TiVo Files Patent For RFID Video Recoder Based On Implant Chip

Informationweek
Nov. 25, 2005

This is absolutely key. We have been told all along that implantable chips will only ever be voluntary, yet through security justifications and popular culture they're sqeezing us in a vice like grip.

In the future it will be a case of no chip, no TV. They want to create a society of outcasts who refuse to take the chip and then can be demonized and blamed for society's ills.

They are relying on peer pressure to push part of the agenda through. Clubs across Europe are already chipping people to enter VIP areas.

On the security/political side of the equation, Tommy Thompson is touring the US advocating the loving security chip. - Prison Planet
TiVo Inc. has filed a patent application to the U.S. Patent and Trademark Office earlier this month that suggests company inventors believe radio frequency identification (RFID) technology will become inserted into clothing, jewelry, key chains, and even under the skin in the body.

Whether TiVo actually decides to build in the feature, the patent is for a personal video recorder (PVR) that recognizes viewer preferences through an RFID chip embedded in clothing, jewelry or "inserted somewhere [in] the user's body."

The multimedia mobile personalization system would have a remote control that recognizes the viewer's RFID tag closest to the PVR. The remote control identifies and notifies the multimedia device through the RFID chip in the person's clothing or body to tailor the media content to their preferences.

The remote control device would identify and link the viewer to the system using an "RFID tag that is attached to a key ring, necklace, watch, in his wallet, or even a sub dermal tag inserted somewhere in the user's body." The remote control would detect the RFID tag in a limited radius so it wouldn't get confused by signals from others, the patent said.

Either broadcast or recorded television programs and music play lists stored on a local hard drive could be sorted, displayed or restricted, depending on the user identifier. Other methods of identifying the user are stated, too, such as computer vision recognition, biometric identification, and voice analysis.













All original InformationLiberation articles CC 4.0



About - Privacy Policy