Abstract: Data security is an important task in our life. GPS device is the best application for data security. Most of the computer users, mostly use data in electronic format. An important question arises here is how to provide a security for data. In this paper, we propose a Location Based Data Security System to secure data by applying Encryption-Algorithm and coordinate by using GPS device. Encryption means of efficient secure integer comparison. • Using the encryption technology the location of data decryption cannot be restricted. In order to meet the demand of a location-dependent approach, location-dependent data encryption algorithm is needed. A target latitude/longitude coordinate is determined first and the coordinate is incorporated with a random key for data encryption. • The receiver can only decrypt the ciphertext when the coordinate acquired from GPS receiver is matched with the target co-ordinate. GPS-based encryption is an innovative technique that uses GPS-technology to encode location information into the encryption keys to provide location-based security. GPS based encryption adds another layer of security on top of existing encryption methods by restricting the decryption of a message to a particular location. • Our experimental results not only validate the effectiveness of our scheme but also demonstrate that the proposed integer comparison scheme performs better than previous bitwise comparison scheme.
FORM 2
THE PATENT ACT 1970
(39 OF 1970)
&
The Patents Rules, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
1. TITLE OF THE-: INVENTION- DATA SECURITY FENCING ALGORITHM THROUGH GEO-LOCATION APPROACH
2. APPLICANT(S)
(a) NAME: SANJEEV KUMAR,SURAJ'BALWANI, ARCHANA MAGARE
(b) NATIONALITY: INDIAN
(c). ADDRESS: ITM UNIVERSE, VADODARA-391510, GUJARAT, INDIA
3. PREAMBLE TO TEE DESCRIPTION
COMPLETE
i
The following specification particularly describes the invention and the manner in which is to be performed.
4 DESCRIPTION (Description shall start from next page) .
ANNEXTUEE-I
5. CLAIMS (not. applicable for provisional. specification. Claims should start with the preamble - "I/We claim' on separate page)
ANNEXTURE-II
6. DATE AND SIGNATURE (To be given at the end of last page of specification)
7. ABSTRACT OF- THE INVENTION (to be given with complete specification on separate page)
Annexure I
Number of Description Pages: 8
Title: Data Security Fencing Algorithm Through Geo-Location Approach
Inventor: Sanjeev Kumar, Suraj Balwani, Archana Magare
Title of Invention: Data Security Fencing Algorithm Through Geo-Location Approach
1. Title of Invention:
Data Security Fencing Algorithm Through Geo-Location Approach
2. Field Of Invention
Implementation of Security feature through Geo-location i.e encryption your files or messages based on the location you are present. The aim is to provide advance safety feature technically more effective than the traditional way of security apart of passwords and two step verification technique.
3. Background of invention with regard to the drawback associated with known art
As per the traditional way of providing security feature by using password methods are becoming . absolute today. Most of the organization spend millions of dollar to make there system secure from getting attacked by cybercriminals. After spending this much huge amount organization still end up getting hacked and loosing valuable data. According to our survey almost all big companies getting attacked every single day which are not get media coverage as it would harm there potential clients. Our approach is to provide the security in such a way that it will be impossible for cybercriminals to break into organizations. We are providing the advance way for securing there data by there geographical locations.
4. Objective of Invention
Geo Encryption uses the global positioning system(GPS).The main aim is to develop the geo-location based encryption technique will encrypt the the message on the basis of the location of the user, unlike the traditional way where the passwords are used , this method will use latitude and longitude to encrypt and decrypt the message for the user making it more secure. It will be impossible to break the encryption using the traditional mean therefore providing more security to the user.
5. Statement of invention
The data security plays the major role for any organization. With the growth of internet the amount of data that is been generated is huge. This data can be further manipulated by the organization by using tools of analytics to expand the business. So, the protection of this sensitive data is uttermost important. the traditional way is to use the passwords that can protect from unauthorized access. But passwords are crackable. Our goal is to make this technique useful so that it can be applied to transfer high confidential data that can be used in variety of fields such as military .server rooms, and by big organizations. Our major approach is to encrypt the highly confidential message or
information in such a way that the specified user will be able to decrypt the message at a particular location & time.
6. A summary of invention
• The main aim is to provide the better security for transferring the confidential information and to reduce the effort with encryption technology compared to traditional password based technique.
• The wide variety of encryption methods are available. Encryption algorithm require the key and we will provide the key as GPS location.
• The key we will be using
GPS coordinates along with latitude and longitude. The length of the key can be manipulated.
7. A brief description of the accompanying diagram
The working of relation is illustrated with the help of diagram. The message that the user want to encrypt can be of any length depending on the platform on which it is implemented. The geo-location will be fetched with the help of the GPS module that is provided in most of the modern manufacturers in there devices.
The geo-graphical location is based on the coordinates which are unique. These coordinate consist of two parts that is latitude and longitude, it will act as the key for the encryption process. This key will be combined with the message that user want to encrypt. As the coordinates can be changed with the slightest moment of the device these coordinates needs to be locked to avoid frequent coordinate changes.
