Mobile interactive kiosk method

ABSTRACT

An information exchange system includes a mobile electronic device and a stationary electronic device. The mobile electronic device generates a transient or mobile information cloud around the user and includes a range selector module associated that receives input from the user regarding a physical range to extend the mobile information cloud around the user. The stationary electronic device generates a stationary information cloud. At an intersection of the mobile information cloud and the stationary information cloud, information is exchanged between the mobile electronic device and the stationary electronic device.

CROSS REFERENCE TO RELATED APPLICATION

This application is a continuation application of U.S. application Ser.No. 12/927,420, filed on 15 Nov. 2010, the entire contents of which areincorporated herein by reference. A claim of priority is made.

FIELD OF THE INVENTION

This invention relates to a bio-mining method of a human user tofacilitate pairing a human with one or more communications devicesthrough bio-data collected from a communications device capable ofexternal or internal contact with a user.

BACKGROUND OF THE INVENTION

Ever since communications devices (e.g., computers, cell phones andinternet) were invented, there has been a need for a way to exchangeinformation securely, in order to protect a user's personal informationand corresponding communication devices, preventing identity theft andpotential damage to software or hardware generated from maliciousprograms operating through those technologies. A central, safe andsecure environment for exchanging personal information and forregulating one or more devices has been desired from the earliest daysof the computer age.

Various components and systems currently exist that address portions ofthe present invention. There are kiosks as represented in patents likeUS 2005/0137942 and US 2007/0118437. There are cell phone sensor methodsas represented in US 2009/0325539, cell phone location method asrepresented in US 2009/0219921 and a method for controlling cell phoneoperations through gestures as represented in US 2008/0014917. There aresystems that use a human body as a communications medium as representedin U.S. Pat. Nos. 7,075,455 and 7,171,177 and 7,684,769 and 7,664,476.There are virtual server cloud interfaces as represented in U.S. Pat.No. 7,574,496 and there are internet browsers as represented in U.S.Pat. No. 7,277,912. Additionally there are energy harvesting methods asrepresented in U.S. Pat. Nos. 7,586,413 and 6,933,655. There are methodsof storing occurrence data gathered by a distributed sensor network asrepresented in U.S. Pat. No. 7,536,388. And there are systems thatdetect human brain waves for purposes of regulating devices asrepresented in patent 2010/0010365.

But no invention exists that incorporates certain aspects of each one ofthe above cited patents in order to create an entirely new bio-datamining and human pairing technology capable of increasing individualpersonal security and information gathering capacity when communicatingor transacting business in the real and virtual worlds.

SUMMARY TO THE INVENTION

According to an exemplary embodiment, an information exchange systemincludes a mobile electronic device and a stationary electronic device.The mobile electronic device generates a transient or mobile informationcloud around the user and includes a range selector module associatedthat receives input from the user regarding a physical range to extendthe mobile information cloud around the user. The stationary electronicdevice generates a stationary information cloud. At an intersection ofthe mobile information cloud and the stationary information cloud,information is exchanged between the mobile electronic device and thestationary electronic device.

According to another exemplary embodiment, an information exchangesystem includes a mobile electronic device that generates a firsttransient or mobile information cloud around the user. A temporary cloudenvironment is generated by one or more other electronic devices, and atan intersection of the first mobile information cloud and the temporaryinformation cloud, information is exchanged between the mobileelectronic device and the one or more other electronic devices.

BRIEF DESCRIPTIONS OF THE DRAWINGS

FIG. 1 is diagram illustrating a gated cloud community environmentmethod operating within a network.

FIG. 2 is a diagram illustrating how the present invention connects withother communication devices in a cloud configuration.

FIG. 3 is an illustration of an intracloud method showing interfacesbetween multiple proximate communications devices.

FIG. 4 is a diagram illustrating an intercloud method operating within anetwork.

FIG. 5 shows relationship between MIC device, MISK device, host humanand bio-data.

FIG. 6 illustrates relationship between MIC device, MISK device and hosthuman.

FIGS. 7-10 shows MIC to human contact methods.

FIG. 11 is an illustration showing a MIC device method.

FIG. 12 is a diagram showing MISK device method.

FIG. 13 illustrates relationship between multiple human users of thepresent invention.

FIG. 14 illustrates certain data flows associated with a MISKcommunications device and a commercial entity.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

Data mining typically relates to advanced data analysis in vast systemssuch as the Internet. The process seeks valuable information, trends,patterns, groupings and connections in order to provide tacticalbusiness advantages for business leaders. However, traditional datamining techniques do little for reorganizing the Internet, securingpersonal information and expanding mining techniques on a personalbiological level. The solution for achieving these is found not inmining large systems but in mining data generated biologically fromindividual humans. A term now referred to as bio-data mining. Thispresent invention proposes to transform a communications device, such asa cell phone, into a mobile interactive kiosk (“MISK”) communicationsdevice and in so doing transform the Internet thereby opening the doorto intercloud formation.

How would a MISK differ from a common cell phone today? Consider:

According to one aspect, your MISK may be reading your bio-informationand/or bio-characteristics (bio-data). It may know what you sound like.It may be familiar with your own unique electric field. It may recognizeyour individual brain waves or the sound of your blood rushing throughyour veins. Your MISK may monitor body temperature and a host of otherbio-data generated by you. In fact, it may even understand your brainwaves and be able to accept communications from you telepathicallythrough your mobile information cloud (“MIC”) communications device.

Let's imagine you were walking in a crowd of people or on a sidewalkthrough a neighborhood, your MISK could be set to identify publicinformation about an individual or a physical address. According to oneaspect, a method of data processing could provide a means where youinstantly see a proximity map showing sex offenders close to you.

Let's further imagine, according to another aspect, your MISK could beset to regulate what information originating from you could be madepublic, semi-public and which information was private.

Now let's take a trip to the Mall with your MISK on proximity mode.According to another aspect, other MISK owners who were proximate toyour location could show up on your MISK as temporary cloud environmentsor bubbles. Other businesses operating a MISK device could have abilityto use your MISK as an interactive kiosk showcasing their goods andservices even before you enter the store.

According to another aspect, once inside, store advertisements coulddisplay on your MISK and you could see items that personally interestyou. You could access further information on those items without askinga human for assistance. You could even find where an item was located inthe store simply following a GPS styled display on your MISK. Your MISKcould scan the item and pay for it right there in the aisle, safely andsecurely. No more check-out lines.

According to another aspect, a temporary cloud environment, or bubble,may be created between you and the store MISK system that is monitoringall its products stocked on shelves and recording the products you scanin. This temporary cloud may be uniquely encrypted preventing anyoneother than you and the store access, so financial transactions in atemporary cloud environment are both private and secure.

According to another aspect, as you leave the store, a means ofrecording your purchases may be affirmed and the temporary cloudenvironment between you and the store may be dissolved. Any informationexchanged within the temporary cloud may be deleted. In this way, yourpersonal security could be maintained just as it would have been in atypical real world buying situation at that store location.

In our example let's say other MISK owners walk by. You see someone youshould know but can't remember their name. According to another aspect,you could set your MISK device on proximity mode and see all bubbles andpublic information for every proximate MISK near you. You could see allpublic information from other MISK users who are willing to share withyou. So your MISK device may function as a kind of a business card onsteroids. Never again will you not be able to place a face with a name.

Let's say you go to your bank. Once proximate to the teller you hear hergreet you by name. According to another aspect, your MISK bubble may beable to couple with other MISK systems, bigger bubbles, instantlybringing relevant information about your needs and past activities tothe teller's fingertips. All your account information relevant tobusiness dealings at that location may be accessible to the tellerautomatically as you step up to the counter because you are at the bank,inside their MISK bubble. No searching for files or entering queries.Your information is right there. On your MISK, at the same time, allrelevant bank information may be displayed for you. Instant access andexchange of meaningful information may be automatically activated whenyou are proximate to a location or other MISK devices.

Now let's say you go to the shoe store. Once you reach the check-outstation the teller again greets you by name. According to anotheraspect, the shoe store teller may only access information about you thatwould normally be exchanged within that store not using the MISK system.In other words, the shoe teller would only see your basic informationand not be able to access information the bank next door was able tosee. Why? Because doing so would violate real world information exchangepractices. Personal security and privacy may be maintained in a MISKenvironment while personal convenience and information gatheringcapabilities may be enhanced.

