Systems and methods for using persistent, passive, electronic information capturing devices

ABSTRACT

Personal companions crowd-source and/or crowd-share characterizations, and optionally raw data, from real-world, virtual and/or mixed-reality experiences. Characterizations can advantageously be stored in one or more self-evolving, structured databases, and can be organized according to objects, actions, events and thoughts. Characterizations can be weighted differently for different users, and “forgotten” over time, especially in favor of maintaining higher level characterizations. Personal companions can be used to obtain additional information, and conduct interpersonal, commercial, or other interactions or transactions.

This application is a Continuation-In-Part of U.S. application Ser. No.13/952058 filed Jul. 26, 2013, and claims priority to U.S. provisionalpatent application No. 61/856470, filed Jul. 19, 2013, and U.S.provisional patent application No. 61/677377, filed Jul. 30, 2012, bothof which are incorporated herein by reference in their entirety.

FIELD OF THE INVENTION

The field of the invention is personal companions.

BACKGROUND

The following description includes information that may be useful inunderstanding the present invention. Unless the context indicatesotherwise, the text should not be interpreted as an admission that anyof the information provided herein is prior art to the claimedinventions, or that any publication specifically or implicitlyreferenced is prior art. Moreover, it should be appreciated thatportions of this background section describe aspects of the inventivesubject matter.

Humans are social creatures who tend to seek out community with others.There are, of course, numerous real-life communities that rely onface-to-face encounters, but often disparate interests, geographicseparation, age, gender and other differences can make real-lifecommunities difficult to access or maintain. Facebook™ and other socialmedia have been successful in filling in some of the void, but manyindividuals still find that currently available, electronically accessedcommunities are poor substitutes for real-life companions.

What is needed is an electronic personal companion (usually referred tohereinafter simply as a “personal companion”) that can act as a friend,providing information, warnings and other guidance, conversation,solace, and so forth, and can also act as an interface with other peopleor things. That goal has been depicted in science fiction, but has neverbeen realistically enabled.

Crowd-Sourcing and Crowd-Sharing

The current inventors have concluded that personal companions can mosteffectively be implemented where they utilize one or both ofcrowd-sourcing and crowd-sharing. See Table 1 and correspondingdescription below.

TABLE 1 Many Distantly Many Distantly Separated Receivers SeparatedReceivers Actively Obtain & Use Passively Obtain & Use InformationAnd/Or Information And/Or Other Items Other Items Many DistantlyCrowd-Sourcing Crowd-Sharing Separated Providers (e.g. Digg ™, ActivelyProvide Facebook ™, Information And/Or Pinterest ™, Twitter ™) OtherItems Many Distantly Crowd-Sourcing Crowd-Sharing Separated Providers(e.g. medical telemetry Passively Provide devices) Information And/OrOther Items

As used herein, “crowd-sourcing” refers to situations where many(defined herein to mean at least a hundred) distantly separatedindividuals collectively provide information, services, ideas, money,transaction opportunities and/or other items in a manner that enablesothers to make use of those items in some meaningful manner.

As used herein the term “distantly separated” refers to individuals thatare out of unaided earshot and eyesight. Depending on the number ofdistantly separated individuals participating as providers ofinformation or other items, a system, method, topic, circumstance, etccould be narrowly crowd-sourced (100-999 providers), moderatelycrowd-sourced (1000-999,999 providers), or massively crowd-sourced(≥1,000,000 providers).

The recitation of ranges of values herein is merely intended to serve asa shorthand method of referring individually to each separate valuefalling within the range. Unless otherwise indicated herein, eachindividual value within a range is incorporated into the specificationas if it were individually recited herein.

Also, unless the context indicates otherwise, the terms “individuals”“users”, “persons” should all be interpreted interchangeably to includelive human beings, thinking machines, and virtual and mixed-realitybeings.

Crowd-sourcing” can be active or passive on the part of the individualsproviding the information or other items. Examples of activecrowd-sourcing include Digg™, Facebook™ YouTube™, Pinterest™, Twitter™and many others, each of which allows millions of users to providecommentary, still and video images, or other types of information toother users. Wikipedia™ focuses on encyclopedic and other referencematerials along the same lines, and Kickstarter™ does something similarfor funding of projects. In all those cases, an active, conscious effortis required for an individual to provide the information, pledge money,or provide other items. Even if the effort is something as simple asclicking “like” or “dislike” icons, the provider must speak, type, ortake some other affirmative action with respect to the particular itembeing provided.

Examples of passive crowd-sourcing include telemetry devices that uploadbiometric data (blood pressure, heart rate, blood gases, and so forth)to health care providers. For example, a heart monitor mightperiodically send pulse and blood pressure data to a hospital, with nospecific effort being required at all by the wearer. Indeed, suchdevices would typically operate even if the wearer is asleep orunconscious. If the hospital collects such data from many individualswithout those individuals taking active steps with respect to theparticular data items (i.e., efforts besides just setting up the devicesto capture the information), the data can be interpreted herein as beingpassively crowd-sourced. Outside the medical field, automatic uploadingof image data from many Google Glass™ wearers could also be consideredpassive crowd-sourcing.

Other examples can be found in the field of on-line or directed surveys,where it is known for companies to use cell phones or otherperson-carried devices to solicit survey information from hundreds oreven thousands of people in a crowd-sourced manner.

What is not done in the prior art of crowd-sourcing, however, is formany person-carried devices to solicit information from theircorresponding users in an auditory, conversational manner, and then makethat information widely available to others in a manner that weighs thesolicited information for the receivers. What is also not done in priorart crowd-sourcing is for the devices that solicit information to beclosely associated with their users, such that the devices are notfungible between users. Devices could use different questions orstrategies to solicit information from the users, even given the verysame inputs, based upon the devices' prior experiences with their users.Systems, methods and devices that do those things are contemplatedherein.

Regardless of whether individuals are active or passive in providing theinformation or other items, the term “crowd-sourcing” is used hereinwhere the recipients must take specific steps to receive and useindividual items in a meaningfully way. For example, to effectivelyutilize a tag cloud found on the Digg™ website, a person must go to thatwebsite and click on one of the tags. Similarly, to effectively utilizeinformation in a Tweet™, a recipient must access and read the Tweet™.The same is true for doctors, nurses, researchers or others toeffectively utilize medical telemetry data. In each of those instancesthe recipient must take an active step to obtain and use individualitems of information.

In contrast to “crowd-sourcing”, the term “crowd-sharing” is used hereinto mean situations where many recipients receive and make use ofspecific information or other items provided by many providers in apassive manner.

Under that definition, Google Glass™ does not currently crowd-share.Google Glass™ can passively record raw data, and can upload it to acloud-based server farm. But to the knowledge of the current inventors,the information is not then provided to many others in a manner thatthey can receive and use the information without taking some affirmativeaction to do so.

Similarly, Google™ Yahoo™, Bing™, Siri™, Nina™ and other searchengine/question-answer systems do not currently crowd-share. Theycrowd-source information by crawling the Internet and other sources, andthey crowd-source additional information by observing how users respondto the search results. But the users are not passively provided with theunderlying crowd-sourced data; they must take some affirmative action(e.g., running a search) to use the information in any meaningful way.

As another example, many people listening to a concert or othergathering over the Internet would inevitably overhear a cacophony ofhundreds or thousands of voices. That situation falls outside the scopeof crowd-sharing (as the term is used herein) because any informationoverheard cannot be utilized by the attendees in any meaningful waywithout taking the active step of understanding what was said, or insome other way interpreting the noise. Even appreciating that the crowdwas large and the noise immense requires an active step ofinterpretation.

As yet another example, advertising often utilizes subliminal messaging.An advertiser might show an attractive person drinking a particularproduct, and thereby seek to instill in viewers the idea that drinkersof their product are attractive. Similarly, a television advertisermight flash a word, image or other message upon the screen so quicklythat viewers are not consciously aware of the message. As currentlypracticed those instances also fall outside the scope of crowd-sharingbecause the subliminal messaging is basically one-to-many (advertiser torecipients), not many-to-many.

What would be crowd-sharing is where many people carry personalcompanions that observe and interpret the world around them, usinginformation based at least in part upon interpretations shared by manyother personal companions. In such cases, the receivers are theindividuals carrying the personal companions, and it is theircorresponding personal companions that receive and make use of theshared information on their behalf. In preferred embodiments, personalcompanions can go further, utilizing the shared information to operatedevices, send communications, or do or refrain from doing other thingson behalf of their users. Systems, methods and devices that do all ofthat are contemplated herein, but to the knowledge of the currentinventors, are missing from the prior art.

As used herein, the term “crowd-facilitated” includes both crowd-sharingand crowd-sourcing.

A. Crowd-Sourcing of Image and Sound Data

To be effective for the vast majority of people, informationcrowd-sourced and/or crowd-shared by a personal companion must at thevery least utilize ambient image and/or sound data. Following is a briefsummary of how ambient image and sound data has been handled in theprior art.

Focusing first on images, prior art FIG. 1 depicts a high-levelconceptual overview of how images have historically been recorded, usedand stored. In each of the steps depicted, there is a left side thatshows physical processing and application of images, and a right sidethat shows electronic processing and application of images.

In Capture step 10, a camera is used to capture an image. The camera canbe pointed specifically at a target, or used in surveillance mode tocapture whatever happens to be in view, or both. For most of the last100 years cameras have used physical film 12A (left side of step 12),but of course more recently cameras have captured images electronically12B (right side of step 12).

In Processing step 20, images are processed into physical or electronicrecordings. For film, images are usually processed chemically 22A toproduce negative or positive photographs, slides, movies and so forth.For digital cameras, images are usually processed electronically 22Binto TIFF, JPEG, PDF, MP4 or other digital formats.

In Identification step 30, objects (people, animals, buildings, cars,symbols and so forth) captured in the images can either be identifiedphysically through visual examination by a person 32A, or electronicallyusing software programs operating on mainframes, personal computers,cloud services, etc 32B. Security personnel and others, for example,have long used computer-facilitated facial recognition to identifypeople in captured images, and the references used to make theidentifications were often derived from many sources. See, e.g., U.S.Pat. No. 5,982,912 to Fukui et al. (November 1999).

In Additional Information step 40, the identities of objects derived instep 30 are used to obtain information external to the image. Tocontinue with the security example, a person might peruse a physicalfolder or other physical resource 42A to look up more information abouta person recognized in an image, or a computer could electronicallydiscover 42B additional information about the person by accessing adatabase. See e.g., U.S. Pat. No. 5,771,307 to Lu (June 1998).

As used herein, the term “database” means any organized collection ofdata in digital form. A database includes both data and supporting datastructures. The term “database system” is used herein to mean acombination of (a) one or more database(s) and (b) one or more databasemanagement systems (DBMS) used to access the database(s).

In Transaction step 50, the additional information is used to make apurchase or conduct some other transaction. In a physical mode 52A, forexample, a security service might use an identification of a person tophysically withdraw cash from a person's bank account. In an electronicmode 52B, a computer might recognize a signature to authorize anelectronic transfer of the funds, see e.g., U.S. Pat. No. 5,897,625 toGustin (April 1999), or control access to a facility, see e.g., EP614559to Davies (January 1999). Here again, the reference data used inexecuting transactions was likely derived from many different sources,and therefore crowd-sourced.

In Storage step 60, the captured images, as well as information andtransaction histories, are stored physically or electronically. On thephysical side 62A, photographs or other physical recordings can bestored in albums, slide decks, movie canisters and so forth. On theelectronic side 62B, electronic images, receipts and so forth can bestored on electronic, optical or other memories.

Astute readers will appreciate that the two sides of each of the steps10, 20, 30, 40, 50, and 60 are readily interconvertible. For example,the box and lens of a film camera can be converted for use as a digitalcamera for capturing an image. Similarly, in step 20 a physicalphotograph 22A can be readily converted into a TIFF or electronic image22B, and visa-versa. A physical identification 32A can be used to makeelectronic identifications 32B, as well as the other way around. In step40, a printed encyclopedia or other physical resources for obtainingadditional information 42A can be readily stored in electronic form 42B,and an electronic resource such as Wikipedia™ 42B can easily be printedas a hard copy 42A. In step 50, an in-person commercial transaction canbe conducted entirely with exchange of physical dollars, or can just aseasily be transformed into an electronic transaction using a creditcard. The same is true in step 60, where a physical photo album 62A isreadily interconvertible with an electronic photo album 62B.

One result of interconvertibility of the physical left-side steps withthe electronic right-side steps is that the choices at each step areindependent of the choices at all the other steps. For example, one cancapture an image with a film camera (physical), process the image to aphotograph (physical), scan the photograph to a digital image(electronic), and use a server to ID an object in the image(electronic). Then, regardless of how the image was captured or objectsin an image were identified, one can discover additional informationphysically or electronically, conduct transactions physically orelectronically, and store images, transactions and so forth physicallyor electronically. Accordingly, many aspects of processing image datacould be considered crowd-sourced.

An analogous situation exists for sound. For example, sound recordingswere originally made without any electronics, using a pen and a rotatingdrum. And since the advent of electronics, people have used microphonesto process sounds into digital sound recordings. But physical soundrecordings can be used to make electronic recordings, and visa-versa.Similarly, sounds recorded physical or electronically can be used inperson to conduct a physical transaction (e.g., in person in a physicalstore), or an electronic transaction (e.g., over a telephone).Accordingly, many aspects of processing sound data could be consideredcrowd-sourced.

Crowd-Sourcing of Parameters for Characterizing Image and Sound Data

What hasn't been done in processing of image and sound data iscrowd-sourcing the parameters used to characterize ambient data. Forexample, whether it is Interpol using electronic facial recognition toidentify potential criminals, Google™ Goggles™ automatically identifyingobjects within images captured by a cell phone, or Aurasma™, GoogleGlass™ or ID™ connecting a magazine reader with a local retail store,the parameters used to resolve the identifications have always beendetermined by whomever/whatever controls the databases in a top-down,rather than bottoms-up, crowd-sourced manner.

Even one of my own earlier inventions, which claims speaking into a cellphone to retrieve a web page or other address, and then using the phoneto contact that address, assumed that the characterization parameterswere all determined in a top down manner. US2012/0310623 (Fish, PublSeptember 2012).

But top-down implementations for handling images, sounds, and othertypes of information are inherently more restrictive, and less dynamicthan bottom-up systems, and are decidedly suboptimal for use as personalcompanions. What are needed for viable personal companions are systemsthat not only crowd-source ambient data, but that crowd-source theparameters used in interpreting the data.

