...Knowledge begins with Learning. Bookmark and Share

Adaptive Insight Systematic Freedom Synergy

Computer Controlled Financial Networked Transaction System 1995

© copyright 2005 / 11th November 1998 and copyright  by Adrian Ashley 

The next generation of artificial intelligent electronic euro money and euro personal identification card programmed to follow established European trading laws and legal systems.  A computer controlled euro financial system provides the following capabilities :- Providing a type of intelligent passport currency for electronic money transactions. Tracking and verification of the origin of the electronic money, With a set of defined parameters such as

  1. The user identification code – National Insurance Number
  2. The legal identification code of the source of the electronic Euro money.
  3. The legal identification code of the sink(destination) of the electronic Euro money.
  4. The Amount of electronic money
  5. The currency of electronic money
  6. The legal product identification code the good or services that the electronic money represents
  7. The time and date stamp

The Computer Controlled Euro Financial System programmed to follow established European trading laws and legal systems can be explained by means of an example  

A person who works during the week at a company called ABC and receives a wages. On Saturday the person goes to town shopping with their personal identification card transaction card The person goes into a clothing shop and purchases a  new leather jacket for 350 euro.

Below is how this Network money transaction can be represented

Artificial Intelligent Money Object Parameters

User Identification

National Insurance Number protected by data encryption

Money Source

Company ABC – Legal Trading ID code protected by data encryption

Money Sink

Clothing Shop – Legal Trading ID code protected by data encryption

Amount

350

Currency

Euro

Product

Leather Jacket –Legal Goods ID code

Tracking status

Time Date stamp

Then advantages of such a computer controlled euro financial system. Massively reducing the ability carry any illegal activity with unidentified and anonymous paper and coinage money system   The purchasing the leather jacket will be paying a tax and X % VAT
The user of the personal identification card transaction card will have set the card of with proportional tax ratios the predetermine the destination of the tax to the users choosing.

FUNCTION - Tax Vectoring
Extract from 1998 For example the user may set the card so that more of the tax is directed to health and education etc
User in terms of Tax/VAT/Council Tax vectoring you define the destination proportional ratio of your Tax to the tax authorities account

 FUNCTION - PERSONAL ACCOUNT MANAGEMENT
Extract from the  1995 Expired patent
You may request a certain amount of a currency to be transferred from your bank account to a virtual account on the said Binary Card(BC)(7), the currency that is transferred may be divided up in to sub-virtual accounts in pre-defined ratios, for example sub-divided into the following categories
            (1) FOOD          ACCOUNT(1),
            (2) CLOTHING   ACCOUNT(2),
            (3) TRAVEL       ACCOUNT(3),
            (4) LEISURE      ACCOUNT(4),
            (n)   XXX            ACCOUNT(n),
            n= the maximum number of accounts
FUNCTION – Artificial Intelligent
Extract from the  1995 Expired patent

The Artificial Intelligence Protection Network(AIPN) will automatically track the flow of the said currency and any irregularities will shut the card down

programmed to follow established European trading laws and legal systems.

FUNCTION –  Interoperability Artificial intelligent monitoring system
The transaction system could connected to a companies accounts server computer  and analyse the companies accounts 24 / 7 passive monitoring system and with the power to suspend trading when financial irregularities are detected and backtrack all financial transaction, even as far as the employee purchasing the leather jacket at 350 Euros  as described above

FUNCTION – Card Parameters data Extract from the  1995 Expired patent
personal identification card transaction card also know as  Binary Card(BC)(7) will contain the following information
            (a) Unique PIN code + General emergency code
            (b) Unique user personal mark of Patch Lock
            (c) optional unique internal digitised user face
            (d) optional unique digitised user finger prints
            (e) optional unique user DNA
            (f)  user home address information
            (g) user medical address information
            (h) user medical information
            (i) user verification of academic qualification
            (j) user verification of vehicle licence
            (k) user verification of valid vehicle insurance and road tax
            (l)  user bank data
            (m) user currency
            (n) user virtual accounts
            (o) Unique hand commands
            (v) Unique voice commands

GOOD FOR THE ENVIRONMENT.  

If the  financial system upgraded to 100% electronic transaction. Computer Controlled  Financial Networked Transaction System, with artificial intelligence.
  
There would not be a need to manufacture trillions of pieces of paper money and million of tones of coinage with anonymous transactions and move the physical money around in armored vehicles and on ships and aircraft burning fossil fuels the whole process is energy and time consuming etc.

HOW SOPHISTICATED.

Trillions of transaction data and be compressed and stored for over 200 years in deep data storage or timeless. All net work transactions protected by encryption and artificial intelligence. Track backwards down to the products point of manufacture down to the raw materials and verify legal origin such as no Child labours / Slave labour in operation
Networked computers programmed to follow established European trading laws and legal systems , processing in the quiet periods like night time low processing activity. All the systems already exist

Calculate the environmental impact of the manufactured article and indicate the locate for the article disposal and recycling, then indicate to the global manufactures the position of the recycled material for remanufacturing, in an internet synergy

On user command identify jobs in a global environment with supporting accommodation and travel details and local information, in a web services synergy

TRADING STANDARDS.

At the click of an authorized mouse button any article failing to meet trading standards such as food safety and product safety can be blocked at the transaction till point and for any article missed, alert the purchaser via email to return the goods / merchandise for a refund or replacement. This is one of the main objectives of a Computer Controlled  Financial Networked Transaction System, with artificial intelligence programmed to follow established European trading laws and legal systems.

Copyright 1995 1998

 Abstract Extract from the  1995 Expired patent

             There are various forms of personal identification such as a passport, cheque guarantee card, driving licence, personal identification card, unemployment documents, NHS medical card ,national insurance card, all the above forms of identification have one thing in common, their main objective is to validate the person using these various forms of identification. It is however possible to forge or generate a false documents, such as a false passport, or using an unauthorised driving licence, or unauthorised cheque guarantee card or fraudulently cashing an unemployment cheque using counterfeit money or in general presenting a false personal identification, the user may enter their personal mark for the verification process by physical contact by means of a virtual pen or by non-physical contact by means of optically sampled hand commands said user may insert the said Binary Card(BC)(7) in to the said slot(6) of said currency transaction system and /or verification system , said user may insert their left or right hand open and palm facing downwardly ,said at least one camera will optically sample the said user hand and generate a data stream of the outer shape of the said hand said data stream will be stored in the said Input Buffer - key vector map(12) in order to compare said data stream with Patch lock pre-programmed on to the said Binary Card(BC)(7) rotating the said user hand and /or extending digits may be Patch locked and represent numeric digits and /or different hand commands a closed fist will indicate a pause between inputs said at least one display will present a visual feedback and/ or information to follow,

NETWORK TRANSACTION PROCESS Expired UK Patent 1996 by Adrian Ashley

 

 

iEMU = Intelligent European Monetary Union Computer Systems 1998 User Interface Patented in 1996 Software Copyright 1994 Vectex Microprocessor plans 1994 - 1996

iEMU = Intelligent European Monetary Union Computer Systems 1998 User Interface Patented in 1996 Software Copyright 1994 Vectex Microprocessor plans 1994 - 1996

  NETWORK TRANSACTION PROCESS Expired UK Patent 1996 by Adrian Ashley

 FIELD OF THE INVENTION

            This invention relates to the verification of a persons identity in order to access a facility such as transcontinental transaction cards or general access by means of the Network Transaction Process(NTP)

 BACK GROUND OF THE INVENTION

            There are various forms of personal identification such as a passport, cheque guarantee card, driving licence, personal identification card, unemployment documents, NHS medical card ,national insurance card, all the above forms of identification have one thing in common, their main objective is to validate the person using these various forms of identification. It is however possible to forge or generate a false documents, such as a false passport, or using an unauthorised driving licence, or unauthorised cheque guarantee card or fraudulently cashing an unemployment cheque using counterfeit money or in general presenting a false personal identification,

