AU2021100920A4 - Intelligent Pen Drive* : Highest Data Security ( Auto data share your Gmail & Link share your mobile No) Using AI- Based Programming - Google Patents

Intelligent Pen Drive* : Highest Data Security ( Auto data share your Gmail & Link share your mobile No) Using AI- Based Programming Download PDF

Info

Publication number
AU2021100920A4
AU2021100920A4 AU2021100920A AU2021100920A AU2021100920A4 AU 2021100920 A4 AU2021100920 A4 AU 2021100920A4 AU 2021100920 A AU2021100920 A AU 2021100920A AU 2021100920 A AU2021100920 A AU 2021100920A AU 2021100920 A4 AU2021100920 A4 AU 2021100920A4
Authority
AU
Australia
Prior art keywords
usb
data
share
user
link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2021100920A
Inventor
Shweta Choudhary
Ms. Deepkiran
Bhupendra Kumar
Sudhasnhu Raghuwanshi
Sunita Rani
Rajesh Kumar Singh
Samender Singh
Pardeep Tyagi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to AU2021100920A priority Critical patent/AU2021100920A4/en
Application granted granted Critical
Publication of AU2021100920A4 publication Critical patent/AU2021100920A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4411Configuring for operating with peripheral devices; Loading of device drivers
    • G06F9/4413Plug-and-play [PnP]
    • G06F9/4415Self describing peripheral devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/10Program control for peripheral devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/16Sound input; Sound output
    • G06F3/167Audio in a user interface, e.g. using voice commands for navigating, audio feedback
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/02User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/02Reservations, e.g. for tickets, services or events
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computational Linguistics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Our Invention Intelligent Pen Drive Highest Data Security (Auto data share your Gmail & Link share your mobile No) Using Al- Based Program is a intelligent automated assistant system engages with the user in an integrated, conversational manner using natural language dialog, and invokes external services when appropriate to obtain information or perform various actions. The invented technology also can be implemented using any of a number of different platforms, such as the web, email, smartphone, and the like, or any combination and share data automatic if anyone can delete the information after that link share by reg mobile no. The invention is to a system is based on sets of interrelated domains and tasks, and employs additional functionally powered by external services with which the system can interact. The invention is a portable, application-specific USB autorun device, following connection to a computer terminal, automatically initializes or presents itself as a known type of device and then automatically sends to the terminal a sequence of data complying with a standard protocol, that sequence of data automatically causing content to be accessed or a task to be initiated. The invented technology also the device (i) includes a standardized USB module that includes a USB microcontroller, the standardized module being designed to be attached to or embedded in multiple types of different, application specific packages but (ii) excludes mass memory storage for applications or end-user data. 19 "-a100 Intelligent Automated Assistant reOnenamuato MD09TvkFo patcuTrate FI.1 seamlsofUB uoundvce n ad omtad hiecntucin

