Patents by Inventor Michael Stephen Fiske

Michael Stephen Fiske has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130042111
    Abstract: Methods and systems are provided for performing a secure transaction. Users register biometric and/or other identifying information. A registration code and an encryption key are generated from the biometric information and/or information obtained from a unpredictable physical process and are stored in a secure area of a device and also transmitted to a service provider. A transaction passcode generator may be computed based on the stored registration code. In at least one embodiment, a unique transaction passcode depends upon the transaction information, so that on the next step of that transaction, only that unique transaction passcode will be valid. In an embodiment, the passcode includes the transaction information. In at least one embodiment, if the transaction information has been altered relative to the transaction information stored in the device's secure area, then the transaction passcode sent during this step will be invalid and transaction may be aborted.
    Type: Application
    Filed: July 4, 2012
    Publication date: February 14, 2013
    Inventor: Michael Stephen Fiske
  • Publication number: 20120198560
    Abstract: Based upon the principle of Turing incomputability, and novel properties of the Active Element Machine, a malware-resistant computing machine is constructed. This new computing machine is a non-Turing, non-register machine (non von-Neumann), called an Active Element Machine (AEM). AEM programs are designed so that the purpose of the computation is difficult to apprehend by an adversary and hijack with malware. These methods can help hinder reverse engineering of proprietary algorithms and hardware design. Using quantum randomness, the AEM can deterministically execute a universal digital computer program with active element firing patterns that are Turing incomputable. In some embodiments, a more powerful computational procedure is demonstrated than Turing's computational procedure (digital computer procedure). Current digital computer algorithms can be derived or designed with a Turing machine computational procedure.
    Type: Application
    Filed: December 6, 2011
    Publication date: August 2, 2012
    Inventor: Michael Stephen Fiske
  • Publication number: 20120185698
    Abstract: Computer security applications use cryptography keys, cryptography codes—such as one-time passcodes—and other user credentials to protect the secrecy, authenticity and integrity of applications such as financial information, financial transactions and infrastructure (e.g. the electrical grid, power plants, and defense systems). The prior art attempted to generate (e.g. derive) an invariant from a biometric template, biometric print or non-biometric pattern that is used as a security key or code. Biometric variability has been a difficult obstacle for the prior art. In an embodiment, the invariant is at least partially generated (e.g., derived) a transformation between the biometric templates or prints. In an embodiment, the invariant is a cryptography key. In an embodiment, the transformation(s) help perform an authentication of the user and are executed by digital computer program instructions. In an embodiment, pattern transformation(s) are represented with colors, geometry or frequencies.
    Type: Application
    Filed: January 6, 2012
    Publication date: July 19, 2012
    Inventor: Michael Stephen Fiske
  • Patent number: 8209751
    Abstract: In an embodiment a secure module is provided that provides access keys to an unsecured system. In an embodiment the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment the access keys are sent to the unsecured system after receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.
    Type: Grant
    Filed: June 20, 2008
    Date of Patent: June 26, 2012
    Assignee: Biogy, Inc.
    Inventor: Michael Stephen Fiske
  • Patent number: 8077933
    Abstract: In one embodiment, biometric authentication, using fingerprints, handprints, retinal scans and voice recognition, may be used as a means of granting access to an individual, for example, to use a device or gain entry to a building, car, computer, airport, website, a bank account, execute a financial transaction, access a military installation, read or obtain confidential information, execute a legal agreement, authenticate a decision, or another entity. In another embodiment, biometric authentication can be used as an alternative to the use of a key or combination or as an additional form of authentication. Access may be in any of a number of forms. In one embodiment a collection of pairs of features from one biometric print is compared to another collection of pairs from another biometric print to determine whether biometric authentication is successful.
    Type: Grant
    Filed: September 1, 2007
    Date of Patent: December 13, 2011
    Assignee: Fiske Software, LLC
    Inventor: Michael Stephen Fiske
  • Publication number: 20110274273
    Abstract: In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after the receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. In an embodiments, a registration code is generated using non-determinism. In an embodiments, a key is generated using non-determinism.
    Type: Application
    Filed: July 11, 2011
    Publication date: November 10, 2011
    Inventor: Michael Stephen Fiske
  • Patent number: 8019705
    Abstract: In an embodiment, instructions in a computer language are translated into instructions in a register machine language. The instructions in the register machine language are translated into active element machine instructions. The use of the register machine language is optional. In an embodiment, the first translator may translate the instructions into another machine language. In an embodiment, an active element machine may be programmed using instructions for a register machine with elemental register machine instructions, such as push, pop, copy, and jump, and/or using a higher language, such as C, may be emulated with active element instructions executing on an active element machine.
    Type: Grant
    Filed: June 27, 2006
    Date of Patent: September 13, 2011
    Assignee: Fiske Software, LLC.
    Inventor: Michael Stephen Fiske
  • Patent number: 8010467
    Abstract: An active element machine is a new kind of computing machine. When implemented in hardware, the Active element machine can execute multiple instructions simultaneously, because every one of its computing elements is active. This greatly enhances the computing speed. By executing a meta program whose instructions change the connections in a dynamic Active element machine, the Active element machine can perform tasks that digital computers are unable to compute.
    Type: Grant
    Filed: July 11, 2005
    Date of Patent: August 30, 2011
    Assignee: Fiske Software LLC
    Inventor: Michael Stephen Fiske
  • Publication number: 20110066833
    Abstract: A new computing machine and new methods of executing and solving heretofore unknown computational problems are presented here. The computing system demonstrated here can be implemented with a program composed of instructions such that instructions may be added or removed while the instructions are being executed. The computing machine is called a Dynamic Register Machine. The methods demonstrated apply to new hardware and software technology. The new machine and methods enable advances in machine learning, new and more powerful programming languages, and more powerful and flexible compilers and interpreters.
    Type: Application
    Filed: September 14, 2009
    Publication date: March 17, 2011
    Inventor: Michael Stephen Fiske
  • Publication number: 20100275265
    Abstract: A new system is presented here that can effectively protect users' identities, their sensitive data and help secure transactions. The security of this system does not depend on the integrity of the host personal computer nor on the security of the network computers that execute network traffic. Furthermore, the system is designed to help prevent identity theft. This system can be implemented for governments, financial exchanges and health care systems where security is a primary concern.
    Type: Application
    Filed: March 24, 2010
    Publication date: October 28, 2010
    Inventors: Michael Stephen Fiske, Martin Andres Quiroga
  • Patent number: 7707622
    Abstract: Protecting the security of an entity by using passcodes is disclosed. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator.
    Type: Grant
    Filed: April 14, 2005
    Date of Patent: April 27, 2010
    Assignee: Biogy, Inc.
    Inventor: Michael Stephen Fiske
  • Patent number: 7669236
    Abstract: The security of an entity is protected by using passcodes. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator.
    Type: Grant
    Filed: April 6, 2005
    Date of Patent: February 23, 2010
    Assignee: Biogy, Inc.
    Inventor: Michael Stephen Fiske
  • Patent number: 7657033
    Abstract: In one embodiment, messages are encrypted with encrypted transformations that commute with one another. In another embodiment, a message is divided into message segments, and with each encrypted message segment one or more encrypted keys are sent. The encrypted keys may be used to decrypt a message segment that is sent at another time, such as the next message segment to be sent. In another embodiment, a sender encrypts a message with a first encryption, which may be unknown to the receiver. Then a receiver encrypts the message with a second encryption. Next the sender removes the first encryption, thereby allowing the receiver to reconstitute the original message by removing the second encryption.
    Type: Grant
    Filed: December 8, 2005
    Date of Patent: February 2, 2010
    Assignee: Fiske Software LLC
    Inventor: Michael Stephen Fiske
  • Publication number: 20090228714
    Abstract: Encrypted data is stored in an online vault. The data in the online vault requires one key from the user and one key from an administrator to decrypt the data. In an embodiment, the key from the user may be stored in a secure area of a portable device. In an embodiment, the key for the administrator is unique to the user. In an embodiment, a backup key is stored in a secure area in the portable device, and the users key may be constructed by applying a function to the backup key.
    Type: Application
    Filed: March 24, 2009
    Publication date: September 10, 2009
    Inventors: Michael Stephen Fiske, Alex Barangan
  • Publication number: 20090178115
    Abstract: In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.
    Type: Application
    Filed: June 20, 2008
    Publication date: July 9, 2009
    Inventor: Michael Stephen Fiske
  • Publication number: 20090158049
    Abstract: In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.
    Type: Application
    Filed: June 7, 2008
    Publication date: June 18, 2009
    Inventor: Michael Stephen Fiske
  • Publication number: 20080288786
    Abstract: In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after the receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.
    Type: Application
    Filed: June 7, 2008
    Publication date: November 20, 2008
    Inventor: Michael Stephen Fiske
  • Patent number: 7398260
    Abstract: An Effector machine is a new kind of computing machine. When implemented in hardware, the Effector machine can execute multiple instructions simultaneously because every one of its computing elements is active. This greatly enhances the computing speed. By executing a meta program whose instructions change the connections in a dynamic Effector machine, the Effector machine can perform tasks that digital computers are unable to compute.
    Type: Grant
    Filed: March 2, 2004
    Date of Patent: July 8, 2008
    Assignee: Fiske Software LLC
    Inventor: Michael Stephen Fiske
  • Patent number: 7249116
    Abstract: This invention relates to the machine recognition and learning of predetermined categories and more generally, to the representation of patterns, information and knowledge in computational applications. A method of learning categories is an important component of advanced software technology. This invention has applications in the following areas: bioinformatics, document classification, document similarity, financial data mining, goal-based planners, handwriting and character recognition, information retrieval, natural language processing, natural language understanding, pattern recognition, search engines, strategy based domains such as business, military and games, and vision recognition.
    Type: Grant
    Filed: April 6, 2003
    Date of Patent: July 24, 2007
    Assignee: Fiske Software, LLC
    Inventor: Michael Stephen Fiske
  • Publication number: 20030236761
    Abstract: This invention relates to the machine recognition and learning of predetermined categories and more generally, to the representation of patterns, information and knowledge in computational applications. A method of learning categories is an important component of advanced software technology. This invention has applications in the following areas: bioinformatics, document classification, document similarity, financial data mining, goal-based planners, handwriting and character recognition, information retrieval, natural language processing, natural language understanding, pattern recognition, search engines, strategy based domains such as business, military and games, and vision recognition.
    Type: Application
    Filed: April 6, 2003
    Publication date: December 25, 2003
    Inventor: Michael Stephen Fiske