There are two ideas here - how to construct a sharable model without a zero-knowledge-proof such that the receiver gains nothing from working on your model and how to construct a revenue stream from a single sale product. These generic iseas are applied to my efforts.
Two new method of software construction and sale
Non-cloud sold software as a service
Aaquantum-co-opt- Two new method of software construction and sale
Two new method of software construction and sale
Non-cloud sold software as a service
Aaquantum-co-opt- Two new method of software construction and sale
Sometime, an expansive
small core can underlie a large number of applications such that the core is
required essentially in all applications. Typical example of essential core is
solution to NP-Complete problem. In these cases, a simulation of some
applications can be built using copy-left software; all except the essential
core.
The essential core is
simulated by a table lookup. The entire simulation can now be safely sent to
investors, alpha users, market specialist, venture capitalist etc. It proves
1. The progress already made
2. Safety from competition
3. Applicability to consumer uses
4. Time and cost estimates on remaining work
5. Parallelism possible in rapid deployment
6. What the investors bid on
7. Essentiality in the applications considered
It is separate from the
selling documents attached to the application. The final product is the
development of all the non-essential components given for free, without
limitations. A bounded, but functional essential core is also so available. No
one can question a proprietary component to duplicate a slow part in component
pipeline.
The essential defeat of
copy-left for some applications by doing some parts open, some closed; obeys
these cardinal rule of software from Natural Justice
1. Thou shall never call code written by others your own
2. Thou shall never interfere in viral growth of free software
3. Thou
shall never assert software-patents
Selling is accomplished by
including the complete package with extra optimized component.
The second essential method
is never sell the essential component but provide its results as a remote
software service black box which accepts an encrypted message and returns an
encrypted answer, perhaps using own values from previous transactions as well.
An
application
Rather than NP-complete,
provably hard encryption problem is used – square-root of 1000+
bit integer field. For simplicity it will be called dsqrt. Also
useful are dmul, ddiv and dexp all modulo some M, ^ is exponentiation., % is
mod. Most cryptography magic arises from remainder operation, % in C
Cryption
Put(message,
key, sender-edata, public-receiver-edata => fail | e-message, p-key, p_data)
-- all published, public-receiver-edata
has M
Get(e-message,
dsqrt(p-key,M), p-data, receiver-edata,
known-database-edata => fail |
message, who, when, serial, …)
Note
that
p-key = (key*key)%M
And
dsqrt(x,M) = (ask_me(p-key^public%M))^private%M
I know not public or
private, user finds the dsqrt since dsqrt and ^ commute! I simply calculate the
dsqrt of some number sent to me! I and consumer need each other – only customer
knows the public, only I know semiprime roots!, not sender, not receiver.
Clouds are considered union
of sub-cloud. There is one or more me in every sub-cloud. Any consumer can
select sub-clouds for enabling ask-me. Regardless of connectivity loss, as long
as one sub-cloud works, ask_me works.
Critical is me as an
essential service, whose rates can be set by marketing and advertizing
concerns, leading even to provide the whole chain as a product. Additional to
work here is conversion of any software product as periodic (annual or monthly)
service.
Elimination of
Man-in-the-middle
It is assumed that
digesting is a secure operation. How then one ensure a and b are related.
Assume that digest are half bitwidth of encryption. Then (known1^cpower%me) =
digest(a) // digest(b) && (known2^cpower%me) = digest(b) //
digest(a) where // indicates bit concatenation, implies that a, b
are related. Reason is that there is no effective way of forcing digest on
right and left implies that right has the known decryption.
Register
To setup an account in
family f, consumer does
Register(family,
f_permit,name => who,known1,known2,public,private) -- After register, only
factors of who kept.
After getting f_permit from
the family admin. After testing once, who of a name is known. Then encrypted
messages are sent. One can set up records for a name in tables and use the
digest of the block, rather than who, make who a field of the record, thus
extend binary to secure n-ary relation.
A new family is created by fregister.
fregister (
long_family_name => family, permit_base)
f_permit(name) =
permit_base ^ digest(name)
Secure broadcast
The message can be
encrypted once. So is p_data. They are published once on a cloud. The key is
squared once for any recipient in consumer who to p_key. To read, the recipient
gets the dsqrt from me. Uses that to decrypt e_message and e_data.
Secure message
To guard against malicious
cloud modification, the sender can pass the square of the digest of message.
That can also be dsqrt and checked.
Relevance to class-of-75,
other friends and me
In order to ensure freedom
from bugs most of software must be open source. But that makes software hard to
get revenue from. Also socialist FSF, with its copy-left, has collided with
other less restrictive open sources. Ideal situation is mine who claims
knowledge of a very hard problem, whose answers can be checked easily on every
use and whose veracity can be checked by testing, even by adaptive dsqrt.
Further most of the program is open source. Open or closed source replacements
are possible provided that the extender disclaims any software patent actions.
