Intelligent Secure Social Media Based Event Management System

20170344748 · 2017-11-30

Assignee

Inventors

Cpc classification

International classification

Abstract

An intelligent system and method for gathering social network data for an event, moderate the data, and display it to people along with analytics. The system helps event managers to see all the details posted about the event and they can control what to show to the general public. It also helps people to see what is being posted about the event and also encourages them to post. Additionally, the back end intelligence can scan through the posts and group them according to common thread and allow those to be backed up in redundant servers for forensic analysis.

Claims

1. A computer-implemented method for event management comprising: receiving data from social media conversations of users attending an event and users who have interest in said event; storing said data in a redundant knowledge database; and analyzing said stored data to monitor said conversations specific to said event.

2. The computer-implemented method of claim 1, wherein said analyzing comprises real-time analyzing of said data stored in said redundant knowledge database.

3. The computer-implemented method of claim 1, further comprising providing user access to social media applications over Internet through access tools.

4. The computer-implemented method of claim 1, further comprising providing a consolidated platform of social media applications for users interested in said event.

5. The computer-implemented method of claim 1, further comprising providing an event host client interface to provide access control of said database to general public users.

6. The computer-implemented method of claim 1, further comprising providing a security client interface to provide access control of said database to security users.

7. The computer-implemented method of claim 1, further comprising providing a law enforcement interface to provide access control of said database to law enforcement users.

8. The computer-implemented method of claim 1, further comprising providing a general user client interface to provide access control of said database to general public users.

9. The computer-implemented method of claim 7, wherein said analyzing comprises real-time analyzing and forensic analyzing of said data stored in said redundant knowledge database.

10. A system for event management comprising: a memory; and one or more processors coupled to the memory, wherein the memory comprises program instructions to: receive data from social media conversations of users attending an event and users who have interest in said event; store said data in a redundant knowledge database; and analyze said stored data to monitor said conversations specific to said event.

11. The system of claim 10, wherein said data stored in said redundant knowledge database is analyzed in real-time by a data analytics module.

12. The system of claim 10, further comprising a user access to social media applications over Internet through access tools.

13. The system of claim 10, further comprising a consolidated platform of social media applications for users interested in said event.

14. The system of claim 10, further comprising an event host client interface to provide access control of said database to general public users.

15. The system of claim 10, further comprising a security client interface to provide access control of said database to security users.

16. The system of claim 10, further comprising a law enforcement interface to provide access control of said database to law enforcement users.

17. The system of claim 10, further comprising a general user client interface to provide access control of said database to general public users.

18. The system of claim 16, wherein said data stored in said redundant knowledge database is analyzed in real-time by an analytics and forensic module.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

[0059] Example embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements and in which:

[0060] FIG. 1 illustrates the examples of popular social media applications

[0061] FIG. 2 shows the social media application distribution in terms of still photographs, video and data

[0062] FIG. 3 illustrates the unfiltered day to day social media connectivity

[0063] FIG. 4 illustrates the connectivity of the proposed intelligent event management system to users, displays and social media applications

[0064] FIG. 5 shows the high level connectivity between devices and the proposed intelligent event management system

[0065] FIG. 6 illustrates the different applications of the proposed intelligent event management system

[0066] FIG. 7 illustrates the system components of the intelligent event management system

[0067] FIG. 8 depicts the server components of the proposed intelligent event management system

[0068] FIG. 9 depicts the client components of the proposed intelligent event management system

[0069] FIG. 10 shows the control and data flow diagram of various functionalities

[0070] FIG. 11 shows the user interface dependencies between the users and back end functions

[0071] FIG. 12 illustrates the user interface message flow between modules

[0072] FIG. 13 illustrates the client interface for various users

[0073] FIG. 14 shows the customization of the social media application for users

[0074] FIG. 15 illustrates the profile management within the proposed intelligent event management system

[0075] FIG. 16 shows the visualization example in a giant display

[0076] FIG. 17 illustrates the user monitoring capability within the proposed intelligent event management system

[0077] FIG. 18 illustrates the analytics portion for various social media application

[0078] Other features of the present embodiments will be apparent from the accompanying drawings and from the detailed description that follows.

DETAILED DESCRIPTION

[0079] Several method, process and systems for intelligent cloud based secure social media based event management system are disclosed. Although the present embodiments have been described with reference to specific example embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the various embodiments.

[0080] FIG. 1 is an illustration of the various popular social media examples today. The intelligent secure social media based event management system supports social media applications and is not restricted to those available today. Without loss of generality, it supports and the proposed methodology could work with the popular social media applications available today such as Facebook 102, Google plus 104, Instagram 106, Snapchat 108, YouTube 110, Twitter 112, Skype 114, WhatsApp 116 and Linkedin 118.