Now let's imagine you go out to the parking lot but you notice yourautomobile keys are missing. No problem. According to another aspect,since you are paired with your MISK and have added all your possessions(that have a computer incorporated into their function) to a securecloud environment through your MISK, nobody else may be able to accessyour stuff. Your car may not need a key because it will recognize you,and if you choose, only you. Through your MISK you become your key.Nobody will be able to operate your car in a MISK cloud environmentaccept those whom you allow to join the personal cloud that is housingyour things.

How will a car know it is you? According to another aspect, your MISKmay be reading your bio-information and/or bio-characteristics(bio-data). It may know what you sound like. It may be familiar withyour own unique electric field. It may recognize your individual brainwaves or the sound of your blood rushing through your veins. Your MISKmay monitor body temperature and a host of other bio-data generated byyou. In fact, it may even understand your brain waves and be able toaccept communications from you telepathically through your mobileinformation cloud (“MIC”) communications device.

How? According to another aspect, you may be training your MISK torecognize your brain waves through a series of controlled interactiveinformation exchanges. Once your MISK identifies a particular brain waveassociated with a particular thought or action of yours, it may storethat wave and continually compare it with other waves collected fromsimilar thoughts and actions. Once brain waves have been clearlyidentified and stored, they can be converted into commands readable toother devices.

According to another aspect, those signals may be amplified andtransmitted to devices not in direct physical contact with you. So yourtelepathic communication capabilities may extend far beyond the weakbrain wave field range generated in your body. This same trainingprocess could be used with any bio-information and/orbio-characteristics (“bio-data”) which can be compared to your brainwave activity as a confirmation of your personal state of mind orintentions.

According to another aspect, your MIC could be monitoring blood flownoise and blood temperature. That information could be compared withrecognizable brain waves and may help your MISK distinguish betweennormal user state of being from irregular user states of being such asdrunkenness, sleep, fear, alarm, danger and distress.

According to another aspect, monitoring your bio-electric field throughyour MIC and MISK devices, and comparing it with controlled actions,could enhance and amplify your MISK's ability to recognize your brainactivities. Data comparing your bio-capacitance and a host of otherbio-data may all be useful to your MISK helping it to pair with you andensuring nobody else will have access to your stuff through your MISKdevices. Your MISK will be trained to recognize you and only you throughyour own unique bio-data.

Now let's begin the drive home. You want to listen to a talk show andyour wife wants to listen to classical music. No problem. According toanother aspect, your MISK can play music directly into your brainbypassing normal brain sound reception organs in your ears. You may beable to hear through your ears and hear inside your mind. Your MISK mayrecord the frequencies currently being used inside your brain to discernsounds, visual images and any other human senses. Having identifiedthese waves your MISK can broadcast signals in a form recognizable toyour brain without going through your senses.

According to another aspect, your MISK may use frequencies thatstimulate your skin which create signals going from your skin throughyour pituitary gland directly into your brain.

Or, according to another aspect, your MISK may use signal transmissionsyour brain can recognize and directly broadcast those signals into yourbrain for an instant and direct communications link inside your mind.

According to another aspect, if you are irritated by a strange sensationcreated by your MISK as it is communicating directly with your mindthrough your skin or nervous system, you can increase the wavetransmission harmonically beyond your ability to physically feel MISKtransmissions while maintaining physical stimulation on the pituitary,nervous system or brain. Doing so may allow direct communication betweenyour mind and your MISK without experiencing negative physicalsensations.

Now let's say your trip takes you into the night and all lighting toyour gauges goes out from an electrical failure. You need to see yourgauges and, according to another aspect, you may see your gaugesdisplayed on your MISK or the images displayed directly into your mind.

As you continue along you hit a deer that causes you to go off the roadand slam into a tree. Let's imagine all vehicle occupants are renderedunconscious and remain so as an ambulance arrives. Let's say there is noinformation recognizable onboard. According to another aspect, themedic, if he is a MISK user, need only to place his hand on your bodyand your MISK may automatically transmit all your medical informationthrough your body, through his body, to his MISK device where yourinformation may be displayed in human readable form.

After healing up you leave the hospital and a thief tells you atgunpoint to hand over your car keys, credit cards and, since you are aTexas resident, he takes your concealed gun you keep in the glove box.According to another aspect, they don't work. Your car, credit cards andyour gun will not function for the thief because they are all part of asecure cloud environment through your MISK that ties them directly toyour bio-data.

So he tells you to get in and drive him to a destination he will showyou. According to another aspect, your MISK may pick up and compare yournormal brain waves and other bio-data and instantly know something iswrong. Or it may optically detect your face configuration or other bodygestures and discern conditions are not normal. Therefore your MISK maylock down your possessions and make an emergency call to the police.Your MISK may have collected the thief's bio-information and relayed itto the proper authorities. This will be the last theft attempt he makesfor a long time.

You've had a busy day and decide to tell all yours friend at the coffeeshop. According to another aspect, you sit down and begin communicatingwith your friends in a permanent cloud environment you establishedearlier. None of the dirtier aspects of the Internet may function insideyour cloud community. If anybody tries to introduce internet filth inyour cloud environment, your MISK may evict, brand and notify other MISKuser's of that individual's location and past behaviors. It may becomepart of the global MISK environment public record within the entirety ofthe MISK cloud community.

Full transparency and full security may be the watchwords of a MISKenvironment. This is not to be confused with full informationaccessibility. According to another aspect, information accessibilitymay be set in part by MISK governing rules located within the MISK cloudbrowser program. Other parameters may be added by each individual MISKuser and applied to their own private cloud environments.

For example, let's say we are still at the coffee shop telling everybodywe know who is part of your permanent cloud community. According toanother aspect, we may even tweet the entire cloud community through amessage system that is part of the MISK cloud browser program wheremessages may be classified and organized by topic, geography and date.At the same time your MISK may ping everyone proximate to you at thecoffee shop and invite them to share your experience in a separate butsimultaneous temporary cloud environment automatically created betweenproximate MISK devices. Some people may accept the invitation, others donot.

According to another aspect, those people who do not even wish to bepinged like this may set their MISK to accept such invitations only frompeople who are within one foot or less of them. Such people may not showup on your MISK or that temporary cloud environment unless, when youwalk by them on the way out the door, you get within one foot orphysically touch them.

Let's say 10 other people join you in a temporary cloud environment andexchange stories and information. According to another aspect, once youleave the coffee shop, that temporary cloud which was set up in thecoffee shop may automatically be dissolved from your MISK and anyinformation exchanged therein may be deleted, both in your MISK andwithin the temporary cloud back in the coffee shop. Gone. If informationand relationships found within a temporary cloud environment are to bepreserved in your MISK, the temporary environment may be either joinedto an existing permanent cloud within your overall cloud environment oryou may create a new permanent cloud and store it on your MISK.

Now it get's interesting. Let's say a personal injury lawyer is withinthat temporary cloud environment you entered which was set up by thecoffee shop's MISK system. He wishes to communicate with you further butyou are yet unsure if you want to bring him into other permanent cloudenvironments in your MISK. At the same time, you do not want to discusspersonal information within the existing temporary cloud bubble so,according to another aspect you change the mode between you two in thetemporary cloud environment and begin exchanging information in asub-bubble environment with complete secrecy. In other words, you set upa sub temporary cloud within the coffee shop's temporary cloudenvironment. After a few minutes you decide it is not a good fit.

According to another aspect, when you exit the coffee shop the temporarycloud pathway between you and the lawyer may be dissolved once either ofyou exceed a specific proximate distance limit you previously set forthat temporary cloud experience. Or the secret exchange may beterminated by you or the lawyer before either of you leave the premisesbased upon hitting a disconnect button. Or let's say the temporary cloudparameter was time. You may set your MISK to exchange information for 5minutes and then the secret back channel communications pathway may bedissolved with all information exchanged therein. You could hostmultiple secret back channel communications simultaneously with otherMISK users and exchange differing levels of private data in each one.

According to another aspect, a function of a temporary cloud environmentmight be an inability to save information shared in that environment. Solet's say you are in need of swapping research information on a limitedscale with a competitor. You create a secret temporary cloud environmentand begin discussing your idea. You incorporate video conferencing andshare text information in that cloud environment. Upon any one partyexiting the cloud session, all information stored therein may bedissolved.

