US 12,488,079 B2
Systems and methods for a connected computing resource and event/activity identification information infrastructure using near existential or existential biometric identification of humans
Victor Henry Shear, Atherton, CA (US); Timothy St. John Redmond, Walnut Creek, CA (US); Jaisook Rho, Palo Alto, CA (US); Jason Ben Shear, Austin, TX (US); Bruce Jason Tromberg, Bethesda, MD (US); and Robert George Wong, San Francisco, CA (US)
Assigned to Advanced Elemental Technologies, Inc., Santa Clara, CA (US)
Filed by Advanced Elemental Technologies, Inc., Atherton, CA (US)
Filed on Feb. 19, 2025, as Appl. No. 19/057,964.
Application 18/525,832 is a division of application No. 18/198,540, filed on May 17, 2023, granted, now 12,111,902, issued on Oct. 8, 2024.
Application 19/057,964 is a continuation of application No. 18/525,832, filed on Nov. 30, 2023, granted, now 12,259,958.
Claims priority of provisional application 63/365,067, filed on May 20, 2022.
Prior Publication US 2025/0232021 A1, Jul. 17, 2025
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/32 (2013.01); G06F 21/86 (2013.01)
CPC G06F 21/32 (2013.01) [G06F 21/86 (2013.01)] 23 Claims
OG exemplary drawing
 
1. A system for connected computing secure identification information acquisition, authentication, and management, such system including a hardware and software arrangement set comprising one or more processors and one or more memories comprising:
one or more secure tamper-resistant computing hardware and software human biometric identification information and liveness information acquisition arrangements that include at least one sensor arrangement and at least one emitter arrangement configured for human biometric identification information acquisition and liveness testing,
one or more secure, human biometric identification, and associated attribute, information cloud service registration and management arrangements,
one or more secure receiving, carrying and forwarding computing hardware and software mobile device arrangements configured to receive, carry and forward human biometric identification information and/or information derived at least in part therefrom, and
one or more secure tamper-resistant computing hardware and software receiving and using arrangements configured to receive and use human biometric identification information and/or information derived at least in part therefrom,
wherein the hardware and software arrangement set is configured to enable:
acquiring, contemporaneous to their use, a human's biometric identification information and liveness information by the one or more secure, tamper-resistant computing hardware and software human biometric identification information and liveness information acquisition arrangements;
securely registering such human's acquired biometric identification information, and/or information derived at least in part therefrom, with the one or more cloud service registration and management arrangements;
receiving, by the one or more secure receiving, carrying and forwarding mobile device arrangements, such human biometric identification information, and/or information derived at least in part therefrom, from the one or more cloud service registration and management arrangements, wherein the one or more secure receiving, carrying and forwarding mobile device arrangements then carry, for a contemporaneous time period, such received human biometric identification information, and/or information derived at least in part therefrom;
receiving, by the one or more secure tamper-resistant receiving and using arrangements, the human biometric identification information, and/or information derived at least in part therefrom, from the one or more receiving, carrying and forwarding mobile device arrangements;
performing similarity matching evaluation comparing such acquired human biometric identification information, and/or information derived at least in part therefrom, with a previously registered biometric identification information set of such human to authenticate the identity of such human; and
determining, based at least in part on such similarity matching evaluation's outcomes, whether to authorize one or more operations to be performed by at least one of (a) such one or more secure receiving, carrying and forwarding computing hardware and software mobile device arrangements, (b) one or more such tamper-resistant receiving and using arrangements, and/or (c) one or more receiving and using cloud service arrangements.