Digital signature using phonometry and compiled biometric data system and method

ABSTRACT

A system, method and one or more wireless earpieces for authenticating utilization of one or more wireless earpieces. A request is received through the one or more wireless earpieces. Biometric readings are performed for a user utilizing sensors of the one or more wireless earpieces. The biometric readings are analyzed to determine whether a biometric profile authorizes the one or more wireless earpieces to fulfill the request. The request is authenticated in response to determining the biometric profile authorizes fulfillment of the request.

PRIORITY STATEMENT

This application claims priority to U.S. Provisional Patent Application62/379,068, filed on Aug. 24, 2016, and entitled DIGITAL SIGNATURE USINGPHONOMETRY AND COMPILED BIOMETRIC DATA SYSTEM AND METHOD, herebyincorporated by reference in its entirety.

BACKGROUND I. Field of the Disclosure

The illustrative embodiments relate to wireless earpieces. Morespecifically, but not exclusively, the illustrative embodiments relateto granting access to the wireless earpieces utilizing one or morebiometric profiles associated with the wireless earpieces.

II. Description of the Art

The growth of wearable wireless devices is increasing exponentially.This growth is fostered by the decreasing size of transceivers, chips,circuits, and other components as well as enhanced computing andcommunications standards and protocols. Securing actions performed bythe wearable devices and data and information available through thewearable devices continues to be a concern. These concerns arelegitimate based on the small and transportable nature of the wearabledevices as well as the large amount of personal information and datathat the wearable devices may generate, store, and access.

SUMMARY OF THE DISCLOSURE

One embodiment provides a system, method, and one or more wirelessearpieces for authenticating utilization of one or more wirelessearpieces. A request is received through the one or more wirelessearpieces. Biometric readings are performed for a user utilizing sensorsof the one or more wireless earpieces. The biometric readings areanalyzed to determine whether a biometric profile authorizes the one ormore wireless earpieces to fulfill the request. The request isauthenticated in response to determining the biometric profileauthorizes fulfillment of the request. Another embodiment provideswireless earpieces including a processor and a memory storing a set ofinstructions. The set of instructions are executed to perform the methoddescribed.

Another embodiment provides a wireless earpiece. The wireless earpieceincludes a frame for fitting in an ear of a user. The wireless earpiecefurther includes a logic engine controlling functionality of thewireless earpiece. The wireless earpiece further includes a number ofsensors taking biometric readings of the user. The logic engine receivesa request through the one or more wireless earpieces, analyzes thebiometric readings to determine whether a biometric profile authorizesthe wireless earpiece to fulfill the request, and authenticates therequest in response to determining the biometric profiles authorizesfulfillment of the request.

According to another aspect a digital signature is provided thataccesses the recordings of the biometric data obtained by the device aswell as one or more of the sensors on the device. Further, in devicesthat contain microphones and speakers, such components may also beactivated. Logins to the device may include comparisons to the personalnorms over time of the biometric sensors, as well as voice passwords.Further, such voice passwords may also be able to perform comparativemeasurements of the voice to the user's stored fundamental frequency aswell as other unique identifiers of individual speech patterns.

BRIEF DESCRIPTION OF THE DRAWINGS

Illustrated embodiments of the present invention are described in detailbelow with reference to the attached drawing figures, which areincorporated by reference herein, and where:

FIG. 1 is a pictorial representation of a communications environment inaccordance with an illustrative embodiment;

FIG. 2 is a block diagram of wireless earpieces in accordance with anillustrative embodiment;

FIG. 3 is a flowchart of a process for authenticating a request inaccordance with an illustrative embodiment; and

FIG. 4 depicts a computing system in accordance with an illustrativeembodiment.

DETAILED DESCRIPTION OF THE DISCLOSURE

The illustrative embodiments provide a system, method, and wirelessearpieces for managing access to the wireless earpieces and unlockingfunctionality as needed. One or more biometric profiles may be createdfor managing access to the wireless earpieces. The biometric profilesmay also be referred to as a digital signature. In one embodiment, thebiometric profiles may be associated with biometric information of theuser, such as voice input, skin conductivity, fingerprints, earstructure, or so forth. The logic of the wireless earpieces manageaccess to data, features, and functions of the wireless earpieces orexternally connected devices. The wireless earpieces may manage accessutilizing the user profiles in response to automatic or user-generatedrequests. The user may be identified utilizing the user profile whichmay also include one or more passwords or secure identifiers.

The wireless earpieces represent a smart wearable device that may beworn within the ears of the user. As with all personal devices, thewireless earpieces may store valuable personal information includingname, address, age, sex, user preferences, user profiles, userbiometrics, user financial information for implementing transactions(e.g., debit/credit card numbers, account numbers, user names,passwords, pins, etc.), and other sensitive personal information. Thewireless earpieces include a number of sensors that may be configured toread biometric information associated with the user. The wirelessearpieces may also receive user input from the user including gestures,voice commands, motions, taps, swipes, or other forms of feedback. Thebiometric information may include heart rate or pattern, respirationrate, blood pressure, fingerprints, mapping of the user's ear/head,voice analysis, skin conductivity, height determinations, and so forth.The biometric readings or information may also be stored for any numberof purposes including health monitoring, identification, tracking, andso forth.

The wireless earpieces may include a multifactorial access systemspecified by the user profiles that may include preprogrammed passwords,pin numbers, biometric information, verbal indicators, or passwordcombinations that may be required as access information to unlockspecific information, data, functionality, actions, or features of thewireless earpieces. For example, sequential, simultaneous, or concurrentbiometric readings or user input may be required by the user profiles tounlock specified data, functions, or so forth. In another embodiment,the user may program the multifactorial access of the wireless earpiecesassociated with the user profiles. For example, an external interfaceavailable through a wireless device may be utilized to set themultifactorial access requirements for data, functionality, or otherrequests. As a result, the access to sensitive information may bepartitioned or sandboxed by each of a number of user profiles stored onthe wireless earpieces to prevent unauthorized or inadvertent access.The access information may be received directly by the wirelessearpieces or from an external device location with the wirelessearpieces directly through a connection (e.g., Wi-Fi, Bluetooth, NFMI,etc.) or through one or more networks.

The illustrative embodiments may allow a user to loan the wirelessearpieces to another user without concern for breaching or contaminationof their own unique personal biometric or private data. In oneembodiment, the primary or administrative user may establish the userprofiles for any number of users that may utilize a single set ofwireless earpieces. For example, the primary user may control the userprofiles of the secondary users. Multifactorial access to data may alsobe set for the secondary users as allowed by the primary user. As aresult, any number of users may be able to control and manage access todifferent data, functions, and so forth available through the wirelessearpieces. Each of the user profiles may be secured utilizingencryption, passwords, biometric identifiers, or other securingmechanisms.