According to another aspect, if the nature of your communications isreally sensitive, you may exchange information verbally and/or visuallyvia synthetic telepathic means. Or you may both meet at a coffee shopand discuss in person certain aspects through a traditional “over thetable” conversation and then upon a handshake certain limited or secretinformation may be exchanged between parties using both human bodies asa medium between their respective MISK devices. This kind of informationexchange prevents information from being pirated by other proximatecommunications devices. In this way physical gatherings can be a securecloud environment just as easily as virtual gatherings can be.

According to another aspect, your MISK may store information that hasbeen uniquely encrypted through a means comprising your own bio-data.Your MISK may send information directly into your body as a broadbandsignal which may be altered by your body capacitance and then passivelydetected by your personal MIC device that maintains physical contactwith your body. And the MIC may transmit the altered signal back to yourMISK for final data storage and analysis.

In this way all of your information may be stored in a completelyindividual configuration. Data stored on your MISK may be unlike data onanybody else's MISK around the world. Therefore your information mayremain secret, safe and private. No viruses, malware or signal piratingmay be effective because nobody will have the encryption key to unlockyour information. As will information stored on all other MISKs beunreadable to you.

According to another aspect, back doors in your physical hardware may becompletely ineffective as information retrieved may be in a form that isunreadable to any devices capable of accessing your information throughthat means.

In effect, according to another aspect, you and your bio-data mayliterally become the bio-password shield that functions as thegatekeeper over all your information and electronic devices. No longerwill you have to remember your password. No longer will you have tocontinually change passwords on all your accounts in order to increasepersonal security. You need only have your MIC in physical contact withyour body and your MISK handy to access information or regulate personaldevices. Nobody and no computer will be able to crack your bio-passwordshield because your bio-data is too large, too complicated andcontinuously fluctuating based upon your individual naturally occurringbio-characteristics.

However, according to another aspect, as you participate in a temporaryor permanent cloud environment, information you wish to share there mayhave the encryption shield removed in that environment. The MISK cloudenvironment itself may be encrypted through the bio-data from whoevercreated it so others who locate the cloud will not be able to see insideunless they are granted access and they enter the cloud environment.Once inside, certain information they choose to share may also havetheir encryption shield removed so information they make public can bereadable to all other participants in that cloud environment. In thisway, information can be exchanged in a meaningful, safe and secure wayenhancing information synergy between MISK cloud participants whilemaintaining privacy between them at the same time.

According to another aspect, information shared within a MISK cloudenvironment can be in the form of photo, video, text, voice and otherdisplay means that may be discernable through human sensory organsand/or may be discernable directly to the brain bypassing human sensoryorgans.

According to another aspect, being paired to your MISK through your MICmay dramatically enhance your personal cloud experience. Whenparticipating in virtual gaming or when listening to music in a MISKcloud environment, you may have synthetic feelings added to thoseexperiences beyond visual and auditory senses. You may feel things andsmell things as information within the cloud may be set to directlycommunicate with your brain.

According to another aspect, movies can become truly interactive.Imagine watching a movie or playing a virtual game and gesturing to pickup a stick and a sensation in your hands feels just like you wereholding it. Or imagine you are watching the World Series in a cloudenvironment and a home run is slammed into the crowd. You reach out yourhand as if you had your glove on to catch the ball. Immediately there isa sensation in your hand of a glove being impacted by the ball. Or yousmell hotdogs or popcorn.

According to another aspect, your MISK may be set to enhance all of yourother media experiences. Imagine watching “The Sound of Music” whenMaria is singing on the mountain tops. Or imagine questing throughbeautiful mountains and being able to smell the mountain flowers,grasses and fresh air while you participate with the media inside a MISKcloud. The list of possibilities is endless.

According to another aspect, your MISK could function as your universalremote. You could create a cloud environment for all your devices thatyour MISK would then be able to regulate.

According to another aspect, you could be trained to work with your MISKand your MISK could be trained to recognize your bio-data throughvirtual games or real life occurrences.

According to another aspect, your personal MIC may consist of atransponder capable of sending and receiving information. It may furtherconsist of a CPU, a storage means and an energy harvesting means. Theenergy harvester unit may reduce any battery size requirements for theMIC and provide a means to energize a battery incorporated into thedevice. The energy harvester antenna may further be used as a means tosense bio-data from its host when in physical contact with said hosthuman.

According to another aspect, information collected by a MIC that ispaired to a host human may be transmitted to another MISK not yetpaired. The MISK may use host human bio-data generated in part from thehost user's MIC that may be used for pairing the host human to anunpaired MISK device. The host user, MISK and MIC may all be connectedand paired together using the host human bio-data as a kind of personalbio-password and a way for information to be encrypted.

According to another aspect, a recognizer unit may be incorporated intoboth a MISK and a MIC device which may have capacity for both devices tolook for and identify their host human bio-data as well as recognizesoftware and hardware identifier information that may be part of a MICand a MISK device.

According to another aspect, pairing between a MIC and a human host andpairing between a MIC and corresponding MISK, and paring a MISK to ahuman host, can be established through information gathered, stored,shared and finally recognized by the recognizer unit which may befunctioning as part of a MIC and a MISK device. In this way a, human canbecome an integral part of a MIC and a MISK device.

According to another aspect, the MIC device may be a gatekeeper ofbio-data which can only be detected when MIC device is in physicalcontact with a host human. A MISK device may incorporate all or part ofbio-data collected by a MIC which may be combined with bio-datacollected by MISK that it was able to detect not being in physicalcontact with a host human. The MISK may also send and collect bio-datato and from a host human through other proximate communications devices.

According to another aspect, a MIC paired to a human host may havecapabilities of sending and receiving one or more signal transmissions,which may consist of varying amplitudes and frequencies, to and from aMISK that is paired to the MIC device.

According to another aspect, a MIC may also have capabilities of sendingand receiving one or more signal transmissions, which may consist ofvarying amplitudes and frequencies, to and from a human host.

According to another aspect, a MISK paired to a MIC and its human hostmay also have capabilities of sending and receiving one or more signaltransmissions, which may consist of varying amplitudes and frequencies,to and from said human host.

According to another aspect, a second MISK paired to a second human hostmay have capabilities of sending and receiving one or more signaltransmissions, which may consist of varying amplitudes and frequencies,to and from the first human and/or any MISK paired to the first human.

According to another aspect, a MISK paired to a human host may havecapabilities of sending and receiving one or more signal transmissions,which may consist of varying amplitudes and frequencies, to and fromother communication devices.

According to another aspect, both MIC and MISK devices may incorporatean energy harvesting unit that may supply at least part of the energyneeds for the devices. Said energy harvester unit may convertelectromagnetic waves such as microwaves, from proximate communicationdevices or other devices capable of generating electromagnetictransmissions. Or the energy harvesting unit in a MIC may convert heatas a thermal coupler and directly covert heat to electrical energy. Or aenergy harvesting unit functioning as part of a MIC may comprise apiezoelectric means of harvesting electrical energy. Or an energyharvesting unit may incorporate one or more of these and other energyharvesting technologies to produce electrical energy for a MIC.

According to another aspect, a MIC device may incorporate a energyharvesting unit method to collect at least a portion of bio-data fromhost human. The energy harvesting unit may include a self powered switchcapable of alternating antenna method of operation from a energyharvesting mode to a bio-data collection mode and/or a signaltransmission mode intended to be received by a device inside or outsidethe host human's body. The energy harvesting unit may comprise at leastone antenna.

According to another aspect, a method of detecting, establishing acommunications pathway, exchanging information, and converting othercommunications devices into at least a partial MISK unit may beinitiated once a MISK device is proximate to another communicationsdevice or is in any form of contact with a MISK device. A firstcommunication exchange may take place in a secure temporary cloudenvironment localized between both devices. A further method may enablea MISK device to become master over a proximate communications device.

According to another aspect, a MISK device may send an invitation inhuman readable form that may display a method of accepting, downloading,and installing a MISK application onto a proximate communications deviceafter being granted access to the temporary cloud environment.

According to another aspect, a MISK application may be capable oftransforming a communications device into at least a partial MISKdevice.