 SUMMARY OF INVENTION

            According to the present invention there is provided a Network Transaction Process(NTP) comprising of

 means for entering user personal mark or user personal signature or user personal password or user personal geometric symbols is provided by virtual pen(1)

means for resting user hand on said verification system is provided by integral hand rest(4)

means for displaying visual feedback data is provided by a back lit display(2),

 means for simultaneously entering and displaying user access data is provided by said virtual pen(1) the said back lit display(2) will immediately display a real time trace or trail or the said virtual pens(1) previous point of contact

 means for sensing said previous point of contact is provided by integral sensor mounted upon the (x-axis) and (y-axis) continuously monitoring the position of the current and said previous point of contact of the tip of the said virtual pen(1)

 means for guiding is provided by a activating a grid or line in the said back lit display(2) to assist the user entering their personal mark,

 means for processing the said user personal mark or said user personal signature or said user personal password or said user personal geometric symbols is provided by processing means referring to  said Network Transaction Process(NTP) will use three internal Processing elements configured to work in co-operation, each Network Transaction Process(NTP) element will have their internal parameters set by parameter data stored on the user said Binary Card(BC)(7) said internal parameters are defined at the initial time of programming and are stored on the said Binary Card(BC)(7) ,

 means for comparing data is provided by a standard two dimensional memory matrix called the imap(10)  with a central origin point called the quiescent(q) point(11), the said imap(10) memory matrix cell elements will be addressed by standard Cartesian co-ordinates or polar co-ordinates this is the area where the processing will take place,

  means for programming said  Binary Card(BC)(7) is as follows

means for addressing or locating any  memory cell may be addressed either by Cartesian co-ordinates or by vector addressing the components of a vector

 means for sampling motion of said virtual pen(1) tip as the user enters their said personal mark

herein referred to as a data stream comprising of a plurality of x-axis and y-axis data points with reference to axis co-ordinated of said back lid display(2)

 means for storing said data stream generated from the user entering their said personal mark is provided by the Input Buffer - key vector map(12)

 means for locating the centre of gravity will be obtained from all the data points stored in the input buffer and modification will be made so that the said centre of gravity of the data stream  will equal or rest upon the quiescent point in the imap(10) and the said modified data will be transferred into the navigation buffer - key vector map(13)  is provided by first processor

 means for linking said data stream the sequence in which the data was initially entered when the user initially entered their said personal mark, If the modified data points in the navigation buffer - key vector map(13) were linked up in order or sequence in which they were initially generated and plotted in the said imap(10)  it would form a vector key with the centre of gravity of the vector resting over the quiescent or origin point in the imap(10) is provided by second processor

 said  virgin Binary Card(BC)(7) stores this data in the said card the data will be known as the Foundation Patch Lock the card would contain three samples of each of the following

            (1) Foundation Patch Lock for the x-vip  processor and the delta parameter

            (2) Foundation Patch Lock for the y-vip  processor and the delta parameter

            (3) Foundation Patch Lock for the 2-Dip processor

The delta delay parameters set the sample rate for the x-axis sensor(3) and y-axis sensor(3) means for the internal (x-channel) and (y-channel)

the delta parameter will be adjusted so that the maximum area is mapped by the key vector map  in the imap(10) of the (x-vip) and (y-vip) processors

 means for verification only when said  Binary Card(BC)(7) is programmed with a user said personal mark then the procedures for verifying the Foundation Patch Locks or Patch Locks stored in the card with a later user entered said personal mark are as follows, the user must insert their programmed said Binary Card(BC)(7) into the slot(6) of the said verification system

 means for verification only when  Patch Locks will be constructed by using the Foundation Patch Locks stored in the said Binary Card(BC)(7) obtained by following said first processor and said second processor means, the Foundation said Patch Locks sequential said data stream is transferred to the said navigation buffer - key vector map(13)  at each vector point from [p1,p2,p3,...,pn] a Binary Patch(14) will be placed in the said memory matrix imap(10) for said (x-vip) processor, and said  (y-vip) processor and said (2-Dip) processor,

 means for designating a pre-determined area or square size is provided by Binary Patch(14) said area may vary depending on the required accuracy of the system is provided by third processor,

 means for designating a pre-determined binary value  within the boundary area of the said Binary Patch(14)  will be stored in the imap(10) said binary value may vary depending on the required accuracy of the system is provided by third processor,

 means for designating a pre-determined said binary value is different for each area of the Binary Patch(14) beginning with binary value one for the absolute smallest patch and incrementing the binary value for each incrementing area Binary Patch(14) is provided by third processor,

 means for designating the centre point of each said Binary Patch(14) will rest upon the key vector map data points the said Patch Locks are constructed is provided by third processor,

 means for entering user said personal mark is as follows the user will remove the virtual pen(1) attached to the said Verification System by a flexible lead(8) from the said virtual pen holder(9), and scribe their said personal mark upon the said back lit display(2), the delta parameter setting will be set from the information upon the said Binary Card(BC)(7),

 means for sampling motion of said virtual pen(1) tip as the user enters their said personal mark

herein referred to as a data stream comprising of a plurality of x-axis and y-axis data co-ordinates  with reference to axis co-ordinated of said back lid display(2)

 said data stream generated from the user entering their personal mark sampled by a (x-axis) and  (y - axis) sensors(3) via the x-channel and y-channel respectively the sequential said data stream will be held in the said Input Buffer - Key Vector Map(12),

 means for locating the centre of gravity will be obtained from all the data points stored in the input buffer and modification will be made so that the said centre of gravity of the data stream  will equal or rest upon the quiescent point in the imap(10) and the said modified data will be transferred into the navigation buffer - key vector map(13)  is provided by first processor

 means for linking said data stream the sequence in which the data was initially entered when the user initially entered their said personal mark, If the modified data points in the navigation buffer - key vector map(13) were linked up in order or sequence in which they were initially generated and plotted in the said imap(10)  it would form a vector key with the centre of gravity of the vector resting over the quiescent or origin point in the imap(10) is provided by second process

 means for rotating the said Navigation Buffer - Key Vector Map(13) data a full 360 degrees virtually over the said Patch Lock in the said Imap(10), each data vector point in the said Navigation Buffer - Key Vector Map(13) is compared with the said Patch Lock Patches(14), the number of vector points equalling the virtual location of a said Patch Lock Patch(14) is registered in the RIndex register within the (x-vip) processor and (y-vip) processor and

(2-dip) processor is provided by the forth process of the said (x-vip) processor and said (y-vip) processor and said (2-dip) processor,

 means for obtaining the angular rotation Qhigh where the maximum number of entered vector points equalling the virtual location of a said Patch Lock Patch(14) is registered in the said RIndex register of said (x-vip) processor and said (y-vip) processor and said (2-Dip) processor the said Navigation Buffer - Key Vector Map(13) is re-configured to a new data orientation so that the said Navigation Buffer -Key Vector Map(13) corresponds to the Qhigh angular position or the angular rotation where the said user mark compares and equals the virtual location of said Patch Lock Patch(14),

 means for shifting in a linear Cartesian motion Zig Zag the said Navigation Buffer - Key Vector Map(13) data in a pre-set area virtually over the said Patch Lock, each data vector point in the said Navigation Buffer - Key Vector Map(13) is compared with the said Patch Lock  Patches(14), the number of vector points equalling the virtual location of a said Patch Lock Patch(14) is registered in the said RIndex register within the said (x-vip) processor and, said (y-vip) processor  and said (2-Dip) processor, the (xh) and (yh) Cartesian location where the maximum number of points equalled the virtual location of a said Patch Lock Patch is registered in the said RIndex(15) register within the said (x-vip) processor, and the said (y-vip) processor and the said (2-Dip) processors , the Navigation Buffer - Key Vector Map(13) is re-configured to a new data orientation so that the Navigation Buffer - Key Vector Map(13) corresponds to the (xh) and (yh) Cartesian position wherein the maximum number of comparison were obtained,

 means for generating a positive identification is provided when said (x-vip) processor, said (y-vip) processor and said (2-Dip) processor will generate a positive identification if a pre-defined number of vector points corresponds with their pre-programmed Patch Lock Patches(14),

Input one   of the three input AND gate is connected to the output of the (X-VIP) processor

Input two   of the three input AND gate is connected to the output of the (Y-VIP) processor

Input three of the three input AND gate is connected to the output of the (2-DIP) processor

the said Verification System willl produce a positive valid user response and generate a positive identification upon the said back lit display(2) only if all three Network Transaction Processor(NTP) elements generate a positive identification or logical high then the three input logic gate will produce a logical high which will indicate that the user of the card has been positively identified with the data stored upon the said Binary Card(BC)(7) incorporating samples of three said Patch Locks and setting parameters for each, said Patch Lock one is used by the said  (X-VIP) processor  said Patch Lock two is used by the said (Y-VIP) processor and the said Patch Lock three is used by the said (2-DIP) processor each processing element is set by the parameters on the said Binary Card(BC) when first programmed, the three internal Network Transaction Processing(NTP) elements will have the following names and function,

 PROCESSOR 1= The X-Velocity Image Processor(X-VIP), Function of the (x-vip) is as follows the user will insert their valid said Binary Card(BC)(7) into the said slot(6) of the said Verification System, the sample rate on the (x-channel) will be set by parameter data on the user said Binary Card(BC)(7), this will determine how fast the sensor mounted upon the said (x-axis) thereof will sample the motion of the tip of the said virtual pen(1) which rests upon the surface of the said back lit display(2) the motion is executed by the valid user of the inserted said Binary Card(BC)(7),

 The linear said (x-axis) positional data generated from the said (x-axis) sensor(3) will store this data sequentially for the duration of the user personal mark entry, after the user has entered their said personal mark the said sequential (x-channel) said data stream will stop,

 The said sequential (x-channel) data will form the Key Vector Map(KVM) for the said (X-VIP) processor which will execute the Network Transaction Process(NTP) and generate a positive or negative identification this will be interpreted as a logical level high or low respectively which is connected to the said  three input logical AND gate,

Input one   of the three input AND gate is connected to the output of the said (X-VIP) processor

