Afrikaans: Afrikaans | Albanian: shqiptare | Amharic: አማርኛ | Arabic: عربي | Armenian: հայերեն | Assamese: অসমীয়া | Azerbaijani: Azərbaycan | Basque: euskara | Belarusian: беларускі | Bosnian: bosanski | Bulgarian: български | Burmese: မြန်မာ | Catalan: català | Cebuano: Cebuano | Chinese (Simplified): 简体中文 | Chinese (Traditional):中國傳統的 | Corsican: Corsu | Croatian: Hrvatski | Czech: čeština | Danish: dansk | Dutch: Nederlands | Esperanto: Esperanto | Estonian: eesti keel | Filipino: Filipino | Finnish: Suomalainen | French: Français | Galician: galego | Georgian: galego; | German: Deutsch | Greek: Ελληνικά | Gujarati: ગુજરાતી | Haitian Creole: Kreyòl ayisyen | Hausa: Hausa | Hawaiian: ʻŌlelo Hawaiʻ | Hebrew: עִברִית | Hindi: हिंदी | Hmong: Hmoob | Hungarian: Magyar | Icelandic: íslenskur | Igbo: Igbo | Indonesian: bahasa Indonesia | Irish: Gaeilge | Italian: Italian | Japanese: 日本 | Javanese: basa jawa | Kannada: ಕನ್ನಡ | Kazakh: қазақ | Khmer: ខ្មែរ | Kinyarwanda: Kinyarwanda | Korean: 한국인 | Kurdish: Kurdî | Kyrgyz: Кыргызча | Lao: ພາສາລາວ | Latin: Latinus | Latvian: latviski | Lithuanian: lietuvių | Luxembourgish: lëtzebuergesch | Macedonian: македонски | Malagasy: Malagasy | Malay: Melayu | Malayalam: മലയാളം | Maltese: Malti | Marathi: मराठी | Mongolian: Монгол | Nepali: नेपाली | Norwegian: norsk | Odia: ଓଡିଆ | Pashto: پښتو | Persian: فارسی | Polish: Polski | Portuguese: Português | Punjabi: ਪੰਜਾਬੀ | Romanian: Română | Russian: Русский | Samoan: Samoa | Scottish Gaelic: Gàidhlig na h-Alba | Serbian: Српски | Shona: Shona | Sindhi: سنڌي | Sinhala: සිංහල | Slovak: slovenský | Slovenian: Slovenščina | Somali: Soomaali | Spanish: Español | Sundanese: basa Sunda | Swahili: kiswahili | Swedish: svenska | Tajik: тоҷикӣ | Tamil: தமிழ் | Tatar: Татар | Telugu: తెలుగు | Thai: แบบไทย | Turkish: Türkçe | Turkmen: Türkmenler | Ukrainian: українська | Urdu: اردو | Uyghur: ئۇيغۇر | Uzbek: o'zbek | Vietnamese: Tiếng Việt | Welsh: Cymraeg | West Frisian: Westfrysk | Xhosa: isiXhosa | Yiddish: יידיש | Yoruba: Yoruba | Zulu: Zulu |
☆☆☆☆☆☆☆☆☆ NAVIGATION OF CONTENTS ☆☆☆☆☆☆☆☆☆

Professional History

Linked-in Profile

INVENTION TITLE: "The Cloud OS - Operating System"


  
The Cloud OS - Operating System Invention
was submitted on October 02 2021 to the World Intellectual Property Organization WIPO with the International Patent #: PCT/IB2021/000683. The Cloud OS Company will be open in Southern California. The Company is currently waiting for final certification and the resources before announcing the official physical location.

  The Cloud OS - Operating System is designed with State-of-the-Art with nice Look & Feel and data secured in mind to prevent hacking, and secure data with the new 3D e-Web (Electronic Spider Web) with the new Neighbor-to-Neighbor Routing/Networking technology, and intended to replace all the existing Computing Operating Systems like Windows Operating System, Mac Operating System, Linux Operating System, etc... with more user friendly. The Cloud OS will run in Cloud OS server machines which composed of million and million of machines and will divide into topology groups like Data Center currently, but with no keyboards, no mouses and no monitors to prevent hacking right at the network topology sites. The data at topology sites will beam back and forth to Starlink satellites to for internet communication from one topology site to another site and from one country to another. The Cloud OS will have the Cloud OS Engate Service Container which will be always available where ever has signal coverage for the user to engate into the Cloud OS at first stage of login or first authentication service. The Cloud OS Engate Service Container, which will be the same everywhere, will be the container of the first service that lead the user to the Cloud OS world before login. Note that the service container will contain the service, and the service can be dynamically and randomly changed at anytime... User devices will download Application Service Container after authentication process to allow the user login to their Cloud OS account. The Application Service Container will host user's apps and data with high secured protection of the 4K Number Encryptor technology which has been used in ZFilePackager app that provides free to use to backup user data while waiting for the Cloud OS. The Application Service Container is part of the Cloud OS and running on user's devices and the data will be synced up to the user's account and store in user's Cloud OS account every few seconds or whenever possible. When the user's devices turning off, all data will be in their Cloud OS account, and the apps with current states of user's workspace stay the same for the next login. After the user authenticated with Cloud OS account, the user authentication (password & magic number) will not be stored on user devices. The user password & magic number will convert into the 4K Number Encryptor form-factors in several sequences during authentication to prevent hacking thru the air or wireless access. The users will have no worry of losing their data when the lost their devices like currently. The Cloud OS will support 64-byte instead of currently 64-bit, and support new Alpha Number 0α12345..ABCDEF..ZÄabcdef which counting from 0-9A-ZÄa..zä (base-64 with Latin Characters) instead of currently 0-9A-F (base-16) as the Hexadecimal representation. This new Cloud OS Operating System will bring our world of computing to the new World of Computing Infrastructure modern with the new World eWeb (the Internet [spider] Web) applying the Neighbor-to-Neighbor routing technology for Self-Manage and Self-Grown with great dynamic secured data transfer protocols to protect from hacking as mentioned in Invention #9: G-ROUTING ALGORITHM METHODOLOGY for the best network routing technology. The Cloud OS will be the great promise Operating System which provides great data secure, with no or less of IT services and with no or less or maintenance and will work great with StarLink satellites network to provide people around the world with a secured and unified The World of Computing Infrastructure Modern. The Cloud OS works great with Starlink Satellite Network for the perfect world of Internet and the future of World Computing with the great invention #5: Greatest Performance Hard Drive (G-Drive) which is ready for Quantum Data Storage...

  The Cloud OS Operating System is one of my total 9 inventions. Invention #5: Greatest Performance Hard Drive (G-Drive) will provide the greatest performance hard drive ever and ready for the Quantum Hard Drive with Quantum Recording Technology and ready for Quantum Data Storage which was mentioned on my Social media and Linked-in media networks. The Cloud OS will use the G-Drive as the main storage with Rotation Division Multiple Access (RDMA) technology for faster data access with support of data secured protocols sequences to protect user data around the world. Keep in mind that only OS in cloud can protect data in cloud, so Cloud OS is the best Operating System ever and will be the future operating system for all kinds of smart devices, phones, tablets, etc... Below are the features in short description of the Cloud OS Operating System.