Once the coordinate get locked the process for encryption will be trigged .For encryption we have use the caesar cipher algorithm for encrypting our message. The implementation can be done by using other advance encryption methods but for our project we have used Caesar cipher. The algorithm will take upto 4 decimal numbers from the latitude and other 4 decimal number from longitude which will be combined with the plain text. When the coordinates get combined with plaintext the key will be obtained which will be based on your Geo-location.
we have implemented the decryption which will decrypt ony if the device will be in range which means even if the user is not as in exact location he need to me in range of 30m from the coordinates to trigger the decryption process. The value of the range can be changed as per the devices and as per the requirement of the user. Without knowing the coordinates it is impossible to decipher the encrypted message. Any kind of cyberattack is almost impossible to crack into system because knowing the coordinates are impossible . Even in brute force attack the total number of combinations for geo-locations are practically impossible crack the ciphertext.
8. Encryption Algorithm
Step 1: Start
Step 2: The device will initiate geo-coordinates with the help of GPS module that will fetch the location.
Upto 4 decimal digits are taken that will be added with plan text. That will generate the unique value which will be our key for encryption.
STEP 4: The key that is generated is very unique and it will be impossible to guess it by any hacking mean for example brute force technique.
9. Decryption Algorithm
STEP 1: The decryption algorithm checks two conditions
• Your geo~coordinates.
• Or you should be within 30m of range from the location .
STEP 2: Once one of the above criteria is satisfied the decryption algorithm will fetch the KEY, from the device BUFFER memory and decryption will be done.
Annexure II Claims:
We claim,
Claim l.A(l)30m data security based on the algorithm.
Justification:Brute Force Technique
Brute force is the hacking technique that enable the hacker to get access to any confidential information that is not supposed to be shared. Generally the working of brute force attack is done by trial and hit method. In this the unauthorized user will apply all the permutation and combinations for generating the key/password until he/she get correct key to enter the system. This technique may take days/months or sometimes years to crack the system security depending upon how strong your password is.
• In our project, we have claimed that brute force attack is not possible. The reasons is that a successful brute force attack will give you the remote access but to crack our system the cracking of key is not sufficient you need to be within the range i.e 30m . There is no way to find the range for the hacker.
• Secondly, we are using geographical locations that contain upto 7 floating values. These values are keep on changing with the slight movement of the device. In case of brute force attack the number of combinations that lies within 30m are exponentially-high. Moreover the concept of range that we have implemented makes the attempt useless as the remote access is not possible and there is no way to find the range.
(2) Hybrid approach for generating ciphertext through geo-location. Justification :
Differential Frequency Attack (DFA)
DFA is an attack that is performed on an Application Specific Integrated Circuit (ASIC) implementation of the Advanced Encryption Standard (AES) algorithm using a Side-channel Attack
Standard Evaluation Board (SASEBO-R). SASEBO-R is a circuit board that contains an ASIC cryptographic device and which was specifically designed with features to perform DPA attacks.
DFA attacks steals the cryptic-key that can be later used to exploit the application. As, in our project stealing the cryptic-key won't be sufficient. The hacker need to be in range in order to get access by using the crypt-key. As most of the server rooms are highly secured with latest technologies and placed in cold areas. It is unlikely that after implementing the concept that we have used , hacking into the system by any mean would be very difficult
Annexure I
Number of Description Pages: 8
Title: Data Security Fencing Algorithm Through Geo-Location Approach
Inventor: Sanjeev Kumar, Suraj Balwani, Archana Magare
1. Title of Invention:
Data Security Fencing Algorithm Through Geo-Location Approach
2. Field Of Invention
Implementation of Security feature through Geo-location i.e encryption your files or messages based on the location you are present. The aim is to provide advance safety feature technically more effective than the traditional way of security apart of passwords and two step verification technique.
3. Background of invention with regard to the drawback associated with known art
As per the traditional way of providing security feature by using password methods are becoming absolute today. Most of the organization spend millions of dollar to make there system secure from getting attacked by cybercriminals. After spending this much huge amount organization still end up getting hacked and loosing valuable data. According to our survey almost all big companies getting attacked every single day which are not get media coverage as it would harm there potential clients. Our approach is to provide the security in such a way that it will be impossible for cybercriminals to break into organizations. We are providing the advance way for securing there data by there geographical locations.
4. Objective of Invention
Geo Encryption uses the global positioning system(GPS).The main aim is to develop the geo-location based encryption technique will encrypt the the message on the basis of the location of the user, unlike the traditional way where the passwords are used, this method will use latitude and longitude to encrypt and decrypt the message for the user making it more secure. It will be impossible to break the encryption using the traditional mean therefore providing more security to the user.
5. Statement of invention
The data security plays the major role for any organization. With the growth of internet the amount of data that is been generated is huge. This data can be further manipulated by the organization by using tools of analytics to expand the business. So, the protection of this sensitive data is uttermost important. the traditional way is to use the passwords that can protect from unauthorized access. But passwords are crackable. Our goal is to make this technique useful so that it can be applied to transfer high confidential data that can be used in variety of fields such as military ,server rooms, and by big organizations. Our major approach is to encrypt the highly confidential message or
information in such a way that the specified user will be able to decrypt the message at a particular location &time.
