Wearable Earpiece Multifactorial Biometric Analysis System and Method

ABSTRACT

A system, method and one or more wireless earpieces for authenticating a transaction utilizing one or more wireless earpieces. An indication that the transaction is pending is received by the one or more wireless earpieces. Biometric readings are performed for a user utilizing sensors of the one or more wireless earpieces. The biometric readings are analyzed to determine whether the user is authorized to perform the transaction. The transaction is authenticated in response to determining the biometric readings authorize the user to perform the transaction.

PRIORITY STATEMENT

This application claims priority to U.S. Provisional Patent Application No. 62/359,560, filed Jul. 7, 2016, entitled Wearable Earpiece Multifactorial Biometric Analysis System and Method, and hereby incorporated by reference in its entirety.

FIELD OF THE INVENTION

The present invention relates to wireless earpieces. More specifically, but not exclusively, the present invention relates to authenticating transactions utilizing biometric readings from wireless earpieces.

BACKGROUND IN THE ART

The growth of wireless transactions and authentication is increasing exponentially. This growth is fostered by the decreasing size of transceivers, chips, and other components as well as enhanced transaction standards and protocols. Securing these wireless transactions utilizing authenticated user information and biometrics continues to be a concern due to the high number of transactions and their associated value.

SUMMARY OF THE DISCLOSURE

Therefore, it is a primary object, feature, or advantage to improve over the state of the art.

It is a further object, feature, or advantage to provide for the coordination of advanced biometric sensors in order to verify the user.

It is a still further object, feature, or advantage to provide new and novel mappings sing onboard biometric sensors to map the surroundings of the external auditory canal, the tragal region as well as the pinna in a 360 degree fashion to provide a unique biometric identifier.

Another object, feature or advantage is to provide onboard storage of the biometric identifiers in a protected area of the device.

Yet another objection, feature, or advantage is to provide a summation or combination of multiple biometric identifiers. Another object, feature, or advantage is to facilitate transactions based upon the successful use of a whole suite of biometric identifiers for high level security.

A further object, feature, or advantage is the use of multiple variable identifiers to reduce the ability of hackers to replicate the unique biometric array of data.

A still further object, feature, or advantage is to allow for greater security for a user. Another object, feature, or advantage is to allow for user data for major emergency issues to be stored on the device and allow for specified access such as in a medical emergency situation.

Yet another object, feature, or advantage is to provide a security device to allow for specific two way communication based on biometric protocols. One or more of these and/or other objects, features, or advantages will become apparent from the specification and claims that follow. No single embodiment need exhibit each and every object, feature, or advantage as different embodiments may have different objects, features, or advantages.

One embodiment provides a system, method and one or more wireless earpieces for authenticating a transaction utilizing one or more wireless earpieces. An indication that the transaction is pending is received by the one or more wireless earpieces. Biometric readings are performed for a user utilizing sensors of the one or more wireless earpieces. The biometric readings are analyzed to determine whether the user is authorized to perform the transaction. The transaction may include a financial transaction, secure communication, release of private information, application access, or any number of other secure transactions or processes. The transaction is authenticated in response to determining the biometric readings authorize the user to perform the transaction. Another embodiment provides wireless earpieces including a processor and a memory storing a set of instructions. The set of instructions are executed to perform the method described.

Another embodiment provides a wireless earpiece. The wireless earpiece includes a frame for fitting in an ear of a user. The wireless earpiece further includes a logic engine controlling functionality of the wireless earpiece. The wireless earpiece further includes a number of sensors taking biometric readings. The logic engine receives an indication of the one or more wireless earpieces that the transaction is pending, analyzes the biometric readings to determine whether the user is authorized to perform the transaction, and authenticates the transaction in response to determining the biometric readings authorize the user to perform the transaction.

BRIEF DESCRIPTION OF THE DRAWINGS

Illustrated embodiments of the present invention are described in detail below with reference to the attached drawing figures, which are incorporated by reference herein, and where:

FIG. 1 is a pictorial representation of a transaction environment in accordance with an illustrative embodiment;

FIG. 2 is a block diagram of wireless earpieces in accordance with an illustrative embodiment;

FIG. 3 is a flowchart of a process for authenticating a transaction in accordance with an illustrative embodiment; and

FIG. 4 depicts a computing system in accordance with an illustrative embodiment.

DETAILED DESCRIPTION OF THE DISCLOSURE

The illustrative embodiments provide a system, method, and a wireless earpiece for authenticating a transaction utilizing wireless earpieces. Although different embodiments may be shown and described it is to be understood that features from one embodiment may be present in other embodiments and that the embodiments need not be exclusive of one another. The wireless earpieces may be utilized to directly or indirectly authenticate a transaction being performed by the user. In one embodiment, the wireless earpieces may work in combination with a dynamic or static wireless device, such as a cell phone, smart card, smart wearable (e.g., watch, ring, etc.), radio frequency identification tag, or so forth. The wireless earpieces are worn in the ear of the user. In response to an indication that a wireless earpiece is pending, the wireless earpieces may be utilized to perform any number of authentication actions. The wireless earpieces may be utilized to receive biometric readings from the user or other identifying information to authenticate a transaction. The transaction

The biometric readings may include any of the unique information gathered by the wireless earpieces including heart rate or pattern, voice characteristics, skin conductivity, or so forth. The wireless earpieces or other connected devices may store standard measurements or norms for comparison purposes. As a result, the biometric readings may be analyzed to perform comparisons to authenticate the biometric readings. The biometric readings may also indicate the user's physical or emotional state as determined using biometric information, sensed information, and other information and data about the user or the user's environment to ensure that the transaction should be authorized. The biometric readings of the user may be determined from a pair of wireless earpieces or a single wireless earpiece worn by the user. The description included herein may refer to the wireless earpieces individual or collectively.

