{"id":400,"date":"2023-04-24T23:39:33","date_gmt":"2023-04-24T23:39:33","guid":{"rendered":"https:\/\/nau.edu\/research\/?page_id=400"},"modified":"2024-12-12T18:02:55","modified_gmt":"2024-12-12T18:02:55","slug":"dynamic-hybridized-positional-notation-instruction","status":"publish","type":"page","link":"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/dynamic-hybridized-positional-notation-instruction\/","title":{"rendered":"Dynamic Hybridized Positional Notation Instruction Set Computer Architecture to Enhance Security"},"content":{"rendered":"<div class=\"nau-block nau-block-left-nav-top-bound\">\n    \t<button id=\"left-nav-toggle-btn\" onclick=\"toggleNav();\">\n\t\tON THIS PAGE \n\t\t<i id=\"chevron-icon\" class=\"fas fa-solid fa-chevron-down\"><\/i>\n\t<\/button>\n\t<div id=\"left-nav-menu-track\">\n\t\t<div id=\"left-nav-wrapper\">\n\t\t\t<div class=\"rfi-above-anchor-tags\">\n\t\t\t\t<div class=\"ri-container\">\n\t\t\t\t\t<a href=\"https:\/\/nau.edu\/admissions\/request-information\/\" id=\"request-info\" class=\"btn bg-true-blue left-nav-menu-bottom-button display-mobile\">Request info&nbsp;&nbsp;<\/a>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div id=\"left-nav-menu\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"menu-section backcolor\">\n\t\t\t\t\t<div class=\"header\">\n\t\t\t\t\t\tHOW CAN WE HELP?\t\t\t\t\t<\/div>\n\t\t\t\t\t<ul class=\"responsive-icons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"tel:928-523-4620\"><img decoding=\"async\" src=\"https:\/\/in.nau.edu\/wp-content\/themes\/nau-marketing-2021\/img\/icon-phone.svg\" alt=\"Telephone:\"> 928-523-4620<\/a>\n\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"mailto:nauinnovations@nau.edu\"><img decoding=\"async\" src=\"https:\/\/in.nau.edu\/wp-content\/themes\/nau-marketing-2021\/img\/icon-email.svg\" alt=\"Email:\"><span class=\"left-nav-email\"> nauinnovations&#8203;@nau.edu <\/span><\/a><\/li>\n\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<section class=\"nau-block left-nav-section\"><header class=\"entry-header\"><div class=\"breadcrumb\"><ol class=\"breadcrumbs\"><li><a href=\"https:\/\/in.nau.edu\">IN<\/a><span class=\"breadcrumb-chevron\" aria-hidden=\"true\">&gt;<\/span><\/li><li><a href=\"https:\/\/in.nau.edu\/research\">Research<\/a><span class=\"breadcrumb-chevron\" aria-hidden=\"true\">&gt;<\/span><\/li><li class=\"current\">Pages<\/li><\/ol><\/div><h1 class=\"entry-title text-left \">Dynamic Hybridized Positional Notation Instruction Set Computer Architecture to Enhance Security<\/h1><hr class=\"h1-hr  text-left \" role=\"none\"><\/header><!-- .entry-header --><\/section><!-- <section class=\"nau-block left-nav-section grid-md-12\">\n    <header class=\"entry-header\">\n        <h1 class=\"entry-title text-left \" tabindex=\"0\" id=\"h1-first\">Dummy H1<\/h1>\n        <hr class=\"h1-hr  text-left \" role=\"none\">\n    <\/header>\n<\/section> -->\n\n<section class=\"nau-block left-nav-section grid-md-12\">\n    <div class=\"page-content\">\n        \n\n<h2 class=\"wp-block-heading\">Description<\/h2>\n\n\n\n<p>The technology relates to a computer architecture that is capable to execute instructions in different positional notation values. The definition of a positional notation value is given by the general formula that represents a base 10 numeral in any positional notation. The computer architecture includes a special routing unit that hybridizes the instructions of multiple positional notation values, in variable rations. The routing unit has a temporal control dynamically switching between multiple hybridized instruction sets. Furthermore, the novel computer architecture can be applied to enhance security, whereby a software code is segmented into sequences of different code variations aimed at different computing units.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Additional information<\/h2>\n\n\n\n<section  \n    class=\"nau-block nau-block-panels   \" \n    data-layout_mobile=\"groupLayout-Stack gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\"\n        data-layout_tablet=\"groupLayout-Stack gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\"\n        data-layout_desktop=\"groupLayout-Tabs gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\"\n        data-layout_xl=\"groupLayout-Tabs gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\">\n\n    <div class=\"background-wrapper\">\n        <div class=\"block-main-content\">\n            \n            \n                            <div class=\"tab-nav\" role=\"tablist\" aria-label=\"Tabs for  articles\">\n                                                \n                        <button data-panel=\"panel--0\"\n                            role=\"tab\"\n                            aria-controls=\"panel--0\"\n                            class=\"active bg-true-blue bg-none\"\n                            tabindex=\"0\">Patent number and inventor<\/button>\n                                                \n                        <button data-panel=\"panel--1\"\n                            role=\"tab\"\n                            aria-controls=\"panel--1\"\n                            class=\"after-active bg-true-blue bg-none\"\n                            tabindex=\"-1\">Potential applications<\/button>\n                                                \n                        <button data-panel=\"panel--2\"\n                            role=\"tab\"\n                            aria-controls=\"panel--2\"\n                            class=\" bg-true-blue bg-none\"\n                            tabindex=\"-1\">Benefits and advantages<\/button>\n                                                \n                        <button data-panel=\"panel--3\"\n                            role=\"tab\"\n                            aria-controls=\"panel--3\"\n                            class=\" bg-true-blue bg-none\"\n                            tabindex=\"-1\">Case number and licensing status<\/button>\n                                    <\/div>\n            \n            \n            \n            <div class=\"panel-wrapper\">\n                \n                                \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--0\"\n                            id=\"panel--0\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Patent number and inventor<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>16\/358,509 and 16\/842,643<\/p>\n<p>Bertrand Cambou, Paul G. Flikkema, and Donald A. Telesca Jr.<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                    \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--1\"\n                            id=\"panel--1\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Potential applications<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>This technology is designed for use with cybersecurity and information assurance.<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                    \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--2\"\n                            id=\"panel--2\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Benefits and advantages<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>The primary goal of this novel computing architecture is to improve security protocols between parties communicating through a nonsecure channel. Conventional systems have a fixed architecture and known instruction set, leaving the systems vulnerable to malicious code deployed by hackers. With this technology, the system is configured to dynamically change its architecture, incorporating computing units that perform operations in different numerical bases. An outside attacker is not privy to the current state of the system. The computing architecture mitigates malware attacks which are designed to run on monolithic systems.<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                    \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--3\"\n                            id=\"panel--3\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Case number and licensing status<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>2018-014<\/p>\n<p>This invention is available for licensing.<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                                                <\/div>\n\n                    <\/div>\n    <\/div>\n<\/section>\n\n    <\/div>\n<\/section>\n\n<div class=\"nau-block nau-block-left-nav-bottom-bound\">\n\n<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":276,"featured_media":1278,"parent":59,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","ring_central_script_selection":"","footnotes":""},"class_list":["post-400","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/400","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/users\/276"}],"replies":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/comments?post=400"}],"version-history":[{"count":14,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/400\/revisions"}],"predecessor-version":[{"id":6132,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/400\/revisions\/6132"}],"up":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/59"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/media\/1278"}],"wp:attachment":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/media?parent=400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}