US20130019286A1 - Validating that a user is human - Google Patents
Validating that a user is human Download PDFInfo
- Publication number
- US20130019286A1 US20130019286A1 US13/564,023 US201213564023A US2013019286A1 US 20130019286 A1 US20130019286 A1 US 20130019286A1 US 201213564023 A US201213564023 A US 201213564023A US 2013019286 A1 US2013019286 A1 US 2013019286A1
- Authority
- US
- United States
- Prior art keywords
- question
- response
- evidence
- user
- processor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Definitions
- the present disclosure relates to question answering (QA) systems, and more specifically, to validation that a user of a QA system is human.
- CAPTCHA is a type of challenge-response test used in computing to ensure that the response is generated by a person instead of by an automated device. The process usually involves a computer asking a user to complete a simple test that the computer is able to recognize. The test is designed to be easy for a computer to generate, but difficult for a computer to solve. Therefore, if a correct solution is received, it can be presumed to have been entered by a human.
- a common type of CAPTCHA requires the user to type letters or digits from a distorted image that appears on the screen. Such tests are commonly used to prevent unwanted automated programs from accessing a computer platform.
- Embodiments herein disclose a mechanism for generating questions, presenting a question to a user, and using a response from the user to determine if the user is human.
- Embodiments herein disclose a mechanism in which an automated question answering system generates secondary questions, asks those questions to a pool of users, and improves its ability to answer questions based on responses from those users.
- a method of validating that a user is human is disclosed.
- a user question is generated using a computerized device.
- the user question is output to a user.
- a user response to the user question is received from the user.
- the user response is validated as having been provided by a human.
- a method of determining that a user of a question-answer system is human is disclosed.
- a question is received into a computerized question-answer system operating on a computerized device to provide an automatically generated answer to the question.
- a plurality of candidate answers to the question is generated by the computerized device.
- the sources of evidence used to generate the plurality of candidate answers are evaluated to identify marginal evidence.
- the marginal evidence contributes only partially to a candidate answer.
- the computerized device determines a confidence score for each of the plurality of candidate answers.
- the computerized device identifies information not provided by the marginal evidence that could further develop the confidence score. At least one follow-on inquiry is formulated based on the information.
- the follow-on inquiry is output to external sources separate from the question-answer system to obtain responses to the follow-on inquiry. At least one response to the inquiry is received from the external sources. Whether the at least one response to the at least one follow-on inquiry was provided by a human respondent is determined based on one of: a previous determination that a respondent is human, and syntactic or semantic characteristics of the at least one response.
- a method is disclosed.
- a first question to be answered by a Question Answering (QA) system is provided to a processor.
- the processor creates a collection of candidate answers to the first question.
- the collection of candidate answers is created from a corpus of data.
- the processor generates supporting evidence and a confidence score for each candidate answer.
- An evidence analysis module produces a second question based on the supporting evidence.
- the processor presents the second question to one or more external sources separate from the QA system to obtain responses to the second question.
- the processor receives at least one response or knowledge item from the one or more external sources.
- the processor determines whether a respondent is human based on one of: a previous determination that a respondent is human, and syntactic or semantic characteristics of the at least one response or knowledge item provided to the second question.
- a question is received into a Question Answering (QA) system.
- the QA system compares the question to a corpus of data.
- the QA system generates hypotheses about relationships between linguistic and semantic entities of the question and the corpus of data.
- the QA system generates a plurality of candidate answers to the question using the hypotheses.
- the QA system evaluates sources of evidence used to generate the plurality of candidate answers to identify marginal evidence.
- the marginal evidence contributes only partially to a candidate answer.
- the QA system determines a confidence score for each of the plurality of candidate answers. A missing piece of common-sense knowledge that would enable the QA system to further develop the confidence score is determined.
- a follow-on inquiry to obtain the missing piece of common-sense knowledge is formulated.
- the follow-on inquiry is output to an external expert community source separate from the QA system to obtain responses to the follow-on inquiry.
- Responses comprising the missing piece of common-sense knowledge are received from the external expert community source.
- a common-sense knowledge inquiry is generated.
- the common-sense knowledge inquiry is output to the external expert community source.
- a response to the common-sense knowledge inquiry is received from the external expert community source. Whether the respondent is human is determined based on syntactic or semantic characteristics of the response to the common-sense knowledge inquiry.
- a computerized device for determining that a user is human.
- the computerized device comprises a question-answer system comprising software for performing a plurality of question answering processes.
- a receiver receives a question into the question-answer system.
- a processor that generates a plurality of candidate answers to the question is connected to the question-answer system.
- the processor evaluates sources of evidence used to generate the plurality of candidate answers to identify marginal evidence.
- the marginal evidence only partially contributes to a candidate answer.
- the processor determines a confidence score for each of the plurality of candidate answers.
- the processor identifies information not provided by the marginal evidence that could further develop the confidence score.
- the processor generates at least one follow-on inquiry based on the information.
- a network interface outputs the at least one follow-on inquiry to external sources separate from the question-answer system to obtain responses to the follow-on inquiry and receives from the external sources at least one response to the at least one follow-on inquiry.
- the processor evaluates whether the at least one response to the at least one follow-on inquiry was provided by a human respondent based on one of: a previous determination that a respondent is human and syntactic or semantic characteristics of the at least one response.
- a computer system for verifying that a user is human.
- the computer system comprises an automated question answering (QA) system comprising a corpus of data, a processor, and a network interface.
- the processor has software for performing a plurality of question answering processes.
- the processor generates a user question from the corpus of data.
- the network interface outputs the user question to a user separate from the QA system and receives a user response to the user question from the user.
- the processor determines whether the user is human based on syntactic or semantic characteristics of the response to the user question.
- a question answering (QA) system comprises a processor.
- An evidence analysis module is connected to the processor.
- a first interface is connected to the processor.
- a second interface is connected to the processor.
- a corpus of data is connected to the evidence analysis module.
- the first interface provides a first question to be answered by the QA system.
- the processor creates a collection of candidate answers to the first question from the corpus of data. Each candidate answer has supporting evidence and a confidence score generated by the processor.
- the evidence analysis module produces a second question based on the supporting evidence.
- the processor presents the second question through the second interface to one or more external sources separate from the QA system to obtain responses to the second question.
- the processor receives at least one response or knowledge item from one or more external sources through the second interface.
- the processor determines whether a user is human based on one of: a previous determination that a respondent is human and syntactic or semantic characteristics of the at least one response or knowledge item obtained for the second question.
- a non-transitory computer readable storage medium readable by a computerized device comprises a question-answer system comprising question answering processes.
- the non-transitory computer readable storage medium stores instructions executable by the computerized device to perform a method. According to the method, a user question is generated. The user question is output to a user. A user response to the user question is received from the user. The user response is validated as having been provided by a human.
- FIG. 1 is a flow diagram of a method according to an embodiment herein;
- FIG. 2 is an illustration of aspects of a system according to an embodiment herein;
- FIG. 3 is an illustration of aspects of a system according to an embodiment herein;
- FIG. 4 is an illustration of aspects of a system according to an embodiment herein;
- FIG. 5 is an illustration of inquiry examples according to an embodiment herein;
- FIG. 6 is an illustration of aspects of a system according to an embodiment herein;
- FIG. 7 is an illustration of aspects of a system according to an embodiment herein;
- FIG. 8 is an illustration of aspects of a system according to an embodiment herein;
- FIG. 9 is a flow diagram of a method according to an embodiment herein.
- FIG. 10 is an illustration of articles of manufacture according to embodiments herein;
- FIG. 11 is a schematic diagram of a hardware system according to embodiments herein.
- FIG. 12 is a schematic diagram of a deployment system according to embodiments herein;
- FIG. 13 is a schematic diagram of an integration system according to embodiments herein;
- FIG. 14 is a schematic diagram of an on demand system according to embodiments herein;
- FIG. 15 is a schematic diagram of a virtual private network system according to embodiments herein.
- FIG. 16 is a schematic diagram of a virtual private network system according to embodiments herein.
