INVIdata Technology requires a computer-mediated network, server, hardware, software, database, application, NTFS file system (OS) including but not limited to technology in demand, cloud or normal hosting services, data center may be implemented or facilitated to achieve and fulfil the objective of the business, idea and concept expressed in this document. The technology may also include other technologies and software and hardware components required to provide additional functionalities to the system.

The term ‘New Technology File System (NTFS)’ used herein refers to a file system that the Windows NT operating system uses for storing and retrieving files on a storage device.

The term ‘Virtual Invisible Partition’ used herein refers to as a hidden partition, is a section of a storage device that is intentionally made inaccessible or "invisible" to the operating system and the user.

The term “embedded system” used herein refers to as an end computing device that has a combination of a computer processing unit (e.g., SoC, controller, microcontroller, microprocessor, or the like); computer memory; and hardware I/Os, peripherals, sensors, or other hardware components that collectively function for an intended purpose. It may be “embedded” as part of a complete device often including electrical or electronic hardware and mechanical parts. Because an embedded system typically controls physical operations of the machine that it is embedded within, it often has real-time computing constraints.

The present invention provides a system and method for efficient data protection through INVIdata Technology from unauthorized access where the data is INVIdata is invisible, functionally 0-byte file size, non-accessible, non-copiable, non-corruptible, non-traceable, non-deletable, non-transferable and non-hackable. Where an Invisible Unicode Programming Technology (INVIdata) has been used in which any type of data files converted into an invisible format and zerobyte size.
FIG. 1 illustrates a block diagram of an Invisible Zerobyte Data Technology system to provide efficient data protection, in accordance to one or more embodiment of the present invention. It is an embedded system, shown as configured to receive an OS build with hardware driver bindings and instances for hardware components in accordance with some of the embodiments disclosed herein. The embedded system includes one or more processing units, input/output (I/O) ports, a communications interface, computer- storage memory (memory) and hardware components, all of which constitute hardware components with drivers and presence in one or more device trees. The system may take the form any number of computing devices, such as smart sensor, loT device, application-specific integrated circuit (ASIC), or other device that engineered and programmed for a specific functional purpose.

The processing unit may include any type of ASIC, SoC, microcontroller, MCU, controller, microprocessor, processor, analog circuit, or the like programmed to execute computer-executable instructions for implementing aspects of this disclosure. In some examples, the processing unit is programmed to execute instructions such as those illustrated in the other drawings discussed herein. For purposes of this disclosure, the terms “processor,” “controller,” “MCU,” “processing unit,” and “control unit” are meant to connote the same thing and are used interchangeably.

The embedded system is equipped with one or more hardware components. Hardware components refer to the specific hardware that is connected to or resident on device. Examples of hardware components include, without limitation, transceivers (e.g., UART); displays (e.g., touch, VR or augmented reality (AR), etc.); peripherals (e.g., stylus, wearable, etc.); sensors (e.g., accelerometer, inertial movement unit (IMU), gyroscope, global positioning system (GPS), magnetometer, etc.); microphones; speakers; or any other hardware. Any combination of hardware may be incorporated in device. I/O ports provider internal and external connections for the hardware components. Hardware components use the I/O ports to operate externally and internally.

The hardware components are logically discussed herein as being application hardware components and system hardware components, meaning they are either logically connected to application-specific code or system-specific code. For the disclosure, “logically connected” may include physically connected, electrically connected, or able to communicate via signaling (e.g., through radio waves, wirelessly, light, infrared, or the like). The hardware components may be used by either the application code or the system code, but those two portions of code are isolated from one another using different partition.

Computer-storage memory includes any quantity of memory devices associated with or accessible by the device. The computer- storage memory may take the form of the computer-storage media references below and operatively provide storage of computer-readable instructions, data structures, program modules and other data to store and access instructions configured to carry out the various operations disclosed herein. The computer storage memory may include memory devices in the form of volatile and/or nonvolatile memory, removable or non-removable memory, data disks in virtual environments, or a combination thereof. And computer- storage memory may include any quantity of memory associated with or accessible.

