Single-Point-of-Access Cyber System

ABSTRACT

The system and system components of the present invention provide individuals with both a safe and a secure cyber environment. Within this safe and secure cyber environment each individual and each cyber device is properly identified for all cyber interactions with others and for all cyber interactions with the cyber devices of others. The system also provides individuals with privacy for the individual&#39;s cyber activities and cyber assets. Further, the system provides for environment-wide interoperable use of any cyber device, cyber programming, and cyber content.

BACKGROUND OF THE INVENTION

1. Field of the Invention

This invention pertains to a system, system components, and methodswhich together provide for cyber interactions among individuals andcyber devices; more particularly, the present invention pertains to asystem, system components, and methods which together provide a cyberenvironment which provides individuals with safe, secure, private cyberinteractions with properly identified others, and safe, secure, privatecyber interactions with the properly identified cyber devices of others.In addition, the present invention provides individuals with the abilityto selectively grant or deny others or the cyber devices of othersaccess to all or any part of the individual's cyber activities, cyberinteractions, and cyber assets. Further, the cyber environment which isprovided by the present invention provides for interoperable use ofcyber devices, cyber content, and cyber programming throughout the cyberenvironment. For the purpose of this application, the term “cyber” shallgenerally be understood to refer to the use of non-biological processingof programming for any purpose. Further definition involving the use ofthe term follows.

2. Description of the Related Art

Individuals who access cyber environments have little or no assurance orexpectations that the cyber environments will provide the individualswith security, privacy, or the ability to grant or deny others or thecyber devices of others access to all or any part of the individuals'cyber activities, cyber interactions, or cyber assets. In additioncurrent cyber environments cannot provide individuals with the identityof others or the identity of the cyber devices of others with whom,through use of the cyber environments, the individuals interact.Further, cyber environments do not provide for cyber environment-wideinteroperable use of any cyber device, cyber programming, and cybercontent.

There remains a need for a combination of system programming and systemdevices which provide a safe and secure cyber environment which provideseach individual with both privacy for the individual's cyber activitiesas well as control over others' access to the individual's cyberactivities, cyber interactions, and cyber assets. In addition, the needremains for a combination of system programming and system devices whichproperly identify each cyber device and each individual who uses thesystem. Further, the need remains for a combination of systemprogramming and system devices which provide cyber environment-wideinteroperable use of any cyber device, cyber programming, and cybercontent.

SUMMARY OF THE INVENTION

The present invention includes a combination of processes, procedures,programming, system architecture, device architecture, and devices whichtogether provide individuals with both a safe and a secure cyberenvironment. Within this safe and secure cyber environment eachindividual and each cyber device will always be properly identified forall cyber interactions with others and for all cyber interactions withthe cyber devices of others. The present invention also providesindividuals with any level of privacy that is required by eachindividual for the individual's cyber activities and cyber assets. Thesafe and secure cyber environment of the present invention furtherprovides for environment-wide interoperable use of any cyber device,cyber programming, or cyber content which can be either configured to beused with the single-point-of-access cyber system or could be convertedfor use by processes and procedures which are a part of thesingle-point-of-access cyber system.

BRIEF DESCRIPTION OF THE DRAWING FIGURES

A better understanding of the system, the components of the system, andthe methods of the present invention may be had by referring to thedrawing figures which illustrate essential architecture, components, andfunctions of the invention as described in the following Description ofthe Embodiments section.

FIG. 1 is an overview diagram of the disclosed single-point-of-accesscyber system.

FIG. 2 is a schematic block diagram which illustrates the architectureand the architectural components of the single-point-of-access cybersystem.

FIG. 3 is a schematic block diagram which illustrates theinterconnections and the cyber activities which occur within thearchitecture of the single-point-of-access cyber system.

FIG. 4 is a schematic block diagram which illustrates thesingle-point-of-access cyber system and the associated cyber activitiesof the individual.

FIG. 5 is a schematic block diagram which illustrates the cyberactivities associated with the individual's device-based cyber assets.

FIG. 6 is a schematic block diagram which illustrates the cyberactivities associated with the individual and the cyber activitiesassociated with a remote cyber device.

FIG. 7 is a schematic diagram which illustrates the cyber activitiesassociated with the individual's device-based cyber assets, as well asthe cyber activities associated with the individual, and thoseassociated with a remote cyber device.

FIG. 8 is a schematic diagram which illustrates the cyber activitiesoccurring between others and the individual's public computer.

FIG. 9 is a schematic diagram which illustrates the cyber activitiesoccurring between others and both the individual's public computer andthe individual's cyber telephone system.

FIG. 10 is a schematic diagram which illustrates the cyber activitiesoccurring between others and the individual's cyber telephone system.

FIG. 11 is a schematic diagram which illustrates the individual'sadministrative-based, management-based, and operational cyber activitiesassociated with the individual's device-based cyber assets.

FIG. 12 is a schematic diagram which illustrates a point of cyber accesscomputer as well as the components, interconnections, and the associatedcyber activities within.

FIG. 13 is a schematic diagram which illustrates a private computer andthe components, interconnections, and the associated the cyberactivities within.

FIG. 14 is a schematic diagram which illustrates a public computer andthe components, interconnections, and the associated cyber activitieswithin.

FIG. 15 is a schematic diagram which illustrates the cybercommunications network of the single-point-of-access cyber system.

FIGS. 16A-16F are illustrations of a two-screen input output devicewhich can be configured for use in multiple forms.

FIG. 17 is an illustration of a group of virtual processes which areused for security, for interoperability conversion, and for makingalterations to images.

FIGS. 18A-18G are illustrations depicting cyber images in both frameformat and scroll format.

DESCRIPTION OF EMBODIMENTS

The following Description of Embodiments is organized as follows:

1. Key definitions 41 2. General definitions 60 3. Advantages 89 4.Short overview 108 5. Expanded overview 124 6. Single-point-of-accesscyber system architecture 205 7. Universal interactive operating system224 8. Cyber communications network 397 9. Input output device 425 10.Cyber communications network between an input 508 output device and apoint of cyber access computer 11. Point of cyber access computer 52212. Cyber telephone system 599 13. Cyber communications network betweena sender's 617 point of cyber access computer and a recipient's point ofcyber access computer 14. An individual's cyber asset manager and the629 individual's device-based cyber assets 15. Cyber communicationsnetwork between an individual's 644 cyber asset manager and theindividual's remote device-based cyber assets 16. Examples of use of thesingle-point-of-access cyber 656 system

(1) KEY DEFINITIONS

The meanings and definitions for the following list of key words and keyphrases shall be used when key words and phrases from this list are usedthroughout this patent application.

Cyber: any activity, device, system, process, procedure, or file whichuses non-biological processing for any purpose.

Cyber activities: use of any component or resource of the single pointof access cyber system by an individual, or by a cyber device.

Private cyber activities: an individual's use of any component orresource of the single-point-of-access cyber system wherein all othersand the cyber devices of all others are excluded from the individual'scyber activities.

Public cyber activities: an individual's use of any component orresource of the single-point-of-access cyber system which includesothers or the cyber devices of others as a part the individual's cyberactivities.

Cyber assets: an Individual's cyber devices or cyber files.

Device-based cyber assets: an individual's cyber devices.

File-based cyber assets: an individual's cyber files.

Cyber content: cyber files which, after processing, can be perceived byan individual through the individual's use of an input output device.

Cyber device: a physical or virtual device which directly or indirectlyuses non-biological processing to achieve any purpose or function.

Cyber resources: the cyber files and cyber devices of others. Others maymake copies of their file-based cyber assets available to an individualby providing the individual with a copy of the others file based cyberasset. The copy of the other's file-based cyber asset which is madeavailable to the individual is a cyber resource. Others may also havedevice-based cyber assets which are also considered to be device-basedcyber resources when they are shared with another individual.

Individual: any one person, or any singular entity that uses thesingle-point-of-access cyber system.

Entity: any business, government, school, organization, or othermulti-individual group that has its own single-point-of-access cybersystem identification.

Identity: the single-point-of-access cyber system requires that eachindividual who uses the single-point-of-access cyber system, and thateach cyber device that is a part of the single-point-of-access cybersystem, have one and only one single-point-of-access cyber systemidentification. An individual's single-point-of-access cyber systemidentification or a cyber device's single-point-of-access cyber systemidentification can also be considered to be the individual'ssingle-point-of-access cyber system identity or the cyber device'ssingle-point-of-access cyber system identity.

Established identity: the first step in the single-point-of-access cybersystem identification process is when the identity of an individual orthe identity of a cyber device is first established by a cyber device.

Verified identity: the cyber device which establishes the identity of anindividual or a cyber device will then provide verification of theidentity of the individual or the cyber device for all further cyberinteractions of the individual or the cyber device.

Confirmed identity: a cyber device which receives verification of theidentity of an individual or of a cyber device can then confirm theverified identity of the individual or the cyber device.

Properly identified: an individual or a cyber device whose identity hassuccessfully been established, verified, and/or confirmed as required bysingle-point-of-access cyber system processes, procedures, andprotocols.

Programming: computer programs or applications or any usable partthereof which serve any purpose.

(2) GENERAL DEFINITIONS

The meanings and definitions for the following list of words and phrasesshall be used when words and phrases from this list are used throughoutthis patent application.

Operational access: access to a cyber device for the purpose ofoperating the cyber device in order to use the resources of the cyberdevice.

Administrative access: access to a cyber device for the purpose ofinteracting with the administrative functions of the cyber device.

Cyber access: access (in any form) to any cyber device or any cyberactivity.

Cyber address: the single-point-of-access cyber system unique locationaladdress information or data for a cyber device.

Cyber identification: the single-point-of-access cyber system uniqueidentification information or data for an individual or a cyber device.

Computer: a physical or virtual device that may use a processor, memory,storage, user interface, and an interconnection structure to process,access, store, modify, run, use, share, delete, or copy cyber files,code, and/or data.

Point of cyber access computer: a single-point-of-access cyber systemcomputer which further includes a separate and distinct private computeras well as a separate and distinct public computer.

Private computer: a single-point-of-access cyber system computer whichis a part of an individual's point of cyber access computer. A privatecomputer can only be accessed by the individual and can only be accessedthrough the individual's point of cyber access computer.

Public computer: a single-point-of-access cyber system computer which isa part of an individual's point of cyber access computer. A publiccomputer can be accessed by others and can only be accessed through theindividual's point of cyber access computer.

Cyber communication: use of single-point-of-access cyber systemtelephone or video telephone service, or use of single-point-of-accesscyber system mail or message service.

Cyber communications network: the single-point-of-access cyber systemcommunications network (communication nodes and paths) which is used forinterconnected transfer of cyber interactions between cyber devices.

Cyber files: a file which requires non-biological processing within orfor use by a cyber device.

Cyber interaction: a cyber exchange which is sent from a cyber deviceand is received by a separate and different cyber device.

Cyber System: any physical or virtual system that uses non-biologicalprocessing to achieve any purpose or function.

Cyber telephone device: an input output device which is configured tosend or receive cyber telephone communication interactions.

Cyber vault: a cyber environment where the individual who is the ownerof the cyber vault can exclude cyber vault access from the cyberinteractions of all others and from the cyber interactions of the cyberdevices of all others. Cyber files and cyber devices including computersmay be contained within a cyber vault. An individual's private computercan be considered to form the physical construct of the individual'scyber vault.

Cyber site: the single-point-of-access cyber system equivalent of aprior art internet web site.

Device: a mechanical or a cyber device or a combination thereof. Anycyber device may be a virtual device or a physical device, or acombination thereof.

Frames and scrolls format: a format for creating and using interactiveimage based cyber content which uses the pixel resolution grid from aframe formatted image or a scroll formatted image to identify thelocation of an individual's interaction with that specific image.

Frame: a cyber image with a pixel resolution grid size that does notexceed the size of both the height and the width of the pixel resolutiongrid of the cyber image output device where the image will be displayed.

Scroll: a cyber image with a pixel resolution grid height or width sizewhich is larger than the corresponding height or width size of one orboth of the dimensions of the pixel resolution grid of the cyber imageoutput device where the image will be displayed.

Input output device: a cyber input device or a cyber output device or acyber input and output device.

Thin Device: a thin device provides limited processing functions, and,may provide only the processing functions that are needed for theoperation of the thin device alone. A thin device thereby relies on aseparate device to send interactions that are ready to be used by thethin device.

Pre-processed cyber interaction: a cyber interaction that is in a statewhere it can be used by a thin device.

System: more than one process, procedure, or device which are configuredtogether to perform or provide one or more functions.

Manage: store, access, use, make available to others, copy, remove,delete, move, name, or rename a cyber file.

Others: any individuals who are not “the individual”, “an individual”,or “said individual”.

User: an individual who uses the single point of access cyber system.

(3) ADVANTAGES

Prior art cyber systems have many significant problems. The mostsignificant of these problems is that the prior art systems cannotprovide adequate and reasonable levels of safety, security, and privacy.

To that point, it is important to recognize that prior art cyber systemsare not capable of accurately and reliably identifying one single personwhile that person is using cyber assets or resources. This, in turn,leads to the prior art system's inability to accurately and reliablyhold any individual accountable for that individual's own cyberactivities.

Further, if an individual's cyber assets are unable to accurately andreliably identify the individual as always being one, and only one,specific and unique individual, then the individual's cyber assets arealso unable to accurately and reliably keep others from gaining accessto the individual's personal and private cyber assets.

The single-point-of-access cyber system of the present invention,through use of its processes, procedures, architecture, programming, anddevices, incorporates the system-wide use of accurate and reliableidentity as a tool to provide each and every individual with not onlyextremely high levels of safety, security, and privacy while using cyberassets or resources of any kind, but also with absolute safety,security, and privacy for each individual's own personal and privatecyber activities and cyber assets.

The use of accurate and reliable identity alone will not provide thehighest attainable levels of cyber safety, security, and privacy.

The prior art system's unbelievably complex environment also contributesgreatly to its inability to provide each individual with adequate andreasonable levels of cyber safety, security, and privacy.

The single-point-of-access cyber system of the present invention uses ofa best performing blend of: as simple as possible; as concise aspossible; and, as efficient as possible; as a strategy that is appliedto all aspects of the cyber system.

Use of simple, concise, and efficient as an environment-wide strategyenables the single-point-of-access cyber system of the present inventionto achieve the highest levels of cyber safety, security, and privacythat may be obtained. Through use of the single-point-of-access cybersystem, the unbelievably complex environment that has always plaguedprior art cyber systems can be eliminated.

One example of the single-point-of-access cyber system's use of assimple, as concise, and as efficient as possible, is its architecturethat integrates all cyber activities, all cyber assets, and all cyberresources into the operation of one single system. This system providesfor: phone; television; computing; remote device integration; personalhealth devices; etc.; to all operate as a part of one system that usesone, and only one, as simple, as concise, and as efficient as possibleuniversal interactive operating system.

Perhaps the most benefit any individual may gain from their use of cyberassets is the benefit that can be derived by first collecting, and thenusing, the individual's own personal and private data. This cyberfunction can, among many other things, provide the individual withtechnology-based augmentation to the individual's natural cognitive andperceptive capabilities. An individual's use of cyber augmentation tothe individual's natural cognitive and perceptive capabilities issimilar in concept to an individual's use of an automobile to augmentthe individual's own natural ability to move from one location toanother.

Further, each individual may also derive benefit from use of their ownbody of collected data when the individual's cyber assets use the datato predict, and be prepared to provide for, whatever cyber assets orcyber resources the individual may want or need now, and in the future.

The single-point-of-access cyber system of the present inventionprovides for each individual to have absolute safety, security, andprivacy for all of their own personal and private computing activitiesand assets. It is essential and of utmost importance that no others evergain access to the personal and private cyber activities and assets ofan individual.

The following six steps embodied in this single-point-of-access cybersystem solve the majority of the problems of prior art cyber systems. Inaddition, the method steps which are embodied in the disclosedsingle-point-of-access cyber system also solve many of the existingproblems with the prior art cyber environment.

a. Each cyber device and each individual who uses the disclosedsingle-point-of-access cyber system and method will always be requiredto be properly identified.

b. Each individual who uses the disclosed single point of access cybersystem and method will be identified exclusively by the individual's oneand only remotely accessed point of cyber access computer.

c. Each individual who uses the disclosed single point of access cybersystem and method may only gain access to the single point of accesscyber system through the individual's remotely accessible point of cyberaccess computer.

d. The one and only remotely accessible point of cyber access computerof each individual provides and includes a separate and differentcomputer for the processing and support of the individual's privatecyber activities as well as another separate and different computer forthe processing and support of the individual's public cyber activities.

e. Each individual has exclusive access to the part of the individual'sown point of cyber access computer which provides processing and supportfor the individual's private cyber activities.

f. The disclosed single-point-of-access cyber system provides for cybercontent and cyber devices which do not use the single-point-of-accesscyber system's operating system to operate seamlessly when being used asa part of the disclosed single-point-of-access cyber system.

(4) SHORT OVERVIEW

A simplified graphic representation of the disclosedsingle-point-of-access cyber system appears in FIG. 1, wherein anindividual is shown using an input output device. By use of the inputoutput device, a cyber interaction from the properly identifiedindividual gains access to, and is transferred through, the cybercommunications network, and to the individual's point of cyber accesscomputer where the individual's identity is properly established priorto the individual's cyber interaction gaining access to the individual'spoint of cyber access computer. After having gained access to their ownpoint of cyber access computer, the individual, through the individual'scyber interactions, may engage in both private and public cyberactivities. Private cyber activities are for the individual only. Publiccyber activities involve others. By use of the disclosed system, theindividual has complete access control over cyber interactions fromothers. The interoperability provided by the disclosed system enablesthe integration of interactions with any type of cyber devices into thedisclosed system.

