Patents Assigned to InfoSci, LLC
-
Patent number: 10541989Abstract: Various embodiments provide methods and computing devices configured to implement the methods for dynamically changing an ephemeral shared data set. Various embodiments provide methods and computing devices configured to implement the methods for the dynamic generation of a value that may be used to protect a communication based on the dynamically changed ephemeral shared data set. Various embodiments incorporate the assumption that trusted systems ultimately are demonstrably insecure, because such systems are penetrable and vulnerable. Various embodiments provide a digital communication system that assumes no trust among various network elements, for at least the reason that the digital environment is inherently untrustworthy.Type: GrantFiled: October 1, 2018Date of Patent: January 21, 2020Assignee: InfoSci, LLCInventors: John Ellingson, Matthew Richardson
-
Patent number: 10542002Abstract: Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a first computing device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device. A processor of the second computing device may send the transitory identity to the third computing device with a request to authenticate the first computing device. The processor of the third computing device may authenticate the identity of the first computing device in response to determining that the transitory identity received from the first computing device matches the transitory identity received from the second computing device.Type: GrantFiled: May 31, 2018Date of Patent: January 21, 2020Assignee: InfoSci, LLCInventors: John Ellingson, Thomas Charles Ottoson
-
Patent number: 10419226Abstract: Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a medication delivery device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device. A processor of the second computing device may send the transitory identity to the third computing device with a request to authenticate the medication delivery device. The processor of the third computing device may authenticate the identity of the medication delivery device in response to determining that the transitory identity received from the medication delivery device matches the transitory identity received from the second computing device.Type: GrantFiled: September 1, 2017Date of Patent: September 17, 2019Assignee: INFOSCI, LLCInventors: John Ellingson, Thomas Charles Ottoson
-
Patent number: 10122699Abstract: Various embodiments provide methods and computing devices configured to implement the methods for dynamically changing an ephemeral shared data set. Various embodiments provide methods and computing devices configured to implement the methods for the dynamic generation of a value that may be used to protect a communication based on the dynamically changed ephemeral shared data set. Various embodiments incorporate the assumption that trusted systems ultimately are demonstrably insecure, because such systems are penetrable and vulnerable. Various embodiments provide a digital communication system that assumes no trust among various network elements, for at least the reason that the digital environment is inherently untrustworthy.Type: GrantFiled: October 20, 2017Date of Patent: November 6, 2018Assignee: INFOSCI, LLCInventors: John Ellingson, Matthew Richardson
-
Patent number: 10057269Abstract: In methods, systems, and computing devices configured to implement methods of authenticating a computing device, a first computing device and a second computing device may share a dynamically updated shared data set. The first computing device may select elements of the shared data set stored at the first computing device and may generate a rule set for extracting the selected elements from the shared data set. The first computing device may send the rule set to the second computing device, and may generate a first result using the selected elements. The second computing device may extract the selected elements from the shared data set using the rule set, may generate a second result, and may send the second result to the first computing device. The first computing device may determine whether the second computing device is authenticated based on whether the first result matches the second result.Type: GrantFiled: April 21, 2017Date of Patent: August 21, 2018Assignee: INFOSCI, LLCInventor: John Ellingson
-
Patent number: 10021100Abstract: Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a first computing device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device. A processor of the second computing device may send the transitory identity to the third computing device with a request to authenticate the first computing device. The processor of the third computing device may authenticate the identity of the first computing device in response to determining that the transitory identity received from the first computing device matches the transitory identity received from the second computing device.Type: GrantFiled: June 27, 2017Date of Patent: July 10, 2018Assignee: INFOSCI, LLCInventors: John Ellingson, Thomas Charles Ottoson
-
Patent number: 9722803Abstract: Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a first computing device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device. A processor of the second computing device may send the transitory identity to the third computing device with a request to authenticate the first computing device. The processor of the third computing device may authenticate the identity of the first computing device in response to determining that the transitory identity received from the first computing device matches the transitory identity received from the second computing device.Type: GrantFiled: December 30, 2016Date of Patent: August 1, 2017Assignee: InfoSci, LLCInventors: John Ellingson, Thomas Charles Ottoson