  1. Cloud OS will use new Programming Language UCOOP (Unified Common Object Oriented Programming) Language. The UCOOP programming language will derided from Java and only run within Cloud OS Operating System with new Cell Grid Layout for UI design, supports auto Retry within the scope of Try/Catch blocks. The UCOOP programming language will support new Sort algorithm with merging range option. The new language also protects from software inheritance and much more... The Cloud OS will apply the new Software Model
    The UIX Common Vector Circle SW Model Family
    which was invented around in October 2022 and is intended to replace the current model of 3 modeling circles (Model-View-Control).
  2. Cloud OS will support compiler so everyone can program and build their own application within their own account before build their applications with Public Application Build-Certificate to release and run in public environment which provides the users with the statistic and information of the 3rd party applications.
  3. Cloud OS will support 3D Search Engine, the Spiral Data Pipelength Model Search Engine applying the 4x4 bytes Match & Search Algorithm and extendable for Language Searching Algorithm which applying the 'Word x Word' Match & Search Algorithm.
  4. Cloud OS will not allow to change the clock in any applications or within the workspace to prevent things going in revert directions; this feature can be used to prove the original owner of the file by timestamp of file creation and more...
  5. Cloud OS will use Hand Writing Recognition more accurately for only one user per account. This can be use for Cloud OS account login to recognize real owner authentication.
  6. Cloud OS will replace the current traditional
    ASCII table
    by the new
    USC-LI table
    (Unified Standard Code Language Information table) which supports all languages around the world with markup tags for Language Codes & Language Fonts, plus pre-translated common phrases codes and common symbols/icons codes.
  7. With Cloud OS, when creating Cloud OS account, the users can have many different password formats options; like Clock Password (1 password for each hour of day depends on user's choice), Password & Magic Number or Login with Image 4K Number Encryptor... etc... and they are all go through 4K Number Generator for high secured authentication.
  8. With Cloud OS, when login to Cloud OS account from the user's devices or a borrow device, user's data and apps will look the same. And when the user logout from the borrowed device, all the apps and data will go the the cloud and leave no residue in the borrowed device.
  9. With Cloud OS, when the users turn off their devices or the devices are out of battery, user's data will be in cloud and user's device be like new, has no data or password to worry if the users lost their computer or laptop like currently. With Cloud OS, the user device will be more simple without storage device and less hardware components than currently, the laptop just has the temporary memory RAM (Random Access Memory) chip, CPU (Central Processing Unit) with GPU (Graphic Processing Unit) and a wireless chip as the main components; the laptop can be foldable in dual book-view with virtual keyboard on the other half.
  10. Cloud OS will support Language Writer, Language Reader, Data Grid Analyzer, Data Grid Viewer and Presentation Designer in different Languages as the standard applications like Microsoft Word, Excel or Power Point in Windows.
  11. Cloud OS will use standalone apps style instead of apps in browser. Cloud OS will support standard API for developers to develop their Website apps, and one Website app for each website instead of all or many websites can be opened within one browser instance which create so much confusing and out of control when the users have many websites links opening like currently with Google Chrome, Internet Explorer or Microsoft Edge. However, one Website app can link to another with a public hyperlink but the link will be opened by the Website app which the link belong to for security and 3rd party Look & Feel application protection. The Cloud OS will allow the users to be able to host their own web site within their own Cloud OS account and much more...
  12. Cloud OS will allow the user to search the Apps Room to choose and enable the Apps to use; The users don't need to install apps like we do currently for many decades. All applications must be certified and built with Build-Certificate which contains statistic and information about API or Protocols the apps used to identify potential of hacking.
  13. Cloud OS will standard API and Protocols for 3rd party user's devices in standard protocols; Users don't have to install drivers for their devices like we have done for many decades in Windows.
  14. Cloud OS will provide at least 3 backup data locations randomly in 3 different network topologies to prevent data lost; The users don't need to have USB flash drive or hard drive to storage their data. However, the Cloud OS will provide a download the encrypted raw-data to the Cloud OS compatible storage devices and only Cloud OS can convert the data back when the users upload back to the user's Cloud OS account with the 4K Number Encryptor.
  15. Cloud OS will support Unique Machine ID (machine address) start from 10 bytes and stepping up 2 higher bytes using Alpha Number instead of Hexadecimal Number (currently with only 6 bytes in hex) to prevent duplicated machine address.
  16. Cloud OS will use Invention #9: G-ROUTING ALGORITHM METHODOLOGY as a routing algorithm for the Star-Tree networking topology in 3D World Electronic Web and intended to replace the current Internet Network Backbone which current has many hacking issues that allows the hackers hosting the copy-modify websites from one community to another community with the current routing method of which ever closest server goes first. Another critical issue is the duplicate machine address or IP address will provide the hackers share the same content of current session as the user's view. The Cloud OS machine will handle the data routing and use Neighbor-to-Neighbor routing technology and prevent server machine get kidnap or stolen. The Cloud OS machine has its own star network connections and not need the routers like currently to prevent unwanted server machines connecting or disconnecting without network notification capability. The Cloud OS WeWeb (Worldwide Electronic [spider] Web) will automatically notify when new Cloud OS network branch is connected or will automatically notify when a Cloud OS server machine is gone missing. The Cloud OS WeWeb will also automatically draw and count the Network eWeb nodes (server machines) around the world.
  17. Cloud OS will support corporate accounts under an organization or a company with their own policy. The organization can set their own policy to allow employees the permission to share data to public via Shared-βox.
  18. With Cloud OS, the users don't need to have IT services or bring their laptop/computer to repair shop any more like currently.
  19. With Cloud OS, company or organization needs little or none of IT services. The Cloud OS will provide standard domain policy and can be configurable to apply for employees under a company or an organization. A company or an organization will have a Cloud OS account, and the employees will have Cloud OS accounts under the organization domain Cloud OS account.
  20. Cloud OS will support entire world with same version with latest and greatest. This will provide the same Look & Feel and compatibility to all users and 3rd party applications.
  21. With Cloud OS, the users will access directly to their Cloud OS account from anywhere around the world; and don't support Remote Desktop like currently which is not secured.
  22. Cloud OS will provide the user account with one and only one account login without any other built-in or hidden accounts. The Cloud OS will provide the user login statistic of the previous logins with date time and during of usage include statistic of previous Shared-βox links... There are more and more great features and convenience that's endless to say when you are with Cloud OS...
  23. Cloud OS will allow Corporate or Organization to allocate accounts for their employees with 2 Password sets and create a temporary password set for employee before assign the accounts to their employees. One for Initial Password set and one Unlock Password set for last take over when an employee left the company or organization or help to reset employee's passwords. These 2 Password sets will be used after the accounts have been suspended/lockout for taking over the accounts for security and/or reset passpords for recovery purposes. Note that all these activities will be logged as readonly and will be shown for loggin statistic when the user regain the login to the Cloud OS account. As a company or organization, a list of authorized personels will be able to trigger to suspend an account; and with a minimum of 3 or defined number of people (minimum authorized security team) from that list can trigger to suspend an account depends on company policy. Cloud OS will transform user passwords to different encryption forms for no one else will know the user account passwords and there is no passwords recovery option for security purposes. However, Cloud OS will provide
    Password Recovery Within Cloud OS
    account for other security purposes like raw-data download for backup for Cloud OS with 4K Password or zipping data with 4K Password within Cloud OS. The Cloud OS also provides this feature for individual as an optional security account recovery feature but the users have to keep these passwords by themselves. The individual will have options either record their 2 Password Sets and save in case need to reset passwords and/or send to their love ones a link to keep as secret Password Recovery Options. When enter into password or account recovery, the users will be asked to enter personal info plus these 2 Password Sets or enter their secret Password Recovery account of their love one... Fingerprints with order of 3 or more fingers can be another login option plus a magic number and/or favorite day/month/year write in your own format... With Cloud OS the users do not need to remember other passwords like Facebook, Twitter, Costco, Amazon, etc... All these service apps can link directly within user's account by Username... When creating these accounts, the service apps will ask for unique username and generate an account identification 4k number. The account ID 4k number will be stored on user's account and the service apps use to identify. The user need just the username to login (support multiple accounts), and the acount ID 4k number will be automatic load and identify to simplify user's input and account passwords to remember... We can keep the traditional login to these service accounts by entering both Username & Password as an option, but the users have to remember their password...
  24. Cloud OS which could be run in any Cloud OS compatible user devices, will support voice and video communication with high secured data and message transferring via dynamic protocols; transferring the same data but the content of encrypted transferring data will be different each time of transmission. Part of this 4K Number Encryptor methodology has been used in ZFilePackager application. The voice and video communications can be used by mobile devices like phones or tablets contacting each other via phone number or Cloud OS Email Address. The mobile devices can be used with or without Cloud OS. Without Cloud OS, the devices will be in the analog mode when no Cloud OS eWeb is available in mountain or middle of the ocean. With mobile Cloud OS like I already mentioned above when the user login into Cloud OS account, the Application Service Container will host users apps and data. This will be the great promise for the future of the World Computing Infrastructure for both mobile devices and desktop platform devices with high secured data and communications...
  25. Cloud OS will support children account under a parent account similar like the corporate accounts so the parent can have his or her parent control over their own children. However, the Cloud OS will provide the default children's Cloud OS rules for security and policy restriction purposes apply across the world...
  26. Cloud OS will support lot more and more good features and cannot able to list all here...

Existing World Computing Issues

  Currently, the internet (network backbone) is not secured and data transferring through the wire or wireless are hacked-able and viewable with a internet networking sniffer analyzer. User documents, personal data and passwords are stored in computer PC, laptop or tablets running in Windows OS, Mac OS or Linux OS. The keyboard and mouse are also the hacked components, every key stroke can be sent out to the hackers. What exactly computer hacking activities? Access and copy data files from a computer remotely, etc... Hacking into a computer remotely is meant accessing remotely with a hidden built-in account or with the user's password from the keyboard key strokes logger. Most of the smart devices have wireless devices other than the Internet WiFi devices could be built-in into the system and also built-in into the keyboards or mouses and even in side the monitors; and data can be sent out in deferent ways through hidden wireless devices...

  1. Windows or Linux files system are accessible within the computer or laptop and the files system can be replaced easily by the hackers or by the super admin users remotely. Hacked code that was created for decades are still able to run in later Windows 10 or later version without a way to notify the users to check and remove. Remember, Hack means Spy (Hackoirob: Hack with Output Input then rob...). Current computer or laptop PC comes with lot of game apps, lot of un-necessary apps, and more likely hacked apps preinstall on the new computer...Cloud OS will privide the users with initial common stardard apps (no game apps, no 3rd party apps), the users will need to goto Apps Room and search for 3rd party apps that they want and enable to use.
  2. Windows or Linux super admin accounts are built-in and can be easily being used to access user's devices remotely. There are many hidden built-in accounts under "C:\Windows\users" if the Windows users enable or unhide the setting "Hide protected operating system files" under "Folder Options"
  3. All currently computers or phones: Windows, MacOS(MacBook, MacAir, MacPC), ChromeOS(Chrome Book) have Documents, personal data and password are stored locally on user's devices PC, laptop or phone which will be lost if the users lost their devices.
  4. Documents, personal data and password on user's devices can be retrieved by 3rd party applications right on your computer, laptop or phones.
  5. What happens when the users bring their computer PC, laptop or tablet to a repair store for repair reset password, and how their account get reset? Only super admin can reset user's account, then documents, personal data and password can be leaked...
  6. There are too many versions of Windows, MacOS or Linux OS to be updated, and the users have to deal with the different version of Windows or Linux and also the compatibility of the applications. Like documents that were generated with Microsoft Word, Excel or Power Point applications in different versions that may cause the user's data to be mismatched.
  7. Even user's devices are up-to-date with latest version but there is not way to notify the users to remove the existing spyware.
  8. The users have to deal with drivers or install and reinstall Operating System and/or applications for Windows or Linux OS -- MacOS(MacBook, MacAir, MacPC): are built based on Unix/Linux, Android-liked; ChromeOS(ChromeBook): are also built based on Unix/Linux, Android-liked; which is too much hassle!
  9. There too much of cache memory and cookies running on the user's devices which can be hacked cached code or spyware. Most of the cookies or hacked codes are came from Internet Browser.
  10. There are many unwanted and un-necessary Windows or Linux services or daemons running in the background which can be hacked programs that the users can not be aware of.
  11. Currently computers support remote access, and one computer can be accessed remotely with the same account that can access more than one location or more than one remote access person.
  12. Too much of IT services are required for current networking for a company or an organization.
  13. The current computers support VPN, VNC or Remote Desktop which is not secured and open to many unwanted or unknown login accounts at the same times within the same computer without knowledge of the user that current using that computer.
  14. The existing network or network backbone created with hacked holes with too much routers at Data Center (Unix/Linux servers connect to routers and provide keyboards and mouses at Data Center which provide hacking home for hackers, etc..) for the hackers to clone websites from a server then host at their interested locations. One server can host more than 100 websites without network notification capability of current network backbone of too many routers that are lossy from the servers or computers.
  15. The existing Windows or Linux operating systems support 3rd party compilers, and the developers code can be compiled with the 3rd party add-on spyware code.
  16. There are lot more of current problems and issues that could not list all of the
    Existing World Computing Issues
    ... Hacking to other computers to steal is the biggest problem with the current existing world computing infrastructure.
  17. Existing Windows computer/laptop crashes cause too much hassle (data lost, apps crashed, need to reset or reinstall...) for the users...With Cloud OS, crashes happen only on user's device, but the users can reboot the device and re-login to Cloud OS account without issue and data/apps look the same (data and apps are in cloud and protected by the Cloud OS). Cloud OS was invented with Self-Manage and Self-Control. The users do not need to bring the devices to repair shop to recover their device and data...
  18. Existing MacOS(MackBook, MacAir, MacPC) are also hackable. Data and Password are stored on user's devices. When the device is crashed or reset, all data are deleted. The Appple icloud contains users's photos, videos files, documents, data files which can be accessed by hackers without users' knowledge, and data files can be deleted by hackers. With Cloud OS, each user Cloud OS account has its own account authentication and controller processes which are always running to protect and notify the users when any instruders' logins...
  19. All Windows, MacOS, ChromeOS, and Linux computer or laptop contain user's data and apps, and the users cannot borrow a device to use with the same their own data and apps if the users lost their device (computer or laptop). With Cloud OS, the users can borrow a device to login to their Cloud OS account and have the same apps, the same data, and the same settings as their login previously if they lost their device
  20. Existing MacOS (MacBook, MacAir, MacPC) when copying files and bring to Windows computer, there are extra files come with each file which can be seen obviously which provides hacking and crashing the files in Windows environment. The Cloud OS will define well clearly files and folders structure; and the users do not need to worry file transfer from one machine OS to another.
  21. All Windows, MacOS, ChromeOS, and Linux computer or laptop are hassle for the users to transfer data documents from one type of OS (Operating System) to another or email to friends for coworks with different type of computer. Apps and data files are not compatible, and this is the most trouble for the users around the world. The Cloud OS will provide standard and common (free to use as part of the Cloud OS) Language Reader, Language Writer, Data Grid Analyzer, Email app, etc... (to replace Microsoft Word, Excel, etc...). Cloud OS will be use Starlink network to provide the entire world with the latest and greatest Cloud OS for every user around the world. The Cloud OS will provide the data converter gate for users to upload their existing data, documents to their Cloud OS account; data files transfer to different types of machine or computer will be no longer an issue. Cloud OS and Starlink Network provide the world the best and perfect World of Computing Insfrastructure Modern!

