Not Applicable
The present invention generally relates to a method for indemnifying and protecting information. More specifically the present invention relates a method of identifying and authenticating a user's identity and transmitting protected information to the identified and authenticated user.
The ways in which someone may be authenticated fall into three categories, based on what are known as the factors of authentication: something a user know, something a user have, or something a user are. Each authentication factor covers a range of elements used to authenticate or verify a person's identity prior to being granted access, approving a transaction request, signing a document or other work product, granting authority to others, and establishing a chain of authority.
Security research has determined that for a positive identification, elements from at least two, and preferably all three, factors be verified. The three factors (classes) and some of elements of each factor are: the ownership factors: something the user has (e.g., wrist band, ID card, security token, software token, phone, or cell phone); the knowledge factors: something the user knows (e.g., a password, pass phrase, or personal identification number (PIN), challenge response (the user must answer a question)); and the inherence factors: something the user is or does (e.g., fingerprint, retinal pattern, DNA sequence (there are assorted definitions of what is sufficient), signature, face, voice, unique bio-electric signals, or other biometric identifier).
When elements representing two factors are required for identification, the term two-factor authentication is applied. e.g. a bankcard (something the user has) and a PIN (something the user knows). Business networks may require users to provide a password (knowledge factor) and a pseudorandom number from a security token (ownership factor). Access to a very high security system might require a mantrap screening of height, weight, facial, and fingerprint checks (several inherence factor elements) plus a PIN and a day code (knowledge factor elements), but this is still a two-factor authentication.
Counterfeit products are often offered to consumers as being authentic. Counterfeit consumer goods such as electronics, music, apparel, and counterfeit medications have been sold as being legitimate. Efforts to control the supply chain and educate consumers to evaluate the packaging and labeling help ensure that authentic products are sold and used. Even security printing on packages, labels, and nameplates, however, is subject to counterfeiting.
One familiar use of authentication and authorization is access control. A computer system that is supposed to be used only by those authorized must attempt to detect and exclude the unauthorized. Access to it is therefore usually controlled by insisting on an authentication procedure to establish with some degree of confidence the identity of the user, granting privileges established for that identity. Common examples of access control involving authentication include: Asking for photoID when a contractor first arrives at a house to perform work; Using captcha as a means of asserting that a user is a human being and not a computer program; A computer program using a blind credential to authenticate to another program; Logging in to a computer; Using a confirmation E-mail to verify ownership of an e-mail address; Using an Internet banking system; and Withdrawing cash from an ATM.
In some cases, ease of access is balanced against the strictness of access checks. For example, the credit card network does not require a personal identification number for authentication of the claimed identity; and a small transaction usually does not even require a signature of the authenticated person for proof of authorization of the transaction. The security of the system is maintained by limiting distribution of credit card numbers, and by the threat of punishment for fraud.
Security experts argue that it is impossible to prove the identity of a computer user with absolute certainty. It is only possible to apply one or more tests which, if passed, have been previously declared to be sufficient to proceed. The problem is to determine which tests are sufficient, and many such are inadequate. Any given test can be spoofed one way or another, with varying degrees of difficulty.
Therefore, what is needed is a method and apparatus for proving identity of a computer or other electronic device user by applying one or more tests which are sufficient to proceed with allowing access and which are adequate in certainty of identity of a user.
A “human key” is a software identification file that enables a user to verify themselves to another user or a computer system. The software file of the human key enables a user to be verified and/or authenticated in a transaction and also provides tracking of the financial transaction by associating the transaction to one or more human keys which identify and authenticate a user in the system.
A “software application” is a program or group of programs designed for end users. Application software can be divided into two general classes: systems software and applications software. Systems software consists of low-level programs that interact with the computer at a very basic level. This includes operating systems, compilers, and utilities for managing computer resources. In contrast, applications software (also called end-user programs) includes database programs, word processors, and spreadsheets. Figuratively speaking, applications software sits on top of systems software because it is unable to run without the operating system and system utilities.