- the QA system described herein is not merely a document search system.
- document search typically takes a keyword query and merely returns a list of documents, ranked in order of relevance to the query.
- QA technology takes a question expressed in natural language, seeks to understand it in detail, and returns a precise answer to the question.
- a typical scenario is for an end user to enter a question in natural language form, much as if they were asking another person, and for the system to sift through vast amounts of potential evidence to return a ranked list of the most compelling, precise answers. These answers may also include summaries of their justifying or supporting evidence, allowing the user to quickly assess the evidence and select the correct answer.
- a document search can usually find documents or passages containing some keywords in common with the query, but lack the precision, depth, and understanding necessary to deliver correct answers with accurate confidence.
- An Internet web search engine has access to an immense source of information and can quickly find relevant web pages given a small number of query terms, such a search engine does not generate precise answers to the questions.
- a web search engine does not return answers; rather, it is designed to return a ranked list of web pages that the user may be trying to find.
- a challenge for even finding the relevant documents is the issue of choosing the right set of keywords to retrieve those documents.
- Many questions contain information that is not critical for answering the question, but is provided for educational and/or entertainment purposes.
- the question may use terms different from those used in evidence that may contain a correct answer.
- formulating an effective query that returns the relevant documents is a critical and non-trivial task.
- the question requires an answer that must be synthesized from multiple pieces of evidence from multiple source documents; that is, the answer is a list of items or a logical combination of two or more items. These answers do not appear in any one place. Rather, the QA technology must synthesize the answer from independent sources to form a final answer.
- aspects of the various embodiments implement the use of failures in QA systems to motivate inquiries for common sense knowledge, and employ crowd sourcing to respond to those inquiries. These failures can be used in QA processes to determine what common-sense knowledge would be useful to have in order to improve answer retrieval.
- One aspect of the QA system is to be able to discover and pose follow-on inquiries to a user (or an external expert community) that, if answered, will improve the ability of the QA system to understand and evaluate supporting evidence for questions.
- the acquired common-sense knowledge can be applied either off-line or during a live question answering session.
- specific QA process failures can be identified and used to specify specific gaps in the system's common-sense knowledge, which can then be filled.
- specific user-interface elements for common-sense knowledge questions are provided and employed.
- the QA system when the QA system is unable to obtain an answer with a high degree of confidence, the QA system generates and poses follow-on inquiries in order to acquire information that can change the degree of confidence in an answer.
- the QA system solicits responses to the follow-on inquiries from external sources either in online mode, in which case the external sources' response to the follow-on inquiry will influence the QA system's answer to the current question, or in offline mode, where follow-on inquiries are dispatched to an external expert community at a later time.
- the QA system may reformulate the question or request assistance from an outside source.
- crowd sourcing is a process that involves sending tasks to a distributed group of people.
- the task or problem is typically sent to an undefined public rather than a specific body.
- embodiments herein can evaluate agreement among the various respondents regarding responses to the inquiries in order to validate that the respondents are human and that the responses were not generated by an automated script.
- a question may be related to an interrogatory searching for specific information, such as, “What is the capital of New York?”
- a question may be posed in the form of an answer or statement, such as done in the popular game show “Jeopardy!”
- FIG. 1 is a flow diagram illustrating one non-limiting embodiment herein. According to FIG. 1 , one embodiment described herein enables a computer implemented method for enhancing the accuracy of a question-answer system in providing responses to questions inputted to the question-answer system.
- the first step of the method involves providing the QA system.
- the QA system uses multiple question answering processes and evidence from a corpus of data to provide answers to questions.
- the details regarding processes and evidence for an example QA system that can be used in a preferred embodiment are described in co-pending U.S. patent application Ser. No. 12/152,411, incorporated herein by reference.
- a question is input to the QA system.
- the question may be in the form of a statement or an answer seeking an appropriate question.
- a failure in a question answering process is determined.
- the QA system generates one or more candidate answers to the question with associated confidence scores based on results from scoring processes/algorithms for pieces of evidence extracted from a corpus of data.
- a failure may result either from an inability to generate a candidate answer with a confidence score above a threshold value or if the QA system cannot correctly interpret the question. Additionally, a failure may also result from an individual piece of evidence receiving a score below a threshold value.
- the missing piece of data/information may be data/information that would enable the QA system to improve a score for a piece of evidence, for example a passage, wherein the score for the piece of evidence is used in a confidence score for a candidate answer.
- the missing information may be any item of data, a fact, a syntactical relationship, a grammatical relationship, a logical rule, a taxonomy rule, a grammatical rule, or any other information that would increase a determined score for a piece of evidence that may support or refute a candidate answer to the question.
- a follow-on inquiry is output to obtain the missing piece of information.
- the inquiry may be directed to outside sources that can include a variety of users in an expert community who may be human users or may be other electronic systems capable of providing a response, such as other QA systems.
- a follow-on inquiry may involve, for example, keyword matching, expansion of the original question, and/or a request for lexical semantic relationships.
- the QA system might request a clarification of what sense a word is being used, or what type of information is being requested in the question.
- the QA system receives a response to the follow-on inquiry.
- the response is returned by a human user, expert community or other QA system.
- the response to the follow-on inquiry is validated to confirm the missing piece of data.
- the validation may include validation that the response is supported by a threshold number of experts, humans, or QA systems.
- the obtained missing piece of data is added into the question-answer system.
- the missing piece of data may any item of data, a fact, a syntactical relationship, a grammatical relationship, a logical rule, a taxonomy rule, a grammatical rule, or any other information that would increase a determined score for a piece of evidence that may support or refute a candidate answer to the question.
- the missing piece of data may be input into the corpus, algorithm, process, logical rule, or any other location or combination thereof wherein the data may affect the resulting score for a piece of evidence.
- At least one step of the method is carried out using a computer device.
- the response to the follow-on inquiry may be evaluated to determine whether or not the response was provided by a human respondent.
- the QA system 210 receives a question or questions 220 and searches a corpus of data 225 to extract pieces of evidence 230 , 240 , 250 that are evaluated by a number of algorithms in order to generate candidate answers 285 to the question 220 .
- the QA system 210 attempts to generate many candidate answers 285 to the question 220 presented. To do so, the QA system 210 considers a wide variety of information, e.g., texts of all kinds, web documents, reference books, novels, plays, encyclopedias, dictionaries, thesauri, textbooks, and technical reports, included in the corpus of data 225 .
- the corpus of data 225 includes quantities of digitally encoded, structured and unstructured information, such as fragments of documents, passages, internal or external knowledge bases, natural language documents, corporate intranets, reference books, textbooks, technical reports, blogs, etc. These lists are intended to be non-limiting examples of sources of information for the QA system 210 .
- the vast majority of the corpus of data 225 comprises a wide variety of natural language text. Some of the data may be structured (formal knowledge bases) and some of the data may be semi-structured (tagged text) or unstructured (untagged text) in order to help interpret text and refine answers.
- pieces of evidence refers to the specific information or data that the QA system 210 evaluates to refute or support candidate answers 285 to the question 220 .
- the QA system 210 draws pieces of evidence from the corpus of data 225 .
- the term piece of evidence is not intended to limit the length of evidence used and may include a document, passage from a document, data, meta-data, entry in a database or any other information capable of contributing to a confidence score for a candidate answer.
- ‘logical rules’ refer to the lexical, grammatical, and/or semantic relationships that the QA system 210 uses to generate and score candidate answers 285 to the question 220 based on the pieces of evidence. The logical rules enable the QA system 210 to draw an inference from the pieces of evidence in order to evaluate the candidate answers 285 .
- the QA system 210 extracts pieces of evidence from the corpus of data 225 .
- the pieces of evidence can be fit into three categories: good evidence 230 , bad evidence 240 , and marginal evidence 250 .
- the QA system 210 compares the question 220 to the data in the corpus of data 225 and assigns an evidence score to the extracted evidence based on how well the evidence matches the question 220 .
- Good evidence 230 is a piece of evidence with a high evidence score; that is, an evidence score above a previously established evidence threshold value such that it contributes significantly to a confidence score for a candidate answer.
