MySQIF™ Privacy App™ uses polymorphic encryption techniques. The key lengths scale with the size of the data. The bigger the file, the more keys used. The master key is a one-time event, it never passes between the Sender and Receiver, and then it disappears after successful decryption
Use your browser Find feature (Ctrl+F) to search for topical content below.
McKibben et al. (Nov. 21,2006). U.S. Patent No. 7,139,761,
Dynamic Association of Electronic
Stored Information with Iterative Workflow Changes. USPTO. Source: https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/7139761
McKibben et al. (Jun. 05,2012). U.S. Patent No. 8,195,714,
Context Instantiated Application
Protocol. USPTO. Source: https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/8195714
McKibben et al. (Jun. 05,2012). U.S. Patent No. 7,925,246,
Radio/Telephony Interoperability
System. USPTO. Source: https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/7925246
FIRST AMENDED MILLER ACTNOTICE. (Apr. 25, 2019). Leader Technologies, Inc. to the U.S. Executive pursuant to 40 U.S.C. §3131 et seq. Leader Technologies, Inc.
Petition for Writ of Certiorari. (Nov. 16, 2012). Leader Techologies Inc. v. Facebook Inc., No-12-617. U.S. Supreme Court.
Carlson, Albert H., Mandeep Singh. (Jan. 8-10, 2024). Exploring Polymorphic Algorithms and Their Use in Cryptography. IEEE, Conference: 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC) At: Las Vegas, NV.
Mandeep Singh, Albert Carlson. (May 31, 2024). An Approach to Watermarking Using Polymorphic Algorithms For Increased Data Security. Austin Community College/IEEE.
Carlson et al. (Nov. 03, 2015). U.S. Patent No. 9,178,514, Polymorphic Hardware Engine. USPTO. Source: https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/9178514
Albert Henry Carlson et al. (Sep. 04, 2018). U.S. Patent No. 10,069,805, Polymorphic one time pad matrix. USPTO. Source: https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/10069805
Carlson; Albert Henry et al. (Dec. 25, 2018). U.S. Patent No. 10,162,985, Virtual Polymorphic Hardware Engine. USPTO. Source: https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/10162985
Carlson et al. (Nov. 19, 2019). U.S. Patent No. 10,482,290. Virtual Polymorphic Hardware Engine. USPTO. Source: https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/10482290
Carlson et al. (Feb. 18, 2020). U.S. Patent No. 10,567,351, Polymorphic One Time Pad Matrix. USPTO. Source: https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/10567351.pdf
Carlson, Albert Henry. (Feb. 18, 2021). U.S. Patent Appl. No. 10,051,006. Blind Key Generator and Exchange. USPTO. https://patentimages.storage.googleapis.com
/bd/8b/c1/65d851cd296de2/US20210051006A1.pdf
Carlson et al. (Nov. 06, 2018). U.S. Patent No. 10,122,684, Local Area Network Electronic Perimeter Security. USPTO. Source: https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/10122684.pdf
Carlson et al. (Mar. 30, 2021). U.S. Patent No. 10,965,710. Dynamic PIN Configurator. USPTO. Source: https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/10965710
Carlson, Albert Henry; Whilhite, Elizabeth et al. (Dec. 02, 2004). WO 2004/105296. Secure Communications. WIPO. Source: https://patentimages.storage.googleapis.com/06/c1/01/35afaa11ecc87a/WO2004105296A2.pdf
A
. Carlson, I. K. Dutta, B. Ghosh and M.
Totaro. (Dec. 06-09, 2021). Modeling Polymorphic Ciphers. 2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC), Gandia, Spain, 2021, pp. 1-5, doi:https://10.1109/FMEC54266.2021.9732571