In one embodiment, the wireless earpieces may work in combination with adynamic or static wireless device, such as a cell phone, smart card,smart wearable (e.g., watch, ring, etc.), radio frequency identificationtag, or so forth. The wireless earpieces are worn in the ear of theuser. In response to an automatic or user-generated request, thewireless earpieces may be utilized to perform any number ofauthentication actions. The wireless earpieces or other connecteddevices may store standard measurements, benchmarks, values, or normsfor comparison purposes. As a result, the biometric readings may beanalyzed to perform comparisons to authenticate the biometric readings.The biometric readings may also indicate the user's physical oremotional state as determined using biometric information, sensedinformation, and other information and data about the user or the user'senvironment to ensure that the request should be fulfilled. Thebiometric readings of the user may be determined from a pair of wirelessearpieces or a single wireless earpiece worn by the user. Thedescription included herein may refer to the wireless earpiecesindividual or collectively.

The wireless earpieces are configured to fit at least partially into anexternal auditory canal of the user. The ear canal is a rich space forobtaining biometric measurements about the user as well as stabilizingthe wireless earpieces as they are worn. The wireless earpieces may beutilized during a number of rigorous physical activities that requirestability. The shape and configuration of the wireless earpieces allowthe wireless earpieces to be worn for long periods of time whilegathering valuable information utilizing the sensors of the wirelessearpieces. The wireless earpieces may include sensors for measuring pulerate, blood oxygenation, voice or sound, position/orientation, location,temperature, altitude, cadence, calorie expenditure, and so forth.

The wireless earpieces may include any number of sensor arraysconfigured to capture information about the user. The large amount ofdata may be utilized to authenticate the user for any number of request.The wireless earpieces may configure themselves to perform variousfunctions as well as sending commands to any number of proximate devicesto implement actions, commands, or transactions. The wireless earpiecesmay utilize historical information by learning over time in response toselections made utilizing the wireless earpieces or interconnecteddevices, such as a cell phone. The sensors may sense dynamicmanifestations including movement patterns, fluidity, hesitations,volume of the voice, amplitude and frequency modulations (e.g., jitter,shimmer rates, etc.) temperature fluctuations, increases or decreases inheart rate, and level of sweat production for comparison utilizing logicof the wireless earpieces to generate one or more actions. The sensorsmay learn personal norms over time to more accurately identify users aswell as user selections. Alerts may be played to the user indicating thestatus of the request (e.g., initiated, in process, pending, awaitingverification, approved, rejected, etc.). In one embodiment, the wirelessearpieces may utilize sensor readings in response to a request. Therequest may include a request to identify the user. In addition, therequest may include one or more specified actions.

FIG. 1 is a pictorial representation of a communication environment 100in accordance with an illustrative embodiment. The wireless earpieces102 may be configured to communicate with each other and with one ormore wireless devices, such as a wireless device 104. The wirelessearpieces 102 may be worn by a user 106 and are shown both as worn andseparately from their positioning within the ears of the user 106 forpurposes of visualization. A block diagram of the wireless earpieces 102if further shown in FIG. 2 to further illustrate components andoperations of the wireless earpieces 102.

In one embodiment, the wireless earpieces 102 include a frame 108 shapedto fit substantially within the ears of the user 106. The frame 108 is asupport structure that at least partially encloses and houses theelectronic components of the wireless earpieces 102. The frame 108 maybe composed of a single structure or multiple structures that areinterconnected. The frame 108 defines an extension 110 configured to fitsubstantially within the ear of the user 106. The extension 110 mayhouse one or more speakers, ear-bone microphones, or vibrationcomponents for interacting with the user. The extension 110 may beremovable covered by one or more sleeves. The sleeves may be changed tofit the size and shape of the user's ears. The sleeves may come invarious sizes and have extremely tight tolerances to fit the user 106and one or more other users that may utilize the wireless earpieces 102during their expected lifecycle. In another embodiment, the sleeves maybe custom built to support the interference fit utilized by the wirelessearpieces 102 while also being comfortable while worn.

In one embodiment, the frame 108 or the extension 110 (or other portionsof the wireless earpieces 102) may include sensors 112 for sensingpulse, blood oxygenation, blood pressure, temperature, voicecharacteristics, skin conduction, blood or excretion chemical levels(e.g., glucose levels, key tones, etc.), impacts, activity level,position, location, orientation, as well as any number of internal orexternal user biometrics. A first set of the sensors 112 may representexternal sensors that may sense user gestures, contact, motions,fingerprints, and external conditions (e.g., temperature, humidity,pressure, etc.) external to the ear of the user 106 when the wirelessearpieces 102 are worn. A number of the sensors 112 may also beinternally positioned within the wireless earpieces 102 or positionedagainst or proximate the skin or tissues of the ears of the user 106when worn. For example, the sensors 112 may represent metallic contacts,optical interfaces, thermometers, or micro-delivery systems forreceiving and delivering information. Small electrical charges may besensed within the ear of the user 106 as well as passed through thesensors 112 to analyze the biometrics of the user 106 including pulse,skin conductivity, temperature, blood analysis, sweat levels, and soforth. Sensors 112 may also be utilized to provide a small electricalcurrent which may be useful for alerting the user, stimulating bloodflow, alleviating nausea, or so forth.

In some applications, temporary adhesives or securing mechanisms (e.g.,clamps, straps, lanyards, extenders, chargers, portable battery packs,etc.) may be utilized to ensure that the wireless earpieces 102 remainin the ears of the user 106 even during the most rigorous and physicalactivities or that if the wireless earpieces 10 to fall from the ears ofthe user 106 they are not lost. For example, the wireless earpieces 102may be utilized during marathons, swimming, team sports, biking, hiking,parachuting, or so forth. The wireless earpieces 102 may be configuredto play music or audio, receive and make phone calls or othercommunications, determine ambient environmental conditions (e.g.,temperature, altitude, location, speed, heading, etc.), read userbiometrics (e.g., heart rate, motion, temperature, sleep, bloodoxygenation, voice output, calories burned, forces experienced, etc.),and receive user input, feedback, or instructions. The wireless device104 or the wireless earpieces 102 may communicate directly or indirectlywith one or more wired or wireless networks, such as a network 120. Thewireless earpieces 102 may include logic for dynamically configuringcomponents of the wireless earpieces 102, such as speakers andmicrophones, to the conditions of the communication environment 100.

The wireless earpieces 102 may determine their position with respect toeach other as well as the wireless device 104. For example, positioninformation for the wireless earpieces 102 and the wireless device 104may determine proximity of the devices in the communication environment100. For example, global positioning information, wirelesstriangulation, or signal strength/activity may be utilized to determineproximity and distance of the devices to each other in the communicationenvironment 100. In one embodiment, the distance information may beutilized to determine whether the wireless earpieces 102 are both beingworn (e.g., should be experiencing similar environmental conditions,noise, etc.) or whether a single wireless earpiece 102 is being worn.The sensors 112 (e.g., contact sensors, optical sensors, etc.) may alsodetermine when the wireless earpieces are being worn to control thepower utilization of the wireless earpieces 102, such as implementing alow-power mode, partial power mode, or full power mode. In oneembodiment, each of the wireless earpieces 102 may functionindependently to provide multiple users access to the features andfunctions of the wireless earpieces 102.