According to another aspect, once transformation is complete, a methodof changing relationship from a master/slave configuration to a peer topeer relationship may be established between the first MISK device andthe newly transformed MISK device. As part of the transformationprocess, instructions may be provided indicating how a new MISK user canobtain a personal MIC device. Full access to the MISK cloud environmentmay not be accessible until the new host human is properly paired to aMIC device and at least one MISK device.

According to another aspect, a MISK cloud browser program may functioninside the MISK cloud environment that is created inside a network. Andthe cloud browser program may function outside the MISK cloudenvironment inside a network.

According to another aspect, the MISK cloud browser may function inharmony as part of a existing internet browser program or as astandalone browser program operating within the Internet.

However, according to another aspect, the MISK cloud browser program maybe the only browser program capable of operating within the MISK cloudenvironment.

According to another aspect, the MISK cloud browser may allow you tovisit other cloud environments within the MISK cloud environment. It mayalso allow you to visit internet sites outside the MISK cloudenvironment.

According to another aspect, a MISK cloud browser icon may be placed onyour MISK desktop. Upon activating the MISK cloud browser icon, you maybe given a choice between accessing information in the MISK cloudcommunity or accessing information from the internet. Or your MISK cloudbrowser may simply indicate to you the source of information that isbeing displayed from a query.

According to another aspect, every web page or MISK cloud page may runthrough the MISK cloud browser program, this will provide the originalowner of the MISK cloud browser technology ultimate control over theMISK cloud environment as its administrator.

According to another aspect, the MISK cloud environment may operateinside the internet and may transform the internet virally from theinside out. The result this transformation will be as dramatic astelephone communications were transformed by the Internet. Eventuallyall internet activity may reside within one huge MISK cloud environmentwhich itself may contain a multitude of smaller clouds connected invarious ways inside therein.

Why may the Internet be absorbed and transformed through the MISK cloudenvironment? People will want absolute security and privacy foundexclusively within a MISK cloud environment. They may also want toexperience the free flow of information within a MISK cloud community aswell as experience an enhanced sensory communications method. The MISKcloud environment may expand virally from a MISK device to othercommunications devices until this technology completely absorbs theinternet and every communications device able to connect with it or makea phone call. At the end of the day, it may be that only one MISK cloudbrowser may be running the bulk of Internet activity. Only one cloudbrowser will make the rules and governing cloud.

According to another aspect, a MISK cloud search method may functionwithin the MISK cloud environment. It may seek other clouds or access amassive library bank within the MISK cloud environment that may beloaded with information unparalleled in the real world or virtual world.

According to another aspect, a method of ranking information contentwithin the MISK cloud environment may be established preventing a human,who is too young, from accessing inappropriate material. The only wayone can participate in a MISK cloud community will be by having a MICdevice properly paired and in physical contact with a host human andboth must also properly be paired to at least one MISK device, whichthen may serve as a portal to the MISK cloud community.

An example of public information which may be required to be accessiblefrom each MISK user, as being part of the standard information exchangedwithin the MISK cloud community, may include individual MISK user nameand age. So when a MISK user wants to access information within the MISKcloud community library, an individual's age may prevent them fromseeing inappropriate material. Same goes for searching MISK cloudsavailable within the MISK cloud community. If any clouds areparticipating in activities that are beyond appropriate discretionarylevels for a particular age group, again the individual who is too youngmay be denied the ability to see or even request joining a particularcloud environment.

According to another aspect, individual MISK users can further imposeinformation content controls preventing inappropriate material frombeing accessed or shared in their MISK experience. Privacy and secrecymay be maintained according to personal preferences. Just becausematerial is out there may not automatically mean you want to have accessto it. So a method of ranking MISK information and individual MISKclouds may be incorporated within the entire MISK cloud environment.Eventually all explicit internet activity may be effectively controlledand quarantined from public view within the entire MISK cloud community.

Basically, through the MISK and MIC cloud system, a method of recreatingthe web is provided. And the way we interact with each other andinformation in general may be revolutionized and upgraded. You, yourMISK device, and your personal MIC device can serve as an interfacebetween the real world and virtual world.

Let's imagine you are going to church. A church would be an example of acommercial entity. According to another aspect, you enter the foyerwhere there is a MISK that is paired to a church official who set up apermanent cloud environment for that location. Anybody who passes by thechurch MISK inside the building may automatically exchange informationand be registered, logged and noted in the church records. At the sametime the church MISK may pass announcements to your personal MISK so youare fully informed. In this way the church may be able to automaticallycreate and maintain its church directory, track attendance, communicatemessages and keep in touch with members without the hassle of continual,ongoing data entry.

According to another aspect, businesses can use the same technique totrack their customers. Businesses would be another example of acommercial entity. Business managers may be able to track how customersrespond to in-store advertising, aisle configuration, customer trafficpatterns, or customer time spent in the store. Stores may generate acomplete record of everyone who entered their store and may be able tocreate an ongoing record of what each customer typically purchasesthere.

Individualized messages can be created and tailored specifically to eachcustomer buying habits. Messages can inform proximate customers of otherproducts thereby enhancing cross selling efforts. Customers may be ableto instantly communicate with customer service or other proximate MISKusers anywhere in the store through a temporary or a permanent cloudenvironment the store sets up for each customer who enters the store.Communications between a customer and a store representative may besecure and private. Financial transactions can take place in completeprivacy. Marketing campaigns can be changed instantly, results tracked,and instantly analyzed. In store digital screens may change what theydisplay based upon who is proximate to the screens. Coupons could bedisplayed on a customer's MISK as could sale items.

Although the previous mentioned examples are rather specific, itnevertheless alludes to vast array of applications possible when a MICdevice and a MISK device are paired to a human host. And, as will beapparent, the technology described herein is not limited to systemconfigurations as described. Such aspects of the present technology arethus about powerful new human interfaces with communications devicesthat are paired to a human. These new user interfaces extend into theeveryday world in ways that a cell phone, a computer or the internetnever could.

The foregoing just touches upon a few of the many aspects of thetechnology detailed herein. These and other features of this presenttechnology will be more readily apparent from the following detaileddescription, which proceeds with reference to the accompanying drawings.

In accordance with the present invention, there is provided a method formining bio-data from a human user to be used in part to pair a user witha mobile interactive kiosk (MISK) communications device through a mobileinformation cloud (MIC) communications device capable of external orinternal contact with a user, in order to regulate informationexchanges, provide personal security, enhance personal privacy and toregulate devices within a network. This invention further relates toproviding a user with an ability of creating, browsing, searching,categorizing, participating and passing information between one or moresecure cloud environments through a cloud browser program operatingwithin a network. And further relates to classifying information basedin part upon user proximity to a specific location and collected userbio-data, applying that information as a partial basis for establishingguiding rules for governing communications within a cloud environment.

FIG. 1 is diagram illustrating method for a gated cloud communityenvironment 110 operating within a network 100. A network is acommunications link that could consist of one or more LANs (“Local AreaNetworks”) and/or one or more WANs (“Wide Area Networks”) and/or theInternet, the World Wide Web, analog or digital wired and wirelesstelephone networks (e.g. PSTN, ISDN, or xDSL), radio, television, cable,satellite, and/or any other delivery mechanism for carrying data. Thegated cloud environment 110 expands into and transforms a network 100virally from the inside out as other communication systems capable ofdelivering and exchanging data through a communications link.

FIG. 2 is a diagram illustrating a hardware connectivity method for amobile interactive kiosk device 200 to interface with one or more othercommunication devices through a wired or wireless communications datapathway at 211, 212, 213, 214, and 215. A cloud environment isestablished when a MISK device 200 is proximate to or withincommunications range with other communications devices that are capableof executing instructions under the command of MISK device 200. FIG. 2shows a portable computer 240, a standalone computer 230, a cell phone250, a LAN network 220, or a WAN network 261 all having a broadcastingrange that can intersect MISK device 200 at 201. Where 201 is theproximate broadcasting range for MISK 200 and the proximate range is 241for a portable computer 240, and the proximate range is 231 for astandalone computer 230, and the range is 221 for an intranet network220, and the proximate range is 261 for a WAN broadcasting unit 260.Detection between the communications devices occurs at 211, 212, 213,214 and 215 respectively which provide an opportunity for a temporary orpermanent communications link between the devices.