Input two   of the three input AND gate is connected to the output of the said (Y-VIP) processor

Input three of the three input AND gate is connected to the output of the said (2-DIP) processor

The Verification System will produce a positive valid user response and generate a positive identification upon the said back lit display(2) only if all three Network Transaction Processor(NTP)  elements generate a positive identification or logical high then the three input logic gate will produce a logical high which will indicate that the user of the card has been positively identified with the data stored upon the said Binary Card(BC)(7),

 The purpose of the said X-Velocity Image Processor X-VIP is to monitor and test the velocity of the said virtual pens(1) tip motion after the user has entered their personal mark, the said         (X-VIP) processor will compare the sequential said data stream from the x-channel with the said Patch Lock stored on the inserted said Binary Card(BC)(7),

 PROCESSOR 2= The Y-Velocity Image Processor(Y-VIP), Function of the said (y-vip) processor  is as follows the user will insert their valid said Binary Card(BC)(7) into the said slot(6) of the said Verification System, the sample rate on the

(y-channel) will be set by parameter data on the user said Binary Card(BC)(7), this will determine how fast the sensor mounted upon the (y-axis) thereof will sample the motion of the tip of the said virtual pen(1) which rests upon the surface of the said back lit display(2) the motion is executed by the valid user of the inserted said Binary Card(BC)(7),

 The linear (y-axis) positional data generated from the said (y-axis) sensor(3) will store this data sequentially for the duration of the user personal mark entry, after the user has entered their personal mark the sequential (y-channel) data stream will stop,

 The sequential (y-channel) data will form the Key Vector Map(KVM) for the (Y-VIP) processor which will execute the Network Transaction Process(NTP) and generate a positive or negative identification this will be interpreted as a logical level high or low respectively which is connected to a three input logical AND gate,

Input one   of the three input AND gate is connected to the output of the (X-VIP) processor

Input two   of the three input AND gate is connected to the output of the (Y-VIP) processor

Input three of the three input AND gate is connected to the output of the (2-DIP) processor

 The Verification System will produce a positive valid user response and generate a positive identification upon the said back lit display(2) only if all three Network Transaction Processor(NTP)(7) elements generate a positive identification or logical high then the three input logic gate will produce a logical high which will indicate that the user of the card has been positively identified with the data stored upon the said Binary Card(BC)(7),

 The purpose of the Y-Velocity Image Processor Y-VIP is to monitor and test the velocity of the said virtual pens(1) tip motion after the user has entered their personal mark, the (Y-VIP) processor will compare the sequential said data stream  from the y-channel with the said Patch Lock stored on the inserted said Binary Card(BC)(7),

 PROCESSOR 3= The 2-Dimentional Image Processor (2-DIP), Function of the said (2-Dip) processor  is as follows the user will insert their valid said  Binary Card(BC)(7) into the said slot(6) of the said Verification System, the sample rate on the (x-channel) and (y-channel) will be set by parameter data on the user said Binary Card(BC)(7), this will determine how fast the said sensors(3)  mounted upon the (x-axis) and (y-axis) thereof will sample the motion of the tip of the said virtual pen(1) which rests upon the surface of the said back lit display(2) the motion is executed by the valid user of the inserted said Binary Card(BC)(7),

 The linear (x-axis) and (y-axis) positional data generated from the said (x-axis) and said (y-axis) sensor(3) will store this data sequentially for the duration of the user said personal mark entry, after the user has entered their said personal mark the sequential (x-channel) and (y-channel) said data stream will stop,

 The said sequential (x-channel) and (y-channel) data will form the said  Key Vector Map(KVM) for the (2-DIP) processor which will execute the said Network Transaction Process(NTP) and generate a positive or negative identification this will be interpreted as a logical level high or low respectively which is connected to a said three input logical AND gate,

Input one   of the three input AND gate is connected to the output of the said (X-VIP) processor

Input two   of the three input AND gate is connected to the output of the said (Y-VIP) processor

Input three of the three input AND gate is connected to the output of the said (2-DIP) processor

 The said Verification System will produce a positive valid user response and generate a positive identification upon the said back lit display(2) only if all three said Network Transaction Processor(NTP) elements generate a positive identification or logical high then the said three input logic gate will produce a logical high which will indicate that the user of the card has been positively identified with the data stored upon the said Binary Card(BC)(7),

 The purpose of the said 2-Dimentional Image Processor 2-DIP is to monitor and test the image of the said personal mark scribed by the said virtual pens(1) tip motion after the user has entered their said personal mark, the said (2-DIP) processor will compare the sequential data from the said (x-channel) and said (y-channel) with the said Patch Lock stored on the inserted said Binary Card(BC)(7),

The virtual keypad(5) and unlimited virtual command keys is displayed upon the said back lit display(2) the operation of the virtual keypad(5) is achieved by using the said virtual pad(1) to apply a single stroking motion over the appropriately displayed virtual numeric or command key on the virtual keypad(5) or said back lit display(2),

 means for accessing user medical history contained on the said Binary Card(BC)(7) is provided by a Medical Card Reader(MCR) by authorised medical personnel

after the said Binary Card(BC)(7) is inserted in to a slot of the said  Medical Card Reader(MCR),

 means for accessing user personal details contained on the said  Binary Card(BC)(7) is provided by a Urban Security Police Card Reader(USPCR) by authorised personnel after the said Binary Card(BC)(7) is inserted in to a slot of the said  Urban Security Police Card Reader(USPCR),

 means for contacting an emergency service by the said Binary Card(BC)(7) in an emergency ,If you require assistance you can call for help at a near by terminal insert your card and enter your personal mark and then select the emergency code command option and then select the type of help required,

 means for transferring a currency and executing any transaction is provided by said Binary Card(BC)(7) and verification system used in currency transaction systems, when you go to you local Bank and go to the kiosk an authorised personnel will ask you to insert your said Binary Card(BC)(7) in to the said slot(6) of the verification system, You may request a certain amount of a currency to be transferred from your bank account to a virtual account on the said Binary Card(BC)(7),

 means for dividing said currency in to a plurality of internal accounts in pre-defined ratios is provide in the said Binary Card(BC)(7)

 means for detecting tampering if your entered said personal mark is consistently wrong the verification system will either electronically mark the said Binary Card(BC)(7) indicating that Tampering is Detected(TID), if the said Binary Card(BC)(7) has over a present number of (TID) marks then the next time the said Binary Card(BC)(7) is used , the verification system will automatically contact the appropriate authorities and indicate to the authorities the location where the card is currently being used and the nature of the attempted fraud and the verification system will shut the card down, however if the said Binary Card(BC)(7) has been used correctly for a present number of times for example if the said Binary Card(BC)(7) has been used correctly then the verification system will remove a single said (TID) mark if there were one present for every present number for example ten correct interactions or transactions,

 means for tracking and monitoring the currency transaction is indicated by the Current Status(CSTAT) of the said Binary Card(BC)(7) is provide by  the Artificial Intelligence Protection Network(AIPN)

 means for programming a virtual travel ticket with all relevant ticket information will be programmed back on to the said Binary Card(BC)(7) the cost of the travel will be purchased with said currency

 means for  accessing the said travel ticket details is provided by Travel Card Reader(TCR) will access the information held in the travel account on the said Binary Card(BC)(7) this will contain all the ticket information ,

 means for translating  your currency in to any international currency taking into account the exchange rate is provided by said  Binary Card(BC)(7)

 The said Binary Card(BC)(7) will contain the following information

            (a) Unique PIN code + General emergency code

            (b) Unique user personal mark of Patch Lock

            (c) optional unique internal digitised user face

            (d) optional unique digitised user finger prints

            (e) optional unique user DNA

            (f)  user home address information

            (g) user medical address information

            (h) user medical information

            (i) user verification of academic qualification

            (j) user verification of vehicle licence

            (k) user verification of valid vehicle insurance and road tax

            (l)  user bank data

            (m) user currency

            (n) user virtual accounts

            (o) Unique hand commands

            (v) Unique voice commands

 

            Patch Lock parameters and personal details

            Patch Lock one    is used by the (X-VIP) processor

            Patch Lock two    is used by the (Y-VIP) processor

            Patch Lock three is used by the (2-DIP) processor

 BRIEF DESCRIPTION OF THE DRAWINGS

For a better understanding of the invention, an embodiment of the invention will now be described by way of a non-limiting example with reference to the accompanying drawing which:

 Fig 1. shows an artists impression of a Human Signature Dynamic Ashley Patch Lock System

            or verification system and Binary Card(BC)(7),

Fig 2. shows components of a vector,

Fig 3. shows a vector,

Fig 4. shows a vector key,

Fig 5. shows Key Vector Map[KVM]

Fig 6. shows CoG Key Vector Map[KVM]

Fig 7. shows Patch Lock(WL)

Fig 8. shows Patch Patch(WP)

Fig 9. shows basic steps of Network Transaction Process(NTP)