Examples of device include, without limitation, random access memory (RAM); read only memory (ROM); electronically erasable programmable read only memory (EEPROM); flash memory or other memory technologies; CDROM, digital versatile disks (DVDs) or other optical or holographic media; magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices; memory wired into an analog computing device; or any other computer memory. The examples disclosed herein may be described in the general context of computer code or machine- or computer-executable instructions, such as program components, being executed by a computer or other machine. Generally, program components include routines, programs, objects, components, data structures, and the like that refer to code, performs particular tasks, or implement particular abstract data types.

Computing device includes a bus that directly or indirectly couples the following devices: computer-storage memory, one or more processors, one or more presentation components, I/O ports, I/O components, a power supply, and a network component. While computing device is depicted as a seemingly single device, multiple computing devices may work together and share the depicted device resources. For example, memory is distributed across multiple devices.

Memory may take the form of the computer-storage memory device referenced below and operatively provide storage of computer-readable instructions, data structures, program modules and other data for the computing device. In some examples, memory stores one or more of an OS, a universal application platform, or other program modules and program data. Memory is thus able to store and access data and instructions that are executable by processor and configured to carry out the various operations disclosed herein. In some examples, memory stores executable computer instructions for an OS and various software applications. The OS may be any OS designed to the control the functionality of the computing device, including, for example but without limitation: WINDOWS® developed by the MICROSOFT CORPORATION®, MAC OS® developed by APPLE, INC.® of Cupertino, Calif., ANDROID™ developed by GOOGLE, INC.® of Mountain View, California, open-source LINUX®, and the like. Memory represents a quantity of computer- storage memory and memory devices that store executable instructions and data for use in hosting, monitoring, and managing the devices.

By way of example and not limitation, computer readable media comprise computer- storage memory devices and communication media. Computer- storage memory devices may include volatile, nonvolatile, removable, non-removable, or other memory implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or the like. Computer- storage memory devices are tangible and mutually exclusive to communication media. Example computer-storage memory devices include hard disks, flash drives, solid state memory, phase change random-access memory (PRAM), static random-access memory (SRAM), dynamic random-access memory (DRAM), other types of random-access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, compact disk read-only memory (CD-ROM), digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that may be used to store information for access by a computing device. In contrast, communication media typically embody computer readable instructions, data structures, program modules, or the like in a modulated data signal such as a carrier wave or other transport mechanism and include any information delivery media.

The computer-executable instructions may be organized into one or more computer-executable components or modules. Generally, program modules include, but are not limited to, routines, programs, objects, components, and data structures that perform particular tasks or implement particular abstract data types. Aspects of the disclosure may be implemented with any number an organization of such components or modules. For example, aspects of the disclosure are not limited to the specific computer-executable instructions or the specific components or modules illustrated in the figures and described herein. Other examples of the disclosure may include different computer-executable instructions or components having more or less functionality than illustrated and described herein. In examples involving a general-purpose computer, aspects of the disclosure transform the general-purpose computer into a special-purpose computing device, MCU, SoC, ASIC, or the like for isolating application operations from system operations.

Processor(s) may include any SoC, MCU, controller, processor, processing unit that perform the various operations stored in the memory. Specifically, processor(s) are programmed to execute computer-executable instructions for implementing aspects of the disclosure.

FIG. 2 illustrates a block diagram of INVIdata technology features, in accordance to one or more embodiment of the present invention. The present invention relates to an Invisible Unicode Programming Technology concept as INVIdata technology wherein INVIos acts as a standalone contemporary OS, or seamlessly integrating as an Addon Operating System. And, INVIfile is a specialized file system to create the barrier between INVIos and current file system (NTFS) for heightened security and data protection. Although the data is converted into INVIdata and stored in INVIos using INVIfile memory management which is an invisible format and zerobyte file size to give the protection against from unauthorized access.

INVIos makes data invisible, non-traceable and non-deletable by establishing a virtual invisible partition, making data both invisible and resistant to tracking or deletion attempts. Furthermore, its utilization of optimized memory management paradigms significantly bolsters system stability and performance, cementing the security and reliability of primary operating systems to unparalleled heights.