Description

"-a100 Intelligent Automated Assistant
reOnenamuato
MD09TvkFo
patcuTrate
FI.1 seamlsofUB uoundvce n ad omtad hiecntucin
Intelligent Pen Drive* : Highest Data Security ( Auto data share your Gmail & Link share your mobile No) Using Al- Based Programming
FIELD OF THE INVENTION
Our invention is related to a intelligent Pen Drive Highest Data Security (Auto data share your Gmail & Link share your mobile No) Using Al- Based Programming.
BACKGROUND OF THE INVENTION
Today's electronic devices are able to access a large, growing, and diverse quantity of functions, services, and information, both via the Internet and from other sources. Functionality for such devices is increasing rapidly, as many consumer devices, smartphones, tablet computers, and the like, are able to run software applications to perform various tasks and provide different types of information. Often, each application, function, website, or feature has its own user interface and its own operational paradigms, many of which can be burdensome to learn or overwhelming for users. In addition, many users may have difficulty even discovering what functionality and/or information is available on their electronic devices or on various websites; thus, such users may become frustrated or overwhelmed, or may simply be unable to use the resources available to them in an effective manner.
In particular, novice users, or individuals who are impaired or disabled in some manner, and/or are elderly, busy, distracted, and/or operating a vehicle may have difficulty interfacing with their electronic devices effectively, and/or engaging online services effectively. Such users are particularly likely to have difficulty with the large number of diverse and inconsistent functions, applications, and websites that may be available for their use.
Accordingly, existing systems are often difficult to use and to navigate, and often present users with inconsistent and overwhelming interfaces that often prevent the users from making effective use of the technology.
USB is a serial bus standard; devices connecting using the USB standard must have a physical connector that conforms to the standard: there are currently many applicable plug designs (e.g. Series A, Series B, Mini A, Mini B); the USB standard also evolves to cover new plug designs.
The term 'USB autorun device' refers to a USB human interface device (HID) Keyboard autorun device, such as that described in W2007/077439A2 or a USB compact disc (CD) emulator autorun device.
Universal Serial Bus Human Interface Device Class
Universal Serial Bus (USB) human interface device (HID) is a device class definition of USB devices. This device class consists of human interface devices such as computer keyboards, computer mice, game controllers, and alphanumeric display devices. The USB
HID class is defined in a number of documents provided by the USB Implementers Forum (USB-IF) Device Working Group. The primary document used to describe the USB HID class is the Device Class Definition for HID 1.11, available from http://www.usb.org/developers/devclass-docs/HID1_11.pdf.
The USB HID class describes devices used with nearly every modern computer. Many predefined functions exist in the USB HID class. These functions allow hardware manufacturers to design a product to USB HID class specifications and expect it to work with any software that also meets these specifications.
The USB HID class specifications allow for a myriad of other devices under the USB HID class. Some examples are automobile simulation controllers, exercise machines, telephony devices, audio controls, and medical instrumentation. Any device can be a USB HID class device as long as a designer meets the USB HID class logical specifications. This is not to say that there is no need to ship drivers for these devices, nor that an operating system will immediately recognize the device. This only means that the device can declare itself under the human interface device class.
One of the benefits of a well-defined specification like the USB HID class is the abundance of device drivers available in most modern operating systems. The USB HID class devices and their basic functions are defined in USB-IF documentation without any specific software in mind. Because of these generic descriptions, it is easy for operating system designers to include functioning drivers for devices such as keyboards, mice, and other generic human interface devices. The inclusion of these generic drivers allows for faster deployment of devices and easier installation by end-users.
The USB human interface device class can be used to describe both device and interface classes. The interface class is used when a USB device can contain more than one function. It is possible, therefore, to have USB devices with two different interfaces at the same time (e.g. a USB telephone may use a HID keypad and an audio speaker.) The interface devices are also defined with subclass descriptors. The subclass descriptor is used to declare a device bootable. A bootable device meets a minimum adherence to a basic protocol and will be recognized by a computer BIOS. BIOS stands for Basic Input/Output System. BIOS refers to the software code run by a computer when first powered on. The primary function of the BIOS is to prepare the machine so other software programs stored on various media (such as hard drives, floppies, and CDs) can load, execute, and assume control of the computer. This process is known as booting up. BIOS can also be said to be a coded program embedded on a chip that recognize and controls various devices that make up the computer. The term BIOS is specific to personal computer vendors.
Each USB HID interface communicates with the host using either a control pipe or an interrupt pipe. Both IN and OUT control transfers are required for enumeration; only an IN interrupt transfer is required for HID reports. OUT interrupt transfers are optional in HID class devices. An interrupt is an asynchronous signal from hardware indicating the need for attention or a synchronous event in software indicating the need for a change in execution. A hardware interrupt causes the processor to save its state of execution via a context switch, and begin execution of an interrupt handler. Software interrupts are usually implemented as instructions in the instruction set, which cause a context switch to an interrupt handler similarly to a hardware interrupt. Interrupts are a commonly used technique for computer multitasking, especially in real-time computing. Such a system is said to be interrupt-driven.
The host periodically polls the device's interrupt IN endpoint during operation. When the device has data to send it forms a report and sends it as a reply to the poll token. Common devices such as keyboards and mice send reports that are well-defined by the manufacturer. When a vendor makes a custom USB HID class device, the reports formed by the device need only match the report description given during enumeration and the driver installed on the host system. In this way it is possible for the USB HID class to be extremely flexible.
USB HID Keyboard Autorun Device
This device automatically provides input data equivalent to that typed into a computer keyboard when the device is plugged into the USB port of a computer. An example is a web key which is a USB key that stores a website address. When the webkey is connected to the computer's USB port, it automatically opens a pre-programmed web page by automatically performing a sequence of keystrokes.
USB CD Emulator Autorun Device
This device, when plugged into the USB port of a computer, automatically provides input data equivalent to that taken from a computer CD drive. By storing autorun file data (i.e. by presenting an autorun.inf to the OS), a USB CD emulator autorun device can be used to automatically open a program or run a shell command. An example is a webkey which is a USB key that stores a website address. When the webkey is connected to the computer's USB port, it automatically opens a pre-programmed web page.
Autorun Files
Autorun.inf is an instruction file associated with the Windows Autorun function. An autorun.inf file is a text-based configuration file stored on a CD that tells the operating system which operations to perform on insertion of the CD; which executable to start, which icon to use, and so on.
There are many and varied tasks that can be initiated and content that can be accessed using a personal computer, either locally or remotely via a network. Current options for accessing these tasks or content are typically performed by the user navigating through or interacting with the PC operating system (OS) or a software application using generic input apparatus such as a keyboard and mouse. These navigations and interactions can be complex and lengthy, making them hard to remember; and they are often an abstract set of user actions that have no direct representational relationship to the task or content.
The typical options for accessing tasks or content on a PC using the Graphical User Interface (GUI) of the OS, as described above, present several problems to the user; certain tasks are hard to remember, non-descriptive and non-portable. The user faces increased difficulty when using a PC, he is not familiar with, such as a friend's computer or one set up for multiple users, such as a computer in a public place, for example an airport. Further, a non-computer-literate user (for example a child, an old person, or a technophobe) cannot be expected to manage complex interactions to get to a task, such as navigating to a URL, but may be quite happy to interact once they are there-they understand the value in the task, not the complicated process to get to it. An example of the problem stated above is:
A user is unable to access their web-mail easily, particularly a new subscriber, because they have to remember a long sequence of actions, such as the correct website URL, their username and password. A typical set of tasks for this function is too complex to be readily remembered by a user-for example:
1. Select a text based menu item from a set of drop-down menus within the OS to start a browser application; 2. Then type in a URL address in the form of a text string; 3. Navigate to the login page; 4. Enter a username and password.