FIG. 3 is an illustration of an intracloud method showing interfacesbetween multiple proximate communications devices. MISK user 200, isconnected to the internet through a WAN network 260. Both communicationssystems intersect and exchange information through communication pathway382. MISK user 200 is simultaneously proximate with a standalonecomputer 230 that will be located within a store, having acommunications pathway and intersection point 381, through whichinformation can be exchanged. Standalone computer 230 is also connectedto the internet through a WAN communications pathway 383, providing afurther common communications link 301 between MISK 200, computer 230and the WAN network 260.

Computer 230 is simultaneously proximate with an LAN (in-store) network220, with broadcast range of 321, producing a common communication linkat 302. Computer 230 is within proximate range 311, of a cell phone 310,which creates a communication pathway 372, between them. A commoncommunications link 302 is established between computer 230, thein-store network 220, and the cell phone 310.

Portable computer device 240 is out of communication range 351 from theother devices but is connected to the WAN internet communication pathwaythrough intersection 391.

MISK device 200 pings communication device 230 establishing acommunications pathway which allows an information exchange betweendevices. MISK 200 forms a master/slave relationship over device 230 andimplements a method of converting device 230 into a MISK.

Once device 230 has completed its transformation into a MISK,relationship between MISK 200 and newly transformed MISK 230 is changedinto a peer to peer relationship. New MISK 230 displays in humanreadable form information on how its user can pair with it and how toobtain a personal mobile information cloud (MIC) device. Once MISK 230successfully pairs with its host human user through a MIC device, thenMISK 230 will ping devices 220 and 310 virally transmitting theconversion process.

In our coffee shop example a secret communications method was offered.If you were the owner of a MISK device 200, at the coffee shop, and allother communications devices were MISKs in FIG. 3, a temporary cloudenvironment would be established at 301 between MISK devices 200, 230and 260. In cloud 301 all three parties could exchange informationfreely. If MISK user 200 wanted to exchange private information withMISK user 230 in secret away from participants in temporary cloud 301,he would create through the MISK device 200 a sub temporary cloudenvironment 381 where MISK user 200 and MISK user 230 could exchangeinformation either separately or simultaneously to the cloud exchangeoccurring at 301.

FIG. 4 is a diagram illustrating a communications method 420, operatingwithin a network 100, that can function directly as a network browserthrough one or more communications pathways 402. A browser is a softwareapplication allowing users to view and access electronic content storedeither remotely or locally. A browser is commonly used to displaydocuments in Hyper-Text Markup Language (“HTML”) and stored on serversconnected to a network like the Internet 100.

The communication system in FIG. 4 is capable of delivering andexchanging data between a MISK device 200 and a host system 230 througha communications link 421 to an intercloud browser program 420. MISKuser 200 may own a general purpose computer such as a laptop computer240 that also is functioning as a MISK device having a communicationslink 423 to the intercloud browser program 420 originating from a hostsystem 230 through a communications pathway 422. Examples of eachelement herein are broadly described and may each include numerousinterconnected computers and communications devices not represented inthe diagram.

The intercloud browser program 420 (“MISK application”) is a softwareapplication originally loaded onto the host system 230 for commandingand directing communications enabled by the host system. Example of suchcommands may include creating intracloud temporary and permanent cloudenvironments. Commands may include a system of organizing cloudenvironments in a searchable configuration. Commands may include amethod of dissolving and deleting intracloud environments.

Commands may further incorporate human generated bio-passwords to beused in establishing a secure gated cloud community environment. TheMISK application 420 capable of commanding and directing may include acomputer system, a device, an instruction, a piece of code, a program,or a combination thereof for collectively or independently instructingthe host system 230. MISK application 420 may be temporarily orpermanently embodied in any type of equipment, component, machine,storage medium, or signal propagation method capable of carryinginstructions to the host system 230.

The MISK device 200 is capable of communicating with other proximatecommunications devices 240 through the MISK application 420 viacommunications pathway 421 and 423 respectively. MISK device 200 canfurther access the Internet 100 through MISK application 420 directlyvia communications pathways 421 and 402 respectively. Or MISK device 200can access the Internet 100 through an existing browser applicationpreviously loaded on the MISK device 200 operating system.

In an example, let's say Browser #1 410 is a Microsoft Internet Explorerbrowser application. MISK device 200 initiates MISK browser 420 throughcommunications pathway 421. MISK browser 420 accesses Browser #1 407through communications pathway 407. Browser #1 410 then accesses theInternet via communications pathway 401. Browser #2 412 might beGoogle's Chrome and Browser #3 413 might be Apple's Safari. A MISKdevice 200 or 240 will have capability of accessing information fromInternet 100 directly through communication pathway 402 or through anybrowser currently operable on their operating system.

The host system 230 either functions as a login server or is capable ofestablishing a communications link with one thereby enabling access bysubscribers and/or users that will route communications and otherelements between a MISK device 200 and the host system 230. The hostsystem 230 also includes various password, encryption, pairing methodsand communications methods related to a human bio-data from a humanowner of host system 230 and bio-data from at least one human user of aMISK device 200 and/or 240.

The MISK application 420 supports communication methods like instantmessaging, texting, emailing, video transmissions, audio transmissionsand other transmissions that may be discerned by human sensory organsand/or discerned directly into at least one human brain bypassing humansensory organs.

The MISK application 420 further includes a method where rules governingcloud communications are based in part upon a human user bio-data andreal world information exchanges commonly occurring at specificgeographical locations.

The MISK application 420 includes a method of pairing at least one humanuser to one or more communications devices.

The MISK application 420 includes a method of organizing information,regulating information exchanges, provide personal security andenhancing personal privacy inside and outside a network 100 and toregulate devices.

The MISK application may support associated services, such asadministrative functions, advertising, interest groups and directoryservices as related to a cloud community having architecture thatenables all communications devices to communicate with each other whilebeing connected through the MISK application 420.

FIG. 5 is an illustration showing relationship between mobileinformation cloud device (“MIC”) 530, a mobile interactive kiosk device(“MISK”) 200 as they relate to a host human and the bio-data 540 forcreating a method of forming a completely secure bio-password and/ormethod of encrypting user information grouped into different levels ofprivacy such as information for public use 550, semi-public 560 use andprivate 510 use.

Bio-data 540 may consist of bio-information and bio-characteristics of ahuman MISK user. An example of some bio-characteristics could be, butare not limited to, a human user's electric field, body capacitance,temperature, voice sound, brain waves, sound of blood flowing,electrostatic charge, one or more electromagnetic frequencies, one ormore quasi-electrostatic frequencies, fingerprints, facialcharacteristics and the like.

Bio-characteristics are generated within or by an individual human body.A human individual's bio-characteristics are as unique to thatindividual as fingerprints are unique to them. No two humans haveexactly the same fingerprints and therefore, that characteristic hasbecome somewhat useful in personal security methods.

The human body has many interesting characteristics that can be used forsecuring information and other devices. A human body can hold a chargeas a capacitor and it can function as an antenna sending and receivingelectromagnetic signals. It can be a conductor or function as adielectric.

MIC device 530 must maintain external or internal contact with a humanuser and will collect, record and transmit bio-data forming a bio-password unique to the human user. The bio-data gathered by MIC 530 is thentransmitted to MISK 200 through communications pathway 503. MISK 200incorporates digital information passing it through an encryptionprocess that modifies information (“bio-information”) based uponbio-data. The newly encrypted information or bio-information is storedon the MISK 200. Individual bio-information can only be decoded throughproperly paired MISK device 200 that uses the bio-pas sword as a key todecode bio-information into a useable form.

An easy way of encrypting information is by having MISK 200 changeinformation into a broadband frequency, send the broadband transmissionthrough communications pathway 503 into a human user's body where a MICdevice 530 in physical contact to the human user receives the signalthat has been altered by capacitance characteristics of the human body.The encrypted information can be stored or sent to locations exteriorthe human body.

Decoding the bio-information requires a difference engine comparingoriginal signal with encrypted signal factoring in human bodycapacitance occurring at exactly the same time the original signaltransmission from MISK 200 began. Information sent into a human body canradiate naturally as part of the human electromagnetic field or beamplified out of the body making various localized communicationtechniques available.

To secure information into different modes of security, the publicinformation 550 may not involve an encryption method and access to it isthrough 502. The semi-public data 560 may be encrypted using one set ofbio-characteristics thereafter being stored in the MISK 200 and theprivate data 510 may be protected by another set of bio-characteristicsto form absolute security of private information.

