Patents by Inventor Michael Fiske
Michael Fiske has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7979716Abstract: In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.Type: GrantFiled: May 17, 2005Date of Patent: July 12, 2011Assignee: Biogy, Inc.Inventor: Michael Fiske
-
Patent number: 7886155Abstract: The security of an entity is protected by using passcodes. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator.Type: GrantFiled: April 12, 2005Date of Patent: February 8, 2011Assignee: Biogy, Inc.Inventor: Michael Fiske
-
Patent number: 7770018Abstract: In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.Type: GrantFiled: May 25, 2005Date of Patent: August 3, 2010Assignee: Biogy, Inc.Inventor: Michael Fiske
-
Publication number: 20100011222Abstract: Protecting the security of an entity by using passcodes is disclosed. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator.Type: ApplicationFiled: April 13, 2005Publication date: January 14, 2010Inventor: Michael Fiske
-
Patent number: 7423515Abstract: In an embodiment, a lock mechanism has a lock shaft, a motor, and a lock cylinder, wherein the motor rotates a cog that moves the lock cylinder into and out of the lock shaft. The lock cylinder is oriented concentric to an axis about which the lock cylinder rotates. Rotating the cog causes the lock cylinder to rotate about the axis, which in turn causes the lock cylinder to more into and out of the lock shaft in a direction along the axis. In an embodiment, the cog has no translational motion in a direction parallel to the axis. The lock cylinder may have grooves, and the cog may engage the grooves. Rotating the cog may causes the lock cylinder to rotate with the cog, and the cog to slide within the grooves as the lock cylinder moves along the axis.Type: GrantFiled: July 11, 2004Date of Patent: September 9, 2008Assignee: Biogy Inc.Inventors: Michael Fiske, Jon Louis
-
Publication number: 20080024272Abstract: Biometric Authentication Lock Mechanism, called BALM, is a novel fingerprint enabled lock mechanism for bike locks, lockboxes, handguns, luggage, briefcases, desk drawers, cash registers, gym lockers and padlocks. Until BALM, mechanical locks required a key, a combination number, or an access code. Furthermore, most of these locks utilized a tumbler. BALM enables customers to open their lock with only their finger. With BALM, there are no more keys to lose, or combination numbers to forget.Type: ApplicationFiled: July 22, 2007Publication date: January 31, 2008Inventor: Michael Fiske
-
Publication number: 20070288668Abstract: An active element machine is a new kind of computing machine. When implemented in hardware, the active element machine can execute multiple instructions simultaneously, because every one of its computing elements is active. This greatly enhances the computing speed. By executing a meta program whose instructions change the connections in a dynamic active element machine, the active element machine can perform tasks that a digital computer are unable to compute. In an embodiment, instructions in a computer language are translated into instructions in a register machine language. The instructions in the register machine language are translated into active element machine instructions. In an embodiment, an active element machine may be programmed using instructions for a register machine. The active element machine is not limited to these embodiments.Type: ApplicationFiled: April 24, 2007Publication date: December 13, 2007Inventor: Michael Fiske
-
Patent number: 7215769Abstract: NADO is a process for encrypting and decrypting information in a variety of cryptographic devices. The underlying process is a fast stream-like cipher that can be implemented efficiently in analog or digital hardware or in software. The NADO process makes use of three novel methods in cryptography: 1) A sequence of permutations which scrambles and spreads out the encrypted information; (2) A state generator built with a non-autonomous dynamical system to generate an unpredictable sequence of states; (3) One or more perturbators which perturb both the non-autonomous dynamical system and the sequence of permutations in a non-periodic way.Type: GrantFiled: October 25, 2003Date of Patent: May 8, 2007Assignee: Fiske Software LLCInventor: Michael Fiske
-
Publication number: 20070079108Abstract: An active element machine is a new kind of computing machine. When implemented in hardware, the Active element machine can execute multiple instructions simultaneously, because every one of its computing elements is active. This greatly enhances the computing speed. By executing a meta program whose instructions change the connections in a dynamic Active element machine, the Active element machine can perform tasks that digital computers are unable to compute.Type: ApplicationFiled: July 11, 2005Publication date: April 5, 2007Inventor: Michael Fiske
