TW486638B - A system, method and article of manufacture for effectively interacting with a network user - Google Patents

A system, method and article of manufacture for effectively interacting with a network user Download PDF

Info

Publication number
TW486638B
TW486638B TW088120146A TW88120146A TW486638B TW 486638 B TW486638 B TW 486638B TW 088120146 A TW088120146 A TW 088120146A TW 88120146 A TW88120146 A TW 88120146A TW 486638 B TW486638 B TW 486638B
Authority
TW
Taiwan
Prior art keywords
user
information
quot
scope
application
Prior art date
Application number
TW088120146A
Other languages
Chinese (zh)
Inventor
Chad Burkey
Sergei Lopatin
Lucian Hughes
Original Assignee
Andersen Consulting Llp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US09/196,482 priority Critical patent/US6446076B1/en
Application filed by Andersen Consulting Llp filed Critical Andersen Consulting Llp
Application granted granted Critical
Publication of TW486638B publication Critical patent/TW486638B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation

Abstract

A system is disclosed that facilitates a web-based active knowledge management system is utilized to facilitate an intelligent agent coordinator. The architecture facilitates delivery of information whenever and whenever a user requires the information in an appropriate format based on characteristics of the user at that instant. Personalization of information is also afforded by taking into account the history of user interactions with various applications and current real-time situations including ""who is the current user, where the user is currently, and when the user is logged onto the system"". A fast and scalable information prioritization subsystem is also utilized to incorporate intelligent agents coordinator opinion, user preferences, and history of user interactions. This processing removes much of the normal processing from an agent which allows the agents to be much more sophisticated and precise without compromising the system scalability. In addition, speech recognition and speech synthesis in combination with intelligent agent animated representation and tactile input provides for efficient, intuitive, and emotionally rewarding interaction with the system.

Description

486638 56l9twf.doc / 002 A7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. 5. Description of the invention (丨) The present invention is related to an agent based system ('agent-based system'), and particularly to an interactive An intefactwe web-based agent system that responds to users with information associated with user requests. Agent based technology is designed to interact with the user to execute various computer-specific tasks in foreground and background modes. Increasingly heavy in application. Agent software (agent sftft) includes computer programs that are set to perform routine, lengthy and time-consuming specific procedures on behalf of users. To facilitate individual users, agents The program must be personalizable according to the individual user's vision, habits, and preferences. Therefore, there is a need for "an agent program to efficiently and effectively retrieve user knowledge from users" and use it to perform actions on behalf of the users. Agents ’thoughts, or agents, have been fully established. The agent is the trustee's, which is generally called the client, and the client represents the client. Under this Code, the principal authorizes the agent to do anything that the principal is unwilling or unable to do. For example, an insurance broker may handle all of the client's insurance matters, or an art broker may arrange a concert date on behalf of a performer. With the advent of computers, new ways of using agents appeared. Significant advances in the field of experts have allowed computer programs to perform routine, lengthy, and time-consuming procedures on behalf of computer users. These computer programs are called software agents. In addition, there is a proliferation of computer and communication networks. These networks allow users to access large amounts of information and services without any geographical restrictions. Therefore, ______4 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) " ~-(Please read the precautions for the arm surface first and write this page).

Order-I. Line · 486638 5619twf. Doc / 002 A7 _ B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of the invention (y) The agent has an excellent environment to perform a large number of actions on behalf of the user. For example, it is possible for an agent to make flight reservations, buy tickets, and send tickets directly to users. Similarly, agents can scan the Internet and retrieve specific graduation thesis from the latest sports reports or news to applied physics. Today's solutions cannot apply agent technology to existing calendar technology to provide users with background information. According to the viewpoint of a preferred embodiment of the present invention, an active knowledge management system is used as an intelligent agent coordinator. A universal back-end is provided to support several information transmissions. Channel. For example, if the user is in front of the Magic Wall, the information will be presented in multimedia. If the system determines that the user is moving, the information is transmitted to the observer machine in standard text. This structure facilitates the transmission of information, and users can request information formed in an appropriate format according to their characteristics, whenever and wherever possible. Information personalization can also be generated by user interaction records and real-time (feaMime) status including "who is the current user, where is the user currently, and when does the user sign in to the system." A fast and scalable information prioritization subsystem is also used to combine smart agent opinions, user preferences, and user interaction records. This flow removes most of the general flow from the agent, making the agent more refined and accurate without compromising system scalability. In addition, speech recognition and speech synthesis combined with gravity______ 5 IIIJII J- I I-MM I ns · II • II genus * (Please read the note on -t side first? Matters ^ ® ^ (This page)-Line · Γ This paper size applies to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 486638 5619twf.doc / 002 A7 B7 Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs ) Smart agent for drawing performance, and touch input provides efficient, intuitive and emotional feedback to the system. In order to make the above-mentioned objects, features, and advantages of the present invention more comprehensible, a preferred embodiment is given below in conjunction with the accompanying drawings to make a detailed description as follows: Brief description of the drawings: Figure 1 shows the basis A block diagram of a representative hardware environment of a preferred embodiment; FIG. 2 illustrates a flowchart of a system according to a preferred embodiment; FIG. 3 illustrates a parsing unit according to a preferred embodiment Figure 4 shows a flowchart of pattern matching according to a preferred embodiment; Figure 5 shows a flowchart of a search unit according to a preferred embodiment; Figure 6 shows a basis A flowchart of the overall system flow of a preferred embodiment; FIG. 7 shows a flowchart of topic processing according to a preferred embodiment; FIG. 8 shows a meeting record according to a preferred embodiment record) processing flowchart; Figure 9 shows a block diagram of the processing flow of the packet bargain finder according to a preferred embodiment; Figures 10 A and 100B illustrate the city's implementation of a better implementation Example of the logic of controlling the inner valley web page Block diagram and flowchart; Figure 11 shows the receiving user center according to a preferred embodiment (user- ________6___ This paper size applies to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (Please read the threat surface first Precautions 4® written on this page) Installation. Line · 486638 56l9twf.d〇c / 〇〇2 A7 ____________ B7 5. The detailed logic flow chart of the invention description (required) centric); Figure 12 shows the basis 1 A data model of the user profile of the preferred embodiment; FIG. 13 illustrates a persona model according to a preferred embodiment; FIG. 14 illustrates an intention according to a preferred embodiment ( intention) data model; FIG. 15 shows a processing flowchart for generating current statistics of an agent program according to a preferred embodiment; FIG. 16 shows a personalized product rating of a user according to a preferred embodiment ); Figure 17 shows a flowchart of access to the central storage method according to a preferred embodiment, and Figure 18 shows the interaction between a user and a specific supplier integrator according to a preferred embodiment Figure 19 shows a flowchart of an agent program for generating an oral abstract according to a preferred embodiment; Figure 20 shows a display logic according to a preferred embodiment; Figure 21 shows a basis for a The daily work management logic of the preferred embodiment; Figure 22 shows the home screen of the user according to a preferred embodiment; Figure 23 shows the interactive screen of the agent program according to a preferred embodiment; Figure 24 shows the basis A block diagram of a preferred embodiment of an active knowledge management system; FIG. 25 shows a block diagram of a back-end server according to a preferred embodiment; _ ____ '_7____ This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (please read the precautions on the back to write this page), and install _ printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 486638 56l9twf.doc / 002 A7 ____B7 ______ 5. Description of the Invention (Γ) and Figure 26 shows a block diagram of a magic wall according to a preferred embodiment. Embodiments According to the present invention, the system of the preferred embodiment is applied to a personal computer, such as an IBM compatible personal computer, a Macintosh, or a UNIX workstation. Draw on printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs -----,-ι.ίΙΊ Ji Pack --- (Please read the precautions on the arm surface first and write this page) Line-1 The physical environment shows a typical workstation hardware configuration according to the preferred embodiment, which includes a central processing unit 110, such as a microprocessor, and other units connected through a system bus 112. The workstation in FIG. 1 includes a random access memory (RAM) 114, a read-only memory (ROM) 116, and an input / output (I / O) for connecting peripheral devices such as a disk storage unit 120 to the system bus 112. Card 118, user interface adapter 122 connecting keyboard 124, mouse 126, speaker 128 and microphone 132, and / or other user interface devices such as touch screen (not shown) A communication card 134 connected to the bus 112, a workstation to a communication network (such as a data processing network), and a display card 136 used to connect the system bus U2 to the display device I38. Usually the workstation is equipped with an operating system (OS), such as Microsoft Windows NT / 95, IBM OS / 2, MAC OS or UNIX. Those skilled in the art can also implement platforms and operating systems different from those described above according to the present invention. '' The preferred embodiment is written using ava, C, C ++ and object oriented programming (OOP) methods. OOP has been heavily used to develop complex systems. OOP is gradually becoming a software design and development ^ Paper size applies Chinese National Standard (CNS) A4 specifications (210 X 297 8 8 love) ------- 486638 56l9twf.doc / 002 A7 Employee Consumer Cooperatives, Intellectual Property Bureau, Ministry of Economic Affairs Printed B7 丨 · „— · | _V. Mainstream of & Invention Description, many software solutions need to be rewritten to apply the advantages of OOP. Applied to electronic messaging system In the information interface, it is necessary to provide OOP principles such as a set of classes and objects. OOP is the process of developing computer software by using objects, which includes analyzing problems, system design, and constructing programs. Objects also include data And related data structure (structure) and processing program (software package) software package (software package). Because it also includes data and related data structure and processing program collection, it can be considered as no need for additional data structure, processing program or data Self-sufficient component to execute its specific program. Therefore, OOP regards computer programs as many independent Component, that is, the collection of objects, each component has its own specific program. This concept of packaging data, data structure, and processing program in a component or module is called closure.) Generally speaking, OOP A component is a reusable software module, which represents an interface that conforms to the object model and can be accessed through component integration architecture during execution. The component integration architecture is a software module that allows each software module to be in a different program space. (Process space) uses a mutual capability and function architecture. When constructing this architecture, it is usually done by assuming a common component object model. In distinguishing objects from class of objects) is required. An object is an object class, usually called a category, a single instance. A class can be considered as a blueprint for generating objects. Many objects can be identified by a ___________9_ This paper standard applies to Chinese national standards (CNS ) A4 size (210 X 297)> (Please read the precautions on the arm surface first and write this page): 486638 5 ^ l9twf. Doc / 002 A7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. 5. Description of the invention (7) It was produced. 0 0 P is allowed. Part of the object. For example, an article representing a piston engine has a composition-relationship with an article representing a piston. In fact, a piston engine contains pistons, valves, and other parts. The fact that a piston is a part of a piston engine can be logically represented by two objects in OOP. OOP also allows the design of objects that depend on other objects. If there are two objects, one representing a piston engine and the other representing a piston engine made of ceramic, the relationship between the two objects is not an organizational relationship. Ceramic piston engines do not constitute piston engines. Instead, it is a piston engine with one more limitation than piston engines, namely that the piston is made of ceramic. In this example, the object representing the ceramic piston engine is called a derived object, and it inherits all the concepts of the object representing the piston engine, and further adds restrictions or explicit statements. The object representing the ceramic piston engine is attached to the object representing the piston engine. The relationship between the two is called inheritance. When an object or category representing a ceramic piston engine inherits all concepts representing an object representing a piston engine, it inherits the thermal characteristics of a standard piston defined in the piston engine category. However, the thermal characteristics of ceramic piston engine object override ceramics is different from that of metal pistons. It skips the original function and uses a new function related to ceramic pistons. Different piston engines have different characteristics ’but most of them have basic functions related to them (such as several pistons in the engine, ignition sequence, lubrication, etc.). In order to access these functions in any piston engine category, programmers need to --------- 1 ^ 0_ _ This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions for the flank surface first --- I write this page} Order:-Line · 486638 5619twf.d〇c / 002 ^ 7

5. Description of the invention (2) Use the same function name to call the same function, but each type of active engine may have different / overloaded implementation functions, but have the same function name. The ability to hide functions with different implementations under the same function name is called polymorphism, which greatly simplifies communication between objects. According to the concepts of organizational relationship, encapsulation, inheritance and polymorphism, an object can represent anything in the true world. In fact, a logical understanding of facts is the only limitation that determines the types of things that can be converted into objects in object-oriented software. Some representative classifications are as follows: 1. Objects represent global objects, such as vehicles in traffic flow simulations, electronic components in circuit design programs, countries in economic models, or aircraft in air traffic control systems. 2. Objects represent elements of the computer-user environment, such as windows, menus, or graphic objects. 3. Objects represent bills of lading, such as personnel files or city latitude and longitude tables. 4. Objects represent user-defined data types, such as time, angle, complex numbers, or points on a plane. With the ability of objects to represent any logically separable objects, OOP allows software developers to design and implement computer programs, which are models of facts, whether the facts are entities, processes, systems, or objects. Since an object can represent anything, software developers can create an object that will be used as a building block in future large software projects. If 90% of a new software program is a verified component formed from pre-designed reusable objects, only 10% of the new software project needs to be written and tested from scratch. Since 90% comes from this paper which has been tested for extension and reusability, this paper standard is applicable to China National Standard (CNS) A4 (210 X 297 mm) -----—— τI-; ΙΙΊ Packing · II ·· W Φ (Please read the note of the threat page first? Matters ^ this page) _ --Line · Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 486638 5619twf.doc / 002 A7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs Description of the invention (了) The list of objects, the potential area of errors will be 10% of the entire program. Therefore, OOP allows software developers to create objects from other objects, which are created in advance. This procedure is similar to combining a device and an auxiliary device into a complex machine. 00P technology makes software engineering closer to hardware engineering, that is, software is made up of ready-made components, which developers can use as objects. This can improve the quality of software like accelerating the speed of software development. Programming languages began to fully support OOP theories such as encapsulation, inheritance, polymorphism, and organizational relationships. With the advent of C ++, many commercial software developers have begun to take advantage of OOP. C ++ is an OOP language that provides fast machine execution code. In addition, C ++ is suitable for both business applications and system design projects. Now C ++ is the choice for most OOP programmers. But there are other OOP languages, such as Smalltalk, common lisp objec system (CLOS), and Eiffel. And OOP compatibility started to be added to most traditional computer programming languages such as Pascal. The advantages of object classes are as follows: 1. Objects and their related categories break down complex programming problems into many smaller and simpler problems. 2. Encapsulation enforces data abstraction, from data organization to small and independent objects that can communicate with each other. Encapsulation protects data from accidental destruction, but allows other objects to interact with the data through object member functions and data structures. ^ 3 • Subclassing and inheritance allow new objects derived from standard classes in the system to be extended and modified. Therefore, it is not necessary to create new functions (please read the note I y-installation --- precautions on this page first): ----This paper size is applicable to China National Standard (CNS) A4 (210 X 297) (Centi) 486638 5619twf. Doc / 002 A7 B7 5. The description of the invention (/ ^) begins. 4. Polymorphism and multiple inheritance allow different programmers to mix and match many different categories of features. Specific objects that work in a manner that works with related objects. 5. Class hierarchies and containment hierachies provide the flexibility of modular real-world objects and their relationships. 6. Reusable class functions Libraries are very useful in many situations, but also have some limitations, such as: complexity. In complex systems, the 'class hierarchy of related categories' can become confusing when there are dozens or hundreds of categories. Quite confusing. Flow of control. A program written with the aid of a class library still responds to flow control (that is, it must control the interaction between all objects created by a particular library) The programmer must decide when and with what function to call which type of object. Duplication of effort. Although the type library allows the Intellectual Property Bureau staff of the Ministry of Economics to print it ---! ---- Ί 「· τ -install—— (Please read the caution page of the arm surface first) --Line designer uses and reuses many small code fragments, but every programmer uses Combine these code snippets in different ways. Two programmers use the same class library to write two programs that perform exactly the same actions, but their internal structure (such as design) may be completely different, because each programmer In its own way, it makes hundreds of judgments. Inevitably, similar code snippets perform similar actions in different ways, but cannot work together. The class library is very flexible. As the program becomes more complex, more programming The division was forced to redevelop the solution to the basic problem over and over again. A paper-type paper using the T-Park National Standard Bismuth Standard (CNS) A4 (21 × 297 mm) 486638 5619twf .doc / 002 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs V. Invention Description (//) The new concept of a separate function library is extended to a framework of class library. This structure is more complicated It includes a large number of collaborative classes that implement basic requirements and designs in a specific application field, and these classes collect small patterns and major mechanisms. Architecture also represents a change in the way programmers think about the interaction between code written by themselves and code written by others. In the early days of procedural programming, a programmer called a library provided by the operating system to perform certain actions. But basically, the program runs from beginning to end, and the programmer can only control the flow. It is therefore suitable for printing paychecks, calculating math tables or solving programs that can only be executed in one way. The development of the graphical user interface (GUI) has begun to reverse the structure of procedural programming. This kind of interface, not program logic ’allows users to execute programs and decide when to perform certain actions. Today, many personal computer software use an event loop device that detects mouse, keyboard, and other external event sources to implement this method, and call the appropriate part of the code according to the user's actions. The programmer no longer has to decide the order of events. Instead, the program is divided into multiple separate segments' which are called at unpredictable times and in unpredictable order. By transferring control to users in this way, developers create even more: easy-to-use programs. However, the individual program snippets written by the developers still call the function library provided by the operating system to complete the work, and the program designer 0 must, the title page determines: the flow control after each program snippet is called by the event loop ° application The code is still at the top of the system. Please read the Precautions on the arm surface first page) Installation.-丨 · This paper size is applicable to China National Standard (CNS) A4 (210 X 297 public love) 486638 i 5619twf.d〇c / 〇〇2 A7 _ B7 V. Description of the Invention (/ · >) Although the event loop program requires programmers to write a lot of code, it is not necessary to write it separately for each application. The concept of an application framework is more advanced than the concept of an event loop. Instead of dealing with the problem of building and working with basic menus, windows and dialog boxes, programmers use application frameworks to work with application code and basic user interfaces. Then replace some of the general functions in the architecture with specific functions of the application in the plan. The application architecture reduces the total amount of code that programmers must rewrite. However, the architecture is actually a general application that displays windows, cut-and-paste support, etc. The programmer needs to give up a wider range of control than the event loop program allows. . Architecture code pays attention to almost all event processing and flow control, and only calls the programmer's code (such as creating or manipulating a unique data structure) when the architecture requires it. When writing a structured program, a programmer not only needs to transfer control to the user (as is the case with an event loop program), but must also transfer the detailed control flow of the program to the structure. Compared with having specific code and repeating similar problems repeatedly In terms of creating independent programs, this approach allows the creation of more complex systems that work together in interesting ways. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs ----- · --- ^ 11 — 「· 装 --- (Please read the precautionary notes before writing this page) --- Lines' as described above It is basically a collection of cooperation categories that complete reusable design solutions for a given problem area. It generally includes objects (such as menus and windows) that provide basic behaviors, and programmers inherit some of the predetermined behaviors and Use this object instead of other behaviors so that the architecture calls the application at the right time. There are three main differences between architecture and class libraries:

