Scalable full spectrum cyber determination process

ABSTRACT

A full spectrum cyber identification determination process for accurately and reliably determining and reporting any identification determination from a full spectrum of possible cyber identification determinations. Utilizing cyber resources and predetermined criteria for providing cyber identification determinations for at least one unidentified subject of an observation, the process: provides identification determinations for any possible subject of an observation; provides for the utilization of any selected attainable level of accuracy, up to, and including 100% accuracy; provides for single, intermittent, and constant identification determinations; utilizes any available cyber resources; interacts with utilized cyber resources to provide any possible function and/or observation; recognizes characteristics from observations and then utilizes recognized characteristics for comparing and/or determining; provides and utilizes a standard set of designations for representing all aspects of the process; utilizes useful information and/or outcomes from comparing for making identification determinations; and, reports on any aspect of the process at any time.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation-in-part application of U.S. patentapplication Ser. No. 14/316,196, filed Jun. 26, 2014, entitled FULLSPECTRUM CYBER IDENTIFICATION DETERMINATION PROCESS, having the sameinventor, now allowed, which is incorporated herein by reference in itsentirety; which application is a continuation of U.S. patent applicationSer. No. 13/784,277, filed Mar. 4, 2013, issued as U.S. Pat. No.8,769,649 on Jul. 1, 2014, which is incorporated herein by reference inits entirety; which application is a continuation of U.S. patentapplication Ser. No. 13/688,925, filed Nov. 29, 2012, issued as U.S.Pat. No. 8,434,136 on Apr. 30, 2013, which is incorporated herein byreference in its entirety.

FIELD OF THE DISCLOSURE

The present disclosure relates generally to a full spectrum cyberidentification determination process, and more particularly to a fullspectrum cyber identification determination process that utilizesobservations, information, predetermined criteria, and cyber resourcesfor providing identification determinations from a full spectrum ofcyber identification determinations.

BACKGROUND OF THE DISCLOSURE

Throughout this disclosure, the term “cyber” shall generally beunderstood to refer to utilizing non-biological processing ofprogramming. Further definition involving the use of the term followsbelow.

There currently exists a need in the art to achieve a much higher levelof cyber security than can be provided by existing cyber securitymeasures. I have identified two primary underlying reasons why prior artcyber security measures do not meet present needs. These are:

(1) the prior art's inability to accurately grant and deny any specificperson access to cyber resources of any kind; and

(2) the prior art's inability to accurately hold any one person directlyand personally accountable for his or her own cyber activities and cyberresources.

I have also found that both of the above are due to prior art'sinability to accurately identify even one single person when he or sheis utilizing cyber resources.

When I combine the previous findings, I further find:

-   -   1. it is not possible to accurately deny others access to your        cyber resources if your own cyber resources cannot accurately        determine that you and you alone are yourself; and    -   2. if cyber resources cannot accurately identify who you are,        then it is not possible for others to accurately hold you        directly accountable for your own cyber activities and cyber        resources.

Thus, I find utilization of accurate cyber identification determinationsof a person to be an important step in a process for providing not onlyreasonable levels of cyber security, but also the highest levels ofcyber security, cyber safety, and cyber privacy that can be attained.

Additionally, we live in a technologically interconnected world wherethe vast spectrum of available cyber resources is ever widening. Overtime, our technologically interconnected world is destined to provideevery possible cyber resource that humanity could ever want or need.Included in those cyber resources will be a full spectrum cyberidentification determination process that provides not only thepresently needed 100% accurate cyber identification determinations of aperson, but also every other cyber identification determination ourworld could ever want or need. A further discussion of this universalconcept is disclosed in my co-pending Patent ApplicationPCT/US2011/056931, entitled “Single-Point-of-Access Cyber System”, whichis incorporated herein by reference in its entirety.

With this understanding, I find there is a present need for a cyberidentification determination process that:

provides identification determinations of a known person and anunidentified person being the same person at any attainable level ofaccuracy, including 100% accuracy;

utilizes any number of observed, unique biological characteristics of aknown person and/or an unidentified person for making identificationdeterminations;

performs observations of a person who is not consciously engaged in theidentification determination process;

provides single, intermittent, and constant identificationdeterminations of a person;

performs observations where the unidentified person repeats a portion ofa randomly selected, previously recorded observation of the knownperson;

utilizes any available observation of a subject of an observation formaking identification determinations;

provides and utilizes an all-inclusive, standard set of designations foraccurately and consistently representing any aspect of the process;

provides absolute security and privacy for all information and resourcesthat are utilized for providing cyber identification determinations;

utilizes any useful criteria for observing, recognizing, matching,comparing, determining, reporting, or, any other aspect of theidentification determination process;

utilizes observations made by others for providing identificationdeterminations;

utilizes useful information of any type, from any source for providingidentification determinations;

utilizes more than one recognized characteristic for determining;

utilizes comparisons of more than one matching characteristic to achievea predetermined attainable identification determination; and

predetermined attainable identification determination; and,

is a single system that is scalable in size and utilized resources;these utilized resources may be configured to provide for any needs in arange from needs for a self-contained process for utilization with thesmallest of identification determination needs, to needs for aself-contained process that provides a full spectrum of identificationdetermination resources that are utilized to provide a full spectrum ofidentification determination needs.

I find that a technologically interconnected world that is capable ofproviding every possible cyber resource humanity could ever want or needcan only be built upon the foundation of a secure and safe cyberenvironment.

I also find that utilization of accurate cyber identificationdeterminations of a person is an indispensable step in providing asecure and safe cyber environment.

SUMMARY OF THE DISCLOSURE

In one aspect, a scalable full spectrum cyber determination process isprovided which comprises

utilizing at least one computing device in conjunction with (a) criteriaselected from criteria that may be utilized by said process, (b)selected useful information, (c) selected necessary programming, and (d)any other necessary resource, all of which being structured and utilizedfor providing at least one cyber determination;

wherein said at least one cyber determination is selected from the groupconsisting of the full spectrum of cyber determinations;

wherein said at least one cyber determination is utilized for at leastone purpose;

wherein said useful information is derived from at least one memberselected from the group consisting of (a) at least one point in time,and (b) over at least one period of time;

wherein said useful information is selected from the group consisting ofthe full spectrum of useful information that may be utilized by saidprocess;

wherein said full spectrum of useful information that may be utilized bysaid process includes useful information from at least one sensorobservation;

wherein said at least one sensor observation provides useful informationregarding at least one aspect of at least one subject of said at leastone sensor observation;

wherein said at least one cyber determination regarding said at leastone aspect of at least one subject of at least one sensor observation isselected from the group consisting of the full spectrum of cyberdeterminations regarding aspects of subjects of sensor observations;

wherein said at least one aspect of at least one subject of at least onesensor observation is selected from the group consisting of the fullspectrum of aspects regarding subjects of sensor observations;

wherein said at least one subject of at least one sensor observation isselected from the group consisting of the full spectrum of subjects ofsensor cyber observations;

wherein said cyber determination process utilizes at least one observedcharacteristic of said at least one subject of at least one sensorobservation;

wherein said at least one observed characteristic is selected from thegroup consisting of the full spectrum of observable characteristics ofsubjects of sensor observations;

wherein said at least one sensor observation is at least one type ofsensor observation selected from the group consisting of (a) visualsensor observations, (b) audible sensor observations, (c) thermal sensorobservations, (d) olfactory sensor observations, and (e) any other typeof sensor observation;

wherein said at least one sensor observation has at least onecharacteristic selected from the group consisting of the full spectrumof characteristics of sensor observations;

wherein said full spectrum cyber determination process is scalable andconfigurable, in regard to included resources, to be anywhere in therange of a minimum to a maximum, wherein at the minimum, said processincludes only the resources that are needed for providing for the leastcomplex, in regard to included necessary resources, of all cyberdetermination needs, and wherein at the maximum, said scalable cyberdetermination process includes every resource that is needed forproviding every cyber determination from the full spectrum of cyberdeterminations;

wherein said scalable cyber determination process provides at least onedetermination selected from the group consisting of (a) at least onesingle cyber determination, (b) at least one intermittent cyberdetermination, and (c) at least one constant cyber determination; and

wherein said scalable cyber determination process further comprisesutilizing at least one part of at least one step selected from the groupconsisting of

