System and method for virtual world biometric analytics through the use of a multimodal biometric analytic wallet

ABSTRACT

The invention provides a system and method for virtual world biometric analytics through the use of a multimodal biometric analytic wallet. The system includes a virtual biometric wallet comprising a pervasive repository for storing biometric data, the pervasive repository including at least one of a biometric layer, a genomic layer, a health layer, a privacy layer, and a processing layer. The virtual biometric wallet further comprises an analytic environment configured to combine the biometric data from at least one of the biometric layer, the genomic layer, the health layer, the privacy layer, and the processing layer. The virtual biometric wallet also comprises a biometric analytic interface configured to communicate the biometric data to one or more devices within a virtual universe.

FIELD OF THE INVENTION

The invention generally relates to a system and method for combiningbiometric data and, in particular, to a system and method for virtualworld biometric analytics through the use of a multimodal biometricanalytic wallet.

BACKGROUND

A virtual universe (VU) is an interactive simulated environment accessedby multiple users through an online interface. Users inhabit andinteract in the VU via avatars, which are a user's representation ofhimself or herself. These representations can be in the form of athree-dimensional model, a two-dimensional icon, a text construct, auser screen name, etc. Although there are many different types of VUs,there are several features many VUs generally have in common. Thesefeatures include, for example,

-   -   Shared Space: the VU allows many users to participate at once;    -   Graphical User Interface: the VU depicts space visually, ranging        in style from 2D “cartoon” imagery to more immersive 3D        environments;    -   Immediacy: interaction takes place in real time;    -   Interactivity: the VU allows users to alter, develop, build, or        submit customized content;    -   Persistence: the VU's existence continues regardless of whether        individual users are logged in; and    -   Socialization/Community: the VU allows and encourages the        formation of social groups such as teams, guilds, clubs,        cliques, housemates, neighborhoods, etc.

When interacting in VUs it is often difficult for a user to accuratelyrepresent himself or herself in the VU via an avatar. Moreover, it iseven more difficult for a user to continuously update his or her avatarto represent the user's ever changing physical and/or behavioralcharacteristics. This lack of similarity between the user and his or heravatar detracts from the user's virtual experience.

In addition to detracting from the user's virtual experience, theinability of the user to accurately represent himself or herself via anavatar makes it difficult for others to verify and/or authenticate theuser. Moreover, even when an avatar does accurately resemble his or herowner, the resemblance may not provide enough verification for businesstransactions, meetings, etc., that may occur within a VU.

SUMMARY

In a first aspect of the invention, a system includes a virtualbiometric wallet comprising a pervasive repository for storing biometricdata, the pervasive repository including at least one of a biometriclayer, a genomic layer, a health layer, a privacy layer, and aprocessing layer. The virtual biometric wallet further comprises ananalytic environment configured to combine the biometric data from atleast one of the biometric layer, the genomic layer, the health layer,the privacy layer, and the processing layer. The virtual biometricwallet also comprises a biometric analytic interface configured tocommunicate the biometric data to one or more devices within a virtualuniverse.

In another aspect of the invention, a computer implemented method forapplying biometrics in a virtual universe comprises ascertainingphysiological, behavioral, and cognitive biometric data from a user inthe real world; transferring the biometric data to a virtual biometricwallet; and applying the biometric data to an avatar of the user.

In another aspect of the invention, a computer program productcomprising a computer usable storage medium having readable program codeembodied in the storage medium is provided. The computer program productincludes at least one component operable to: ascertain biometric data;link multiple types of the biometric data together using one or moreanalytic algorithms; transfer the biometric data to a virtual construct;and apply the biometric data to a virtual representation of a user usingthe virtual construct.

In yet another aspect of the invention, a method for verifying virtualusers, comprises providing a computer infrastructure being operable to:ascertain characteristics and behavioral traits about a real world user;link one or more of the real world user characteristics and thebehavioral traits together; apply the characteristics and behavioraltraits to the virtual user; and authenticate the virtual user based onthe characteristics and the behavioral traits of the real world user.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

The present invention is described in the detailed description whichfollows, in reference to the noted plurality of drawings by way ofnon-limiting examples of exemplary embodiments of the present invention.

FIG. 1 shows an illustrative environment for implementing the steps inaccordance with the invention;

FIG. 2 shows a pervasive repository comprising five layers according toaspects of the invention;

FIG. 3 shows a biometric storage layer according to aspects of theinvention;

FIG. 4 shows a genomic layer according to aspects of the invention;

FIG. 5 shows a health layer according to aspects of the invention;

FIG. 6 shows a privacy layer according to aspects of the invention;

FIG. 7 shows a processing layer according to aspects of the invention;

FIG. 8 shows portions of an analytic environment according to aspects ofthe invention; and

FIG. 9 shows an exemplary biometric analytic interface knowledgerepresentation according to aspects of the invention.

DETAILED DESCRIPTION

The invention is directed to a system and method for combining biometricdata and, in particular, to a system and method for virtual worldbiometric analytics through the use of a multimodal virtual biometricanalytic wallet (“virtual biometric wallet). More specifically, theinvention utilizes biometric technologies to provide identification andverification in VUs as well as to provide users with a mechanism to moreaccurately represent himself or herself in the VU. Any number ofbiometric technologies may be utilized by the invention to uniquelyrecognize the user based upon one or more of his or her intrinsicphysical, cognitive, or behavioral traits. Exemplary biometrics mayinclude fingerprints, facial patterns, iris patterns, deoxyribonucleicacid (DNA), voice recognition, etc.

