Patents by Inventor Michael Fiske

Michael Fiske has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7979716
    Abstract: In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.
    Type: Grant
    Filed: May 17, 2005
    Date of Patent: July 12, 2011
    Assignee: Biogy, Inc.
    Inventor: Michael Fiske
  • Patent number: 7886155
    Abstract: The security of an entity is protected by using passcodes. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator.
    Type: Grant
    Filed: April 12, 2005
    Date of Patent: February 8, 2011
    Assignee: Biogy, Inc.
    Inventor: Michael Fiske
  • Patent number: 7770018
    Abstract: In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.
    Type: Grant
    Filed: May 25, 2005
    Date of Patent: August 3, 2010
    Assignee: Biogy, Inc.
    Inventor: Michael Fiske
  • Publication number: 20100011222
    Abstract: Protecting the security of an entity by using passcodes is disclosed. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator.
    Type: Application
    Filed: April 13, 2005
    Publication date: January 14, 2010
    Inventor: Michael Fiske
  • Patent number: 7423515
    Abstract: In an embodiment, a lock mechanism has a lock shaft, a motor, and a lock cylinder, wherein the motor rotates a cog that moves the lock cylinder into and out of the lock shaft. The lock cylinder is oriented concentric to an axis about which the lock cylinder rotates. Rotating the cog causes the lock cylinder to rotate about the axis, which in turn causes the lock cylinder to more into and out of the lock shaft in a direction along the axis. In an embodiment, the cog has no translational motion in a direction parallel to the axis. The lock cylinder may have grooves, and the cog may engage the grooves. Rotating the cog may causes the lock cylinder to rotate with the cog, and the cog to slide within the grooves as the lock cylinder moves along the axis.
    Type: Grant
    Filed: July 11, 2004
    Date of Patent: September 9, 2008
    Assignee: Biogy Inc.
    Inventors: Michael Fiske, Jon Louis
  • Publication number: 20080024272
    Abstract: Biometric Authentication Lock Mechanism, called BALM, is a novel fingerprint enabled lock mechanism for bike locks, lockboxes, handguns, luggage, briefcases, desk drawers, cash registers, gym lockers and padlocks. Until BALM, mechanical locks required a key, a combination number, or an access code. Furthermore, most of these locks utilized a tumbler. BALM enables customers to open their lock with only their finger. With BALM, there are no more keys to lose, or combination numbers to forget.
    Type: Application
    Filed: July 22, 2007
    Publication date: January 31, 2008
    Inventor: Michael Fiske
  • Publication number: 20070288668
    Abstract: An active element machine is a new kind of computing machine. When implemented in hardware, the active element machine can execute multiple instructions simultaneously, because every one of its computing elements is active. This greatly enhances the computing speed. By executing a meta program whose instructions change the connections in a dynamic active element machine, the active element machine can perform tasks that a digital computer are unable to compute. In an embodiment, instructions in a computer language are translated into instructions in a register machine language. The instructions in the register machine language are translated into active element machine instructions. In an embodiment, an active element machine may be programmed using instructions for a register machine. The active element machine is not limited to these embodiments.
    Type: Application
    Filed: April 24, 2007
    Publication date: December 13, 2007
    Inventor: Michael Fiske
  • Patent number: 7215769
    Abstract: NADO is a process for encrypting and decrypting information in a variety of cryptographic devices. The underlying process is a fast stream-like cipher that can be implemented efficiently in analog or digital hardware or in software. The NADO process makes use of three novel methods in cryptography: 1) A sequence of permutations which scrambles and spreads out the encrypted information; (2) A state generator built with a non-autonomous dynamical system to generate an unpredictable sequence of states; (3) One or more perturbators which perturb both the non-autonomous dynamical system and the sequence of permutations in a non-periodic way.
    Type: Grant
    Filed: October 25, 2003
    Date of Patent: May 8, 2007
    Assignee: Fiske Software LLC
    Inventor: Michael Fiske
  • Publication number: 20070079108
    Abstract: An active element machine is a new kind of computing machine. When implemented in hardware, the Active element machine can execute multiple instructions simultaneously, because every one of its computing elements is active. This greatly enhances the computing speed. By executing a meta program whose instructions change the connections in a dynamic Active element machine, the Active element machine can perform tasks that digital computers are unable to compute.
