Patents by Inventor Jon Fisher

Jon Fisher has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070165849
    Abstract: Systems and methods for providing encryption and decryption of data transmitted on a computer implemented network, preferably user authentication identifier data, such as a password, at the point of entry into the user's computer. The systems and methods enable an end user to mentally select a marker from one of the randomly arranged elements on a first portion of a graphical image. A second portion of the graphical image includes an arrangement of possible elements of any individual authentication identifier sequence, and is positioned adjacent to the first portion. The systems and methods prompt a user to enter each element of the identifier by moving the selected marker and the first portion as necessary to substantially align the selected marker with a chosen element of the authentication identifier appearing on the outer portion. According to one embodiment, the image portions are concentric wheels. According to another embodiment, the image portions are arranged in adjacent rows.
    Type: Application
    Filed: December 22, 2005
    Publication date: July 19, 2007
    Inventors: Thomas Varghese, Steven Harris, Jon Fisher, Don Durai
  • Publication number: 20060282660
    Abstract: The present invention provides systems and methods for authenticating access requests from user devices by presenting one of a plurality of graphical user interfaces selected depending on a perceived risk of fraud associated with the devices. User devices are identified with fingerprinting information, and their associated risks of fraud are determined from past experience with the device or with similar devices and from third party information. In preferred embodiments, different graphical user interfaces are presented based on both fraud risk and, in the case of a known user, usability. In preferred embodiments, this invention is implemented as a number of communicating modules that identify user devices, assess their risk of fraud, present selected user interfaces, and maintain databases of fraud experiences. This invention also includes systems providing these authentication services.
    Type: Application
    Filed: April 28, 2006
    Publication date: December 14, 2006
    Inventors: Thomas Varghese, Jon Fisher, Steven Harris, Don Durai
  • Publication number: 20060266707
    Abstract: The invention provides for dyring methods for macroporous polymers that provide improved performance characteristics. The polymers are easy to pack and especially useful in large scale chromatography columns.
    Type: Application
    Filed: May 26, 2005
    Publication date: November 30, 2006
    Inventors: Jon Fisher, Martin Kinzey, John Maikner
  • Publication number: 20060237367
    Abstract: Macroporous polymers having selected porosity and permeability characteristics that provide rigid polymer matrices suitable for use in medium and high pressure reversed phase liquid chromatography (RPC) are disclosed. A method for preparing the polymers is also disclosed. The polymers are especially useful as stationary phases in large scale chromatography columns without developing increased pressures during prolonged use, while maintaining good chromatographic performance for targeted biomolecules, such as insulin.
    Type: Application
    Filed: April 26, 2005
    Publication date: October 26, 2006
    Inventors: Jon Fisher, Biwang Jiang, Marlin Kinzey, John Maikner
  • Publication number: 20060104446
    Abstract: Systems and methods for providing encryption and decryption of data transmitted on a computer implemented network, preferably user authentication identifier data, such as a password, at the point of entry into the user's computer. The systems and methods enable an end user to mentally select a marker from one of the randomly arranged elements on a first portion of a graphical image. A second portion of the graphical image includes an arrangement of possible elements of any individual authentication identifier sequence, and is positioned adjacent to the first portion. The systems and methods prompt a user to enter each element of the identifier by moving the selected marker and the first portion as necessary to substantially align the selected marker with a chosen element of the authentication identifier appearing on the outer portion. According to one embodiment, the image portions are concentric wheels. According to another embodiment, the image portions are arranged in adjacent rows.
    Type: Application
    Filed: December 22, 2005
    Publication date: May 18, 2006
    Inventors: Thomas Varghese, Steven Harris, Jon Fisher, Don Durai
  • Publication number: 20060020815
    Abstract: Systems and methods for providing encryption and decryption of data transmitted on a computer implemented network, preferably user authentication identifier data, such as a password, at the point of entry into the user's computer. The systems and methods enable an end user to mentally select a marker from one of the randomly arranged elements on a first portion of a graphical image. A second portion of the graphical image includes an arrangement of possible elements of any individual authentication identifier sequence, and is positioned adjacent to the first portion. The systems and methods prompt a user to enter each element of the identifier by moving the selected marker and the first portion as necessary to substantially align the selected marker with a chosen element of the authentication identifier appearing on the outer portion. According to one embodiment, the image portions are concentric wheels. According to another embodiment, the image portions are arranged in adjacent rows.
    Type: Application
    Filed: June 29, 2005
    Publication date: January 26, 2006
    Inventors: Thomas Varghese, Steven Harris, Jon Fisher, Don Durai