The disclosed single-point-of-access cyber system requires that eachindividual be properly identified prior to each step that theindividual's cyber interactions carry out through thesingle-point-of-access cyber system. The disclosedsingle-point-of-access cyber system further requires that each cyberdevice be properly identified prior to each step the cyber device'scyber interactions carry out through the single-point-of-access cybersystem. These identification requirements for the individual and for thecyber devices provide a safe, secure cyber environment for all who usethe single-point-of-access cyber system. These identificationrequirements for all individuals and for all cyber devices are alsonecessary to enable the disclosed single-point-of-access cyber system toprovide every individual with the ability to have a full range of cyberpersonal rights as well as a full range of cyber property rights.

The disclosed single-point-of-access cyber system provides a singleportal where an individual gains access to cyber interactions, to cybercommunications, to the individual's cyber assets, and to cyberresources. By providing an individual with one and only one portal foraccess to cyber interactions, to cyber communications, to cyberactivities, to the individual's cyber assets, and to cyber resources,the individual is provided with enormous advantages over prior art cybersystems and prior art communications systems.

The disclosed single-point-of-access cyber system and method provide astandard set of cyber processes and cyber procedures for interconnectedcyber interactions with remote cyber devices. This feature of thesingle-point-of-access cyber system provides any device or any cyberdevice with the ability to be easily configured to be used as anintegral part of the single-point-of-access cyber system.

The architecture, devices, processes, and procedures of thesingle-point-of-access cyber system provide a private, safe, securecyber environment for use by an individual. A private, safe, securecyber environment for an individual's cyber activities must be providedbefore cyber personal rights, cyber property rights, and cyber privacyrights can be provided.

As compared to prior art cyber systems, where most computer programs usetheir own unique processes, procedures, and programming, the disclosedsingle-point-of-access cyber system of the present invention providescomputer programs with standard processes, procedures, and programming.This system-wide use of standard processes, procedures, and programmingprovides enormous advantages for cyber system security, cyber systemsafety, cyber system interoperability, cyber system interconnectivity,and overall cyber system simplicity.

Through an individual's exclusive use of the individual's privatecomputer which is within the individual's point of cyber accesscomputer, the disclosed single-point-of-access cyber system provides theindividual with the ability to safely, securely, and privately store andaccess, use, and manage the individual's cyber-based information and theindividual's file-based cyber assets. This use of the individual'sprivate computer creates a cyber environment where cyber-basedinformation and file-based cyber assets attain long-term value which issimilar to that of their tangible counterparts.

The disclosed single-point-of-access cyber system provides an individualwith the ability to selectively, safely, securely, and privately shareall, or any part of, the individual's cyber-based information orfile-based cyber assets with selected others. This feature of thesingle-point-of-access cyber system provides an individual with theability to have full control over access by others to all, or any partof, the individual's cyber-based information or file-based cyber assets.

The requirement of the single-point-of-access cyber system that cyberinteractions be sent to a recipient as pre-processed images drasticallyreduces the recipient's need for processing resources as well as thecyber communications network's need for the cyber resources that areused for the transfer of interconnected cyber activities and cyberinteractions.

The disclosed single-point-of-access cyber system's use of pre-processedimage-based cyber interactions eliminates the risk of a receivingmalicious content in a cyber file that would need to be processed intoimage-based content by the recipient.

The disclosed single-point-of-access cyber system provides a thin inputoutput device for an individual's use. The thin input output deviceprovides the individual with the ability to gain safe and secure remoteaccess to the individual's point of cyber access computer. After havingbeen properly identified, the individual may gain access to theindividual's cyber telephone system, to cyber interactions with others,and to cyber interactions with the individual's cyber assets and cyberresources. The thin input output device, provides the individual withinterconnected cyber interactions with the individual's remote point ofcyber access computer.

The thin input output device facilitates maximum utility and mobilityfor the individual's use of the single-point-of-access cyber systembecause the thin input output device provides the individual with theability to gain safe, secure, and private access to the individual'spoint of cyber access computer from any location. Further, the thininput output device requires a minimum amount of cyber resources at thephysical location of the individual.

The disclosed single-point-of-access cyber system provides for acomplete and full-featured, yet less complex, cyber system. This altersthe need found in prior art systems for more computer processingcapabilities for use with future cyber system enhancements andimprovements. Use of the disclosed single-point-of-access cyber systemwill eliminate the need for development of bigger, better, faster, andmore capable cyber processors. Encryption is the backbone of prior artcyber security. However, bigger, better, faster, more capable cyberprocessors could eventually have capabilities to regularly decipherencrypted cyber files thereby overcoming encryption based prior artcyber security measures.

The disclosed single-point-of-access cyber system's ability to convertcyber content and cyber interactions to and from a universal interactiveoperating system standard format provides any cyber device, cybercontent, cyber interaction, or cyber activity which does not use theuniversal interactive operating system with the interoperability tointeract with an individual at an input output device or to interactwith a cyber device which uses the universal interactive operatingsystem. The conversion process which is a component of the disclosedsingle-point-of-access cyber system assures that a cyber device or cybercontent or cyber interactions or cyber activities which are supported bya process for conversion to and from the universal interactive operatingsystem format will not become obsolete.

As an example, the cyber processes and cyber procedures of the universalinteractive operating system, through use of captured images from avideo camera, can convert a very old and generally obsolete form ofcommunication such as Native American Indian smoke signals, to a textmessage, or to a voice message, or to a system command, or to a cyberfile.

As a further example, digital photos which were stored in cyber filesusing a prior art format from the late 1980's can be converted forinteroperable use by the universal interactive operating systemcomponent of the single-point-of-access cyber system. Therefore, thedigital photos in a late 1980's cyber format can be used by anindividual as long as the universal interactive operating systemcomponent of the single-point-of-access cyber system is made availablefor use by the individual.

(5) EXPANDED OVERVIEW

The disclosed single-point-of-access cyber system and method of thepresent invention are a combination of processes, procedures, programs,system architecture, device architecture, and cyber devices whichtogether provide a safe and secure cyber environment for one or moreindividuals. In the provided safe and secure cyber environment anindividual can have interoperable access to any desired and availablecyber function. In addition, the disclosed single-point-of-access cybersystem provides the individual with complete cyber privacy for theindividual's personal and private cyber activities. Also, the disclosedsingle-point-of-access cyber system provides the individual with varyinglevels of cyber privacy as specified by the individual for theindividual's public cyber activities.

As shown in FIG. 1, the three primary devices which make up thesingle-point-of-access cyber system 10 of the present invention are aninput output device 100, a point of cyber access computer 200, and acyber communications network 300.

The architecture of the single-point-of-access cyber system 10 shown inFIG. 2 establishes a simple, concise, safe, and secure array ofefficient paths for cyber interactions among an individual, cyberassets, cyber resources, and others.

The important cyber device architectural features and systemarchitectural features which make up the single-point-of-access cybersystem 10 are:

(a) integration of all of an individual's private and publicinterconnected cyber activities into one system;

(b) integration of all of an individual's private and public cyberactivities and cyber interactions into the operations of one point ofcyber access computer 200; and

(c) the point of cyber access computer 200.

A still better understanding of the disclosed system may be had byunderstanding that the individual's point of cyber access computerincludes a separate private computer 230 shown in more detail in FIG. 13and a separate public computer 260 (shown in more detail in FIG. 14).The separate private computer 230 provides separate processing andsupport for the individual's private cyber activities. The separatepublic computer 260 provides separate processing and support for theindividual's public cyber activities.

The individual's separate private computer 230 serves as a cyber vault.By functioning as a cyber vault, the individual's private computer 230provides the individual with safety, security, and privacy for all ofthe individual's personal and private cyber activities. The individual'sseparate public computer 260 provides for cyber interactions between theindividual and others.

As shown in FIGS. 1 and 2, the single-point-of-access cyber system 10includes a secure thin input output device 100. Thin input output device100 provides for remote cyber interactions between the individual andthe individual's point of cyber access computer 200.

The single-point-of-access cyber system 10 provides for storage of alifelong collection of the individual's file-based cyber assets.

The primary processes, procedures, and programs which make up thesingle-point-of-access cyber system 10 are:

(a) system-wide processes and procedures which identify each cyberdevice and each individual that is interacting with the disclosedsingle-point-of-access cyber system;

(b) a system-wide requirement that each individual using the disclosedsingle-point-of-access cyber system be properly identified prior to eachstep the cyber interactions of the individual carry out through thesingle-point-of-access cyber system;

(c) a system-wide requirement that each cyber device using the disclosedsingle-point-of-access cyber system be properly identified prior to eachstep each cyber interactions of the cyber device carries out through thesingle-point-of-access cyber system;

(d) a universal interactive operating system;

(e) a process for creating and using interactive cyber content;

(f) a process for providing cyber content interoperability bytranslating cyber content to and from a single-point-of-access cybersystem cyber content format;

(g) a procedure which requires a sender to send only pre-processimage-based cyber content to a recipient;

(h) a process for providing interoperability that translates cyberinteractions to and from a single-point-of-access cyber system standardformat;

(i) separate processing and support by a separate private computer forthe private cyber activities of the individual; separate processing andsupport by a separate public computer for public cyber activities;

(j) processes and procedures which exclude cyber interactions from allothers and cyber interactions from the cyber devices of all others fromgaining access to the individual's private computer;

(k) processes and procedures which provide an individual with exclusiveand complete administrative control, operational control, and accesscontrol of the individual's point of cyber access computer, theindividual's public computer, the individual's private computer, and theindividual's device-based cyber assets; and

(l) processes and procedures for providing an individual with theability to selectively grant or deny specified others access to theindividual's point of cyber access computer, to the individual's cybertelephone system, to the individual's public computer, and to theindividual's cyber resources which are available through theindividual's public computer.

The foundation for the disclosed single-point-of-access cyber system 10,as shown in FIG. 3, is the requirement that each individual and eachcyber device be properly identified prior to each step the cyberinteractions of the individual or the cyber device carry out through thesingle-point-of-access cyber system.

This foundational requirement for proper identification of theindividual, others, and every cyber device provides the safe and securecyber environment which provides a level of cyber safety, cybersecurity, and cyber privacy that far exceeds what is found in prior artsystems. This foundational requirement also establishes a frameworkwhich supports cyber personal rights, cyber privacy rights, and cyberproperty rights for every individual.

An individual is provided only one unique lifelongsingle-point-of-access cyber system identification. This unique lifelongsingle-point-of-access cyber system identification, when combined withthe single-point-of-access cyber system address of the individual'spoint of cyber access computer 200, provides all that others need toknow to contact the individual for any cyber interaction or any cyberactivity.

As shown in FIGS. 1, 2, and 3, the single-point-of-access cyber system10 also includes a thin input output device 100. The input output device100 provides the individual with the ability to use the input outputdevice 100 for secure remote cyber interactions with the individual'sone and only point of cyber access computer 200. An example of an inputoutput device 100 appears in FIGS. 16A-16F.

As shown in FIG. 16B, for example, the input output device 901 mayinclude two screens 903 & 905 hinged together like a book. As shown inFIG. 16C, a stylus 907 may be used by the individual for interactionwith the input output device 901. Further adaptability of the inputoutput device appears in FIG. 16D where screen 905 may be rotated withrespect to screen 903. Once rotated, screens 903 & 905 may be foldedback together as shown in FIG. 16E. When folded together as in FIG. 16Fthe individual may again use a stylus 907 to interact with one of thescreens on the input output device. Each configuration of the inputoutput device 901 may relate to a different functionality provided tothe individual by the input output device 901.

Those with ordinary skill in the art will understand that the inputoutput device 901 shown in FIGS. 16A-16F is but one of many differenttypes of devices which may serve as an input output device 100 which canbe used with the disclosed single-point-of-access cyber system 10.

As shown in FIG. 3, an individual, through use of the input outputdevice 100, communicates information to the individual's point of cyberaccess computer 200. This communication first allows the individual'spoint of cyber access computer 200 to establish the individual'sidentity. After the individual's identity has been established by theindividual's point of cyber access computer 200, the individual gainsaccess to any of the cyber assets and the cyber resources which areavailable to the individual through the individual's point of cyberaccess computer 200.

Once the individual's identity has been established by the individual'spoint of cyber access computer 200, the individual's point of cyberaccess computer 200 provides the individual with an array offunctionalities including but not limited to: computing capabilities;computer programs, computer applications; a cyber telephone; a cybervideo telephone; cyber messaging; cyber mail; cyber television; cybervideo entertainment; cyber radio; cyber music; verification of theindividual's identity for all of the individual's public cyberactivities; cyber interactions with the individual's cyber assets; cyberinteractions with others; and cyber interactions with the cyberresources of others. Further, the individual is provided with the optionto have exclusive operational control of the individual's point of cyberaccess computer's: operational functions, system access functions,systems management functions, and systems configuration functions.

The point of cyber access computer 200 includes two additional andseparate computers for two separate areas of operation which are:

(a) the individual's private computer 230, shown schematically ingreater detail in FIG. 13, which can only be accessed by the cyberinteractions of the individual and the cyber interactions of theindividual's device-based cyber assets; and

(b) the individual's public computer 260, shown schematically in greaterdetail in FIG. 14, which provides specified others with access tospecified cyber resources which have been made available to specifiedothers by the individual.

The private computer component 230 of the individual's point of cyberaccess computer 200 establishes a new dimension for an individual'scyber activities. This new dimension is a high level of privacy, safety,and security that is not provided by systems in the prior art.

Only the cyber interactions of the individual and the cyber interactionsof the individual's device-based cyber assets can gain access to theindividual's private computer 230. Only after the individual's point ofcyber access computer 200 has established the individual's identity orthe identity of the individual's device-based cyber assets will accessbe granted to the individual's private computer 230. This means that thecyber interactions of no others can gain access to the individual'sprivate computer 230. This feature of the single-point-of-access cybersystem 10 provides the individual with absolute privacy, safety, andsecurity for the individual's cyber activities which occur within theindividual's private computer 230.

An individual's point of cyber access computer 200 may contain theentire working collection of the individual's file-based cyber assetsand file-based cyber resources.

Through use of their own private computer 230, the individual has accessto one or more of the following: computing capabilities; computerprograms; computer applications; a cyber telephone; a cyber videotelephone; cyber messaging; cyber mail; cyber television; cyber videoentertainment; cyber radio; cyber music; and cyber interactions withavailable cyber resources of others. Further, through the individual'suse of their own private computer 230, the individual is provided withthe option to have exclusive operational control of the individual'spoint of cyber access computer's, the individual's private computer's,and the individual's public computer's: system management functions;system configuration functions; and system access functions. Theindividual is also provided with operational control of the accesscontrol functions for the individual's cyber resources which are madeavailable for use by specified others.

An individual's cyber assets include all of the individual's cyberdevices, programs, applications, processes, procedures, and files whichuse non-biological processing.

Cyber assets are the sole property of one specific individual. Anindividual can share any part of the individual's file-based cyberassets with specified others. When the individual makes a copy of theindividual's file-based cyber asset available for specified others it ismade available through the individual's public computer 260. Copies ofthe individual's file-based cyber assets which are made available tospecified others through the individual's public computer 260 are calledcyber resources.

An individual's file-based cyber assets include, but are not limited to,one or more of the following: personal records; financial records;health records; cyber history; photographs; cyber books; cybermagazines; music; videos; computer programs; computer applications; andcyber files of any type.

An individual's device-based cyber assets, at a minimum, consist of theindividual's point of cyber access computer 200. The individual'sdevice-based cyber assets can also include, but are not limited to, oneor more of the following: an input output device; an audio output/videodisplay device; a cyber telephone device; a health monitoring device; avehicle; a cyber file backup-and-restore device; a video camera; a homeor office cyber automation device which may control, and/or, monitorlights, locks, security system, thermostat, refrigerator, lawn sprinklersystem, water heater operation, water or electric consumption, garagedoor opener, dog door, printer, private weather station, etc.; or a GPSposition locating device; and any other device-based cyber assets withwhich an individual may interact.

As shown in FIG. 3, security processes and procedures are used for allinbound cyber activities, for all inbound cyber interactions, and forall inbound cyber content which transfer to the individual's privatecomputer 230 from the individual's point of cyber access computer 200 orfrom the individual's public computer 260.

Also as shown in FIG. 3, the individual's public computer 260 is theindividual's only portal for: all cyber activities; all cyberinteractions; and the transfer of all cyber content to and from others.

An individual's point of cyber access computer 200 provides verificationof the individual's identity for all of the individual's outbound cyberactivities and for all of the individual's outbound cyber interactions.

The single-point-of-access cyber system mandates that the devices withinthe cyber communications network 300 between the input output device 100and the point of cyber access computer 200, which comes in first contactwith a sender's cyber interactions, establishes the identity of thesender's point of cyber access computer and the input output device thatis being used by the sender prior to transferring the sender's cyberinteractions. The device within the cyber communications network 300which comes in first contact with the sender's cyber interaction fromthe sender's point of cyber access computer is subsequently required toprovide verification of the identity of the sender's point of cyberaccess computer 200 prior to each step the sender's cyber interactiontakes through the single-point-of-access cyber system 10.

For a cyber interaction from an other to gain access to the individual'spoint of cyber access computer 200, the individual's point of cyberaccess computer 200 must have received verification of thesingle-point-of-access cyber system identification of the other. Thenthe individual's point of cyber access computer 200 must confirm theother's verified identity. Once the verified identity of the other hasbeen confirmed, the cyber interaction from the other can then be grantedaccess to the individual's point of cyber access computer 200.