(a) a first series observation step utilizing at least one sensorobservation, wherein at least one subject of said at least oneobservation has at least one previously determined aspect, said processrecognizing at least one characteristic regarding said previouslydetermined aspect, said at least one recognized characteristic beingutilizable by said process in performing said at least one cyberdetermination, said cyber process assigning designations representing(i) said at least one observation, (ii) said at least one known aspectof said at least one subject, and (iii) said at least one observedcharacteristic, said cyber process including at least one first seriesobservation record which includes said designations,

(b) a second series observation step utilizing at least one sensorobservation, wherein at least one subject of said at least oneobservation has at least one yet to be determined aspect, said scalableprocess recognizing at least one characteristic regarding said at leastone yet to be determined aspect, said process assigning designationsrepresenting (i) said at least one observation, (ii) said at least oneyet to be determined aspect of said at least one subject, and (iii) saidat least one characteristic regarding said at least one yet to bedetermined aspect, wherein said cyber process includes at least onesecond series observation record containing said designations,

(c) a matching step matching at least one designation from at least onesecond series observation record with at least one designation from atleast one first series observation record,

(d) a comparing step comparing designations representing at least onesecond series observation record with designations representing at leastone comparable first series observation record and providing at leastone conclusion from the comparison,

(e) a determining step wherein said process utilizes at least one fromthe group of: said at least one conclusion from said at least onecomparing step; and, said useful information, for making said at leastone cyber determination, and

(f) a reporting step providing at least one report regarding at leastone aspect of at least one part of at least one operation of saidprocess.

The cyber process of claim 1, wherein said scalable cyber determinationprocess achieves at least one selected attainable level of accuracy goalfor at least one cyber determination, and wherein said at least oneattainable level of accuracy falls within the range extending from thesmallest recognizable level of accuracy up to, and including, 100%accuracy.

In some embodiments of the foregoing cyber process, said cyberdetermination process provides for any possible level of observationparticipation by at least one person who is at least one subject of atleast one sensor observation, and wherein said any possible level ofobservation participation ranges from said at least one person beingpresent but not consciously or otherwise engaged in said at least onesensor observation, to said at least one person being an active andconsciously engaged participant in said at least one sensor observation.

In some embodiments of the foregoing cyber process, said cyberdetermination process utilizes at least one observation selected fromthe group consisting of (a) at least one sensor observation of more thanone simultaneously observed characteristic of at least one subject, and(b) at least one sensor observation which is of at least onecharacteristic of at least one subject, and which occurs over at leastone period of time. In some instances of this embodiment, said at leastone sensor observation occurs over said at least one period of time andincludes observing at least one change that occurs to at least oneobservation subject over said at least one period of time. In theseinstances, said at least one change includes at least one aspect of atleast one subject of at least one sensor observation selected from thegroup consisting of (a) visual sensor observations, (b) audible sensorobservations, (c) thermal sensor observations, (d) olfactory sensorobservations, and (e) any other type of sensor observation. Also inthese instances, said cyber determination process includes at least oneperson being said at least one observation subject, and wherein said atleast one change that occurs to said at least one person is at least onechange of at least one observable aspect of at least one part of atleast one feature of said at least one person. Further in theseinstances, said at least one feature is selected from the groupconsisting of the head, face, mouth, eyes, eyebrows, nose, arms, hands,fingers, legs, feet, neck, torso, skin, heart, stomach, intestines,liver, kidneys, lungs, breath, vascular system, brain, spinal cord,neural system, skeleton, blood, and any other feature of a person wheresensor observable changes occur.

In some embodiments of the foregoing cyber process, said at least onecyber determination includes any indicated measure that exists of atleast one yet to be identified person being the same person as a knownperson, wherein said at least one determination ranges from determiningsaid yet to be identified person absolutely is not said known person,through determining any intermediate indicated measure of probabilitythat exists of said yet to be identified person being said known person,to determining said yet to be identified person absolutely is said knownperson.

Some embodiments of the foregoing cyber process further comprise arepeating step in which said cyber determination process selects atleast one part of at least one first series observation of at least oneperson for repetition by at least one yet to be identified person,wherein said at least one yet to be identified person performs said atleast one repetition, wherein said process assigns designationsrepresenting (a) said at least one observation, (b) said at least onerepetition, and (c) at least one characteristic regarding said at leastone yet to be identified person. In some instances of these embodiments,said scalable cyber determination process includes at least one secondseries observation record of said at least one repetition, and whereinsaid at least one second series observation record includes saiddesignations assigned by said process.

In some embodiments of the foregoing cyber process, said cyberdetermination process further comprises searching available first seriesobservation records of previously determined aspects of first seriesobservation subjects until either every selected determination isprovided, or there are no further first series observation records tosearch.

Some embodiments of the foregoing cyber process further compriseutilizing useful information which is derived from at least one sourceother than at least one from the group of (a) said at least one firstseries observation record, and (b) said at least one second seriesobservation record.

In some embodiments of the foregoing cyber process, said cyberdetermination process utilizes itself, said at least one computingdevice, said selected criteria, said selected information, said selectedprogramming, and said any other necessary resource, all of which beingstructured to accurately grant or deny access to at least one part of atleast one resource selected from the group consisting of (a) at leastone resource being utilized by said process, and (b) at least oneresource that is utilizing said process.

Some embodiments of the foregoing cyber process further comprisemanipulating, in any way possible, the operations of at least oneselected from the group consisting of (a) process utilized resources,and said cyber process itself; wherein said manipulating provides saidprocess with selection of possible utilizations, wherein saidmanipulating is utilized for at least one purpose, and wherein said atleast one purpose for utilizing said manipulating includes aiding inachieving at least one cyber determination goal.

In some embodiments of the foregoing cyber process, said cyberdetermination process further includes process history, wherein saidprocess history includes at least one process history record.

In some embodiments of the foregoing cyber process, said at least oneobservation record that was derived from at least one source other thansaid first series observation step being included as at least one firstseries observation record.

In some embodiments of the foregoing cyber process, all or any part ofsaid cyber determination process is performed in any order.

In some embodiments of the foregoing cyber process, said cyberdetermination process includes at least one process standard designationrepresenting at least one aspect of at least one operation of said cyberdetermination process.