[0081] FIG. 2 illustrates the social media application distribution. Popular distribution of social media conversations includes pictures, 202, video 204 and data 206. For example, Instagram 106 predominantly uses pictures to share between users, while snapchat 108 uses pictures and video. YouTube 110 uses video alone for sharing, while Skype 114 uses video and data for sharing. Linkedin 118 uses data alone for sharing while Twitter 112 uses both short data forms and pictures to be shared. Some applications such as Facebook 102, Google plus 104 and WhatsApp 116 allow conversations that include pictures, voice, video and data.

[0082] FIG. 1 and FIG. 2 illustrates together the arrangement of the social media applications over the gamut of pictures, voice and video.

[0083] FIG. 3 illustrates the unfiltered social media connectivity possible today for general public. The group of social media applications is available over Internet 308 to be accessed by general public through their popular devices such as laptops 312, desktops 314, smart devices 316 and tablets 318. The social media applications provide picture sharing 302, voice and video chats 304 and data sharing 306.

[0084] FIG. 4 illustrates the proposed intelligent event management system 406 high level network architecture. The proposed system 406 is fault tolerant through redundancy as can be seen from the overlapping system picture. The proposed system 406 has access to redundant knowledge base 408 where the data is stored for conducting conversations, real-time analysis and forensic analysis. The system is cloud based and has access over Internet 308 to users 402. The users 402 can access various social media applications to conduct conversations by sharing pictures 302, voice and video 304 and data 306. The event managers display the event related conversations in a single large display 404 and local displays such as laptops 312, desktops 314, smart devices 316 and tablets 318.

[0085] FIG. 5 illustrates the high level network architecture of intelligent connectivity. The proposed system 406 provides users access to social media applications 302, 304, 306 connecting them to the social media world through large displays 404, laptops 312, desktops 314, smart devices 316 and tablets 318

[0086] FIGS. 4 and 5 together illustrate the connectivity architecture, between the proposed system 406, users 402, social media applications 302, 304, 306 and the access tools 404.

[0087] FIG. 6 illustrates the variety of users that the proposed system 406 supports. The system supports event hosts 602 to manage the event, keep the attendees informed, provide attendees a common platform to relay their opinions and facilitate the smooth functioning of the event. Event hosts 602 also display an abridged filtered version of conversation in the display 404 for all patrons to view. This helps more attendees to participate and relay their views thus helping event hosts to fine-tune the functioning to address the patrons' needs. The system supports local security 604 to conduct the event in a secure fashion. The local security 604 relays emergency procedures and signs for orderly conduct of the event. The local security 604 monitors the event continuously to proactively avoid any untoward incident. The proposed system 406 supports law enforcement agencies 606 to monitor the event over social media “chatter” from those attending and those who are interested in the event over a period of time. The agency 606 conducts real-time analysis and forensic analysis based on data in 408. The agency 606 coordinates the activities during disaster recovery and uses the display 404 to relay information to general public and event hosts. The proposed system 406 supports general public access to the social media applications 302, 304, 306 over Internet 308. The system 406 provides a consolidated platform for general public to get information from various people interested in the event, either participating or not. It is difficult for attendees to go through all social media applications and gather conversations related to an event, and our proposed system 406 provides that view.

[0088] FIG. 7 illustrates the proposed intelligent event management system 406 components. The system 406 has User Interface 708, Event management 710, Security platform 712, Analysis platform 714, data analysis 716 and social media collector 718 components. The system 406 provides connectivity to uses through security gadgets 702, displays 704 and edge devices 706. The user interface 708 provides access control to general public, event hosts, security and law enforcement. Event management 710 provides functionality for consolidated access to social media applications for a particular customized event. Security platform 712 provides interface to local security to monitor and relay messages for smooth functioning of the event and messages related to emergency preparedness. Analysis platform 714 provides the functionality for law enforcement to conduct both real-time and forensic analysis based on social media conversations collected in redundant knowledgebase 408. Data analytics 716 provides the functionality for event management and general public to view various performance graphs and analytics related to event encouraging participation from various attendees to post their views. The social media collector 718 provides the access to multiple social media applications and consolidates the views on a user basis, geographical basis, gender basis and other customizable parameters.

[0089] FIG. 8 illustrates the proposed intelligent event management system 406 cloud based server components. The subcomponents cover all the system components in FIG. 7. The User Interface 708 is handled by the User GUI management 802, Admin interfaces 804, and Super Admin interface 806 and Law enforcement override 808. The User GUI management 802 provides the functionality of configuring and customizing the Graphical User Interface (GUI) of general public access and event management access. Admin Interface 804 provides the administrator of the proposed system special access to handle event related configuration changes. Super Admin Interface 806 provides the functionality to the administration managers to override the admin configurations and provide special privileges to change configurations on a need basis. The Law enforcement override 808 provides the functionality to law enforcement during a situation or after to conduct real-time or forensic analysis based on data collected in the redundant knowledgebase 408.