There are multiple systems that may be used to acquire biometric datafrom real world users for authentication purposes. For example, unimodalbiometric systems may be used to acquire a single biometriccharacteristic, such as a fingerprint, for authentication. However,unimodal systems are unable to combine other biometric analytic data foruser authentication.

Multimodal biometric systems may also be used to acquire biometric datafrom real world users for authentication purposes. Unlike unimodalsystems, multimodal biometric systems attempt to integrate traditionaland behavioral biometric characteristics for user authentication.Existing multimodal biometric systems include statically definedbiometric acquisition points, fusion policies, and computationalalgorithms for user authentication. However, existing multimodal systemsdo not combine multimodal information and do not include other types ofinformation such as the human genome, health data, and family history.

Manual health data systems may also be used to acquire biometric datafrom one or more devices. Exemplary devices may include magneticresonance imaging (MRI) and functional MRI (fMRI) as well as devicessuch as a stethoscope. However, manual health data systems fail toprovide an amorphous service oriented architecture to combine multimodalinformation. Moreover, there is no way to use the acquired health datafor verification or authentication in a VU.

The present invention allows biometric data to be acquired from a realworld user via any one or more of the above noted devices or from anynumber of additional devices known to those of skill in the art. Onceacquired, the biometric data can be sent to a virtual biometric walletcomprising a pervasive repository, an analytic environment, and one ormore biometric analytic interfaces.

The virtual biometric wallet is configured to allow disparate biometricinformation to be stored on a pervasive storage device or repositorythat can be used to authenticate users and avatars, in the VU. Thepervasive repository may store a plurality of different types ofbiometric information. For example, the pervasive repository may includea storage layer for a user's biometric data, genomic data, and healthdata. The biometric data may include physiological, behavioral, and/orcognitive biometric information. The genomic data may include DNAinformation about the user and the health layer may include, e.g.,family information and medical history.

In embodiments, the pervasive repository may also include a privacylayer which provides mechanisms to protect biometric data from beingacquired from remote sensing. The pervasive repository may also includea processing layer configured to provide continuous biometric analyticprocessing and data mining for health analysis, behavioral predictions,physiological monitoring, and environment cues. These layers make itpossible for the pervasive repository to support disparate biometricanalytic acquisition with the potential for multi-modal rollup.

The virtual biometric wallet is further configured to include ananalytic environment configured to act on data to combine health,genomic, physiological, behavioral, and cognitive distributed analysis.In embodiments, the analytic environment may comprise a continuousmachine-learning environment and an application environment. Thelearning environment may obtain exemplar data from multiple sources anduse the exemplar data to train one or more algorithms in order toascertain appropriate weights and heuristics for the algorithms. Theseweights and heuristics may be used in the application environment tolink user characteristics and behavioral traits. Embodiments may alsouse the analytic environment to produce health informatics.

In addition to a pervasive repository and analytic environment, thevirtual biometric wallet may also comprise a biometric analyticinterface, which enables the transportation and analysis of real timeon-body information within the VU. In particular, the biometric analyticinterface allows the information stored in the pervasive repository andcombined in the analytic environment to be sensed by one or moreacquisition devices within the VU. In embodiments, the acquisitiondevices may include remote sensors that act as service points for thevirtual biometric wallet.

Accordingly, the present invention beneficially allows disparatebiometric information to be stored on a pervasive storage device andused to identify and verify users and avatars in the VU. Moreover,embodiments also allow the biometric information obtained about a userto be mapped onto the user's avatar to make the avatar appear, act,sounds, etc., like the user. Beneficially, this allows the user toemulate their real world state and provides the user with a notion ofpresence while in the VU.

The invention also beneficially provides mechanisms for combininggenomic, health and biometric data as well as deriving a user'scognitive state. This allows real world and VU environments to becomeaware of a user's identity and reduces the risk of virtual fraud anddoppleganging, i.e., cloning.

System Environment

As will be appreciated by one skilled in the art, the present inventionmay be embodied as a system, method or computer program product.Accordingly, the present invention may take the form of an entirelyhardware embodiment, an entirely software embodiment (includingfirmware, resident software, micro-code, etc.) or an embodimentcombining software and hardware aspects that may all generally bereferred to herein as a “circuit,” “module” or “system.” Furthermore,the present invention may take the form of a computer program productembodied in any tangible medium of expression having computer-usableprogram code embodied in the medium.

Any combination of one or more computer usable or computer readablemedium(s) may be utilized. The computer-usable or computer-readablemedium may be, for example but not limited to, an electronic, magnetic,optical, electromagnetic, infrared, or semiconductor system, apparatus,device, or propagation medium. More specific examples (a non-exhaustivelist) of the computer-readable medium would include the following:

-   -   a portable computer diskette,    -   a hard disk,    -   a random access memory (RAM),    -   a read-only memory (ROM),    -   an erasable programmable read-only memory (EPROM or Flash        memory),    -   a portable compact disc read-only memory (CDROM),    -   an optical storage device, and/or        The computer-usable or computer-readable medium could even be        paper or another suitable medium upon which the program is        printed, as the program can be electronically captured, via, for        instance, optical scanning of the paper or other medium, then        compiled, interpreted, or otherwise processed in a suitable        manner, if necessary, and then stored in a computer memory.