About My Inventions

  1. INVENTION TITLE: New Way to protect WiFi Network from Hackers -- (U.S. Patent #: 29/788,607 & New U.S. Patent #: PCT/US24/17533 / International Patent #: РСТ/В2024/000110)
      In short title:
    WiFi[+]Secured
    which provide the WiFi router a new way to protect WiFi network from hackers by "Press-and-Scan" to get access protocol. This new WiFi router will not broadcast WiFi SSID anymore, and it required the users have to be physically there to press-and-hold a button then scan a dot matrix code label which contains SSID & WiFi Pass-code to get access. The owners should have their owner wallet key in dot matrix label for the final Press-and-Scan step to have persistent access.
      There are many different ways to hack into the current WiFi Network. And the current WiFi routers are difficult to setup for non-Network experience people. The current WiFi routers are default with visible WiFi name (SSID), and this will attract the hackers to hack into the WiFi router to have Network access. I introduce the new way to protect the WiFi Network [WiFi+Secured] completely from the hackers with the new WiFi router Press-and-Scan-to-Access. This new WiFi router Press and-Scan-to-Access will provide the owners and users an invisible WiFi SSID and the WiFi Password without the user inputs. The WiFi router should have a random WiFi SSID and a random Password label along with a wallet-card for factory-key and owner-key label that come with the WiFi router package. The WiFi SSID, WiFi Password, factory-key and owner-key should be in scan-able-code, barcode, QR-code or G-CODE labels. The Authentication Owner key contains WiFi SSID, WiFi Password, and the owner-key. The Authentication User key contains only WiFi SSID and WiFi Password. The "Press-and Scan" button will allow the users to scan the G-CODE labels to have the Network access. To scan the WiFi SSID and the WiFi Password from the label, the users need to press and hold the "Press-and-Scan" button while scanning the label. However, for the owners accessing procedure, the device OS or WiFi application will ask to scan the owner-key to have persistent owners WiFi Network access. For appliances and small devices New Way to protect WiFi Network New Way to protect WiFi Network from Hackers from Hackers or security cameras using WiFi Network, the devices' providers can have an application to assign WiFi Network access to the devices and must follow the same WiFi+Secured protocol. The whole idea of this new WiFi Network protection here is to have a button pressed while scanning the WiFi SSID and the Password to have access to prevent unwanted users from outside of the house or business accessing the WiFi Network. This idea also applies to the WiFi Extenders. The "Press-and-Scan" button should be close to the WiFi SSID and Password label. For more extensible Network like business, a separate wireless device has a "Press-and-Scan" button and an Authentication keys label provided to replace the routers with "Press-and-Scan" button and the labels that are hidden from the users. The device OS or WiFi application should only show the desired name but not the WiFi SSID even this is a random SSID. Click this link WiFi[+]Secured to check out the invention specification (Full invention document is not shown here for business security purposes)... The dot matrix label can be G-CODE label; please visit
    www.TheGCODECreator.com
    for details...
      Conclusion: With this new idea, the Family-Client-Network and Business-Client-Network are worry-free from the hackers gaining access into their WiFi Networks. WiFi+Secured for Family-Client-Network are hidden from the neighbors and unwanted users. WiFi+Secured for Business-Client-Network are more secured and only allow access to the customers when they are in the business like Starbucks, Coffee stores, Restaurants, and small customer service businesses. This new WiFi+Secured Network protection will be even more secured for large business or corporates if they are sharing offices in the same building. A standard trademark below is for new routers with this new secured protocol to help customers and users identify the new WiFi+Secured protocol should have the Trademark and WiFi-Access-Label like below. The trademark and the WiFi-Access-Label should be printed right below the “Press-and-Scan” button. The WiFi security option should always be set to the highest security option “WPA2” or higher. Notice: The QR code below is just a sample code label, and can could be replaced by other code labels like Barcode or G-CODE labels.
  2. INVENTION TITLE: THE G-CODE -- (U.S. Patent #: 29/806,573 => PCT/US22/70704 / International Patent #: PCT/IB2022/000112)
      
    THE G-CODE
    is invented to replace the existing dot-code or data-matrix labels like Barcode, Code-128, QR-CODE or any other Data-Matrix Code labels. The G-CODE can support any matrix data size from 8x8 to 64x64 with increment of 4 dots on each size, and 64x64 to 128x128 with increment of 8 dots on each size, and forever extendable size of 16 dots on each size from 128x128 and up until the computer cannot able to calculate the data checksum with current CPU supports of 64-bit. The G-CODE supports UTF-8, UTF-16 and UTF-32 as long as the user data matrix follows the G-CODE sizes described above.
       The G-CODE is designed with State Of The Art and is designed to last forever. The existing Barcode, Code-128 and QR-Code contain low ratio of User Data verse Error Correction Codes. The existing codes cannot able to support dynamic extendable sizes, and do not provide the great Error Correction like the G-CODE does. The G-CODE provides up to 4 ways of line checksums, row-direction checksums, column-direction checksums, backward-diagonal-direction checksums and forward-diagonal-direction checksums. These 4 checksum methods will provide greatest Error Correction algorithm ever for the data matrix. With State Of The Art design, the G-CODE has the Great Eagle Symbol on the top part of the GCODE frame, and the 4 identical square-corners with option of color or black-and-white mode. The 4 corners are painted with the U.S. flag in color mode, and painted with black-white-black squares in black-and-white mode. Next to these 4 square-corners, there are 2-pairs of duplicated checksums for entire user data, one for entire user data of rows-checksum and the other for entire user data of columns-checksum. These user data checksums are also calculated with 4-bit width in row-direction for user data rows-checksum, with 4-bit width in column direction for user data columns-checksum. The G-CODE labels always come with 3-lines border, 2 solid lines and 1 white line. These border lines create a nice looking and great decoration for the G-CODE labels. The user data matrix is in the middle of the G-CODE labels, and the lines between the user data matrix and the border are the rows, columns, and the diagonals checksum lines. The G-CODE checksums are calculated by every 4-bit width of the data matrix for rows, columns and diagonals lines. The magic of 4-bit data checksum is to provide more The G-CODE condensed data checksum compare to 8-bit or higher, and this 4-bit data checksum method will provide more accurate and focus on scanning for error areas of 4x4 bits. The identity of G-CODE label is the Great Eagle Symbol and the 4 square-corners with sizes depend on the size of the user data. The G-CODE label can be scanned in with or without the border lines depend on the user's scanner alignment or the scanner applications.
      Conclusion: This G-CODE with State Of The Art design and dynamic grown in sizes, G-CODE is a Great CODE and designed to last ever. The G-CODE is designed to replace the existing dot-code or data-matrix labels like Barcode, Code-128, QR-CODE or any other Data-Matrix Code labels. NOTICE: Deal to hacking issues, G-CODE was delayed of releasing and still waiting for International WIPO Office Certification. Click this link THE G-CODE to check out the invention specification (Full invention document is not shown here for business security purposes)... Please visit my website for more info: www.TheGCODECreator.com; please visit
    www.TheGCODECreator.com
    for details and how to prepare text data files for the G-CODE Creator application with the
    G-CODE Profiles Creator Demo (full) Video Clip
    or the [ G-CODE Profiles Creator Demo (first 5 minutes) Video Clip] and the
    G-CODE Labels Creator Demo (full) Video Clip
    or the [ G-CODE Labels Creator Demo (first 5 minutes) Video Clip]...
  3. INVENTION TITLE: The Cloud OS - Operating System -- (U.S. Patent #: PCT/US21/71689 / International Patent #: PCT/IB2021/000683)
      
    The Cloud OS - Operating System Invention
    (a 10 years idea invention) -- OS, Applications and Data in cloud, data and password not store on user devices, enable apps in cloud to use, no need to install apps on user accounts or devices. When login to Cloud OS account, user device will be loaded with Authentication Service Container and use Authentication Protocol, when completed successfully authenticated, user device will be loaded with Application Service Container; this container will host user's applications and manage data and files in Cloud.
      Cloud OS supports programming in Latin letters and supports any other languages more than just UTF-8 or UTF-32 using Language Code Tags with the new Unified Standard Code Language Information (USC-LI) Table. Currently, non Latin languages only have 3 UTF-8 bytes for language code; however, each byte has higher bit masked out so only 1.5 bytes are used. This is too little for non Latin languages. Cloud OS will much more language codes and also support language fonts. The Cloud OS will support 64-byte (currently 64-bit), and support binary (base-2), hexadecimal (base-16: 0x012345..ABCDEF) and new alpha number (base-64: 0α012345..ABCDEF..ZÄabcdef..zä). This new Cloud OS Operating System will bring us to the next modern level of World Computing Infrastructure for the World eWeb (the Internet) and Computing Applications in many different fields with great secured dynamic data transfer protocols to protect from hacking. Please read the above translation description for more details about the Cloud OS Operating System. Click this link The Cloud OS to check out the invention specification (Full invention document is not shown here for business security purposes)...
      Conclusion: The Cloud OS – Operating System will provide the users with nice Look-and-Feel and great user friendly interfaces. The client devices are much simpler without hard drive or storage devices, and provide the users with more data secured, low cost and low maintenance. This new design of Cloud OS – Operating System with State Of The Art design and high secured data protection, and much more reliable with great secured communications for VoIP, Video Conference, Data, Text, and Messaging services will be a promise future Operating System to replace the existing Linux, Windows, macOS and other existing Operating Systems. Entire Worldwide networks will be more secured, more protected, and more challenge for the future of our younger generations for Software Development and any other inventions with the Copyright protection supported.
  4. INVENTION TITLE: The LPS - Local Positioning System -- (U.S. Patent #: PCT/US21/72562 / International Patent #: PCT/IB2021/000949)
      