No communications link 502 between MISK 200 and private data 510 will bepossible without human user first transferring the portion of privatedata 510 to another lesser security level such as semi-public 560 orpublic 550 classifications. Only then will other communications deviceswith to access the bio-information be able to establish a communicationspathway 504 or 505 and receive that decodes bio-information back into auseable form devoid of encryption.

This is only one example showing how information can be protected and/orencrypted using a human's bio-characteristics. To someone familiar withthe art, a multitude of other protection and/or encryption methods couldbe provided.

FIG. 6 is an illustration showing relationship between a MIC device 530,a MISK device 200 and a host human 602. The proximate distance betweenthe MIC 530 and the MISK 200 is at 603. MIC 530 is in physical contactwith a host human 602.

MIC 530 may be collecting bio-data and transmitting a weak signal intohost human body 602 using it as an antenna. MISK 200 can receive the MICtransmission if it is within human body transmission range. However,MISK 200 can send one or more signals to MIC 530 directly and/or intohuman body 602. In this way a single or multiple signal transmissions ofvarying frequencies and/or amplitudes can simultaneously be sent andreceived between MIC 530, MISK 200 and the host human body 602.

FIGS. 7-10 are illustrations showing a few of the many possible methodsof human exterior contact with a MIC 700 device. A MIC 700 can makecontact on a human ear being attached to a Bluetooth device. Or it canmake contact attached to a bracelet 530 of some kind. Eye glasses 810can make extended contact with a human body as can a wristwatch 820. AMIC 700 can be fastened 901 to adhesive material 900 that can adhere toa human body compatible with human anatomy. FIG. 10 shows a preferredbody contact location for a MIC 700. A human forehead would be anotherpreferred body contact location.

FIG. 11 is an illustration showing a MIC 700 device method. The presentembodiment in part relates to a data communication using a human body asa data transferring medium between human body and/or a MISK 200. Inorder to collect bio-data from a host human user to be used as a strongsecurity method of protecting information and devices, the MIC 700 mustbe in physical contact with host human user and consists of amicroprocessor 1100 and integrated chip 1110.

The first action of an unpaired MIC 700 is to pair with a human user anda MISK 200 device through a pairing unit 1130. Bio-Data Collector 1121sends instructions to Energy Harvester 1150 and Human Interface 1190 togather human bio-characteristics.

Energy Harvester 1190 is a transponder integrated circuit with one ormore antennas where one function of at least one antenna is to transformmagnetic flux from a magnetic field into an electrical signal havingelectrical energy. Another aspect of the Energy Harvester 1190 is atleast one antenna passively receives electromagnetic signals from humanbody transmitting it as bio-data to the Bio-Data Collector 1121. Bothfunctions can occur through the same antenna or a plurality of antennas.

A Human Interface 1190 unit consisting of a microphone, thermometer andan electrometer passively collects bio-data and transmits to Bio-DataCollector 1121. Bio-Data Collector 1121 sends one or more aspects ofbio-data over to Bio-Pas sword 1131 unit that has instructions forcreating one or more bio-passwords. One bio-pas sword might be the soundof blood rushing through human user vessels. One bio-password mightutilize electric field of human user. One bio-pas sword might be theelectric charge of human user. A bio-pas sword could be the sum total ofall bio-data or it could be just a sample of one or more aspects of thebio-data. Whatever the case, the one or more bio-passwords are thenstored in 1124 and the bio-data generated is transformed into a signalthat the pairing unit 1130 can use to recognize human user.

Once MIC 700 is paired to a human user, it sends bio-password and otherbio-data to MISK Regulator 1120 where MISK 200 records bio-password andother bio-data enabling it to pair likewise with human user. MISKRegulator 1120 sends information request to MISK 200 throughSend/Receive Circuit 1160 asking for MISK hardware and softwareidentifier information. MISK identifier information is then transmittedback to MIC 700 through Send/Receive Circuit 1160 to MISK Regulator 1120where MISK identifier information is recorded in Pairing Unit 1130.Through this or similar processes both human user and MISK 200 areuniquely paired with MIC 700.

When other MISK users are proximate to MIC 700 the Recognizer Unit 1133compares encrypted bio-information pattern from proximate MISK user inorder to determine if proximate MISK is properly paired or if it belongsto another human. If proximate MISK belongs to another human, then MISKRegulator 1120 having master/slave control over MISK paired with it,gives permission for MISK to form peer to peer relationship between bothMISKs and public information is exchanged.

If a MISK is not properly paired to a human user who is paired with aMIC device or a properly paired MISK is not proximate to the human andMIC it is uniquely paired to, then information exchanges will occurbetween other proximate communications devices.

MISK Application 1122, in full or in part, may be stored on MIC 700 andbe used by MISK Regulator 1120 to transform other proximatecommunications devices belonging to the human user into a partial orfull MISK device.

Information communicated between a MIC and MISK that are paired to eachother will flow through the MIC Converter Unit 1133 for implementingdata encryption or for de-encrypting information. Data may be encrypteda multitude of possible methods.

An example may be to receive MISK information and average it withbio-information collected. Or information sent from MISK may be sentinto human body where signal transmission is altered by human bodycapacitance.

MIC 700 may detect MISK transmission through Single Electrode 1140. TheSignal Control 1123 unit may compare the signal with a clock synthesizermethod in order to provide a means of restoring altered signal back toan original form. The clock synthesizer method could use a literal clockmechanism or it could use any one of many regularly occurring frequencytransmissions naturally emanating from the human user's body and use thefrequency transmissions occurring at the time of transmission as a clocksynthesizer method. The natural emanating frequency to be used as aclock synthesizer is recorded from human body at the same time of MIC700 signal reception from MISK is received. The recorded clocksynthesizer frequency emanating from human body at the time of signalreception is recorded and used as the bio-password or decoding key forthat information.

In this way every signal transmission will have a bio-characteristicsignal associated with it providing an infinite method of informationsecurity while at the same time offering a bio-key to unlockbio-encrypted information. Signal Control 1123 chooses how informationfrom its paired MISK will be bio-encrypted. The choice of encryptioncould be in part modified by a paired human user to offer even moreflexibility for security.

The Training Unit 1134 records bio-data collected from MIC 700 andcompares them with control human responses. Information may be processedin the training unit 1134 or sent to proximate MISK.

A neural network program will compare complex bio-data signals tocontrol human responses in order to identify brain wave signalsassociated with human responses.

Games on a MISK may constitute a training session where specificresponses to stimuli are known. Bio-data collected from MIC 700 duringtraining sessions will amplify brain wave detection thereby enhancing acommunication method that bypasses human sensory organs.

Training Unit 1134 working in tandem with MISK Regulator 1120 canestablish a method of ongoing MIC training as human host interacts withother communications devices such as watching TV or playing virtualgames on a computer or driving an automobile.

Real time information can be sent from MISK Regulator 1120 to HumanInterface 1190 which can be discerned by human host in a method thatbypasses sensory organs and/or MISK Regulator 1120 can relay displayinformation through Send/Receive Unit 1160 that will transmit a signaloutside the body to MISK 200 where training information can be displayedin human readable form using human sensory organs.

Signals can be transmitted to the human host from MIC 700 as amodulating current through Single Electrode 1140 and/or as a frequencyof any modulation (or lack thereof), wavelength, kind, type, charge,amplitude or intensity sent by Send/Receive Unit 1160 in a formdiscernable to host human brain directly having bypassed human sensoryorgans.

Energy Harvester 1160 unit can reduce the size of battery 1170 neededwhile at the same time offers an ability of recharging which providescapability of subcutaneous human contact with MIC 700.

FIG. 12 is a diagram showing mobile interactive kiosk method. Although aMISK 200 device could be made complete and ready to go direct from thefactory, the present embodiment relates to a communications device, suchas a cell phone, being transformed into a MISK 200 device once becomingproximate to another properly paired MISK or a properly paired MIC 700device.

Once the MISK Application 1200 is installed on the cell phone throughits OEM hardware and/or software, the device is a MISK 200. The newlyactivated MISK 200 then activates the Pairing Unit 1211 coordinatingpairing functions between a MIC 700 in physical contact with a humanhost through the MIC Application 1216 which acts as master over MISKApplication 1200 instructing Pairing Unit 1211 to receive MIC 700bio-password through Hardware Interface 1210.

