Patents by Inventor John Ellingson
John Ellingson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12238202Abstract: A cryptographic management key system is disclosed for providing secure communication in a cryptographic system. The cryptographic key management system includes a plurality of communication apparatuses under the control of a common control console, each communication apparatus being in communication with at least one source of dynamic random or pseudo-random information via the common control console, and communication paths among the plurality of communication apparatuses, said communication paths including a control plane, a random information plane and a data plane.Type: GrantFiled: February 15, 2023Date of Patent: February 25, 2025Assignee: Qwerx Inc.Inventors: Mark Pecen, John Ellingson
-
Patent number: 12217022Abstract: A random number generator system is disclosed that includes a quantum event source for generating a quantum event, a quantum event detector for detecting the generated quantum event, a clock circuit providing a looping counting signal including a plurality of counts (n0, n1 etc.), a converter circuit for associating the detected quantum event with a contemporaneous count of the plurality of counts, and a processing system for providing a random number based on the contemporaneous count.Type: GrantFiled: July 10, 2023Date of Patent: February 4, 2025Assignee: Qwerx Inc.Inventors: John Ellingson, Matthew Richardson
-
Publication number: 20240235815Abstract: A cryptographic management key system is disclosed for providing secure communication in a cryptographic system. The cryptographic key management system includes a plurality of communication apparatuses under the control of a common control console, each communication apparatus being in communication with at least one source of dynamic random or pseudo-random information via the common control console, and communication paths among the plurality of communication apparatuses, said communication paths including a control plane, a random information plane and a data plane.Type: ApplicationFiled: February 15, 2023Publication date: July 11, 2024Inventors: Mark Pecen, John Ellingson
-
Publication number: 20240012619Abstract: A random number generator system is disclosed that includes a quantum event source for generating a quantum event, a quantum event detector for detecting the generated quantum event, a clock circuit providing a looping counting signal including a plurality of counts (n0, n1 etc.), a converter circuit for associating the detected quantum event with a contemporaneous count of the plurality of counts, and a processing system for providing a random number based on the contemporaneous count.Type: ApplicationFiled: July 10, 2023Publication date: January 11, 2024Inventors: John Ellingson, Matthew Richardson
-
Patent number: 11463439Abstract: Methods and computing devices configured to implement the methods for authenticating processing devices on a system on chip (SoC) for encrypted communication. An SoC may include a plurality of memories configured to store equivalent ephemeral shared data sets. A first processing device of the SoC may select first elements from a first ephemeral shared data set, generate a rule set indicating the first elements, send the rule set to a second processing device of the SoC, and generate a first result based on the first elements. The second processing device may receive the rule set, select second elements from a second ephemeral shared data set, generate a second result based on the second elements, and send the second result to the first processing device. The first processing device may receive the second result and authenticate the second processing device based on a comparison of the first and second results.Type: GrantFiled: October 31, 2019Date of Patent: October 4, 2022Assignee: Qwerx Inc.Inventors: John Ellingson, Matthew Richardson
-
Publication number: 20200111091Abstract: Some embodiments include methods that may be implemented on a processor of a computing device for certifying an authenticated transaction. Some embodiments include methods that may be implemented on a processor of a computing device for certifying a wallet record file. In some embodiments, the authenticated transaction may include a distributed ledger transaction.Type: ApplicationFiled: April 11, 2019Publication date: April 9, 2020Inventor: John ELLINGSON
-
Publication number: 20200067927Abstract: Methods and computing devices configured to implement the methods for authenticating processing devices on a system on chip (SoC) for encrypted communication. An SoC may include a plurality of memories configured to store equivalent ephemeral shared data sets. A first processing device of the SoC may select first elements from a first ephemeral shared data set, generate a rule set indicating the first elements, send the rule set to a second processing device of the SoC, and generate a first result based on the first elements. The second processing device may receive the rule set, select second elements from a second ephemeral shared data set, generate a second result based on the second elements, and send the second result to the first processing device. The first processing device may receive the second result and authenticate the second processing device based on a comparison of the first and second results.Type: ApplicationFiled: October 31, 2019Publication date: February 27, 2020Inventors: John ELLINGSON, Matthew RICHARDSON
-
