Not Applicable
Not Applicable
The present invention generally relates to an apparatus for registering and identifying a user in a system. More specifically the present invention relates apparatus for registering and identifying a user in a system using visual and audio means of verification.
The ways in which someone may be authenticated fall into three categories, based on what are known as the factors of authentication: something a user know, something a user have, or something a user are. Each authentication factor covers a range of elements used to authenticate or verify a person's identity prior to being granted access, approving a transaction request, signing a document or other work product, granting authority to others, and establishing a chain of authority.
Security research has determined that for a positive identification, elements from at least two, and preferably all three, factors be verified. The three factors (classes) and some of elements of each factor are: the ownership factors: something the user has (e.g., wrist band, ID card, security token, software token, phone, or cell phone); the knowledge factors: something the user knows (e.g., a password, pass phrase, or personal identification number (PIN), challenge response (the user must answer a question)); and the inherence factors: something the user is or does (e.g., fingerprint, retinal pattern, DNA sequence (there are assorted definitions of what is sufficient), signature, face, voice, unique bio-electric signals, or other biometric identifier).
When elements representing two factors are required for identification, the term two-factor authentication is applied . . . e.g. a bankcard (something the user has) and a PIN (something the user knows). Business networks may require users to provide a password (knowledge factor) and a pseudorandom number from a security token (ownership factor). Access to a very high security system might require a mantrap screening of height, weight, facial, and fingerprint checks (several inherence factor elements) plus a PIN and a day code (knowledge factor elements), but this is still a two-factor authentication.
Counterfeit products are often offered to consumers as being authentic. Counterfeit consumer goods such as electronics, music, apparel, and counterfeit medications have been sold as being legitimate. Efforts to control the supply chain and educate consumers to evaluate the packaging and labeling help ensure that authentic products are sold and used. Even security printing on packages, labels, and nameplates, however, is subject to counterfeiting.
One familiar use of authentication and authorization is access control. A computer system that is supposed to be used only by those authorized must attempt to detect and exclude the unauthorized. Access to it is therefore usually controlled by insisting on an authentication procedure to establish with some degree of confidence the identity of the user, granting privileges established for that identity. Common examples of access control involving authentication include: Asking for photoID when a contractor first arrives at a house to perform work; Using captcha as a means of asserting that a user is a human being and not a computer program; A computer program using a blind credential to authenticate to another program; Logging in to a computer; Using a confirmation E-mail to verify ownership of an e-mail address; Using an Internet banking system; and Withdrawing cash from an ATM.
In some cases, ease of access is balanced against the strictness of access checks. For example, the credit card network does not require a personal identification number for authentication of the claimed identity; and a small transaction usually does not even require a signature of the authenticated person for proof of authorization of the transaction. The security of the system is maintained by limiting distribution of credit card numbers, and by the threat of punishment for fraud.
Security experts argue that it is impossible to prove the identity of a computer user with absolute certainty. It is only possible to apply one or more tests which, if passed, have been previously declared to be sufficient to proceed. The problem is to determine which tests are sufficient, and many such are inadequate. Any given test can be spoofed one way or another, with varying degrees of difficulty.
Therefore, what is needed is a method and apparatus for proving identity of a computer or other electronic device user by applying one or more tests which are sufficient to proceed with allowing access and which are adequate in certainty of identity of a user.
A “human key” is a software identification file that enables a user to verify themselves to another user or a computer system. The software file of the human key enables a user to be verified and/or authenticated in a transaction and also provides tracking of the financial transaction by associating the transaction to one or more human keys which identify and authenticate a user in the system.
A “software application” is a program or group of programs designed for end users. Application software can be divided into two general classes: systems software and applications software. Systems software consists of low-level programs that interact with the computer at a very basic level. This includes operating systems, compilers, and utilities for managing computer resources. In contrast, applications software (also called end-user programs) includes database programs, word processors, and spreadsheets. Figuratively speaking, applications software sits on top of systems software because it is unable to run without the operating system and utilities.
A “software module” is a file that contains instructions. “Module” implies a single executable file that is only a part of the application, such as a DLL. When referring to an entire program, the terms “application” and “software program” are typically used.
A “software application module” is a program or group of programs designed for end users that contains one or more files that contains instructions to be executed by a computer or other equivalent device.
