Patents by Inventor Michael Stephen Fiske

Michael Stephen Fiske has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11093614
    Abstract: Based upon the principles of randomness and self-modification a novel computing machine is constructed. This computing machine executes computations, so that it is difficult to apprehend by an adversary and hijack with malware. These methods can also be used to help thwart reverse engineering of proprietary algorithms, hardware design and other areas of intellectual property. Using quantum randomness in the random instructions and self-modification in the meta instructions, creates computations that are incomputable by a digital computer. In an embodiment, a more powerful computational procedure is created than a computational procedure equivalent to a digital computer procedure. Current digital computer algorithms and procedures can be constructed or designed with ex-machine programs, that are specified by standard instructions, random instructions and meta instructions. A novel computer is invented so that a program's execution is difficult to apprehend.
    Type: Grant
    Filed: March 27, 2019
    Date of Patent: August 17, 2021
    Assignee: AEMEA Inc.
    Inventor: Michael Stephen Fiske
  • Publication number: 20200358614
    Abstract: Methods and systems are provided for performing a secure transaction. In an embodiment, users register biometric and/or other identifying user information. A private encryption key is generated from the biometric information and/or other user information and/or information obtained from a unpredictable physical process and are stored in a secure area of a device and a public key is transmitted to the blockchain network which acts as a service provider. In some embodiments, the execution and integrity of transactions by using transaction signatures, based on visual images is disclosed. In an embodiment, a blockchain network verifies and executes the transaction.
    Type: Application
    Filed: July 27, 2020
    Publication date: November 12, 2020
    Inventor: Michael Stephen Fiske
  • Publication number: 20200322146
    Abstract: This invention pertains to protecting communications between multiple sensors and emitters or securing data transmission between multiple computers or multiple vehicles. This invention provides a secure method for two or more parties to communicate privately, even when the processor has malicious malware or there is a backdoor in the main processor. In some embodiments, the energy received by the sensor is encrypted before it undergoes an analog to digital conversion. In some embodiments, the encryption occurs inside the sensor. In some embodiments, the encryption hardware is a part of the sensor and creates unpredictable energy changes that interact with the sensor. In some embodiments, there are less than 40 sensors in a communication system and in other embodiments there are more than 1 billion sensors. In some embodiments, the invention provides a method for the sensors of a network of self-driving cars to communicate securely.
    Type: Application
    Filed: May 30, 2020
    Publication date: October 8, 2020
    Applicant: Fiske Software, LLC
    Inventor: Michael Stephen Fiske
  • Patent number: 10728027
    Abstract: Protecting the security of an entity by using passcodes is disclosed. A user's passcode device generates a passcode, where sometimes the device is called Alice. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system (called Bob or the second party), which authenticates the passcode by at least generating a passcode from a passcode generator or nonce, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator. In these embodiments, there are asymmetric secrets stored on the passcode device (Alice's device) and by the administrator (Bob's device). This adds more security so that if the backend servers are breached, the adversary cannot generate valid passcodes. In some embodiments, the passcode depends on a nonce or the rounded time.
    Type: Grant
    Filed: January 10, 2016
    Date of Patent: July 28, 2020
    Assignee: Biogy, Inc.
    Inventor: Michael Stephen Fiske
  • Publication number: 20200228315
    Abstract: A symmetric cryptography for encrypting and decrypting information is provided, that can be implemented efficiently in hardware or in software. The symmetric cryptography uses a key generator, so that the cryptography is not dependent on a single, static cryptography key. The key generator is a value or collection of values from which the key is generated. In some embodiments, the key generator substantially increases the computational complexity of differential cryptanalysis and other cryptographic attacks because it has more entropy than the key(s). In an embodiment, the key generator is updated with one-way functions exhibiting the avalanche effect, which generates an unpredictable sequence of keys used during the encryption or decryption process. In an embodiment, a dynamic key is derived from a key generator with a one-way function. In an embodiment, a block cipher uses a different dynamic key to encrypt each block of plaintext, where each key is derived from a different key generator.
