Thursday, November 01, 2007

New Inventions with Patent Application Pending

Chrysanthemum
("Kiku" in Japanese but not "kurisansamamu"; Le chrysanthème)



New Inventions with Patent Application Pending
(Nouvelles inventions avec demande de brevet en suspens)



I have some ideas for invention of useful hardware and software products:

(1) A New Mode of Watches and Clocks

Background of Invention:

Current mainstream watches and clocks are of course to tell a user an hour, a minute, and a second of a day with auxiliary display of a day of the week and a day of the month.

But, there are many old citizens who cannot instantly recall what day or date it is, thus feeling embarrassed or making others embarrassed.

My new mode of watches and clocks display a day of the week and/or a day of the month as its main indication with auxiliary display of an hour, a minute, and a second of a day.

There are various ways to indicate a day of the week and a date as its main information on the surface of a watch and a clock.

In a case of a digital watch or a clock, a text indicating a date can occupy the full surface of the watch or a clock.

In a case of an analog watch or clock, letters meaning days of the week and dates of the month will be put on the surface instead of the numbers indicating hours, 1 to 12, to be pointed at by the hands of a watch or a clock.

Claims and Details of Design:
(not to be disclosed here, but an example of the surface of a new mode of watches below presented)


(For your reference:
http://www.nawcc.org/museum/nwcm/MusMap.htm ;
especially about evolution of Japan's clock technology:
http://www.nawcc.org/museum/nwcm/galleries/asian/asian.htm )


(2) A New Internet Protocol

Background of Invention:

When US Defense Department invented this telecommunications protocol, they did not take into serious consideration an intervention by a spy, a use of false identity by a criminal, or a need of confirmation of Internet users, since anticipated users are all military staff well identified situated in a well identified location.

But, as the Internet was made publicly and commercially open, millions of spies, criminals, terrorists, traffickers, drunks, people full of mischief and malice, and irresponsible and immoral people are now using it.

A law enforcement agency in any country desperately needs to get their identification and location in order to prevent damages to a government, legitimate business, and ordinary citizens and also to stop an act of terror.

Now, a new Internet protocol should be introduced at two spheres: one for communications among routers and other public network equipment; and another for computers, cellular phones, and other user equipment.
( http://www.profitgate.net/webchart.html )

The key is mandate preservation of record of the originating PC's IP address and those of routers at each node and gateway in each field allocated to such an address in the data structure of every packet or a whole communication data unit to be sent from a sending PC to a receiving PC or a server.

And, if any router working as a gateway for a PC to be connected to the public Internet lacks this function or fails to add the address information of its client PC to a received packet, it should be disabled, excluded, or rejected for connection by other routers in the public Internet. The second router that has received data from the first router, which is directly communicated with the originating client PC, must also add the address of first router to a received packet of data and transferred it to the third router.

This sequence must be continued until a destination PC receives the packet of data sent by the originating PC.

So, one packet must have several or scores of additional fields to record every IP address of a PC and routers that handle and forward the packet.

However, with an increase in transmission speed and capacity of a PC and a router, this must be technically and economically practical and feasible.

Consequently, a mail-receiving or site-connected PC can get information on where its receiving data or its connected site was originated and passed through.

When anonymity is needed, a different scheme shall be authorized and introduced on a contract base between a citizen using the Internet and his/her contracted service provider.

The point is that at least every router, server, or communications equipment working as a gate way to or a node in the public-domain Internet should be globally and clearly identified, authorized, and monitored based on an additional protocol over the normal IP protocol opened for users and consumers with the focus on preservation of full and correct IP addresses of network entities involved in any single communication sequence of data.

Claims and Details of Design:
(not to be disclosed here, but examples of the Internet system message on a user PC below presented:
"This mail has been sent from a PC with an (permanent or temporary) address xxx.xxx.xxx.xxx via authentic routers with addresses yyy.yyy.yyy.yyy, zzz.zzz.zzz.zzz, and nnn.nnn.nnn.nnn, respectively."

"This Web site message has been sent from a PC with an (permanent or temporary) address xxx.xxx.xxx.xxx through authentic routers with addresses yyy.yyy.yyy.yyy, zzz.zzz.zzz.zzz, and nnn.nnn.nnn.nnn, respectively."

"This Web page is stored in a server with an (permanent or temporary) address xxx.xxx.xxx.xxx where you are connected over authentic routers with addresses yyy.yyy.yyy.yyy, zzz.zzz.zzz.zzz, and nnn.nnn.nnn.nnn, respectively."
)

Note: A geographical location of any router in the Internet public domain must be registered in and known to a law enforcement agency and must be shared globally by all the governments.
* * *


Jesus Christ never used a watch and the Internet as well as a PC or a cell phone.

Therefore, it is apparent that we have to discuss how to be His follower while using a watch and the Internet as well as a PC or a cell phone.

Indeed, the more you are given, the more you are requested to contribute to the society.

Truly, if you do not have this faith, benefits from what you are given and thus possess will be taken away both materially and spiritually, since they are of no use for you.



(Now, I have to consult a clock and get ready to post this writing to blog through the public-domain Internet for you, yes for you all.

Indeed, the system is now being used to be a follower of Jesus Christ.

Truly, I am not making money but spending money in this practice for victims of the amnestic syndrome and Internet crimes.)



"...Wild animals were there also, but angels came and helped him..."

(Er lebte mit den wilden Tieren zusammen, und die Engel Gottes versorgten ihn.)