Patents Assigned to Fiske Software LLC
-
Patent number: 11876889Abstract: A symmetric cryptography for encrypting and decrypting information is provided, that can be implemented efficiently in hardware or in software. The symmetric cryptography uses a key generator, so that the cryptography is not dependent on a single, static cryptography key. The key generator is a value or collection of values from which the key is generated. In some embodiments, the key generator substantially increases the computational complexity of differential cryptanalysis and other cryptographic attacks because it has more entropy than the key(s). In an embodiment, the key generator is updated with one-way functions exhibiting the avalanche effect, which generates an unpredictable sequence of keys used during the encryption or decryption process. In an embodiment, a dynamic key is derived from a key generator with a one-way function. In an embodiment, a block cipher uses a different dynamic key to encrypt each block of plaintext, where each key is derived from a different key generator.Type: GrantFiled: March 23, 2020Date of Patent: January 16, 2024Assignee: Fiske Software, LLCInventor: Michael Stephen Fiske
-
Patent number: 11818261Abstract: This invention pertains to protecting communications between multiple sensors and emitters or securing data transmission between multiple computers or multiple vehicles. This invention provides a secure method for two or more parties to communicate privately, even when the processor has malicious malware or there is a backdoor in the main processor. In some embodiments, the energy received by the sensor is encrypted before it undergoes an analog to digital conversion. In some embodiments, the encryption occurs inside the sensor. In some embodiments, the encryption hardware is a part of the sensor and creates unpredictable energy changes that interact with the sensor. In some embodiments, there are less than 40 sensors in a communication system and in other embodiments there are more than 1 billion sensors. In some embodiments, the invention provides a method for the sensors of a network of self-driving cars to communicate securely.Type: GrantFiled: May 30, 2020Date of Patent: November 14, 2023Assignee: Fiske Software, LLCInventor: Michael Stephen Fiske
-
Patent number: 11171934Abstract: A process of hiding a key or data inside of random noise is introduced, whose purpose is to protect the privacy of the key or data. In some embodiments, the random noise is produced by quantum randomness, using photonic emission with a light emitting diode. When the data or key generation and random noise have the same probability distributions, and the key size is fixed, the security of the hiding can be made arbitrarily close to perfect secrecy, by increasing the noise size. The hiding process is practical in terms of infrastructure and cost, utilizing the existing TCP/IP infrastructure as a transmission medium, and using light emitting diode(s) and a photodetector in the random noise generator. In some embodiments, symmetric cryptography encrypts the data before the encrypted data is hidden in random noise, which substantially amplifies the computational complexity.Type: GrantFiled: June 15, 2019Date of Patent: November 9, 2021Assignee: Fiske Software LLCInventor: Michael Stephen Fiske
-
Patent number: 11140141Abstract: This invention pertains to secure communications between multiple parties and/or secure computation or data transmission between multiple computers or multiple vehicles. This invention provides a secure method for three or more parties to establish one or more shared secrets between all parties. In some embodiments, there are less than 40 parties and in other embodiments there are more than 1 million parties that establish a shared secret. In some embodiments, establishing a shared secret among multiple parties provides a method for a secure conference call. In some embodiments, a shared secret is established with multiple computer nodes across the whole earth to help provide a secure Internet infrastructure that can reliably and securely route Internet traffic. In some embodiments, a shared secret is established so that self-driving vehicles may securely communicate and securely coordinate their motion to avoid collisions.Type: GrantFiled: September 17, 2018Date of Patent: October 5, 2021Assignee: Fiske Software LLCInventor: Michael Stephen Fiske
-
Publication number: 20200322146Abstract: This invention pertains to protecting communications between multiple sensors and emitters or securing data transmission between multiple computers or multiple vehicles. This invention provides a secure method for two or more parties to communicate privately, even when the processor has malicious malware or there is a backdoor in the main processor. In some embodiments, the energy received by the sensor is encrypted before it undergoes an analog to digital conversion. In some embodiments, the encryption occurs inside the sensor. In some embodiments, the encryption hardware is a part of the sensor and creates unpredictable energy changes that interact with the sensor. In some embodiments, there are less than 40 sensors in a communication system and in other embodiments there are more than 1 billion sensors. In some embodiments, the invention provides a method for the sensors of a network of self-driving cars to communicate securely.Type: ApplicationFiled: May 30, 2020Publication date: October 8, 2020Applicant: Fiske Software, LLCInventor: Michael Stephen Fiske
