DETECTION OF SITUATIONS OF DIGITAL INAPTITUDE

20230239392 · 2023-07-27

    Inventors

    Cpc classification

    International classification

    Abstract

    Detecting a user having a digital inaptitude (for example electronic illiteracy), where the user has at least one terminal and requires assistance suited for the use of at least one digital service from the terminal is disclosed. The following are provided: querying a database storing service-access requests from the terminal; among the requests, identifying at least incorrect requests relating to failed attempts by the user to access the service; estimating a frequency of incorrect requests for evaluating an electronic illiteracy score of the user; comparing the evaluated score to a preset threshold; and in case the evaluated score exceeds the threshold, detecting the user as having an electronic illiteracy in order to propose at last one specific surface suited to the user.

    Claims

    1. A process, executed in an electronic device, the process comprising: getting information representative of requests about at least two services, made from at least one terminal, where the at least one terminal is associated with a first user login; getting, from the representative information, an indicator about first requests which, among the requests about the at least two services, correspond to an access failure to at least one of the services, to request for assistance about at least one of the services and/or entry errors for a recipient of a communication; and triggering, as a function of the indicator and in combination with at least one of the terminals associated with the first user login, at least one action for assistance.

    2. The process according to claim 1, wherein the indicator comprises a frequency of incorrect requests.

    3. The process according to claim 1, wherein the process comprises: among the requests about at least two services, identifying the first requests.

    4. The process according to claim 3, wherein identifying an incorrect request comprises: verifying whether the length of an access to one of the services is shorter than a first length.

    5. The process according to claim 1, wherein the process comprises: querying a database storing requests from the at least one terminal for accessing one of the services.

    6. The process according to claim 1, wherein the first requests comprise at least one among the following requests: at least one request for assistance accessing at least one of the services, made from the user's terminal; at least one access request to at least one of the services from the terminal, comprising an incorrect password; at least one access password reset request to at least one of the services made from the terminal; at least one phone call made from the terminal; at least one phone call made from the terminal to at least one voice assistance service about at least one of the services.

    7. The process according to claim 6, wherein the indicator considers respective frequencies of first requests to the services.

    8. An electronic device comprising at least one processor configured for executing a process according to claim 1.

    9. The electronic device according to claim 8, wherein the electronic device is one of the at least one terminal and or one service platform.

    10. The electronic device according to claim 8, wherein triggering comprises execution of the assistance action from the electronic device.

    11. The electronic device according to claim 8, wherein triggering comprises transmission of an execution command from the assistance action to at least one of the at least one terminal.

    12. A process, executed in a terminal on communication network, comprising: sending on the communication network at least one first request about at least one first service among a plurality of services; and upon receiving from the communication network a signal depending on requests made from a terminal of the communication network associated with the user login, and about at least two services from the plurality of services corresponding to an access failure to at least one of the two services and/or entry errors for a recipient of a communication, executing at least one action for assistance from the terminal.

    13. A terminal associated with at least one user login and comprising at least one processor configured for: sending on a communication network at least one first access request to at least one first service among a plurality of services; and upon receiving from the communication network a signal depending on requests made from a terminal of the communication network associated with the user login, and about at least two services from the plurality of services, corresponding to an access failure to at least one of the two services and/or entry errors for a recipient of a communication, executing at least one action for assistance from the terminal.

    14. The terminal according to claim 13, where the terminal comprises a human-machine interface, where the human-machine interface is configured for being driven by a simplified user menu for the second-service services, as a function of the signal.

    15. A processing circuit comprising a processor and a memory, the memory storing program code instructions of a computer program for executing the process according to claim 1, when the computer program is executed by the processor.

    16. A processing circuit comprising a processor and a memory, the memory storing program code instructions of a computer program for executing the process according to claim 12, when the computer program is executed by the processor.

    17. The process according to claim 1 wherein the assistance action is an action for assistance using at least one of the services.

    18. The process according to claim 12 wherein the at least one assistance action is an action for assistance using at least one second service.

    19. The process according to claim 12, wherein the requests sent comprise at least one among the following requests: at least one request for assistance accessing at least one of the at least two services; at least one access request to at least one of the at least two services comprising an incorrect password; at least one access password reset request to at least one of the at least two services; at least one phone call; at least one phone call to at least one voice assistance service about at least one of the at least two services.

    20. The terminal according to claim 13 where the assistance action is an action for assistance using at least one second service.