    The LPS - Local Positioning System
    The LPS - Local Positioning System is designed to guide, locate and track any devices, robot cleaners, robot carriers, or any vehicles inside the building, warehouse or manufacturing. The LPS can be extended to Mobile-LPS; the LPS system that can be anywhere in space or on other planets without GPS availability. The Mobile-LPS system can be used for Network of Flying Objects or Network of Moving Objects.
      Not like the GPS, the LPS can operate in high frequency for faster data broadcasting with more accuracy and work inside big building or even under the tunnels, and the signal can go thru the walls. The GPS system works great for objects or devices in outside open space, but the accuracy is not yet satisfied and could be more than few meters errors. The GPS system operates with many different levels of frequency (L1 frequency at 1.575 GHz, L2 frequency at 1.227 GHz, etc...). With the current FCC approval of 5.0 GHz RF transmitter, the LPS system can operate at this frequency or higher to provide the LPS system more accurate and works anywhere in any environments. The GPS devices and the satellites are too far from each others, so the difference of distances from point-to-point of the GPS devices is hard to calculate and yield more errors compare to the LPS system. The GPS system works great for large objects in outside open area, but not for small objects. If the Atomic Clock oscillator can be improved to 10x faster or higher, we will have even higher accuracy than within 12 inches. With this new LPS system, any devices, big or small, inside or outside can work great with high accuracy of 12 inches with relative locations to a fix-point of the LPS system. Not like the GPS, the LPS system is easy to collaborate, maintain, and improve without worry of devices out of clock synchronization or power outage. The LPS transmitter devices can be installed anywhere and easy to collaborate with a simple LPS Collaborator device. The LPS system can be widely used for many applications in many other platforms, such as single LPS transmitter for robot cleaner, 3 or more LPS transmitters for robot carrier in warehouse or manufacturing, great system Air Traffic Control for airports with combination of Radar-GPS-LPS system, great for military and security patrol system, and even great for Drones-in-Mars or other planets. Click this link The LPS to check out the invention specification (Full invention document is not shown here for business security purposes)...
      Conclusion: The LPS – Local Positioning System will work great in the buildings, even in the tunnels and would be more accurate than the current GPS system. The GPS satellites are too far from the devices on earth compare to the LPS system, so the accuracy of the LPS will be much higher than the GPS system with higher frequency and faster data or information transmission compare to the GPS. The LPS can easily collaborate and easy to use and can be applied for many indoor applications such as Robot Carrier, Robot Cleaner, and outdoor applications such as Airport Traffic Control, Patrol or Security Guard Circle, etc... The LPS will be used in conjunction with the GPS to improve global and local positioning systems. This combination will be a big improvement for the world of tracking and positioning applications for both indoor and outdoor devices. This would be great improvement for Airport Traffic Control system in combination with Radar and GPS systems. Far more than that the LPS – Local Positioning System will enable the world of technology to create a Network of Flying Objects (NFO) or Network of Moving Objects (NMO). This would be a great help for military and security to use Drones in Military Patrol Circle and Security Guard Circle.
  5. INVENTION TITLE: The Greatest Performance Hard Drive (G-Drive) -- (U.S. Patent #: PCT/US21/72563 / International Patent #: PCT/IB2021/000961)
      
    The Greatest Performance Hard Drive (G-Drive)
    is invented to provide the greatest performance for storage hard drives ever to be used in Cloud OS in real life systems with RDMA (Rotation Division Multiple Access) technology and ready for Quantum Hard Drive. The Cloud-OS was invented with the RDMA technology to allow each user has a chance to access their data on every rotation of the hard drive disk.
      This invention will introduce the new Hard Drive with new Geometry Disk Layout, dual CPUs, and dual Actuators with additional Writer Port to provide the Hard Drive with greatest write and read performance. The G-Drive will have three controllers; the main controller will communicate with the host and control the other two actuator controllers. The main controller will pass the host read and modify commands to Actuator-1 controller, and pass the host write commands to Actuator-2 controller. The Actuator-1 controller will handle the read/modify commands from host. The Actuator-2 controller will handle host write commands data to the outer SMR temporary zones (25% outer LBAs), then both controllers will manage and organize the data to their target locations when they have a chance. This will improve the random operations performance close to the sequential operations. Each actuator controller has its own CPU to control its Actuator for Servo heads and arms moments. The G-Drive will have additional LED flashing at a fix position with a Photo Sensor to track and count every rotation of the disk. This LED feature will help the Servo Controller to seek to a specific location, Sector, Track or Zone faster and more accurate. The G-Drive disk will be divided into 36 clove Rotational Zones, and the data disk space will be divided into 16 Radius Zones within the Data Radius with the same space from each other. This 16 Radius Zones create 16 Circular Tracks; these tracks will be the Radius Sector Info Tracks. With this Geometry Disk Layout and the LED at 0° degree of the disk, the G-Drive will perform greatest seeking to any location, sector or LBA faster and more accurate than the current hard drive technology. The G-Drive will write data LBA outward direction opposite with the current hard drive technology. The LBA outward direction orientation will provide the OS easier to organize the system files, system data and the user data. Click this link The G-Drive to check out the invention specification (Full invention document is not shown here for business security purposes)...
      Conclusion: The G-Drive – Greatest Performance Hard Drive is designed with State-of-the-Art Geometry of 360° degree Disk Layout in combination of LED Radius at 0° degree detection will be a big promise for the future storage disk hard drive. The Cloud-OS was invented with the RDMA technology to allow each user has a chance to access their data on every rotation of the hard drive disk. This patent will be a great improvement for Data Center with Cloud-OS supports. The G-Drive will provide the fastest data recording for video systems and great for flying object recorders, like aircrafts recording while flying at low altitude. The G-Drive is a perfect hard drive for the Cloud-OS computer systems. With this perfect computer system, the world will have great Data Center with fast data storage and great Cloud-OS network; this will bring the world to the next level of computing infrastructure. This is a big promise for the future of our younger generations. Our younger generations will use these as the great tools to invent beyond what we have today.
  6. INVENTION TITLE: Cell ëMap Live Updates System -- (U.S. Patent #: PCT/US22/79368 / International Patent #: PCT/IB2022/000685)
      
    Cell ëMap Live Updates System
    is invented for the new map layout in cells, based on Latitudes and Longitudes in 10°, 1° and down to 1km² cell maps. The Latitudes and Longitudes (LAT) in 10° Cell ëMap is used for spaces, high speed flying objects or earth scanning. The Latitudes and Longitudes (LAT) in 1° Cell ëMap is used for faster map scanning and pin point a location on earth easier and faster. The highest resolution of Cell ëMap is the 1km² cell and is used for mapping and navigation system in city or crowded area.
      The Cell ëMap Live Updates System is designed with State-of-The-Art and support local organization offices update and maintain the Cell ëMaps easier and secured than ever with broadcasting cell e-maps. Figure-1 below shows the Globe Latitudes and Longitudes in 10° layout for a quick view of the globe. The Cell ëMap Live Updates System is designed to allow local organizations around the world able to update their points of interest, and live traffic notifications; the local organizations know their local points of interest better. This system can be used with the existing Cell Phone Towers or new form of Broadcasting Towers to broadcast Cell ëMaps around each tower. When cars or smart devices travel close to a tower, the cars or smart devices will receive the next Cell ëMaps and use in Navigation Systems and ready for the next moves along their way. This invention will help satellites, space stations, airplanes and cars with smart devices travel and locate positions on earth easier and faster and ready for our future spaces pin point on earth more accurate from far distances when we have with the Cell ëMap Towers located on earth. Cell ëMap Towers can be covered 10° (648 towers max)* or 1° layout (64,800 towers max) layout at each map's corners where are possible on land or ocean... "Latitudes and Longitudes 10° Layout" The Equator and the Prime Meridian are the main lines defined the position zero on earth to start with. We have total of 36 meridians of Longitude and 9 North Latitudes and 9 South Latitudes with 10° layout. Figure-2 below shows the Globe in 10° Latitudes and Longitudes layout which can be found on Wiki Encyclopedia. "Latitudes Radius and High Calculations" The Cell ëMap Live Updates System is designed with the 1km² cell for highest resolution of Cell ëMap, and each cell position can be calculated based on the radius and the high of each Latitude that the cell map is occupied. This section will provide the calculations for each Cell ëMap locate on Latitudes in radius, circumference, area and the arc of each cell. Figure-3 below shows the radius and high calculations based on the given Equator dimension of 40,075.017 km. "LAT (Latitudes) 1° Cell ëMap Format". The Cell ëMap Live Updates System is designed with State-of-the-Art and providing secured broadcasting cell e-maps for navigation systems. Broadcasting Cell ëMaps will prevent hacking or blocking from unwanted interrupters; and every smart device can able to receive cell e-maps on-the-go more privately without knowing from the others. The important feature here is broadcasting cell e-maps; so the smart devices or smart cars do not need to have phone or internet services to receive the cell e-maps. In addition to this, local organizations can able to update their own local maps for their points of interest and live traffic notifications by their own and in their own languages. The local organizations can have the rights to support international language like English broadcasting along with the local language using Language Tag to support international travelers. This invention will prevent the navigation hacking issue on cars or smart devices use for navigating while traveling; and will support much easier navigating algorithms which works for one cell would work on the other cells. This system is a promise mapping and navigating system for our future and our younger generations' futures for our smart world with the future supporting of LPS Navigation System. The LPS Navigation System will use LPS towers along the roads, along the freeway, across the neighbors, city-to-city to provide more accurate locations with this Cell ëMap Live Updates System. More than just that; this new globe mapping layout of 10° and 1° LAT cell e-maps will help our astronauts, space vehicles, space stations, and future programs for Space Port, Space Links linking with our home, the earth more accurate than ever if we adding Cell ëMap Towers along the Latitudes and Longitudes or Meridians. This new map layout with Cell ëMap Towers can help to pin point lost of airplanes or greatly support Air Traffic Control, Air Defense, and UFV Unmanned Flying Vehicles better than ever. Click this link The Cell ëMap to check out the invention full document...
      Conclusion: The Cell ëMap Live Updates System is designed with State-of-the-Art and providing secured broadcasting cell e-maps for navigation systems. Broadcasting cell emaps will prevent hacking or blocking from unwanted interrupters; and every smart device can able to receive cell e-maps on-the-go more privately without knowing from the others. The important feature here is broadcasting cell e-maps; so the smart devices or smart cars do not need to have phone or internet services to receive the cell e-maps. In addition to this, local organizations can able to update their own local maps for their points of interest and live traffic notifications by their own and in their own languages. The local organizations can have the rights to support international language like English broadcasting along with the local language using Language Tag to support international travelers. This invention will prevent the navigation hacking issue on cars or smart devices use for navigating while traveling; and will support much easier navigating algorithms which works for one cell would work on the other cells. This system is a promise mapping and navigating system for our future and our younger generations’ futures for our smart world with the future supporting of LPS Navigation System. The LPS Navigation System will use LPS towers along the roads, along the freeway, across the neighbors, city-to-city to provide more accurate locations with this Cell ëMap Live Updates System. More than just that; this new globe mapping layout of 10° and 1° LAT cell e-maps will help our astronauts, space vehicles, space stations, and future programs for Space Port, Space Links linking with our home, the earth more accurate than ever if we adding Cell eMap Towers along the Latitudes and Longitudes or Meridians. This new map layout with Cell eMap Towers can help to pin point lost of airplanes or greatly support Air Traffic Control, Air Defense, and UFV Unmanned Flying Vehicles better than ever.
  7. INVENTION TITLE: The LPS Navigation System -- (U.S. Patent #: PCT/US22/79369 / International Patent #: PCT/IB2022/000671)
      
