Empirical data gathered by ambient computer observation of a person are analyzed to identify an instance of a particular behavior

ABSTRACT

Computer systems configured to correlate instances of empirical data, gathered from ambient observation of a person, as being potentially relevant to each other vis-à-vis one particular behavior. A pair of correlated instances of empirical data is analyzed to identify it as an instance of the one particular behavior. Such computer systems facilitate transmission of a digital message, the content of which may be determined in response to the instance of the one particular behavior. The digital message might be used to alter the one particular behavior of the person in real time.

RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.15/411,028, filed on Jan. 20, 2017 (pending), which is a continuation ofU.S. patent application Ser. No. 14/034,231, filed on Sep. 23, 2013,issued as U.S. Pat. No. 9,607,025 on Mar. 28, 2017, which claimspriority to U.S. Provisional Patent Application Ser. No. 61/744,394,filed Sep. 24, 2012, which are each commonly assigned and incorporatedby reference herein in their entirety.

TECHNICAL FIELD

The present disclosure relates generally to personal profiling and, inparticular, in one or more embodiments, the present disclosure relatesto multi-component profiling using empirical data gathered from personaldigital devices.

BACKGROUND

There are situations in which a true profile of a person could be ofimmense value to the person himself. Two examples of this would beonline dating services and psychotherapy. Once the profile is created,action can be taken based on the profile. For example, a match for aperson is suggested by a dating service or a therapeutic solution isgiven for a psychological problem.

The current approaches to developing a profile of a person involveasking the person questions (i.e., self-report) and/or observing theperson interacting with others. These approaches have several problemsincluding the following:

-   -   1. The data obtained is unreliable because of both conscious and        subconscious biases of the person questioned.    -   2. The data obtained has the potential for having been skewed        because the observer's presence may have affected the observed        person's behavior.

For the reasons stated above, and for other reasons stated below whichwill become apparent to those skilled in the art upon reading andunderstanding the present specification, there is a need in the art foralternatives to profiling a person.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a profiling system in accordance with an embodiment.

FIG. 2A illustrates a user using a computer having a camera inaccordance with an embodiment.

FIG. 2B illustrates user content in accordance with an embodiment.

FIG. 2C illustrates an image of a user's countenance in accordance withan embodiment.

FIG. 3 illustrates correlation of instances of empirical data inaccordance with an embodiment.

FIG. 4A illustrates correlation of instances of empirical data inaccordance with a further embodiment.

FIG. 4B illustrates connecting a behavior data-point to a profilecomponent in accordance with an embodiment.

FIG. 5 illustrates hardware and software interactions for creating apost in accordance with an embodiment.

FIG. 6 illustrates hardware and software interactions for displaying apost in accordance with an embodiment.

DETAILED DESCRIPTION

As noted above, existing methods of profiling a person are associatedwith known problems. For such examples as dating services andpsychologists, neither has access to empirical data about the personthat has been obtained:

-   -   1. without the person biasing it; and    -   2. in an unobtrusive manner.        That is, they do not have access to uncontaminated data that        would let them determine the person's true profile.

Various embodiments provide advantages over prior methods of profilingby using a person's own digital devices to unobtrusively obtain unbiasedempirical data about the person, and correlate and analyze thisempirical data to obtain a true profile of the person. For example,various embodiments turn a person's digital devices intosensors/collectors that acquire empirical data about the person withoutself-reporting bias, and thus remove the influence of the observer byhaving the digital device unobtrusively do the data gathering. Profilesdeveloped by such methods may be referred to herein as a PProfile.

Some uses for such profiling include:

-   -   Online Dating Service, facilitating getting people into healthy,        lasting relationships    -   An aid in psychotherapy and in couples therapy    -   An aid in self-improvement regimes    -   To assist physician-patient interaction by identifying        health-related behavior patterns    -   An aid in sentencing or prisoner rehabilitation decisions in a        criminal justice system    -   An aid in sociological research, e.g., using data scrubbed of        personal identification information    -   An aid to career counseling, employee recruitment, student        counseling, college selection, college admissions, family        counseling, etc.    -   To enhance a person's credit report    -   To enhance the function of Networking Parties    -   An augmented reality approach to interpersonal relationships

Various embodiments include profiling systems (e.g., PProfile Systems)including components configured to perform methods described herein.FIG. 1 illustrates a profiling system in accordance with an embodiment.The profiling system includes one or more personal digital devices(PDD). It is expected that including all of a person's PDDs would yieldimproved results, and may include such PDDs as smart phones, computers(e.g., desktop computer, laptop computer, tablet, etc.), land linephones, TVs, radios, portable media players (e.g., MP3 players), digitalwallets, computer-enabled home appliances, digital devices that havebeen integrated into automobiles and other transportation vehicles,specific-purpose devices (e.g., pedometers, sleep trackers, caloriecounters, etc.), augmented reality devices (e.g. GOOGLE GLASS), wearabledigital devices, computer cameras and microphones, or any other digitaldevice used by the person or accessed by the person (e.g., point-of-salesystems for credit card use or ATMs). These digital devices can connectto the internet and other networks in a variety of ways including wiredand wireless (cellular, RF, IR, etc.), near field communications (NFC),and Wi-Fi.

In the example of FIG. 1, the profiling system (e.g., PProfile System)includes a smart phone 101, computers 102, augmented reality glasses 103and computer cameras and microphones 104. The profiling system furtherincludes a computer system (e.g., a central computer system or CCS) 110,which includes communications units 111, processing units 112 andstorage units 113. Communications units 111 include any and all hardwarenecessary for communicating between and among the subunits of CCS 110and between the computer system 110 and the personal digital devices101-104. The communications units 111 would include, for example,modems, routers, receivers/transmitters of electromagnetic radiation,interface hardware (with appropriate protocol software, e.g., Ethernet),etc. Processing units 112 may include processors (e.g., microprocessors,personal computers, mainframes, etc.) as well as user interface devices(e.g., monitors, keyboards, printers, etc.). Storage units 113 includenon-transitory storage media (e.g., semiconductor devices, hard drives,optical discs and drives, tapes and tape libraries, etc.).

Various embodiments further include software (e.g., PProfile SystemSoftware), which may include personal digital device (PDD) software andcomputer system (e.g., Central Computer System or CSS) software.Specific software may be listed as being on specific hardware. Thisgives one way that the software could be placed. However, otherdistributions of the PProfile System Software are possible.Consequently, throughout the remainder of this specification, individualsoftware modules can be labeled as PProfile Software—NAME without regardto a particular hardware element.

PDD Software may be placed on each of a person's digital devices. Thiscould be done in at least the following ways:

-   -   by consent of the person.    -   by order of a Court.    -   by order of a parent for a child's digital devices.    -   by order of the Federal Government, e.g., Homeland Security        The software placed on a digital device can be a client of        software running in the CCS.

Once the PProfile PDD Software is placed on a person's digital device,it may operate without command from the person. It is in this way thatthe PProfile System may unobtrusively acquire unbiased empirical dataabout the person. As the empirical data is collected, the PDD Softwarelabels the provenance of the empirical data. For example, the empiricaldata may be labeled for the PProfile user and for the digital devicethat captured it.

PDD software can include, for example, the following modules:

PDD Software—Text Content

Software that collects content data (e.g., keywords, XML, tags,metadata, addressee, time, duration, subject, complete documents, etc.)from, for example, the following: email, word processor documents,computer contacts lists, tweets, Facebook entries, internet searches,entries into web pages, web pages viewed, chat rooms, text messages,instant messages, digital wallet transactions, etc.

PDD Software—Digital Device Use Monitoring

Software that monitors and documents use of a digital device such as:the amount of time spent using the digital device, the time of day whenthe use occurred, the geographic location where the use occurred, etc.

PDD Software—Location

Software that collects geographical location data of the device/usersuch as: GPS data, time at a location, motion of the device while at alocation, etc.

PDD Software—App Use Monitoring

Software that monitors and documents the use of software applications(apps). The apps monitored might include, for example, any of the appsavailable from Apple and Google.

PDD Software—Physiology

Software that monitors and collects data on physiological observables,such as pulse, temperature, keystrokes dynamics, etc.

PDD Software—Surveillance Sensors

Software that turns a digital device's sensors, such as its microphone,camera, and physiological sensors, into surveillance devices. That is,this PDD Software could turn on these sensors independently ofinstructions from the user of the device.

PDD Software—Surveillance Sensors Data Collection

Software that monitors and collects raw empirical data from the device'ssensors. The data collected could include, for example, sound, images,and physiological data.

In addition, some digital devices can be used to collect data in morethan one way. Consider digital devices equipped with microphones such assmart phones and computers. Two different types of conversations can bemonitored for empirical data using these devices if they have beenequipped with PDD Software:

-   -   I. Listening to conversations made through the device, i.e.,        listening to a call    -   II. Listening to conversations held in the presence of the        device (i.e., the PDD Software turns the device into a        surveillance device that listens to ambient conversations any        time that the device is powered on. It may listen to these        conversations even when the device is not actively being used to        place calls.)

PDD Software—Surveillance Information Extraction

Software that extracts information from the raw empirical data collectedby the PDD Software—Surveillance Sensors Data Collection. Some, or all,of this software may be hosted at the CCS. Two examples of the use ofthis software are given below:

-   -   Empirical sound data of a conversation is collected. This data        is then analyzed by voice software and turned into text. The        text information is then analyzed by the PDD Software—Text        Content and/or the PDD Software—Synopsis.    -   Empirical image data is collected. This data is then analyzed to        determine if the person's face is in the image.

PDD Software—Local Archiving

Software that archives the empirical data gathered by the individualpersonal digital devices.

PDD Software—Synopsis

Software that develops a synopsis of the empirical data collected.

PDD Software—Simultaneous Data Collection/Correlation

Some digital devices can be used to collect different types of empiricaldata at the same time. For example, consider computers equipped withword processors, email, internet connection, etc., and with a camera.(See FIG. 2A) At least two types of empirical data can be collected byeach of these digital devices using PDD Software:

-   -   content of the word processor, email, website, etc. that the        person is working on (FIG. 2B); and    -   images of the user's countenance (FIG. 2C) as he views specific        content in the word processor, email, website, etc.

Similarly, a smartphone equipped with PDD Software could be collectingat least the following two types of empirical data:

-   -   sound data of a user's conversation; and    -   physiological data about the user during the conversation.        In each case, the two types of empirical data can then be        correlated to each other by the either by the PDD Software or by        the CCS Software. (See below.)

PDD Software—Identification

Digital Device PProfile Software can also be used to identify theprovenance of each instance of gathered empirical data. For example,this software may label the gathered empirical data as originating witha specific person through means such as:

-   -   voice identification.    -   facial recognition.    -   keystroke recognition.

PDD Software—Transmission

Software that transmits the empirical data that has been collected bythe personal digital device to the CCS. This software may also includesoftware that receives PDD Software updates. Note that some digitaldevices are not connected to the internet. These may instead utilizesoftware that connects the local digital device to, for example, auser's computer that then passes the empirical data to the CCS.

CCS software can include, for example, the following:

CCS Software—Manager

This software manages the entire PProfile System. For example, itmanages the data flow that takes raw empirical data and processes itinto a user's profile.

CCS Software—Registration

All users of the PProfile System must be registered. This is softwarethat enables a person to register with the PProfile System. Thissoftware could, for example, be hosted at a website. In addition, thissoftware can assign an identification number and access codes to theuser.

CCS Software—Installation

This software downloads the appropriate PDD Software to the variousdigital devices of a registered user. It would also enable updates tothe PDD Software, and changes that are made as the user's digitaldevices change.

CCS Software—Control of Surveillance Sensors

This software issues commands to the user's digital device's sensors,such as its microphone, camera, and physiological sensors.

CCS Software—Transmission

This enables the CCS to receive transmissions of data from the personaldigital devices of registered users. It also allows the CCS to transmitinformation to the personal digital devices.