    21. The process according to claim 18, wherein the requests sent comprise at least one among the following requests: at least one request for assistance accessing at least one of the at least two services; at least one access request to at least one of the at least two services comprising an incorrect password; at least one access password reset request to at least one of the at least two services; at least one phone call; at least one phone call to at least one voice assistance service about at least one of the at least two services.

    Description

    BRIEF DESCRIPTION OF THE DRAWINGS

    [0119] Other advantages and characteristics of the development will appear upon reading the following detailed description of implementation examples, and on examining the attached drawings, on which:

    [0120] FIG. 1 schematically shows in particular a platform F, in operation for executing at least some embodiments of the development.

    [0121] FIG. 2 shows the main steps of a method according to at least some embodiments of the development.

    [0122] FIG. 3 schematically shows the processing circuit of a terminal according to at least some embodiments of the development.

    [0123] FIG. 4 shows schematically the processing circuit for a platform according to at least some embodiments of the development.

    DETAILED DESCRIPTION OF CERTAIN ILLUSTRATIVE EMBODIMENTS

    [0124] Below, examples are given for illustration of typical behaviors of users suffering from digital inaptitude, like electronic illiteracy or a physical or mental handicap. These people may encounter problems such as: [0125] Difficulties accessing an Internet site, for example a site giving today's weather; [0126] Difficulties entering a login and a password, for example for accessing a personal space; [0127] Difficulties dialing a phone number (by using a phone keypad or touch screen of a mobile phone), for example for calling a contact, an emergency number or a client service; [0128] Etc.

    [0129] A solution is proposed below allowing: [0130] Automatically detecting users potentially having digital inaptitude, like electronic illiteracy; [0131] Making specific services available to them to make it easier for them to use digital tools (for example, phone, Internet access, etc.).

    [0132] For this purpose, a platform F is provided (FIG. 1; which may have the material form of a server, for example), capable of making use of several data sources in order to automatically detect behaviors which might be observed more frequently in people having a digital inaptitude, like electronic illiteracy. Examples of such behaviors are calls to tech support, or requests for password reset following several incorrect password entries, or even requests for resetting logins (typical case where the user forgets their login and request that it be sent to them, by email for example), etc.

    [0133] In that way it is possible to identify users for whom this type of behavior is abnormally high (meaning, for example, much higher than the observed average in the entire population of users of the same network). In that way, the user who occasionally calls on technical support or who asks for resetting of one of their passwords every so often is not detected as potentially having a digital inaptitude, like electronic illiteracy. In contrast, a user who makes use of technical support very often and who asks for resetting of the password nearly every time they attempt to connect to a personal space may be detected as potentially having a digital inaptitude, like electronic illiteracy.

    [0134] In the example described below, two data sources may thus be used by the platform F: [0135] call records (CRA); [0136] Internet navigation information.

    [0137] Use of these two data sources by the platform F is described below.

    [0138] Referring to FIG. 1, a user's terminal TER is connected by a network RES to a platform F which is connected to a computer system SI of a telecommunication operator, in particular to the part of the computer system in which the call records (CRA) are generated. The CRA are digital data which are generated automatically in the telecommunication operators' computer systems (fixed and mobile) during each phone call (from a landline or mobile phone). These CRA are used by the operators in particular for billing the clients thereof and generating detailed bills for clients thereof: they therefore generally contain information about each phone call made and received by the users of the network RES: [0139] the phone number of the caller: in the case of a mobile phone (GSM, UMTS, etc.), this number is for example MSISDN type (Mobil Station ISDN Number, ISDN for Integrated Services Digital Network); [0140] the called telephone number; [0141] the time of the call; [0142] the call duration; [0143] Etc.

    [0144] The format of these CRA is not standardized (each telecommunications operator generally uses their own CRA format).

    [0145] The platform F is capable of querying, for example regularly, the computer system (SI) of the operator in order to retrieve the CRA generated since the last query. Typically, retrieving the CRA may be done daily (typically each night).

    [0146] When new CRA are retrieved this way (for example upon retrieval), the platform F analyzes them in order to detect some specific calls made (for example, calls to numbers corresponding to technical support, typically).

    [0147] Calling L1 the list of the specific numbers (or specific prefixes of numbers) which are thus detected by F (this list can be modified by the operator at any time), L1 is stored in a database (BDD) near the platform F. This list L1 therefore contains phone numbers (for example: +33810 20 20 00, +33810 30 30 30, etc.) and also prefixes of phone numbers (for example: +33810*, +33820*, etc.) characterizing user assistance requests to dedicated services.