In the context of this document, a computer-usable or computer-readablemedium may be any medium that can contain, store, communicate,propagate, or transport the program for use by or in connection with theinstruction execution system, apparatus, or device. The computer usableprogram code may be transmitted using any appropriate transmission mediavia a network.

Computer program code for carrying out operations of the presentinvention may be written in any combination of one or more programminglanguages, including an object oriented programming language such asJava, Smalltalk, C++ or the like and conventional procedural programminglanguages, such as the “C” programming language or similar programminglanguages. The program code may execute entirely on the user's computer,partly on the user's computer, as a stand-alone software package, partlyon the user's computer and partly on a remote computer or entirely onthe remote computer or server. In the latter scenario, the remotecomputer may be connected to the user's computer through any type ofnetwork. This may include, for example, a local area network (LAN) or awide area network (WAN), or the connection may be made to an externalcomputer (for example, through the Internet using an Internet ServiceProvider).

FIG. 1 shows an illustrative environment 10 for managing the processesin accordance with the invention. To this extent, the environment 10includes a computer infrastructure 12 that can perform the processesdescribed herein. In particular, the computer infrastructure 12 includesa computing device 14 that comprises a Virtual Biometric Wallet 35,which makes computing device 14 operable to acquire, process, andtransmit biometric data in accordance with the invention, e.g., processdescribed herein.

The computing device 14 also includes a processor 20, a memory 22A, anI/O interface 24, and a bus 26. The memory 22A can include local memoryemployed during actual execution of program code, bulk storage, andcache memories which provide temporary storage of at least some programcode in order to reduce the number of times code must be retrieved frombulk storage during execution.

The computing device 14 is in further communication with the externalI/O device/resource 28 and the storage system 22B. For example, the I/Odevice 28 can comprise any device that enables an individual to interactwith the computing device 14 or any device that enables the computingdevice 14 to communicate with one or more other computing devices usingany type of communications link. The external I/O device/resource 28 maybe keyboards, displays, pointing devices, microphones, headsets, etc.The storage system 22B can include an “inventory” of sounds,modifications, etc., which may be selected by the user's avatar.

In general, the processor 20 executes computer program code, which isstored in the memory 22A and/or storage system 22B. The computer codemay be representable of the functionality of the Virtual BiometricWallet 35. While executing computer program code, the processor 20 canread and/or write data to/from memory 22A, storage system 22B, and/orI/O interface 24. The program code executes the processes of theinvention. The bus 26 provides a communications link between each of thecomponents in the computing device 14.

The computing device 14 can comprise any general purpose computingarticle of manufacture capable of executing computer program codeinstalled thereon (e.g., a personal computer, server, handheld device,etc.). However, it is understood that the computing device 14 is onlyrepresentative of various possible equivalent computing devices that mayperform the processes described herein. To this extent, in embodiments,the functionality provided by the computing device 14 can be implementedby a computing article of manufacture that includes any combination ofgeneral and/or specific purpose hardware and/or computer program code.In each embodiment, the program code and hardware can be created usingstandard programming and engineering techniques, respectively.

Similarly, the server 12 is only illustrative of various types ofcomputer infrastructures for implementing the invention. For example, inembodiments, the server 12 comprises two or more computing devices(e.g., a server cluster) that communicate over any type ofcommunications link, such as a network, a shared memory, or the like, toperform the processes described herein. Further, while performing theprocesses described herein, one or more computing devices on the server12 can communicate with one or more other computing devices external tothe server 12 using any type of communications link. The communicationslink can comprise any combination of wired and/or wireless links; anycombination of one or more types of networks (e.g., the Internet, a widearea network, a local area network, a virtual private network, etc.);and/or utilize any combination of transmission techniques and protocols.

In embodiments, the invention provides a business method that performsthe steps of the invention on a subscription, advertising, and/or feebasis. That is, a service provider, such as a Solution Integrator, couldoffer to perform the processes described herein. In this case, theservice provider can create, maintain, deploy, support, etc., a computerinfrastructure that performs the process steps of the invention for oneor more customers. In return, the service provider can receive paymentfrom the customer(s) under a subscription and/or fee agreement and/orthe service provider can receive payment from the sale of advertisingcontent to one or more third parties.

Exemplary Implementation of the System

The present invention is described below with reference to flowchartillustrations and/or block diagrams of methods, apparatus (systems) andcomputer program products according to embodiments of the invention. Itwill be understood that each block of the flowchart illustrations and/orblock diagrams, and combinations of blocks in the flowchartillustrations and/or block diagrams, can be implemented by computerprogram instructions. These computer program instructions may beprovided to a processor of a general purpose computer, special purposecomputer, or other programmable data processing apparatus to produce amachine, such that the instructions, which execute via the processor ofthe computer or other programmable data processing apparatus, createmeans for implementing the functions/acts specified in the flowchartand/or block diagram block or blocks.

These computer program instructions may also be stored in acomputer-readable medium that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablemedium produce an article of manufacture including instruction meanswhich implement the function/act specified in the flowchart and/or blockdiagram block or blocks.