A secondary problem that has been identified is that most interactive peripheral hardware such as application-specific input devices usually requires a second step after physically connecting to a computer, such as installing a driver or software. So in cases where application-specific input devices have been created, they are often complicated to set up and are not very portable-being unable to operate with computers that do not have the required drivers or software.
Existing solutions that relate to the problems outlined above are:
1. Compact Disks (CD) with autorun files (for example, a CD business card) that automatically launches an application or setup wizard on the CD 2. "Hotkeys", such as those found on certain 'Logitech' USB keyboards or other PC peripherals, that can perform a series of tasks or actions from a single key press. 3. Programmable Keyboard-Macro devices that can be user programmed with key sequences for example, PI Engineering's X Keys range of products (refer to U.S. Pat. No. 4,964,075). 4. USB mass storage devices with specific files or software preinstalled, (such software needing to be manually selected and run by an operator) offering physical and portable access to predefined, or user-defined content. It is also possible to include an 'autorun' file on a USB drive: a user typically plugs a USB drive into a PC and the USB automatically generates data that emulates the operation of a CD. But it is possible to block this kind of CD emulation at the operating system level (and for security reasons, e.g. reducing the risk of viral infection, blocking could become increasingly common).
OBJECTIVES OF THE INVENTION
1. The objective of the invention is to a intelligent automated assistant system engages with the user in an integrated, conversational manner using natural language dialog, and invokes external services when appropriate to obtain information or perform various actions. 2. The other objective of the invention is to a be implemented using any of a number of different platforms, such as the web, email, smartphone, and the like, or any combination and share data automatic if anyone can delete the information after that link share by reg mobile no. 3. A The other objective of the invention is to a system is based on sets of interrelated domains and tasks, and employs additional functionally powered by external services with which the system can interact. 4. The other objective of the invention is to a computer terminal, automatically initializes or presents itself as a known type of device and then automatically sends to the terminal a sequence of data complying with a standard protocol, that sequence of data automatically causing content to be accessed or a task to be initiated.
SUMMARY OF THE INVENTION
According to various embodiments of the present invention, an intelligent automated assistant is implemented on an electronic device, to facilitate user interaction with a device, and to help the user more effectively engage with local and/or remote services. In various embodiments, the intelligent automated assistant engages with the user in an integrated, conversational manner using natural language dialog, and invokes external services when appropriate to obtain information or perform various actions.
According to various embodiments of the present invention, the intelligent automated assistant integrates a variety of capabilities provided by different software components (e.g., for supporting natural language recognition and dialog, multimodal input, personal information management, task flow management, orchestrating distributed services, and the like). Furthermore, to offer intelligent interfaces and useful functionality to users, the intelligent automated assistant of the present invention may, in at least some embodiments, coordinate these components and services. The conversation interface, and the ability to obtain information and perform follow-on task, are implemented, in at least some embodiments, by coordinating various components such as language components, dialog components, task management components, information management components and/or a plurality of external services.
According to various embodiments of the present invention, intelligent automated assistant systems may be configured, designed, and/or operable to provide various different types of operations, functionalities, and/or features, and/or to combine a plurality of features, operations, and applications of an electronic device on which it is installed. In some embodiments, the intelligent automated assistant systems of the present invention can perform any or all of: actively eliciting input from a user, interpreting user intent, disambiguating among competing interpretations, requesting and receiving clarifying information as needed, and performing (or initiating) actions based on the discerned intent.
Actions can be performed, for example, by activating and/or interfacing with any applications or services that may be available on an electronic device, as well as services that are available over an electronic network such as the Internet. In various embodiments, such activation of external services can be performed via APIs or by any other suitable mechanism. In this manner, the intelligent automated assistant systems of various embodiments of the present invention can unify, simplify, and improve the user's experience with respect to many different applications and functions of an electronic device, and with respect to services that may be available over the Internet. The user can thereby be relieved of the burden of learning what functionality may be available on the device and on web-connected services, how to interface with such services to get what he or she wants, and how to interpret the output received from such services; rather, the assistant of the present invention can act as a go-between between the user and such diverse services.
In addition, in various embodiments, the assistant of the present invention provides a conversational interface that the user may find more intuitive and less burdensome than conventional graphical user interfaces. The user can engage in a form of conversational dialog with the assistant using any of a number of available input and output mechanisms, such as for example speech, graphical user interfaces (buttons and links), text entry, and the like. The system can be implemented using any of a number of different platforms, such as device APIs, the web, email, and the like, or any combination thereof. Requests for additional input can be presented to the user in the context of such a conversation. Short and long term memory can be engaged so that user input can be interpreted in proper context given previous events and communications within a given session, as well as historical and profile information about the user.
In addition, in various embodiments, context information derived from user interaction with a feature, operation, or application on a device can be used to streamline the operation of other features, operations, or applications on the device or on other devices. For example, the intelligent automated assistant can use the context of a phone call (such as the person called) to streamline the initiation of a text message (for example to determine that the text message should be sent to the same person, without the user having to explicitly specify the recipient of the text message). The intelligent automated assistant of the present invention can thereby interpret instructions such as "send him a text message", wherein the "him" is interpreted according to context information derived from a current phone call, and/or from any feature, operation, or application on the device. In various embodiments, the intelligent automated assistant takes into account various types of available context data to determine which address book contact to use, which contact data to use, which telephone number to use for the contact, and the like, so that the user need not re-specify such information manually.
In various embodiments, the assistant can also take into account external events and respond accordingly, for example, to initiate action, initiate communication with the user, provide alerts, and/or modify previously initiated action in view of the external events. If input is required from the user, a conversational interface can again be used. In one embodiment, the system is based on sets of interrelated domains and tasks, and employs additional functionally powered by external services with which the system can interact. In various embodiments, these external services include web-enabled services, as well as functionality related to the hardware device itself. For example, in an embodiment where the intelligent automated assistant is implemented on a smartphone, personal digital assistant, tablet computer, or other device, the assistant can control many operations and functions of the device, such as to dial a telephone number, send a text message, set reminders, add events to a calendar, and the like. In various embodiments, the system of the present invention can be implemented to provide assistance in any of a number of different domains. Examples include: 1. Local Services (including location- and time-specific services such as restaurants, movies, automated teller machines (ATMs), events, and places to meet); 2. Personal and Social Memory Services (including action items, notes, calendar events, shared links, and the like); 3. E-commerce (including online purchases of items such as books, DVDs, music, and the like); 4. Travel Services (including flights, hotels, attractions, and the like). One skilled in the art will recognize that the above list of domains is merely exemplary. In addition, the system of the present invention can be implemented in any combination of domains. In various embodiments, the intelligent automated assistant systems disclosed herein may be configured or designed to include functionality for automating the application of data and services available over the Internet to discover, find, choose among, purchase, reserve, or order products and services. In addition to automating the process of using these data and services, at least one intelligent automated assistant system embodiment disclosed herein may also enable the combined use of several sources of data and services at once. For example, it may combine information about products from several review sites, check prices and availability from multiple distributors, and check their locations and time constraints, and help a user find a personalized solution to their problem.
