Creating Unique and Unbreakable Digital DNA (IoT)
5543 N Military Trail, Unit 2215
Boca Raton, FL 33496
Office: (716) 517-
5330
E-mail: Cyb3raliens@Gmail.com
5543 N Military Trail, Unit 2215
Boca Raton, FL 33496
Office: (716) 517-
5330
E-mail: Cyb3raliens@Gmail.com
The IoT has extended the internet connectivity to reach not just computers and humans, but most of our environment things by having the potential to connect billions of objects simultaneously. Blockchain represents the missing piece of a puzzle to solve privacy and reliability flaws in IoTs.
In 2018, Cyber Aliens LLC was founded by George Antoniou, Ph.D. in Information Systems, Oresteban Carabeo, M.Sc. in Cybersecurity Management, and Roberto Hernandez, B.S. in Electrical Engineering. Currently, George, Oresteban, and Roberto are the owners of Cyber Aliens LLC, which is a company with cutting edge technology in the areas of Cryptology, Special Algorithms, Microcontrollers, and IoT Digital Identity. Cyber Aliens LLC holds patent ownership for patent inventions in the field of Cryptology and Special Algorithms.
Cyber Aliens LLC have a product called Cyb3r Aliens (Autonomous Local Intelligence Encrypted Network Security) for use in downloadable computer programs and hardware for encryption, decoding, identity access management and blockchain authentication and verification using artificial intelligence to register IoT enabled devices.
UNITED STATES PATENT LAW
Under United States law, a patent is a right granted to the inventor of a (1) process, machine, article of manufacture, or composition of matter, (2) that is new, useful, and non-obvious. A patent is the right to exclude others, for a limited time (usually, 20 years) from profiting of a patented technology without the consent of the patent-holder. Specifically, it is the right to exclude others from: making, using, selling, offering for sale, importing, inducing others to infringe, applying for an FDA approval, and/or offering a product specially adapted for practice of the patent. Patent law is designed to encourage inventors to disclose their new technology to the world by offering the incentive of a limited-time monopoly on the technology.
The Copyright Clause (also known as the Intellectual Property Clause, Copyright and Patent Clause, or the Progress Clause[1]) describes an enumerated power listed in the United States Constitution (Article I, Section 8, Clause 8).
The clause states that:
"[the United States Congress shall have power] To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries."
The clause is the basis of intellectual property laws in the United States, specifically copyright and patent laws.
Patentable subject matter (§101)
"Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof may obtain a patent therefor, subject to the conditions and requirements of this title."
— 35 U.S.C. 101.
To be patent eligible subject matter, an invention must meet two criteria. First, it must fall within one of the four statutory categories of acceptable subject matter: process, machine, manufacture, or composition of matter. Second, it must not be directed to subject matter encompassing a judicially recognized exception: laws of nature, physical phenomena, and abstract ideas.
Novelty (§102)
Section 102 of the patent act defines the "novelty" requirement. The novelty requirement prohibits patenting a technology that is already available to the public. Specifically, 35 U.S.C. 102 states:
(a) NOVELTY; PRIOR ART.—A person shall be entitled to a patent unless— (1) the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention ...
For a technology to be "anticipated" (and therefore patent-ineligible) under 35 U.S.C. 102, the prior art reference must teach every aspect of the claimed invention either explicitly or impliedly. "A claim is anticipated only if each and every element as set forth in the claim is found, either expressly or inherently described, in a single prior art reference." Verdegaal Bros. v. Union Oil Co. of California, 814 F.2d 628, 631 (Fed. Cir. 1987).
Obviousness (§103)
To be patentable, a technology must not only be "new"but also "non-obvious." A technology is obvious (and therefore ineligible for a patent) if a person of "ordinary skill" in the relevant field of technology, as of the filing date of the patent application, would have thought the technology was obvious. Put differently, an invention that would have been obvious to a person of ordinary skill at the time of the invention is not patentable. Specifically, 35 U.S.C. 103 states:
35 U.S.C. 103 Conditions for patentability; non-obvious subject matter. A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains.
Note:
The following proves the legality and ownership of the invention we are offering you and likewise proves beyond doubt the qualification, existence, and veracity of our invention.
Cyber Aliens Microchip Device is a product that can be used in any IoT device. It will have an IP Address utilizing the Blockchain Ecosystem (BCE) and the intended applications, such as Identity Access Management (IAM) and the central server. Limitations are also being identifying by exposing phishing and malware into various components not utilizing BCE or utilizing the Internet or the traditional transactions that are being done today it’s a limitation because of the one-sided IoT authentication/authorization.