Crowd-Sourcing Parameters for Goods and Services

There has already been considerable work in crowd-sourcing parametersfor use in buying and selling goods and services. Several of my earlierinventions, for example, involved databases that use parameter-valuepairs to describe goods and services for sale or purchase. See U.S. Pat.No. 6,035,294 (Fish, Mar. 2000), U.S. Pat. No. 6,195,652 (Fish, February2001) and U.S. Pat. No. 6,243,699 (Fish, June 2001). Databases accordingto those 2000-era patents, which have been referred to over the years asBigFatFish™ or BFF™ patents, are self-evolving in that they allowordinary users (i.e., non-programmers) to describe products and servicesusing whatever parameters (i.e., features or characteristics) they like.Thus, instead of a programmer or business deciding what parameters canused to describe the goods and services (top-down model), ordinary userscollectively determine what parameters are available (bottom-up model).

References to “I”, “me” or “my” in this application refer to the firstnamed inventor herein, Robert Fish. The '294, '652 and '699 patents, aswell as all other extrinsic materials discussed herein, are incorporatedby reference in their entirety. Where a definition or use of a term inan incorporated reference is inconsistent or contrary to the definitionof that term provided herein, the definition of that term providedherein applies and the definition of that term in the reference does notapply.

One key benefit of bottom-up systems is that they are inherentlyself-evolving. For example, instead of being limited to describing anautomobile by the usual parameters of make, model, year, mileage,condition, and price, ordinary users can add additional parameters suchas color, leather interior, tow package, and so forth. Those newparameters, along with older parameters, are then displayed as choicesto subsequent users. As another example, Monster.com and otheremployment web sites currently limit parameterized data to the fields ofjob title, educational requirement, years of experience, and so forth.Users cannot add new parameters that might be relevant for them, such aspreference for large or small firms, preference for night or day shifts,need for flex time, and so forth. Self-evolving databases, however, cando that, and in that manner can evolve to accommodate the needs ofwhoever is using the system.

To avoid anarchy in user's descriptions of goods and services, the2000-era patents contemplated that parameter choices would be displayedto subsequent users along with some sort of indication as to theirrelative prior frequencies of use. Since users will naturally leantowards using the more popular parameters, the popular parameters willtend to become even more popular, and the less popular parameters willtend to become obsolete, eventually being eliminated from the system. Inthat manner self-evolving databases according to those 2000-era patentsshould be able to automatically balance the benefits and drawbacks ofcreativity with those of conformity.

The 2000-era patents also applied the same self-evolving concepts to thevalues of parameter-value pairs. For the parameter of “color”, forexample, most users would likely describe red cars using the value of“red”. Others, however, might prefer to describe a red car using thevalue of “rose”, and my self-evolving systems would accommodate thatinconsistency by allowing users to use either term. Subsequent userswould then be shown both terms as choices, relying on font size, listranking or some other method to designate the value “red” as having beenused more frequently than value “rose”. In that manner the model onceagain balances creativity with conformity, allowing users to employwhatever values they think are best, but encouraging them to use valuesthat others collectively think are best.

The 2000-era patents contemplated that addition of new parameter andvalue terms to the system would be automatic—i.e., without interference,checking or other vetting by a human or automated arbiter. If someonewanted to add the parameter “banana” to describe an automobile or achair, he would be allowed to do that (the pronouns “he” and “his”should be interpreted herein to include both male and female). The ideawas that vetting of new parameters (via human or machine) wasunnecessary because nonsensical parameters would typically begin at theconceptual bottom of any listing, and would be eliminated from thesystem relatively quickly through non-use. Vetting may turn out to beunnecessary in practice, but just in case I disclosed the concept ofvetting terms in self-evolving databases a few years later in one of mysubsequent applications, US2007/0088625 (Fish, Publ April 2007).

Several months after the priority date of the '625 application, Google™began publicly experimenting with GoogleBase™, a vetted self-evolvingdatabase for the sale of goods and services. Although GoogleBase becamequite successful, with millions of records being added in only a fewweeks, Google™ quickly pulled the plug. Although it was never admittedto be the case, the problem was apparently that widespread adoption ofthat technology would likely have significantly reduced Google'sAdSense™ revenue. After all, a self-evolving marketplace would veryefficiently allow users to find exactly what they were looking for,rather than forcing them to scour the Internet in a manner that triggershefty advertising revenue. In addition, GoogleBase was less effectivethan it could have been, because it only contemplated half theconcept—crowd-sourcing of the parameters. Google™ apparently neverappreciated the benefit of crowd-sourcing values.

Others, however, have appreciated the benefits of crowd-sourcingdescriptive values. Digg™, for example, allows users to associatedescriptive keywords with web-pages of interest. In a Digg-type system,a user might characterize a web-page as being “awesome” or “insightful”,and if other users characterize the same web-page using the same values,those terms would be listed in a large font in a tag cloud, ordesignated in some other manner as being popular. In my terminology,such descriptors are merely values of the parameter “rating.” It isfascinating that Google™ never appreciated the benefits ofcrowd-sourcing values, and Digg-type systems never appreciated thebenefits of crowd-sourcing parameters.

Even the user-contributed encyclopedias such as Wikipedia basically dothe same thing as Digg; they characterize web pages by crowed-sourcedkeywords (i.e. values) rather than a combination of both crowd-sourcedparameters and crowd-sourced keywords. Modern search engines are alsosimilar, in that they index substantially all words in web pages andother documents, and thus effectively utilize almost all words askeywords. But there again the systems fail to crowd-source parameters.

The strategy of crowd-sourcing values, but not parameters, typicallyresults in over-inclusive results sets. For example, someone searchingfor the keywords “red’ and “car” might well find a web page or articleon a red-faced driver of a white car. Wikipedia-type systems address theproblem with disambiguation interfaces, and Google™ and other searchengines address that problem with sophisticated ranking algorithms. Butboth of those solutions are themselves top-down approaches that arerelatively static and inflexible. Such strategies are inherentlyresistant to evolution, and are therefore not conducive to developingeffective personal companions.

Even Watson™, the very sophisticated set of computer programs developedat IBM™ to process and store vast amounts of information, characterizesinformation according to pre-established “buckets”. For example, Watsonhas a “names” database into which names of people can be extracted fromnewspapers, journals, phone books and other sources, and a “places”database that stores information about physical locations (New Jersey,Princeton, Egypt, etc). The “names” and other specific database bucketsare in effect parameters, which are hard-coded into the system by thedevelopers rather than relying on crowd-sourcing.

To be fair, it was not clear for many years that a bottom-up,self-evolving approach to storage and retrieval of data was evenpractical. The many different types of products, and the potentiallymillions of different types of information, could easily utilize manythousands of different parameters. Without some new invention, one wouldconsequently need either thousands of different tables to accommodatethe different goods and services and types of information, or anextremely large table having thousands of columns. Back in the 1999-2000timeframe, I hired some of the brightest minds in database design tosolve the problem of inefficient storage and retrieval attendingself-evolving databases. Despite hundreds of thousands of dollars ofeffort, however, they were completely unsuccessful in finding a viablesolution.

I finally did develop a viable solution, and filed an application onthat solution in 2006, see US2007088723 (Fish, Publ April 2007). Theanswer was to store records in a relatively narrow table (perhaps only50 columns) in which the different columns had different meanings fordifferent types of products, services, etc. A second table is then usedto provide keys to the meaning of the different columns for eachdifferent type of products and services. Thus, for descriptions ofautomobiles a cell at column 6 might store price, but for descriptionsof physicians a cell at column 6 might store the number of years inpractice, or the name of a practice specialty. According to acalculation in the '723 application, such a database would be extremelyefficient, having the ability to store descriptions of 500 millionunique items using only about 12.5 gigabytes of storage. Of particularsignificance in the current application is that retrieval from such adatabase would also be extremely fast, and highly amenable toassociative searching.

Crowd-Sourcing of Documents and Stored Information in General

As noted above, my 2000-era patents were directed to buying and sellinggoods and services. They failed to apply the concept of crowd-sourcingcharacterizations to information in general, using crowd-sourcedparameters. Two of my later applications, however, addressed thatdeficiency. U.S. Pat. No. 7,594,172 (Fish, September 2009) disclosedaspects of using self-evolving databases for web pages and otherdocuments, and U.S. Pat. No. 7,693,898 (Fish, April 2010) disclosedaspects of using self-evolving databases for storing information ingeneral.

Crowd-Sourcing of Symbols

In my 2000-era patents I also never disclosed the idea of crowd-sourcingcharacterizations of symbols, let alone the parameters used in makingsuch characterizations. As used herein, the term “symbols” should beinterpreted broadly to include bar codes, QR (Quick Response) codes,facial and other images, photographs, videos, sounds, smells, figurinesand other 3D or 2D objects, rhythms, sequences, and indeed anything usedas a key to identify something else.

In the prior art, electronic resolution of symbols has apparently alwaysbeen done according to top-down chararacterizations. For example, simplebar codes merely correlate objects with their UPC (Uniform ProductIdentifier) classification numbers. QR codes can be resolved to morecomplex information, such as a web site, but they are still resolved ina top-down manner because correlation of the code with the link or otherinformation is pre-established by whomever or whatever is in control ofthe links. Even facial recognition systems link facial features toindividuals using top-down databases. It is unknown to the currentinventors whether there are existing infrastructures that link a givensymbol to multiple, user-selectable targets. But even if such things didexist in the prior art, they would likely still have been top-downbecause whoever or whatever set up the correlations would want todetermine what links are associated with the various target choices.

Of course the top-down resolution of symbols makes very good sense fromthe perspective of ordinary economic activity. For example, any companypaying to link its products and services with a symbol, either inadvertising or elsewhere, naturally wants to link its own products andservices, website, phone number and so forth codes with that symbol, notthose of its competitors. And if consumers were allowed to crowd-sourcelinks for products and services however they saw fit, a given bar codeor other symbol might well become linked to images, characterizationsand other information that are wholly unfavorable to the company owningthe symbol. Those of ordinary skill would expect that any service thatallowed the public to do that would quickly lose advertising revenuefrom of the owners of those symbols.

It is contemplated herein, however, that symbols can properly meandifferent things to different people, and that personal companionsshould be able to associate symbols according to the needs, wants andperspectives of both their respective users, and of others. Thus, it iscontemplated herein that personal companions should crowd-source boththe meanings of symbols and their associated links and otherinformation, and that such characterizations could optionally be doneusing crowd-sourced parameters.

Persistence in Crowd-Sourcing/Crowd-Sharing Characterizations of AmbientData

Crowd-sourcing of ambient data is contemplated herein to be accomplishedmost effectively in a persistent manner. Persistent crowd-sourcing ofambient data does not appear to have been done where the parameters arealso crowd-sourced, and does not appear to have been done at all wherethe ambient data is crowd-shared.

As used herein, “ambient data” refers to data derived from theenvironment within or about a person. The “environment” is categorizedherein as a tautology of objects, actions, events, and thoughts. In thiscontext a person, or perhaps his avatar in a game world, might obtainsambient data from which an apple could be characterized as beingsubstantially round, about first sized, has a smooth red or greensurface, and optionally has a stem sticking out the top. He or hisavatar might also obtain ambient data derived from a person running(action), or a car accident (an event), or a generalization or otheridea, a property right, or perhaps an emotion (a thought).

Also as used herein, the term “persistent” refers to something thatoccurs or is sampled at a rate of at least once every 30 seconds over afive minute period, or at least a cumulative 50% of the time over a fiveminute period. In contrast, the term “continuous” as used herein meansthat something occurs or is sampled at a rate of at least every 5seconds during a five minute period, or at least a cumulative 90% of thetime over a five minute period.

It is known in limited circumstances of the prior art to use a cellphone or other camera-containing device to record an image in a user'senvironment, send that information to a service for identification, andthen act upon the identification. It is known, for example, for a userto point his cell phone at the front of a restaurant, and have a servicereturn a menu from that restaurant. Similarly, it is known for a user topoint his cell phone at an advertisement in a newspaper, and have aservice return price and availability information of a diamond ringfeatured in the advertisement. But those uses are all one-off searches;they do not embody persistent collection of information.

Many medical telemetry systems do collect ambient biometric data on apersistent or even a continuous basis. But those systems do not involvecrowd-sourcing of parameters or crowd-sharing of data orcharacterizations of the data. They merely collect separate data fromdifferent patients, and make that data available to a very limitednumber of doctors, nurses, and interested others, and only upon thoseindividuals taking active steps to acquire and/or use the data.

Similarly, Google Glass™, GoPro™, Countour™ or other Point of View (POV)camera can collect image and sound data on a persistent or continuousbasis, but the data is not interpreted using crowd-sourced parameters,and is not distributed by crowd-sharing.

Allowing users to crowd-source parameters can be especially importantwith respect to ambient data because the context can be very important.One of my earlier applications did disclose strategies to automaticallyprovide guidance as to contexts in which terms are used. InUS2007/0219983 (Fish, Publ September 2007), I described an improvementin which a search engine would pull up a set of records that include asearch term, and then look at what terms are used in windows of perhaps25 words on either side of the search term. Those terms would then bepresented with an indication of relative frequency so that the searcherwould know what additional terms are typically located nearby thesearched-for term. A reverse dictionary such as that available atwww.onelook.com provides another means of crowd-sourcing contextcorrelations.

Interestingly, however, all of my earlier crowd-sourcing patentapplications, as well as my earlier idea of summarizing windowssurrounding search terms, and the currently available reversedictionaries, only provide correlations as one-off searches. They do notaddress how context information could be used in storing persistentlyrecorded ambient data.

One huge hurdle is that the wide range of viewing perspectives andcontexts accompanying persistently recorded ambient data can make evenmere identification of objects, actions, events and thoughts extremelydifficult. Those having the resources to put together sophisticatedidentification infrastructures to resolve those difficulties wouldalmost certainly do so to make money from advertising, or otherassociations with vendors. Accordingly, they would not want users tocharacterize ambient data in a crowd-sourced manner because that wouldundercut the ability of the infrastructure provider to extract moniesfrom the vendors.

Even an ordinary consumer would likely not appreciate the value ofcrowd-sourced identifications of such things. He would want his cellphone, camera or other device to identify an apple as an apple, not apear. Similarly, he would want his cell phone or other device toidentify a car accident as “a car accident”, not a “meeting of thedrivers”.

Still another difficulty is that persistently recorded ambient dataoften involves a combination of different modalities (image, speech,music, animal and other sounds, smells and even vibrations). Those othermodalities may well provide needed context, yet involve information thatis not readily understood or properly appreciated, such as persontalking in another language, a facial expression or tone of voice, orperhaps background sounds of birds. Thus, there is a need to integrate atranslation system into the crowd-sourcing of persistently recordedambient data. This could be done by adapting teachings in another one ofmy other patents, U.S. Pat. No. 8,165,867 (Fish, April 2012). In thatsystem, electronics is employed to obtain information in one modality,send signals derived from that information to a distant server foranalysis, and then receive back information in the same or a differentmodality.