Others gain access to the individual's point of cyber access computer200 and to the individual's public computer 260 for the purposes ofcyber activities and cyber interactions.

An individual has the ability, through use of the access and managementfunctions of the individual's separate private computer 260, to specifyto whom the individual grants or denies access to:

the individual's point of cyber access computer 200;

the individual's cyber telephone system 270; and

the individual's public computer 260.

Further, the individual can grant or deny each specified other access toall, or any part, of the cyber resources which are available tospecified others through their use of the individual's public computer260.

Others who are granted access to all or part of an individual's cyberresources, or to the individual's cyber telephone system 270, or to theindividual's public computer 260, can only request that the individualor the individual's point of cyber access computer 200, or theindividual's public computer 260, or the individual's private computer230, respond to the other's cyber interaction.

Only the individual, through cyber interactions with the individual'spoint of cyber access computer 200, or the individual's public computer260, or the individual's private computer 230, may send cyberinteractions from the individual's point of cyber access computer 200 toothers.

Others are excluded from gaining operational, access, or administrativecontrol of the individual's cyber resources. Further, others areexcluded from gaining operational, access, or administrative control ofany part of the individual's public computer 260.

Cyber interactions from the individual's point of cyber access computer200 to the input output device 100 that is being used by the individualas shown in FIG. 3 are required to be pre-processed as image or audiobased content prior to being sent, as opposed to sending cyberinteractions as files which need to pre-processed into image or audiobased content by the input output device.

A recipient can respond to a single-point-of-access cyber systemformatted interaction from a sender by communicating to the sender:

(a) the recipient's specific input;

(b) the specific point where the recipient's cyber interaction was made;and

(c) the identification of the sender's specific content which wasperceived by the recipient at the point in time when the recipient'scyber interaction was made.

The disclosed system provides a frames and scrolls format forimage-based cyber content. Using the frames-and-scrolls format, as shownin greater detail in the array of images in FIGS. 18A-18G forimage-based single-point-of-access cyber system content, a recipient canrespond to a cyber interaction from the sender by communicating therecipient's specific input, at the specific point, and on the specificimage which the recipient perceived.

Shown in FIG. 18A, as an example, is a screen which is similar toscreens 903 and 905 shown in FIGS. 16A-16 F the size of the screen is1024 pixels by 768 pixels. An image having a dimension larger than1024×768, such as the 1024 pixels by 3000 pixels image shown in FIG.18D, will not appear in its entirety on a 1024×768 image display screen.Rather, only a portion of the image shown in FIG. 18D will appear at onetime on a screen such as shown in FIG. 18E, or in FIG. 18G using thedisclosed frames and scrolls format. As shown in FIGS. 18E and 18G, thedisclosed scrolls format may be used when one or both of the two imagedimensions are larger than what can be presented at one time on a singlescreen.

As shown in FIG. 3, an individual's point of cyber access computer 200may also include a cyber telephone system 270. The cyber telephonesystem 270 provides for all aspects of the individual's needs or desiresfor cyber telephone services. The individual's cyber telephone system270:

(a) provides a history of cyber telephone system activities;

(b) grants or denies cyber telephone communication interactions fromothers, access to all or any part of the individual's cyber telephonesystem;

(c) routes cyber telephone communications interactions, and relatedcyber alerts, to an input output/cyber telephone device which is on, ornear, the individual, or which is specified for use as a cyber telephonecontact device by the individual;

(d) records messages from inbound cyber telephone communicationsinteractions;

(e) delivers messages to specified others; and

(f) provides any other cyber telephone services or functions which areneeded or desired by the individual.

A key feature of the disclosed single-point-of-access cyber system 10 isthat it has differences among operations, processes, code, transferpackets, and formats for: cyber interactions; cyber telephonecommunications; cyber mail; cyber messages; cyber television; cybervideo entertainment; cyber music; file transfers; computer programs,computer applications; operational controls; and any other required ordesired function. The reason for the use of differences amongoperations, processes, code, transfer packets, and formats is to providefor security between different processes, to assure proper routing, andto assure that cyber interaction for one specific purpose can not andwill not be used for a different purpose.

The single-point-of-access cyber system 10, cyber communications network300 requires that an individual be properly identified prior to eachstep the individual's cyber interactions carry out through thesingle-point-of-access cyber system 10, cyber communications network300.

The single-point-of-access cyber system 10, cyber communications network300 requires each cyber device be properly identified prior to each stepthe cyber device's cyber interactions take through thesingle-point-of-access cyber system 10, cyber communications network300.

The single-point-of-access cyber system 10 requires all cyber activitiesto be properly formatted. Further, the single-point-of-access cybersystem 10 requires all cyber activities keep a history of each step thecyber activities carry out through the cyber communications network 300and through the single-point-of-access cyber system 10.

The single-point-of-access cyber system 10 has policies, procedures, anddevices which are used for cyber interaction among the individual, theindividual's point of cyber access computer 200, the individual'sprivate computer 230, and the individual's remote device-based cyberassets 420 (FIG. 2). These policies, procedures, and devices provide forsafe and secure cyber interactions between the individual's remotedevice-based cyber assets 420 and the individual or the individual'sprivate computer 230 or the individual's point of cyber access computer200. In addition, these policies, procedures, and devices exclude allothers from gaining access to the individual's cyber assets.

Another key feature of the disclosed single-point-of-access cyber system10 is the universal interactive operating system. The programming whichmakes up the universal interactive operating system provides processesand procedures. The processes and procedures provide an interoperableinterconnected cyber environment. Within the interoperable cyberenvironment any cyber device can use the safety and security of thesingle-point-of-access cyber system 10 for interconnected cyberinteractions.

It makes no difference which operating system is used by a sender of acyber interaction or which operating system is used by the recipient ofa cyber interaction as long as the cyber interaction between the senderand the recipient uses the universal interactive operating system of thedisclosed system for interoperable interconnection.

The universal interactive operating system which is used in thedisclosed single-point-of-access cyber system has interoperabilityprocesses which translate cyber interactions, cyber activities, andcyber content to and from standard universal interactive operatingsystem format.

The individual's point of cyber access computer 200, the individual'sprivate computer 230, and the individual's public computer 260, keep ahistory of all cyber activities from within the cyber domain of theindividual.

As shown in FIG. 17, the universal interactive operating systemincludes, for example, resource-efficient processes and procedures whichuse one or more virtual projectors 803, and one or more virtualprojection display screens 805, and one or more virtual recorders orcapture devices 807 to: convert cyber content for interoperability;convert cyber interactions for interoperability; alter images; alteraudio; converge two or more sources of image-based cyber content intoone or more converged sources of image-based cyber content.

(6) SINGLE-POINT-OF-ACCESS CYBER SYSTEM ARCHITECTURE

As shown in FIG. 2, the architecture of the disclosedsingle-point-of-access cyber system 10 defines the interrelationship ofthe components of the disclosed single-point-of-access cyber system 10.The architecture of the single-point-of-access cyber system 10 alsodefines the components of the disclosed single-point-of-access cybersystem 10. Specifically the components of the single-point-of-accesscyber system 10 include architectural rules and requirements, systemstructure, one or more point of cyber access computers 200, one or moreinput output devices 100, one or more cyber devices, a cybercommunications network 300, and a universal interactive operatingsystem. Optionally, the components of the single-point-of-access cybersystem 10 can further include one or more cyber asset managers 250 andone or more cyber telephone systems 270.

The architecture of the disclosed single-point-of-access cyber system 10provides architecture for a cyber system in which one or more point ofcyber access computers 200, and one or more input output devices 100,and one or more cyber devices, have cyber interactions using the cybercommunications network 300 and the universal interactive operatingsystem.

The device architecture which is a part of the disclosedsingle-point-of-access cyber system 10 provides for a point of cyberaccess computer 200, or a private computer 230, or a public computer260, or a cyber device to be a physical device, to be a virtual device,or to be a combination thereof.

The architecture of the disclosed single-point-of-access cyber system 10provides for the addition of, and the removal from, and thereconfiguration of the arrangement of, the cyber processes and the cyberprocedures of the single-point-of-access cyber system 10.

The architecture of the disclosed single-point-of-access cyber system 10provides for the addition of, the removal from, and the reconfigurationof the arrangement of, cyber components and cyber devices which are apart of the single-point-of-access cyber system 10.

The architecture of the disclosed single-point-of-access cyber system 10provides device architecture. The device architecture in turn providesfor separate processing and support for an individual's private cyberactivities, as well as separate and different processing and support foran individual's public cyber activities.

The device architecture of the disclosed single-point-of-access cybersystem 10 further provides for a point of cyber access computer 200which is a combination of three separate, yet interconnected computers.The first computer is the point of cyber access computer 200; the secondcomputer is a private computer 230; and the third computer is a publiccomputer 260. The three separate computers can be integrated into onesingle device, or, one or more of the three separate computers may bephysically separate computers which may also be physically located atone or more locations.

The device architecture of the disclosed single-point-of-access cybersystem 10 provides for the addition of, the removal from, and thereconfiguration of the arrangement of: the components, the cyberprocesses, and the cyber procedures of a single-point-of-access cybersystem cyber device.

The architecture of the disclosed single-point-of-access cyber system 10provides for and requires the use of system-standard interface andinteraction cyber processes and cyber procedures. The system-standardinterface and interaction cyber processes and cyber procedures providean environment of cyber interoperability where any cyber device can beseamlessly used as a part of the single-point-of-access cyber system 10.

According to the architectural rules and regulations of the disclosedsingle-point-of-access cyber system 10, it is an absolute requirementthat the individual's point of cyber access computer 200 establishes orconfirms the identity of the individual, or the identity of others, orthe identity of a cyber device, prior to providing point of cyber accesscomputer access to cyber interactions from the individual, or fromothers, or from a cyber device.

It is also an absolute requirement of the architectural rules andregulations of the architecture of the disclosed single-point-of-accesscyber system 10 that proper identification of each individual is madeprior to each step the cyber interactions of the individual take throughthe single-point-of-access cyber system 10. The architectural rules andregulations also require proper identification of each cyber deviceprior to each step that the cyber interactions of the cyber device takethrough the single-point-of-access cyber system 10.

The architectural rules and regulations require that an individual'sprivate computer 230 can only be accessed by cyber interactions from aninput output device 100 that is being used by the individual or by cyberinteractions from the individual's device-based cyber assets. Further,the architectural rules and regulations require that the individual'sprivate computer 230 can only be accessed through the individual's pointof cyber access computer 200.

The architectural rules and regulations provide for an individual'spublic computer 260 to only be accessed by cyber interactions fromothers who have been granted access by the individual. Further, theindividual's public computer 260 can only be accessed through theindividual's point of cyber access computer 200.

The architecture of the disclosed single-point-of-access cyber system 10provides:

(a) a single interconnected cyber system for use by any individual forall of the individual's cyber interactions and cyber activities;

(b) a system-wide set of standard cyber processes and cyber procedures;

(c) a cyber system which requires each individual, and each cyber devicewhich uses the cyber system, to always be properly identified;

(d) a remotely accessible point of cyber access computer for use byindividuals who use the single-point-of-access cyber system; and

(e) an individual with the ability to remotely access cyber assets andcyber resources.

(7) UNIVERSAL INTERACTIVE OPERATING SYSTEM

The universal interactive operating system is the primary operatingsystem that is used by most of the various components of thesingle-point-of-access cyber system.

The universal interactive operating system provides programming which inturn provides processes and procedures which in turn provide a cyberenvironment wherein cyber activities of every type can be integratedinto one world-wide interconnected cyber system—a cyber system that usesthe universal interactive operating system as a primary operatingsystem.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide an individual with the ability to consolidate access to all ofthe individual's cyber activities into one remotely accessible device.This one remotely accessible device is the individual's one and onlypoint of cyber access computer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide a cyber environment where cyber activities and cyber devices ofevery type can be accessed and used by an individual through theindividual's use of an input output device in conjunction with theindividual's use of the individual's point of cyber access computer.

The universal interactive operating system is designed to minimize thenumber of system-wide operational processes and procedures which areprovided and used by others. This minimization of the number ofsystem-wide operational processes and procedures is accomplished byproviding and requiring the system-wide use of standard operationalprocesses and procedures by others.

The universal interactive operating system provides programming fordevice operating systems for:

(a) point of cyber access computers;

(b) private computers;

(c) public computers;

(d) input output devices;

(e) cyber telephone devices;

(f) cyber communications network devices; and

(g) any other single-point-of-access cyber system device which requiresthe use of an operating system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnrequire and provide processes and procedures to assure that eachindividual is properly identified prior to each step the cyberinteractions of that individual take through the single-point-of-accesscyber system. The processes and procedures requiring identificationfurther assure that each cyber device is properly identified prior toeach step the cyber device's cyber interactions take through thesingle-point-of-access cyber system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide an individual or a cyber device with the ability to establishidentity, confirm identity, or provide verification of the identity ofan individual, or of a cyber device.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide a cyber environment wherein each cyber device which is a part ofthe single-point-of-access cyber system must properly identify eachindividual and every other cyber device prior to having further cyberinteractions with the properly identified individual or the properlyidentified cyber device.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide an individual's point of cyber access computer, or any cyberdevice, with the ability to establish the individual's identity.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnrequire and provide processes and procedures to assure that anindividual's point of cyber access computer establishes the individual'sidentity prior to further cyber interactions between an input outputdevice that is being used by the individual and the individual's pointof cyber access computer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnrequire and provide for an individual's point of cyber access computerto provide others and the cyber devices of others with verification ofthe individual's identity prior to each step that the individual's cyberinteractions take through the single-point-of-access cyber system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnrequire an individual's point of cyber access computer to establish theidentity of the individual's device-based cyber assets, and for theindividual's device-based cyber assets to establish the identity of theindividual's point of cyber access computer prior to any further cyberinteractions between the individual's point of cyber access computer andthe individual's device-based cyber assets.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide an individual's point of cyber access computer with the abilityto confirm the verified identity of others and the verified identity ofthe cyber devices of others prior to further cyber interactions withothers or with the cyber devices of others.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnrequire and provide for devices within the cyber communications networkto establish the identity of an individual's point of cyber accesscomputer upon the individual's point of cyber access computer's firstinteraction with the cyber communications network.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnrequire the device within a cyber communications network whichestablishes the identity of an individual's point of cyber accesscomputer to in turn provide verification of the identity of theindividual's point of cyber access computer prior to each step theindividual's cyber interactions take through the single-point-of-accesscyber system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide an input output device with the ability to capture identityinformation in regard to an individual, then transfer the identityinformation as a cyber interaction to the individual's point of cyberaccess computer where the cyber interaction containing captured identityinformation about the individual can be used by the individual's pointof cyber access computer to establish the individual's identity.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide an individual with the ability to use the single-point-of-accesscyber system identification of an other, or the single-point-of-accesscyber system identification of the device-based cyber assets of another,to obtain additional information about the other or to obtain additionalinformation about the other's device-based cyber assets.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnrequire and assure that each individual has one, and only one,single-point-of-access cyber system identification.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnrequire and provide a cyber environment where there are no individualswho have more than one single-point-of-access cyber systemidentification and there are no cyber devices that have more than onesingle-point-of-access cyber system identification.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide operating-system-based cyber security functions and services foruse throughout the single-point-of-access cyber system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnrequire and provide processes for security for all inbound cyberinteractions and cyber activities that have been sent to an individual'spoint of cyber access computer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnrequire and provide processes for security for all internal cyberinteractions and cyber activities within an individual's point of cyberaccess computer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnrequire and provide processes for security for all outbound cyberinteractions and cyber activities from an individual's point of cyberaccess computer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide an individual with the ability to manage security at each of theindividual's device-based cyber assets including, but not limited to theindividual's point of cyber access computer, the individual's privatecomputer, the individual's public computer, the individual's remotecyber devices, and the individual's cyber telephone system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide differences among cyber operations, processes, codes, transferpackets, and formats for cyber interactions for: cyber telephonecommunications; cyber mail; cyber messages; cyber television; cybervideo entertainment; cyber music; file transfers; computer programs;computer applications; operational controls; and any other needed ordesired functions. The differences among cyber operations, processes,codes, transfer packets, and formats for cyber interactions provides forsecurity between different processes, assures proper routing, andassures that a cyber interaction for one specific purpose cannot be usedfor a different purpose.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which inspectinbound cyber interactions to determine if the inbound cyberinteractions contain dangerous or malicious or inappropriate or unwantedcontent.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which denyfurther access to inbound cyber interactions which contain dangerous ormalicious or inappropriate or unwanted content.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide:

(a) safe and secure cyber interactions between the individual's privatecomputer and the individual's point of cyber access computer;

(b) safe and secure cyber interactions between the individual's privatecomputer and the individual's public computer;

(c) safe and secure cyber interactions between the individual's privatecomputer and the individual's device-based cyber assets; and

(d) safe and secure cyber interactions between the individual's privatecomputer and the individual's cyber telephone system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnrequire and provide processes for security for:

(a) interactions with operations of an individual's device-based cyberassets;

(b) interactions with operations of an individual's file-based cyberassets;

(c) interactions with operations of an individual's cyber resources.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide for and require that security-based administrative cyberinteractions occur between single-point-of-access cyber system devicesas an integral part of a corresponding cyber interaction which is beingtransferred between the same two single-point-of-access cyber systemdevices.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide a system-wide protocol. The system-wide protocol requires othersto have the ability to only request that an individual provide an otherwith a requested cyber interaction. The system-wide protocol furtherrequires that the individual either directly, or through automatedinteraction from the individual's cyber devices, have the exclusiveability to send others cyber interactions from the individual, or fromthe individual's point of cyber access computer, or from theindividual's public computer, or from the individual's cyber telephonesystem. No others have the ability to send cyber interactions from theindividual, or from the individual's point of cyber access computer, orfrom the individual's public computer, or from the individual's cybertelephone system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnrequire and provide for the deletion of any cyber interaction which wasfrom an individual or from a cyber device which cannot be properlyidentified.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide for the identification of, and the deletion of cyberinteractions which contains dangerous, or malicious, or inappropriate,or unwanted, or improperly labeled or identified contents.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that use (seeFIG. 17) the combination of one or more virtual projectors 803, one ormore virtual projection display screens 805, and one or more virtualrecorders or capture devices 807 to provide cyber security by convertingcyber content from cyber interactions which are not in universalinteractive operating system standard image-based cyber content formatto cyber interactions which are in universal interactive operatingsystem standard image-based cyber content format.