CCS Software—Data Collection

The CCS's Collection Software enables the CCS to collect empirical datagathered by the digital devices and transmitted to the CCS.

CCS Software—Archiving

This is software that maintains an archive. Information archived could,for example, include:

-   -   user registration information    -   summary of pertinent facts about the user    -   empirical data gathered from the user's PDDs    -   results of empirical data correlation processes    -   results of analyses of gathered user empirical data    -   behavior data-points    -   scale values for user profile components    -   list of all profile components    -   list of the behaviors associated with each profile component

CCS Software—Privacy and Authorization

The empirical data collected and the results of the analyses may bestrictly private. For such embodiments, the user, and only the user, canauthorize the release this information. However, the user would not beprovided access to change the empirical data that has been collected bythe PProfile System.

In those situations where the user wants parts or all of thisinformation released, the user may follow a set of steps, instantiatedthrough this software, that will authorize which information is to bereleased and to whom the information is to be released.

Under the PProfile System, access to a user's empirical data and profilemight be restricted to the user only. No one else might have access,unless the user authorizes it. In addition, the user could limitthird-party authorization to specific elements of his profile. (Forexample, the user could authorize specified profile elements to bereleased to a third part. However, the user would not be provided accessto change or modify his empirical data or his profile.

CCS Software—Emotion

This software can be hosted on the CCS. However, parts of this softwaremay be hosted on individual digital devices.

The CCS Software—Emotion analyzes certain empirical data and associatesan emotion and/or an action with it. “Emotion and/or action” may becollectively referred to as “emotion” in this description. This softwarecould include, for example, the following:

-   -   Countenance Software        -   Countenance Software operates on empirical image data of the            user's face collected by the PDD Software. It determines            whether the subject's face is present, and if so, determines            the user's facial affect. The Countenance Software then            associates an emotion with the facial affect. This would            include measuring the type and degree of emotional response.            Note that the emotional response can then be correlated with            a triggering event, e.g., content of an email.    -   Voice Software        -   Voice Software operates on empirical sound data collected by            the PDD Software on a user's digital device. (See Type I and            Type II conversations described above in PDD            Software—Surveillance Data Collection.) The Voice Software            determines whether it is the subject's voice that is            present, and if so, determines vocal affect. The Voice            Software then associates an emotion with the user's voice            affect. This would include measuring the type and degree of            emotional response. In addition, the Voice Software also            identifies content in the speech train, if it has not            already been done by the PDD Software Surveillance            Information Extraction. The emotional response and the            content can then be correlated.        -   Voice Software can also determine the content of statements            made to the person during a conversation. It can then            determine the person's emotion (e.g., based on analysis of            his voice response) to the content of what he has heard.            Note that the emotional response can then be correlated with            the statements made to him.

CCS Software—Correlation

This software connects different instances of relevant empirical data toeach other. Two examples of this correlation would be:

-   -   connecting a person's emotional response to a triggering event,        e.g., connecting the contents of an email (triggering event) to        happiness (emotional response) at the time the person is reading        that email.    -   connecting a person's behavior at one time to his behavior at        another time, e.g., connecting an email that the person has        written (behavior at one time) to another email that he has        written (behavior at another time.)

CCS Software—INSP List

This software comprises the Instance-Specific (INSP) List of empiricaldata items. Items in this list could include anything that is a portionof an instance of empirical data such as: words, metadata, physiologicaldata, facial and voice affect, user actions, etc. For each item, theINSP lists an associated family of items. The INSP List is used as partof the correlation process.

CCS Software—Table

The PProfile System can identify, from a user's empirical data,instances of types of behaviors and instances of other observables.“Behaviors” and “other observables” may be collectively referred to as“behaviors” in this description.

The CCS Software—Table lists the identifiable types of behaviors thathave been selected by the implementer of the PProfile System; and, foreach behavior type, the CCS Software—Table lists the profile componentsthat it pertains to.

CCS Software—Analysis

This software analyzes correlated instances of a user's empirical datafor the purpose of identifying instances of particular types ofbehaviors exhibited by the user. The behavior types that the CCSSoftware—Analysis can identify are those contained in CCSSoftware—Table.

CCS Software—Behavior/Component

In this software, each profile component may be linked to a list ofbehaviors.

CCS Software—Scale Value

This software uses the behavior instances identified from a user'sempirical data to determine scale values for the user's profilecomponents. This software can be programmed to update a user's profilescale values from time to time as new behavior instances are gathered.

CCS Software—Profile

This software may include at least the following functions:

-   -   lists all the different profile components that PProfile can        determine scale values for. This could be archived in compile        subsets of profile components to create specialized profiles.    -   creates, for each user, a profile. It does this by compiling the        scale values for each profile component as determined by the CCS        Software—Scale Value.

CCS Software—Security and Privacy

The PProfile System may employ any and all available means to protectthe security and the privacy of the empirical data being collected andof the derived profile from unauthorized access.

PProfile System could be set up so that the only person authorized toview the empirical data and the resulting profile is the person himselfor the person's authorized designee. Various services could be providedto the user for authorized distribution of his empirical data and theresulting profile. While a user can authorize access to his data, theuser would not be allowed, by the PProfile System, to change hisempirical data or the resulting profile.

There may be software in place that verifies that the person using thedigital device is the one that is the registered user of the PProfileService. For example, facial recognition software, voice recognitionsoftware, etc. might be used to verify who is actually using the digitaldevice to mitigate the possibility of collecting irrelevant data.

CCS Software—Specialized Use

Example specialized uses will be described subsequently in thisdescription. The CCS Software—Specialized Use is the software adapted tosupport such specialized uses.

The following gives some of the types of empirical data that can becollected using a person's digital devices enabled with PProfileSoftware:

-   -   Type of Hardware Used: desktop computer, laptop computer,        tablet, smartphone, augmented reality device, etc. and length of        time spent using the device.    -   Type of Use: email, word processor documents, Facebook entries,        Tweets, internet searches, GPS, entries into web pages, web        pages viewed (URLs), TV (e.g., programs watched—commercial TV,        cable, NetFlix, . . . ), etc.    -   Content (e.g., keywords, XML, tags, URL, metadata, complete        documents/text, synopses, etc.) of: email, word processor        documents, Facebook entries, Tweets, internet searches, GPS,        entries into web pages, web pages viewed (URLs), TV (e.g.,        programs watched—commercial TV, cable, NetFlix, . . . ), etc.    -   Physiological Data: pulse, temperature, pupil size, keystroke        recognition (e.g., typing speed and length of time a key is held        down), etc., before, during, and after the conversation.    -   The person's image (e.g., facial image) while using or being in        the presence of the device.    -   The person's voice while using or being in the presence of the        device.    -   Voice data (e.g., volume, affect, pitch, identity of the        speaker, etc.)    -   Length of time spent on a particular item.    -   eWallet use (smart phone) and credit card use.    -   who the conversation is with, content of the conversation (e.g.,        synopsis, keywords, etc.), complete conversation, time of        conversation, duration, location, telephone number, type of        conversation (i.e., Types I or II), etc.    -   geographic location of the user and information on the immediate        neighborhood.    -   physical movement of the user (e.g., walking, running, etc.)    -   provenance of the empirical data        All of the above may be date and time-stamped.

The following are examples illustrating a process for determining aperson's profile. The next section shows the process that these examplesillustrate.

A person's profile is comprised of a set of profile elements. Profileelements are also called profile components. Examples of profilecomponents could include the following: honesty, integrity, kindness,loyalty, ambitiousness, happiness, faithfulness, shyness, persistence,adventurousness, cooperativeness, self-control, and uprightness.

One way that a profile can be created from the gathered empirical datais by determining scale values of each of a set of components of theperson's profile. For example, the analysis could be accomplished byturning any of the processes listed below into a set of rules which arethen organized and implemented in computer software. This software wouldthen become part of the PProfile Software.

The PProfile Process for Determining a Profile of a Person—Examples ofGeneral Areas

Character Evaluation

Any process that deduces the character components of the person'sprofile from the empirical data gather could be used.

Example 1

Empirical data e.g., facial affect is gathered that documents how aperson responds under stress. By then comparing what actually happened(e.g., failure of a project) to the person's response (e.g., he takesresponsibility for the failure) conclusions can be drawn about hischaracter. This comparison and conclusion about the person's charactercan be implemented in software (e.g., using Logical IF statements) anddatabases in the following way:

-   -   (i) assign values to variables STRESS and RESPONSE based on the        empirical data gathered.    -   (ii) the IF statement then takes the values of variables STRESS        and RESPONSE and compares these to a database.    -   (iii) the database correlates different values of the variables        STRESS and RESPONSE with scales values of the profile element        UPRIGHTNESS.    -   (iv) the IF statement finds the database listing that matches        the assigned values of STRESS and RESPONSE and then associates        the related scaled UPRIGHTNESS element to the person's profile.

Example 2

Empirical data is gathered from two conversations (or emails) that theperson has had with two different people on the same topic. By comparingthese data, determinations can be made about his honesty and otheraspects of his character. This can be implemented in software (e.g.,using Logical IF statements) in the PProfile Software. For example, letSTATEMENT1 and STATEMENT2 be variables representing what the person hassaid to two different people about the same topic. The value of thesevariables can be assigned by the PProfile Voice Software. Then thePProfile Software can compare STATEMENT1 to STATEMENT2. The IF statementthen assigns a scaled value to the HONESTY element depending on whetheror not the values of the variables STATEMENT1 and STATEMENT2 areconsistent with each other.

Behavior—Pattern Determination

Any process that deduces behavior components of the person could beused. For example, through the gathering of empirical data, PProfile canidentify and archive how a person responds to specific stimuli. Overtime, the software can identify patterns. That is, the software canidentify those stimuli that lead to the same response repeatedly. Inthis way, PProfile identifies conscious and subconscious behaviorpatterns in the person. As another example, PProfile can identify ordeduce tastes, interests, and proclivities of the person. And, based onthe total empirical data gathered, PProfile can assign scaled values toeach behavior pattern.

Psychological Analysis

Any process that uses logical rules in a data base for assigningprobabilistic membership, i.e., scaled values, in categories from theDiagnostic and Statistical Manual (DSM) can be employed as part of thePProfile Analysis.

There are many schools of psychology and of personality testing. Schoolsof psychotherapy, such as Cognitive Behavioral Therapy, GottmanInstitute-type analysis of couples, etc., have rules for assigningscaled values to each of a set of components of the psychologicalprofile of a person or a couple. These rules can be implemented in thePProfile Software. Then, as the PProfile System receives empirical data,it assigns scale values to profile components according to thesoftware-implemented rules.

The PProfile Process for Creating a Profile of a Person—Examples

The following give examples of how the PProfile Process could use thegathered empirical data to develop a profile of a person.

A Person's Activity is Correlated with the Person's Facial Affect

-   -   a. Assume that a person is working at his computer, and accesses        a particular website. Empirical data, (e.g., content of the        website), is documented by PProfile software. The amount of time        that he spends at the website is documented, along with his        immediate subsequent actions, (e.g., he does web searches for        articles on similar content.)    -   b. As he uses a website, facial images of the person are        observed by the PProfile PDD Software by using the computer's        camera.    -   c. The PProfile Software—Emotion deduces the emotional state of        the person from his facial images.    -   d. The PProfile Software—Correlation correlates the emotional        state with the website content.    -   e. The PProfile Software—Emotion can then go on to make        decisions about the person's profile. For example, the degree        and type of emotional reaction (e.g., happiness, bewilderment,        anger, amusement, joy, etc.) that a person has when exposed to        particular information (e.g., a triggering event such as a web        article on the US economy) could be used to determine components        of the person's profile. In this example, the conclusion could        be drawn that the person is deeply interested in the US economy,        but that he is bewildered.    -   f. This process is repeated as new empirical data is gathered.        Over time, a refined profile of the person emerges through        combination of the empirical data and the analysis results from        many events.