    [0148] A user who calls this type of number identified as being technical support numbers very frequently (meaning many more times than average for users of this same network) is in fact considered to be a user likely to encounter difficulties more often when using their digital tools (phone, Internet access, etc.).

    [0149] Further, when new CRA are retrieved, the platform F also identifies the CRA corresponding to abnormally short calls (typically a length of a few seconds). A user who very frequently (meaning many more times than average for users of this network) makes very short calls is considered to be a user who could frequently dial wrong numbers (meaning that they often make an entry error when dialing a phone number and thus calls another user than whom they intended; in this case the communication is obviously very short).

    [0150] Further, the platform F is also capable of querying the computer system (IS) of the operator in order to retrieve, for example regularly, each day for example (typically, each night), the Internet navigation information about users of the network of the operator.

    [0151] In fact, for example from a mobile phone (via any mobile network, for example: GSM, UMTS, LTE, etc.) or a computer (for any type of technology used, for example ADSL, optical fiber or other), when a user accesses an Internet page (for example the portal of the operator), a trace may be generated automatically in the computer system SI of the operator. This trace may in particular contain an identifier, unique for example, of the user (for example their IMSI identifier if the user accesses the Internet from a mobile phone). Recall that the IMSI identifier (for International Mobile Subscriber Identity) is a unique number which allows a mobile phone network (GSM, UMTS, LTE or other type) to identify a user. This number is stored in the SIM card (or USIM in UMTS or LTE) it is not known to the user.

    [0152] In principle, if the user potentially has a digital inaptitude, they are unlikely to use a device to anonymously access the Internet, meaning without generating traces with which to identify them on the operator's network. If a user is capable of traveling the Internet anonymously, they cannot really be considered as subject to a digital inaptitude, like electronic illiteracy.

    [0153] When new navigation information is retrieved that way, the platform F analyzes it in order to detect some behaviors, in particular accessing pages for access to personal environments requiring entry of a login and password by the user.

    [0154] The user who accesses the same page for access to a personal environment several times in a limited span (five times in a row over several minutes) is considered as having difficulties logging in (because they forgot their login or password, or else because they could not enter them correctly, or even simply because they do not know how to enter a login and password, or other difficulties). Below, the more a user shows this type of behavior, the more it is considered that they potentially have a digital inaptitude, like electronic illiteracy.

    [0155] Likewise, the platform F analyzes navigation information relating to access to pages corresponding the password reset requests (case where the user forgot their password) or request for login retrieval (case where the user forgot their login, or simply don't know what it is).

    [0156] The addresses of these various Internet pages are stored in a list L2, itself stored in the database (BDD) of the platform F. This list L2 can be modified at any time by the operator.

    [0157] Additionally, the platform F is also capable of detecting access to specific Internet pages (corresponding to access to personal environments, to a request for resetting the password or even to requesting a login, etc.) by looking for the presence of keywords in the address of the Internet pages consulted. Thus, for example, the following keywords may be used for this search in the addresses of Internet pages consulted: “login,” “account,” “reset,” etc. The addresses of the Internet pages may be materialized by character strings such as for example URL (Uniform Resource Locator) links, or even HTTP (HyperText Transfer Protocol), or others, in which it is possible to look for a correspondence with preset keywords.

    [0158] All these keywords are stored in the list L2. An address containing the keyword “login” is considered to most often correspond to the access to a personal environment, or an address containing the keyword “reset” is considered to most often correspond to a request for resetting a password, etc. There again, the more a given user consults Internet pages having addresses containing this type of keyword, the more this user is considered as potentially having digital inaptitude.

    [0159] Hereafter, the calculation of the score characterizing whether the user is potentially suffering from a digital inaptitude, like electronic illiteracy, is described.

    [0160] The score characterizing the probability that a given user has digital inaptitude, like electronic illiteracy is referenced as S (a score S is assigned to each user of the network of the operator). The scores of the set of network users are stored in the database BDD of the platform F.

    [0161] The score S is for example a percentage: [0162] the minimum score (0%) corresponds to a user for whom no observed behavior corresponds to one of the behaviors frequently observed in people having a digital inaptitude, like electronic illiteracy; [0163] the maximum score (100%) corresponds to a user for whom all observed behaviors correspond to one of the behaviors frequently observed in people having a digital inaptitude, like electronic illiteracy.