Additionally, at least one intelligent automated assistant system embodiment disclosed herein may be configured or designed to include functionality for automating the use of data and services available over the Internet to discover, investigate, select among, reserve, and otherwise learn about things to do (including but not limited to movies, events, performances, exhibits, shows and attractions); places to go (including but not limited to travel destinations, hotels and other places to stay, landmarks and other sites of interest, etc.); places to eat or drink (such as restaurants and bars), times and places to meet others, and any other source of entertainment or social interaction which may be found on the Internet. Additionally, at least one intelligent automated assistant system embodiment disclosed herein may be configured or designed to include functionality for enabling the operation of applications and services via natural language dialog that may be otherwise provided by dedicated applications with graphical user interfaces including search (including location-based search); navigation (maps and directions); database lookup (such as finding businesses or people by name or other properties); getting weather conditions and forecasts, checking the price of market items or status of financial transactions; monitoring traffic or the status of flights; accessing and updating calendars and schedules; managing reminders, alerts, tasks and projects; communicating over email or other messaging platforms; and operating devices locally or remotely (e.g., dialing telephones, controlling light and temperature, controlling home security devices, playing music or video, etc.). Further, at least one intelligent automated assistant system embodiment disclosed herein may be configured or designed to include functionality for identifying, generating, and/or providing personalized recommendations for activities, products, services, source of entertainment, time management, or any other kind of recommendation service that benefits from an interactive dialog in natural language and automated access to data and services.
In various embodiments, the intelligent automated assistant of the present invention can control many features and operations of an electronic device. For example, the intelligent automated assistant can call services that interface with functionality and applications on a device via APIs or by other means, to perform functions and operations that might otherwise be initiated using a conventional user interface on the device. Such functions and operations may include, for example, setting an alarm, making a telephone call, sending a text message or email message, adding a calendar event, and the like. Such functions operations may be performed as add-on functions in the context of a conversational dialog between a user and the assistant. Such functions and operations can be specified by the user in the context of such a dialog, or they may be automatically performed based on the context of the dialog. One skilled in the art will recognize that the assistant can thereby be used as a control mechanism for initiating and controlling various operations on the electronic device, which may be used as an alternative to conventional mechanisms such as buttons or graphical user interfaces.
The invention is a portable, application-specific USB autorun device operable to communicate with a computer terminal such that, following connection to the terminal, the device automatically initializes or presents itself as a known type of device and then automatically sends to the terminal a sequence of data, the data complying with a standard protocol, that sequence of data automatically causing content to be accessed or a task to be initiated; wherein the device (i) includes a standardized USB module that includes a USB microcontroller, the standardized module being designed to be attached to or embedded in multiple types of different, application specific packages but (ii) excludes mass memory storage for applications or end-user data.
In one implementation, the first predefined sequence of data are keycodes, the keycodes complying with the human interface device (HID) keyboard standard protocol. Alternatively, the device can automatically initialise or present itself as a CD drive. The USB autorun module can, in one implementation, be a USB IC module. In another implementation, it can be a USB Integrated Circuit Card module. Other implementation features are:
The data automatically sent from the device to the terminal causes a URL to be sent by that terminal to open a specific website address. A unique user ID and password (or passcode) can be appended to the URL and passed as parameters to a web server, so that the user can be identified. The physical shape or marking of the packaging or housing of the device represents or is associated with the single application that the device performs. The packaging or housing is small enough to be held in a hand and readily inserted into a female USB socket on the terminal. The device is application-specific USB autorun device because it is designed for a single application; we will give a large number of examples of applications in this specification.
An implementation of the invention brings a number of important benefits to the user: 1. The user has a physically descriptive object that represents the single, specific task or process that is initiated or implemented by the HID keycodes. 2. The user no longer needs to remember or learn the complex actions that need to be performed in order to navigate to and run the content or carry out the task/process-he simply connects the device to the PC. 2. The user can initiate or access the task/process from any personal computer terminal running common Operating System software, since the device does not require unique software or drivers because it autorun.
Because the device has no costly mass memory, it is far cheaper to manufacture than, for example, conventional USB based memory keys, which typically have between 64 MB to 1 GB of Flash memory. Because a single module can be used for a large variety of different applications, that also means that unit costs can be far lower than if the module were custom designed for a specific application. Furthermore, where HID keyboard emulation is used, there is no risk of the operating system blocking operation, as may happen with conventional USB devices that emulate CDs. The terminal could be, as noted above, a conventional PC (i.e. personal computer, including Apple Macintosh computer) but also a personal digital assistant (PDA), laptop computer, gaming console, portable gaming device, mobile telephone, smartphone, communicator, wireless information device, web browsing device, portable navigation device and indeed any other kind of electronic information terminal.
An implementation of the present invention is called the 'link-it'. The 'link-it' is a small USB device that automatically runs a task or content on a computer when plugged in. In its simplest form, it links a physical object directly to web content by automatically opening a URL such as a website address. The product removes huge barriers by linking the user directly to web content simply by plugging an object into the computer, using USB as the PC connection with which most users are familiar. As well as solving the key issue of accessibility, the 'link-it' offers many other features including identification, authentication and security, CRM tracking and physical interactivity.
The USB 'link-it' can be manufactured in volume for less than US$1. This makes the product a powerful low cost marketing and loyalty product that can be used in a number of vertical markets as a marketing device that can be given to users to provide easy access to a site and increase user loyalty. The most widely used product that has turned the USB connection into a common user interface similar to the keyboard or mouse is the USB memory stick. Inevitably the link-it will be compared with this product. The perceived value of a USB memory stick is between $15 and $50. This price is driven almost entirely by the price of memory-the link-it is not a memory product and can therefore be made at a fraction of the cost, initially around $1. The key technology features of the 'link-it' are: Autorun Identification Authentication and security Tracking Input and Output System Integration Autorun (Direct URL Access) When a'link-it'is inserted into a PC it automatically opens, or'autorun', a URL which links the user to web content. There are two autorun techniques that can be implemented in the 'link-it' USB device; USB HID keyboard emulation (USBHK) and USB CD drive emulation (USBCD). In the USBHK implementation the device appears to the PC as a standard plug'n' play keyboard. On connection, the device automatically sends a series of keyboard commands to open the destination URL (e.g. http://www.amazon.co.uk). The website will then be displayed to the user in a web browser. The USBHK implementation has some advantages over the USBCD implementation, particularly as it offers continued input and output between the website and the device and is not blocked by Microsoft Vista. In the USBCD implementation the device appears to the PC as a standard plug 'n' play CD drive containing an autorun file (e.g. 'autorun.inf). On connection, the autorun file executes and automatically opens the destination URL (e.g. http://www.amazon.co.uk). The website will then be displayed to the user in a web browser. However, USBCD is incompatible with Microsoft Vista. Identification Data can be passed to a website through a URL and because each device can be programmed with a unique ID number, like a serial number, each 'link-it' product can be identified by the website's server. If user information for a device is also held by the website, then the 'link-it' can be used to identify a user too. A 'link-it' with a unique ID number would thus act a bit like a permanent and portable cookie. Whenever the 'link-it' is connected to a computer it autorun and opens an internet URL with the ID number appended and passed as a parameter to the web server (e.g. http://www.amazon.com/welcome.cgi?userid=1234)