A Person's Email Composition is Correlated with the Person's FacialAffect

-   -   a. Assume a person is working at his computer, and composes an        email. Empirical data, (e.g., content of the emails, date, time,        addressee, . . . ), is documented by the PProfile Software.    -   b. As the person composes the emails, his facial image is        collected by the PProfile Software—Surveillance Sensors Data        Collection by using the computer's camera.    -   c. The PProfile Software—Emotion deduces the emotional state of        the person from his facial images.    -   d. The PProfile Software—Analysis can then make deductions about        the person's behavior, e.g., he lied in the email about a        certain topic.

A Person's Emails are Correlated with Each Other

-   -   a. Assume a person is working at his computer, and composes        several emails. Empirical data, (e.g., content of the emails),        is documented by the PProfile Software.    -   b. PProfile Software—Analysis can compare the emails for        consistency. That is, has the person told one person one thing        and another person something else on the same topic.    -   c. The PProfile Software can then go on to make decisions about        the person's profile. For example, any of the following        conclusions could be drawn based on the empirical data:        -   the person consistently tells email recipients the truth.        -   the person selectively tells some email recipients the            truth.        -   the person lies to all recipients.

A Person's Conversation is Correlated with the Person's Voice andPhysiological Data

-   -   a. Empirical data from conversations (Type I and II) is        gathered. This would include: with whom the conversation takes        place, content of the conversation, etc.    -   b. Empirical data related to the person's voice and physiology        is gathered: pitch of voice, temperature, pulse, etc.    -   c. PProfile Software—Emotion can be used to analyze the voice        and physiological data to determine the emotional state of the        person.    -   d. The PProfile Software—Analysis can then go on to make        decisions about the person's profile by correlating (a), (b),        and (c). For example, a particular topic (e.g., lawn care) may        illicit a negative emotional response (e.g., anger) from a        husband when talking to his wife.

In addition, the PProfile Software can make decisions about the person'sprofile by correlating (a), (b), and (c) with empirical data fromanother action by the person. For example, the person may tell someonethat he has done a particular thing when, in fact, he has done somethingelse. If this occurs often enough, the PProfile Software can concludethat the person suffers from Pseudologia Fantastica and add this to hisprofile.

A Person's Actions are Observed and Analyzed

-   -   a. The person goes to Starbucks. The following empirical data is        obtained:        -   length of time the person stays in Starbucks.        -   percentage of the time that is spent actively using his            digital devices.        -   digital work that was done using these devices. (For            example, does the person spend his time doing web searches            related to his work or does he spend his time doing web            searches for entertainment.)        -   conversations (Type I and II): the duration, the content of            the conversations, etc.        -   data related to the person's voice and physiology is            gathered such as: temperature, pulse, pitch of voice, etc.    -   b. The PProfile Software correlates and analyzes this data.    -   c. The analysis of this data could lead to conclusions about,        for example, the following:        -   the social skills of the person. (For example, is he capable            of starting conversations with strangers.)        -   the honesty of the person.        -   the integrity of the person. (For example, is he looking for            a new relationship even though he is married.)        -   the vigor and intensity of the person.

A Couple is Observed and Analyzed

PProfile can unobtrusively observe how a couple interacts with eachother (e.g., through Type I and II conversations and through changes intheir physiology.) This is similar to a couple at a therapist's officeexcept that with PProfile the observer does not affect the observed.

-   -   a. Empirical data is gathered on each member of the couple        individually. This is done when they are not interacting with        each other.    -   b. Empirical data is gathered on the interaction of the couple.        For example, empirical data could be gathered based on their        conversations with each other.    -   c. Empirical data on the physiology of each member of the couple        is gathered when they are apart and when they are together.    -   d. The empirical data is correlated by the PProfile        Software—Correlation.    -   e. This correlated data is then analyzed by the PProfile        Software—Analysis. One way to do this is by using the techniques        developed at the Gottman Relationship Institute (Seattle,        Wash.). The results of this analysis can be used to suggest        actions such as: alerting couples to potential problems,        behavior modification, separation, divorce, etc.    -   f. By archiving an individual's empirical data as he functions        as a member of a couple, PProfile Software could detect patterns        in behavior of the individual. For example, PProfile could see a        pattern in which the person is regularly attracted to other        people, all of whom have similar profiles.    -   g. This method could also be used to predict the success of a        potential marriage between two single people.

Determining Profile Components from the Empirical Data Gathered—theProcess

This section shows the process that the examples, in the prior section,illustrate.

A person's profile is comprised of profile components. Profilecomponents describe different aspects of a person and of the person'sbehavior. Each profile component might be measured on its own scale, andmight have its own characteristic method of determining its scale value.

Different people may have different scale values for the profilecomponents. “Determining the profile of a person” means determining thescale values of the profile components for that person.

The PProfile System determines the profile, for a person, by determiningthe scale values of profile components using the empirical data gatheredby the person's own digital devices.

The PProfile System Process for Determining the Profile of a Person:Preliminaries

Profile Components

The PProfile System may contain a list of defined profile components.Profile components could include, for example, the following:

-   -   honesty, integrity, kindness, loyalty, ambitiousness, happiness,        faithfulness, shyness, persistence, adventurousness,        cooperativeness, self-control, uprightness, and optimism.    -   mental disorders listed in the Diagnostic and Statistical Manual        of Mental Disorder (DSM) and the Global Assessment of        Functioning (GAF).    -   depth of social network (e.g., in the user's profession or        elsewhere), who is in the user's social network, how well the        user works with others, is he sought out by his peers for        advice, etc.        There are many possible profile components. Each profile        component must be defined unambiguously.

Profile Sub-Components and Sub-Subcomponents

The PProfile System may contain a list of defined profile sub-componentsand sub-subcomponents.

Determining the scale value of a profile component from the empiricaldata gather is complicated by at least the following problem:

The empirical data is instance-specific; it is not component-specific,i.e., empirical data does not come labeled as being relevant to aparticular profile component.

Consequently, the PProfile System must connect instance-specificempirical data to particular profile components.

For some empirical data, this will be easy. For some empirical data,this will be difficult. One method that PProfile could use to make theseconnections is to define profile sub-components and sub-subcomponents.

For example, consider the profile component “honesty.” It broadly coversmany situations. However, we can define “spousal honesty” as asubcomponent. We can then go on to define the sub-subcomponent “spousalfaithfulness honesty.” By defining sub-subcomponents are narrowly aspossible, it becomes easier for the PProfile System to identifyinstance-specific empirical data as being, or not being, relevant tothat sub-subcomponent. The process for connecting instance-specificempirical data to a particular profile component is detailed in thefollowing sections.

Since components, subcomponents, sub-subcomponents, and so on, are allcomponents, these will be collectively referred to as components.

Note that there is a fundamental difference between the following twosituations:

-   -   (i) Gauging a person's reaction to a movie (i.e., to a        controlled stimulus) by observing the person's facial affect        (i.e., the person's response) during the movie. The goal of the        process is to determine if the person liked the movie. The        process does not determine anything about the person. That is,        it does not connect the person's response to a component of the        person's profile. Nor does it correlate the response with other        empirical data; and    -   (ii) Determining a person's profile by observing how a person        responds to encounters with random (i.e., uncontrolled) stimuli        and then associating those responses (i.e. behaviors) with        profile components.

A goal of the PProfile process is to assign scale values to profilecomponents. First, observations of self-initiated actions of the personand of reactions of the person to stimuli are used by PProfile toidentify instances of particular types of behavior exhibited by theperson. PProfile then relates each instance of a particular type ofbehavior to relevant profile components. Finally, PProfile uses behaviorinstances in the determination of scale values of the relevant profilecomponents.

A goal of PProfile is to determine a person's profile, i.e., assignscale values to his profile components. It is not to just measure aperson's reaction to a controlled stimulus.

Identifiable Types of Behaviors and Profile Components

The CCS Software—Table lists the types of behaviors that the PProfilesystem can identify from a user's empirical data; and, for each behaviortype, the CCS Software—Table lists the profile components that itpertains to. As an example, consider the behavior type “lying.” The CCSSoftware—Table could contain the following entry:

Identifiable Type Of Behavior: Lying

Profile Components Behavior Pertains To:

-   -   Honesty    -   Integrity    -   Responsibility    -   Courage        Other behaviors may list other pertinent profile components.        There can be overlap between the lists of pertinent components        for different behavior types.

In operation, if an instance of a particular type of behavior isidentified in a user's empirical data, then the PProfile System searchesthe CCS Software—Table to find the list of profile components that theidentified behavior pertains to.

The CCS Software—Table could also be arranged based on the profilecomponents. As an example, consider the profile component “honesty.” TheCCS Software Table could contain the following table entry:

Profile Component: Honesty

Identifiable Types Of Behaviors Pertinent To Honesty:

-   -   Virtuous    -   Lying    -   Cheating    -   Stealing        Other profile components may list other types of behaviors.        There can be overlap between the lists of types of behaviors for        different profile components.

Instance-Specific Empirical Data Items

One of the tools employed by PProfile, in determining a user's profile,is to correlate different instances of a user's empirical data that arerelevant to each other (e.g., relevant vis-à-vis a behavior or a profilecomponent). Once identified, these correlated instances of a user'sempirical data may be analyzed, as a collection, as part of the processdetermining the user's profile.

Consequently, the PProfile System must be able to correlate an instanceof a user's empirical data (labeled ED_(X)) to other instances of auser's empirical data (labeled as ED_(M)) that are relevant to it.However, correlation may be complicated by at least the followingproblem: The empirical data is instance-specific; empirical data doesnot come labeled as being relevant to other instance-specific empiricaldata.

For some empirical data, this correlation is easy. For other empiricaldata this correlation is hard. One method that PProfile could use toaccomplish this correlation would be to develop an Instance-Specific(INSP) List of empirical data items.

Developing an INSP List of items will be done in this section. (Seebelow and FIG. 3) The next sections show how the INSP List could beemployed within the PProfile System for correlating different instancesof empirical data. (See FIG. 4A)

To see how an INSP List would be developed, consider I_(XN) (where N isan integer) as an item that would be a portion of the instance ofempirical data ED_(X) (301). The item I_(XN) could include, for example,any of the following: words, metadata, physiological data, facial andvoice affect, user actions, etc.

A goal of PProfile would be to correlate ED_(X) with other, relevantinstances of empirical data ED_(M) (where M is an integer.) Toaccomplish this, develop a family of items (302), I_(XNL) (where L is aninteger), to be associated with the item I_(XN). All the items I_(XNL)in this family are, in some way, related to the item I_(XN).Consequently, if an item, I_(XNL), in this family matches an item (303),I_(MN) (N is an integer) associated with another instance of empiricaldata (ED_(M)), then it would be an indication that the other instance ofempirical data, ED_(M), is relevant to ED_(X). Once the family of itemsis developed, include it in the INSP List associated with the itemI_(XN). See FIG. 3 where the particular item I_(X7) is used as aspecific example. The family of items associated with I_(X7) is labeledI_(X7L) (where L is an integer.) In this example, assume that I_(X72)matches I_(M1). This match indicates that ED_(M) is relevant to ED_(X).So, ED_(M) will be correlated to ED_(X) in the correlation process.

The INSP List includes many individual items I_(XN). Specific itemsI_(XN) are denoted with specific values of X and N, with X and N beingintegers, and each item I_(XN) will be linked to a family of relateditems I_(XNL). Families of related items I_(XNL) for different itemsI_(XN) could overlap.

This process could be extended in the following way. Consider that theinstance of empirical data ED_(M) as containing items I_(MN). For eachI_(MN), develop a list of associated items I_(MNL). Then, to determineif ED_(M) is relevant to ED_(X), look for matches between any member ofthe family (I_(XNL)) associated with I_(XN), and any member of thefamily (I_(MNL)) associated with I_(MN).

As a specific example, consider the instance empirical data ED_(X) to bean email. And, consider the item, I_(XN), associated with ED_(X) to bethe word “working” that appears in the body of the email.

