Method and Apparatus for Obtaining Information from the Web

ABSTRACT

An intelligent conversation system augmenting a conversation between two or more individuals uses a speech to text block configured to convert voices of the conversation into text, a determination circuit configured to determine topics from the text of the conversation, search parameters determined by the determination circuit from the topics are sent to an Internet, search results corresponding to the search parameters are received from the Internet; and a memory configured to store the search results received from the Internet. The speech to test block is configured to convert the search results to speech. An earphone is configured to transmit the speech to one of the two or more individuals. The speech is used by one of the individuals to augment the conversation.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of application Ser. No.13/013,886, filed on Jan. 26 2011, entitled “Method and Apparatus forObtaining Statistical Data from a Conversation” which is invented by atleast one common inventor as the present application and is incorporatedherein by reference in their entirety. The present application filed onMar. 24, 2017 is related to the two earlier co-filed U.S. applicationsentitled “Apparatus for Aiding and Informing a User” with applicationSer. No. 13/013,903 filed on Jan. 26, 2011 and “Apparatus forElectrically Coupling Contacts by Magnetic Forces” with application Ser.No 13/013,895 filed on Jan. 26, 2011 and invented by at least one commoninventor as the present application and incorporated herein by referencein their entireties. In addition, the present application filed on Mar.24, 2017 is also related to another continuation of application Ser. No.13/013,886, entitled “Method and Apparatus for Obtaining Informationfrom the Web” with application Ser. No. 14/332,427 filed on Jul. 16,2014.

BACKGROUND OF THE INVENTION

During a conversation within a group, arguments occur because of amisunderstood word, a misheard word, lazy listening, interruptions, orsomeone commanding large portions of the conversation. This leads toraised voices, obscenities and further interruptions.

A portable wireless system is a device that contains many differentblocks that are used to perform several functions. For example, portablewireless systems include the iPod from Apple Computer Inc. or theAndroid phone from Google. In addition, the portable wireless system canbe customized to perform a particular function such as reading a book ina device called Kindle from Amazon.

The iPad and Android phone use Apps (Application software) loaded intothe portable wireless system to perform functions or tasks. Similarly,the App's software can be downloaded as an App to a person's portablesystem to benefit and aid the person in performing functions or tasks.

BRIEF SUMMARY OF THE INVENTION

A first embodiment uses a system (for example, a portable wireless cellphone downloaded with this inventive App) to monitor various parametersof a conversation, for example distinguishing voices in a conversationand reporting who in the group is violating the proper etiquette rulesof conversation. These results would indicate any disruptive individualsin a conversation. So they are identified, monitored, trained to preventfurther disturbances, and their etiquette is improved to prevent furtherdisturbances. Some of the functions the system can perform include:report how long one has spoken, report how often one interrupts, reporthow often one raises their voice, count the occurrences of obscenitiesand determine the length of silences.

In another embodiment, a system can provide meaning of words, sendemail, identify fast talkers, train to reduce the volume of a voice,provide a period of time to a speaker, beep when someone uses aprofanity, request a voice to speak up, provide grammatical corrections,provide text copies of conversation, and eliminate background noises.These are features that could help improve the operations of a group incommunication. Such an application can be carried out with a portablewireless system or in a telephone conference call.

The inventive technique utilizes voice recognition, speech to text, andother blocks emulating various Finite State Machines (FSM) that can beused to interact with the conversation. Other embodiments of thisinvention can be used in conjunction with music players, stored audiorecordings, web browser results or interact radio output.

Another embodiment is a portable system consisting of components thatare magnetically and electronically coupled together. The electroniccoupling allows signals and power/ground to couple between the variouscomponents. The magnetic coupling allows the portable system to comeapart without damaging the components when an element of a componentgets unexpectedly snagged after passing an obstacle. The components canbe easily collected and reassembled to reconstruct the system.Furthermore, the positioning of the magnets in the magnetic couplingprovides a lock and key combination in that the pattern and anti-patternbetween mating surface couplings can be designed to only allow oneorientation when the units are coupled. This restriction in orientationprevents the power leads from shorting to ground or other signal leadsduring the reassembly thereby preventing damage to the system.

In yet another embodiment is an apparatus that allows the user tointeract with an electronic system, such as a music player, and benotified when a potentially dangerous situation may be occurring in theimmediate vicinity of the user. This is particularly important when theuser is listening to music using a loud volume setting thereby makingthe user oblivious to any dangerous conditions or situations surroundingthem, for example, a car beeping at an intersection. The apparatusmonitors the surrounding environment while the user is listening totheir music and interrupts the user's interaction with the music playerand redirects the user's attention to the audio of the newly determinedpotentially dangerous situation. The user decides on the urgency of thissituation, decides what needs to be done, and responds as they see fit.

BRIEF DESCRIPTION OF THE DRAWINGS

Please note that the drawings shown in this specification may not bedrawn to scale and the relative dimensions of various elements in thediagrams are depicted schematically and not necessary to scale.

FIG. 1a shows a portable wireless system containing componentsillustrating this inventive technique.

FIG. 1b shows a portable wireless system containing other possiblecomponents illustrating this inventive technique.

FIG. 2a illustrates a system with an interface and DSP/Memoryillustrating this inventive technique.

FIG. 2b shows a system with an audio signal analyzer and VoiceRecognition Block illustrating this inventive technique.

FIG. 2c depicts a wireless system with an addition of a Statistical DataBlock illustrating this inventive technique.

FIG. 3 shows the volume waveforms of three persons speaking in aconversation illustrating this inventive technique.

FIGS. 4a-c corresponds to the insert 3-9 of FIG. 3. FIG. 4a depicts thevolume waveform of person 1 leading the volume waveform of person 2 by δunits given in using this inventive technique.

FIG. 4b illustrates person 1 and person 2 overlapping by 0 units usingthis inventive technique.

FIG. 4c shows person 1 lagging person 2 by δ units illustrating thisinventive technique.

FIG. 5a depicts the lagging waveforms given in FIG. 4c illustrating thisinventive technique where persons 1 and 2 maintain a constant volumelevel when talking.

FIG. 5b shows this inventive technique where persons 1 and 2 presentvarying volume levels when talking. Noise is also included if notfiltered.

FIG. 5c shows the time magnified view of FIG. 5b illustrating thisinventive technique.

FIG. 6a illustrates the volume waveforms of two persons in aconversation incorporating this inventive technique.

FIG. 6b shows a table displaying the results, of a conversation betweenthe two persons in FIG. 6a using this inventive technique.

FIG. 7 depicts a flowchart obtaining and storing parameters from aconversation illustrating this inventive technique.

FIG. 8a shows the flow chart of the wait state after interruptionillustrating this inventive technique.

FIG. 8b depicts one possibility of the internal flowchart of the StoreAll Parameters Block illustrating this inventive technique.

FIG. 8c depicts one possibility of terminating the flowchartillustrating this inventive technique.

FIG. 9a shows a wireless system with a speech to text and requestcircuit to perform a function illustrating this inventive technique.