- bad evidence 240 is a piece of evidence with such low relevance that it does not contribute to a confidence score for a candidate answer.
- a QA system 210 may not extract bad evidence from the corpus, or may extract bad evidence in order to evaluate and determine outright that this evidence will not provide a candidate answer with any confidence.
- there are also pieces of evidence that the QA system 210 is able to identify as relevant to the question and may produce an evidence score that contributes significantly to a confidence score for a candidate answer if a missing link or missing piece of information is provided.
- a missing link or missing piece of information could be described as all the marginal evidence, or a subset of the marginal evidence (either all relatively high scoring marginal evidence, all relatively low scoring marginal evidence, or some middle range of scores for the marginal evidence (based on predetermined score parameters)).
- the marginal evidence 250 is evidence that the QA system 210 can use in generating candidate answers 285 , but is lacking in some manner, such that the score for the piece of evidence does not contribute significantly to the overall confidence score for a candidate answer 285 .
- a low confidence score for all candidate answers 285 indicates that the QA system 210 should obtain additional information or assistance to further develop the confidence scores of the candidate answers 285 .
- low confidence scores may serve as a trigger for the QA system 210 to evaluate whether pieces of evidence 230 , 240 , 250 for a candidate answer 285 are marginal evidence 250 such that a missing information or missing link may be identified.
- the QA system 210 uses the good evidence 230 and the marginal evidence 250 to generate candidate answers 285 .
- Each candidate answer 285 is assigned a confidence score, which is an aggregation of the evidence scores.
- a candidate answer 285 with a low confidence scores; that is, confidence scored below a previously established confidence threshold value indicates that the QA system 210 should obtain additional information or assistance to further develop the confidence scores of the candidate answers 285 .
- bad evidence does not contribute to the candidate answers 285
- marginal evidence contributes only partially to the candidate answers 285
- good evidence provides high confidence in the candidate answers 285 .
- the QA system 210 evaluates a self-assessed probability that the candidate answer 285 is a correct answer to the question 220 , or in other words, the QA system 210 generates a confidence score for a candidate answer 285 .
- the QA system 210 analyzes the question to figure out what is being asked. It also analyzes the corpus of data 225 based on the question 220 in order to extract candidate answers 285 , and computes a reliable confidence in light of whatever supporting or refuting pieces of evidence 230 , 240 , 250 it finds.
- the QA system 210 attempts to justify the answer by multiple sources in the corpus of data 225 .
- the degree to which the probability that the candidate answer 285 is a correct answer to the question 220 correlates to the confidence score for the candidate answer 285 .
- the QA system 210 can then rank the candidate answers 285 based on the confidence scores.
- the QA system 210 generates follow-on inquiries 260 to supplement the marginal evidence 250 by identifying an aspect of the piece of evidence that is lacking, in other words, identifying the missing piece of information or missing link.
- the QA system 210 uses follow-on inquiries 260 to clarify the aspect of the evidence that the QA system 210 failed to understand.
- the follow-on inquiries 260 are sent to an external source 272 , which may include a community of potential respondents 270 , which may be on an electronic network, such as the Internet 275 .
- the validated responses may then be fed back into the QA system 210 as data, a fact, a syntactical relationship, a grammatical relationship, a logical rule, a taxonomy rule, a grammatical rule, or any other information that would increase a determined score for a piece of evidence that may support or refute a candidate answer to the question.
- the potential respondents 270 may be from an external expert community who may be human users or other electronic systems capable of providing a response, such as other QA systems.
- the responses 280 to the follow-on inquiries may include the missing information or missing link necessary to make the marginal evidence 250 useful in order to improve the confidence scores of one or more candidate answers 285 .
- Such missing information can be used to produce improved candidate answers 285 to the inputted question or can be used to produce subsequent follow-on inquiries 260 . In either case, the information can be used to enhance the internal knowledge base of the QA system 210 and improve the confidence in the candidate answers 285 .
- the missing information included in the responses 280 to the follow-on inquiries can also help repair flaws in the question answering processes used by the QA system 210 by incorporating the information of the response, and the manner that provided the response, into the question answering processes.
- the QA system 210 evaluates the responses 280 to the follow-on inquiries to determine agreement among the various respondents regarding the responses 280 to the follow-on inquiries, in order to validate that the respondents are human and that the responses were not generated by an automated script.
- Inputs to the QA system 210 may include questions 220 , the evidence extracted from the corpus of data 225 , and responses 280 to follow-on inquiries.
- Outputs from the QA system 210 include candidate answers 285 and follow-on inquiries 260 . This provides low cost, continuous knowledge acquisition.
- FIG. 3 shows one approach to identifying marginal evidence 250 .
- the QA system 210 receives a question 320 and parses the question into a collection of elements 340 .
- the QA system 210 searches the corpus of data 225 for a piece of evidence, for example a passage, such as 330 , to support or refute a candidate answer 285 to the question.
- the QA system 210 parses the passage 330 into a collection of elements 350 .
- the QA system 210 analyzes the passage 330 by seeking to match, or associate in some manner, the elements 340 in the question 320 and the elements 350 in the passage 330 based on lexical, grammatical, and/or semantic relationships.
- the QA system 210 may, for example, attempt to match the various individual elements, such as 345 , 355 with corresponding semantic roles in the question 320 and the passage 330 .
- the QA system 210 then classifies the passage as good, bad, or marginal as indicated at 360 .
- ‘marginal’ means that some part of the passage 330 may be relevant, but it needs additional information to improve a score for the piece of evidence based on a scoring algorithm or process. This additional information can be labeled as a “missing link” or “missing information” that, when connected or combined with the other information in the passage 330 , enables the QA system 210 to further develop the confidence score of the candidate answers 285 .
- the inputs to the QA system 210 include the question 320 and the passage 330 that is used for comparison to the question 320 .
- Outputs from the QA system 210 include classification of the passage 330 into good, bad, and marginal matches to the question 320 , or simply identification of the marginal evidence without requiring identification of the good or bad evidence.
- the marginal evidence includes missing information thus follow-on inquiries 260 can be generated in order provide the missing information from an external source.
- the QA system 210 may employ a variety of specific mechanisms for finding marginal evidence. Aligning questions to sample passages is one of the ways that the QA system 210 uses evidence to evaluate candidate answers 285 . Given an answer key, it can be used to drive the search for near misses. In general, there are many kinds of “near miss” failures that the QA system 210 could encounter, for example:
- mismatched elements such as 345 , 355
- a follow-on inquiry 260 can be used to determine whether the mismatched elements are equivalent.
- Such follow-on inquiry 260 can use the equivalence to decide if the passage 330 aligns with the question 320 , and can also be used to resolve similar alignment problems in future questions.
- the QA system 210 analyzes lexical, grammatical, and semantic relationships of the words within each question 320 ; therefore, the QA system 210 breaks each question 320 down into many separate elements 340 (including keywords, equivalent keywords, logical relationships, restrictions, subject categories, etc.).
- the good evidence 230 matches a sufficient number of the elements to provide high score for the piece of evidence; that is, a score above a threshold value that contributes significantly to a confidence score for a candidate answer 285 .
- the marginal evidence 250 matches some of the elements of the question 320 , but not all such elements resulting in a score for the piece of evidence below a previously established threshold value.
- the systems and methods herein identify the elements of the question 320 that the marginal evidence elements were not able to match.
- the systems and methods herein identify the portions of the question 320 that were not provided by the marginal evidence 250 , and generate follow-on inquiries 260 to request the external sources 272 to supply information to clarify the portions of the question 320 that were not provided by the marginal evidence 250 .
- the follow-on inquiries 260 may use a natural language format.
- the systems and methods herein automatically identify the missing link that, if known, would increase the confidence score for one or more candidate answers 285 .
- This missing link can be an item of data, a fact, a syntactical relationship, a grammatical relationship, a logical rule, a taxonomy rule, a grammatical rule, etc.