In another aspect, a scalable, full spectrum cyber determination processis provided which comprises:

deriving information, from at least one point in time or over at leastone period of time, from a spectrum of information that includes atleast one observed characteristic of at least one sensor observation ofat least one subject, thereby obtaining derived information, whereinsaid at least one sensor observation is a type of sensor observationselected from the group consisting of (a) visual sensor observations,(b) audible sensor observations, (c) thermal sensor observations, (d)olfactory sensor observations, and (e) any other type of sensorobservation;

performing at least one cyber determination through the use of at leastone computing device in conjunction with (a) criteria that may beutilized by said process, (b) said derived information, and (c) anynecessary programming and resources, wherein said cyber determinationprocess provides at least one cyber determination selected from thegroup consisting of (i) at least one single cyber determination, (ii) atleast one intermittent cyber determination, and (iii) at least oneconstant cyber determination; and

utilizing said at least one cyber determination for at least onepurpose; wherein said scalable cyber determination process furthercomprises at least one selected part of at least one step selected fromthe group consisting of

a first series observation step utilizing at least one sensorobservation, wherein at least one subject of said at least oneobservation has at least one previously determined aspect, said processrecognizing at least one characteristic regarding said previouslydetermined aspect, said at least one recognized characteristic beingutilizable by said process in performing said at least one cyberdetermination, said cyber process assigning designations representing(i) said at least one observation, (ii) said at least one known aspectof said at least one subject, and (iii) said at least one observedcharacteristic, said cyber process including at least one first seriesobservation record which includes said designations,

a second series observation step utilizing at least one sensorobservation, wherein at least one subject of said at least oneobservation has at least one yet to be determined aspect, said scalableprocess recognizing at least one characteristic regarding said at leastone yet to be determined aspect, said process assigning designationsrepresenting (i) said at least one observation, (ii) said at least oneyet to be determined aspect of said at least one subject, and (iii) saidat least one characteristic regarding said at least one yet to bedetermined aspect, wherein said cyber process includes at least onesecond series observation record containing said designations,

a matching step matching at least one designation from at least onesecond series observation record with at least one designation from atleast one first series observation record,

a comparing step comparing designations representing at least one secondseries observation record with designations representing at least onecomparable first series observation record and providing at least oneconclusion from the comparison,

a determining step wherein said process utilizes at least one from thegroup of: said at least one conclusion from said at least one comparingstep; and, said useful information, for making said at least one cyberdetermination, and

a reporting step providing at least one report regarding at least oneaspect of at least one part of at least one operation of said process.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a flowchart which illustrates one particular, non-limitingembodiment of a process disclosed herein.

DETAILED DESCRIPTION Definitions

Cyber: Utilizing non-biological processing of programming. Furtherdefinition involving the use of the term follows below.

Absolutely Unique: occurring at a ratio of one to the total number ofprocess-wide identity files for each different person.

And/or: either or both of “and” and “or.”

Biological characteristic: any characteristic of a biological organism,including a person, that can be observed and reported upon.

Unique biological characteristic: any single observable biologicalcharacteristic of a person or any combination of observable biologicalcharacteristics of one person that can be considered to be unique to theobserved person.

Capture/capturing: the use of cyber resources for acquiring and thenrecording cyber based observations.

Characteristic: a recognized aspect of an observation and/or acombination of recognized aspects of an observation that can be assigneda designation and further utilized.

Characteristics: at least one characteristic.

Constant/constantly: occurring at any selected frequency that providesfor continuous identification determinations.

Criteria: a group of at least one choice of options.

Cyber: anything such as devices, programming, processes, or files thatutilize non-biological processing of programming in any way.

Full spectrum: full available spectrum.

Identification determinations: at least one identificationdetermination.

Known person: the person who is the subject of a first series ofobservations.

Recognized: any aspect of an observation that is identified for furtherutilization.

Recording: creating a cyber record or a cyber file

Series: a group of at least one.

Unidentified person: one single person who is a subject of a secondseries of observations; a person who has not been determined, utilizingpredetermined criteria, to be the same person as a known person.

Unique: occurring at a selected ratio other than the ratio of absolutelyunique.

Overview

The following brief overview pertains to this cyber identificationdetermination process in general; however, it also pertains, in part, tothe more specific utilization of the process for providing accurate andreliable identification determinations of a person.

I therefore introduce you to the full spectrum cyber identificationdetermination process of the present disclosure, a cyber identificationdetermination process that accurately and reliably provides cyberidentification determinations of a person from a full spectrum of cyberidentification determinations, thereby providing the foundation uponwhich to build a secure, safe, and private technologicallyinterconnected world.

Additionally, through wise utilization of this accurate and reliablecyber identification determination process, cyber environments may soonchange from environments of unparalleled chaos to a unified and orderlytechnologically interconnected environment that provides all users withreasonable levels of cyber security, cyber safety, and cyber privacy.

The following is a list of a portion of the resources from the fullspectrum of resources that are provided by the cyber identificationdetermination process of the present disclosure:

a. identification determinations of a full spectrum of subjects of cyberidentification determinations;

b. identification determinations that fill a full spectrum of needs forcyber identification determinations;

c. identification determinations that are provided utilizing a fullspectrum of attainable levels of accuracy including 100% accuracy;

d. identification determinations that utilize cyber resources from afull spectrum of useful cyber resources;

e. identification determinations that utilize information from a fullspectrum of useful information;

f. identification determinations that utilize observations from a fullspectrum of useful observations;

g. identification determinations that utilize unique biologicalcharacteristics of a person from a full spectrum of unique biologicalcharacteristics of a person who is the subject of an observation;

h. identification determinations that utilize predetermined criteriafrom a full spectrum of useful criteria;

i. identification determinations that utilize standard designations foraccurately and reliably representing any aspect of the identificationdetermination process;

j. identification determinations that are provided one single time,intermittently, and constantly;

k. utilization of the process itself to accurately grant and deny accessto the cyber resources that are being utilized by the process;

l. absolute security and privacy for all cyber identification processinformation and resources;

m. observations of a person where the subject of an observation may beany in a range from not being consciously engaged in the observation tobeing consciously engaged and participating in the observation;

n. scalable for configuring as a self-contained process that providesfor any in a range from the least complex of all cyber identificationdetermination needs to the most complex and comprehensive of all cyberidentification determination needs;

o. ease of use in all phases of operations;

p. persistence in trying to achieve attainable selected identificationdeterminations;

q. utilization of one or more of an incalculable number of observedunique biological characteristics of a person for providingidentification determinations;

r. alteration of operations of the process itself for aiding inattaining any selected achievable identification determination;

s. utilization of useful information and useful observations from anysource;

t. utilization of a unique combination of simultaneously occurringobserved biological characteristics for providing identificationdeterminations of a person; and,

u. utilization of a unique combination of observed biologicalcharacteristics that occur over any period of time for providingidentification determinations of a person.

Proper utilization of a 100% accurate cyber identification determinationof a person process can, for the first time ever, provide the world withthe benefits of a secure, safe, and private technologicallyinterconnected cyber environment.

Among the many benefits that may be derived from the utilization of thisprocess for providing a full spectrum of cyber identificationdeterminations is its ability to determine and report on any indicatedmeasure of probability that exists of an unidentified person being thesame person as a specific known person. At one end of the full spectrumof these identification determinations is the determination that anunidentified person absolutely is the same person as a specific knownperson, and at the other end of the spectrum is the determination thatan unidentified person absolutely is not the same person as a specificknown person.

Through the utilization of cyber resources and predetermined criteria,the process provides its identification determinations by comparing anunidentified subject of an observation with a known subject of anobservation.

The process utilizes predetermined criteria for every aspect of theprocess where criteria can be used.

The process provides and utilizes a standard set of designations forrepresenting all observations, any characteristics, and any other aspectof the process.