FIG. 9b illustrates a flowchart to respond to sending an email usingverbal commands illustrating this inventive technique.

FIG. 10a depicts a wireless system with a software component to performa function or task (called Apps) illustrating this inventive technique.

FIG. 10b shows a flowchart to provide the meaning of a word illustratingthis inventive technique.

FIG. 11 illustrates a table providing various Apps illustrating thisinventive technique.

FIG. 12a depicts the side and front view of an ear plug illustratingthis inventive technique.

FIG. 12b illustrates the ear plug inserted in the auditory canalillustrating this inventive technique.

FIG. 12c shows a head view of a person wearing a portable wirelesssystem illustrating this inventive technique.

FIG. 13a depicts the ear plug inserted in the auditory canal and coupledto the eyeglass illustrating this inventive technique.

FIG. 13b illustrates the ear plug; coupled to the wire 12-7 illustratingthis inventive technique.

FIG. 13c shows a close up, of the magnetic connector cord provingelectrical contact illustrating this inventive technique.

FIG. 13d depicts the relative position of the magnetic connector cordand orientation during contact illustrating this inventive technique.

FIG. 14a shows a top view of a person wearing the portable wirelesseyeglass system illustrating this inventive technique.

FIG. 14b illustrates the components in the right ear plug illustratingthis inventive technique.

FIG. 14c depicts the components in the left ear plug illustrating thisinventive technique.

FIG. 14d shows the Electronic Block Diagram of the eyeglass illustratingthis inventive technique.

FIG. 15a shows a top view of a person wirelessly interacting with a webpage on a second device illustrating this inventive technique.

FIG. 15b shows the Electronic Block Diagram of the eyeglass illustratingthis inventive technique.

FIG. 15c depicts the components in the right/left ear plug illustratingthis inventive technique.

FIG. 16a shows an electronic circuit (for example, a music player)coupled to the Interface Block illustrating this inventive technique.

FIG. 16b illustrates a music player coupled to the Interface Block ofone system that interfaces wirelessly to the user wearing eyeglass of asecond system illustrating this inventive technique.

FIG. 16c shows a block diagram of the system that disables the musicplayer when the external audio signals are loud illustrating thisinventive technique.

FIG. 17a illustrates another perspective of a block diagram of thesystem that disables the music player when the external audio signalsare loud illustrating this inventive technique.

FIG. 17b depicts the external volume and whether the user is listeningto the music or the microphone illustrating this inventive technique.

FIG. 18a shows a block diagram of one embodiment of the system thatsends out the last several discussion topics to the web illustratingthis inventive technique.

FIG. 18b shows the block diagram of the system that receives additionalinformation about the last several discussion topics from the webillustrating this inventive technique.

FIG. 19a shows a flow chart that recalls the last few topics from localmemory illustrating this inventive technique.

FIG. 19b shows a different embodiment of a flow chart that recalls thelast few topics from the web illustrating this inventive technique.

FIG. 20 shows an additional embodiment of a flow chart that identifieserrors in the conversation and makes suggestions illustrating thisinventive technique.

DETAILED DESCRIPTION OF THE INVENTION

This inventive embodiment incorporates a system that is used to analyzea conversation held between two or more people. The system provides adetailed summary of the results of a conversation including but notlimited to: reporting the identity of the voices in a conversation,reporting how long each of the voices in a conversation has spoken,reporting how often the voices in a conversation interrupt, reportinghow often the voices in a conversation raise their voice, reporting howoften the voices in a conversation speak obscenities and reporting howoften the voices in a conversation are silent.

The system contains all the required components to extract the contentof the verbal discussion of a group. The content is further segregatedaccording to which person was talking, who remained silent, whodominated the conversation, etc. These are all features that could helpimprove the operations of a group in communication. Such an applicationcan be carried out in a multiple of systems. For example, the inventioncan be used in a portable wireless system or in a telephone conferencecall.

Another embodiment of a wireless system 1-1 is illustrated in FIG. 1 a.The system could also be portable and handheld. Like numbers refer tolike elements throughout. An antenna 1-2 can transmit/receive radiosignals 1-3. The system also has a microphone 1-4 and a speaker 1-5.Earphones (not illustrated) can be used as a listening device and willbe presented later. The system also comprises several blocks (only asub-set shown) such as the MPEG (Motion Picture Experts Group) Block 1-6which can be used to process video and also includes one of the audiocoding schemes such as AAC (Advanced Audio Codec). A Processor Block 1-7handles some of the data processing, scheduling and additionalcontrolling issues. The Accelerometer Block 1-8 can be used to detectorientation and movement. A Memory Block 1-9 holds the data, softwareroutines such as Apps, boot up routines and configuration data. The RFModule (Radio Frequency) Block 1-10 contains all the transceivercomponents to drive and respond to the signals of an antenna 1-2.Finally, a Battery 1-11 is used to power the system. Although, in somecases, a power cord to a wall outlet can provide power or a source ofenergy.

Additional embodiments can be achieved by replacing the conversationmonitoring program with other functions or tasks as will be describedlater. Examples include: providing meaning of words, sending email,identifying fast talkers, training to reduce the volume of a voice,providing a period of time to a voice, beeping after someone uses aprofanity, requesting a voice to speak up, providing grammaticalcorrections, providing text copies of conversation, and eliminatingbackground noses.

Another version of a portable handheld system 1-12 is shown in FIG. 1 b.Internally, a DSP (Digital Signal Processing) Memory Block 1-13 is usedin conjunction with the DSP Block 1-14. The Memory Blocks 1-9 and 1-13are just one example of a way to partition the memory. Various othermethods to integrate the memory components together to perform specifictasks are possible. For example, one large memory can be used to combineall the individual memories into one, although the performance of thesystem may be impacted. Another example is to segregate the memoriesfrom each other and provide distinct memories to each Processing/DSPBlock. The handheld system can also contain a Display 1-15 and a Camera1-16. Also the system has at least one A/D D/A (Analog to Digital,Digital to Analog) Block 1-18 along with converter Block 1-19 and anAudio Amp Block 1-17. The DSP Block 1-14 can be used to process digitalsignals available from the conversation after their analog audio signalsare translated into digital format by the A/D Block 1-18. In addition, aSpeech to Text Block coverts the speech directly into text (notillustrated). The Display 1-15 serves as one of the interfaces to thesystem.

FIGS. 2a-c illustrates several portable handset systems that utilizeDSPs to analysis voice and audio signals. In FIG. 2a , the system 21comprises an Interface Block 2-2 that interfaces any signal that entersor leaves the system. In FIG. 2a , the interface Block 2-2 interfacesthe microphone and speaker to the internal blocks of the system. Someadditional examples include; display screens, antennas, or earphones. Inthis case, the internal blocks shown are the DSP Block 1-14 and itsMemory Block 1-13. The DSP Block contains components that can processdigital signals of voice very efficiently. Voice signals received fromthe microphone are analog in nature. The diagrams are simplified suchthat many blocks that are required are not illustrated in order tosimplify the diagrams. For example, not illustrated in the FIG. 2a arethe A/D and D/A Blocks that are used to convert the analog voice signalsinto digital voice signals (for the DSP) and vice versa.