- systems and methods herein can receive a number of responses (from, for example, a crowd sourcing environment). These responses can be filtered to make sure that the responses are from actual humans (as opposed to computerized answering systems), for example, based on responses to supply missing information that a machine would have trouble answering.
- the responses can be filtered to make sure that the responses are above a certain level of accuracy (based upon the reputation of the responder, correlation with the known correct answer, agreement of the responses with one another, etc.). Then, once the responses are filtered, the high-quality, human-based responses can be utilized to increase of the knowledge base of the question answer system, and/or also used to generate additional rules to help the question answer system score and rank the candidate answers 285 .
- FIG. 4 demonstrates a practical application of the approach to identify marginal evidence illustrated in FIG. 3 .
- the QA system 210 compares the question 420 to the passage 430 .
- the question 420 is “Eleazar killed one of these huge beasts.”
- the question 420 is looking for an answer as to what type of beast was killed by Eleazar.
- the piece of evidence, or passage 430 has been identified as relevant to answering the question 420 .
- the QA system 210 evaluates the text for lexical, grammatical, and/or semantic relationships among the elements 440 of the question 420 and the elements 450 of the passage 430 .
- the QA system 210 can match some elements, such as Eleazar 445 , to conclude that the passage is of some relevance.
- the QA system 210 may not be able to determine that “stabbed” 457 and “killed” 447 have a logical relationship. This failure of the QA system 210 reveals the missing information or missing link 460 . In this example, the missing link is to resolve whether “killed” 447 is logically related to “stabbed” 457 .
- the systems and methods herein could generate a follow-on inquiry 260 that asks for a crowd source response to the question “does stabbing imply killing?” If the response 280 to this follow-on inquiry is to the affirmative, the systems and methods herein can automatically learn that the two words may be synonyms. According to an embodiment herein, the system concludes that the passage 430 would receive a higher score and contribute more significantly to the confidence score for a candidate answer 285 of “elephant” if “killed” is logically related to “stabbed.”
- FIG. 5 provides examples of some specific examples of follow-on inquiries 260 .
- natural language follow-on inquiries 510 are actual natural language questions generated by the QA system 210 that can be supplied directly to external sources 272 , such as another QA system, another information source, or human respondents 270 on an electronic network (such as the Internet 275 ), so that the QA system 210 can acquire the missing information needed to better respond to the question 220 .
- the follow-on inquiries can be multiple-choice taxonomies using text and/or diagrams 515 .
- synonyms are different words with similar or almost identical meanings
- a hyponym is a word or phrase whose semantic field is included within that of another word; for example: rose is a hyponym of flower
- a hypernym is a word with a general meaning that has basically the same meaning of a more specific word; for example, the word “color” is a hypernym for red, green, blue, brown, etc.
- the systems and methods herein allow the QA system 210 to answer questions more similarly to a human expert and to be customized for different localities. More specifically (with reference to answering the question of FIG. 4 ), purely logical rules may require that the correct answer in the multiple-choice example 515 be selection “D” because “stab” and “kill” sometimes overlap, but not always (surely logically eliminating answers A-C). However, depending upon local speech customs, “killing” and “stabbing” can be considered synonyms.
- the systems and methods herein allow the QA system 210 to answer questions with higher confidence, and provides more flexibility in its word definitions and grammatical/logical rules.
- the ability of the systems and methods herein to automatically learn of human peculiarities by utilizing crowd sourced responses allows the QA system 210 to respond more consistently as a human would when generating answers to questions. This further underscores the need to filter out non-human responses 280 to the follow-on inquiry because non-human responses may give the correct, albeit purely logical response, if supplied by a machine-based answering system.
- the QA system 210 herein is able to receive information a human would consider to be a correct response (even if such a response might not be the most correct answer in a purely logical sense).
- the QA system 210 can receive a number of responses, for example, from a crowd sourcing environment or an external expert community. These responses can be filtered to make sure that the responses are from actual humans, as opposed to computerized answering systems, and that the responses are above a certain level of accuracy either based upon the reputation of the responder, correlation with the known correct answer, or agreement of the responses with one another.
- the question is looking for a “star”; however, the QA system 210 may not know if that means a star in the sky or a star on the stage.
- An appropriate answer to the question is “Samuel Kane”. It is possible that a first source from the corpus of data identifies Samuel Kane as an actor. However, the QA system may not be able to determine that Samuel Kane is a “star.” As such, the QA system has identified missing information or a missing link regarding the lexical relationship between an actor and a star.
- the QA system 210 may direct some follow-on inquiries. Some examples of follow-on inquiries may include:
- the QA system 210 Using follow-on inquiries, the QA system 210 tries to determine more about being an actor and being a star. By evaluating the responses to the follow-on inquiries, the QA system 210 determines that this question is asking for a “star.” If the QA system 210 finds a possible answer that is an actor, can it be certain that this answer is a star? Conversely, if the QA system 210 finds a possible answer that is an actor, should it suspect that this answer is a star? According to one resource, the QA system 210 has found a possible answer: Samuel Kane. Based on that information, the QA system 210 believes that Samuel Kane is an actor. Should the QA system 210 conclude that Samuel Kane is a star because it believes that Samuel Kane is an actor? Should the QA system 210 suspect that Samuel Kane is a star because it believes that Samuel Kane is an actor?
- the question is looking for several specific elements.
- An appropriate answer to the question is “Marco Antonio Regil.”
- the QA system 210 uses the question text to build a keyword search question.
- the QA system 210 considers many possible expansions of the question; e.g., show is related to program, born is related to birth, television is related to TV, etc.
- An embodiment herein can find this relevant passage since it contains the correct answer and some keywords from the clue.
- the QA system 210 can then look for expansions to the original question that would have produced this passage.
- the QA system 210 finds several expansions: quiz show is related to game show, Mexico is related to Mexican, 60's is related to 1969. These could be used as training data to train a more effective question expander if they are actually implied by the clue. Thus, this embodiment can enable the following follow-on inquiries:
- the QA system 210 can present follow-on inquiries to potential respondents 270 (internet users, other QA system, etc.) requesting potential respondents 270 to rank the terms of the question from most relevant to the topic of this question to least relevant:
- the QA system 210 can present follow-on inquiries to potential respondents 270 (internet users, other QA system, etc.) requesting potential respondents 270 to rate the terms on a number scale based on relevance to the topic of this question, for example rate from 1-10 in term of relevance the following terms:
- Another embodiment herein employs relation detection for knowledge-based lookup to generate follow-on inquiries.
- relation detection is described below: Question: “She appeared on the big screen as George Powell in the Hollywood blockbuster K-PAX.”
- the question is looking for a specific person's name.
- An appropriate answer to the question is “Mary McCormack.”
- the QA system 210 may use the question text and a structured knowledge base to arrive at the correct answer.
- the structured knowledge base may have an entry labeled Role_In_Movie (“Mary McCormack”, “Rachel Powell,” “K-PAX”).
- Role_In_Movie (“Mary McCormack”, “Rachel Powell,” “K-PAX”).
- the QA system 210 would have gotten the answer correct had it concluded that the question was asking for the specific variable that satisfies the following structured question: played_Role_In_Movie (???, “Rachel Powell,” “K-PAX”).
- the system does not have a detection pattern for Played_Role_In_Movie that matches this clue. It does have a pattern for Played_Role_In_Movie (X,Y,Z) of the form “X played Y in Z”. Thus, it knows that if the text had been “She played Rachel Powell in K-PAX,” then it would have detected this relation and gotten the question right; and as such, it could present a context like this to the respondents 270 .
- the QA system 210 uses several criteria: e.g., is the candidate answer satisfying similar lexical and semantic relations (e.g. for a query about an actress starring in a movie, is the candidate answer a female, and does the candidate answer satisfy actor-in-movie relation?); how well does the candidate answer and the query align; how well do the terms match, and do the terms exist in similar order.
- similar lexical and semantic relations e.g. for a query about an actress starring in a movie, is the candidate answer a female, and does the candidate answer satisfy actor-in-movie relation?
