A method to identify victim of abuse and remote operator using voice to skull and remote neural monitoring, comprising the steps of: using a database in a computer consisting of one or more of disgusting items, funny items, anti-political trend and anti-religious belief items, countries and races it…
US Patent Application for Methods and Automatic System to Identify Who is Victims of Abuse Voice to Skull & Remote Neural Monitoring Technology and Identify Who is Remote Attacker or Operator Using Device of Voice to Skull & Remote Neural Monitoring Patent Application (Application #20200275874 issued September 3, 2020) - Justia Patents Search Log In Sign Up Find a Lawyer Ask a Lawyer Research the Law Law Schools Laws & Regs Newsletters Marketing Solutions Justia Connect Pro Membership Basic Membership Justia Lawyer Directory Platinum Placements Gold Placements Justia Elevate SEO Websites Blogs Justia Amplify PPC Management Google Business Profile Social Media Justia Onward Blog Justia Patents US Patent Application for Methods and Automatic System to Identify Who is Victims of Abuse Voice to Skull & Remote Neural Monitoring Technology and Identify Who is Remote Attacker or Operator Using Device of Voice to Skull & Remote Neural Monitoring Patent Application (Application #20200275874) Methods and Automatic System to Identify Who is Victims of Abuse Voice to Skull & Remote Neural Monitoring Technology and Identify Who is Remote Attacker or Operator Using Device of Voice to Skull & Remote Neural Monitoring Aug 31, 2019 A method to identify victim of abuse and remote operator using voice to skull and remote neural monitoring, comprising the steps of: using a database in a computer consisting of one or more of disgusting items, funny items, anti-political trend and anti-religious belief items, countries and races items, foreign clubs or organizations items, languages and dialects items, and scientific knowledge items, tested person selecting one item which only causes the remote operator to have psychological response and does not cause the tested person to have psychological response, instructing the tested person to launch imaginary psychological attack, assigning test questions based on the imaginary psychological attack and obtaining answers from the tested person in response to the test questions, then using polygraph meter to analysis the answers and assigning true or false status to the answers. Skip to: Description · Claims · Patent History · Patent History Description CROSS REFERENCE OF RELATED APPLICATION This application claims the benefit of U.S. Provisional Patent Application No. 62/812,915, filed Mar. 1, 2019. This application is incorporated by reference herein in their entirety. BACKGROUND OF THE PRESENT INVENTION Field of Invention The present invention relates to a method to identify who is victims of abuse voice to skull and remote neural monitoring technology to and identify who is remote attacker or operator using device of voice to skull and remote neural monitoring. Description of Related Arts Origin of the problem: from 2015 to 2018, there were large amount of victims in 22 provinces in China, Shanghai and Beijing municipalities have large number of collective protests against RNM & V2K technology abuse. In addition, on Oct. 1, 2015, representatives from 17 countries in Berlin, Germany, hold a “Covered Harassment Conference”. The covered harassment is same thing with voice to skull & remote neural monitoring technology. After a lot of times contacting with the victims in China mainland WeChat, emails and telephones, these victims' thoughts were read and harassed at same time by some unknown Chinese institutions abusing these technology. According to Zhong Zhiyong, the organizer and leader of anti-V2k & RNM torture in 22 provinces and cities in mainland China (Zhong Zhiyong's affairs were also reported by the media “The Epoch Times” and he and other victims representatives also received interview with “New Tang Dynasty TV”). He told me directly by phone and WeChart almost all victims have the same experience: quickly being read thoughts and could use their thoughts to hold silent thoughts conversations with operators (ROD) using devices of V2K & RNM. Including a Chinese victim has been a lawful permanent resident in United States is still quickly being read thoughts and could use his thoughts to hold silent thoughts conversations with operators (ROD) using devices of V2K & RNM. But all these RODs are in P.R.China. Another Chinese leader anti-abuse technology of V2K & RNM, Mr. Yao Dou-jie live in Shenzhen China who collect large information also confirmed same cases above. Generally three to five operators (ROD) of V2k & RNM devices in group in turn concentrate one victim via satellite positioning technology to realize remote harassment, the technology is mainly based on these US technology patents and China patents which describe the technology of V2K & RNM are extracting the brain's characteristic wave frequency first (like fingerprints, each