A “website”, also written as Web site, web site, or simply site, is a collection of related web pages containing images, videos or other digital assets. A website is hosted on at least one web server, accessible via a network such as the Internet or a private local area network through an Internet address known as a Uniform Resource Locator (URL). All publicly accessible websites collectively constitute the World Wide Web.
A “web page”, also written as webpage is a document, typically written in plain text interspersed with formatting instructions of Hypertext Markup Language (HTML, XHTML). A web page may incorporate elements from other websites with suitable markup anchors.
Web pages are accessed and transported with the Hypertext Transfer Protocol (HTTP), which may optionally employ encryption (HTTP Secure, HTTPS) to provide security and privacy for the user of the web page content. The user's application, often a web browser displayed on a computer, renders the page content according to its HTML markup instructions onto a display terminal. The pages of a website can usually be accessed from a simple Uniform Resource Locator (URL) called the homepage. The URLs of the pages organize them into a hierarchy, although hyperlinking between them conveys the reader's perceived site structure and guides the reader's navigation of the site.
A “mobile device” is a generic term used to refer to a variety of devices that allow people to access data and information from where ever they are. This includes cell phones and other portable devices such as, but not limited to, PDAs, Pads, smartphones, and laptop computers.
“Netbot” is an automated or semi-automated tool that can carry out repetitive and mundane tasks.
“NFC” is an acronym for “Near Field Communication” which allows for simplified transactions, data exchange, and wireless connections between two devices in proximity to each other, usually by no more than a few centimeters. NFC is expected to become a widely used system for making payments by smartphone in the United States. Many smartphones currently on the market already contain embedded NFC chips that can send encrypted data a short distance (“near field”) to a reader located, for instance, next to a retail cash register. Shoppers who have their credit card information stored in their NFC smartphones can pay for purchases by waving their smartphones near or tapping them on the reader, rather than using the actual credit card.
“Social network sites” are web-based services that allow individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system. The nature and nomenclature of these connections may vary from site to site. While we use the terms “social network”, “social network pages”, and “social network site” to describe this phenomenon, the term “social networking sites” also appears in public discourse, and the variation of terms are often used interchangeably.
“VAR” is a Virtual, live, direct or indirect, view of a physical, real-world environment whose elements are augmented by computer-generated sensory input such as sound, video, graphics or GPS data.
The presented invention is an apparatus for human identification; registration; and protection executed in combination by a mobile device and a computer comprising: a mobile device consisting of a camera for capturing and recording video and audio data; a server for receiving video streamed to it by the mobile device for sign-up or sign-in; working from a computer or mobile device and using an Internet connection; accessing an authentication unit. The authentication unit creating data for registration. The authentication unit also creating identification data; and sending to verification; a match combined with 9 out of 17 positive point evaluations returns, via an Internet connection to the mobile device.
In alternative embodiments of the invention, the system and apparatus can use a mobile device equipped with projection means to project images or data stored in the system database for use by the identified user. In other alternative embodiments, the system and apparatus can use multiple probes or sensors for submitting information to the system from an identified source for re-distribution.
The accompanying drawings, which are incorporated in and constitute a part of this specification exemplify the embodiments of the present invention and, together with the description, serve to explain and illustrate principles of the inventive technique. Specifically:
a-1c are embodiments of multiple smartphone devices that can be used in combination with a computer to record information and identify and authenticate user;
a-32c are images of smartphone devices in combination with various sensors;
In the following detailed description, reference will be made to the accompanying drawings, in which identical functional elements are designated with like numerals. The aforementioned accompanying drawings show by way of illustration and not by way of limitation, specific embodiments and implementations consistent with principles of the present invention. These implementations are described in sufficient detail to enable those skilled in the art to practice the invention and it is to be understood that other implementations may be utilized and that structural changes and substitutions of various elements may be made without departing from the scope and spirit of present invention. The following detailed description is, therefore, not to be construed in a limited sense. Additionally, the various embodiments of the invention as described may be implemented in the form of software running on a general purpose computer, in the form of a specialized hardware, or combination of software and hardware.
The current present invention is an apparatus for identifying protecting, requesting, assisting and managing information. The apparatus is executed on a computer, laptop, mobile computing device, smartphone, or any other machine comprising the hardware components required by the apparatus of the present invention and capable of executing software to control and enable functionality of the hardware components of the apparatus of the present invention.