The server would receive the past ID number and look up the user in a database. A customised web page would be sent back to the browser. For example, the page might say, "Welcome back, John Smith!" and show the last items the user browsed. Such identification could also be implemented using an intermediary re-direct server that would verify the ID number and redirect to the correct web page for that ID. In this case the company would not need to change its system.
Authentication and Security An additional level of security would be implemented by including a one-time-only passcode generator in the device; thus appending a unique passcode to the URL each time the 'link-it' is connected to a computer. This could be used if authentication or user login is required by a web service, such as authorizing a music download or logging in to web mail or an online store. Whenever the 'link-it' is connected to a computer it autorun and opens an internet URL with an ID number and OTO passcode appended and passed as parameters to the web server. The server would use the ID to look up the sequence of numbers for that ID and identify the next expected passcode. If they match it securely links the user to the appropriate page. This would be invisible to the user. Such a system would prevent the URL from being reproduced and would ensure the web service could only be accessed using the device. An example sequence of generated URLs might be: i. 1st connection=https://www.amazon.com/login.cgi? userid=1234&passcode=2906 ii. 2nd connection=https://www.amazon.com/login.cgi? userid=1234&passcode=5789 iii. 3rd connection=https://www.amazon.com/login.cgi? userid=1234&passcode=8631 etc .... This level of security could also be implemented using an intermediary re-direct SSL server that would verify the user ID and OTO passcode and redirect to the correct web page for that user. In this case the company would not need to change its system and the user login URL would not be visible or accessible at any time. For example: • https://ink-its.com/rd.php?ucode=1234&pcode=0467 might re direct to .... • https://www.amazon.com/ogin.cgi?user=j.smith&password=midas 55 Tracking The 'link-it' can be tracked from initial use through to repeated interaction with a company's web content. It therefore offers new opportunities for companies to evaluate the success of their online services and enhance their CRM systems. To track the use of the'link-it', the URL needs to contain something which identifies it as being from the'link it'. This can be done in several ways, but most will use some form of identification as described above. Here are a few example scenarios. Identification-Logged by Company Using ID Number A unique ID stored on the link-it is sent as part of the URL. This is received by the company's server and the use of it is logged, the user is sent the appropriate page. The logs can be used to track usage of the link-it and the company could calculate its relationship to successful user transactions. Revenue could be based on successful transactions by checking against a log of the time, date and amount for each transaction. Identification-Logged by Company Using Cookie
To enable easy integration with a company's system, the link-it would store and send an existing identification format e.g. a cookie. Many websites retrieve an ID from a cookie on the user's PC to identify the user. The link-it could send the cookie without being constrained to a specific PC. To track the use of the link-it the cookie must be identifiable as coming from the link-it and not a cookie on the PC. This would not matter if revenue came from introducing new users irrespective of their later method of access. However, with minimal changes to the company's system, it may be possible to identify a 'link-it originated' cookie if the server could identify that it hadn't made a request for that cookie. Identification-Logged and Redirected by Intermediary Server.
The link-it would autorun a URL, with an ID number appended, which would go to an intermediary server. The server would log the ID and redirect to the appropriate page.
This is also a way to log the use of link-its, and for users to access the correct page for their specific ID, without changing the company's user ID format. This would be invisible to the user and very easy to log. No significant changes should be needed to the company's system.
Input and Output (Physical Interactivity) Various forms of input and output could be integrated into a 'link-it' product, from simple LEDs to low-cost actuators. Depending on the client's needs, designs could be created that enable a greater or lesser degree of interactivity with the product. For example, an Amazon 'link-it' may have a 'buy' button that would move an item into the user's basket; or a Disney toy may have articulated arms and legs that move in time with music from a website. Input and output on the 'link-it' would be achieved with common sensors and actuators, while input and output between the 'link-it' and the website would be achieved using the HID keyboard interface. The device would send keyboard commands to the browser to trigger different website events and the website would send keyboard commands to the device to cause the product to behave in some way. Communication between the website and the 'link-it' would offer new and exciting interactive possibilities.
System Integration
An important feature of the 'link-it' technology is that it can be easily integrated with a customer's existing back-end system. Whether linking to a simple website address, passing a 'link-it' ID to a server, or integrating with an existing cookie system the 'link-it' should require few changes or additions to the customer's website. For more advanced market applications such as those that require authentication, and where back-end changes may initially cause complications, an intermediary server could be used to re direct the 'link-it' to the destination web page. The re-direct server could be hosted by the customer or be offered as an external service.
Re-Direct Server Details
The server application manages a database of client URLs and perform a redirecting function. It will receive URLs (which will include an ID number) from USB devices and redirect to client URLs. Its main function will be to manage the connections between the USB device URLs and the associated client URLs. It will also include ways of adding/amending to the database as well as interfaces for viewing information about the data, such as use statistics. The server application will manage the redirecting process between a USB device URL and the end client URL. It will run on a server and will integrate with a database containing all of the information necessary to perform the redirects. The Server Application also includes data capture so that tracking and statistics can be enabled.
For each end client URL there will be a set of information in the database relating to a client, a job, and the number of products associated with that job. Along with this information, there will be a further set of data relating to the batches of devices, including their batch codes and ID numbers. There may also be other information stored, such as passwords, which might be used for additional services such as web portals for viewing information relating to the use of the device.
Random Distribution The first time the device is used all essential information needs to be input by the customer on the website e.g. postcode, house number, name, contact telephone. The second time the device is used (irrespective of the computer is being used) all the information obtained is in place, reducing the number of steps needed to place and order. Local Distribution The only difference to Random distribution is that the first time the device is used, the customer does not need to establish they are in a delivery area, they can be presented immediately with a menu. This is done by pre-linked IDs on flyers to the database of restaurants before distribution. Direct Mail All the essential information is in place and linked to the flyer but there maybe a need for further customer verification. Arrives with Your Food All essential information can already be in place and the device is ready to use. The device can be uniquely identified as part of the URL. This means it can be recognised by the company's server allowing it to be linked to the information known about the customer. A USB autorun device used for food delivery would have the following advantages: Tempting to use New and novel Less likely to be thrown away than a generic paper flyer Quick to use and as easy as phone ordering Does not require opening a browser Does not require reading and writing a URL Can be recognised from any computer, doesn't require a'cookie'
The site might allow customers to speak directly to the take away company by opening an audio call through the internet. This makes the card feel like a quick way to make a free telephone call.
BRIEF DESCRIPTION OF THE DIAGRAM
FIG. 1 is examples of USB Autorun devices in a card format, and their construction.
FIG. 2: is a block diagram depicting a system architecture illustrating several different types of clients and modes of operation.
FIG. 3: is a block diagram depicting a client and a server, which communicate with each other to implement the present invention according to one embodiment.
FIG. 4: is a block diagram depicting a fragment of an active ontology according to one embodiment.
FIG. 5: is a block diagram depicting an example of an alternative embodiment of an intelligent automated assistant system.
FIG. 6: is a flow diagram depicting a method of operation for active input elicitation component(s) according to one embodiment.