    LPS Navigation System
    is invented to guide, navigate for any moving objects, vehicles, airplanes with LPS devices equipped that based on the LPS - Local Positioning System and the Cell ëMap Live Updates System inventions. The GPS system works great for objects or devices in outside open space, but the accuracy is not yet satisfied and could be more than few meters errors. The GPS system operates with many different levels of frequency (L1 frequency at 1.575 GHz, L2 frequency at 1.227 GHz, etc...). With the current FCC approval of 5.0 GHz RF transmitter, the LPS system can operate at this frequency or even higher to provide the LPS system more accurate and works anywhere in any environments.
      The GPS devices and the satellites are too far from each others, so the difference of distances from point-to-point of the GPS devices is hard to calculate and yield more errors compare to the LPS system. The GPS system works great for large objects in outside open area, but not for small objects. If the Atomic Clock oscillator can be improved to 10x faster or higher, we will have even higher accuracy than within 12 inches. The LPS towers are small and cheap to develop and can be powered by solar and have their own IDs and can be separated by 1 to 5 kilometers apart with lower power of transmitting; and they can be linked together for self-collaboration after first installation. With this new LPS Navigation system that uses LPS towers along the roads, across neighbors, city to cities; any moving smart devices, smart cars, flying cars, airplanes or unmanned vehicles that equipped with LPS receivers will able to pin point the current location and position on the e-maps that defined LPS towers along the way. The Cell ëMap Live Updates System invention already defined the LAT Cell ëMap in 10° layout, 1° layout and down to the 1km² Cell ëMap layouts. The Cell ëMap layout system will define the LPS towers locations on the Cell ëMap system; when this is ready, any moving devices, moving objects or moving vehicles will receive the cell e-maps signals along the way and easy to navigate anywhere along the cell e-maps based on the predefined positions of the LPS towers. The LPS towers are easy to collaborate, maintain, and improve without worry of devices out of clock synchronization or power outage. The LPS transmitter device towers can be installed anywhere and easy to collaborate with a simple LPS Collaborator device or with a LPS 'PAIR' button to synchronize neighbors' distances when their clocks are synchronized. "LPS Towers Layout" The LPS towers are new and recommended to layout more evenly and geometry as possible and at any given position should be at least covered with 3 towers signals; and one tower signal should overlap the others to provide one device can communicate to at least their 2 other neighbor towers. With great layout, we can collaborate entire the LPS network towers automatically easy without manually using the LPS Collaborator device as mentioned in the LPS - Local Positioning System invention. Figure-1 below shows a simple of LPS tower layout in geometry. "The LPS Navigation System" The LPS Navigation System is designed with the following LPS protocol in normal mode; LPS tower will send every interval with its ID, following its second-counter, and its nanosecond-counter, and then following with the distances between its neighbors. The distances between its neighbors will use for calculation of the circle of the 3 points, 3 LPS towers; these distances will be used to calculate the radius R at center point Pc of the Triangle Circle Radius. This radius R will be used to relatively calculate distance of the signal travelling time tn verse the time tc that travels to the same distance R of each tower. The Pc point can be used as a perfect collaboration position for all 3 towers for mobile collaboration or during LPS towers installation. Table-2 below shows the sequences of each tower broadcasting in 1 second interval with 2 neighbor towers. In real world, the LPS Navigation System should broadcast every 100 millisecond interval for accuracy of moving cars, flying cars, airplane and unmanned vehicles. The LPS Navigation System is also designed to support automatic adjust atomic clock using Automatic Clock Synchronization propagation to collaborate the LPS towers clocks within limit LPS Towers IDs in range; this feature will show in section "The LPS Towers Clock Synchronization Propagation". When one LPS tower is miscalculating the distances with its neighbors or when power outage or in case lost of LPS tower, the system will use Alert Protocol which will show in section "LPS Towers Alert". The LPS Navigation System is designed with State-Of-The-Art and supports LPS Automation Collaboration with great LPS Alert System to provide great technology for entire world... Click this link LPS Navigation System to check out the invention full document...
      Conclusion: The LPS Navigation System is designed with State-Of-The-Art and supports LPS Automation Collaboration with great LPS Alert System to provide great technology for entire world for smart city, navigating vehicles, self-driving cars, flying cars, airplanes, unmanned aircraft, marshal drones, and any other smart devices navigating through the maps. The LPS Navigation System is designed to work with the Cell ëMap Live Updates System for large number of LPS towers around the cities, around the country, and around the world; the Cell eMap Live Updates System invention is also mentioned this invention and is intended to use for locating positions on the Cell eMaps to provide accurate mapping and navigating around the world with great layout of Cell eMap and LPS towers. The LPS towers can be powered by solar; they are small and convenient to install anywhere on any surfaces. This could be great for tall buildings and high mountains to provide obstacle objects to avoid for airplanes, flying cars, unmanned aircrafts and any other flying objects. The LPS Navigation System and the Cell ëMap Live Updates System, together will be a great promise mapping and navigating system for our future and our younger generations’ futures. This system will use LPS towers along the roads, along the freeway, across the neighbors, city-to-city, and country-to-countries to provide more accurate locations and secured maps than ever with the Cell ëMap Live Updates System and this great LPS Navigation System.
  8. INVENTION TITLE: Emergency Traffic Lights Routing System -- (U.S. Patent #: PCT/US22/82343 / International Patent #: PCT/IB2022/000791)
      
    Emergency Traffic Lights Routing System
    (a 5 years idea invention) is invented to search for shortest routes with pre-green traffic lights for a predefined distance before rescue vehicle moving to rescue fires' rescue critical health condition people, and even rescue in disaster emergency situations.
      Traffic lights are in some geometry layout, and this invention applies the G-NETWORK layout and G-ROUTING algorithm to search for fastest route and apply G-ROUTING protocol to transmit messages from one traffic light to another using Neighbor-to-Neighbors networking technology which was used in G-ROUTING ALGORITHM METHODOLOGY invention. The existing traffic lights controllers can be improved to support Emergency Traffic Lights Routing System by adding RF wireless device into the traffic light controller for each traffic corner. The RF device in traffic light controller only needs to use low power and enough to have signals covering its traffic lights neighbors to form a Neighbor-to-Neighbors networking layout. The database requires for Neighbor-to-Neighbor networking is simple with the properties of the neighbors like distances and directions from a traffic light or a node. Traffic light is not a re-routable node, and the system will handle the routing and set the properties of node-to-nodes for forwarding protocol in traffic light routing operation. When receiving an emergency call request, the rescue station system will look into the database for the destination traffic light ID and trigger the system for a fastest route starts from the rescue station; only rescue stations have the system that can trigger a rescue route and forward green command to a list of routing traffic lights. The routing traffic lights will take turns to turn green light for a given initial distance and keep green lights ahead with a maximum velocity of the rescue vehicle. The rescue vehicle can be equipped with an RF device carrying in the last rescue vehicle to notify the traffic light back to normal condition, to end the route when the vehicle passes by. If this device is not equipped or not available on the rescue vehicle for any reason, the traffic lights will be green after received the command and stay for maximum of 15 minutes; when this situation happens, the traffic lights on the route will flash red for maximum of 1 hour after 15 minutes green timeout, then the traffic lights will go back to normal control condition. The system also provides testing protocol and testing sequences to test signal propagation one-to-one across the traffic lights networks. Click this link Emergency Traffic Lights Routing System to check out the invention full document...
      Conclusion: The Emergency Traffic Lights Routing System is invented with State-Of-The-Art with the main purpose of find a shortest routing distance and set the routing traffic lights turn green ahead of rescue vehicle before the rescue vehicle moving. The system will be great help to rescue fires, rescue critical health condition people, and even great rescue in disaster emergency situations. The existing traffic lights controllers can be improved to support Emergency Traffic Lights Routing System by adding RF wireless device into the traffic light controller for each traffic corner. This invention would be helpful for rescuer team moving on the fastest route with pre-green traffic lights to rescue safer and faster. With existing traffic lights system, rescue vehicles may be stuck in the traffic at high traffic conditions when both sides of the roads are fully with cars and trucks. The Emergency Traffic Lights Routing System will help to clear the traffic before the rescue vehicles start moving; this is a great help to rescue in critical emergency situation or in disaster situation in bad traffic condition. The Emergency Traffic Lights Routing System will be great for smart city in the future, and the community will be safer with fast rescue responding.
  9. INVENTION TITLE: G-ROUTING ALGORITHM METHODOLOGY -- (U.S. Patent #: PCT/US22/82347 / International Patent #: PCT/IB2022/000800)
      