486638 56l9twf.doc / 002 A7 B7 V. Description of the invention (θ) 1. Behavior vs. protocol. A class library is a collection of callable behaviors. These individual functions should be used in the program. On the other hand, the framework not only provides the protocol, but also the set of agreements or rules that control each protocol, which includes a comparison of the rules provided by the architecture, and the programmer assumes the necessary providers. 2. Call. (Ca.ll) vs. overload. In a class library, a programmer forms an instantiate object and calls its member functions. It may form and call objects in the architecture in the same way (that is, the architecture is used as a class library), but in order to obtain all the advantages of reusable architecture design, programmers generally write overloaded code and are called by the architecture. The architecture manages the control flow between objects. 3. Implementation vs. Design. With category libraries, programmers reuse only their implementations, and with frameworks, programmers reuse their designs. It represents a general-purpose design solution that can be applied to specific problems in a variety of given areas. For example, a single architecture can implement a user interface, even if two different user interfaces are created by the same architecture to solve completely different interface problems. Therefore, the development of various problem and programming solution architectures can significantly reduce the energy of software design and development. The preferred embodiment of the present invention uses Hypertext Markup Language (HTML) to implement Internet files, which has a universal confidential communication protocol for transmitting media between the client and Newco. For HTML, HTTP or other protocols can be easily replaced without extra experimentation. Information about these can be obtained from T. Berners-Lee, D. Connoly, "RFC 1866: Hypertext Markup ________ [6___ _ This paper standard applies to China National Standard (CNS) A4 specification (210 x 297 mm) -------- " I? --- 7 · install --- (please read the precautionary page of the first page) · i-line -Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs ^ 6638 5619twf.doc / 00:

Printed by a member of the Intellectual Property Bureau of the Ministry of Economic Affairs and a Consumer Cooperative. V. Description of Invention (/ «/) Language-2.0" (Νον · 1995) and R · Fielding, Η · Frystyk, Τ · Beiners-Lee, J. Gettys, J C. Mogul, "Hypertext Transfer Protocol-HTTP / 1.1: HTTP Working Group Internet Draft" (May 2, 1996). HTMM is used to create a simple data format that can be carried from one platform to another. .HTML files are SGML files with a generic semantics suitable for expressing poverty in the field. Since 1999, HTML has been used by the world wide web. HTML is ISO standard 8879 : 1986 Information Processing Text and Office System; an application of Standard Generalized Markup Language (SGML) (ISO Standard 8879: 1986 Information Processing Text and Office Systems; Standard Generalized Markup Language (SGML)) 〇 Now, website development The tool is limited in its ability to create dynamic web applications that connect from the client to the server and interact with existing computing Sources cooperate with each other. So far, HTML has become the main technology for developing web-based solutions. However, HTML · has proved to be inadequate in the following areas: poor implementation efficiency; limitation of user interface functions; only Can generate static web pages (web pages); Lacks the ability to interact with existing applications and data; and cannot be extended. Sun's Java programming language solves most client problems: Improves client execution efficiency; This paper standard applies Chinese national standards (CNS) A4 specification (210 X 297 mm) ------ / --- ^--install --- (Please read the precautions on the arm surface first page) · Cable · 486638 56l9twf.doc / 002 A7 B7 V. Invention Description (/ f) Provide the creation of dynamic and real-time web applications; and provide the ability to create a variety of user interface components. With Java, developers can create robust user interfaces (user interface, UI) components ◦ can create customized tools (such as: real-time stock quotes, animated images (icons), etc.), and improve client execution efficiency. Unlike HTML, Java supports the concept of client-side validation, which downloads appropriate programs on the client to improve execution efficiency. Create dynamic, instant web pages. Using the above-mentioned customized user interface components, dynamic web pages can be created.

Sun's Java has become the industry standard programming language for programming in the Internet. Sun defines Java as "a simple, object-oriented, distributed, interpreted, robust, and secure." ), Architecture-neutral, portable, high-efficiency, multithreaded, dynamic, buzzword-compliant, general-purpose programming languages. " Java applets are small and specific applications that follow Sun's Java application programming interface (API), enabling developers to add interactive content to web documents (simple animations, page decoration, Games, etc.). The applet uses the method of copying the program code from the server to each user's terminal to execute it in a Java compatible browser (such as Netscape Navigator). From a programming language perspective, the core features of Java come from C ++. Sun's Java documentation states that Java is basically C ++ plus extensions from Objective C for more dynamic behavior. Another technology that provides Java-like functionality is Microsoft's ActiveX technology, which gives developers and web designers the Internet and personal computer products ______; _jj____ This paper standard applies to China National Standard (CNS) A4 (210 X 297) (Li) -------- ^ '! 丨 「Installed! (Please read the precautionary page of Hiller first page of Hiller).-· Line · Printed by the Intellectual Property Bureau Employee Consumer Cooperative of the Ministry of Economic Affairs 486638 5619twf.doc / 0 0s2 A7 B7 V. Description of the Invention (/ 4) Means of generating dynamic content. ActiveX includes tools for developing animation, 3D virtual reality, video, and other multimedia content. These tools apply to the Internet Standard, implemented on multiple platforms, and supported by more than 100 companies. The constituent element of these tools is called Active} (Control, which is a small and fast component that allows developers to embed software fragments in HTML pages. ActiveX controls can be used with Multi-programming language cooperation, burden

Microsoft Visual C ++, Borland delphi, Microsoft Visual

The Basic program is set up with the Tenth System and Jakarta, Microsoft's future Java development tool. ActiveX also includes an ActiveX server architecture that allows developers to create server-side applications. Those skilled in the art will know that the present invention can be implemented with ActiveX instead of java without additional experiments. According to a preferred embodiment, BackgroundFinder (BF) is implemented as an agent ' which helps individuals receive related corruption reports from different sources about the conference to prepare for the upcoming conference. BF receives the input characters Nei Rong to form a statement of the target meeting. The input is generated by the scheduling system including the meeting time according to the preferred embodiment. When the meeting time is approaching, query the scheduling system to get the content of the target event, and enter this information into the agent. Then, the agent analyzes the incoming meeting text to obtain various elements such as title, body, participants, place, time, etc. The system also performs style matching to confirm specific fields in the meeting content. This information is used to query different sources of information on the website and to get the relevant content of the current meeting to send back to the scheduling system. For example, if someone attends a meeting where Netscape talks to Microsoft about their competition issues ’, they will get first-hand information from the scheduling system. Next, analyze the paper size applicable to the Chinese National Standard (CNS) A4 (210 X 297 mm) 1 BIBi 1 n I n I m ϋ I rlf Read the Cautionary Note on Ken page first) π ·-丨 Line · Economy Printed by the Employees ’Cooperatives of the Ministry of Intellectual Property Bureau 486638 56l9twf.doc / 002 A7 B7 Printed by the Employees’ Cooperatives of the Intellectual Property Bureau of the Ministry of Economy ", And the title is" competition. " According to the purpose of the present invention, the system updates the scheduling system, and the user finally has the best information to prepare for the meeting. According to a preferred embodiment, this sound information is stored in a file and can be obtained by selecting a link embedded in the scheduling system. Program Structure The computer program according to the preferred embodiment is composed of five different modules: BF.Main, BF.Parse, BF.Error, BF.PatternMatching and BF.Search. It also includes the user interface fmiMain for debugging purposes only. The executable program according to the preferred embodiment does not execute the user interface and is only returned to the calendaring system via Microsoft's Winsock control. The preferred embodiment of the system is implemented in two different modes, which can be specified by the scheduling system at the command line. When the system is executed in simple mode, a keyword query is executed and transmitted to the external search engine. When running in complex mode, the system performs pattern matching before producing queries that are sent to the search engine. Data Structure According to a preferred embodiment, the system uses three user-defined structures: 1. TMeetingRecord 2. TPatternElement 3. TPatternRecord The user-defined structure TMeetingRecord is used to store all the relevant information of a simple meeting. This information includes user code (userlD), meeting 20 (please read the precautions on the arm surface first page). Installation-line · This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) 486638 5619twf. doc / 002 A7 B7 V. Description of the invention (/ 1) The thick narrative of the proposal, the extracted list of title keywords and the content of the meeting. It should be noted that in each instance of the system of the preferred embodiment, there is only one meeting record. Because each time the triggering system cooperates with an upcoming conference, a program is designated to receive information for only one conference. ParseMeetingText uses this meeting record and then sends this information about the meeting record to other functions in turn. If GoPatternMatch can be linked to any card in a particular field, the related record in the meeting record will also be updated. According to a preferred embodiment, the TMeetingRecord structure including each field described in parentheses is provided below. ----- \-Ti, J--Ί 装 --- (Please read the precautions on the arm surface first and write this page) Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs

Public Type TMeetingRecord sUserlD As String sTitleOrig As String (title) sTitleKW As String sBodyKW As String sCompany () As String sTop ic () As String sPeople () As String s W hen () As String sWhere () As String sLocation As String sTime As String sParticipants () As String sMeetingText As String End Type (user ID given by Munin) (reserve to return the original list of Munin that is not listed in the stop list (only the title of the keyword that is listed in the stop list) (only Articles with keywords on the stop list) (Company identified by title or text style match) (Subjects identified by title or text style match) (People identified by title or text style match) (Persons identified by title or text style match) (via title Or the time confirmed by the style match of this article) (the location confirmed by the title or the style match of this article) (the place passed by Munin) (the time passed by M uni η) (all participants sent by M uni η) (Including the original meeting content of the user code)

Public Type t A Pattern E1 em ent elementArray () As String · ----This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) 486638 5619twf.doc / 002 A7 _B7___ 5. Description of the invention ( / ^)

End Type

Public Type tAPatternRecord pattern A rray () As tAPatternElement

End Type Common User-Defined Constants Many constants are defined in each declaration area of the program and must be updated periodically, as is the procedure for maintaining the preferred embodiment system. These constants are accessible to allow the dynamic configuration of the system to be generated when the code is maintained. Listed below is a list of constants for each module, which are more likely to be changed often . However, there are other constants used in the code that are not listed in the table below. This does not mean that the constants that are not included will not change, only that these constants change less frequently. · (Please read the phonetic notation of the arm first? Matters written on this page) The paper size printed by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs applies to Chinese National Standard (CNS) A4 (210 X 297 mm) 486638 5619twf.doc / 002 A7 B7 V. Explanation of the invention (> ^) Module (BF.Main): Constant preset 値 Use ~~ MSGTOMUNIN-TYPE 6 Defines the message number used to confirm the communication between BF and Munin. IP_ADDRESS_MUNIN Ί0.2.100.48 " Defines the IP address of the Munin and BF machines, so data can be sent via UDP. P〇RT_MUNIN 7777 Defines the remote port for operation. TIMEOUT_AV 60 Defines the constant for setting timeout in inet control. TIMEOUT.NP 60 Defines the constant for setting timeout in inet control. CMD_SEPARATOR nyi defines the delimiter symbol to describe the beginning of the meeting content entered by the representative in the Munin command. OUTPARAM_SEPARATOR M..M Defines delimited symbols that separate different parts of the output. Separator (seperator) is used to define the message form (msg type), user id (user id), conference title and the beginning of the actual received content. (Please read the notes on the arm surface first and write this page) Search Group (BF.Search): Binding Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs Consumer Cooperatives Constant CURRENT VALUE Use PAST—NDAYS 5 Define the number of days to review AltaVista articles. I do n’t really come back to the factory because I do n’t really want to do a news search in AltaVista. Just need all the information. CONNECTOR_AV_URL " + AND + " Defines how keywords are connected. I want the keywords to be in the string f ', so use AND. If you want to use OR or other methods, just change the connector. C〇NNECTOR_NP_URL " + AND + " Defines how keywords are connected. The keywords are expected to be in the same ^ string, so use AND. If you want to use OR or other methods, just change the connection symbol. NUM_NP_ST〇RIES 3 defines the number of texts returned from NewsPage to Munin. NUM_AV_STORIES 3 Defines the number of articles returned from AltaVista to Munin. Semantic analysis module (BF.Parse): 23. Line. 1 / η 1Ν JV 千 Ί nJ? / Again, Μ public yy z X 1υ 486638 5619twf.doc / 002 A7 B7 V. Description of the invention (> /) The constant CURRENT VALUE " IS ~~ PORTION-SEPARATOR II · .1 defines the separator between the different parts of the meeting content transmitted by Munin. For example: in " 09 :: MeetwithChad :: aboutlife :: Chad | Denise :::::: " is a separation symbol between different parts of the meeting content. PARTICIPANT—SEPARATOR M | ll defines the separation symbol between each correlation (pa "ticipant") in the associated list part of the original meeting content. Refer to the above example. Pattern matching module (BF.PattemMatching) : The constants in this module do not need to be updated frequently. I -----.--- Ί IJ! Equipment --- (Please read the note on the arm surface first? Matters H write this page) General program flow · -Line. The best way for printed procedures describing procedures and functions to be printed by employees ’consumer cooperatives in the Intellectual Property Bureau of the Ministry of Economic Affairs is to cooperate with the five flowcharts shown in Figures 2 to 6. Figure 2 shows the preferred implementation. The complete program flow of the example. The program starts at function block 200 at the top of the flowchart. It starts at the beginning of the program. When the application starts, it performs a semantic analysis of the command line, removes the appropriate meeting content, and initiates. ) According to the preferred embodiment of the background search operation (background finder operation) of the target 'such as function block 2 10. After the decision of the target, a global stop list (global stop list) is generated, such as function block 220. Then, the use of Come on All styles of matching operation, such as function block 230. Follower 'Follow the flowchart, function block 200 starts the logic processing G0BF240' which wraps the correct search of a specific target search engine Query information. For example, function block 240 flows to function block .25, and then calls GoPatternMatch, as shown in function block 260. To understand

GoPatternMatch's program flow, converted to the title "process flow for _____JA__________ This paper size applies to Chinese National Standard (CNS) A4 specifications (210 χ 297 mm) 486638. 1 ~ χ 5619twf.doc / 002 ____ B7 V. Description of the invention ( > >) BF, s pattern matching unit ". It is worth noting that the functions of the same level in the flowchart are sequentially called from left to right (or from top to bottom) by their common parent function (parentfuncti). For example, the main program 200 calls ProcessC⑽mandLine21, followed by CreateStopList22, followed by CreatePatterns23, followed by GoBackgrundundFinder240. Figures 3 to 6 detail the logic of the entire program, semantic analysis unit, style matching unit, and search unit, respectively. Figure 6 details the logic that defines the key flow of data through the BackgroundFinder and shows the functions responsible for creating or processing this information. Detailed search structure in simple query mode Search AltaVista (function box 27 in Figure 2)

The AltaVista search engine uses identify and returns information about the current conference title, as shown in function block 270, Figure 2. The system of the preferred embodiment obtains all keywords from the title portion of the original meeting content, and builds an advanced query for transmission to AltaVista. In queries, keywords are reasonably combined. Results are ranked based on the same set of keywords. Those skilled in the art know that date restrictions or author criteria may exist in the retrieved documents. The high-ranking file collection is passed back to the scheduling system of the preferred embodiment. , /.