    Type: Application
    Filed: March 23, 2020
    Publication date: July 16, 2020
    Inventor: Michael Stephen Fiske
  • Publication number: 20200220715
    Abstract: A common vulnerability during a Diffie-Hellman key exchange is a man-in-the-middle attack, where Eve is able to pretend she is Bob to Alice and also pretend that she is Alice to Bob. In an embodiment, after a key exchange is completed, visual image authentication between Alice and Bob can notify Alice and Bob that Eve has launched a man-in-the-middle attack. When Alice's sequence of visual images derived from her shared secret do not match Bob's sequence of visual images, Alice and Bob know that their key exchange has been compromised by Eve. In this case, Alice and Bob should perform their key exchange again. Our invention provides a malware resistant alternative to not using a root certificate during a key exchange. It is well-known that a root certificate can be compromised by an dishonest or corrupt insider. Since the institution has access to the root certificate, there is no guarantee that a rogue network administrator will not use it to personally profit, or breach the security of the system.
    Type: Application
    Filed: March 15, 2020
    Publication date: July 9, 2020
    Inventor: Michael Stephen Fiske
  • Publication number: 20200104534
    Abstract: A new computational machine is invented, called a clock machine, that is a novel alternative to computing machines (digital computers) based on logic gates. In an embodiment, computation is performed with one or more clock machines that use time. In an embodiment, a cryptographic cipher is implemented with random clock machines, constructed from a non-deterministic process, wherein the compiled set of instructions (i.e., the implementation of the cryptographic procedure) is distinct on each device or chip that executes the cryptographic cipher. In an embodiment, by using a different set of clock machines to execute two different instances of the same cryptographic procedure, each execution of a procedure looks different to malware that may try to infect and subvert the cryptographic procedure. This cryptographic process also makes timing attacks more challenging. In an embodiment, a detailed implementation of the Midori cipher with random clock machines is described.
    Type: Application
    Filed: December 2, 2019
    Publication date: April 2, 2020
    Applicant: AEMEA, Inc.
    Inventor: Michael Stephen Fiske
  • Patent number: 10592651
    Abstract: Methods and systems described herein perform a secure transaction. A display presents images that are difficult for malware to recognize but a person can recognize. In at least one embodiment, a person communicates transaction information using visual images received from the service provider system. In at least one embodiment, a universal identifier is represented by images recognizable by a person, but difficult for malware to recognize. In some embodiments, methods and systems are provided for determining whether to grant access, by generating and displaying visual images on a screen that the user can recognize. In an embodiment, a person presses ones finger(s) on the screen to select images as a method for authenticating and protecting communication from malware. In at least one embodiment, quantum randomness helps unpredictably vary the image location, generate noise in the image, or change the shape or texture of the image.
    Type: Grant
    Filed: September 17, 2015
    Date of Patent: March 17, 2020
    Assignee: Fiske Software LLC
    Inventor: Michael Stephen Fiske
  • Publication number: 20200082295
    Abstract: We describe a computing machine, called an ex-machine, that uses self-modification and randomness to enhance the computation. The name ex-machine is derived from the latin extra machinam because its can evolve as it computes so that its complexity increases without an upper bound. In an embodiment, an ex-machine program can compute languages that a Turing or standard machine cannot compute. In an embodiment, the ex-machine has three types of instructions: standard instructions, meta instructions and random instructions. In an embodiment, the meta instruction self-modify the machine as it is executing so that new instructions are added. In an embodiment, the standard instructions are expressed in the C programming language or VHDL dataflow language. Random instructions take random measurements from a random source. In an embodiment, the random source produces quantum events which are measured. In an embodiment, an ex-machine receives a computer program as input, containing only standard instructions.
    Type: Application
    Filed: June 9, 2019
    Publication date: March 12, 2020
    Inventor: Michael Stephen Fiske
  • Patent number: 10498528
    Abstract: A new computational machine is invented, called a clock machine, that is a novel alternative to computing machines (digital computers) based on logic gates. In an embodiment, computation is performed with one or more clock machines that use time. In an embodiment, a cryptographic cipher is implemented with random clock machines, constructed from a non-deterministic process, wherein the compiled set of instructions (i.e., the implementation of the cryptographic procedure) is distinct on each device or chip that executes the cryptographic cipher. In an embodiment, by using a different set of clock machines to execute two different instances of the same cryptographic procedure, each execution of a procedure looks different to malware that may try to infect and subvert the cryptographic procedure. This cryptographic process also makes timing attacks more challenging. In an embodiment, a detailed implementation of the Midori cipher with random clock machines is described.
    Type: Grant
    Filed: June 21, 2017
    Date of Patent: December 3, 2019
    Assignee: Aemea Inc.