Canopy

One can think of a mature forest as including trees growing so closetogether that the branches and leaves of one tree interact with thebranches and leaves of its neighbors. In some cases the branches caneven form a canopy, which then develops a life of its own.

If one analogizes a tree to a person, the roots could be viewed ascorresponding to the person's history of experiences, and the branchesand the leaves as corresponding to characterizations of thoseexperiences. A tribe or other group, or even a civilization could thenbe viewed as an interpersonal canopy that combines memories, lifeexperiences, observations, and so forth in a manner that has a life ofits own. What is needed is an electronic type of canopy, one that wouldcombine automatically abstracted memories and so forth in a manner thatsurvives even when some of the source individuals die, or are otherwiseremoved from the collective.

Of course, in the realm of personal companions, the different peopleproviding the information need not be close geographically or even intime, as would trees in a canopy, but could be widely distributed overspace and time. Moreover, neither the tree nor the canopy conceptsdiscussed herein should be interpreted as requiring that raw data needsto be saved. Indeed, just the opposite is more socially acceptable, asis apparent from the bad press accorded Google Glass™ with respect toprivacy issues surrounding recordation of raw data.

Personal companions preferably store characterizations of the ambientdata, such as topics discussed, or observations as to whether the otherpeople seemed happy. Yes, they might also store some raw data, eitherfor later local processing or for transmission to a distal processor.But all of the raw data need not, and preferably should not bemaintained. It might instead be useful to store only a relatively smallnumber of frames (or segment) from a video for the short term, and theneven fewer frames (or a shorter segment), or perhaps line drawingsderived from the video, for the long term. Here it is important toappreciate that there can be a need to store both characterizations thatare in the same modality as the raw data (e.g., frames from a video),and those in different modalities as the raw data (e.g., the word“happy” from a video image). Moreover, preferred personal companionshould be capable of automatically individualizing thesecharacterizations in different ways for different users, or even indifferent ways for the same user depending upon circumstances.

Thus, in a manner akin to human short term, medium term, and long termmemories, there is a need for personal companions to abstract raw data,and then delete some or all of the raw data. For example, a person neednot remember all the details of buying groceries at the supermarket.That would only clog up his mind. Instead, he would tend to rememberwhat was purchased only for a medium term. In the long term he mightonly remember having visited that particular grocery store on variousoccasions, and eventually he might forget about the grocery storealtogether. Personal companions should be able to do somethinganalogous, locally and/or in the canopy.

Not only is it useful to delete raw data over time, in favor ofcharacterizations, but there is also a need for personal companions tohide particular information from others, and possibly at times even fromthe person who generated, recorded, or abstracted it. For example, aperson might well want to forget details, or even the existence, of agiven event because the event was embarrassing or painful. Personalcompanions should be able to do something analogous, locally and/or inthe canopy.

The opposite is also true, that there is a need for systems, methods,and apparatus that specifically make some information available to oneor more others. For example, it is known for a baby monitor to provide aparent with a live video or audio feed from a nursery. But it would alsobe useful if the parent could automatically receive characterizationsfrom a system carried by the baby, or perhaps the baby's caretaker, withupdates such as “Joey just ate” or “ Joey went to sleep”.

It is interesting that the LiveScribe™ pen is useful primarily becauseit correlates characterizations with raw data. In that system a specialpen has a camera that records movements of the tip on a speciallyprinted piece of paper, and a microphone that records conversations andother sounds. When a user takes notes of a conversation or lecture, thesystem correlates the notes with whatever words were being spoken, andwhatever sounds were received by the device when the notes were taken.The notes are characterizations, but they are not stored asparameter-value pairs. Some contemplated embodiments of personalcompanions should be able to do what LiveScribe™ does, but should alsobe able to abstract automatically, using crowd-sourced parameters, andthen crowd-share the data and characterizations as appropriate.

Handling Variant, Inconsistent, and Incorrect Characterizations

Most computer programming is designed for consistency in results. Forexample, in known object recognition software, different instances ofthe same software can be expected to provide the same characterization.If an instance of Midomi™, Musipedia™, Tunedia™ or Shazam™ accessed byone cell phone identifies a song on the radio from a 10 second soundsegment, another instance of the same service operating on anotherperson's cell phone at the same time would be expected to make the verysame identification. Similarly, if one instance of an airport securityX-ray system identifies an object as a knife, every other instance ofthat same system can be expected to yield the same result when presentedwith exactly the same image. In other words, the prior art teachesunambiguous links of images to targets; one to one or many to onecorrelations.

That isn't necessarily helpful. In the airport example, a terrorist needonly learn how to get past one instance of a currently deployedscreening system to be relatively assured of circumventing all similarscreening systems. If different instances of the same system producedvariant results under identical circumstances, a person trying to sneakcontraband onto a plane could never be sure of passing a particularcheckpoint.

Humans do not necessarily want their characterizations to be consistentwith everyone else's. And since humans may have very different desiresand perspectives, there is a need to build potential variances intopersonal companions with respect to the way different objects, actions,events and thoughts are treated. For example, in a grocery store, itmight be useful if different employees could train their personalcompanions to have different levels of specificity in describing fruit.One person might want his personal companion to characterize a givenapple as an apple, whereas another person would want his personalcompanion to characterize the banana as a Macintosh apple, or as beingoverly ripe. Similarly, a person living in a snowy climate might want totrain his/her personal companion to be more specific in describingdifferent type of snow than someone in a warm climate.

In addition to supporting variant or inconsistent information, which isthought herein to be desirable in at least some circumstances, there isalso a need to deal with intentionally wrong information in acrowd-sourced environment. For example, it is known for companies togame a bulletin ranking service by uploading positive comments abouttheir own products, and negative comments about their competitors'products. Facebook™, Wikipedia™ and others have tried to address thatproblem by focusing on comments from “friends”, or weighing commentsaccording to the number or accuracy of posts a person has historicallyprovided to the system. But all of those systems can still be spoofed byindividuals using multiple user names.

What are needed are systems, methods, and apparatus in whichcrowd-sourced ambient data is registered or otherwise linked to physicaldevices that provide the data. For example, if a physical device isregularly worn by a person during significant portions of that person'sdaily routine, it should be possible to extract from a mirror or otherreflected image who the person is. Similarly, the combination should beable to distinguish bona-fide commentators from corporate shills by thefrequency and content of their characterizations.

Conversations, Guidance, Warnings

There have been numerous efforts over the years to have computersidentify objects, or characteristics of objects (ripeness of fruit,etc), by their visual appearances. As discussed above, prior efforts arealmost entirely top-down. In July 2012 Google™ announced their catidentifier, which apparently used a neural net of 16,000 processors andten million images to effectively crowd-source what a cat looks like.Although an impressive feat at the time, a practical personal companionneeds to quickly and inexpensively obtain characterizations frominteractions with humans, either directly from its user, or throughinteractions with other personal companions. Viable ways of doing thatare described herein.

In particular, personal companions should be able to obtaincharacterizations of the world from conversations with humans,preferably by asking questions using audible speech. For example, whenthe camera of a user's personal companion sees another person, the usermight say “Hi Jacob”. From that exchange the companion couldautomatically associate features derived from an image of that personwith the name “Jacob”. Alternatively or additionally, the companionmight ask “Who is that person?”, or if the companion knows the person'sfirst name but not the last name, it might ask “What is Jacob's lastname?” As another example, it would be desirable if the camera of such adevice were worn so that a user could put a banana in its view and say“This is a banana” or “This banana is over-ripe. You can tell by thebrown color of the peel”. The companion would then associate brown coloron a banana with over-ripeness.

Another need is for personal companions to interact with a user as woulda friend, abstracting information from activities of the user, or othersources, and possibly admonishing that user when something seems awry,or to make a suggestion. By way of contrast, current GPS systems areknown that request information such as a destination, and even suggestdifferent routes based upon preferences. But all of that is top-downprogrammed. Two similarly situated people (using the same software onthe same model cell phone, in the same position in a traffic jam, at thesame time of day, with the same destination and the same selectedpreferences) would get the same directions and even the same questions(“press 1 to select alternate route”) from their cell phones. A humanfriend, however, would know personal information about the driver, andmight know that on this particular day the driver is not in a rush, andwould be happy sitting in traffic listening to the radio. The humanfriend would have that information based on characterizations of thedriver's behavior, not by the driver explicitly setting preferences. Itwould be helpful if a personal companion could do that. In anotherexample, a person might be walking along at a swap meet. When he stopsto buy some unneeded item, his personal companion might admonish himabout spending too much money.

Another thing that a human friend does is provide guidance as tospecific purchasing decisions. There are, of course, already systemsthat provide some aspects of purchasing and other guidance to consumersaccording to crowd-sourced comments. Examples include the “like/dislike”choice on Facebook™, and the “MustGo/Go/so-so/No/OhNo” movie ratingsystem of Fandango™. But those systems are highly simplistic, and are oflimited use because of the almost non-existent capability for sortingand filtering of the comments.

My 2000-era patents disclosed interfaces where consumers could sortproducts and services according to whatever characteristics were ofinterest to the searcher. That technology, however, stopped short ofteaching how to provide purchasing and other guidance to consumers whena display screen is inconvenient or unavailable. For example, if ashopper saw a product advertised on a TV, billboard, or in a store, itwould be useful for his/her personal companion to conduct a conversationregarding a possible purchase, without the shopper having to pull outhis cell phone or tablet. In particular, it would be helpful to have thecompanion say something along the lines of “The most common reportedcharacteristics of this product are “ease of use, price, and durability.Would you like information about any of those?” If the shopper then said“Tell me about durability”, the companion might respond “In 1115characterizations, 30% said very durable, 28% said yes, and 24% saidpretty good.”

Similarly, it would be useful if the conversation could provideinformation that compared “apples to apples”, e.g., price per gram or mgfor foods or vitamins. In many instances that would require calculationsto be performed on available data, and then that data to a user in aconversational format. As a simple example, it would be useful if a usercould inquire in a conversational format something along the lines of“How many Chinese restaurants are in Burbank?” or “How many Chineserestaurants are within a half hour drive of my current location?”

Discussion herein regarding the value of spoken conversation is notmeant to completely discount the value of providing visuals to a person,whether through glasses, a hand-held or desk-top device, or otherwise.What is needed, however, is the ability of a personal companion to helpvisualize the information in a compact format, such as sortable andfilterable tables, and allow the user to control the presentation(perhaps sort or filter the records of a table) as part of a spokenconversation. Whereas a user might be able to get a name of a restaurantor an address by asking Google Glass™ “where is the nearest Chineserestaurant?”, it would be more useful the system would review thecharacteristics used to classify restaurants or Chinese restaurants, andthen come back with a question such as “Are you looking for fast, cheap,or for fine dining?”

Another need (at least from the perspective of the current inventor) isfor systems, methods, and apparatus that reduce the impact ofadvertising on decision making. For example, Google™ auctions placementof advertising on its search results pages. Whoever pays the most getshis link moved to the top, or in some other desired position. Mostrecently, Google™ has even blurred the distinctions between advertisedrecords and search-ranked records, making the advertising more effectivefrom the advertisers' point of view, but potentially reducing the valueof the search results to the user.

Even where users have some very limited control over the rankingalgorithm, as in Google™ Shopping, Google™ puts advertisers on the top.And of course, Google™ Shopping can only rank products according toprice and relevance, which forces the user to look through page afterpage (with new advertisements each time) to ferret out other productcharacteristics such as free shipping. What is needed is for personalcompanions to provide search results to a requester, preferably in aconversational or tabular format, which would give a user the option ofeliminating or at least reducing the advertising.

SUMMARY OF THE INVENTION

All of the aforementioned objects and advantages can be achieved bypreferred systems, methods, and apparatus in which (1) multipleindividuals carry sensors on their persons or clothing, (2) ambient datais persistently or continuously received by the sensors, and at leastone of (3a) the data is automatically characterized (i.e., abstracted)using crowd-sourced parameters, and (3b) the raw data and/orcharacterizations are provided to others in a crowd-shared manner.

In terms of physical embodiments, information is preferably obtainedusing a “sensor module” carried by or on a person. At a minimum, sensormodules are likely to include a camera and a microphone, so that imagesreceived by the camera can be associated with spoken parameters and/orvalues received by the microphone. In preferred embodiments the cameraand microphone components are combined in a pin worn on clothing aboutthe torso, as for example on the front of a shirt, blouse or jacket.Biometric, olfactory, tactile, atmospheric and/or sensors of the sensormodule might well be located away from the camera and microphone, orconfigured as multiple or accessory sensor modules.

One or more sensors module are preferably coupled with a carriedelectronic device (“electronics module”), which preferably providespower, an operating system and suitable software. One or moreelectronics modules can advantageously provide connectivity to theoutside world, via any suitable manner of wired and/or wirelessconnection. Preferred electronics module are small enough as to bewearable, i.e., worn in a pants pocket or in a smallish (less than 1000or 500 cubic centimeters) hip carrier. Contemplated electronic modulescan be focused mostly or entirely on the personal companion functions,but can also include properly programmed general purpose devicesincluding smart phones, PDAs, mini-tablets, and so forth.

The electronics module can be coupled with a sensor module using a wiredconnection, but it is contemplated that the coupling could occurwirelessly. As electronics and power sources continue to miniaturize, avery compact sensor module could be physically adjacent the electronicsmodule, or even be located within the same housing.

Preferred personal companions can interact with their users in anycombination of active and passive modes. Among other things, users canactively or passively record raw data from their immediate environment,actively or passively abstract the raw data to determine objects,actions and/or events, and actively or passively provide the abstractedinformation to others according to the particular circumstances(contexts) in which those others find themselves.

Thus, personal companions can preferably operate using bothcrowd-sourcing and crowd-sharing. In crowd-sourcing, a personalcompanion could utilize the user's own previous characterizations ofobjects, actions, events and thoughts, and it could make suchcharacterizations generally available to others. In crowd-sharing, apersonal companion would receive data and/or characterizations fromothers, and then use that information to characterize objects, actions,events, and/or thoughts of the personal companion's user, without anyparticular effort from the user to do so. Thus, even though the wearernever told his personal companion that a green banana is unripe, hispersonal companion could draw that conclusion based upon passivelyreceived characterizations of others. And the wearer might not even knowthat his personal companion drew that conclusion.

Where there are discrepancies between a user's characterizations andthose of others, the user's personal companion would preferably weightthe characterizations in favor of his/her own prior characterizationsrelative to those made by others. This is discussed in greater detailbelow.