NewsPage (function block 275 in Figure 2) ''

The NewsPage search system provides the latest news headlines about the target conference. The system takes all the keywords in the title part of the original meeting content and creates a query that is sent to the NewsPage search engine. Only the most recent files will be retrieved. The NewsPage search system provides a time limit that can be set according to the user's preferences. ___2 5___ — ---- This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) -----illt.lT — 1 pack --- (Please read the precautions on the arm surface first and write this page) · • Line · Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 邾 6638 A7 '^ 19twf.doc / 002 5. Description of the invention (&gt; 4) system. The files that are still in order are returned to the scheduling system. FIG. 3 is a flowchart of a semantic analysis unit according to a preferred embodiment. The process starts at function block 300 which is responsible for launching the program from the main module. Next, a wrapper function in function block 310 is used to prepare the keyword filtering process in function block 320. After the keywords are filtered, a function block 330 is performed to determine whether the defined symbol positions are correct. Then in function block 34, calculate the number of characters in the specific string, and the delimiter of the specific field and the specific field of the meeting content will be retrieved in function block 350. Then, in function block 3S0, confirm once The delimiter of the string to make sure it is positioned correctly. Finally, in function block 360, the extraction of each character in the title and information text is a function block 362 that uses the search for the closest character definition symbol in the input phrase to remove the characters. The logic of function block 364 that does not require data and confirms whether the character is in the stop list and returns a function block 366 if the character is in the stop list, processes one character at a time. The pattern matching of the preferred embodiment-’The limitations related to the simple search method are as follows: 1. Since the set of keywords extracted from the conference content relies on a stop list of extra characters, 1 is limited by the breadth of the stop list. So, instead of deciding which part of the meeting is unnecessary, focus on figuring out which part of the meeting is needed. 2_ The simple search method of the preferred embodiment uses only the key elements of the conference title &apos; to form the query communicated to AltaVista and NewsPage. It ignores another source of inquiries, conference papers. It is not possible to generate a meeting including this article 2 6;! &Lt; Please read the precautionary note before writing this page) Ίβ]. • Line-This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) 486638 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5569twf-d〇c / ° 02 A7 B7 ------- ---- ^, Invention Description (^) Keyword query 'causes query too It's too complicated to get meaningless results. 3. For example, you can extract the keywords "Andy" and "Grove". However, the oversimplified search did not know that "Andy Grove" was the name. I would like to guess the possibility of "Andy Grove". You can find that it is an Anderson, and what kind of college he has participated in before. 4 · In short, relying only on the stop list to analyze the extra characters will lead to information overload of 0 grams; the service is limited to the preferred embodiment of the style matching. Next is how the style matching system of the preferred embodiment is Deal with the corresponding sichuan fruit. 1. By style matching, you can match only the part of the meeting content you need, and extract this part. 2. By matching the style of the conference paper and extracting the required conference papers, it is not necessary to completely abandon the conference papers. 3. Style matching is based on a specific set of templates, which can confirm the name of the person, company, etc. from the content of the meeting. 4. In short, by style matching, there will be no more information overload. Of course, the biggest question is how well style matching works. If artificial intelligence processing is excluded, a 100% hit rate cannot be achieved. It can only recognize about 20% of company names. Style The style in the context of the preferred embodiment is a template for a detailed phrase structure that is searched in the meeting content. Choose the _ 27 supported by the preferred embodiment. This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) I ϋ I βί ^ ϋ u— J— ϋ I · ϋ I (Please read the threat surface first Precautions ® written on this page} a ^ T ·. Line · 486638 5619twf.doc / 〇〇2 A7 B7 Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs Probable phrase templates appear in the content of conferences. For example: on the conference itinerary, many people wrote, such as "Meeting with Bob Dutton from Stanford University next Tuesday." The general style will be like The name of the person after the "and" (in this example, Barber Dougton), and the name of the organization that follows "from" (in this example, Stanford University). Pattern matching terminology style: style A template that can be combined with the detailed content of the phrase, which includes sub-units. Elements: a style can include many sub-units. These sub-units become elements. For example: in style ', with $ PEOPLE $ from $ C〇MPANY $ " ", With ,,,,, $ PE〇PLE $ ,,,,, from ,,,,, $ COMPANY $, are all components. Placeholder: The placeholder is a special combination that can be combined with a frame. Component. In the above example, "$ PEOPLE $" is the identifier. Indicator: Indicator is another component that needs to be found in the meeting content, but it does not need to be combined with it. In the search style, there are usually More than one indicator, this is why the indicator is not an atomic type 〇 Substitute: Substitute is a collection of indicators, which are synonyms for each other. It is found that any indicator is good in the input In each meeting, there are five fields to confirm: company ($ COMPANY $) people ($ PEOPLE $) location ($ LOCATION $) 28 (please read Note HP writes this page) • Installation · --- Line _ This paper size is in accordance with China National Standard (CNS) A4 (210 χ 297 mm) Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs and Consumer Cooperatives 486638 5619twf.doc / 002 A7 __B7__ V. Description of the invention (/) Time time) ($ TIMES) theme (topic) (STOPIC-UPPERS) or ($ T〇PIC_ALL $) in parentheses is the identification code should be thrown in the code as the corresponding fields of · representatives. $ COMPANY $: A string of capitalized words (eg Meet with Joe Carter of <Andersen Consulting>). $ PEOPLE $: A string connecting uppercase words of two initial letters, which may be connected by V ,, "and (and)", "or (or)", "&amp;,", such as: Meet with &lt; Joe Carter 〉 Of Andersen Consulting, Meet with &lt; Joe Carter and Luke Hughes〉 of Andersen Consulting) 〇 $ L〇CATI〇N $: A string of uppercase capitalized words (eg: Meet Susan at &lt; Palo Alto Square). $ TIME $: link contains a string of the form #: ## (eg: dinner at &lt; 6 ·· 30 pm &gt;). $ TOPIC_UPPER $: link a string of capital letters about the beginning of the topic (eg: <Stanford Engineering Recruiting> Meeting to talk about mew hires &gt;). $ TOPIC_ALL $: link a single-word string, regardless of whether the first letter is capitalized (such as Meet to talk about <ubiquitous computing>). Here is a table showing all the BF supported Styles. Each style belongs to a style group. All styles in a style group share a similar format, and they differ from each other only in what kind of indicator is used as a proxy. It should be noted that the gray style is in the process. The code is also annotated ______29 This paper size applies to the Chinese National Standard (CNS) A4 specification (210 X 297 meals): &quot; '---- J ---- ^ — 装 --- (Please read first Threat of the 'Notes HI write this page) ·-丨 · 486638 5619twf.doc / 002 A7B7 V. Description of the invention (&gt; p (commented). BF has the ability to support these styles "but at this point, Matching these styles is not necessary. _ Printed by PATARP PAT # PATTERN EXAMPLE J 1 a $ PEOPLE $ of SCOMPAN Y $ Microsoft Marc Paul Maritz b $ PEOPLE $ from SCOMPAN Y $ Bill Gates, Paul Allen and Paul Romain from Microsoft 2 a $ TOPIC_UPPER $ meeting Push Technical Conference b $ TOPIC_UPPER $ mtg Push Technical Conference c $ TOPIC_UPPER $ demo Push technology demonstration d $ TOPIC_UPPER $ interview Push technology visit e $ TOPIC_UPPER $ presentation Push technology brief f $ TOPIC_UPPER $ visit Push technology tour a $ TOPIC_UPPER $ briefing Push technology brief h $ T0PICJUPPER $ discus sion push technology discussion i $ TOPIC_UPPER $ workshop push technology seminar (workshop) j $ TOPIC_UPPER $ prep push technology preparation k $ TOPIC_UPPER $ review push technology review (review) I STOPIC_UPPER $ lunch push technology lunch report m $ TOPIC_UPPER $ p roj ect Push technology project n $ TOPIC_UPPER $ projects Push technology. Project 3 a $ COMPANY $ Intel Corporation --------- install --- (Please read the precautions of the arm surface first HI (Write this page). -Line · This paper size is in accordance with Chinese National Standard (CNS) A4 (210 X 297 mm) ^ 0638 56l9twf.d〇c / 〇02 A7 ^ _ B7 Printed by the consumer consumer cooperative corporation --- η b $ C0MPANY $ corp. IBM Corporation '~ ^ C $ C0MPANY $ systems Cisco Corporation d $ C0MPANY $ limited IBM Corporation ~ e $ C0MPANY $ ltd IBM Corporation 4 a about $ T0PIC_ALL $ About smart agent f | j (inte 11 igent agents technology) b discuss $ T0PIC_ALL $ Discuss smart agent P technology c show $ T0PIC_ALL $ Client showing smart agent technology d re: $ T0PIC_ALL $. Reply Smart agent technology e review $ TOPIC_ALL $ Review of smart agent technology f Agenda Agenda's agenda is as follows: _ · Complete--Complete--Complete g agenda: $ TOPIC_ALL $ Agenda: A client of the smart agent-no Fan eCommerce 5 aw / $ PE0PLE $ of SCOMPAN Y $ Meet with Andersen Consulting's Joe Carter bw / $ PE0PLE $ from $ COMPANY $ Meet with Andersen's Joe Carter 6 aw / $ COMPANY $ per $ PEOPLE $ Talk to Intel's Jason Foster 7 a At $ TIME $ at 3 pm:: b Around $ TIME $ About 3 pm _______3 1 This paper size applies to Chinese National Standards (CNS) A4 specification (210 χ 297 mm) ----- 一 ----, 1 :! 丨 「「 Install --- Please read the precautionary page of this page first) 丨 Line_ 486638 Ministry of Economic Affairs Intellectual Property Printed by the Bureau ’s Consumer Cooperatives. 5. Description of Invention (&gt; /) 5 6 1 9 t wf .doc / 0 0 2 A7 ____ B7 8 a At SLOCATI〇N $ In LuLu's Restaurant b In $ LOCATI〇N $ 'In Saint Santa Clara 9 A Per $ PE0PLE $ See Susan Butler 10 A c all w / $ PE0PLE $ Call John Smith to confirm B call with $ PE0PLE $ Call John Smith to confirm 11 A prep for $ T0PIC_ALL $ Prepare London Conference B Preparation for $ T0PIG_ALL $ Prepare London Conference Figure 4 A flowchart of pattern matching according to a preferred embodiment is shown. The process starts at function block 400, the main program starts the pattern matching application, and transfers control to function block 410 to start the pattern matching process. Then, in function block 420, the wrapper function loops through each style, including determining whether a portion of the content string can be combined into one style, as shown in function block 430. Next, in function block 440, , Different identification codes are combined with possible tadpoles. And in function block 441, the punctuated list of names is determined. In function block 442, the full name is processed by finding the two initial letters and capital letters, and extracting the letters after the blank or single word to determine whether they are capitalized. At function block 443, analyze the time from the string in an appropriate manner. In function block 445, continuous phrases ‘such as company, subject, or place are capitalized in the first letter, and further processing in the function block 4 ′ is used to obtain the word behind the blank. After matching the meeting field processing, a function block 45 is used to determine an index, which is the forefront of the style. In function block 452, obtain 32 paper sizes that are applicable to China National Standard (CNS) A4 specifications (210 X 297 mm) ----- 1 ----- J--Ί 装 --- (Please read first Note on the arm surface write this page) · Line. 486638 5 6 19 twf. Doc / 0 0 2 A7 B7 V. Description of the invention (V) The word behind the blank, and check this word to determine whether it is an indicator, This is shown in function block 454. Then, at function block 460, the analysis string determines a pointer, which is not the end of the pattern. In function block 462, a word following an unnecessary blank such as a line feed or carriage return is processed, and whether the word is an indicator is analyzed, such as function block 464. Next, at function block 470, the temporary record is reset to an empty set in preparation for processing the next string. At function block 480, the meeting record is updated, and at function block 482, a check is performed to determine if a record has been set as a meeting record before the meeting record is analyzed again. Using Confirmed Meeting Fields Now that you have identified fields that are considered important in the meeting content, there are only a few things you can do. One of the most important applications of style matching is, of course, to improve the queries that will eventually be sent to AltaVista and NewsPage. There are also many options and enhancements that use style matching results to add BF. These functions are described in the next paragraph. The goal of this paragraph is to give readers a sense of how the results obtained from pattern matching can help achieve better search results. FIG. 5 is a flowchart of a detailed process for preparing a query and obtaining information from the Internet according to a preferred embodiment. The process starts at function block 500, and moves to function block 510 to handle the packaging function, and prepares for a web search using a web search engine. If the query uses the AltaVista search engine, in function block 530, the system fetches information from the meeting record, and forms a query in function blocks 540 to 560 and sends it to the search engine. If the query uses the NewsPage search engine, then in function block 520, the system records the meeting from the meeting ___ 3 3 This paper size applies the Chinese National Standard (CNS) A4 specification (21〇 &gt; &lt; 297mm) ---- -1--1: 1 .-- Outfitting --- (Please read the caution page of the arm surface first) Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 486638 5619twf.doc / 002 A7 B7 V. Invention Explanation (V) Grab the information and form a query in function blocks 521 to 528.

AltaVista Search Bow

The advantage of AltaVista search bow 1 engine is that it provides greater flexibility. T (enhanced flexibility). Using its advanced query method, it is possible to construct all kinds of boolean queries and sort the required searches. However, the biggest disadvantage of AltaVista is that it cannot handle large queries well and may return irrelevant results. If we can confirm the title and company in the meeting ~ content, we can form a fairly short but comprehensive query to hopefully produce better results. We also pay attention to the titles found. —

NewsPage search engine

The advantage of the NewsPage search engine is that it does a job search for recent news, if a valid company name can be given. Therefore, when sending a query to the NewsPage website, all recognizable company. Names are sent, and the subject is used to generate the query only if the company name is not found. If none are found, no search will be performed. The algorithm that forms the query sent to AltaVista is shown in Figure 7, and the algorithm used to generate the query sent to NewsPage is shown in Figure 8. The following table describes each function of the preferred embodiment in detail. The order of the functions mimics the program flow as much as possible. When a function is called multiple times, the function is listed after the first function is called. And after every subsequent function call, its description is not copied. * __-________ 34 This paper size is in accordance with Chinese National Standard (CNS) A4 (210 X 297 mm) (Please read the note page on the arm surface) Printed by the Intellectual Property Bureau Staff Consumer Cooperatives 486638 5619twf.doc / 002 A7 _B7 V. Description of Invention () /) Printed by the Consumer Cooperative of Intellectual Property Bureau of the Ministry of Economic Affairs

Procedure Name Type Called By Description Main (B F. M a i η) Public Sub None This function is the main function for program execution. It uses appropriate parameters (such as: Internet timeout, stop list) to initialize BF, and calls GoBF to execute the main part of the program. ProcessCo m m a n d L i n e (BF.Main) Private Sub Main This function analyzes the command line. The hypothesis indicates that the delimiting symbols at the beginning of Munin's input are stored in the constant CMD SEPARATOR. CreateStop List (BF.Main) Private Function Main This function sets a stop list to analyze unwanted words in the meeting content. There are commas on each side of each word for systematic checking. CreatePatte rns (BF.Pattern Match) Public Sub Main This program is called only once. 'When BF is first started to create all available Including the potential pattern of part of the conference content. A style can contain as many elements as needed. There are two forms of elements. The first element is the indicator, which is a real word that defines the possibility of a subsequent meeting field (such as a company). Most of the indicators are pre ----- i ------ Ί --- --Installation --- (Please read the precautions for the arm surface first and write this page)-Thread · 3J_ This paper size applies to China National Standard (CNS) A4 (210 χ 297 mm) 486638 5619twf.doc / 002 A7 _B7 V. Description of the Invention (: H) The stop character of the printing period of the cooperative of employees of the Intellectual Property Bureau of the Ministry of Economic Affairs, because the stop character is usually used for all meeting contents, so it can form a style. The second element j is a specific string representing the identification code. The format of the identifier is $ * $, where * can be any of PEOPLE, COMPANY, TOPIC_UPPER, TIME, LOCATION or TOPIC_ALL. A style can start with any form of element and can include any number / form of elements. A pattern can start with any element, and can include any length / number / form of elements / This step dynamically creates a new style record for each style in the table, and creates a new pattern element for each element in the style. In addition, there are ideas for replacing indicators in styles. For example: $ COMPANY $ 's style $ PEOPLE $ is similar to the style $ PEOPLE $ from $ COMPANY $. This structure can represent the need for replacement. GoBF Public Main This is a wrapper program. Its call (BF.Main) Sub is called BF's semantic analysis and search subroutine. And send the data back (Please read the note on the back page first)