    [0164] Calculation of the score S may be done automatically by the platform F, and may be updated (recalculated) automatically, after use of new data recovered in the computer system SI (CRA and/or Internet navigation information), typically daily (each night for example).

    [0165] The value of the score S is calculated by the platform F, for example according to a predetermined formula (set by the operator, for example; this formula is for example stored in a database on the platform F and it can be modified at any time, for example by the operator).

    [0166] In the following, note: [0167] u, a login of one of the users of the operator; [0168] S(u), the score of the user u (i.e. characterizing whether the user u does or does not have a digital inaptitude, like numerical illiteracy); [0169] N.sub.Detect.sub.1.sub.(u), the number of behaviors detected in the first data source (the call records for example) for the user u (behaviors considered as typical of people with digital inaptitude, like electronic illiteracy); [0170] N.sub.Total.sub.1.sub.(u), the total number of behaviors analyzed in the first data source (call records, in this example) for the user u; [0171] N.sub.Detect.sub.2.sub.(u), the number of behaviors detected, for example, in the second data source (the Internet navigation information) for the user u (behaviors considered as typical of people with digital inaptitude, like electronic illiteracy); [0172] N.sub.Total.sub.2.sub.(u), the total number of behaviors analyzed in the second data source (Internet navigation information) for the user u.

    [0173] For example, the score S(u) of the user u may be calculated according to the following formula:

    [00002] S ( u ) = ( N D e t e c t 1 ( u ) N Total 1 ( u ) * 100 ) + ( N D e t e c t 2 ( u ) N Total 2 ( u ) * 1 0 0 ) 2

    [0174] The value the denominator corresponds to the number of data sources (which in this example is two).

    [0175] In a possible variant of the development, this formula used for the calculation of the score S(u) contains a weight (P) with which to give more or less importance to one or another of the two data sources.

    [0176] P is a decimal number with a value included between 0 and 1.

    [0177] In this case, the score S(u) may be calculated according to the following formula:

    [00003] S ( u ) = ( 1 - P ) * ( N D e t e c t 1 ( u ) N Total 1 ( u ) * 1 0 0 ) + ( P ) * ( N D e t e c t 2 ( u ) N Total 2 ( u ) * 1 0 0 )

    [0178] For example, P=0.25 gives more weight to the detection by the CRA in this example.

    [0179] Next, the score S(u) may be used by the platform as follows.

    [0180] It may set a threshold (configurable) above which a user u is considered as potentially having a digital inaptitude, like electronic illiteracy. The value of this threshold may be set for example between 10% and 50%, for example 20%.

    [0181] If the value of S(u) is less than this threshold, the user u is not considered as having a digital inaptitude, like electronic illiteracy. Inversely, if the value of S(u) is greater than this threshold, the user u is considered as having a digital inaptitude.

    [0182] When a user u is considered as having a digital inaptitude, like electronic illiteracy, some specific services are proposed, for example: [0183] Phone access to a personal assistant specialized in helping people with a digital inaptitude, like electronic illiteracy, cataloged as such in a database; [0184] Access to online training or tutorials serving to combat digital inaptitude, like electronic illiteracy; [0185] Etc.

    [0186] Further, when a user u is considered as having a digital inaptitude, like electronic illiteracy, some services provided by the operator may be adapted in order to make the use thereof easier.

    [0187] The installation of applications on terminals of these users may be provided for in order to change the execution of the human-machine interfaces these terminals in order to simplify the messages from these interfaces.

    [0188] The modification of the human-machine interface may be programmed in order for simplification of the login/password entry procedure, for example for the connection to a personal space provided by the operator (password entered by the user may for example be displayed in the clear during entry thereof, meaning that is not replaced by a succession of “*” characters during entry thereof, thus limiting the risks of incorrect entry).

    [0189] Further, the simplification of the human-machine interface, for example of the operator portal, can be provided. In this case, a request made from the terminal calls for the presentation of a more basic homepage, limiting base functionalities, possibly without advertisement bands, and the display of a contact point for technical support clearly visible at any time, etc.

    [0190] Further, automatic access to a specific technical support dedicated to people with digital inaptitude, like electronic illiteracy, can be provided. When the user calls client service of the operator, the user is directed (based on the coordinates of their terminal for example) to a person having experience providing support to people with digital inaptitude or an electronic illiteracy.