Fig 10. shows basic steps of Network Transaction Process(NTP) more detail

Fig 11. shows isymbols of image DAWLP

Fig 12. shows diagram of image DAWLP

Fig 13. shows semiconductor layout for image DAWLP

Fig 14. shows isymbols of velocity DAWLP

Fig 15. shows diagram of velocity DAWLP

Fig 16. shows semiconductor layout for velocity DAWLP

Fig 17. shows Vectex Hyperprocessor-HS ID

 DETAILED DESCRIPTION OF THE INVENTION

            According to the present invention there is provided a Network Transaction Process(NTP) comprising of three main types of user interface ,

a virtual pen(1) contact interface comprising

a virtual pen(1) used for entering your personal mark such as your personal signature or your personal password or entering your personal geometric symbols in order to program the Binary Card(BC)(7) when initially issued,

 Later you will use the pen to re-enter your personal mark such as your personal signature or your personal password or entering your personal geometric symbols when ever verification of the user of the said Binary Card(BC)(7) which is intended to be programmed once at the point of purchase,

 The operator will enter their personal mark by means of said virtual pen(1) by resting their writing hand upon the integral hand rest(4) , the point of the virtual pen(1) will rest upon the surface of a back lit display(2),

 As the operator executes the motion of scribing or entering their personal mark by means of said virtual pen(1) the said back lit display(2) will immediately display a real time trace or trail or the said virtual pens(1) previous point of contact means for sensing said previous point of contact is provided by integral sensor mounted upon the (x-axis) and (y-axis) continuously monitoring the position of the current and said previous point of contact of the tip of the said virtual pen(1) and presenting a real time trace to the user in order that your personal mark will be observed taking form, it will also be possible to turn on a grid or line in the said back lit display(2) to assist the user entering their personal mark,

 The said Network Transaction Process(NTP) will process your personal mark and determine if the entered personal mark approximately equals the Ashley Patch Lock stored on the Binary Card(BC)(7), the said Network Transaction Process(NTP) may be executed in dedicated semiconductor it will be called the Vectex Hyperprocessor or the said Network Transaction Process(NTP)  may be executed in software,

The said Network Transaction Process(NTP) will use three internal Network Transaction Processing(NTP) elements configured to work together, each Network Transaction Process(NTP) element will have their internal parameters set by parameter data stored on the user said Binary Card(BC)(7) said internal parameters are defined at the initial time of programming and are stored on the said Binary Card(BC)(7) ,

 A standard two dimensional memory matrix called the imap(10) as shown in Fig 13 and Fig 16 with a central origin point called the quiescent(q) point(11), the said imap(10) memory matrix cell elements will be addressed by standard Cartesian co-ordinates or polar co-ordinates this is the area where the processing will take place

STAGE 1-Programming

If the Binary Card(BC)(7) as shown in Fig 1 is virgin it will be programmed in the following way,

PHASE 1 - virgin(DAWLC)

Any memory cell may be addressed either by Cartesian co-ordinates or by vector addressing the components of a vector are defined in Fig 2. The data stream generated from the user entering their personal mark will be obtained from the (x-channel) and (y-channel), this data will be held in the Input Buffer - key vector map(12) as shown in Fig 13 and Fig 16,

PHASE 2 - virgin(DAWLC)

The centre of gravity will be obtained from all the data points stored in the input buffer and modification will be made so that the centre of gravity of the data point will equal or rest upon the quiescent point in the imap(10), The  modified data will be transferred into the navigation buffer - key vector map(13) as shown in Fig 13 and Fig 16,

PHASE 3 - virgin(DAWLC)

Each data point can be linked up as shown in Fig 3 in the sequence in which the data was initially entered when the user initially entered their personal mark, If the modified data points in the navigation buffer - key vector map(13) were linked up in order or sequence in which they were initially generated and plotted in the said imap(10)  it would form a vector key as shown in Fig 4 with the centre of gravity of the vector resting over the quiescent or origin point in the imap(10) as shown in Fig 5 ,

 A virgin Binary Card(BC)(7) stores this data in the said card the data will be known as the Foundation Patch Lock the card would contain three samples of each of the following

            (1) Foundation Patch Lock for the x-vip  processor and the delta parameter

            (2) Foundation Patch Lock for the y-vip  processor and the delta parameter

            (3) Foundation Patch Lock for the 2-Dip processor

The delta delay parameters set the sample rate for the x-axis sensor(3) and y-axis sensor(3) means for the internal (x-channel) and (y-channel) as shown in Fig 1, Fig 16, Fig 17

the delta parameter will be adjusted so that the maximum area is mapped by the key vector map as shown in Fig 5 in the imap(10) of the (x-vip) and (y-vip) processors as shown in Fig 17,

STAGE 2 - Verification

If the Binary Card(BC)(7) is programmed with a user personal mark then the procedures for verifying the Foundation Patch Locks or Patch Locks stored in the card with a later user entered personal mark are as follows, The user must insert their programmed Binary Card(BC)(7) into the slot(6) of the verification system as shown in Fig 1,

 PHASE 1 -Verification

The Patch Locks will be constructed by using the Foundation Patch Locks stored in the Binary Card(BC)(7) obtained by following said stage 1, The Foundation Patch Locks sequential data stream is transferred to the navigation buffer - key vector map(13)  at each vector point from [p1,p2,p3,...,pn] a Binary Patch(14) will be placed in the memory matrix imap(10) as shown in Fig 7 for each processor as shown in Fig 13 and Fig namely the (x-vip), (y-vip) and (2-Dip) processor as shown in Fig 17,

 The area or square size of the Binary Patch(14) may vary depending on the required accuracy of the system, and that within the boundary area of the said Binary Patch(14) a binary value will be stored in the imap(10),

 The binary value is different for each area of the Binary Patch(14) beginning with binary value one for the absolute smallest patch and incrementing the binary value for each incrementing area Binary Patch(14) area as shown in Fig 8,

 The centre point of each Binary Patch(14) will rest upon the key vector map data points as shown in Fig 7, the Patch Locks are constructed as shown in Fig 7, upon a dedicated semiconductor called the Vectex Hyperprocessor as shown in Fig 17 or in software the Vectex Hyperprocessor is a dedicated semiconductor which is part of the internal circuitry of the Verification System all element thereof are co-operable with the said Vectex Hyperprocessor and the external Artificial Intelligence Protection Network(AIPN), the  verification process is followed as indicated in Fig 9 and Fig 10 but step 2 was executed in the said stage 1,

 The user will remove the virtual pen(1) attached to the Verification System by a flexible lead(8) from the virtual pen holder(9) as shown in Fig 1, and scribe their personal mark upon the back lit display(2), The delta parameter setting will be set from the information upon the Binary Card(BC)(7),

 PHASE 2 - Verification

The data stream generated from the user entering their personal mark sampled by a (x-axis) and  (y - axis) sensors(3) via the x-channel and y-channel respectively the sequential data stream will be held in the Input Buffer - Key Vector Map(12) as shown in Fig 13 and Fig 16,

 PHASE 3 - Verification

The centre of gravity will be obtained from all the data points stored in the said Input Buffer - Key Vector Map(12) and modifications will be made so that the centre of gravity of the data points will equal or rest upon the quiescent point in the imap(10), the modified data will be transferred in to the Navigation Buffer - Key Vector Map(13) as shown in Fig 13 and Fig 16,

 PHASE 4 - Verification

Each data point can be linked up as shown in Fig 3 in the sequence in which the data was initially entered when the user initially entered their personal mark, If the modified data points in the Navigation Buffer - Key Vector Map(13) were linked up in the order or sequence in which they were initially generated and plotted in the imap(10) it would form a vector key as shown in Fig 4 with the centre of gravity of the vector key resting over the quiescent or origin point in the imap(10) as shown in Fig 5

 PHASE 5 - Verification

Rotate the Navigation Buffer - Key Vector Map(13) data a full 360 degrees virtually over the Patch Lock in the Imap(10), each data vector point in the Navigation Buffer - Key Vector Map(13)

is compared with the Patch Lock Patches(14), the number of vector points equalling the virtual location of a Patch Lock Patch(14) is registered in the RIndex register within each respective processor namely (x-vip),(y-vip) and (2-dip) processors as shown in Fig 13, Fig 16 and Fig 17,

 The angular rotation Qhigh where the maximum number of vector points equalling the virtual location of a Patch Lock Patch(14) is registered in the RIndex register within each respective

processor namely (x-vip),(y-vip) and (2-Dip) processors as shown in Fig 13, Fig 16 and Fig 17,

the Navigation Buffer - Key Vector Map(13) is re-configured to a new data orientation so that the Navigation Buffer -Key Vector Map(13) corresponds to the Qhigh angular rotation,

 PHASE 6 - Verification

In a linear Cartesian motion Zig Zag the Navigation Buffer - Key Vector Map(13) data in a pre-set area virtually over the said Patch Lock, each data vector point in the Navigation Buffer - Key Vector Map(13) is compared with the Patch Lock  Patches(14), the number of vector points equalling the virtual location of a Patch Lock Patch(14) is registered in the RIndex register within each respective processor namely (x-vip), (y-vip) and (2-Dip) processor as shown in Fig 13,