The universal interactive operating system provides programming which inturn provides processes and procedures which provide encryption andother cyber security processes and cyber security procedures for usewith any desired cyber interaction or cyber activity.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnrequire and provide encryption and other cyber security processes andcyber security procedures be used for cyber interactions which use radiofrequency signals for cyber communication.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures for backing upstored information from, as well as restoring backed up information to:

(a) an individual's point of cyber access computer;

(b) an individual's private computer;

(c) an individual's public computer;

(d) an individual's cyber telephone system;

(e) an individual's device-based cyber assets.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures for safe, secure,and private cyber financial interactions, cyber financial transactions,and the operation of cyber-based financial record keeping systems.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide safe, secure, and private cyber interactions between anindividual through the individual's use of their own point of cyberaccess computer and any health care related cyber device or any healthcare related cyber resource which is being relied upon by theindividual.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide the ability to use varying levels of security for access to, andoperations of, different parts and the operation of thesingle-point-of-access cyber system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide an individual with the ability to selectively grant orselectively deny cyber interactions from specified others, or cyberinteractions from the specified cyber devices of specified others,access to the individual's point of cyber access computer, access to theindividual's cyber telephone system, and access to the individual'spublic computer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide an individual with the ability to make copies of theindividual's file-based cyber assets available for specified others ascyber resources. Cyber resources are made available to specified othersthrough the individual's public computer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that provide anindividual with the ability to selectively grant or selectively denycyber interactions from specified others, or cyber interactions from thecyber devices of specified others, access to all or any part of thecyber resources which have been made available for specified othersthrough their use of the individual's public computer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that provide anindividual with the ability to safely and securely provide specifiedothers specified levels of administrative control, or specified levelsof access control, or specified levels of operational access control ofall, or any part of, the individual's point of cyber access computer,the individual's private computer, the individual's public computer, theindividual's device-based cyber assets, the individual's file-basedcyber assets, or the individual's cyber telephone system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide an individual with the ability to provide specified others withspecified cyber resources, specified cyber content, and specified cyberservices of any type.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that convertcyber interaction output from cyber devices that do use the universalinteractive operating system to cyber interaction output that interactsseamlessly with the operating systems of cyber devices that do not usethe universal interactive operating system component of the disclosedsingle-point-of-access cyber system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that convertcyber interaction output from cyber devices which do not use theuniversal interactive operating system to cyber interaction output thatinteracts seamlessly with cyber devices that do use the universalinteractive operating system component of the disclosedsingle-point-of-access cyber system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide interoperability processes to convert cyber content that is notin a format that can directly be used by the single-point-of-accesscyber system to cyber content that is in the standard universalinteractive operating system format.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnprovide interoperability processes that convert cyber content that is ina standard universal interactive operating system format to cybercontent that is in a format which can be used by a cyber device using anoperating system other than the universal interactive operating systemportion of the disclosed invention. The combination of this and theprevious three processes and procedures immediately above is the reasonthe interactive operating system is described as being universal.

The universal interactive operation system provides programming which inturn provides and enables the processes and procedures which in turnprovide an environment of cyber interoperability. The environment ofcyber interoperability provides an individual with the ability to accessand interact with any available cyber device or any available cybercontent.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that use (seeFIG. 17) one or more virtual projectors 803, one or more virtualprojection display screens 805, and one or more virtual recorders orcapture devices 807 to convert inbound image-based cyber content thatcannot be used by the universal interactive operating system standardimage-based cyber content format to image-based cyber content that canbe used by the universal interactive operating system standardimage-based cyber content format.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that provide forsafe and secure cyber interactions with content and deviceinteroperability conversion processes.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that provide forsafe and secure cyber interactions with output from content and deviceinteroperability conversion processes.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that convertadministrative cyber interactions and systems configuration cyberinteractions between cyber devices, to and from system-standarduniversal interactive operating system format.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that identifyinbound or outbound cyber interactions that require content or deviceinteroperability conversion.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that provide anindividual with the ability to use operating systems other than theuniversal interactive operating system which is a part of thesingle-point-of-access cyber system of the disclosed invention. Theindividual may require the use of an operating system other than theuniversal interactive operation system of the disclosed invention forthe purpose of converting cyber content and cyber interactions that canbe used by operating systems other than the universal interactiveoperating system, to cyber content and cyber interactions that can beused by the universal interactive operating system. Further, theindividual may require the use of an operating system other than theuniversal interactive operating system for the purpose of using computerprograms or computer applications that require the use of an operatingsystem other than the universal interactive operating system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that exclude allothers, and the cyber devices of all others, from gaining operationalcontrol, or administrative control, or access control of an individual'spoint of cyber access computer, or the individual's private computer, orthe individual's device based cyber assets.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that exclude allothers, and the cyber devices of all others, from gaining administrativecontrol, or access control of an individual's public computer, or of theindividual's cyber telephone system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that provide forthe use of outbound cyber interactions that have been pre-processed bythe sender. The pre-processed cyber interactions of the sender are readyto be used by a thin input output device with no further contentprocessing required.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnrequire and provide for a sender to pre-process outbound cyberinteractions so that the outbound cyber interactions are ready to beused by a thin input output device with no further content processingrequired.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which in turnrequire and provide for cyber interactions that are sent from anindividual's point of cyber access computer to the thin input outputdevice that is being used by the individual to be pre-processed cyberinteractions which require no further processing of content prior to useby the individual at the thin input output device.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures requiring andproviding for the use of single-point-of-access cyber system addressesand single-point-of-access cyber system identifications at each step ofeach cyber interaction.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that provide anindividual with the ability to request or require that others onlyprovide the individual with cyber interactions and cyber content thatcomply with all of the individual's preferences or requirements forcyber interactions and for cyber content.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that provide anindividual with the ability to request, or require others, provide theindividual with varying levels of privacy, as defined by the individual,for the individual's cyber interactions with others.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that provide anindividual with the ability to add cyber components and cyber devices tothe single-point-of-access cyber system, to remove cyber components andcyber devices from the single-point-of-access cyber system, and tochange the configuration of the cyber components and the cyber devicesof the single-point-of-access cyber system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that provide anindividual with the ability to:

(a) add processes and procedures to the single-point-of-access cybersystem;

(b) remove processes and procedures from the single-point-of-accesscyber system;

(c) change the configuration of the processes, and the procedures of thesingle-point-of-access cyber system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that provide anindividual with the ability to:

(a) add cyber processes, cyber procedures, and components to a cyberdevice;

(b) remove cyber processes, cyber procedures, and components from acyber device;

(c) Change the configuration of the cyber processes, the cyberprocedures, and the components of a cyber device.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that allow anindividual's single-point-of-access cyber system cyber devices, cybercomponents, cyber processes, and cyber procedures to be configured.Providing an individual with the ability to re-configure theindividual's single point-of-access cyber system cyber devices, cybercomponents, cyber processes, and cyber procedures provides for thevarying needs and desires of different and unique individuals. Further,individuals that are entities such as businesses, or schools, orgovernments, or any other type of entity which uses asingle-point-of-access cyber system identification, can have manydifferent and specific needs for single-point-of-access cyber systemcyber devices, cyber components, cyber processes, cyber procedures, andcyber system configurations.

The universal interactive operating system provides programming which inturn provides and enables the interoperability cyber processes and cyberprocedures that provide an individual with the ability to seamlessly useany non-system-standard cyber activity, or any non-system-standard cyberprocess, or any non-system-standard cyber device which the individualmay require or desire.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that provide forthe interrelationship between the cyber components, the cyber devices,the cyber processes, and the cyber procedures of thesingle-point-of-access cyber system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that provide forcyber interactions between the cyber components, the cyber devices, thecyber processes, and the cyber procedures of the single-point-of-accesscyber system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that provide anindividual, through their use of an input output device, with aperceptible output. This perceptible output is the result of theindividual's interaction with the input output device.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures that provide anindividual with operational access to the individual's point of cyberaccess computer from any remote input output device which can provideadequate information to the individual's point of cyber access computerto allow the individual's point of cyber access computer to establishthe individual's identity.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provideseamless cyber interactions when an input output device issimultaneously used for two or more different cyber activities.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide forcyber interactions with input devices of any type and output devices ofany type.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide agraphic user interface using frames and scrolls formatted image-basedcyber content in conjunction with the processes which use one or morevirtual projectors, one or more virtual projection display screens, andone or more virtual recorders or capture devices for conversion of,alteration of, or convergence of image-based cyber content.

The universal interactive operating system provides programming which inturn provides and enables the processes, procedures, and programmingwhich makes up the device operating system for a point of cyber accesscomputer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which enable apoint of cyber access computer to include a separate private computerand to also include a separate public computer; the separate privatecomputer and separate public computers may both be an integral part ofthe point of cyber access computer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide acyber system which routes and transfers cyber interactions and cyberactivities within a point of cyber access computer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide anindividual with the ability to use any input output device for cyberinteractions with the individual's point of cyber access computer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide anindividual's point of cyber access computer with the ability toindependently have cyber interactions with others based on predeterminedoperational settings, predetermined administrative settings, andpredetermined access settings which were provided to the individual'spoint of cyber access computer by the individual.

The universal interactive operating system provides programming which inturn provides and enables the processes, procedures, and programmingwhich makes up the device operating system for a private computer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide anindividual with a private computer which can only be accessed by theindividual or the individual's device-based cyber assets.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which exclude allothers, as well as the cyber devices of all others, from having cyberinteractions with an individual's private computer. Because all othersand the cyber devices of all others are excluded from having cyberinteractions with the individual's private computer, the individual'sprivate computer provides the individual with a cyber environment whichis absolutely safe, secure, private, and free from intrusion by othersas described above. The individual's private computer can also beconsidered to be a cyber vault.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which providesafe and secure cyber interactions between an individual's privatecomputer and all cyber activities and all cyber interactions from withinthe individual's point of cyber access computer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide anindividual with the ability to use the individual's private computer torun and use computer programs and to run and use computer applications.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide anindividual with the ability to store, access, use, and manage a lifelongcollection of file-based cyber assets from within the individual'sprivate computer.

The universal interactive operating system provides programming which inturn provides and enables the processes, procedures, and programmingwhich makes up the device operating system for a public computer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provideprocesses for an individual's public computer to use to independentlyhave cyber interactions with others based on predetermined operationalsettings, predetermined administrative settings, and predeterminedaccess settings which were provided for the individual's public computerby the individual.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures for an individualto use to receive and to store cyber interactions and cyber content fromothers through use of the storage capabilities of the individual'spublic computer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide anindividual with the ability to selectively grant or to selectively denyothers or the cyber devices of others access to the individual's publiccomputer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide anindividual with the ability to selectively grant or to selectively denyspecified others or the specified cyber devices of specified othersaccess to all or any part of the individual's cyber resources which areavailable for specified others through the individual's public computer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide forall aspects of operations of, and interaction with, a safe, a secure,and a full-featured cyber telephone system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide anindividual's cyber telephone system with the ability to independentlyinteract with others based on predetermined operational settings,predetermined administrative settings, and predetermined access settingswhich were provided for the individual's cyber telephone system by theindividual.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures for all aspectsof operations of, and for cyber interactions with, a safe, a secure, anda full-featured cyber asset manager.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which exclude anindividual's device-based cyber assets from having cyber interactionswith others.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which exclude allothers from having cyber interactions with a any specific individual'sdevice-based cyber assets.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide aninteroperable cyber environment wherein interconnected cyber devices ofany type can be seamlessly used as a component of thesingle-point-of-access cyber system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide asystem-wide standard interconnected interactive interface for use withany cyber device.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which providefor:

(a) use of multiple lines of cyber communications;

(b) use of multiple types of lines of cyber communications;

(c) use of multiple providers of lines of cyber communications.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which require andprovide for all devices within the cyber communications network toexclude all from interacting with cyber interactions while the cyberinteractions are being transferred through the cyber communicationsnetwork.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which require andprovide for each separate cyber interaction to exclusively use aseparate line of cyber communications whereby no two cyber interactionsmay use the same line of cyber communications at the same time.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which require andprovide for a sender's cyber interactions to move one way only through acyber communications line and for the recipient's cyber interactions tomove one way only and to be sent through a separate cyber communicationsline.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which providesafe and secure cyber interactions from a cyber device which are sent toand through an input output device which is being used by an individualand to the individual's point of cyber access computer. Further, theuniversal interactive operating system provides and enables theprogramming which provides processes and procedures which provide safeand secure cyber interactions from an individual's point of cyber accesscomputer, through an input output device that is being used by theindividual, to a cyber device.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which route andtransfer cyber interactions through the cyber communications network.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide forall operations of the universal interactive operating system's safe,secure, and full-featured transfer packet system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which require andprovide for the use of transfer packet labels. The transfer packetlabels are used for the purposes of: security; identification; routing;communicating a sender's requirements or requests; or any other requiredor desired utility which can be provided by information from a transferpacket label.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which compare atransfer packet's label to the contents of the transfer packet.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide forsafe and secure deletion of transfer packets which have packet contentsthat do not match the transfer packet's label.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide forsafe and secure use of mobile or in-motion cyber devices such as avehicle or a cyber telephone device.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide andmake use of single-point-of-access cyber system addresses for mobile orin-motion cyber devices.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide foruse of the cyber communications network by mobile or in-motion cyberdevices.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide forthe use of a GPS locating device either independently, or in conjunctionwith, a cyber device.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which providemenus, or any other user perceptible output which provides an individualwith knowledge of, and access to, cyber interactions with cyberactivities or cyber content.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide fora voice recognition driven user interface.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide anindividual with the ability to store, to access, to use, and to managefile-based cyber assets and file based cyber resources.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide anindividual with the ability to store, to access, to use, and to manage alifelong collection of the individual's file-based cyber assets.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide anindividual with an absolutely safe and secure location for storage, foraccess, for use, and for management of a lifelong collection of theindividual's file-based cyber assets.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide ahistory of an individual's cyber activities as well as a history of theindividual's device-based cyber asset's cyber activities.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which use acombination of one or more virtual projectors, one or more virtualprojection display screens, and one or more virtual recorders or capturedevices to converge a plurality of sources of image-based cyber contentinto one or more converged sources of interactive image-based cybercontent.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which use acombination of one or more virtual projectors, one or more virtualprojection display screens, and one or more virtual recorders or capturedevices to alter any aspect of image-based cyber content in any way.

The universal interactive operating system provides programming which inturn provides and enables the universal interactive operating system setof standard cyber processes and standard cyber procedures for use,management, and alteration of image-based cyber content.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide forcreation and use of frames and scrolls formatted image-based cybercontent.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide forframes and scrolls formatted image-based cyber content to use the totalpixel width by total pixel height size of the target image output deviceto determine the total pixel width by a total pixel height size of animage which is to be transferred to the image output device.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide forand enable the use of image-based cyber content which has both a totalpixel width and a total pixel height which are smaller than or equal tothe pixel width and the pixel height of the target image display device.Such content is considered to be a cyber image in frame format as shownin FIGS. 18B and 18C.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide forand enable the use of image-based cyber content which has a total pixelwidth which is greater than the pixel width of the target image displaydevice and/or a total pixel height which is greater than that of thepixel height of the target image display device. Such content isconsidered to be a scroll formatted cyber image as shown in FIGS. 18Eand 18G.

The frames and scrolls format for image-based cyber content provides anindividual with the ability to scroll through a scroll formatted cyberimage so that an entire scroll formatted cyber image may be displayed,although not simultaneously.

Further, the frames and scrolls format for image-based cyber contentuses a pixel width by pixel height grid to identify the point on aframes or scrolls formatted cyber image where an input interaction wasmade by an individual as shown in FIGS. 16C and 16F.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide forall aspects of operations and use of a safe, secure, and full-featuredcyber license system.

In the single-point-of-access cyber system license system which isenabled by the universal interactive operating system a licensee isrequired to provide the licensor with:

(a) the licensee's single-point-of-access cyber system identification;

(b) the licensee's single-point-of-access cyber system address;

(c) the identification of the licensed cyber resource; and

(d) the rights the licensee has to the licensed cyber resource.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide forall aspects of operations and use of a safe, secure, and full-featuredcyber mail system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide forall aspects of operations and use of a safe, secure, and full-featuredcyber message and cyber alert system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide forall aspects of operations and use of a safe, secure, and full-featuredcyber site system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide asender with the option to receive a cyber acknowledgement of therecipient's receipt of a cyber interaction.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which providesystem generated cyber messages when cyber activities do not executeproperly.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide anindividual with the ability to send to themselves, or to others,system-generated cyber messages or system-generated cyber alerts basedon any parameter the individual designates.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which providesafe, secure, and private interaction between any health care relatedcyber device or any cyber health care related resource that is beingused or relied upon by the individual, the individual's privatecomputer, or the individual's point of cyber access computer.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which provide jobmanagement for the operations of the universal interactive operatingsystem as well as task management for the operations of the universalinteractive operating system.