The items associated with “working” would include, for example, thefollowing: words, metadata, physiological data, facial and voice affect,user actions, etc.

For the item “working”, the associated family of items, I_(XNL), in theINSP might include:

-   -   words (e.g., work, late, overtime, deadline, project, evening,        time of work, finish, meeting, dinner, drink, occupation, job,        boss, supervisor, gig, etc.)    -   spouse's name    -   supervisor's name    -   employer's name    -   time-period around the time that the email was composed and/or        sent (TP₁)    -   time-period during which “working” occurs (TP₂)    -   time-stamped empirical data such as: emails, phone calls,        location, etc. Any empirical data that is time stamped as being        within TP₁ or TP₂    -   physical location where email was composed    -   physical location of work place    -   physical location of the user during the “working” time-period.    -   facial affect    -   voice affect    -   physiological data

A Process for Correlating Instances of Empirical Data

The following describes a PProfile process for correlating instances ofempirical data. (See FIG. 4A)

Correlation Process Steps:

The PProfile System gathers an instance of user empirical data (labeledED_(X) in 401) and transmits it to the PProfile CCS and the PProfileSoftware—Manager (402).

As an example, assume that the instance empirical data is a particularemail that a user is sending. When ED_(X) is an email, the empiricaldata gathered could include the following: content, addressee, time ofsending, provenance of the empirical data, etc. All of these, takentogether, constitute the instance empirical data ED_(X)

Some of the data collected might include the following:

-   -   From: PProfile User    -   To: User's Wife    -   Date Aug. 30, 2012, 4:12 PM EDT    -   Body: “I'm at the office working late tonight. I won't be home        until after 9:00 PM.”

The PProfile Software—Manager passes ED_(X) on to the PProfile SoftwareContent (403) and archives ED_(X) on the PProfile Software—Archive(404).

The PProfile Software—Content analyzes the instance empirical dataED_(X).

In the above example, the PProfile Software—Content analysis wouldidentify the word “working,” in the body of the email, as an item thatis a portion of the instance of user empirical data. The PProfileSoftware—Content labels the results of its analysis as being for ED_(X)and passes the results back to the PProfile Software—Manager. ThePProfile Software Manager archives the analysis results obtained fromthe PProfile Software—Content in the PProfile Software—Archive (404).The PProfile Software—Manager passes the analysis results obtained fromthe PProfile Software—Content on to the PProfile Software Correlation(405).

The PProfile Software—Correlation (405) may execute the following stepswhen it receives the results of the analysis of the instance empiricaldata:

-   -   (i) Search the INSP List (406) to find matches to the instance        empirical data results, e.g., search the INSP for the word        “working.” If a match is found in the INSP, then there will be        an family of items that are associated with the instance        empirical data results, e.g., there will be a family of items        associated with the word “working.” See above for an example of        a family of items associated with the word “working.”    -   (ii) Using the family/families of items found in the INSP List        that are associated with the instance of user empirical data,        search the PProfile Software—Archive (404) for other instances        of the user's empirical data that contain matches to items in        the family/families of items associated with the instance        empirical data, i.e., look for instances of user empirical data        (ED_(M)) that are relevant to the instance of user empirical        data (ED_(X)). (See FIG. 3) For example, search the archived        user empirical data looking for matches to the items in the        family of items in the INSP List associated with the word        “working.” The word “drink” is in the family of items associated        with the word “working” in the INSP List. (See above.) So, the        PProfile Software—Correlation would look for other instances of        user empirical data that contain the word “drink.”

In addition, the search routine executed by the PProfileSoftware—Correlation can be customized to search for such things as:

-   -   specific empirical data that, by definition, is relevant, e.g.,        facial affect while composing the email.    -   physical location of the user during the time period that he is        supposed to be working.    -   empirical data time-stamped as having occurred during a        specified time period before and/or after the instance empirical        data ED_(X).

Finally, the PProfile Software—Correlation can be programmed to stopsearches related to the ED_(X) when certain conditions are meet, suchas, amount of time spent searching, number of results, number ofsearches done, etc.

The following are examples of “other instances of empirical data”(ED_(M)) that the PProfileSoftware—Correlation searches of the PProfileSoftware—Archive could find that are relevant to the example instance ofempirical data ED_(X) given above:

-   -   ED₁: User's Facial Image While Writing An Email To His Wife    -   The PProfileSoftware—Correlation found the facial-image        empirical data that PProfile gathered during the time-period        (TP₁) that the user was writing the instance email ED_(X).    -   ED₂: Physical Location Of The User During The “Working” Time        Period    -   The user has told his wife that he will be working and will not        be home until after 9:00 PM. Consequently, the physical location        of the user during that time period (TP₂) is relevant empirical        data. The PProfileSoftware Correlation searches the Empirical        Data Archive looking for instances of empirical data that allows        for the determination of the physical location of the user        during the time period from 5:00 PM to 9:00 PM. The        PProfileSoftware—Correlation finds location information as        gathered by the user's smartphone.    -   ED₃: Time-Stamped Empirical Data    -   The PProfileSoftware—Correlation searches for time-stamped        empirical data. That is, PProfileSoftware—Correlation has        received the empirical data ED_(X). ED_(X) contains the time        that the instance-empirical data ED_(X) was created by the user.        It then searches for user empirical data that is time-stamped        during a specified period (TP₁) before and after the time of the        instance empirical data ED_(X). For example, the        PProfileSoftware Correlation finds a phone call received in the        specified time period TP₁ before the instance email ED_(X).    -   ED₄: Matches To Items In The INSP List Associated With The Word        “Working”    -   The PProfileSoftware—Correlation finds an email sent by the user        containing the word “drink”, i.e., containing an item in the        family of items associated with the word “working.”

The PProfileSoftware—Correlation (405) labels any the matches (ED_(M))that it found as correlated, i.e., potentially relevant, to the instanceempirical data ED_(X). PProfileSoftware—Correlation then archives theresults in PProfile Software—Archive (404).

The PProfileSoftware—Correlation passes its results back to the PProfileSoftware—Manager.

Analysis

The PProfile Software—Correlation passes any matches to “other empiricaldata” it has found back to the PProfile Software—Manager. These matchesare other instances of empirical data (ED_(M)) potentially relevant toED_(X).

The PProfile Software—Manager receives the matches and passes them on tothe PProfileSoftware—Analysis. The PProfileSoftware—Analysis uses thesecorrelated instances of user empirical data, ED_(X) and ED_(M), for thepurpose of identifying instances of particular types of behaviorsexhibited by the user. The behavior types that the PProfileSoftware—Analysis can identify are those contained in CCS Software—Table(see above).

To see how the analysis process would work, consider the specificexamples of instance empirical data ED_(X) and possible relevantempirical data ED₁, ED₂, ED₃, and ED₄ given above.

The instance empirical data, ED_(X), included an email comprised of thefollowing information:

-   -   From: PProfile User    -   To: User's Wife    -   Date: Aug. 30, 2012, 4:12 PM EDT    -   Body: “I'm at the office working late tonight. I won't be home        until after 9:00 PM.”

The following are examples of the PProfile analysis using the instanceempirical data ED_(X) and relevant empirical data ED₁, ED₂, ED₃, andED₄:

-   -   ED₁: User's Facial Image While Writing (TP₁) An Email To His        Wife    -   Analysis: The PProfileSoftware—Analysis passes ED₁ onto the        PProfile Software—Emotion/Countenance. The Emotion/Countenance        software determines whether the subject's face is present, and        if so, determines the user's facial affect. The        Emotion/Countenance software then uses the facial affect to make        a determination about the user. Note that the analysis done by        the PProfile Software—Emotion/Countenance could have been done        when the ED₁ data was first gathered. For the case of ED₁, the        Emotion/Countenance software determines that the user was lying.        The PProfile Software—Emotion/Countenance then passes this        result back to the PProfile Software—Analysis. The        PProfileSoftware—Analysis then connects the results of the        PProfile Software—Emotion/Countenance analysis of ED₁, to the        instance empirical data ED_(X). By making this connection,        PProfileSoftware—Analysis is able to identify an instance of a        particular type of behavior exhibited by the user.    -   Type of Behavior Identified: The user lied to his wife about        working late at the office.    -   ED₂: Physical Location Of The User During The “Working” Time        Period    -   Analysis: In the instance empirical data ED_(X), the user states        that he will be “at the office working late tonight.” The        PProfileSoftware—Analysis searches the PProfile Software—Archive        and obtains the physical location of the user's office.        Alternatively, this could be done by the PProfile        Software—Correlation. The PProfileSoftware—Analysis then uses        ED₂ to obtain the actual physical location of the user during        the “working late” time period (TP₂). PProfileSoftware—Analysis        then compares the archived physical location of the user's        office with the actual location of the user during the time        period when he told his wife that he would be working late. For        the case of ED₂, PProfileSoftware—Analysis finds that the user's        actual location is not at his office. PProfileSoftware—Analysis        is then able to identify an instance of a particular type of        behavior exhibited by the user.    -   Type of Behavior Identified: The user lied to his wife about        being at the office working late.    -   ED₃: Time-Stamped Empirical Data    -   Analysis: PProfileSoftware—Analysis has received ED₃ from the        PProfileSoftware—Manager. ED₃ comprises a phone call received by        the user during the time period TP₁. PProfileSoftware—Analysis        passes ED₃ onto the PProfile Software modules Voice and Content.        These PProfile software modules determine the following:        -   Call From: Woman's Name        -   Date: Aug. 30, 2012, 4:05 PM EDT        -   Content: “I'll meet you for a drink at 7 PM.”    -   Note that the analysis done by the PProfile Software modules        Voice and Content could have been done when the ED₃ data was        first gathered. This information is then passed back to        PProfileSoftware—Analysis. The PProfileSoftware—Analysis then        compares the above information with the information in ED_(X).        The results of this comparison allows    -   PProfileSoftware—Analysis to identify an instance of a type        behavior exhibited by the user.    -   Type of Behavior Identified: The user lied to his wife about        being at the office working late.    -   ED₄: Matches To Items In The INSP List Associated With The Word        “Working”    -   Analysis: PProfileSoftware—Analysis has received an email (ED₄)        from the PProfileSoftware—Manager. The email contains the        following information:        -   From: Woman's Name        -   To: User        -   Date: Aug. 30, 2012, 4:05 PM EDT        -   Body: “I'll meet you for a drink at 7 PM.”    -   ED₄ is relevant because the body of the email contains the word        “drink,” i.e., it contains a word that appears in the family of        items associated with the word “working” in the INSP List. The        PProfileSoftware—Analysis compares the two emails and is able to        identify an instance of a particular type of behavior exhibited        by the user.    -   Type of Behavior Identified: The user lied to his wife about        working late in the office.    -   Note that, in each example, PProfileSoftware—Analysis has        identified an instance of a particular type of behavior        exhibited by the user. This identification has been achieved by        analyzing correlated instances of the user's empirical data.

Determine Behavior Data-Points

When empirical data is gathered it is raw empirical data. As describedin the sections above, some analysis must be done to determine, forexample:

-   -   Content of Instance Empirical Data    -   Emotion associated with a facial affect    -   Correlated empirical data    -   Behavior Identified: Analysis of the instance empirical data and        relevant other empirical data leads to the identification of an        instance of a particular type of behavior exhibited by the user.

Once this initial analysis is completed on the raw empirical data, theresult is termed an “instance of a particular type of behavior exhibitedby the user” or, equivalently, a “behavior data-point” or BDP.

Each of the following is an example of a behavior data-point:

-   -   Example A—The combination of:    -   empirical data: content of email from husband to wife    -   correlated empirical data: facial affect    -   type of behavior identified: husband was lying while writing the        email to wife    -   Example B—The combination of:    -   empirical data: content of email from husband to wife    -   correlated empirical data: content of email from husband to girl        friend    -   type of behavior identified: inconsistency between these two        emails shows that husband has lied to wife    -   Example C—The combination of:    -   empirical data: content of email from husband to wife on project        results    -   correlated empirical data: facial affect shows stress    -   correlated empirical data: email in which husband takes        responsibility    -   type of behavior identified: husband exhibits the behavior of        uprightness.