[0090] In FIG. 8, the Event management 710 component has four subcomponents namely Event host server interface 812, Content filtering rules 814, Event profile management 816 and Visualization 818. These subcomponents are not directly available for Event hosts but can be manipulated through the user interface. The Event host server interface 812 provides the interface to the server database. Content filtering 814 allows filtering rules to be defined by the event managers so that postings from attendees and well-wishers that are inappropriate are filtered before being publicly displayed. The filtering rules can be set through configuration management interface. Event profile management 816 subcomponent provides the event managers to set profiles based on interest, gender, age, and various other profiles. These profiles help the managers target their information to correct audience and allows gathering analytics as well. Visualization 818 subcomponent provides the display functionality at the event location for the attendees so they can check their messages about the event in addition to security messages.

[0091] In FIG. 8, Security platform 712 has four subcomponents namely, the security server interface 822, security rules 824, security analysis 826, and security profile 828. The security server interface 822 subcomponent provides the unique API interface to the security server. Security rules 824 subcomponent allows the security configuration to input security related rules to get targeted information on the conversations. For example, local security can configure a trigger for “bomb” and other words to be flagged in conversation. Security profile subcomponent 828 provides the social media conversation information based on profiles. This allows security personnel to target a specific user names and follow their conversation.

[0092] In FIG. 8, Analysis platform 714 has five subcomponents, namely, Data gathering 832, Real-time data analysis 834, Hysteresis 836, Forensic analysis 838 and Redundancy management 830. Data gathering 832 subcomponent allows the integration of law enforcement requirement to gather social media data for a period of time over a profile and record for analysis. Real-time data analysis 834 subcomponent provides the analytical method capability to slice and dice the data as it emerges in the social media. The subcomponent correlates data from various social media applications over real-time and brings out a cohesive thread of information. The hysteresis 836 subcomponent uses intelligence techniques to analyze the real-time and stored data over a period of time to see if there is transience in a behavior or is a sustained problem area. Forensic analysis 838 subcomponent provides the important functionality of providing forensic analysis using stored data in redundant knowledgebase. This technique can be used by law enforcement agencies to analyze data after an event occurs for investigation purposes. Redundancy management 830 subcomponent provides the important functionality of managing multiple copies of knowledge base 408 running in the system. The subcomponent makes sure that the database is stable.

[0093] In FIG. 8, Data analytics 716 component has five subcomponents namely, data analytics 842, performance management 844, dependency grouping 846, heuristic engine 848 and knowledgebase interface 840. These subcomponents are used for intelligent analysis of data and for monitoring the performance and collecting analytics. The data analytics subcomponent 842 provides the important functionality of analytics that the event managers have requested. Performance management subcomponent 844 provides the functionality to display in graphical method or table the performance of the social media application, system and the user. Dependency grouping subcomponent 846 provides the important grouping of various social media to be targeted as a set. The user groups with common users in various social media are created. The heuristic engine 848 has intelligence algorithm based on fuzzy logic that automatically fine tunes the system to cater towards areas that the users require. For example, if the time of day in an event is close to noon, the heuristic engine 848 devices rules where advertisement to neighboring restaurants are displayed suggesting lunch availability. The display management using heuristic engine 848 is crucial for user attention and revenue generation. The knowledgebase interface 840 subcomponent provides the method to access the knowledgebase.

[0094] In FIG. 8, Social media collector component 718 has four subcomponents, namely General user server interface 852, user profile management 854, social media manager 856 and social media translator 858. The general user server interface 852 provides the general user some of the unique functionality to connect other users. User profile management 854 subcomponent provides the users to manage their social media profiles. For example, some users may be interested only in a few particular social media application. Social media manager subcomponent 856 groups the user profiles and manages the social media application in its totality. Social media translator subcomponent 858 provides the translation function for various languages so that display can be in a common language for event attendees.

[0095] FIG. 9 illustrates the intelligent event management client components. The components are event host client interface 902, security client interface 904, law enforcement interface 906 and general user client interface 908. All the four clients provide a unique configuration window to their particular clients. The client has a back end server connection to access the server capabilities.

[0096] FIGS. 8 and 9 together illustrate the client and server components of the intelligent event management system.