The wireless earpieces are configured to fit at least partially into an external auditory canal of the user. The ear canal is a rich space for obtaining biometric measurements about the user as well as stabilizing the wireless earpieces as they are worn. The wireless earpieces may be utilized during a number of rigorous physical activities that require stability. The shape and configuration of the wireless earpieces allow the wireless earpieces to be worn for long periods of time while gathering valuable information utilizing the sensors of the wireless earpieces. The wireless earpieces may include sensors for measuring pule rate, blood oxygenation, microphone, position/orientation, location, temperature, altitude, cadence, calorie expenditure, and so forth.

The wireless earpieces may include any number of sensor arrays configured to capture information about the user. The large amount of data may be utilized to authenticate the user for any number of transactions. The wireless earpieces may configure themselves to perform various functions as well as sending commands to any number of proximate devices to implement transaction, commands, or specified actions. The wireless earpieces may learn over time in response to selections made utilizing the wireless earpieces or interconnected devices, such as a cell phone. The sensors may sense dynamic manifestations including movement patterns, fluidity, hesitations, volume of the voice, amplitude and frequency modulations (e.g., jitter, shimmer rates, etc.) temperature fluctuations, increases or decreases in heart rate, level of sweat production for comparison utilize logic of the wireless earpieces to generate one or more actions. Alerts may be played to the user indicating the status of the transaction (e.g., initiated, in process, pending, awaiting verification, approved, rejected, etc.).

FIG. 1 is a pictorial representation of a transaction environment 100 in accordance with an illustrative embodiment. The wireless earpieces 102 may be configured to communicate with each other and with one or more wireless devices, such as a wireless device 104. The wireless earpieces 102 may be worn by a user 106 and are shown as worn and separately from their positioning within the ears of the user 106 for purposes of visualization. A block diagram of the wireless earpieces 102 if further shown in FIG. 2 to further illustrate components and operation of the wireless earpieces 102.

In one embodiment, the wireless earpieces 102 includes a frame 108 shaped to fit substantially within the ears of the user 106. The frame 108 is a support structure that at least partially encloses and houses the electronic components of the wireless earpieces 102. The frame 108 may be composed of a single structure or multiple structures that are interconnected. The frame 108 defines an extension 110 configured to fit substantially within the ear of the user 106. The extension 110 may include one or more speakers or vibration components for interacting with the user 106. The extension 110 may be removable covered by one or more sleeves. The sleeves may be changed to fit the size and shape of the user's ears. The sleeves may come in various sizes and have extremely tight tolerances to fit the user 106 and one or more other users that may utilize the wireless earpieces 102 during their expected lifecycle. In another embodiment, the sleeves may be custom built to support the interference fit utilized by the wireless earpieces 102 while also being comfortable while worn.

In one embodiment, the frame 108 or the extension 110 (or other portions of the wireless earpieces 102) may include sensors 112 for sensing pulse, blood oxygenation, temperature, voice characteristics, skin conduction, glucose levels, impacts, activity level, position, location, orientation, as well as any number of internal or external user biometrics. In other embodiments, the sensors 112 may be internally positioned within the wireless earpieces 102. For example, the sensors 112 may represent metallic contacts, optical interfaces, or micro-delivery systems for receiving and delivering information. Small electrical charges may be passed through the sensors 112 to analyze the biometrics of the user 106 including pulse, skin conductivity, blood analysis, sweat levels, band so forth. Sensors 112 may also be utilized to sense or provide a small electrical current which may be useful for alerting the user, stimulating blood flow, alleviating nausea, or so forth.

In some applications, temporary adhesives or securing mechanisms (e.g., clamps, straps, lanyards, extenders, etc.) may be utilized to ensure that the wireless earpieces 102 remain in the ears of the user 106 even during the most rigorous and physical activities.

For example, the wireless earpieces 102 may be utilized during marathons, swimming, team sports, biking, hiking, parachuting, or so forth. The wireless earpieces 102 may be configured to play music or audio, receive and make phone calls or other communications, determine ambient environmental conditions (e.g., temperature, altitude, location, speed, heading, etc.), read user biometrics (e.g., heart rate, motion, temperature, sleep, blood oxygenation, voice output, calories burned, forces experienced, etc.), and receive user input, feedback, or instructions. The wireless earpieces 102 may be utilized to authenticate a transaction to which the user 106 is a party.

The transaction environment 100 may further include a transaction device 118. The transaction device 118 may communicate with one or more wired or wireless networks, such as a network 120. The transaction device 118 may represent any number of devices, systems, equipment, or components, such as a point of sale terminal, wireless transaction device, credit card machines, or so forth. The transaction device 118 may utilize any number of standards, protocols, or processes. For example, the transaction device 118 may utilize credit/debit cards, online accounts, PayPal, Apple Pay, Google

Wallet, Android Pay, Samsung Pay, flint, Breadcrumb, LevelUp, Square, Spark Pay, iZettle, PayAnywhere, Dwolla, or any number of payment service providers and the associated device(s).

The wireless earpieces 102 may determine their position with respect to each other as well as the wireless device 104 and the transaction device 118. For example, position information for the wireless earpieces 102 and the wireless device 104 may determine proximity of the devices in the transaction environment 100. For example, global positioning information or signal strength/activity may be utilized to determine proximity and distance of the devices to each other in the transaction environment 100. In one embodiment, the distance information may be utilized to determine whether a transaction may be authorized. For example, the wireless earpieces 102 may be required to be within four feet of the wireless device 104 and the transaction device 118 in order to perform a biometric readings or receive user input utilized to authenticate or reject a transaction sought out by the user 106.

