Don't miss

Dot ,star ,Hash coded language(.*#) © Dexter





(.*#)DOT,STAR,HASH CODED LANGUAGE
The subject of the invention is dot,star,hash coded language. The subject of the invention may also include a procedure in connection with the application or production of the invention. 

Generally we use a us language like key English keywords so i think a secure coded language provide a high level security to code our information
The purpose of the invention is to eliminate the faults of known solutions. Purpose of the invention is that to secure data and information Dot,star,hash coded language is a high level language using this coded language you can easy to encrypt your data .
The inventive step is based on the recognition that the implementation of claim 1 may result in a solution that is more advantageous than the previous ones. Idea of the invention is that secure the information a high level security provide our users and our system a code language provide a secure platform to us for communication.
According to the purpose, the most general implementation form of the solution according to the invention is described by claim 1. The various implementation forms are described by the sub- claims.
The invention is presented in more detail through drawings of the implementation forms.
Figure 1: Dot,star,hash coded language

Gobtech

Figure 1:
Coded language describes phrases that are targeted so often at a specific group of people or idea that eventually the circumstances Coded language provide a secure way of communication.
English hindi php, c language but our method much secure .
1 A . a
2 B .. b
3 C ... c 
4 D …. d
5 E * e
6 F *.f
7 G *.. g 
8 H *… h
9 I *…. i 
10 J ** j 
11 K ** k
12 L **.. l
13 M **… m 
14 N **…. n 
15 O # o 
16 P #. p 
17 Q #.. q
18 R #... r
19 S #.... s
20 T #* t 
21 U #*. u 
22 V #*.. v 
23 W #*… w 
24 X #*…. x
25 Y #** y
26 Z #**. z 
Dot (.) = 1 
Star (*)=…. 
Hash (#) = *** 
Add comma before the code to make small later
 Example 
Deepak = ….,*,*,#.,;,**. 
D= … 
e=* 
p=,#. 
a=.
K=**.

 To encrypt your details a secure method to use a coded language Dot, star, hash method have high level security Developed By :- Er Deepak kumar tandan.
Just apply dot,star,hash to code your information Dot (.) = 1 Star (*)=…. Hash (#) = *** Add comma before the code to make small later Example Deepak = ….,*,*,#.,;,**. D= … e=* p=,#. a= K=**. To encrypt your details.
Dot,star,hash coded language is much secure. coded language provide a secure way to communication. coded language provide a high level banking platform. .
To encrypt your details a secure method to use a coded language Dot, star, hash method have high level security .


CLAIMS
1.Dot,star,hash coded language, comprising: characterized in that a high secure language a coded language to provide a secure platform for users a secure method for banking.
A patent is a contract between the state and an inventor; and care must be exercised to see that both are treated fairly. If this policy is interpreted to limit the scope of the inventor’s claims, he would not receive adequate legal protection for the contribution he is making to the promotion of science and technology. On the contrary, further experimentation by others is discouraged if the patent claims are made very road and there is no method of checking liberal interpretation of claims leading to monopolization of the art unfairly. This in turn would violate the general purpose the patent laws, which are primarily designed to promote the progress of science rather than to reward the inventor.
An invention is protected through claims in a patent which precisely define what the invention is. The claims and the claims alone construct a fence around the patented invention to avoid its unlawful use. It may be noted that legal protection is awarded only to what is included in the claims and the matted not included is open to public for creating new inventions. It is necessary to understand the meaning and scope of a patent’s claims in order to determine whether a proposed course of action would constitute an infringement or whether it would enlarge the scope so much that the interest of the state is jeopardised. As a great deal in decision making would depend on how one constructs claims, the language of claims assumes a very important place.
A factor which may affect the interpretation of patent claims is prior judicial definition of terms or expression appearing in the claims. Where the terminology of a patent claims may be susceptible of various interpretation having more than one definite meaning, it may be found that courts have been confronted, in earlier cases, with the problem of interpreting the same or similar language. In addition, the courts have also developed over the years a number of general rules for interpretation of claims. Unfortunately, the rules may vary from one court to another court. The general rule, however, is that patent claims, unless limited by patent office proceedings or by prior art, or by judicial determination, are to be construed literally. It is the opinion of some courts that a patentee is bound by the language and terms of his claims.

"Preferably": The word suggests that the component or condition to which the word relates is optional, not essential or not necessarily effective in changing the result to a degree constituting a different of kind. In the absence supporting data, ‘preferably’ may destroy the criticality of the feature. For that reason, it is sometime desirable and possible to replace the word,



ABSTRACT
Dot,star,hash coded language.
The subject of the invention is: a high secure language a coded language to provide a secure platform for users a secure method for banking.




Read more :- Holeless-phone

No comments

comments..