As a BDP is identified by the PProfileSoftware—Analysis, it is labeledwith the user's identification, or with some other information to linkit to the user, and then it is passed to the PProfile Software—Manager.

Connecting a Behavior Data-Point (BDP) to a Profile Component

This section shows the process for connecting a behavior data-point(BDP) to a profile component. (See FIG. 4B)

-   -   The PProfile Software—Manager (402) receives a BDP (412A) from        the PProfile Software—Analysis (411).    -   The PProfile Software—Manager locates the type of behavior        identified in the BDP. The PProfile Software—Manager uses the        type of behavior identified in the BDP to search the PProfile        Software—Table (413) for the profile component(s) (PC) that the        BDP (412A) pertains to.    -   The PProfile Software—Manager adds the results of this search to        the BDP (412B).    -   The PProfile Software—Manager archives the BDP (412B) in the        PProfile Software—Archive (404).

Determine Scale Values of Profile Components

A goal for the PProfile System is to determine the profile of a user.“To determine the profile of a user” means to determine a scale valuefor each profile component for the user. A scale value of a profilecomponent is determined as the result of analysis of the user's behaviordata-points which are pertinent to that profile component.

Each profile component may be measured on its own scale and may have itsown characteristic method of determining its scale value. For example,the profile components happiness and honesty may be measured ondifferent scales.

The crucial conditions that each profile-component scale should satisfyinclude at least the following:

-   -   The scale should be explicitly and unambiguously defined.    -   The scale should have reliability and validity.    -   The scale should be consistently applied to all users.

For each profile component, many potentially usable scales exist in theliterature. Consequently, for any particular implementation of thePProfile System, one of these scales may be chosen for each component.

This section shows the process for determining scale values for aprofile component. (See FIG. 4B)

The PProfile Software—Scale Value (414) contains the scale for eachprofile component. It also contains the algorithms for determining ascale value, for each component, by using the behavior data-points (BDP)pertinent to each respective component. The PProfile Software—ScaleValue (414) can be set to execute at specific time intervals or can betriggered to execute by an event such as receiving a command from thePProfile Software—Manager (402) when the Manager receives a new BDP(412B).

Process for Determining the Scale Value of a Component for a User:

-   -   The PProfile Software—Scale Value (414) executes a search of the        PProfile Software—Archive (404) to find all the BDPs (412B) that        pertain to a given profile component.    -   The PProfile Software—Scale Value (414) collects all the BDPs        (412B) that pertain to the given profile component and then        executes the appropriate algorithm for the scale for the given        profile component. The result of the algorithm is the scale        value for the given profile component. The PProfile        Software—Scale Value (414) then labels this scale value as being        for the particular user.    -   The PProfile Software—Scale Value (414) archives the scale value        for the given profile component in the PProfile Software—Archive        (404).    -   The PProfile Software—Scale Value (414) repeats the above steps        for each profile component of the user.

Create a Profile

A profile is comprised of a set of components. As time goes on, a user'sprofile will become more complete in that the empirical data gatheredwith be related to a larger variety of components. And, the profile willbecome more accurate, since it will be based on more data-points foreach component.

The PProfile System Process for Determining the Profile of a Person:Steps

A particular embodiment according to the present invention is nowdescribed by which the PProfile System determines a person's profile.Other embodiments are possible.

The PProfile Process comprises the following steps:

-   -   gathering instances of empirical data by using the person's        digital devices as collectors of digital data;    -   collecting the instances of a person's empirical data;    -   archiving the instances of the person's empirical data;    -   correlating relevant instances of the person's empirical data;    -   identifying an instance of a particular type of behavior        exhibited by the person by analyzing correlated instances of        empirical data;    -   labeling the correlated instance of empirical data and the        identified instance of a particular type of behavior as a        “behavior data-point” for the person;    -   searching a table to find the profile components that the        particular type of behavior, of the behavior data-point, are        pertinent to;    -   adding the pertinent profile components to the behavior        data-point;    -   archiving the behavior data-point in an archive;    -   for a specified profile component, searching the archive for all        those behavior data-points, of the person, that are pertinent to        the specified profile component;    -   assigning a scale value to the specified profile component, of        the person, by analyzing all the archived behavior data-points,        of the person, pertinent to the specified profile component;    -   repeating the process for each profile component;    -   creating a profile for the person by collecting the scale-valued        profile components;    -   repeating the process as additional empirical data is gathered        to update the profile.

Specialized Uses of the PProfile System

The following are examples of how a person's profile and the PProfileSystem could be used.

PProfile Online Dating Service

-   -   a. Empirical data about a person is gathered and correlated by        PProfile Software.    -   b. The empirical data is analyzed by the PProfile Analysis        Software. This results in a profile for the person.    -   c. The above steps are repeated for all the men and women using        the PProfile System Online Dating Service.    -   d. The PProfile System Online Dating Service suggests matches        between people with complementary profiles. One way to do this        is by using the techniques developed at the Gottman Institute        (Seattle, Wash.)

Psychotherapy

-   -   a. Empirical data about a person is gathered and correlated by        PProfile Software.    -   b. The empirical data is analyzed by the PProfile Analysis        Software. This results in a profile for the person.    -   c. The person can then share the empirical data and the profile        with a therapist. The therapist is then in a much better        position to understand the person and suggest therapy for the        person.

Couples Therapy

-   -   a. Empirical data is gathered on each member of the couple. This        is done when they are not interacting with each other. And, it        is done when they are interacting with each other.    -   b. The empirical data is correlated by the PProfile Software and        is analyzed by the PProfile Analysis Software. One way to do        this is by using the techniques developed at the Gottman        Institute (Seattle, Wash.)    -   c. The results of this analysis can be used to suggest actions        such as: alerting couples to potential problems, behavior        modification, separation, divorce, etc.

Self-Improvement

-   -   a. Empirical data about a person is gathered and correlated by        PProfile Software.    -   b. The empirical data is analyzed by the PProfile Analysis        Software. This results in a profile for the person.    -   c. The person can then use this information to do, for example,        any of the following:        -   Develop good habits        -   Break bad habits. To break a bad habit, a person must become            aware that he has the habit and must realize that it is            doing him harm. PProfile can help on both of these points.        -   Identify patterns of behavior he was unaware of        -   Apply techniques such as those from “Personal Power”            (Anthony Robbins). For example, using head-mounted display            devices, messages could be sent to the person in real-time            that will help to implement Personal Power techniques such            as Neuro-Associative Conditioning Systems (NACS).

Health Care

-   -   The person's profile can become part of the person's medical        records.    -   The person's physician can be given his profile as a way for the        physician to better understand the psychological make-up of the        person. The profile would supplement the conclusions the        physician draws about the patient from their direct        interactions.    -   The PProfile System could also be used to assist physicians in        identifying behaviors and habits (both conscious and        subconscious) that the patient has. Some behaviors/habits lead        to or are indicators of illness. The PProfile System could also        be used to monitor whether or not the patient is following some        prescribed procedure.    -   Real Time Feed Back. These are not just periodic “support        statements” Rather, these are tailored messages that are a        response to what the person is doing as observed by PProfile.

The Criminal Justice System

-   -   A person's profile could be used, for example, in the Sentencing        stage of the Justice System. The profile would give the Judge a        much better understanding of the person and how believable his        statements of remorse are.    -   A person's profile could be used, for example, in helping to        determine a rehabilitation program for a prisoner.    -   A person's profile could be used as a means of preventing        crimes. For example, certain behavior could trigger a response        of getting the person into a mental health clinic.

Sociological Studies

Compilations of many profiles, each of which has been scrubbed ofpersonal identification data, could be used by sociologists for a broadhost of studies, such as: identifying new groups of people and behavior,discovering tendencies that are a function of geographical location,etc.

Government Census

Compilations of many profiles, scrubbed of personal identification data,could be used by governments to identify patterns in the generalpopulation. For example, a study recently reported that Wall Street hasa much higher percentage of psychopaths than does the population as awhole. This type of study would greatly benefit from having the PProfileSystem scrubbed-data available.

Career Counseling

The PProfile System could match a person to particular careers by usinghis profile. That is, careers filter out certain personality types.PProfile can be used to ascertain if a person is suitable for aparticular type of career based on his profile.

Employee Recruitment and/or Screening

Private, government, and military employers may request access to aperson's PProfile Account to, for example,

-   -   assess the person's suitability for the job (i.e., the person's        PProfile System profile becomes part of the person's resume.)    -   find ways to improve an employee's productivity    -   assess the suitability of a person to work on a particular        project or to work with a particular group (i.e., does the        employee's profile mesh with that of the other team members.)

Student Counseling

A student's profile could be given to a school counselor as a means ofhelping to understand why the student may be having problems. Theprofile could also be used to anticipate problems and take preventativeaction.

School Administrators

Schools administrators could use student profiles as a means of gettingthe mix of students that the administrators want in a class.

Choosing A School Or College

A student could be matched to a college based partly on how his profilematches any of the following:

-   -   the requirements of the college    -   how students, with similar profiles, have done at the school or        college in past years. (A school is only a “good school,” if it        is good for the student. The PProfile System would give a way of        quantifying “good.”)    -   how well the student's profile fits with that of the general        student body.

College Selection of Entering Students

An student's Profile could be required as part of the student'sApplication for Admission. The college could be looking for studentswith certain profiles or for a student body with a particular mix ofprofiles.

Family Counseling: Profiles of Both Parents and Children

A child's profile could be given to the parents as a way of helping theparents to better understand the child. This use of the PProfile Systemholds the interesting possibility of correlating a child's profile witha parent's profile in Family Counseling.

Parents and Teenagers

Teenager comes home, eats, and closes the door to his room. PProfilegives the parent a way of knowing not only what the teenager is doing bywhy, i.e., his psychological motives, etc. PProfile gives the parentinformation that he has never had before.

Real Estate

One of the variables that goes into buying a home is the school districtthat it is in. Parents often choose a house based on the school districtthat it is in. PProfile could be used by parents to assist in homepurchases, i.e., a good school is only good if it is good for yourchild.

Sports

In world class sports, what typically makes the difference betweenathletes is not physical ability but rather mental/emotional state. Anathlete's profile gives his coaches a deeper understanding of theathlete than they may have. This could be used by his coaches to get theathlete to perform at the optimum level.

PProfileCreditReport

The person's PProfile System profile becomes part of the person's creditreport.

Homeland Security

Homeland Security could use the PProfile System as a way of identifyingpotentially dangerous people. In antiterrorism efforts, often timessuspects are dropped from surveillance because there is not enoughmanpower to watch them. PProfile could help with this problem.

Networking

Networking parties bring people together to establish, for example,business relations. One of the problems with these is that, in largegatherings, it is hard to be efficient in meeting the right people foryour needs. These parties would be greatly aided by PProfilePublic asdescribed below. By employing PProfilePublic a person could walk into aroom with 200 people and could efficiently be matched with the peoplethat meet his criteria.

PProfileSportsDrafting

Professional sports teams spend large sums of money trying to figure outwho the right draft picks are for them. This effort is increasinglydata-driven. However, according to an Apr. 25, 2013 article in AmericanPublic Media's Marketplace Tech Report:

-   -   “Even if you know everything there is to know about a player        like Jahleel Addae—tackles, sacks, kick returns, and        interceptions—what you don't know, what you can't know, is how        he will fit in with the rest of the team.”

PProfile could know. Or, at least, could help to know which playerswould fit in with the rest of the team.

This could be done by having all the players on the team and thepotential draftees enroll as clients of PProfile. Once PProfile developsprofiles for them, these can then be analyzed to see if a potentialdraftee fits in with the rest of the team.