In one embodiment, the wireless earpieces 102 and the corresponding sensors 112 (whether internal or external) may be configured to take a number of measurements or log information during normal usage. The sensor measurements may be utilized to extrapolate other measurements, factors, or conditions applicable to the user 106. For example, the sensors 112 may monitor the user's heartbeat or EKG to determine the user's unique pattern or characteristics. The user 106 or another party may configure the wireless earpieces 102 directly or through a connected device and app (e.g., mobile app with a graphical user interface) to store or share information, audio, images, and other data. Some examples of standard usage may include detecting and recording a heartbeat, setting a biometric for transaction authentication, setting a gesture/input for transaction authentication, active participation in a conversation, listening to music, or so forth.

The user 106 or another party may also utilize the wireless device 104 to associate biometric information and conditions with the actual or perceived status of the user 106.

As a result, the wireless earpieces 102 may be adjusted or trained over time to become even more accurate in reading biometric information of the user 106. The wireless earpieces 102 may utilize historical information to generate default values, baselines, thresholds, policies, or settings for determining when and how the user's biometric identifiers are read.

The wireless earpieces 102 may include any number of sensors 112 and logic for measuring and determining user biometrics, such as pulse rate, skin conduction, blood oxygenation, temperature, calories expended, voice and audio output, position, and orientation (e.g., body, head, etc.). The sensors 112 may also determine the user's location, position, velocity, impact levels, and so forth. The sensors 112 may also receive user input and convert the user input into commands or selections made across the personal devices of the personal area network. For example, the user input detected by the wireless earpieces 102 may include voice commands, head motions, finger taps, finger swipes, motions or gestures, or other user inputs sensed by the wireless earpieces. The user input may be determined by the wireless earpieces 102 and converted into transaction authorization commands that may be sent to one or more external devices, such as the wireless device 104, the transaction device 118, a tablet computer, or so forth. For example, the user 106 may create a specific head motion and voice command that when detected by the wireless earpieces 102 are utilized to authenticate a transaction or secure communication to or from the wireless earpieces 102.

The sensors 112 may make all of the measurements with regard to the user 106 or may communicate with any number of other sensory devices in the transaction environment 100 to measure information and data about the user 106 as well as the transaction environment 100 itself. In one embodiment, the transaction environment 100 may represent all or a portion of a personal area network. The wireless earpieces 102 may be utilized to control, communicate, manage, or interact with a number of other wearable devices or electronics, such as smart glasses, helmets, smart glass, watches or wrist bands, other wireless earpieces, chest straps, implants, displays, clothing, or so forth. A personal area network is a network for data transmissions among devices, such as personal computing, communications, camera, vehicles, entertainment, and medical devices. The personal area network may utilize any number of wired, wireless, or hybrid configurations and may be stationary or dynamic. For example, the personal area network may utilize wireless network protocols or standards, such as INSTEON, IrDA, Wireless USB, Bluetooth, Z-Wave, ZigBee, Wi-Fi, ANT+ or other applicable radio frequency signals. In one embodiment, the personal area network may move with the user 106.

In other embodiments, the transaction environment 100 may include any number of devices, components, or so forth that may communicate with each other directly or indirectly through a wireless (or wired) connection, signal, or link. The transaction environment 100 may include one or more networks and network components and devices represented by the network 120, such as routers, servers, signal extenders, intelligent network devices, computing devices, or so forth. In one embodiment, the network 120 of the transaction environment 100 represents a personal area network as previously disclosed. The network 120 may also be a secure financial network including connections for performing a transaction.

Communications within the transaction environment 100 may occur through the network 120 or may occur directly between devices, such as the wireless earpieces 102 and the wireless device 104, or indirectly through a network, such as a Wi-Fi network. The network 120 may communicate with or include a wireless network, such as a Wi-Fi, cellular (e.g., 3G, 4G, 5G, PCS, GSM, etc.), Bluetooth, or other short range or long range radio frequency network. The network 120 may also include or communicate with any number of hard wired networks, such as local area networks, coaxial networks, fiber-optic networks, network adapters, or so forth. Communications within the transaction environment 100 may be operated by one or more users, service providers, or network providers.

The wireless earpieces 102 may play, communicate, or utilize any number of alerts or communications to indicate that the status of a transaction. For example, one or more alerts may indicate when a transaction is pending, in process, authorized, and/or rejected with specific tones, verbal acknowledgements, tactile feedback, or other forms of communicated messages. For example, an alert may be played during each stage of the transaction. The corresponding alert may also be communicated to the user 106, the wireless device 104, and the transaction device 118.

In other embodiments, the wireless earpieces 102 may also vibrate, flash, play a tone or other sound, or give other indications of the transaction status in order to prompt user actions (e.g., providing a biometric reading, gesture, etc.) or implement any number of processes. The wireless earpieces 102 may also communicate an alert to the wireless device 104 that shows up as a notification, message, or other indicator indicating the changed status of the transaction.

The wireless earpieces 102 as well as the wireless device 104 may include logic for automatically implementing actions in response to a pending transaction or various conditions and factors of the transaction environment 100. For example, the wireless device 104 may communicate instructions received from the wireless earpieces 102 for the user 106 to authorize a transaction at a fast food restaurant. The wireless device 104 may include an application that displays instructions and information to the user 106 in response to the transaction status.

In one embodiment, the wireless device 104 may utilize short-range or long-range wireless communications to communicate with the wireless earpieces 102 through a wireless signal or devices of the transaction environment 100. For example, the wireless device 104 may include a Bluetooth and cellular transceiver within the embedded logical components. For example, the wireless signal may be a Bluetooth, Wi-Fi, Zigbee, Ant+, near-field magnetic induction (NFMI), or other short range wireless communication.