-
Patent number: 10592651Abstract: Methods and systems described herein perform a secure transaction. A display presents images that are difficult for malware to recognize but a person can recognize. In at least one embodiment, a person communicates transaction information using visual images received from the service provider system. In at least one embodiment, a universal identifier is represented by images recognizable by a person, but difficult for malware to recognize. In some embodiments, methods and systems are provided for determining whether to grant access, by generating and displaying visual images on a screen that the user can recognize. In an embodiment, a person presses ones finger(s) on the screen to select images as a method for authenticating and protecting communication from malware. In at least one embodiment, quantum randomness helps unpredictably vary the image location, generate noise in the image, or change the shape or texture of the image.Type: GrantFiled: September 17, 2015Date of Patent: March 17, 2020Assignee: Fiske Software LLCInventor: Michael Stephen Fiske
-
Patent number: 10403173Abstract: NADO Cryptography Using One-way Functions is a symmetric cryptography for encrypting and decrypting information. The NADO process introduces some novel concepts and methods to cryptography: (1) The notion of a key generator is presented that eliminates the dependence of the cryptographic security on a single, static cryptography key. (2) A key generator updating method built with one-way functions exhibiting the avalanche effect that generates an unpredictable sequence of keys as the encryption or decryption algorithm executes; (3) An sequence of unpredictable permutations that diffuse the informations across the whole block. (4) An sequence of unpredictable permutations that act as substitution boxes. (4) The use of key generator updating and one-way functions that exploit the avalanche effect to update the permutations in (3) and (4). NADO using one-way functions can be implemented efficiently in hardware or in software.Type: GrantFiled: June 1, 2014Date of Patent: September 3, 2019Assignee: Fiske Software, LLCInventor: Michael Stephen Fiske
-
Patent number: 10360395Abstract: A process of hiding a key or data inside of random noise is introduced, whose purpose is to protect the privacy of the key or data. In some embodiments, the random noise is produced by quantum randomness, using photonic emission with a light emitting diode. When the data or key generation and random noise have the same probability distributions, and the key size is fixed, the security of the hiding can be made arbitrarily close to perfect secrecy, by increasing the noise size. The hiding process is practical in terms of infrastructure and cost, utilizing the existing TCP/IP infrastructure as a transmission medium, and using light emitting diode(s) and a photodetector in the random noise generator. In some embodiments, symmetric cryptography encrypts the data before the encrypted data is hidden in random noise, which substantially amplifies the computational complexity.Type: GrantFiled: November 28, 2015Date of Patent: July 23, 2019Assignee: Fiske Software, LLCInventor: Michael Stephen Fiske
-
Patent number: 10356061Abstract: A process of hiding one or more public keys inside of random noise is introduced, whose purpose is to protect the privacy of the public keys. In some embodiments, the random noise is produced by quantum randomness, using photonic emission with a light emitting diode. When the public key generation and random noise have the same probability distributions, and the key size is fixed, the security of the hiding can be made arbitrarily close to perfect secrecy, by increasing the noise size. The process of hiding can protect public keys that are vulnerable to Shor's algorithm or analogs of Shor's algorithm, executed by a quantum computer. The hiding process is practical in terms of infrastructure and cost, utilizing the existing TCP/IP infrastructure as a transmission medium, and a light emitting diode(s) in the random noise generator.Type: GrantFiled: May 19, 2016Date of Patent: July 16, 2019Assignee: Fiske Software, LLCInventor: Michael Stephen Fiske
-