The computer program instructions may also be loaded onto a computer orother programmable data processing apparatus to cause a series ofoperational steps to be performed on the computer or other programmableapparatus to produce a computer implemented process such that theinstructions which execute on the computer or other programmableapparatus provide processes for implementing the functions/actsspecified in the flowchart and/or block diagram block or blocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof code, which comprises one or more executable instructions forimplementing the specified logical function(s). It should also be notedthat, in some alternative implementations, the functions noted in theblock may occur out of the order noted in the figures. For example, twoblocks shown in succession may, in fact, be executed substantiallyconcurrently, or the blocks may sometimes be executed in the reverseorder, depending upon the functionality involved. It will also be notedthat each block of the block diagrams and/or flowchart illustration, andcombinations of blocks in the block diagrams and/or flowchartillustration, can be implemented by special purpose hardware-basedsystems that perform the specified functions or acts, or combinations ofspecial purpose hardware and computer instructions.

Pervasive Repository

The virtual biometric wallet comprises a pervasive repository, which isconfigured to store physiological, behavioral, and cognitive traits andcharacteristics with health data and a subject's genome. In embodiments,one or more distributed sub-instances of the pervasive repository may becreated, thereby making the pervasive repository inherently distributed.The distributed sub-instances may be created based on determined privacypolicies, which may be loaded onto extensible items with biometricanalytic interfaces. For example, a biometric analytic interface mayinclude a privacy policy that designates what information anotherbiometric analytic interface or acquisition device may obtain. Thepervasive repository and/or one or more distributed sub-instances of thepervasive repository may be embodied as a storage unit 22B.

The traits, characteristics, and data in the pervasive repository may besynched to a central repository via a biometric analytic interface, asdescribed in more detail herein. For example, as a traveling distributeddatabase or inventory item moves in and out of range of the centralrepository, both may be synched. The range within which the synchingoccurs may be dynamically defined and may relate to a geographicalvirtual distance such as inches, feet, yards, meters, and/or miles, etc.Optionally, the range may relate to, e.g., the distance in which aperson may be heard while shouting, talking, and/or whispering withinthe VU.

FIG. 2 shows a pervasive repository comprising five layers in accordancewith embodiments of the invention. The five layers of the pervasiverepository 200 include a biometric storage layer 210, a genomic layer220, a health layer 230, a privacy layer 240, and a processing layer250. While five layers are disclosed herein, it should be understood bythose skilled in the art that the present invention is not limited tofive layers and may be expanded to include additional layers asappropriate.

FIG. 3 shows a biometric storage layer in accordance with embodiments ofthe invention. The biometric storage layer 210 may be used to storeinformation acquired from a person's body and may include trigger pointsfor health monitoring. In embodiments, the information can be dividedinto three classes or layers of biometric information includingphysiological 310, behavioral 320, and cognitive 330 information.

The physiological layer 310 may include biometrics relating to aperson's physical characteristics. These characteristics may include theperson's face, hand geometry, fingers, ear/pina, iris, retina and/orteeth, etc. In embodiments, additional physiological information mayalso be obtained and stored in the physiological layer 310 or in a userdefined field. An exemplary user defined field may be illustrated inaccordance with aspects of the Federal Bureau of Investigation'sElectronic Fingerprint Transmission Specification (EFTS).

The behavioral layer 320 may include biometrics relating to the person'sactions and/or conduct. For example, the behavioral layer 320 mayinclude characteristics relating to a person's voice such as vocal tractencoding and/or voice spectral information. The behavioral layer 320 mayalso include biometrics relating to skin luminescence, thermograms,venule/arteriole/vein/artery blood flow, signature, eye movement, and/orgait, etc.

The cognitive layer 330 may include biometrics relating to a person'sthinking, learning, perception, awareness, and/or judgment. For example,the cognitive layer 330 may provide a storage mechanism for thoughtpatterns, Purkinje fiber activations, functional magnetic resonanceimaging (fMRI) under labeled movements and thoughts, limb control brainmapping, and/or electrocardiogram (ECG) recordings with respect tothought and movement, etc.

FIG. 4 shows a genomic layer in accordance with embodiments of theinvention. The genomic layer 220 is configured to maintain a list of oneor more genetic disorders. In embodiments, these genetic disorders maybe synched with a distributed genetic disorder database.

In particular, the genomic layer 220 may store information about thevirtual biometric wallet owner's genome 410, genes, and/or chromosomes.A genome 410 is the complete genetic sequence of an organism, which isstored on a chromosome. A chromosome consists of a DNA helix on whichthousands of genes are encoded. Each gene corresponds to a unit ofinheritance, which may be associated with regulatory regions,transcribed regions, and/or other functional sequence regions.

The genomic layer 220 may process the owner's genomic sequence. Inembodiments, this processing may be performed using a processing queue420, which may keep a line of patterns 430. These patterns 430 may besearched and compared with known genetic disorders to determine whetherthe owner has a possible genetic risks and/or disorders. The geneticdisorders may be maintained by the genomic layer 220 and synched with adistributed genetic disorder database.

Thus, the genomic layer 220 stores an individual's genome 410 andprocesses it to determine genetic disorders. The patterns 430 from thegenetic disorders may be continually or periodically searched using oneor more search algorithms. If a probable match is found, the resultingnucleotide matches may be stored for data retrieval.

FIG. 5 shows a health layer in accordance with embodiments of theinvention. The health layer 230 is configured to provide knowledge thatmay be correlated with the person's health state and risk factors. Thehealth layer 230 may include the person's diagnosis history, familyrecords, hereditary diseases, current health status, bodily statistics,and/or regional epidemiology factors. In embodiments, one or more ofthese factors may be used to provide predictive health monitoring andsuggestions via a biometric analytic interface.