In one embodiment, the wireless earpieces 102 and the correspondingsensors 112 (whether internally or externally positioned when worn) maybe configured to take a number of measurements or log information duringnormal usage. The sensor measurements may be utilized to extrapolateother measurements, factors, or conditions applicable to the user 106.For example, the sensors 112 may monitor the user's heartbeat or EKG todetermine the user's unique pattern or characteristics. The user 106 oranother party may configure the wireless earpieces 102 directly orthrough a connected device and app (e.g., mobile app with a graphicaluser interface) to store or share information associated with the userprofiles, audio, images, and other data. Some examples of standard usagemay include detecting and recording a heartbeat, setting a biometric forauthentication of a request, setting noise thresholds and the associatedspeaker volume level or microphone sensitivity, setting a user specifiedgesture/input for performing an action (e.g., playing music, opening anapplication, providing an audio indication of biometric feedback, etc.),active participation in a conversation, listening to music, or so forth.As a result, the wireless earpieces 102 may be customized to unlockaccess to data and features of the wireless earpieces 102 utilizing thedigital user profiles. Within the user profiles, a combination orsequence of biometrics and user input may be associated with specificrequests. Thus, access to the various features, functions, and data ofthe wireless earpieces 102 may be partitioned and protected utilizingunique identifiers. Distinct user profiles and unlocking preferences maybe utilized to ensure that multiple users may utilize the wirelessearpieces 102 with data, functionality, and access for each user beingcompletely secured.

The wireless earpieces 102 may reconfigure themselves during an initialset up process, during start up, during regular use, or in response to auser request. In one embodiment, each of the sensors 112 of the wirelessearpieces 102 may perform baseline readings stored in the user profileto determine which user is utilizing the wireless earpieces 102. Thebaseline readings may also be utilized to adapt to communicationsenvironments 100 that may be quiet, slightly noise, loud, or anything inbetween. For example, utilizing the user profiles, the logic of thewireless earpieces 102 may determine which of a number of usersassociated with the wireless earpieces 102 or a guest is utilizing thewireless earpieces 102 and the applicable communications environment 100(e.g., the user's home, train station, work out areas, officeenvironment, mechanical shop, sports venue, etc.). In one embodiment,the wireless earpieces 102 may determine data, functions, and featuresthat may be accessed based on the user, the user's authorization level,location, activity, and other permissions, settings, and authorizationsspecified by the user profile. The components of the wireless earpieces102, such as the speakers and microphones may then be self-adjustedbased on the identified user and information associated with thecommunications environment 100.

The wireless earpieces 102 may include any number of sensors 112 andlogic for measuring and determining user biometrics, such as pulse rate,skin conduction, blood oxygenation, blood pressure, temperature,calories expended, voice and audio output, position, and orientation(e.g., body, head, etc.). The sensors 112 may also determine the user'slocation, position, velocity, impact levels, and so forth. The sensors112 may also receive user input and convert the user input into commandsor selections made across the personal devices of the personal areanetwork. For example, the user input detected by the wireless earpieces102 may include voice commands, head motions, finger taps, fingerswipes, motions or gestures, or other user inputs sensed by the wirelessearpieces 102. The user input may be measured by the wireless earpieces102 based on the user profile associated with the user may be convertedinto internal commands (utilized by the wireless earpieces 102themselves) or external commands that may be sent to one or moreexternal devices, such as the wireless device 104, a tablet computer, orso forth. For example, the user 106 may create a first specific headmotion and first voice command that when detected by the wirelessearpieces 102 are utilized to automatically indicate the user's pulseand blood pressure, a first gesture and a second voice command mayauthorize the wireless earpieces 102 to communicate the user's heartrate and calories burned for the day, and the user's skin conductivityand a second gesture may authorize the wireless earpieces to dictate atext message or implement a phone call. The user profiles may utilizeany number of user biometrics and user input alone, or in combination,to unlock partitioned data and functionality to effectively sandbox thewireless earpieces 102.

The wireless earpieces may communication with any number of othersensory devices in the communication environment 100 to measureinformation and data about the user 106 as well as the communicationenvironment 100 itself. In one embodiment, the communication environment100 may represent all or a portion of a personal area network. Thewireless earpieces 102 may be utilized to control, communicate, manage,or interact with a number of other wearable devices or electronics, suchas smart glasses, helmets, smart phones, laptops, tablets, watches orwrist bands, other wireless earpieces, chest straps, implants, displays,clothing, or so forth. A personal area network is a network for datatransmissions among devices, such as personal computing, communications,camera, vehicles, entertainment, and medical devices. The personal areanetwork may utilize any number of wired, wireless, or hybridconfigurations and may be stationary or dynamic. For example, thepersonal area network may utilize wireless network protocols orstandards, such as INSTEON, IrDA, Wireless USB, Bluetooth, NFMI, Z-Wave,ZigBee, Wi-Fi, ANT+ or other applicable magnetic or radio frequencysignals. In one embodiment, the personal area network may move with theuser 106.

In other embodiments, the communication environment 100 may include anynumber of devices, components, or so forth that may communicate witheach other directly or indirectly through a wireless (or wired)connection, signal, or link. The communication environment 100 mayinclude one or more networks and network components and devicesrepresented by the network 120, such as routers, servers, signalextenders, intelligent network devices, computing devices, or so forth.In one embodiment, the network 120 of the communication environment 100represents a personal area network as previously disclosed. The network120 may also represent a number of different network types (e.g.,cellular, Ethernet, etc.) and associated service provider(s).

Communications within the communication environment 100 may occurthrough the network 120 or may occur directly between devices, such asthe wireless earpieces 102 and the wireless device 104, or indirectlythrough a network, such as a Wi-Fi network. As noted, the network 120may communicate with or include a wireless network, such as a Wi-Fi,cellular (e.g., 3G, 4G, 5G, PCS, GSM, etc.), Bluetooth, or other shortrange or long range radio frequency network. The network 120 may alsoinclude or communicate with any number of hard wired networks, such aslocal area networks, coaxial networks, fiber-optic networks, networkadapters, or so forth. Communications within the communicationenvironment 100 may be operated by one or more users, service providers(e.g., secure, public, private, etc.), or network providers.

The wireless earpieces 102 may play, communicate, or utilize any numberof alerts or communications to indicate that the status of the wirelessearpieces and any access being managed through the user profiles. Forexample, one or more alerts may indicate when 1) attempts are made by anunauthorized user to access protected information or functionality(e.g., a prompt to provide passwords or identifiers), 2) access isdenied, 3) authorization is in process, 4) additional user interactionis required (e.g., combinations of passwords, sequential verification,etc.), and/or 5) access is granted. The one or more alerts may includespecific tones, verbal acknowledgements, tactile feedback, or otherforms of communicated messages. For example, an alert may be playedduring each stage of the access process. The corresponding alert mayalso be communicated to the user 106, the wireless device 104, or otherspecified users or devices.

In other embodiments, the wireless earpieces 102 may also vibrate,flash, play a tone or other sound, or give other indications of theaccess process status in order to prompt user actions (e.g., giving asequence of verbal, motion, or gesture-based authentications, provideadditional feedback, etc.) or implement any number of associated steps.The wireless earpieces 102 may also communicate an alert to the wirelessdevice 104 that shows up as a notification, message, or other indicatorindicating the necessity for configuration/re-configuration of a userprofile, such as an audio alert that “the voice identifiers associatedwith Pete's profile have been updated.”

