G06F17/30

EMOTION TYPE CLASSIFICATION FOR INTERACTIVE DIALOG SYSTEM
20180005646 · 2018-01-04 ·

Techniques for selecting an emotion type code associated with semantic content in an interactive dialog system. In an aspect, fact or profile inputs are provided to an emotion classification algorithm, which selects an emotion type based on the specific combination of fact or profile inputs. The emotion classification algorithm may be rules-based or derived from machine learning. A previous user input may be further specified as input to the emotion classification algorithm. The techniques are especially applicable in mobile communications devices such as smartphones, wherein the fact or profile inputs may be derived from usage of the diverse function set of the device, including online access, text or voice communications, scheduling functions, etc.

DISPLAYING THE ACCESSIBILITY OF HYPERLINKED FILES
20180007029 · 2018-01-04 ·

The accessibility of a hyperlinked files is displayed. A hyperlink that references a resource is extracted from a target file. An attempt to acquire the resource is made by performing a first authentication operation. A first object is received in response to performing the authentication operation. A second object is acquired by performing a second authentication operation using pre-determined authentication information. The first object and the second object are compared to determine if the first object is the same as the second object. Information indicating the accessibility of the resource is presented via a display apparatus.

METHOD AND SYSTEM FOR FACILITATING TERMINAL IDENTIFIERS
20180004852 · 2018-01-04 · ·

Embodiments of the present application disclose a method for providing a terminal identifier to a terminal. During operation, a security server receives a registration information set from the terminal, in which the registration information set includes multiple pieces of equipment information from the terminal. The security server then generates a terminal identifier based on the multiple pieces of equipment information in the registration information set. The security server then returns the terminal identifier to the terminal.

USER CONTROLLED PROFILES
20180005276 · 2018-01-04 ·

Disclosed herein is a computer-implemented method for obtaining one or more offers for a user, the method comprising a secure computer environment within a computing system: receiving personal data of a user that has been authorised for use by the user and is associated with a confirmed user preference of the user, receiving offer data from one or more third party offer providers, generating one or more offer results in dependence on the offer data and personal data, and outputting the one or more offer results Advantageously, the personal data contained within a user's profile that is used to obtain offers or other beneficial services does not need to be transferred to the providers of these offers or other beneficial services as the mechanism to identify relevant offers or other beneficial services is managed through a sandbox mechanism.

DATA BACKUP USING METADATA MAPPING

An information processing apparatus, backup method, and program product that enable efficient differential backup. In one embodiment, an information processing apparatus for files stored in a storage device includes: a metadata management unit for managing metadata of files stored in the storage device; a map generation unit for generating a map which indicates whether metadata associated with an identification value uniquely identifying a file in the storage device is present or absent; and a backup management unit for scanning the metadata to detect files that have been created, modified, or deleted since the last backup, and storing at least a data block and the metadata for a detected file in a backup storage device as backup information in association with the identification value.

METHOD AND SYSTEM OF ON-LINE REAL-TIME SHADOWING FOR CONTEXT AWARE USER RELATIONSHIP MANAGEMENT

Methods and systems are disclosed herein to provide real-time shadowing service architectures and workflows to support dynamic event pattern parameter configuration, collection, filtering, learning, and profiling for users of one or more interactive platforms. The real-time shadowing service may receive a subset of application specific tags, generate tag values for the tags in the subset based on user behavior, and report the values for the tags in the subset. Further, the real-time shadowing service may collect data based on a list of tags for an engagement level related parameter vector (E.V.) and a competence level related parameter vector (C.V.). Further, the real-time shadowing service may map E.V. and C.V. for an event of interest (EoI) to an engagement level (E.L.) and competence level (C.L.) based on a model. The real-time shadowing service may also generate alerts based on detection rules, E.L. and C.L., and transmit the alerts.

METHOD AND SYSTEM FOR PRESENTING CONTENT SUMMARY OF SEARCH RESULTS
20180004844 · 2018-01-04 ·

Methods, systems and programming for presenting a content summary of search results is described herein. In one example, at least one search result may be fetched based on a search query. A determination may be made that a summary has previously been generated for at least some of the at least one search result, and the summary may be retrieved. A search result page including the at least one search result and at least part of the summary may be generated, and the search result page may be sent in response to the search query.

GENERATION AND DELIVERY OF DIGITAL RECEIPTS BASED ON USER PREFERENCES AND TRANSACTION RELATED DATA
20180005200 · 2018-01-04 · ·

A method of delivering a digital receipt relating to a transaction to a user, the method comprising, at a server: receiving transaction related data from a point of sale system, the transaction related data having been intercepted in a data communications path between a point of sale terminal and a peripheral device; analysing transaction related data to extract user identification data; querying a user data module using extracted user identification data to determine user preferences relating to delivery of digital receipts; generating the digital receipt in dependence on the determined user preferences and the received transaction related data; outputting the digital receipt.

METHODS AND SYSTEMS FOR ANCHORING HYPERTEXT TRANSFER PROTOCOL (HTTP) LEVEL SERVICES IN AN INFORMATION CENTRIC NETWORK (ICN)
20180007116 · 2018-01-04 · ·

Methods and systems anchor hypertext transfer protocol (HTTP) level communication in an information-centric networking (ICN) network. Both content requests and responses to servers within the ICN network and to servers located outside the ICN network, in an IP network for example, are disclosed. Communication may be between two IP capable only devices at the HTTP level, one connected to an ICN network while the other one is connected either to an ICN or IP network. The disclosed namespace 200 enables IP based HTTP communication within the ICN network. An information-centric networking (ICN) network attachment point (NAP) or border gateway (BGW) may receive an HTTP request packet and encapsulate the received HTTP request packet. The ICN NAP/BGW may then forward the HTTP request packet towards the local ICN network servers. The HTTP request packet may be published to a named content identifier (CID) that may be determined through a hash function of a fully qualified domain name (FQDN). The ICN NAP may receive a HTTP response packet for a subscribed information item, which may be included in a named rCID. The named rCID may be determined through a hash function of a uniform resource locator (URL). Instead of using the hash of a URL and an FQDN directly, a separate scope identifier, which may be a root identifier, may be chosen for HTTP-over-ICN communication for the overall ICN namespace. The scope identifier may include a particular structure for the ICN namespace being built up. Using a root identifier may allow for separating HTTP-over-ICN communication from other ICN communication, for example, for operational or migration reasons. Under the root scope identifier, there may be two sub-scope identifiers, a first sub-scope identifier (I) for communication within the ICN network and a second sub-scope identifier (O) for communication to IP addresses outside the ICN network. The ICN may be based on the PURSUIT publish-subscribe architecture or on the Named Data Networking (NDN) project and the like.

System and Method for Selecting Sponsored Images to Accompany Text

A system for selecting an image to accompany text from a user in connection with a social media post. The system includes receiving text from the user; identifying one or more search terms based on the text; identifying candidate images from images in one or more image databases using the search terms, where the candidate images comprise a sponsored image; presenting one or more candidate images to the user, where the sponsored image is presented preferentially compared to other candidate images; receiving from the user a selected image from the one or more candidate images; generating the social media post comprising the selected image and the user-submitted text; and transmitting the social media post for display.