person's brain characteristic wave frequency is different), then codes the brain characteristic wave frequency by computer software technology and remotely locks the frequency and monitors the victim's brain wave frequency using computer software technology and satellite positioning technology. The bases of these technology are microwave auditory effect or call Frey effect and neural coding technology. In such way, three to five operators (ROD) using devices of V2K & RNM in groups perform active psychological attacks on victim's brain with some negative emotions, but the effect of this kind of psychological reactions can be two-ways or two directions between victim and operators (RODs) using devices of V2K & RNM. In past of years, FBI's investigation on some cases related similar technology attacking. This is not a scientific fiction, because the following US patents and China patents tell us it is true and existing technologies: 1. U.S. Pat. No. 6,470,214B1 Method and device for implementing the radio frequency hearing effect, US Air Force. 2. The US public technology patent for remote reading human thoughts is U.S. Pat. No. 3,951,134A: Apparatus and method for remotely monitoring and altering brain waves. 3. U.S. Pat. No. 6,011,991A explained how read human thoughts remotely via satellite. 4. CN 2008202247769.1 China use the tech both in peaceful time and war time. Till now we have confirmed these technologies existing with US patents and China patents. 5. US company QU-wave.com also explains what is V2K. Till now, there is not any method to identify both the victims and those remote operators (RODs) using devices of V2K & RNM around world. These abuse has been developed global and transnational, so the invention is the first set of method in the world which can identify both victims and remote operators (RODs) using devices of V2K & RNM accurately in high degree by means of computer technology. SUMMARY OF THE PRESENT INVENTION An object of the present invention is to provide a methods to identify both the victims and those remote operators using devices of V2K & RNM around world. This is the first set invention of identification with computer and automatic technology around world which can automatically generate identification results, except checking polygraph meter with human, all other parts of the system achieves automation. The method of the present invention: Abbreviation: ROD: remote operators using devices of V2K & RNM technology ISA:an identification system administrator TP: a tested person who originally claims him/her as a victim Step 1. Ask a TP who was a victim to use of RODs reading his/her thoughts to launch multiple reverse psychological attacks to those RODs to cause or stimulate ROD's psychological response, the base of technology comes from US patents and China patents. Step 2. Find out all kinds of characteristics of psychological response both in the victim's and ROD's by psychological analysis tech., the base of technology come from basic psychological analysis. Step 3. Find the different characteristics of psychological responses between the victim's (TP's) and RODs' using relative comparing method; the base of theory come from quantitative science and statistics. Step 4. Use of automatic control decay curve (PID control regulate curve) to prove the method of identification is accurate, the base of theory come from automatic control theory. The present invention utilizes the victim's thoughts to be read and the victim can use his/her thoughts to establish brain thoughts talking communication with the remote operator using device (ROD) of V2K & RNM, so the invention ask the victim to use his/her thoughts intentionally choose classified content from data base of psychological reaction in a computer to attack those remote operators using device (RODs) via satellite. Because RODs are human beings and they should make psychological response on their device when they receive the victim's remote psychological attacking via satellite and then in turn the victim can feel and sense the RODs' psychological response. According theory of psychoanalysis: the psychological response between an active psychological attacker and a psychological attacked person passively have completely different characteristics, so these different psychological responses caused by selective classified psychological attacks can be used both to identify a victim (TP) and those remote operators using device (RODs) of RNM & V2K via satellite. From the theory of automatic control decay curve: multiple PID adjustments can achieve a correct control requirements, so the above victim (TP) who use multiple classified and deliberate psychologically attacks the remote operators using device (RODs) V2K & RNM can gradually approach the correct identifying himself/herself is a victim (TP) and identify who are remote operators using device (RODs) RNM & V2K via satellite, with the help of polygraph, the invention ensures the accuracy of identification. Additional advantages and features of the invention will become apparent from the description which follows, and may be realized by means of the instrumentalities and combinations particular point out in the appended claims. Still further objects and advantages will become apparent from a consideration of the ensuing description and drawings. These and other objectives, features, and advantages of the present invention will become apparent from the following detailed description, the accompanying drawings, and the appended claims. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a schematic diagram showing an operation of the human and machine according to a preferred embodiment of the present invention. FIG. 2A to FIG. 2F illustrates a first set of flowcharts for identify a victim according to the present invention. FIG. 3A to FIG. 3E illustrates a second set of flowcharts for identify all kinds status of remote operator or attacker (ROD's) according to the present invention. FIG. 4 illustrates an identification decay curve. FIG. 5 illustrates examples of disgusting things. FIG. 6 illustrates examples of funny stories. FIG. 7 illustrates examples of imaginary political attack. FIG. 8 illustrates examples of imaginary religious attack. FIG. 9 illustrates examples of imaginary national attack. FIG. 10 illustrates how TP use HMI touch screen which connects with a controller and a computer to achieve automatic identification. FIG. 11A illustrates how TP use HMI touch screen which connects with a controller and a computer to achieve automatic identification. FIG. 11B illustrates how TP use HMI touch screen which connects with a controller and a computer to achieve automatic identification. FIG. 12A illustrates how TP use HMI touch screen which connects with a controller and a computer to achieve automatic identification. FIG. 12B illustrates how TP use HMI touch screen which connects with a controller and a computer to achieve automatic identification. FIG. 13 illustrates how TP use HMI touch screen which connects with a controller and a computer to achieve automatic identification. FIG. 14 illustrates how TP use HMI touch screen which connects with a controller and a computer to achieve automatic identification. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT V2K: What is ‘Voice to Skull’? . . . Voice to skull is the transmission of voice, or any other audible or subliminal sound, directly into the hearing sense of a victim. So the invention is based on technologies about of RNM & V2K technology around the world. The painful experience described by victims is consistent with the effect of these technologies in relation to V2K which were described in US patents and China patent. The invention is based on these V2K & RNM device operated by human beings and these operators show themselves emotions when they are using these devises to harass victims. On the other hand, victims can feel and sense operator's emotions. This emotional interaction between victim and operators is interactive when these V2K & RNM devices are running. The reason to confirm V2K & RNM device operated by human beings is human brain can forget something, because operators frequently forget somethings related victim's history, but victims do not forget the things in himself or herself history. On the other hand, these computer memory and robot memory with artificial intelligent never lost data when programmer programs data into their memory, so only human has memory error, but computer's CPU never has memory data read and write error. So the invention can analyze operator's human emotion which a victim can feel and sense to identify these voice to skull is not victim's auditory hallucination, but they are emotional response from those remote operators. Because there are obvious differences between victim's emotion reaction and those emotions response belong to remote operators using devices of V2K & RNM, so if using the invention method, you can find these differences clearly. STATEMENT OF GOVERNMENT INTEREST The invention can help victims to confirm their grieves and get justice, on the other hand, it can help law enforcement like FBI to find out the fact of cases, as this remote technology is global and transnational crime, so if all kinds of victims enter United States in some related cases, FBI can use the invention as a tool to analysis and identify who are operators (or call them remote attacker), then these operators' (or call them remote attacker) nationality and race; religious belief and political belief, scale of language and dialect, scale of scientific knowledge, even identify these attacker or operator belong to which organization. For example, FBI investigated the case of Washington D.C. navy yard gun case, CNN reported on September 26,2013, the gunman suffered “Low frequency attacks” and that attack drove him to kill. If similar cases happen, the invention can help FBI to investigate. Declaration: In this invention, all political, religious attacks or attack a country are human brain