    Inventor: Michael Stephen Fiske
  • Publication number: 20190312854
    Abstract: A process of hiding a key or data inside of random noise is introduced, whose purpose is to protect the privacy of the key or data. In some embodiments, the random noise is produced by quantum randomness, using photonic emission with a light emitting diode. When the data or key generation and random noise have the same probability distributions, and the key size is fixed, the security of the hiding can be made arbitrarily close to perfect secrecy, by increasing the noise size. The hiding process is practical in terms of infrastructure and cost, utilizing the existing TCP/IP infrastructure as a transmission medium, and using light emitting diode(s) and a photodetector in the random noise generator. In some embodiments, symmetric cryptography encrypts the data before the encrypted data is hidden in random noise, which substantially amplifies the computational complexity.
    Type: Application
    Filed: June 15, 2019
    Publication date: October 10, 2019
    Applicant: Fisks Software,LLC
    Inventor: Michael Stephen Fiske
  • Patent number: 10403173
    Abstract: NADO Cryptography Using One-way Functions is a symmetric cryptography for encrypting and decrypting information. The NADO process introduces some novel concepts and methods to cryptography: (1) The notion of a key generator is presented that eliminates the dependence of the cryptographic security on a single, static cryptography key. (2) A key generator updating method built with one-way functions exhibiting the avalanche effect that generates an unpredictable sequence of keys as the encryption or decryption algorithm executes; (3) An sequence of unpredictable permutations that diffuse the informations across the whole block. (4) An sequence of unpredictable permutations that act as substitution boxes. (4) The use of key generator updating and one-way functions that exploit the avalanche effect to update the permutations in (3) and (4). NADO using one-way functions can be implemented efficiently in hardware or in software.
    Type: Grant
    Filed: June 1, 2014
    Date of Patent: September 3, 2019
    Assignee: Fiske Software, LLC
    Inventor: Michael Stephen Fiske
  • Publication number: 20190251262
    Abstract: Based upon the principles of randomness and self-modification a novel computing machine is constructed. This computing machine executes computations, so that it is difficult to apprehend by an adversary and hijack with malware. These methods can also be used to help thwart reverse engineering of proprietary algorithms, hardware design and other areas of intellectual property. Using quantum randomness in the random instructions and self-modification in the meta instructions, creates computations that are incomputable by a digital computer. In an embodiment, a more powerful computational procedure is created than a computational procedure equivalent to a digital computer procedure. Current digital computer algorithms and procedures can be constructed or designed with ex-machine programs, that are specified by standard instructions, random instructions and meta instructions. A novel computer is invented so that a program's execution is difficult to apprehend.
    Type: Application
    Filed: March 27, 2019
    Publication date: August 15, 2019
    Applicant: AEMEA INC.
    Inventor: Michael Stephen Fiske
  • Patent number: 10360395
    Abstract: A process of hiding a key or data inside of random noise is introduced, whose purpose is to protect the privacy of the key or data. In some embodiments, the random noise is produced by quantum randomness, using photonic emission with a light emitting diode. When the data or key generation and random noise have the same probability distributions, and the key size is fixed, the security of the hiding can be made arbitrarily close to perfect secrecy, by increasing the noise size. The hiding process is practical in terms of infrastructure and cost, utilizing the existing TCP/IP infrastructure as a transmission medium, and using light emitting diode(s) and a photodetector in the random noise generator. In some embodiments, symmetric cryptography encrypts the data before the encrypted data is hidden in random noise, which substantially amplifies the computational complexity.
    Type: Grant
    Filed: November 28, 2015
    Date of Patent: July 23, 2019
    Assignee: Fiske Software, LLC
    Inventor: Michael Stephen Fiske
  • Patent number: 10356061
    Abstract: A process of hiding one or more public keys inside of random noise is introduced, whose purpose is to protect the privacy of the public keys. In some embodiments, the random noise is produced by quantum randomness, using photonic emission with a light emitting diode. When the public key generation and random noise have the same probability distributions, and the key size is fixed, the security of the hiding can be made arbitrarily close to perfect secrecy, by increasing the noise size. The process of hiding can protect public keys that are vulnerable to Shor's algorithm or analogs of Shor's algorithm, executed by a quantum computer. The hiding process is practical in terms of infrastructure and cost, utilizing the existing TCP/IP infrastructure as a transmission medium, and a light emitting diode(s) in the random noise generator.
