Patents Assigned to InfoSci, LLC
  • Patent number: 10541989
    Abstract: Various embodiments provide methods and computing devices configured to implement the methods for dynamically changing an ephemeral shared data set. Various embodiments provide methods and computing devices configured to implement the methods for the dynamic generation of a value that may be used to protect a communication based on the dynamically changed ephemeral shared data set. Various embodiments incorporate the assumption that trusted systems ultimately are demonstrably insecure, because such systems are penetrable and vulnerable. Various embodiments provide a digital communication system that assumes no trust among various network elements, for at least the reason that the digital environment is inherently untrustworthy.
    Type: Grant
    Filed: October 1, 2018
    Date of Patent: January 21, 2020
    Assignee: InfoSci, LLC
    Inventors: John Ellingson, Matthew Richardson
  • Patent number: 10542002
    Abstract: Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a first computing device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device. A processor of the second computing device may send the transitory identity to the third computing device with a request to authenticate the first computing device. The processor of the third computing device may authenticate the identity of the first computing device in response to determining that the transitory identity received from the first computing device matches the transitory identity received from the second computing device.
    Type: Grant
    Filed: May 31, 2018
    Date of Patent: January 21, 2020
    Assignee: InfoSci, LLC
    Inventors: John Ellingson, Thomas Charles Ottoson
  • Patent number: 10419226
    Abstract: Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a medication delivery device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device. A processor of the second computing device may send the transitory identity to the third computing device with a request to authenticate the medication delivery device. The processor of the third computing device may authenticate the identity of the medication delivery device in response to determining that the transitory identity received from the medication delivery device matches the transitory identity received from the second computing device.
    Type: Grant
    Filed: September 1, 2017
    Date of Patent: September 17, 2019
    Assignee: INFOSCI, LLC
    Inventors: John Ellingson, Thomas Charles Ottoson
  • Patent number: 10122699
    Abstract: Various embodiments provide methods and computing devices configured to implement the methods for dynamically changing an ephemeral shared data set. Various embodiments provide methods and computing devices configured to implement the methods for the dynamic generation of a value that may be used to protect a communication based on the dynamically changed ephemeral shared data set. Various embodiments incorporate the assumption that trusted systems ultimately are demonstrably insecure, because such systems are penetrable and vulnerable. Various embodiments provide a digital communication system that assumes no trust among various network elements, for at least the reason that the digital environment is inherently untrustworthy.
    Type: Grant
    Filed: October 20, 2017
    Date of Patent: November 6, 2018
    Assignee: INFOSCI, LLC
    Inventors: John Ellingson, Matthew Richardson
  • Patent number: 10057269
    Abstract: In methods, systems, and computing devices configured to implement methods of authenticating a computing device, a first computing device and a second computing device may share a dynamically updated shared data set. The first computing device may select elements of the shared data set stored at the first computing device and may generate a rule set for extracting the selected elements from the shared data set. The first computing device may send the rule set to the second computing device, and may generate a first result using the selected elements. The second computing device may extract the selected elements from the shared data set using the rule set, may generate a second result, and may send the second result to the first computing device. The first computing device may determine whether the second computing device is authenticated based on whether the first result matches the second result.
    Type: Grant
    Filed: April 21, 2017
    Date of Patent: August 21, 2018
    Assignee: INFOSCI, LLC
    Inventor: John Ellingson
  • Patent number: 10021100
    Abstract: Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a first computing device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device. A processor of the second computing device may send the transitory identity to the third computing device with a request to authenticate the first computing device. The processor of the third computing device may authenticate the identity of the first computing device in response to determining that the transitory identity received from the first computing device matches the transitory identity received from the second computing device.
    Type: Grant
    Filed: June 27, 2017
    Date of Patent: July 10, 2018
    Assignee: INFOSCI, LLC
    Inventors: John Ellingson, Thomas Charles Ottoson
  • Patent number: 9722803
    Abstract: Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a first computing device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device. A processor of the second computing device may send the transitory identity to the third computing device with a request to authenticate the first computing device. The processor of the third computing device may authenticate the identity of the first computing device in response to determining that the transitory identity received from the first computing device matches the transitory identity received from the second computing device.
    Type: Grant
    Filed: December 30, 2016
    Date of Patent: August 1, 2017
    Assignee: InfoSci, LLC
    Inventors: John Ellingson, Thomas Charles Ottoson