In FIG. 2b , the system 2-3 contains a Processor Block 1-7 coupled tothe Interface Block, an Audio Signal Analyzer Block 2-5 and a VoiceRecognition Block 2-4. The Voice Recognition Block 2-4 is used torecognize voice or speech received from the microphone, translate thevoice into text, and identify the individual. In the process ofidentification of the voices, when a voice is being analyzed, the voiceis compared with previous samples of voice recordings that are stored inmemory (not shown). If there is a match, the voice is assigned the name,provided in the memory. Otherwise, if a match is not made, the systemwill ask for an identity of the person. The system then stores the nameinto memory with components of the voice characteristics for futurereference. The Audio Signal Analyzer Block 2-5 is used to eliminate anybackground noise that the system may be receiving thereby providingbetter voice quality for the system to capture. For instance, if thereis a constant hum in the background, the system can use the audio signalanalyzer to null the constant hum out.

FIG. 2c shows a Processor Block coupled to a DSP Block in a system 2-6.The DSP Block with the Voice Recognition Block 2-4 can be used togetherto identify or distinguish the different voices in a conversation. Oncethese voices are identified and the Memory Block 2-8 is used topermanently store data related to the different voices in theconversation or temporarily hold data during calculations. Theadditional block in this system is called the Statistical Data Block2-7. The Statistical Data Block accesses the Memory Block 2-8 to providestatistics concerning the conversations the system 2-6 has beenanalyzing. The Statistical Data Block 2-7 is used with the ProcessorBock and Memory Block 2-8 to provide information or statistics such as:reporting the identity of the voices in a conversation, reporting howlong the voices in a conversation have spoken, reporting, how often thevoices in a conversation interrupt, reporting how often the voices in aconversation exceed the minimum level, reporting how often the voices ina conversation uses obscenities and reporting how often the voices in aconversation are silent. The Processor Block couples these parameters ofthe voices in a conversation to the Interface Block. The Interface Blocksends the results to a transducer, such as, the Display Block 1-15, thespeaker or RF Module Block 1-10.

FIG. 3 illustrates three different people speaking in a conversation3-1. The vertical axis displays the volume of each person in dB. Thehorizontal axis corresponds to time. Several times are provided: 0, andt1-t5. The horizontal dotted line 3-2 in each graph corresponds to theminimum volume that the system will detect. Starting from time=0, person3 speaks t₁. The persons 1 and 2 during this time interval are below theminimum volume; thus the system will not detect these two persons. Inanother embodiment, a second lower level (not shown) can be set todetermine if the person is whispering. However, the amplitude 3-3 ofperson 3 during this time period is greater that of the minimum 3-2 sothe system can detect the voice of person 3. The information for person3 is stored in memory where the memory has a tag identifying that thisportion of memory is related to person 3. This information includes:length of time speaking, volume of speaker, etc. In the next interval,t₁ to t₂, person 1 talks. Person 1 initiates his discussion byincreasing their volume along the rising edge 3-10 until the volumeremains at a constant amplitude as indicated by the horizontal line 3-7.Finally, person 1 completes their discussion at t₂ and decreases theirvolume along the falling edge 3-11. The information for person 1 isstored in memory where the memory has a tag identifying that thisportion of memory is related to person 1. In the third interval, t₂ tot₃, person 2 initiates their discussion by increasing their volume alongthe rising edge 3-12 until the volume remains at a constant amplitude asindicated by the horizontal line 3-5. The information for person 2 isstored in memory where the memory has a tag identifying that thisportion of memory is related to person 2, as performed in the previousintervals for the other persons. The next interval, t₃ to t₄ showsperson 3 speaking at the volume 3-4. Finally, in the last interval, t₄to t₅, person 2 is speaking at volume 3-6. Note the dashed oval 3-9,encompasses a portion of the amplitude 3-7 and the falling edge 3-11 ofperson 1 and amplitude 3-5 and the rising edge 3-12 of person 2. Inparticular, the overlap or lack therein between the falling edge 3-11and the rising edge 3-12 is further illustrated in the magnified images4-1 provided in FIGS. 4a -c. Since time is the independent variable, thetime associated with the previous intervals is recorded and used todetermine the total duration of the various parameters.

FIG. 4a illustrates a magnified version 4-2 of the oval 3-9 in FIG. 3.The falling edge-3-11 leads the rising edge 3-12 providing a lead gap4-5 of δ. That is, when person 1 stops talking, there is a gap of δseconds before person 2 starts to talk. The value of a typical gap δbetween speakers is set to about a second. If the gap δ is one second orless, then person 2 is considered to be interrupting person 1. In themagnified version 4-3, the relationship between the falling edge 3-11and the rising edge 3-12 is adjusted to have a gap 4-6 that decreases tozero as shown in FIG. 4b . Just as person 1 utters the last word, person2 starts talking. Lastly, in 4-4, the falling edge 3-11 of person 1 lagsthe rising edge of person 2 as illustrated by the lag gap 4-7 of −δ inFIG. 4 c. In this case, both persons 1 and 2 are both talkingsimultaneously and in this case, |−δ| can vary from 0⁺ seconds andhigher. FIGS. 4b and 4c offer a pictorial representation of identifyingwhen interruptions occur. Two or more interrupts can occursimultaneously. In some cases, the identity of the interrupters can bedetermined by analyzing the voice characteristics of each voice duringan interruption when each of the interrupters has the loudest voice fora short period of time. The system can request certain speakers toremain silent. Or if the identity cannot be made, the system can ask fororder in the conversation to be restored.

The horizontal lines 3-7 and 3-5 in the lagging gap case 4-4 of FIG. 5aindicates that the two persons are always speaking using a constantvolume during their period of discussion. This is typically not the casein real life. FIG. 5 b, replaces the ideal horizontal lines 3-7 and 3-5with the jagged lines 5-3 and 5-4 as illustrated in the view 5-2 topresent the more realistic waveforms corresponding to the variations ofvolume levels of the two persons. In some cases, these realisticwaveforms can be averaged over time and presented as a constant overthis time period. A magnified version of 5-2 is provided in 5-6 of FIG.5 c. The more realistic waveforms are expanded and several newdemarcations are illustrated.

The first demarcation is the dashed line 5-7 in each set of waveforms.This represents the maximum volume level above which one would beconsidered to be raising one voice if exceeded for a certain minimumtime period. Another is the vertical dotted line 5-5 that is placed nδunits after t₂ where one of the persons has stopped talking. And asindicated earlier, line 3-2 provides the minimum volume a person shouldhave in order to be heard or identified by the system.

