A Breakthrough in IoT Authentication

Most security systems protect a secret — a key, a password, something static that gets used over and over. The attacker's job is to find that secret. Once they have it, they're in forever.

ZipIPS™ doesn't work that way.

Every authentication credential is tied to a single, unrepeatable moment in time. Both devices independently derive the credential from pre-shared tables that never cross the network. There is no static key to steal. No credential to replay. Authentication works both ways — the client verifies the host and the host verifies the client, each generating a fresh timestamp and independently confirming the response before access proceeds. And any device can challenge the commanding host before executing a new instruction — blocking man-in-the-middle attacks before they start. Failed attempts are immediately blocked, permanently logged, and available for review.

This is Zero Trust at the device level: never trust, always verify.

ZipIPS™ is protected by two issued U.S. patents — US10171465B2 and US10348729B2 — invented by Helene E. Schmidt of Creative Synergies LLC. It is a licensable architecture, not a product. Licensees write their own implementation code, configured for their specific environment, at millisecond, microsecond, or nanosecond precision depending on their hardware capabilities.

Independent analyses by Claude (Anthropic) and Grok 4 (xAI) — conducted separately and reaching the same conclusions — confirm that ZipIPS™ delivers greater security than current NIST post-quantum and lightweight cryptography standards, in a credential one-eighth the size of CRYSTALS-Kyber-512.

How ZipIPS™ Compares

Click either chart to enlarge

NIST Security Level Comparison: Bits of Security

NIST Security Level Comparison showing ZipIPS™ entropy levels vs DES, AES-128, and Kyber-1024

ZipIPS™ ms (381 bits) · ns (476 bits) · ns+ (735 bits) — compared to DES, AES-128, and CRYSTALS-Kyber-1024

Credential Size Comparison: Bytes per Authentication

Credential size comparison showing ZipIPS™ credentials are far smaller than CRYSTALS-Kyber

ZipIPS™ credentials (95–157 bytes) vs. CRYSTALS-Kyber-512 (800 bytes) and Kyber-1024 (1,568 bytes)

Applications of ZipIPS™

ZipIPS™ applies wherever device-level authentication is required. White Papers are available for each of the following categories, providing in-depth technical and commercial insights.


  • Aerospace and Space
  • Agentic AI (White Paper coming soon)
  • AI and Edge Computing
  • Autonomous Vehicles
  • Banking and Financial Services
  • Consumer IoT
  • Defense Systems
  • Education and Research
  • Government and Public Sector
  • Healthcare IoT
  • Manufacturing
  • Media
  • Quantum Infrastructure
  • Retail and E-Commerce
  • Smart Cities
  • Smart Grids and Energy Infrastructure
  • Sports and Entertainment
  • Telecommunications
  • Transportation

ZipIPS™ is available for licensing. Please visit more pages on this site and Contact Us if you have any questions.

zipips@synergies.com