The two-factor authentication passwords are limitations because they’re done within close company’s systems utilizing the Internet or utilizing PKI certificates, but without an overall arching environment, such as BCE that does the three-way-handshaking validating and invalidating an IoT device that it has a Point-to-Point Encryption (P2PE) Cyber Aliens Microcontrollers (MC) 64-bit MC (A) and MC (B), and utilizes IAM and central server software. Further references on how it is done today and what are the limitations address IAM for different vendors like Microsoft that utilizes the federation services and active directories, ORACLE IAM, and some other vendors that they’re doing IAM at the application layer.
The limitations today with all these vendors and IAM frameworks are lacking as they don’t identify and authenticate/authorize the actual IoT device, and if they do, it’s by some pseudo manner utilizing PKI digital certificates, which is an end to end transaction, not P2PE which is limited by the PKI certificate longevity and time to live till its expiration set its date. The Cyber Aliens MC 64-bit MC (A) and MC (B) and software can be used in servers, such as mail servers, database servers, DNS servers, web servers, file servers, print servers, game servers, and application servers and others. It can be used for commercial drones’ registration, commercial research utilizing blockchain security capabilities, telecommunication towers, Mobile devices, and (OnStar) satellite secure communications. It can also be can be used for the automobile industry such as autonomous self-driving and to solve theft cases, agriculture industry such as farming (cows, crops, etc.) using blockchain security capability sensors, Cybersecurity to address security, risk, and compliance.
IAM has been done today utilizing two-factor authentications or using credentials such as login account & password at the authentication stage where authorization is being done at the application layer. The devices are being authenticated in an environment sometimes using PKI digital certificates such as workstation to the server or wireless environments to authenticate smart devices. The following are some limitations, not exclusively identified. In “the payment card industry data security standard (PCI DSS)” environment at P2PE can be utilized for point to point of sales equipment to do a P2PE transactions utilizing traditional PCI DSS credit card processing networks. The limitations are no authentication and authorization not being at the IoT level.
The Cyber Aliens Microchip Device is a system combined and not a system separately having a complex system hardware architecture and software with levels of complexity of P2PE, IAM, and BCE. Cyber Aliens Microchip Device is an integrated circuit that has all semiconductors separated, the two microcontrollers, voltage regulators, and more efficient because it does not require many peripherals to program the master mode and slave mode; having a complex hardware is the novelty combination of microcontrollers making it impossible to hack the SEA/AES 512-bit keys because there are two brains, the MC (A) and MC (B) generating aleatory codes to extend the information of the key. The Cyber Aliens Microchip Device system, it is not usual to see a system in real time encrypting two microcontrollers; it is much more difficult to hack because it is not known who is the master and slave being a dynamic function of the combined microcontrollers.
Cyber Aliens Microchip Device USB can be used in retrofitting on the self-driven cars; The USB port capacity in the self-driven car facilitates the protocol communication through the Cyber Aliens P2PE device. The chip is embedded into the Cyber Aliens P2PE device and inserted into the USB port of the self-driven car. The Zero Knowledge Proofs (ZKP) protocol communication of IoTs can be used for the self-driven cars, wherein the IoT device 1 embedded chip for self-driven car 1 and IoT device 2 embedded chip for self-driven car 2; The two cars driving in parallel in a highway, and when they approach each other the prover IoT device 1 embedded chip in the self-driven car 1 communicates with the verifier IoT device 2 embedded chip, which is the self-driven car 2. At that point, the proofs and secret data do not unveil the secret data between the self-driven car 1 and the self-driven car 2.
Cyber Aliens Microchip Device is the only product with a combined system and not a system separately having a complex system hardware architecture and software with levels of complexity of P2PE, IAM, and BCE; A microcontroller (MC) 64-bit using MC (A) and MC (B) embedded into a device using point-to-point encryption (P2PE) to communicate with the novel IAM blockchain software and a central server database to track all registered and non-registered IoT devices in the BCE. The microchip device is embedded into the pacemaker P2PE of the pulse generator that houses the battery, and a tiny computer; The pacemaker lead wires send impulses from the pulse generator to the heart muscle, senses the heart electrical activity, and causes the heart to contract by each impulse.
