Patents by Inventor John Ellingson

John Ellingson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240012619
    Abstract: A random number generator system is disclosed that includes a quantum event source for generating a quantum event, a quantum event detector for detecting the generated quantum event, a clock circuit providing a looping counting signal including a plurality of counts (n0, n1 etc.), a converter circuit for associating the detected quantum event with a contemporaneous count of the plurality of counts, and a processing system for providing a random number based on the contemporaneous count.
    Type: Application
    Filed: July 10, 2023
    Publication date: January 11, 2024
    Inventors: John Ellingson, Matthew Richardson
  • Patent number: 11463439
    Abstract: Methods and computing devices configured to implement the methods for authenticating processing devices on a system on chip (SoC) for encrypted communication. An SoC may include a plurality of memories configured to store equivalent ephemeral shared data sets. A first processing device of the SoC may select first elements from a first ephemeral shared data set, generate a rule set indicating the first elements, send the rule set to a second processing device of the SoC, and generate a first result based on the first elements. The second processing device may receive the rule set, select second elements from a second ephemeral shared data set, generate a second result based on the second elements, and send the second result to the first processing device. The first processing device may receive the second result and authenticate the second processing device based on a comparison of the first and second results.
    Type: Grant
    Filed: October 31, 2019
    Date of Patent: October 4, 2022
    Assignee: Qwerx Inc.
    Inventors: John Ellingson, Matthew Richardson
  • Publication number: 20200111091
    Abstract: Some embodiments include methods that may be implemented on a processor of a computing device for certifying an authenticated transaction. Some embodiments include methods that may be implemented on a processor of a computing device for certifying a wallet record file. In some embodiments, the authenticated transaction may include a distributed ledger transaction.
    Type: Application
    Filed: April 11, 2019
    Publication date: April 9, 2020
    Inventor: John ELLINGSON
  • Publication number: 20200067927
    Abstract: Methods and computing devices configured to implement the methods for authenticating processing devices on a system on chip (SoC) for encrypted communication. An SoC may include a plurality of memories configured to store equivalent ephemeral shared data sets. A first processing device of the SoC may select first elements from a first ephemeral shared data set, generate a rule set indicating the first elements, send the rule set to a second processing device of the SoC, and generate a first result based on the first elements. The second processing device may receive the rule set, select second elements from a second ephemeral shared data set, generate a second result based on the second elements, and send the second result to the first processing device. The first processing device may receive the second result and authenticate the second processing device based on a comparison of the first and second results.
    Type: Application
    Filed: October 31, 2019
    Publication date: February 27, 2020
    Inventors: John ELLINGSON, Matthew RICHARDSON
  • Publication number: 20200065503
    Abstract: In methods, systems, and computing devices configured to implement methods of conveying a data file from a first computing device to a second computing device. A referential complex dataset (RCD) is stored in memory of a first computing device and a second computing device. The first computing device may compare bit strings within a data file to bit strings within the RCD to identify a matching bit string in the RCD, generate a set of rules for locating the matched bit string in the RCD, and transmit the rule set to the second computing device. The second computing device may receive the rule set, sequentially use each rule in the rule set to identify corresponding bit strings in the RCD in memory, and copy the identified bit strings into a memory to replicate the data file.
    Type: Application
    Filed: November 5, 2019
    Publication date: February 27, 2020
    Inventors: John ELLINGSON, Robert M. HANSEN
  • Patent number: 10546139
    Abstract: In methods, systems, and computing devices configured to implement methods of conveying a data file from a first computing device to a second computing device. A referential complex dataset (RCD) is stored in memory of a first computing device and a second computing device. The first computing device may compare bit strings within a data file to bit strings within the RCD to identify a matching bit string in the RCD, generate a set of rules for locating the matched bit string in the RCD, and transmit the rule set to the second computing device. The second computing device may receive the rule set, sequentially use each rule in the rule set to identify corresponding bit strings in the RCD in memory, and copy the identified bit strings into a memory to replicate the data file.
    Type: Grant
    Filed: July 26, 2018
    Date of Patent: January 28, 2020
    Assignee: NTROPY LLC
    Inventors: John Ellingson, Robert M. Hansen
  • Patent number: 10542002
    Abstract: Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a first computing device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device. A processor of the second computing device may send the transitory identity to the third computing device with a request to authenticate the first computing device. The processor of the third computing device may authenticate the identity of the first computing device in response to determining that the transitory identity received from the first computing device matches the transitory identity received from the second computing device.