Bio-password from MIC 700 is stored in Storage Unit 1221 and is used byRecognizer Unit 1219 as a method of pairing with host human user.Recognizer Unit 1219 then requests hardware and software identifierinformation from MIC 700 through Hardware Interface 1210 that is furtherstored in Storage Unit 1221 and are subsequently used to identify MIC700 whenever it is proximate to MISK 200.

Host human user can instruct MISK 200 through key pad, touch screen,voice commands or by optical methods through Human Interface 1230 toMISK Application 1200 via Hardware Interface 1210. Instructions mayactivate Cloud Browser 1217 which opens a cloud browser application onMISK 200 displaying content in human readable form. Cloud Browser 1217may simultaneously connect with the Internet or other network accordingto host human instructions communicated through Human Interface 1230.

MISK 200 will also collect bio-data obtained through Hardware Interface1210. Bio-Data Collector 1212 gathers and sends one or more aspects ofbio-data over to Bio-Password 1218 unit that has instructions forcreating one or more bio-passwords.

One bio-password might be the sound of the host human's voice. Onebio-password might utilize exterior electric field of human user. Onebio-password might be a fingerprint of human user. A bio-pas sword couldbe the sum total of all bio-data or it could be just a sample of one ormore aspects of the bio-data. Whatever the case, one or morebio-passwords are then stored in 1221 and the bio-data generated istransformed into a modulating and/or non-modulating signal that thepairing unit 1211 can use to recognize human user.

Once MISK 200 is paired to a human user, it sends bio-password and otherbio-data collected by MISK 200 to MIC 700. At the same time Bio-DataCollector 1212 records bio-data generated from MIC 700 enabling MISK 200to pair with human user and corresponding MIC 700. MIC Application 1216sends information request through Hardware Interface 1210 to MIC 700asking for MIC hardware and software identifier information. MICidentifier information is then transmitted back to MISK 200 throughHardware Interface 1210 to MIC Application 1216 where MIC identifierinformation is recorded in Pairing Unit 1211. Through this or similarprocesses both human user and MISK 200 are uniquely paired with MIC 700.

When other MISK users are proximate to MISK 200 the Recognizer Unit 1219compares encrypted bio-information pattern from proximate MISK user inorder to determine if proximate MISK is properly paired or if it belongsto another human.

If proximate MISK belongs to another human, then MIC Application 1216having master/slave control over MISK 200 paired with it, givespermission for both MISKs to form peer to peer relationship and acommunications pathway is established and public information exchangedbetween them.

If a MISK is not properly paired to a human user who is paired with aMIC device or a properly paired MISK is not proximate to the human andMIC it is uniquely paired to, then information exchanges will not occurbetween other proximate communications devices.

MISK Application 1200, in full or in part, may be stored on MIC 700 andbe used by MIC application 1216 to transform other proximatecommunications devices belonging to the human user into a partial orfull MISK device.

Information communicated between a MIC and MISK that are paired to eachother will flow through the Converter Unit 1215 for implementing dataencryption or for de-encrypting information.

Data may be encrypted a multitude of possible methods. An example may beto receive MIC information and average it with bio-information collectedat 1212. Or information received into MISK 200 may be sent as amodulating and/or non-modulating signal transmission into host humanbody where signal transmission is altered by human body capacitance. MIC700 may detect MISK 200 and resend altered signal back to MISK 200.

The Signal Control 1214 unit may compare the signal with a clocksynthesizer method in order to provide a means of restoring alteredsignal back to an original form. The clock synthesizer method could usea literal clock mechanism or it could use any one of many regularlyoccurring frequency transmissions naturally emanating from the humanuser's body. Those frequency transmissions occurring at the time oftransmission could serve as a clock synthesizer method of encryption.

The natural emanating frequency to be used in the clock synthesizer isrecorded from human body at the same time of MISK 200 signaltransmission from MISK is sent. The recorded clock synthesizer frequencyemanating from human body at the time of signal transmission is recordedand used as the bio-password or decoding key for that information.

In this way every signal transmission can have one or morebio-characteristics signal associated with it providing an infinitemethod of information security while at the same time offering a bio-keyto privately unlock bio-encrypted information.

Signal Control 1214 chooses how information from its paired MIC will bebio-encrypted. The choice of encryption could be in part modified by apaired human user to offer even more flexibility for security.

The Training Unit 1220 records bio-data collected from MISK 200 and/orMIC 700 and compares them with control human responses. Bio-data can beany form of a human characteristics such as but not limited toelectromagnetic, heat, capacitance sound and optical. Information may beprocessed in the training unit 1220 or sent to a proximate MISK or aserver having a communications pathway with MISK 200.

A neural network program or similar application, capable ofunderstanding complex information, operating inside of or throughAnalyzer Unit 1213 can compare complex bio-data signals to control humanresponses in order to identify brain wave signals associated with humanresponses.

Games on MISK 200 may constitute a training session where specificresponses to stimuli are known. Bio-data collected from MISK 200 and/orMIC 700 during training sessions will amplify brain wave detectioncapabilities thereby enhancing a communication method that bypasseshuman sensory organs.

Training Unit 1220 working in tandem with MIC Application 1216 canestablish a method of ongoing MISK training as human host interacts withother communications devices such as watching TV or playing virtualgames on a computer or driving an automobile.

Real time information can be sent from MIC Application 1216 to HumanInterface 1230 which can be discerned by human host in a method thatbypasses sensory organs and/or MIC Application 1216 can relay displayinformation through Human Interface 1230 that will display informationin human readable form discernable to human sensory organs.

Signals can be transmitted to the human host from MISK 200 as anon-modulated wave form and/or a modulated wave form sent bySend/Receive Unit 1160 in a wave configuration discernable to host humanbrain directly having bypassed human sensory organs.

FIG. 13 is an illustration describing communication method betweenmultiple human users of the present invention. Human 1300 is proximateto human 1340 of distance 1310 where body to body communications canoccur. Information stored in MIC 700 on in contact with human 1300 iscommunicated to MIC 1331 that is in physical contact with human 1340.

Information stored on MIC 700 and MIC 1331 pertains to personalidentifier information for each human consisting of name, address, phonenumber, medical records, financial records and whatever otherinformation needed to promote the health and well being of each human.Information exchanged will be determined by setting different levels ofclassifications for personal information that may include a publicclassification, semi-public classification and a private classification.

An example of public information might consist of name and social mediaaddress. Semi-public information may include phone number, emailaddress, mailing address and the like. Private information may includefinancial records, medical records, banking information, credit cardinformation, confidential records and the like.

If human 1300 was in physical contact with a medical doctor or emergencymedical technician through contact point 1310, due to the physicallocation of the medical facility or the professional classification ofthe emergency medical technician, information classification groupingscan temporarily be adjusted in a manner consistent with commonlyaccepted information exchanges occurring at that location in the realworld apart of MISK information exchanges.

If the information requested exceeds what MIC 700 has stored, additionalpersonal information can come through MISK 200 through communicationspathway 1322 using human body 1300 as a medium whereby emergency medicaltechnician's human body 1340 is a medium receiving information fromcontact point 1310 passing through human body 1340 to MIC 1331 which istransmitted to MISK 1333 and displayed in human readable form. Medicalinformation could further be relayed from MISK 1333 to a server 230location offsite through communications pathway 1332 to Cloud Browserapplication 110 through communications pathway 1334. Or Medicalinformation could be sent directly to proximate computer 230 acting as atemporary server through communications pathway 1335.

As brain wave patterns are trained into MISK 200 and MIC 700 acommunications pathway is established at 1324 between MISK 200 and humanbrain 1300. A communications pathway is further established at 1323between MIC 700 and human brain 1300 where signal transmissions from MIC700 and MISK 200 can enter directly into human brain 1300 throughpituitary or brain directly through human nervous system.

Human 1300 can thus send and receive communications using synthetictelepathy methods. Signal methods of transmission into human body 1300may be modulating or non-modulating, electromagnetic, electrostatic,quasi-electrostatic or electric current transmission. Any form of signaltype, frequency, amplitude, charge or intensity can be used either tocommunicate directly with human brain 1300 or to encrypt informationpassing through MISK 200, MIC 700 or human body 1300.