A “software module” is a file that contains instructions. “Module” implies a single executable file that is only a part of the application, such as a DLL. When referring to an entire program, the terms “application” and “software program” are typically used.
A “software application module” is a program or group of programs designed for end users that contains one or more files that contains instructions to be executed by a computer or other equivalent device.
A “website”, also written as Web site, web site, or simply site, is a collection of related web pages containing images, videos or other digital assets. A website is hosted on at least one web server, accessible via a network such as the Internet or a private local area network through an Internet address known as a Uniform Resource Locator (URL). All publicly accessible websites collectively constitute the World Wide Web.
A “web page”, also written as webpage is a document, typically written in plain text interspersed with formatting instructions of Hypertext Markup Language (HTML, XHTML). A web page may incorporate elements from other websites with suitable markup anchors.
Web pages are accessed and transported with the Hypertext Transfer Protocol (HTTP), which may optionally employ encryption (HTTP Secure, HTTPS) to provide security and privacy for the user of the web page content. The user's application, often a web browser displayed on a computer, renders the page content according to its HTML markup instructions onto a display terminal. The pages of a website can usually be accessed from a simple Uniform Resource Locator (URL) called the homepage. The URLs of the pages organize them into a hierarchy, although hyperlinking between them conveys the reader's perceived site structure and guides the reader's navigation of the site.
A “mobile device” is a generic term used to refer to a variety of devices that allow people to access data and information from where ever they are. This includes cell phones and other portable devices such as, but not limited to, PDAs, Pads, smartphones, and laptop computers.
“Netbot” is an automated or semi-automated tool that can carry out repetitive and mundane tasks.
“NFC” is an acronym for “Near Field Communication” which allows for simplified transactions, data exchange, and wireless connections between two devices in proximity to each other, usually by no more than a few centimeters. NFC is expected to become a widely used system for making payments by smartphone in the United States. Many smartphones currently on the market already contain embedded NFC chips that can send encrypted data a short distance (“near field”) to a reader located, for instance, next to a retail cash register. Shoppers who have their credit card information stored in their NFC smartphones can pay for purchases by waving their smartphones near or tapping them on the reader, rather than using the actual credit card.
A “PortalBot” is an automatic aggregator of specific semantic, keyword, or human key information from targeted internet web portals, for the purpose of finding, searching, identifying, and managing intellectual property, copyrighted material, or media in a network like the Internet or world wide web (WWW).
“Social network sites” are web-based services that allow individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system. The nature and nomenclature of these connections may vary from site to site. While we use the terms “social network”, “social network pages”, and “social network site” to describe this phenomenon, the term “social networking sites” also appears in public discourse, and the variation of terms are often used interchangeably.
The current present invention is an apparatus for connecting a human key identification to objects and content or identification, tracking, delivery, advertising, and marketing. A plurality mechanisms integrally working as one system is explained. An Independent Clearing House Agent (ICHA) server is connected to a human key server. The human key server is connected to a translation server and universal virtual world (UVW) server for the management of a plurality of methods and mechanism integrally working as one system. A virtual world airport (VWA) server is connected to a Mobile, Handheld, and Independent Device Application Development (MHIDAD) server which in turn communicates with an illumination transformer audio video manager interactive server transmitter (ITAVMIST which communicates with a Virtual Cash Virtual Currency (VCVC) server. The authentication unit also creating identification data; and sending to verification; a match combined with 9 out of 17 positive point evaluations returns, via an Internet connection to the mobile device.
The accompanying drawings, which are incorporated in and constitute a part of this specification exemplify the embodiments of the present invention and, together with the description, serve to explain and illustrate principles of the inventive technique. Specifically:
In the following detailed description, reference will be made to the accompanying drawings, in which identical functional elements are designated with like numerals. The aforementioned accompanying drawings show by way of illustration and not by way of limitation, specific embodiments and implementations consistent with principles of the present invention. These implementations are described in sufficient detail to enable those skilled in the art to practice the invention and it is to be understood that other implementations may be utilized and that structural changes and substitutions of various elements may be made without departing from the scope and spirit of present invention. The following detailed description is, therefore, not to be construed in a limited sense. Additionally, the various embodiments of the invention as described may be implemented in the form of software running on a general purpose computer, in the form of a specialized hardware, or combination of software and hardware.