 Fig 16 and Fig17

 The (xh) and (yh) Cartesian location where the maximum number of points equalled the virtual location of a Patch Lock Patch is registered in the RIndex(15) register within each respective processor namely (x-vip), 9y-vip) and (2-Dip) processors as shown in Fig 13, Fig 16 and Fig 17,

The Navigation Buffer - Key Vector Map(13) is re-configured to a new data orientation so that the Navigation Buffer - Key Vector Map(13) corresponds to the (xh) and (yh) Cartesian position,

 Each processor will generate a positive identification if a pre-defined number of vector points corresponds with their pre-programmed Patch Lock Patches(14),

Input one   of the three input AND gate is connected to the output of the (X-VIP) processor

Input two   of the three input AND gate is connected to the output of the (Y-VIP) processor

Input three of the three input AND gate is connected to the output of the (2-DIP) processor

The Verification System will produce a positive valid user response and generate a positive identification upon the back lit display(2) only if all three Network Transaction Processor(NTP)  elements generate a positive identification or logical high then the three input logic gate will produce a logical high which will indicate that the user of the card has been positively identified with the data stored upon the Binary Card(BC)(7) incorporating samples of three Patch Locks and setting parameters for each,

Patch Lock one is used by the (X-VIP) processor ,Patch Lock two is used by the (Y-VIP) processor and Patch Lock three is used by the (2-DIP) processor each processing element is set by the parameters on the Binary Card(BC) when first programmed, the three internal Network Transaction Processing(NTP) elements will have the following names and function,

 PROCESSOR 1= The X-Velocity Image Processor(X-VIP), Function of the (x-vip) is as follows the user will insert their valid Binary Card(BC)(7) into the slot of the Verification System, the sample rate on the (x-channel) will be set by parameter data on the user Binary Card(BC)(7), this will determine how fast the sensor mounted upon the (x-axis) thereof will sample the motion of the tip of the virtual pen(1) which rests upon the surface of the back lit display(2) the motion is executed by the valid user of the inserted Binary Card(BC)(7),

 The linear (x-axis) positional data generated from the (x-axis) sensor(3) will store this data sequentially for the duration of the user personal mark entry, after the user has entered their personal mark the sequential (x-channel) data stream will stop,

 The sequential (x-channel) data will form the Key Vector Map(KVM) for the (X-VIP) processor which will execute the Network Transaction Process(NTP) and generate a positive or negative identification this will be interpreted as a logical level high or low respectively which is connected to a three input logical AND gate,

 Input one   of the three input AND gate is connected to the output of the (X-VIP) processor

Input two   of the three input AND gate is connected to the output of the (Y-VIP) processor

Input three of the three input AND gate is connected to the output of the (2-DIP) processor

The Verification System will produce a positive valid user response and generate a positive identification upon the back lit display(2) only if all three Network Transaction Processor(NTP)  elements generate a positive identification or logical high then the three input logic gate will produce a logical high which will indicate that the user of the card has been positively identified with the data stored upon the Binary Card(BC)(7),

 The purpose of the X-Velocity Image Processor X-VIP is to monitor and test the velocity of the virtual pens(1) tip motion after the user has entered their personal mark, the (X-VIP) processor will compare the sequential data from the x-channel with the Patch Lock stored on the inserted

Binary Card(BC)(7),

 PROCESSOR 2= The Y-Velocity Image Processor(Y-VIP), Function of the (y-vip) is as follows the user will insert their valid Binary Card(BC)(7) into the slot(6) of the Verification System, the sample rate on the (y-channel) will be set by parameter data on the user Binary Card(BC)(7), this will determine how fast the sensor mounted upon the (y-axis) thereof will sample the motion of the tip of the virtual pen(1) which rests upon the surface of the back lit display(2) the motion is executed by the valid user of the inserted Binary Card(BC)(7),

 The linear (y-axis) positional data generated from the (y-axis) sensor(3) will store this data sequentially for the duration of the user personal mark entry, after the user has entered their personal mark the sequential (y-channel) data stream will stop,

 The sequential (y-channel) data will form the Key Vector Map(KVM) for the (Y-VIP) processor which will execute the Network Transaction Process(NTP) and generate a positive or negative identification this will be interpreted as a logical level high or low respectively which is connected to a three input logical AND gate,

Input one   of the three input AND gate is connected to the output of the (X-VIP) processor

Input two   of the three input AND gate is connected to the output of the (Y-VIP) processor

Input three of the three input AND gate is connected to the output of the (2-DIP) processor

The Verification System will produce a positive valid user response and generate a positive identification upon the back lit display(2) only if all three Network Transaction Processor(NTP)(7) elements generate a positive identification or logical high then the three input logic gate will produce a logical high which will indicate that the user of the card has been positively identified with the data stored upon the Binary Card(BC)(7),

 The purpose of the Y-Velocity Image Processor Y-VIP is to monitor and test the velocity of the virtual pens(1) tip motion after the user has entered their personal mark, the (Y-VIP) processor will compare the sequential data from the y-channel with the Patch Lock stored on the inserted

Binary Card(BC)(7),

 PROCESSOR 3= The 2-Dimentional image Processor (2-DIP), Function of the (2-Dip) is as follows the user will insert their valid Binary Card(BC)(7) into the slot(6) of the Verification System, the sample rate on the (x-channel) and       (y-channel) will be set by parameter data on the user Binary Card(BC)(7), this will determine how fast the sensors(3)  mounted upon the (x-axis) and    (y-axis) thereof will sample the motion of the tip of the virtual pen(1) which rests upon the surface of the back lit display(2) the motion is executed by the valid user of the inserted Binary Card(BC)(7),

 The linear (x-axis) and (y-axis) positional data generated from the (x-axis) and (y-axis) sensor(3) will store this data sequentially for the duration of the user personal mark entry, after the user has entered their personal mark the sequential (x-channel) and (y-channel) data stream will stop,

 The sequential (x-channel) and (y-channel) data will form the Key Vector Map(KVM) for the

(2-DIP) processor which will execute the Network Transaction Process(NTP) and generate a positive or negative identification this will be interpreted as a logical level high or low respectively which is connected to a three input logical AND gate,

Input one   of the three input AND gate is connected to the output of the (X-VIP) processor

Input two   of the three input AND gate is connected to the output of the (Y-VIP) processor

Input three of the three input AND gate is connected to the output of the (2-DIP) processor

The Verification System will produce a positive valid user response and generate a positive identification upon the back lit display(2) only if all three Network Transaction Processor(NTP)(7) elements generate a positive identification or logical high then the three input logic gate will produce a logical high which will indicate that the user of the card has been positively identified with the data stored upon the Binary Card(BC)(7),

 The purpose of the 2-Dimentional Image Processor 2-DIP is to monitor and test the image of the personal mark scribed by the virtual pens(1) tip motion after the user has entered their personal mark, the (2-DIP) processor will compare the sequential data from the (x-channel) and

(y-channel) with the Patch Lock stored on the inserted Binary Card(BC)(7),

 The virtual keypad(5) and unlimited virtual command keys is displayed upon the back lit display(2) the operation of the virtual keypad(5) is achieved by using the virtual pad(1) to apply a single stroking motion over the appropriately displayed virtual numeric or command key on the virtual keypad(5) or back lit display(2),

 The said Binary Card(BC)(7) will assist the paramedics, in the event of an accident if the paramedics find a said Binary Card(BC)(7) on you they may insert it in to a Medical Card Reader(MCR) and obtain important medical information such as blood type and medical history so you get the right treatment or medication it may save you,

 The said Binary Card(BC)(7) will assist the Police they may require your identification they may take your said Binary Card(BC)(7) , insert it in to an Urban Security Police Card Reader(USPCR) and have access to information required by the Police but the Urban Security Police Card Reader(USPCR) will also programme back on to your said Binary Card(BC)(7) the details of the event such as the Police badge number and accurate time of the stop this feature is to reduce Police harassment and if you are unhappy with the event you can go down to the Police head quarters and lodge a complaint and with the data held on your said Binary Card(BC)(7) you can prove the event , also the Police will have all your details on their Urban Security Police Card Reader(USPCR),

 The said Binary Card(BC)(7) in an emergency such as you may be forced to use your card against you will or if you have been in an accident or your car has broken down,

If you require assistance you can call for help at a near by terminal insert your card and enter your personal mark and then select the emergency code command option and then select the type of help required such as,

  (a) CARD AGAINST YOUR WILL - the system will shut the card down the next time it is used

(b) EMERGENCY - Police required, the system will contact the nearest patrol,

(c) ACCIDENT - Ambulance required, the system will contact the nearest ambulance,

(d) FIRE - Fire brigade required , the system will contact the nearest fire truck

(e) BREAKDOWN - vehicle pickup required the system will contact the nearest rescue unit

