摘要:
Methods for creating build sequences which are determined using computational chemistry algorithms to simulate mechanosynthetic reactions, and which may use the mechanosynthesis process conditions or equipment limitations in these simulations, and which facilitate determining a set of mechanosynthetic reactions that will build an atomically-precise workpiece with a desired degree of reliability. Included are methods for error correction of pathological reactions or avoidance of pathological reactions. Libraries of reactions may be used to reduce simulation requirements.
摘要:
Processes for creating build sequences are described which use computational chemistry algorithms to simulate mechanosynthetic reactions, and which may use the mechanosynthesis process conditions or equipment limitations in these simulations, and which facilitate determining a set of mechanosynthetic reactions that will build an atomically-precise workpiece with a desired degree of reliability. Included are methods for error correction of pathological reactions or avoidance of pathological reactions. Libraries of reactions may be used to reduce simulation requirements.
摘要:
Mechanosynthesis trajectories are described which are approximately coaxial, and are shown to be useful in a wide range of mechanosynthesis reactions regardless of the nature of the tip or the feedstock being transferred.
摘要:
The present invention is directed to methods for the synthesis of products via mechanosynthesis, including bootstrap means to go from atomically-imprecise to atomically-precise tools, methods for determining reaction sequences for workpieces, and methods for creating new reactions, reaction sequences and tips.
摘要:
Processes for creating build sequences are described which use computational chemistry algorithms to simulate mechanosynthetic reactions, and which may use the mechanosynthesis process conditions or equipment limitations in these simulations, and which facilitate determining a set of mechanosynthetic reactions that will build an atomically-precise workpiece with a desired degree of reliability. Included are methods for error correction of pathological reactions or avoidance of pathological reactions. Libraries of reactions may be used to reduce simulation requirements.
摘要:
Processes are described for manufacturing atomically-precise tips using one or more tips in one or more mechanosynthetic reactions to create one or more atomically-precise tips. The processes may employ a variety of feedstock, binding any of a wide range of atoms to a workpiece to build the one or more atomically-precise tips. The processes result in atomically-precise mechanosynthesis tips with a wide variety of possible tip structures using a wide range of feedstock binding elements. Characteristics of such tips that may be used when designing new embodiments are also described.
摘要:
Logically and thermodynamically reversible charge transfer (RCT) devices and logic are provided for conditionally transferring individually identifiable charge packets from one or more sources to one or more destinations under the control of one or more additional charge packets that indicate by their presence or absence whether the condition or conditions have been satisfied or not. The individual identities of all of these charge packets are substantially preserved while logic operations are being performed by this logic.
摘要:
Systems and methods that allow the formation and distribution of session keys amongst a dynamic group of users communicating over an unreliable, or lossy, network. The systems and methods according to this invention allow an intermediate session key contained in an intermediate key distribution broadcast to be determined by receiving a preceding key distribution broadcast that precedes the intermediate key distribution broadcast, the preceding key distribution broadcast including a first portion of the intermediate session key; receiving a subsequent key distribution broadcast that follows the intermediate key distribution broadcast, the subsequent key distribution broadcast including a second portion of the intermediate session key that is distinct from the first portion; and combining at least the first portion of the intermediate session key contained within the preceding key distribution broadcast and the second portion of the intermediate session key contained within the subsequent key distribution broadcast to obtain the intermediate session key.
摘要:
The functionality of “protected shareware” is controlled by digitally signed messaging protocol. Protective code within the shareware controls the functionality of the shareware in response to authorization messages which are supplied directly or indirectly by the shareware supplier. These messages are digitally signed in whole or part by or on behalf of the shareware supplier using the supplier's secret signing key. The shareware, in turn, includes the public checking key for this digital signature of the supplier, thereby enabling the protective code to authenticate any such authorization message before acting in reliance upon it. The shareware includes an integrity self-checking routine which is run at appropriate times to ensure that shareware, including its protective code, is in an anticipated state. Typically this is equivalent to a finding that the code has not been altered, but it is conceivable that the code might be dynamically altered in some authorized (i. e., “anticipated”) way.
摘要:
A method and apparatus for encrypting and decrypting data which operates efficiently on computers of differing architectures is disclosed. Unlike previous encryption/decryption method and apparatus, the present invention executes efficiently in the computer's software. The method uses part of the data input to access a table of pseudo-random numbers. The pseudo-random numbers are exclusively ORed (XORed) with the remaining part of the data input. The output from the XOR operation is then used to access the table where the other portion of the data is in turn XORed with the pseudo random numbers. This iterative process continues until the data is fully randomized. Several variations of this method are presented.