FIG.7: is a flow diagram depicting a method for active typed-input elicitation according to one embodiment.
FIG. 8 is an example of a USB Autorun device with fingerprint recognition for secure use. FIG. 9: is an example of a USB Autorun device as an intelligent business card.
DESCRIPTION OF THE INVENTION
A module suitable for use in a USB autorun device could be produced using a USB microprocessor IC USB contacts, such as is shown in FIG. 1.
Device 2 (USB Autorun Device with Keypad for Secure Use)
FIG. 2, there is shown a block diagram depicting a system architecture illustrating several different types of clients 1304 and modes of operation. One skilled in the art will recognize that the various types of clients 1304 and modes of operation shown in FIG. 2 are merely exemplary, and that the system of the present invention can be implemented using clients 1304 and/or modes of operation other than those depicted. Additionally, the system can include any or all of such clients 1304 and/or modes of operation, alone or in any combination. Depicted examples include:
Computer devices with input/output devices and/or sensors 1402. A client component may be deployed on any such computer device 1402. At least one embodiment may be implemented using a web browser 1304A or other software application for enabling communication with servers 1340 via network 1361. Input and output channels may of any type, including for example visual and/or auditory channels. For example, in one embodiment, the system of the invention can be implemented using voice-based communication methods, allowing for an embodiment of the assistant for the blind whose equivalent of a web browser is driven by speech and uses speech for output.
Mobile Devices with I/O and sensors 1406, for which the client may be implemented as an application on the mobile device 1304B. This includes, but is not limited to, mobile phones, smartphones, personal digital assistants, tablet devices, networked game consoles, and the like.
Consumer Appliances with I/O and sensors 1410, for which the client may be implemented as an embedded application on the appliance 1304C.
Automobiles and other vehicles with dashboard interfaces and sensors 1414, for which the client may be implemented as an embedded system application 1304D. This includes, but is not limited to, car navigation systems, voice control systems, in-car entertainment systems, and the like.
Networked computing devices such as routers 1418 or any other device that resides on or interfaces with a network, for which the client may be implemented as a device-resident application 1304E.
Email clients 1424, for which an embodiment of the assistant is connected via an Email Modality Server 1426. Email Modality server 1426 acts as a communication bridge, for example taking input from the user as email messages sent to the assistant and sending output from the assistant to the user as replies.
Instant messaging clients 1428, for which an embodiment of the assistant is connected via a Messaging Modality Server 1430. Messaging Modality server 1430 acts as a communication bridge, taking input from the user as messages sent to the assistant and sending output from the assistant to the user as messages in reply.
Voice telephones 1432, for which an embodiment of the assistant is connected via a Voice over Internet Protocol (VoIP) Modality Server 1430. VoIP Modality server 1430 acts as a communication bridge, taking input from the user as voice spoken to the assistant and sending output from the assistant to the user, for example as synthesized speech, in reply.
For messaging platforms including but not limited to email, instant messaging, discussion forums, group chat sessions, live help or customer support sessions and the like, assistant 1002 may act as a participant in the conversations. Assistant 1002 may monitor the conversation and reply to individuals or the group using one or more the techniques and methods described herein for one-to-one interactions.
In various embodiments, functionality for implementing the techniques of the present invention can be distributed among any number of client and/or server components. For example, various software modules can be implemented for performing various functions in connection with the present invention, and such modules can be variously implemented to run on server and/or client components. Referring now to FIG. 3, there is shown an example of a client 1304 and a server 1340, which communicate with each other to implement the present invention according to one embodiment. FIG. 3 depicts one possible arrangement by which software modules can be distributed among client 1304 and server 1340. One skilled in the art will recognize that the depicted arrangement is merely exemplary, and that such modules can be distributed in many different ways. In addition, any number of clients 1304 and/or servers 1340 can be provided, and the modules can be distributed among these clients 1304 and/or servers 1340 in any of a number of different ways.
In the example of FIG. 3, input elicitation functionality and output processing functionality are distributed among client 1304 and server 1340, with client part of input elicitation 1094 a and client part of output processing 1092 a located at client 1304, and server part of input elicitation 1094 b and server part of output processing 1092 b located at server 1340. The following components are located at server 1340:
• complete vocabulary 1058 b; • complete library of language pattern recognizers 1060 b; • master version of short term personal memory 1052 b; • master version of long term personal memory 1054 b.
In one embodiment, client 1304 maintains subsets and/or portions of these components locally, to improve responsiveness and reduce dependence on network communications. Such subsets and/or portions can be maintained and updated according to well-known cache management techniques. Such subsets and/or portions include, for example:
• subset of vocabulary 1058 a; • subset of library of language pattern recognizers 1060 a; • cache of short term personal memory 1052 a; • cache of long term personal memory 1054 a.
Additional components may be implemented as part of server 1340, including for example:
• language interpreter 1070; • dialog flow processor 1080; • outputprocessor1090; • domain entity databases 1072; • task flow models 1086; • services orchestration 1082; • service capability models 1088.
Each of these components will be described in more detail below. Server 1340 obtains additional information by interfacing with external services 1360 when needed.
or some applications, the USB autorun device is used to access a private or secure website or may pass user login information to a server. In such cases, an additional level of security could be added by integrating a fingerprint scanner into the device, as shown for example in FIG. 8.
This device type is show in FIG. 9 and its. The USB autorun device could act as a personal or corporate business card-an "auto card". The card could contain just the name (or name and company for corporate use) and possibly image of the person. All the other details could be accessed once connected to a computer. The form factor of the device could either be a slim stick the length of existing business cards but a third of the width or it could be designed to be same size as existing cards to ensure compatibility with existing business card storage systems.
Each card would come with a unique ID internally stored. The level or amount of contact details could be determined by colour coding on the card-for example grey=business details, green=private contacts, red=private and personal details. So business details could include business and office details and contacts website. Private details could include mobile number and home address and personal contacts might include blog site, private web site chat details and blog details. At the point the recipient of the card connects to their computer then either; a) an e-mail notice is sent to the provider of the "auto card" enabling that card to be registered to particular person, or b) at the point that they make contact by e-mail then the recipients' details would be passed to the original provider of the "auto card".
At any point in time the provider of the card can supply the holder of their card with updated details if they change their position within a company, change company or change any of their contact details. The card can be given access to additional contact information if for example the recipient has business contact details but subsequently the provider of the card wishes to provide private contact details, there could also be a message window on the "auto card" once connected online. This enables the original provider of the "auto card" to send out messages such as they are away on holiday or attending a trade show with hotel contacts etc.
CD Business Cards already exist-so we should review this technology. These are credit card sized CD-ROM that will play in any standard computer CD drive. They are currently still more expensive than a normal CD, but the prices are becoming lower as manufacturers gear up for larger production runs. There appears to be two types of card; CD-R recordable cards and CD ROM factory produced cards. For quantities greater than 500 of one single design and dataset the CD ROM is an appropriate option, but for quantities of 500 or less the CD-R is the practical choice. CD business cards work just like a normal CD and can contain whatever information you wish to put on them up to the capacity limit of the disc (typically a maximum of about 45-50 MB, or about 35 floppy discs). The CDs will work in most standard PC, MAC or laptop CD/DVD drive.
An example of how the "auto card" business card could be used by companies with existing e-mail and contact services might be a company like Google. The "auto card" could support the existing Google communication services like: Google mail/Google maps/Google chat. By inserting the USB card the details of that contact would be automatically loaded into a "Google card index"-one clicks link to gmail/chat/map/VoIP/blog. Activating these will send your Google card to recipient. An example is shown in FIG. 9