As shown in FIG. 1, utilizing the process, cyber resources, andpredetermined criteria for providing cyber identification determinationsof a person:

observations for a first series of observations are captured 10 a,during a first series of observations step 10, characteristics from theobservation are recognized 10 b, assigned designations 10 c, and thenthe designations representing the characteristics and the observationare included in the first series of observations 30, which representsthe observed cyber identity of a known person;

a call for at least one selected cyber identification determinationinitiates a cycle of this process;

the process captures observations 20 a, of a selected unidentifiedperson, during a second series of observations step 20, characteristicsfrom the observation are recognized 20 b, assigned designations 20 c,and then the designations representing the characteristics and theobservation are included in the second series of observations 40;

the process interacts with utilized cyber resources to control theoperations of those resources for capturing any possible observationsand also for providing any useful cyber resource;

any step of the process, or any portion thereof, may be performed in anyorder or sequence;

in any usable order or sequence, utilizing all or any part of thefollowing, the process may:

a. utilize useable observations and information from any source;

b. determine and utilize a level of accuracy;

c. determine and utilize a measure of adequacy of available resources;

d. capture observations for a first series of observations or a secondseries of observations;

e. recognize usable characteristics from observations;

f. utilize recognized characteristics from any observation;

g. utilize at least one unique biological characteristic for providingidentification determinations of a person;

h. assign designations to recognized characteristics;

i. determine which, and the order in which recognized characteristicswill be utilized for comparing and/or determining;

j. match observations and recognized characteristics from a secondseries of observations, during a matching step 50, with correspondingcomparable observations and recognized characteristics from a firstseries of observations;

k. determine and provide conclusions as to an indicated measure ofcomparison between the characteristic from the second series ofobservations and the characteristic from the first series ofobservations during a comparing step 60;

l. select which conclusions from comparing will be utilized fordetermining;

m. utilize conclusions from comparing and/or information for providingcyber identification determinations;

n. provide identification determinations including determinations of anindicated measure of probability of a known person and a unidentifiedperson being the same person during a determining step 70; and,

o. report on any aspect of the process during a reporting step 80.

Additionally, based upon predetermined criteria, the process may bepersistent in attempting to attain an attainable identificationdetermination. As an example, should a determination based uponconclusions from comparing a first characteristic of a person not resultin the process determining a selected attainable determination goal,then the process may continue the comparing and determining until anyattainable selected identification determination goal is achieved.

Should a determination based upon conclusions from comparing allavailable useful characteristics of the unidentified person not resultin determining an attainable selected identification determination goal,then the process may perform at least one additional observation of theunidentified person to add to the second series of observations.

The process may select a portion of a first series of observations to berepeated by an unidentified person for inclusion in the second series ofobservations.

Further, the process may alter the operations of any cyber resourcesutilized for capturing observations in order to capture observationsthat are most likely to aid in the process providing an attainableselected identification determination.

DESCRIPTION

Disclosed herein is a process that merges the future with the present.In order to have a full understanding of the present disclosure you mustalso have an understanding of my vision of a technologicallyinterconnected future, which is as follows.

We live in a technologically interconnected world where vast cyberresources presently exist. Within this technologically interconnectedworld, we utilize cyber resources from a full spectrum of availablecyber resources. This full spectrum of available cyber resources is everwidening, and, over time, our technologically interconnected world isdestined to provide every possible cyber resource that humanity couldever want or need. When that time comes, the entire body of cyberresources will include and rely heavily upon a cyber identificationdetermination process such as the full spectrum cyber identificationdetermination process of the present disclosure, a cyber identificationdetermination process that provides not only 100% accurateidentification determinations of a person, but also every cyberidentification determination our world could ever want or need.

To more fully understand implications of the utilization of my presentdisclosure of a cyber identification determination process, it ishelpful to see its relationship to my pending patent applicationPCT/US2011/056931, entitled, “Single-Point-of-Access Cyber System.”

The core operations of the process may best be disclosed through adetailed example of the utilization of the process for the purpose ofproviding a single selected identification determination that anunidentified person and a known person absolutely are the same person.One of many predetermined criteria utilized for the performing of thiscycle of the utilization of the process is that the full resources thatare available to the process should be utilized in any way possible topersistently work towards accomplishing the selected achievableidentification determination.

In one scenario, a “known person” owns a portable computer. This processis utilized by the known person for exclusively granting only the knownperson access to further use of his or her portable computer'sresources. The portable computer runs the programming of the knownperson's personally configured and built cyber identificationdetermination process. In addition, the portable computer has amicrophone and a camera that the process may control the adjustableoperations of.

The process utilizes observations of the known person that come from thevast collection of observations that make up the known person's firstseries of observations. The first series of observations of the knownperson is exclusively made up of observations that include the knownperson as a subject of the observation. The first series of observationsrepresents the cyber identity of a known person.

A cycle of the utilization of the process is initiated by anunidentified person requesting use of the known person's portablecomputer.

Every aspect of the operation of the process utilizes predeterminedcriteria. Criteria from a full spectrum of criteria may be predeterminedby the known person, or criteria may be predetermined as an integralpart of the operations of the cyber resources that were selected foruse, or criteria may be predetermined as a part of the operations of theprocess, or criteria may be predetermined utilizing any other means forselecting criteria, or any combination thereof. Selection of anythingalso constitutes criteria.

Criteria is a selected choice of who, when, where, what, why, or how aseach relates to any aspect of the process and its operations. Providinga choice of any possible criteria, and, any criteria being possible, maywell be the most important features that cyber resources have to offer.And, this cyber identification determination process takes full and bestadvantage of this particular cyber feature by providing any user with achoice of selection of any selectable aspects of his or her utilizationof the process.

In the instance of this cycle of the utilization of the process, theprocess, utilizing predetermined criteria, utilizes the computer'scamera to capture an image of the unidentified person. The process,again using predetermined criteria, utilizes the zoom feature of thecamera to closely frame an image of only the face of the unidentifiedperson in order to provide an observation that would be most likely toaid in achieving the selected attainable identification determinationgoal.

As a part of either series of observations, utilizing cyber resourcesand predetermined criteria, the process recognizes usefulcharacteristics of any kind from the observations.

The process provides and utilizes a standard set of designations foraccurately and reliably representing any aspect of the process and itsoperations.

Utilization of one standard set of designations is an indispensable partof accurately, reliably, and consistently providing identificationdeterminations, while utilizing any available observation or cyberresources from any place on the planet. Also included in the process isthe strategy of providing, on a worldwide basis, extremely consistentand accurate assignments of standard designations to every recognizedaspect of each and every observation and characteristic.

Designations that accurately and reliably represent the observation,including designations representing the captured image of theunidentified person's face, are assigned and then included in a secondseries of observations for utilization in this cycle of the process. Inaddition, designations are accurately and consistently assigned,according to a process standard, so that designations representingobservations and recognized characteristics from either series ofobservations may be universally utilized across the entiretechnologically interconnected cyber environment where the process isutilized.

The process utilizes cyber resources and predetermined criteria formatching designations representing the observation and characteristicsfrom the second series of observations with designations representing atleast one comparable observation of a known person from that person'sown first series of observations.

In the instance of this cycle of the utilization of the process,predetermined criteria call for selecting and then utilizing one or morecomparable observations from the first series of observations of theknown person. Further, the one or more selected observations should bethe most likely of all available observations to aid in accuratelyachieving the attainable selected identification determination goal.