The wireless earpieces 102 as well as the wireless device 104 mayinclude logic that utilize the user profiles to automatically manageaccess and authorization in response to wireless earpiece set-up,start-up, condition changes (e.g., location, activities, etc.), eventhappenings, user requests or various other conditions and factors of thecommunication environment 100. For example, the wireless device 104 maycommunicate instructions received from the wireless earpieces 102 forthe user 106 to provide user input and feedback to unlock the data,functions, and features. The wireless device 104 may include anapplication that displays instructions and information to the user 106in response to authentication information being required.

As previously noted, the wireless device 104 may utilize short-range orlong-range wireless communications to communicate with the wirelessearpieces 102 through a wireless signal or devices of the communicationenvironment 100. For example, the wireless device 104 may include aBluetooth and cellular transceiver within the embedded logicalcomponents. For example, the wireless signal may be a Bluetooth, Wi-Fi,Zigbee, Ant+, near-field magnetic induction (NFMI), or other short rangewireless communication.

The wireless device 104 may represent any number of wireless or wiredelectronic communications or computing devices, such as smart phones,laptops, desktop computers, control systems, tablets, displays, gamingdevices, music players, personal digital assistants, vehicle systems, orso forth. The wireless device 104 may communicate utilizing any numberof wireless connections, standards, or protocols (e.g., near fieldcommunications, NFMI, Bluetooth, Wi-Fi, wireless Ethernet, etc.). Forexample, the wireless device 104 may be a touch screen cellular phonethat communicates with the wireless earpieces 102 utilizing Bluetoothcommunications and with the network 120 utilizing a 5G connection. Thewireless device 104 may implement and utilize any number of operatingsystems, kernels, instructions, or applications that may make use of theavailable sensor data sent from the wireless earpieces 102. For example,the wireless device 104 may represent any number of android, iOS,Windows, open platforms, or other systems and devices. Similarly, thewireless device 104 or the wireless earpieces 102 may execute any numberof applications that utilize the user profiles, user input, proximitydata, biometric data, and other feedback from the wireless earpieces 102to initiate, authorize, or perform access associated tasks.

As noted, the layout of the internal components of the wirelessearpieces 102 and the limited space available for a product of limitedsize may affect where the sensors 112 and other components may bepositioned. The positions of the sensors 112 within each of the wirelessearpieces 102 may vary based on the model, version, and iteration of thewireless earpiece design and manufacturing process.

FIG. 2 further illustrates a block diagram of the wireless earpieces202. As noted, the components of the wireless earpieces 202 may bedescribed collectively rather than individually. The wireless earpieces202 may be wirelessly linked to any number of wireless devices, such asthe wireless device 104 of FIG. 1. For example, wireless devices mayinclude wearable devices, communications devices, computers,entertainment devices, vehicle systems, exercise equipment, or so forth.Sensor measurements, user input, and commands may be received from boththe wireless earpieces 202 and the wireless device (not shown) forprocessing and implementation on either of the devices (or otherexternally connected devices). Reference to the wireless earpieces 202may descriptively or functionally refer to either the pair of wirelessearpieces (wireless earpieces) together or each individual wirelessearpiece (left wireless earpiece and right wireless earpiece) withoutlimitation.

In one embodiment, the wireless earpieces 202 may include a battery 208,a logic engine 210, a memory 212, a user interface 214, a physicalinterface 215, a transceiver 216, and sensors 217. The wireless devicemay have any number of configurations and include components andfeatures as are known in the art.

The battery 208 is a power storage device configured to power thewireless earpieces 202. In other embodiments, the battery 208 mayrepresent a fuel cell, thermal electric generator, piezo electriccharger, solar charger, ultra-capacitor, or other existing or developingpower storage technologies. The sensors 217 may also be utilized tomeasure the temperature of the battery 208 and the condition of internalcomponents of the wireless earpieces. The sensors 217 may also beutilized to determine data about internal and external conditions andfactors applicable to the user, the user's environment, a communicatingwireless device, or so forth. Other conditions and factors sensed by thesensors 217 (e.g., water/humidity, pressure, blood oxygenation, bloodcontent levels, altitude, position, impact, radiation, etc.) may also bedetermined with the data being processed by the logic engine 210.

The logic engine 210 is the logic that controls the operation andfunctionality of the wireless earpieces 202. The logic engine 210 mayinclude circuitry, chips, and other digital logic. The logic engine 210may also include programs, scripts, and instructions that may beimplemented to operate the logic engine 210. The logic engine 210 mayrepresent hardware, software, firmware, or any combination thereof. Inone embodiment, the logic engine 210 may include one or more processors.The logic engine 210 may also represent an application specificintegrated circuit (ASIC), field programmable gate array (FPGA),integrated circuit, chip, or chipset.

The logic engine 210 may utilize sensor measurements, user input, userpreferences and settings, conditions, factors, and environmentalconditions to determine the identity of the user, at least in part, frommeasurements performed by the wireless earpieces 202. This informationmay also be utilized to authenticate specific functions, activities,transactions, or other actions performed by the wireless earpieces 202.The wireless earpieces 202 may function separately or together toauthenticate a feature, function, or setting is allowed for anauthorized user. For example, processing may be divided between thewireless earpieces 202 to increase the speed of processing and to loadbalance any processes being performed. For example, a left wirelessearpiece may perform imaging of the user's ear to identify the userwhile the right wireless earpiece may identify voice characteristics ofthe wireless earpieces. Multiple forms of identifying information may beutilized to better secure the processes of the wireless earpieces.

In one embodiment, the logic engine 210 may perform the authenticationdeterminations based on measurements and data from the sensors 217. Thelogic engine 210 may also perform any number of mathematical functions(e.g. linear extrapolation, polynomial extrapolation, conicextrapolation, French curve extrapolation, polynomial interpretation) todetermine or infer the identity of the user from the sensor measurementsas well as determine whether a biometric identifier or password isverifiably received. The logic engine 210 may utilize time and othersensor measurements (or other factors) as causal forces to enhance amathematical function utilized to perform the determinations,processing, and extrapolation performed by the logic engine 210. Thelogic engine 210 may compare biometric data established in the biometricprofile against biometric readings that are received in real-time (ornear real-time).

The logic engine 210 may also process user input to determine accesscommands implemented by the wireless earpieces 202 or sent to thewireless earpieces 202 through the transceiver 216. Specific actions maybe allowed based on sensor measurements, extrapolated measurements,environmental conditions, proximity thresholds, user profiles, and soforth. For example, the logic engine 210 may implement an authenticationmacro allowing the user to automatically unlock a communicationapplication utilizing a heartbeat pattern and voice command. In anotherembodiment, different types of actions may require different levels orcombinations of biometric and user information. For example, sharing lowvalue data, such as work out data, may require a single piece ofidentifying information (e.g., ear mapping) whereas sharing high valuedata, such as glucose levels, heart rate, and blood pressure may requirethree pieces of identifying information (e.g., skin conductivity, userspecified gesture, user sign on to the wireless earpieces 202).

In one embodiment, a processor included in the logic engine 210 iscircuitry or logic enabled to control execution of a set ofinstructions. The processor may be one or more microprocessors, digitalsignal processors, application-specific integrated circuits (ASIC),central processing units, or other devices suitable for controlling anelectronic device including one or more hardware and software elements,executing software, instructions, programs, and applications, convertingand processing signals and information, and performing other relatedtasks.