6. A summary of invention
• The main aim is to provide the better security for transferring the confidential information and to reduce the effort with encryption technology compared to traditional password based technique.
• The wide variety of encryption methods are available. Encryption algorithm require the key and we will provide the key as GPS location.
• The key we will be using
GPS coordinates along with latitude and longitude. The length of the key can be manipulated.
7. A brief description of the accompanying diagram
The working of relation is illustrated with the help of diagram. The message that the user want to encrypt can be of any length depending on the platform on which it is implemented. The geo-location will be fetched with the help of the GPS module that is provided in most of the modern manufacturers in there devices.
The geo-graphical location is based on the coordinates which are unique. These coordinate consist of two parts that is latitude and longitude /it will act as the key for the encryption process. This key will be combined with the message that user want to encrypt. As the coordinates can be changed with the slightest moment of the device these coordinates needs to be locked to avoid frequent coordinate changes.
Once the coordinate get locked the process for encryption will be trigged .For encryption we have use the caesar cipher algorithm for encrypting our message. The implementation can be done by using other advance encryption methods but for our project we have used Caesar cipher. The algorithm will take upto 4 decimal numbers from the latitude and other 4 decimal number from longitude which will be combined with the plain text. When the coordinates get combined with plaintext the key will be obtained which will be based on your Geo-location.
we have implemented the decryption which will decrypt ony if the device will be in range which means even if the user is not as in exact location he need to me in range of 30m from the coordinates to trigger the decryption process. The value of the range can be changed as per the devices and as per the requirement of the user. Without knowing the coordinates it is impossible to decipher the encrypted message. Any kind of cyberattack is almost impossible to crack into system because knowing the coordinates are impossible . Even in brute force attack the total number of combinations for geo-locations are practically impossible crack the ciphertext.
8. Encryption Algorithm
Step 1: Start
Step 2: The device will initiate geo-coordinates with the help of GPS module that will fetch the location.
Upto 4 decimal digits are taken that will be added with plan text That will generate the unique value which will be our key for encryption.
STEP 4: The key that is generated is very unique and it will be impossible to guess it by any hacking mean for example brute force technique.
9. Decryption Algorithm
STEP 1: The decryption algorithm checks two conditions
• Your geo-coordinates. . • Or you should be within 30m of range from the location .
STEP 2: Once one of the above criteria is satisfied the decryption algorithm will/fetch the KEY, from the device BUFFER memory and decryption will be done.
10. Brute Force Technique
Brute force is the hacking technique that enable the hacker to get access to any confidential information that is not supposed to be shared. Generally the working of brute force attack is done by trial and hit method. In this the unauthorized user will apply all the permutation and combinations for generating the key/password until he/she get correct key to enter the system. This technique may take days/months or sometimes years to crack the system security depending upon how strong your password is.
• In our project, we have claimed that brute force attack is not possible. The reasons is that a successful brute force attack will give you the remote access but to crack our system the cracking of key is not sufficient you need to be within the range i.e 30m .There is no way to find the range for the hacker.
• Secondly, we are using geographical locations that contain upto 7 floating values. These values are keep on changing with the slight movement of the device. In case of brute force attack the number of combinations that lies within 30m are exponentially high. Moreover the concept of range that we have implemented makes the attempt useless as the remote access is not possible and there is no way to find the range.
11.Differential Frequency Attack (DFA)
DFA is an attack that is performed on an Application Specific Integrated Circuit (ASIC) implementation of the Advanced Encryption Standard (AES) algorithm using a Side-channel Attack ■ Standard Evaluation Board (SASEBO-R). SASEBO-R is a circuit board that contains an ASIC
cryptographic device and which was specifically designed with features to perform DPA attacks.
DFA attacks steals the cryptic-key that can be later used to exploit the application. As, in our project stealing the cryptic-key won't be sufficient. The hacker need to be in range in order to get access by using the crypt-key. As most of the server rooms are highly secured with latest technologies and placed in cold areas. It is unlikely that after implementing the concept that we have used , hacking into the system by any mean would be very difficult.
12.Claim(s)
We claim,
Claim 1.A(1)30m data security based on the algorithm. (2) Hybrid approach for generating ciphertext through geo-location.
| # | Name | Date |
|---|---|---|
| 1 | 202021034388-Form 1-110820.pdf | 2020-08-17 |
| 1 | 202021034388-Other Patent Document-110820.pdf | 2020-08-17 |
| 2 | 202021034388-Form 2(Title Page)-110820.pdf | 2020-08-17 |
| 2 | 202021034388-Form 5-110820.pdf | 2020-08-17 |
| 3 | 202021034388-Form 3-110820.pdf | 2020-08-17 |
| 4 | 202021034388-Form 2(Title Page)-110820.pdf | 2020-08-17 |
| 4 | 202021034388-Form 5-110820.pdf | 2020-08-17 |
| 5 | 202021034388-Form 1-110820.pdf | 2020-08-17 |
| 5 | 202021034388-Other Patent Document-110820.pdf | 2020-08-17 |