 The said Binary Card(BC)(7) and verification system used in currency transaction systems, when you go to you local Bank and go to the kiosk an authorised personnel will ask you to insert your said Binary Card(BC)(7) in to the said slot(6) of the verification system, You may request a certain amount of a currency to be transferred from your bank account to a virtual account on the said Binary Card(BC)(7), the currency that is transferred may be divided up in to sub-virtual accounts in pre-defined ratios, for example sub-divided into the following categories

            (1) FOOD          ACCOUNT(1),

            (2) CLOTHING   ACCOUNT(2),

            (3) TRAVEL       ACCOUNT(3),

            (4) LEISURE      ACCOUNT(4),

                        -           -           -

            (n)   XXX            ACCOUNT(n),

            n= the maximum number of accounts

 The verification system will function in the following way assuming that you have already entered you personal mark, If you entered the correct pin number or personal mark the transaction will continue, if you entered an incorrect pin number or incorrect personal mark the system will allow you to re-enter , if you are consistently wrong the verification system will either electronically mark the said Binary Card(BC)(7) indicating that Tampering is Detected(TID), if the said Binary Card(BC)(7) has over a present number of (TID) marks then the next time the said Binary Card(BC)(7) is used , the verification system will automatically contact the appropriate authorities and indicate to the authorities the location where the card is currently being used and the nature of the attempted fraud and the verification system will shut the card down,

 However if the said Binary Card(BC)(7) has been used correctly for a present number of times for example if the said Binary Card(BC)(7) has been used correctly then the verification system will remove a single said (TID) mark if there were one present for every present number for example ten correct interactions or transactions,

 If you have entered the correct pin number or personal mark the verification system will communicate with the local bank where your account is held and verify that the said Binary Card(BC)(7) is not reported stolen and cleared for free and active unrestricted use, the verification system will also verify the current amount of said currency in the account is more than or equals the said currency on the said Binary Card(BC)(7),

 The verification system will send a message to you upon the said back lit display asking if it is OK to remove the total purchase cost of items from the said Binary Card(BC)(7), the system will display some option such as 'YES DO IT'or 'NO CANCEL ALL'

you will then use the said virtual pen(1) or hand commands to indicate the appropriate response,

 Depending upon your response the system will execute either of the following

a) Transfer the specified said currency from your said Binary Card(BC)(7) from the appropriate sub-account  for example the food account on the said Binary Card(BC)(7) to the stores Data Logging System(DLS),

 It will also log who purchased what and at what time, there is two reasons for this,

1) To assist the security forces if a crime takes place in a certain area and certain items were used in that crime then the evidence can be collected,

2) To help the store, so that if requested by the customer that all the shopping be done based on the previous shopping list the store may execute the collecting of items during the night using robots to collect the different items and put your shopping away to one side ready for collecting the following morning,

After the currency transaction the Current Status(CSTAT) of the Binary Card(BC)(7) will be up dated on  the card also the Artificial Intelligence Protection Network(AIPN) will update its information regarding the current location and current status of your Binary Card(BC)(7), so that if there is any change in the information or the amount of currency  the Artificial Intelligence Protection network(AIPN) will know

 The Artificial Intelligence Protection Network(AIPN) will automatically track the flow of the said currency and any irregularities will shut the card down , if the store in which the transaction took place has an account at the same bank as yourself then the physical real currency will have no need to leave the security of the bank the currency will be physically moved from your account to the stores account internally and externally to the bank the Artificial Intelligent Protection Network(AIPN) working with the verification system and the Binary Card(BC)(7) will protect the transaction of said currency and said current status(CSTAT) is maintained at all times and monitoring the flow of said currency and detecting fraud and tampering,

 The travel account has an extra feature in that if you go to the travel agents and select a holiday for the future you may purchase a ticket at the travel agent ,when you have selected your holiday you would insert your Binary Card(BC)(7) in to a verification systems said slot and enter your personal mark if the security verification system positively identifies you with the internal Patch Locks then the transaction will begin,

 The Artificial Intelligent Protection Network(AIPN) will check the Current Status(CSTAT) of the said Binary Card(BC)(7), if everything is fine you will be cleared for purchase of a travel ticket,

The travel ticket may be a coach, rail, ship airline spacecraft ant means of transport at this point you may select all the travel details such as date of departure ,seating arrangements number of children if it applies , the duration of the vacation all the standard information associated with booking a ticket, all the ticket information will be programmed back on to the said Binary Card(BC)(7) the cost of the travel will be purchased with said currency

the transaction will be executed in the same way as explained above,

 When you remove your said Binary Card(BC)(7) from the verification system the Artificial Intelligence Protection Network(AIPN) will update the Current Status(CSTAT) of your said Binary Card(BC)(7)it will have less said currency in the travel account an also there will be a valid travel ticket in the travel account on the said Binary Card(BC)(7),

 On the day of your departure for example if you are travelling by air you will go to the checking in desk and insert your said Binary Card(BC)(7) in to the verification system and enter your personal mark the Travel Card Reader(TCR) will access the information held in the travel account on the said Binary Card(BC)(7) this will contain all the ticket information ,

 If all the information is valid then you would place your luggage on a conveyor belt for weighing the Current Status(CSTAT) of the said Binary Card(BC)(7) will be updated, if every is fine you would then proceed to the more secure side of the terminal for passport checks again you would insert your said Binary Card(BC)(7)

in to the verification system authorised personnel may access the internal user digitised face stored in the said Binary Card(BC)(7),

 If everything is fine then you are clear to travel also the Artificial Intelligent Protection Network(AIPN) will update the Current Status(CSTAT) of the said Binary Card(BC)(7) indicating that you have left the country,

 On arrival at your destination you will use the same passport checking procedure also you will have the opportunity to translate your currency in to any international currency taking into account the exchange rate,

 The said Binary Card(BC)(7) will contain the following information

            (a) Unique PIN code + General emergency code

            (b) Unique user personal mark of Patch Lock

            (c) optional unique internal digitised user face

            (d) optional unique digitised user finger prints

            (e) optional unique user DNA

            (f)  user home address information

            (g) user medical address information

            (h) user medical information

            (i) user verification of academic qualification

            (j) user verification of vehicle licence

            (k) user verification of valid vehicle insurance and road tax

            (l)  user bank data

            (m) user currency

            (n) user virtual accounts

            (o) Unique hand commands

            Patch Lock parameters and personal details

            Patch Lock one    is used by the (X-VIP) processor

            Patch Lock two    is used by the (Y-VIP) processor

            Patch Lock three is used by the (2-DIP) processor

 ADVANTAGES AND POSSIBLE APPLICATIONS

            The advantages of a Hand Command interface is there is no physical contact with the verification system also the verification system will have to identify hand sign communication with people who are hearing disabled, the Possible applications are as follows

Application 1 Currency transactions                     Application 2 Next Generation Passport

Application 3 Personal identification                     Application 4 Access to buildings

Application 5 ignition system for vehicles Application 6 vehicle licence verification

Application 7 Academic qualification verification    Application 8 library card verification

 General access to buildings or vehicle ignitions

 Claims

1. A Method or Process  herein referred to as the Network Transaction Process(NTP) for user verification system in currency transaction cards herein referred to as Binary Card(BC) or

general access control comprising of: Network Transaction Process(NTP) comprising  of user interface  a virtual pen contact interface

 means for entering user personal mark or user personal signature or user personal password or user personal geometric symbols herein referred as personal mark is provided by virtual pen(1)

means for resting user hand on said verification system is provided by integral hand rest(4)

means for displaying visual feedback data is provided by a back lit display(2),

 means for simultaneously entering and displaying user access data is provided by said virtual pen(1) the said back lit display(2) will immediately display a real time trace or trail or the said virtual pens(1) previous point of contact

 means for sensing said previous point of contact is provided by integral sensor mounted upon the (x-axis) and (y-axis) continuously monitoring the position of the current and said previous point of contact of the tip of the said virtual pen(1)

 means for guiding is provided by a activating a grid or line in the said back lit display(2) to assist the user entering their personal mark,

 means for processing the said user personal mark or said user personal signature or said user personal password or said user personal geometric symbols is provided by processing means referring to  said Network Transaction Process(NTP) will use three internal Network Transaction Processing(NTP) elements configured to work in co-operation, each Network Transaction Process(NTP) element will have their internal parameters set by parameter data stored on the user said Binary Card(BC)(7) said internal parameters are defined at the initial time of programming and are stored on the said Binary Card(BC)(7) ,

 means for comparing data is provided by a standard two dimensional memory matrix called the imap(10)  with a central origin point called the quiescent(q) point(11), the said imap(10) memory matrix cell elements will be addressed by standard Cartesian co-ordinates or polar co-ordinates this is the area where the processing will take place,

 means for programming said  Binary Card(BC)(7) is as follows

 means for addressing or locating any  memory cell may be addressed either by Cartesian co-ordinates or by vector addressing the components of a vector

 means for sampling motion of said virtual pen(1) tip as the user enters their said personal mark

herein referred to as a data stream comprising of a plurality of x-axis and y-axis data points with reference to axis co-ordinated of said back lid display(2)

 means for storing said data stream generated from the user entering their said personal mark is provided by the Input Buffer - key vector map(12)

 means for locating the centre of gravity will be obtained from all the data points stored in the input buffer and modification will be made so that the said centre of gravity of the data stream  will equal or rest upon the quiescent point in the imap(10) and the said modified data will be transferred into the navigation buffer - key vector map(13)  is provided by first processor

 means for linking said data stream the sequence in which the data was initially entered when the user initially entered their said personal mark, If the modified data points in the navigation buffer - key vector map(13) were linked up in order or sequence in which they were initially generated and plotted in the said imap(10)  it would form a vector key with the centre of gravity of the vector resting over the quiescent or origin point in the imap(10) is provided by second processor

 said  virgin Binary Card(BC)(7) stores this data in the said card the data will be known as the Foundation Patch Lock the card would contain three samples of each of the following