The memory 212 is a hardware element, device, or recording mediaconfigured to store data or instructions for subsequent retrieval oraccess at a later time. The memory 212 may represent static or dynamicmemory. The memory 212 may include a hard disk, random access memory,cache, removable media drive, mass storage, or configuration suitable asstorage for data, instructions, and information. In one embodiment, thememory 212 and the logic engine 210 may be integrated. The memory mayuse any type of volatile or non-volatile storage techniques and mediums.The memory 212 may store information related to the user, wirelessearpieces 202, wireless device 204, and other peripherals, such as awireless device, smart glasses, smart watch, smart case for the wirelessearpieces 202, wearable device, external sensors, and so forth. In oneembodiment, the memory 212 may store, display, or communicateinstructions, programs, drivers, or an operating system for controllingthe user interface 214 including one or more LEDs or other lightemitting components, speakers, tactile generators (e.g., vibrator), andso forth. The memory 212 may also store user profiles, biometricreadings, user input required for specified data, functions, orfeatures, authentication settings and preferences, thresholds,conditions, signal or processing activity, historical information,proximity data, and so forth.

The transceiver 216 is a component comprising both a transmitter andreceiver which may be combined and share common circuitry on a singlehousing. The transceiver 216 may communicate utilizing NFMI, Bluetooth,Wi-Fi, ZigBee, Ant+, near field communications, wireless USB, infrared,mobile body area networks, ultra-wideband communications, cellular(e.g., 3G, 4G, 5G, PCS, GSM, etc.), infrared, or other suitable radiofrequency standards, networks, protocols, or communications. Forexample, the transceiver 216 may coordinate communications and actionsbetween the wireless earpieces 202 utilizing NFMI communications. Thetransceiver 216 may also be a hybrid or multi-mode transceiver thatsupports a number of different communications. For example, thetransceiver 216 may coordinate communications between the wirelessearpieces 202 as well as perform communications with wireless devices orother systems utilizing wired interfaces (e.g., wires, traces, etc.),NFC, or Bluetooth communications. The transceiver 216 may also detectamplitudes and infer distance between the wireless earpieces 202 andexternal devices, such as the wireless device or a smart case of thewireless earpieces 202.

The components of the wireless earpieces 202 may be electricallyconnected utilizing any number of wires, contact points, leads, busses,wireless interfaces, or so forth. In addition, the wireless earpieces202 may include any number of computing and communications components,devices or elements which may include busses, motherboards, circuits,chips, sensors, ports, interfaces, cards, converters, adapters,connections, transceivers, displays, antennas, and other similarcomponents. The physical interface 215 is hardware interface of thewireless earpieces 202 for connecting and communicating with wirelessdevices or other electrical components, devices, or systems.

The physical interface 215 may include any number of pins, arms, orconnectors for electrically interfacing with the contacts or otherinterface components of external devices or other charging orsynchronization devices. For example, the physical interface 215 may bea micro USB port. In one embodiment, the physical interface 215 is amagnetic interface that automatically couples to contacts or aninterface of a wireless device. In another embodiment, the physicalinterface 215 may include a wireless inductor for charging the wirelessearpieces 202 without a physical connection to a charging device.

The user interface 214 is a hardware and software interface forreceiving commands, instructions, or input through the touch (haptics)of the user, voice commands, or predefined motions. For example, theuser interface 214 may include a touch screen, one or more cameras orimage sensors, microphones, speakers, and so forth. The user interface214 may be utilized to control the other functions of the wirelessearpieces 202. The user interface 214 may include the LED array, one ormore touch sensitive buttons or portions, a miniature screen or display,or other input/output components. The user interface 214 may becontrolled by the user or based on commands received from the wirelessdevice. For example, the user may turn on, reactivate, or providefeedback utilizing the user interface 214.

In one embodiment, the user interface 214 may include a fingerprintscanner that may be utilized to scan a fingerprint (e.g., the indexfinger) of a user to identify a user. The user interface 214 or memory212 of each of the wireless earpieces 202 may store identifyinginformation for one or more fingers. In one embodiment, the biometricdata of the user may be encrypted and stored within a secure portion ofthe memory 212 to prevent unwanted access or hacking. The wirelessearpieces 202 may also store important biometric data, such as medicalinformation (e.g., medical conditions, allergies, logged biometrics,contacts, etc.) that may be shared in response to an emergency.

In one embodiment, the user may provide user feedback for authenticatinga request by tapping the user interface 214 once, twice, three times, orany number of times (e.g., sequentially or in a timed pattern).Similarly, a swiping motion may be utilized across or in front of theuser interface 214 (e.g., the exterior surface of the wireless earpieces202) to implement a predefined action. Swiping motions in any number ofdirections or gestures may be associated with specific requests as wellas other activities, such as share exercise data, share music playlist,enable a dictation feature, open a specified app, share user vitals,play music, pause, fast forward, rewind, activate a digital assistant(e.g., Siri, Cortana, smart assistant, etc.), or so forth withoutlimitation. The swiping motions may also be utilized to control actionsand functionality of wireless devices or other external devices (e.g.,smart television, camera array, smart watch, etc.). The user may alsoprovide user input for authorizing an action or request by moving hishead in a particular direction or motion or based on the user's positionor location. For example, the user may utilize voice commands, headgestures, or touch commands to change the content displayed by awireless device as received from the wireless earpieces 202. The userinterface 214 may also provide a software interface including any numberof icons, soft buttons, windows, links, graphical display elements, andso forth for receiving user input.

In one embodiment, the user interface 214 may periodically utilize oneor more microphones and speakers of the wireless earpieces 202 toauthenticate the user. The microphone of the user interface 214 maymeasure various voice characteristics including amplitude, shimmer rates(i.e., changes in amplitude over time) frequency/pitch, jitter rates(i.e., changes in frequency data over time), accent, voice speed,inflection, and so forth. Specific words, phrases, or sounds may beassociated with actions as stored in the memory 212 and detected by oneor more microphones of the user interface 214. The microphones mayinclude external microphones positioned on the outside surface(s) of thewireless earpieces 202 (e.g., air microphones) as well as internalmicrophones (e.g., bone, ear-bone microphones, etc.). The wirelessearpieces 202 may also recognize a pre-defined vocabulary. For example,specific words may be required to authenticate different requests andaction types. In one embodiment, the user may speak for a period of timeto perform on the spot comparative analysis of the voice of the user.For example, the user may be required to speak specific words, phrases,a song, or other vocalizations. Specific analysis of the voicesfrequency, jitter, shimmer, and other voice characteristics of the usermay be read by the microphones of the user interface 214 and processedby the logic engine 210.

The user interface 214 may be utilized to create one or more biometricprofiles associated with each of a number of users. The biometricprofiles may be stored in the memory 212 and updated as needed and basedon utilization. The biometric profiles may store any number ofpasswords, passphrases, user-specific identifiers, and so forth. Thebiometrics may be identified immediately upon the wireless earpieces 202being placed in the ears of the user or after a time period or specifiednumber of measurements have been performed. The wireless earpieces 202may allow for detailed analysis of the user's biometrics. For example,infrared sensors may be utilized to analyze a fingerprint of a user tobe analyzed for fingerprint and infrared patterns associated with theuser.