Referring to
A computer laptop or mobile device such as a smartphone 100, can work with one cam split 109 or two cams in 3D mode 108 and two stereo microphones 106 and 105. A projector device 124 with two separate CCDs 120 and 121 with two separate mirrors 125 and 126 is incorporated into the smartphone device 100 in one embodiment. In another embodiment as shown in
Now referring to
The smartphone 110 shown in
Now referring to
Now referring to
The authentication unit 404 creating data for registration 404 by converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; and storing files in a first data storage 406 and numerical data in a second data storage location 407.
The authentication unit 403 also creating identification data 405 by: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA files into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 406 and numerical data in a second data storage 407 and comparing the first data to the second data in step 408, using a Computer Object De-Encryption Encryption File Algorithm (CODEFA) 409 and sending to verification; a match combined with 9 out of 17 positive point evaluations returns 409, via an Internet or WWW connection 410, “Hello, and your first name” on a display screen of a computer 411, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 503 creating data for registration 504 by: extracting audio from video and converting to Wave form; creating a point grid for analysis; creating a form coordinates; creating numerical reference points; converting data into interpolated volume variables; storing wave form coordinates and volume data; and storing files in a first data storage 506 and numerical data in a second data storage 507.
The authentication unit 503 also creating data for identification 505 by: extracting audio from video and converting to Wave form; creating point grid for analysis; creating wave form coordinates creating numerical reference points; converting data into interpolated volume variables; storing form coordinates and volume data; storing files in a first data storage 506 and numerical data in a second data storage 507; comparing data stored in the databases in step 508 and sending to verification by CODEFA 509; matching combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 510, “Hello, and your first name” on a display screen of a computer 511, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 603 creating data for registration 604 by: extracting 24 images at beginning of audio; extracting 24 images at 2 second mark of audio start; extracting 24 images backward at end of audio stop; converting files into wave form for analysis; converting files into interpolated brightness variables; creating wave form coordinates and pixel data; and storing files in a first data storage 606 and numerical data in a second data storage 607.
The authentication unit 603 also creating data for identification 605 by: extracting 24 images at beginning of audio; extracting 24 images at 2 second mark of audio start; extracting 24 images backward at end of audio stop; converging into wave form for analysis; converting files into interpolated brightness variables; creating wave form coordinates and pixel data; storing file in a first data storage 606 and numerical data in a second data storage 607; comparing data stored in the databases in step 608 and sending to verification by CODEFA 609; matching combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 610, “Hello, and your first name” on a display screen of a computer 611, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 703 creating data for registration 704 by: extracting form the video 3 image files at random times; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; and storing files in a first data storage 706 and numerical data in a second data storage 706.
The authentication unit 703 also creating data for identification 705 by: extracting from video 3 image files at random times; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 706 and numerical data in a second data storage 707; comparing data stored in the databases and send to verification in step 708; and sending to verification by CODEFA 709; matching combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 710, “Hello, and your first name” on a display screen of a computer 711, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 803 creating data for registration 804 by: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; creating 6 additional levels or brightness + and −; storing files in a first data storage 806 and numerical data in a second data storage 7.
The authentication unit 803 also creating data for identification 805 by: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; creating 6 additional levels or brightness + and −; and storing files in a first data storage 806 and numerical data in a second data storage 807; comparing data stored in the databases in step 8108 and sending to verification by CODEFA 809; matching combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 810, “Hello, and your first name” on a display screen of a computer 811, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 903 creating data for registration 904 by: Video is verified and stored; Audio is verified and stored; Video and audio is processed into CODEFA; During verification state Video and Audio spatial point is recorded from microphone and camera lenses; and storing files in a first data storage 906 and numerical data in a second data storage 907.
The authentication unit 903 also creating data for identification 905 by: Video is verified and stored; Audio is verified and stored; Video and audio is processed into CODEFA; During verification state Video and Audio SP spatial point is recorded from microphone and camera lenses; storing files in a first data storage 906 and numerical data in a second data storage 907; During identification CODEFA Registration SP data is compared to CODEFA Identification SP data to see if it matches 909; comparing data and send to verification in step 908; a match combined with 9 out of 17 positive point returns via an Internet or WWW connection 910, “Hello, and your first name” on a display screen of a computer 911. A non match returns negative point evaluation; if match data is stored as + data for learning; if no match data is stored as − data for learning and the video data is analyzed for a match of who the user really is, and if identified, notifies user by email questioning the failed identification.