The wireless device 104 may represent any number of wireless or wired electronic communications or computing devices, such as smart phones, laptops, desktop computers, control systems, tablets, displays, gaming devices, music players, personal digital assistants, vehicle systems, or so forth. The wireless device 104 may communicate utilizing any number of wireless connections, standards, or protocols (e.g., near field communications, NFMI, Bluetooth, Wi-Fi, wireless Ethernet, etc.). For example, the wireless device 104 may be a touch screen cellular phone that communicates with the wireless earpieces 102 utilizing Bluetooth communications. The wireless device 104 may implement and utilize any number of operating systems, kernels, instructions, or applications that may make use of the available sensor data sent from the wireless earpieces 102. For example, the wireless device 104 may represent any number of android, iOS, Windows, open platforms, or other systems and devices. Similarly, the wireless device 104 or the wireless earpieces 102 may execute any number of applications that utilize the user input, proximity data, biometric data, and other feedback from the wireless earpieces 102 to initiate, authorize, or process a transaction and perform the associated tasks.

As noted, the layout of the internal components of the wireless earpieces 102 and the limited space available for a product of limited size may affect where the sensors 112 may be positioned. The positions of the sensors 112 within each of the wireless earpieces 102 may vary based on the model, version, and iteration of the wireless earpiece design and manufacturing process.

FIG. 2 further illustrates a block diagram of the wireless earpieces 202. As noted, the components of the wireless earpieces 202 may be described collectively rather than individually. The wireless earpieces 202 may be wirelessly linked to any number of wireless devices, such as the wireless device 104 of FIG. 1. For example, wireless devices may include wearable devices, communications devices, computers, entertainment devices, vehicle systems, exercise equipment, or so forth. Sensor measurements, user input, and commands may be received from either the wireless earpieces 202 or the wireless device (not shown) for processing and implementation on either of the devices (or other externally connected devices). Reference to the wireless earpieces 202 may descriptively or functionally refer to either the pair of wireless earpieces (wireless earpieces) or individual wireless earpieces (left wireless earpiece and right wireless earpiece) without limitation.

In some embodiments, the wireless device may also act as a logging tool for sensor data or measurements made by the wireless earpieces 202. For example, the wireless device may receive and share data captured by the wireless earpieces 202 in real-time including biometric information, such as a transaction biometrics or input or status of the user (e.g., physical, emotional, etc.). As a result, the wireless device may be utilized to store, display, and synchronize sensor data received from the wireless earpieces 202. For example, the wireless device may display user pulse rate, temperature, proximity, location, blood oxygenation, distance, calories burned, and so forth as measured by the wireless earpieces 202. The wireless device may be configured to receive and display alerts that indicate conditions to initiate, process, and authenticate a transaction have been met. For example, if a transaction is requested and if the wireless earpieces 202 meet a distance threshold with a wireless device, the wireless earpieces 202 may automatically display as an alert, message, or in-app communication, such as “please authenticate the transaction initiated from your cell phone.” The wireless earpieces 202 and the wireless device may have any number of electrical configurations, shapes, and colors and may include various circuitry, connections, and other components utilized to perform the illustrative embodiments.

In one embodiment, the wireless earpieces 202 may include a battery 208, a logic engine 210, a memory 212, a user interface 214, a physical interface 215, a transceiver 216, and sensors 217. The wireless device may have any number of configurations and include components and features as are known in the art.

The battery 208 is a power storage device configured to power the wireless earpieces 202. In other embodiments, the battery 208 may represent a fuel cell, thermal electric generator, piezo electric charger, solar charger, ultra-capacitor, or other existing or developing power storage technologies. The sensors 217 may also be utilized to measure the temperature of the battery 208 and the condition of internal components of the wireless earpieces. The sensors may also be utilized to determine data about external conditions and factors applicable to the user, the user's environment, a communicating wireless device, or so forth. Other conditions and factors sensed by the sensors 217 (e.g., water/humidity, pressure, blood oxygenation, blood content levels, altitude, position, impact, radiation, etc.) may also be determined with the data being processed by the logic engine 210.

The logic engine 210 is the logic that controls the operation and functionality of the wireless earpieces 202. The logic engine 210 may include circuitry, chips, and other digital logic. The logic engine 210 may also include programs, scripts, and instructions that may be implemented to operate the logic engine 210. The logic engine 210 may represent hardware, software, firmware, or any combination thereof. In one embodiment, the logic engine 210 may include one or more processors. The logic engine 210 may also represent an application specific integrated circuit (ASIC) or field programmable gate array (FPGA). The logic engine 210 may utilize sensor measurements, user input, user preferences and settings, conditions, factors, and environmental conditions to determine the identity of the user, at least in part, from measurements performed by the wireless earpieces 202. This information may also be utilized to authenticate transactions. The wireless earpieces 202 may function separately or together to authenticate a transaction is allowed by an authorized user. For example, processing may be divided between the wireless earpieces 202 to increase the speed of processing and to load balance any processes being performed. For example, a left wireless earpiece may perform imaging of the user's ear to identify the user while the right wireless earpiece may identify voice characteristics of the wireless earpieces. Multiple forms of identifying information may be utilized to better secure transactions authenticated through the wireless earpieces.

In one embodiment, the logic engine 210 may perform the authentication determination based on measurements and data from the sensors 217. The logic engine 210 may also perform any number of mathematical functions (e.g. linear extrapolation, polynomial extrapolation, conic extrapolation, French curve extrapolation, polynomial interpretation) to determine or infer the identity of the user from the sensor measurements. The logic engine 210 may utilize time and other sensor measurements as causal forces to enhance a mathematical function utilized to perform the determinations, processing, and extrapolation performed by the logic engine 210.