Procedure Type Called By Description ^ Jame _ The paper size is applicable to the Chinese National Standard (CNS) A4 (210 χ 297 mm) 486638 5619twf.doc / 002 A7 _B7 V. Description of the invention _ Printed by the Intellectual Property Bureau, Ministry of Economic Affairs, Consumer Consumption Cooperative

Procedure Name Type Called By Description Munse ° ParseMeeti Public GoBackGround This function obtains the contents of the initial meeting ng T ext (BF.Parse) Function Finder and confirms the user ID of this record, and includes the title, subject, participant list, Location and time for other parts of the meeting. In addition, the call helper ProcessStopList removes extra characters from the original meeting title and meeting subject. Therefore, only keywords are left. The analyzed information is stored in the MeetingRecord structure. This function does not perform error checking, and most of the time it assumes that the conference content string formed by M u n i η is correct. The most important thing is the record of thisMeeting, which is a register of all relevant information of the current conference, and finally passed back to the calling program. FormatDeli Private ParseMeet ingT has four ways to place the delimiter m i t a t i ο n ext, number. By changing these methods (BF.Parse) DetermineNum Words, Get A WordFrom String into the fourth way to pay attention, where there is no defined symbol around, only between the fields of the string (such as AzB :: C ). Determ ineN Public Parse M eet i ng This function determines how many words (BF.Parse) ProcessStop List (stlnEvalString) are in a string u m W or r ds Function Text. This letter I 1 ϋ IF ϋ 0i ϋ ϋ ϋ I · 1 ϋ (Please read the note on the back HI first to write this page) Line · 32_ ^ Paper size applies Chinese National Standard (CNS) A4 specification (210 X 297 mm) 486638 5619twf.doc / 〇〇2 A7 B7 V. Description of the invention ()

Procedure Name

Called By

The description type assumes that each word is separated by the separation symbol specified in stSeparator. The return type is an integer, indicating how many words have been found. It assumes that each word in the string is separated by stSeparator. This function always

GetAWordFromString — Used since GetAWordFromString is called first. (Please read the notes on the mouth first and write this page)

GetA WordF r o m S t r i n g (BF.Parse)

Public Function

ParseMeeting Text, ProcessStop List The employee's cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs printed this function to extract the few (ith) words (stlnEvalString) in the string, which assumes that each word is separated by the separation symbol specified in the variable stSeparator . In most cases, this function is used with DetermineNumWords. This function returns the required word. This function checks to make sure that ilnWordNum is within bounds. Therefore, i will not be greater than the total number of words in the string, nor will it be less than / equal to zero. If the limit is exceeded, an empty string is returned to indicate that no information can be obtained. By calling DetermineNumWords in advance, 38 paper sizes are in accordance with Chinese National Standard (CNS) A4 (210 X 297 mm) 486638 5619twf.doc / 〇〇2 A7 ___B7 V. Invention Description U6) Employees ’Cooperatives, Intellectual Property Bureau, Ministry of Economic Affairs • Procedure Name Type Called By Description to ensure this does not happen. ParseAndCl e a η P h r a s e (BF.Parse) Private Function ParseMeetingT ext This function first captures the word and sends it to C1 e a n W 〇 r d to remove unwanted components. This word will be removed in parseWord, so a method that can cycle the entire text without removing the entire function and remove the word is needed. Keep Clean Word, and check for postbacks. There is a single word now, so pass it to the analysis chain. The order of this chain is ParseC lean Phrase-> Clean Word-> E v a 1 u a t e W w r d. If the word has not been removed, the entire chain is obtained, which will be added to the end of the keyword string. The first is to check "/" as the defining symbol and extract the function of that part. Will call ’’ StitchFace &quot; (called GetAWordFrom String). If a single word is found, each one will transmit the chain. If the entire chain is obtained without adding or removing these words, these words will be added instead of removed. -------— iJ--Ί «^ --- (Please read the precautions for the arm surface first and write this page) Order · -_ 线-_______39 This paper size applies to China National Standard (CNS) A4 specifications 210 X 297 mm) 486638 5619twf.d〇c / 〇〇2 A7 B7 V. Description of Invention (V /) Printed by the Consumer Cooperative of Intellectual Property Bureau of the Ministry of Economic Affairs

Procedure Name Type Called By Description FindM in (BF.Parse) Private Function Parse AndClean Phrase This function takes 6 inputs 値 and evaluates the smallest 不 that is not 0. It first creates an array as a container. Therefore, the five inputs 値 can be arranged in ascending order. The minimum value is the ground of the array. If the whole array has no 値 that is not 0, then it can be known that an error has occurred, and this function ends. Clean Word (BF. Parse) Private Function Parse AndC lean Phrase This function attempts to erase a single word from the meeting content. First determine if the string is of variable length, then run a series of tests on this word to make sure it is clean, and if necessary, edit the word and remove unwanted characters. These tests include obtaining file extensions, non char, numbers, and so on. EvaluateWord (BF. Parse) Private Function ParseAndCIean Phrase This function tests whether the word is on the stop list, so it can decide whether to remove the word from the original meeting content. If a word is not on the stop list, it is used as a keyword, and the function is aborted without error. If such a word is a stop word, an error will be returned. --------- Installation --- (Please read the note on the back? Matters on this page first) Order · --line · _____40 This paper size is applicable to China National Standard (CNS) A4 (210 χ 297) (Centi) 486638 5619twf.doc / 002 A7 B7 V. Description of the invention (&gt; S) rocedure

Called By

Description The input test string must be correctly defined, so it cannot receive part of the string G ο P atte rη Mate h (BF.Pattern Match) Match P a 11 e rn s (B F. Pattern Match) P ub 1 i (Sub

Public Sub

GoBF

GoPattern Match This step is called when QueryMethod is set to complex query. It represents doing all the pattern matching steps. This is a simple wrapper function that initializes some arrays and then starts matching the title with the subject's style. (Please read the notes on the arm surface first. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs

MatchAPatt e rn (B F. Pattern Match)

Private Function

MatchPatterns 4 1 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm). This function loops through each pattern in the pattern table and tries to confirm the content of the conference specified by slnEvalString. In order to debug, it also tries to list the number of times that certain styles have been triggered, and stored in gTabulateMatches to determine which style has the most number of times. gtabulateMatches is stored as a wide-area variable because it must be possible to run a batch file with 40 or 50 test strings and still have to know how often a pattern is triggered. This function checks every component in the current style. First decide whether the element is a label or an index. If it is a label, try to combine the label with this page) 8 366 8 56l9twf.d〇c / 002 A7 B7 5

Procedure

Called By

Description

Name

A few puppets. If it is an indicator, the 昝 g formula will find it 'There is a skill to perform different actions based on whether the current element is the forefront of the style. If you are at the forefront, you need to find indicators or identification codes. If you can't find ', you know that the current style does not exist, and it ends. If it is not at the forefront, continue to look for ‘because the forefront may be elsewhere. In this case, repeat. ------ 1ΙΊ--Ί 装 --- (Please read the precautionary page of the mouth first) et i n g F i e 1 d (BF. Pattern Match)

Private Function

Match APattern This function uses a large switch narrative to determine what kind of identification code and what form of identification code it is talking about. There are specific requirements and different connection restrictions. When specified in the following functions such as: BindTime, etc. If the link is successful, add it to the guess record. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs

BindNames (B F. P a 11 e r n Match)

Private Function

MatchMeeting Field In this function, try to match the name with the corresponding identifier $ PEOPLE $. The name is defined as any two consecutive uppercase words. Also received a series of names connected by and, or, &amp; so it has been observed that these three separation symbols cannot be found. This paper size is applicable to the Chinese National Standard (CNS) A4; (each (210 x 297 mm)) 486638 5619twf.doc / 002 A7 B7 The invention statement printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs (| Λ ”)

Procedure Type Called By Description Name only. Do not link single word names because it is too common in any way. So ’do n’t want to have broad but irrelevant results. This function calls a BindAFullName with a name in the link. Therefore, BindNames collects all the results from BindAFullName. B i n d A F u 11 Name (BF.Pattern Match) Private Function BindNames This function attempts to link full names. If the $ PEOPLE $ tag is not the front end of the pattern, it must be correctly located at the front end of the test string. Because the leading word of the string has been deleted. If it is at the forefront, search until you find words similar to the full name. If it cannot be found, this style is absent from the entire content and it is terminated completely. Finally returns the next pattern in MatchPatterns. G etN ext Wo rdAfterWace pac e (BF. Pattern Match) Private Function BindAFull Name, B i n d T i m, BindCompanyT op i c Loc This function retrieves the next word of the test string. It looks for a word that follows a blank, @, or /. This word is defined as the trailing end 'when another blank or separation symbol appears. B ind T ime (B F. Pattern Private Function MatchMeeting Field Grab the next 43 paper sizes Applicable to Chinese National Standard (CNS) A4 specifications (210 X 297 mm) (Please read the precautions for the arm surface first page)- -Line- 486638 5619twf.d〇c / 〇〇2 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs

Procedure Name Type Called By Description Matcn j Determines whether it is a time style. If so, find the time and add it to the record. May need to add more time styles, but do not want to enter time in the title, especially now there are tools such as: OutLook. BindCompa Private MatchMeeting This function finds a continuous uppercase string of nyT opicLoc (B F. Pattern Match) Function Field and links it to stMatch, which is transmitted by the reference of MatchMeetingField. A continuous uppercase string is a sequence of uppercase single words, which will not be interrupted by, for example,. There may be more things added to the interrupt list. Locate Patte rn H ead (BF.Pattern Match) Private Function I Match A Pattern This function attempts to locate the component as an indicator. This indicator cannot be at the forefront of the style, unless it can alternatively be passed to the function LocateIndicator. Therefore, the next word is continuously retrieved until no word can be retrieved (suspended), or one of the indicators is found. C ο ntai η I n A Private LocatePattern This function is quite simple. It uses rray (B F. Pattern Match) Function Head, Locatelndicato r to find all the elements in the array by loop to find the matching string. Locatelndic ator Private Function MatchAPattern This function attempts to locate the function (please read the note on the arm surface first? Write this page) This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 486638 6 19 twf. / 0 0 2

V. Description of Invention (Production V)

Procedure Type Name

Called By

Description (B F. Pattern Match)

Initial izeG uessesReco rd (BF.Pattern Match)

AddToMeet ingRecord (B F. Pattern Match)

Private Sub

Private Sub

Match APattern

The components of the Match A Pattern indicator. This indicator cannot be at the forefront of a pattern, unless it is alternatively passed to the function Locate Pattern Head. Therefore, if the style can be satisfied, the next word captured must be an indicator or it has failed. So just grab a single word to test, determine if it is a valid indicator, and return the result. This function again initializes the temporary test structure because the information has been moved to the permanent structure. Initially, each structure has an element. ---- 1 ^ --- ^ 丨 Ί—ΙΊ Equipment --- (Please read the note on the arm surface first? Matters page) · Printed by the Consumers' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs. 11 n C urr G uesses is called only when the information is variable. Representing it as a legitimate guess to be stored in the meeting field of the permanent speech tlnMeetingRecord. Check to make sure that there is no repeated storage, and to eliminate the things to be stored, so there are no messy things such as punctuation marks. The reason why it has not been eliminated until now is to save time. Call ParseAndCleanPhrase without wasting resources, unless you decide to permanently put it on-line. 45 This paper size applies to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 486638 5619twf.doc / 002 A7 __B7 V. Description of the invention ( H) Rocedure Type Called By Description ame N 〇D up 1 icate E ntry (BF.Pattern Match) Private Function AddToMeeting Record This function loops through each element in the array to determine the test string a S tring and any string already stored in the array. It's all different. It is only slightly different from ContaiηInArray 〇 Search Alta Vista (BF.Search) Public Function GoBackGround Finder This function prepares the query to be sent to the AltaVista search engine. It sends this query and analyzes the results returned in the appropriate format, which includes the title, URL, and retrieves the subject / abstract of each article. The number of retrieved articles is specified by the constant NUM_AV_STORIES. Important parameters include stURLAltaVista for storing queries, stResultHTML for html obtained from stURLAltaVista designated web pages. J C ο n s t r u c t A Ita V i staU R L (B F. Search) Private Function Search AltaVist a This function uses the advanced query search mode to create a URL string for the AltaVista search engine. It includes keywords to be used, language and how to sort search. Build queries separately based on whether you want to use the results of the style matching unit. (Please read the phonetic notation on the arm surface first? ^ This page: 46_ This paper size is applicable to the Chinese National Standard (CNS) A4 specification (210 x 297 mm) 486638 A7 Printed by the Employees' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 5619twf.doc / 〇〇2 B7 V. Description of the invention (#)

Procedure Name Type Called By Description ConstructSi mp 1 e K ey W ο rd (BF.Search) Private Function ConstructAlta VistaURl, Const ructNews PageU RL This function forces the keyword list to be stored in the stTitleKW block or stBodyKW field of the input meeting record. And link each keyword separated by a link symbol into a string, when judged by the input variable stlnConnector. Returns this newly created string ConstructC o m p I x A V KeyWord (BF.Search) 1 Private Function! ConstructAlta VistaURL This function creates keywords to be sent exclusively to AltaVista. Unlike Constructs impleKeyW or d, which simply obtains all keywords from the title to form a query, this function observes the results of the B F pattern matching program and sees whether any specific company name or subject can be identified to build the query. The query will include the identified company and subject, and will default to a simple query if the company or subject cannot be identified. J oin W ith C o nnectors (B F. S earch) Private Function ConstructComplex A VKey Word, ConstructCom plexNPKey Word, Ref ine W ith Rank This function replaces the spaces between words in a string with a connection symbol. Enter the specified. Refine Wit Date (NOT Private Function ConstructAlta VistaURL This function creates AltaVista check 47 (please read the phonetic note of the arm first? Matters and then IPr page) Order: i-line · This paper size applies the Chinese National Standard (CNS) A4 specification ( 210 χ 297 mm) 486638 5619twf.d〇c / 〇〇2 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs

Procedure Name Type Called By Description CALLED AT THE MOMENT) (B F.Search), and return this part of the URL as a string. It ensures that AltaVista searches of documents will be PAST_NDAYS in the past. Refine With Rank (BF.Search) Private Function 1 1 ConstructAlta VistaURL This function creates a string to be sent to AltaVista for advanced query search in order. If you build a simple query, you will get all keywords from the title. For complex queries, words will be obtained from the company and subject. In most cases, the query is constructed using the function ConstructComplexAVKey Word. Identify Bio ck (BF.Parse) i 1 Public Function Search A ItaV ist a, SearchN e ws Pa ge i This function filters out the blocks in the string marked with the start and end tags. This function extracts 1 word The squares in the string are marked by 1 (iStart), which is the foremost and end markers that start at a specific location input. This received square does not include the tag itself. If the block cannot be identified with a specific delimiter, the parameter iReturnSuccess returned by the reference is unsuccessful. This postback form is a received block. IsOpenURL Error (B F. E r r r r) Public Function Search A ItaV ist a, SearchNewsP age This function determines whether the counting error is a timeout error. Its Pei ^ ί This paper size is in accordance with Chinese National Standard (CNS) A4 (210 X 297 mm) ^ 6638 A7 B7 5 Invention Description (#) Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs

Procedure Name Type Called By Description Moves the mouse to the preset cursor, and then returns true (true) if it has expired, otherwise it is false. Search New Public GoBackGround This function prepares queries to be sent to the s Page (BF.Search) Function Finder NewsPage search engine. Send this query and then analyze the returned results in an appropriate format including the title, URL, and subject / abstract of each received article. The number of articles received is defined by the constant UM_NP_STORIES. ConstructN Private SearchN e ws Pa This function creates a URL that is sent to ewsPageUR L (B F. Search) Function ge! NewsPage. It uses the information contained in the entered meeting record to determine the keywords to use. Also call different functions to build strings based on whether simple or complex queries are needed. ConstructC Private ConstructNews This function creates keywords to be passed to ompIexNPK e y W ord (B F. Search) Function PageURL NewsPage. Unlike ConstructKeyWord String, which simply retrieves all keywords from the title to form a query, this function observes the results of the BF style matching program and sees if it can identify any particular company name or subject to build the query. Because NewsPage works best with a company name, only the company name will be used. 49 This paper size applies to the Chinese National Standard (CNS) A4 specification (210 x 297 mm) (Please read the note on the back? Matters page) Equipment · --- Line · CC 366 5619twf.doc / 002 A7 _B7 V. Description of Invention (") _ Printed by the Consumer Cooperative of Intellectual Property Bureau of the Ministry of Economic Affairs

