×

Non-deterministic secure active element machine

  • US 10,268,843 B2
  • Filed: 03/10/2015
  • Issued: 04/23/2019
  • Est. Priority Date: 12/06/2011
  • Status: Active Grant
First Claim
Patent Images

1. A physical computing machine implemented method for performing computations comprising:

  • constructing, by the physical computing machine, a procedure, the procedure including a set of one or more machine instructions, which when invoked cause the machine to perform one or more tasks;

    constructing, by the physical computing machine, a first method of a multiplicity of possible methods for performing a first instance of the procedure;

    performing computations by implementing the first instance of the procedure by the first method on the physical computing machine, therein implementing the set of one or more machine instructions according to the first method;

    constructing, by the physical computing machine, a second method of the multiplicity of possible methods for performing a second instance of the procedure; and

    performing computations by implementing the second instance of the procedure by the second method on the physical computing machine, therein implementing the same set of one or more machine instructions according to the second method;

    wherein the constructing of the first instance of the procedure on the physical computing machine and the constructing of the second instance of the procedure on the physical computing machine are based on a non-deterministic process running within the physical computing machine;

    the first instance of the procedure performs an operation specified by the set of instructions and the second instance of the procedure also performs the operation specified by the set of one or more machine instructions, butthe first instance of the procedure performs the procedure by the first method, and therein performs the operation specified by the set of one or more machine instructions, via the first method, andthe second instance of the procedure performs the procedure, via the second method and therein performs the operation specified by the set of one or more machine instructions by the second method,therein protecting security of the method by obscuring the operation performed by the procedure from a potential hacker;

    wherein said non-deterministic process is generated from quantum events occurring on the physical computing machine.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×