Characterizations of data are preferably stored as parameter-valuepairs, using a self-evolving database. Characterizations can becollected over time from multiple objects and events encountered by agiven person and sensor module, and can optionally be combined withthose from other individuals and their sensor modules, and even fromsensor modules not directly associated with any given person. It iscontemplated that characterizations can be made within a few minutes ofan object or occurrence of an event, or at some later time (as forexample upon review of a day's events), or even by a person who was noteven wearing the sensor module that captured the information. Not onlycan characterizations be crowd-sourced, but the parameters used tocharacterize can be crowd-sourced.

Characterizations are preferably organized according to objects,actions, events and thoughts, and can be used to obtain additionalinformation, and conduct interpersonal, commercial, or otherinteractions or transactions. Characterizations can advantageously bestored in self-evolving, structured databases, such that abstractedinformation can be made available to some or all of others using thesystem.

To avoid clutter, characterizations can be “forgotten” over time,especially in favor of maintaining higher level characterizations. Thus,although raw data of video, images, sounds, biometric, environmental,and so forth can be stored indefinitely, it is preferred that over timesome or all of the raw data can be lost in favor of characterizationsand subsets of the raw data. For example, in place of a video of the sunrising, the system might store a characterization that on a given daythe sunrise was “cloudless”, “perfect” or “breezy”, or it might storespecific frames or a line drawing pulled from the video.Characterizations can also be further characterized to higher levels ofabstraction. For example, over time characterizations of the sizes andcolors of various fruits seen in a supermarket visit might be abstractedto “went shopping”.

In some implementations, sensor module(s) and the system(s) that operatethem can be implemented as personal companions, which make use ofpersistent inputs from many individuals to crowd-sourcecharacterizations and characterization parameters from real-world,virtual and/or mixed-reality experiences. Preferred implementations canobserve ambient environments with little or no conscious direction fromtheir users, but can also interact with the users in a conversationalmanner when appropriate.

There are numerous security implications to personal companions.Certainly it would be advantageous to have a personal companion thatprovides not only a potentially flawed human interpretation of whathappened, but an actual video or image of the event and the perpetrator.If millions of people were to wear such personal companions, thelikelihood that a crime would be caught on camera is greatly increased.In addition, raw data and characterizations combined from many differentpersonal companions (the canopy idea) could be mined by authorities todiscover links that would otherwise be difficult or impossible to find.

Various objects, features, aspects and advantages of the inventivesubject matter will become more apparent from the following detaileddescription of preferred embodiments, along with the accompanyingdrawings in which like numerals represent like components.

BRIEF DESCRIPTION OF THE DRAWING

FIG. 1 is a high-level conceptual overview of how images havehistorically been recorded, used and stored

FIG. 2 is the overview of FIG. 1, annotated to include various aspectsof crowd-sourcing and crowd-sharing of information.

FIG. 3A is a schematic of a person using a personal companion, where thecamera is included in a sensor module affixed to clothing.

FIG. 3B is a schematic of a person using a personal companion, where thecamera is included in a sensor module worn as an earpiece.

FIG. 4 is a schematic showing preferred correlations among imagerecognition and characterization facilities.

FIGS. 5A, 5B and 5C are part of an objects characterization facility.FIGS. 5A and 5C show an objects table, and FIG. 5B shows a correspondingobject position-keys table.

FIG. 6 is a schematic of an actions characterization facility, andincludes various actions-related data tables.

FIG. 7 is a schematic of an events characterization facility, andincludes various events-related data tables.

FIG. 8 is a schematic of several people interacting through theirpersonal companions with a canopy and with each other.

FIG. 9 is a sample User Preferences table.

DETAILED DESCRIPTION

The following discussion provides many example embodiments of theinventive subject matter. Although each embodiment represents a singlecombination of inventive elements, the inventive subject matter isconsidered to include all possible combinations of the disclosedelements. Thus if one embodiment comprises elements A, B, and C, and asecond embodiment comprises elements B and D, then the inventive subjectmatter is also considered to include other remaining combinations of A,B, C, or D, even if not explicitly disclosed.

All methods described herein can be performed in any suitable orderunless otherwise indicated herein or otherwise clearly contradicted bycontext. The use of any and all examples, or exemplary language (e.g.“such as”) provided with respect to certain embodiments herein isintended merely to better illuminate the invention, and does not pose alimitation on the scope of the invention otherwise claimed. No languagein the specification should be construed as indicating any non-claimedelement essential to the practice of the invention.

Throughout the discussion, references may be made regarding servers,services, interfaces, portals, platforms, or other systems formed fromcomputing devices. It should be appreciated that the use of such termsis deemed to represent one or more computing devices having at least oneprocessor configured to execute software instructions stored on acomputer readable tangible, non-transitory medium. For example, a servercan include one or more computers operating as a web server, databaseserver, or other type of computer server in a manner to fulfilldescribed roles, responsibilities, or functions.

In FIG. 2, systems, methods and apparatus are contemplated in whichobjects, actions, events, and thoughts are abstracted from the imagedata using crowd-sourced characterizations and characterizationparameters 32C, additional information is procured 42C, transactions areexecuted 52C, and information is stored 62C, using crowd-sourcedstrategies. The term “parameters” is used herein to refercharacteristics that can be used in combination with values to describean object, action, event or thought.

In FIG. 3A, a personal companion 300A generally comprises (a) a sensormodule 320A, (b) a networkable electronics module 330 includingprocessor 332, software 334 and data storage 336 in the electronicsmodule 330, (c) a speaker 370, and (d) a distally operated system(distal service) 360 including processor 362, software 364 and datastorage 366. In this particular example, a person 310 is wearing thesensor module 320A on his shirt 311, and carries the electronics module330 in a pocket (not shown), or a hip carrier (not shown), or perhaps apurse (not shown). The electronics module 330 has a power and data link(not shown) with the sensor module 320A and a wired or wireless link(not shown) with the speaker 370A, and is at least intermittentlynetworked with a distally operated system (distal service) 360.

The sensor module 320A can comprise a single housing or be separatedinto multiple housings, and can include any practical sensor orcombination of sensors, including especially a camera 322A and amicrophone 324A. Other contemplated sensors can be included in thesensor module 320A, or located elsewhere on or near the body, andinclude those that measure pulse, blood pressure, pO₂ (partial pressureof Oxygen), body temperature, chemicals in the sweat, or otherbiometrics, and ambient temperature, humidity, movement, proximity orother environmental characteristics. In this particular example, theperson 410 is wearing a pulse monitor 328 on his wrist, which iswirelessly coupled with the electronics module 330. Multiple sensors canbe housed together, or be separated by several millimeters, centimeters,or any other suitable distance. Duplicate sensors can be included, asfor example a backup or stereo camera (not shown).

Sensor modules are preferably small enough to be comfortably carried forhours at a time. In the case of a clothing-worn sensor module, theoutwardly facing (away from the wearer) surface area couldadvantageously be only a few square centimeters. Sensor modules can becoupled to the clothing or wearer using a pin, band, snap, lanyard,necklace or any other suitable connector. In FIG. 3 the sensor module320 is coupled to the upper chest area of the shirt 311 using a safetypin (not shown). Another option is to put the camera and/or microphoneon an in-ear Bluetooth headset.

Sensor modules preferably have an electronically operated coating thatchanges color or in some other manner designates to the wearer or othersthat the sensor is in or out of operation. Thus, for example, a cameraor other sensor that collect still, video or other images might acoating overlay on the lens that changes to red, blue, grey or someother color or pattern to designate that the sensor is off line.Similarly, a microphone or other sound sensor might have a blinking orsteady light to designate that it is off line. The sensor in the imagesin this application should be interpreted as having such coatings orlights. In fact, it is contemplated that Google Glass™, which might ormight not be utilized with abstracting systems and methods contemplatedherein, could also have such coatings or lights.

As used herein, and unless the context indicates otherwise, the term“coupled to” is intended to include both direct coupling (in which twoelements that are directly connected, logically or physically) andindirect coupling (in which at least one additional element is logicallyor physically located between the two elements). The terms “coupled to”and “coupled with” are used synonymously.

Data collected by the sensor module(s) is preferably sent to theelectronics module 330, and the data flow can optionally bebidirectional. In FIG. 3 the camera 322A send images to the electronicsmodule 330, and the networkable electronics module 330 sends focus,blackout or other operating commands to the camera 322A. A similarsituation independently occurs for sounds, in which the microphone 324Asends sound data to the electronics module 330, and the electronicsmodule 330 might send filtering or other commands to the microphone324A. Electronics module 330 also sends sounds to the speaker 370A,which in this instance is an ear bud.

Power source(s) for the sensor module 320A, and possibly even for theelectronics module 330, could be located in any suitable location, asfor example, within the electronics module, or even separately from bothof those devices, perhaps even in the fabric of a worn garment. In FIG.3A, some power is provided by a battery woven into the fabric of theshirt 311, and power is carried to the networkable electronics module330 via power cable (not shown). Batteries woven into clothing aredescribed in US 2011/0271424 (Revol-Cavalier, Publ November 2011).

Optional glasses 380 can be equipped with an electronic display 384,which is preferably operated by electronics module 330 to show video,text or other visually perceivable information to the wearer. It iscontemplated that a sensor module could be incorporated into, orattached to a pair of glasses.

It is contemplated that distally operated system (distal service) 360can comprise any suitable computer implementation, can employ variouscomputing devices including servers, services, interfaces, systems,databases, agents, peers, facilities, controllers, or other types ofcomputing devices, operating individually or collectively, locally or ina distributed fashion. Interaction between (a) a local device of a givenuser, for example networkable electronics module 330, and (b) thedistally operated system (distal service) 360, is preferably conductedas a client/server fashion, although peer-to-peer and all other suitableconfigurations are contemplated. Computing devices can comprise aprocessor configured to execute software instructions stored on atangible, non-transitory computer readable storage medium (e.g., harddrive, solid state drive, RAM, flash, ROM, etc.). Software instructionsoperating on computing devices preferably configure the computing deviceto provide the roles, responsibilities, or other functionality asdiscussed herein with respect to the disclosed apparatus. In especiallypreferred embodiments, the various servers, systems, databases, orinterfaces exchange data using standardized protocols or algorithms,possibly based on HTTP, HTTPS, AES, public-private key exchanges, webservice APIs, known financial transaction protocols, or other electronicinformation exchanging methods. Data exchanges preferably are conductedover a packet-switched network, the Internet, LAN, WAN, VPN, or othertype of packet switched network.

As used herein, the term “personal companion” refers to the entiresystem as viewed from the perspective of an individual user. Thus, therecan be aspects of multiple personal companions that share resources atdistally operated system (distal service) 360. From time to time herein,reference is made to a local portions of the system, which refers toportions of the system worn or otherwise carried by an individual user.

FIG. 3B is similar to FIG. 3A, except that the personal companion 300Bhas a sensor module 320B worn as an earpiece, in a manner similar to howpeople currently wear Bluetooth headsets. In this instance sensor module320B includes a camera 322B, a microphone 324B and a speaker 370B.

In FIGS. 3A/3B the camera 332A/332B receives images of a table 381,which supports an orange 382 and an apple 383. The images are sent tothe electronics module 330, which relays at least portions of the imagedata to the distally operated system (distal service)360. The distallyoperated system (distal service) 360 uses software 362 to identifyvisual features in whatever image data was received, and then applythose visual features against a crowd-sourced database to identify oneor more objects within the image(s). As discussed in greater detailbelow, contemplated systems and methods can be used not only to identifyobjects, but also to identify actions, events, and thoughts.

FIG. 4 depicts a high level overview of preferred correlations amongdata structures. Currently preferred embodiments use a featurerecognition facility 400, an objects characterization facility 500, anactions characterization facility 600, an events characterizationfacility 700, and a thoughts facility 800. As used herein, the term“facility” means a physical device comprising electronics programmed orotherwise configured to (a) perform a desired function or (b) provideaccess to a device, system or service that performs the desiredfunction. Facilities can be stand-alone, networked and/or implemented incloud computing or other distributed environments.

Feature recognition facility 400 can use any suitable algorithms,software and/or hardware, and it is considered to be within the skill ofordinary persons in the art to implement feature recognition facility400 using known products.

For example, identification of objects and visual features using imagedata can be accomplished using a Scale-Invariant Feature Transform(SIFT) or Speeded Up Robust Feature (SURF). Information on thesetechnologies can be found at the corresponding Wikipedia articles,http://en.wikipedia.org/wiki/Scale-invariant_feature_transform andhttp://en.wikipedia.org/wiki/SURF, respectively. Such technologies arealready used in conjunction with a single camera SLAM system. See forexample, Active Vision Laboratory's web page athttp://www.robots.ox.ac.uk/˜bob/research/research_objectslam.html.

Identification of persons and facial features using facial recognitionsoftware products can be accomplished using products such asiOmniscient™ (seehttp://iomniscient.com/index.php?option=com_content&view=article&id=58&Itemid=54).

Identification of objects and features using sound data can also beaccomplished with available software. For example, content of humanspeech can be recognized using Dragon™ NaturallySpeaking software fromNuance™ (see www.nuance.com), and birdsong, music and other non-speechsounds can be recognized using programs Raven™ (seewww.birds.comell.edu/brp/raven/ravenoverview.html).

Identification of objects and features using odor data can beaccomplished using zNose™ from Electronic Sensor Technology, or the S&T™(Smell and Taste) software from F&F Consulting (seehttp://www.fid-tech.com/eng/technol/data/electronics/1.449.html).

It should be appreciated that personal companions and their respectivesensors can participate in incidental identification. Incidentalidentification, as used herein and applied to the present invention,comprises any identification made by a personal companion and associatedsensors in a passive manner. For example, a body-worn camera canincidentally identify the text on a sign and determine that the signrequires a user to stop when he or she is in a car. In another example,a body-worn microphone can incidentally capture passive comments fromone or more people regarding a subject, such as, for example, astatement from a passerby commenting on the presence of broken glass ona sidewalk. However, the invention described herein can passivelyidentify, process, and record any information collected by one or moresensors associated with the personal companion.

Additionally, it is contemplated that incidental identification allows apersonal companion to collect and process information without userinput, thereby allowing the personal companion to learn passivelywithout prompting by the user (e.g., initiating identification of anobject by asking the personal companion a question).

It should be appreciated that personal companions need not conduct imageor sound recognition per se. that is, there is no necessarily anydatabase of images against which a captured image is compared. Personalcompanions preferably store pattern characteristics and associate thosepatterns with objects, ideas, behaviors and other things. For examplepersonal companions could store information that oranges are bumpy,orange colored, usually have no stem attached, and about the size of afist. In that instance, determining that an object is an orange does notrequire image recognition software, but instead pattern recognitionsoftware, preferably using crowd sourcing of the patterns.

