You are on page 1of 16

Unique P-Mail Addressing

CEC, CHIRALA

Page 1

ABSTRACT

Technology can be utilized for learning in many ways. The modern way of learning integrates Internet technology. We should provide still more security to the Internet applications and we should improve the standards. For development of Internet in INDIA first of all we should make the people to be aware of this concept. As an Internet application developer we should implement new reforms and new technologies useful for the present day world Moreover the Internet in INDIA is facing a lot of problems like it is being hacked by intruders and many problems. To overcome these problems, we have to find a new way for providing security. So, we have introduced a concept of P-mail systems (Personal mailing systems) i.e., at the time of birth of a child a small chip will be inserted into the brain of a child and that chip will take care of all the activities done by that child. For this a unique ID will be allotted to the child and so that may not be hacked by anyone. As a password the Fingerprints or retina scan or heartbeat is used. Thus, this technique will be very useful in providing the childs secret activities when he grows up i.e., they will be hidden. Now, our paper discusses all the things about the concept in detail and advantages of this system and many more

CEC, CHIRALA

Page 2

INTRODUCTION
Internet is a worldwide system of interconnected computer networks. The origin of the Internet can be traced to the creation of ARPANET (Advanced Research Projects Agency Network) as a network of computers under the auspices of the U.S. Department of Defense in 1969. Today, the Internet connects millions of computers around the world in a non-hierarchical manner unprecedented in the history of communications. The Internet is a product of the convergence of media, computers, and telecommunications. It is not merely a technological development but the product of social and political processes, involving both the academic world and the government (the Department of Defense). From its origins in a non-industrial, noncorporate environment and in a purely scientific culture, it has quickly diffused into the world of commerce. The Internet is the worldwide, publicly accessible network of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP). It is a "network of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked Web pages and other documents of the World Wide Web. This type of technology that we are using today is facing a lot of problems on the following aspects: The Security level is not up to the mark. A person can have more than one mailing account. A big problem if we have to remember numerous passwords and Ids. Person has to carry Mobiles or laptops for communication. To overcome these problems we have introduced a new concept called Unique P-mail Systems. The technologies that would be used in these systems are Embedded Systems with Digital Signal processing & Biometrics Identifications. Since the previous technology focused on the identification, the future technology would also reflect our identification

1. The name Internet


CEC, CHIRALA Page 3

Internet is traditionally written with a capital first letter, as it is a proper noun. The Internet Society, the Internet Engineering Task Force, the Internet Corporation for Assigned Names and Numbers, the World Wide Web Consortium, and several other organizations.

CEC, CHIRALA

Page 4

2. Concept of P-mail Systems

According to the concept of P-mail systems at the time of birth of a child, a chip in the form of a molecule would be inserted in the new born child. This chip would be directly connected to any of the main nerves that would be controlling the brain. This chip can be accessed by means of satellite. It allocates a UNIQUE name or number to that child called P-mail address (Personal Mail Address), which would be his identification code similar to his name.

Micro Chip placed in Brain of a new born child.

3. Analysis
CEC, CHIRALA Page 5

In our large solar system many satellites revolve around the earth all the times. The satellites that revolve around the earth 24-hours have the total control over these chips. The collected information from the chips is collected by the satellites. As the person grows, the chip has to be changed once in every 10 years since the capacity and capability of the person changes. The chip doesn't have their own memory but utilize the registers present in the Brain. The up to date information will be stored in the registers of brain.

The Capacity and Capability of chip increases as the Human Brain increases.

The information collected by satellites will be stored in the registers of the brain. All the activities that are to be performed by the person will be recoded within the system and guides the user always in every aspect. This process will be done by using the chip present inside the brain. As the chip also has a lifetime it should also be recharged for every 10 years. Already it is known that the size of chip will be increased for every 10 years, so it is to be recharged. The satellites will be accessing the information in the chip as shown.

CEC, CHIRALA

Page 6

Satellites revolving around the earth taking the information from the chips.

As shown in the figure all the satellites take information from well designed chips and deliver an appropriate response to the user of the system. In this way, the entire system works. The chip is embedded with an internal software which has many specifications. The tasks that are to be performed by the chip will be discussed in further part of the paper.