Now referring to
The authentication unit 1003 creating data for registration 1004 by: Extracting audio from video and converting to Wave form; creating point grid for analysis; creating wave form coordinates; creating numerical reference points; converting data into interpolated volume variables; storing wave form coordinates and volume data from audio phrase begin point to end point; and storing files in a first data storage 1006 and numerical data in a second data storage 1007.
The authentication unit 1003 also creating data for identification 1005 by: Extracting audio from video and converting to Wave form; creating point grid for analysis; creating wave form coordinates; creating numerical reference points; converting data into interpolated volume variables; storing wave form coordinates and volume data from audio phrase begin point to end point; storing files in a first data storage 1006 and numerical data in a second data storage 1007; comparing data and send to verification in step 1008; and sending to verification by CODEFA 1009; matching combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 1010, “Hello, and your first name” on a display screen of a computer 1011, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 1103 creating data for registration 1104 by: Receiving Processor data during Registration; Receiving “Processor time of day related to Registration; Receiving typed phrase during registration; Receiving Audio file of phrase spoken at CODEFA during registration; converting CODEFA file into interpolated volume variables with SP Target data embedded; creating wave form coordinates and pixel data; and storing files in a first data storage 1106 and numerical data in a second data storage 1107.
The authentication unit 1103 also creating data for identification 1105 by: Receiving Processor data during Registration; Receiving Processor time of day related to Registration; Receiving typed phrase during registration; Receiving Audio file of phrase spoken at CODEFA during registration; converting CODEFA file into interpolated volume variables with SP Target data embedded; creating wave form coordinates and pixel data; storing files in a first data storage 1106 and numerical data in a second data storage 1107; comparing data and send to verification in step 1108; and sending to verification by CODEFA 1109; matching combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 1110, “Hello, and your first name” on a display screen of a computer 1111, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 1203 creating data for registration 1204 by: converting dual cam video to .jpg image files with SP Target of each cam embedded; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 1206 and numerical data in a second data storage 1207.
The authentication unit 1203 also creating data for identification 1205 by: converting dual cam video to .jpg image files with SP Target of each cam embedded; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 1206 and numerical data in a second data storage 1207; comparing data and send to verification in step 1208; and sending to verification by CODEFA 1209; matching combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 1210, “Hello, and your first name” on a display screen of a computer 1211, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 1303 creating data for registration 1304 Automatic Object Identification, views background compared with foreground and attaches box around moving object with 16 pixels distance around the edge, locks on, gets image for beginning of processing then: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; and storing files in a first data storage 1306 and numerical data in a second data storage 1307.
The authentication unit 1303 also creating data for identification 1305 by Automatic Object Identification then: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; and storing files in a first data storage 1306 and numerical data in a second data storage 1307; comparing data and send to verification in step 1308; and sending to verification by CODEFA 1309; matching combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 1310, “Hello, and your first name” on a display screen of a computer 1311, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 1403 creating data for registration 1404 by: using an Audio Phrase Distance device comprised of on the phone or device, that sending data back to the main server for evaluation and decision to determine Distance to object using sound and infrared data; converting variation calculated with “APD” and distance data to object data; storing files in a first data storage 1406, numerical data in a second data storage 1407, and audio phrase distance data in a third data storage 1408.
The authentication unit 1403 also creating data for identification 1405 by: using an Audio Phrase Distanced (ADP) device to determine Distance to object using sound and infrared data; converting variation calculated with “APD” and distance data to object data; storing files in a first data storage 1406, numerical data in a second data storage 1407, and audio phrase distance data in a third data storage 1408 and values are used for comparison with audio data to determine identification at different distances from microphone in step 1408. Matching combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 1410, “Hello, and your first name” on a display screen of a computer 1411, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 1503 creating data for registration 1504 by: converting 3D multiple cam video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 1506 and numerical data in a second data storage 1507.
The authentication unit 1503 also creating data for identification 1505 by: converting dual cam video to .jpg image files with SP Target of each cam embedded; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 1506 and numerical data in a second data storage 1507; comparing 3D differences and store in 3D data storage 1508; comparing data in a first data storage 1506 and numerical data in a second data storage 1507 in step 1509 and send to verification in step 1510; A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 1510, “Hello, and your first name” on a display screen of a computer 1511, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 1603 creating data for registration 1604 by: converting video to .jpg image files in grayscale; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; and storing files in a first data storage 1606 and numerical data in a second data storage 1607.