    Type: Grant
    Filed: May 19, 2016
    Date of Patent: July 16, 2019
    Assignee: Fiske Software, LLC
    Inventor: Michael Stephen Fiske
  • Patent number: 10268843
    Abstract: Based upon Turing incomputability, connectedness and properties of the active element machine (AEM), a malware-resistant computing machine is constructed. The active element computing machine is a non-Turing, non-register machine. AEM programs are designed so that the purpose of the AEM computations are difficult to apprehend by an adversary and hijack with malware. These methods can also be used to help thwart reverse engineering of proprietary algorithms, hardware design and other areas of intellectual property. Using quantum randomness, the AEM can deterministically execute a universal Turing machine (universal digital computer program) with active element firing patterns that are Turing incomputable. In an embodiment, a more powerful computational procedure is created than Turing's computational procedure (equivalent to a digital computer procedure). Current digital computer algorithms and procedures can be derived or designed with a Turing machine computational procedure.
    Type: Grant
    Filed: March 10, 2015
    Date of Patent: April 23, 2019
    Assignee: Aemea Inc.
    Inventor: Michael Stephen Fiske
  • Publication number: 20190089687
    Abstract: This invention pertains to secure communications between multiple parties and/or secure computation or data transmission between multiple computers or multiple vehicles. This invention provides a secure method for three or more parties to establish one or more shared secrets between all parties. In some embodiments, there are less than 40 parties and in other embodiments there are more than 1 million parties that establish a shared secret. In some embodiments, establishing a shared secret among multiple parties provides a method for a secure conference call. In some embodiments, a shared secret is established with multiple computer nodes across the whole earth to help provide a secure Internet infrastructure that can reliably and securely route Internet traffic. In some embodiments, a shared secret is established so that self-driving vehicles may securely communicate and securely coordinate their motion to avoid collisions.
    Type: Application
    Filed: September 17, 2018
    Publication date: March 21, 2019
    Inventor: Michael Stephen Fiske
  • Publication number: 20190050554
    Abstract: Methods and systems described herein perform a method or system of authentication. In some embodiments, the system of authentication uses visual images and/or text phrases that advertise an institution, person, product or service. In some embodiments, a display presents images that are difficult for malware to recognize but a person can recognize. In at least one embodiment, a person communicates transaction information using visual images received from the service provider system. In some embodiments, methods and systems are provided for determining whether to grant access, by generating and displaying visual images on a screen that the user can recognize. In an embodiment, a person presses ones finger(s) on the screen to select images as a method for authenticating and protecting communication from malware. In at least one embodiment, quantum randomness helps unpredictably vary the image location, generate noise in the image, or change the shape or texture of the image.
    Type: Application
    Filed: October 5, 2018
    Publication date: February 14, 2019
    Inventor: Michael Stephen Fiske
  • Publication number: 20180233069
    Abstract: NADO Cryptography Using One-way Functions is a symmetric cryptography for encrypting and decrypting information. The NADO process introduces some novel concepts and methods to cryptography: (1) The notion of a key generator is presented that eliminates the dependence of the cryptographic security on a single, static cryptography key. (2) A key generator updating method built with one-way functions exhibiting the avalanche effect that generates an unpredictable sequence of keys as the encryption or decryption algorithm executes; (3) An sequence of unpredictable permutations that diffuse the informations across the whole block. (4) An sequence of unpredictable permutations that act as substitution boxes. (4) The use of key generator updating and one-way functions that exploit the avalanche effect to update the permutations in (3) and (4). NADO using one-way functions can be implemented efficiently in hardware or in software.
    Type: Application
    Filed: June 1, 2014
    Publication date: August 16, 2018
    Inventor: Michael Stephen Fiske
  • Publication number: 20180144114
    Abstract: Methods and systems are provided for performing a secure transaction. In an embodiment, users register biometric and/or other identifying user information. A private encryption key is generated from the biometric information and/or other user information and/or information obtained from a unpredictable physical process and are stored in a secure area of a device and a public key is transmitted to the blockchain network which acts as a service provider. In some embodiments, the private key depends upon at least partly on user information presented in the secure area. This hinders attacks like the Mt. Gox exchange. Each unique transaction passcode or transaction signature depends upon the transaction information and user information, so that on the next step of that transaction, only that unique transaction passcode will be valid.
    Type: Application
    Filed: January 1, 2018
    Publication date: May 24, 2018
    Inventor: Michael Stephen Fiske