The logic engine 210 may also process user input to determine transaction commands implemented by the wireless earpieces 202 or sent to the wireless earpieces 202 through the transceiver 216. Specific transactions may be allowed based on sensor measurements, extrapolated measurements, environmental conditions, proximity thresholds, and so forth. For example, the logic engine 210 may implement a transaction macro allowing the user to automatically pay for a beverage at a designated place and time each morning utilizing only heartbeat analysis. In another embodiment, different types of transactions may require different levels or combinations of biometric and user information. For example, low value transactions (e.g., 0-$20) may require a single piece of identifying information whereas high value transactions $200+) may require three pieces of identifying information.

In one embodiment, a processor included in the logic engine 210 is circuitry or logic enabled to control execution of a set of instructions. The processor may be one or more microprocessors, digital signal processors, application-specific integrated circuits (ASIC), central processing units, or other devices suitable for controlling an electronic device including one or more hardware and software elements, executing software, instructions, programs, and applications, converting and processing signals and information, and performing other related tasks.

The memory 212 is a hardware element, device, or recording media configured to store data or instructions for subsequent retrieval or access at a later time. The memory 212 may represent static or dynamic memory. The memory 212 may include a hard disk, random access memory, cache, removable media drive, mass storage, or configuration suitable as storage for data, instructions, and information. In one embodiment, the memory 212 and the logic engine 210 may be integrated. The memory may use any type of volatile or non-volatile storage techniques and mediums. The memory 212 may store information related to the user, wireless earpieces 202, wireless device 204, and other peripherals, such as a wireless device, smart glasses, smart watch, smart case for the wireless earpieces 202, wearable device, and so forth. In one embodiment, the memory 212 may display or communicate instructions, programs, drivers, or an operating system for controlling the user interface 214 including one or more LEDs or other light emitting components, speakers, tactile generators (e.g., vibrator), and so forth. The memory 212 may also store biometric readings, user input required for specified transactions, transaction settings and preferences, thresholds, conditions, signal or processing activity, historical information, proximity data, and so forth.

The transceiver 216 is a component comprising both a transmitter and receiver which may be combined and share common circuitry on a single housing. The transceiver 216 may communicate utilizing NFMI, Bluetooth, Wi-Fi, ZigBee, Ant+, near field communications, wireless USB, infrared, mobile body area networks, ultra-wideband communications, cellular (e.g., 3G, 4G, 5G, PCS, GSM, etc.), infrared, or other suitable radio frequency standards, networks, protocols, or communications. For example, the transceiver 216 may coordinate communications and actions between the wireless earpieces 202 utilizing NFMI communications. The transceiver 216 may also be a hybrid transceiver that supports a number of different communications. For example, the transceiver 216 may communicate with wireless devices or other systems utilizing wired interfaces (e.g., wires, traces, etc.), NFC or Bluetooth communications. The transceiver 216 may also detect amplitudes and infer distance between the wireless earpieces 202 and external devices, such as the wireless device or a smart case of the wireless earpieces 202. The components of the wireless earpieces 202 may be electrically connected utilizing any number of wires, contact points, leads, busses, wireless interfaces, or so forth. In addition, the wireless earpieces 202 may include any number of computing and communications components, devices or elements which may include busses, motherboards, circuits, chips, sensors, ports, interfaces, cards, converters, adapters, connections, transceivers, displays, antennas, and other similar components.

The physical interface 215 is hardware interface of the wireless earpieces 202 for connecting and communicating with wireless devices or other electrical components, devices, or systems.

The physical interface 215 may include any number of pins, arms, or connectors for electrically interfacing with the contacts or other interface components of external devices or other charging or synchronization devices. For example, the physical interface 215 may be a micro USB port. In one embodiment, the physical interface 215 is a magnetic interface that automatically couples to contacts or an interface of a wireless device. In another embodiment, the physical interface 215 may include a wireless inductor for charging the wireless earpieces 202 without a physical connection to a charging device.

The user interface 214 is a hardware interface for receiving commands, instructions, or input through the touch (haptics) of the user, voice commands, or predefined motions. For example, the user interface 214 may include a touch screen, one or more cameras or image sensors, microphones, speakers, and so forth. The user interface 214 may be utilized to control the other functions of the wireless earpieces 202. The user interface 214 may include the LED array, one or more touch sensitive buttons or portions, a miniature screen or display, or other input/output components. The user interface 214 may be controlled by the user or based on commands received from the wireless device. For example, the user may turn on, reactivate, or provide feedback utilizing the user interface 214.

In one embodiment, the user interface 214 may include a fingerprint scanner that may be utilized to scan a fingerprint (e.g., the index finger) of a user to authenticate a transaction. The user interface 214 of each of the wireless earpieces 202 may store identifying information for one or more fingers. In one embodiment, the biometric data of the user may be encrypted and stored within a secure portion of the memory 212 to prevent unwanted access or hacking. The wireless earpieces 202 may also tore important biometric data, such as medical information (e.g., medical conditions, allergies, logged biometrics, contacts, etc.) that may be shared in response to an emergency.

In one embodiment, the user may provide user feedback for authenticating a transaction by tapping the user interface 214 once, twice, three times, or any number of times. Similarly, a swiping motion may be utilized across or in front of the user interface 214 (e.g., the exterior surface of the wireless earpieces 202) to implement a predefined action. Swiping motions in any number of directions or gestures may be associated with specific transactions as well as other activities, such as share exercise data, share music playlist, share vitals, play music, pause, fast forward, rewind, activate a digital assistant (e.g., Siri, Cortana, smart assistant, etc.), or so forth without limitation. The swiping motions may also be utilized to control actions and functionality of wireless devices or other external devices (e.g., smart television, camera array, smart watch, etc.). The user may also provide user input for authenticating a transaction by moving his head in a particular direction or motion or based on the user's position or location. For example, the user may utilize voice commands, head gestures, or touch commands to change the content displayed by a wireless device. The user interface 214 may also provide a software interface including any number of icons, soft buttons, windows, links, graphical display elements, and so forth.

