top of page

METHODS​

Using patented research findings and methods is the way by which NGO “Unity DEN” pursues its high goals. The methods are developed by teams led by Prof. Jivko Jelev - scientist and inventor with numerous international awards and authority.

His ideas are inspired by archaeological and historical artifacts, national traditions and esoteric knowledge. The various applications of the methods are the resource base for the development of the projects and activities of the organization. The methods developed combine cryptology, steganography, high and nano-technologies.

 

SAVING INFORMATION IN THE EMPTINESS 

 

This method is recognized as a world class innovation with an independent life cycle. It applies the principles of steganography and stochastics, higher cryptology and nanotechnology in combination with other high technology. As a result, a unique protection in three dimensions is achieved: visible macro, micro and nano level, with no direct analogue.

It is recognized and highly appreciated by over 450 experts worldwide with competitive advantages associated with qualitatively new possibilities for recording a huge amount of information.

ESSENCE

 Currently the widely applied digital method of recording information allows two options for a description of the item indicated by the number 4 in Figure 1, with coordinates in a plane:

 

 

 

 

 

 

                  

Fig. 1. Scheme of digital recording of 1 and 0

 

The alternative is a record, containing information about the location of the same point relative to the remaining 9 holes depicted in Figure 1. Therefore, item 4 would

have a lot more possible positions. The holes may be of different depths, wherein the description

of the point is done in three-dimensional coordinate system, ie axis z, as indicated in Figure 2. When creating a marking with embedded code formed by 10 holes (FIG. 1) 3,486,784,401 possible combinations are created (Fig. 2).

Changing the shape of the hole and its rotation in space significantly increases the number of possible variations. For example, the hidden combinations in number encryption is (9!)18, while in image encryption they reach (9!) 400. The method improves the classical model (Figure 1), created by John Atanasov using multivariability (Fig. 2), multiplying the entity.

 

 

 

 

 

 

 

 

 

 

 

 

 

Fig .2 Illustration of multivariability of the location of  point 4 and the type of its shape

 

Marking is done by laser engraving or laser micro-perforation. The offset of the spatial coordinates of the holes along the axes "X" and "Y" implements two levels (degrees) of protection incorporating hidden numbers (codes).

They further personalize the security of documents or goods.

This way we are able to embed hidden information by displacement of coordinates of any given hole or symbol from their stationary values.

For example, details about origin and quality stand behind the visible image of the numbers on the label. This allows the creation of qualitatively new encrypted tag of new generation.

 

 

 

 

 

 

 

 

 

      

 

Fig.3 Image of encrypted marking

 

We solve the problem with forgery and the exact copy of a protection through one unique personalization of the of marking using a code from the material, unlike any widespread current protections (shown in Figure 3), which can easily be forged not to mention that the RFID chip(3c) electromagnetically pollutes the environment. The material that bears the mark – the material on which engraving is done, has a specific microstructure, similar to human fingerprints, which are unique for each individual. This method generates similar unique prints (images) on the material. After the multilevel protection is done, some of its elements are scanned and recorded by high resolution devices. Even though the protection is applied on the same material, the structure of the material around each hole or engraving is different and is formed in a different manner:

 

       

 

 

 

 

 

 

 

Fig.4 Images from two neighboring holes on a paper, at a distance 0.2 mm from one another

 

The microstructure of the material can not be copied or duplicated, and therefore differentiates this protection with all other known methods of marking.

The specific built in information, for each level and for each individual object of protection is generated and provided by different sources that are independent from each other (manufacturer, trader, controlling body or other institutions, etc.). The connection and relationship between the visible image (information, number, etc.) and the built in secret, hidden information for a given level is recorded on non-erasable media CD-ROM, DVD-ROM protecting it from unwanted or unauthorized adjustments. Having in mind the need of independence of the levels of protection, only the relevant authorities involved in the process of formation and generation of hidden image information (codes) for that particular level, have access to it. This way we superimpose informational layers, which are protected, insulated and independent from each other. If somehow the information for a given level is falsified, as a result of corruption in the relevant body, the other levels remain valid and protected. As a result we completely eliminate the possibility of fraud and reproduction of the original protection since the replacement of information from the other levels is impossible.

A distinctive feature of the method is that the data base is virtually inaccessible to hackers.