The virtual invisible partition is a hidden partition and section of a storage device that is intentionally made inaccessible or "invisible" to the operating system and the user. These partitions are typically created for specific purposes for storing sensitive data that should not be easily accessible. Sensitive data such as encryption keys or personal information may be stored in a hidden partition to prevent unauthorized access. This adds an extra layer of security, especially on devices that may be lost or stolen. Some vendors include proprietary software or tools in a hidden partition for system management, firmware updates, or device-specific configurations. Hidden partitions are typically created during the manufacturing process or by system administrators and are not visible to the user in the operating system's file explorer. However, they can usually be accessed or modified using specialized tools or by booting into a specific recovery mode.

In a preferred embodiment, the creation of virtual invisible partition’s journey commences with INVIos by initiating a Virtual Invisible Partition (VIP) upon its initial deployment on a user's system. This VIP remains untraceable by conventional operating system tools, serving as a concealed enclave for sensitive data. By segregating critical information within this secure partition, INVIos fortifies the defense against unauthorized access and cyber threats.

In a preferred embodiment, the INVIos comprises an INVIclean module, an INVIcrypt module, an INVIlayer module, and INVIshare module. The present invention provides the features of INVIclean, INVIcrypt, INVIlayer, and INVIshare along with robust protocols for guaranteed data invisibility and invincibility for fortifying internal data security frameworks.

In accordance with one aspect of the invention, the INVIclean module is to mitigate the risk of steganography attacks by ensuring that image files do not contain hidden data. The INVIclean module is to protect the system from steganography attacks by cleaning secret information hidden within files, such as images and to ensure that any embedded malicious code or hidden data is thoroughly removed and securely storing it in the Virtual Invisible Partition. This module is applicable to only files where the image is detected. When an image is identified in file, the INVIclean module scans and cleans the file to remove any hidden data. Thus, the INVIclean module plays a pivotal role in thwarting steganography attacks.

In accordance with one aspect of the invention, the the INVIcrypt module obfuscates the data by replacing with invisible characters. It utilizes asymmetric cryptography to secure the data, rendering it inaccessible to unauthorised users. The main purpose is to make the data non-corruptible and non-accessible. The data is converted into a format consisting of invisible characters using a private key to make it undetectable by standard file system and ensuring the integrity of the data against corruption. The INVIcrypt module goes beyond mere encryption; it fortifies files against corruption, making them impervious to unauthorized access or tampering. Through advanced cryptographic techniques, it renders files seemingly empty and worthless to anyone without the correct decryption keys, ensuring that only authorized users can access and decipher the content. This level of protection safeguards the integrity and confidentiality of data, providing robust security against potential threats or breaches

In accordance with one aspect of the invention, INVIlayer module makes the data non-copiable by creating an invisible layer on data, reducing its functional size to zero bytes, and preventing unauthorized copying. The main purpose is to make the data non-copiable. The INVIfile system wraps the data in an INVIlayer and convert it into INVIdata. The INVIlaayer ensures that the file system of the main OS can see the zero-byte size file to hiding its contents. The INVIlayer revolutionizes data security by introducing an invisible zero-byte layer to INVIcrypted file. This ingenious layer not only enhances data integrity and confidentiality but also makes the data non-copyable. By camouflaging the encrypted files as zero-byte size files, the main operating system is deceived into treating them as insignificant, thereby thwarting any attempts at unauthorized copying or replication. This innovative approach ensures that sensitive data remains firmly under wraps, impervious to unauthorized duplication or extraction.

In accordance with one aspect of the invention, INVIshare module is a feature for sharing INVIcrypted the data file to authorized users. Therefore, the data can be transferred to authorized users only. Thereafter, authorized users can decrypt the data file and can access it. The INVIshare module makes zero-byte sharable files using RAR by creating sharable files and allowing secure sharing of invisible data. The Data Sharing is designed for secure sharing of INVIdata via INVIshare incorporated by INVIos. INVIshare enables users to share their protected data with trusted parties without compromising its security. This feature maintains the encrypted and invisible properties of the data, ensuring shared information remains shielded from unauthorized access and tampering.

