Various Techniques To Increases Searching Speed, Unification, Reduce Installation Cost & Memory Consumption

Concurrently these techniques will provide universal unification for each human that can solve various security and accessing related problems. All the three methods would contain very small size database for whole universe’s humans, and that integrated and common database would be accessible very efficiently. The advantage of these methods is that these can be used in integrated mode or can be applicable individually according to the necessity. Further these methods would be used for accessing online or offline accounts like bank accounts, social networking sites accounts etc. Moreover it enhances the concept of internet security or access security which has always been the main aim of biometrics. I am explaining my techniques using fingerprint technology & further we are flexible to use these techniques with any other technology like iris scan, facial scan etc.

Publication Date
23 August 2012

biometrics fingerprinting


Click here to download link on

Click to share this page via your favorite social network.

Learn more about defensive publications with our examples and frequently asked questions

What we are trying to do?

We are attempting to mobilize the creativity and innovative capacities of the Linux and broader open source community to codify the universe of preexisting inventions in defensive publications that upon publication in the IP.COM database will immediately serve as effective prior art that prevents anyone from having a patent issued that claims inventions that have already been document in a defensive publication. In addition to creating a vehicle to utilize this highly effective form of IP rights management for known inventions, it is hoped that the community will use defensive publications as a means of codifying future inventions should the inventors prefer not to make their invention the subject of a patent disclosure and application.