Through the incredible speed and power of the operations of cyberresources, any large number of criteria can be collectively orselectively utilized for any aspect of the operations of this cyberidentification determination process.

In the instance of this cycle of the utilization of the process,predetermined criteria utilize time, date, temperature, light sources,light levels, the portion of the unidentified person that was observed,and clarity of observation for matching the observation of theunidentified person with at least one comparable observation from thefirst series of observations of the known person.

The process provides final identification determinations for manyaspects of each observation at the time when designations are assignedto recognized characteristics. For example, a final identificationdetermination may be provided that a person who was the subject of anobservation had red hair, or hazel eyes, or a particular geometry andratio of movement between joints in a finger while opening or closing,or any other characteristic.

Further, when utilizing an observation that has more than one person asa subject of the observation, the process may exclude from furtheridentification determinations any person who is a subject of theobservation who has been determined to have hair that is not red and/oreyes that are not hazel. Also, based upon predetermined criteria, anunidentified person may be determined to absolutely not be the sameperson as the known person if it was determined that the unidentifiedperson did not have red hair and/or hazel eyes.

Utilizing cyber resources and predetermined criteria, matchedobservations of the unidentified person and the known person arecompared by the process. Any predetermined criteria may be utilized bythe process for any aspect of comparing.

Utilizing cyber resources and predetermined criteria, conclusions fromcomparing, along with any useful information, may be utilized by theprocess for making identification determinations. Any predeterminedcriteria may be utilized by the process for any aspect of its makingcyber identification determinations.

In the instance of this cycle of utilization of the process, theunidentified person is wearing large dark glasses that prevent theprocess from utilizing any comparison from the entire area of theireyes. Also, the unidentified person is wearing a hat that covers thearea where the known person has a small scar crossing a pea-sizedbirthmark; therefore, this very unique biological characteristic of theknown person cannot be utilized for making an identificationdetermination.

In the instance of this cycle of the utilization of the process,conclusion from comparing a first set of matched characteristics did notprovide an identification determination that met the identificationdetermination goal of this cycle of the process. So, followingpredetermined criteria, the process continues to utilize conclusionsfrom comparing of characteristics until the goal of this cycle of theprocess is attained, or until there are no further conclusions from thecomparing to utilize.

The latter being the case in this cycle of utilization of the process,and taking into consideration that the unidentified person is wearing ahat and dark glasses, then the process selects utilization of a furtherobservation of the unidentified person presenting that person's fullyopened left hand to the computer's camera, fingernails facing thecamera, then slowly closing the hand and opening it again fully.

The unidentified person, still wanting to gain access to the resourcesof the known person's computer, complies with the request from thecomputer's image display screen. The process operates the zoom on thecomputer's camera to provide the optimum captured observation forutilization with this cycle of the process.

In this instance, the process utilizes comparing of still images,geometry of the movement, and changes in images of the hand and fingersthat occur with movement for providing identification determinations.

The selected repeated observation provides an overabundance of uniquebiological characteristics that can be utilized for making anidentification determination, far more than are needed for determining,with 100% accuracy, that the unidentified person and the known personabsolutely are the same person. Just a portion of the characteristicsthat were recognized from the opening and closing of a single fingerfrom this observation would suffice for making the selecteddetermination for this cycle of the utilization of the process.

The selected cyber identification determination having been attained,then, utilizing cyber resources and any predetermined criteria for anyaspect, the process reports the identification determination.

In the instance of this cycle of the utilization of the process, thedetermination is reported to a history the process maintains, and alsoto programming running on the portable computer of the known personwhereby, having received the report that the unidentified personabsolutely is the known person, the computer then grants the knownperson exclusive access to use of the resources of his or her owncomputer. History, or any other aspect of the process may be stored involatile or non-volatile memory, e.g., in one or more storage modulesthat are utilized by one or more computers.

In order to best demonstrate a few selected further utilizations of theprocess we will look to the future. I will utilize my co-pending patent,the Single-Point-of-Access Cyber System, to illustrate that future. I doso primarily because my Single-Point-of-Access Cyber System provides forwhat I find to be the full and best utilization of an accurate andreliable full spectrum cyber identification determination process.

To begin with, the Single-Point-of-Access Cyber System architectureprovides each person with one remotely accessible point of cyber accesscomputer. Each person may utilize any mobile or stationary remoteterminal-type-of device that is called an “input output device” to gainsecure and private access to his or her own remotely located computer.

Each person's own remotely located point of cyber access computerutilizes the process that is the subject of this patent application fordetermining, with 100% accuracy, that an unidentified person absolutelyis the same person as the proprietary user of the computer beforegranting the previously unidentified person access to the personal andprivate resources of that person's own remotely located point of cyberaccess computer.

Utilizing the identification determination resources of this process,the Single-Point-of-Access Cyber System provides a technologicallyinterconnected world with an environment that provides for the highestattainable levels of cyber security, cyber safety, and cyber privacy.

A cycle of utilization of the process is initiated by an unidentifiedperson who utilizes any input output device to call up his or her ownremotely located point of cyber access computer, and then requestsaccess to the personal and private resources of his or her own computer.Each person's point of cyber access computer is configured to where onlyone specific person can gain access to personal and private resourcesand, only after that person has, with 100% accuracy, been determined tobe the proprietary user of the computer. The computer requests that theunidentified person requesting access repeat a phrase the process hasrandomly selected from the first series of observations of theproprietary user of the computer.

The process may utilize any criteria for selecting the phrase to berepeated. In the instance of this cycle of the process, the phrase to berepeated was selected based upon observations from the utilized inputoutput device in regard to light levels, light source, temperature,movement of the unidentified person, movement of the input outputdevice, and a number of other process selected factors.

The unidentified person repeats the selected phrase for the microphoneand camera of the input output device. The process, utilizingpredetermined criteria, and available cyber resources, controls theoperations of the microphone and the pan, tilt, and zoom modes of thecamera of the input output device in order to capture the optimumobservation for a second series of observations.

The process recognizes characteristics from this observation andaccurately assigns designations to all recognized characteristics. Thedesignations representing the observation and recognized characteristicsare included in a second series of observations.

The designations representing the repeating of the selected phrase arethen compared, utilizing the predetermined criteria of first matchingthe peak and valley representations of the sound of the voice from therepeating with the peak and valley graph of the voice from theproprietary user of the computer originally speaking the phrase that wasrepeated. Then, if a match exists, the process further compares theposition of the mouth at various landmarks such as high peaks in thepeak and valley graph.

In this instance, the process determines that the unidentified personrequesting access absolutely is the proprietary user of the computer andthe proprietary user is thereby granted exclusive access to the personaland private resources of his or her own remotely located point of cyberaccess computer.

I find that an interesting set of identification determination criteriamust go along with a cyber environment that provides a person withsecure, safe, and private access to that person's own remotely locatedcomputer and the private cyber resources within. To achieve this cyberenvironment, I find it necessary to utilize criteria that require a 100%accurate identification determination be made of a person beforegranting that person access to the resources of his or her own remotelylocated computer, and criteria must also be utilized that requiresconstant identification determination of the same person while he or sheis utilizing the resources of his or her own computer in any way.

Therefore, the Single-Point-of-Access Cyber System not only requiresthat a person be accurately determined to be the proprietary user of apoint of cyber access computer before he or she may gain access to itsresources, but the Single-Point-of-Access Cyber System also requires theperson utilizing the computer to constantly be determined to be theproprietary user of the computer while that person is personally usinghis or her own point of cyber access computer in any way.

