Position Sensitive Key and Lock
This Position Sensitive Key and Lock system is a method to apply secure protection locking and unlocking of a Device such as computer devices, computer software, digital music, digital video, information and physical objects, structures or containers using an absolute position determined by all terrestrial or outer space coordinate location systems.
The Position Sensitive Key and Lock system utilises a secure Lock and Key principle with invention's Key Creator computer software program, invention's Secure Locking computer software program and Secure Unlocking computer software program.
The Position Sensitive Key and Lock system determines the numeric reference of the latitude, longitude and ellipsoid /altitude position of a Device and encrypts, using cryptography, that numeric reference into a cipher key, software key or coded mechanical recognition system to create a high security code Secure Key.
The Position Sensitive Key and Lock system uses the unique identity of the cryptography code embedded within the Secure Key to encrypt (lock) or decrypt (unlock) computer software, information and locks on physical objects, structures or containers if the Device is in the correct latitude, longitude and ellipsoid /altitude position
If the Device is stolen the Position Sensitive Key and Lock system will provide information on the whereabouts of the stolen Device.
The invention utilises Earth or Outer Space position location systems such as Global Positioning System (GPS), radio, radio beacon, microwave, laser, magnetic, gyroscope, celestial or any method or device that will provide a latitude, longitude and ellipsoid/ altitude accurate location. The latitude, longitude and ellipsoid /altitude position can also be 3-D Cartesian X Y Z accurate location, Geographical Information Systems (GIS), and by the UK's National Grid Reference system or any other position determining system. The invention will also use the three dimensional location systems for determining accurate positions in Outer Space outside the normal Earth positioning systems.
An absolute position of the latitude, longitude and ellipsoid/ altitude is determined for the location of a Device.
The description of a 'Device' is either a computer, a mobile telephone, any appliance that contain a Central Processing Unit (CPU) or microprocessor chip, Subscriber Identity Module - Mobile Equipment (SIM Card), Smart Card, Hand held computers, Palm Top computers, Box with a CPU in their inventions positional system lock, Containers with a CPU in their positional system lock, Containers on Road, Rail, Air, Sea or Space with a CPU in their positional system lock, Safes and Vaults with a CPU in their positional system lock, all doors, gates and exits and entrance mechanisms with a CPU in their positional system lock.
That location can be a local latitude, longitude and ellipsoid /altitude position or a remote latitude, longitude and ellipsoid /altitude position.
With the Position Sensitive Key and Lock device's Central Control Unit obtaining a latitude, longitude and ellipsoid/ altitude position of a Device from a remote position the master program communicates with the remote device and confirms its current position. That Central Control Unit will then create the Secure Key. The Secure Key can be used remotely or transmitted or delivered to the local Device
With the use of the Position Sensitive Key and Lock device for secure delivery or collection of products in a Container it may be several or many latitude, longitude and ellipsoid /altitude positions that are logged and embedded within the Container CPU to enable that Container to be opened or closed securely when it is has travelled to and/ or located at those proposed delivery positions.
The invention's Key Creator software applies an encryption code of the latitude, longitude and ellipsoid /altitude position to produce a Secure Key utilising cryptography and security systems such as those listed in Appendix 1 of this document or other cryptography systems. The Secure Key is encrypted to ensure that the latitude, longitude and ellipsoid/ altitude position is hidden within that encryption code and only the inventions Secure Unlocking computer software can access the hidden code.
To lock and protect a computer program, software, information or container held within a Device the Secure Locking computer software program examines the Secure Key utilising the invention's decryption technique and then checks that the Device is in the correct latitude, longitude and ellipsoid/altitude position. If it is located correctly then the Secure Locking computer software program encrypts the computer program, software or information held within that Device using the Position Sensitive Key and Lock cryptography secure wrapping technique. This wrapping technology is called the 'Secure Wrap'. Any information, computer program, or locked information is securely protected by this Secure Wrap encryption process and access is only gained whilst the Secure Key is within the Device and that Device is in the correct latitude, longitude and ellipsoid /altitude position. If an attempt is made to use the Secure Wrapped information or computer program at a different location or on an un-licensed Device the cryptography used within the Secure Wrap will not allow the contents to be used or examined.
