LEGAL · INTELLECTUAL PROPERTY

22 Patent-Pending Technologies

Every claim listed below is the subject of a US patent application filed (or in active attorney review) by Anthony S. Owens and assigned to Vibe Software Solutions. Inclusion on this list does not constitute a granted patent. This page is the canonical public list and is regenerated on each release from lib/disclosure-policy.ts.

Filing program: USPTO § 112 specification draft (attorney review).

  1. CLAIM 1

    Post-Quantum Encrypted by Construction

    ML-KEM-768 post-quantum key exchange + 512-byte uniform cells + ChaCha20-Poly1305 AEAD + Ed25519 signatures across the entire substrate. Built for the day quantum computers break the rest of the internet.

    HYVE-UT (uniform transport) — every cell on the bus is exactly 512 bytes regardless of payload, eliminating size-side-channel leakage. NIST PQC primitives end-to-end.

  2. CLAIM 1

    HYVE Bus Uniform Cell (HYVE-UT)

    Every message on the inter-organ bus is encrypted into a fixed 512-byte cell, regardless of payload size — eliminating size-based side-channel inference about what agents are doing.

    Uniform-cell construction with ChaCha20-Poly1305 AEAD framing; padding is indistinguishable from payload to any party without the cell key.

  3. CLAIM 2

    HYVE Concealed Shamir Transport (HYVE-CST)

    Shamir K-of-N secret sharing applied per byte position to bus cells, so no single relay or storage shard can reconstruct the cell content even with full network access.

  4. CLAIM 3

    HYVE Blind Routing Tokens (HYVE-BRT)

    Routing tokens that reveal the next-hop destination only to the holder of the matching key, while opaque to relays — agents communicate without leaking topology.

  5. CLAIM 4

    HYVE Ratchet

    Forward-secrecy ratchet for long-lived agent sessions — session compromise yields no past traffic, and key rotation is invisible to the application layer.

  6. CLAIM 5

    DEK/KEK Two-Tier Key Hierarchy

    Data encryption keys (DEKs) per archive, wrapped under key encryption keys (KEKs) in the operator vault, with cross-tenant isolation enforced at the type level.

  7. CLAIM 6

    GF(256) Shamir Recovery

    Recover encrypted archives from partial shard loss using GF(256) finite-field Shamir reconstruction — single hardware failure does not lose data.

  8. CLAIM 7

    Patent-Pending Data Protocol (.hyvedata)

    Per-chunk AES-256-GCM encryption + Reed-Solomon GF(256) shard recovery (4+2 / 6+3 / 8+4 configurable) + PSO shard layout + Ed25519-signed manifest, keyed from your OS vault. One unlock decrypts every archive on the machine.

    .hyvedata file format — recoverable from partial corruption, mathematically tied to operator vault DEK/KEK hierarchy, signed-and-verified manifest prevents undetected tampering.

  9. CLAIM 8

    Deterministic Decide() Orchestration

    Sub-200-nanosecond-per-rule deterministic decision function combining four signals — Tide cognition, Trust reputation, Narrator audit, Augur security — into a refuse / clarify / proceed gate. Same input, same output, every time.

    decide(tide, trust, narrator, augur) → {refuse | clarify | proceed} ; benchmarked under 200 ns per rule. Determinism is the audit story — every decision can be replayed in Observatory.

  10. CLAIM 9

    Observatory Interpretability Surface

    Eight tabs for live introspection of agent behavior: Neural Brain, Stats, Agent Trace, Bus Activity, Decision Lineage, Memory Inspector, Token Economics, Replay. Every decision is reconstructible.

  11. CLAIM 10

    Tarpit + Tor + Sentinel Triad

    Layered network defense — outbound tarpitting, optional Tor relay, and Sentinel adaptive policy — combined to resist coercive traffic analysis without sacrificing throughput.

  12. CLAIM 11

    Dual-Posture ISO Pipeline

    One installer image that boots in either consumer or developer posture without separate ISOs, with reproducible builds verified by Ed25519 manifest signatures.

  13. CLAIM 12

    Tide Cognition

    Cognitive-state inference from typing rhythm — the OS knows when you are in flow, divided, or fatigued, without ever seeing the content of what you type.

    Privacy-by-construction: timing-only feature extraction, never content. Classification model is on-device, never sent to the cloud.

  14. CLAIM 13

    Panic-Wipe PIN

    A second PIN that unlocks the OS into a clean decoy state while irreversibly wiping the real vault — physical-coercion resistance built into the unlock flow.

  15. Augur Self-Policing CI Gate

    Augur audits its own source on every commit — the security tool that catches itself before catching anything else.

  16. HYVE Anima

    The agentic video generation engine inside Cinema studio — patent-pending generation pipeline.

  17. HYVE Aura

    The WiFi-CSI ambient presence sensing engine inside Sense studio — your home perceives you without cameras.

  18. HYVE LLM Creator

    Connect every LLM you already pay for — Anthropic, OpenAI, Azure, plus 53 others — through a single OAuth gateway. HYVE never sees your password. Orchestrate frontier models, local engines, quantum compute providers, and custom backends through one substrate.

    OAuth 2.0 + PKCE (RFC 7636) flow for password-free LLM provider federation across 56 providers in 7 categories (frontier hosts, aggregators, local engines, quantum, biological, custom).

  19. Leaper Differential Sandbox

    Four-tier provenance-keyed execution sandbox (KnownSigned / AiGenerated / UserUploaded / Unknown) — the OS treats every binary differently based on where it came from, automatically.

  20. Quantum Cognition Routing

    Five algorithmic patterns (Grover, QAOA, VQC, Quantum Kernels, Quantum Sampling) routed across ten quantum compute providers — the first agent OS that treats quantum hardware as a first-class compute target.

  21. Sentinel Hardware Kill-Switches

    Camera and microphone cut at the kernel module level, below userspace, below the browser. No software can override the hardware kill.

  22. Trust Federation

    Cross-tenant agent reputation lookup — your Omega can ask the network whether an agent has earned trust elsewhere before delegating to it locally.

FOOTNOTE · TIMELINE

Patent applications are filed in advance of public disclosure. Granted patents will be added to a separate /legal/granted-patents page when the USPTO issues notices of allowance. Founding members receive notification of every patent grant for the lifetime of their license.