    [0191] At any time, a user may contact the operator (by simple telephone call for example) activating or deactivating the automatic calculation of their S(u) score.

    [0192] At any time, a user may contact the operator (by a simple phone call for example) for requesting the operator to eliminate all data about them present in the database of the platform F (BDD database).

    [0193] Thus, a service can be implemented for detection of users having digital inaptitude, like electronic illiteracy, in order to offer them specific and adapted services. The use of digital tools thus makes fighting against digital inaptitude, like electronic illiteracy, easier and supports digital inclusion.

    [0194] In FIG. 2 the steps of a process according to a possible embodiment are summarized. During the first step S1, a terminal of the user u makes phone calls and/or requests over the Internet. At step S2, the computer system SI of the telecommunications operator collects, the call record CRA and the requests made from the terminal TER in order to feed the database BDD. At step S31, based on the call records CRA, a frequency f1 of calls to a number specifically for assistance with the use of the digital services (online help platforms, etc.) may be estimated. This frequency f1 can be estimated for example as the ratio between the number of calls to assistance platforms and the total number of calls, as previously presented, or again f1 may be estimated according to the number of calls to assistance platforms per unit time (for example per day, per week or per month), or again the aforementioned ratio may be determined for such a time unit. At step S32, a frequency f2, for example of incorrect requests through the Internet and coming from the terminal TER, or even password reset requests (requests identified by the term “reset,” “logon,” etc.) may further be estimated. As with the frequency f1, the frequency f2 may be estimated by a ratio of the number of incorrect requests (incorrect or requesting a password or other) over a total number of requests, and/or over a preset time period.

    [0195] In step S4, the score S(u) for the user u may be calculated, as a weighted sum for example of the frequencies f1, f2, for example of the type: [0196] S(u)=(1−P) f1+Pf2, as previously presented. In step S5, if the score exceeds a threshold value THR, for example a preset threshold value (arrow OK at output from test S5), for example 20%, then in step S6, the user u of the terminal is considered as suffering from a digital inaptitude, like electronic illiteracy. In this case, the presentation of specific services for the user u, for example a tutorial or equivalent, or even the execution of a routine on the terminal TER in order to drive a human-machine interface (step S7) with a simpler menu for using the digital service requested by the user (with fewer headings for example and only keeping essential headings for the user possibly with simplified training for these headings for the user) may be provided.

    [0197] For that purpose, a terminal TER for executing such an implementation may comprise, as shown in FIG. 3, a processing circuit comprising at least: [0198] a communication interface COM1 with the network RES of the operator; [0199] a processor PROC1 connected to the interface COM1 for processing in particular data received from the platform F according to which the user u of the terminal TER potentially has a digital inaptitude, like electronic illiteracy, and executing a routine as a consequence for driving the human-machine interface according to a simplified mode; [0200] a memory MEM1 connected to the processor PROC1 for storing at least the instructions for the aforementioned routine; and [0201] the human-machine interface HMI (for example a touch screen displaying headings for use of a digital service) for example for offering the user u a simplified navigation menu for use of the requested digital service.

    [0202] In some embodiments, the processor PROC1 may be configured for: [0203] sending on a communication network at least one first access request to at least one first service among a plurality of services; [0204] upon receiving from said communication network a signal depending on failures of requests for access to at least two services from said plurality of services, where said requests are made from a terminal of said communication network associated with a user login associated with the terminal TER, executing an action for assistance using at least one second service from said terminal.

    [0205] The platform F further comprises its own processing circuit, comprising at least: [0206] a communication interface COM2 with the network RES of the operator, and also data coming from the database BDD; [0207] a processor PROC2 for executing a computer program in the meaning of the present development for executing the process according for example to the embodiment shown in FIG. 2; and [0208] a memory MEM2 accessible to the processor PROC2 and storing in particular instructions for the aforementioned computer program.

    [0209] In some embodiments, the processor PROC2 may be configured for: [0210] getting information representative of access requests to at least two services, made from at least one terminal, where said at least one terminal is associated with a first user login; [0211] getting, from said representative information, an indicator about requests which, among said access requests, correspond to an access failure to at least one of said services; [0212] triggering, as a function of said indicator and in combination with at least one of said terminals associated with said first user login, at least one action for assistance in using at least one of said services.