The sensors 217 may include inertial sensors, pulse oximeters,accelerometers, gyroscopes, magnetometers, water, moisture, or humiditydetectors, impact/force detectors, thermometers, photo detectors (e.g.,infrared, spectroscopy, etc.), miniature cameras, microphones, and othersimilar instruments for identifying the user and reading biometrics aswell as location, utilization of the wireless earpieces 202,orientation, motion, and so forth. The sensors 217 may also be utilizedto determine the biometric, activity, location, and speed measurementsof the user. In one embodiment, the sensors 217 may store data that maybe shared with other components (e.g., logic engine 210 authenticating auser), users, and devices.

The sensors 217 may include photodetectors, ultrasonic mapping devices,or radar that scan the ear of the user when positioned for utilization.The sensors 217 may generate a two or three dimensional scan, infrared,or topography map of the user's ear and surrounding areas when thewireless earpieces 202 are properly positioned. The mapping may includethe internal and/or external portions of the user's ear. Thetopographical image or map of the user's ear may be utilized as astand-alone biometric identifier or may be utilized with other biometricidentifiers to identify the user. The image may include the externalauditory meatus, scapha, fossa triangularis, scaphoid fossa, helix,antihelix, antitragus, lobule, the tragus, and pinna as well as otherinternal or external portions of the ear and surrounding head structure.

Externally connected wireless devices may include components similar instructure and functionality to those shown for the wireless earpieces202. For example, a wireless device may include any number ofprocessors, batteries, memories, busses, motherboards, chips,transceivers, peripherals, sensors, displays, cards, ports, adapters,interconnects, sensors, and so forth. In one embodiment, the wirelessdevice may include one or more processors and memories for storinginstructions. The instructions may be executed as part of an operatingsystem, application, browser, or so forth to implement the featuresherein described. For example, the user may set preferences for thewireless earpieces 202 to work individually or jointly to identify userbiometrics readings for comparison against known biometric data/valuesto verify the user is authorized. Likewise, the biometric preferencesmay manage the actions taken by the wireless earpieces 202 in responseto identifying specific users are utilizing the wireless earpieces 202.For example, a parent user may have full access to perform any number offeatures, but a juvenile user may only have access to perform designatedfeatures (e.g., biometric tracking, transactions of amounts less than$20, etc.). In one embodiment, the wireless earpieces 202 may bemagnetically or physically coupled to the wireless device to berecharged or synchronized.

The wireless device may also execute an application with settings orconditions for updating, synchronizing, sharing, saving, processingtransactions and utilizing biometric information. For example, one ofthe sensors 217 that may have failed may be ignored in response toimproper or unreliable data being gathered. As a result, the useridentification process may be dynamically performed utilizing anycombination of sensor measurements. For example, the number and positionof the sensors 217 utilized to perform status determinations for theuser may vary based on failures, inaccurate data, or other temporary orpermanent issues with hardware and software of the wireless earpieces202.

FIG. 3 is a flowchart of a process for authenticating a request inaccordance with an illustrative embodiment. In one embodiment, theprocess of FIG. 3 may be implemented by one or more wireless earpieces,such as the wireless earpieces 102 of FIG. 1. For example, the method ofFIG. 3 may be performed for both of the wireless earpieces as a pair/setor for each of wireless earpieces individually to process a request. Inone embodiment, the biometric readings and user input may include one ormore of a heart rate, hand gestures, designated motions, voicecharacteristics (e.g., amplitude, frequency, jitter, shimmer, etc.) skinconductivity, vocabulary, blood oxygenation, temperature, heart beatpattern, ear map, calories expended per time period, sweat levels,orientation, position, and so forth. The method of FIG. 3 may beperformed to authorize a request. For example, the existing sensors ofthe wireless earpieces may be utilized to authorize a specific feature,function, action, and/or data access (e.g., data storage, data,retrieval, data communication to an external device, etc.). The processof FIG. 3 may be performed by one or more of the wireless earpiecesand/or one or more wireless devices (e.g., cell phone, tablet, gamingdevice, smart card, etc.). In one embodiment, the request may be orinclude identification of the user.

The process may begin with the wireless earpieces receiving a requestthat requires authentication (step 302). In one embodiment, the requestmay be automatically generated based on circumstances, conditions, oruser actions. In one example, the wireless earpieces may need toautomatically identify the user as part of a request (e.g., upon startup, once positioned in the ears of a user, upon activating a specifiedapplication or feature, etc.). In another example, the wireless earpiecemay detect a wireless device linked with the wireless earpieces and maybe prompted to synchronize health data once authorized by the user. Therequest may also be received in response to a user request (e.g., sharemy work out data with John, open my bank app, etc.). The user may alsopre-program a specified voice command, gesture, head motion, or otherinput that may be sensed by the wireless earpieces. In one embodimentthe request may require a combination or simultaneous reading of varioususer inputs and biometrics to authorize the request. In one embodiment,the request may be initiated and processed entirely utilizing thewireless earpieces. In another embodiment, the request may be receivedfrom a wireless device, such as a cell phone, in communication with thewireless earpieces. The request may provide information that thewireless device requires the biometric reading or other user input toauthenticate a specified feature, function, action, data, or so forth.For example, the request may be played as an audio or tactile alert tothe wireless earpieces. In one embodiment, one or more applications orother software interfaces of both the wireless device and the wirelessearpieces may interact to perform the communications of FIG. 3.

Next, the wireless earpieces perform biometric readings for a userutilizing the wireless earpieces (step 304). The sensor locations andtypes of sensors within the wireless earpieces may vary. The sensors maygenerate a number of biometric readings that may be utilizedindividually or compiled to subsequently identify the user and specificbiometric factors. The sensors may include one or more inertial sensors,temperature sensors, heart pulse rate sensors, skin conductivitysensors, and microphones (i.e., analyzing the user's voice). The sensorsmay measure data or information that may be utilized to determine orimply the user's identity as herein described. The sensor readings mayinclude active or passive sensor readings. The sensors may utilize anynumber of sampling rates or time periods for performing the sensormeasurements. For example, the sensors may identify the user from themoment the wireless earpieces are placed in the ears of the user suchthat any potential requests may be automatically authenticated asbelonging to the authorized user. The biometric readings may also beperformed in response to receiving the request described in step 302. Inanother embodiment, the biometric readings may represent user inputpurposely provided by the user as part of an identification process,such as gestures, motions, verbal commands, posing, sounds, and soforth. The specified user input or baseline readings for the biometricreadings may have been previously entered, saved, or logged forutilization as part of the transaction process. For example, thewireless earpieces may store user preferences and access informationthat specify the type, order, and accuracy of biometric information anduser input required to perform authentication.