4. Assigning P-mail Address


CEC, CHIRALA Page 7

According to the concept of P-mail systems, a unique name or a number will be assigned to the person. The name may contain alpha-numeric values. The format of the number is as follows: User ID: INDAPEGRJY1616 From the above user ID it is clear that the first three letters represent the country name i.e., INDIA. The next two letters determine the state name i.e., AP, Andhra Pradesh, then comes the district name i.e., EG, East Godavari the last alphabet characters gives the city name i.e., Rajahmundry. Finally, the last 4 numbers render the code of a particular person. In this way, the P-mail address will be given to a particular user and he will be identified with that ID. Now, we need security for that so, password is needed, but there is a great problem with passwords is that it may be hacked and leads to change in information which results in abnormal conditions. So, considering these problems with passwords, on behalf of passwords, we use finger prints of the particular person. This will be more secure way to identify a person as no two finger prints will match each other. By this way of using finger prints the security enhancement is achieved. The user ID and password are as shown in the figure. User ID: INDAPEGRJY1616 Password:

Assigning a password to a particular user in the form of finger print. Thus a unique identification number and a password will be given to every person.

5. About chip
CEC, CHIRALA Page 8

The chip plays a very important role in the concept of P-mail systems. The chip will be having embedded software that performs the following tasks in an efficient manner. They are as follows. Internet is the only way by which we are completely connected

with the world, by using the P-mail address. Global Positioning System permanently activated. No need of carrying any cell phones, lap tops only for the sake

of communication. body. The heck of remembering ID and password has been avoided. Passwords cannot be hacked because they are the parts of our

Through this chip, we have many more advantages. At first we get rid of passwords being hacked as they now become the parts of our system. With the help of this system, a new advantage called global positioning is achieved. By this global positioning it is well informed that a person need not be static and can move of his own way. This is also an added advantage for the chip. The chip also contains a GPS system . the GPS system is accessed through many devices. Here, we produce a small GPS device used for GPS services.

CEC, CHIRALA

Page 9

An example device that we would use for locating ourselves around the globe.

The famous and most well known GPS device that we knew is the cell phones. Now-a-days, the cell phones are also being replaced by new devices as shown in the figure below.

New devices replacing cell Phones

As we are using GPS services for accessing Internet, we can also use the above shown GPS device. It also has an advantage that we can see our mail box without a computer or a laptop even. All the things will be appearing on our palm only. The system is as shown.

CEC, CHIRALA

Page 10

Accessing Internet and checking mails on our palm only

This Example Shows How we can directly read our mails without using computers, cell phones or any other devices. Since the built in camera generates the hologram image on the hand itself.

CEC, CHIRALA

Page 11

6. Security Enhancement
The ID allocated to a particular person is unique, so there are various passwords. Now let us assume that Fingerprint can only be accepted after 10 years, then what about the remaining life time, so we have to find an alternative way for providing security this has been an enhancement in the security. So, we can use different kinds of password identification techniques such as Retina Scan, Heart beat/minute, Face Recognition or DNA tests. The pictures of some of these techniques are shown below..

Initializing Retina Scan

Password Authenticated

CEC, CHIRALA

Page 12

Initializing Heart Beat

Password Authenticated

CEC, CHIRALA

Page 13

7. Advantages
Since the chip is directly connected with our brains the data which we need can be found out easily by using our replaced Mobile devices. The data which we are searching can be structured perfectly and send to the satellites through which we obtain Filtered Results. We would be provided with only one Mailing System, Mail ID and an exclusive password. By using the above mentioned System we are provided with many more advantages such as:: Banking P-mail ID is our Account Number. ATM cards are not necessary. Residential proof for legal formalities is not necessary, since the Chip has GPS facility. Passport is pre installed in the Chip. Driving License is also updated in Chip.

In future, the computer will also be changed and will be as follows.

Future computer

CEC, CHIRALA

Page 14

Conclusion
In todays life Internet plays an important role in every aspect of our life starting from mailing to very very large businesses. So, it is very essential to learn it in a more effective way and also motivate all illiterates about this. The above discussed concept of P-mail systems also plays an important role in human life. It exclusively takes care of all the activities done by the human in his lifetime. This application may not be working this time but it is an Internet application in the coming future. Seeing all these evidences we finally conclude that in the next generation, it is sure that Internet is everything and everything is Internet.

References
CEC, CHIRALA Page 15

1. http://www.ctnetwork.org 2. http://world.std.com/~walthowe/ 3. http://netways.shef.ac.uk/index.htm4.http://www.science.widener.edu/~wither


s/pyramid.htm

4. ftp://ftp.uwashington.edu/public/Internet

CEC, CHIRALA

Page 16

You might also like