PProfilePolling

One of the difficult things about polls and surveys is finding a groupthat is truly representative of a larger population. PProfile could beof great assistance in doing this. Given a group of people who are allmembers of PProfile, PProfile could pick out a smaller, selected groupbased on criteria set by the polling organization.

PProfile could also be used in another way. Imagine that the pollingorganization is presented with a sampling group. That is, it cannot pickthe group. If the members of the group were PProfile users, thenPProfile could provide the polling organization with the profile of eachmember of the group, with the authorization of the members. That is,PProfile knows the audience. The polling organization can then interpretthe meaning of the poll results relative to the group that it has.

In addition, PProfile could provide relevant empirical data that has notbeen available before, such as:

-   -   Conversations and emails related to the poll material of the        members of a sampling group.    -   Some polls are being used to evaluate things such as movies and        commercials. For example, the facial affect of a person is        registered as they watch a movie or a commercial. However, the        facial affect is, to a degree, out of context. PProfile would        allow the polling agency to put the facial affect into the        context of the person, i.e., PProfile knows the audience

PProfileGunPermit Background Checks

Background checks for gun permits have strict regulations that must bemet. PProfile could have a background check done before the person eventhinks about buying a gun. PProfile could do this by keeping a runningcheck going on all empirical data gathered on the person.

In addition, PProfile could add a new dimension to Background Checks.For example, PProfile could flag those people who are prone tospontaneous outbursts of anger, hostility, etc. That is, PProfile couldalert authorities to people who would potentially be a threat if theywere to obtain a gun.

PProfileProfessional

PProfileProfessional is a specialized PProfile service covering a user'sprofessional life. There is an entire universe of profile componentsthat have never before been available for measurement which, because ofPProfile, would now be available.

For example, in “Emotional Intelligence” pages 160-161, Daniel Golemanstates the following:

-   -   “The single most important factor in maximizing the excellence        of a group's product was the degree to which the members were        able to create a state of internal harmony . . . .”        “Internal harmony” is directly related to the personalities of        the members of the group and to how well the different        personalities fit together.

Consequently, PProfileProfessional could be used, for example, in thefollowing way.

Consider a large organization with many employees. Assume that all theemployees are users of PProfile. When a new project is to start andmanagement wants to assemble a group to work on it, PProfileProfessionalcould be employed to help pick the group members based on how well thepersonalities, i.e., profiles, fit together.

PProfileResume

A person becomes a client of the PProfile Service. PProfile collectsempirical data about the user. Some of this data is personal. Some of itis professional/employee, e.g., work experience. The user can askPProfile to confirm his work experience/Resume to authorized thirdparties, e.g., business clients, new employers, etc.

PProfileAccess

When a person is a user of the PProfile Service, PProfile collectsempirical data about the person. The person can ask PProfile to allowthird parties access to parts this data and/or parts of the analysis.The access of the information comes with conditions, such as:

-   -   The user, and only the user, can authorize access to his data.    -   The user can change neither the data nor the analysis.

PProfileBusiness

This specialized application of the PProfile service would be directedto business people.

Instead of a person telling who they are, PProfileBusiness would observethe person and then determine who they are. That is, just as withdating, the question that comes up when you first meet a person inbusiness is this: Is this person really who he says he is? In socialmedia and in the real world, people paint portraits of themselves as onething. But, the reality of who they are may be very different.

PProfile creates the profile by gathering empirical data and thenanalyzing it as described previously in the specification. Then, withthe authorization of the person, PProfileBusiness can make his businessprofile available to third parties.

The following are two methods of employing PProfileBusiness:

-   -   a. PProfileBusiness could be run as a social media service. A        user could develop a business portrait of himself. However, the        PProfileBusiness portrait would have to be consistent with the        user's profile. That is, PProfile could ensure that the        information entered was accurate. The user could then authorize        third parties to view this portrait.    -   b. PProfileBusiness is used to vet information the user has        entered into other services. This could be done as an app        running on the other service. Or, it could be done when a third        party downloads information from the other service and then asks        PProfileBusiness for verification. Once the user authorizes it,        PProfileBusiness could provide the verification.

PProfileTimeRestricted

Some people will want to only be observed at certain times of the day.So, for example, some users might only allow PProfile to gather datawhile they are at work. Other users might only allow PProfile to gatherdata while they are away from work.

PProfile could offer a service that limits when empirical data iscollected. This will be notes in any data that PProfile is authorized tobe shared with third parties.

PProfileDeviceRestricted

Some people will want to only be observed while using certain devices.So, for example, some users might only allow PProfile to gather datafrom devices that are owned by the user, i.e., no data is gathered fromdevices used at work.

PProfile could offer a service that limits which devices are used forempirical data This will be notes in any data that PProfile isauthorized to be shared with third parties. collected.

PProfileDriving

PProfileDriving is a service that determines a person's driving profile.A person's driving profile is not just about the number of speedingtickets he has gotten. The person's driving profile is about all thebehaviors, physiological responses, and emotions responses that theperson exhibits while driving. These affect the person's driving skills.

This profile could be determined by PProfile. For example, assume that amicrophone and a camera were to be placed into the driving'scompartment. The driver's facial and voice affect could be correlatedwith his actions, the car speed, the speed limit, and other empiricaldata.

PProfile could alert the user that he is exhibiting certain behaviorsthat are detrimental to safe driving or that have gotten him intotrouble before. These could also be used by insurance companies.

PProfileBoyMeetsGirl

PProfileBoyMeetsGirl is a service that could be used by a boy and a girlwho are both users of the PProfile Service. Assume that these two peoplehave just met and that the girl is wearing Google Glass. PProfile couldprovide the girl with metadata on what the boy says to her. For example,if he tells her that he knows people influential in her profession, thenPProfile can either confirm or reject his statement through a calloutvisible through Google Glass. This would have to be authorized by theboy. In addition, Google Glass could be combined with Facial Affectsoftware to further assist in this interaction.

Facial Recognition software has been suggested for Google Glass.However, PProfileBoyMeetsGirl adds an entirely new dimension to GoogleGlass: Character Recognition.

PProfileForensic

PProfile could be used to study medical conditions such as suicide. Forexample, if a PProfile user commits suicide, then the data in hisPProfile account could be accessed. Reviewing this data would be similarto observing the person in intimate detail. It would give cliniciansdata that they have never had before.

PProfileInteraction

PProfile could be used to interact with the user in real time. Forexample, if the user is exhibiting a specified behavior detected throughthe empirical data gather by PProfile, then the PProfile System canreact and interact with the user. For example, the System could interactwith the user by sending him messages that try to modify his behavior.

PProfile could also be used to conduct experiments with the user. Forexample, if the PProfile System detects that the user is in a specifiedenvironment, the System can interact with the user and see how heresponds. One method of doing this is through text messages or calloutson Google Glass.

Recently it has been found that ultrasound could effect a person's mood.(See “Good vibrations: Mediating mood through brain ultrasound” MedicalPress, Jul. 17, 2013). Consequently, another way to modify a user'sbehavior would be for him to wear a device similar to Google Glass thatis equipped with an ultrasound transducer. The message sent to the userwould be a command to the transducer to emit a particular ultrasonicsignal that would modify the user's mood.

PProfileTalent

PProfile could be used to determine where a person's true talents are.This could be accomplished, for example, by observing

-   -   physiological and emotional responses as the person is presented        with new things to try    -   what activities he is naturally drawn to    -   what activities he spends his free time doing    -   length of time spent doing these activities    -   emotional state while doing these activities.

PProfileSurvey

PProfile never releases a user's data without authorization from theuser. However, PProfileSurvey could scrub all the personalidentification data from the empirical data. PProfileSurvey could thendraw conclusions about the population as a whole by adding togetherscrubbed data from many users. PProfile could be used to spot trends inthe population as a whole.

PProfileMessagingServices

PProfileMessagingServices is a service that generates message to a userbased on his profile and his empirical data. The message could be at therequest of the user; for example, the user could request thatPProfileMessagingServices send him a message if it detects that he isbehaving in a certain way. Or, the message could be from, for example,law enforcement authorities, parents, etc.

PProfileArchive

PProfileArchive is a service that allows a user to view all the materialthat PProfile has archived on him. This would be valuable to the user.He could assess his own life. And, he could do self-searches through hisown material to determine, for example, what information companies couldhave gathered about him.

PProfileSpecializedProfiles

For some purposes, it would be helpful to group the set of profilecomponents into subsets. The following are examples of possible subsets:

-   -   Character Profile Components    -   Psychological Profile Components    -   Professional Profile Components    -   Business Profile Components    -   Financial Profile Components    -   Consumer Profile Components    -   Medical Profile Components    -   Genetic Profile Components

Based on these subsets of profile components, sub-profiles can bedefined. These sub-profiles would include, for example, the following:

-   -   Character Profile    -   Psychological Profile    -   Professional Profile    -   Business Profile    -   Financial Profile    -   Consumer Profile    -   Medical Profile    -   Genetic Profile    -   Personality    -   Emotional

PProfileSocialNetwork

This application of PProfile could use the profile of others to assistin determining the profile for a user. For example, the depth of aPProfile user's social network could be determined by such things as:

-   -   the number and the quality of the people that seek out his        advice.    -   the number and the quality of the people that the user seeks out        to consult with.

As another example, a person may be known by his enemies as much as byhis friends. If PProfile has the profiles of a user's enemies and of hisfriends, then these could help in developing a profile of the user.

PProfileSocialNetwork could also be of help in psychotherapy. That is, atherapist would know about the people that a patient is dealing with ifthese other people are also members of PProfile.

PProfilePublic

PProfilePublic is a service that allows registered users of the PProfileSystem to post user-specified public-information for other registeredusers of the PProfile System to see. This public-information is call hisPost.

The Post can contain, for example:

-   -   part of the user's Profile.    -   something that he wants the public to know about him.    -   something that he is looking for.

The user is totally free to select portions of his profile and otherinformation for his Post, and to change these selections at hispleasure. The only limitation on these selections is that Profileelements cannot be altered by the user.

The user can choose not to Post any information. He can also restrictthe group of registered PProfile users who are shown the Post to thosethat satisfy criteria set by him.

The PProfilePublic Service could be implemented as a website hosted bythe PProfile System's CCS.

The following is a specific example of a PProfilePublic Service relatedto use of a head-mounted display (HMD), sometimes referred to as aheads-up display. Head-mounted displays may include specialized glassesor headgear with features such as the following:

-   -   head-mounted display/heads-up display    -   smart phone    -   range finder    -   camera    -   compass    -   geographic location equipment (GPS, cell phone, etc.),    -   microphone    -   RFID hardware    -   highly directional EM antenna    -   nondirectional EM antenna

The HMD may be in communication with the PProfilePublic Service through,for example, wi-fi or cell phone internet access. Although the specificexample given below utilizes an HMD, creating and displaying a postcould be accomplished using other personal digital devices, such as asmart phone for example.

FIG. 5 illustrates hardware and software interactions for creating apost in accordance with an embodiment. FIG. 5 depicts a computer system(e.g., central computer system or CCS) 200. CCS 200 may contain the samesubunits as CCS 110 of FIG. 1. In addition, CCS 200 is depicted toinclude a database (e.g., PProfilePublic Database) 210. The database 210may include, for each registered user of the PProfilePublic Service:

-   -   Profile    -   Current geolocation of the user    -   Authorization Criteria    -   Post

CCS 200 may further include Post Software 211 providing, in conjunctionwith other subunits of CCS 200 (such as communications units 111,processing units 112 and storage units 113 of FIG. 1) means to allow auser to post information. By accessing the PProfilePublic Service (e.g.,through a website or other portal), the posting user can specify whatinformation he wants to post on the PProfilePublic Service. Thisinformation could be, for example, public-information items listedabove.

One way for the PProfilePublic Service to enable the posting-user tocreate a PProfilePublic Post is to present the user with an electronicposting-form with, for example, the following fields:

-   -   Marital Status    -   Age    -   Profession    -   A yes/no check-off box for inclusion of each element of the        user's profile.    -   Instant Post (This is a short user-specified message.)        The information that he enters into these fields will become his        PProfilePublic Post.