A. Carlson, B. Ghosh, I.K. Dutta, S..
Key Space Reduction Using Isomorphs, 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 2021, pp. 0970-0975, doi:https://10.1109/IEMCON53756.2021.9623158
A. H. Carlson, R. E. Hiromoto and R. B. Wells. (Sep. 15-17,
2011). Breaking block and product ciphers applied across byte boundaries. Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisation and Advanced Computing Systems, Prague, 2011, pp. 733-736, doi:https://doi.org/10.1109/IDAACS.2011.6072867
B. Ghosh, I. K. Dutta, S. Khare
, A. Carlson and M. Totaro. (Oct. 27-30, 2021). Isomorphic Cipher Reduction, 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, B.C., Canada, 2021, pp. 0947-0953, doi:https://doi.org/10.1109/IEMCON53756.2021.9623135
A. Carlson, B. Ghosh, I. K. Dutta, S. Khare and M. Totaro . (Oct. 27-30, 2021). Key Space Reduction Using Isomorphs, 2021 IEEE 12th Annual Information
Technology, Electronics and Mobile Communication Conference (IEMCON),
Vancouver, BC, Canada, 2021, pp. 0970-0975, doi:https://doi.org/10.1109/IEMCON53756.2021.9623158
A. H. Carlson, R. E. Hiromoto and R. B. Wells. (Sep. 15-17, 2011). Breaking block and product ciphers applied across byte boundaries, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, Prague, 2011, pp. 733-736, doi:https://doi.org/10.1109/IDAACS.2011.6072867
B. Ghosh, I. K. Dutta, A. Carlson, M. Totaro and M. Bayoumi. (Oct. 28-31, 2020). An Empirical Analysis of Generative Adversarial Network Training Times with
Varying Batch Sizes, 2020 11th IEEE Annual Ubiquitous Computing,
Electronics & Mobile Communication Conference (UEMCON), New York, NY,
USA, 2020, pp. 0643-0648, doi:https://doi.org/10.1109/UEMCON51285.2020.9298092
Carlson, Albert, Marc Laude, Deborah Frincke . (Aug. 01, 2003). Railway
Security Issues: A Survey of Developing Railway Technology, Conference:
CCCT 2003
, Orlando, Florida. Source:https://www.atdlines.com/pdf/rsi-secur.pdf
A. Carlson, I. Dutta and B. Ghosh. (Oct. 03-05, 2022). Using the Collision Attack
for Breaking Cryptographic Modes, 2022 13th International Conference on
Computing Communication and Networking Technologies (ICCCNT), Kharagpur,
India, 2022, pp. 1-7, doi:https://doi.org/10.1109/ICCCNT54827.2022.9984325
Albert H. Carlson. (Apr. 01, 2009). Defense in Depth: Perspectives on utility security from a military intelligence
viewpoint, Western Power and Delivery Conference, Spokane, WA. Source: Research Gate.
A. Carlson , S. R. Mikkilineni, M. W. Totaro, R. B. Wells and R. E. Hiromoto. (Jul. 19-22, 2022). Equivalence of Product Ciphers to Substitution Ciphers and their Security
Implications, 2022 International Symposium on Networks, Computers and
Communications (ISNCC), Shenzhen, China, 2022, pp. 1-6, doi:https://doi.org/10.1109/ISNCC55209.2022.9851719
Albert H. Carlson. (May01, 2012). SET THEORETIC ESTIMATION APPLIED TO THE INFORMATION
CONTENT OF CIPHERS AND DECRYPTION, Final Dissertation, Thesis for Doctor of
Philosophy, Computer Science, University of Idaho. Source: Research Gate.
I. K. Dutta, B. Ghosh, A. Carlson, M. Totaro and M. Bayoumi . (Oct. 28-31, 2020). Generative Adversarial Networks in Security: A Survey, 2020 11th IEEE
Annual Ubiquitous Computing, Electronics & Mobile Communication Conference
(UEMCON), New York, NY, USA, 2020, pp. 0399-0405, doi:https://doi.org/10.1109/UEMCON51285.2020.9298135
A. Carlson, S. Khare, I. K. Dutta, B. Ghosh and M. Totaro. (Jan. 26-29, 2022). Space Selection and Abstraction in Set Theoretic Estimation, 2022 IEEE
12th Annual Computing and Communication Workshop and Conference (CCWC), Las
Vegas, NV, USA, 2022, pp. 0012-0020, doi:https://doi.org/10.1109/CCWC54503.2022.9720845
A. Carlson, S. R. Mikkilineni, M. W. Totaro, R. E. Hiromoto and R. B. Wells. (Jul. 19-22, 2022).
An Introduction to Local Entropy and Local Unicity,
2022 International
Symposium on Networks, Computers and Communications (ISNCC), Shenzhen,
China, 2022, pp. 1-7, doi:https://doi.org/10.1109/ISNCC55209.2022.9851755
B. Ghosh, I. Kalyan Dutta, A. Carlson and M. Totaro . (Oct. 20-22, 2020). Mathematical Modeling and Prediction of Neural Network
Training based on RC Circuits, 2020 International Symposium on
Networks, Computers and Communications (ISNCC)
, Montreal, QC, Canada, 2020,
pp. 1-4, doi: https://doi.org/10.1109/ISNCC49221.2020.9297244
B. Williams, A. Carlson and R. Hiromoto. (Oct. 03-05, 2022). Novel Innovations for Improving the Quality of Weak PRNGs, 2022 13th
International Conference on Computing Communication and Networking Technologies
(ICCCNT)
, Kharagpur, India, 2022, pp. 1-6, doi:https://doi.org/10.1109/ICCCNT54827.2022.9984611
B. Williams, A. Carlson and R. Hiromoto . (Oct. 03-05, 2022). Novel Innovations that Failed to Improve Weak PRNGs, 2022 13th
International Conference on Computing Communication and Networking Technologies
(ICCCNT), Kharagpur, India, 2022, pp. 1-6, doi:https://doi.org/10.1109/ICCCNT54827.2022.9984517
I. Kalyan Dutta, B. Ghosh, A. H. Carlson and M. Bayoumi. (Jun. 02-16, 2020). Lightweight Polymorphic Encryption for the Data Associated with Constrained
Internet of Things Devices, 2020 IEEE 6th World Forum on Internet of
Things (WF-IoT), New Orleans, LA, USA, 2020, pp. 1-6, doi:https://doi.org/10.1109/WF-IoT48130.2020.9221296
B. Williams, R. E. Hiromoto and A. Carlson. (Sep. 18-21, 2019). A Design
for a Cryptographically Secure Pseudo Random Number Generator, 2019
10th IEEE International Conference on Intelligent Data Acquisition and Advanced
Computing Systems: Technology and Applications (IDAACS), Metz, France,
2019, pp. 864-869, doi:https://doi.org/10.1109/IDAACS.2019.8924431
Dr. Albert Carlson, Dr. Keeper L. Sharkey. (Aug. 19, 2022). NIST Quantum Proof Algorithm
Analysis. Quantum Security Alliance (QSA).