The current present invention is an apparatus for connecting a human key identification to objects and content or identification, tracking, delivery, advertising, and marketing. Now referring to
Now referring to
A mobile device such as a lap top is used to access the doctor exchange form 401 which uses a human key server 402 and authentication server 403 to access a first data storage 404 and confirm user identity. From the mobile device such as a lap top is used to access the doctor exchange form 401 a user can access a second data storage 405 via a second thin client server 406 using a second human semantics process server 407 to access a drug criteria data storage 408 which communicates with a first human semantics generator 410, and a first thin client server 409. The first thin client server 409 can provide a connection to the world wide web 411 while the drug criteria data storage 408 may be access by a lap top is used to access the doctor exchange form 401 or a second lap top 412.
Now referring to
A cam 601 or computer 602 accessed a human key server 603 which in turn accesses a media server 604 which accesses a first video server stream manager 605 which in turn sends information to a time stamp server and certifier 606 which is backed up a stored 607. A digital fingerprint validation information is provided by accesses to the first video server stream manager 605 to a digital storage encryption server 608 which validates a digital fingerprint form stored prints 610 and encrypted prints 611 and sends the validation the first video server stream manager 605 which in turn generates a CODEFA number for submission. The CODEFA number is good for one use then a new number must be retrieved. A second video streaming server 612 sends information to a computer 615, CD 616, Email 617, and USB 618 which is accessed by any computer 613 to request to unlock, which is verified by the human key server 614 which confirms a payment, user, password, and CODEFA number 619.
Still referring to
Also the APS active pixel sensor curved camera technology, is a serious part of this invention, as it adds many multiple redundancies for identification of humans and objects. Additionally, the laser communication between server nodes is an important part of the management of the cluster system that is used in this system.
Referring to
Now referring to
Referring to
In
In
Referring to
Now referring to
The authentication unit 1404 creating data for registration 1404 by converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA files into wave form for analysis; converting CODEFA files into interpolated brightness variables; creating wave form coordinates and pixel data; and storing files in a first data storage 1406 and numerical data in a second data storage location 1407.
The authentication unit1403 also creating identification data 1405 by: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA files into wave form for analysis; converting CODEFA files into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 1406 and numerical data in a second data storage 1407 and comparing the first data to the second data in step 1408, using a Computer Object De-Encryption Encryption File Algorithm (CODEFA) 1409 and sending to verification; a match combined with 9 out of 17 positive point evaluations returns 1409, via an Internet or WWW connection 1410, “Hello, and your first name” on a display screen of a computer1411, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 1503 creating data for registration 1504 by: extracting audio from video and converting to Wave form; creating a point grid for analysis; creating a form coordinates; creating numerical reference points; converting data into interpolated volume variables; storing wave form coordinates and volume data; and storing files in a first data storage 506 and numerical data in a second data storage 1507.
The authentication unit1503 also creating data for identification 1505 by: extracting audio from video and converting to Wave form; creating point grid for analysis; creating wave form coordinates creating numerical reference points; converting data into interpolated volume variables; storing form coordinates and volume data; storing files in a first data storage 1506 and numerical data in a second data storage 1507; comparing data stored in the databases in step 1508 and sending to verification by CODEFA 1509; matching combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 1510, “Hello, and your first name” on a display screen of a computer 1511, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 1603 creating data for registration 1604 by: extracting 24 images at beginning of audio; extracting 24 images at 2 second mark of audio start; extracting 24 images backward at end of audio stop; converting files into wave form for analysis; converting files into interpolated brightness variables; creating wave form coordinates and pixel data; and storing files in a first data storage 1606 and numerical data in a second data storage 1607.