- the language and knowledge processing infrastructure of the QA system 210 combines statistical and heuristic techniques to assess its own knowledge and produce its best candidate answer 285 with an accurate confidence—a measure of the likelihood it is correct based on a self-assessment of its sources, inference methods, and prior performance.
- some of the respondents 270 on the Internet 275 may provide incorrect or misleading result.
- the systems and methods herein can utilize a crowd sourcing technique to obtain responses to the follow-on inquiries 260 . Crowd sourcing involves asking external sources 272 , such as an expert community, which can be many human Internet/computer users, to provide individual responses to the follow-on inquiries. Understandably, some of the responses from some respondents 270 will be incorrect.
- the “correctness” of the response is a relative statement because, as shown above in the examples in FIG. 5 , some semantic and grammatical human ways of asking and answering questions may not be purely logically “correct.” Therefore, what is considered a strong synonym by humans may not be considered a synonym under purely logical rules. Thus, the systems and methods herein learn what the majority of the respondents 270 consider to be the “correct” responses to the follow-on inquiries and use such as a standard of what is “correct” in order to become more humanlike.
- the QA system 210 can employ many alternative approaches to validating responses, three examples of which are illustrated in FIGS. 6-8 . More specifically, FIGS. 6 , 7 , and 8 illustrate verification schemes that may be employed to determine the accuracy of the information submitted to the QA system 210 .
- one embodiment herein permits only outside sources with demonstrated accuracy in providing previous information 645 , such as correct answers 285 to previous questions, to provide answers to follow-on inquiries 260 .
- the QA system 210 can fill-in and classify marginal evidence, and supply answers generally.
- the same follow-on inquiry 260 is given to multiple potential respondents 270 . If several respondents 270 provide the same result, the QA system 210 can generally trust the answer.
- one embodiment herein permits outside sources to supply answers that match with the results the QA system 210 has determined regarding all the good and bad evidence 775 .
- the QA system 210 can generally trust the respondents 270 that agree with the QA system 210 on the good evidence and bad evidence 775 . Since the accuracy of the QA system 210 regarding the classifications of the good evidence 750 and the bad evidence 760 is beyond dispute, it can be implied that respondents 270 that agree with these assessments are more likely than not to be accurate in order to provide responses to follow-on inquiries 780 that match with its own assessments, can fill-in and classify marginal evidence, and supply responses generally.
- one embodiment herein permits specifically identified outside sources to supply answers 885 if they demonstrate a sufficient amount of accuracy in relation to a known trusted source 880 , such as a human expert.
- a trusted source 880 provides a response for several examples.
- the QA system 210 can generally trust respondents 270 that often agree with the trusted source 880 on those examples.
- Accuracy in any of the embodiments can be determined by tracking the success rate of the outside source or sources 272 in relation to the metrics and comparisons indicated in the above embodiments. This can be done by keeping track of responses in relation to the above embodiments for definite duration or an infinite duration, and it can be done internally by the QA system 210 , or by another tracking system or method known in the art.
- FIGS. 6 , 7 , and 8 can be employed individually, or they can be combined in any manner.
- the verification techniques illustrated in FIGS. 6 , 7 , and 8 can be used in hybrid verification schemes by mixing the features of portions of each method.
- the verification scheme shown in FIG. 8 can compare the determinations of the reliable trusted source 880 on good and bad evidence 775 to those of the other respondents 270 to determine which outside source will be permitted to respond to the QA system 210 .
- the verification scheme can be a combination metric of answers provided to questions, answers to follow-on inquiries, and/or classifications regarding evidence provided by the reliable outside source in relation to the answers provided to questions, answers to follow-on inquiries, and/or classifications regarding evidence provided by the other outside sources.
- the verification scheme can combine any of the methods in any manner in order to generate a hybrid metric that permits the outside source to respond to the QA system 210 .
- the external or outside sources referenced throughout this application include, but are not limited to, sources accessible to the QA system 210 such as human sources, electronic sources, such as another QA system, or any other source accessible by the QA system 210 that is capable to facilitate responses to the QA system 210 according to the principles embodied in the present disclosure.
- the QA system 210 described herein is an application of advanced natural language processing, information retrieval, knowledge representation and reasoning, and machine learning technologies to the field of open-domain question answering using technology for hypothesis generation, massive evidence gathering, analysis, and scoring.
- the QA system 210 described herein determines a confidence in its answer 285 . If that confidence is low, the system realizes that it may not understand the question. For example, there may be a pun or some syntax that the QA system 210 does not understand. On the other hand, if the confidence is high, the QA system 210 knows it likely understood the question and stands a good chance of getting that question right. Having sufficient information, the QA system 210 can always find documents or passages containing some keywords in common with the question but may lack the precision, depth, and understanding necessary to deliver correct answers with accurate confidence.
- An additional embodiment herein uses the failures of the QA system to generate questions to determine whether the outside responding source is a human source. As described above, the failures of the QA system motivate follow-on inquiries to employ common sense knowledge and crowd sourcing techniques in order to respond to those follow-on inquiries. According to another embodiment, the QA system can evaluate the nature of the responses received and determine that a respondent is human.
- FIG. 9 is a flow diagram illustrating one non-limiting embodiment herein. According to FIG. 9 , one embodiment described herein enables a computer implemented method for validating that a user is human.
- the first step of the method involves providing a question answering system.
- the QA system uses question answering processes and evidence passages to provide responses to questions.
- a question is input to the QA system.
- the question may be in the form of a statement or an answer seeking an appropriate question.
- a failure in a question answering process is determined.
- the QA system generates one or more candidate answers to the question with associated confidence scores based on results from scoring processes/algorithms for pieces of evidence extracted from a corpus of data.
- a failure may result either from an inability to generate a candidate answer with a confidence score above a threshold value or if the QA system cannot correctly interpret the question. Additionally, a failure may also result from an individual piece of evidence receiving a score below a threshold value.
- the missing piece of data/information may be data/information that would enable the QA system to improve a score for a piece of evidence, for example a passage, wherein the score for the piece of evidence is used in a confidence score for a candidate answer.
- the missing information may be any item of data, a fact, a syntactical relationship, a grammatical relationship, a logical rule, a taxonomy rule, a grammatical rule, or any other information that would increase a determined score for a piece of evidence that may support or refute a candidate answer to the question.
- an inquiry is output to outside sources in order to obtain the missing piece of data.
- the inquiry may be directed to outside sources that can include a variety of users who can be human users or electronic systems capable of providing a response, such as other QA systems.
- a follow-on inquiry may involve, for example, keyword matching, expansion of the original question, and/or a request for lexical semantic relationships.
- the QA system might request a clarification of what sense a word is being used, or what type of information is being requested.
- the follow-on inquiry may ask a question for which the answer is known by the QA system.
- the follow-on inquiry may ask a question for which the answer is not known by the QA system.
- the QA system evaluates the nature of the response to determine whether the outside or external responding source is human 970 .
- the QA system 210 can do this by keeping track of how other humans have responded to questions or follow-on inquiries, and it can compare a response from an external source to the tracked responses. Responses that agree with responses from other humans can indicate that a respondent is human. These can be the same, similar, or different follow-on inquiries and questions. If the response matches well, the QA system can determine that the respondent was human. Afterwards, the QA system may determine the answers to questions for which the answer is not already known based on consensus among users who were previously known to be human.
- Another method that the QA system can use to determine if the responding source is human is to phrase the question or follow-on inquiry in natural language fashion.
- the QA system can then assess the accuracy of the response and/or determine whether or not the response itself is in natural language format.
- the system can perform several types of analyses.
- the QA system 210 can perform a syntactic analysis by parsing the answer to determine if the answer conformation to syntactic rules of a language, for example English.
- the QA system 210 can check to see if the answer is semantically similar by comparing the predicate argument structure to a collection of human produced text.
- the phrase “A quasar can star in a honor movie” is syntactically well formed but the predicate “star” never occurs together with “quasar” and “honor movie.”
