Computer Bunker

Digital Hegemony Proposal

Abstract

A common gate array integrated circuit and an unusual compiler can be used to provide a secure computing node. The resulting Computer Bunker would achieve digital hegemony by using cryptographically defined instruction sets that are unique for each key. Each instruction has many bits (128). Ownership of each instruction set can be shared by a team. The compiler can be written in an open source organization. Volunteers are being recruited for the Computer Bunker team.

See USA Patents Invented by Alan Folmsbee and owned by Sun, Oracle, and Intel
6,598,166 Microprocessor in which logic changes during execution
6,757,831 Instruction buffer configuration
6,675,298 Op code lengths longer than standard
6,665,796 Microprocessor instruction result obfuscation
6,609,201 Secure program execution using instruction buffer interdependencies
6,308,256 Secure execution of program instructions provided by network
4,757,468 Authenticated read-only memory

Email me to help build the Computer Bunker team: venusglobe at cabanova dot com
Invest $12,000,000 to get us started.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

Details


Microelectronics are inscrutable. As miniaturization proceeds to smaller transistor and wire dimensions, it becomes increasingly difficult for people to evaluate the logic and states of  information in a chip. Only the IO pins are available for an analyst to easily evaluate the signals. The Computer Bunker is a single chip that holds a privately owned digital arena for secret calculations. A compiler is provided to implement this region of Digital Hegemony. Cryptographically secured instructions can be sent to team members who share a secret key, without adversaries being able to execute the instructions.

The Computer Bunker is safe from viruses and spy ware because those programs use standard instructions sets. Those instructions that run on Intel and Motorola microprocessors cannot be executed inside a Computer Bunker, only instructions defined under the key can be executed.

The applications for Digital Hegemony are myriad. For example, advances in computer vision software are valuable enough to need protection from thieves. Visual information can be input to the Bunker and the brilliant conclusions can be output. The calculations are not seen, only the input data and output data. The algorithms are protected as trade secrets.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

The Computer Bunker features "instruction encryption". This is different from data encryption. Data encryption can be used for Digital Hegemony, but it is not a part of the advances proposed in this invention. The first patent on encrypted instructions is from Robert M. Best, USA Patent number 4,278,837, dated July 14, 1981. The present invention supersedes that basic idea in several ways.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$


2020 Vision for Keyed Instruction Set Computer (KISC)
by Alan Folmsbee, MSEE
July 1, 2011

In the year 2020, there will be room under KISC for a billion tycoons. The Keyed Instruction Set Computer is being developed to improve several powers for users of digital systems. Those powers are summarized in this list:

1 Immunity from viruses
2 Ownership of programs, digital rights management and software distribution infrastructure assurance
3 Trade secret protection and local hegemony
4 Creating a secure physical space in which anything goes
5 Cleanroom environment for beginning original work
6 Subservience confirmation options or global hegemony for one team
7 Integrated bunker size adjustments using physical and chemical options
8 Integrated projectors for keyboard and display
10 Wireless power supply

Digital Hegemony is achieved by assertive owners of KISC integrated bunkers. Local or global hegemony are supported equally. Local tycoons will enjoy the benefits of developing intellectual properties in a safe zone that is so small that it is impregable to most adversaries. When gate arrays are using metal lines narrower than 0.1 um, there are few laboratories in the world that can measure their voltages. When the key bits are kept off of metal lines, the buried conductors are even safer from being observed. Customized gate array products of the year 2020 will be available to enhance the security of those key signals by using special shapes of the planar materials.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

Legal Department Questions

1 Without the patents cited, will KISC be possible? Yes. New trade secrets are claimed beyond those already patented for my previous employers.
2 Will those cited patents be licensed? Yes. Money can be paid to license them.
3 Will a backdoor be possible for governments? Yes. Backdoors can be included or excluded as a logical decision made by the hegemen or subservient owners of KISC systems.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

Preferred Embodiment

A 256 bit key is chosen by an owner of a KISC gate array system. The key is used by the compiler to create a one-byte-wide instruction set that is encoded using the Salsa 20 stream cipher to produce a map to a sixteen-byte-wide instruction set. The key defines how some of the gate array wires will be connected. The key defines the "instruction buffer interdependencies" that control how instructions are loaded from a buffer of many instructions.  That loading from the buffer is done out of order and it optionally uses an XOR with a Salsa 20 stream of deterministically varying bits. The order in which instruction bytes are concatenated to load 128 bit instructions into the instruction decoder may optionally be defined by network interactions. Sequential changes in the security states can be enabled to make a moving target for adversaries who may try to interpret the input pins and output pins of the KISC

Data encryption is not needed, but it can be used. Instruction encryption is implemented without data encryption to create the KISC. Instructions are input to the KISC from ordinary RAM and cache hardware. Input data pins and output data pins are not protected by hardware. Input instruction pins can be observed by adversaries, but it is the goal of this invention to deny any value from that observation. The compiler can run on a KISC system and emit instructions that can only be executed by compatible KISC gate arrays.

The following patents have some of the techniques that were mentioned for the preferred embodiment.
6,598,166 Microprocessor in which logic changes during execution
6,757,831 Instruction buffer configuration
6,675,298 Op code lengths longer than standard
6,665,796 Microprocessor instruction result obfuscation
6,609,201 Secure program execution using instruction buffer interdependencies
6,598,166 Microprocessor in which logic changes during execution
6,308,256 Secure execution of program instructions provided by network


Concluding Remarks

In the year 2020, the KISC chips could provide people with safe nodes of hardware for which they can have confidence. Confidence that comes from impunity, from power, from secrecy.  The compiler of 2020 comes with an operating system for KISC gate arrays. When an owner has implemented the system, a team that shares the key can progress as with any  other computer to create products and designs. The trade secrets which they produce can be kept away from competitors andd away from virus-contaminated largess. The resulting 2020 products can be distributed in the form of KISC containing hardware so that portions of the product's valuables are calculated in an inscrutable place. Smart phones and personal computers can run on KISC at speeds that are ten times slower than the fastest electronic devices of the day. Millions of tycoons will flourish without the extensive piracy of software and ideas that is common in 2011.