            (1) Foundation Patch Lock for the x-vip  processor and the delta parameter

            (2) Foundation Patch Lock for the y-vip  processor and the delta parameter

            (3) Foundation Patch Lock for the 2-Dip processor

The delta delay parameters set the sample rate for the x-axis sensor(3) and y-axis sensor(3) means for the internal (x-channel) and (y-channel)

the delta parameter will be adjusted so that the maximum area is mapped by the key vector map  in the imap(10) of the (x-vip) and (y-vip) processors

 means for verification only when said  Binary Card(BC)(7) is programmed with a user said personal mark then the procedures for verifying the Foundation Patch Locks or Patch Locks stored in the card with a later user entered said personal mark are as follows, the user must insert their programmed said Binary Card(BC)(7) into the slot(6) of the said verification system

 means for verification only when  Patch Locks will be constructed by using the Foundation Patch Locks stored in the said Binary Card(BC)(7) obtained by following said first processor and said second processor means, the Foundation said Patch Locks sequential said data stream is transferred to the said navigation buffer - key vector map(13)  at each vector point from [p1,p2,p3,...,pn] a Binary Patch(14) will be placed in the said memory matrix imap(10) for said (x-vip) processor, and said  (y-vip) processor and said (2-Dip) processor,

 means for designating a pre-determined area or square size is provided by Binary Patch(14) said area may vary depending on the required accuracy of the system is provided by third processor,

 means for designating a pre-determined binary value  within the boundary area of the said Binary Patch(14)  will be stored in the imap(10) said binary value may vary depending on the required accuracy of the system is provided by third processor,

 means for designating a pre-determined said binary value is different for each area of the Binary Patch(14) beginning with binary value one for the absolute smallest patch and incrementing the binary value for each incrementing area Binary Patch(14) is provided by third processor,

 means for designating the centre point of each said Binary Patch(14) will rest upon the key vector map data points the said Patch Locks are constructed is provided by third processor,

 means for entering user said personal mark is as follows the user will remove the virtual pen(1) attached to the said Verification System by a flexible lead(8) from the said virtual pen holder(9), and scribe their said personal mark upon the said back lit display(2), the delta parameter setting will be set from the information upon the said Binary Card(BC)(7),

 means for sampling motion of said virtual pen(1) tip as the user enters their said personal mark

herein referred to as a data stream comprising of a plurality of x-axis and y-axis data co-ordinates  with reference to axis co-ordinated of said back lid display(2)

 said data stream generated from the user entering their personal mark sampled by a (x-axis) and  (y - axis) sensors(3) via the x-channel and y-channel respectively the sequential said data stream will be held in the said Input Buffer - Key Vector Map(12),

 means for locating the centre of gravity will be obtained from all the data points stored in the input buffer and modification will be made so that the said centre of gravity of the data stream  will equal or rest upon the quiescent point in the imap(10) and the said modified data will be transferred into the navigation buffer - key vector map(13)  is provided by first processor

 means for linking said data stream the sequence in which the data was initially entered when the user initially entered their said personal mark, If the modified data points in the navigation buffer - key vector map(13) were linked up in order or sequence in which they were initially generated and plotted in the said imap(10)  it would form a vector key with the centre of gravity of the vector resting over the quiescent or origin point in the imap(10) is provided by second process

 means for rotating the said Navigation Buffer - Key Vector Map(13) data a full 360 degrees virtually over the said Patch Lock in the said Imap(10), each data vector point in the said Navigation Buffer - Key Vector Map(13) is compared with the said Patch Lock Patches(14), the number of vector points equalling the virtual location of a said Patch Lock Patch(14) is registered in the RIndex register within the (x-vip) processor and (y-vip) processor and

(2-dip) processor is provided by the forth process of the said (x-vip) processor and said (y-vip) processor and said (2-dip) processor,

 means for obtaining the angular rotation Qhigh where the maximum number of entered vector points equalling the virtual location of a said Patch Lock Patch(14) is registered in the said RIndex register of said (x-vip) processor and said (y-vip) processor and said (2-Dip) processor the said Navigation Buffer - Key Vector Map(13) is re-configured to a new data orientation so that the said Navigation Buffer -Key Vector Map(13) corresponds to the Qhigh angular position or the angular rotation where the said user mark compares and equals the virtual location of said Patch Lock Patch(14),

 means for shifting in a linear Cartesian motion Zig Zag the said Navigation Buffer - Key Vector Map(13) data in a pre-set area virtually over the said Patch Lock, each data vector point in the said Navigation Buffer - Key Vector Map(13) is compared with the said Patch Lock  Patches(14), the number of vector points equalling the virtual location of a said Patch Lock Patch(14) is registered in the said RIndex register within the said (x-vip) processor and, said (y-vip) processor  and said (2-Dip) processor, the (xh) and (yh) Cartesian location where the maximum number of points equalled the virtual location of a said Patch Lock Patch is registered in the said RIndex(15) register within the said (x-vip) processor, and the said (y-vip) processor and the said (2-Dip) processors , the Navigation Buffer - Key Vector Map(13) is re-configured to a new data orientation so that the Navigation Buffer - Key Vector Map(13) corresponds to the (xh) and (yh) Cartesian position wherein the maximum number of comparison were obtained,

 means for generating a positive identification is provided when said (x-vip) processor, said (y-vip) processor and said (2-Dip) processor will generate a positive identification if a pre-defined number of vector points corresponds with their pre-programmed Patch Lock Patches(14),

Input one   of the three input AND gate is connected to the output of the (X-VIP) processor

Input two   of the three input AND gate is connected to the output of the (Y-VIP) processor

Input three of the three input AND gate is connected to the output of the (2-DIP) processor

the said Verification System will produce a positive valid user response and generate a positive identification upon the said back lit display(2) only if all three Network Transaction Processor(NTP) elements generate a positive identification or logical high then the three input logic gate will produce a logical high which will indicate that the user of the card has been positively identified with the data stored upon the said Binary Card(BC)(7) incorporating samples of three said Patch Locks and setting parameters for each, said Patch Lock one is used by the said  (X-VIP) processor  said Patch Lock two is used by the said (Y-VIP) processor and the said Patch Lock three is used by the said (2-DIP) processor each processing element is set by the parameters on the said Binary Card(BC) when first programmed, the three internal Network Transaction Processing(NTP) elements will have the following names and function,

 PROCESSOR 1= The X-Velocity Image Processor(X-VIP), Function of the (x-vip) is as follows the user will insert their valid said Binary Card(BC)(7) into the said slot(6) of the said Verification System, the sample rate on the (x-channel) will be set by parameter data on the user said Binary Card(BC)(7), this will determine how fast the sensor mounted upon the said (x-axis) thereof will sample the motion of the tip of the said virtual pen(1) which rests upon the surface of the said back lit display(2) the motion is executed by the valid user of the inserted said Binary Card(BC)(7),

 The linear said (x-axis) positional data generated from the said (x-axis) sensor(3) will store this data sequentially for the duration of the user personal mark entry, after the user has entered their said personal mark the said sequential (x-channel) said data stream will stop,

 The said sequential (x-channel) data will form the Key Vector Map(KVM) for the said (X-VIP) processor which will execute the Network Transaction Process(NTP) and generate a positive or negative identification this will be interpreted as a logical level high or low respectively which is connected to the said  three input logical AND gate,

Input one   of the three input AND gate is connected to the output of the said (X-VIP) processor

Input two   of the three input AND gate is connected to the output of the said (Y-VIP) processor

Input three of the three input AND gate is connected to the output of the said (2-DIP) processor

The Verification System will produce a positive valid user response and generate a positive identification upon the said back lit display(2) only if all three Network Transaction Processor(NTP)  elements generate a positive identification or logical high then the three input logic gate will produce a logical high which will indicate that the user of the card has been positively identified with the data stored upon the said Binary Card(BC)(7),

 The purpose of the said X-Velocity Image Processor X-VIP is to monitor and test the velocity of the said virtual pens(1) tip motion after the user has entered their personal mark, the said         (X-VIP) processor will compare the sequential said data stream from the x-channel with the said Patch Lock stored on the inserted said Binary Card(BC)(7),