It is contemplated that at least some feature recognition could takeplace locally, to the extent permitted by the sophistication of thelocal hardware in electronics module 330. For example, the S&T™ systemdiscussed above is specifically designed for use on cell phones or othermobile devices. Nevertheless, it is far more likely that featurerecognition facility 400 will operate by the local hardware sendingimage, sound, odor or other data to a distal service for interpretation.

Outputs of the feature recognition facility 400 are preferably stored indatabase tables that correlate specific features with objects andactions. And unlike the prior art, such storage preferably takes placeusing crowd-sourced characterizations and parameters.

Objects characterization facility 500 is implemented in part in objectstable 510 shown in FIGS. 5A and 5C, and an objects position-keys table520 shown in FIG. 5B. The corresponding database manager(s),communications manager(s), hardware, etc can be located anywhere,including for example the electronics module 330 (FIGS. 3A and 3B) andthe Canopy (FIG. 8), and those figures should be interpreted in thatmanner.

Objects table 510 is used to correlate names of objects, which could bethings, people, animals, buildings, trees, toys, and so forth, withcharacteristics. In this particular example the first two columns 511 ₁,511 ₂ are used for record number and position key, respectively, thethird column 511 ₃ is used for a name of the object, and the remainingcolumns 511 ₄-511 _(y) are used for the characteristics. In thisexample, the data used for position key is the name of an objectcategory (fruit, vehicle, person, animal, etc), which is used inconjunction with table 520 to interpret the data in some of theremaining columns.

Object table 510 could be very large, having many millions of records.For searching efficiency, however, object table could be split into manydifferent tables. One way of doing that would be to have differenttables for different object categories, e.g., a table for fruit, a tablefor vehicle, and a table for person.

Object position-keys table 520 uses the first two columns 521 ₁, 521 ₂for record number and category, respectively, and the remaining columns521 ₃-521 _(n) for data that determines what information cells of agiven record in the object table 510 will store.

From a linguistic perspective, one can think of objects table 510 ascorrelating nouns in column 511 ₃ with corresponding adjectives incolumns 511 ₄-511 _(y) for a particular object. For example, the firstrecord 512 ₁ in objects table 510 correlates the noun “orange” with theadjectives “round”, “orange” and “dimpled” in corresponding cells ofcolumns 511 ₄, 511 ₅ and 511 ₆. The first record 522 ₁ in the objectsposition-keys table 520 correlates the adjective “round” with thecategory “shape”, the adjective “orange” with the category “color”, andthe adjective “dimpled” with the category “texture”.

The second record 512 ₂ in the objects position-keys table 520correlates the noun “truck” with the adjectives “monster”, “white”,“expensive”, and “big wheels”. The reader should note that the term“adjective” is used herein in a relatively broad sense to describe anaspect of the object, and the words or characters used to store thatneed not be grammatically correct in any particular language. Thus, thesecond record 512 ₂ stores the words “big wheels”, even though inEnglish the correct adjective might be “big wheeled”.

The reader will hopefully should notice that not all cells of everyrecord need to be utilized. To the contrary, each of the various tablesin this application will very likely have many cells with no data. Also,instead of including literals in the objects table 510, it should beappreciated that one could alternatively or additionally use anadjectives table (not shown) that would simply list adjectives, whichcould then be pointed to from objects table 510.

Object records can also store symbols. In records 512 ₇ and 512 ₈ theobjects table 510 stores images of one of the Apple logos, and twodifferent contexts in which that logo was found. Record 512 ₉ stores abar code for the xyz product, which was identified as being found onpackaging. Record 512 ₁₀ stores a QR code for Wikipedia, which wasidentified as being found on a t-shirt. Of particular interest is record512 ₁₁, included here to demonstrate that virtually anything can be usedas a symbol. In this case the image of George Washington standing up ina boat is stored as a symbol.

FIG. 5C shows some of the columns of Table 510 that were not depicted inFIG. 5A because of space limitations. In this example, column 511 ₇identifies the personal companions (or perhaps that of users operatingthe personal companions) that provided the information in the record.

Column 511 ₈ identifies the confidentiality level accorded theinformation in the record. Typically the default would be shareable, butusers might instruct their personal companions to restrict theinformation to only the personal companion (or person), to familymembers, and so forth.

Column 511 ₉ identifies a date or perhaps a date/time stamp in which theinformation was loaded or last updated.

Column 511 ₁₀ identifies a date or perhaps a date/time stamp that therecord will expire. A default might be for the record to never expire,or perhaps for some time period, such as 5 or 10 years from the loaddate.

Column 511 ₁₁ identifies a weighting that should be applied to thisrecord. This could be on any suitable scale, as for example 1 to 5, or 1to 100. Weightings might correspond to the confidence that the personproviding the information has with respect to the correlations in therecords. For example, a person providing information might be almostcompletely sure that a given QR code is associated with a given product,but only 1% sure that a person standing up in a boat in a painting isGeorge Washington. The weighting might be determined by a personalcompanion asking for a weighting, or in other instances by comparing oneperson's characterizations with those of others, giving relatively heavyweightings to characterizations upon which people tend to agree.

Column 511₁₂ identifies a persona to which this record relates. Personasused in connection with crowd-sourced databases are described in anotherone of my patent applications, US2008/0097849 (Ramsaier et al., PublApril 2008). In the context of the current application, personas couldbe used to modify the weighting given to specific records depending onwhether the persona for that record is consistent or inconsistent withthe current persona. Current persona could be expressly told to one'spersonal companion, or more preferably inferred by place, people, etc,and could be stored in a User Preferences table such as row 8 of table900 of FIG. 9.

Of course the data presented in all of the tables in this applicationare exemplary only, included to indicate the gist of the ideas presentedherein. Similarly, although records and columns are depicted as havingfixed lengths, which is currently thought to be desirable to providequick processing speed, records and columns could instead have variablelengths, and indeed other structures besides flat tables could be used.One should also appreciate that even though the letters “n” and “m” areused repeatedly to designate the number of columns and records inmultiple tables, the various tables can have, and almost certainly willhave, different numbers of columns and records. Still further, the useof any particular logo in this application should not be construed asindicating any legal association with, or endorsement by, any entityassociated with the logo.

It should also be appreciated that although the tables and otherexemplifications herein use English language words, any language couldbe used, including non-phonetic languages such as Japanese, Mandarin andKorean. In addition, it is contemplated to use translation tables orother strategies to translate data from one language into anotherlanguage.

In FIG. 6, actions characterization facility 600 generally includes anactions table 610 and an actions position-keys table 620, with thedatabase manager, communications manager, hardware, etc not shown.Actions table 610 is used to correlate aspects of movements, walking,riding, driving, eating, speaking, flying, sinking, playing, and soforth, with names of the actions. In this particular example the firsttwo columns 611 ₁, 611 ₂ used for record number and position key,respectively, the third column 611 ₃ is used for the name of the action,and the remaining columns 611 ₃-611_(n) are used for othercharacterizations of the actions.

Action position-keys table 620 uses the first two columns 621 ₁, 621 ₂for record number and category, respectively, and the remaining columns621 ₃-621_(n) for data that determines what information cells of a givenrecord in the action table 610 will store.

Actions table 610 should be interpreted as having corresponding columnsfor source identification, confidentiality, time stamps, weighting andpersonas as discussed with respect to FIG. 5C.

From a linguistic perspective, one can think of actions table 610 ascorrelating verbs in column 611 ₃ with corresponding adverbs in columns611 ₄-611_(n) for a particular action. In the example shown record 622 ₁is a key to interpreting data in records 611 ₁ and 611 ₂ in actionstable 610, where speed is “fast” or “slowly” and “manner” is“recklessly” or “haltingly”.

The reader may notice at this point that the categories depicted in thefigures for different types of objects and actions are examples only,and are therefore somewhat arbitrary for the purpose of demonstration.Indeed, categories are intended to evolve over time depending on whatusers of the system tend to utilize. It may also be that someimplementations use subcategories, or no categories at all for one ormore of the objects characterization facility 500, actionscharacterization facility 600, events characterization facility 700, orthoughts facility 800. In other instances the category can be the sameas the object, action, etc. See for example records 612 ₃, and 612 ₄ inFIG. 6.

One could alternatively or additionally use an adverbs table (not shown)that would simply list adverbs, which could then be pointed to inobjects table 610.

In FIG. 7, events characterization facility 700 generally includes anevents table 710 that correlates (a) objects from the objects table 510with (b) actions from the actions table 610 and (c) outcomes. In thisparticular example the first two columns 711 ₁, 711 ₂ are used forrecord number and name of the event, respectively, and the remainingcolumns 711 ₄-711_(n) are used for characteristics of the events.

It is contemplated that one could use an events-position key tableanalogous to tables 520 and 620 for objects and events, respectively.But that is considered disadvantageous because it introduces unnecessarycomplexity.

From a linguistic perspective, one can think of actions table 710 as acollection of stored sentences, where the data in cells of the variouscolumns correspond to the subjects, verbs, objects, and other parts ofspeech. For example:

-   -   In events record no. 1, the observation that “Martha Smith        reads” is recorded as Martha Smith (object record 5) reads        (action record 5).    -   In events record no. 2, Martha Smith (object record 5) reads        (action record 5) a Harry Potter book (object record 6).    -   In events record no. 3 Martha Smith (object record 5) reads        (action record 3) a Harry Potter book (object record 6) to an        unknown young adult male (object record 3).    -   In events record no 4., the unknown young adult male (object        record 2) is walking a labrador dog (object record 4), with an        outcome that someone (perhaps someone identified in a column of        the table that is not visible), is “happy”. Here the literal        “happy” is inserted into the table, but one could have an        adjectives table as discussed above (not shown), and record only        links to the adjectives. One could also describe outcomes in        terms of adverbs, and include either literals of the adverbs, or        use links to an adverbs in an adverbs table (not shown).

The system could be made more complicated than simply using nouns,adjective, verb and adverbs. For example, in table 710, column 711 ₆ isused for preposition objects.

The terms “events” and “outcomes” should be construed herein in asufficiently broad manner to include correlations of symbols withobjects, actions, events, and thoughts. Links are considered addressesof data objects. In record 712 ₆, for example, one of the Apple logos isassociated with an outcome of linking to the main web page URL for theApple company. Similarly, a hypothetical bar code for XYZ company isassociated with a link to its website, and a Wikipedia QR code isassociated with a link to its website.

Of course, since this is a bottom-up, self evolving database,individuals can make whatever associations they desire. To demonstratethat aspect, the hypothetical bar code for XYZ company is alsoassociated with a link to a competitor's ABC website. Similarly, theimage of George Washington standing in a boat is stored as a symbol thatrepresents multiple different things, a concept (pride in America), ahistorical event (revolutionary war), a web page, and a book,Washington: A Life, by Ron Chernow).

Thoughts can be handled in a manner analogous to events, with the maindifference that thoughts are not necessarily correlated with specificreal-life events. For example, whereas Table 710 of FIG. 7 might storeinformation about a specific accident, a record of a thoughts table (notshown) might store the generalization that a car (noun) moving (verb)fast (adverb) and erratically (adverb) tends to result in accidents(outcome). Another record might store the generalization that music(noun) played (verb) loudly (adverb) over a long time (adverb) tends toresult in deafness (outcome). A third example is that a record couldstore the generalization that regular (adverb) flossing (verb) tends toresult in gum disease (outcome).

It is contemplated that generalizations or other thoughts could bestored more or less directly from parsing of communications with users,and/or result from automatic review of records in events table(s).

It is also contemplated that any characterizations and/or featurerecognition facilities can be associated with one or more artificialintelligence systems. Artificial intelligence can include, but is notlimited to, neural nets, machine learning algorithms, supervisedlearning classifiers, time-series forecasting, regression analyses,predictive analytics algorithms, and fuzzy logic.

For example, features recognition facility 400 can use a supervisedlearning classifier to identify different feature inputs and outputs andinfer a function from labeled training data. It is contemplated that thelabeled training data can be input manually by a user of featurescharacterization facility 400. It is further contemplated that thefeatures characterization facility 400 can preferably also receivecrowd-sourced labeled training data, thereby quickening the pace and thedepth of supervised learning.

In another example, actions characterization facility 600 can use atime-series forecasting to predict when one or more actions will likelyoccur. It is contemplated that actions characterization facility 600 canpredict future events by observing the temporal ordering of a user todetermine when the user typically takes an action. It is furthercontemplated that action characterization facility 600 can crowd-sourcetime-series data to come to more accurate conclusions about typicalbehavior patterns in particular contexts, such as, for example, the factthat many individuals typically arrive at work around 9:30 AM in adesignated geographic area.

In yet another example, objects characterization facility 500 can use alinear regression analysis to predict the relationship between multiplevariables. It is contemplated that objects characterization facility 500can predict that a user's keys are highly related to a car parked in thedriveway. The object characterization facility 500 can further correlatethe car parked in the driveway with a particular house and come to aconclusion that the car is highly related to the house. To take thisexample a step further, objects characterization facility 500 candetermine that the car is associated with the house most frequentlybefore 8:00 AM and after 5:00 PM on weekdays using time-seriesforecasting in conjunction with a regression analysis. As with theprevious examples, objects characterization facility 500 cancrowd-source data to draw more accurate conclusions about therelationship between two objects.

The present invention is not limited to the embodiments and examplesdiscussed herein and can comprise any facility paired to any one or moreartificial intelligence systems to assist in identifying and predictingthe occurrence of objects, events, features, events, and any othermeasurable factor.

Real-World, Virtual World, and Mixed-Realities

FIGS. 3A and 3B should be interpreted as exemplifying any of real-world,virtual or mixed-reality environments. Thus, the orange 382 and apple383 could be real or virtual, and independently the person 310 could bereal or virtual. As used herein, the term mixed-reality should beinterpreted to include augmented reality. Similarly, the tables shown inFIGS. 5A, 5B, 6 and 7 should all be construed as storing informationthat can have any combination of real-world, virtual or mixed-realitycomponents.

Examples of Crowd-Sourcing/Sharing of Parameters and Identifications

Hopefully, one can now understand how the apparatus of FIGS. 3 through 8can implement step 32C of FIG. 2. In a preferred embodiment, a personwears or carries equipment such as the camera 322, microphone 324,electronics module 330, and speaker 370 of FIG. 3. The camera imagessome object, as for example, orange 382. The image, or at least dataderived from the image, is sent to feature recognition facility 400,which either identifies the object as an orange, or identifies features(round, shaped, smallish, orange) from which other software canassociate the object with an orange. Unlike the prior art, however,where a company has trained an image recognition facility to identifyall such objects as oranges in a top-down manner, the training here iscontemplated to be accomplished by multiple users. Thus, upon firstencountering an orange by any of the users, the system and user mightuse microphone 324 and speaker 370 to engage in a dialogue as follows:

System—What is this?