thoughts imagination attacks with viewing videos, pictures & other materials in computer databases in non-public site, there is neither any verbal attack nor behavioral attack. So do not cause insulting anyone. Description of the method of the present invention: Abbreviation: PM: polygraph meter (computerized digital) ISA: an identification system administrator TP: a tested person RODs: remote operators using devices of V2K & RNM technology V2K: Voice to Skull RNM: Remote Neural Monitoring Technology HMI: human machine interface The invention use of victim's (TP's) intentional selective and classified thoughts to launch some psychological attacks to those remote and covered operators (RODs) using devices of V2K & RNM to stimulate those operator's (ROD's) corresponding and classified emotional responses which victim (TP) can feel and sense. Then the invention use of relatively comparing methods, designed procedures in flowcharts classify emotional responses between the victim's (TP's) and remote operators' (ROD's), designed procedures in flowchart can find out there are significant differences between victim's (TP's) and remote operators' (ROD's) with judgement diamond frames. Use of these difference, computer and controller can identify both victim (TP) and classified identify all kinds status of remote operators (ROD) using devices of V2K and RNM by checking flowcharts FIG. 2 A to FIG. 2F and FIG. 3A to FIG. 3E automatically. These classified identities including remote operator's (ROD's) nationality, race, political trend, religious belief, organization, scale of language and dialect, scale of scientific knowledge. When identifying begin, a identifying curve indicates identifying error changes gradually from large to small and approach to accurate identification at last, the principle is similar with automatic control decay curve, which is shown in FIG. 4. Such similar curve is widely used for PID controller in automatic control technology which is used to control like temperature and pressure, but the invention uses it to identify victim (TP) and to identify ROD, mainly for identifying ROD. Referring to FIGS. 1-14, the present invention consists six parts: I. Polygraph Meter: (PM) There are many kinds of ordinary polygraph meters. Polygraph meter is used to confirm the tested person's (TP's) answer is true. If high class digital polygraph which can connects with a computer and sent truth or fails signals automatically is available, the automatic system of identification could run very fast. Expensive and high accurate instrument is using fMRI (Functional Magnetic Resonance Imagine) when in real need. Illuminating lies with brain scan outshines polygraph test, fMRI spots more lies in first controlled comparison of the two technologies. II. ISA: an identification system administrator An identification administrator (ISA) asks a tested person (TP) to choose some special contents from a database in a computer which could cause those remote operator's or attacker's (ROD)'s psychological reaction and response via V2K & RNM device, but cannot cause tested person's (TP) same psychological reaction. Meanwhile, the tested person (TP) to answer YES or NO with pressing designed buttons on HMI according those designed questions contents which also shows on HMI in diamond frames in flowcharts in a computer about attacker's or call remote dives operators' (ROD's) psychological reaction and response which the tested person (TP) can feel or sense, ISA then checks the polygraph meter to confirm TP′ answer is true. III. Tested person (TP) Tested person (TP) should claim himself/herself is a victim of abusing V2K & RNM technology. Tested person who is connected to polygraph meter and answer questions which can be analyzed and identify who is the remote attacker or operator (ROD) using V2K & RNM device, furthermore the invention may analyze and identify attacker's or operator's (ROD's) nationality, race, political belief and religious belief, scale of language and dialect, scale of scientific knowledge and which organization by the designed procedures in a computer. Of course, the qualified tested person (TP) should be emotional stable and rational thinking, as well as cooperative with identification system administrator (ISA). IV. A computer contains seven classified databases a; b; c; d; e; f and g which classify psychological attacking contents. Every classified database can let tested person (TP) choose contents to launch some classified psychological attacks to ROD to cause ROD's classified psychological responses. This the ROD's classified psychological responses can be used to identify who is victim (TP) and who is attacker or operator (ROD) by operating programs in flowcharts in a computer and in a controller. Of course, the classified contents can be updated and increased according different requirements in a computer used in identifying process. V. A controller: A controller manages logical calculations when au… truncated (65,599 more characters in archive)