Patents by Inventor Michael Fisk

Michael Fisk has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200028864
    Abstract: Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.
    Type: Application
    Filed: October 24, 2018
    Publication date: January 23, 2020
    Inventors: Joshua Neil, Alexander Kent, Curtis Hash, JR., Michael Fisk, Alexander Brugh, Curtis Storlie, Benjamin Uphoff
  • Patent number: 10530799
    Abstract: Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.
    Type: Grant
    Filed: October 24, 2018
    Date of Patent: January 7, 2020
    Assignee: Triad National Security, LLC
    Inventors: Joshua Neil, Alexander Kent, Curtis Hash, Jr., Michael Fisk, Alexander Brugh, Curtis Storlie, Benjamin Uphoff
  • Patent number: 10122741
    Abstract: Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.
    Type: Grant
    Filed: May 26, 2016
    Date of Patent: November 6, 2018
    Assignee: Los Alamos National Security, LLC
    Inventors: Joshua Neil, Alexander Kent, Curtis Hash, Jr., Michael Fisk, Alexander Brugh, Curtis Storlie, Benjamin Uphoff
  • Patent number: 7979716
    Abstract: In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.
    Type: Grant
    Filed: May 17, 2005
    Date of Patent: July 12, 2011
    Assignee: Biogy, Inc.
    Inventor: Michael Fiske
  • Patent number: 7886155
    Abstract: The security of an entity is protected by using passcodes. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator.
    Type: Grant
    Filed: April 12, 2005
    Date of Patent: February 8, 2011
    Assignee: Biogy, Inc.
    Inventor: Michael Fiske
  • Patent number: 7870970
    Abstract: A collapsible container includes a base, a top, and opposed side covers arranged between the base and the top. The side covers have a lower section frame pivotally connected to the base and a top section frame pivotally connected to the top, and a central hinge arrangement configured so that the top section frame is pivotally movable relative to the lower section frame. The side covers can thus be selectively positioned between an erected position and a collapsed position. In the erected position, the container presents an interior space. End covers are arranged to be pivotally movable between an upright position for covering respective open ends, and a down position for allowing the side covers to be movable to the collapsed position.
    Type: Grant
    Filed: September 1, 2005
    Date of Patent: January 18, 2011
    Assignee: Collapsible Containers Pty Ltd.
    Inventor: Frank Michael Fisk
  • Patent number: 7770018
    Abstract: In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.
    Type: Grant
    Filed: May 25, 2005
    Date of Patent: August 3, 2010
    Assignee: Biogy, Inc.
    Inventor: Michael Fiske
  • Publication number: 20100011222
    Abstract: Protecting the security of an entity by using passcodes is disclosed. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator.
    Type: Application
    Filed: April 13, 2005
    Publication date: January 14, 2010
    Inventor: Michael Fiske
  • Patent number: 7423515
    Abstract: In an embodiment, a lock mechanism has a lock shaft, a motor, and a lock cylinder, wherein the motor rotates a cog that moves the lock cylinder into and out of the lock shaft. The lock cylinder is oriented concentric to an axis about which the lock cylinder rotates. Rotating the cog causes the lock cylinder to rotate about the axis, which in turn causes the lock cylinder to more into and out of the lock shaft in a direction along the axis. In an embodiment, the cog has no translational motion in a direction parallel to the axis. The lock cylinder may have grooves, and the cog may engage the grooves. Rotating the cog may causes the lock cylinder to rotate with the cog, and the cog to slide within the grooves as the lock cylinder moves along the axis.
    Type: Grant
    Filed: July 11, 2004
    Date of Patent: September 9, 2008
    Assignee: Biogy Inc.
    Inventors: Michael Fiske, Jon Louis
  • Publication number: 20080076511
    Abstract: A method relates to conducting a card based game of chance for a charity wherein a game is played at a plurality of remote play locations and the charity benefits from increased player participation. The method includes distributing game cards to purchasing players at a plurality of remote locations, the game cards containing game data related to the game of chance. At the remote locations and prior to initiation of the game, the game data of each individual game card is exchanged and validated with a central server location. Information is exchanged between the remote location and the central server location. The game of chance is conducted at the remote location and, for any purported winning cards, exchanging game data of such cards with the central server location and performing a post-game validation at the central server location of the purported winning cards.
    Type: Application
    Filed: September 18, 2007
    Publication date: March 27, 2008
    Inventor: Michael Fisk
  • Publication number: 20080024272
    Abstract: Biometric Authentication Lock Mechanism, called BALM, is a novel fingerprint enabled lock mechanism for bike locks, lockboxes, handguns, luggage, briefcases, desk drawers, cash registers, gym lockers and padlocks. Until BALM, mechanical locks required a key, a combination number, or an access code. Furthermore, most of these locks utilized a tumbler. BALM enables customers to open their lock with only their finger. With BALM, there are no more keys to lose, or combination numbers to forget.