[0097] FIG. 10 illustrates the control and data flow of the messages through the intelligent system. The user interfaces 1004 are the starting point for general users, security, event host and the law enforcement. In addition, the security and law enforcement have access to real-time data through interfaces 1012 and forensic data 1014 through interfaces to redundant knowledge base 408. The four categories configure their priorities into the system through user interface 1004. The interface allows the category of users to configure profiles. The profiles are managed in profile management 1006. The Intelligent event manager 1008 uses the profile setting to operate its engine of configuring the set social media applications, collecting data, analytics for the profiles selected and display mechanisms. The event manager provides input to visualization 1016 for display purposes. The intelligent event manager also logs the social media information into knowledgebase with multiple copies for redundant purposes 1018.

[0098] FIG. 11 illustrates the user interface dependencies. The four categories have general user interface 1106 provided with user name and password to access the back end system. The administrator of the intelligent event manager has a special admin view 1104 to perform data moderation and user interface customizations at programming level. The admin can create various templates for visualizations 1112. In addition, there is a super admin view 1114 that is for admin managers of the event management system to view and update running events real-time. They have access to the back end system to talk to data collector 1108 and data analytics 1110. The super admin view, for the system organizer, is to track multiple running events including functionality to do the following: [0099] Track current running events over our system with infographics. [0100] Ability to terminate any running event from the system. [0101] Handle removing of idle event.

[0102] This view gives control to system administrator to keep track of all the events. He can delete any idle event or limit certain users in case of lots of events already running on the system server.

[0103] FIG. 12 illustrates the user interface flow chart and visualization process. The admin panel 1204 can start a presentation 1210 or stop a presentation 1206 in the display based on the filters. If the data filtering is properly done the moderated data 1208 can be shown in visualization display 1216. If stopped 1206 due to being inappropriate, the data is collected 1212 and logged for further analysis 1214. Meanwhile, user configuration can customize user interface 1218 through configuration mechanism as discussed earlier.

[0104] FIG. 13 illustrates the front end client interface that has a banner 1302. The illustration shows Tweetboard 1302 but without loss of generality, it can be customized. The user or event manager first accesses the main interface over the web and input the hashtags of the events through customization 1306. The manager will also choose different social networks (Facebook, Twitter, Instagram, etc.) from which to collect data 1308. The manager can choose either one or multiple networks based on the need.

[0105] FIG. 14 illustrates the customization of the account in terms of color 1404, layout 1406, screens 1410 and banner 1402. The messages can also be displayed as per subscribed format 1412. Admin view will allow the intelligent event manager to moderate the data and do various customizations. The event manager will open the presentation views from this admin page. The event manager can also customize the presentation views on this page such as size of the views, background color, putting brand logo, and choose what views to display. The configuration query is send to the back-end intelligent event manager 406 which will start collecting data for the hashtags. The back-end intelligent event manager 406 will run crawlers to collect the data. It will also calculate stats and analytics and send the data back to the front end admin page for the event manager to moderate. The back-end intelligent event management system can handle many concurrent events. It will collect data for each event and send it back to its admin page. It will also collect data from multiple networks (Facebook, Twitter, Instagram, etc.) depending upon managers.

[0106] FIG. 15 illustrates the profile management where the User interface customization 1502, moderation 1504, and message display as per configuration 1412 are done. The manager can perform following functions in admin view namely: [0107] Disable/Enable the retweets to be shown. [0108] Disable/Enable Moderation (In disable moderation case all the data will be displayed in presentation views). [0109] Approve all data. [0110] Add trusted users (for trusted users all the posts will go to presentation view without moderation), [0111] Add users to blocked list (blocked users posts will be automatically removed). [0112] Star a post to make it appear on the presentation view instantly (otherwise the approved tweets will go in the queue and will displayed accordingly) [0113] See updated event information over time (number of Tweets, number of Retweets, time)

[0114] FIG. 16 illustrates the visualization view of the display. The display clearly shows live streaming 1602 notification and the messages that are live 1604. The original text or image is posted clearly for all attendees to see. The event manager can control the display time of each view in the administration page. The illustration shows various messages that are worthy of display as per administrator filtering constraints.

[0115] FIG. 17 continues the illustration of the user monitoring portion in display to encourage other users to participate. The live streaming is advertised 1702. The total message count from various attendees are clearly advertised 1704. This allows the event attendees and followers to clearly note the interest level on the event.

[0116] FIG. 18 shows the analytics portion shown real-time in the display. The data shown over time the number of tweets 1802 and the trend 1804 will be useful to gauge the interest level. In addition, the data can be customized for various other social media applications as well. The illustration is shown for Twitter. In addition, it will be appreciated that the various operations, processes, apparatuses and methods disclosed herein may be embodied in a machine-readable medium and/or a machine accessible medium compatible with a data processing system (e.g., a computer system), and may be performed in any order (e.g., including using means for achieving the various operations). Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.