Next, the wireless earpieces analyze the biometric readings to determinewhether a biometric profile authorizes the request to be fulfilled (step306). The wireless earpieces may store a number of biometric profilesassociated with a number of users that may utilize the wirelessearpieces. The biometric profiles may specify what features, functions,access, and control each of a number of users has when utilizing thewireless earpieces. The biometric profiles may also specify specificbiometric identifiers, readings, or input may be required toauthenticate and implement distinct requests. The biometric readings orother user input may be analyzed for accuracy statistical significance,and so forth. For example, the biometric readings taken in real-time bythe wireless earpieces may be compared against default, baseline, orstandard biometric data, values, or readings associated with thebiometric profiles for the user to ensure accuracy in identifying theuser. Likewise, user input that may be received for verificationpurposes may be compared against pre-established or trained data. Thewireless earpieces may also perform biasing or error correction asneeded during step 304 to ensure the sensor measurements are accurate.For example, if a sensor from one of the wireless earpieces is measuringincorrect or inaccurate data, the data from that sensor may bedisregarded for purposes of performing analysis. The sensor measurementsmay be run through any number of computations utilizing the processor ofone of the wireless earpieces. In one embodiment, a number of biometricreadings and/or user input may be required to be received sequentially,simultaneously, or concurrently to authorize the request.

Next, the wireless earpieces determine whether there is a biometricprofile authorization (step 308). As previously noted, the identity ofthe user may be determined utilizing the biometric readings and one ormore biometric profiles. As noted, a number of different users mayutilize the wireless earpieces at any given time. For example, each ofthe different users may have distinct personal information, securitysettings, permissions, applications and preferences that may be utilizedby the user. During step 306, the wireless earpieces may ensure that allsecurity measures, conditions, thresholds, and information are providedand authenticated to perform the request. For example, a request toallow standard operations of the wireless earpieces may be implementedin response to identifying a User A utilizing an ear map and voicecharacteristics. In another example, requests for personal data to beshared by User B may be performed in response to a voice confirmationand gesture confirmation confirmed through the wireless earpieces. Inanother example, a request to open a financial application by User C maybe performed in response to the wireless earpieces being securely linkedwith wireless device B and the user tapping the right wireless earpiecetwice in a row. In yet another example, sending personal data by User Dmay be performed in response to a skin conductivity, a verbal pinnumber, and ear mapping.

If the biometric profile authorization is granted during step 308, thewireless earpieces fulfill the request (step 310). During step 310 therequest may be fulfilled by accessing or sending data, opening anapplication, enabling a feature, or performing other specifiedfunctionality of the wireless earpieces. In another embodiment, therequest may be fulfilled by a wireless device in communication with thewireless earpieces. During step 310 the wireless earpieces may fulfillthe request directly or indirectly. Requests may be fulfilled utilizingany number of hardware and software devices, components, and modules.

If the biometric profile authorization is not granted during step 308,the wireless earpiece generates an alert if needed (step 312). The alertmay be generated in any number of ways. In one embodiment, the alert isan internal alert that may be communicated to the user of the wirelessearpieces. For example, the alert may be communicated to the user as anaudio, tactile, or visual alert, such as “the Dash (wireless earpieces)is not accessible based on the currently provided user biometrics”, or“the selected app cannot be opened.” The alert may also be communicatedto a wireless device in communication with the wireless earpiece. Forexample, an alert may be sent to a cell phone in communication with thewireless earpiece to display an application specific alert to the user,such as “this feature is not available due to improper authorization.”In some embodiments, the alert may be sent through email, text message,or other designated communications technique in the event that thewireless earpieces are being utilized by an unauthorized party. In otherembodiments, no alert may be generated.

Next, the wireless earpieces reject the request (step 314). Therejection may be a default response to determining the user is notauthorized to fulfill the request. The rejection may ensure the properverifications are performed before fulfilling a request. As a result,the wireless earpieces are more secure and may be shared betweenmultiple users while still securing data and access to features andfunctionality of the wireless earpieces. The process of FIG. 3 may allowthe user to automatically secure access to the data, features, andfunctions of the wireless earpieces.

The illustrative embodiments provide a system, method, and wirelessearpiece(s) for managing access to the data, features, and functions ofthe wireless earpieces utilizing biometric profiles. The describedprocess may be utilized in combination with various features, functions,methods, systems, devices, components, or claim sets of the wirelessearpieces or as separately described. The illustrative embodiments maytake the form of an entirely hardware embodiment, an entirely softwareembodiment (including firmware, resident software, micro-code, etc.) oran embodiment combining software and hardware aspects that may allgenerally be referred to herein as a “circuit,” “module” or “system.”Furthermore, embodiments of the inventive subject matter may take theform of a computer program product embodied in any tangible medium ofexpression having computer usable program code embodied in the medium.The described embodiments may be provided as a computer program product,or software, that may include a machine-readable medium having storedthereon instructions, which may be used to program a computing system(or other electronic device(s)) to perform a process according toembodiments, whether presently described or not, since every conceivablevariation is not enumerated herein. A machine readable medium includesany mechanism for storing or transmitting information in a form (e.g.,software, processing application) readable by a machine (e.g., acomputer). The machine-readable medium may include, but is not limitedto, magnetic storage medium (e.g., floppy diskette); optical storagemedium (e.g., CD-ROM); magneto-optical storage medium; read only memory(ROM); random access memory (RAM); erasable programmable memory (e.g.,EPROM and EEPROM); flash memory; or other types of medium suitable forstoring electronic instructions. In addition, embodiments may beembodied in an electrical, optical, acoustical or other form ofpropagated signal (e.g., carrier waves, infrared signals, digitalsignals, etc.), or wireline, wireless, or other communications medium.

Computer program code for carrying out operations of the embodiments maybe written in any combination of one or more programming languages,including an object oriented programming language such as Java,Smalltalk, C++ or the like and conventional procedural programminglanguages, such as the “C” programming language or similar programminglanguages. The program code may execute entirely on a user's computer,partly on the user's computer, as a stand-alone software package, partlyon the user's computer and partly on a remote computer or entirely onthe remote computer or server. In the latter scenario, the remotecomputer may be connected to the user's computer through any type ofnetwork, including a local area network (LAN), a personal area network(PAN), or a wide area network (WAN), or the connection may be made to anexternal computer (e.g., through the Internet using an Internet ServiceProvider).

FIG. 4 depicts a computing system 400 in accordance with an illustrativeembodiment. For example, the computing system 400 may represent adevice, such as the wireless device 104 of FIG. 1. The computing device400 may be utilized to receive user settings, instructions, or feedbackfor controlling the functions, features, operations, and actions of thewireless earpieces together and separately. In one embodiment, thecomputing device 400 may utilize biometric profiles to control andmanage the features and functions implemented by the wireless earpieces.The computing device 400 includes a processor unit 401 (possiblyincluding multiple processors, multiple cores, multiple nodes, and/orimplementing multi-threading, etc.). The computing system includesmemory 407. The memory 407 may be system memory (e.g., one or more ofcache, SRAM, DRAM, zero capacitor RAM, Twin Transistor RAM, eDRAM, EDORAM, DDR RAM, EEPROM, NRAM, RRAM, SONOS, PRAM, etc.) or any one or moreof the above already described possible realizations of machine-readablemedia. The computing system also includes a bus 403 (e.g., PCI, ISA,PCI-Express, HyperTransport®, InfiniBand®, NuBus, etc.), a networkinterface 405 (e.g., an ATM interface, an Ethernet interface, a FrameRelay interface, SONET interface, wireless interface, etc.), and astorage device(s) 409 (e.g., optical storage, magnetic storage, etc.).The system memory 407 embodies functionality to implement embodimentsdescribed above. The system memory 407 may include one or morefunctionalities that facilitate retrieval of the audio informationassociated with an identifier. Code may be implemented in any of theother devices of the computing system 400. Any one of thesefunctionalities may be partially (or entirely) implemented in hardwareand/or on the processing unit 401. For example, the functionality may beimplemented with an application specific integrated circuit, in logicimplemented in the processing unit 401, in a co-processor on aperipheral device or card, etc. Further, realizations may include feweror additional components not illustrated in FIG. 4 (e.g., video cards,audio cards, additional network interfaces, peripheral devices, etc.).The processor unit 401, the storage device(s) 409, and the networkinterface 405 are coupled to the bus 403. Although illustrated as beingcoupled to the bus 403, the memory 407 may be coupled to the processorunit 401.