The authentication unit 1603 also creating data for identification 1605 by: converting video to .jpg image files in grayscale; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 1606 and numerical data in a second data storage 1607; comparing data stored in the databases 1608 and send to verification in step 1609. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 1610, “Hello, and your first name” on a display screen of a computer 1611, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 1703 creating data for registration 1704 by: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data PCB; and storing files in a first data storage 1706 and numerical data in a second data storage 1707.
The authentication unit 1703 also creating data for identification 1705 by: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data PCB; storing files in a first data storage 1706 and numerical data in a second data storage 1707; comparing data stored in the databases in step 1708 using CODEFA 1709. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 1710, “Hello, and your first name” on a display screen of a computer 1711, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 1803 creating data for registration 1804 by: converting audio from 2 stereo microphones to data; converting audio data and input into database; Analyze and compare left data from right data; and storing files in a first data storage 1806 and numerical data in a second data storage 1807.
The authentication unit 1803 creating data for identification 1805 by: converting audio from two stereo microphones to data; converting audio data and input into databases; analyzing and comparing left date from right data; storing files in a first data storage 1806 and numerical data in a second data storage 1807. comparing data stored in the databases in step 1808 using CODEFA 1809. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 1810, “Hello, and your first name” on a display screen of a computer 1811, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 1903 creating data for registration 1904 by: converting video to .jpg image files; converting file into interpolated brightness variables; converting .jpg image files to Vector files; converting Vector Files to line art; overlaying Line art on to grid form for analysis; creating grid form coordinates and pixel data PCB; and storing files in a first data storage 1906 and numerical data in a second data storage 1907.
The authentication unit 1903 creating data for identification 1905 by: converting video to .jpg image files; converting file into interpolated brightness variables; converting .jpg image files to Vector files; converting Vector Files to line art; overlaying Line art on to grid form for analysis; creating grid form coordinates and pixel data PCB; storing files in a first data storage 1906 and numerical data in a second data storage 1907; comparing data in step 1908 using CODEFA 1909. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 1910, “Hello, and your first name” on a display screen of a computer 1911, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 2003 creating data for registration 2004 by: converting video to .jpg image files; converting file into interpolated brightness variables; converting .jpg image files to Vector files; converting Vector Files to line art; overlaying Line art on to grid form for analysis; creating grid form coordinates and pixel data PCB; and storing files in a first data storage 2006 and numerical data in a second data storage 2007.
The authentication unit 2003 creating data for identification 2005 by: converting video to .jpg image files; converting file into interpolated brightness variables; converting .jpg image files to Vector files; converting Vector Files to line art; overlaying Line art on to grid form for analysis; creating grid form coordinates and pixel data PCB; storing files in a first data storage 2006 and numerical data in a second data storage 2007; comparing data stored in the databases in step 2008 using CODEFA 2009. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 2010, “Hello, and your first name” on a display screen of a computer 2011, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 2103 creating data for registration 2104 by: converting 3D multiple cam video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; and storing files in a first data storage 2106 and numerical data in a second data storage 2107.
The authentication unit 2103 creating data for identification 2105 by: converting dual cam video to .jpg image files with SP Target of each cam embedded; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 2106 and numerical data in a second data storage 2107; comparing 3D differences and store in 3D data storage 2108; comparing data and send to verification in step 2109 using CODEFA. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 2110, “Hello, and your first name” on a display screen of a computer 2111, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 2203 creating data for registration 2204 by: converting video to .jpg image files in grayscale; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 2206 and numerical data in a second data storage 2207.
The authentication unit 2203 creating data for identification 2205 by: converting video to .jpg image files in grayscale; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 2206 and numerical data in a second data storage 2207; comparing V1 data to V2 data in step 2208 and send to verification using CODEFA 2209. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 2110, “Hello, and your first name” on a display screen of a computer 2111, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 2303 creating data for registration 2304 by: converting dual cam video to .jpg image files with SP Target of each cam embedded; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 2306 and numerical data in a second data storage 2307.