Procedure Type Called By Description Name and if there is no company name, only the subject will be used. ConstructO Private GoBackGround This function gets the string array's verallResul Function Finder input (stlnStories) and (B F. M a i n) 1 1 MeetingRecord that stores the current meeting information. Each array element stores documents received from each source. This function facilitates the establishment of the appropriate output to Munin, which includes a message type, original user code, and conference title that lets Munin know which BF is responsible for, so Munin knows which conference BF is talking about. Connect An Public GoBackGround This function allows BF to connect to dTransferT Sub 1 Finder Munin and finally forward the information 〇 1 to Munin. The UDP Munin protocol will be used instead of the TCP protocol. (BF.Main) 1 So the remote host and remote port must be set correctly. Use a global string to store gResultOverall, because although it does not need UDP, it needs to use TCP, and if it has been converted back, do not change the code. Disconnect Public FromMunin Sub And Quit (BF.Main) Figure 6 is the actual code prepared and transmitted. Searched to AltaVista and NewsPage search engines according to the preferred embodiment. Program start This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (Please read the precautions on this page first) 486638 、 5619twf.doc / 002 A7 B7 Employees ’Cooperatives, Intellectual Property Bureau, Ministry of Economic Affairs 5. The description of the invention is printed in the function block 6 10. The command line is used to update the entry including specific schedule information. Then according to function block 620, a message is posted. According to the function block 630, generate a meeting record to store the existing meeting information. Then, the query is sent to AltaVista, such as function box 640. The query is sent to NewsPage, such as function box 650. When the message is returned from the search engine, it is stored in The result data structure is shown in function block 660. Figure 7 provides details of creating a query in accordance with the preferred embodiment. The process starts at function block 710 and analyzes the meeting records to obtain possible companies , Person, subject, place, and time. Then in function block 720, at least one theme is determined, and at least one company name is determined in function block 730. Finally, in function block 740, decide what content file to send to the user at last. Figure 8 shows the change of the query method shown in Figure 7. In function block 800, the meeting record is analyzed, and in function block 820 confirms the company and confirms the subject in function block 83. Finally, in function block 840, the subject or the company is used to formulate a query. Various embodiments are added to add specific parameters to meet specific user needs The discussion is as follows. The success rate of strengthening the style matching is to increase the BF efficiency and add more styles / style collections to the program "CreatePattems". The existing code for declaring styles can be used as templates for future styles. Because all are stored in dynamic arrays You can easily reuse the code by copy and paste. You can strengthen the combination of the code _______5J______ This paper size applies the Chinese National Standard (CNS) A4 (210 X 297 mm) (Please read the note on the back first Matters are again on βτ page). -Line · ii 486638 A7 5619twf.doc / 002 V. Description of the invention / Functions of BindName, BindTime, Bin dCompanyLocTopic. This enhanced function is implemented by adding a link to determine the limit of the meeting field's collection, which can increase the number of links. For example: BindTime currently accepts and links all of the formats of or #: _. The time of the connection allows BindTime to accept the numbers from 1 to 12 before the "o'clock" ◦ The vocabulary-based identification algorithm and the accuracy rate of each guess are specified. BF makes only guesses that meet the current limit (threshold) are Effective. According to the location confirmed by the system by the style matching or the meeting place designated by the user, the system of the preferred embodiment will suggest a fine restaurant when it detects lunch / dinner / breakfast. You can also use the company searcher's website to confirm that the company name is indeed obtained, or if there is no company name that can be confirmed by pattern matching, you can use the company searcher's website as a dictionary to determine whether this initial letter is a company name . Even the stock price and news of confirmed companies can be displayed. Wireless bargain identification of the preferred embodiment. Figure 9 shows the hardware of the device and its control logic flow and the software system designed to compare the base of the website in a traditional, physical, and non-website retail environment. (Comparison shopping) software system Flowchart. Wireless (Wireless) phone is a handheld phone 920 with Internet procotol (IP) capability combined with a mini barcode printer 910 (installed inside the phone or connected by a cable), '_ It is used for scanning A universal product code (UPC) barcode on the back of a book or other product 900. The wireless device 920 transmits a barcode to the packet exchange search service module (service modnle) 940 (executed on a web server) via Skyline 930, and the conversion barcode is (using a book as _______ 52) This paper standard applies to Chinese national standards (CNS) A4 Regulations 1Γ (2ΐ〇χ 297):-(Please read the phonetic notation on the arm? Matters page) Printed by the Intellectual Property Bureau Employee Consumer Cooperative of the Ministry of Economy 486638 5619twf.d〇c / 002 A7 B7

V. Description of the invention (5 P) Printed by the Consumer Property Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs) International standard book number (or internal example book number) or any appropriate identification code. Then, the service Ping Mo Group Connect to an appropriate third party website, and find information on prices, shipping methods, and availability of products from each web supplier 95. This information is formatted and displayed on the screen of a handheld device. IP wireless phone or other handheld The device 920 uses a wireless modem, such as Metricom's Ricochet wireless modem. The 8-ounce Ricochet SE wireless modem is about the size of a cigarette case and is easy to set up. It can be easily attached to a hand using the included Velcro The back of the computer screen 'connects the cable to the serial port, pulls out the antenna, and transmits. The software settings are also simple. The intuitive installer installs the driver of the Ricochet modem and places a connection on the desktop. Picture. The function of this modem is the same as that of traditional telephone modem. Of course, wireless perfor mance) ca n’t be as reliable as traditional dial-up r '* connections. We can get stable connections at multiple San Francisco locations when sitting by the window. But in the CNET brick headquarters, the Ricochet modem ca n’t connect at all. When online, 'the efficiency of up to 28.8kbPs will drop to a slower speed. But even if you are not satisfied with the slower speed. Compared with other Internet access methods using mobile phone modems' Ricochet modems are faster, more reliable, and For cheap. SE wireless uses battery, this modem has a battery life of up to 12 hours. And according to a preferred embodiment, when the Ricochet modem starts to slow down, reduce the use of the laptop ’s dual battery. So use a wireless modem. (According to the best practice) Example 'users can use the web server software 940 to confirm the correct product 950 ° and then' use appropriate 53______ This paper size applies Chinese National Standard (CNS) A4 specifications (210 X 297 public love) C Please Read the Zhuyin on the back? Matters-This Page) Binding _-Line · 486638 5 6 19twf .doc / 0 0 2 A7 B7 V. Description of the invention (&quot;) Select the supplier of the device key and place an order. Next, the 'packet exchange search service module' uses the appropriate third party website provider 960 to place an order. jHZlgjte's personal webpage and intentions value network prototype (printed by the consumer property cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, printed network prototype) According to the preferred embodiment, my! site is a high-impact based on the Internet. ) Applications, which focus on the theme of delivery services, and in a buyer-centric world, provide a personalized experience to each customer through a personal website. Services are intuitive and methodical to meet consumer intent-basic living needs or things that require additional judgment, and cooperation across multiple areas, such as financial planning, healthcare, personal and professional development, family life and other concerns thing. Each member owns and maintains their personal information, and creates and browses content tailored for them. From entering a demand for a product or service to completing a payment, use smart agents to research, execute transactions, and provide advice. With advanced description and filtering, smart agents learn about users and improve their delivery services. '' Consumer intentions include management of daily tasks (e.g. e-mail, calendar, conference, todo, billing, shopping and travel plans), and moving to a new environment (Such as finding suitable places to live, moving, travelling and buying insurance, business and personal meeting notices, new environment awareness). '' From the perspective of consumers, my! Site provides a central area where users can access related products and services and complete daily tasks quite conveniently. . 'From a business standpoint, my! Site represents a new and innovative way, _____ 54 (Please read the phonetic notation of the arm? Matters—installation ... — then on this page) Order-· ΐ ΐ · This paper size Applicable to China National Standard (CNS) A4 specification (210: 486638 5619twf.doc / 002 A7 B7) 5. Description of the invention (p) Can effectively attract, serve and maintain customers. Intention value network allows users to enter Personalized websites use the assistance of intelligent agents with learning capabilities to interact with Internet users. According to the intent of the preferred embodiment, the Internet provides superior values. It provides 24 hours a day, Access customized information, suggestions and products for 7 days a week. This is personalized information, so each member watches highly customized information to determine the relationship with users in need. Egocentric interface personal The central interface is a user interface designed to meet specific user needs, preferences, and current conditions. It uses the information stored in the central profile database User personal information to customize the interface. Users can set security permissions and interface components and content preferences. The content integrated in the personal center interface is customized based on the user's relevant information. When the content is displayed At the time, the personal center interface includes the relationship between content and users, which is how the content is related to the users. For example, when displaying the upcoming ski tour that the user participates in, the user will include the user personally Event information in the calendar and meeting list, such as: people who will be in this place when skiing. Figure 10A shows the intended price and network structure implemented on the World Wide Web. For simplicity, this figure ignores the Regarding confidentiality, scalability and privacy, consumers can use any Internet browser 1010 running on a personal computer connected to the Internet or a personal digital assistant (PDA) with wireless Internet access, such as Netscape Navigator or Microsoft Internet Explorer, access intent price network ... 17th ______5 5 ____________ This paper size is in accordance with Chinese National Standard (CNS) A4 (210 X 297 mm) — (Please read the note above?-Matters on this page: Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs's Consumer Cooperatives 486638 5 619 twf do c / 〇〇: A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. 5. Description of the Invention (ρ) The figure describes in detail various ways to access the Internet of Intent Price. Consumers use an integrator web server 1020 with a single name or IP address to access the intended network. The integrator uses various resources such as: intent database 1030, content database 1040, supplier information database 1050 and customer ’s profile database 1060 to create an intent price network. 1 Intent database 1030 stores all information about intents and the forms of products and services used to satisfy them. The information in this database includes intention steps, areas of interest, layout templates, and personalization templates. The content database 1040 stores all information about intentions, such as: recommendations, reference information, personalized content, satisfaction levels, product ratings and process reports. The supplier information database 1050 includes information integrated with intended product and service providers. The link between the information provider's intention framework and the supplier stored in this database includes product listings, features and descriptions, and the address of the supplier's product website. Personal and consumer information database 1060 contains personal information about consumers, such as: name, address, social security number and credit card information, personal preferences, behavioral information, ’history and website layout preferences. Supplier web server 1070 provides consumers with access to all supplier databases and transaction support used to provide information. The product information database 1080 stores all product related information, such as; features, whether there are products and prices. The product order database 1090 stores the orders of all consumers. The interface of this database can be through enterprise resource planning (enterprise ________5 provided by SAP, Baan, Oracle, or other vendors). 6 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm). ) ----- ^ --------.---- t --- (Please read the Phonetic Note on Arm Surface first page) · 丨 Line · 486638 5619twf.d〇c / 002 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs V. Invention Description (α)

Ksouixe planning (ERP) applications, or direct access through a website server or application server that supplies the issue. The Consumer Information Database i 〇 9 i stores all consumer information that suppliers must use to complete transactions or maintain consumer records. Figure 10B is a flow chart of the logic of creating a web page in the personal center interface. The environment is assumed to be a web server, a browser connected via a TCP / IP network, such as the public Internet or a private intranet. Web server benefits can include Microsoft Internet Information Server, Netscape Enterprise Server, or Apache. The browser can include Micr0S0ft Internet Explorer or Netscape Navigator. The client (ie the browser) sends a request (requestHOOi to the server (ie the server) —a specific web page. This is usually done by the user clicking a link or button on the web page. The web server crawls a specific user The typesetting and content preferences of 002 are based on the unique user code stored in the client (ie, browser) and the user's profile database (user, s profile databaSe) 1003. Then, the web server The server receives the web page content 1004, which is from the content database 1005. Then it receives the user center content such as: calendar, email, contact list and work list 1006 (nth The figure shows a detailed description of this process) ◦ The search of the database is to use the user content preferences stored in the personal information database 1003 personal information part to filter the resale content. After that, 'as defined in the user personal information The formatting preferences format the returned content as a web page 1007. Then, the web page is sent back to the client and displayed to the user 1008. Figure 11 describes receiving the user center content and The process of adding to the webpage. -------. 5 7 This paper has been oversized using Chinese National Standard (CNS) A4 (21〇X 297 meals) 05- (Please read the precautions of the arm surface before This page:

486638 5619twf.doc / 002 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of Invention (&gt; //) This process describes step 1006 in Figure 10B in a more detailed manner. It assumes that the server has obtained the user's personal information ’and is expected to add content to this page. The server analyzes the filtered content 1110 ′ search logs, contact names and emails. If any are found, they are marked and stored in a temporary storage space. The server then attempts to discover any user-centric content 1120 stored in a different database. This is accompanied by the marked items in the temporary storage space and calendar items 1130 in the calendar database 1140, email items 1115 in the email database 1114 ', contact items 1117 in the contact database 1168, and work log data The work record item 1119 in the task-list database 1118 and the news item 1121 in the news database 1120 are matched. After receiving any relevant user content, combine and return 1122. The user persona system allows users to create multiple different roles that combine personal information into a collection for use in different ones. Users can create a role when purchasing for the home. This role can include a home address and can indicate that the user is looking for a good price when making a purchase. When the same user can create a second role for work, this role can store the user's office address and indicate the user. I prefer items from certain suppliers or companies when they are on sale. Users use this role when purchasing work-related things. A role can include rules and restrictions. For example, job roles can restrict users from making reservations with only one travel agency, and using appointment rules set by their boss. Figure 12 depicts the relationship between users, their multiple roles, and multiple personal information (please read the notes on the arm surface and then this page). 丨 line · 486638 56l9twf.doc / 002 A7 B7 Ministry of Economy Printed by the Intellectual Property Spirit Consumer Cooperatives V. Description of Invention (I). The user level is user personal information 1200. This personal information describes the users and their account information. There is a unique record for each use of the account in the database. Attached to each user are characters 1220] 1230 and 1240. These roles are used to group multiple roles into useful situations. For example, if a user living in San Francisco works in Palo Alto and has a mountain chalet in Lake Tahoe, there will be three different situations when he visits the website. One 'for work' and the other two for home life in different places. Users can create work roles 1220, family roles 230, and mountain life roles 1240. Each character refers to different general personal information 1250, 1260, and 1270, including addresses and locations. Therefore, there will be three general personal messages. Each character also refers to one of the two travel personal information. User maintenance includes work travel personal information 1280 regarding all business rules for booking tickets and bookings. This personal information can be specified for first class travel only on business trips, and like United Airlines. Job roles refer to this work travel personal information. The user also maintains family travel personal information 1290 ′ which is designated for economy class travel and requires non-refundable tickets because it is cheaper. Both family roles and mountain life roles point to personal information for family travel. Figure Π describes the data model that supports the concept of roles. ◦ User table 13 10 Each user who has an account in the system has a record. This form includes: • Username and password Π20 as the unique identification card. Each user can have multiple roles 13 3 0, which is like a more specific structure: personal information device. Personal information includes detailed personal information in the personal information field UI50 records. Attached to each personal information is a collection of personal information restrictions 1360. Each rule including name 1370 and defined restrictions 59 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (please read the note on your side first? Matters-installation --- this page). • Line · 486638 5619twf.doc / 002 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of Invention (r ;?) 1380, the rule is a similar style (if X then Y), which allows this rule to restrict For specific purposes. An example of a personal information restriction is the rule that a user cannot make a reservation to an airline listed on the form. This personal information restriction can be included in the travel personal information of the job role set by the user's boss. Each personal information column Bits also include the 139 set of permissions included in the record. These permissions set access to specific personal information fields. Intention-cer ^ jc interface In order to meet consumer intent, such as retirement planning or relocation, ~ specific interfaces are required. Consumer intentions require additional planning and coordination across multiple areas, such as financial securities, the provision and delivery of healthcare, personal and professional development, entertainment and other concerns. Meeting intent requires complementary networks across industries to cross-industry to meet consumer needs. An intent-centric interface is an interface designed to help users manage their personal intent. At any given time, the content of the interface is set to display only the content related to a specific anthracene map. This intent center interface allows users to manage procedures that meet specific intents. This is accompanied by two series of steps and the range of content that users can access Collection. At any time, the user can also switch the interface to manage different intents, and the content of the interface will be changed to include only content that meets the recently selected intent. ',, Figure 14 provides a detailed description of the data model needed to support the center of the map. Each user role H10 (detailed description of the role data model in Figure π) has any number of valid user intents of 1: 420. Each effective user intention has the nickname H30 as the display name on the screen. Each effective user intention also includes multiple data fields .: 144Ό, which includes from and to _ _______60 (Please read the precautions on the back first Continued on this page}-· Steel J ^ T ·. Line. This paper size is applicable to China National Standard (CNS) A4 (210 X 297 public love) Printed by the Intellectual Property Bureau Employee Consumer Cooperative of the Ministry of Economic Affairs 486638 5619twf.doc / 002 A7 B7 5. Description of the invention (w) Any user data collected by user interaction. For example: if the user clicks on the form on the screen and one of the fields is a social security number, the corresponding data field will contain Name two "SSN" 1450, 値 = "999-99-9999" 1460. Each user intention also tracks the completion status of intent step 1470. The completion field 1480 indicates when the user completed the step. Each user intention is to serve as All user intents Predetermine the user-specific form of the general intent of the model 1490. The general intent can be customized by custom rules 1411, 1412 attached to the next step, which The rule is how the system will customize the intent for each single user based on the individual user's personal information. The statistics agent agent continuously tracks each user's key statistics (key statistics) ◦ These statistics are used in a similar way In Tamogochi virtual reality pet, in order to promote these behaviors of users ◦ Statistics: recorded as login frequency, content such as the frequency of news article evaluations and agent activity, which measures the number of programs executed at a specific time The system uses this information to attract users to encourage these behaviors. Figure 15 depicts the flow of the web page that displays the current statistics of the agent. When the user requests the agent statistics page 1510 from the client browser, the server Retrieve the user statistics 1520 from the user personal information database 1530 ◦ Then, the server performs the necessary mathematical calculations to generate the statistics normalization set 1540. Then, the server retrieves from the content database 1560 to calculate the user statistics Equation 1550 is the central statistic. Use this general formula Generic formula and user statistics generate graph 1 570. This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ----: --- r ---.--- -Install --- (Please read the caution page of the arm surface first) -Line · 486638 5619twf.doc / 002 A7 B7 V. Description of the invention (57) / These graphics are placed in a template to generate statistics web page 1 580, and then Returned to the user • 1590 ◦ {Gurenhua Product Fortunately Announces Yueyue Gun Service System provides services in the form of consumer reports, which are customized for each user based on user profile. The system records and provides users' evaluations on product quality and various aspects of intentions. The difference between this system and traditional product quality measurement services is that the ratings passed to users are personalized. By finding the person who is closest to the user's information and who has previously asked to evaluate this product, run this service. Using this algorithm, you can be sure to return the user's product report. Statistics 値. Figure 16 depicts the algorithm that determines the user's personalized product rating. When the user requests the product report 1610 of product X, the algorithm retrieves the personal information of the product that the user has previously evaluated ‘1620 from the user ’s personal information database 1630 (including the product evaluation). Then, the system retrieves the preset limit of the profile matching algorithm from the content database 1650. Next, follow the range set by the personal information matching algorithm 1660 to correspond to a short list of all users. The closest 値 of the first η (preset limit 値) is determined, and a test is performed to determine whether it falls within the range of the user's personal information (also the preset limit 値), which uses a personal poor information matching algorithm the result of. If it is not within the limit, zoom in to limit 1680, and then test again. Repeat this process) until the test returns true. Then use the product evaluations from the n-smallest set of closest judgments to judge a range of product statistics 1690. Put these statistics into the product report ——___ · _ 62____ $ Zhang scale is applicable to China National Standard (CNS) A4 specification (210 X 297 mm) &quot; _ ---- T · --- r 11I I-- -.— (Please read the caution page on the arm surface first) Order: --Line-Printed by the Employees 'Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs Printed by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economy printed 486638 5619twf.d〇c / 〇〇 2 A7 _ B7 V. Description of the invention (b) Report template 1695, and send it to user 1697 as a product report. Personal Information | ^ There are central storage places for personal information provided by the services ubiquity system. This central storage is a server on the Internet and can be accessed by any device connected to the Internet, with appropriate access methods. Because personal information is accessible everywhere, various access devices can be used to customize services based on user personal information. For example, a merchant's website can use this personal information to provide personalized content to the user. PDA with Internet access can synchronize the calendar, email, contact records, work records and notes on the PDA and the version stored on the website. Therefore, only one version of the information needs to be maintained to make it available at all times, so that it exists in all formats. Figure 17 shows the detailed logic for accessing personal information stored in the hub in various ways. The personal information database 1710 is a central storage place for user personal information. The profile gateway server 1720 receives all requests for personal information, whether from the users themselves or the merchants trying to provide services to the users. To ensure that when the personal information owner authorizes the outgoing information, the personal information gateway server responds. Any device that uses TCP / IP (a standard network protocol) to access the Internet 1730 can request information from a personal information database through smart HTTP requests. Consumers can access services from, for example, TV 1740, mobile phones, smart cards, gas meters, water meters, kitchen appliances, security systems, desktop computers, laptops, pocket notebooks, PDAs, and cars. Similarly, merchants 1-10 will have access to these personal information (permitted by the consumer who owns each personal information) and can provide customized and personalized services accordingly_____63 This paper standard applies Chinese national standards CNS) A4 size (210 X 297 mm) '---- r -------- ^ --- 11 --- (Please read the precautions of the arm surface before H page) ·- Line · 486638 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5619twf.doc / 002 A7 —_____ 21 --------------- 丨 丨--, Invention Description U /) consumer. One possible use of services exists everywhere for hotel chains. Consumers can bring a smart card with a digital certificate that uniquely identifies them. The smart card's digital visa is issued by the system ’and records its personal corruption into a personal information database. Consumers bring their cards to hotel chains to register for accommodation, hotel staff swipe their smart cards, and consumers enter a pin number to cancel their digital signing. This visa is sent to the personal information gateway server (using a secure transmission protocol) 'and will be tolerated. 'Travel Head B is then accessed by a specific part of the personal information preset by the customer. The hotel can receive all consumer billing information and hotel room preferences. The hotel can also cater to consumers' movie and dinner preferences, while offering customized menus. The hotel can also email the consumer's spouse to let them know they have arrived safely at the hotel. After registering at the hotel, all transaction information can be uploaded to the consumer's personal information. Hotel partners will be allowed to take advantage of this information about consumers obtained by the hotel (and again with consumer consent). Intent price network · In the Canadian network, the overall integrator system coordinates products and services delivered to users. The integrator manages the physical and virtual networks of the suppliers that approve the provision of products & services to users based on the user preferences reflected in the user's personal information. The integrator manages the relationship between the supplier and the consumer, and coordinates the consumer's intent with the supplier's ability to realize it. This is achieved by providing consumer information and objective advice about the product and supplier. Figure 18 shows the detailed interaction between the consumer and the integrator of the accompanying supplier __ 64 _ ----. — — L ·, ——'---- 装 .—— (Please read the arm surface first Precautions on this page) r ·-· line-This paper size applies to Chinese National Standard (CNS) A4 (210 X 297 mm) 486638 5619twf .doc / 002 A7 B7 V. Description of the invention (^). The user accesses the web browser 1810 and requests product and price information from the integrator. This request is sent from the user's browser to the integrator's website / application server 1820. User preferences and personal information were obtained from the consumer's personal information library of the integrated system 1830, and returned to the website / application server plug-in1. iAt Supplier Product Library 1 8 4 0 Filter out the required product information and customize it for individual users. The website / application server updates the supplier consumer information database 185 with the query information about the user. The product and price information is then formatted as a web page 186Q and returned to the consumer's web browser. Summary agents (summary The collection of software agents that run on application servers and web servers is designed to consider users' repetitive or mundane tasks. These agents work according to the rules set by the user, and only allow Perform user-defined tasks. These agents can bill users, filter content and emails, and provide a summary of tasks and agent activities. The agent's user interface can be modified to suit individual users. FIG. 19 shows the logic of the agent program that generates the oral summary according to the preferred embodiment. When the user requests the summary webpage 1900, the server fetches the user agent preference 1920 from the user personal information database 1930, such as: Agent form, rules, and summary level. The server fetches content from the content database 1950, such as emails, to-dos, news, and bills. The agent uses rules stored in the personal information database Analyze all the contents and summarize them 1960. According to the template, format the content Web page 1970. Use the contents of the content database 1990_______65_; _ ^ The paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) &quot; I--IIIKcrl — Ί — — —-II (Please Read the phonetic notation on the arm surface? Matters on this page) · _-丨 Line · Printed by the Employees 'Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs Printed by the Employees' Cooperatives of the Ministry of Economics and Intellectual Property Bureau 486638 56l9twf.doc / 002 A7 B7 (") A speech template, which generates the voice content of the agent 1980. This voice content is inserted into the webpage 1995, and the webpage is returned to the user 1997. Ya [trusted second person (trusted third party ^ The above method requires the website to maintain the guarantee of information privacy in accordance with the published policy. This system is a third party trusted by consumers and operates in every situation according to its behavior, especially in terms of information privacy, and Not stimulated by business opportunities. A trusted third party has an appropriate set of procedures to ensure compliance with the stated policies. MeCommerce This word extends "eCommerce" Figure 20 shows a login screen according to a preferred embodiment, which represents "personalized electronic commerce". This screen is implemented by the Agent 2000 in a Microsoft Internet Explorer application, which guides users through The process of interacting with the system, customizing and personalizing different system components to obtain information and interact with the user's personal needs. The user enters the user name 2010 and password 2020, and selects the button 2040 to initiate the login process. As suggested by the trademark (10g〇) 2030, the system converts e-commerce to personalization, so it is called "personalized" e-commerce. FIG. 21 illustrates a screen for daily work management according to the preferred embodiment. The user accepts the personalized information 2190 of the animation agent 2100. Users choose different actions according to different needs, including travel 2110, family affairs 2120, financial management 2130, and business activities 2140. It also provides daily work such as email, calendar and document preparation image 2142 to facilitate moving from one action to another. 6 This paper size applies Chinese National Standard (CNS) A4 specification (210 X 297 mm) --- ---- r --- Ί --- install --- (please read the precautions of the arm surface first, then this page) .. line. 486638,619twf.doc / 002 A7 B7 V. Description of invention (w) Browse of actions. A direct link 2146 is also provided to allow the forwarding of new texts and other things of interest. Depending on where the user is, you can choose different personal information, such as work, home, or vacation. When users need personal information from another location, they can add this personal information 2170. Different items of personal information 2180 are collected from users in order to support different attempts. And permission 2150 is a collection of items 2180, ensuring that the information is timely. FIG. 22 illustrates a user home screen according to a preferred embodiment. Provide world news 2200 and local news 2210 according to user preference. The user has selected Real Finance 2230 as an item to provide direct information on the screen. Different agents 2220 are also provided according to different user preferences. FIG. 23 illustrates agent interaction according to the preferred embodiment. The agent 2310 communicates information 2300 with the user, indicates that the user's life insurance has changed, and indicates a graph for the user's statistical information. ◦ Provides specific suggestions 2395 to facilitate detailed information based on the user's current statistics. In the center of the screen, the user's life insurance graphic 2370 is emphasized to help the user determine the appropriate action. A button 2380 is provided to facilitate policy changes, and a button set 2390 helps users to choose insurance needs from different angles. Event backgrounder An event backgrounder is a short description of an upcoming event that is passed to the user before the event. Event announcements are regularly updated. The latest information about this event includes related information such as: itinerary and daily work, and other useful information such as acquaintances who may be in the same area. The purpose of the event announcement is to provide information about events and resources such as: public websites, user calendars and contacts _ 6 7 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) ------- -: --------- Equipment --- (Please read the note on the arm surface? Matters before ^ | this page) Order-line · Printed by the Intellectual Property Bureau Staff Consumer Cooperatives of the Ministry of Economy 486638 56l9twf. doc / 002 A7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs V. Invention Description (/ f) The latest information described in the record 'allows the user to react optimally in a given situation.

g Friend Finder (finde-_Q When a friend, family member or acquaintance will be in the same area or will be in this area, this software looks for opportunities to notify the user. The software scans the user's calendar to find upcoming events. Then ' Use the map to compare these calendar items with the calendar items of the people recorded in the contact list. Tell the user any matching results, that is, tell the user 'someone will come near them at a certain time. The term, information overload, has been understood in terms of its metaphors and impact. People have limited attention at any one time 'but there is more and more competition to pay attention to every day. In short,' too much information and too Less time is the main factor that complicates the lives of today's knowledge workers. The first attempt to deal with information overload dynamically focused on the intelligent filtering of information, so it would reduce the amount of information. However, it is not simple to remove the random part of information. Most of the The methodist is only wise about the greed of the last power to the user, which is based on the interests of the user and the exclusion of the least. The relevant part is to evaluate each document to complete. So in this way, you can also improve the quality. At present, filtering is only the first step in processing information. Undoubtedly, the access to the document is the same as the quality of the document. Important. When entering a meeting, there is no value in including important information about meeting materials sent to the office. When business speed is accelerated due to technology of interconnectedness, the ability to obtain quality information whenever and wherever is Necessary. — ____— —_68 __ ^ _ This paper size applies to China National Standard (CNS) A4 (21〇X 297. Public Love), (Please read the precautions of the arm surface before this page) Order:- 486638 5619twf.doc / 002 A7 B7 V. Description of the invention (from) This new proposal is called the intelligent information transfer theory and is a pioneer in the new information age. The preferred embodiment demonstrates that the above intelligent information transfer theory does not only try to reduce Information is overloaded, and high-quality documents are sent at the time and place that users need. In other words, the system will be correct at the right place, at the right time. Send the message to the right person. Description of Yudong Knowledge Management System Figure 24 is a block diagram of the active knowledge management system of the preferred embodiment. This system includes the following parts: a back end connected to one or more servers (back -end) 2400, personal mobile wireless client (observer) 2430, 2436, public client (magic wall) 2410, 2420, web client (web client) 2446, 2448. E-mail client 2450, 2460. Back-end server program (2400) Figure 25 is a block diagram of a back-end server in the preferred embodiment. The back end (2400 in Figure 24) is a computer system with the following active software: intelligent agent coordinator (Mimin) 258 (), information ordering system 2530, continuous and periodic information collection and processing Smart-type agent collection 250,000, 2502, 2504, user personal information database 2542 and its supporting software, information channels database (information channels database) 2542 and its supporting software, communication software 2550, information transmission software (iniormation transformation software) 2560 and auxiliary software. Viewers (446 and 2448 on Figure 24) Viewers are a combination of hardware devices and software applications. Hardware includes hand __________ 69 __ This paper size applies to China National Standard (CNS) A4 (21〇X 297 mm) • ------ II ----- install i I (Please read the arm surface first Note on the note? Matters on this page again). --Line-Printed by the Consumers' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 486638 5619twf.doc / 002 A7 B7 V. Description of the invention (") Personal computer and wireless communication device. Viewer The state-of-the-owner's-world is regularly updated by continuously receiving wireless information streams. The information collected and processed by a set of intelligent agents includes mail messages, A user's favorite news, calendar updates, background information about upcoming meetings and events, such as weather and traffic. Figure 26 is a block diagram of the magic wall of the preferred embodiment. The hardware of the magic wall includes: A computer system 2640 connected to a back-end server. 2640, 2630, 2632 large array of sensors for detecting the presence, location and characteristics of people. 2634, 2630, 2632. Audio input 26 10 / output 2614 hardware magic wall software support. Compatible with current The station ’s standard multimedia output speech recognition / touch input is represented by speech-enabled animated characters. The smart agent magic wall operates as follows: 1. If the user appears near the magic wall, The sensor array triggers the "user here" event, which sends an environmental cue including the character code and location to the smart agent to coordinate ____ 7 0 This paper standard applies to Chinese national standards (CNS) A4 specification (210 X 297 mm) (Please read the precautions on the arm surface before this page) Order: .Line-Printed by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economy 486638 5619twf.doc / 002 A7 B7 5. The invention description us). 2. According to the information returned by the sensor array, confirm the user. 3. The magic wall is switched to the "locked on the user" mode. If another user approaches, the system will notify him / her that other users cannot be served at the moment because the current user is being served. 4. The smart agent coordinator is Know the user's preferences 5. The smart agent coordinator determines whether there is any relevant information that the user is interested in, and the time-sensitive information of the magic wall location should be displayed (for example: traffic reports, meetings (No mention). If this information exists, it is ready to be transmitted. 1 If not, control is transferred to the information ordering system. 6. The information ranking system determines what information is most relevant to the user based on the user's personal information, the timeliness of the information, and the previous recommendations of the smart agent coordinator. 7. The information page identified at this time and place that is most relevant to the user is displayed. The action of information transmission also includes the animation and voice output of the smart agent. 8. If the user requests it, he / she can ask the magic wall to display a specific page. The magic wall recognizes this voice clip, then confirms it and displays the requested page. 9. When the user leaves the magic wall area, the sensor array triggers the "user left" event. 10. The magic wall transitions to the waiting state. Other client websites The client is a standard browser to browse the collection of web pages, which allows the use of this paper size to apply the Chinese National Standard (CNS) A4 specification (210 X 297 mm) --------: ---- --- Equipped --- (Please read the precautions on the arm surface first, then Hi this page) Order: Thread-486638 5619twf.doc / 002 A7 B7 Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs of the People ’s Republic of China on the five inventions. Walls look at the same information. The email client is any standard email program. Intelligent Agent Coordinator This code snippet is the coordination agent (or meta-agent) of the active knowledge management system, which represents the communication between the system and each user, and the communication between different agents. Are handled by the smart agent coordinator. Examples of these agents are as follows: BackgroundFinder-An agent that analyzes meeting content to determine important keywords and phrases, and searches for the information behind the meeting for each user. TrafficFinder-Agent that searches for traffic information for each user based on the area of residence. Respond to other agents that perform statistical analysis and update of each user's personal data. The smart agent coordinator 2580 in Figure 25 is also the user interface of the system when the user interacts with the system. Whether it is a GUI or other end-user interface, it ultimately handles the smart agent coordinator (ask questions or send commands). The smart agent coordinator has four main responsibilities: monitoring user activity, processing information requests, maintaining each user's personal information, and passing information between users and other corresponding agents. Monitoring user activity Whenever the user touches the sensor, the smart agent coordinator receives an environmental cue. These tips not only make Wisdom 72 ------— 1 — — — · II (Please read the precautions of the arm surface before Ipl this page) ·.-丨 line. This paper standard is in accordance with China National Standard (CNS) A4 Specifications (210 X 297 mm) 486638, 6l9twf. Doc / 002 A7 B7 V. Invention Description (/ c,) Agent Coordinator Knows where the user is for information transmission purposes' and learns the standard style of each person's life (Arrival time, departure time, etc.). When transmitting information, these patterns are frequently updated ’and modified to improve the intelligence of the system. For example, it is not unusual for individuals to have several email accounts (work, home, mobile, etc.) today, as opposed to using several different computers to handle all accounts. Therefore, in order for the smart agent coordinator to successfully send information to the correct location, it must understand all accounts and the time that users may have to maximize the likelihood that users will see the information. This will be described in another paragraph. Information Requests ’The smart agent coordinator processes information requests from other agents in order to personalize the information for each user, and the information provided by the users accurately reflects their interests. These requests typically have personal information about the user. For example: the agent prepares a traffic report for the user, which may request the user's traffic area (search string) from the smart agent coordinator. Data access for all user personal information is achieved in this way. Maintaining user personal information User personal information includes a lot of information about users. This information is a mixture of user-specific data and information that the smart agent coordinator learns and infers from each user: information and activities. To protect the data contained in personal information, the smart agent coordinator must handle all requests for user information. The smart agent coordinator regularly modifies and updates these personal information by observing user activities and trying to learn their lifestyles, to help in more daily ordinary tasks. Smart Generation ______ _ 73 (Please read the phonetic notation of the arm first? Matters before-install i Jill this page: Order: Printed by the Intellectual Property Bureau Staff Consumer Cooperatives of the Ministry of Economy This paper is printed in accordance with China National Standard (CNS) A4 specifications (210 X 297 mm) 486638 5 6 1 9 tw fdoc / 〇〇2 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of the invention "The program coordinator also uses other agent programs from each use Collect information from daily activities of these agents. These agents collect this data 'in an attempt to discover current and long-term interests, and the timing of each type of information transmission preference. Another important idea observed by smart agent coordinators is to also try to decide Find out where each user will stay all day for everyday purposes. ^ Information routing). Most people are moving all day. Smart agent coordinator is wrong to observe (unsupervised learning) And cue cards from the environment try to decide where the user is and where they will be 'and are more sensitive to these things. Decide where to send the user ’s information It is important to send information in that format. For example: if a user is at their desk and uses a web client, the smart agent coordinator can get action hints from his PC and knows that he must send any necessary information. In addition Because the desktop 1 &gt; € is usually more capable and can deliver full-featured and image-rich versions. However, 'considering another case, the smart agent coordinator has received instructions that the person has left the office (through the door Card reader). A few minutes later, the smart agent coordinator also received a notification with urgent information. The smart agent coordinator knows that he has left the office and has not received any notifications, assuming he can be reached via a handheld device (also With these functions) to contact and send this emergency notification to the text, rather than the graphical version. Inherent innovation Active knowledge management systems represent some of the more important tasks in the world of knowledge management and human computer interaction. As an advanced idea, the main innovations are listed below: _______ 7 4 Zhongguanjia Standard (CNS) A4 specification (210x 297 public love) ---- (Please read the precautions on the mouth first and then install it. --- This page: Order --- line · ^ ___ I_ Intellectual Property of the Ministry of Economic Affairs Printed by the Bureau ’s Consumer Cooperatives 486638 5619twf.doc / 002 A7 B7 Invention Description (?> 0) 1. Smart agent coordinator as described above. 2. Development, demonstration and implementation of smart information transfer theory. 3. Information Pass-through channel support, which utilizes a common back-end. For example, users are in front of a magic wall, and information is presented in multimedia. If the system determines that the user is moving, the information is transmitted to the viewer as a standard document. It facilitates the transfer of information, whenever and wherever users need it. 4. Personalization of information is not only based on statistical personal information, but also includes the current real-time status including "who, where, when." 5. A fast and malleable information ranking system is used to combine intelligent agent opinions, user preferences, and user interaction records. It removes most of the general process from the smart ‘type agent’, making the smart agent more refined and accurate without compromising the scalability of the system. 6. Smart agent with speech recognition and speech synthesis combined with animation, and touch input provides efficient, intuitive and emotional feedback to the system. Support code according to the preferred embodiment According to the preferred embodiment, the following code is written and executed on Microsoft