One example of how the process may provide constant identificationdeterminations utilizes an image of the eyes of the user of the inputoutput device. The predetermined criteria calls for the comparing of themost current image of the eyes with the immediate prior image of theeyes at a frequency that would not allow the observed user to bechanged. This method provides a weak, but accurate constantidentification determination. However, for the instance of this constantcycle of utilization of the process, further predetermined criteria alsocalls for a full comparison and a 100% accurate identificationdetermination to be made each time the person who is using the inputoutput device blinks his or her eyes.

Additionally, point of cyber access computers are primarily voiceoperated, thereby providing the process with a vast collection of firstseries observations of the proprietary user of the computer when he orshe is speaking. So, should a person be wearing large dark glasses thatprevent the use of the person's eyes for making identificationdeterminations, then the process may utilize observations of theperson's mouth for providing identification determinations. The processmay also utilize the capturing of observations of the uniquecharacteristics of the mouth at a frequency that would provide aconstant determination as to whether or not the same mouth was thesubject of the observation. And a 100% accurate identificationdetermination may be provided when this person speaks, wherein theprocess utilizes a portion of what was said by the unidentified personin conjunction with a matching comparable observation of the proprietaryuser of the point of cyber access computer saying the same phrase.

Should it not be possible to utilize either of the prior strategies forproviding constant identification determinations of the user of an inputoutput device, then the process may utilize any possible aspect of anobservation of the user of the input output device for persistentlytrying to attain a 100% accurate determination that the person using theinput output device is the proprietary user of the point of cyber accesscomputer.

A point of cyber access computer from the Single-Point-of-Access CyberSystem is one single remotely accessible computer that securely andprivately provides for every cyber resource the proprietary user of thepoint of cyber access computer could ever want or need.

At the point in the future where it is possible to utilize every cyberresource humanity could ever want or need, a person could utilize his orher own remotely located point of cyber access computer to navigatethrough the maze of a large open market area of an ancient and irregularpart of a city in a country the person has never before been. The pointof cyber access computer will utilize this cyber identificationdetermination process to aid the proprietary user of the computer innavigating the maze.

The point of cyber access computer of the person will utilize cyberpositioning resources to determine the geographic location of theperson. The point of cyber access computer of the person will thenutilize available public cameras from the area to first find the personfrom the large group of people at the market, and then accuratelyconfirm that the found person was the proprietary user of the computer,and then, as much as is possible, provide a constant identification andlocation determination for the person as the person moves through themarket. The previous real-time information about the location of theperson, in turn, will be utilized by the computer for providing theperson with the best possible aid in navigating through the maze of thebusy congested market.

At times during constant observation of the person, no part of theperson may be observable. However, there may be visible parts ofanything that has previously been on, or about the body of the personthat may be utilized by the process for visually following the movementsof an otherwise unidentifiable person through the market.

This brings up another feature of this full spectrum cyberidentification determination process: the feature of the processproviding identification determinations not only of a person, but alsoproviding identification determinations of any other recognizablebiological observation, any recognizable non-biological observation, andany recognizable observance of the environment of an observation.

At a time when there is a cyber environment that provides every resourcewe could want or need, cyber resources could be utilized to observe arock wall and through utilization of this process, the cyber resourcescould easily provide accurate information about the location of thewall, when the wall was built, what type of materials were used, andwhere the rocks originally came from.

The full spectrum cyber identification determination process-enabled,secure, safe, and private technologically interconnected environment ofthe Single-Point-of-Access Cyber System will provide the planet withvast new cyber resources. Among those resources will be devices thatregularly monitor any selected aspect of our personal health.

The voice operated point of cyber access computer can be fully utilizedthrough use of an input output device that is similar in size, and isworn similarly to a wristwatch. Although an input output device with animage display screen of such a small size would require intermittent useof a larger image display screen, I find a wristwatch-configured inputoutput device to provide the greatest all-around utility. I find this,in part, because a wristwatch-configured input output device may also beutilized to securely and privately monitor and report to one's point ofcyber access computer any possible health observations, both internallyand externally.

A person's own point of cyber access computer may then utilize thosehealth observations for providing that person, through use of his or herpersonal wristwatched-configured input output device, reports of anyhealth information he or she may want to or need to be aware.

Through utilization of the security, safety, and privacy that is enabledby use of the full spectrum cyber identification determination processof the present disclosure, and the resources of theSingle-Point-of-Access Cyber System, we will each have the ability tosecurely and privately provide all, or any part of our own personal andprivate health information to health care providers of our choice sothat those health care providers may have the ability to better provideus with the best of all possible health care outcomes.

Additionally, it will be possible to anonymously provide all, or anypart of our own health information to selected others for health relatedresearch.

Utilizing a wristwatch-configured input output/health monitoring device,each person may enjoy the benefits of secure and private uninterruptedobservations of any number of measures of his or her health, and also,the benefits of the utilization of remote access to the full resourcesof his or her own remotely located point of cyber access computer.

Looking to the present again, more particularly the present need for aneasy to use, versatile process that provides 100% accurate cyberidentification determinations of a person, I find that prior art cyberidentification measures fail to meet present needs for identificationdeterminations because prior art does not go so far as to identify eachperson by means of utilizing unique biological characteristics of aperson that cannot be replicated by any others. The cyber identificationdetermination process of the present disclosure provides identificationdeterminations of any person by utilizing unique biologicalcharacteristics of a person, unique biological characteristics thatcannot be replicated by any other person or device.

The full spectrum cyber identification determination process, asutilized for providing 100% accurate cyber identification determinationsof a person, utilizes as many unique biological characteristics of aperson as are necessary to achieve an attainable selected identificationdetermination goal. Many examples of unique biological characteristicsof a person have previously been addressed. However, when both internaland external observations of a person are utilized in any combination,there are a very large number of possible combinations of uniquebiological characteristics that could be utilized for providingidentification determinations of just one person. And, with every uniquebiological characteristic of a person that has been observed also existsone means for accurately matching an unidentified person with theidentity file of a known person.

The process may provide any identification determination from a fullspectrum of cyber identification determinations of not only a person,but also any other biological, non-biological, or environmentobservances.

Within the full spectrum of identification determinations of a personare a multitude of determinations that fall short of providing adetermination that an unidentified person and a known person absolutelyare the same person. For example, there are identificationdeterminations of hair color, moles, wrinkles in skin, freckles,geometry of motion at joints, scars, height, eye color, and on and on.

There are also identification determinations of any measure ofprobability that might exist of a known person and an unidentifiedperson being the same person. This type of identification determinationis useful in many ways; it can be utilized to provide an indicatedmeasure of probability that has been accomplished at any point in acycle of the utilization of the process. And, should there be more thanone person as the subject of an observation for a second series ofobservations, all those who are not the same person as the known personcan be eliminated by utilizing an ever increasing selected minimumindicated measure of probability to quickly eliminate the majority ofpersons who were subjects of the observation.

The process can be utilized for determining the exact identity of anunidentified person, even when there is no knowledge of who theunidentified person might be other than the designations that representobservations of the unidentified person. For example, the process maydetermine who an unidentified person is by utilizing selected criteriathat called for the most unique combination of recognizedcharacteristics of the unidentified person to be utilized for searchingavailable databases for first series of observations of known personsuntil either a known person was found that absolutely was the sameperson as the unidentified person, or there were no further databaserecords of first series of observations of known persons from which tosearch.