    THE G-ROUTING ALGORITHM
    is invented to provide routing algorithm for the G-NETWORK layouts in some geometries like Satellites, Internet 3D-eWeb Networks, Cell ëMap System and even for Emergency Traffic Lights Routing System.
      The G-ROUTING ALGORITHM provides great routing, fast and robust for any networks using Neighbor-to-Neighbors networking technology. The Neighbor-to-Neighbors networking technology only requires neighbor knowing next neighbors; one network node only needs to know its closest neighbors and can only communicate to its closest neighbors. The Neighbor-to-Neighbors networking technology provides the network with self-adjusting when a node is removed or added into the networks. The G-ROUTING ALGORITHM Methodology is invented with State-of-the-Art and invented to work with any geometry networks, G-NETWORK from simple networking nodes to most complicated machine networking nodes. The simple networking nodes are the network nodes that can only send and receive signal to forward to the next closest neighbors; these networking nodes do not have any knowledge about the network configuration database or the neighbor nodes' properties. These network nodes cannot perform a re-route when the desired network routing path stuck at their position with a neighbor node is disconnected during routing. A center network controller is required to build a route path with a series of routing nodes and let one node forward to its neighbor routing node until it reaches the destination node. The complicate machine networking nodes are the nodes that have knowledge of the network configuration database or their neighbor nodes' properties. These networking nodes can perform a re-route when the desired network routing path stuck at their position with a neighbor node is disconnected during routing. For complicate machine networking nodes, any nodes can be used to build and start a network route. The systems with these networking nodes can be built with Auto-Notify-Neighbors and broadcasting across entire networks for updating when a node is gone missing or a new node has been added into the network structure. For complex networking like Star-Tree eWeb topology network, network nodes can be mixed with both re-routable and not re-routable nodes; complicated machine nodes and simple forwarding only nodes. The G-ROUTING ALGORITHM is a promise for future of networking and routing algorithm with the Neighbor-to-Neighbors networking technology. Figure-1 shows the square network nodes layout which is similar to the Satellite StarLink network layout and Traffic Lights network layout. The network nodes are communicated directly to their closest neighbors; and they can only send and receive to their closest neighbor nodes. This layout provides a node can only have maximum of 4-neighbor nodes. Figure-2 shows the square network nodes layout plus diagonal lines which provides networking layout with some shortcut paths for faster routing networking system. The network nodes are crossed by diagonal lines having more neighbor nodes than others. The lines showing in the network layout can be direct connected or wireless in any forms but required reachable node-to-node or Neighbor-to-Neighbors only. The Neighbor-to-Neighbors networking technology is not just in square layout, but it can be in hexagon layout or any other layouts like Star-Tree topology layout or can be in Multi-layer Network Structure with local-to-local nodes and community-to-community nodes within the same network. Click this link The G-ROUTING ALGORITHM to check out the invention full document...
      Conclusion: The G-ROUTING ALGORITHM is fast and robust searching algorithm to find the best routes for the G-NETWORK layouts. The G-ROUTING ALGORITHM Methodology is invented with State-of-the-Art and invented to work with any other networks from simple networking nodes layouts to the most complicated machine networking nodes layouts. This algorithm and the G-NETWORK layouts are ready for the future of the 3-D networks or multi-layer networks, or cell structure networks like chemistry elements bonding networks. The G-ROUTING ALGORITHM Methodology is invented to support any networks in some geometry in G-NETWORK layouts. The G-NETWORK layouts are controllable and manageable and self-grown when new nodes are added into the network or nodes are removed from the network. The G-NETWORK layouts must be defined in form of Neighbor-to-Neighbors methodology for the properties of the neighbor nodes of each network node. The Neighbor-to-Neighbors methodology requires smaller database compare to other existing network routing database. When a node is gone missing or unavailable for any reasons, adding a new node into the G-NETWORK layouts is much simple compare to the existing networks and only requires Neighbor-to-Neighbors notification of network property changes. The G-ROUTING ALGORITHM is a promise for the future of networking and routing algorithm with the Neighbor-to-Neighbors networking technology. The Cloud OS – Operating System, Cell ëMap Live Updates System, and Emergency Traffic Lights Routing System inventions were intended to use the G-ROUTING ALGORITHM. The Neighbor-to-Neighbors networking technology provides the self-grown layout networks and can be more and more complexity and sophisticated in the manageable G-NETWORK form with multi-layers; only neighbor node knows its neighbor nodes. The G-NETWORK layout and G-ROUTING ALGORITHM provide the great secured and tied network than any other existing networks.
  10. INVENTION TITLE: Parallel Transforming Percentage (PTP) Theorem -- (U.S. Patent #: PCT/US23/77507 / International Patent #: PCT/IB2023/000611)
      
    Parallel Transforming Percentage (PTP) Theorem
    is introduced to solve some mysteries of geometry problems and help to build magnified objects or products easier in 2D or 3D parallel transforming geometry for lines, shapes and objects.
      introduced to solve some mysteries of geometry problems and help to build magnified objects or products easier in 2D or 3D parallel transforming geometry for lines, shapes and objects. The theorems: [1] - All spheres are parallel, and they are only different in form of percentage. [2] - All circles are parallel on the same surface or on other parallel surfaces, and they are only different in form of percentage. [3] - All lines, shapes, and objects are zoomified, are parallel transforming from its original, and they are only different in form of percentage. [4] - A line that parallels with a side of a triangle will divide the other 2 sides into the same percentage on both sides as well as its parallel side. [5] - A line that parallels with the bases of a trapezoid will divide the 2 sides into the same percentage on both sides, and this line is equal to the small base plus the parallel percentage of the difference of the 2 bases. [6] - Ellipse is a closed curve with the perimeter that divides all the chord lines of the outer circle with radius R that parallel with the fixed short radius r of the ellipse into the same percentage on each chord line for all the chord lines with the same percentage of r/R. [7] - The e-chords are the n lines adjacent to the n equal angles in a circle where n>2, are equal to 2 times of the circle radius multiply by sine of ꙥ/n. [8] - The e-chord shape with all n sides equal is the largest shape compares to other shapes with the same number of n chord lines that are not equal in a circle, and the shape with more e-chord lines has larger area. [9] - The rectangle in an ellipse which belongs to the e-chord square of the outer circle of the ellipse, has the largest area with the width equals to √2 multiply by the fixed long radius R, and the height equals to √2 multiply by the fixed short radius r of the ellipse.. Click this link The PTP Theorem to check out the invention full document...
      Sumary: The PTP Theorem The Parallel Transforming Percentage (PTP) theorem can be applied widely to calculate lines, surfaces and volumes for any shapes and objects relatively to its original one. The PTP theorem is applied in this document to find surface center and object center and to solve the mystery of ellipse which currently has incorrect definition of two focuses. We now can have short definition of ellipse, ellipse is a circle which rotates an angle on its plane. Beside the PTP theorem, I also proved other theorems to support the PTP theorem. One of these theorems solves the common misunderstanding of surface area verse circumference ratio. Circle is the magic shape which has infinite sides, and which ever shape that has ‘n’ sides equal (e-chord lines in its circle) always has larger area to circumference ratio compare to the shapes with the same number of ‘n’ sides not equal. This is also true for objects or 3D shapes with ‘n’ sides equal have largest volume than other objects with ‘n’ sides not equal; and sphere is the magic object with infinite sides, has largest volume to surface area ratio compare to other objects. This PTP theorem is not just for geometry, this PTP theorem also triggers for many great ideas from weight to density percentage, color mixer in percentage to create giant airplane start from a testable dimension. Based on the greatest size of an object, the PTP theorem will be applied as the numbers within 0 and 1, and 1 is 100%. And the measurement is based on percentage without using actual number and unit for easier and better calculating and transforming of multi-directional transforming. The multi-directional transforming will be more common and useful in the future to help computer simulations faster and easier.
  11. INVENTION TITLE: Auto Following Motion Security Camera -- (U.S. Patent #: PCT/US24/13660 / International Patent #: PCT/IB2024/000177)
      
    Auto Following Motion Security Camera
    is invented with State of The Art design to solve the existing security camera problems. We live in the world with high technology, and the safety and security daily is more concerned, more demand and critical in many cases. We need a security camera that can automatically follow and record a motion target instead of manually login to an app and control the cameras manually while most of us are not physically stay at the property every time, everyday. Figure-1: Auto Following Motion Security Camera - Overview The Auto Following Motion Security Camera in this invention comes with a horizontal moment step motor which can turn the camera left and right directions up to 360° degrees, and a vertical moment step motor which can turn the camera up and down directions with at least 60° degrees. The security camera would comes with light beams which light up when detecting motion either by software scanned image motion detection or physical photo sensors which are built-in with the camera. The security camera would have an option to support prerecorded alert sounds and support custom recording alert sounds or voice for better customized environment security areas. Figure-1 above shows an overview of Auto Following Motion Security Camera. The camera has enough built-in RAM memory to capture and save low video in resolution, in monochrome bmp mode every ¼ of a second for at least 15 seconds with circular buffering techniques. When the camera detects motion object, the Auto Following Motion Security Camera will turn on the light beams and scan the motion and capture in monochrome mode, then compare pixel by pixel with the previous captured mono-mode image. The basic motion scan algorithm which is provided in this invention will help to find the motion in rectangle, and the camera will turn and focus on the motion object to the center of the image as shown in Figure-1 the overview above. With this invention of the Auto Following Motion Security Camera, we will have better security camera system to protect our property, company, organization or point of interests. Protect property or point of interests is protect our society, protect our society is to make our society safer and more secured. So, this invention of new Auto Following Motion Security Camera is great for our society. Click this link Auto Following Motion Security Camera to check out the invention full document...
      Conclusion: The Auto Following Motion Security Camera is invented with State of The Art design to solve the existing security camera problems with high technology for more safety and security concerned to prevent dangerous situations in many cases. We need a security camera can automatically follow and Auto Following Motion Security Camera record a motion target instead of manually login to an app and control the cameras manually while most of us are not physically stay at the property every time, everyday. With this invention of the Auto Following Motion Security Camera, we will have better security camera system to protect our property, company, organization or point of interests. Protect property or point of interests is protect our society, protect our society is to make our society safer and more secured. So, this invention of new Auto Following Motion Security Camera system is great for our society.
  12. INVENTION TITLE: Wall Security Camera System -- (U.S. Patent #: PCT/US24/13663 / International Patent #: PCT/IB2024/000096)
      