For example, the health layer 230 may maintain knowledge as to the lasttime the person was sick and recent symptoms the person has had. Thisinformation may be compared to the person's family records and/or theperson's hereditary diseases to determine possible ailments that may beinflicting the person. The possible ailments may be acquired by a healthcare professional via an acquisition device and used to diagnose theperson.

FIG. 6 shows a privacy layer in accordance with embodiments of theinvention. The privacy layer 240 is configured to protect personal dataand enable multi-layer security so that only authenticated individualsor automated systems 610 are granted access to the information stored inthe user's virtual biometric wallet 620. Thus, for example, a person'shereditary diseases may only be accessible to the user and the user'sphysician.

A variety of methods may be used to ensure data privacy. For example,the privacy layer 240 may employ any number of cancelable biometrictechnologies, which perform a distortion on one or more biometric imagesor features before authenticating the user. The distortion may beperformed using a non-invertible biometric template stored within thebiometric storage layer. In embodiments, any number of variableparameters may be utilized to provide the non-invertible function.

The privacy layer 240 may include additional types of data protection.For example, the privacy layer may include keystores, which providecertificates signed by certificate authorities for a public keyinfrastructure (PKI). Moreover, the privacy layer 240 may use securesocket layers (SSL) and encryption capabilities to protect the user'sbiometric data from public interception and/or packet snooping.Additional exemplary data protections may include, e.g., internetprotocol tables, user identifiers (UID), internet protocol filtering,and/or access control lists and encryption, etc.

FIG. 7 shows the processing layer in accordance with embodiments of theinvention. The processing layer 250 is configured to provide continuousbiometric analytic processing and data mining for health analysis,behavioral predictions, physiological monitoring, and environment cues.

In particular, the processing layer 250 performs computations andreasoning using one or more algorithms from a bank of algorithms 710.Exemplary algorithms in the bank of algorithms 710 may include, but arenot limited to, Markov models, principal component analysis (PCA),clustering, genetic algorithms, wavelet functions, and neural networks.Additional algorithms known to those of skill in the art may also beincluded for feature extraction, pattern recognition, classification,and data mining, etc.

For example, the bank of algorithms 710 may include the Markov model720, which uses probabilistic processes to reach future states insteadof relying on past states. The exemplary Markov model illustrated inFIG. 7 represents the pronunciation of the word “tomato”. In addition tothe Markov model, embodiments may also include the hidden Markov model(HMM), which determines hidden parameters based on observableparameters. The HMM may be used for temporal pattern recognition ofbiometrics such as speech, handwriting, gesture recognition, gait, etc.

A number of algorithms may be included in the bank of algorithms 710 todecrease the dimensionality of the data. For example, a PCA 720algorithm may be included to reduce multidimensional data into a lowerdimension. Additionally, a wavelet function 730 may also be included forobject recognition and image dimensionality reduction.

Clustering algorithms 740 may also be included in the bank of algorithms710 to, e.g., decrease search space and cluster images. For example,clustering may be used to gather a number of images of a person'shealthy bone and compare the images to gathered images of a broken bone.Based on the analysis, a determination may be made as to where the boneis broken and how badly the bone is broken.

The bank of algorithms 710 may also include any number of geneticalgorithms 750, which may be used for bioinformatics, gene expressionprofiling, protein folding, etc. Additionally, the bank of algorithms710 may include one or more neural networks 760, which comprisealgorithms for understanding how biological systems work. Inembodiments, the neural networks 760 may include artificialinterconnected neurons that are representable of human biological neuralnetworks.

In embodiments, the processing layer may also provide a stagingprocessing area to provide training on biometric data and health data.The staging processing area may provide, for example, heuristicselection and machine-learning. After algorithm training, the productionstage enables real time signal and data processing.

Analytic Environment

FIG. 8 shows aspects of an analytic environment according to embodimentsof the invention. The analytic environment 800, which may be part of thevirtual biometric wallet, is configured to train algorithms, which maybe used by the processing layer of the pervasive repository. As thedistributed analytic environment 800 spreads into VUs, counter partacquisition devices may increase the amount of data to process.

The analytic environment 800 acts on biometric data to combine health,genomic, physiological, behavioral, and cognitive distributed analysis.In doing so, the analytic environment utilizes biometric data 810, whichmay be obtained from one or more sensors or pervasive devices that arescattered throughout the VU. The acquired data may be passed to acentral repository 820 through one or more biometric analyticinterfaces. The central repository 820 is configured to store biometricdata obtained from a plurality of virtual biometric wallets and, inembodiments, pass the obtained biometric data to the analyticenvironment 800. The central repository 820 may be embodied as a storageunit 22B.

The biometric data 810 from the central repository 820 may be identifiedas exemplar data or non-exemplar data. Exemplar data, or training data,may be defined by the user and/or an administrator and may be sent to acontinuous machine-learning environment 830 to train one or morealgorithms. Once trained, the weights and/or heuristics from thecontinuous machine-learning environment 830 may be sent to theapplication environment 840. The application environment 840 may includethe same algorithms that were used in the continuous machine-learningenvironment 840 and apply the weights and/or heuristics from thecontinuous machine-learning environment 840 to the incoming non-exemplardata. This allows the algorithms to be trained and applied to incomingnon-exemplar data so that unimodal and/or multimodal biometric data maybe combined. Once combined, the application environment 840 may send oneor more of the trained algorithms to the processing layer of thepervasive repository via the biometric analytic interface. This allowsrespective algorithms from the application environment to be replicatedto support desired functions.