Claims (5)

WE CLAIM
1. Our Invention Intelligent Pen Drive Highest Data Security (Auto data share your Gmail & Link share your mobile No) Using Al- Based Program is a intelligent automated assistant system engages with the user in an integrated, conversational manner using natural language dialog, and invokes external services when appropriate to obtain information or perform various actions. The invented technology also can be implemented using any of a number of different platforms, such as the web, email, smartphone, and the like, or any combination and share data automatic if anyone can delete the information after that link share by reg mobile no. The invention is to a system is based on sets of interrelated domains and tasks, and employs additional functionally powered by external services with which the system can interact. The invention is a portable, application-specific USB autorun device, following connection to a computer terminal, automatically initializes or presents itself as a known type of device and then automatically sends to the terminal a sequence of data complying with a standard protocol, that sequence of data automatically causing content to be accessed or a task to be initiated. The invented technology also the device (i) includes a standardized USB module that includes a USB microcontroller, the standardized module being designed to be attached to or embedded in multiple types of different, application specific packages but (ii) excludes mass memory storage for applications or end user data.
2. According to claims# the invention is to a intelligent automated assistant system engages with the user in an integrated, conversational manner using natural language dialog, and invokes external services when appropriate to obtain information or perform various actions.
3. According to claiml,2# the invention is to a be implemented using any of a number of different platforms, such as the web, email, smartphone, and the like, or any combination and share data automatic if anyone can delete the information after that link share by reg mobile no.
4. According to claim,2,3# the invention is to a system is based on sets of interrelated domains and tasks, and employs additional functionally powered by external services with which the system can interact.
5. According to claiml,2,4# the invention is to a computer terminal, automatically initializes or presents itself as a known type of device and then automatically sends to the terminal a sequence of data complying with a standard protocol, that sequence of data automatically causing content to be accessed or a task to be initiated.
FIG. 1 is examples of USB Autorun devices in a card format, and their construction.
FIG. 2: is a block diagram depicting a system architecture illustrating several different types of clients and modes of operation.
FIG. 3 is a block diagram depicting a client and a server, which communicate with each other to implement the present invention according to one embodiment.
FIG. 4: is a block diagram depicting a fragment of an active ontology according to one embodiment.
FIG. 5: is a block diagram depicting an example of an alternative embodiment of an intelligent automated assistant system.
FIG. 6: is a flow diagram depicting a method of operation for active input elicitation component(s) according to one embodiment.
FIG.7: is a flow diagram depicting a method for active typed-input elicitation according to one embodiment.
FIG. 8 is an example of a USB Autorun device with fingerprint recognition for secure use.
FIG. 9: is an example of a USB Autorun device as an intelligent business card.
AU2021100920A 2021-02-18 2021-02-18 Intelligent Pen Drive* : Highest Data Security ( Auto data share your Gmail & Link share your mobile No) Using AI- Based Programming Ceased AU2021100920A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2021100920A AU2021100920A4 (en) 2021-02-18 2021-02-18 Intelligent Pen Drive* : Highest Data Security ( Auto data share your Gmail & Link share your mobile No) Using AI- Based Programming