    Wall Security Camera System
    is invented with State of The Art in mind to provide our lives more secured in many dangerous cases to instantly view and monitor outside views of the living rooms, bedrooms, offices, etc…, at anytime without having to open mobile camera app to check while the doors and the windows are closed and covered. This Wall Security Camera System is also intended to resolve the existing security camera system issues when the users have the security camera online account to view their motion events, but the video files could have been deleted by hackers, and lagging issue of delaying video notifications. This new security camera system invention provides the users with solid video recording files and quick delivery of alert event notifications. Figure-1: Wall Security Camera System - Overview The Wall Security Camera System can be provided with wire or secured wireless connection from the Wall Security Camera Viewer to the camera, and this system works great with my other invention “Auto Following Motion Security Camera” with auto following focus and target on the motion object. However, this system also supports existing camera without auto following motion feature. Figure-1 above shows a complete overview of the Wall Security Camera System with Camera Hostspot and mobile Security Camera App view. The Wall Security Camera Viewer supports external memory card which can be stored video files directly on this device locally, and the Wall Camera Viewer should able to use data file circular recording method to keep continually recording within the memory size without having to change the memory card. With this design, the Wall Security Camera Viewer can be in standalone and good for monitoring outside views within a room locally. The Wall Security Camera Viewer should able to support scanning for motion and alert. The Wall Security Camera System is invented in a complete security camera system included the Camera Hostspot which hosts the camera viewer and cameras. The Camera Hostspot can able to buffering video files for each camera and send motion alert photo frames to the Mobile Security Camera app via online storage and ready for user’s secured Cloud OS account video storage. With Camera Hostspot, we can able to view the alert quicker in series of photo frames captured during a defined motion timeframe before the users can view the complete motion alert video files. Click this link Wall Security Camera System to check out the invention full document...
      Conclusion: The Wall Security Camera System is invented with State of The Art in mind to provide our lives more secured in many dangerous cases to instantly view and monitor outside views of the living rooms, bedrooms, offices, etc…, at anytime without having to open mobile camera app to check while the doors and the windows are closed and covered. This Wall Security Camera System is also intended to resolve the existing security camera system issues when the users have the camera online account to view their motion events, but the video files could have been deleted by hackers, and the lagging issues of delaying video notifications. This is great security camera that could be used in a closed office or a closed room to monitor for any motion object while working in office or sleeping in the bedroom. The Wall Security Camera System is the great security camera system which provides directly and constantly monitoring outside views at anytime while seating or working inside the rooms.

My Next Inventions

  1. INVENTION TITLE: OH SMART Airport;
    OH SMART Airport
    invention will help to rescue the air planes stuck wheels can easily landing on the rescuer after the rescuer running on the circle rail reaching the same velocity of the landing air plane...OH SMART Airport will have wide open space with only the round building with diameter about 1Km, and the vehicles and cars will go under the ground level into the terminates H to get into the center-round building... Recommend for every aircraft should have Front & Back Cameras right in front and right in on the back of the front wheel respectively to help pilot view the moment of Takeoff and Landing on the ground better... This invention was resumed earlier this year after more than 2 years delay while working on other inventions and expect to be ready to submit by the end of the year...
    NOTICE: The Smart Airport will have Emergency doors for both travelers and visitors; and the Emergency doors will be secured and can only be opened with both sides agreement to open at the same time; The Airport Security Patrol will open the lock from outside and then both sides can be opened and required to open at the same time [and locked at the same time to have the doors closed]; this requires Airport Security personnel to be the last person on both sides to clear all travelers and visitors from the Emergency Path for security purposes in order to close the doors...
    View landing video clip: http://www.youtube.com/watch?v=vKo4Eee7V3s
  2. INVENTION TITLE: Emergency Cylinder Helical Stair; The Cylinder Helical Stair is the stair with a holdable pole at the center within a cylinder. This invention is part of the OH SMART Airport which is used for Rotatable Coffee shop & Air Traffic Control room with compact size within the cylinder. The Emergency Cylinder Helical Stair can have an option to support slidable without electrical power with one person per board. The board can be 1 feet width and within the side of the stair step and one side on the rail which is built attached to the cylinder and the other end attached (50+% to the center pole); and the boards can be stacked one on top another after the latch got trigger at the last step by the slide board and pushed down to stack up; and the board can be removed by hand from the upper level on the ceiling one by one which was pre-attached on the rail and the pole; and the stair can be setup by pulling up for next emergency later after electrical is on... However, this invention will be made separately to support consumer...
  3. INVENTION TITLE: Personal One Step Escalator; The Personal One Step Escalator is the vertical escalator with just one step (board) to get from one floor to another, and intended for personal use which means one person at a time and the escalator travel up/down using one step with buttons control. This invention is part of the OH SMART Airport which is used for the Air Traffic Control room with multiple levels option within the same room to allow Airport Control Personnels to get up/down to their level within the same room for better communication and to reduce space and building structure...However, this invention will be made separately to support consumer...
  4. INVENTION TITLE: SMART GEAR BELT CART Exchanger; The Smart Gear Belt Cart Exchanger system requires each cart comes with hook for Cart-to-Cart hook to connect together as a patch to roll up/down easier. The Cart Exchanger belt requires gears on top and each gear will roll the cart roll-bar which is built-in with the cart. The carts will slide on top of a surface (or a roller surface without motor); the motor requires for the Gear Belt only to hold-up and move the carts on the Gear Belt...
  5. INVENTION TITLE: Matrix Base Keyboard; This invention, which has been mentioned serval months ago and pasted as the last link on the main web page (www.TheCloudOSCenter.com), is the promise for the future of the Cloud OS computers to prevent hacking by Wireless Keystroke Logger...
  6. INVENTION TITLE: Dual Air Wheel; This invention, which has been mentioned serval months ago, is the promise for the future car wheels with rim and tire that supports dual air banks either with tube or tubeless which can prevent from flat. Dual Air Wheel will have 2 air banks, 2 air valves and 2 tire sensors for one tire/wheel; when one air bank side of a tire get flat we still have the other air bank side of the tire to drive...
  7. INVENTION TITLE: Transpond License Plate;
    Transpond License Plate
    invention will help vehicles, cars, trucks, motor cycles, etc... to equip with knot-transponders; each knot-transponder represents for a letter or a number for easier tracking vehicles passing by a gate or an entrance to identify the license plate number easier with the purpose of tracking for missing vehicles or pin point parking location with a smart parking system...
  8. INVENTION TITLE: One Round Chamber; One Round (360°) Chamber invention is the hard drives testing chamber that will help Hard Drive manufacture loading test drives in 360 degrees with multiple slot levels in vertical hard drives loading layout, turning one round and come back for another round with constant RPM (Revolutions Per Minute) for temperature/humidity in dynamic convection apply to the drives with at least 4 times loading capacity compare to the current common manufacture's chambers with only 1 loading side; This chamber will be used in the Cloud OS company for hard drive testing...
  9. INVENTION TITLE: Tall Building Emergency Spiral Tube Slider; Tall Building Emergency Spiral Tube Slider invention will help rescuing people in a tall building to escape faster instead of stair way when the elevators are out of power. Each spiral tube slider can be built around the elevator for saving spaces. However, the spiral tube sliders are recommended to built at the corners of the building for more safety purpose and for faster to get out the building in the worst emergency conditions. The twin towers in New York that were happened in September 11 of year 2001 is one of the biggest case to concern...
  10. INVENTION TITLE: Auto Following Target Network Camera System; Auto Tracking Target Network Camera System invention is the network of cameras which can be used in a crowed environment like airport, to help the security officers tracking a selected target with auto tracking and following the target from one camera to another and display in one monitor with information of the current camera number and location...
  11. INVENTION TITLE: Robot Medical Doctor;
    Robot Medical Doctor
    invention (a 20 years idea) will apply machine learning to help patients for regular checkup with more comfortable interactive with Robot Medical Doctor for any health conditions...
  12. INVENTION TITLE: Color Code Fiber Optic;
    Color Code Fiber Optic
    invention will use center phototransistor reader in a bike-cycle-wheel model with the perceptive phototransistors around...
  13. INVENTION TITLE: Touch Slide & Landing Board for Aircraft Carrier[☆]; with the Touch Slide & Landing Board for Aircraft Carrier, the aircraft landing in an angle, and touching the angle slide-landing board, then sliding on a railroad with gradually wider on other end and eventually stop at the other end with higher friction on the railroad with spring protection to help the pilot from shocking or rebounding force... Additional add-on the Rolling Accelerator Board to support take-off (fly-up), this Rolling Accelerator Board which rolls faster then the aircraft (normal take-off) velocity with the same direction of the aircraft fly-up will help accelerate the aircraft fly-up faster in a shortest distance as possible... Recommend for every aircraft should have Front & Back Cameras right in front and right in on the back of the front wheel respectively to help pilot view the moment of Takeoff and Landing on the ground better... This invention will be submitted for patent by the end of the year expectedly. View airplanes crashed on Aircraft Carrier video clips below...

    Video-1: http://www.youtube.com/watch?v=UOQ-ypLDZmo&t=309s

    Video-2: http://www.youtube.com/watch?v=0cs73p2T9FY&t=6s
    .

My Theory, Theories & Theorems

  1. Parallel Transforming Percentage (PTP) Theorem:
    The theorems: [1] - All spheres are parallel, and they are only different in form of percentage. [2] - All circles are parallel on the same surface or on other parallel surfaces, and they are only different in form of percentage. [3] - All lines, shapes, and objects are zoomified, are parallel transforming from its original, and they are only different in form of percentage. [4] - A line that parallels with a side of a triangle will divide the other 2 sides into the same percentage on both sides as well as its parallel side. [5] - A line that parallels with the bases of a trapezoid will divide the 2 sides into the same percentage on both sides, and this line is equal to the small base plus the parallel percentage of the difference of the 2 bases. [6] - Ellipse is a closed curve with the perimeter that divides all the chord lines of the outer circle with radius R that parallel with the fixed short radius r of the ellipse into the same percentage on each chord line for all the chord lines with the same percentage of r/R. [7] - The e-chords are the n lines adjacent to the n equal angles in a circle where n>2, are equal to 2 times of the circle radius multiply by sine of ꙥ/n. [8] - The e-chord shape with all n sides equal is the largest shape compares to other shapes with the same number of n chord lines that are not equal in a circle, and the shape with more e-chord lines has larger area. [9] - The rectangle in an ellipse which belongs to the e-chord square of the outer circle of the ellipse, has the largest area with the width equals to √2 multiply by the fixed long radius R, and the height equals to √2 multiply by the fixed short radius r of the ellipse. Click here to view detail of the theorem.
  2. Light Through Medium Theory #1:
    “The light itself cannot produce any colors, only the medium which contains color atoms that the light goes through can produce colors.” Click here to view detail of the theory which has been posted here in Facebook.
  3. Light Through Medium Theory #2:
    “The photons go through the medium which contains color atoms will carry colors with them to become color photons.”
  4. Heat & Spark on Touching & Sliding Theory: “When two or more objects in the same environment or same electrical potential are touching or sliding on each other with scratching of material, the heat will be generated or electrical sparks may happen.”
  5. How the Earth rotates and spins around the Sun in the Universe:
    The Earth rotates 1 revolution per day, and spins around the Sun 1 per year.
    "Your shoes weight almost or equal to 1 (one) Kg, but the Earth weights almost or equals to 0 (zero) Kg." -- Henry V. Pham
    We live on earth, and the earth planets branch is just part of the Universe which spins around the Sun. How can we see the stars at night? The Earth spins around the Sun once per year, and the stars at night we see the same every seasons... We live in this Universe in a close-universe container with Neuclear Radiation Protection, and the entire container spins around, then the entire Earth branch we live in spins with the close-universe container. There could be giant Quantum Neuclear power out there spins the entire our Universe. The Sun with full of Neuclear power and closer to the Earth in summer time, and the Sun with less Neuclear power and farther to the Earth on other seasons. And the Earth spins with the close-universe container through 4 corners to have 4 different seasons. So, are there giant real physical Gods, which we call the Heaven, working to keep the entire Universe running? Most likely! We are the lucky human living on Earth, the perfect planet for human that the Heaven gave it to us! And there are people on other planets that may already visited the earth like we have heard, UFO, and could be more...
    Click here to view our Universe Quantum Mechanism Model...