Different levels of protection and recording of information provide different ways of access in reading and authentication:

I-st level - information , visible and identifiable to the average person. Visible marking that would allow mobile phone camera verification.

II-nd level – reading devices for automatic control. Readers that allow access to information from supervisory authorities and departments.

III-rd - expert leve – for evidence in laboratory conditions to identify the code through the material.

The method has patents on all continents. Winner of exclusive license, valued at 435 million euros. Experts estimate that the technology has 36 basic patent applications.

The method is repeatedly presented and highly appreciated worldwide. It served as a basis for the launch of four major international projects initiated by NGO “Unity DEN”:

 

* ACTIVITIES AGINST ORGANIZED CRIME, ARMS TRAFFICKING AND VEHICLES THEFT

* PROTECTION OF DOCUMENTS AND SECURITIES AGAINST COUNTERFEITING,

* PROTECTION FROM EXCISE AND TAX FRAUD

* HOLISTIC AGRICULTURE EUROPEAN PROGRAM "FROM THE FARMER TO THE TABLE   

 

 CRYPTOLOGY

 

The development and enrichment of the applications of the method is related to other scientific discoveries and patents. Study was done on one of the most splendid Bulgarian manuscripts – the manuscript of the London Gospel of Tsar Ivan Alexander. It is written in 1355-1356 by the monk Simeon for about a year. The book ends with the so-called magic square. It reads the inscription "ИОАЛЕКСАНДРАЦАРЯТЕТРАВАГГЕЛ", ie "The John Alexander King Fourgospel," which is a clear confirmation of the fact that the book has been prepared by his order. A reading of his magic square (Fig. 4) revealed the key to the code of the sacred books.

 

 

 

 

 

 

     

 

 

 

 

 

 

 

 

Fig. 4 The magic square

 

The British mathematician of Indian origin, Dr. Rahul Savannah (London School of Economics) worked on deciphering the hidden messages in the magic square. He gives in the Annex his interpretation and mathematical algorithm, according to which one can read in the square nearly 11 million times the sentence "The Fourgospel of Tsar John Alexander." The official announcement was made on December 5, 2008 at a lecture in the European Parliament by Professor Jivko Jelev and Dr Savannah, see

http://www.youtube.com/watch?v=KXJDh9d6Zkc

The principle of cryptology in the Fourgospel "Magic square" was implanted in the method " EIIE” ( Energy Information In Emptiness ). Already being used for the creation of unique code marking. For this discovery the president of NGO "Unity DEN" received special recognition - the prize of the highest world forum – gold medal at the United Nations Summit.

 

METHOD FOR MEASURING THE ENERGY SPECTRUM OF THE WATER

 

The method allows the measuring of impact of information on the water. Water is a system of molecules linked by hydrogen bonds. A team of Bulgarian scientists proved that water stores information, but unlike Emoto, they rely on the mobile hydrogen bonds. The Angle between water droplets placed on polyethylene varies depending on the hydrogen energy bonds between water molecules. Hydrogen bonds are mobile. They can be stretched like a rubber band, to spin, to twist and to take different energy. The modification of the process, allows the energy spectrum of the water to be measured so as to obtain the energy. These spectrums provide information on how the energies are distributed between all links in any given water amount. The patent of the method energy spectrum of the water by Prof. Anton Antonov and Eng. Jvko Jelev is a fact, and a prestigious Swiss Prize for the discovery.

Water is the compound with the most communicative molecule of the planet. It has specific properties. It takes the information discreetly and can transfer it. In a series of studies of people,we  used the methods of Tibetan acupressure. In the tibetan acupressure, one should give energy with fingers while pressuring on a certain point of the human body in clockwise motion with a turnover of around a second. That is how energy is transferred. Withdrawal of energy uses the same process but in a counter clockwise motion. We used this method with water remotely. In a hyper-clean polyethylene bottles (imported from the U.S. Institute for Nuclear Research, to make nuclear tests) we put the control sample (ionized water). It turned out that when we "give" energy we can measure it in the spectrum of the water in electron volts, used in atomic physics.

More about the methods you can learn from their applications, testimonials and patents.

 

NEXT OPEN

HOUSE

TUESDAY, OCT 12

CALL US TO RESERVE YOUR SPOT

123-456-7890

You can also request more information with this form:

Your details were sent successfully!

bottom of page