The universal interactive operating system provides programming which inturn provides and enables the processes and procedures which providemanagement for cyber devices which use the universal interactiveoperating system.

The universal interactive operating system provides programming whichprovides and enables the processes and procedures which provide for theaccurate and reliable identification of one specific and uniqueindividual through use of any combination of facial recognition, voicerecognition, and facial movement.

(8) CYBER COMMUNICATIONS NETWORK

The purpose of the cyber communications network 300 (see FIGS. 2-15) isto safely, securely, and efficiently transfer properly formatted andproperly identified transfer packets from a properly identified senderto a properly identified recipient.

Transfer packets are the only single-point-of-access cyber systemvehicles which are used to move cyber interactions from a sender to arecipient.

The single-point-of-access cyber system uses many different and uniquetransfer packet formats. The different and unique transfer packetformats are used for different types of cyber activities as well as forcyber activities which are for different purposes.

A point of cyber access computer uses differences in transfer packetformats to aid in providing security for all inbound cyber activities.The point of cyber access computer also uses differences in transferpacket formats to aid in the proper routing of cyber activities andcyber interactions.

The packet portion of a transfer packet contains all, or a part of, asender's cyber interaction.

A sender's cyber interaction may require one or more transfer packets. Acyber interaction which requires more than one transfer packet hastransfer packets which are identified as being a specific sequentialpart of a specific group of transfer packets.

Each transfer packet, at a minimum, has a label which provides:

(a) the single-point-of-access cyber system address of the recipient'spoint of cyber access computer;

(b) the recipient's single-point-of-access cyber system identification;

(c) the sender's single-point-of-access cyber system identification;

(d) verification of the sender's identity;

(e) the single-point-of-access cyber system identification of thesender's point of cyber access computer;

(f) the single-point-of-access cyber system address of the sender'spoint of cyber access computer;

(g) verification of the identity of the sender's point of cyber accesscomputer;

(h) information about the contents of the transfer packet regarding ifthe transfer packet is one in a connected series of transfer packetsthat together, in proper sequence, make up one single cyber interactionfrom a sender;

(i) information about the contents of a transfer packet which aid therecipient in determining if the sender's cyber interaction conforms withthe recipient's requirements or preferences for privacy and therecipient's requirements or preferences for cyber interaction content;

(j) history of every cyber interaction that the transfer packet has witha single-point-of-access cyber system cyber device.

A transfer packet label can include any information about the sender orany information about the contents of the transfer packet which wasrequired or desired by the sender or the recipient of the cyber transferpacket.

Recipients of transfer packets can require that transfer packets includeadditional label information which can include any information about thesender or about the contents of the transfer packet which may aid therecipient in determining if the sender's cyber interaction will beallowed to gain access to the recipient's point of cyber accesscomputer.

An example of a recipient's requirements for additional transfer packetlabel information about the sender or about the contents of a transferpacket would occur if a recipient required all senders to identify thesender as a business. The recipient may further require cyberinteractions from a business to identify if the business was making anunsolicited marketing cyber interaction. In such case the recipient hasthe ability to exclude all unsolicited businesses marketing cyberinteractions from gaining access to the recipient's point of cyberaccess computer.

The cyber communications network (see FIG. 15), requires that eachindividual be properly identified prior to each step the individual'scyber interactions take through the cyber communications network.Further, the cyber communications network requires that each cyberdevice be properly identified prior to each step the cyber device'scyber interactions take through the cyber communications network. Cyberinteractions from improperly or inadequately identified individuals orimproperly or inadequately identified cyber devices cannot betransferred through the cyber communications network.

The cyber devices which make up the cyber communications network do nothave the ability to make changes to transfer packet labels or theability to use or alter the contents of transfer packets.

A recipient has the ability to keep a complete history of transferpacket label information from any or all of the inbound cyberinteractions which are received by the recipient. The recipient also hasthe ability to keep a history of transfer packet label information fromany or all inbound cyber interactions which are denied access to therecipient's point of cyber access computer.

Communications between the devices within the cyber communicationsnetwork can use wire, or optical fiber, or radio frequency, or any othermeans which provides adequate utility, or any combination thereof. Whenradio frequency is used for cyber communications, thesingle-point-of-access cyber system requires the use of encryption, orany other cyber security process which makes the contents of a transferpacket useless to all but the sender and the recipient.

The devices in the cyber communications network (see FIG. 15), the inputoutput devices, the point of cyber access computers, and remotedevice-based cyber assets are each required to provide separatesecurity-based administrative cyber interactions as an integral part ofa corresponding cyber interaction which is being transferred between thesame two single-point-of-access cyber system cyber devices. This processprevents intruders from interacting with transfer packets and theoperations of the cyber communications network.

Each device in the cyber communications network keeps a history of itsown cyber activities and cyber interactions.

The device within the cyber communications network which comes in firstcontact with cyber interactions from an individual's point of cyberaccess computer is required to establish the identity of theindividual's point of cyber access computer prior to the transfer of theindividual's cyber interaction. The devices within the cybercommunications network which come in first contact with the individual'spoint of cyber access computer can use any safe, secure, and accurateprocess or method to establish the identity of the individual's point ofcyber access computer.

After having properly established the identity of an individual's pointof cyber access computer, the device within the cyber communicationsnetwork which comes in first contact with cyber interactions from theindividual is required to provide verification of the identity of theindividual's point of cyber access computer prior to each step theindividual's cyber interactions take through the single-point-of-accesscyber system.

(9) INPUT OUTPUT DEVICE

The purpose of the input output device 100 (referring again to FIG. 1)in the disclosed single-point-of-access cyber system is to:

(a) send input from an individual using the input output device throughthe cyber communications network to the individual's point of cyberaccess computer;

(b) receive output for the individual which was sent from theindividual's point of cyber access computer through the cybercommunications network to the input output device which is being used bythe individual; and

(c) provide output which provides the individual with the ability toperceive the cyber interaction which was sent to the input output devicethrough the cyber communications network from the individual's point ofcyber access computer.

As shown in FIG. 1, the input output device 100 uses the cybercommunications network 300 to move transfer packets between the inputoutput device that is being used by an individual and the individual'spoint of cyber access computer 200.

The input output device 100 uses an operating system which providesfunctional and operational programming for all of the functions of theinput output device.

One type of input output device is a thin input output device 100 whichhas limited processing capabilities. A thin input output device relieson another device to have previously processed the content of theinteraction so that the interaction can be used by the thin input outputdevice with no further processing of content.

As a part of its operations, one type of input output device 100 has theability to store its operating system as well as store any cyberinteractions which are required to be stored.

An input output device 100 may also be a cyber telephone device. When aninput output device is also a cyber telephone device an individual'spoint of cyber access computer 200 can initiate cyber telephonecommunication cyber interactions with the individual at the individual'sinput output/cyber telephone device. When an individual is using aninput output device that is not a cyber telephone device, the individualwould need to initiate the cyber telephone communication process.

Cyber interaction from an individual to the individual's point of cyberaccess computer 200 must originate from an input output device 100. Theinput output device 100 can provide the individual's point of cyberaccess computer 200 with information which allows the individual's pointof cyber access computer 200 to establish the individual's identity. Aspreviously indicated, proper identification of the individual prior toany further cyber interactions with the same individual is an essentialtenet of the present invention.

Sending a cyber interaction from an individual using the input outputdevice to the individual's point of cyber access computer requires theindividual use properly formatted transfer packets. The properlyformatted transfer packets are addressed to the individual as therecipient. The address contains the individual's single-point-of-accesscyber system identification as well as the single-point-of-access cybersystem address and the identification of the individual's point of cyberaccess computer.

Sending a cyber interaction from an individual's point of cyber accesscomputer to an input output device which is being used by the individualrequires that the individual's point of cyber access computer send inputoutput device formatted transfer packets. The input output deviceformatted transfer packets are addressed to the single-point-of-accesscyber system identification and address of the input output device whichis being used by the individual.

Upon first contact with the individual's point of cyber access computer,the individual's cyber interaction's request for access will be routedto the processes and procedures for granting the individual's cyberinteractions access to the individual's point of cyber access computer.

Following an individual's request for the individual's cyber interactionto gain access to the individual's own point of cyber access computerthere will be the execution of process and procedures for establishingthe identity of this specific individual. The cyber interactions fromthe individual who is using the input output device will only be grantedaccess to the individual's own point of cyber access computer after theindividual's own point of cyber access computer accurately establishesthe individual's identity.

An individual's point of cyber access computer, working in conjunctionwith the input output device that is being used by the individual, canuse facial recognition, or voice recognition, or facial movement whenspeaking, or a password, or a retinal scan, or a token, or any othersuitable method of identification known to those of ordinary skill inthe art, or any combination thereof, to remotely establish theindividual's identity.

Once cyber interactions from the individual gain access to theindividual's point of cyber access computer, the cyber interactions fromthe individual will be routed to the individual's private computer. Itis at the individual's private computer where the individual, throughthe individual's interactions with the input output device, hasoperational and administrative access to the individual's privatecomputer, the individual's point of cyber access computer, theindividual's public computer, the individual's cyber assets, theindividual's cyber resources, and the individual's cyber telephonesystem.

Only cyber interactions from the individual can gain access to theindividual's private computer 230 (see FIGS. 2-12). All cyberinteractions from all others are excluded from access of any kind to theindividual's private computer.

Once the individual through the individual's interactions with the inputoutput device has gained access to the individual's private computer230, the individual is provided with options for further cyberinteractions.

Referring again to FIG. 3, an individual using the input output device100 sends cyber interactions through the cyber communications network tothe individual's private computer 230. In turn, the individual's privatecomputer 230 processes the individual's cyber interaction. The cyberinteraction to be processed by the individual's private computer 230 caninclude any cyber activity which is available for use by the individualthrough the individual's point of cyber access computer 200, theindividual's public computer 260, the individual's cyber assets, theindividual's cyber resources, or the individual's cyber telephonesystem.

Cyber interactions with cyber activities, cyber interactions with cyberdevices, and cyber interactions with cyber content which is availablefor use by the individual through the individual's private computer 230will include: the individual's computer programs and applications; theindividual's cyber telephone system; the individual's cyber assetmanager; the individual's home automation system and its resources; theindividual's vehicle; the individual's owned copies of cyber television,cyber video entertainment, and cyber music; the individual's cyberassets including cyber activity history, personal financial information,personal health information, photographs, or any other cyber activitiesor cyber devices or cyber content; and, access to the cyber resources ofothers which are available for the individual's use including books,magazines, newspapers, libraries, the cyber educational system, cyberservices, the cyber health system, or any other cyber resource.

As a result of an individual's cyber interactions, the individual'sprivate computer 230, or the individual's point of cyber access computer200, or the individual's public computer 260, can respond to theindividual by sending cyber interactions through the cybercommunications network to the input output device 100 which is beingused by the individual.

As an example, an individual can be typing on a keyboard which appearson the screen of the input output device while looking at the image onthe image display screen of the input output device. When the individualinputs the letter “k” to the keyboard appearing on the screen of theinput output device 100, and the individual communicates theindividual's input of the letter “k” to the individual's remote point ofcyber access computer 200, the individual's point of cyber accesscomputer 200 will, in turn, respond to the input output device 100 whichthe individual is using. This response will provide an image whichrepresents the changes to the prior image which were the results of theindividual's prior cyber interactions.

Another example would be that the individual at the input output device100 interacts with an image on the display screen of the input outputdevice 100. The image appearing on the screen of the input output deviceprovides the individual with choices for cyber interactions which arefor labeled or otherwise identified purposes. The individual interactswith the image appearing on the display screen of the input outputdevice 100, and the individual communicates the interaction to theindividual's remote point of cyber access computer 200. The individual'spoint of cyber access computer 200 in turn processes the individual'scyber interaction and responds by providing the input output device 100which the individual is using with a new image and associated links. Thenew image and associated links are the result of the individual's pointof cyber access computer's processing of the individual's prior cyberinteraction.

Yet another example would be that instead of a physical interaction withthe display screen on the input output device, the individual speakscertain words, such as the instructions to open the garage door, intothe input output device 100. The input output device 100 communicatesthe individual's voice command cyber interaction to the individual'spoint of cyber access computer 200. In turn the individual's point ofcyber access computer 200 operates the individual's garage door opener.The individual's point of cyber access computer 200 may or may notnotify the individual at the input output device of the status of theopening of the garage door depending on the previously establishedpreferences of the individual.

An individual's point of cyber access computer 200 may have the abilityto remotely alter the functional and operational settings of the inputoutput device 100 which is being used by the individual.

One possible result of an individual's cyber interactions with theindividual's point of cyber access computer 200 can be that theindividual's point of cyber access computer 200 responds in part or inwhole to the individual's cyber interactions by providing cyberinteractions which alter the functional and operational settings of theinput output device 100 which is being used by the individual.

Alterations to the functional and operational settings of the inputoutput device 100 can be requested by the input output device 100, or bythe individual through the individual's interactions with the inputoutput device 100, or by the individual's point of cyber access computer200, or by any cyber device, or by any cyber file.

The input output device 100 has the ability to return to predeterminedfunctional and operational settings upon request, or upon completion ofa cyber interaction which requested or required the altered functionaland operational settings for the input output device.

An individual's point of cyber access computer 200 and an input outputdevice 100 can each establish an interconnection with the cybercommunications network. This cyber communications networkinterconnection can be an interconnection ranging from a momentarysingle line cyber communications network interconnection to continuousmultiple line cyber communications network interconnections.

Cyber interaction between an input output device 100 and theindividual's point of cyber access computer 200 which are transferredusing the cyber communications network can simultaneously include one ormore instances of cyber interactions between:

(a) the individual's cyber assets and the individual's cyber assetmanager;

(b) the individual using the input output device 100 and theindividual's point of cyber access computer 200;

(c) a cyber resource and the individual's public computer 260;

(d) the individual's private computer 230 and the individual at theinput output device 100;

(e) the individual's point of cyber access computer 200 and a cyberdevice;

(f) the individual's private computer 230 and a cyber asset; and

(g) the individual's public computer 260 and a cyber resource.

The input output device 100 can be used as a cyber communicationsnetwork link between device-based cyber assets or device-based cyberresources and an individual's point of cyber access computer 200.

The input output device 100 can use one or more lines of cybercommunication. These lines of cyber communication can be between aninput output device 100 and an individual's point of cyber accesscomputer 200, or between an input output device 100 and any device-basedcyber asset or cyber resource.

A thin input output device 100 operations are limited to processing onlyfunctional and operational programming. Therefore, the thin input outputdevice 100 only runs the programming that is required for the operationsof the thin input output device. When working in conjunction with a thininput output device, an individual's private computer 230 provides allpossible processing, management, and support for every interaction thatis sent to the thin input output.

All cyber interaction from an individual's point of cyber accesscomputer 200 to the input output device 100 the individual is using areto be pre-processed and made ready for use by the input output prior tobeing sent through the cyber communications network.

The input output device 100 will, upon first cyber interaction with anindividual's point of cyber access computer 200, provide theindividual's point of cyber access computer 200 with information aboutthe display screen size, the type of the input output device's displayscreen, as well as information about the operational capabilities andthe operational settings of the input output device 100.

An input output device's components may include:

(a) one single-point-of-access cyber system identification;

(b) one single-point-of-access cyber system address;

(c) one or more devices which provide operations for transferring cybertransfer packets over a cyber communications network;

(d) interconnecting circuits;

(e) one or more sources of power;

(f) a protective housing;

and may also include one or more of the following:

(g) an image display;

(h) an audio output device 909;

(i) a camera 911;

(j) a microphone 913;

(k) a manual input device;

(l) a cyber storage device;

(m) an auxiliary input for interaction with other cyber devices; and

(n) an auxiliary output for interaction with other cyber devices.

The universal interactive operating system provides the needed operatingsystem programming to provide the input output device 100 with theability to be used as a single-point-of-access cyber system input outputdevice.

The universal interactive operating system provides the neededprogramming which provides for the interoperable use of the input outputdevice 100 as an input output device 100 which may have cyberinteractions with cyber devices which do not use the universalinteractive operating system.

The universal interactive operating system provides the neededprogramming which provides an individual with the ability to alter theoperational configuration of the input output device 100 on a temporaryor permanent basis.

The universal interactive operating system provides the neededprogramming which provides an input output device'ssingle-point-of-access cyber system identification to the first devicein the cyber communications network with which the input output device100 has cyber interactions.

The universal interactive operating system provides the programming thatprovides the input output device with the ability to provide allnecessary cyber communications functions including use of properlyformatted transfer packets for interactions with any type of cyberdevices.

The input output device 100 can be an integral part of a point of cyberaccess computer 200; or, the input output device 100 can be directlyconnected to a point of cyber access computer 200; or, the input outputdevice 100 can be a separate remote cyber device which communicates witha remote point of cyber access computer 200 through use of the cybercommunications network 300.

Communication between the input output device 100 and the individual'spoint of cyber access computer 200 can use radio frequency, fiber optic,wire, or any other suitable method for communications known to those ofordinary skill in the art, or any combination thereof.

A remote thin input output device 100 provides an individual with thehighest attainable level of functional utility and computing andcommunications mobility.

The input output device 100 can have the ability to interact with anycyber device that is capable of interacting with an input output device.