Active Server Page environment. It mainly includes Microsoft Jscript with a \ database call embedded in the code, in order to query and store information in the database. Intent Center Interface Create Intent ASP Page ("intention_create.asp") &lt;% @ LANGUAGE = &quot; JScript &quot;% &gt; &lt;%

Response.Buffer = true; 7 5 This paper size applies to China National Standard (CNS) A4 (210 x 297 mm) --------------- Packing --- (Please read first Note on the arm surface is on this page) Order---· Line-486638 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5619twf.doc / 002 A7 _ B7_ V. Description of the invention (73) Response. Expires = 0;% &gt; &lt; htm 1 &gt; &lt; head &gt; <title> Create An Intention &lt; / title &gt; &lt; / head &gt; &lt; body bgcolor = &quot;# FFE9D5M styles &quot; font-family: Arial &quot; text = &quot;# 000000 &quot; &gt; &lt;% // Define some variables upl = Ser rv er. C re ate Obj ect (MS oft A rt i san s. F i 1 e U p &quot;) intention —name = upl.Form ( '' intention —name, ') intention desc = upl.Form (&quot; intention desc &quot;) // intention name = Request.Form (Mintention_nameM) // intentiondesc = Request.Form (&quot; intention_desc &quot;) // intention icon = Request.Form (Mintention_iconM) submitted = upl.Foi.m (&quot; submitted ") items = new Enumerator (upl.Form)% &gt; & l t;% // Establish connection to the database obj Connection = Server.CreateO bj ect (&quot; ADODB.Connection &quot;) obj Connection.Open (&quot; Maelstrom &quot;)% &gt; &lt;% _____ 7 6 _ This paper size applies China National Standard (CNS) A4 specification (210 x 297 mm) (Please read the precautions on the arm surface before ipi this page) Binding: Thread-486638 5619twf .doc / 002 A7 B7 V. Description of the invention (;) V〇 // Check to see if the person hit the button and do the appropriate thing if (submitted == MAdd / DeleteM) j flag = &quot; false, '// loop through all the inputs while (! Items.atEnd〇) {i = item s. item () &quot; if items are checked then delete them if (upl.Form (i) == MonM) {objConnection.Execute (&quot; delete from user intention where intention_id = ”+ i); o bj Connection .Execute (&quot; delete from intentions where intenti ο n _ id = &quot; + i); o bj Connection. Execute (&quot; delete from tools_to_intention where intention_id = '' + i) flag = &quot; true &quot;} items. MoveNext () (Please read first (Notes on this page are on this page) · Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economics // if items were not deleted then insert whatever is in the text field in the database if (flag == &quot; false &quot;) {intention_na me — Short = intention_name.replace (/ / gi, ') objConnection.Execute (MINSERT INTO intentions (intention_n ame, intent ion desc, intent ion_icon) values (, M + intention name + ΊΊ This paper standard applies Chinese National Standard (CNS) A4 specifications (210 x 297 mm) 486638 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economy 5619twf.doc / 002 A7 _B7___ V. Description of the invention (75, 0 ,, ',,' + intention desc + ',,, &quot;, + Intention —name —short + 'gif &quot; + Response.write (&quot; the intention short name is &quot; + intenti ο η _ na in e _ short); upl.SaveAs (&quot; E: development / asp_examples &quot; '+ intenti ο η _ name _ sh 0 rt + &quot;. gi f &quot;))} // Query the database to show the most recent items. rsCustomersList = obj Connecti on.Execute (&quot; SELECT * FROM intenti 0 nsn)% &gt; &lt; input type = &quot; Submit &quot; name = Mreturn_to_mcp &quot; value = MGo to Main Control Panel &quot; onclick = &quot; location.href =, default.asp1 &quot; &gt; <form method = &quot; post &quot; action: &quot; intention_create.asp '' enctype = &quot; mu 11 ipart / f 0 rm-dat a &quot; &gt; &lt; TABLE border = 0 &gt; &lt; tr &gt; &lt; td colspan = &quot; 2 ', &gt; &lt; font face = nArial' 'size = `` + l' '&gt; &lt; b &gt; Enter in a new intention &lt; / b &gt; &lt; / font &gt; &lt; / td &gt; &lt; / tr &gt; &lt; tr &gt; &lt; td &gt; &lt; font face = `` Arial &quot; &gt; Name: &lt; / font &gt; &lt; / tcl &gt; &lt; td &gt; &lt; INPUT TYPE = ntext &quot; name = nintenti ο η _ nam e &quot; &gt; &lt; / 1 d &gt; &lt; / 1 r &gt; &lt; tr &gt; &lt; td &gt; &lt; font face =, 'Arial,' &gt; Description: &lt; / font &gt; &lt; / td &gt; &lt; td &gt; &lt; TEXTAREA name = &quot; intention_desc &quot; &gt; &lt; / TEXTAREA &gt; &lt; / td &gt; &lt; / tr &gt; &lt; tr &gt; &lt; td &gt; &lt; font face = & q uot; ArialM &gt; Icon Image: &lt; / font &gt; &lt; / td &gt; &lt; td &gt; &lt; INPUT TYPE = MfileM NAME = nintention_icon &quot; size = 40 &gt; &lt; / td &gt; &lt; / tr &gt; &lt; tr &gt; &lt; td colspan = M2M &gt; &lt; INPUT ty pe = Msubm it &quot; n am e = n su bm itted &quot; value = &quot; Add / Delete &quot; &gt; &lt; / td &gt; &lt; / tr &gt; &lt; / TABLE &gt; &lt; HR &gt; <font face = nArialn size = n + l "&gt; &lt; b &gt; Current lntentions &lt; / b &gt; &lt; / font &gt; &lt; TABLE &gt; 78 (Please read the note 3 on the back first, then this page) • Line-This paper size is in accordance with Chinese National Standard (CNS) A4 (210 X 297 mm) 486638 5619twf.d〇c / 〇〇2 A7B7 Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs Consumer Cooperatives V. Invention Description (Product &gt; &lt; tr bgcolor = E69780 align = ncenter ''> &lt; td &gt; 〈FONT color = &quot; white &quot; &gt; Delete &lt; / FONT &gt; &lt; / td &gt; &lt; TD &gt; 〈FONT co lor = &quot; white "&Gt; Itention &lt; / FONT &gt; &lt; / TD &gt; &lt; TD &gt; &lt; FONT color = Mwhite &quot; &gt; Description &lt; / FONT &gt; &lt; / TD &gt; &lt; TD &gt; &lt; FONT color = "White" &gt; Image &lt; / FONT &gt; &lt; / TD &gt; &lt; / tr &gt; &lt;% // Loop over the intentions in the list counter = 0; while (IrsCustomersList.EOF) {% &gt; &lt; tr bgcolor = &quot; whiteM style = &quot; font-size: smaller &quot; &gt; &lt; td al ign = center &gt; &lt; INPUT type = &quot; checkbox &quot; name = M &lt;% = rs C ustomers L ist (M intenti ο n _ i d &quot;)% &gt; &quot; &gt; &lt; / TD &gt; &lt; td &gt; &lt;% = rsCustomersList (', intention — name &quot;)%〉 &lt; / td &gt; &lt; td &gt; &lt;% = rsCustomersList (&quot; intention_desc &quot;)% &gt; &lt; / td &gt; 79 (Please read the notes on the * f side and then this page)-Install too. 210 X 297 mm) 486638 5619twf.doc / 002 A7 B7 V. Description of the invention (&lt; td &gt; 〈img src: rs C ustomers L ist (&quot; intenti ο n _ ic ο n &quot;)% &gt; M &gt; &lt; / td &gt; &lt; / tr &gt; &lt;% counter + + rsCustomersList.MovelMext ()}% &gt; &lt; / TABLE &gt; &lt; hr &gt; Available Tools &lt; / fo rm &gt; &lt; / BODY &gt; &lt; / HTML &gt; ASP page ("intentions_list.asp") that receives intent 1J table &lt;!-#include fi 1 e = `` inc 1 ude / ch ec kau th en tic at i on. in c ''-&gt; &lt; HTML &gt; &lt; HEAD &gt; &lt; TITLE &gt; mySite! Intentions List &lt; / TITLE &gt; (Please read the precautions on this page first, then this page) --line-economic Printed by the Consumer Cooperatives of the Ministry of Intellectual Property Bureau &lt; SCRIPT LANGUAGE = nJavaScriptn &gt; function intentionsList () {this.internal Array = new Array (); &lt;% // establish connection to the database objConnection = 80 Standard (CNS) A4 specification (210 x 297 mm) 5 ^ 19twf.doc / 002 A7 B7 V. Description of the invention (7?)

Serve Γ.C r eateOb j ect (&quot; ADODB.Connection &quot;); ob j Co nnection.Open (&quot; Maelstrom &quot;); // create query intentionsQuery = objConnection.Execute (&quot; SELECT * FROM intentions ORDER BY intention_name asc &quot;);% &gt; // write out the options &lt;% num Options = 0 while (! intentionsQuery.EOF) {intentionMame = intentionsQuery (&quot; intention — name &quot;); intentionsQuery ('' intention — icon &quot;);% &gt; intentionlcon (please read 2 notes on the arm surface first, then this page) ·. new Array (2); this.internalArray [&lt;% = numOptions% &gt;] = this.internalArray [&lt;% = numOptions% &gt;] [0] = 11 &lt;% = intenti ο η N am e% &gt; &quot;; this.internalArray [&lt;% = numOptions% &gt;] [1] = &quot; images / &lt;% = intentionlcon% &gt; &quot;; &lt;% numOptions + +; intentionsQuery. moveNext ();% &gt; --line · Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs &lt;%% &gt;} nu ηι I ntenti ο ns = &lt;% = num O pti ο ns% &gt;; intentionArray = new intentionsList () .internalArray; function selectlntention () {for (i = 0; i &lt;numlntentions; i + +) {8 1 This paper size applies to China National Standard (CNS) A4 (210 x 297 mm) 486638 5619twf.doc / 002 A7 B7 V. Description of the invention (7 / if (IntentionsListSelect.options [i] .selected) intentionNameTextField.value intenti ο n A rray [i] [0]; intentionArray [i] [l]; // intention Picture. S rc break; printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs &lt; / SCRIPT &gt; &lt; / HEAD &gt; <BODY BGCOLOR: ', &lt; 0 / 〇 = Session ("main —background',)%>", style: &quot; font-family: A ria 1M &gt;-&lt; CENTER &gt; &lt;! --- <FORM NAME = ”intention —list &quot; &gt; ---> &lt; TABLE FRAME = MBOXn border = 0 CELLPADDING = M2M CELLSPACING = ,, 2 ,, &gt; &lt; TR &gt; &lt; TD COLSPAN = M3 &quot; STYLE = Mfont: 20pt arial &quot; ALIGN = MCENTERM &gt; &lt; B &gt; Add a mySite! Intention &lt; / B &gt; &lt; / TD &gt; &lt; / TR &gt; &lt; TR &gt; &lt; TD COLSPAN-M3 &quot; &gt; &nbsp; &lt; / TD &gt; &lt; / TR &gt; &lt; TR &gt; &lt; T D width = M100n &gt; &lt; font size = &quot; -l &quot; &gt; Please Select An Intention You Would Like to Add to Your List &lt; / font &gt; &lt; / TD &gt; &lt; TD colspan = 2 &gt; <SELECT ID = ” IntentionsListSelectn 82 This paper size is in accordance with Chinese National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the arm surface before this page) m. Line · ^ 6638 C 〇dfwt 9 1 6 Intellectual Property of the Ministry of Economic Affairs Printed by the Bureau ’s Consumer Cooperatives V. Invention Description (U NAME = `` lntentionsListSelect '' S1ZE = `` 10 ”style = &quot; font: 9pt Arial; &quot; 〇nClick = &quot; selectIntention () M &gt; &lt;% intentionsQuery.moveFirst (); for (j = 0; j &lt;num〇ptions; j + +) {% &gt; &lt; OPTION VALUE- &quot; &lt;% = intentiοnsQuery (&quot; intention_id &quot;)% &gt; &quot; &lt;% if (j == 0) {% &gt; SELECTED &lt;%}% &gt; &gt; &lt;% = intentionsQuery (Mintention_nameM) ° / 〇 &gt; &lt;% intent ion sQuery.moveNext ()} intentionsQuery. moveFirst ();% &gt; &lt; / SELECT &gt; &lt; / TD &gt; &lt; / TR &gt; &lt; TR &gt; &lt; TD COLSPAN = ,, 3 ,, &gt; & am p; nbsp; &lt; / TD &gt; &lt; / TR &gt; &lt; TR &gt; &lt; TD width = n100, &gt; &lt; font size = n-l ''〉 Customize the Intention name &lt; / font &gt; &lt; / TD &gt; &lt; TD COLSPAN 2n &gt; &lt; INPUT TYPE = ,, text, 'NAM E = M intent ionNameTextFie IdM ID = MintentionNameTextFieldn SIZE = M3 0,1 VALUE = M &lt;% = intentionsQuery (Mintention_nameM)% &gt; Mx / TD &gt; &lt; / TR &gt; &lt; TR &gt; &lt; TD COLSPAN = M3M &gt; &nbsp; &lt; / TD &gt; &lt; / TR &gt; 83 &lt; TR &gt; 83 This paper size applies the Chinese National Standard (CNS) A4 specification ( 210 X 297 mm) (Please read the precautions for the flank surface before installing --- this page) .-. LINE-486638 5619twf.doc / 002 A7 __B7___ V. Description of the invention ("/) &lt; TD COLSPAN = M3 &quot; A LI GN = MC ΕΝ TE RM &gt; &lt; INPUT TYPE = Mbuttonn NAME = nin ten ti ο η Ο KB u tto n &quot; VALUE- &quot; OK &quot; SIZE-M10M ID = M in te nti ο η 〇 KB u tto n &quot; onClick = "javaScript: top.opener.top.navframe.addAnIntention ();"> &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp; nb sp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;