My Social Media Posts

  1. Light Through Medium Theory #1:
    “The light itself cannot produce any colors, only the medium which contains color atoms that the light goes through can produce colors.” Click here to view detail of the theory which has been posted here in Facebook on 2023/07/31.
  2. Immediate Family Members Circles:
    “The circles of immediate family members.” Click here to view detail which has been posted here in Facebook on 2023/03/11.
  3. iQuote - Poverty:
    “Poverty is just a challenge!” Click here to view detail of the theory which has been posted here in Facebook on 2022/04/07.
  4. iQuote - Everything must come at a day:
    “Chicken egg takes many days to hatch. Fish dead takes many days to reek... Everything will come at day!” Click here to view detail which has been posted here in Facebook on 2022/09/20.
  5. iQuote - Worst shortcoming:
    “Wostest of your shortcoming is 'hiding shortcoming'!” Click here to view detail which has been posted here in Facebook on 2023/04/07.
  6. iQuote - Fortune & Happiness family:
    “Fortune relies on Daddy! Lovelife relies on Mommy! Unified the family together! Create one happiness family!” Click here to view detail which has been posted here in Facebook on 2022/03/28.
  7. iQuote - Want to be greater:
    “Want to accomplish great job, first you have to accept the fact! Want to be greater than others, first you have to accept yourself! When you've completed great accomplishment, then you can realize your ability! When you have no shortcoming, then you know you are greater than others!” Click here to view detail which has been posted here in Facebook on 2022/03/17.

The References

    About my Applications

  1. ZFilePackager application:
    ZFilePackager application
    is the Java zip application with high secured encryption of 4K Number Encryptor to make it impossible to revert engineer to user's zip passwords. Password and Magic Number will go through the sequence of the 4K Number Encryptor (the 4K Password in short word). Note that this is Java application and it needs to run with JRE (Java Runtime Environment), please check your Windows system for JRE installed by open Command Prompt and type 'C:\>java -version'. If your Windows system does not have JRE installed, then go back to the main page and look for the banner "Download & Install Java JRE to run Java Application". The ZFilePackager application can be downloaded from the main page, then unzip to a 'C:\' folder (recommend folder name without spaces) and look for file name ZFilePackager.jar, you can double click to run this application...
  2. The G-CODE Utility application:
    G-CODE Utility
    is the Java application utility to allow the users prepare text data files in random or sequential alpha-numeric to generate G-CODE Labels, G-CODE Product Icons or G-CODE Profiles. This is also a Java application and needs JRE to run...
  3. The G-CODE Creator application:
    The G-CODE Creator
    is the Java application which uses to generate G-CODE Labels, G-CODE Product Icons, G-CODE Logos and G-CODE Profiles. This application is still hold as private and protect from hacking while waiting for International Patent Certification of the G-CODE Invention...
  4. HackedProcessKiller application:
    HackedProcessKiller
    is the Java Windows application for "Windows 10" helps users to kill hacked processes to prevent their Windows PC from hackers. This application is required to run with command line under Administrator mode or set this app to run in System Task Scheduler when login into the Windows System. This application can be downloaded the unzip to a 'C:\' folder (recommend folder name without spaces) and look for the batch file to start the application in Administrator command prompt 'StartHackedProcessKiller.bat'. When running this app and suspect a hacked process, be sure to try option '(1): Kill the selected process one time!' from the right-click of a selected process in the 'green color Windows process table' and make sure this process is killed without crashing (If your system crashed, it will restart and backup with this option. You can copy & paste the selected suspect hacking process somewhere or write it down...). Then, next time this process comes back again you can use option '(2): Kill the selected process repeatedly when it comes again!'...
  5. File Revisions Control application:
    File Revision Control
    is the Java application applying the
    UIX COM-VEC-CIR Software Model
    with the 4K Password which is intended to replace SVN, CVS, Bitbucket, Git, or any other source control or file revisions control applications for higher secured encryption with the new 4K Number Encryptor which has been used in the ZFilePackager application (4K Number Encryptor is intended to replace the MD5, SHA-256 or any other existing encryptions). ...

    About my other small inventions, designs or concepts

  1. The UIX COM-VEC-CIR SW Model:
    The U9 Common Vector Circle Software Model
    provides 360° of derivative vectors for each modeling circle. Developers will have a complete software modeling with more clean code and easy coding maintenance from small to larger infrastructure software architecture development...[1]Controllers: -> Events/Actions Controls; [2]Observers: -> Events/States/Monitors of data/objects/components Observers.; [3]Models: -> Data Models.; [4]Views: -> UI/Console Display/Data Output...;[5]Error-Handlers: -> Handle hardware/firmware/software/IO errors.; [6]Conditions: -> Error conditions, Permission conditions, etc...;[7]Components: -> HW/SW components.;[8]Interfaces: -> Defined common protocols.;[9]Reporters: -> Report data, actions summary, customer choices, etc... This UIX SW Model is a promise for the future of world infrastructure of Software Architecture which can be used for machine learning for coding generation. This universal model also applicable for hardware or firmware for smart system
    UIX COM-VEC-CIR Hardware/Firmware Model
    , the Universal 9 Common Vector Circle Hardware/Firmware Model...
  2. The USC-LI Table:
    The USCLI-Table
    is intended to replace the current traditional
    ASCII table
    by the new USC-LI table (Unified Standard Code Language Information table) which supports all languages around the world with markup tags for Language Codes & Language Fonts, plus pre-translated common phrases codes and common symbols/icons codes. The current ASCII Table is only used English characters with many unused symbols with the same total of 256 characters of 1 byte value. The new USCLI-Table replaced the unused characters in ASCII table by other Latin characters with markup tags to support all current UTF-8, UTF-16 or UTF-32 or can be redefined with new language codes for non Latin languages. The new USCLI-Table keeps the same English character values from ASCII table (Example: 0-9;A-Z;a-z with the same hexadecimal values 0x30-0x39;0x41-0x5A;0x61-0x7A) for easier converting from the existing documents to the new Cloud OS literal language with minimal changes in software...
  3. The In-Cloud OS Passwords Recovery:
    The In-Cloud OS Passwords Recovery
    provides the users with the secured tool with an option to recover their applications, other secured services or encryption passwords features like the ZFilePackager applications or any secret keys that the users want to keep as secret within their Cloud OS account, etc... Keep in mind that the Cloud OS account passwords itself does not provide passwords recovery for security purposes, and because the Cloud OS authenticate the user passwords in several sequences and the raw-passwords will be transformed into the 4K Number for high secured purposes. However, when the user create a Cloud OS account, the Cloud OS will provide an option to have one Initial Password & one Unlock Password to keep as a key-pair passwords to unlock the account when the account is in suspended or locked mode. This Passwords Recovery feature will help the parents a secured method to save and to recover their children's passwords in this secured tool to prevent someone else peeping of full passwords display; This feature is also useful for organization and company...
  4. The Image 4K Number:
    The Image 4K Number
    can be used for Cloud OS mobile devices login to support on the road login. Each image will go through the sequences of the 4K Number Generator and the Cloud OS will use this 4K image number to represent for that image...
  5. Prevent Hacking By Keyboard:
    Prevent Hacking Input Keyboard Concepts
    Keyboard can be built with foldable Configurable Matrix Base Keyboard Concept to allow the users configure single key signal to prevent from key stroke logger by keyboard. However, Cloud OS will support handwriting with handwriting recognition for only the user of the Cloud OS account for more accurate and more secured. Cloud OS will also support pen mouse (stilus) which can be used to write the login passwords on the table without ink (invisible) to login...
  6. Others: There are lot more ideas and features and already defined in my Cloud OS guideline like the new Cloud OS Email application with better layout and email rules and policies. The email address in new form <"First.Last">@ë<"CityName">.mail, <"First.Last">@ë<"Company">.mail, <"First.Last">@ë<"Organization">.mail, and share box <"First.Last">@ë<"CityName">.βox, <"First.Last">@ë<"CityName">.βox, <"First.Last">@ë<"CityName">.βox; The company or organization can be '.com', '.net', '.org' or anything else but not '.mail' and '.βox'. Other applications like Language Writer, Language Reader, etc...
  7. MATHEMATIC REFERENCES:
    The Universe Equations
    Click the link to view more about the Universe Equations which is expanded from the problem solvation from the book
    THE DIOPHANTINE EQUATIONS by: Ran Van Vo (Click to download PDF file)
    which has been provent and solved by Ran Van Vo. His works are more than just the diophantine equations/problems solvations, he also proved the
    Last Fermat Theorem
    and
    Beal's Conjecture
    ...

----------------☆☆☆☆☆☆☆☆☆----------------
Email: [email protected] -- for details!
☆☆☆☆☆☆☆☆☆ END OF DETAILS ☆☆☆☆☆☆☆☆☆

Revisit main websites for more information!
www.TheGCODECreator.com | www.GCODE-Creator.com
  www.TheCloudOSCenter.com | www.TheGreatestDrive.com
www.ThePatrolCircle.com


[Last updated: 2024-06-05 -- Henry V. Pham]

Copyright© 2021[⨢] by www.TheCloudOSCenter.com. All Rights Resevered.