A number of classes of analytic algorithms may be used in the analyticenvironment 800. The exemplary classes may relate to reasoning,clustering algorithms, pattern recognition, data mining, search and/oroptimization, dimensionality reduction, etc. Each of these classes mayinclude one or more analytic algorithms, which may be applied in thecontinuous machine-learning environment and/or the applicationenvironment.

For example, embodiments may include a reasoning class of algorithmscomprising Bayes probability, belief networks, neural networks, HMMs,Markov models, etc. Embodiments may also include a clustering class ofalgorithms relating to patterns, graphs, models, and/or density.Exemplary pattern algorithms may include K-means, C-means, etc.Exemplary graph algorithms may include minimum spanning trees (MST),spatial graphs, etc. Model based clustering algorithms may also beincluded such as, e.g., mixture models. Additional clusteringalgorithms, such as density based algorithms may include, e.g., kernelbased models.

In embodiments, pattern recognition classes may include, e.g., neuralnetworks, discriminative feature space (DFFS), linear discriminativeanalysis (LDA), HMMs, Gabor filters, state vector machines, etc. Datamining classes may include algorithms that are vector based, Boolean,probabilistic, breadth/depth, bi-directional, iterative deepening, etc.In embodiments, search/optimization classed of algorithms may include A*search trees, mini-max algorithms, search algorithms, etc. Additionally,the dimensionality reduction class may include, e.g., PCA, independentcomponent analysis, etc. Any one or more of the analytic algorithms inthese exemplary classes may be stored in a continuous machine-learningenvironment and/or an application environment and used to, e.g., linkuser characteristics and behavioral traits.

Biometric Analytic Interface

One or more algorithms, policies, and/or heuristics may be loaded ontoextensible items with biometric analytic interfaces. Biometric analyticinterfaces are ubiquitous interfaces configured to provide servicepoints to acquisition devices, traveling repositories, and analyticenvironments. In essence, biometric analytic interfaces may be embodiedas amorphous service oriented architectures. In embodiments, one or morebiometric analytic interfaces may be included in the virtual biometricwallet.

Biometric analytic interfaces may be included in any number of VU itemsincluding clothing, accessories, digital and mechanical devices, as wellas any other extensible item. For example, biometric analytic interfacesmay be included in a number of virtual inventory items such as, e.g.,cards, phones, sweaters, shoes, eye glasses, etc. The biometric analyticinterfaces are configured to provide mechanisms for parallel acquisitionand processing as well as to provide a mechanism to synch to a centralrepository. In embodiments, the type of biometric analytic interface mayaffect the algorithms and/or communication rules provided to theprocessing layer of the pervasive repository.

FIG. 9 shows an exemplary biometric analytic interface knowledgerepresentation in accordance with embodiments of the invention. Inparticular, FIG. 9 includes a biometric analytic interface type, incolumn 900. The type of biometric analytic interface may include, e.g.,a person's watch, a virtual store kiosk, a physician, etc.

FIG. 9 also includes an activation column 910, which identifies therange the biometric analytic interface should be from an acquisitiondevice, such as another biometric analytic interface, a centralrepository, etc. In embodiments, the range may be in inches, feet,yards, meters, and/or miles, etc. Optionally, the range may relate to,e.g., the distance in which a person may be heard while shouting,talking, and/or whispering within the VU. While a range is indicated inactivation column 910, it should be understood by those skilled in theart that any number of mechanisms and/or events may be used to determinewhen and/or how frequently biometric information can be obtained fromthe virtual biometric wallet's biometric analytic interface.

An output column 920 and an input column 930 may also be included aspart of the biometric analytic interface. The output column 920 mayrepresent the knowledge sent from the biometric analytic interface tothe acquisition device. The input column 930 may represent informationthat may be sent to one or more algorithms, communication rules, etc. Inembodiments, the algorithms, communication rules, etc., may be based onthe type of biometric analytic interface.

For example, type 1 may be representative of a virtual kiosk having abiometric analytic interface. The biometric analytic interface mayacquire and process information obtained from an avatar within a 0.9meter activation range of the virtual kiosk. The biometric analyticinterface may also send information about the avatar as output. Theamount and/or type of information sent as output may depend on thebiometric analytic interface's privacy policy, as defined by the user.In embodiments, an input may be used to send information to one or morealgorithms, communication rules, etc., which may be included in theprocessing layer of the pervasive repository.

Virtual Biometric Wallet

Biometric data obtained in the real world may be stored in an avatar'svirtual biometric wallet. The virtual biometric wallet may be multimodaland provide a consolidation of multimodal biometric storage. Inembodiments, the virtual biometric wallet may further encompass virtualidentification systems, ID cards, visas, licenses, and/or voterregistration, etc., in addition to the real world biometric data. Thisinformation may be used to, e.g., provide virtual advertisements andentertainment that is tailored towards each avatar's virtual biometricwallet.