Publication number: 20200065503Abstract: In methods, systems, and computing devices configured to implement methods of conveying a data file from a first computing device to a second computing device. A referential complex dataset (RCD) is stored in memory of a first computing device and a second computing device. The first computing device may compare bit strings within a data file to bit strings within the RCD to identify a matching bit string in the RCD, generate a set of rules for locating the matched bit string in the RCD, and transmit the rule set to the second computing device. The second computing device may receive the rule set, sequentially use each rule in the rule set to identify corresponding bit strings in the RCD in memory, and copy the identified bit strings into a memory to replicate the data file.Type: ApplicationFiled: November 5, 2019Publication date: February 27, 2020Inventors: John ELLINGSON, Robert M. HANSEN
-
Patent number: 10546139Abstract: In methods, systems, and computing devices configured to implement methods of conveying a data file from a first computing device to a second computing device. A referential complex dataset (RCD) is stored in memory of a first computing device and a second computing device. The first computing device may compare bit strings within a data file to bit strings within the RCD to identify a matching bit string in the RCD, generate a set of rules for locating the matched bit string in the RCD, and transmit the rule set to the second computing device. The second computing device may receive the rule set, sequentially use each rule in the rule set to identify corresponding bit strings in the RCD in memory, and copy the identified bit strings into a memory to replicate the data file.Type: GrantFiled: July 26, 2018Date of Patent: January 28, 2020Assignee: NTROPY LLCInventors: John Ellingson, Robert M. Hansen
-
Patent number: 10542002Abstract: Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a first computing device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device. A processor of the second computing device may send the transitory identity to the third computing device with a request to authenticate the first computing device. The processor of the third computing device may authenticate the identity of the first computing device in response to determining that the transitory identity received from the first computing device matches the transitory identity received from the second computing device.Type: GrantFiled: May 31, 2018Date of Patent: January 21, 2020Assignee: InfoSci, LLCInventors: John Ellingson, Thomas Charles Ottoson
-
Patent number: 10541989Abstract: Various embodiments provide methods and computing devices configured to implement the methods for dynamically changing an ephemeral shared data set. Various embodiments provide methods and computing devices configured to implement the methods for the dynamic generation of a value that may be used to protect a communication based on the dynamically changed ephemeral shared data set. Various embodiments incorporate the assumption that trusted systems ultimately are demonstrably insecure, because such systems are penetrable and vulnerable. Various embodiments provide a digital communication system that assumes no trust among various network elements, for at least the reason that the digital environment is inherently untrustworthy.Type: GrantFiled: October 1, 2018Date of Patent: January 21, 2020Assignee: InfoSci, LLCInventors: John Ellingson, Matthew Richardson
-
Patent number: 10419226Abstract: Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a medication delivery device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device. A processor of the second computing device may send the transitory identity to the third computing device with a request to authenticate the medication delivery device. The processor of the third computing device may authenticate the identity of the medication delivery device in response to determining that the transitory identity received from the medication delivery device matches the transitory identity received from the second computing device.Type: GrantFiled: September 1, 2017Date of Patent: September 17, 2019Assignee: INFOSCI, LLCInventors: John Ellingson, Thomas Charles Ottoson
-
Publication number: 20190149552Abstract: Various embodiments provide methods and computing devices configured to implement the methods for protecting device communication. Various embodiments may include selecting elements from an ephemeral shared data set stored in the computing device and in an access point, generating a rule set indicating the selected elements, generating a first dynamic session key based on the selected elements, sending the generated rule set to the access point, receiving a second dynamic session key from the access point, determining whether the first dynamic session key matches the second dynamic session key, and determining that the access point is authenticated in response to determining that the first dynamic session key matches the second dynamic session key.Type: ApplicationFiled: December 21, 2018Publication date: May 16, 2019Inventor: John ELLINGSON
-
Publication number: 20190036899Abstract: Various embodiments provide methods and computing devices configured to implement the methods for dynamically changing an ephemeral shared data set. Various embodiments provide methods and computing devices configured to implement the methods for the dynamic generation of a value that may be used to protect a communication based on the dynamically changed ephemeral shared data set. Various embodiments incorporate the assumption that trusted systems ultimately are demonstrably insecure, because such systems are penetrable and vulnerable. Various embodiments provide a digital communication system that assumes no trust among various network elements, for at least the reason that the digital environment is inherently untrustworthy.Type: ApplicationFiled: October 1, 2018Publication date: January 31, 2019Inventors: John ELLINGSON, Matthew RICHARDSON