Cyber Aliens Microchip Device is the product for Smart City communication with global network, urban infrastructure, wireless connection technology in lifestyle social medium, and communication network to transmit information through the Internet of Things (IoTs). Blockchain represents the missing piece of a puzzle to solve privacy and reliability flaws in IoT. The intrinsic decentralized, autonomous, and trustless features of the Blockchain make it suitable to be applied in several different scenarios such as Smart Home, Smart Industries, Smart Grid, and Smart City; The blockchain could keep an immutable history of smart devices to enable an autonomous functioning of intelligent devices, removing the presence of centralized authority and human control using smart contracts.
Cyber Aliens Microchip Device create its own fingerprint identity IOS to finger the blockchain environment in gathering information from each device that becomes registered in the BCE. It includes a serial number and fingerprint unique to each device sending data into the central server. The Cyber Aliens Microchip Device is embedded in a device to authenticate a device into the central server; The central server database tracks the IoT devices to keep the database with all Microcontroller entries and validations. The central server identifies if any of these IoT devices fall off the BCE by sending an output: IAM blockchain device not valid; thereby gathering the data and creating an identity for devices to be IAM blockchain device valid. The IAM blockchain software identifies IoT devices as part of the BCE. Every device must be registered and validated through the IAM blockchain software and the central server. Cyber Aliens Microchip Device uses the blockchain distributed digital ledgers of cryptographically signed transactions that are grouped into blocks. Each block is cryptographically linked to the previous one making it tamper evident after validation and undergoing a consensus decision. As new blocks are added, older blocks become more difficult to modify creating tamper resistance. New blocks are replicated across copies of the ledger within the network, and any conflicts are resolved automatically using established rules.
The BCE and IoT blockchain ledger contain transactional chain information where blocks are chained together through each block containing the hash digest of the previous block’s header the blockchain. A block is a data structure containing the block header and block data. If a previously published block were changed, it would have a different hash. This in turn would cause all subsequent blocks to also have different hashes since they include the hash of the previous block. This makes it possible to easily detect and reject altered blocks.
Cyber Aliens Microchip Device use the blockchain where the block 01 contains the hash of block data wherein the MAC address, serial number, and fingerprint identity IOS are being recorded in the block data blockchain transactional ledger. The hash of block data is a hash representation of the block data, wherein different methods can be used, such as a generating a Merkle tree, which is a data structure where the data is hashed and combined until there is a singular root hash that represents the entire structure, and storing the root hash, or by utilizing a hash of all the combined block data.. The hash chain is an append-only data structure where data is bundled into data blocks that include a hash of the previous data block’s data within the newest data block. This data structure provides evidence of tampering because any modification to a data block will change the hash digest recorded by the following data block.
Cyber Aliens Microchip Device Patent Technology: Microcontrollers embedded into the IoT devices for the present and future of the automobile industry, pacemakers, electronic voting, and everything that has an Internet connection. The system uses the highest symmetric encryption of 512-bit key, creating a DNA for each electronic device to prevent hacking or theft of information and data. With this technology science advances to the world of IoTs, the Internet of Things. The Cyb3r Aliens Microchip Device works with two brains that make random decisions by becoming a Master or Slave to create protected encryption within the technology of the future Blockchain. Cyb3r Aliens Microchip Device can help the United States and the entire world by protecting their industrial secrets.
Reg. No. 6,332,328
Registered Apr. 27, 2021
Int. Cl.: 9
Trademark
Principal Register
Cyber Aliens Trademark CLASS 9: Microchip device for downloadable computer programs and hardware for encryption decoding identity access management and blockchain authentication and verification using artificial intelligence to register internet of things (IoT) enabled devices.
USB Device Retrofitting:
Downloadable computer programs and hardware for encryption, decoding, identity access management and blockchain authentication and verification using artificial intelligence to register IoT enabled devices.
Cybersecurity Basic Package Automobile Industry:
$ 299.99
Specification:
Cybersecurity Medium Package Automobile and Healthcare Industry:
$ 799.99
Specification:
Cybersecurity Full Package Automobile, Healthcare, Government, Smart City IoT Communication Devices:
$ 1,299.99
Specification:
Our company provides excellent customer service support by responding as soon as possible to clients, fixing issues, and providing training.
Encrypted USB drive, thumb drive or flash stick device plug in with computer notebook.
5543 North Military Trail Unit 2215, Boca Raton, Florida 33496, United States
Office : (716) 517- 5330 E-mail: Cyb3raliens@Gmail.com www.Cyb3raliens.com
Open today | 09:00 am – 05:00 pm |
Monday - Friday: 9am - 5pm
Saturday - Sunday: Closed