The authentication unit 2303 creating data for identification 2305 by: converting dual cam video to .jpg image files with SP Target of each cam embedded; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 2306 and numerical data in a second data storage 2307; comparing data in step 2308 and send to verification using CODEFA in step 2309. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 2310, “Hello, and your first name” on a display screen of a computer 2311, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 2403 creating data for registration 2404 by Automatic Object Identification, views background compared with foreground and attaches box around moving object with 16 pixels distance around the edge, locks on, gets image for beginning of processing then: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; and storing files in a first data storage 2406 and numerical data in a second data storage 2407.
The authentication unit 2403 creating data for identification 2405 by Automatic Object Identification then: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 2406 and numerical data in a second data storage 2407; comparing data stored in the databases in step 2408 and send to verification via CODEFA in step 2409. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 2410, “Hello, and your first name” on a display screen of a computer 2411, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 2503 creating data for registration 2504 by: extracting from video 3 image files at random times; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; and storing files in a first data storage 2506 and numerical data in a second data storage 2507.
The authentication unit 2403 creating data for identification 2505 by: extracting from video 3 image files at random times; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; storing files in a first data storage 2506 and numerical data in a second data storage 2507; comparing data stored in the databases in step 2508 and send to verification using CODEFA in step 2509. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 2510, “Hello, and your first name” on a display screen of a computer 2511, while a non match returns a negative point evaluation.
Now referring to
The authentication unit 2603 creating data for registration 2604 by: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; creating 6 additional levels or brightness + and −; storing files in a first data storage 2606 and numerical data in a second data storage 2607.
The authentication unit 2603 creating data for identification 2605 by: converting video to .jpg image files; converting .jpg image files to ASCII PPM files; converting PPM files to CODEFA files; converting CODEFA file into wave form for analysis; converting CODEFA file into interpolated brightness variables; creating wave form coordinates and pixel data; creating 6 additional levels or brightness + and −; storing files in a first data storage 2606 and numerical data in a second data storage 2607; comparing T1 data to T2 data in step 2608 and sending it to verification in step 2609. A match combined with 9 out of 17 positive point evaluations returns via an Internet or WWW connection 2610, “Hello, and your first name” on a display screen of a computer 2611, while a non match returns a negative point evaluation.
No referring to
Now referring to
Now referring to
The a sensor 3002 can provide disease detection and advanced tests 3005 by identifying the age of the object 3006, detecting dangerous items 3007, which can be sent to any source 3012. Additionally, the sensor providing metallurgical identification 3008, water analysis 3009, blood analysis 3010, and saliva analysis 3011 can collect and process the data and send it to a physician for review 3014, enzyme analysis 3015, or a DNA test 3016.
Information can be transmitted to any source 3012 including, but not limited to, airport data 3017, air quality 3018, gold testing 3019 from chemical analysis 3012, gaseous analysis 3020, infection analysis 3021, carbon monoxide detection 3022, and smoke alarm detection and identification 3023.
Now referring to
Now referring to
Now referring to
Now referring to
Moreover, other implementations of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. Various aspects and components of the described embodiments may be used singly or in any combination in the computerized content filtering system. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
Although the present invention has been described in considerable detail with reference to certain preferred versions thereof, other versions are possible. Therefore, the point and scope of the appended claims should not be limited to the description of the preferred versions contained herein.
As to a further discussion of the manner of usage and operation of the present invention, the same should be apparent from the above description. Accordingly, no further discussion relating to the manner of usage and operation will be provided.
With respect to the above description, it is to be realized that the optimum dimensional relationships for the parts of the invention, to include variations in size, materials, shape, form, function and manner of operation, assembly and use, are deemed readily apparent and obvious to one skilled in the art, and all equivalent relationships to those illustrated in the drawings and described in the specification are intended to be encompassed by the present invention.
Therefore, the foregoing is considered as illustrative only of the principles of the invention. Further, since numerous modifications and changes will readily occur to those skilled in the art, it is not desired to limit the invention to the exact construction and operation shown and described, and accordingly, all suitable modifications and equivalents may be resorted to, falling within the scope of the invention.
This application claims priority from and is a Continuation of U.S. patent application Ser. No. 12/653,749, entitled “Method and device for identifying protecting, requesting, assisting and managing information”, filed on 17 Dec. 2009, which is incorporated by reference in its entirety for all purposes as if fully set forth herein.
Number | Date | Country | |
---|---|---|---|
Parent | 12653749 | Dec 2009 | US |
Child | 13332208 | US |