In accordance with one aspect of the invention, even after intruder or outsider gets access to data file, he cannot access the data file because it is invisible data file. When the file is functionally 0 byte size where the RAM of the computer system cannot access the data file. Therefore, it can only be accessed through particular credentials of Virtual Invisible Partition. So here even after intruder or outsider gets access to key, he cannot get complete message because it is invisible file and in unreadable format.

FIG. 3 illustrates a flow diagram to provide efficient data protection on based of INVIdata technology in accordance with embodiments of the present invention. Firstly, the Virtual Invisible Partition is established, integrated and embedded in the primary operating system for guaranteeing data invisibility, invincibility and integrity. After establishing the Virtual Invisible Partition as an INVIos, the INVIdata technology is ready to work and protect the data from unauthorized access. The INVIfile system is a specialized file system to create the barrier between INVIos and current file system (NTFS) for heightened security and data protection.

The method to convert data into INVIdata for efficient data protection includes the steps of as following. When an image is identified in a file then INVIclean feature is applied to scan and cleans the image data to remove the hidden data. The data file is sanitized to eliminate any concealed threats in terms of images to neutralize any hidden content and to avoid thwarting steganography attacks by INVIclean feature.

Thereafter, the sanitized file is encrypted by replacing visible characters into invisible characters using a private key and ensuring the integrity of the data against corruption to make data inaccessible to unauthorised users. Further, to make the data non-copiable; INVIlayer creates an invisible layer on data and reducing its functional size to zero bytes to prevent unauthorized copying. Lastly, INVIdata is stored in virtual Invisible Partition using INVIfile memory management to make data virtually invisible and impervious to deletion or detection by unauthorized parties.

In accordance with one aspect of the invention, the Advanced Encryption Standard (AES) is a symmetric block cipher that is used to protect classified data. AES-256 encryption uses the 256-bit key length to encrypt as well as decrypt a block of messages. There are 14 rounds of 256-bit keys, with each round consisting of processing steps that entail substitution, transposition, and mixing plaintext to transform it into ciphertext.

FIG. 4 illustrates a flow diagram to retrieve and convert INVIdata into data in accordance with embodiments of the present invention. The method includes steps of retrieving INVIdata back into the main operating system’s partition via INVIfile system. Thereafter, INVIdata is decompiled from INVIlayer by INVIfile system and INVIdata is converted into actual file size to its readable format. And, the data is decrypted using a protected key of Cryptography AES and converted into readable format in real-time manner. Lastly, the actual data is accessible in the main operating system’s file system.

The decryption method comprises major steps comprising of retrieving the INVIdata, decompiling INVIlayer, converting INVIdata into readable format, decrypting the data and accessing the data in the main operating file system.

The above description clearly indicates the manner in which the intended objects are fulfilled. It has multiple novelties such as guarantee of data integrity, high level of security and data unavailability to unauthorized access. The present invention provides the INVIdata technology involves the creation and integration of the embedded virtual Invisible Partition (VIP) as an INVIos with primary operating system for guaranteeing data invisibility, invincibility and integrity.

In accordance with one aspect of the invention, the purpose is a one stop solution for data security where the data is invisible, 0-byte file size, non-accessible, non-copiable, non-corruptible, non-traceable, non-deletable, non-transferable and non-hackable. Also, INVIos technology acts as a standalone contemporary OS, or seamlessly integrating as an Addon Operating System. and the data files converted into an invisible format and zerobyte file size which gives the protection against from unauthorized access. The Virtual Invisible Partition module is to make data invisible, non-traceable and non-deletable by establishing a virtual invisible partition, making data both invisible and resistant to tracking or deletion attempts. Furthermore, its utilization of optimized memory management paradigms significantly bolsters system stability and performance, cementing the security and reliability of primary operating systems to unparalleled heights. It is beneficial to many stakeholders such as Bank and Fintech Companies, Corporate Houses, Defence/Police Department, E-Commerce Companies, Education Sector, Government Department, Healthcare Sectors and Individual Professionals.