The input output device 100 may include one or more of the followingsources for receiving input: a camera; a microphone; a keyboard; apointing device; a touch or multi-touch display screen; a digitaltablet; a sensor of any type; an input device of any type; a mediareader; a stored information link; a GPS global position locatingdevice; interconnections for other input devices; and any other sourcesof input known to those of ordinary skill in the art.

The input output device 100 may include one or more of the followingways of providing output: an image display device; an audio outputdevice; a tactile output device; interconnections for other outputdevices; or any other possible output known to those of ordinary skillin the art.

The size of the input output device's image display can range from thesmallest useable image display size to the largest image display sizeavailable.

The input output device 100 may include a remote and/or a localconnection for cyber interactions with an individual's point of cyberaccess computer.

Each input output device, that is not an integral part of a point ofcyber access computer, has a unique single-point-of-access cyber systemidentification and a mobile or stationary single-point-of-access cybersystem address.

Any individual can use any input output device for cyber interactionswith the individual's remote point of cyber access computer. Inputoutput devices need not be user-specific. Input output devices may alsobe cyber telephone devices.

Computers such as those incorporated into cell phones, laptop computers,or desktop computers can also be used as single-point-of-access cybersystem input output devices. These types of input output devices alsohave the ability to provide the additional feature of input outputdevice-based computing functions to the individual.

The individual requires the use of the input output device 100 for cyberinteractions with the individual's remote point of cyber access computer200. The input output device 100 can be configured with two 8.5′×11′multi-touch, digital tablet enabled image display screens which arehinged together like a book in portrait format as shown in FIG. 16B Theillustrated input output device 901 shown in the array of imagesappearing in FIGS. 16A-16F makes an excellent, light weight, andmanageable cyber book, or an input output device which can be used toreview cyber-based content of any kind. The input output device shown inthe array of images in FIGS. 16A-16F is typically not a computer.Rather, the input output device shown in the array of images in FIGS.16A-16F is typically a remote thin input output device which is used forcyber interactions with an individual's point of cyber access computeror for cyber interactions with other cyber devices.

As shown in FIGS. 16A and 16B, if the individual takes the input outputdevice 901 which the individual is holding in book configuration and theindividual places the input output device on a table where it isoriented as, and can be used as, an open laptop computer, then, throughuse of a cyber communications network interconnection with theindividual's point of cyber access computer, this input output devicemay become a remote terminal for cyber interactions with theindividual's point of cyber access computer.

An individual may use the multi-touch or the tablet functions of theimage display screens on the illustrated input output device askeyboards or as a tablet for drawing, or for handwriting, or for markingof content.

Both of the image display screens on the illustrated input output devicemay also be arranged side-by-side to form one single larger sized imagedisplay screen.

With a 180-degree flip and a fold-over of one of the image displayscreens of the input output device as shown in FIGS. 16D and 16E, theinput output device can be transformed into a single-screen digital pad,or a digital tablet, or an interactive single screen image display asshown in FIG. 16F.

As shown in FIG. 16D, an input output device may include a camera, amicrophone, and one or more speakers, to provide for multimediafunctions and to provide the individual's point of cyber access computerwith information which can be used to establish the individual'sidentity.

The previously described remote input output device may well be acommonly used mid-sized portable input output device. An input outputdevice such as a thin I-Phone-sized input output device putsinterpersonal cyber communications as well as all of the capabilities ofan individual's point of cyber access computer in the palm of theindividual's hand.

Televisions, telephones, and other devices which provide audio/visualoutput can easily be adapted by a person of ordinary skill in the artfor use as an input output device which can be used with the disclosedsingle-point-of-access cyber system.

The input output device 100 can be configured to provide additionalfunctions beyond that of a basic input output device. These additionalfunctions can be used to provide for the needs of a disabled individual,or for integration of the input output device into a special orsingle-purpose cyber system, or for any other purpose.

(10) CYBER COMMUNICATIONS NETWORK BETWEEN AN INPUT OUTPUT DEVICE AND APOINT OF CYBER ACCESS COMPUTER

The purpose of the part of the cyber communications network 300 which isused between the input output device 100 and the individual's point ofcyber access computer 200 is to safely and securely transfer properlyformatted and properly identified transfer packets between the inputoutput device 100 and the individual's point of cyber access computer200.

There are unique transfer packet formats for:

(a) cyber interactions from an individual's point of cyber accesscomputer 200 to and through the cyber communications network 300 and tothe individual who is using the input output device 100 that is beingused by the individual;

(b) cyber interactions from an individual using the input output device100 to and through the cyber communications network 300 and to theindividual's point of cyber access computer 200;

(c) cyber interactions from an individual's cyber assets to and throughthe input output device 100 which is being used by the individual to andthrough the cyber communications network 300 and to the individual'spoint of cyber access computer 200;

(d) cyber interactions from the cyber resources of others to and throughthe input output device 100 which is being used by an individual to andthrough the cyber communications network 300 and to the individual'spoint of cyber access computer 200; and

(e) cyber interactions from an individual's point of cyber accesscomputer 200 to and through the cyber communications network 300, to andthrough the input output device 100 which is being used by theindividual, and to a cyber asset or to a cyber resource.

Cyber interactions between the input output device 100 and theindividual's point of cyber access computer 200 can use:

(a) multiple lines of cyber communications;

(b) multiple types of lines of cyber communications;

(c) multiple sources of lines of cyber communications.

Cyber interactions which use the part of the cyber communicationsnetwork 300 between the input output device 100 and the individual'spoint of cyber access computer 200 are required to be protected from useby others by the use of encryption or other cyber security measuresknown to those of ordinary skill in the art which provide adequatesecurity. Encryption renders the content of a transfer packet useless toall but the sender and the recipient.

The part of the cyber communications network 300 between an input outputdevice 100 that is being used by the individual and the individual'spoint of cyber access computer 200 uses one or more of the following forthe transfer of transfer packets: radio frequency; fiber optics; wire;any other suitable transfer method, or any combination thereof.

The cyber devices, cyber processes, and cyber procedures which serve thepart of the cyber communications network 300 between the input outputdevice 100 and the individual's point of cyber access computer 200provide for transfers of transfer packets which are free from intrusionand interference by others.

(11) POINT OF CYBER ACCESS COMPUTER

A point of cyber access computer 200 provides one specific individualwith one and only one, safe and secure, remotely accessible computerwhich provides this one individual with the individual's exclusive pointto gain access to: computing capabilities; the individual's cyberassets; the individual's cyber telephone system; and cyber resources.

The individual's only portal for cyber access is the individual's oneand only point of cyber access computer 200. The single-point-of-accesscyber system 10 provides a system architecture in which each individualwho uses the single-point-of-access cyber system 10 has one and only onepoint where the individual gains access to cyber activities, to cybertelephone communications, to cyber assets, and to available cyberresources. Further, all others have only one point of cyber access wherethe others can interact with this specific individual for cybertelephone communications and for cyber interactions.

As previously stated, the foundation for the single-point-of-accesscyber system 10 is that:

each individual is required to be properly identified prior to each stepthe individual's cyber interactions take through thesingle-point-of-access cyber system 10; and

each cyber device is required to be properly identified prior to eachstep the cyber device's cyber interactions take through thesingle-point-of-access cyber system 10.

An individual who desires to use the disclosed single point of accesscyber system 10 may use the input output device 100 for remote cyberinteractions with the individual's point of cyber access computer 200.The input output device 100 is used to provide the individual's point ofcyber access computer 200 with information which allows the individual'spoint of cyber access computer 200 to establish the individual'sidentity.

After an individual's identity has been established by the individual'spoint of cyber access computer 200, the individual is granted access tothe individual's point of cyber access computer 200. Further, after theindividual's identity has been established by the individual's point ofcyber access computer 200, the individual's point of cyber accesscomputer 200 provides verification of the individual's identity prior toeach step the individual's cyber interactions take through thesingle-point-of-access cyber system 10.

An individual's point of cyber access computer is the only device in thesingle-point-of-access cyber system which has the ability to establishthe individual's identity and to provide verification of theindividual's identity.

The point of cyber access computer 200 includes a separate privatecomputer 230 and a separate public computer 260. Therefore, the point ofcyber access computer 200 is a combination of at least three separatecomputers.

Each individual who uses the single-point-of-access cyber system 10 mustbe properly identified. An individual's point of cyber access computer200 exclusively establishes the individual's identity. After theindividual's identity has been established, the individual can gainaccess to the individual's private computer 230. Once to the individualhas gained access to their private computer 230, the individual willhave full operational access and administrative access to not only theindividual's private computer 230, but also to the individual's point ofcyber access computer 200 and to the individual's public computer 260 aswell.

The device architecture of the point of cyber access computer solvesmany of the significant problems with prior art cyber systems andcomputers. An individual's point of cyber access computer includes threeseparate computers:

(a) the individual's point of cyber access computer;

(b) the individual's separate private computer; and

(c) the individual's separate public computer.

The individual's point of cyber access computer 200 provides security,access control, and internal routing for all of the individual's pointof cyber access computer's cyber activities. The individual's point ofcyber access computer 200 also provides interoperability processing andconversion as needed for inbound cyber activities, for outbound cyberactivities, and for internal cyber activities.

As shown in FIG. 11 an individual gains administrative control andoperational control of the individual's point of cyber access computer200 through the individual's private computer 230.

An individual has cyber interactions with the individual's privatecomputer through the individual's use of the input output device 100.The individual's private computer 230 provides the individual with theability to have cyber interactions with: the individual's point of cyberaccess computer 200; the individual's public computer 230; theindividual's cyber telephone system 270; the individual's cyber assets;and available cyber resources. The individual's private computer 230also provides the individual with the ability to have cyber interactionswith others.

An individual's point of cyber access computer 200 must establish theindividual's identity prior to providing the individual's cyberinteractions access to the individual's point of cyber access computer200. The individual's point of cyber access computer 200 must alsoestablish the identity of the individual's device-based cyber assetsprior to allowing the individual's device-based cyber assets' cyberinteractions to gain access to the individual's point of cyber accesscomputer 200.

Access to the individual's private computer 230 is only granted to cyberinteractions from the individual and to cyber interactions from specificcyber assets of the individual. Cyber interactions from all others andthe cyber devices of all others are excluded from gaining access to theindividual's private computer.

An individual's public computer 260 is the only part of the individual'spoint of cyber access computer 200 where others can have cyberinteractions with the individual or where others can gain access to theindividual's cyber resources. The individual's cyber resources are onlymade available to others through the individual's public computer 260and only with the permission of the individual.

An individual can choose to share all or any part of the individual'sfile-based cyber assets with specified others. The individual will makethe individual's file-based cyber assets available to others byproviding specified others with copies of the individual's cyber assets.These copies are placed in the individual's public computer and madeavailable to others through the others' cyber interactions with theindividual's public computer 260.

Cyber resources are an individual's file-based cyber assets which havebeen copied to the individual's public computer 260 for use by specifiedothers.

It is an important security feature of the disclosedsingle-point-of-access cyber system that the single-point-of-accesscyber system 10 requires the use of different and unique processes,procedures, formats, transfer packets, or codes for the operations of,and for cyber interactions with and between a point of cyber accesscomputer 200 and the point of cyber access computer's private computer230, and the point of cyber access computer's public computer 260.

The point of cyber access computer 200 pre-processes outbound cyberinteractions to the input output device 100 so that the outbound cyberinteractions can be transferred to, and used by the input output device100 with no further processing of content required.

The point of cyber access computer 200 provides an individual with theability to provide others with the individual's requests or requirementsfor privacy as well as the individual's preferences or requirements forinbound cyber activities and for inbound cyber content.

The individual's point of cyber access computer 200 provides:

(a) an individual with the exclusive point where the individual gainsidentified access to the single-point-of-access cyber system 10;

(b) an individual with the only point where others can access theindividual for cyber interactions;

(c) cyber security;

(d) an individual with cyber interactions with the cyber communicationsnetwork 300;

(e) an individual with cyber interactions with the input output device100 that is being used by the individual;

(f) an individual with cyber interactions using a cyber telephonedevice;

(g) routing of cyber activities;

(h) an individual with access to the individual's private computer 230;

(i) verification of the individual's identity at each step theindividual's cyber interactions take through the single-point-of-accesscyber system 10;

(j) an individual with the ability to send outbound cyber interactionsto an input output device or to remote cyber devices;

(k) an individual with the ability to deny access to the individual'sprivate computer 260 by cyber interactions from all others and the cyberdevices of all others;

(l) cyber interaction and security between the individual's point ofcyber access computer 200 and the individual's private computer 230;

(m) cyber interaction and security between the individual's point ofcyber access computer 200 and the individual's public computer 260;

(n) cyber interaction and security between the individual's privatecomputer 230 and the individual's public computer 260;

(o) processes and procedures which confirm the identity of others priorto granting or denying the cyber interactions of each other access tothe individual's point of cyber access computer 200;

(p) an individual with the ability to provide specified others access tothe individual's public computer 260 for specified purposes;

(q) an individual with the ability to send outbound cyber interactionsfrom the individual's public computer 260;

(r) verification of the individual's identity when the individual issending outbound cyber interactions;

(s) verification of the individual's identity for the individual'sinteractions with the individual's device-based cyber assets;

(t) processes and procedures which establish the identity of theindividual's device-based cyber assets prior to allowing cyberinteractions from the individual's device-based cyber assets to gainaccess to the individual's point of cyber access computer 200;

(u) processes and procedures for device and file interoperabilityconversion to and from the single-point-of-access cyber system standardformat; and

(v) an individual with a cyber telephone system which provides cybertelephone and cyber video telephone services.

As shown in FIG. 13 the individual's private computer 230 provides anindividual with:

(a) a safe, secure, and private cyber environment where no others maygain access;

(b) computing capabilities;

(c) computer programs;

(d) computer applications;

(e) a history of cyber activities;

(f) storage, access, use, and management of the individual's file-basedcyber assets which include but are not limited to the individual'spersonal information, the individual's health information, and theindividual's financial information;

(g) a cyber asset manager;

(h) administrative control and operational control of the individual'sdevice-based cyber assets including the individual's point of cyberaccess computer, the individual's private computer, the individual'spublic computer, the individual's cyber asset manager, and theindividual's cyber telephone system;

(i) cyber interaction with others;

(j) cyber interactions with the cyber resources of others;

(k) the ability to specify others who have access to the individual'spublic computer;

(l) a system which allows the individual to share the individual's cyberassets with others by making copies of the individual's cyber assetsavailable for specified others as a cyber resources;

(m) a system which provides the individual with the ability tospecifically designate which cyber resources are available to eachspecific other through the individual's public computer;

(n) a system which allows the individual to grant or to deny specifiedothers access to the individual's public computer 260; and

(o) a system which allows the individual to grant or to deny specifiedothers access to specific cyber resources of the individual.

As shown in FIG. 14 the individual's public computer 360 provides:

(a) the only cyber portal where others can have cyber interactions withthe individual;

(b) cyber security;

(c) the individual and others with computing;

(d) the individual and others with the use of computer programs;

(e) the individual and others with the use of computer applications;

(f) the individual with the ability to send outbound cyber interactionsin response to request from others;

(g) the individual and others with the individual's inbound cyber mailsystem;

(h) the individual and others with the individual's inbound cybermessaging system;

(i) specified others with the individual's cyber resources as specifiedby the individual;

(j) storage, access, use, and management of the individual's file-basedcyber resources;

(k) the individual with the ability to grant or to deny specified othersaccess to all or any part of the individual's public computer 260; and

(l) the individual with the ability to grant or deny specified othersaccess to all or any part of the individual's cyber resources.

(12) CYBER TELEPHONE SYSTEM

A cyber telephone system 270 (see FIG. 2) can be a component of a pointof cyber access computer.

A cyber telephone system provides services for cyber telephone and cybervideo telephone communications. The cyber telephone system can also sendautomated cyber telephone communications to others.

An individual may initiates outbound cyber telephone communicationsthrough the individual's use of their private computer 230.

An individual has the ability to grant or to deny cyber telephone systemaccess to the cyber telephone communication cyber interactions fromothers and from the cyber interactions of the cyber devices of others.

Transfer packet label information from an inbound cyber telephonecommunication interaction is used to determine if an individual grantsor denies the inbound cyber telephone communication interaction accessto the individual's cyber telephone system.

An individual may further grant or deny cyber telephone communicationinteractions from specified others access to all, or any part of theservices of the individual's cyber telephone system.

An individual's cyber telephone system provides:

(a) cyber security;

(b) the individual with the ability to grant or deny access to all orany part of the services of the individual's cyber telephone system bycyber telephone communication interaction from others and from the cyberinteractions of the cyber devices of others;

(c) for routing of inbound cyber telephone communication interactions orcyber alerts to a cyber telephone device at or near the person of therecipient;

(d) a message-taking system;

(e) for routing of cyber telephone communication interactions to theindividual's cyber telephone system's message taking system;

(f) messages for the senders of an inbound cyber telephone communicationinteractions;

(g) the individual with the ability to re-direct inbound cyber telephonecommunication interactions to different recipients or different cyberdevices; and

(h) a history of cyber telephone system activities.

An individual using an input output device, after having gained accessto the individual's private computer, has complete operational control,administrative control, and access control of the individual's cybertelephone system.

An individual has the ability to simultaneously interact with theindividual's cyber telephone system, the individual's point of cyberaccess computer, the individual's private computer, the individual'spersonal computer, and the individual's device-based cyber assets.

The programming, processes, and procedures of the universal interactiveoperating system provide for complete security for cyber telephonecommunication interactions which are transferred from the individual'scyber telephone system to the individual's private computer or to theindividual's public computer.