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2021100920A AU2021100920A4 (en) 2021-02-18 2021-02-18 Intelligent Pen Drive* : Highest Data Security ( Auto data share your Gmail & Link share your mobile No) Using AI- Based Programming

Publications (1)

Publication Number Publication Date
AU2021100920A4 true AU2021100920A4 (en) 2021-04-29

Family

ID=75625734

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021100920A Ceased AU2021100920A4 (en) 2021-02-18 2021-02-18 Intelligent Pen Drive* : Highest Data Security ( Auto data share your Gmail & Link share your mobile No) Using AI- Based Programming

Country Status (1)

Country Link
AU (1) AU2021100920A4 (en)

Similar Documents

Publication Publication Date Title
US10460728B2 (en) Exporting dialog-driven applications to digital communication platforms
US20240004827A1 (en) Usb device
US11232046B2 (en) Portable, computer-peripheral apparatus including a universal serial bus (USB) connector
US10437418B2 (en) Overloading app icon touchscreen interaction to provide action accessibility
WO2017143885A1 (en) Application processing method and apparatus for embedded universal integrated circuit card
US20180101574A1 (en) Searching index information for application data
US11372965B2 (en) Application with self-configuring accessibility settings
CN108427549B (en) Method and device for processing sound of notification message, storage medium and terminal
CN106817618B (en) Popup display method and device and electronic equipment comprising popup display device
CN117501223A (en) Service driven gadgets with multi-form authentication displayed in gadget boards
US11449186B2 (en) System and method for optimized generation of a single page application for multi-page applications
AU2021100920A4 (en) Intelligent Pen Drive* : Highest Data Security ( Auto data share your Gmail & Link share your mobile No) Using AI- Based Programming
CN113407241A (en) Interactive configuration method, device and system and electronic equipment
WO2018083679A1 (en) System and method for providing personalized solutions using bots
Machiraju et al. Conversations as platforms
JP2018524676A (en) Messenger-based service providing apparatus and method using the same
CN114415897B (en) Method for displaying more menu configuration of applet

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry