Patents by Inventor Robert O. Keith, Jr.

Robert O. Keith, Jr. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220385458
    Abstract: A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.
    Type: Application
    Filed: August 5, 2022
    Publication date: December 1, 2022
    Inventor: Robert O. Keith, JR.
  • Publication number: 20220229888
    Abstract: A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.
    Type: Application
    Filed: April 8, 2022
    Publication date: July 21, 2022
    Inventor: Robert O. Keith, JR.
  • Publication number: 20220197985
    Abstract: A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.
    Type: Application
    Filed: October 8, 2021
    Publication date: June 23, 2022
    Inventor: Robert O. Keith, JR.
  • Publication number: 20220164424
    Abstract: A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.
    Type: Application
    Filed: December 3, 2021
    Publication date: May 26, 2022
    Inventor: Robert O. Keith, Jr.
  • Patent number: 11328042
    Abstract: A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.
    Type: Grant
    Filed: May 6, 2020
    Date of Patent: May 10, 2022
    Assignee: Winkk, Inc.
    Inventor: Robert O. Keith, Jr.
  • Publication number: 20220139546
    Abstract: A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.
    Type: Application
    Filed: January 11, 2022
    Publication date: May 5, 2022
    Inventors: Sudha Manjunath, Sanju Manjunath, Robert O. Keith, JR.
  • Publication number: 20220138300
    Abstract: A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.
    Type: Application
    Filed: January 11, 2022
    Publication date: May 5, 2022
    Inventors: Sudha Manjunath, Sanju Manjunath, Robert O. Keith, JR.
  • Publication number: 20220130501
    Abstract: A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.
    Type: Application
    Filed: January 11, 2022
    Publication date: April 28, 2022
    Inventors: Robert O. Keith, Jr., Sanju Manjunath
  • Publication number: 20220092163
    Abstract: A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.
    Type: Application
    Filed: December 3, 2021
    Publication date: March 24, 2022
    Inventor: Robert O. Keith, JR.
  • Publication number: 20220094545
    Abstract: Aspects of associative cryptography key operations are described. In one embodiment, a first cryptographic function is applied to secret data to produce a first encrypted result. The first encrypted result is transmitted by a first device to a second device. The second device applies a second cryptographic function to the first encrypted result to produce a second encrypted result. At this point, the secret data has been encrypted by two different cryptographic functions, each of them being sufficient to secure the secret data from others. The two different cryptographic function can be inversed or removed, in any order, to reveal the secret data. Thus, the first device can apply a first inverse cryptographic function to the second encrypted result to produce a first result, and the second device can apply a second inverse cryptographic function to the first result to decrypt the secret data.
    Type: Application
    Filed: December 3, 2021
    Publication date: March 24, 2022
    Inventors: Rustam Islamov, Robert O. Keith, JR.
  • Publication number: 20220092164
    Abstract: A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.
    Type: Application
    Filed: December 3, 2021
    Publication date: March 24, 2022
    Inventor: Robert O. Keith, JR.
  • Publication number: 20220092165
    Abstract: A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.
    Type: Application
    Filed: December 3, 2021
    Publication date: March 24, 2022
    Inventor: Robert O. Keith, JR.
  • Publication number: 20220092161
    Abstract: A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.
    Type: Application
    Filed: December 3, 2021
    Publication date: March 24, 2022
    Inventor: Robert O. Keith, JR.
  • Publication number: 20220092162
    Abstract: A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.
    Type: Application
    Filed: December 3, 2021
    Publication date: March 24, 2022
    Inventor: Robert O. Keith, JR.
  • Publication number: 20220093256
    Abstract: A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.
    Type: Application
    Filed: December 6, 2021
    Publication date: March 24, 2022
    Inventors: Robert O. Keith, JR., Sanju Manjunath
  • Publication number: 20220094550
    Abstract: A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.
    Type: Application
    Filed: December 3, 2021
    Publication date: March 24, 2022
    Inventor: Robert O. Keith, JR.
  • Publication number: 20220043913
    Abstract: A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.
    Type: Application
    Filed: October 8, 2021
    Publication date: February 10, 2022
    Inventor: Robert O. Keith, JR.
  • Publication number: 20220045841
    Abstract: A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software. The data is recorded in a highly secure manner. The data is stored encrypted in a database and accessed using a homomorphic access technology where the actual encrypted contents are not exposed.
    Type: Application
    Filed: October 8, 2021
    Publication date: February 10, 2022
    Inventor: Robert O. Keith, JR.
  • Publication number: 20220038895
    Abstract: A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.
    Type: Application
    Filed: October 18, 2021
    Publication date: February 3, 2022
    Inventors: Robert O. Keith, JR., Bradley E. Gray
  • Publication number: 20220036905
    Abstract: A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.
    Type: Application
    Filed: October 8, 2021
    Publication date: February 3, 2022
    Inventor: Robert O. Keith, JR.