The authentication unit 1603 also creating data for identification 1605 by: extracting 24 images at beginning of audio; extracting 24 images at 2 second mark of audio start; extracting 24 images backward at end of audio stop; converging into wave form for analysis; converting files into interpolated brightness variables; creating wave form coordinates and pixel data; storing file in a first data storage 1606 and numerical data in a second data storage 1607; comparing data stored in the databases in step 1608 and sending to verification by CODEFA 1609; matching combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 610, “Hello, and your first name” on a display screen of a computer 1611, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 1703 creating data for registration 1704 by: extracting form the video 3 image files at random times; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA files into wave form for analysis; converting CODEFA files into interpolated brightness variables; creating wave form coordinates and pixel data; and storing files in a first data storage 1706 and numerical data in a second data storage 1706.
The authentication unit 1703 also creating data for identification 1705 by: extracting from video 3 image files at random times; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA files into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 1706 and numerical data in a second data storage 1707; comparing data stored in the databases and send to verification in step 1708; and sending to verification by CODEFA 7109; matching combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 1710, “Hello, and your first name” on a display screen of a computer 1711, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 1803 creating data for registration 1804 by: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA files into interpolated brightness variables; creating wave form coordinates and pixel data; creating 6 additional levels or brightness + and −; storing files in a first data storage 1806 and numerical data in a second data storage 1807.
The authentication unit 1803 also creating data for identification 1805 by: converting video to .jpg image files; converting.jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA files into interpolated brightness variables; creating wave form coordinates and pixel data; creating 6 additional levels or brightness + and −; and storing files in a first data storage 1806 and numerical data in a second data storage 1807; comparing data stored in the databases in step 8108 and sending to verification by CODEFA 1809; matching combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 1810, “Hello, and your first name” on a display screen of a computer 1811, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 1903 creating data for registration 1904 by: Video is verified and stored; Audio is verified and stored; Video and audio is processed into CODEFA; During verification state Video and Audio spatial point is recorded from microphone and camera lenses; and storing files in a first data storage 1906 and numerical data in a second data storage 1907.
The authentication unit 1903 also creating data for identification 1905 by: Video is verified and stored; Audio is verified and stored; Video and audio is processed into CODEFA; During verification state Video and Audio SP spatial point is recorded from microphone and camera lenses; storing files in a first data storage 1906 and numerical data in a second data storage 1907; During identification CODEFA Registration SP data is compared to CODEFA Identification SP data to see if it matches 1909; comparing data and send to verification in step 1908; a match combined with 9 out of 17 positive point returns via an Internet or WWW connection 1910, “Hello, and your first name” on a display screen of a computer 1911. A non match returns negative point evaluation; if match data is stored as + data for learning; if no match data is stored as—data for learning and the video data is analyzed for a match of who the user really is, and if identified, notifies user by email questioning the failed identification.
Now referring to
The authentication unit 2003 creating data for registration 2004 by: Extracting audio from video and converting to Wave form; creating point grid for analysis; creating wave form coordinates; creating numerical reference points; converting data into interpolated volume variables; storing wave form coordinates and volume data from audio phrase begin point to end point; and storing files in a first data storage 2006 and numerical data in a second data storage 2007.
The authentication unit 2003 also creating data for identification 2005 by: Extracting audio from video and converting to Wave form; creating point grid for analysis; creating wave form coordinates; creating numerical reference points; converting data into interpolated volume variables; storing wave form coordinates and volume data from audio phrase begin point to end point; storing files in a first data storage 2006 and numerical data in a second data storage 2007; comparing data and send to verification in step 2008; and sending to verification by CODEFA 2009; matching combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 2010, “Hello, and your first name” on a display screen of a computer 2011, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 1103 creating data for registration 2104 by: Receiving Processor data during Registration; Receiving “Processor time of day related to Registration; Receiving typed phrase during registration; Receiving Audio file of phrase spoken at CODEFA during registration; converting CODEFA file into interpolated volume variables with SP Target data embedded; creating wave form coordinates and pixel data; and storing files in a first data storage 2106 and numerical data in a second data storage 2107.
The authentication unit 2103 also creating data for identification 2105 by: Receiving Processor data during Registration; Receiving Processor time of day related to Registration; Receiving typed phrase during registration; Receiving Audio file of phrase spoken at CODEFA during registration; converting CODEFA files into interpolated volume variables with SP Target data embedded; creating wave form coordinates and pixel data; storing files in a first data storage 2106 and numerical data in a second data storage 2107; comparing data and send to verification in step 2108; and sending to verification by CODEFA 2109; matching combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 2110, “Hello, and your first name” on a display screen of a computer 2111, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 2203 creating data for registration 2204 by: converting dual cam video to .jpg image files with SP Target of each cam embedded; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA files into wave form for analysis; converting CODEFA files into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 2206 and numerical data in a second data storage 2207.
The authentication unit 2203 also creating data for identification 2205 by: converting dual cam video to .jpg image files with SP Target of each cam embedded; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA files into wave form for analysis; converting CODEFA files into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 2206 and numerical data in a second data storage 2207; comparing data and send to verification in step 2208; and sending to verification by CODEFA 2209; matching combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 2210, “Hello, and your first name” on a display screen of a computer 2211, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 2303 creating data for registration 2304 Automatic Object Identification, views background compared with foreground and attaches box around moving object with 16 pixels distance around the edge, locks on, gets image for beginning of processing then: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; and storing files in a first data storage 2306 and numerical data in a second data storage 2307.
The authentication unit 2303 also creating data for identification 2305 by Automatic Object Identification then: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; and storing files in a first data storage 2306 and numerical data in a second data storage 2307; comparing data and send to verification in step 2308; and sending to verification by CODEFA 2309; matching combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 2310, “Hello, and your first name” on a display screen of a computer 2311, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 2403 creating data for registration 2404 by: using an Audio Phrase Distance device comprised of on the phone or device, that sending data back to the main server for evaluation and decision to determine Distance to object using sound and infrared data; converting variation calculated with “APD” and distance data to object data; storing files in a first data storage 2406, numerical data in a second data storage 2407, and audio phrase distance data in a third data storage 2408.
The authentication unit 2403 also creating data for identification 2405 by: using an Audio Phrase Distanced (ADP) device to determine Distance to object using sound and infrared data; converting variation calculated with “APD” and distance data to object data; storing files in a first data storage 2406, numerical data in a second data storage 2407, and audio phrase distance data in a third data storage 2408 and values are used for comparison with audio data to determine identification at different distances from microphone in step 2408. Matching combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 2410, “Hello, and your first name” on a display screen of a computer 2411, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 2503 creating data for registration 2504 by: converting 3D multiple cam video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA files into wave form for analysis; converting CODEFA files into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 2506 and numerical data in a second data storage 2507.
The authentication unit 2503 also creating data for identification 2505 by: converting dual cam video to .jpg image files with SP Target of each cam embedded; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 2506 and numerical data in a second data storage 2507; comparing 3D differences and store in 3D data storage 2508; comparing data in a first data storage 2506 and numerical data in a second data storage 2507 in step 2509 and send to verification in step 2510; A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 2510, “Hello, and your first name” on a display screen of a computer 2511, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 2603 creating data for registration 2604 by: converting video to .jpg image files in grayscale; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA files into wave form for analysis; converting CODEFA files into interpolated brightness variables; creating wave form coordinates and pixel data; and storing files in a first data storage 2606 and numerical data in a second data storage 2607.
The authentication unit 2603 also creating data for identification 2605 by: converting video to .jpg image files in grayscale; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 2606 and numerical data in a second data storage 2607; comparing data stored in the databases 2608 and send to verification in step 2609. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 2610, “Hello, and your first name” on a display screen of a computer 2611, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 2703 creating data for registration 2704 by: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA files into wave form for analysis; converting CODEFA files into interpolated brightness variables; creating wave form coordinates and pixel data PCB; and storing files in a first data storage 2706 and numerical data in a second data storage 2707.