Identification and verification services may be provided by the virtualbiometric wallet. Additionally, in embodiments, virtual checks may beperformed on the user and/or virtual biometric wallet to identify orverify that the avatar is who he or she claims to be. Theseverifications may be performed continuously or periodically todetermine, e.g., whether the user has possession of his or her virtualbiometric wallet. In embodiments, the verifications may be performed bycomparing the user's incoming real world biometric data with thebiometric data stored in the user's virtual biometric wallet. Theverifications may also be performed, e.g., by requiring the user toperiodically insert a code, password, thumbprint, and/or other personalinformation to verify that the user is in possession of his or hervirtual biometric wallet and that the virtual biometric wallet has notbeen misappropriated. If the person possessing the virtual biometricwallet is not the user, the virtual biometric wallet may discontinuedata collection and/or take steps to prevent unauthorized access to thedata within the virtual biometric wallet. In embodiments, a similarcheck may be performed on one or more of the acquisition devices.

Information in the virtual biometric wallet may be obtained from thebiometric analytic interface using one or more VU acquisition devices,which may include one or more biometric analytic interfaces. Inembodiments the biometric analytic interface may include a privacypolicy that designates what information the acquisition device mayobtain. Thus, a user may limit automated and/or manual access tobiometric, genomic, and/or health data, etc.

In embodiments, a user may be allowed to designate information or typesof information that cannot be acquired unless permission is given to theacquisition device and/or the entity or thing associated with theacquisition device. Beneficially, this allows the user to control whohas access to the user's information. In embodiments, the user maychange permissions when the user comes into contact with an acquisitiondevice. Moreover, in embodiments, the virtual biometric wallet may trackwhat acquisition devices have requested information from the user, allowthe user to access the tracked information, and/or permit the user tochange permissions for one or more of the acquisition devices based onthe tracked information.

For example, real world biometric information may be continuouslyobtained about a user and continuously or periodically transferred tothe user's virtual biometric wallet. The user may carry this informationin the user's virtual biometric wallet and give permission to the user'svirtual physician to acquire specific types of information from theuser's virtual biometric wallet. Thus, the virtual physician may beallowed to acquire private medical biometric information from the usersuch as health data, genetic information, etc. This information may beobtained via an acquisition device and used for diagnosis purposes. Inembodiments, the physician may also be allowed to monitor one or morebiometric factors via the virtual biometric wallet.

In addition to storing health data and genetic information, the virtualbiometric wallet may also provide continuous data analysis on health,biometric, and genomic information. The information in the virtualbiometric wallet may be mapped onto a user's avatar to emulate a user'sattitude, physical condition, and/or mood. For example, derivedknowledge such as thought patterns can be acquired in the real worldfrom an electroencephalogram (EEG) and contrasted to a baseline image.The results of this comparison may provide insights into mood and theveracity of thoughts. Brain structure change may also be derivablethrough pattern recognition. These types of cognitive biometrics, whichare stored within a virtual biometric wallet, can be used to reflect theuser's current moods and/or conditions through the user's avatar.Moreover, the moods and/or conditions may also be used to help doctorswith the administration of anti-depressants, selective serotoninreuptake inhibitors (SSRI), and deep brain stimulation. As informationand knowledge is gained from the user's real world state, medicalinformatics may be continuously or periodically synched back to thepervasive repository for use within the VU.

Embodiments may map the user's real world cognitive, behavioral, and/orphysical traits onto the user's avatar. For example, physiological,behavioral, and/or cognitive biometric information may be obtained andtransferred to the user's virtual biometric wallet, wherein thebiometric information may be used to deduce that the user is angry inthe real world. In embodiments, this deduction may be used to make theuser's avatar appear angry in the VU, thereby augmenting the avatar'semotions based on the user's real world emotions.

A user's real world behavior traits may also be mapped onto the user'savatar to provide a more realistic virtual experience. For example, aperson's real world behavioral traits such as gait, voice, tics, andsignature may be stored in the user's virtual biometric wallet foravatar identification and verification. Real world cognitive traits suchas thoughts and intelligence may also be translated to the virtualbiometric wallet to make the user's avatar more representative of theuser and/or for avatar identification and verification purposes.

In addition to behavioral and cognitive traits, embodiments maytranslate real physiological traits such as fingerprint, face, palm,pina shape, hand knife, iris, retina, DNA and signature to the virtualbiometric wallet. This allows the user's avatar to have, e.g., the samefingerprints, face, and/or iris, etc., as the real world user andheightens the user's virtual experience. Additionally, this informationalso aids in identification and verification of the user via the user'savatar.

Examples of Use

The virtual biometric wallet may facilitate security in VUs. Forexample, a VU may control virtual access to conferences, secure businesstransaction processing, and/or areas having confidential information.Before being admitted to one or more of these secured locations, theuser's avatar may be asked to provide virtual biometrics, which arerepresentative of the user's real world biometrics. Thus, a virtual usermay be verified by his or her real world biometric information asportrayed by the user's avatar.

In addition to providing security in business transactions, conferences,processing, etc., the virtual biometric wallet may also provideauthority figures and scientists with tools to solve crimes. Forexample, forensic scientists and/or authority figures may utilizevirtual DNA, hair samples, and other virtual biometric traits toidentify criminals and fight virtual crime. This may be performed, e.g.,by comparing information from an avatar's virtual biometric wallet toreal world or VU information that is known about a criminal.

In embodiments, authorities, governments, etc., may use the virtualbiometric wallet for surveillance and/or pervasive computing. Forexample, authorities may compare information from the virtual biometricwallet to criminal and/or terrorist watch lists. Additionally, real timetracking and/or anchor alerts may use the virtual biometric wallet toobtain information about criminals.