If a person or mechanism is required to use or look at a computer program, software or information held within a Device, then the Secure Unlocking computer software program is activated. This Secure Unlocking computer software program examines the latitude, longitude and ellipsoid /altitude position through the Device's Earth or Outer Space position location system and if this is verified as correct by the Secure Unlocking computer software when it examines the Secure Key the computer program, software or information is unlocked and could be used by the person or a mechanism requiring access. The unlocked computer program, software or information is still held in cryptography format whilst it is in the unlock useable or readable format so that in the event of the information being stolen or transferred to another device it cannot be accessed.
Remote vendors or providers who provide computer programs, software or information, and utilise the invention, would receive a request from a user or client to be provided with a computer program, software or information. The invention's software held within the vendors or providers Computer Device, termed Central Control Unit, at the vendors or providers location can examine remotely the clients Earth or Outer Space position location system to determine that client's Device's accurate latitude, longitude and ellipsoid /altitude position. It is then possible for the vendors or provider's Device to utilise the inventions Secure Locking program and create a Secure Key for their client and to encrypt the computer programs, software or
information with Secure Wrap. It then transmits that Secure Wrapped computer program, software or information plus the Secure Key to the client's Device. Alternatively the vendors or providers Computer Device could have the client's Secure Key transmitted to the vendors or providers Computer Device and the vendors or providers Computer Device would utilise the inventions Secure Locking computer software program to encrypt the computer program, software or information and carry out a Secure Wrap of that software or information. That Securely Wrapped software or information would be transmitted or sent to the Client.
When the client wishes to use the provided computer program, software or information the Position Sensitive Key and Lock's Secure Unlocking computer software program would examine the Secure Key, obtain the encrypted code, decrypt that code and verify that the encrypted location is the same as the latitude, longitude and ellipsoid /altitude position through the client's Device's Earth or Outer Space position location system. If verified as correct by the Secure Unlocking computer software the computer program, software or information would be unlocked and could be used or read by that client.
If the user's Device is moved to a different latitude, longitude and ellipsoid /altitude position the computer programs, software or information that were previously accessible from the original position could not now be accessed. The inventions Position Sensitive Key and Lock program would access the new latitude, longitude and ellipsoid/ altitude position and inform the inventions Control Centre Device of the new position and inform the client of that new position. This is important information in the event that the Device is stolen. In the event of the Device's Earth or Outer Space position location system being disconnected but the Device transmits any message to the internet the invention's Position Sensitive Key and Lock program sends a message covertly to the inventions Control Centre Device providing detailed information of the new URL ( Uniform Resource Locator - an address) or email address of the user's Device enabling the owner to trace the location of their Device through the ISP (Information Service Provider). This feature of the invention's software is that the low level computer program used by the Position Sensitive Key and Lock program is not visible to the Task Manager file on the Computer Device and cannot be seen in the Applications or Processes section of the Task Manager. This low level file is known as a Stealth File and is activated at predetermined time intervals and when the Device is turned on. The Stealth Program confirms that latitude, longitude and ellipsoid/ altitude position is correct in accordance with Secure Key embedded algorithms and
that the Device still has the position of the latitude, longitude and ellipsoid /altitude equipment connected to it and functioning. If the Stealth Program cannot confirm either of these facts when the devices is next connected to the internet it initiates an executable low level instruction file that will inform the Control Centre Device of the IP or other address of the Device and the IP address or other address that the Device is transmitting to. This information will be used to identify the location of a stolen Device or a user's identity who is using the Devices illegally.