The authentication unit 2703 also creating data for identification 2705 by: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data PCB; storing files in a first data storage 2706 and numerical data in a second data storage 2707; comparing data stored in the databases in step 2708 using CODEFA 1709. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 2710, “Hello, and your first name” on a display screen of a computer 2711, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 2803 creating data for registration 2804 by: converting audio from 2 stereo microphones to data; converting audio data and input into database; Analyze and compare left data from right data; and storing files in a first data storage 2806 and numerical data in a second data storage 2807.
The authentication unit 2803 creating data for identification 2805 by: converting audio from two stereo microphones to data; converting audio data and input into databases; analyzing and comparing left date from right data; storing files in a first data storage 2806 and numerical data in a second data storage 2807. comparing data stored in the databases in step 2808 using CODEFA 2809. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 2810, “Hello, and your first name” on a display screen of a computer 1811, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 2903 creating data for registration 2904 by: converting video to .jpg image files; converting file into interpolated brightness variables; converting .jpg image files to Vector files; converting Vector Files to line art; overlaying Line art on to grid form for analysis; creating grid form coordinates and pixel data PCB; and storing files in a first data storage 2906 and numerical data in a second data storage 2907.
The authentication unit 2903 creating data for identification 2905 by: converting video to .jpg image files; converting file into interpolated brightness variables; converting .jpg image files to Vector files; converting Vector Files to line art; overlaying Line art on to grid form for analysis; creating grid form coordinates and pixel data PCB; storing files in a first data storage 2906 and numerical data in a second data storage 2907; comparing data in step 2908 using CODEFA 2909. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 2910, “Hello, and your first name” on a display screen of a computer 2911, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 3003 creating data for registration 3004 by: converting video to .jpg image files; converting file into interpolated brightness variables; converting .jpg image files to Vector files; converting Vector Files to line art; overlaying Line art on to grid form for analysis; creating grid form coordinates and pixel data PCB; and storing files in a first data storage 3006 and numerical data in a second data storage 3007.
The authentication unit 3003 creating data for identification 3005 by: converting video to .jpg image files; converting file into interpolated brightness variables; converting .jpg image files to Vector files; converting Vector Files to line art; overlaying Line art on to grid form for analysis; creating grid form coordinates and pixel data PCB; storing files in a first data storage 3006 and numerical data in a second data storage 3007; comparing data stored in the databases in step 3008 using CODEFA 3009. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 3010, “Hello, and your first name” on a display screen of a computer 3011, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 3103 creating data for registration 3104 by: converting 3D multiple cam video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA files into wave form for analysis; converting CODEFA files into interpolated brightness variables; creating wave form coordinates and pixel data; and storing files in a first data storage 3106 and numerical data in a second data storage 3107.
The authentication unit 3103 creating data for identification 3105 by: converting dual cam video to .jpg image files with SP Target of each cam embedded; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 3106 and numerical data in a second data storage 3107; comparing 3D differences and store in 3D data storage 3108; comparing data and send to verification in step 3109 using CODEFA. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 3110, “Hello, and your first name” on a display screen of a computer 3111, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 3203 creating data for registration 3204 by: converting video to .jpg image files in grayscale; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA files into wave form for analysis; converting CODEFA files into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 3206 and numerical data in a second data storage 3207.
The authentication unit 3203 creating data for identification 3205 by: converting video to .jpg image files in grayscale; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 3206 and numerical data in a second data storage 3207; comparing V1 data to V2 data in step 3208 and send to verification using CODEFA 3209. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 3110, “Hello, and your first name” on a display screen of a computer 3111, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 3303 creating data for registration 3304 by: converting dual cam video to .jpg image files with SP Target of each cam embedded; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA files into wave form for analysis; converting CODEFA files into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 3306 and numerical data in a second data storage 3307.