User—An orange.

System—How do you know?

User—It's round and orange and dimpled.

System—What kind of object is it?

User—It's a fruit.

That data would be entered into a table such as objects table 510, asshown in row 512 ₁. If the system didn't already know that the adjective“round” referred to a shape, or that “red” referred to a color, thesystem might initiate a dialogue such as the following:

System—What sort of characteristic is “round”?

User—Round is a shape.

System—What sort of characteristic is “orange ”?

User—Orange is a color.

System—What sort of characteristic is “dimpled”?

User—Dimpled is a texture.

That data could be stored in a record such as 522 ₁ of table 520. Ofcourse, as time went on, the system would learn the words ofcharacteristics, objects, and so forth. One key is that the imagerecognition facility is trained in a crowd-sourced and/or crowd-sharedmanner. Another key is that the image recognition facility identifiesboth object names (e.g., the name “orange”), characteristics (e.g.,round, orange, dimpled), and parameters (e.g., shape, color, texture,etc).

Readers will appreciate that analysis of the words spoken by the user,and generation of queries and comments by the system would likelyutilize at least rudimentary language parsing and creation facilities,preferably ones that consider both syntax and semantics. Such facilitiesare known in the prior art, and are not by themselves considered to beinventive herein.

In the case of actions, the image recognition facility would identifyactions such as “walking” and “riding”, and also identifycharacteristics of those actions, including for example, speed. Thatinformation would be stored in tables such as 610 and 620. An exemplarydialogue might take place as follows:

System—What is the boy doing?

User—He is standing.

System—How do you know?

User—His feet are on the ground.

System—How is he standing?

User—Quietly.

Events can be stored in an analogous manner, using a table such as table710 of FIG. 7. To store that information, an exemplary dialogue mighttake place as follows:

System—What is happening?

User—Martha Smith is reading a book.

Assuming the system could already recognize Martha Smith, the activityof reading, and the object as a book, the system might store theinformation as in record 712 ₂ of table 710.

Readers might be skeptical that objects, actions, and events can becharacterized with only a handful of characteristics sourced by questionand answer interactions. But upon reflection, readers should appreciatethat the process is analogous to how items, actions, events and thoughtscan be characterized in the old twenty questions guessing game (“Is itbigger than a bread box?”).

It is also contemplated that a question and answer conversation can beinitiated by a person. In one embodiment, a user can tell a personalcompanion to initiate a dialog in order to add characterizations about aparticular object of interest. For example, a user can initiate aconversation about the high sentimental value of a picture drawn by theuser's child that would otherwise be considered of little worth by thepersonal companion based on past conversations with the user.

In another embodiment, the user subject to a condition preventing speech(e.g., a user that is unable to speak, an environment where talking isnot allowed, and a temporary inability to speak) can initiate a questionand answer conversation using nonverbal cues, such as, for example, ahand signal. In this embodiment, it is contemplated that the personalcompanion can converse with the user verbally (e.g., through a speakeror headphones) or non-verbally (e.g., through a series of vibrationsfelt on the user's arm).

It is contemplated that a personal companion is not limited to purelyverbal conversations and can, instead, converse with a user in anymanner known in the art.

Crowd-Sourcing/Sharing Of Additional Information

Element 42C of FIG. 2 refers to crowd-sourcing/sharing of additionalinformation. In a crowd-sourced example, a person might say to hispersonal companion something along the lines of “This ornament breakseasily”, or the personal companion might see the user break the ornamentwith little or no provocation. The characterization of breaking easilywould be uploaded to the canopy, and made available to others. In acrowd-shared example, the personal companion of another person would seethat the other person had picked up one of the ornaments in a store, andbased upon passively received characterizations of others, the personalcompanion might say to the user “Be careful. That ornament breakseasily”.

FIG. 7 provides a specific example of how the characterizations could bestored. There, outcomes in column n are, or provide links to, theadditional information. For example, in record 712 ₇, the XYZ barcode isassociated with a link to the URL for the XYZ company, and may well havebeen added to the system by an employee for the XYZ company. Theassociation of the XYZ barcode with a competing company in record 712 ₈,or with the literal “breaks easily” in record 712 ₁₄, however, wouldhave almost certainly been added to the system by someone else.

In another crowd-sourced example of obtaining additional information, auser might say to his personal companion, “Please tell others that theroute 5 freeway is jammed at Katella”, or the personal companion mightsee that the traffic jam using its camera. If that information is madegenerally available to others, then the personal companion of anotherperson might passively receive the information, see that its person wasabout to enter the freeway, and say something along the lines of “Areyou sure you want to go this way? The freeway is jammed at Katella.”

It is important to note that although most of the examples herein arefocused on deriving information from a microphone, camera or othersensor carried by a person, information could also becrowd-sourced/shared from stored materials, including for exampleInternet web pages, and county or other government records. For example,comments about a particular product could be crowd-sourced from blogsdiscussing the product. Thus, it is contemplated that a web crawlercould be used to scour the Internet for information, using the canopy toprovide context and suggestions as to how to characterize theinformation it finds, to establish links, and possibly even to conductor take part in transactions.

Crowd-Sourcing/Sharing Of Transactions

Element 52C of FIG. 2 refers to transactions, which can be accomplishedin a crowd-sourced or crowd shared manner.

In a crowd-sourced example, a person might ask his personal companion tofind out whether any others are interested in purchasing a monstertruck. And example of how this could be recorded is in FIG. 7. There,record 712 ₁₅, in association with object record 510 ₂ and action record610 ₆, shows an opportunity for 10 people to cooperate to each purchasea monster truck for $88,000. Many other examples are contemplated,including those where multiple individuals collectively purchase thesame object, or perhaps collectively fund development of a company,commercialization of an invention, and so forth.

In a crowd-shared example, a personal companion might see that itsperson's vehicle is getting old, has high mileage, and is starting tobreak down. The personal companion might also have recorded oohs and ahswhen the person viewed monster trucks. Based on those correlations, andcorrelations from that person or others that a new item is oftenpurchased when an old item is wearing out, the personal companion mightmention to its person that a given vehicle is available, or that othersare banding together to make a multi-vehicle purchase. The personalcompanion would have known about the opportunity because it passivelyreceived that information from the personal companions of others,possibly funneled through a canopy.

In another situation, if a group of friends were planning a vacationtogether, and three of the friends just bought airline tickets, thatinformation would be made available to a fourth friend in acrowd-sourced or crowd-shared process as discussed above. In acrowd-sourced aspect of a transaction, a person might ask his personalcompanion “What's going on with the vacation? If others purchasedtickets, then please purchase one for me.” Or perhaps a person might sayto his personal companion “Tell the others that I already bought thetickets.”

In a crowd-sourced example of the transaction, a personal companionmight tell its person “Three others bought tickets already. You shouldbuy one too.” Here again he personal companion would have known aboutthe opportunity because it passively received that information from thepersonal companions of others, possibly funneled through a canopy. Thepersonal companion might even not say anything to its person, and simplypurchase a ticket.

Since personal companions can be context-aware, such interactions wouldpreferably occur during an appropriate moment for the person, or perhapstriggered by something in the person's environment, such as a quietmoment, or perhaps when the person is looking at his calendar.

Storing Characterizations In The Canopy

Element 62C of FIG. 2 refers to storing characterizations in the canopy.This refers to the fact that records in the various tables can begenerated by many different people, and yet everyone can have access tothem. Although not readily apparent in this application, the ellipsisindicating other columns in the various table should be read to include,among other things, indicators of the source of the data, a time/datestamp, geographic location, social groups, and privacy indicators. Inthat manner the system can weight correlations properly to differentusers.

For example, an events table such as table 710 could store manyinstances of different people correlating the XYZ barcode or logo withInternet links and comment literals. Most or all of those correlationswould be made available to everyone, and would preferably be weightedaccording to frequency, time/date stamp and so forth. Those associationswould remain, as part of the canopy, at least during their various decayperiods, even if the persons storing them died, or otherwise stoppedusing the system.

It is contemplated, however, that associations would be weighted.Weighting could be done in any suitable manner, but would preferablyreflect who made the associations, how old the associations were, andthe frequency with which a given association was made. Thus,associations made one day ago would be given greater weight those made ayear ago, and associations made by hundreds of people would be givengreater weight than those made by only one or two people. Also,associations made by a given individual would preferably be givengreater weight for that individual than for others. This is how an appleto most people could be considered an apple, but the same apple to aproduce manager might be considered a Macintosh.

FIG. 8 depicts a thoughts facility 800 in which multiple users 810 a-810n of personal companions 820 a 820 n, and their connections 830 a-830 nwith a processing network 840, all in accordance with the canopy conceptdiscussed above. At any point in time some of the personal companionswill likely be passively observing their local environments, usingpreviously crowd-sourced information to derive characterizations fromthose environments, but not interacting with their corresponding usersat all. Other personal companions will likely be interacting with theircorresponding users (sometimes in a question and answer mode), in effecttraining the system to crowd-source how objects, actions, events andthoughts should be abstracted, both in the present and in the future.Others will likely be using the data and/or characterizations from otherpersonal companions, in a crowd-shared manner that does not require anyaction from their corresponding users to receive the information. Stillothers will likely be interacting with their corresponding users, makingsuggestions, providing warnings, and so forth, based uponcharacterizations about the their past or contemporaneous localenvironments, past or contemporaneous interactions with their users, anddata and characterizations of others. All of that can be based at leastin part on data and characterizations stored in the canopy.

As indicated elsewhere, depending on memory, computer power, and soforth, none, some or all of the steps listed above (recording,abstracting, and providing circumstance-relevant information) for anygiven personal companion can be accomplished locally, with the remainderaccomplished distally (e.g., by a distal server or network), or even byrecruiting processing power from other personal companions.

From the perspective of a given one of the users, thoughts facility 800should be interpreted as comprising software operable by a user 810 a incooperation with a device 820 a having a portable housing, within whichis contained electronics configured by the software to: receive ambientdata corresponding to an item 801 within an environment of the user 810a; and utilize (a) information derived from the ambient data and (b) anaudible, at least partially computer generated, conversation with theperson to assist in identifying the item.

Device 820 a can be and/or include a cell phone, or at least sufficientelectronics to conduct a phone call, and in other aspects can comprise apersonal companion such as 300A in FIG. 3A or 300B of FIG. 3B.

The item can be a car, person, animal, building, coffee cup, orsubstantially any cognizable physical object, in the real world, avirtual world or a mixed reality world. Thus, for example, the itemcould comprise an electronic rendering of an object, such as an image ona TV screen or other electronic display.

The ambient data can include image data produced by a CCD, CMOS or otherimage sensor, and since the image sensor can be remote from the housingof the electronics, the ambient data can include image data receivedfrom a source external to the housing. Ambient data can additionally oralternatively include sound, biometric, olfactory or other types ofdata.

The electronics of device 820 a is preferably configured to sendinformation derived from the ambient data to a service distal (part ofcanopy 840) from the device. The information sent from the device 820 acan comprise at least a portion of the ambient data, a matrixmanipulation or other derivation of at least a portion of the ambientdata, and/or textual or other characterizations of the ambient data.Characterizations could, for example, include color, size, movement,relative position, type of object (e.g. face), loudness, or rhythm.Additionally or alternatively, the information sent from device 820 acould comprise a Scale-Invariant Feature Transform (SIFT), Speeded UpRobust Feature (SURF), or other non-textual characterization of afeature of at least a portion of the object.

The electronics of device 820 a can further be configured to receive aproposed identification from the distal service, and to relate theproposed identification to the person as part of the audibleconversation. Sending and or receiving herein can be accomplisheddirectly, by point to point communications, or indirectly viaintermediate points. Relating of the proposed identification can occurin any suitable manner including for example, stating or suggesting.

The electronics of device 820 a can further be configured to receive anaddress from the distal service, and to obtain additional informationabout the item by contacting the address. All manner of physical andelectronic addresses are contemplated, including for example, atelephone number, an email address, a SMS address, and a socialnetworking address. Similarly, all manner of additional information arecontemplated, including for example, price, availability, options,physical characteristics, and consumer comments.

The electronics of device 820 a can further be configured to receive acomment from the distal service, and render the comment as part of theaudible conversation.

Device 820 a can optionally include a screen, projector or other displayapparatus 802 a, and where the electronics is configured to receiveimage data from the distal service, the device can render the image datausing the display apparatus.

The electronics of device 820 a can further be configured to receive acommand from the distal service, and to use the command to operate oneof the other personal companions, or another device as for example atelevision, radio or a 3D printer.

The audible conversation can be of any practical length, but preferablyincludes a sequence of at least a first second utterance by the person,a first computer generated utterance, a second utterance by the person,and a second computer generated utterance.

The electronics of device 820 a can further be configured to utilize adatabase (as for example in the canopy) to provide a characterization ofthe item, wherein the database associates parameters with values, and atleast some of the parameters are crowd-sourced or crowd-shared, and/orwhere data within the database is crowd-shared.

Devices 820 b through 820 n should be thought of a similar to device 820a, and for example, could have corresponding display apparatus 802 bthrough 802 n.

Another set of novel concepts herein involves a personal companion orother electronic device being programmed to make use of an item ofstored information on behalf of its user in a manner that requires noaffirmative action by the user.

This could be accomplished further to the electronic device solicitinginformation from its user using an audible human-understandableconversation that includes at least some computer-generated speech,communicating the solicited information for storage in a hardware-baseddata structure; and obtaining the item of information from the datastructure. In some embodiments the obtained item will be derived from(1) at least some of the solicited information and (2) other informationsolicited by, and uploaded to, the data structure by another person'selectronic device.

The solicited information could comprises raw data and/or one or morecharacterizations of raw data.

There are many ways in which stored information can be used by apersonal companion or other electronic device on behalf of its userperson, in a manner that requires no affirmative action by the user. Forexample, the personal companion could use the stored information torecognize at least one of an object, an action and an event, in anenvironment about the person. Another contemplated use is for theelectronic device to refrain from saying something in response to thepersonal companion recognizing at least one of an object, an action andan event, in an environment about the person. Other contemplated usesare for the electronic device to send an operating command to a piece ofequipment, or perhaps an email or other form of communication to aperson or other entity. Another contemplated use is for the electronicdevice to make a purchase, or conduct some other transaction, especiallya transaction involving money.