Patent number: 8077933Abstract: In one embodiment, biometric authentication, using fingerprints, handprints, retinal scans and voice recognition, may be used as a means of granting access to an individual, for example, to use a device or gain entry to a building, car, computer, airport, website, a bank account, execute a financial transaction, access a military installation, read or obtain confidential information, execute a legal agreement, authenticate a decision, or another entity. In another embodiment, biometric authentication can be used as an alternative to the use of a key or combination or as an additional form of authentication. Access may be in any of a number of forms. In one embodiment a collection of pairs of features from one biometric print is compared to another collection of pairs from another biometric print to determine whether biometric authentication is successful.Type: GrantFiled: September 1, 2007Date of Patent: December 13, 2011Assignee: Fiske Software, LLCInventor: Michael Stephen Fiske
-
Patent number: 8019705Abstract: In an embodiment, instructions in a computer language are translated into instructions in a register machine language. The instructions in the register machine language are translated into active element machine instructions. The use of the register machine language is optional. In an embodiment, the first translator may translate the instructions into another machine language. In an embodiment, an active element machine may be programmed using instructions for a register machine with elemental register machine instructions, such as push, pop, copy, and jump, and/or using a higher language, such as C, may be emulated with active element instructions executing on an active element machine.Type: GrantFiled: June 27, 2006Date of Patent: September 13, 2011Assignee: Fiske Software, LLC.Inventor: Michael Stephen Fiske
-
Patent number: 8010467Abstract: An active element machine is a new kind of computing machine. When implemented in hardware, the Active element machine can execute multiple instructions simultaneously, because every one of its computing elements is active. This greatly enhances the computing speed. By executing a meta program whose instructions change the connections in a dynamic Active element machine, the Active element machine can perform tasks that digital computers are unable to compute.Type: GrantFiled: July 11, 2005Date of Patent: August 30, 2011Assignee: Fiske Software LLCInventor: Michael Stephen Fiske
-
Patent number: 7657033Abstract: In one embodiment, messages are encrypted with encrypted transformations that commute with one another. In another embodiment, a message is divided into message segments, and with each encrypted message segment one or more encrypted keys are sent. The encrypted keys may be used to decrypt a message segment that is sent at another time, such as the next message segment to be sent. In another embodiment, a sender encrypts a message with a first encryption, which may be unknown to the receiver. Then a receiver encrypts the message with a second encryption. Next the sender removes the first encryption, thereby allowing the receiver to reconstitute the original message by removing the second encryption.Type: GrantFiled: December 8, 2005Date of Patent: February 2, 2010Assignee: Fiske Software LLCInventor: Michael Stephen Fiske
-
Patent number: 7398260Abstract: An Effector machine is a new kind of computing machine. When implemented in hardware, the Effector machine can execute multiple instructions simultaneously because every one of its computing elements is active. This greatly enhances the computing speed. By executing a meta program whose instructions change the connections in a dynamic Effector machine, the Effector machine can perform tasks that digital computers are unable to compute.Type: GrantFiled: March 2, 2004Date of Patent: July 8, 2008Assignee: Fiske Software LLCInventor: Michael Stephen Fiske
-
Patent number: 7249116Abstract: This invention relates to the machine recognition and learning of predetermined categories and more generally, to the representation of patterns, information and knowledge in computational applications. A method of learning categories is an important component of advanced software technology. This invention has applications in the following areas: bioinformatics, document classification, document similarity, financial data mining, goal-based planners, handwriting and character recognition, information retrieval, natural language processing, natural language understanding, pattern recognition, search engines, strategy based domains such as business, military and games, and vision recognition.Type: GrantFiled: April 6, 2003Date of Patent: July 24, 2007Assignee: Fiske Software, LLCInventor: Michael Stephen Fiske
-
Patent number: 7215769Abstract: NADO is a process for encrypting and decrypting information in a variety of cryptographic devices. The underlying process is a fast stream-like cipher that can be implemented efficiently in analog or digital hardware or in software. The NADO process makes use of three novel methods in cryptography: 1) A sequence of permutations which scrambles and spreads out the encrypted information; (2) A state generator built with a non-autonomous dynamical system to generate an unpredictable sequence of states; (3) One or more perturbators which perturb both the non-autonomous dynamical system and the sequence of permutations in a non-periodic way.Type: GrantFiled: October 25, 2003Date of Patent: May 8, 2007Assignee: Fiske Software LLCInventor: Michael Fiske