After an interruption, where in this case, the interrupter carries theconversation, the delay may take a little longer to recover theconversation. Thus, the n in nδ would be greater than or equal to 1 inorder to ensure that there are no more interrupters. Once the value of δhas been set (usually to one), the system can proceed to determine thelength of the conversation. However, if the interrupter is subdued, thenthe volume of the interrupter would decrease as the volume of theinterrupted voice increases. This latter case is not illustrated butwould also need a time slightly greater than nδ to recover theconversation.

Although the waveforms in FIGS. 5b and 5c are more realistic, theaveraged horizontal lines will be used in the waveform 6-1 given in FIG.6a to simplify the presentation without complicating the diagram. FIG.6a illustrates a conversation between two persons, Person 1 speaksbetween 0 δ−2 δ at a first volume level of 6-2. A period of silenceoccurs between 2 δ and 3 δ. Then, person 2 raises their voice to asecond volume level above the 5-7 maximum line between 3 δ to 5 δ.Another period of silence occurs between 5 δ and 7 δ. Between 7 δ and 8δ, person 1 raises their voice to a third volume level 6-3 above thelevel 5-7. Another gap of silence between 8 δ and 9 δ. Person 2 thenraises their voice to a fourth volume level 6-6 between 9 δ and 10 δ.Person 2 then increases to a fifth volume level 6-7 between 10 δ and 11δ while person 1 interrupts and raises their voice to a sixth volumelevel 6-4, simultaneously. After a recovery period of δ between 11 δ and12 δ, person 2 raises their voice to the volume level 6-8 between 11 δand 12 δ after which the conversation ends.

FIG. 6b illustrates a tabular format 6-9 which provides the actionperformed and its duration. δ is set equal to 1 second. In total thereare 4 seconds of silence including the one after the interruption. Theperson 1 holds a conversation for 3 seconds, disregarding the periodduring the interruption between 10 δ and 11 δ while 1 person raisedtheir voice for 2 seconds. In the case for person 2, the conversationwas held for 4 seconds again disregarding the interruption and person 2raised their voice for 3 seconds. Person 2 never interrupted whileperson 1 interrupted for 1 second.

The flowchart 7-1 in FIG. 7 presents one embodiment of a method that candetermine the duration for each of the various actions given in FIG. 6bin an actual conversation. Note that any references to the elements ofthe flowchart, those elements are italicized. Similar embodiments forflowcharts, although not shown, can be generated for those that havequiet voices, counting the obscenities or if someone whispers. Appsprovide one way of downloading software into a system that representsone of the embodiments of the flowchart. The Apps are available bydownloading the software either by the use of a tape, magnetic storage,memory stick, on-board memory, DVD or even wirelessly.

The system begins at Start 7-2 and proceeds to the Set Start Time.The >1 Talking Decision 7-3 determines if more than one person istalking. If so, move to Alert Users so that the start of a newconversation measurement evaluation can about to begin. Then once theflow returns to >1 Talking Decision 7-3, if only one person is talkingthen proceed to the Voice Min Decision 7-4 to see if the voice is lessthe minimum level (see 3-2 in FIG. 6a ). If so, there is silence, theduration is measured until the silence is broken. The flow then moves toStore all Parameter and then the data regarding this and all silenceperiods are stored after which the flow moves to A. The Done Decision7-13 determines if the conversation is done, if not then proceed toVoice Min Decision 7-4. If the volume of the voice is greater theminimum volume, move to Voice Max Decision 7-5 to see if the volume ofthe voice is greater than the maximum volume. In either case, identifyif the voice is normal or raised in volume after passing through eitherVoice Normal or Voice Raised, then proceed to Analyze Voice. Here thevoice is matched against the known voices in the database in KnownPerson Decision 7-7. If none of the voices are matched, then move to AddNew Person and add this new person into the database. The systemrequests the information directly from the new person by asking the newperson to identify themselves which is part of the training period. Theinteractions to the system can be either voice controlled (speech) orphysically controlled (keyboard, mouse, etc). The system has voicerecognition in the DSP or processor and the system asks for the identityof the new person during a period of silence so the system can writetheir identity into the memory.

The next step is to move to Any Interruptions Decision 7-8 to ask if anyinterruptions have occurred. If not, then continue monitoring thetalking until the current person is done talking. Once the talking iscomplete move to Store all Parameters, then store all the parametersinto memory after which the flow moves to A. However, if there have beeninterruptions at Any Interruptions Decision 7-8, then the system wouldmove to Analyze Interrupter and then move to Known Voice Decision 7-10.Here the voice is matched against the known voices in the database. Ifnone of the voices are matched, move to the Add New Person Block andthen add this new person into the database. The system identifies thename of the interrupter by having the system request the informationdirectly from the interrupter or someone else in the conversation.

Once the identity of the interrupter has been determined, the flow movesto Person Interrupting Decision 7-11 and asks if the person is stillinterrupting. If not, then move to Store All Parameters and store in thecorresponding memory space all the parameters into memory. The flow thenmoves to A. If the person is still interrupting passing in PersonInterrupting Decision 7-11, then move to C (given in FIG. 8a ). In FIG.8a , the flow enters Lag Decision 8-2 of the partial flowchart 8-1. Ifthe Lag is less than 0, move to Wait δ and then wait for a time periodof δ and check again, Once Lag is greater than 0, move to Wait (n+1) δ8-3 and wait an additional δ (n=0) or more (n>0). Then move to D (inFIG. 7). The flowchart in FIG. 8a starts during the interruption. Thesystem waits at least one δ or more before proceeding to PersonInterrupting Decision 7-11 again. If there are no interruptions, thenstore all the parameters in the corresponding memory space for theinterrupted person into memory.

If after returning to Done Decision 7-13, the conversation is completeand one flows to B given in FIG. 8c in the flowchart 8-13. The clock isstopped in End Start Time, allowing the determination of the total timefor the conversation in Calculate Time Duration. The number of personsin the conversation is summarized in Determine # of Persons. Thesoftware determines the length of time each person: controls theconversation time (Determine Conversation Time of Each), raises theirvoice (Determine Raised Voice Time of Each), interrupted others in theconversation (Determine Who Interrupted) or was the recipient of aninterruption (Determine Interruption Time of Each). The Display Resultsof Discussion 8-14 provides the results of all the statistical data on ascreen or is announced verbally by the portable system.

In FIG. 7, there are several occurrences of Store All Parameters. InFIG. 8b , the flowchart 8-4 provides one embodiment of the flow withinStore All Parameter 8-5. First, the voices are identified and segregatedin identity of Voices 8-7, then Speech To Text Translation 8-8translates the voice into text so the content of the statements in theconversation can be evaluated. The text is analyzed to see if any of thepersons in the conversation desired the system to perform a specificrequest in Any Requests Decision 8-9. If so, the system performs theserequests in Perform Request, the flow then continues to Enter Durationof Event where the duration of each of these events is calculated.Finally, control moves to Place in Memory so that the statistical dataconcerning the conversation such as the period of silence, the durationof conversation by each person, the number of times a person raisestheir voice or interrupts is placed into the memory of the system andcan be stored and/or displayed on a screen.