In embodiments, the virtual biometric wallet may also be used byemployer's to screen employees. For example, the virtual biometricwallet may be used to readily portray cognitive, behavioral and/orphysiological biometrics via a user's avatar. Moreover, in embodiments,the user may also be able to gather biographical data on employees andprospective employees. This information may be used to determine whetherthe employee is wanted for a crime, has substance abuse problems, etc.Understandably, the employer's access to information in the virtualbiometric wallet may be limited by the user.

Embodiments of the invention may allow biometric information from theuser's virtual biometric wallet to be used to diagnosis the user in theVU via the user's avatar. For example, the user's avatar may visit avirtual clinic and speak with a virtual physician. The virtual physiciancan also examine the avatar based on the real world biometric traitsthat have been mapped onto the avatar via the virtual biometric wallet.This information, together with information the virtual physicianderives from the user's virtual biometric wallet, may be used todiagnose and treat the user.

In addition to diagnosing a user via the user's avatar, embodiments mayalso perform simulated treatments on the user's avatar. For example, auser having an ailment such as cancer may see a virtual physician fortreatment. The virtual physician may recommend one or more treatments,which may be administered to the user's avatar before being administeredto the real world user. This allows the user to go through apersonalized trial wherein the results of the treatment may be analyzedand/or adjusted before the treatment is administered to the user. Inembodiments, a plurality of treatments may be administered at once bycloning the avatar and applying one or more of the treatments to each ofthe cloned avatars to determine what treatment or combination oftreatments would be most effective for the user.

As described above the present invention provides numerous advantagesthat can be understood by those of skill in the art such as, e.g.,increasing the usefulness of raw data and analysis results.Additionally, the biometric analytic interfaces enable pervasive devicesto read, transmit and store algorithms, data and results. By fusinghealth, genomic, physiological, behavioral and cognitive data, accuratesystemic states can be represented by avatars in the VU. Thisbeneficially allows human to computer interaction to be blended byincreasing human presence within virtual worlds and by sensing andprocessing prosthesis within the real world.

While the invention has been described in terms of embodiments, thoseskilled in the art will recognize that the invention can be practicedwith modifications and in the spirit and scope of the appended claims.Additionally, the terminology used herein is for the purpose ofdescribing particular embodiments only and is not intended to belimiting of the invention. As used herein, the singular forms “a”, “an”and “the” are intended to include the plural forms as well, unless thecontext clearly indicates otherwise. It will be further understood thatthe terms “comprises” and/or “comprising,” when used in thisspecification, specify the presence of stated features, integers, steps,operations, elements, and/or components, but do not preclude thepresence or addition of one or more other features, integers, steps,operations, elements, components, and/or groups thereof.

The corresponding structures, materials, acts, and equivalents of allmeans or step plus function elements in the claims below are intended toinclude any structure, material, or act for performing the function incombination with other claimed elements as specifically claimed. Thedescription of the present invention has been presented for purposes ofillustration and description, but is not intended to be exhaustive orlimited to the invention in the form disclosed. Many modifications andvariations will be apparent to those of ordinary skill in the artwithout departing from the scope and spirit of the invention. Theembodiment was chosen and described in order to best explain theprinciples of the invention and the practical application, and to enableothers of ordinary skill in the art to understand the invention forvarious embodiments with various modifications as are suited to theparticular use contemplated. Accordingly, while the invention has beendescribed in terms of embodiments, those of skill in the art willrecognize that the invention can be practiced with modifications and inthe spirit and scope of the appended claims.

What is claimed is:
 1. A method for deploying an application forverifying virtual users, comprising: providing a computer infrastructurebeing operable to: ascertain characteristics and behavioral traits abouta real world user; link one or more of the real world usercharacteristics and the behavioral traits together; apply thecharacteristics and behavioral traits to the virtual user; andauthenticate the virtual user based on the characteristics and thebehavioral traits of the real world user.
 2. The method of claim 1,wherein the characteristics and the behavioral traits include at leastone of physiological biometric data, behavioral biometric data, andcognitive biometric data.
 3. The method of claim 1, wherein the computerinfrastructure is at least one of supported, deployed, maintained, andcreated by a service provider.
 4. The method of claim 1, wherein thebehavioral traits include at least one of gait, voice, tics, andsignature.
 5. The method of claim 1, wherein the characteristics includeat least one of physical characteristics and behavioral characteristics.6. The method of claim 5, wherein the physical characteristics includeat least one of a person's face, hand geometry, fingers, ear, iris,retina and teeth.
 7. The method of claim 5, wherein the behavioralcharacteristics include at least one of vocal tract encoding and voicespectral information.
 8. The method of claim 1, further comprising thecomputer infrastructure being operable to train one or more algorithmsin order to ascertain appropriate weights and heuristics for the one ormore algorithms.
 9. The method of claim 8, wherein the computerinfrastructure is operable to utilize the weights and heuristics for theone or more algorithms to link the one or more of the real world usercharacteristics and the behavioral traits together.
 10. The method ofclaim 1, wherein the virtual user is an avatar in a virtual universe.11. The method of claim 10, further comprising providing a virtualdiagnosis of the avatar in the virtual universe.
 12. The method of claim11, further comprising simulating treatment of the avatar in the virtualuniverse using the virtual diagnosis.