The authentication unit 3303 creating data for identification 3305 by: converting dual cam video to .jpg image files with SP Target of each cam embedded; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA files into wave form for analysis; converting CODEFA files into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 3306 and numerical data in a second data storage 3307; comparing data in step 3308 and send to verification using CODEFA in step 3309. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 3310, “Hello, and your first name” on a display screen of a computer 3311, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 3403 creating data for registration 3404 by Automatic Object Identification, views background compared with foreground and attaches box around moving object with 16 pixels distance around the edge, locks on, gets image for beginning of processing then: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; and storing files in a first data storage 3406 and numerical data in a second data storage 3407.
The authentication unit 3403 creating data for identification 3405 by Automatic Object Identification then: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 3406 and numerical data in a second data storage 3407; comparing data stored in the databases in step 3408 and send to verification via CODEFA in step 3409. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 3410, “Hello, and your first name” on a display screen of a computer 3411, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 3503 creating data for registration 3504 by: extracting from video 3 image files at random times; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA files into wave form for analysis; converting CODEFA files into interpolated brightness variables; creating wave form coordinates and pixel data; and storing files in a first data storage 3506 and numerical data in a second data storage 3507.
The authentication unit 3503 creating data for identification 3505 by: extracting from video 3 image files at random times; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA files into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 3506 and numerical data in a second data storage 3507; comparing data stored in the databases in step 3508 and send to verification using CODEFA in step 3509. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 3510, “Hello, and your first name” on a display screen of a computer 3511, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 3603 creating data for registration 3604 by: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; creating 6 additional levels or brightness + and −; storing files in a first data storage 3606 and numerical data in a second data storage 3607.
The authentication unit 3603 creating data for identification 3605 by: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; creating 6 additional levels or brightness + and −; storing files in a first data storage 3606 and numerical data in a second data storage 3607; comparing T1 data to T2 data in step 3608 and sending it to verification in step 3609. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 3610, “Hello, and your first name” on a display screen of a computer 3611, while a non match returns a negative point evaluation.
Now referring to
Now referring to
Now referring to
Now referring to
Moreover, other implementations of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. Various aspects and components of the described embodiments may be used singly or in any combination in the computerized content filtering system. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
Although the present invention has been described in considerable detail with reference to certain preferred versions thereof, other versions are possible. Therefore, the point and scope of the appended claims should not be limited to the description of the preferred versions contained herein.
As to a further discussion of the manner of usage and operation of the present invention, the same should be apparent from the above description. Accordingly, no further discussion relating to the manner of usage and operation will be provided.
With respect to the above description, it is to be realized that the optimum dimensional relationships for the parts of the invention, to include variations in size, materials, shape, form, function and manner of operation, assembly and use, are deemed readily apparent and obvious to one skilled in the art, and all equivalent relationships to those illustrated in the drawings and described in the specification are intended to be encompassed by the present invention.
Therefore, the foregoing is considered as illustrative only of the principles of the invention. Further, since numerous modifications and changes will readily occur to those skilled in the art, it is not desired to limit the invention to the exact construction and operation shown and described, and accordingly, all suitable modifications and equivalents may be resorted to, falling within the scope of the invention.
This application claims priority from and is a Continuation of U.S. patent application Ser. No. 12/860,936, entitled “Apparatus for connecting Protect Anything human key identification mechanism to objects, content, and virtual currency for identification, tracking, delivery, advertising and marketing”, filed on Aug. 23, 2010, which is incorporated by reference in its entirety for all purposes as if fully set forth herein. U.S. patent application Ser. No. 12/860,936 is a Continuation of U.S. patent application Ser. No. 12/830,344 entitled “Apparatus for secure recording and transformation of images to light for identification, and audio visual projection spatial point targeted area” filed on Jul. 4, 2010
Number | Date | Country | |
---|---|---|---|
Parent | 12860936 | Aug 2010 | US |
Child | 13357029 | US | |
Parent | 12830344 | Jul 2010 | US |
Child | 12860936 | US |