An example of a system 9-1 to perform a request is provided in FIG. 9a .The conversation of the group enters the Processor Block through theInterface Block. The Voice Recognition Block 9-2 performs voicerecognition and can perform additional analysis (volume amplitude, A/Dand D/A, etc). The speech is applied to the Speech to Text Block 9-3,and the text is applied to the Request Block 9-4 that interprets acommand. Here the Request Block looks for the command statement which isthen followed by the desired request.

An example is provided in the flowchart 9-5 provided in FIG. 9 b. Theconversation is applied to Voice Recognizer 9-5 which performs thecharacteristics mentioned in the previous paragraph. The voice is passedto Convert to Text 9-6 and Store in Memory 9-7. The text format allowsthe recognition that the Person slates “Computer Command, Email the laststatement” 9-8. The person may think that the last statement discussedwas important and wants a record of the last statement sent to theiremail. The term “Computer Command” is recognized by the system whichunderstands that the immediate statement following this command is afunction that the person wants performed. The immediate statementfollowing the command is “Email the last statement.” The system flows toInterpret the Request 9-10 to decipher the last statement to determinethe request. Once the request is understood, the last statement and thedetermined task is stored in memory in Location in Memory 9-11 and sentto Content to Processor 9-12 to create the email. Finally, the email issent using the RF Module 9-13.

Another embodiment of a system 10-1 is provided in FIG. 10a . All blocksare similar as to the system given in FIG. 9a except for the addition ofthe Software Block 10-2. The Software Block can occupy a section ofmemory and contain the Apps. Once one of these Apps is invoked toperform a function or task, the program in the software Apps isperformed by the processor to create the requested function or task.

FIG. 10b gives another embodiment for a flowchart 10-3. This time theflow moves to Person states “Computer Command, Meaning of the next word”10-4. As before, the term “Computer Command” is something the systemeasily recognizes. The system next Interprets the Request 9-10 and thenuses Software 10-5 provided by the Apps to Perform Request Apps 10-6.Once the meaning of the word is performed, the system flow moves toAnnounce Response 10-7 which notifies the user verbally or via thedisplay screen.

FIG. 11 depicts a table 11-1 with a number of requests and thecorresponding function that the system performs. These requests would bepreceded by the statement “Computer command.” The request “Meaning ofnext word” provides the meaning of the word. The Fast talker identifiesthe fast talker in the conversation. The request “Train Volume of Voice”provides the ability of the system to train one of the persons to reducetheir volume level. The request “Timer to Hold Floor” provides a personwith a specified amount of time, for example, 30seconds, to command thefloor. The “Beep for curse words” identifies any spoken curse words andattempts to beep them out by inferring their context within the givenstatement. The request “Stop Whisperine” determines the person that hasthe lowest overall volume and the system requests that they increasetheir volume. The request “Grammatical correction” analyzes thestatement following this phase and provides corrections if necessary.Finally, the last request illustrated is “Background noise” which causesthe system to identify non-human voices and determine if that noise canbe eliminated. Once the noise is eliminated, the conversation can beheard or stored in memory. Many other requests can be created ifdesired.

FIG. 12a illustrates two views 12-1 of an ear plug 12-2, the side view(top) and the front view (bottom). The tip 12-3 is pushed into theauditory canal 12-9 of FIG. 12b and the flexible body 12-4 of the earplug is fitted against the auditory canal. The body 12-4 can containselectronic systems to manipulate signals transferred between the tail12-5 and the tip 12-3 of the ear plug. The tail 12-5 can contain amicrophone (not shown) to pick up external audio signals. The tail 12-5has a mating surface that can also contain electrical contacts andmagnets. The mating surface is held magnetically to a mating surface ofa mate (described in detail later). This coupling of the mating surfaceof the tail to the mating surface of the mate provides power and/oradditional signals (sourced from iPod by Apple Computer Inc., forexample) to the ear plug 12-2. These signals in turn can be manipulatedby the electronic systems in the body 12-4 and provided to the tip 12-3which contains a miniature speaker or ear phone. In one embodiment, theear phone can be fabricated using MEMS (Micro Electrical MechanicalSystem) technology.

FIG. 12b presents a cross-sectional view 12-8 of the ear plug 12-2 inthe auditory canal 12-9. The tip with the miniature speaker or ear phonefaces the tympanic membrane 12-10. If external audio signals “leak”around the ear plug 12-2 to by-pass the electrical system, theinformation that this leaked signal carries can compromise the desiredbehavior of the ear plug at the Tympanic membrane 12-10. To compensate,in a second embodiment of this invention, noise reduction techniques canbe incorporated into the electrical system in the body 12-4 to invertthe signal and add it to the leaked signal such that the tympanicmembrane 12-10 cannot sense this “leaked” signal.

FIG. 12c illustrates a view of a person 12-6 with the ear plug 12-2 intheir ear and wearing a set of eyeglasses 12-11. Between the ear plugand the set of eyeglasses (hereafter called eyeglass) is a connectorcord 12-7 that electronically couples the ear plug to the eyeglass.

FIG. 3a depicts a close-up cross sectional view 13-1 of the auditorycanal region 13-4, connector cord 12-7 and the eyeglass support region13-3. The connector cord 12-7 electronically couples the auditory canalregion to the eyeglass support region. The coupling is aided by the earmate 13-2 and eyeglass mate 13-2′ connected to the ends of the connectorcord 12-7. The tail 12-5 is coupled to the ear mate 13-2 while theeyeglass tail 12-5′ is coupled to the other end of the connector cord12-7 using the eyeglass mate 13-2′. The eyeglass tail 12-5 coupleselectronics located in the eyeglass to the electronics located in theear plug 12-2.

The auditory canal region 13-4 is further illustrated in FIG. 13b .Inside the region 13-6, the ear mate 13-2 couples to the tail 12-5. Theregion 13-6 is further magnified as presented in FIG. 13 c. The tail12-5 comprises magnets 13-9 and 13-10 and at least one electricalcontact 13-8′. Although the tail shows four electrical contacts, thenumber could be any integer n. Similarly, the ear mate 13-2 has magnets13-11 and 13-12 with at least one electrical contact 13-8. Since unlikepolarities attract, the magnetic force will pull the tail 12-5 to theear mate 13-2. Each contact is shown coupled to a wire 13-14 that formsa part of the connector cord 12-7. Similarly, the contacts are coupledto the left of the tip 12-5 to electronics located within the ear plug12-2.

FIG. 13d shows one embodiment 13-15 of how the exposed contacts from13-8′ through 13-8′″ in the tail 12-5 align and couple to the exposedcontacts from 13-8 through 13-8″ of the ear mate 13-2. These exposedcontacts can be raised above the surface of the tail and ear mate andcan be coated with a conductive metal such as gold (AU) or some otherconductive material that minimizes oxide growth. Once the exposedcontacts of the tail and ear mate couple together, a low ohmic contactis made. The exposed contacts of the tail can mate to the exposedcontacts of the ear mate because the tail is held to the ear mate by themagnetic forces of attraction. The magnets can be embedded in the tailand the ear mate. Since magnets have a N (North) and a S (South) pole,only the pole facing the gap between the tail and ear mate isillustrated.

