Creative Synergies LLC Banner

About Us

Over a decade ago, I was given a prophecy, followed by a dream that inspired the creation of ZipIPS™, a patented Intrusion Prevention System (IPS). Creative Synergies LLC was founded to bring this vision to life. Initially, I thought this strategy would protect cloud computing clients and hosts. Then the Internet of Things (IoT) came along and that clearly would benefit from enhanced security. Most recently, quantum computing, with the ability to massively attack passwords by recursive algorithms, became a threat—a threat that ZipIPS™ is uniquely designed to thwart. You see, with ZipIPS™ every attempt is tied to a timestamp. Any new guess would be with a different timestamp, and therefore a different password.

Systems can be designed for the client to request confirmation from the device sending a change of instructions, by simply asking for the code along with the current timestamp. Only authorized operators would have the timestamp and associated password. So, think of a drone out on a mission with a hacker trying to take control of where it was going. ZipIPS™ would prevent anyone from a common hacker to a foreign entity with quantum computing resources from changing that drone’s mission.

Our Mission

My mission is to license ZipIPS™ to organizations that need to secure IoT ecosystems against both conventional attacks and quantum-based threats. ZipIPS™ provides quantum-secure authentication powered by NanoTimestamp Power — credentials tied to a single, unrepeatable moment in time. No static keys. No replayable tokens. And because any device can challenge the commanding host before executing a new instruction, only authorized sources can issue commands that are acted upon. Failed attempts are immediately blocked, permanently logged, and available for review. Creative Synergies LLC invites qualified organizations to explore licensing these patented technologies — and to be part of building a more trustworthy digital world.

Learn More About ZipIPS™

The video above describes how ZipIPS™ came into this world and offers a glimpse of what this powerful tool has to contribute to state-of-the-art cybersecurity. If you'd like to replay the video, we recommend turning on the sound—maybe not full blast, it can get loud depending on your settings. It isn't by John Williams, but we still think it is pretty cool! The video software does not support the "™" symbol, so you will only see ZipIPS there. For a deeper dive, visit our ZipIPS™ page.

And God said “I will give you something that will prevent people from coming in unauthorized.” Then there was a dream—predators never caught the prey. Every time they jumped, they missed. Every time… TIME… TIMESTAMPS! And ZipIPS™ was born. How unique is it? It has TWO patents! Then Grok said “ZipIPS™ is better than NIST standards for Post-Quantum Cryptography”

And Grok Said

Just recently, I became aware of Grok xAI and asked for an analysis of my patents and how they compare to the current NIST standards for Post-Quantum Cryptography. I gave Grok my patent numbers and clarified any assumptions it was making. For example: timestamps and codes are only generated when a new request is made. ZipIPS™ is not constantly generating new codes, which would consume resources needlessly.

Since I am a retired chemist and not an expert on the state of the art computer systems, I asked Grok what was the shortest timestamp interval available on current commercial systems. Grok said nanoseconds are common. So, my patents, based on milliseconds, suddenly became much more powerful when microsecond and nanosecond timestamp data were added.

Independent analyses by Grok 4 (xAI) and Claude (Anthropic) — conducted separately and reaching the same conclusions — confirm that ZipIPS™ exceeds current NIST standards for both Post-Quantum Cryptography and Lightweight Cryptography, delivering greater security in a significantly smaller credential.

ZipIPS™ has a wide range of applications across various industries. We invite you to browse the numerous ways ZipIPS™ can be used to secure IoT systems and protect against cyber threats on our White Papers page.

If you have ideas for new uses not listed, we’d love to hear your feedback! Please share your thoughts with us on our Contact Us page.