(13) CYBER COMMUNICATIONS NETWORK BETWEEN A SENDER'S POINT OF CYBERACCESS COMPUTER AND A RECIPIENT'S POINT OF CYBER ACCESS COMPUTER

The purpose of the part of the cyber communications network 300 which isused between a sender's point of cyber access computer and a recipient'spoint of cyber access computer is to safely and securely transferproperly formatted and properly identified transfer packets between asender's point of cyber access computer and a recipient's point of cyberaccess computer.

A sender's cyber interaction which is to be directed to a recipientoriginates with the sender's interactions with an input output device.The cyber interaction from the sender's interactions with the inputoutput device goes to and through the cyber communications network, toand through the sender's point of cyber access computer, to and throughthe cyber communications network 300, to and through the recipient'spoint of cyber access computer, and then to the public computer withinthe recipient's point of cyber access computer.

A sender's cyber interaction to a recipient can also come from thesender's public computer and go to and through the sender's point ofcyber access computer, to and through the cyber communications network,to and through the recipient's point of cyber access computer, and thento the recipient's public computer.

A sender's cyber interaction to a recipient can also come from thesender's point of cyber access computer and go to and through the cybercommunications network, to and through the recipient's point of cyberaccess computer, and then to the recipient's public computer.

There are many unique types of transfer packets for cyber interactionsfrom the sender's point of cyber access computer to the recipient'spoint of cyber access computer. The different and unique types oftransfer packets are used to identify different types of cyberactivities in order to provide a high level of security for both thesender and the recipient.

Cyber interactions between a sender's point of cyber access computer anda recipient's point of cyber access computer can use one or more:

(a) lines of cyber communications;

(b) types of lines of cyber communications; and

(c) sources of lines of cyber communications.

A sender is required to be properly identified prior to each step thesender's cyber interactions take through the cyber communicationsnetwork 300.

Cyber interactions which use the part of the cyber communicationsnetwork 300 between a sender's point of cyber access computer 200 and arecipient's point of cyber access computer 200, most especially cyberinteractions which use radio frequency, are protected from use by othersby the use of encryption or other suitable cyber security measures knownto those of ordinary skill in the art. Currently encryption renders thecontent of the transfer packets useless to all but the sender and therecipient of the transfer packet.

The devices, processes, and procedures which serve the part of the cybercommunications network that is used between a sender's point of cyberaccess computer and a recipient's point of cyber access computer providefor cyber communications network transfer of transfer packets which arefree from intrusion or interference by others.

(14) AN INDIVIDUAL'S CYBER ASSET MANAGER AND THE INDIVIDUAL'SDEVICE-BASED CYBER ASSETS

An individual's device-based cyber assets could include, but are notlimited tone or more: video cameras; televisions; television programmingaccess and selection devices; personal health monitors; personal healthcare devices; devices for identification of others; vehicles; cybervaults; cyber file back-up and restore devices; GPS locating devices;home or business automation management devices (which could monitor,record, and have cyber interactions with lights, heating and coolingsystems, locks, garage door openers, lawn sprinkler systems, securitysystems, water meter readings, automated pet doors, personal weatherstations, and more); or any other device-based cyber assets or systems.

An individual may have one or more device-based cyber assets which arenot an integral part of the individual's point of cyber access computer.

An individual's remote device-based cyber assets have cyber interactionswith the individual using one or more cyber asset managers.

An individual's cyber asset manager provides safe and secure cyberinteractions between either the individual or the individual's cyberasset manager and the individual's device-based cyber assets. Theindividual's cyber asset manager also provides the individual with safeand secure administrative control and operational control of theindividual's remote device-based cyber assets.

An individual gains administrative control and operational control ofthe individual's cyber asset manager through the individual's privatecomputer 230. No others can gain administrative control or operationalcontrol of the individual's cyber asset manager.

There is complete and absolute security for an individual's cyberinteractions which are transferred from the individual's cyber assetmanager to the individual's private computer.

An individual's point of cyber access computer 200 establishes theidentity of the individual's device-based cyber assets prior toproviding cyber interactions from the individual's device-based cyberassets with access to the individual's cyber asset manager.

An individual's device-based cyber assets establish the identity of theindividual's point of cyber access computer 200 prior to theindividual's device-based cyber assets' providing cyber interactionsfrom the individual's point of cyber access computer with access.

An individual's cyber asset manager can be located within theindividual's point of cyber access computer. This configuration of thelocation of the individual's cyber asset manager can be used forinteraction with the individual's remote device-based cyber assets whichrequire low security cyber interactions.

An individual may have one cyber asset manager that is located withinthe individual's point of cyber access computer, or, an additional cyberasset manager may be located within the individual's private computer.Locating a cyber asset manager within the individual's private computerwould provide for the highest attainable level of security and privacyfor cyber interactions with the individual's remote device-based cyberassets.

For example, an individual's cyber asset manager can have cyberinteractions with a cyber device on the person of the individual. Thecyber device on the person of the individual monitors and reports on theindividual's blood sugar level. The individual may also have a cyberinsulin delivery system which is operated through cyber interactionswith the individual's cyber asset manager. The individual would need torely on cyber interactions with both of these devices with their life.The individual would need to use the highest level of security andprivacy available for the cyber interactions with these two cyberdevices, and therefore the individual would be best served to have cyberinteractions with these remote device-based cyber assets through aprivate-computer-based cyber asset manager.

An individual's cyber asset manager and the same individual's remotedevice-based cyber assets interconnect using the resources of the cybercommunications network.

An individual's cyber asset manager uses the universal interactiveoperating system for cyber operations and cyber interactions.

An individual's device-based cyber assets only interact with theindividual. Others who wish to have cyber interactions with theindividual's device-based cyber assets must request that the individualprovide the requestor with a copy of the requested cyber interactioninformation. A copy of the requested cyber interaction information fromthe individual's device-based cyber asset is made available for therequestor through the requestor's cyber interaction with theindividual's public computer 260.

An individual's cyber asset manager and the individual's device-basedcyber assets each provide a history of cyber interactions and cyberactivities.

(15) CYBER COMMUNICATIONS NETWORK BETWEEN AN INDIVIDUAL'S CYBER ASSETMANAGER AND THE INDIVIDUAL'S REMOTE DEVICE-BASED CYBER ASSETS

The purpose of the part of the cyber communications network which isused between an individual's cyber asset manager and the individual'sremote device-based cyber assets is to safely and securely transferproperly formatted and properly identified transfer packets between theindividual's cyber asset manager which is within the individual's pointof cyber access computer and the individual's remote device-based cyberassets.

An individual's cyber asset manager's interaction with one of theindividual's remote device-based cyber assets may come from theindividual's cyber asset manager, through the individual's privatecomputer, to and through the individual's point of cyber accesscomputer, to and through the cyber communications network, to theindividual's remote device-based cyber asset.

An individual's remote device-based cyber asset's interaction with theindividual's cyber asset manager comes from the individual's remotedevice-based cyber asset, to and through the cyber communicationsnetwork, to and through the individual's point of cyber access computer,and either to the individual's cyber asset manager, or, to theindividual's private computer, and then on to the individual's cyberasset manager.

There are many unique transfer packet formats for cyber interactionsbetween an individual's cyber asset manager and the individual's remotedevice-based cyber assets. The different and unique transfer packetformats are used to identify cyber interactions between different typesof cyber devices, and to identify cyber interactions for differentfunctions or purposes.

Cyber interactions between an individual's cyber asset manager and theindividual's remote device-based cyber assets can use:

(a) one or more lines of cyber communications;

(b) one or more types of lines of cyber communications; and

(c) one or more sources of lines of cyber communications.

An individual's device-based cyber assets can use a cyber telephonedevice which is being used by the individual, or an input output devicewhich is being used by the individual as a cyber communications networklink to or from the individual's point of cyber access computer.

An individual's cyber asset manager is required to be properlyidentified prior to each step that the individual's cyber assetmanager's cyber interactions take through this part of the cybercommunications network. Further, the individual's remote device-basedcyber assets are required to be properly identified prior to each stepthe individual's remote device-based cyber assets' cyber interactionstake through this part of the cyber communications network.

Cyber interactions which use the part of the cyber communicationsnetwork between an individual's cyber asset manager and the individual'sremote device-based cyber assets, most especially those cyberinteractions that use radio frequency, are protected from use by othersby the use of encryption or other suitable cyber security measures.

The devices, processes, and procedures which control the operations ofthis part of the cyber communications network through their use of theprogramming, processes, and procedures which are a part of the universalinteractive operating system provide for the safe and secure transfer oftransfer packets which are free from intrusion or interference byothers.

(16) EXAMPLES OF USE OF THE SINGLE-POINT-OF-ACCESS CYBER SYSTEM

On election day in November every voter in the United States can,through use of an input output device, gain identified access to theirpoint of cyber access computer. Thus every voter has the ability tosafely, securely, and privately cast their vote in any, or in all, ofthe elections where the individual is eligible to cast a vote.

As an example, in an elementary school classroom, a student can use aninput output device such as shown in FIGS. 16A-16F which has twoapproximately 8′ by 11′ multi-touch, digital tablet enabled imagedisplay screens which are hinged together on one side like a book inportrait format as shown in FIG. 16B. The student can turn the sameinput output device 90 degrees where it then resembles and may providethe functions of a laptop computer.

The input output device, through use of the cyber communicationsnetwork, can have cyber interactions with the student's remotely locatedpoint of cyber access computer.

As shown in FIGS. 16C and 16F, the student can use a stylus 907 inconjunction with the digital tablet feature of the input output device'sdisplay screens to write, to draw, or to interact with an imageappearing on the display screen. The student can also use themulti-touch mode of the display screens for interaction with their pointof cyber access computer. The student's display screen's multi-touchmode also provides the student with a touch screen keyboard. Further,the student can use the input output device's microphone or camera forinput for cyber interaction with the student's point of cyber accesscomputer. Also, the student may use any type of cyber input device whichcan interact with the student's input output device.

The student's point of cyber access computer provides the student withaccess to cyber educational materials from multiple sources such as acyber library, or a cyber compendium of information, or the student'sschool district's cyber library.

The student's point of cyber access computer uses school districtsupplied computer programs, school district supplied computerapplications, and school district supplied cyber educational materials.

The student uses an input output device to remotely access the student'spoint of cyber access computer so that the student may use the schooldistrict supplied cyber-based educational resources and materials forthe class that the student is currently attending.

The input output device provides the student with full interactiveaccess to all available cyber-based educational resources and materials.

The student can use a stylus 907 to either write a report or to work onmath problems.

The student stores the student's schoolwork using the cyber resources ofthe student's point of cyber access computer.

The student submits finished school work to the student's teacher usingthe cyber mail functions of the single-point-of-access cyber system.

The student can also use the single-point-of-access cyber system forcyber telephone communication interactions with the student's teacherduring class by simply using the single-point-of-access cyber system'scyber video telephone functions for remote interaction with thestudent's teacher from across the classroom.

The student's teacher, through use of school district supplied computerprograms and computer applications, can access a copy of the image whichis displayed on the student's input output device. Using the same schooldistrict supplied computer programs and computer applications, thestudent's teacher has the ability to have cyber interactions with thestudent by providing graphic input to the student which can be viewed bythe student in real time on the image display screen of the student'sinput output device.

All of the previously addressed school-related cyber activities do notrequire that cyber interconnection infrastructure be provided to thestudent by the school district. Every cyber-based educational activityis performed using the single-point-of-access cyber system's cyber mailfunctions, cyber interaction functions, and cyber video telephonefunctions.

The school district can provide the student with any cyber educationalmaterials which the school district deems appropriate.

The school district can also provide the student with cyber educationalmaterials which are appropriate for the student's abilities in any fieldof study. Further, the school district can supply the student with cybereducational materials which are formatted to be of most interest to thestudent and most suitable to the learning style of the student.Therefore, a school district which uses the educational resources madeavailable through use of the single-point-of-access cyber system can,and will, make “no child left behind” an educational concept andchallenge of the past.

It should also be noted that the student can use any input output deviceto remotely access the cyber-based educational resources made availableto the student through the student's point of cyber access computer fromanywhere the student is located.

In the context of an individual's health care, an individual has ahealth related examination by a health care provider, the health careprovider is required to safely, securely, and privately:

maintain a record of the interaction between the health care providerand the individual for the lifetime of the individual;

provide the single-point-of-access cyber system health care registrywith the individual's single-point-of-access cyber systemidentification, along with the health care providerssingle-point-of-access cyber system identification and the date of thehealth care related service;

provide the individual with a complete record of the individual's healthcare related interaction with the health care provider by sending a copyof the health care provider's record to the individual through theindividual's public computer.

The individual can review the copy of the health care provider's recordfor the individual's health related examination for accuracy and thenrequire the health care provider correct inaccuracies if needed.

The individual can choose to save all, or any part of, the health careprovider's record of the individual's health related examination bytransferring the copy of health care provider's record from theindividual's public computer to the individual's private computer wherethe record or any part thereof can be saved as a part of theindividual's absolutely safe, secure, and private files which containthe individual's personal health records.

The individual can also choose to delete the copy of the health careprovider's record of the individual's health related examination.

If the individual happens to lose, or deletes, the copy of the healthcare provider's record of the individual's health related examination,the individual can contact the single-point-of-access cyber systemhealth care registry and receive the needed information. Thesingle-point-of-access cyber system health care registry providesinformation to the individual which only includes the health careprovider's single-point-of-access cyber system identification and thedate of the individual's health related examination. Using informationprovided by the single-point-of-access cyber system health careregistry, the individual can request that the health care provider sendthe individual a copy of the health care provider's record of theindividual's prior health related examination. The health care provideris required to provide a copy of the record of the individual's healthrelated examination to the individual only, thereby providing theindividual with complete privacy for single-point-of-access cybersystem-based health records.

The individual can, anonymously, or with others' knowledge of theindividual's identity, choose to share all or any part of theindividual's health related information with specified others.

If a third party such as a health care insurance company was obligatedto pay for any part of the individual's health related services, thethird party insurance company can require that the individual providethe third party insurance company with a cyber interaction whichdiscloses or confirms any or all of the details about the health relatedservices the individual received from the health care provider. Thissimple process eliminates the opportunity for health care fraud.

The individual can safely, securely, and privately share all or any partof the individual's health information with health care providers. Theindividual's shared health information will provide the health careprovider with a tool to use to better provide appropriate health careservices to the individual.

The individual can safely, securely, privately, and anonymously shareall or any part of the individual's personal health information withscientists or researchers who are working to provide improved healthcare outcomes. Quantum leaps forward may be made by scientists andresearchers when anonymously donated reliable health information fromlarge numbers of individuals are made available for research.

The individual can also choose to provide the individual's healthinformation to an agency such as the United States Center for DiseaseControl and Prevention (CDC) so that the CDC can use the individual asone of many who are used to monitor a geographic area or a specific partof the population for targeted health related occurrences. The CDC canthen monitor a sample of people to determine when and where there is anoutbreak of flu or food borne illness, and when and where there is anoccurrence of any other targeted health related issue.

The single-point-of-access cyber system's ability to allow an individualto safely, securely, privately, and anonymously share the individual'shealth information with others will provide public health entities withan informational tool which fills the public health entitiesstate-of-the-public's-health informational need.

The single-point-of-access cyber system provides an all-inclusiveworld-wide database of health care information as well asarea-appropriate definitions for the health care information that iscontained within the database. This database is an ultimateinformational tool for scientists and medical researchers to use toimprove health care outcomes worldwide.

The single-point of access cyber system provides an individual with asafe, secure, and private process for cyber interactions with cyberhealth monitoring devices or cyber health care delivery devices whichare on or near the person of the individual.

For example, an individual uses a cyber body function monitor on theirperson. The cyber body function monitor, using the resources of thesingle-point-of-access cyber system, has cyber interactions with theindividual's point of cyber access computer. The individual's cyber bodyfunction monitor reports to the individual's point of cyber accesscomputer that the individual has a blood sugar level which requires theindividual's cyber insulin delivery system which is on the person of theindividual to deliver a specified amount of insulin to the individual'sbloodstream. The individual can require that the individual's permissionis given prior to the delivery of insulin, or the individual can allowan automated delivery of insulin if the automated delivery does notexceed a pre-determined amount of insulin. The individual requires adose of insulin which exceeds this pre-determined acceptable dose, so,the individual is required to approve of the delivery of the indicatednecessary dose of insulin before the indicated necessary dose of insulinis delivered.

The single-point-of-access cyber system's ability to safely, securely,and privately monitor and record information which is received from acyber health monitoring device that is on or near the person of theindividual provides an individual with intermittent or continuousreporting from cyber health related monitors of any type. Informationfrom cyber health related monitors can be saved by the individual foruse by the individual or for use by health care providers. Or,information from the individual's cyber health related monitors can beused by science and medicine to enable science and medicine to betterunderstand the intricacies of the workings of a human body in order tobe able to provide improved health care outcomes worldwide.

In another example, an individual is driving towards the individual'sresidence. The individual inputs the voice command, “open the garagedoor,” to the individual's pocket-sized input output/cyber telephonedevice. The individual's point of cyber access computer receives theindividual's voice recognition-based cyber interaction and in turnmonitors the GPS locating device which is a part of the individual'sinput output/cyber telephone device so that the individual's point ofcyber access computer may determine the optimum point in time tointeract with the individual's garage door opener. The individual'spoint of cyber access computer interacts with the individual's garagedoor opener to open the individual's garage door when the individual andthe individual's vehicle approach.

While the disclosed system has been defined in terms of its preferredand alternative embodiments, those of ordinary skill in the art willunderstand that numerous other embodiments and applications of thedisclosed system will become apparent. Such other embodiments andapplications shall be included within the scope and meaning of theinvention as defined by the appended claims.

1. A single-point-of-access cyber system comprising: devices and programming structured for processing cyber activities; devices and programming structured to provide a single point of cyber access to an individual; an input output device for cyber interactions between said individual and said devices and programming structured to provide said individual with a single point of cyber access; devices and programming structured to provide a cyber communications network; devices and programming structured to carry out cyber activities among said individual, others, cyber assets of said individual, and cyber resources of said others.
 2. The single-point-of-access cyber system as defined in claim 1 further comprising a system requirement for said individual to be property identified prior to gaining access to cyber communications, cyber activities, said cyber assets of said individual, and said cyber resources of said individual and said others.
 3. The single-point-of-access cyber system as defined in claim 1 wherein each said individual using the single-point-of-access cyber system has only one unique, lifelong, single-point-of-access cyber system identification.
 4. The single-point-of-access cyber system as defined in claim 1 wherein said single-point-of-access cyber system is structured to interact with cyber devices, each of said cyber devices having a single-point-of-access cyber system address, and each of said cyber devices further having only one unique single-point-of-access cyber system identification.
 5. The single-point-of-access cyber system as defined in claim 4 further comprising: devices and programming structured to establish the identity of each said cyber device and each said individual using the single-point-of-access cyber system; devices and programming structured to verify the identity of each said cyber device and each said individual using the single-point-of-access cyber system; and devices and programming structured to confirm the identity of each said cyber device and each said individual using the single-point-of-access cyber system.
 6. The single-point-of-access cyber system as defined in claim 4 further comprising system requirements for: each said individual to be property identified prior to each step in carrying out the cyber interactions of said individual throughout the single-point-of-access cyber system; and each said cyber device to be property identified prior to each step in carrying out the cyber interactions of said cyber device throughout the single-point-of-access cyber system.
 7. The single-point-of-access cyber system as defined in claim 5 further comprising devices and programming for using any combination of facial recognition, voice recognition, or facial movement for accurately and reliably identifying an individual.
 8. The single-point-of-access cyber system as defined in claim 1 further comprising an individual's point of cyber access computer.
 9. The single-point-of-access cyber system as defined in claim 8 wherein said individual's point of cyber access computer further comprises devices and programming structured to establish said individual's identity prior to providing said individual with access to said individual's point of cyber access computer.
 10. The single-point-of-access cyber system as defined in claim 8 wherein said individual's point of cyber access computer further comprising a separate private computer for processing and support for said individual's private cyber activities and a separate and different public computer for processing and support for said individual's public cyber activities; and wherein said separate private computer and said separate public computer is accessible only through said individual's point of cyber access computer.
 11. The single-point-of-access cyber system as defined in claim 10 further comprising devices and programming structured to provide said individual with safety, security, and privacy for said individual's cyber activities by providing separate processing and support for said individuals private cyber activities, and by providing separate and different processing and support for said individual's public cyber activities.
 12. The single-point-of-access cyber system as defined in claim 8 wherein said individual's point of cyber access computer further comprising devices and programming structured to provide said individual with the ability to store, to access, to use, and to manage a lifelong collection of said individual's file-based cyber assets and file-based cyber resources.
 13. The single-point-of-access cyber system as defined in claim 11 wherein said individual's point of cyber access computer further comprising: devices and programming structured for providing safe and secure cyber interactions between: said individual's separate private computer and said individual's point of cyber access computer; said individual's separate private computer and said individual's separate public computer; either said individual's separate private computer or said individual's point of cyber access computer and device-based cyber assets of said individual.
 14. The single-point-of-access cyber system as defined in claim 8 wherein said individual's point of cyber access computer further comprising: devices and programming structured for confirming identity of any other person prior to allowing cyber interactions from said other person to gain access to said individual's point of cyber access computer and wherein, said individual's point of cyber access computer further comprising devices and programming structured for confirming or establishing the identity of each cyber device prior to allowing cyber interactions from said cyber device to gain access to said individual's point of cyber access computer.
 15. The single-point-of-access cyber system as defined in claim 11 wherein said point of cyber access computer further comprises devices and programming structured for excluding cyber interactions of others as well as cyber interactions of the cyber devices of others from gaining access to said individual's private computer.
 16. The single-point-of-access cyber system as defined in claim 14 further comprising devices and programming structured for providing said individual with the ability to: grant or deny access to all or part of an individual's cyber telephone system by cyber interactions from specified others: grant or deny access to all or part of said individual's public computer and said cyber resources contained within by cyber interactions from specified others.
 17. The single-point-of-access cyber system as defined in claim 8 wherein said individual's point of cyber access computer further comprises devices and programming structured for providing for cyber interactions between said individual's point of cyber access computer and remote cyber devices.
 18. The single-point-of-access cyber system as defined in claim 9 wherein said individual's point of cyber access computer, after having established the identity of said individual, and after having granted the cyber interactions of said individual access to said individual's point of cyber access computer, in turn provides verification of said individual's identity prior to each step said cyber interactions of said individual carry out throughout the single-point-of-access cyber system.
 19. The single-point-of-access cyber system as defined in claim 1 further comprising a cyber communications network structured for including cyber communications network devices and programming, wherein prior to further cyber interactions between said cyber communications network and said individual's point of cyber access computer, the single-point-of-access cyber system requires said cyber communications network device which engages in first cyber interactions with said individual's point of cyber access computer to both confirm said individual's identity, and to establish the identity of said individual's point of cyber access computer.
 20. The single-point-of-access cyber system as defined in claim 19 wherein after said cyber communications network's device confirms said individual's identity and establishes the identity of said individual's point of cyber access computer, said device within said cyber communications network which first engages in cyber interactions with said individual's point of cyber access computer in turn provides verification of identity of said individuals point of cyber access computer prior to each step cyber interactions of said individual carry out throughout the single-point-of-access cyber system.
 21. The single-point-of-access cyber system as defined in claim 1 further comprising devices and programming structured for providing said individual with the ability to request or require others to provide said individual with varying levels of privacy as defined by said individual, for cyber activities between said individual and said others.
 22. The single-point-of-access cyber system as defined in claim 1 further comprising a system requirement wherein prior to cyber content being sent to a recipient, said cyber content be pre-processed and in a form structured to require no further processing for use by said recipients thin input output device.
 23. The single-point-of-access cyber system as defined in claim 4 further comprising devices and programming structured for providing system-standard interface and interaction processes and procedures, said system-standard interface and interaction processes and procedures provide for interoperable use of any cyber device as a component of the single-point-of-access cyber system.
 24. The single-point-of-access cyber system as defined in claim 1 further comprising devices and programming structured for minimizing the number of operational processes and procedures used by others by providing and requiring system-wide use of standard single-point-of-access cyber system operational processes and procedures by others.
 25. An input output device structured for providing an individual with the ability to remotely interact with said individual's point of cyber access computer, said input output device comprising: devices and programming for sending cyber interactions from the individual to said individual's point of cyber access computer; devices and programming for receiving cyber interactions from said individual's point of cyber access computer; devices and programming enabling said individual to perceive output which is the result of the input output device receiving said cyber interactions from said individual's point of cyber access computer; and devices and programming for interacting with said individual's point of cyber access computer through the use of a cyber communications network.
 26. The input output device as defined in claim 25 further comprising devices and programming structured for providing said individual's point of cyber access computer information which enables said individual's point of cyber access computer to establish the identity of said individual and establish the identity of the input output device being used by the individual.
 27. The input output device as defined in claim 25 further comprising devices and programming structured for providing said individual with the ability to use the input output device for cyber interactions between said individual and said individual's point of cyber access computer.
 28. The input output device as defined in claim 25 wherein said devices and programming used for sending cyber interactions from said individual to said individual's point of cyber access computer, and receiving cyber interactions from said individual's point of cyber access computer, further comprising a cyber telephone device.
 29. The input output device as defined in claim 25 further comprising devices and programming structured for enabling the input output device to interact with compatible cyber devices.
 30. The input output device as defined in claim 25 further comprising devices and programming structured for providing for use of the input output device as a cyber communications network link between said individual's point of cyber access computer and remote cyber devices.
 31. Architecture for a single-point-of-access cyber system for defining both the components of the single-point-of-access cyber system and the interrelationship of components, said architecture for a single-point-of-access cyber system comprising; a universal interactive operating system structured for providing programming for carrying out processes and procedures establishing a cyber environment that provides for using and enforcing single-point-of-access cyber system architectural rules and requirements; a universal interactive operating system structured for providing operational programming for single-point-of-access cyber system devices and components; single-point-of-access cyber system architectural rules and requirements; single-point-of-access cyber system structure comprising; one or more point of cyber access computers; one or more input output devices for an individual to use for cyber interaction between said individual and said one or more point of cyber access computers; one or more cyber devices constructed and arranged for cyber interactions with said one or more point of cyber access computers; and, a cyber communications network; wherein said one or more point of cyber access computers, said one or more input output devices, and said one or more cyber devices interconnect using said cyber communications network, all using said universal interactive operating system.
 32. Architecture for a single-point-of-access cyber system as defined in claim 31 further comprising devices and programming structured for providing separate processing and support for said individuals private cyber activities as well as separate and different processing and support for said individual's public cyber activities.
 33. Architecture for a single-point-of-access cyber system as defined in claim 31 wherein said one or more point of cyber access computers further comprising said individual's point of cyber access computer, and said individual's point of cyber access computer is a combination of three separate computers: said individual's point of cyber access computer which is required to establish or confirm the identity of the sender of each cyber interaction prior to providing the sender's cyber interaction access to said individual's point of cyber access computer; said individual's private computer which can only be accessed through said individual's point of cyber access computer, and can only be accessed by cyber interactions from said individual and cyber interactions from said individual's device-based cyber assets: and said individual's public computer which can be accessed by cyber interactions from others and can only be accessed through said individual's point of cyber access computer.
 34. The single-point-of-access cyber system architecture as defined in claim 31 wherein said single-point-of-access cyber system architectural rules require each individual be properly identified prior to each step cyber interactions of said individual carry out throughout the single-point-of-access cyber system; and, single-point-of-access cyber system architectural rules require each cyber device be property identified prior to each step cyber interactions of said cyber device carry out throughout the single-point-of-access cyber system.
 35. Architecture for a single-point-of-access cyber system as defined in claim 33 further comprising a cyber asset manager.
 36. Architecture for a single-point-of-access cyber system as defined in claim 33 further comprising a cyber telephone system.
 37. Architecture for a single-point-of-access cyber system as defined in claim 31 further comprising programming providing system-standard interface and interaction processes and procedures, wherein said one or more cyber devices can be configured to be used as a part of the single-point-of-access cyber system by means of said one or more cyber devices' use of said system-standard interface and interaction processes and procedures.
 38. Architecture for a single-point-of-access cyber system as defined in claim 31 wherein processes and procedures can be: added to said single-point-of-access cyber system; removed from said single-point-of-access cyber system; arranged in any configuration as a part of said single-point-of-access cyber system.
 39. Architecture for a single-point-of-access cyber system as defined in claim 31 wherein architectural components and cyber devices can be: added to said single-point-of-access cyber system; removed from said single-point-of-access cyber system; arranged in any configuration as a part of said single-point-of-access cyber system.
 40. Architecture for a single-point-of-access cyber system as defined in claim 31 further comprising single-point-of-access cyber system device architecture wherein components, processes, and procedures can be: added to a cyber device; removed from a cyber device; arranged in any configuration as a part of a cyber device.
 41. Architecture for a single-poi-of-access cyber system as defined in claim 31 further comprising: a single interconnected cyber system for use by said individual for said individual's cyber interactions and cyber activities; a system-wide set of standard processes and procedures providing for and requiring compliance with single point of access cyber system architectural rules and requirements; a requirement that each cyber device and each individual using the single-point-of-access cyber system always be properly identified; a single, remote, point of cyber access computer for said individual's exclusive use for single-point-of-access cyber system cyber communications, cyber interactions, and cyber activities; programming and devices providing said individual remote access to cyber assets and cyber resources.
 42. A universal interactive operating system for a single-point-of-access cyber system, said single-point-of-access cyber system, for use by an individual, including, a cyber communications network, file-based cyber assets, device-based cyber assets, file-based cyber resources, device-based cyber resources, one or more input output devices, and one or more remote point of cyber access computers; said universal interactive operating system comprising: programming structured for properly identifying each individual and each cyber device; programming structured for requiring each individual be properly identified prior to each step cyber interactions of said individual carry out throughout the single-point-of-access cyber system, programming structured for requiring each cyber device be property identified prior to each step cyber interactions of said cyber device carry out throughout the single-point-of-access cyber system; programming structured for providing for the use of and the operations of a cyber communications network; programming structured for providing storage, access, use, and management of file-based cyber assets and file-based cyber resources; programming structured for providing for use of and operations of device-based cyber assets and device-based cyber resources; programming structured for providing security; programming structured for providing for the use of and the operations of input output devices; programming structured for providing for the use of and the operations of remote computers; programming structured for providing a history of cyber activities; programming structured for providing an individual with control of said individual's single-point-of-access cyber system administrative settings; programming structured for providing an individual with control of said individual's single-point-of-access cyber system operational settings; programming structured for providing an individual with control of said individual's single-point-of-access cyber system access settings; programming structured for providing said individual with the ability to request others provide said individual with said individual's preferences for cyber interactions, for cyber content, and for privacy: programming structured for providing for the use of and the operations of a cyber asset manager; and, programming structured for providing for the use of and the operations of a cyber telephone system.
 43. The universal interactive operating system as defined in claim 42 further comprising programming structured for providing and requiring separate processing and support for said individual's private cyber activities and separate and different processing and support for said individual's public cyber activities.
 44. The universal interactive operating system as defined in claim 42 further comprising devices and programming structured for providing for interoperable use of cyber files and cyber devices which do not use the standard processes, procedures, and formats of the universal interactive operating system by providing processes and procedures structured for converting cyber activities, cyber content, and cyber interactions to and from the standard processes, procedures, and formats of the universal interactive operating system.
 45. The universal interactive operating system as defined in claim 42 further comprising a frames and scrolls format for creation and use of interactive image-based cyber content.
 46. The universal interactive operating system as defined in claim 42 further comprising programming structured for requiring and providing for the use of any combination of unique separate processes, procedures, protocols, codes, and/or formats to be used for cyber activities and for cyber interactions which are used for different purposes.
 47. The universal interactive operating system as defined in claim 42 further comprising a cyber license system.
 48. The universal interactive operating system as defined in claim 42 further comprising programming structured for providing said individual exclusive access to and use of: administrative controls, operational controls, and access controls for: said individual's point of cyber access computer; said individual's private computer; said individual's public computer; said individuals cyber asset manager; said individual's cyber telephone system; said individual's cyber assets; and, said cyber resources.
 49. The universal interactive operating system as defined in claim 42 further comprising processes and procedures structured for using one or more virtual projectors in conjunction with one or more virtual projection display screens which receive the image output from said one or more virtual projectors, and one or more virtual recorders which record virtual images from said one or more virtual projection screens, and virtual audio from said one or more virtual projectors for: providing interoperability conversion of cyber content, cyber interactions, and cyber activities to or from said universal interactive operating system-standard format; providing security; altering cyber image size, altering cyber image resolution, or altering the visual presence of a cyber image; interactive alteration of image-based cyber content; and, converging two or more sources of image-based cyber content into one or more converged sources of interactive image-based cyber content.
 50. The universal interactive operating system as defined in claim 42 wherein programming is structured for providing processes and procedures which provide a cyber environment wherein said individual can: add architectural components to, add cyber components to, and add cyber devices to said single-point-of-access cyber system; remove architectural components from, remove cyber components from, and remove cyber devices from said single-point-of-access cyber system; and alter the configuration of the architectural components of, alter the configuration of the cyber components of, and alter the configuration of the cyber devices of said single-point-of-access cyber system.
 51. The universal interactive operating system as defined in claim 42 wherein programming is structured for providing processes and procedures for providing a cyber environment wherein said individual can: add processes and procedures to said single-point-of-access cyber system; remove processes and procedures from said single-point-of-access cyber system; alter the configuration of the processes and the procedures of said single-point-of-access cyber system.
 52. The universal interactive operating system as defined in claim 42 wherein programming is structured for providing processes and procedures for providing a cyber environment wherein said individual can: add components, add processes, and add procedures to a cyber device; remove components, remove processes, and remove procedures from a cyber device; alter the configuration of the components, after the configuration of the processes, and alter the configuration of the procedures of a cyber device.
 53. A point of cyber access computer structured for providing an individual with access to computing capabilities, with access to cyber interactions, with access to cyber communications, with access to the individuals cyber assets, and with access to the cyber resources of others, said point of cyber access computer comprising: devices and programming for processing cyber activities; devices and programming for providing security; devices and programming for establishing, verifying, and confirming identity; devices and programming for cyber interactions between said individual at an input output device and said individual's point of cyber access computer, devices and programming for cyber interactions with others; devices and programming for cyber interactions with cyber devices; devices and programming for storing, accessing, using, and managing cyber files; devices and programming for the transfer of cyber communications, cyber interactions, and cyber activities over a cyber communications network.
 54. The point of cyber access computer as defined in claim 53 further comprising a cyber telephone system, said cyber telephone system providing processing and management of, and security for, an individuals cyber telephone services and cyber video telephone services.
 55. The point of cyber access computer as defined in claim 53 further comprising a cyber asset manager, said cyber asset manager providing processing, and management of, and security for, cyber interactions between said individual's cyber asset manager and said individual's point of cyber access computer, and cyber interactions between said individual's cyber asset manager and said individual's device-based cyber assets. 