FIG. 14 illustrates certain data flows associated with a MISKcommunications device within a commercial entity. Physical storelocation 1400 has a desktop computer 230 with MISK application 420installed therein transforming it into a partial MISK device. A localarea network (“LAN”) 1460 is established through router 1462 emanatingfrom Wireless Hub 1461. Cell phone 1431 is within the store as is cellphone 1441. Cell phones 1411 and 1421 are not inside physical storelocation.

The first time cell phone 1431 enters store 1400 a communicationspathway is established to store desktop computer 230 through wirelesshub 1461 which is connected to LAN network 1460 through router 1462.MISK browser application 420 prompts cell phone 1431 forming acommunications link enabling MISK browser application to display messagein human readable form upon cell phone providing opportunity to acceptloading MISK browser application 420 upon cell phone 1431. MISKapplication 420 is then able to prompt cell phone 1432 that is either inproximate range 1430 of cell phone 1431 or in phone contact, textcontact or email contact.

MISK application 420 identifies cell phone hardware and softwarerecording that information in server 1462 and/or MISK info collectionserver 1481. In store tracking data collected from cell phone 1431shopping activities is also stored in servers 1462 and 1481.

Examples of in store data to be collected might consist of GPScoordinates throughout the store showing customer traffic patterns.Store data collected might also contain products purchased, digitaladvertising interactions, interactions with store services andpersonnel. The possibilities are endless and can be tailored to fit themarketing needs of each specific commercial enterprise.

Cell phone 1421 is walking through the mall and sees a hard copyadvertisement 1424 offering a special phone number 1423 that connectscell phone 1421 directly to store desk top computer 230 through phoneidentifier 1425 and 1464 respectfully. MISK application 420 offers cellphone 1421 user opportunity, displayed in human readable form, to acceptMISK installation. Acceptance may be verbally initiated, initiatedthrough touch pad or key pads. MISK application 420 records cell phone1421 hardware and software identifier information and stores collecteddata on servers 1481 and/or 1462.

Cell phone 1421 then goes into another store proximate to desktopcomputer 1422 whereby MISK application provides opportunity displayed inhuman readable form for desktop user 1422 to accept MISK installation.Upon acceptance store 1422 can participate in all store trackingapplications and methods store 1400 is using as provided through MISKapplication 420.

Cell phone 1411 sees a digital advertisement 1414 having access code1413 options being displayed. Examples of advertising might offer a codefor one product or service and another code for another product orservice. The code for the first offering might be the number 1 andconcurrently the second offering might have a code number 2. User ofcell phone 1411 may physically enter number 1 or number 2 which willopen up advertising information relative to the product or service ofinterest.

Advertising information may be displayed in human readable form upondigital message medium 1414 and/or upon cell phone 1411 screen. Othercodes offering other products or services may be provided turning usercell phone 1411 into a mobile interactive kiosk. Information can becollected through cell phone 1411 for the user's benefit and/orinformation can be collected about user for the store's benefit.

Customer information gathered in this way will be sent to digitalmarketing tool 1442 that provides opportunity for store marketingpersonnel to instantly update and track advertising methods andcampaigns. How a product performs or how a customer interacts with aproduct, advertisement or how the customer uses the store facility isuseful data. The MISK application 420 will gather and refer data todigital marketing tool 1442 providing continual, instant and real timecustomer feedback to store marketing department personnel.

The present embodiment further provides a method of categorizingbusiness to customer information exchanges within a cloud environmentbased upon a business location and the rules governing informationexchanges in the real world at that location. As each store acceptsinstallation of MISK application 420, the new MISK user will setinformation exchange security protocol for that location by enteringinto the MISK application the business': physical address, company name,contact name, phone number, email address, web page address, andfinancial information it would generally share with customers and otherbusinesses.

Additionally MISK settings will delineate what kind of information istypically exchanged publically between the business and a customer; whatkind of information is exchanged in a semi-public encounter; and whatinformation is to be private to that business in normal clientinteractions. The contact person's bio-data will be used to configureand encrypt the information differently for all three information groupsensuring information exchanges and financial transactions occurring atthe business location will be totally secure.

Since other modifications and changes varied to fit particular operatingrequirements and environments will be apparent to those skilled in theart, the invention is not considered limited to the example chosen forpurposes of disclosure, and covers all changes and modifications whichdo not constitute departures from the true spirit and scope of thisinvention.

Having thus described the invention, what is desired to be protected byLetters Patent is presented in the subsequently appended claims.

The invention claimed is:
 1. An information exchange system, comprisinga mobile electronic device that generates a transient or mobileinformation cloud around the user; a range selector module associatedwith the mobile electronic device that receives input from the userregarding a physical range to extend the mobile information cloud aroundthe user; a stationary electronic device that generates a stationaryinformation cloud; and an intersection of the mobile information cloudand the stationary information cloud where information is exchangedbetween the mobile electronic device and the stationary electronicdevice; and an information cloud that includes at least a mobileinformation cloud and a stationary information cloud.
 2. The informationexchange system of claim 1, wherein information between the mobileelectronic device and the stationary electronic device via theintersection of the mobile information cloud and the stationaryinformation cloud includes at least one of push, pull, and two-waycommunication.
 3. The information exchange system of claim 1, whereinthe mobile electronic device includes one or more privacy filters tocontrol information shared with the stationary electronic device via theintersection of the mobile information cloud and the stationaryinformation cloud.
 4. The information exchange system of claim 1,wherein the stationary cloud is in proximity to one or more of a street,highway, road, house, retail store, bank, church, stadium, and servicebusiness.
 5. The information exchange system of claim 1, wherein themobile electronic device comprises one or more of a cellular phone,tablet computer, laptop computer and desktop computer.
 6. Theinformation exchange system of claim 1, wherein at least a portion ofinformation exchanged via the intersection of the mobile informationcloud and the stationary information cloud is deleted once contactbetween the mobile information cloud and the stationary informationcloud is removed.
 7. The information exchange system of claim 1, whereinthe mobile electronic device is paired with a user.
 8. The informationexchange system of claim 1, wherein the stationary information cloud isgenerated in a location that is remote from the stationary electronicdevice.
 9. An information exchange system, comprising a mobileelectronic device that generates a first transient or mobile informationcloud around the user; a temporary cloud environment generated by one ormore other electronic devices; and an intersection of the first mobileinformation cloud and the temporary information cloud where informationis exchanged between the mobile electronic device and the one or moreother electronic devices.
 10. The information exchange system of claim9, wherein information exchanged between the mobile electronic deviceand the one or more other electronic devices is deleted from at leastthe mobile electronic device when intersection between the first mobileinformation cloud and the temporary information cloud is terminated. 11.The information exchange system of claim 9, wherein the mobileelectronic device includes one or more privacy filters to controlinformation shared with the temporary cloud environment via theintersection of the first mobile information cloud and the temporarycloud environment.
 12. The information exchange system of claim 11,wherein private communications between the mobile electronic device anda selected one or more electronic devices is initiated through theintersection of the first mobile information cloud and the temporaryinformation cloud.
 13. The information exchange system of claim 12,wherein the one or more privacy filters determines whether privatecommunications may be initiated between the mobile electronic device andthe selected one or more electronic devices.
 14. The informationexchange system of claim 13, wherein the one or more privacy filtersdetermines whether private communications may be received by the mobileelectronic device from the one or more electronic devices.
 15. Theinformation exchange system of claim 12, further including: a rangeselector module associated with the mobile electronic device thatreceives input from the user regarding a physical range to extend thefirst mobile information cloud around the user.
 16. The informationexchange system of claim 13, wherein the user dynamically modifies thephysical range to modify the intersection of the first mobileinformation cloud and the temporary information cloud.
 17. Theinformation exchange system of claim 9, wherein the mobile electronicdevice is paired with a user.
 18. The information exchange system ofclaim 9, wherein the temporary cloud environment is generated in alocation remote from the one or more other electronic devices.
 19. Theinformation exchange system of claim 9, wherein the temporary cloudenvironment is a second transient or mobile information cloud generatedby a second mobile electronic device associated with a second user. 20.The information exchange system of claim 19, wherein user identificationand location information is exchanged between the first and secondmobile electronic devices in response to an intersection between thefirst mobile information cloud and the second mobile information cloud.