In one embodiment, the user interface 214 may periodically utilize one or more microphones and speakers of the wireless earpieces to authenticate the user. The microphone of the user interface 214 may measure various voice characteristics including amplitude, shimmer rates (i.e., changes in amplitude over time) frequency/pitch, jitter rates (i.e., changes in frequency data over time), accent, voice speed, inflection, and so forth. The wireless earpieces 202 may also recognize a pre-defined vocabulary. For example, specific words may be required to authenticate different transaction types.

The sensors 217 may include pulse oximeters, accelerometers, gyroscopes, magnetometers, water, moisture, or humidity detectors, impact/force detectors, thermometers, inertial sensors, photo detectors, miniature cameras, microphones, and other similar instruments for detecting the user's status as well as location, utilization of the wireless earpieces 202, orientation, motion, and so forth. The sensors 217 may also be utilized to determine the biometric, activity, location, and speed measurements of the user. In one embodiment, the sensors 217 may store data that may be shared with other components (e.g., logic engine 210 authenticating a transaction), users, and devices.

The sensors 217 may include photodetectors, ultrasonic mapping devices, or radar that scan the ear of the user when positioned for utilization. The sensors 217 may generate a two or three dimensional scan or topography map of the user's ear and surrounding areas when the wireless earpieces 202 are properly positioned. The mapping may include the internal and/or external portions of the user's ear. The topographical image of the user's ear may be utilized as a stand-alone biometric identifier or may be utilized with other biometric identifiers to identify the user. The image may include the external auditory meatus, scapha, fossa triangularis, scaphoid fossa, helix, antihelix, antitragus, lobule, the tragus, and pinna as well as other internal or external portions of the ear and surrounding head structure.

Externally connected wireless devices may include components similar in structure and functionality to those shown for the wireless earpieces 202. For example, a wireless device may include any number of processors, batteries, memories, busses, motherboards, chips, transceivers, peripherals, sensors, displays, cards, ports, adapters, interconnects, sensors, and so forth. In one embodiment, the wireless device may include one or more processors and memories for storing instructions. The instructions may be executed as part of an operating system, application, browser, or so forth to implement the features herein described. For example, the user may set preferences for the wireless earpieces 202 to work individually or jointly to identify user biometrics for comparison against known values to verify the user is authorized to perform a transaction. Likewise, the preferences may manage the actions taken by the wireless earpieces 202 in response to identifying specific users are utilizing the wireless earpieces 202. For example, a parent user may have full access to perform any number of transactions, but a juvenile user may only have access to perform transactions at designated locations (e.g., coffee shops, cafeterias, fast food restaurants, etc.) or for designated amounts (e.g., less than $20). In one embodiment, the wireless earpieces 202 may be magnetically or physically coupled to the wireless device to be recharged or synchronized.

The wireless device may also execute an application with settings or conditions for updating, synchronizing, sharing, saving, processing transactions and utilizing biometric information. For example, one of the sensors 217 that may have failed may be ignored in response to improper or unreliable data being gathered. As a result, the user identification process for transaction authorization may be dynamically performed utilizing any combination of sensor measurements. For example, the number and position of the sensors 217 utilized to perform status determinations for the user may vary based on failures, inaccurate data, or other temporary or permanent issues with hardware and software of the wireless earpieces 202.

FIG. 3 is a flowchart of a process for authenticating a transaction in accordance with an illustrative embodiment. In one embodiment, the process of FIG. 3 may be implemented by one or more wireless earpieces, such as the wireless earpieces 102 of FIG. 1. For example, the method of FIG. 3 may be performed for both of the wireless earpieces as a pair/set or for each of wireless earpieces individually to process a transaction. In one embodiment, the biometric readings and user input may include one or more of pulse, hand gestures, designated motions, voice amplitude, voice frequency, skin conductivity, vocabulary, blood oxygenation, temperature, calories expended per time period, sweat levels, orientation, position, and so forth. The method of FIG. 3 may be performed to implement a transaction. For example, the existing sensors of the wireless earpieces may be utilized to authenticate a transaction. The process of FIG. 3 may be performed by one or more of the wireless earpieces, a wireless device (e.g., cell phone, tablet, gaming device, smart card, etc.), and/or the transaction device.

The process may begin with the wireless earpieces receiving an indication that a transaction is pending (step 302). In one embodiment, the indication may be received directly from a user of the wireless earpieces. For example, the user may give a verbal command, such as “provide a payment.” The user may also preprogrammed a specified voice command, gesture, head motion, or other input that may be sensed by the wireless earpieces. As a result, the transaction may be initiated and processed entirely utilizing the wireless earpieces. In another embodiment, the indication may be received from a wireless device, such as a cell phone, and communication with the wireless earpieces. The indication may provide information that the wireless device requires the biometric reading or other user input to authenticate the transaction. For example, the invitation may be played as an audio or tactile alert to the wireless earpieces. In one embodiment, one or more applications or other software interfaces of both the wireless device and the wireless earpieces may interact to perform the communications of FIG. 3.