The illustrative embodiments are not to be limited to the particularembodiments described herein. In particular, the illustrativeembodiments contemplate numerous variations in the type of ways in whichembodiments may be applied. The foregoing description has been presentedfor purposes of illustration and description. It is not intended to bean exhaustive list or limit any of the disclosure to the precise formsdisclosed. It is contemplated that other alternatives or exemplaryaspects are considered included in the disclosure. The description ismerely examples of embodiments, processes or methods of the invention.It is understood that any other modifications, substitutions, and/oradditions may be made, which are within the intended spirit and scope ofthe disclosure. For the foregoing, it can be seen that the disclosureaccomplishes at least all of the intended objectives.

The previous detailed description is of a small number of embodimentsfor implementing the invention and is not intended to be limiting inscope. The following claims set forth a number of the embodiments of theinvention disclosed with greater particularity.

What is claimed is:
 1. A method for authenticating utilization of one or more wireless earpieces, the method comprising: receiving a request through the one or more wireless earpieces, wherein the request is automatically generated in response to a user action when utilizing the one or more wireless earpieces; accessing a biometric profile comprising a type of biometric readings, an order of biometric readings, and an accuracy of biometric readings for authenticating the request; performing a first biometric reading for the user utilizing a first sensor of the one or more wireless earpieces, the first sensor providing a first type of biometric readings; performing a second biometric reading for the user utilizing a second sensor of the one or more wireless earpieces, the second sensor providing a second type of biometric readings; analyzing the first and the second biometric readings to determine whether the biometric profile authorizes the one or more wireless earpieces to fulfill the request; and authenticating the request in response to determining the biometric profile authorizes fulfillment of the request without requiring user input; wherein the biometric readings are automatically performed in response to the one or more wireless earpieces being positioned in ears of the user to immediately authenticate the request utilizing the biometric profile when the biometric readings are received.
 2. The method of claim 1, wherein the one or more wireless earpieces include one or more biometric profiles associated with one or more users.
 3. The method of claim 1, wherein the biometric profile includes a plurality of biometric data associated with the user.
 4. The method of claim 3, wherein the biometric profile specifies one or more of the plurality of biometric data that are associated with each of a plurality of actions.
 5. The method of claim 3, wherein the plurality of biometric data includes voice characteristics, pulse, ear mapping, and temperature.
 6. The method of claim 1, further comprising: rejecting the request in response to determining the biometric profile does not authorize the one or more wireless earpieces to fulfill the request.
 7. The method of claim 1, wherein the one or more wireless earpieces are a pair of wireless earpieces.
 8. The method of claim 1, wherein the biometric readings are read a number of times specified by the biometric profile to authenticate the request.
 9. The method of claim 1, wherein the request includes at least identifying the user is authorized to perform an action associated with the request.
 10. The wireless earpiece of claim 9, wherein the biometric readings are read a number of times specified by the biometric profile to authenticate the request.
 11. The wireless earpiece of claim 9, wherein the set of instructions are further executed to: fulfill the request in response to the authenticating the request, wherein the request includes at least identifying the user is authorized to perform an action associated with the request.
 12. The wireless earpiece of claim 9, wherein the set of instructions are further executed to: play alerts to the user regarding the status of the request.
 13. A wireless earpiece comprising: a processor for executing a set of instructions; and a memory for storing the set of instructions, wherein the set of instructions are executed to: receive a request through the one wireless earpiece, wherein the request is automatically generated in response to a user action when utilizing the one or more wireless earpieces; determine from a biometric profile a type of biometric readings, an order of biometric readings, and an accuracy of biometric readings for authenticating the request; perform the biometric readings for a user utilizing sensors of the wireless earpiece based on the type of the biometric readings and the order of the biometric readings, wherein the biometric readings include a first biometric reading sensed with a first sensor of the wireless earpieces and a second biometric reading sensed with a second sensor of the wireless earpieces; analyze the biometric readings including the accuracy of the biometric readings to determine whether the biometric profile authorizes the wireless earpiece to fulfill the request; and authenticate the request in response to determining the biometric profile authorizes fulfillment of the request, without requiring user input; wherein the biometric readings are automatically performed in response to the one or more wireless earpieces being positioned in ears of the user to immediately authenticate the request utilizing the biometric profile when the biometric readings are received.
 14. The wireless earpiece of claim 13, wherein the memory stores one or more biometric profiles associated with one or more users.
 15. The wireless earpiece of claim 13, wherein the set of instructions are further executed to: reject the request in response to determining the biometric profile does not authorize the wireless earpiece to fulfill the request.
 16. The wireless earpiece of claim 13, wherein the biometric profile includes a plurality of biometric data associated with the user, and wherein the biometric profile specifies one or more of the plurality of biometric data that are associated with each of a plurality of actions.
 17. A wireless earpiece, comprising: a frame for fitting in an ear of a user; a logic engine controlling functionality of the wireless earpiece; a memory operatively connected to the logic engine for storing one or more biometric profiles associated with one or more users; and a plurality of sensors performing biometric readings of the user, the plurality of sensors including at least a first sensor for performing a first of the biometric readings and a sensor for performing a second of the biometric readings, wherein the logic engine receives a request through the one or more wireless earpieces, analyzes the biometric readings to determine whether a biometric profile authorizes the wireless earpiece to fulfill the request, and authenticates the request in response to determining the biometric profiles authorizes fulfillment of the request without requiring the user to provide input; wherein the request is automatically generated in response to a user action when utilizing the one or more wireless earpieces; wherein each of the biometric profiles identifies type of biometric readings, order of biometric readings, and accuracy of biometric readings required for authentication; wherein the biometric readings include at least voice characteristics and topographical mapping of the user; wherein the logic engine further rejects the request in response to determining the biometric profile does not authorize the wireless earpiece to fulfill the request without requiring the user to provide input; wherein the request is associated with identifying the user utilizing the wireless earpiece and at least one of (1) information securely stored by the one or more wireless earpieces and (2) unlocking a feature or function accessible through the wireless earpiece; wherein the biometric readings are automatically performed in response to the one or more wireless earpieces being positioned in ears of the user to immediately authenticate the request utilizing the biometric profile when the biometric readings are received.
 18. The wireless earpiece of claim 17, wherein the biometric readings are read a number of times specified by the biometric profile to authenticate the request. 