The process also utilizes useful information from any source forproviding identification determinations. Perhaps the most powerful ofall information that may be utilized by the process would be informationas to exactly who an unidentified person might be. If the informationthat the process utilizes is accurate, then a search of only onedatabase record will provide the identity of the previously unidentifiedperson.

Prior art cyber security measures fail to accurately control access tocyber resources because of their inability to accurately determine theexact identity of the person who is utilizing those cyber resources. Theprocess of the present disclosure provides identification determinationsfrom a full spectrum of cyber identification determinations as towhether a known person and an unidentified person are the same person.At one farthest end of this range is the identification determinationthat an unidentified person and a known person absolutely are the sameperson. This identification determination can be utilized to accuratelygrant only the known person access to his or her own personal andprivate cyber resources. Since unique biological characteristics of theknown person were utilized for providing the identificationdetermination, unique biological characteristics that can never bereplicated by others, then all others may then be accurately excludedfrom ever gaining access to the cyber resources of the known person.

One of the greatest concerns of those who are skilled in the art ofproviding biological-based identification determinations of a person isthat the utilized information comprising the cyber identity of a personmay be stolen and then used fraudulently or maliciously. The fullspectrum cyber identification determination process of this disclosurenot only utilizes unique biological characteristics of a person that cannever be replicated by others, but the process also utilizes, in manyinstances, a combination of a number of unique biologicalcharacteristics of a person that are observed both simultaneously, andover any measured period of time.

Once again, looking to the future of humanity's use of cyber resources,there should come a time when humanity responsibly utilizes cyberresources as a tool to regularly augment each person's own naturalcognitive and observational capabilities.

In order for a person to achieve the highest attainable levels ofbenefits from utilization of cyber resources to augment his or her ownnatural capabilities, I find it will first be necessary to provide theperson with a relationship of access to utilized cyber resources that isalmost identical to the relationship of access the person has with hisor her own mind and senses.

Therefore, I find that personal and private cyber information andresources should be configured to where they can never be accessed byanyone other than the known person. As an example, I would not want tobe hypnotized for the purpose of others using information from theprivacy of my mind for any reason. And I also would not want anyone togain access to my own personal and private cyber resources andinformation, including my health records, financial information,geographical locating reports, cyber communications of all kinds, cyberinteractions of all kinds including for commerce, education,entertainment, self-help, and so on. And just as is in the case of myown natural cognitive resources, I also would not want anyone to evergain access to any part of my private cyber resources and informationafter my death. Please note, however, through use of this cyberidentification determination process, as is also the case with our ownnatural capabilities, it will be possible to share any selected portionof our own personal and private cyber based information and resourceswith selected others.

Welcome to the Future!

While the disclosed process has been defined in terms of its preferredand alternative embodiments, those of ordinary skill in the art willunderstand that numerous other embodiments and applications of thedisclosed process will become apparent. Such other embodiments andapplications shall be included within the scope and meaning of theinvention as defined by the appended claims. Moreover, it is to beunderstood that the above description of the present invention isillustrative, and is not intended to be limiting. It will thus beappreciated that various additions, substitutions and modifications maybe made to the above described embodiments without departing from thescope of the present invention. Accordingly, the scope of the presentinvention should be construed in reference to the appended claims.

