Search

US-12627503-B1 - Distributed multipoint and multi-sphere entropy-based network security

US12627503B1US 12627503 B1US12627503 B1US 12627503B1US-12627503-B1

Abstract

A system and method for generating cryptographic keys to secure wide-area network (WAN) traffic utilizing real-time, high-entropy data derived from a distributed physical layer. The system utilizes a hybrid multi-point architecture comprising: (1) a plurality of Mobile Nodes configured to harvest stochastic multi-sphere telemetry data (e.g., environmental, biological, galactic, and technological noise); (2) a plurality of Anchor Nodes configured to harvest stochastic data, validate Mobile Node location proofs via Time-Difference-of-Arrival (TDoA) analysis, and stabilize network topology; and (3) a Universal Entropy Engine configured to generate a global security hash (GSH). This GSH enables the derivation of ephemeral encryption keys for native decentralized networks and third-party overlays (e.g., SD-WAN, IoT). By coupling security to the vast, non-deterministic multi-sphere, the system defends against quantum and algorithmic threats.

Inventors

  • Todd E. Snyder

Assignees

  • Todd E. Snyder

Dates

Publication Date
20260512
Application Date
20251222

Claims (5)

  1. 1 . A method for generating ephemeral encryption keys and/or a global security hash (GSH) from a distributed physical layer, comprising: collecting stochastic multi-sphere telemetry data from earth's multi-sphere and observable universe from a plurality of distributed mobile and/or stationary computing apparatuses, wherein said stochastic multi-sphere telemetry data includes at least one or more data types selected from a group including motion data, biological biometric data, ecological environmental data, galactic space data, and technological multi-sphere data including electromagnetic spectrum noise; normalizing said stochastic multi-sphere telemetry data into a set of anonymized entropy digests via a normalization process including a whitening filter and/or cryptographic hash function; validating a physical origin and an integrity of said anonymized entropy digests via Time-Difference-of-Arrival (TDoA) signal analysis and a consensus of signal latency measurements and/or alternative physical/presence integrity verification protocols and analytics available across a network; aggregating said validated anonymized entropy digests to form a dynamic global entropy pool; and generating the global security hash and/or ephemeral encryption keys from said dynamic global entropy pool to secure digital data transmission against algorithmic and quantum decryption threats.
  2. 2 . The method of claim 1 , further comprising utilizing an “Entropy Ratchet” protocol, wherein one or more stored private credentials of the distributed mobile and/or stationary computing apparatuses are mathematically updated and evolved in real-time by ingesting the Global Security Hash (GSH), thereby ensuring Continuous Forward Secrecy (CFS) where a compromised credential cannot be utilized to decrypt prior communications.
  3. 3 . The method of claim 1 , wherein the validating step (“Proof of Spacetime”) comprises: correlating a set of reported geospatial coordinates/presence of a selected mobile node with at least one independent physical verification vector; and said independent physical verification vector being derived from one or more of Time-Difference-of-Arrival (TDoA) signal analysis, optical analysis of local environment features (via camera and/or LiDAR), cross-referencing of onboard and/or nearby sensor data, movement analytics, and/or network and node analytics; and rejecting the entropy digests if deviation between the reported geospatial coordinates/presence data and the independent physical verification vector exceeds a pre-determined threshold.
  4. 4 . The method of claim 1 , wherein the “biological biometric data” comprises time-variant physiological signals, including one or more of heart rate variability (HRV), galvanic skin response, or gait cadence, harvested from authorized users to serve as a unique, non-replicable entropy source.
  5. 5 . The method of claim 1 , further comprising a “Zero-Transmission” Key Exchange protocol, wherein: a first computing apparatus and a second computing apparatus independently generate an identical ephemeral session key by utilizing the current Global Security Hash (GSH) as a deterministic input parameter alongside a pre-shared private credential within a local Key Derivation Function (KDF); and said identical ephemeral session key is established between the first and second computing apparatuses without ever transmitting said identical ephemeral session key across the network.