The forgoing disclosure is not intended to limit the present disclosure to the precise forms or particular fields of use disclosed. As such, it is contemplated that various alternate embodiments and/ or modifications to the present disclosure, whether explicitly described or implied herein, are possible in light of the disclosure. Having thus described embodiments of the present disclosure, persons of ordinary skill in the art will recognize that changes may be made in form and detail without departing from the scope of the present disclosure. For example, orders of processes described herein may be changed and are not limited to the manner described herein.
,CLAIMS:1. An Invisible Zerobyte Data Technology based on INVIdata technology to provide efficient data protection comprising:
INVIos is an embedded operating system and acts as a standalone contemporary OS, or seamlessly integrating as an Addon Operating System;
INVIfile is a specialized file system to create the barrier between INVIos and current file system (NTFS) for heightened security and data protection;
wherein the data is converted into INVIdata and stored in INVIos using INVIfile memory management which is an invisible format and functionally zerobyte file size to give the protection against from unauthorized access.

2. The Invisible Zerobyte Data Technology based on INVIdata technology to provide efficient data protection as claimed in claim 1; wherein embedded INVIos is a Virtual Invisible Partition on the hard disk which is established, integrated and embedded in the primary operating system for guaranteeing data invisibility, invincibility and integrity.

3. The Invisible Zerobyte Data Technology based on INVIdata technology to provide efficient data protection as claimed in claim 1; wherein INVIfile system includes an INVIclean, an INVIcrypt, an INVIlayer, and an INVIshare modules for handling data conversion, INVIdata storage and data retrieval.

4. The Invisible Zerobyte Data Technology based on INVIdata technology to provide efficient data protection as claimed in claim 3;
wherein the INVIclean module meticulously scans and sanitizes by eliminating any concealed threats in terms of images to neutralize any hidden content and to avoid thwarting steganography attacks;
the INVIcrypt module encrypts the sanitized data content by replacing visible characters into invisible characters using a private key and ensuring the integrity of the data against corruption to make data inaccessible to unauthorised users;
INVIlayer module makes the data non-copiable by creating an invisible layer on data and reduces its functional size to zero bytes for preventing unauthorized copying; and
INVIshare module makes zero-byte sharable files using RAR by creating sharable files to authorized users and allowing secure sharing of invisible data.

5. The Invisible Zerobyte Data Technology based on INVIdata technology to provide efficient data protection as claimed in claim 1; wherein the INVIdata is invisible, functionally 0-byte file size, non-accessible, non-copiable, non-corruptible, non-traceable, non-deletable, non-transferable and non-hackable.

6. The Invisible Zerobyte Data Technology based on INVIdata technology to provide efficient data protection as claimed in claim 1; wherein the system is designed for Windows OS, and with respective file systems for MAC OS and Linux OS.

7. A method to provide efficient data protection by INVIdata technology, the method comprising the steps of:
scanning and sanitizing the data files to eliminate any concealed threats in terms of images to neutralize any hidden content and to avoid thwarting steganography attacks by INVIclean feature;
encrypting the sanitized data content by replacing visible characters into invisible characters using a private key and ensuring the integrity of the data against corruption to make data inaccessible to unauthorised users;
making the data non-copiable by creating an invisible layer on data and reducing its functional size to zero bytes to prevent unauthorized copying; and
transferring the INVIdata and storing in INVIos using INVIfile system to make data virtually invisible and impervious to deletion or detection by unauthorized parties.
8. A method to retrieve and convert INVIdata into data, the method comprising the steps of:
Retrieving INVIdata back into the main operating system’s partition via INVIfile system;
Decompiling INVIlayer and covert the data into actual file size to its readable format;
Decrypting the data using a protected key and converting the data back into readable format in real-time manner;
Accessing actual data in the main operating system’s file system.

9. The method as claimed in claims 7 and 8; wherein INVIdata technology provides seamless integration within INVIfile system to secure sharing capabilities of INVIshare with authorised users within encrypted and invisible properties of INVIdata.