Next, the wireless earpiece perform biometric readings for a user utilizing the wireless earpieces (step 304). The sensor locations and types of sensors within the wireless earpieces may vary. The sensors may generate a number of biometric readings that may be utilized individually or compiled to subsequently identify the user. The sensors may include a temperature sensor, a heart pulse rate sensor, a skin conductivity sensor, and a microphone (i.e., analyzing the user's voice). The sensors may measure data or information that may be utilized to determine or imply the user's identity as herein described. The sensor may utilize any number of sampling rates or time periods for performing the sensor measurements. For example, the sensors may identify the user from the moment the wireless earpieces or placed in the ears of the user such that any potential transaction may be automatically authenticated as belonging to the authorized user. The biometric readings may also be performed in response to receiving the indication described in step 302. In another embodiment, the biometric readings may represent user input purposely provided by the user as part of the transaction process. The specified user input or baseline readings for the biometric readings may have been previously entered, saved, or logged for utilization as part of the transaction process.

Next, the wireless earpieces analyzes the biometric readings to determine whether the user is authorized to perform the transaction (step 306). The biometric readings or other user input may be analyzed for accuracy statistical significance, and so forth. For example, the biometric readings may be compared against default, baseline, or standard biometric readings for the user to ensure accuracy in identifying the user. Likewise, user input that may be received for verification purposes may be compared against pre-established or trained data. The wireless earpieces may also perform biasing or error correction as needed during step 304 to ensure the sensor measurements are accurate. For example, if a sensor from one of the wireless earpieces is experience incorrect or inaccurate data, the data from that sensor may be disregarded for purposes of performing analysis. The sensor measurements may be run through any number of computations utilizing the processor of the wireless earpiece.

Next, the wireless earpieces determine whether the user is authorized to perform the transaction (step 308). The identity of the user may be determined utilizing the biometric readings. In one embodiment, a number of different users may utilize the wireless earpieces at any given time. For example, each of the different users may have distinct financial information (e.g., debit cards, credit cards, accounts, etc.), permissions, settings, and preferences that may be utilized to perform a transaction. During step 306, the wireless earpieces may ensure that all security measures, conditions, thresholds, and information are provided and authenticated to perform the transaction. For example, transactions by User A may be performed utilizing debit card A in response to a voice confirmation and gesture confirmation confirmed through the wireless earpieces. In another example, transactions by User B may only be performed between 8:00 a.m.-5:30 p.m. from PayPal account B in response to the wireless earpieces being securely linked with wireless device B. In yet another example, transactions by User C may be performed utilizing a credit card C in response to a skin conductivity and user input read by the wireless earpieces while in the ears of the user and in response to being within four feet of a transaction device (e.g., retail point of sale system).

If the user is authorized during step 308, the wireless earpieces authenticate the transaction (step 310). During step 310 the transaction may be authenticated for performance by the wireless earpieces or a connected device, such as a wireless device. In one embodiment, payment information may be sent to one or more devices to implement the transaction, such as an account, authorized amount, or so forth. During step 310 the wireless earpieces may also implement the transaction directly or indirectly.

If the status of the wireless earpiece is determined to not be normal during step 308, the wireless earpiece generates an alert if needed (step 312). The alert may be generated in any number of ways. In one embodiment, the alert is an internal alert that may be communicated to the user of the wireless device. For example, the alert may be communicated to the user as an audio, tactile, or visual alert, such as “The transaction was cancelled due to improper identification?” The alert may also be communicated to a wireless device in communication with the wireless earpiece. For example, an alert may be sent to a cell phone in communication with the wireless earpiece to display an application specific alert to the user, such as “the transaction is rejected due to an improper voice command.” In some embodiments, the alert may be sent through email, text message, or other designated communications technique in the event that the wireless earpieces are being utilized by an unauthorized party. In other embodiments, no alert may be generated.

Next, the wireless earpieces reject the transaction (step 314). The rejection may be a default response to determining the user is not authorized to perform the transaction.

The process of FIG. 3 may allow the wireless earpieces to utilize logic to initiate, authorize, and/or process a transaction. The transaction may be a financial transaction, a secure communication, or other process that may require or benefit from the security of utilizing biometric readings of the user generated by the wireless earpieces.

The illustrative embodiments provide a system, method, and wireless earpiece(s) for authenticating a transaction utilizing biometric readings or user input received through the wireless earpieces. The illustrative embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, embodiments of the inventive subject matter may take the form of a computer program product embodied in any tangible medium of expression having computer usable program code embodied in the medium. The described embodiments may be provided as a computer program product, or software, that may include a machine-readable medium having stored thereon instructions, which may be used to program a computing system (or other electronic device(s)) to perform a process according to embodiments, whether presently described or not, since every conceivable variation is not enumerated herein. A machine readable medium includes any mechanism for storing or transmitting information in a form (e.g., software, processing application) readable by a machine (e.g., a computer). The machine-readable medium may include, but is not limited to, magnetic storage medium (e.g., floppy diskette); optical storage medium (e.g., CD-ROM); magneto-optical storage medium; read only memory (ROM); random access memory (RAM); erasable programmable memory (e.g., EPROM and EEPROM); flash memory; or other types of medium suitable for storing electronic instructions. In addition, embodiments may be embodied in an electrical, optical, acoustical or other form of propagated signal (e.g., carrier waves, infrared signals, digital signals, etc.), or wireline, wireless, or other communications medium.

Computer program code for carrying out operations of the embodiments may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on a user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN), a personal area network (PAN), or a wide area network (WAN), or the connection may be made to an external computer (e.g., through the Internet using an Internet Service Provider).