Uploading, Storage and Deletion of Data

An events table such as table 710 could store millions of instances ofdifferent people seeing various fruits, or even many instances of thesame person seeing a particular fruit. Most or all of those instanceshave no significance whatsoever, and should not waste space in storage.To facilitate that deletion function, it is contemplated that raw data,such as raw video or other image, audio, and biometric data will besaved for only a relatively short period of time, such as a few minutesor perhaps a few hours. The particular amount of time that raw data issaved is preferably controlled by the person wearing the local portionsof the system, by the amount of local memory, by connectivity toInternet or upload path(s), and so forth. It is, however, alsocontemplated that the local portion of the system could upload raw data,so that, for example, the raw data of a audio/video clip of a caraccident, or perhaps a particularly interesting portion of a sportingevent, could be saved and shared with others.

Ideally, the local portion of the system, e.g., networkable electronicsmodule 330, would have enough processing power and memory to storecharacterizations in local portions of the various characterizationfacility tables, such that for the most part only characterizations aresent to any distal facility for merging with characterizations ofothers. Records in both local and distal facilities are preferablysubject to deletion based upon suitable factors, including for exampleredundancy and a date/time stamp. Where generalization or other thoughtsrecords are abstracted from collections of events records, it iscontemplated that at least some of the underlying events records can bedeleted.

Persistency and Background Operation

One aspect of the inventive subject matter is that personal companionscan have a high degree of persistency. In preferred embodiments aperson's personal companion is active for at least 50%, 60%, 70%, 80% oreven up to 100% of that person's waking day. It basically records asignificant portion of the person's life, the sights that the personwould see and the sounds that the person would hear. The personal sensormodule would thus typically record encounters with friends andco-workers, driving experiences, cooking dinner, and so forth. Dependingon the capability of the camera and microphone, the system could evenrecord images and sounds outside of the person's native senses, such asultraviolet or infrared light, or ultrasonic sounds. The networkedelectronics module could advantageously include a GPS or othergeolocation facility, and record the person's location on an ongoingbasis.

One advantage of both persistency and background operation is thatinformation could be collected from many different people, and not onlybe almost immediately available to others, but actually be used byothers without anyone intentionally storing or retrieving theinformation. For example, in the prior art it is known that a driverdriving along a freeway might see that the road is jammed up withtraffic, and post an image or video of the traffic jam to Facebook™, orsend information regarding the traffic jam to Waze™ or Twitter™. Thirtypeople might see that post, and five write back with thanks for thewarning. All of that, however, takes conscious effort on the part ofthose involved.

In contrast, a contemplated personal companion could have a camera thatwould persistently and automatically observe everything in its view,including the traffic. In preferred embodiments there is no need torepeatedly “point and click” or take other affirmative actions tocapture data. The system could automatically abstract that thecongestion constitutes a traffic jam, and upload that abstraction(perhaps along with still images or video) to the collective eventsfacility. The personal companions of some others could also haveobserved their surroundings and actions, and might have generalized thatthey are about to take that same freeway, and would likely hit the sametraffic jam. Their personal companions could then warn them, sayingsomething along the lines of “The 57 freeway is jammed at Anaheimstadium.” Thus, unlike the prior art, the personal companionobservations can be persistent, and abstraction, sharing and applicationof those observations can all be automatic.

Speed of Operation

It is contemplated that personal companions could providenear-contemporaneous characterization and/or abstraction of observedinformation. As used herein, the term “near-contemporaneouscharacterization and/or abstraction of observed information” withrespect to a feature, object, action, or an event condition means thatthe characterization and/or abstraction takes place within 15 minutes ofthe sensor sensing the feature, object, action, or event beingcharacterized or abstracted. As used herein, the term “contemporaneouscharacterization and/or abstraction of observed information” withrespect to a feature, object, action, or an event condition means thatthe characterization and/or abstraction takes place within 5 minutes ofthe sensor sensing the feature, object, action, or event beingcharacterized or abstracted. These terms are intended thereby to bedistinguished from concurrent, simultaneous, coincident, and real-time,which are referred to herein as occurring within than five seconds of anoccurrence.

Providing Information from Multiple Sources

It is contemplated that personal companions could associate locallyderived information with information from any other available source orsources, including for example, information available on the Internet,identity of nearby business associates or personal friends, andinformation from books, blogs and other Internet sources. Thus, if aperson asked for driving directions, the system might generate a query,which is then submitted to Google.com, Yahoo.com, Ask.com or Bing.com todetermine the answer. One benefit of accessing search engines using aperson companion is that the returned information could be stripped ofadvertising, and/or could be re-ranked according to according toindividual's preferences and history.

The concept of asking a question or stating a command in naturallanguage, and sending the question or command to a distal service toretrieve an answer or operate a device, has recently been embodied inApple's Siri™. But those concepts were disclosed much earlier in thepriority filing, PCT/US00/25613 to what is now US issued '867 patent,and pending applications US2012/0178432 (Fish, Publ July 2012),US2012/0179452 (Fish, Publ July 2012), US2012/0208600 (Fish, Publ Aug2012) and US2012/0231843 (Fish, Publ September 2012).

It is contemplated that information stored by personal companions,whether raw data or characterizations, could be automatically posted tosocial networking and/or other sites. And personal companions might alsomonitor websites and other resources in the background, observing andabstracting from those resources.

Other Aspects of the Inventive Subject Matter

The following paragraphs describe some specific contemplated aspects ofpersonal companions. Unless the context requires a contraryinterpretation, each of the other aspects should be interpreted ascapable of being independently implemented. Thus, even where a sentencesays that a personal companion could do “x”, and the next sentence saysa personal companion could also do “y”, the reader should interpret “x”and “y” as being independently implementable, not that the personalcompanion need do both “x” and “y”.

It should also be appreciated that each of the other aspects could beimplemented along with one, or independently of crowd-sourcing and/orcrowd-sharing.

Inconsistent or Incorrect Information

The use of self-evolving databases contemplated herein will naturallytend to store information that is inconsistent and/or incorrect. Inaddition, personal companions should be able to relearn or correctprevious learning. For example, if a personal companion confuses dogsand cats, because both are furry mammals with tails and four legs, auser should be able to talk back and forth with his personal companionto add distinguishing features. Or if a personal companion is storingdata the correlates particular characteristics with the name Mary, whenin fact those characteristics refer to Jane, a user should be able totell his personal companion to replace the name Mary with the name Jane.Still further, if a personal companion has stored characterizations,whether from its user or from others, that a poisonous plant is safe toeat, a user should be able to insist that his personal companionidentifies that plant as poisonous. This can be accomplished using aweighting factor in the database for this particular user (see e.g.,column 511 ₁₁ in FIG. 5C).

Another consequence of using self-evolving databases as contemplatedherein is that such databases can accommodate nuanced views of differentusers. For example, most people would view a supermarket orange as justan orange. But the produce manager would likely distinguish among aValencia orange, a navel orange, and a blood orange. In another example,one person might view a plastic orange as an orange, while another mightview it as a toy or a prop. Some people might characterize a book abeing “fantastic” while another might characterize it as “awful”. Andindeed, it may be that someone instructs his/her personal computer thata car is called a bicycle. Preferred apparatus, systems and methodsherein can accommodate all of those situations because each personalcompanion could have its own data tables, and where records frommultiple personal companions are stored together, the tables can includea source identifier (e.g. column 511 ₇ of FIG. 5C).

Privacy

Users likely won't want the local instances of their personal companionsto be observing their environment all the time. Among other things,users might want privacy in their homes, and might want to avoidrecording images of copyright subject matter. It is contemplatedtherefore that local instances of personal companions, or at least oneor more sensors of the personal companions, could be place into a sleepmode. This could be done, for example, by expressly telling a personalcompanion to go to sleep, or by pushing a button on the electronicsmodule 330. Another option is for a user to tell his personal companionto sleep automatically, such as when the personal companion perceivesthe event of “getting into bed”, see row 612 ₉ of FIG. 610 or between 9pm and 6 am. Such preferences could be kept in a User Preferences table(see row 1 of table 900 FIG. 9), and could all be triggered byperception of objects corresponding to rows in table 510 and/or eventscorresponding to rows in table 610.

In some instances the user might want his personal companion to “wakeup” after a given period of time, or perhaps upon sensing a keyword,sound or motion. In other instances, a user might want a sensor to beawake, but the local instance of their personal companion to precludeuploads or retrievals. Alternatively the user might want the personalcompanion to retrieve information, but to remain silent. Thesepreferences could all be kept in a User Preferences table (see row 2 oftable 900 of FIG. 9), and could all be triggered by perception ofobjects corresponding to rows in table 510 and/or events correspondingto rows in table 610.

In other instances personal companions could be programmed to anonymizeinformation. That could be accomplished in many ways, includingexpressly instructing a personal companion to upload raw data andobservations to the canopy without source identification tags, oruploading with a code that instructs the canopy to delete any uploadedsource identification tags. For example, records in table 510 or 610could be loaded with source identification data (see e.g. column 511 ₇in FIG. 5C) blocked out. In addition, a personal companion could provideassurances to its user that private data about their habits, day-to-dayactivities, personal thoughts, opinions, etc. cannot be traced back tothem.

Dealing with Different Users

Based upon previous questions and answers with its user, a personalcompanion could automatically implement various preferences. Forexample, a personal companion could activate a blackout coating on itscamera, or stop recording image and/or audio data at night, or during amovie. (See above discussion re privacy). As another example, oneperson's personal companion might focus on automobiles, abstracting whattypes and years of automobiles were viewed during the day, while anotherperson's personal companion might substantially ignore automobiles andinstead focus on identifying people he meets during the day. This canall be accommodated by personal companions each having their own datatables as discussed above, and where records from multiple personalcompanions are stored together, the tables can include a sourceidentifier (e.g. column 511 ₇ of FIG. 5C).

Focus could additionally or alternatively be implemented in a UserPreferences table, as in row 3 of table 900 of FIG. 9, where variousfocuses include fruit, friends, co-workers, and events characterized asdanger. The ellipses in column 6 should be interpreted as indicatingthat the table can have more than just seven columns. Anotherpossibility for focus is that a user might instruct his personalcompanion to interpret the signs along a roadway, and notify the userwhen a certain exit is coming up, or perhaps when the speed limitchanges.

Different personal companions could interact with their users accordingto different personality traits. Thus, one personal companion mightinteract in a strict manner, while another personal companion mightinteract in a very warm, kind manner. A personal companion might alsochange the way it interacts depending on circumstance, so that in asituation that is perceived as being dangerous, the personal companioninteracts in a very terse, quick spoken manner, but while reading on ablanket at the beach, the same personal companion might interact in aslower, more lyrical manner. Similarly, personal companions could adjustthe language (e.g. from Spanish to English) or the speech level (fromadult to child) depending on the perceived characteristics of the personbeing spoken to. For example, a personal companion could be instructedto provide an infant with appropriate music or sounds in a caretakermode, and an adult with adult music. Such preferences could beimplemented using a User Preferences table, as in rows 4 and 5 of table900 of FIG. 9 where Interaction Level is adult, and Language is English.

It is further contemplated that personal companions could haverestrictions that accommodate demographics, preferences, orsensibilities of the users. For example, there could be a kids versionthat restricts the type of information, websites, etc., that can beaccessed by a child user. As an example, personal companions could beinstructed to automatically filter out adult images or other types ofinformation.

Personal companions could also be designed to utilize an inside oroutside service to effect translations from one language to another.Such preferences could be implemented using a User Preferences table, asin row 6 of table 900 of FIG. 9 where Translation Service is recorded asGoogle Translator.

Initializing a Personal Companion

Personal companions do not have to start from scratch. When a personbuys a new personal companion, and uses it for the first time, it couldalready benefit from characterizations, preferences and so forth storedin the canopy, or otherwise previously stored by other users. The newpersonal companion could, for example, start out with records from otherusers that have the same Interaction Level and Language, and one or moreof the same focuses. See User Preferences table, rows 4 and 5 of table900 of FIG. 9.

Moreover, it might be very useful during initial setup or latermodification for a personal companion to guide its user as topreferences by asking about preferences utilized by others. For example,a personal companion might say something along the lines of “Many otherusers have reminders to do something upon leaving the house. Do you wantto set a similar reminder?”

Monitoring

A personal companion could monitor a child, older person or indeedanyone for signs of sickness, and report back with crowd-sourced phrasessuch as “She looks flushed”, or “She stopped breathing” based uponmatching up perceived characteristics with crowd-sourcedcharacteristics. Such characterizations could be maintained in theappropriate tables, e.g., objects table for “She looks flushed”, and anactions table for “She stopped breathing”. Personal companions couldalso monitor a child for some other condition, such as happiness orsleepiness.

A personal companion could similarly be used to monitor what goes on ina child's life at school, or at a park, or during a social interaction.In that case the parent's personal companion could direct the child'spersonal companion to look for certain things, and report back inspecified ways, such as through the canopy, or perhaps directly byplacing a phone call or sending an email. See for example, row 7 in theUser Preferences table in FIG. 9.

A personal companion could also monitor a non-human object for somerelevant condition, including for example, water overflowing from abathtub, a stove being left on, a garage door being left open, or apackage being left at the front door.

A personal companion could be used to record ideas, such as when aperson is talking out load while taking a walk or driving a car. In suchinstances the user might expressly instruct the personal companion toretain raw data of audio and/or video for the next x minutes, or untilfurther notice. The user might also specify that the personal companionshould send the audio to a local device or service to be rendered astext.

A personal companion could also assist in short term or long term memoryenhancement. For example, in cases where a user missed hearing somethingimportant in a conversation, or on TV or the radio, he could ask hispersonal companion “What did he say?”

A personal companion could be used to read pre-recorded text, such asthat from an email, or a book. See for example, row 9 in the UserPreferences table 900 in FIG. 9.

Even though preferred personal companions would likely be used toacquire data in a persistent or continuous manner, it is contemplatedthat they could instead, or from time to time, acquire data in anoccasional or frequent manner. As used herein, the term “occasional”means that something occurs or is sampled at a rate of at least once aweek, or at least a cumulative 2% of the time over a one day period. Incontrast, the term “frequent” as used herein means that something occursor is sampled at a rate of at least once a day during a five day period,or at least a cumulative 10% of the time over a one day period.

Most or all of personal companion interactions could be time shiftedrather than done in real time or near real time. For example, one couldretrospectively process input from a personal companion or even a simplewearable camera, to abstract and identify objects and events experiencedon a skiing run. Where the camera was not part of a personal companion,the video could be fed to the personal companion, and then processedafter the event by conversing with the personal companion. Similarly, ata conference where a camera is not appropriate, a personal companioncould be used to record the live commentary, and interact with a userafter later in the day. Where a personal companion is not availableduring the conference, a simple microphone and recording device could beused to record the commentary, which could later be analyzed using apersonal companion.