- This can be checked in a lexical database such as Prismatic, as described in J. Fan et al., “Prismatic: Introducing Knowledge from a Large Scale Lexical Relation Resource,” Proceedings of the NAACL HLT 2010 First International Workshop on Formalisms and Methodology by Reading, pages 122-127, June 2010.
- the QA system can use general questions, natural language or otherwise, that humans have a known particular way of responding. Using such general questions, the QA system can determine whether the responding source is human.
- the present invention applies to all QA systems now known and as may be developed in the art, and can be implemented by computer or electronic devices now know (or that may become known) in the art.
- a question answering (QA) system includes a processor, an evidence analysis module connected to the processor, a first interface connected to the processor and a second interface connected to the processor, and a corpus of data connected to the evidence analysis module.
- the QA system is the type capable of producing evidence in support of a candidate answer.
- a first question to be answered by the QA system is provided through the first interface.
- the processor creates a collection of candidate answers to the first question from the corpus of data. Each candidate answer has supporting evidence and a score generated by the processor.
- the evidence analysis module produces a second question (i.e. follow-up inquiry) based on the supporting evidence.
- the processor presents the second question through the second interface to one or more users.
- the processor receives at least one response or knowledge item from one or more users through the second interface.
- the processor validates the at least one response and determines whether a user is human based on comparing the at least one response or knowledge item with other answers provided to the second question.
- the processor inputs validated responses into the corpus of data to improve the ability of the QA system to answer questions.
- the new response or knowledge item changes the supporting evidence for the first question and the scores for the candidate answers. Based on the changed evidence, the QA system generates an answer to the first question through the first interface.
- the system can be scaled up or down depending on different application requirements.
- an article of manufacture includes a computer readable medium having computer readable instructions embodied therein for performing the steps of the computer implemented methods, including but not limited to the methods illustrated in FIGS. 1 and 9 .
- Any combination of one or more computer readable non-transitory medium(s) may be utilized.
- the computer readable medium may be a computer readable signal medium or a computer readable storage medium.
- the non-transitory computer storage medium stores instructions, and a processor executes the instructions to perform the methods described herein.
- a computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing.
- FIG. 10 illustrates exemplary articles of manufacture, such as, a magnetic storage device 560 , a portable compact disc read-only memory (CD-ROM) 570 , and a “plug-and-play” memory device 580 , like a USB flash drive. Any of these devices may have computer readable instructions for carrying out the steps of the methods described above with reference to FIGS. 1 and 9 .
- the computer program instructions may be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
- the computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- a program constituting the software may be installed into a computer with dedicated hardware, from a storage medium or a network, and the computer is capable of performing various functions if with various programs installed therein.
- FIG. 11 A representative hardware environment for practicing the embodiments herein is depicted in FIG. 11 .
- the system comprises at least one processor or central processing unit (CPU) 610 .
- the CPUs 610 are interconnected via system bus 612 to various devices such as a random access memory (RAM) 614 , read-only memory (ROM) 616 , and an input/output (I/O) adapter 618 .
- RAM random access memory
- ROM read-only memory
- I/O input/output
- the I/O adapter 618 can connect to peripheral devices, such as disk units 611 and tape drives 613 , or other program storage devices that are readable by the system.
- the system can read the inventive instructions on the program storage devices and follow these instructions to execute the methodology of the embodiments herein.
- CPUs 610 perform various processing based on a program stored in a Read Only Memory (ROM) 616 or a program loaded from a peripheral device, such as disk units 611 and tape drives 613 to a Random Access Memory (RAM) 614 .
- ROM Read Only Memory
- RAM Random Access Memory
- required data when the CPU 610 performs the various processing or the like is also stored as necessary.
- the CPU 610 , the ROM 616 , and the RAM 614 are connected to one another via a bus 612 .
- An input/output adapter 618 is also connected to the bus 612 to provide an input/output interface, as necessary.
- a removable medium such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like, is installed on the peripheral device, as necessary, so that a computer program read therefrom may be installed into the RAM 614 , as necessary.
- the system further includes a user interface adapter 619 that connects a keyboard 615 , mouse 617 , speaker 624 , microphone 622 , and/or other user interface devices such as a touch screen device (not shown) to the bus 612 to gather user input.
- a communication adapter 620 including a network interface card such as a LAN card, a modem, or the like connects the bus 612 to a data processing network 625 .
- the communication adapter 620 performs communication processing via a network such as the Internet.
- a display adapter 621 connects the bus 612 to a display device 623 , which may be embodied as an output device such as a monitor (such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), or the like), printer, or transmitter, for example.
- a monitor such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), or the like
- printer or transmitter
- the program that constitutes the software may be installed from a network such as the Internet or a storage medium such as the removable medium.
- the storage medium is not limited to the peripheral device having the program stored therein as illustrated in FIG. 11 , which is distributed separately from the device for providing the program to the user.
- a removable medium include a magnetic disk (including a floppy disk), an optical disk (including a Compact Disk-Read Only Memory (CD-ROM) and a Digital Versatile Disk (DVD)), a magneto-optical disk (including a Mini-Disk (MD) (registered trademark)), and a semiconductor memory.
- the storage medium may be the ROM 616 , a hard disk contained in the storage section 611 , or the like, which has the program stored therein and is distributed to the user together with the device that contains them.
- aspects of the systems and methods herein may be embodied as a system, method, or computer program product. Accordingly, aspects of the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present disclosure may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
- the computer readable medium may be a computer readable signal medium or a computer readable storage medium.
- the non-transitory computer storage medium stores instructions, and a processor executes the instructions to perform the methods described herein.
- a computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing.
- a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
- a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof.
- a computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
- Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
- Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++, or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages.
- the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server.
- the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
- LAN local area network
- WAN wide area network
- Internet Service Provider for example, AT&T, MCI, Sprint, EarthLink, MSN, GTE, etc.
- each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
- the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
- Deployment types include loading directly in the client, server, and proxy computers via loading a storage medium such as a CD, DVD, etc.
- the process software may also be automatically or semi-automatically deployed into a computer system by sending the process software to a central server or a group of central servers. The process software is then downloaded into the client computers that will execute the process software. The process software is sent directly to the client system via e-mail. The process software is then either detached to a directory or loaded into a directory by a button on the e-mail that executes a program that detaches the process software into a directory. Alternatively, the process software is sent directly to a directory on the client computer hard drive.
- the process will select the proxy server code, determine on which computers to place the proxy servers' code, transmit the proxy server code, and then install the proxy server code on the proxy computer.
- the process software will be transmitted to the proxy server, and then stored on the proxy server.
- the process software may be deployed by manually loading directly in the client, server, and proxy computers via loading a storage medium such as a CD, DVD, etc.
- the process software may also be automatically or semi-automatically deployed into a computer system by sending the process software to a central server or a group of central servers. The process software is then downloaded into the client computers that will execute the process software. Alternatively, the process software is sent directly to the client system via e-mail. The process software is then either detached to a directory or loaded into a directory by a button on the e-mail that executes a program that detaches the process software into a directory. Another alternative is to send the process software directly to a directory on the client computer hard drive.
- the process will select the proxy server code, determine on which computers to place the proxy servers' code, transmit the proxy server code, and then install the proxy server code on the proxy computer.
- the process software will be transmitted to the proxy server, and then stored on the proxy server.
- step 700 begins the deployment of the process software.
- the first thing is to determine if there are any programs that will reside on a server or servers when the process software is executed 701 . If this is the case, then the servers that will contain the executables are identified 809 .
- the process software for the server or servers is transferred directly to the servers' storage via FTP or some other protocol, or by copying through the use of a shared file system 810 .
- the process software is then installed on the servers 811 .
- a proxy server is a server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server. The two primary benefits of a proxy server are to improve performance and to filter requests. If a proxy server is required, then the proxy server is installed 801 . The process software is sent to the servers either via a protocol such as FTP or it is copied directly from the source files to the server files via file sharing 802 .