CCS 200 may further include Consistency Software 212 providing, inconjunction with other subunits of CCS 200 (such as communications units111, processing units 112 and storage units 113 of FIG. 1) means tocheck for consistency. For example, once information is entered into theposting-form, the PProfilePublic Consistency Software 212 might checkthe information for consistency with the posting-user's PProfile Systemprofile. If the Post is found to be inconsistent with the posting-user'sprofile, then the PProfilePublic Software may notify the posting-userthat the Post cannot be posted. For example, if a user enters “single”in the Marital Status line when his profile lists him as married, thenthe post could be rejected by the PProfilePublic Software.

The posting-user may be permitted to access the PProfilePublic sectionof the PProfile System website and to change the Post at any time. Theuser could do this in the traditional way, i.e., through the website. Hecould also do this by commands to speech-recognition software in hisHMD, for example.

CCS 200 may further include Criteria Specification Software 213providing, in conjunction with other subunits of CCS 200 (such ascommunications units 111, processing units 112 and storage units 113 ofFIG. 1) means to permit a user to set criteria to restrict access to thepost. For example, at the PProfilePublic section of the PProfile Systemwebsite, the posting-user may be presented with an electronic CriteriaSpecification Form. He may use this form to set the criteria that aviewing-user must satisfy before the PProfilePublic Service will displaythe posting-user's Post to him. In other words, the posting-userselects, through criteria, who will see his Post. PProfilePublic mayenforce this selection by demanding that the viewing-user's profilesatisfies the posting-user's criteria.

The form could include fields that reflect what the wishes of theposting-user are at that time. For example, a single man who was lookingfor a social connection on a particular night might include fields suchas the following:

FIELD CRITERIA SPECIFICATION Sex Female Status Single Age Range 25-30years old Height Range 5′ 6″ to 5′ 10″ Weight Range 130 lbs to 150 lbsEducation College Character Evaluation Honest Behavior Pattern Ridesmotorcycles Psychological Profile A DSM Category Radius 200 feetThe PProfilePublic Service would then transmit the posting-user's postonly to viewing-users that meet the above criteria.

Note that the Post is not displayed to a viewing-user by name of theviewing-user, in this example. Rather, it is displayed to any user, inthe geographic vicinity, who satisfies the specified criteria. However,the criteria could permit the posting-user to display Posts to a groupof viewing-users that is determined by things other than geographicvicinity.

In addition, a feature could be included that would allow a posting-userto specify a particular person for his post, for example, his post is tobe displayed to the person whose post he had just received.

CCS 200 may further include Location Software 214 providing, inconjunction with other subunits of CCS 200 (such as communications units111, processing units 112 and storage units 113 of FIG. 1) means tolocate users. For example, registered users of PProfile have data abouttheir current geographical location transmitted to the PProfilePublicSystem through their digital devices. When it is received, thisgeolocation information may be analyzed and archived.

FIG. 6 illustrates hardware and software interactions for displaying apost in accordance with an embodiment. FIG. 6 depicts the CCS 200 ofFIG. 5.

CCS 200 may further include Neighborhood Software 221 providing, inconjunction with other subunits of CCS 200 (such as communications units111, processing units 112 and storage units 113 of FIG. 1) means toidentify nearby users. For example, as a registered user's geolocationdata comes into PProfilePublic, the service may search thePProfilePublic database to find other users who are within a radius R ofthe registered user's location. The group of users that are withinradius R of the registered user's location is called the user'sNeighborhood 225.

CCS 200 may further include Identification Software 222 providing, inconjunction with other subunits of CCS 200 (such as communications units111, processing units 112 and storage units 113 of FIG. 1) means toidentify specific nearby users. For example, the PProfilePublic Servicemust be able to identify specific users of the PProfile System who arewithin the viewing-user's Neighborhood from data transmitted by theviewing user, e.g., the criteria. Several methods can be employed to dothis. Five of them are detailed are detailed below as Methods 1-5.

CCS 200 may further include Authorization Software 223 providing, inconjunction with other subunits of CCS 200 (such as communications units111, processing units 112 and storage units 113 of FIG. 1) means torestrict transmission of a posting user's Post. For example, thePProfilePublic Service might only transmits a posting user's Post toviewing-users that meet his designated criteria.

Once a person has been identified as being a PProfile registered-user inthe Neighborhood of a viewing-user, a search is done of thePProfilePublic data base to find the person's Post and the person'scriteria for viewing the Post.

The Authorization software then searches the PProfilePublic database forthe viewing-user's profile. When this is found, the AuthorizationSoftware checks to see if the viewing-user's profile satisfies theposting-user's criteria.

-   -   If the profile does not satisfy the criteria, then the Post is        not shown to the viewing-user.    -   If the profile does satisfy the criteria, then the Post is sent        to the Transmission Software.

In summary, when the PProfilePublic receives a signal from aviewing-user requesting a posting-user's Post, the AuthorizationSoftware checks the posting-user's criteria against the viewing-user'sProfile to see if the viewing-user satisfies the posting-user's criteriabefore it transmits the Post.

CCS 200 may further include Receiving/Transmitting (R/T) Software 224providing, in conjunction with other subunits of CCS 200 (such ascommunications units 111, processing units 112 and storage units 113 ofFIG. 1) means to transmit and receive Posts. The R/T Software 224receives information from a viewing user's head-mounted display device.The R/T Software also transmits a posting user's Post to a viewing user.The Post could be in the form of, for example, an email, a text message,a Tweet, or visual display message for the viewing user's HMD.

Display Software

The PProfilePublic Display Software receives the Post from thePProfilePublic Service. The Display Software may then display the Poston the user's HMD.

Consider the situation where a group of people are registered users ofthe PProfile System. Some of them have decided to make informationavailable to the public through the PProfilePublic Service. That is,some of them have each created a PProfilePublic Post. In addition, atleast some of the registered users each have a digital device that, fromtime-to-time, transmits information identifying the geographic locationof the user to the PProfile System.

As a specific example of the HMD Embodiment of the PProfilePublicService, assume that a 1st user (i.e., user 400) is walking in a publicarea and is wearing an HMD.

-   -   The HMD transmits geographic location data of user 400 to        PProfilePublic.    -   User 400's Neighborhood Is Determined    -   When the geographic location data is received by PProfilePublic,        it checks its database to determine which other registered users        are within a radius R of user 400's geographical location. The        radius R can be set, in the PProfilePublic Software, by user 400        or by the PProfilePublic Service. The group of registered users        within a radius R of the user 400 is called user 400's        Neighborhood 225.    -   User 400 looks at a person (e.g., 2nd user 300) who is at a        distance D from the user 400. (Assume that D<R.)    -   Identification of the Person as a registered PProfile System        user    -   Either automatically or by command of user 400, the PProfile        System tries to determine if the person is a member of the group        of registered users in Neighborhood 225. There are several        methods by which to accomplish this, for example:    -   Method 1    -   (For this method to work, each of the users must be assigned a        unique bar code. And, PProfilePublic must include bar code        reading software.) The person wears a bar code or a data matrix        code that can be scanned by the 1^(st) user's head-mounted        display device's camera. This information is sent to        PProfilePublic. When the bar code information is received by        PProfilePubic, PProfilePublic searches the bar codes assigned to        the registered users in the 1^(st) user's Neighborhood looking        for a match.    -   Method 2    -   Radio-Frequency Identification (RFID): Mobile devices, of        PProfile System's registered users, can be equipped with RFID        hardware and software. This will allow the PProfile System to        identify the person. For this method to work, each of the users        must be assigned unique RFID information. When the RFID        information is received by PProfilePubic, PProfilePublic        searches the RFID information assigned to the registered users        in the 1st user's Neighborhood looking for a match.    -   Method 3    -   (For this method to work, each of the users must be assigned a        unique electromagnetic identification signal. And, personal        digital devices must include electromagnetic-identification        signal transmission/detection hardware and software.) A unique        identification signal is radiated from a digital device of the        person. This is received by the digital device of the 1st user.        Once the information is received, it is transmitted by the 1st        user to PProfile. When the electromagnetic signal information is        received by PProfile, PProfile searches the electromagnetic        signal information assigned to the registered users in the 1st        user's Neighborhood looking for a match.    -   Method 4    -   The PProfile System knows the geographic location of the all the        PProfile users within the radius R very accurately. The        head-mounted display device may be equipped with a rangefinder.        Using the rangefinder gives the distance from the 1st user to        the person. The PProfile also knows the direction in which the        1st user is looking. This is determined by using the compass        feature of smart phones. Once the range and direction        information is received by PProfilePublic, PProfilePublic        searches the location information of each of the registered        users in the 1st user's Neighborhood looking for a match.    -   Method 5    -   The PProfilePublic knows the geographic location of the all the        registered PProfile users in the 1st user's Neighborhood.        PProfilePublic keeps a data base of facial images of its        registered users. Using the head-mounted display device's        camera, an image of the 2nd person is transmitted to the        PProfilePubic. Once the facial image is received by        PProfilePublic, PProfilePublic searches the facial images of        each of the registered users in the 1st user's Neighborhood        looking for a match, by using facial recognition software.

There are only two possible results of this attempt at identification:either PProfilePublic can identify the person as a 2^(nd) user 300 inuser 400's Neighborhood 225, or it cannot. If the PProfilePublic cannotidentify the person, then a message stating this is sent to user 400'sHMD for display. If PProfilePublic can identify the person as a 2^(nd)user 300 in user 400's Neighborhood 225, then PProfilePublic employs itsAuthorization Software 223 to search for a Post from user 300, and tosearch for the associated criteria set by user 300 for viewing the Post.

If there is no Post, then the PProfilePublic Service sends a messagestating this is sent to user 400's HMD for display. If there is a Post,then PProfilePublic's Authorization Software 223 checks to see if user400's profile meets the criteria set by user 300 for the transmission ofuser 300's Post to user 400. If there is a Post, but user 400 does notmeet user 300's criteria, then a message stating this is sent to user400's HMD for display. If there is a Post and user 400's profile meetsuser 300's criteria, then the Post is transmitted to user 400's HMD fordisplay. For example, the Post may be displayed in user 400's field ofview near user 400's view of user 300. In addition, if user 300's Postis displayed to user 400, a message can be sent to user 300 notifyinghim of this.

Note that the identity of user 300 is not given to user 400 by thePProfilePublic Service unless user 300 makes it part of his Post. Theonly information that is given to user 400 is the information that user300 has decided to post.

If a PProfilePublic Post is shown to user 400, then user 400 knows thatthere is a match between them on at least some level. So, for example,this would have immediate applicability to gatherings where people tryto network.

One of the most interesting possibilities presented by the HMDEmbodiment of PProfilePublic Service is that it would allow twostrangers, who are both walking in an urban environment, to start aconversation in a convenient and comfortable way.