    Type: Application
    Filed: July 11, 2005
    Publication date: April 5, 2007
    Inventor: Michael Fiske
  • Publication number: 20060277533
    Abstract: In an embodiment, instructions in a computer language are translated into instructions in a register machine language. The instructions in the register machine language are translated into active element machine instructions. In an embodiment, an active element machine may be programmed using instructions for a register machine.
    Type: Application
    Filed: June 27, 2006
    Publication date: December 7, 2006
    Inventor: Michael Fiske
  • Publication number: 20060259894
    Abstract: An Effector machine is a new kind of computing machine. When implemented in hardware, the Effector machine can execute multiple instructions simultaneously because every one of its computing elements is active. This greatly enhances the computing speed. By executing a meta program whose instructions change the connections in a dynamic Effector machine, the Effector machine can perform tasks that digital computers are unable to compute.
    Type: Application
    Filed: March 2, 2004
    Publication date: November 16, 2006
    Inventor: Michael Fiske
  • Publication number: 20060230284
    Abstract: Protecting the security of an entity by using passcodes is disclosed. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator.
    Type: Application
    Filed: April 12, 2005
    Publication date: October 12, 2006
    Inventor: Michael Fiske
  • Publication number: 20060129811
    Abstract: In one embodiment, messages are encrypted with encrypted transformations that commute with one another. In another embodiment, a message is divided into message segments, and with each encrypted message segment one or more encrypted keys are sent. The encrypted keys may be used to decrypt a message segment that is sent at another time, such as the next message segment to be sent. In another embodiment, a sender encrypts a message with a first encryption, which may be unknown to the receiver. Then a receiver encrypts the message with a second encryption. Next the sender removes the first encryption, thereby allowing the receiver to reconstitute the original message by removing the second encryption.
    Type: Application
    Filed: December 8, 2005
    Publication date: June 15, 2006
    Inventor: Michael Fiske
  • Publication number: 20060117188
    Abstract: Quality of biometric prints is enhanced by any one of several different methods. In one embodiment, if a biometric print does not have a high enough quality, the biometric print is discarded. In another embodiment, a matching score is associated with the degree to which the two biometric prints match. In another embodiment, a ranking is associated with a biometric print, and the ranking is determined based upon two or more matching scores associated with the biometric print. In another embodiment, a variety of distinguishing features are derived from a given biometric print and are stored for authenticating a biometric print of a user requesting access to a secure entity. In an embodiment, a transformation is applied to at least a portion of a newly acquired biometric print to improve the match of the newly acquired biometric print to a stored biometric print.
    Type: Application
    Filed: November 17, 2005
    Publication date: June 1, 2006
    Inventors: Michael Fiske, Jon Louis
  • Publication number: 20060107063
    Abstract: Protecting the security of an entity by using passcodes is disclosed. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator.
    Type: Application
    Filed: April 11, 2005
    Publication date: May 18, 2006
    Inventor: Michael Fiske
  • Publication number: 20060107064
    Abstract: Protecting the security of an entity by using passcodes is disclosed. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator.
    Type: Application
    Filed: April 14, 2005
    Publication date: May 18, 2006
    Inventor: Michael Fiske
  • Publication number: 20060107041
    Abstract: In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after the receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the acccess key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.
    Type: Application
    Filed: May 25, 2005
    Publication date: May 18, 2006
    Inventor: Michael Fiske
  • Publication number: 20060107309
    Abstract: In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after the receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the acccess key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.
    Type: Application
    Filed: May 20, 2005
    Publication date: May 18, 2006
    Inventor: Michael Fiske
  • Publication number: 20060107312
    Abstract: Protecting the security of an entity by using passcodes is disclosed. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator.
    Type: Application
    Filed: April 7, 2005
    Publication date: May 18, 2006
    Inventor: Michael Fiske
  • Publication number: 20060107315
    Abstract: In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after the receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the acccess key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.
    Type: Application
    Filed: May 31, 2005
    Publication date: May 18, 2006
    Inventor: Michael Fiske