A first pattern of embedded magnets is provided in the ear mate 13-2comprising magnets S 13-16, N 13-17, N 13-18 and S 13-19. Theanti-pattern of embedded magnets is depicted in the tail 12-5 as N13-20, S 13-21, S 13-22 and N 13-23. The anti-pattern has the sameposition as the magnets in the first pattern of embedded magnets withthe pole of the magnet being replaced by the opposite magnetic pole. Theopposite polarities of these two magnet sets causes the tail 12-5 toalign with and attract the ear mate 13-2 along the four alignment lines13-24, 13-25,13-26 and 13-27 until the exposed contacts of the tailcouples with the exposed contacts of the ear mate. If the exposedcontacts 13-8 through 13-8″ of the ear mate 13-2 and the exposedcontacts 13-8′ through 13-8′″ of the tail 12-5 have the same relativepattern to the embedded magnets and to each other as shown in FIG. 13 d,then the exposed contacts of the ear mate 13-2 will couple to theexposed contacts of the tail 12-5 and provide an electrical continuityfor signals or power leads between the tail and the ear mate.

The magnetic orientation and position of the magnets can be used toensure that there is only one way for the tail 12-5 to electricallycouple to the ear mate 13-2. This magnetic orientation and positionprevents power/signal leads contacts from being short circuited orincorrectly coupled. For example, if the ear mate 13-2 in FIG. 13d isrotated clockwise 90 degrees, two sets of the magnets attract13-19-13-20 and 13-17-13-22 while two sets repel 13-16-13-21 and13-18-13-23. The imbalance would let the user know that the orientationis not correct. Continuing to rotate the ear mate through the tworemaining 90 degree rotations, similar imbalances occur indicating thatthere is only one orientation (the one shown in FIG. 13d ) where themagnets attract one another. Many different combinations of magneticorientation and position patterns can be placed on the tail 12-5 and theear mate 13-2. The one illustrated in FIG. 13d is one of manyembodiments.

A top view 14-1 of a person 14-2 wearing the eyeglass 14-3 isillustrated in FIG. 14a . The battery 14-4 is housed in the eyeglass andwould provide power to the system (electronic, mechanical or both) inthe eyeglass and via the connector cord 12-7 provides a source of energyto the ear plug to drive an ear phone. In addition, the eyeglass tail12-5′ is coupled to the eyeglass mate 13-2′ providing power and signalsto both ear plugs (in the left and right auditory canals) of the person14-2 via two separate connector cords 12-7 and 12-7′.

A block diagram of the right ear plug 14-5 is provided in FIG. 14b whilethe block diagram of the left ear 14-6 is shown in FIG. 14c . Each earplug comprises a D/A (Digital to Analog) Block, an Ear Phone Block thatmay contain a miniature speaker. An Amplifier channel Block amplifiesthe audio signal. Furthermore, one of the Ear Plugs, in this case theRight Ear Plug, holds additional components such as the MicroprocessorBlock, Memory Block, or any additional Blocks that may be required.

The block diagram 14-7 in FIG. 14d provides interconnectivity betweenthe following components: Ear Plugs, Batteries, antenna, and theProcessor/RF Transceiver Block. The Left and Right Batteries 14-4, rightand left eyeglass mate 13-2′, Processor/RF Transceiver Blocks, andantennas 14-8 and 14-9 are contained in the eyeglass. The antenna andProcessor/RF Transceiver Blocks intercepts wireless signals to provideaudio stimulus to the Ear Plugs. The Left and Right Ear Plugs are in theauditory canals of the person 14-2. The left connector cord 12-7 couplesthe eyeglass mate 13-2′ to the ear mate 13-2. The right connector issimilar in structure. In one embodiment, the connector cord 12-7 cab bereplaced with a wireless connection. In that case, the powerconsiderations may require that the ear plugs contain their own powersource.

FIG. 15a presents another embodiment 15-1 of the invention. The person14-2 wearing the eyeglass 14-3 is viewing a portable system 15-3 that isdisplaying some web content (YouTube, for example) A wireless link 15-2is established between the portable system 15-3 and the eyeglass 14-3.This wireless link 15-2 can be used to carry the audio from the portablesystem 15-3 to the user using the ear plugs that are coupled to theeyeglass 14-3.

FIG. 15b illustrates another embodiment of a block diagram 15-4 of theeyeglass system. In this embodiment, the only component in theRight/Left Ear Plugs 15-8 is the ear phone as shown in FIG. 15 c. Allremaining components in the ear plug were moved to the ElectronicSystem/MIMO Transceiver Block of FIG. 15b and incorporated into theeyeglass. Only one battery is used, the MIMO (Multi Input Multi Output)antenna with the transceiver allows greater wireless throughput. TheInterface Block 15-5 has an added transducer interconnect 15-6 thatcouples the Ear Plugs to the system. The microphone 1-4 and a speaker1-5 are located in the eyeglass. Although not illustrated, themicrophone 14 can be located in the Ear Plug, for example, in the tail12-5.

In addition, another embodiment is indicated by the dotted rectangle15-7. Instead of placing the components inside an eyeglass, thesecomponents can be contained in a small hand held portable system, likean iPhone from Apple or an Android from Google. The left and right earplugs are coupled to the portable device using the connector cord 12-7.Each end of the cord 12-7 is magnetically and electrically coupled toeither the ear plug or the small hand held system. If the connector cord12-7 gets caught in an obstruction, the magnetic forces holding the cord12-7 to either the ear plug or the small hand held device becomesdetached without harming the system. In other embodiments, one end ofthe connector cord 12-7 can have a magnetic coupling while the other endcan use the conventional plug and jack connection or be hard wired tothe hand held device.

The magnetic connection in FIG. 15b allows the portable system to comeapart without damaging the components when an element of a componentgets unexpectedly snagged after passing an obstacle. The components canbe easily collected and reassembled to reconstruct the system. Further,the positioning of the magnets in the magnetic connections provide alock and key combination in that the pattern and anti-pattern betweenmating surface connections can be designed to only allow one orientationwhen the connection is made. This prevents the power leads from shortingto ground or other signal leads and damaging the system.

FIG. 16a depicts yet another embodiment of the invention 16-1 where theportable system 16-2 comprises the Interface Block 15-5 and anElectronic Circuit Block, for example, a Music Player Block, storedaudio recording, web browser output, cell phones, internet radio output,etc. Many of the other blocks introduced earlier can be incorporatedinto this system but have been removed to simplify the explanation ofthe invention. The user can listen to the music using the headphones16-3 or the speaker 1-5. The entire portable system 16-2 can be embeddedinto the eyeglass with the exception of the ear plugs.