- Another embodiment would be to send a transaction to the servers that contain the process software and have the server process the transaction, then receive and copy the process software to the server's file system. Once the process software is stored at the servers, the users, via their client computers, then access the process software on the servers and copy it to their client computers file systems 803 . Another embodiment is to have the servers automatically copy the process software to each client and then run the installation program for the process software at each client computer. The users execute the program that installs the process software on their client computer 812 , and then exit the process 708 .
- step 704 a determination is made whether the process software is to be deployed by sending the process software to users via e-mail.
- the set of users where the process software will be deployed are identified together with the addresses of the user client computers 705 .
- the process software is sent via e-mail 804 to each of the users' client computers.
- the users receive the e-mail 805 and then detach the process software from the e-mail to a directory on their client computers 806 .
- the users execute the program that installs the process software on their client computer 812 , and then exit the process 708 .
- the process software is transferred directly to the users' client computer directory 807 . This can be done in several ways such as but not limited to sharing of the file system directories and then copying from the sender's file system to the recipient users' file system or alternatively using a transfer protocol such as File Transfer Protocol (FTP).
- FTP File Transfer Protocol
- the users access the directories on their client file systems in preparation for installing the process software 808 .
- the users execute the program that installs the process software on their client computer 812 , and then exit the process 708 .
- the process software is integrated into a client, server, and network environment by providing for the process software to coexist with applications, operating systems, and network operating systems software, and then installing the process software on the clients and servers in the environment where the process software will function.
- the first step is to identify any software on the clients and servers including the network operating system where the process software will be deployed that are required by the process software or that work in conjunction with the process software.
- the software applications and version numbers will be identified and compared to the list of software applications and version numbers that have been tested to work with the process software. Those software applications that are missing or that do not match the correct version will be upgraded with the correct version numbers.
- Program instructions that pass parameters from the process software to the software applications will be checked to ensure the parameter lists match the parameter lists required by the process software.
- parameters passed by the software applications to the process software will be checked to ensure the parameters match the parameters required by the process software.
- the client and server operating systems including the network operating systems will be identified and compared to the list of operating systems, version numbers, and network software that have been tested to work with the process software. Those operating systems, version numbers, and network software that do not match the list of tested operating systems and version numbers will be upgraded on the clients and servers to the required level.
- the integration is completed by installing the process software on the clients and servers.
- step 820 begins the integration of the process software.
- the first thing is to determine if there are any process software programs that will execute on a server or servers 821 . If this is not the case, then integration proceeds to 827 . If this is the case, then the server addresses are identified 822 .
- the servers are checked to see if they contain software that includes the operating system (OS), applications, and network operating systems (NOS), together with their version numbers, that have been tested with the process software 823 .
- the servers are also checked to determine if there is any missing software that is required by the process software 823 .
- OS operating system
- NOS network operating systems
- the unmatched versions are updated on the server or servers with the correct versions 825 . Additionally, if there is missing required software, then it is updated on the server or servers 825 .
- the server integration is completed by installing the process software 826 .
- Step 827 determines if there are any programs of the process software that will execute on the clients. If no process software programs execute on the clients, the integration proceeds to 830 and exits. If this not the case, then the client addresses are identified 828 .
- the clients are checked to see if they contain software that includes the operating system (OS), applications, and network operating systems (NOS), together with their version numbers, that have been tested with the process software 829 .
- the clients are also checked to determine if there is any missing software that is required by the process software 829 .
- the unmatched versions are updated on the clients with the correct versions 832 .
- the client integration is completed by installing the process software on the clients 833 .
- the integration proceeds to 830 and exits.
- the process software can be stored on a shared file system accessible from one or more servers.
- the process software is executed via transactions that contain data and server processing requests that use CPU units on the accessed server.
- CPU units are units of time such as minutes, seconds, hours on the central processor of the server. Additionally, the assessed server may make requests of other servers that require CPU units.
- CPU units are an example that represents one measurement of use. Other measurements of use include but are not limited to network bandwidth, memory usage, storage usage, packet transfers, complete transactions etc.
- the summed measurements of use units are periodically multiplied by unit costs and the resulting total process software application service costs are alternatively sent to the customer and/or indicated on a web site accessed by the customer, which then remits payment to the service provider.
- the service provider requests payment directly from a customer account at a banking or financial institution.
- the payment owed to the service provider is reconciled to the payment owed by the service provider to minimize the transfer of payments.
- the process software is shared, simultaneously serving multiple customers in a flexible, automated fashion. It is standardized, requiring little customization, and it is scalable, providing capacity on demand in a pay-as-you-go model.
- the process software can be stored on a shared file system accessible from one or more servers.
- the process software is executed via transactions that contain data and server processing requests that use CPU units on the accessed server.
- CPU units are units of time such as minutes, seconds, hours on the central processor of the server. Additionally, the assessed server may make requests of other servers that require CPU units.
- CPU units are an example that represents one measurement of use. Other measurements of use include but are not limited to network bandwidth, memory usage, storage usage, packet transfers, complete transactions etc.
- the measurements of use used for each service and customer are sent to a collecting server that sums the measurements of use for each customer for each service that was processed anywhere in the network of servers that provide the shared execution of the process software.
- the summed measurements of use units are periodically multiplied by unit costs and the resulting total process software application service costs are alternatively sent to the customer and/or indicated on a web site accessed by the customer, which then remits payment to the service provider.
- the service provider requests payment directly from a customer account at a banking or financial institution.
- the payment owed to the service provider is reconciled to the payment owed by the service provider to minimize the transfer of payments.
- step 840 begins the On Demand process.
- a transaction is created that contains the unique customer identification, the requested service type, and any service parameters that further specify the type of service 841 .
- the transaction is then sent to the main server 842 .
- the main server can initially be the only server, then, as capacity is consumed, other servers are added to the On Demand environment.
- the server central processing unit (CPU) capacities in the On Demand environment are queried 843 .
- the CPU requirement of the transaction is estimated, then the servers' available CPU capacity in the On Demand environment are compared to the transaction CPU requirement to see if there is sufficient CPU capacity available in any server to process the transaction 844 . If there is not sufficient server CPU capacity available, then additional server CPU capacity is allocated to process the transaction 848 . If there was already sufficient CPU capacity available, then the transaction is sent to a selected server 845 .
- On Demand environment Before executing the transaction, a check is made of the remaining On Demand environment to determine if the environment has sufficient available capacity for processing the transaction.
- This environment capacity consists of such things as, but not limited to, network bandwidth, processor memory, storage etc. 846 . If there is not sufficient available capacity, then capacity will be added to the On Demand environment 847 . Next, the required software to process the transaction is accessed, loaded into memory, then the transaction is executed 849 .
- the usage measurements are recorded 850 .
- the usage measurements consist of the portions of those functions in the On Demand environment that are used to process the transaction.
- the usage of such functions as, but not limited to, network bandwidth, processor memory, storage and CPU cycles are what is recorded.
- the usage measurements are summed, multiplied by unit costs, and then recorded as a charge to the requesting customer 851 . If the customer has requested that the On Demand costs be posted to a web site 852 , then they are posted 853 .
- On Demand costs are sent via e-mail to a customer address 854 , then they are sent 855 . If the customer has requested that the On Demand costs be paid directly from a customer account 856 , then payment is received directly from the customer account 857 . The last step is to exit the On Demand process 858 .
- the process software may be deployed, accessed and executed through the use of a virtual private network (VPN), which is any combination of technologies that can be used to secure a connection through an otherwise unsecured or untrusted network.
- VPN virtual private network
- the use of VPNs is to improve security and for reduced operational costs.
- the VPN makes use of a public network, usually the Internet, to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, the VPN uses “virtual” connections routed through the Internet from the company's private network to the remote site or employee.
- the process software may be deployed, accessed, and executed through either a remote-access or a site-to-site VPN.
- the process software is deployed, accessed, and executed via the secure, encrypted connections between a company's private network and remote users through a third-party service provider.
- the enterprise service provider (ESP) sets a network access server (NAS) and provides the remote users with desktop client software for their computers.
- the telecommuters can then dial a toll-free number or attach directly via a cable or DSL modem to reach the NAS and use their VPN client software to access the corporate network and to access, download, and execute the process software.