What is claimed is:
 1. A scalable full spectrum cyber determinationprocess, said scalable full spectrum cyber determination processcomprising: utilizing at least one computing device in conjunction with(a) criteria selected from criteria that may be utilized by saidprocess, (b) selected useful information, (c) selected necessaryprogramming, and (d) any other necessary resource, all of which beingstructured and utilized for providing at least one cyber determination;wherein said at least one cyber determination is selected from the groupconsisting of the full spectrum of cyber determinations; wherein said atleast one cyber determination is utilized for at least one purpose;wherein said useful information is derived from at least one memberselected from the group consisting of (a) at least one point in time,and (b) over at least one period of time; wherein said usefulinformation is selected from the group consisting of the full spectrumof useful information that may be utilized by said process; wherein saidfull spectrum of useful information that may be utilized by said processincludes useful information from at least one sensor observation;wherein said at least one sensor observation provides useful informationregarding at least one aspect of at least one subject of said at leastone sensor observation; wherein said at least one cyber determinationregarding said at least one aspect of at least one subject of at leastone sensor observation is selected from the group consisting of the fullspectrum of cyber determinations regarding aspects of subjects of sensorobservations; wherein said at least one aspect of at least one subjectof at least one sensor observation is selected from the group consistingof the full spectrum of aspects regarding subjects of sensorobservations; wherein said at least one subject of at least one sensorobservation is selected from the group consisting of the full spectrumof subjects of sensor cyber observations; wherein said cyberdetermination process utilizes at least one observed characteristic ofsaid at least one subject of at least one sensor observation; whereinsaid at least one observed characteristic is selected from the groupconsisting of the full spectrum of observable characteristics ofsubjects of sensor observations; wherein said at least one sensorobservation is at least one type of sensor observation selected from thegroup consisting of (a) visual sensor observations, (b) audible sensorobservations, (c) thermal sensor observations, (d) olfactory sensorobservations, and (e) any other type of sensor observation; wherein saidat least one sensor observation has at least one characteristic selectedfrom the group consisting of the full spectrum of characteristics ofsensor observations; wherein said full spectrum cyber determinationprocess is scalable and configurable, in regard to included resources,to be anywhere in the range of a minimum to a maximum, wherein at theminimum, said process includes only the resources that are needed forproviding for the least complex, in regard to included necessaryresources, of all cyber determination needs, and wherein at the maximum,said scalable cyber determination process includes every resource thatis needed for providing every cyber determination from the full spectrumof cyber determinations; wherein said scalable cyber determinationprocess provides at least one determination selected from the groupconsisting of (a) at least one single cyber determination, (b) at leastone intermittent cyber determination, and (c) at least one constantcyber determination; and wherein said scalable cyber determinationprocess further comprises utilizing at least one part of at least onestep selected from the group consisting of (a) a first seriesobservation step utilizing at least one sensor observation, wherein atleast one subject of said at least one observation has at least onepreviously determined aspect, said process recognizing at least onecharacteristic regarding said previously determined aspect, said atleast one recognized characteristic being utilizable by said process inperforming said at least one cyber determination, said cyber processassigning designations representing (i) said at least one observation,(ii) said at least one known aspect of said at least one subject, and(iii) said at least one observed characteristic, said cyber processincluding at least one first series observation record which includessaid designations, (b) a second series observation step utilizing atleast one sensor observation, wherein at least one subject of said atleast one observation has at least one yet to be determined aspect, saidscalable process recognizing at least one characteristic regarding saidat least one yet to be determined aspect, said process assigningdesignations representing (i) said at least one observation, (ii) saidat least one yet to be determined aspect of said at least one subject,and (iii) said at least one characteristic regarding said at least oneyet to be determined aspect, wherein said cyber process includes atleast one second series observation record containing said designations,(c) a matching step matching at least one designation from at least onesecond series observation record with at least one designation from atleast one first series observation record, (d) a comparing stepcomparing designations representing at least one second seriesobservation record with designations representing at least onecomparable first series observation record and providing at least oneconclusion from the comparison, (e) a determining step wherein saidprocess utilizes at least one from the group of: said at least oneconclusion from said at least one comparing step; and, said usefulinformation, for making said at least one cyber determination, and (f) areporting step providing at least one report regarding at least oneaspect of at least one part of at least one operation of said process.2. The cyber process of claim 1, wherein said scalable cyberdetermination process achieves at least one selected attainable level ofaccuracy goal for at least one cyber determination, and wherein said atleast one attainable level of accuracy falls within the range extendingfrom the smallest recognizable level of accuracy up to, and including,100% accuracy.
 3. The cyber process of claim 1, wherein said cyberdetermination process provides for any possible level of observationparticipation by at least one person who is at least one subject of atleast one sensor observation, and wherein said any possible level ofobservation participation ranges from said at least one person beingpresent but not consciously or otherwise engaged in said at least onesensor observation, to said at least one person being an active andconsciously engaged participant in said at least one sensor observation.4. The cyber process of claim 1, wherein said cyber determinationprocess utilizes at least one observation selected from the groupconsisting of (a) at least one sensor observation of more than onesimultaneously observed characteristic of at least one subject, and (b)at least one sensor observation which is of at least one characteristicof at least one subject, and which occurs over at least one period oftime.
 5. The cyber process of claim 4, wherein said at least one sensorobservation occurs over said at least one period of time and includesobserving at least one change that occurs to at least one observationsubject over said at least one period of time.
 6. The cyber process ofclaim 5, wherein said at least one change includes at least one aspectof at least one subject of at least one sensor observation selected fromthe group consisting of (a) visual sensor observations, (b) audiblesensor observations, (c) thermal sensor observations, (d) olfactorysensor observations, and (e) any other type of sensor observation. 7.The cyber process of claim 6, wherein said cyber determination processincludes at least one person being said at least one observationsubject, and wherein said at least one change that occurs to said atleast one person is at least one change of at least one observableaspect of at least one part of at least one feature of said at least oneperson.
 8. The cyber process of claim 7, wherein said at least onefeature is selected from the group consisting of the head, face, mouth,eyes, eyebrows, nose, arms, hands, fingers, legs, feet, neck, torso,skin, heart, stomach, intestines, liver, kidneys, lungs, breath,vascular system, brain, spinal cord, neural system, skeleton, blood, andany other feature of a person where sensor observable changes occur. 9.The cyber process of claim 1, wherein said at least one cyberdetermination includes any indicated measure that exists of at least oneyet to be identified person being the same person as a known person,wherein said at least one determination ranges from determining said yetto be identified person absolutely is not said known person, throughdetermining any intermediate indicated measure of probability thatexists of said yet to be identified person being said known person, todetermining said yet to be identified person absolutely is said knownperson.
 10. The cyber process of claim 1, further comprising: arepeating step in which said cyber determination process selects atleast one part of at least one first series observation of at least oneperson for repetition by at least one yet to be identified person,wherein said at least one yet to be identified person performs said atleast one repetition, wherein said process assigns designationsrepresenting (a) said at least one observation, (b) said at least onerepetition, and (c) at least one characteristic regarding said at leastone yet to be identified person.
 11. The cyber process of claim 10,wherein said scalable cyber determination process includes at least onesecond series observation record of said at least one repetition, andwherein said at least one second series observation record includes saiddesignations assigned by said process.
 12. The cyber process of claim 1,wherein said cyber determination process comprises: searching availablefirst series observation records of previously determined aspects offirst series observation subjects until either every selecteddetermination is provided, or there are no further first seriesobservation records to search.
 13. The cyber process of claim 1, furthercomprising: utilizing useful information which is derived from at leastone source other than at least one from the group of (a) said at leastone first series observation record, and (b) said at least one secondseries observation record.
 14. The cyber process of claim 1, whereinsaid cyber determination process utilizes itself, said at least onecomputing device, said selected criteria, said selected information,said selected programming, and said any other necessary resource, all ofwhich being structured to accurately grant or deny access to at leastone part of at least one resource selected from the group consisting of(a) at least one resource being utilized by said process, and (b) atleast one resource that is utilizing said process.
 15. The cyber processof claim 1, further comprising: manipulating, in any way possible, theoperations of at least one selected from the group consisting of (a)process utilized resources, and said cyber process itself; wherein saidmanipulating provides said process with selection of possibleutilizations, wherein said manipulating is utilized for at least onepurpose, and wherein said at least one purpose for utilizing saidmanipulating includes aiding in achieving at least one cyberdetermination goal.
 16. The cyber process of claim 1, wherein said cyberdetermination process further includes process history, wherein saidprocess history includes at least one process history record.
 17. Thecyber process of claim 1, wherein said at least one observation recordthat was derived from at least one source other than said first seriesobservation step being included as at least one first series observationrecord.
 18. The cyber process of claim 1, wherein all or any part ofsaid cyber determination process is performed in any order.
 19. Thecyber process of claim 1, wherein said cyber determination processincludes at least one process standard designation representing at leastone aspect of at least one operation of said cyber determinationprocess.
 20. A scalable, full spectrum cyber determination process,comprising: deriving information, from at least one point in time orover at least one period of time, from a spectrum of information thatincludes at least one observed characteristic of at least one sensorobservation of at least one subject, thereby obtaining derivedinformation, wherein said at least one sensor observation is a type ofsensor observation selected from the group consisting of (a) visualsensor observations, (b) audible sensor observations, (c) thermal sensorobservations, (d) olfactory sensor observations, and (e) any other typeof sensor observation; performing at least one cyber determinationthrough the use of at least one computing device in conjunction with (a)criteria that may be utilized by said process, (b) said derivedinformation, and (c) any necessary programming and resources, whereinsaid cyber determination process provides at least one cyberdetermination selected from the group consisting of (i) at least onesingle cyber determination, (ii) at least one intermittent cyberdetermination, and (iii) at least one constant cyber determination; andutilizing said at least one cyber determination for at least onepurpose; wherein said scalable cyber determination process furthercomprises at least one selected part of at least one step selected fromthe group consisting of (a) a first series observation step utilizing atleast one sensor observation, wherein at least one subject of said atleast one observation has at least one previously determined aspect,said process recognizing at least one characteristic regarding saidpreviously determined aspect, said at least one recognizedcharacteristic being utilizable by said process in performing said atleast one cyber determination, said cyber process assigning designationsrepresenting (i) said at least one observation, (ii) said at least oneknown aspect of said at least one subject, and (iii) said at least oneobserved characteristic, said cyber process including at least one firstseries observation record which includes said designations, (b) a secondseries observation step utilizing at least one sensor observation,wherein at least one subject of said at least one observation has atleast one yet to be determined aspect, said scalable process recognizingat least one characteristic regarding said at least one yet to bedetermined aspect, said process assigning designations representing (i)said at least one observation, (ii) said at least one yet to bedetermined aspect of said at least one subject, and (iii) said at leastone characteristic regarding said at least one yet to be determinedaspect, wherein said cyber process includes at least one second seriesobservation record containing said designations, (c) a matching stepmatching at least one designation from at least one second seriesobservation record with at least one designation from at least one firstseries observation record, (d) a comparing step comparing designationsrepresenting at least one second series observation record withdesignations representing at least one comparable first seriesobservation record and providing at least one conclusion from thecomparison, (e) a determining step wherein said process utilizes atleast one from the group of: said at least one conclusion from said atleast one comparing step; and, said useful information, for making saidat least one cyber determination, and (f) a reporting step providing atleast one report regarding at least one aspect of at least one part ofat least one operation of said process.