Helping with Day to Day Tasks

A personal companion could couch individuals in memorizing a poem, astory, speech and so forth. It could listen to its user talk, comparethe language with a correct or at least a preferred version, and thenreport back with crowd-sourced phrases such as “That was really good”,or “That still needs a lot more work” based upon matching upcharacteristics such as accuracy, speed, clarity, and so forth.

A personal companion could remind a user, or someone else to followcertain protocols, such as putting on a seat belt, taking off shoes whencoming into the house or going upstairs, or taking vitamins orprescription drugs.

A person companion could assist fashion-challenged or color blind userwith matching colors on clothes, or choosing wall paper or paints.

Aspects of Physical Devices

A person companion could have multiple cameras pointing in differentdirections, for example a back facing camera so that a user can bewarned when he is about to step into a dangerous area, or about to siton a whoopee cushion. Multiple cameras could also provide an extremelygood stereo perspective, with better distance resolution than humaneyes. Cameras could also capture images using wide angle, zoom and otherviews. Cameras could also have filters for different frequency bands,and could detect ultraviolet, infra-red or other frequencies outsidehuman perception.

A person companion could have multiple microphones to assist indetecting the direction from which a sound is coming, or to zoom in onspecific speech or other sound. Here again, data from microphones couldbe filtered for different frequencies, and could be used to detectfrequencies outside of human hearing range.

As pointed out above, personal companions could be intimately associatedwith a cell phone or other communication device, and could use thatdevice to receive and/or make calls. Thus, for example, a personalcompanion could automatically get on the Internet to order flowers or aChristmas present based on an action preference (see e.g., row 13 of theUser Preferences table 900 of FIG. 9). Similarly, a personal companioncould automatically get on the phone to call for an ambulance based uponan event such as Perla fell and didn't get up. As yet another example, amovie star or other person might set his personal companion toautomatically send out tweets with characterization of events during thelast few hours, thereby creating another way of “following” a person.That could even be used by law enforcement, parents, or others to keeptrack of given individuals without completely intruding on theirprivacy.

Personal companions could be electronically, auditory or in some othermanner coupled to mechanical or electronic effectors, such asautomobiles, robots, wheelchairs and so forth. Thus, for example, if apersonal companion characterized it's user as being drunk, it mightprevent the user's car from starting. Such actions could be set aspreferences, as for example in row 13 of User Preferences table 900 inFIG. 9. As another example, a personal companion could characterize it'suser as too hot, and turn on a cooling fan.

Personal companions would preferably be worn in a manner that obscurestheir presence, or at least makes them non-obvious. Thus, for example,the sensor module 320A in FIG. 3A is made to appear as an ornamentalpin.

Answering Specific Questions

Since personal companions inherently utilize crowd-sourcing to obtaininformation, they can readily be used to summarize what correlationsothers have made. For example, a user might ask his personal companion aquestion such as “How many people associate xyz product with breakingeasily?” That would be simple query to put against a database table suchas table 710 in FIG. 7 (see especially row 14), and could be enhancedusing a semantic equivalence dictionary.

Since personal companions could persistently or even continuouslycharacterize object and actions, they might well be able to answerquestions such as “Where did I leave my watch?” or “Where is Julie”?That functionality could be especially facilitated by appropriateentries in a User Preferences table, such as row 11 of the table oftable 900 of FIG. 9. As with other data in the User Preferences table,the designation to keep track of the wristwatch could most efficientlybe entered into the table using a verbal question and answer exchangebetween the user and his personal companion.

Personal companions could also be of great assistance to people withfaulty eyesight or hearing. For example, a blind person could pick up anorange, and ask his personal companion what it is. A deaf person mightask questions of his personal companion, and get the answers written outon a display screen.

Reminders

Although the world already has several excellent calendaring andreminder programs, one advantage of a personal companion is that itcould be context-aware, and trigger reminders accordingly. For example,a personal companion might remind its user to turn out the lights, heat,air conditioning etc upon leaving the house. An example is in row 12 ofthe User Preferences table 900 of FIG. 9. As another example, a personalcompanion might ask its user if he wants to open the garage door whenthe user's car is about a block from home.

A personal companion could also remind its user of annual or monthlyevents, as for example birthdays or holidays. Prior art calendars can dothat as well, but only if they are specifically instructed by the useror someone else to do so. A personal companion could infer whatreminders to calendar, as for example by observing that there is abirthday around June 9^(th) of every year.

Recommendations and Warnings

There are many systems currently in place that allow individuals to makerecommendations to others. For example, many web sites solicit and makeavailable recommendations regarding plumbers, doctors and other workers,many other sites that do similar thing with respect to restaurants,vacations, and so forth.

Personal companions can go one step further, by virtue of their beingcontext-aware. Thus, if a person tells his personal companion that he isgoing to go to xyz restaurant, the personal companion could respond thatthe line there is at least a half hour, based upon observations of otherpersonal companions of people standing in line. Then based on similarinformation in other restaurants, the personal companion might say“Would you consider going to ABC restaurant instead. The wait there isonly 15 minutes.”

A personal companion might also make a vacation recommendation, such assaying “Don't go to Julien today. It's too crowded and overcast” basedon the user's prior characterizations of vacations as being “toocrowded” or “overcast”, and based upon crowd-sourced characterizationsfrom other personal companions that are already in Julien.

Along similar lines, a personal computer might make purchaserecommendations based on the characterizations of others. For example itmight say “There are 20% negative characterizations of the xyz product,and 80 positive or neutral characterizations.” As another example, aperson shopping in a store might pick up a jar of peanut butter, only tohave his personal companion say something along the lines of “52% ofpeople characterized that product as being delicious”, or “Ralphs isselling that same product today for $2.39.”

Similarly, based upon its user characterizing many books as being “toohard”, a personal companion might advise that a book being held by theuser at a bookstore “has been characterized by many others as being toohard.” A similar situation could exist with respect to a personalcompanion advising that a TV show or movie is “too violent” becauseothers have made that characterization.

A personal companion could focus on recording and characterizingbiometrics of its user, for example, blood pressure, heart rate,temperature, etc., and warn when they get out of whack. In a similarmanner, a personal companion could recognize different colors of sputumor other body fluids, and/or interpret coughing sounds, and then askappropriate questions regarding additional signs or symptoms, and makeappropriate recommendations for treatment or further evaluation. Therecommendations could be for individual doctors or other professionals,for hospitals or other practices, or even for telemedicine individualsor teams that the user might never visit in person. The recommendationscould be based at least in part on characteristics and preferences ofthe personal companion user, including for example, age of doctor,gender, estimated cost and so forth. Of course, as with most everythingelse about personal companions, determination of situations for whichwarnings and recommendations are appropriate, and determining whatwarnings and recommendations to make are preferably crowd-sourced.

Once a user has gone to a doctor or some other professional, personalcompanions could crowd-source feedback as to those experiences, and inparticular could prompt for feedback based upon feedback given byothers. For example, a personal companion might say something along thelines of “Dr. Smith was rated by many others as being very thorough. Doyou agree?”

The crowd-sourced data discussed herein could certainly be mined byresearchers to help correlate signs and symptoms with diseases, andtreatments with outcomes. Similarly, crowd-sourced data could be minedby police or other authorities to track down criminals.

A personal companion might also point out non-medical aspects of theuser's appearance, and warn where there a likely problem, such as ashirt inside out, lipstick on wrong, hair needs cutting, too muchperfume, or excessive or unusual body odor. The latter items would ofcourse require either an odor sensor, or stored characterizations as tocrinkling of nose or other features that might be seen in the faces oractions of others. A personal companion could also warn of currentsituations, such as low gas in an automobile, or past occurrences suchas leaving home with the stove still on. See for example, row 10 in theUser Preferences table in FIG. 9.

Still other contemplated examples that rely on a personal companion'sability to be context-aware include warning that plugging in the TVcould overload the circuit, warning that furniture in a showroom wouldbe too large to fit through the doorway at home, or too large or wrongcolor for the room, warn of potential drug interactions when a person isopening several different pill bottles, warning that lifting a givenweight in a gym is too much, or warning that a given food contains toomany calories, or may well cause an allergic reaction.

Other contemplated examples, which would involve characterizations frompersonal companions of other people, include warning that a baby at homehas been crying for more than an hour, a son or daughter is leaving aparty with four other kids, or with alcohol in the car.

A personal companion could view food that a person is eating, or isbeing served, and advise a user with respect to allergies, and specialdiets such as sugar free or gluten free diets.

A personal companion could project future events, such as projectingfuture traffic patterns based upon historical trends, and estimatesprobabilities of events occurring. For example, a person companion mightsay there is a 50% chance of an adverse occurrence if the user walksalone, at night, down a given street.

A personal companion could infer rules, or crowd-facilitate them fromothers. Thus, a driver new to a given country might not know aparticular rule, such as a default speed limit. But his personalcompanion could discover that information based upon observation of theuser's environment (e.g., driving a car on neighborhood streets) andinputs of others through their personal companions.

A personal companion could control equipment or make recommendationsbased on inference about a person. Thus, even though a house thermostatis set to 72° F., a personal companion might cause the setting to beraised, or recommend that the setting be raised, based upon an inferencethat a person in the room in older, and tends to get cold. Similarly aperson companion might recommend that an older person eat dinner earlierin the evening based upon correlations made by personal companions ofothers that older persons do better when they eat dinner at an earliertime.

A personal companion could see that its user is about to send a nastyemail or text, or post a mean comment, and then point out to its userthat the user appears to be in a bad mood, and might want to change thecontent or delay sending the message. A personal companion could alsoadvise the recipient's personal companion that the sender was in a badmood.

Commercializing Personal Companions

One potentially lucrative avenue for making money from personalcompanions is to charge their users, directly or indirectly, for accessto video, audio or other content. Thus, a user might ask his personalcompanion to listen to a song or view a video, and the personalcompanion might report back that the media or other information isaccessible, but only upon payment of a fee.

Another avenue for making money is to charge for preventing data fromgetting onto any of the crowd-sourced/shared databases contemplatedherein, or for removing such data.

Another avenue is to gain revenue by pushing advertisements orrecommendations to users through their personal companions. Or from theother side of the coin, revenue could be realized by charging users tonot receive advertisements or recommendations.

Non-Human Applications of Companions

The systems, methods and apparatus discussed herein are not necessarilydirected to human users. One could have an animal companion, which mightbe affixed to a collar or other clothing of a dog, cat, horse, monkey,bird etc. Although the animal would have far less sophisticatedcommunication capability that most humans, an animal companion couldstill observe the world about the animal, monitor biometrics, and talkto the animal in a human or animal language. For example, if a dog weretrained to drop things that he put in his mouth using the phrase “dropit”, the animal companion could verbally instruct the dog to dropsomething that he shouldn't be chewing on. The dog wouldn't be able toeffectively teach the animal companion, but people in the company of thedog could talk to the animal companion to provide training. Moreover,crowd-sharing could provide an ever increasing wealth ofcharacterizations made by others (human or otherwise).

One could also have companions for inanimate objects, as for examplecars, boats, planes, trains, buildings, and robots. In those instancesthe companions could monitor the environment about object, and alsopossibly temperature, voltage, and other conditions of the object.Companions could also interact with people nearby the object. Forexample, a car companion might be taught to recognize people leaning onthe car, and warn them to stay away. Some of the interactions withnearby people could provide training to the companions.

Epilog

It should be apparent to those skilled in the art that many moremodifications besides those already described are possible withoutdeparting from the inventive concepts herein. The inventive subjectmatter, therefore, is not to be restricted except in the scope of theappended claims. Moreover, in interpreting both the specification andthe claims, all terms should be interpreted in the broadest possiblemanner consistent with the context. In particular, the terms “comprises”and “comprising” should be interpreted as referring to elements,components, or steps in a non-exclusive manner, indicating that thereferenced elements, components, or steps may be present, or utilized,or combined with other elements, components, or steps that are notexpressly referenced. Where the specification claims refers to at leastone of something selected from the group consisting of A, B, C . . . andN, the text should be interpreted as requiring only one element from thegroup, not A plus N, or B plus N, etc.

1. A method of using a computer system and first and second persistent,passive, electronic information capturing devices (PPIC devices) toprovide guidance to a first person, comprising: using the first PPICdevice to gather information (first person information) about anenvironment encountered by the first person; using the computer systemto identify a circumstance based upon abstractions from the first personinformation; using the second PPIC device to gather information (secondperson information) about an environment encountered by a second person,wherein the first one of the PPIC devices is different from the secondone of the PPIC devices, and the first person is different from thesecond person; and using the computer system to utilize (a) thecircumstance and (b) the second person information to automaticallyprovide the guidance to the first person.
 2. The method of claim 1,wherein the first persistent, passive information capturing device isactivated by a question and answer conversation with the first person.3. The method of claim 1, wherein the second persistent, passiveinformation capturing device is activated by a question and answerconversation with the second person.
 4. The method of claim 1, whereinthe first persistent, passive information capturing device and thesecond persistent, passive information capturing device comprises anartificial intelligence system that is trained using crowd-sourcedquestion and answer conversations.
 5. The method of claim 1, wherein thefirst persistent, passive information capturing device captures anidentification of a circumstance, wherein the identification is capturedfrom passive comments by one or more people.
 6. The method of claim 1,wherein the first persistent, passive information capturing devicecaptures an incidental identification, wherein the incidentalidentification is captured from one or more visual cues in the physicalenvironment.
 7. The method of claim 6, wherein the one or more visualcues comprise text.
 8. The method of claim 6, wherein the one or morevisual cues comprise an image.
 9. The method of claim 1, wherein atleast one of the first and second PPIC devices comprises a body-wornmicrophone.
 10. The method of claim 1, wherein at least one of the firstand second PPIC devices comprises a body-worn camera.
 11. The method ofclaim 1, wherein the circumstance comprises a medical issue and theguidance comprises a suggested course of action regarding one or moretreatment options.
 12. The method of claim 1, wherein the circumstancecomprises a time-based issue and the guidance comprises a suggestedcourse of action to minimize an amount of time associated with theissue.
 13. The method of claim 1, wherein the circumstance comprisesfinance-based issue and the guidance comprises a suggested course ofaction based on one or more financial priorities.
 14. The method ofclaim 1, wherein the first PPIC device and the second PPIC device arevehicle-mounted.
 15. The method of claim 1, wherein the guidance isprovided audibly.
 16. The method of claim 1, wherein the guidance isprovided visually.
 16. The method of claim 1, wherein the guidance isprovided by directly controlling a device.