FIG. 4 depicts a computing system 400 in accordance with an illustrative embodiment. For example, the computing system 400 may represent a device, such as the wireless device 104 of FIG. 1. The computing device 400 may be utilized to receive user settings, instructions, or feedback for controlling the power management features of the wireless earpieces together and separately. The computing system 400 includes a processor unit 401 (possibly including multiple processors, multiple cores, multiple nodes, and/or implementing multi-threading, etc.). The computing system includes memory 407. The memory 407 may be system memory (e.g., one or more of cache, SRAM, DRAM, zero capacitor RAM, Twin Transistor RAM, eDRAM, EDO RAM, DDR RAM, EEPROM, NRAM, RRAM, SONOS, PRAM, etc.) or any one or more of the above already described possible realizations of machine-readable media. The computing system also includes a bus 403 (e.g., PCI, ISA, PCI-Express, HyperTransport®, InfiniBand®, NuBus, etc.), a network interface 405 (e.g., an ATM interface, an Ethernet interface, a Frame Relay interface, SONET interface, wireless interface, etc.), and a storage device(s) 409 (e.g., optical storage, magnetic storage, etc.). The system memory 407 embodies functionality to implement embodiments described above. The system memory 407 may include one or more functionalities that facilitate retrieval of the audio information associated with an identifier. Code may be implemented in any of the other devices of the computing system 400. Any one of these functionalities may be partially (or entirely) implemented in hardware and/or on the processing unit 401. For example, the functionality may be implemented with an application specific integrated circuit, in logic implemented in the processing unit 401, in a co-processor on a peripheral device or card, etc. Further, realizations may include fewer or additional components not illustrated in FIG. 4 (e.g., video cards, audio cards, additional network interfaces, peripheral devices, etc.). The processor unit 401, the storage device(s) 409, and the network interface 405 are coupled to the bus 403. Although illustrated as being coupled to the bus 403, the memory 407 may be coupled to the processor unit 401.

The illustrative embodiments are not to be limited to the particular embodiments described herein. In particular, the illustrative embodiments contemplate numerous variations in the type of ways in which embodiments may be applied. The foregoing description has been presented for purposes of illustration and description. It is not intended to be an exhaustive list or limit any of the disclosure to the precise forms disclosed. It is contemplated that other alternatives or exemplary aspects are considered included in the disclosure. The description is merely examples of embodiments, processes or methods of the invention. It is understood that any other modifications, substitutions, and/or additions may be made, which are within the intended spirit and scope of the disclosure. For the foregoing, it can be seen that the disclosure accomplishes at least all of the intended objectives.

The previous detailed description is of a small number of embodiments for implementing the invention and is not intended to be limiting in scope. The following claims set forth a number of the embodiments of the invention disclosed with greater particularity. 

What is claimed is:
 1. A method for authenticating a transaction utilizing one or more wireless earpieces, the method comprising: receiving an indication of the one or more wireless earpieces that the transaction is pending; performing biometric readings for a user utilizing sensors of the one or more wireless earpieces; analyzing the biometric readings to determine whether the user is authorized to perform the transaction; and authenticating the transaction in response to determining the biometric readings performed by the one or more wireless earpieces authorize the user to perform the transaction.
 2. The method of claim 1, wherein the invitation is received from a wireless device associated with the one or more wireless earpieces.
 3. The method of claim 1, wherein the biometric readings include at least a voice identification.
 4. The method of claim 1, further comprising: rejecting the transaction in response to determining the biometric readings do not authorize the user to perform the transaction.
 5. The method of claim 1, wherein the biometric readings include voice characteristics, pulse, and temperature.
 6. The method of claim 1, wherein the one or more wireless earpieces are a pair of wireless earpieces.
 7. The method of claim 1, wherein the indication is received directly from a point of sale communications device.
 8. The method of claim 1, wherein the biometric readings are automatically performed in response to the one or more wireless earpieces being worn by the user to authenticate functionality of the one or more wireless earpieces for the user.
 9. The method of claim 1, wherein the transaction is authorized from an account of the user utilizing secure communications from the one or more wireless earpieces.
 10. The method of claim 1, wherein the biometric readings include a topographical map of a portion of an ear of the user.
 11. A wireless earpiece comprising: a processor for executing a set of instructions; and a memory for storing the set of instructions, wherein the set of instructions are executed to: receive an indication of the one or more wireless earpieces that the transaction is pending; perform biometric readings for a user utilizing sensors of the one or more wireless earpieces; analyze the biometric readings to determine whether the user is authorized to perform the transaction; and authenticate the transaction in response to determining the biometric readings authorize the user to perform the transaction.
 12. The wireless earpiece of claim 11, wherein the invitation is received from a wireless device associated with the wireless earpiece.
 13. The wireless earpiece of claim 11, wherein the biometric readings include a topographical map of a portion of an ear of the user.
 14. The wireless earpiece of claim 11, wherein the set of instructions are further executed to: reject the transaction in response to determining the biometric readings do not authorize the user to perform the transaction.
 15. The wireless earpiece of claim 11, wherein the wireless earpieces is one of a pair of wireless earpieces worn in ears of the user.
 16. The wireless earpiece of claim 11, wherein the indication is received directly from a point of sale communications device.
 17. The wireless earpiece of claim 11, wherein the set of instructions are further executed to: send a communication with information to implement the transaction.
 18. The wireless earpiece of claim 11, wherein the set of instructions are further executed to: play alerts to the user regarding the status of the transaction.
 19. A wireless earpiece, comprising: a frame for fitting in an ear of a user; a logic engine controlling functionality of the wireless earpiece; a plurality of sensors taking biometric readings of the user, wherein the logic engine receives an indication of the one or more wireless earpieces that the transaction is pending, analyzes the biometric readings to determine whether the user is authorized to perform the transaction, and authenticates the transaction in response to determining the biometric readings authorize the user to perform the transaction.
 20. The wireless earpiece of claim 19, wherein the biometric readings includes at least voice characteristics and topographical mapping of the user. 