-
Publication number: 20180367533Abstract: Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a first computing device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device. A processor of the second computing device may send the transitory identity to the third computing device with a request to authenticate the first computing device. The processor of the third computing device may authenticate the identity of the first computing device in response to determining that the transitory identity received from the first computing device matches the transitory identity received from the second computing device.Type: ApplicationFiled: May 31, 2018Publication date: December 20, 2018Inventors: John ELLINGSON, Thomas Charles OTTOSON
-
Publication number: 20180357431Abstract: In methods, systems, and computing devices configured to implement methods of conveying a data file from a first computing device to a second computing device. A referential complex dataset (RCD) is stored in memory of a first computing device and a second computing device. The first computing device may compare bit strings within a data file to bit strings within the RCD to identify a matching bit string in the RCD, generate a set of rules for locating the matched bit string in the RCD, and transmit the rule set to the second computing device. The second computing device may receive the rule set, sequentially use each rule in the rule set to identify corresponding bit strings in the RCD in memory, and copy the identified bit strings into a memory to replicate the data file.Type: ApplicationFiled: July 26, 2018Publication date: December 13, 2018Inventors: John ELLINGSON, Robert M. HANSEN
-
Publication number: 20180343260Abstract: In methods, systems, and computing devices configured to implement methods of authenticating a computing device, a first computing device and a second computing device may share a dynamically updated shared data set. The first computing device may select elements of the shared data set stored at the first computing device and may generate a rule set for extracting the selected elements from the shared data set. The first computing device may send the rule set to the second computing device, and may generate a first result using the selected elements. The second computing device may extract the selected elements from the shared data set using the rule set, may generate a second result, and may send the second result to the first computing device. The first computing device may determine whether the second computing device is authenticated based on whether the first result matches the second result.Type: ApplicationFiled: July 18, 2018Publication date: November 29, 2018Inventor: John ELLINGSON
-
Publication number: 20180343259Abstract: In methods, systems, and computing devices configured to implement methods of authenticating a computing device, a first computing device and a second computing device may share a dynamically updated shared data set. The first computing device may select elements of the shared data set stored at the first computing device and may generate a rule set for extracting the selected elements from the shared data set. The first computing device may send the rule set to the second computing device, and may generate a first result using the selected elements. The second computing device may extract the selected elements from the shared data set using the rule set, may generate a second result, and may send the second result to the first computing device. The first computing device may determine whether the second computing device is authenticated based on whether the first result matches the second result.Type: ApplicationFiled: July 18, 2018Publication date: November 29, 2018Inventor: John ELLINGSON
-
Patent number: 10122699Abstract: Various embodiments provide methods and computing devices configured to implement the methods for dynamically changing an ephemeral shared data set. Various embodiments provide methods and computing devices configured to implement the methods for the dynamic generation of a value that may be used to protect a communication based on the dynamically changed ephemeral shared data set. Various embodiments incorporate the assumption that trusted systems ultimately are demonstrably insecure, because such systems are penetrable and vulnerable. Various embodiments provide a digital communication system that assumes no trust among various network elements, for at least the reason that the digital environment is inherently untrustworthy.Type: GrantFiled: October 20, 2017Date of Patent: November 6, 2018Assignee: INFOSCI, LLCInventors: John Ellingson, Matthew Richardson
-
Patent number: 10057269Abstract: In methods, systems, and computing devices configured to implement methods of authenticating a computing device, a first computing device and a second computing device may share a dynamically updated shared data set. The first computing device may select elements of the shared data set stored at the first computing device and may generate a rule set for extracting the selected elements from the shared data set. The first computing device may send the rule set to the second computing device, and may generate a first result using the selected elements. The second computing device may extract the selected elements from the shared data set using the rule set, may generate a second result, and may send the second result to the first computing device. The first computing device may determine whether the second computing device is authenticated based on whether the first result matches the second result.Type: GrantFiled: April 21, 2017Date of Patent: August 21, 2018Assignee: INFOSCI, LLCInventor: John Ellingson