With this in mind, family,
class-of-75, other friends, investors, venture capitalists and journalists can
peruse to answer
1. Feasibility of making money
2. How much has already been
done
3. Competition and uniqueness
4. Difficulty in compete by
this method
5. Difficulty in compete by
another method
6. Lack of disadvantages by
open source
--------------------------------------------------------------------
Aaquantum-co-opt- Non-cloud sold software as a service
Sometimes, one is interested
in viewing software products as periodic service, where people buy the latest
edition as a service, and the old version develops a flaw, the certificates
issued by the old software are not valid. This entire work depends on the
principle that a semi-prime is crypt-useful only if its factors are secret. If
the owner of the semi-prime discloses the factors, all crypt-certificates lose
their certificate character! It is a dumb idea to do it for messages sent by someone.
However, it is perfectly sane to do it for defeat of the man-in-the-middle!
You want to duplicate Microsoft
windows for protecting revenue!
While none of the old
messages become reusable, the certificate of genuineness of the mail owner public
is at stake! An ordinary criminal can criminalize new customers of the buyer.
The buyer has no sane option but to buy a new identity certificate! Note that
the identity certificate semi-prime idsp
has nothing to do with communication semi-prime of the buyer! If I use it to
certify identities every year, then disclosing its factors end every year means
1. All previous identity
certificates are lost
2. No communication of anyone
is disclosed.
3. Existing customers can
reuse the semi-prime as before. However, while criminals cannot spy on mail,
they can build fake confusing identity certificates and destroy some mail,
while launch some sophisticated adaptive attacks. In short the critical
principle of mine is lost – never trust anything, even repeated, without a
certificate. But this principle, or another reason, gives me clever resale
method!
Use of these ideas
Use in my secure email system is easy.
Put( target, key, sender_full,
Target-public, Certificate => emessage, ekey, letter-cert)
Get( allowed{sender}, emessage,
ekey, letter-cert, receiver_full => message, …)
Trust in sender and letter requires
certified identity!
Kill spam
My method provides a technological solution to the worldwide
problem of spam! Note that the Get is not
from anyone but from a whitelist! The list is in consumer control! It may
consist of names or recommended_by names. If the sender is
not in the whitelist, letter goes to wastelist! Initial whitelist will include
on-government-service and essential-services (police, medical, emergency etc.).
The list can be dynamically expanded or contracted. A republican certificate may
allow republican candidates, authorized to send mail. A consumer might add
democrat, republican, libertarian etc. Point is
1. Allowed list may permit not
just individuals but idea keepers.
2. Allowed ideas may or may
not be static. People conforming (even incorrect fine, the allowed cut) after 1
or 2 errors) allowed even not known.
3. Not just political but advertisement
as well! Generally some companies allowed if selling wanted. To some extent,
consumer directed advertisement!
4. Perhaps user allows movie
stars, sports stars, typical consumer, religious, business or political stars. Everyone
is allowed to be stupid.
5. Consumers are allowed to
lie on anything, including by convincing-lie
software. Change whitelist dynamically. Prevent id detection. So much for
incentivized surveys.
6. Membership in any list
requires a certificate! Days of honest SPAM are over! Today’s spammer lies
about who sent and why sent!
Use in class-of-75
Above is just a label, to
which some subscribers send letters. Essential proposed difference is trust! At
this moment, no one can truest the sender, only possible in cryptographic
transparent scene. Use of my cryptography, when done, in billion odd groups is
intended to be transparent. Instead of submitting your jewel to current email,
you submit it to aaquantum-email, also used for transcripts of allowed senders.
Unlike email, and more like Facebook, you would have, you settable, event
generators. Those specified by at least 1
class-of-75 other than yourself will be sent, via class-of-75 to the interested
and inserted, according to policy, at once, or delayed into the transcript.
Messages have a subject,
imp0licitly if replied to, explicitly if named. On consumer list of allowed links
to messages in store computer for class-of-75 (perhaps replicated) will be kept
per consumer. Simple primitives will exist to move messages to consumers. There
is no need to repeat messages again, rather than link to set of links for that
subject.
All messages will have a
one line summary, displayed in the transcript along with a link to the
body. Complete line looks
<reasonable-reco>
<who> <subject> <line …> <detail-link>
$rea above is needed to
allow a designed reader by consumer to certify that the summary is indeed a
fair summary, not a moronic headline! $who is the writer. $sub is about. $dea
is link to real mail.
Apart from <like> and <dislike>, there will
be <n-like> and <n-dislike>, Also a link to conversations.
Class-of-75 is as if a virtual person, with Facebook
like interface!
Why confident of win
There are exactly two ways
to win trust – long trustable history, or provable can’t hack i.e. cryptography.
EVERY ONE hackable WILL be hacked and that means ALL members of class-of-75.,
specially as unhackables increase and criminals become desperate! I
hope all bless me in this confluence of fighting old age and block-medium.
Regardless of philosophical belief, 2020 onwards, earth belongs to the
unhackables!
No comments:
Post a Comment