 PROCESSOR 2= The Y-Velocity Image Processor(Y-VIP), Function of the said (y-vip) processor  is as follows the user will insert their valid said Binary Card(BC)(7) into the said slot(6) of the said Verification System, the sample rate on the

(y-channel) will be set by parameter data on the user said Binary Card(BC)(7), this will determine how fast the sensor mounted upon the (y-axis) thereof will sample the motion of the tip of the said virtual pen(1) which rests upon the surface of the said back lit display(2) the motion is executed by the valid user of the inserted said Binary Card(BC)(7),

 The linear (y-axis) positional data generated from the said (y-axis) sensor(3) will store this data sequentially for the duration of the user personal mark entry, after the user has entered their personal mark the sequential (y-channel) data stream will stop,

 The sequential (y-channel) data will form the Key Vector Map(KVM) for the (Y-VIP) processor which will execute the Network Transaction Process(NTP) and generate a positive or negative identification this will be interpreted as a logical level high or low respectively which is connected to a three input logical AND gate,

Input one   of the three input AND gate is connected to the output of the (X-VIP) processor

Input two   of the three input AND gate is connected to the output of the (Y-VIP) processor

Input three of the three input AND gate is connected to the output of the (2-DIP) processor

The Verification System will produce a positive valid user response and generate a positive identification upon the said back lit display(2) only if all three Network Transaction Processor(NTP)(7) elements generate a positive identification or logical high then the three input logic gate will produce a logical high which will indicate that the user of the card has been positively identified with the data stored upon the said Binary Card(BC)(7),

 The purpose of the Y-Velocity Image Processor Y-VIP is to monitor and test the velocity of the said virtual pens(1) tip motion after the user has entered their personal mark, the (Y-VIP) processor will compare the sequential said data stream  from the y-channel with the said Patch Lock stored on the inserted said Binary Card(BC)(7),

 PROCESSOR 3= The 2-Dimentional Image Processor (2-DIP), Function of the said (2-Dip) processor  is as follows the user will insert their valid said  Binary Card(BC)(7) into the said slot(6) of the said Verification System, the sample rate on the (x-channel) and (y-channel) will be set by parameter data on the user said Binary Card(BC)(7), this will determine how fast the said sensors(3)  mounted upon the (x-axis) and (y-axis) thereof will sample the motion of the tip of the said virtual pen(1) which rests upon the surface of the said back lit display(2) the motion is executed by the valid user of the inserted said Binary Card(BC)(7),

 The linear (x-axis) and (y-axis) positional data generated from the said (x-axis) and said (y-axis) sensor(3) will store this data sequentially for the duration of the user said personal mark entry, after the user has entered their said personal mark the sequential (x-channel) and (y-channel) said data stream will stop,

 The said sequential (x-channel) and (y-channel) data will form the said  Key Vector Map(KVM) for the (2-DIP) processor which will execute the said Network Transaction Process(NTP) and generate a positive or negative identification this will be interpreted as a logical level high or low respectively which is connected to a said three input logical AND gate,

Input one   of the three input AND gate is connected to the output of the said (X-VIP) processor

Input two   of the three input AND gate is connected to the output of the said (Y-VIP) processor

Input three of the three input AND gate is connected to the output of the said (2-DIP) processor

 The said Verification System will produce a positive valid user response and generate a positive identification upon the said back lit display(2) only if all three said Network Transaction Processor(NTP) elements generate a positive identification or logical high then the said three input logic gate will produce a logical high which will indicate that the user of the card has been positively identified with the data stored upon the said Binary Card(BC)(7),

 The purpose of the said 2-Dimentional Image Processor 2-DIP is to monitor and test the image of the said personal mark scribed by the said virtual pens(1) tip motion after the user has entered their said personal mark, the said (2-DIP) processor will compare the sequential data from the said (x-channel) and said (y-channel) with the said Patch Lock stored on the inserted said Binary Card(BC)(7),

The virtual keypad(5) and unlimited virtual command keys is displayed upon the said back lit display(2) the operation of the virtual keypad(5) is achieved by using the said virtual pad(1) to apply a single stroking motion over the appropriately displayed virtual numeric or command key on the virtual keypad(5) or said back lit display(2),

 means for accessing user medical history contained on the said Binary Card(BC)(7) is provided by a Medical Card Reader(MCR) by authorised medical personnel

after the said Binary Card(BC)(7) is inserted in to a slot of the said  Medical Card Reader(MCR),

 means for accessing user personal details contained on the said  Binary Card(BC)(7) is provided by a Urban Security Police Card Reader(USPCR) by authorised personnel after the said Binary Card(BC)(7) is inserted in to a slot of the said  Urban Security Police Card Reader(USPCR),

 means for contacting an emergency service by the said Binary Card(BC)(7) in an emergency ,If you require assistance you can call for help at a near by terminal insert your card and enter your personal mark and then select the emergency code command option and then select the type of help required,

 means for transferring a currency and executing any transaction is provided by said Binary Card(BC)(7) and verification system used in currency transaction systems, when you go to you local Bank and go to the kiosk an authorised personnel will ask you to insert your said Binary Card(BC)(7) in to the said slot(6) of the verification system, You may request a certain amount of a currency to be transferred from your bank account to a virtual account on the said Binary Card(BC)(7),

 means for dividing said currency in to a plurality of internal accounts in pre-defined ratios is provide in the said Binary Card(BC)(7)

 means for detecting tampering if your entered said personal mark is consistently wrong the verification system will either electronically mark the said Binary Card(BC)(7) indicating that Tampering is Detected(TID), if the said Binary Card(BC)(7) has over a present number of (TID) marks then the next time the said Binary Card(BC)(7) is used , the verification system will automatically contact the appropriate authorities and indicate to the authorities the location where the card is currently being used and the nature of the attempted fraud and the verification system will shut the card down, however if the said Binary Card(BC)(7) has been used correctly for a present number of times for example if the said Binary Card(BC)(7) has been used correctly then the verification system will remove a single said (TID) mark if there were one present for every present number for example ten correct interactions or transactions,

 means for tracking and monitoring the currency transaction is indicated by the Current Status(CSTAT) of the said Binary Card(BC)(7) is provide by  the Artificial Intelligence Protection Network(AIPN)

 means for programming a virtual travel ticket with all relevant ticket information will be programmed back on to the said Binary Card(BC)(7) the cost of the travel will be purchased with said currency

 means for  accessing the said travel ticket details is provided by Travel Card Reader(TCR) will access the information held in the travel account on the said Binary Card(BC)(7) this will contain all the ticket information ,

 means for translating  your currency in to any international currency taking into account the exchange rate is provided by said  Binary Card(BC)(7)

The said Binary Card(BC)(7) will contain the following information

            (a) Unique PIN code + General emergency code

            (b) Unique user personal mark of Patch Lock

            (c) optional unique internal digitised user face

            (d) optional unique digitised user finger prints

            (e) optional unique user DNA

            (f)  user home address information

            (g) user medical address information

            (h) user medical information

            (i) user verification of academic qualification

            (j) user verification of vehicle licence

            (k) user verification of valid vehicle insurance and road tax

            (l)  user bank data

            (m) user currency

            (n) user virtual accounts

            (o) Unique hand commands

            (v) Unique voice commands

            Patch Lock parameters and personal details

            Patch Lock one    is used by the (X-VIP) processor

            Patch Lock two    is used by the (Y-VIP) processor

            Patch Lock three is used by the (2-DIP) processor

 Abstract

             There are various forms of personal identification such as a passport, cheque guarantee card, driving licence, personal identification card, unemployment documents, NHS medical card ,national insurance card, all the above forms of identification have one thing in common, their main objective is to validate the person using these various forms of identification. It is however possible to forge or generate a false documents, such as a false passport, or using an unauthorised driving licence, or unauthorised cheque guarantee card or fraudulently cashing an unemployment cheque using counterfeit money or in general presenting a false personal identification, the user may enter their personal mark for the verification process by physical contact by means of a virtual pen or by non-physical contact by means of optically sampled hand commands said user may insert the said Binary Card(BC)(7) in to the said slot(6) of said currency transaction system and /or verification system , said user may insert their left or right hand open and palm facing downwardly ,said at least one camera will optically sample the said user hand and generate a data stream of the outer shape of the said hand said data stream will be stored in the said Input Buffer - key vector map(12) in order to compare said data stream with Patch lock pre-programmed on to the said Binary Card(BC)(7) rotating the said user hand and /or extending digits may be Patch locked and represent numeric digits and /or different hand commands a closed fist will indicate a pause between inputs said at least one display will present a visual feedback and/ or information to follow,

 

           

 

 

 

 

© 1993 - 1994 - 2002 2006 Adrian Ashley B.Sc (Hons). All rights reserved  All other trademarks are the property of their respective companies. Learning Key Stages reserves the right to make changes without written prior notice. all images above are a guide to the product any may change as the products are developed over time.