A different embodiment of the invention 16-4 is illustrated in FIG. 16b. The portable system 16-5 has an antenna 1-2 that communicates with asecond system 16-6 having a second antenna 1-2′. The Music Player Block16-7 sends the music to the enclosed Interface Block 15-5′ of a firstuser and also sends the music wirelessly to the system 16-5 for adifferent user to listen. The second system, in some cases, can be aserver on the network or a portable system.

Any of the systems, for example, 16-2, 16-5 and 16-6, can incorporatethe block diagram 16-8 illustrated in FIG. 16c . This system allows theuser to listen to music from the Music Player Block by using theheadphones 16-3. Any recording from memory (not shown) can also beheard. However, as the system is providing music to a user, the LoudAudio Signal Re-route Block 16-9 listens to the outside environment byusing the microphone 1-4. If the external audio signals are suddenlyloud then this may warn of impending danger [car beeping horn,ambulance, fire alarm, scuffle, personal attack, announcements in a PA(Public Address) system, etc.]. The Audio Signal and Analyzer Block, theLoud Audio Signal Re-route Block 16-9, and the processor Block can worktogether to pause the music and switch the user to the microphone 1-4.The microphone 1-4 sends its output through the Interface block andreroutes the output to the headphones 16-3 so the user can listen anddetermine the danger level.

This allows the user to interact with an electronic system, such aslistening to music, and be notified when a dangerous situation may beoccurring in the immediate vicinity of the user. The notificationinterrupts the user's interaction with the electronic system andpresents to the user the newly determined potentially dangeroussituation. The user can then decide on the urgency of this situation,and react according to their judgment.

FIG. 17a presents another block diagram 17-1 that has an Analyzer Block17-10 coupled to the Selection Circuit Block 17-5. The Analyzer Block17-10 measures the volume disturbance at microphone 1-4 and sends theresult to the Selection Circuit Block. Meanwhile the user is listeningto the Music Player Block by the path 17-3 going through the MultiplexerBlock 17-2 to the path 17-6 going to the interface Block and applies themusic to the headphone that the user is wearing. Once the SelectionCircuit Block decides that the external audio signals exceed the setlimit then the user needs to evaluate the external audio signals (theSelection Circuit Block 17-5 switches the state of the Multiplexer Blockby disabling the connectivity of path 17-3 to 17-6 and enabling theconnectivity of path 17-4 to path 17-6), the loud external audio signalspicked up by the microphone 1-4 are transferred from path 17-4 throughthe Multiplexer Block 17-2 to the path 17-6 going to the Interface Blockand applies the loud audio signals to the headphone that the user iswearing letting the user evaluate the urgency of the loud audio signals.

FIG. 17b presents several waveforms 17-7 to help better describe theinvention. The top waveform 17-9 depicts the external loud audio signalswhile the middle and bottom waveform determines the times the user islistening to the music or external microphone. For instance, the user islistening to the external microphone between t₁ and t₂. The multiplexercan be in one of two possible states: passing the stimulus from theInterface Block due to the microphone or passing the music from theMusic Player Block. From time equals 0 to t₁, the external volume 17-9is less the threshold level 17-8, so the user listens to the music 17-13and the multiplexer remains in a given state. Between times t₁ and t₂,the external volume 17-9 of exceeds a threshold level 17-8. Themultiplexer changes state so that the user listens to the microphone17-11. Assuming the loud audio signals poses no danger, then betweentime t₂ and t₃, the external volume 17-9 being below the reference level17-8, allows the user to listen to music 17-12 again.

In case the user determines there is no threat, but the noise continues,the user can override the system to ignore the noise by issuing aComputer Command. The system has the capability to analyze the soundafter the user determines there is no threat and remove or filter thatnoise out by treating it as background noise. The user can, in thiscase, continue listening to their music until another new loud noise isdetected.

A block diagram 18-1 of an intelligent portable conversation system isdepicted in FIG. 18 a. The microphone 1-4 picks up the conversation,sends the signal to the Voice Recognition Block 9-2, and then convertsthe Speech into Text Block and stored into memory (not shown). TheDetermination Circuit Block 18-9 using the Voice Recognition Block 9-2determines the last several topics of discussion. These topics form thesearch parameter. These parameters can be stored in memory and then sentas a wireless signal 18-2. When the Switch 18-5 is disabled, there areno silent periods and the system can save power since the Text to SpeechBlock will not be used. The wireless signal 18-2 is captured by thenetwork and routes the request to a search engine.

Once the search engine is finished, the response is routed through thenetwork to the intelligent portable conversation system 18-6 as thewireless signal 18-7 in FIG. 18 b. The wireless signal is captured bythe antenna, processed by the RF Module Block and stored into the MemoryBlock. The Determination Circuit Block 18-9 determines when there is aperiod of silence in the conversation and then reads the result out ofmemory by enabling the Switch 18-5 allowing the text from the web to beconverted into speech on wire 18-8. The Determination Circuit Block alsoswitched the Multiplexer Block 3-10 and allows the speech placed on 18-8to transfer to the wire 18-4 that provides the speech to the InterfaceBlock. The Interface Block informs the user wearing at least one earplug 16-3 the result of the search analysis. The user in turn considerswhat they have heard from the search results and can till the silentperiod in the conversation with information obtained from the web.

A flowchart 19-1 for the intelligent portable conversation system isillustrated in FIG. 19 a. After moving from Communicate 19-2,Recognition converts the group discussion into text, and then the textis stored into Memory after which Categorize Topics categorizes the textby topics. In Silence Decision if there is no silence, it means someonein the group is talking and the control moves back to Communicate 19-2.On the other hand, if there was a period of silence, the flow moves toRecall from Local Memory to recall the last several topics from memorywhile Text to Speech converts the text to speech and in StateInformation the result is sent to the user. The user in turn considerswhat they have heard from the search results and fills the silent periodin the conversation with topic information that has just been discussed.

Another flowchart 19-3 for the intelligent portable conversation systemis illustrated in FIG. 19 b. Moving from Communicate 19-2′, the flowmoves to Recognition Memory and converts the group discussion into text,in Categorize Topics the text is categorized by topics, stores the textinto memory (not shown) then the flow moves to Recall Topics whichrecalls the last few topics. These topics are sent wirelessly to thenetwork by RF Link and the network routes the topic list to WWW which isthe World Wide Web, also known as the Internet, to search engines thatperform searches on the recalled topics. In Store Topic Results thesearch result from the Internet is collected and is wirelessly sent tothe system and stored in local memory. In the Silence Decision if thereis no silence, it means someone in the group is talking and the controlmoves back to Communicate 19-2′. On the other hand, if there was aperiod of silence, the flow moves to Recall Last Topics to cause thesystem to go to the local memory, recalls the last several topics,convert the test into speech after which State Information sequencesthrough the list of several topics and are presented to the user. Theuser in turn considers what they have heard from the search results andfills the silent period in the conversation with topic information thathas just been discussed.