The Position Sensitive Key and Lock program would also link to Mechanical Devices such as locks on lorries, vans, containers, safes, vaults, cash register draw, any container whether static or moveable. Position Sensitive Key and Lock program is embedded within the CPU mechanism inside the mechanical lock. The Position Sensitive Key and Lock program unlock key can be held on an exterior device that can be inserted into the Position Sensitive Key and Lock. It can he placed on or nearby to the Position Sensitive Key and Lock and transmitted to the lock.
If a person or a mechanism wishes to unlock the mechanism then the Secure Unlocking computer software program is activated. This Secure Unlocking computer software program examines the latitude, longitude and ellipsoid /altitude; position through the Device's Earth or Outer Space position location system and if this is verified as correct by the Secure Unlocking computer software when it examines the Secure Key the mechanism is unlocked and access made to the Mechanical Device on or within the container.
The Position Sensitive Key and Lock program would link into navigational and tracking systems located within a vehicle, plane, train, ship or any other system that transports, humans, animals or product and could he programmed to open or close a mechanical lock by the use of Position Sensitive Key and Lock software integrated within those transport systems when they arrive at a specific latitude, longitude and ellipsoid/ altitude position. In certain aaplications when a Container is moved from its latitude, longitude and ellipsoid/ altitude position it will automaticall be locked for security.
With portable devices such as palm top, notebook and laptop computers the Secure Key is issued with a Time License if required. This Time License will allow the portable device to unlock software, information or mechanical locks connected or on
that portable device for certain periods of time whilst that Device is away from its normal latitude, longitude and ellipsoid /altitude position. The period of time is determined by the vendor and client and can be periods of 1 day, 7 day or any contracted period of time. After the expiry of that Time License the Secure Key will not be able to unlock the Position Sensitive Key and Lock. When the portable, device returns to its normal base station the portable device will confirm the latitude, longitude and ellipsoid /altitude position and renew the Time License for contracted period of time agreed by the vendor and client.
The Secure Locking program can create a Secure Key coded with a mechanical recognition system where a Physical Key can be created with mechanical features. These mechanical features relate to embedded code which can he decrypted to relate to the latitude, longitude and ellipsoid /altitude positions of the Device or Mechanical Device to allow locking and unlocking of Computer Information or allow locking and unlocking of a Mechanical Device. The method of creating a Mechanical Lock Device could utilise embedded latitude, longitude and ellipsoid /altitude position coded shapes on a Mortice Key, Cylinder Rim Lock, High Security Multi-Point Locking System, Punched Card, Magnetic Card, Smart SIM Card or any other Mechanical Device including those devices emitting a frequency of Light or Radio.
With secure delivery and collection systems the user could transmit securely many delivery and collection latitude, longitude and ellipsoid /altitude positions to the Mechanical Position Lock and when that vehicle, plane, train, ship, container or any other transport system arrives at those positions the Mechanical Position Lock system allows the lock to be opened.
With certain applications the company providing the delivery and collection service the inventions system can inform that Company of the latitude, longitude and ellipsoid /altitude locations of its transport, the time the Mechanical Position Lock was unlocked and when it was locked up again. If the transport vehicle was locked or unlocked at the incorrect latitude, longitude and ellipsoid /altitude locations then the inventions system could notify the Company of this action.
When the transport company wishes to inform one of its transport vehicles to collect or deliver to a new latitude, longitude and ellipsoid /altitude location then that Company's Computer Devices Secure Locking computer software program would
create a Secure Key. The Secure Key would be transmitted to the transport vehicles tracking system or to the driver's mobile telephone system. A device such as a connector from the mobile telephone to a USB Subscriber Identity Module (SIM Card) connector would send the Secure Key to the microprocessor in the SIM card. When the transport vehicle driver arrives at the new latitude, longitude and ellipsoid /altitude location he/she inserts the USB connector into the port/slot located on the Mechanical Position Lock. The SIM card transmits the Secure Key to the Mechanical Position Lock and the Secure Unlocking computer software inside the CPU within the Mechanical Position Lock can access the hidden latitude, longitude and ellipsoid /altitude location within the Secure Key, confirm that the position is correct and then unlock the container.