&lt; INPUT TYPE = MbuttonM NAME = &quot; intentionCancelButtonM VALUE = M CancelM SIZE = &quot; 10 &quot; ID = MintentionCancelButton &quot; onClick = &quot; self.close (); M &gt; &lt; / TD &gt; &lt; / TR &gt; &lt; // TABLE &gt; &lt;! --- &lt; / FORM &gt; --- &gt; &lt; / CENTER &gt; &lt;% objConnection.Close ();% &gt; &lt; / BODY &gt; &lt; / HTML &gt; Show user intent歹 [i ASP page of table j (excerpted from '' navigation.asp '') &lt; DIV ID = `` intentionlist ”style = '' position: absolute; width: 210; height: 95; left: 365pt; top:- 5; visibility: hidden; font-family: Arial; font-color: # 000000; font: 8pt Arial; M &gt; &lt; DIV sty le = Mposition: absolute; top: 7; left: 7; height: 78; width : 210; zi ndex: 2; background: <o / osSessionC'main — background '')%>; border: solid lpt # 000000; padding: 3pt; overflow: auto; alink: black; link: black; M &gt; &lt; body LINK = M # 000000 &quot; AL IN K = M # 000000M vl ink = MblackM &gt; &lt;% // create query _84 This paper size applies Chinese National Standard (CNS) A4 size (210 x 297 mm) (please read the precautions on this page first, then this page) · --- · Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs, Consumer Cooperatives 486638 5619twf .doc / 002 A7 B7 Intellectual Property Bureau of the Ministry of Economic Affairs Printed by the Employee Consumption Cooperative V. Description of the invention (h) intentionsQuery = objCo η n ectio n.Execute (M SELECT user— intention · * FROM user in ten tion, user intention toper son a WHERE user intention topersona.userpersonaid = &quot; + Session (&quot; currentUserPersona &quot;) + &quot; AND user_intention_to_persona.user_intention_id = user in tent ion. User_intention_idM); num intentions = 0; Response.Write ("&lt; SCRIPT &gt; num intentions: '' + intentionsQuery. RecordCount + &quot; &lt; / SCRIPT &gt; &lt; TABLE cellpadding =, 0, width = '100%' cellspacing = '0'〉 ''); while (! IntentionsQuery.EOF) {% &gt; &lt; TR &gt; &lt; TD &gt; &lt; a href = ', javascript: change lntention (' &lt;% two intentionsQuery ("user —intention_id '')% &gt; ,, &lt;% = num intentions%> '), onmouseover = &quot; mouseOverTab () M onmouseout: mouseOutOfTab () &quot; &gt; &lt; font color = ”Black '' face =` `arial” size = `` -2 &quot; &gt; &lt; 〇 / 〇 = intentionsQuery (&quot; intention_custom_nameM)% &gt; &lt; / font &gt; &lt; / a &gt; &lt; / TD &gt; &lt; TD &gt; &lt; IMG align = &quot; right &quot; SRC = &quot; images / delete.gif &quot; alt = &quot; Delete this intention '' onClick = '' confirmDelete (&lt;% = intentionsQuery (&quot; user_intention_id &quot;)% &gt;) &quot; &gt; &lt; / TD &gt; &lt; / TR &gt; &lt;% numintentions + +; intentionsQuery. moveNext (); % &gt; &lt;%

Response. Write (', &lt; SCRI PT &gt; num intentions: &quot; + numintentions +, &lt; / SCRlPT &gt; &quot;);% &gt; 85 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 (Mm) (Please read the precautions for the arm surface first, then this page) -Fighter · • Thread · 486638 5619twf.doc / 002 A7 ___B7 ___ V. Invention Description Ub) &lt; tr &gt; &lt; td colspan = M2M &gt; &lt; hr &gt; &lt; / td &gt; &lt; / tr &gt; &lt; TR &gt; &lt; td colspan = &quot; 2 &quot; &gt; &lt; ahret = &quot; javascript: change I ntenti ο n ('add ...,% = numintenti ο ns% &gt;); &quot; on mouseover s' ^ nouseOverTabO ”on mouseoui = n mouse Out 〇fTab ()” &gt; &lt; font color two &quot; Black &quot; face = nariar size = ,, _ 2n &gt; add. .. &lt; / f〇nt &gt; &lt; / a &gt; &lt; / td &gt; &lt; / TR &gt; &lt; / tab 1 e &gt; 〈/ body &gt; &lt; / DI V &gt; &lt; DIV style = &quot; position: absolute; top: 0; left: -5; width: 230; height: 105; z-index: 1; &quot; onmouseout = Mintentionlist.style.visibility ^ 'hidden &quot;' on mouseout = `` intentionlist.styl e.visibility: 'hidden' '' on mouseover =, attentionlist.style.visibility: 'hidden' '' &gt; &lt; / DIV &gt; &lt; / DI V &gt; &lt; / DI V &gt; The preferred embodiment is disclosed as above, but it is not intended to limit the present invention. Any person skilled in the art can make various modifications and retouches without departing from the spirit and scope of the present invention. The attached application patent shall prevail. (Please read the precautions on the arm surface first? This page)-Binding too.-Line. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs _____ 86 This paper size applies to China National Standard (CNS) A4 specifications (210 X 297 mm)

Claims (1)

  1. 486638 5 619 t wf. Doc / 0 0 2 A8 B8 C8 D8 Printed by the Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs, and applied for patent scope 1. A method of creating a user interface, including the steps of: identifying a user; obtaining User personal information; identifying information of interest to the user based on the user's personal information; prioritizing information of interest to the user based on the user's personal information; and displaying a display based on the user's personal information on a display Information formatted by that information. 2. The method for creating a user network interface as described in item 1 of the scope of patent application, including the step of detecting a mark for identifying a user using a sensing element. 3. The method for creating a user web interface as described in item 2 of the scope of patent application, including the step of obtaining the user's personal data from a database using the identification mark. • 4. The method for creating a user web interface as described in item 1 of the scope of patent application, including the steps of animating a smart agent to interact with the user. 5. The method for creating a user network interface as described in item 4 of the scope of the patent application, wherein the intelligent agent uses voice synthesis to transmit information to the user. 6. The method for creating a user network interface as described in item 1 of the scope of patent application, comprising the steps of obtaining a voice input from a user, processing the voice input, and displaying information to the user based on the voice input. 7. Create user network interface WW κ as described in item 1 of the scope of patent application (please read the notes on the back before ^^^ page), 1T line 486638 5619twf.doc / 002 Α8 Β8 C8 D8 Central Ministry of Economic Affairs Standard Bureau employee consumer cooperative printed 6. Method for patent application, including the step of updating the user's personal information based on interaction with the user. 8. The method for creating a user network interface as described in item 7 of the scope of patent application, including the step of formatting the information to be transmitted to the user according to the characteristics of the user's current environment. 9. The method for creating a user web interface as described in item 1 of the scope of the patent application, including the steps of transmitting information obtained from a user to a target location. 10. A device for creating an information digest, comprising: a processor; a memory storing information under the control of the processor; a logic circuit for identifying a user; identifying the user based on the user's personal data Interest information compilation circuit; a logic circuit that sorts the user's interest information according to the user's personal data; and a display circuit that displays a logic circuit formatted according to the user's personal information. 11. A computer program that creates an information summary and records in a computer-readable medium includes: a code snippet that identifies a user; a code snippet that obtains user personal information; ρ according to the user's personal information Identifies user-friendly code snippets of interest #; This paper size applies Chinese National Standard (CNS) Α4 specification (210 × 297 mm) (Please read the precautions on the back before filling—page)-installed · 486638 5619twf. doc / 002 A8 B8 C8 D8 A code snippet printed by the Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs and applying for patents to prioritize information of interest to the user based on the user's personal information; A code snippet of the information formatted by the user's personal information. 12. A computer program for creating an information summary recorded in a computer-readable medium as described in item 11 of the scope of patent application, including logic for detecting a mark of a user using a sensing element. 13. A computer program for creating an information summary as described in item 11 of the scope of patent application recorded on a computer-readable medium, including logic for obtaining the user's personal data from a database using the identification mark. 14. A computer program that records a computer-readable medium as described in item 11 of the scope of patent application, including logic for animating a smart agent to interact with the user. 1 5. A computer program that records a computer-readable medium as described in item 14 of the scope of patent application, wherein the intelligent agent program uses voice synthesis to transmit information to the user. 16. A computer program for creating an information summary recorded in a computer-readable medium as described in item 11 of the scope of patent application, including obtaining a voice input from a user, processing the voice input, and displaying according to the voice input Information to the user's logic. 17. A computer program for creating an information summary as described in item 11 of the scope of patent application recorded on a computer-readable medium, including logic for updating the user's personal information based on interaction with the user. 18. If you want to create a summary of information as described in item 11 of the scope of patent application, please read the notes on the back first, then b-page gutter. The paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 3 6 6 8 5619twf.doc / 002 A8 B8 C8 D8 6. The scope of the patent application is recorded in a computer-readable medium, including a computer program that formats information to be transmitted to the user based on the characteristics of the user's current environment. logic. (Please read the precautions on the back before you re-install the pages) Order the paper printed by the Central Consumers Bureau of the Ministry of Economic Affairs, Consumer Cooperatives. The paper size applies to Chinese National Standard (CNS) A4 (210X297 mm) 486638 A8 / B8 5619twf.doc / 002 C8 D8 6. The scope of patent application is a computer program recorded in a computer-readable medium, including logic to format the information to be transmitted to the user according to the characteristics of the user's current environment. 19. A computer program for creating an information summary recorded in a computer-readable medium as described in item 11 of the scope of patent application, including logic for transmitting information obtained from a user to a target location. -------------------- Order ---------- ^. ^ _ W (Please read the notes on the back before filling this page) Ministry of Economy The printed paper size of the Intellectual Property Bureau employee consumer cooperatives applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm)
TW088120146A 1998-11-12 2000-02-11 A system, method and article of manufacture for effectively interacting with a network user TW486638B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/196,482 US6446076B1 (en) 1998-11-12 1998-11-19 Voice interactive web-based agent system responsive to a user location for prioritizing and formatting information

Publications (1)

Publication Number Publication Date
TW486638B true TW486638B (en) 2002-05-11

Family

ID=22725585

Family Applications (1)

Application Number Title Priority Date Filing Date
TW088120146A TW486638B (en) 1998-11-12 2000-02-11 A system, method and article of manufacture for effectively interacting with a network user

Country Status (5)

Country Link
EP (1) EP1138006A2 (en)
AU (1) AU1730200A (en)
CA (1) CA2350314C (en)
TW (1) TW486638B (en)
WO (1) WO2000031656A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9690636B2 (en) 2009-08-10 2017-06-27 Samsung Electronics Co., Ltd. Apparatus and method of data communication between web applications
US10606345B1 (en) 2018-09-25 2020-03-31 XRSpace CO., LTD. Reality interactive responding system and reality interactive responding method

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4390402B2 (en) * 2001-03-29 2009-12-24 富士通株式会社 Knowledge information management method, knowledge information utilization method, and knowledge information management device
DE10239172A1 (en) * 2002-08-21 2004-03-04 Deutsche Telekom Ag Procedure for voice-controlled access to information with regard to content-related relationships
US20050138574A1 (en) * 2003-12-17 2005-06-23 Jyh-Han Lin Interactive icon
GB2446618B (en) * 2007-02-19 2009-12-23 Motorola Inc Method and apparatus for personalisation of applications
US9396437B2 (en) 2013-11-11 2016-07-19 Mera Software Services, Inc. Interface apparatus and method for providing interaction of a user with network entities
IL229370A (en) 2013-11-11 2015-01-29 Mera Software Services Inc Interface apparatus and method for providing interaction of a user with network entities

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU6555798A (en) * 1997-03-14 1998-09-29 Firefly Network, Inc. Method and apparatus for efficiently recommending items using automated collaborative filtering and feature-guided automated collaborative filtering
US5995943A (en) * 1996-04-01 1999-11-30 Sabre Inc. Information aggregation and synthesization system
US5848396A (en) * 1996-04-26 1998-12-08 Freedom Of Information, Inc. Method and apparatus for determining behavioral profile of a computer user
US6021403A (en) * 1996-07-19 2000-02-01 Microsoft Corporation Intelligent user assistance facility
US5915001A (en) * 1996-11-14 1999-06-22 Vois Corporation System and method for providing and using universally accessible voice and speech data files

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9690636B2 (en) 2009-08-10 2017-06-27 Samsung Electronics Co., Ltd. Apparatus and method of data communication between web applications
US10606345B1 (en) 2018-09-25 2020-03-31 XRSpace CO., LTD. Reality interactive responding system and reality interactive responding method

Also Published As

Publication number Publication date
AU1730200A (en) 2000-06-13
EP1138006A2 (en) 2001-10-04
WO2000031656A2 (en) 2000-06-02
CA2350314C (en) 2010-01-19
WO2000031656A3 (en) 2000-10-19
CA2350314A1 (en) 2000-06-02

Similar Documents

Publication Publication Date Title
US20200050464A1 (en) Collaborative and non-collaborative workspace application container with application persistence
US20170308249A1 (en) Displaying a Stream of Content
US9838479B2 (en) Method and apparatus for collecting and disseminating information over a computer network
US9141720B2 (en) System and method for managing content on a network interface
Brambilla et al. Interaction flow modeling language: Model-driven UI engineering of web and mobile apps with IFML
US20160255139A1 (en) Structured updated status, requests, user data &amp; programming based presenting &amp; accessing of connections or connectable users or entities and/or link(s)
US20160255082A1 (en) Identifying &amp; storing followers, following users, viewers, users and connections for user
Sabherwal et al. Business intelligence: practices, technologies, and management
US8554803B2 (en) Systems and methods for facilitating access to documents via a set of content selection tags
Terveen et al. Social matching: A framework and research agenda
US6697824B1 (en) Relationship management in an E-commerce application framework
US8219904B2 (en) Meta-document and method of managing
US7856453B2 (en) Method and apparatus for tracking functional states of a web-site and reporting results to web developers
Skyrme Capitalizing on knowledge
CN101404022B (en) Method of sharing actional label among multi-guest system
Lyytinen et al. The brave new world of development in the internetwork computing architecture (InterNCA): or how distributed computing platforms will change systems development
Grace-Martin et al. Web browsing, mobile computing and academic performance
Kristensen et al. Application of coloured petri nets in system development
Klusch Information agent technology for the internet: A survey
US8069407B1 (en) Method and apparatus for detecting changes in websites and reporting results to web developers for navigation template repair purposes
US9141698B2 (en) Semantic note taking system
US6070149A (en) Virtual sales personnel
Conklin et al. gIBIS: A tool for all reasons
CN100435141C (en) Method and system for automating internet interactions using recorded data
McAfee Enterprise 2.0: The dawn of emergent collaboration

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MK4A Expiration of patent term of an invention patent