True ID Security, LLC™

Patents for license:

U.S. 6,810,310

U.S. 7,145,477

U.S. 8,138,951
U.S. 9,878,802

U.S. 9,993,183 System, Method and Device for Confirmation of an Operator’s Health Condition and Health Status-”True ID’ Alive Iris Scan Technologies”International Classes: A61B5/1171; A61B3/00; G06K9/00
Alive Biometric Identification Authentication Security  Systems Solutions™

India patent pending-Ask for details


True ID Security’s mission is to license proprietary patent-protected Alive Biometric Identification Authentication Security Systems Solutions™ (ABIASSS™) technology.  This technology provides the highest degree of security for all forms of communication devices, internet of things (IOT), home and office security, as well as create a true keyless, cardless, codeless security solution platform.  True ID Security’s state-of-the-art technology offers an array of alive multi biometric based identification authentication solutions along with Multi Data Storage Fragmentation Security Systems Solutions(MDSFSSS). The fragmentation of personal biometric information is vital for the prevention of stolen identities. The use of multiple data servers for storing information enhance the security systems by large margins and it is the only way to prevent cyber criminals from stealing personal biometric information. These solutions will prevent the loss of personal information and property, sensitive company data and government assets. Alive multi biometric solutions are becoming the ultimate for all security needs, from buildings to aircraft, there is no limit on how many different industries these solutions will encompass.



Authentic Patient identification (inpatient/outpatient)
Patient tracking (inpatient/outpatient)
Incorrect medication(inpatient/outpatient)
Surgical errors
Continuous physiologic monitoring (inpatient/outpatient)
Patient travel/mobility difficulty
Healthcare costs
Not enough doctors
Overcrowding in Emergency rooms and Urgent Care facilities and situations
Infant mortality
Maternal mortality
Patient medical record privacy and security
Medication confusion
Accurate timing for patient medication delivery ability
Long wait times for doctor visits
Medical malpractice
Patient identification fraud
Proper patient identification
Correct patient medical records
Correct patient medication
Inability to deliver proper medication amounts 
High cost of medical record tracking and storage
High cost of medical administration
Inefficient patient diagnoses systems and devices
Continuous outpatient monitoring ability


Lack of personal security options Identity and property theft
Internet security breaches
Easy access to data on lost or stolen communication devices
Theft of unsecured sensitive information
Internet viruses and worms
Inability for true internet user identification

Home security: Smart Home intrusions from Cyber criminals


The accessibility of privileged information is becoming easier to obtain due to the failure of existing security systems.  Millions of desktop computers, laptops, tablets, cellular phones and personal digital assistant devices are stolen annually in the United States alone, giving the thief an opportunity to steal any or all sensitive material within the device.  The fact is, only a few key pieces of information are needed to steal personal identification information, which is a growing problem throughout the world.  The expectation exists that we are properly identified before being allowed access to everything from our cellular phones to our financial accounts.  There is no current foolproof solution to authenticate one’s identity.  In addition, the ability of an individual to keep track of the numerous passwords, access codes and magnetic strip cards has already exceeded most people’s capacity to manage.



Utilization of alive biometric signatures for granting access to communication platforms
Select alive biometric access for communication devices
Alive biometric signature registration portals
Complete biometric and physiological data storage banks
Continuous identification of authorized operators
Continuous health condition monitoring
Location and health condition of communication device and operator

Alive biometric building access points

True ID Security’s solutions utilize a fusion of alive biometric and physiological sensors that coalesce into a true identification signature of an individual.  Each individual has their own unique alive biometric signature.  These signatures serve as a method of continuous or momentarley  identification authentication verification. 



In today’s world there exists a great need for a fast, unobtrusive and extremely accurate identification system for all personal, commercial and government communication appliances and platforms.  True ID Security, LLC  ™ recognizes the need to form alliances with worthy companies in the technological fields associated with our company’s mission.  Working together with our patent-protected products, we are revolutionizing the security systems for all forms of communications, transportation, infrastructures, internet of things(IOT) services and devices, healthcare, firearms and many other security related industries.  These security solutions will evolve into billions of new platforms and devices around the world.  We believe our products will enhance your company’s ability to offer the greatest level of security in the global marketplace.



The applications for these biometric based security systems are limitless.  True ID Security, LLC™ is pursuing the markets in the following industries:  communications, transportation, firearms, home and office security, healthcare, banking, data storage devices and government assets.  For example: in the communications market, a cell phone, PDA, computer or laptop could be equipped with one or all of the following biometrics:  fingerprint and/or voice recognition for initial access, and facial and/or thermal imaging for continuous recognition while in use.

Current uses for True ID Security (ABIASS)™ (Alive Biometric Identification Authentication Security System) are for the following forms of communication devices:
Cellular phones
All devices using a CPU requiring identification for operation
Personal computers
Personal data devices
Global positioning devices
Voting venues
Voting platforms
Voting devices


ABIASS™ continuously verifies the owner/operator using the preprogrammed biometrics of the first original owner/operator stored within a communication device’s secure data bank. The biometric and physiological systems continuously authenticate and identify the operator of a communication device.  Input components are coupled to the operator sensors.  A communication device is coupled to the operator sensors.  The communication device central processing unit is coupled to the operator sensors.  The communication device’s central processing unit is coupled to a transceiver.  The transceiver is coupled to a communication provider.  The communication device and communication device provider continuously authenticates the operator of the communication device.

This disclosed method is directed toward a method of operating a communication device.  The authorized operator of a communication device’s biometric and physiological parameters is recognized by the communication device’s central processing unit coupled to stored authorized operator data.  The method includes sensing biometric and physiological parameters of the operator of the communication device.  The method includes comparing the sensed biometric and physiological parameters of the operator of the communication device with stored data and detecting discontinuity between the biometric and physiological parameters and stored data.  The method includes transmitting a signal to a central processing unit of a communication device notifying it that discontinuity exists and processing a signal in the central processing unit.  The method includes activating a device’s “Lock out System” allowing only an emergency signal to be sent from the communication device.  The signal sent from the communication device reveals the location, condition and identification of an unauthorized operator.  A signal may be sent from the service provider for the communication device to self-destruct all stored data on its central processing unit.

The True ID Security ABIASS™ as explained above, will work similarly in the following industries:


Physiological Sensor infused Biometric Signature accessibility Data Servers
Physiological Sensor infused Biometric Signature accessibility routers
Physiological Sensor infused Biometric Signature accessibility communication Devices


ATM transactions
Wireless transfers via communication devices
Point of sale transactions via communication devices
Account verification identification of authorized users

 Health Care Monitoring

Onsite patient
Operators of all forms of communication, transportation, banking, and security devices

Sea Vessels
Personal watercraft/motorcycles

 Infrastructure Security
Government buildings worldwide (U.S. occupies 224,000 buildings globally)
Private sector professional/retail buildings
Voting machines and polling locations
Train stations
International ports
Oil rigs
Private homes
Governmental housing
Sport arena’s
All public & private events
All structure access points
Throughout entire buildings and surrounding facilities
Industrial mining operations
Factories & refineries
Nuclear power plants
Hazardous material storage facilities


True ID Security, LLC™, working together with companies already established in their industry, are revolutionizing identification systems and platforms worldwide.  Considering the scale, magnitude and the global impact of these technologies, the amount of annual revenue could easily exceed a 100 billion dollars in the coming years.  True ID Security, LLC™ is partnering with a variety of companies and government’s to complete this mission.