Description

BACKGROUND OF THE INVENTION Field of the Invention: The present invention relates generally to the fields of cryptographic key generation, decentralized network architecture, networking, network security, computing, and mobile computing. Specifically, it focuses on a system and method(s) to dynamically generate “True Randomness” (TRNG) from multiple distributed multi-sphere sensor and/or telemetry data points. The invention utilizes a hybrid, distributed network of mobile and/or stationary nodes operating within terrestrial and non-terrestrial environments for real-time, anonymized entropy data harvesting, to secure various native network and third-party overlays (e.g., SD-WAN, IoT) against advanced data transmission threats. Description of Related Art: Current network security protocols (TLS/SSL, VPNs) rely heavily on Pseudo-Random Number Generators (PRNGs) for encrypted session key generation. PRNGs are mathematical algorithms that, while statistically random, are fundamentally deterministic. For existing TRNG solutions that create keys from unpredictable physical processes, they are limited among other things by the quantity, diversity, and location of data sources, with their data only being harvested locally using very specialized hardware and silicon circuits. This invention fills a need for a security system and protocol that utilizes vast, wildly non-deterministic, distributed data point sources, and their hyper-unique mix of real-time data, to broadly capture “living chaos” and “energetic variables” from the earth's multi-sphere (e.g. geosphere, biosphere, atmosphere, hydrosphere, techno-sphere, and observable universe) as a root of trust, decoupled from the underlying transport layer to secure digital infrastructure against next-generation threats. BRIEF SUMMARY OF THE INVENTION The present invention, as a system and method(s), addresses the limitations of conventional cryptographic systems by introducing a Dynamic Multi-sphere Encryption and Routing Protocol (DMERP). Unlike traditional systems that generate security via mathematical algorithms (PRNGs), or localized hardware noise (TRNGs), this system utilizes a hybrid multi-point entropy architecture to harness the stochastic nature of earth's multi-sphere (e.g. geosphere, biosphere, atmosphere, hydrosphere, techno-sphere, and observable universe)—the aggregate, stochastic interaction of biological and nonbiological entities, environmental, ecological, and technological systems, physical, non-physical, and technological environments, and their interactive galactic space—to serve as a distributed, non-deterministic root of trust for digital security. In one aspect, the invention provides a method for generating security via a “Universal Entropy Engine” (UEE) that is independent of the underlying data transport layer. Crucially, the system utilizes a “Zero-Transmission” Key Architecture. Instead of transmitting private keys, the UEE broadcasts a public Global Security Hash (GSH) derived from multi-sphere telemetry. This GSH serves as a non-deterministic seed, allowing distributed nodes to execute a Local Key Generation Function (KGF) to derive ephemeral session keys independently at the edge. Furthermore, the system utilizes the GSH to drive an “Entropy Ratchet,” continuously evolving the internal secrets of each node to ensure Perfect Forward Secrecy. By decoupling the generation of entropy from the exchange of keys, the system eliminates Man-in-the-Middle vulnerabilities. In another aspect, the invention provides a Network-Agnostic Overlay. This “Security-as-a-Service” model allows the generated multi-sphere entropy to secure any digital transmission, including third-party networks (e.g., Corporate SD-WAN, VPNs, IoT) against algorithmic and quantum threats, regardless of whether the data travels over the native network, the public internet, or any private communications network infrastructure. In yet another aspect, the invention utilizes the Global Security Hash to seed a Dynamic Routing Protocol (DRP). This protocol randomizes data packet paths across the mesh based on real-time multi-sphere fluctuations, creating a “moving target” network topology that resists traffic analysis. To achieve this, the invention comprises a Hybrid Multi-Point Architecture designed to maximize both entropy diversity and network resilience through a broad spectrum of computing apparatuses: 1. Mobile Nodes (Entropy Harvesters): Unlike systems limited to standard consumer electronics, the present invention explicitly incorporates a diverse range and mix of user-owned, proprietary, manned, remote controlled, and autonomous computing apparatuses. These include, but are not limited to: Consumer Devices: Smartphones, tablets, laptops, PCs, peripherals, and wearables utilized for passive background entropy harvesting.Proprietary Hardware: Custom-built handheld and/or wearable transceivers and devices optimized for high-sensitivity multi-sphere telemetry and entropy