What is claimed is:
 1. A computer system, comprising a communicationunit; wherein the communication unit is configured to receive instancesof empirical data from a plurality of digital devices that areassociated with a particular person, wherein at least some of thereceived instances of empirical data are gathered by ambientobservations of the particular person by the plurality of digitaldevices; wherein each received instance of empirical data comprises oneor more portions of data; and to transmit digital messages to at leastone of the digital devices of the plurality of digital devices that areassociated with the particular person; and a processing unit; and astorage unit; wherein the storage unit comprises at least an assemblageof data comprising a plurality of key items, wherein each key item ofthe plurality of key items is an item having a data type correspondingto a data type of a portion of data of an instance of empirical data tobe received by the communication unit, and wherein the plurality of keyitems comprises image data of the particular person and voice data ofthe particular person; wherein each key item of the plurality of keyitems has at least one associated family of items, wherein a particularassociated family of items of the at least one associated family ofitems is associated to its associated key item of the plurality of keyitems by relevance to one particular behavior such that every item inthe particular associated family of items, when paired with the keyitem, forms a pair that is relevant to the one particular behavior;wherein the computer system is configured by software to perform aprocess, the process comprising: receiving two or more instances ofempirical data associated with the particular person from one or moredigital devices in the presence of the particular person; identifyingthe portions of data in each of the received instances of empiricaldata; for a particular instance of empirical data (ED_(A)), determiningwhether there is a match of an identified portion of data (P_(Aμ)) ofED_(A) to a key item of the plurality of key items in the assemblage ofdata; for a matched key item, using the particular associated family ofitems of the matched key item to search for a match between a member ofthe particular associated family of items of the matched key item and anidentified portion of data (P_(Bν)) of an other instance of empiricaldata (ED_(B)) of the received instances of empirical data; andcorrelating ED_(A) with ED_(B) as being potentially relevant to eachother vis-à-vis the one particular behavior of the particular associatedfamily of items in response to at least one P_(Bν)) of ED_(B) matching amember of the particular associated family of items of the matched keyitem for ED_(A); and analyzing the pair of correlated instances ofempirical data, ED_(A) and ED_(B), to determine if it identifies aninstance of the one particular behavior of the person as observed by thecomputer system; wherein determining that the pair of correlatedinstances of empirical data, ED_(A) and ED_(B), identifies an instanceof the one particular behavior comprises determining if the instances ofempirical data, ED_(A) and ED_(B), are pairwise relevant to each othervis-a-vis the one particular behavior; wherein pairwise relevance ofED_(A) to ED_(B) is determined by comparing the portion, P_(Aμ), ofED_(A) to the portion, P_(Bν), of ED_(B), for a particular relationship; wherein the particular relationship is one member selected from a groupconsisting of consistency and inconsistency;  wherein the pair ofcorrelated instances of empirical data, ED_(A) and ED_(B), is identifiedas an instance of the one particular behavior in response to analysisdetermining that the respective pair of portions, P_(Aμ) and P_(Bν),have the particular relationship; and archiving the pair of correlatedinstances of empirical data, ED_(A) and ED_(B), the one particularbehavior for which the pair of instances of empirical data werecorrelated, the instance of the one particular behavior, and the resultsof the analysis.
 2. The computer system of claim 1, wherein the oneparticular behavior comprises an observable selected from a groupconsisting of a behavior, an action, an activity and an emotion.
 3. Thecomputer system of claim 2, wherein the process that the computer systemis configured to perform further comprises: transmitting a particulardigital message; wherein the content of the particular digital messageis determined in response to at least one of: the correlated instancesof empirical data and the instance of the one particular behavior. 4.The computer system of claim 3, wherein the content of the particulardigital message is further determined using criteria selected from oneof a group consisting of rules or techniques of the Gottman Institute,rules of Cognitive Behavioral Therapy, and techniques ofNeuro-Associative Conditioning Systems (NACS).
 5. The computer system ofclaim 3, wherein the particular person is a child, and wherein theparticular digital message comprises interactive guidance to the childthat is a response to the instance of the one particular behavior. 6.The computer system of claim 5, wherein the particular digital messageis a real time response to the instance of the one particular behaviorof the child.
 7. The computer system of claim 5, wherein the particulardigital message comprises real time, interactive guidance to the childthat implements at least one of rules and techniques of the GottmanInstitute as they relate to the one particular behavior of the child. 8.The computer system of claim 3, wherein the other instance of empiricaldata (ED_(B)) comprises data from a second person's interaction with theparticular person.
 9. The computer system of claim 8, wherein theparticular digital message is transmitted to the particular person. 10.The computer system of claim 9, wherein the particular person is anadult and the second person is a child, and wherein the particulardigital message comprises guidance to the adult.
 11. The computer systemof claim 10, wherein the particular digital message comprises real time,interactive guidance to the adult implementing at least one of rules andtechniques of the Gottman Institute as these rules relate to the oneparticular behavior of the adult.
 12. The computer system of claim 11,wherein the particular digital message is a suggestion to the adult tomodify their behavior as the adult reacts to the child.
 13. The computersystem of claim 8, wherein the particular digital message is transmittedto the second person.
 14. The computer system of claim 13, wherein theparticular person is a child and the second person is an adult, andwherein the particular digital message comprises guidance to the adult.15. The computer system of claim 14, wherein the particular digitalmessage comprises real time, interactive guidance to the adultimplementing at least one of rules and techniques of the GottmanInstitute as they relate to the one particular behavior of the child.16. The computer system of claim 3, further comprising: wherein theparticular person is a patient; wherein at least some of the data in thecorrelated instances of empirical data, ED_(A) and ED_(B), are data thatwere gathered when the patient was away from a healthcare clinic;wherein the one particular behavior is one of: a behavior that iscompliant with instructions given to the particular person by ahealthcare provider; and a behavior that is non-compliant withinstructions given to the particular person by a healthcare provider;and wherein the particular digital message is sent to at least one ofthe particular person, a parent of the particular person when theparticular person is a child, and the particular person's healthcareprovider.
 17. The computer system of claim 16, wherein the oneparticular behavior is related to prescribed instructions given to theparticular person by a healthcare provider.
 18. The computer system ofclaim 17, further comprising: wherein the particular digital messagecomprises real-time feedback sent to the patient having contentdetermined in response to at least one of: the instance of the oneparticular behavior and the correlated instances of empirical data. 19.The computer system of claim 3, wherein the particular digital messageis comprised of at least one of text data, sound data, and image data.20. The computer system of claim 19, wherein the particular digitalmessage is implemented as Augmented Reality (AR).
 21. The computersystem of claim 3, wherein the particular digital message is transmittedto at least one digital device that is in the presence of the particularperson.
 22. The computer system of claim 3, wherein the process that thecomputer system is configured to perform further comprises transmittingthe particular digital message in real time.
 23. The computer system ofclaim 22, wherein the content of the particular digital message isdetermined in response to what the particular person was observed doingas documented by the instance of the one particular behavior; andwherein the content of the particular digital message is designed toassist in behavior modification of the one particular behavior of theparticular person.
 24. The computer system of claim 22, furthercomprising: wherein the content of the particular digital message isdetermined in response to what the particular person was observed doingas documented by the instance of the one particular behavior; andwherein the content of the particular digital message is furtherdesigned to assist the particular person in a self-improvement program.25. The computer system of claim 22, wherein the content of theparticular digital message is further designed to assist the particularperson in their driving behavior.
 26. The computer system of claim 3,wherein the process that the computer system is configured to performfurther comprises transmitting the particular digital message to theparticular person.
 27. The computer system of claim 1, wherein eachinstance of the one particular behavior corresponds to a behaviordata-point for the one particular behavior of the person.
 28. Thecomputer system of claim 27, wherein the process that the computersystem is configured to perform further comprises: analyzing thearchived behavior data-points, of the one particular behavior, todetermine a scale value for the one particular behavior.
 29. Thecomputer system of claim 28, wherein the process that the computersystem is configured to perform further comprises: analyzing thearchived behavior data-points, of the one particular behavior, to refinethe accuracy of the scale value for the one particular behavior, fromtime to time as additional behavior data-points are identified.
 30. Acomputer system, comprising a communication unit; wherein thecommunication unit is configured to receive instances of empirical datafrom a plurality of digital devices that are associated with aparticular person, wherein at least some of the received instances ofempirical data are gathered by ambient observations of the particularperson by the plurality of digital devices; wherein each receivedinstance of empirical data comprises one or more portions of data; andto transmit digital messages to at least one of the digital devices ofthe plurality of digital devices that are associated with the particularperson; and a processing unit; and a storage unit; wherein the storageunit comprises at least an assemblage of data comprising a plurality ofkey items, wherein each key item of the plurality of key items is anitem having a data type corresponding to a data type of a portion ofdata of an instance of empirical data to be received by thecommunication unit, and wherein the plurality of key items comprisesimage data of the particular person and voice data of the particularperson; wherein each key item of the plurality of key items has at leastone associated family of items, wherein a particular associated familyof items of the at least one associated family of items is associated toits associated key item of the plurality of key items by relevance toone particular behavior such that every item in the particularassociated family of items, when paired with the key item, forms a pairthat is relevant to the one particular behavior; wherein the computersystem is configured by software to perform a process, the processcomprising: receiving two or more instances of empirical data associatedwith the particular person from one or more digital devices in thepresence of the particular person; identifying the portions of data ineach of the received instances of empirical data; for a particularinstance of empirical data (ED_(A)), determining whether there is amatch of an identified portion of data (P_(Aμ)) of ED_(A) to a key itemof the plurality of key items in the assemblage of data; for a matchedkey item, using the particular associated family of items of the matchedkey item to search for a match between a member of the particularassociated family of items of the matched key item and an identifiedportion of data (P_(Bν)) of an other instance of empirical data (ED_(B))of the received instances of empirical data; and correlating ED_(A) withED_(B) as being potentially relevant to each other vis-à-vis the oneparticular behavior of the particular associated family of items inresponse to at least one P_(Bν) of ED_(B) matching a member of theparticular associated family of items of the matched key item forED_(A); and analyzing the pair of correlated instances of empiricaldata, ED_(A) and ED_(B), to determine if it identifies an instance ofthe one particular behavior of the person as observed by the computersystem; wherein determining that the pair of correlated instances ofempirical data, ED_(A) and ED_(B), identifies an instance of the oneparticular behavior comprises determining if the instances of empiricaldata, ED_(A) and ED_(B), are pairwise relevant to each other vis-a-visthe one particular behavior; wherein pairwise relevance of ED_(A) toED_(B) is determined by comparing the portion, P_(Aμ), of ED_(A) to theportion, P_(Bν), of ED_(B), for a particular relationship;  wherein theparticular relationship is one member selected from a group consistingof consistency and inconsistency;  wherein the pair of correlatedinstances of empirical data, ED_(A) and ED_(B), is identified as aninstance of the one particular behavior in response to analysisdetermining that the respective pair of portions, P_(Aμ) and P_(B)ν,have the particular relationship; and archiving the pair of correlatedinstances of empirical data, ED_(A) and ED_(B), the one particularbehavior for which the pair of instances of empirical data werecorrelated, the instance of the one particular behavior, and the resultsof the analysis; wherein the process is a service run for a specificperson selected from a group consisting of the particular person whenthe particular person is an adult and a parent of the particular personwhen the particular person is a child; wherein the empirical datagathered, and analyses of the empirical data gathered are strictlyprivate; wherein the empirical data gathered, and the analyses of theempirical data gathered are the property of the specific person; andwherein only the specific person can authorize access to the gatheredempirical data, and can authorize access to the analyses of the gatheredempirical data.
 31. The computer system of claim 30, wherein the processthat the computer system is configured to perform further comprises:making data available to an authorized receiver; wherein content of thedata made available to the authorized receiver is determined in responseto at least one of: the correlated instances of empirical data; and theinstance of the one particular behavior; and wherein the authorizedreceiver is selected from a group consisting of: a therapist inpsychotherapy of the particular person; a therapist in couples therapyinvolving the particular person; a person involved in a self-improvementprogram of the particular person; a healthcare professional involved inthe particular person's healthcare regime; a person of the criminaljustice system; a career counselor; a person involved in employeerecruitment and/or screening; a school counselor of the particularperson; a school administrator in a school of the particular person; acounselor involved in counseling of parents and the particular person,wherein the particular person is a child of the parents; a parent of theparticular person; a counselor working to assist in picking a schooldistrict for the particular person, wherein the particular person is achild; a sports coach of the particular person, wherein the particularperson is an athlete; an individual involved in maintaining theparticular person's credit report; Homeland Security; a person involvedin picking draft choices for a professional sports team, wherein theparticular person is an athlete; a person ruling on a gun permitbackground check of the particular person; a person reviewing a resumeof the particular person; at least one of a person who verifies thebusiness portrait of the particular person and one who vets businessinformation that the particular person has entered into other services;and a person who is working to determine true talents of the particularperson.