FIG. 20 illustrates the flowchart 20-1 of yet another embodiment of theinvention. Moving from Communicate 19-2″, the flow moves to Recognitionconverts the group discussion into text, then the text is stored inMemory after which Processor Analyzes Discussion uses the text to checkfor grammatical errors. If there are none, continue to Communicate19-2″. On the other hand, if there are errors, the flow moves toSynthesize Correction to correct the error and Replace Error replacesthe error with the correction and stores the correction into memory (notshown), then the flow moves to Read Memory which reads the result frommemory and converts the test into speech and then the State Correctionsends the correction to the user. The user can use this information asnecessary.

Various alterations, improvements, and modifications will occur and areintended to be suggested hereby, and are within the sprit and scope ofthe invention. This invention may, however, be embodied in manydifferent forms and should not be construed as limited to theembodiments set forth herein. Rather, these embodiments are provided sothat the disclosure will be thorough and complete, and will fully conveythe scope of the invention to those skilled in the arts.

Finally, it is understood that the above description is onlyillustrative of the principles of the current invention. It isunderstood that the various embodiments of the invention, althoughdifferent, are not mutually exclusive. In accordance with theseprinciples, those skilled in the art may devise numerous modificationswithout departing from the spirit and scope of the invention. Although,the system block diagrams show various blocks within (processor, DSP,MemoryAnalyzer, etc.), a handheld system can be designed by using anycombination of these blocks. One version of the processor comprises aCPU (Central Processing Unit), microprocessor, multi-core-processor,DSP, a front end processor, or a co-processor. All of the supportingelements to operate these processors (memory, disks, monitors,keyboards, power supplies, etc), although not necessarily shown, areknown by those skilled in the art for the operation of the entiresystem. Many portable wireless systems as well as non-portable systemscan benefit from the inventive techniques presented here. In addition,the network and the portable system exchange information wirelessly byusing communication techniques such as TDMA (Time Division MultipleAccess), FDMA (Frequency Division Multiple Access), CDMA (Code DivisionMultiple Access), OFDM (Orthogonal Frequency Division Multiplexing), UWB(Ultra Wide Band), WiFi, Bluetooth, etc. The network can comprise thephone network, IP (Internet protocol) network, LAN (Local Area Network),ad hoc networks, local routers and even other portable systems.

What is claimed is:
 1. An intelligent portable conversation systemaugmenting a conversation with information related to the conversation,the information obtained from the Internet comprising: a microphoneconfigured to pick up the conversation, audio contents of theconversation is applied to a speech to text block, the speech to textblock configured to convert the audio contents of the conversation intotext; a finite state machine configured to determine the one or moretopics from the text of the conversation, the one or more topics used toform search parameters; the search parameters are coupled to theInternet and sent to at least one search engine; text responses of thesearch results corresponding to the search parameters are coupled to thefinite state machine; and the finite state machine determines a periodof silence in the conversation, the finite state machine sends the textresponses of the at least one search engine to a text to speech block,the text to speech block converts the text responses into an audiosignal, wherein during at least one silent period in the conversation, aperson participating in the conversation, after hearing the audiosignal, considers filling in the silent period of the conversation withat least a portion of the audio signal, the audio signal containinginformation obtained from the Internet.
 2. The apparatus of claim 1,wherein at least one silent period within a discussion, the discussionaddressing, at least one or more topics, the one or more topics are usedto form search parameters.
 3. The apparatus of claim 2, wherein thesilence period is about one second.
 4. The apparatus of claim 1, whereinat least one memory configured to store the text of the conversation andthe search parameters.
 5. The apparatus of claim 1, wherein an RF modulewirelessly transmits the search parameters to the Internet, the Internetroutes the search parameters to at least one search engine.
 6. Theapparatus of claim 1, further comprising: at least one memory configuredto store the responses of the search results received from the Internet.7. The apparatus of claim 1, further comprising: an earphone, theearphone is inserted into the auditory canal of the person, the personhearing the audio signal.
 8. An intelligent portable conversation systemaugmenting a conversation with information related to the conversation,the information obtained from a search engine on the Internetcomprising: a speech to text block configured to convert the audiocontents of the conversation into text: a finite state machineconfigured to determine the one or more topics from the text of theconversation, the finite state machine uses the one or more topics toform search parameters; the search parameters are coupled to theInternet and sent to a search engine; text responses of the searchengine responding to the search parameters are coupled to a text tospeech block, the text to speech block converts the text responses intoan audio signal, wherein a person participating in the conversation,after hearing the audio signal, considers filling any silent period ofthe conversation with at least a portion of the audio signal, the audiosignal containing information obtained from the Internet.
 9. Theapparatus of claim 8, wherein at least one or more topics of theconversation are used to form search parameters.
 10. The apparatus ofclaim 8, wherein the silence period is about one second.
 11. Theapparatus of claim 8, wherein at least one memory configured to storethe text of the conversation and the search parameters.
 12. Theapparatus of claim 8, wherein an RF module wirelessly transmits thesearch parameters to the Internet, the Internet routes the searchparameters to the search engine.
 13. The apparatus of claim 8, furthercomprising: at least one memory configured to store the responses of thesearch results received from the Internet.
 14. The apparatus of claim 8,further comprising: an earphone, the earphone is inserted into theauditory canal of the person, the person hearing the audio signal. 15.The apparatus of claim 8, further comprising: an RF module wirelesslyreceives the text responses of the search engine from the Internet, theRF module routes the responses to the finite state machine.
 16. Theapparatus of claim 8, wherein during at least one silent period in theconversation, the person hearing the audio signal of the search resultresponse, considers filling in the silent period of the conversationwith information obtained from the Internet.
 17. An intelligent portableconversation system augmenting a conversation with information relatedto the conversation, the information obtained from a search engine onthe Internet comprising: at least one silent period within a discussionaddressing at least one or more topics, the one or more topics are usedto form search parameters; a microphone configured to pick up theconversation, audio contents of the conversation is applied to a speechto text block, the speech to text block configured to convert the audiocontents of the conversation into text; at least one memory configuredto store the text of the conversation; a finite state machine configuredto determine the one or more topics from the text of the conversationstored in the memory, the one or more topics used to form the searchparameters, the search parameters are stored in the at least one memory;an RF module wirelessly transmits the search parameters stored in memoryto the Internet, the Internet routes the search parameters to at leastone search engine; search parameters determined by the finite statemachine from the topics are sent to the at least one search engine;responses of the search results corresponding to the search parametersare routed through the Internet to the RF module; the at least onememory configured to store the responses of the search results receivedfrom the Internet by the RF module; the finite state machine determinesa period of silence in the conversation, the finite state machine readstext of the responses of the search results from the at least onememory; and a text to speech block converts the text of the responses ofthe search result into an audio signal of the search result response.18. The apparatus of claim 17, further comprising: a text to speechblock converts the text of the responses of the search result into anaudio signal of the search result response.
 19. The apparatus of claim18, further comprising: an earphone inserted into the auditory canal ofa person, the person participating in the conversation, wherein duringat least one silent period in the conversation.
 20. The apparatus ofclaim 19, wherein the person, after hearing the audio signal of thesearch result response, considers filling in the silent period of theconversation with information obtained from the Internet.