Documents

Application Documents

# Name Date
1 202321046843-PROVISIONAL SPECIFICATION [12-07-2023(online)].pdf 2023-07-12
2 202321046843-POWER OF AUTHORITY [12-07-2023(online)].pdf 2023-07-12
3 202321046843-FORM FOR STARTUP [12-07-2023(online)].pdf 2023-07-12
4 202321046843-FORM FOR SMALL ENTITY(FORM-28) [12-07-2023(online)].pdf 2023-07-12
5 202321046843-FORM 1 [12-07-2023(online)].pdf 2023-07-12
6 202321046843-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [12-07-2023(online)].pdf 2023-07-12
7 202321046843-EVIDENCE FOR REGISTRATION UNDER SSI [12-07-2023(online)].pdf 2023-07-12
8 202321046843-STARTUP [13-06-2024(online)].pdf 2024-06-13
9 202321046843-Response to office action [13-06-2024(online)].pdf 2024-06-13
10 202321046843-Proof of Right [13-06-2024(online)].pdf 2024-06-13
11 202321046843-FORM28 [13-06-2024(online)].pdf 2024-06-13
12 202321046843-FORM-9 [13-06-2024(online)].pdf 2024-06-13
13 202321046843-FORM 3 [13-06-2024(online)].pdf 2024-06-13
14 202321046843-FORM 18A [13-06-2024(online)].pdf 2024-06-13
15 202321046843-ENDORSEMENT BY INVENTORS [13-06-2024(online)].pdf 2024-06-13
16 202321046843-DRAWING [13-06-2024(online)].pdf 2024-06-13
17 202321046843-COMPLETE SPECIFICATION [13-06-2024(online)].pdf 2024-06-13
18 202321046843-POA [03-07-2024(online)].pdf 2024-07-03
19 202321046843-FORM 13 [03-07-2024(online)].pdf 2024-07-03
20 202321046843-AMMENDED DOCUMENTS [03-07-2024(online)].pdf 2024-07-03
21 202321046843-Power of Attorney [04-07-2024(online)].pdf 2024-07-04
22 202321046843-FORM28 [04-07-2024(online)].pdf 2024-07-04
23 202321046843-Form 1 (Submitted on date of filing) [04-07-2024(online)].pdf 2024-07-04
24 202321046843-Covering Letter [04-07-2024(online)].pdf 2024-07-04
25 Abstract1.jpg 2024-07-11
26 202321046843-Correspondence-Letter [10-08-2024(online)].pdf 2024-08-10
27 202321046843-FER.pdf 2024-09-20
28 202321046843-FORM 3 [07-11-2024(online)].pdf 2024-11-07
29 202321046843-RELEVANT DOCUMENTS [04-12-2024(online)].pdf 2024-12-04
30 202321046843-POA [04-12-2024(online)].pdf 2024-12-04
31 202321046843-PETITION UNDER RULE 137 [04-12-2024(online)].pdf 2024-12-04
32 202321046843-MARKED COPIES OF AMENDEMENTS [04-12-2024(online)].pdf 2024-12-04
33 202321046843-FORM 13 [04-12-2024(online)].pdf 2024-12-04
34 202321046843-FER_SER_REPLY [04-12-2024(online)].pdf 2024-12-04
35 202321046843-DRAWING [04-12-2024(online)].pdf 2024-12-04
36 202321046843-COMPLETE SPECIFICATION [04-12-2024(online)].pdf 2024-12-04
37 202321046843-CLAIMS [04-12-2024(online)].pdf 2024-12-04
38 202321046843-AMMENDED DOCUMENTS [04-12-2024(online)].pdf 2024-12-04
39 202321046843-US(14)-HearingNotice-(HearingDate-28-08-2025).pdf 2025-08-07
40 202321046843-Correspondence to notify the Controller [25-08-2025(online)].pdf 2025-08-25
41 202321046843-Response to office action [01-09-2025(online)].pdf 2025-09-01

Search Strategy

1 SearchHistory-202321046843E_03-09-2024.pdf

ERegister / Renewals