-
Publication number: 20060277533Abstract: In an embodiment, instructions in a computer language are translated into instructions in a register machine language. The instructions in the register machine language are translated into active element machine instructions. In an embodiment, an active element machine may be programmed using instructions for a register machine.Type: ApplicationFiled: June 27, 2006Publication date: December 7, 2006Inventor: Michael Fiske
-
Publication number: 20060259894Abstract: An Effector machine is a new kind of computing machine. When implemented in hardware, the Effector machine can execute multiple instructions simultaneously because every one of its computing elements is active. This greatly enhances the computing speed. By executing a meta program whose instructions change the connections in a dynamic Effector machine, the Effector machine can perform tasks that digital computers are unable to compute.Type: ApplicationFiled: March 2, 2004Publication date: November 16, 2006Inventor: Michael Fiske
-
Publication number: 20060230284Abstract: Protecting the security of an entity by using passcodes is disclosed. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator.Type: ApplicationFiled: April 12, 2005Publication date: October 12, 2006Inventor: Michael Fiske
-
Publication number: 20060129811Abstract: In one embodiment, messages are encrypted with encrypted transformations that commute with one another. In another embodiment, a message is divided into message segments, and with each encrypted message segment one or more encrypted keys are sent. The encrypted keys may be used to decrypt a message segment that is sent at another time, such as the next message segment to be sent. In another embodiment, a sender encrypts a message with a first encryption, which may be unknown to the receiver. Then a receiver encrypts the message with a second encryption. Next the sender removes the first encryption, thereby allowing the receiver to reconstitute the original message by removing the second encryption.Type: ApplicationFiled: December 8, 2005Publication date: June 15, 2006Inventor: Michael Fiske
-
Publication number: 20060117188Abstract: Quality of biometric prints is enhanced by any one of several different methods. In one embodiment, if a biometric print does not have a high enough quality, the biometric print is discarded. In another embodiment, a matching score is associated with the degree to which the two biometric prints match. In another embodiment, a ranking is associated with a biometric print, and the ranking is determined based upon two or more matching scores associated with the biometric print. In another embodiment, a variety of distinguishing features are derived from a given biometric print and are stored for authenticating a biometric print of a user requesting access to a secure entity. In an embodiment, a transformation is applied to at least a portion of a newly acquired biometric print to improve the match of the newly acquired biometric print to a stored biometric print.Type: ApplicationFiled: November 17, 2005Publication date: June 1, 2006Inventors: Michael Fiske, Jon Louis
-
Publication number: 20060107063Abstract: Protecting the security of an entity by using passcodes is disclosed. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator.Type: ApplicationFiled: April 11, 2005Publication date: May 18, 2006Inventor: Michael Fiske
-
Publication number: 20060107064Abstract: Protecting the security of an entity by using passcodes is disclosed. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator.Type: ApplicationFiled: April 14, 2005Publication date: May 18, 2006Inventor: Michael Fiske
-
Publication number: 20060107041Abstract: In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after the receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the acccess key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.Type: ApplicationFiled: May 25, 2005Publication date: May 18, 2006Inventor: Michael Fiske
-
Publication number: 20060107309Abstract: In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after the receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the acccess key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.Type: ApplicationFiled: May 20, 2005Publication date: May 18, 2006Inventor: Michael Fiske
-
Publication number: 20060107312Abstract: Protecting the security of an entity by using passcodes is disclosed. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator.Type: ApplicationFiled: April 7, 2005Publication date: May 18, 2006Inventor: Michael Fiske
-
Publication number: 20060107315Abstract: In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after the receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the acccess key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.Type: ApplicationFiled: May 31, 2005Publication date: May 18, 2006Inventor: Michael Fiske