    Type: Grant
    Filed: May 31, 2018
    Date of Patent: January 21, 2020
    Assignee: InfoSci, LLC
    Inventors: John Ellingson, Thomas Charles Ottoson
  • Patent number: 10541989
    Abstract: Various embodiments provide methods and computing devices configured to implement the methods for dynamically changing an ephemeral shared data set. Various embodiments provide methods and computing devices configured to implement the methods for the dynamic generation of a value that may be used to protect a communication based on the dynamically changed ephemeral shared data set. Various embodiments incorporate the assumption that trusted systems ultimately are demonstrably insecure, because such systems are penetrable and vulnerable. Various embodiments provide a digital communication system that assumes no trust among various network elements, for at least the reason that the digital environment is inherently untrustworthy.
    Type: Grant
    Filed: October 1, 2018
    Date of Patent: January 21, 2020
    Assignee: InfoSci, LLC
    Inventors: John Ellingson, Matthew Richardson
  • Patent number: 10419226
    Abstract: Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a medication delivery device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device. A processor of the second computing device may send the transitory identity to the third computing device with a request to authenticate the medication delivery device. The processor of the third computing device may authenticate the identity of the medication delivery device in response to determining that the transitory identity received from the medication delivery device matches the transitory identity received from the second computing device.
    Type: Grant
    Filed: September 1, 2017
    Date of Patent: September 17, 2019
    Assignee: INFOSCI, LLC
    Inventors: John Ellingson, Thomas Charles Ottoson
  • Publication number: 20190149552
    Abstract: Various embodiments provide methods and computing devices configured to implement the methods for protecting device communication. Various embodiments may include selecting elements from an ephemeral shared data set stored in the computing device and in an access point, generating a rule set indicating the selected elements, generating a first dynamic session key based on the selected elements, sending the generated rule set to the access point, receiving a second dynamic session key from the access point, determining whether the first dynamic session key matches the second dynamic session key, and determining that the access point is authenticated in response to determining that the first dynamic session key matches the second dynamic session key.
    Type: Application
    Filed: December 21, 2018
    Publication date: May 16, 2019
    Inventor: John ELLINGSON
  • Publication number: 20190036899
    Abstract: Various embodiments provide methods and computing devices configured to implement the methods for dynamically changing an ephemeral shared data set. Various embodiments provide methods and computing devices configured to implement the methods for the dynamic generation of a value that may be used to protect a communication based on the dynamically changed ephemeral shared data set. Various embodiments incorporate the assumption that trusted systems ultimately are demonstrably insecure, because such systems are penetrable and vulnerable. Various embodiments provide a digital communication system that assumes no trust among various network elements, for at least the reason that the digital environment is inherently untrustworthy.
    Type: Application
    Filed: October 1, 2018
    Publication date: January 31, 2019
    Inventors: John ELLINGSON, Matthew RICHARDSON
  • Publication number: 20180367533
    Abstract: Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a first computing device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device. A processor of the second computing device may send the transitory identity to the third computing device with a request to authenticate the first computing device. The processor of the third computing device may authenticate the identity of the first computing device in response to determining that the transitory identity received from the first computing device matches the transitory identity received from the second computing device.
    Type: Application
    Filed: May 31, 2018
    Publication date: December 20, 2018
    Inventors: John ELLINGSON, Thomas Charles OTTOSON
  • Publication number: 20180357431
    Abstract: In methods, systems, and computing devices configured to implement methods of conveying a data file from a first computing device to a second computing device. A referential complex dataset (RCD) is stored in memory of a first computing device and a second computing device. The first computing device may compare bit strings within a data file to bit strings within the RCD to identify a matching bit string in the RCD, generate a set of rules for locating the matched bit string in the RCD, and transmit the rule set to the second computing device. The second computing device may receive the rule set, sequentially use each rule in the rule set to identify corresponding bit strings in the RCD in memory, and copy the identified bit strings into a memory to replicate the data file.