Dr. Albert H. Carlson. (Aug. 03, 2022). Standard Password Practices for Organizations: Relative Theory and
Recommendations. Quantum Security Alliance (QSA).
A. Carlson, H.C. Mumm, K.L. Sharkey, M.S. Watchorn. (Jul. 08, 2022). Quantum Chemistry for Detecting Cybersecurity Threats to Information Systems.
Quantum Security Alliance (QSA).
Dr. Albert H. Carlson, Dr. Robert E. Hiromoto . (Jun. 21, 2013). Reduction of Key Space Using Isomorphs and Language Characteristics. Cloud+MD.
H. Idriss, P. Rojas, S. Alahmadi, T. Idriss, A. Carlson, and M. Bayoumi. (May 27, 2022 to Jun. 01, 2022). Shadow PUFs: Generating Temporal PUFs with Properties
Isomorphic to Delay-Based APUFs, 2022 IEEE International Symposium on
Circuits and Systems (ISCAS)
, Austin, TX, USA, 2022, pp. 175-179,
doi:https://doi.org/10.1109/ISCAS48785.2022.9937489
A. H. Carlson, R. B. Wells and R. E. Hiromoto. (Sep. 05-07, 2005). Using Set Theoretic Estimation to Implement Shannon Secrecy, 2005 IEEE
Intelligent Data Acquisition and Advanced Computing Systems: Technology and
Applications
, Sofia, Bulgaria, 2005, pp. 435-438, doi: https://doi.org/10.1109/IDAACS.2005.283018
A. Carlson, I. Dutta, B. Ghosh and R. Hiromoto. (Oct. 12-15, 2022). The Problem with Regular Multiple Byte Block Boundaries in Encryption, 2022
IEEE 13th Annual Information Technology, Electronics and Mobile Communication
Conference (IEMCON)
, Vancouver, BC, Canada, 2022, pp. 0055-0060, doi:https://doi.org/10.1109/IEMCON56893.2022.9946470
A. Carlson, G. Gang, T. Gang, B. Ghosh and I. K. Dutta. (Jan. 01-04, 2021). Evaluating True
Cryptographic Key Space Size, 2021 IEEE 12th Annual Ubiquitous
Computing, Electronics & Mobile Communication Conference (UEMCON)
, New
York, NY, USA, 2021, pp. 0243-0249, doi: https://doi.org/10.1109/UEMCON53757.2021.9666530
A. Carlson, S. R. Mikkilineni, M. W. Totaro and C. Briscoe. (Jul. 19-22, 2022). A Venona Style Attack to Determine Block Size, Language, and
Attacking Ciphers, 2022 International Symposium on Networks, Computers
and Communications (ISNCC)
, Shenzhen, China, 2022, pp. 1-6, doi:https://doi.org/10.1109/ISNCC55209.2022.9851716
A. Carlson, S. R. Mikkilineni, M. W. Totaro, R. B. Wells and R. E. Hiromoto. (Jul. 19-22, 2022). Equivalence of Product Ciphers to Substitution Ciphers and their Security
Implications, 2022 International Symposium on Networks, Computers and
Communications (ISNCC)
, Shenzhen, China, 2022, pp. 1-6, doi:https://doi.org/10.1109/ISNCC55209.2022.9851719
B. Ghosh, I. K. Dutta, S. Khare, A. Carlson and M. Totaro. (Oct. 27-30, 2021). Isomorphic Cipher Reduction, 2021 IEEE 12th Annual Information
Technology, Electronics and Mobile Communication Conference (IEMCON)
,
Vancouver, BC, Canada, 2021, pp. 0947-0953, doi:https://doi.org/10.1109/IEMCON53756.2021.9623135
Ueli M. Maurer, James L. Massey. (Mar. 01, 1993). Cascade Ciphers: The Importance of Being First, pp.55-61. J. Cryptology. Source: https://doi.org/10.1007/BF02620231
Return periodically. More white papers are being added monthly.
Sign Up