    Type: Application
    Filed: July 22, 2007
    Publication date: January 31, 2008
    Inventor: Michael Fiske
  • Publication number: 20070288668
    Abstract: An active element machine is a new kind of computing machine. When implemented in hardware, the active element machine can execute multiple instructions simultaneously, because every one of its computing elements is active. This greatly enhances the computing speed. By executing a meta program whose instructions change the connections in a dynamic active element machine, the active element machine can perform tasks that a digital computer are unable to compute. In an embodiment, instructions in a computer language are translated into instructions in a register machine language. The instructions in the register machine language are translated into active element machine instructions. In an embodiment, an active element machine may be programmed using instructions for a register machine. The active element machine is not limited to these embodiments.
    Type: Application
    Filed: April 24, 2007
    Publication date: December 13, 2007
    Inventor: Michael Fiske
  • Patent number: 7215769
    Abstract: NADO is a process for encrypting and decrypting information in a variety of cryptographic devices. The underlying process is a fast stream-like cipher that can be implemented efficiently in analog or digital hardware or in software. The NADO process makes use of three novel methods in cryptography: 1) A sequence of permutations which scrambles and spreads out the encrypted information; (2) A state generator built with a non-autonomous dynamical system to generate an unpredictable sequence of states; (3) One or more perturbators which perturb both the non-autonomous dynamical system and the sequence of permutations in a non-periodic way.
    Type: Grant
    Filed: October 25, 2003
    Date of Patent: May 8, 2007
    Assignee: Fiske Software LLC
    Inventor: Michael Fiske
  • Publication number: 20070079108
    Abstract: An active element machine is a new kind of computing machine. When implemented in hardware, the Active element machine can execute multiple instructions simultaneously, because every one of its computing elements is active. This greatly enhances the computing speed. By executing a meta program whose instructions change the connections in a dynamic Active element machine, the Active element machine can perform tasks that digital computers are unable to compute.
    Type: Application
    Filed: July 11, 2005
    Publication date: April 5, 2007
    Inventor: Michael Fiske
  • Publication number: 20060277533
    Abstract: In an embodiment, instructions in a computer language are translated into instructions in a register machine language. The instructions in the register machine language are translated into active element machine instructions. In an embodiment, an active element machine may be programmed using instructions for a register machine.
    Type: Application
    Filed: June 27, 2006
    Publication date: December 7, 2006
    Inventor: Michael Fiske
  • Publication number: 20060259894
    Abstract: An Effector machine is a new kind of computing machine. When implemented in hardware, the Effector machine can execute multiple instructions simultaneously because every one of its computing elements is active. This greatly enhances the computing speed. By executing a meta program whose instructions change the connections in a dynamic Effector machine, the Effector machine can perform tasks that digital computers are unable to compute.
    Type: Application
    Filed: March 2, 2004
    Publication date: November 16, 2006
    Inventor: Michael Fiske
  • Publication number: 20060230284
    Abstract: Protecting the security of an entity by using passcodes is disclosed. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator.
    Type: Application
    Filed: April 12, 2005
    Publication date: October 12, 2006
    Inventor: Michael Fiske
  • Publication number: 20060205477
    Abstract: A method for adapting a game of bingo to a lottery, includes predetermining a plurality of bingo faces to achieve a desired liability profile. One or more of the plurality of bingo faces are distributed. Random call numbers are generated until a desired pattern is achieved on one or more of the distributed bingo faces.
    Type: Application
    Filed: February 17, 2006
    Publication date: September 14, 2006
    Inventors: Michael Fisk, Daniel Bower, Budd Libby
  • Publication number: 20060133297
    Abstract: A method enables the topology of an acyclic fully propagated network to be discovered. A list of switches that comprise the network is formed and the MAC address cache for each one of the switches is determined. For each pair of switches, from the MAC address caches the remaining switches that see the pair of switches are located. For each pair of switches the remaining switches are determined that see one of the pair of switches on a first port and the second one of the pair of switches on a second port. A list of insiders is formed for every pair of switches. It is determined whether the insider for each pair of switches is a graph edge and adjacent ones of the graph edges are determined. A symmetric adjacency matrix is formed from the graph edges to represent the topology of the data link network.
    Type: Application
    Filed: December 17, 2004
    Publication date: June 22, 2006
    Inventors: Daniel Quist, Eugene Gavrilov, Michael Fisk
  • Publication number: 20060129811
    Abstract: In one embodiment, messages are encrypted with encrypted transformations that commute with one another. In another embodiment, a message is divided into message segments, and with each encrypted message segment one or more encrypted keys are sent. The encrypted keys may be used to decrypt a message segment that is sent at another time, such as the next message segment to be sent. In another embodiment, a sender encrypts a message with a first encryption, which may be unknown to the receiver. Then a receiver encrypts the message with a second encryption. Next the sender removes the first encryption, thereby allowing the receiver to reconstitute the original message by removing the second encryption.
    Type: Application
    Filed: December 8, 2005
    Publication date: June 15, 2006
    Inventor: Michael Fiske