    Type: Application
    Filed: July 26, 2018
    Publication date: December 13, 2018
    Inventors: John ELLINGSON, Robert M. HANSEN
  • Publication number: 20180343260
    Abstract: In methods, systems, and computing devices configured to implement methods of authenticating a computing device, a first computing device and a second computing device may share a dynamically updated shared data set. The first computing device may select elements of the shared data set stored at the first computing device and may generate a rule set for extracting the selected elements from the shared data set. The first computing device may send the rule set to the second computing device, and may generate a first result using the selected elements. The second computing device may extract the selected elements from the shared data set using the rule set, may generate a second result, and may send the second result to the first computing device. The first computing device may determine whether the second computing device is authenticated based on whether the first result matches the second result.
    Type: Application
    Filed: July 18, 2018
    Publication date: November 29, 2018
    Inventor: John ELLINGSON
  • Publication number: 20180343259
    Abstract: In methods, systems, and computing devices configured to implement methods of authenticating a computing device, a first computing device and a second computing device may share a dynamically updated shared data set. The first computing device may select elements of the shared data set stored at the first computing device and may generate a rule set for extracting the selected elements from the shared data set. The first computing device may send the rule set to the second computing device, and may generate a first result using the selected elements. The second computing device may extract the selected elements from the shared data set using the rule set, may generate a second result, and may send the second result to the first computing device. The first computing device may determine whether the second computing device is authenticated based on whether the first result matches the second result.
    Type: Application
    Filed: July 18, 2018
    Publication date: November 29, 2018
    Inventor: John ELLINGSON
  • Patent number: 10122699
    Abstract: Various embodiments provide methods and computing devices configured to implement the methods for dynamically changing an ephemeral shared data set. Various embodiments provide methods and computing devices configured to implement the methods for the dynamic generation of a value that may be used to protect a communication based on the dynamically changed ephemeral shared data set. Various embodiments incorporate the assumption that trusted systems ultimately are demonstrably insecure, because such systems are penetrable and vulnerable. Various embodiments provide a digital communication system that assumes no trust among various network elements, for at least the reason that the digital environment is inherently untrustworthy.
    Type: Grant
    Filed: October 20, 2017
    Date of Patent: November 6, 2018
    Assignee: INFOSCI, LLC
    Inventors: John Ellingson, Matthew Richardson
  • Patent number: 10057269
    Abstract: In methods, systems, and computing devices configured to implement methods of authenticating a computing device, a first computing device and a second computing device may share a dynamically updated shared data set. The first computing device may select elements of the shared data set stored at the first computing device and may generate a rule set for extracting the selected elements from the shared data set. The first computing device may send the rule set to the second computing device, and may generate a first result using the selected elements. The second computing device may extract the selected elements from the shared data set using the rule set, may generate a second result, and may send the second result to the first computing device. The first computing device may determine whether the second computing device is authenticated based on whether the first result matches the second result.
    Type: Grant
    Filed: April 21, 2017
    Date of Patent: August 21, 2018
    Assignee: INFOSCI, LLC
    Inventor: John Ellingson
  • Patent number: 10021100
    Abstract: Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a first computing device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device. A processor of the second computing device may send the transitory identity to the third computing device with a request to authenticate the first computing device. The processor of the third computing device may authenticate the identity of the first computing device in response to determining that the transitory identity received from the first computing device matches the transitory identity received from the second computing device.
    Type: Grant
    Filed: June 27, 2017
    Date of Patent: July 10, 2018
    Assignee: INFOSCI, LLC
    Inventors: John Ellingson, Thomas Charles Ottoson
  • Publication number: 20180131526
    Abstract: Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a medication delivery device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device. A processor of the second computing device may send the transitory identity to the third computing device with a request to authenticate the medication delivery device. The processor of the third computing device may authenticate the identity of the medication delivery device in response to determining that the transitory identity received from the medication delivery device matches the transitory identity received from the second computing device.
    Type: Application
    Filed: September 1, 2017
    Publication date: May 10, 2018
    Inventors: John ELLINGSON, Thomas Charles OTTOSON
  • Publication number: 20180077156
    Abstract: Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a first computing device may obtain a transitory identity and may send the transitory identity to a second computing device and a third computing device. A processor of the second computing device may send the transitory identity to the third computing device with a request to authenticate the first computing device. The processor of the third computing device may authenticate the identity of the first computing device in response to determining that the transitory identity received from the first computing device matches the transitory identity received from the second computing device.
    Type: Application
    Filed: June 27, 2017
    Publication date: March 15, 2018
    Inventors: John ELLINGSON, Thomas Charles OTTOSON