- the process software When using the site-to-site VPN, the process software is deployed, accessed, and executed through the use of dedicated equipment and large-scale encryption, which are used to connect a company's multiple fixed sites over a public network, such as the Internet.
- the process software is transported over the VPN via tunneling, which is the process of placing an entire packet within another packet and sending it over a network.
- tunneling is the process of placing an entire packet within another packet and sending it over a network.
- the protocol of the outer packet is understood by the network and both points, called tunnel interfaces, where the packet enters and exits the network.
- step 860 begins the Virtual Private Network (VPN) process.
- VPN Virtual Private Network
- NAS network access server
- the remote users can then access the process software by dialing into the NAS or attaching directly via a cable or DSL modem into the NAS 865 .
- This allows entry into the corporate network where the process software is accessed 866 .
- the process software is transported to the remote users' desktop over the network via tunneling. That is, the process software is divided into packets and each packet, including the data and protocol, is placed within another packet 867 .
- the process software arrives at the remote users' desktop, it is removed from the packets, reconstituted, and executed on the remote users' desktop 868 .
- the process software After the site-to-site VPN has been built, or if it had been previously established, the users access the process software via the VPN 872 .
- the process software is transported to the site users over the network via tunneling 873 . That is, the process software is divided into packets and each packet, including the data and protocol, is placed within another packet 874 .
- the process software arrives at the remote users' desktop, it is removed from the packets, reconstituted, and executed on the site users' desktop 875 . Proceed to exit the process 863 .
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- General Health & Medical Sciences (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
- This application is a Continuation of U.S. application Ser. No. 13/547,436 filed Jul. 12, 2012, which claims the benefit under 35 U.S.C. §120 as a non-provisional of U.S. patent application Ser. No. 61/508,287 entitled “A Method for Validating That a User Is Human,” filed on Jul. 15, 2011, the entire teachings of which are incorporated herein by reference, in their entirety.
- In addition, the present application is related to presently pending U.S. patent application Ser. No. 12/152,411 entitled “System and Method for Providing Answers to Questions,” filed on May 14, 2008, presently pending U.S. patent application Ser. No. 12/126,642 entitled “System and Method for Providing Question and Answers with Deferred Type Evaluation,” filed May 21, 2008, presently pending U.S. patent application Ser. No. 12/724,156, entitled, “Questions and Answers Generation,” filed Mar. 15, 2010, and to presently pending U.S. patent application Ser. No. 13/547,492 entitled “Utilizing Failures in Question and Answer System Responses to Enhance the Accuracy of Question and Answer Systems,” filed Jul. 12, 2012, the entire teachings of each are incorporated herein by reference.
- The present disclosure relates to question answering (QA) systems, and more specifically, to validation that a user of a QA system is human.
- Conventional technologies provide challenge systems for use with computer platforms to verify that a user of the computer platform is a human and not an automated response script. Typically, an audio or visual CAPTCHA device may be used for authentication or to prevent automated software from performing actions that are undesired. A CAPTCHA is a type of challenge-response test used in computing to ensure that the response is generated by a person instead of by an automated device. The process usually involves a computer asking a user to complete a simple test that the computer is able to recognize. The test is designed to be easy for a computer to generate, but difficult for a computer to solve. Therefore, if a correct solution is received, it can be presumed to have been entered by a human. A common type of CAPTCHA requires the user to type letters or digits from a distorted image that appears on the screen. Such tests are commonly used to prevent unwanted automated programs from accessing a computer platform.
- Embodiments herein disclose a mechanism for generating questions, presenting a question to a user, and using a response from the user to determine if the user is human.
- Embodiments herein disclose a mechanism in which an automated question answering system generates secondary questions, asks those questions to a pool of users, and improves its ability to answer questions based on responses from those users.
- According to an embodiment herein, a method of validating that a user is human is disclosed. A user question is generated using a computerized device. The user question is output to a user. A user response to the user question is received from the user. The user response is validated as having been provided by a human.
- According to another embodiment herein, a method of determining that a user of a question-answer system is human is disclosed. A question is received into a computerized question-answer system operating on a computerized device to provide an automatically generated answer to the question. A plurality of candidate answers to the question is generated by the computerized device. The sources of evidence used to generate the plurality of candidate answers are evaluated to identify marginal evidence. The marginal evidence contributes only partially to a candidate answer. The computerized device determines a confidence score for each of the plurality of candidate answers. The computerized device identifies information not provided by the marginal evidence that could further develop the confidence score. At least one follow-on inquiry is formulated based on the information. The follow-on inquiry is output to external sources separate from the question-answer system to obtain responses to the follow-on inquiry. At least one response to the inquiry is received from the external sources. Whether the at least one response to the at least one follow-on inquiry was provided by a human respondent is determined based on one of: a previous determination that a respondent is human, and syntactic or semantic characteristics of the at least one response.
- According to another embodiment herein, a method is disclosed. A first question to be answered by a Question Answering (QA) system is provided to a processor. The processor creates a collection of candidate answers to the first question. The collection of candidate answers is created from a corpus of data. The processor generates supporting evidence and a confidence score for each candidate answer. An evidence analysis module produces a second question based on the supporting evidence. The processor presents the second question to one or more external sources separate from the QA system to obtain responses to the second question. The processor receives at least one response or knowledge item from the one or more external sources. The processor determines whether a respondent is human based on one of: a previous determination that a respondent is human, and syntactic or semantic characteristics of the at least one response or knowledge item provided to the second question.
- According to another embodiment herein, another method is disclosed. A question is received into a Question Answering (QA) system. The QA system compares the question to a corpus of data. The QA system generates hypotheses about relationships between linguistic and semantic entities of the question and the corpus of data. The QA system generates a plurality of candidate answers to the question using the hypotheses. The QA system evaluates sources of evidence used to generate the plurality of candidate answers to identify marginal evidence. The marginal evidence contributes only partially to a candidate answer. The QA system determines a confidence score for each of the plurality of candidate answers. A missing piece of common-sense knowledge that would enable the QA system to further develop the confidence score is determined. A follow-on inquiry to obtain the missing piece of common-sense knowledge is formulated. The follow-on inquiry is output to an external expert community source separate from the QA system to obtain responses to the follow-on inquiry. Responses comprising the missing piece of common-sense knowledge are received from the external expert community source. A common-sense knowledge inquiry is generated. The common-sense knowledge inquiry is output to the external expert community source. A response to the common-sense knowledge inquiry is received from the external expert community source. Whether the respondent is human is determined based on syntactic or semantic characteristics of the response to the common-sense knowledge inquiry.
- According to another embodiment herein, a computerized device for determining that a user is human is disclosed. The computerized device comprises a question-answer system comprising software for performing a plurality of question answering processes. A receiver receives a question into the question-answer system. A processor that generates a plurality of candidate answers to the question is connected to the question-answer system. The processor evaluates sources of evidence used to generate the plurality of candidate answers to identify marginal evidence. The marginal evidence only partially contributes to a candidate answer. The processor determines a confidence score for each of the plurality of candidate answers. The processor identifies information not provided by the marginal evidence that could further develop the confidence score. The processor generates at least one follow-on inquiry based on the information. A network interface outputs the at least one follow-on inquiry to external sources separate from the question-answer system to obtain responses to the follow-on inquiry and receives from the external sources at least one response to the at least one follow-on inquiry. The processor evaluates whether the at least one response to the at least one follow-on inquiry was provided by a human respondent based on one of: a previous determination that a respondent is human and syntactic or semantic characteristics of the at least one response.
- According to another embodiment herein, a computer system for verifying that a user is human is disclosed. The computer system comprises an automated question answering (QA) system comprising a corpus of data, a processor, and a network interface. The processor has software for performing a plurality of question answering processes. The processor generates a user question from the corpus of data. The network interface outputs the user question to a user separate from the QA system and receives a user response to the user question from the user. The processor determines whether the user is human based on syntactic or semantic characteristics of the response to the user question.
- According to another embodiment herein, a question answering (QA) system is disclosed. The QA system comprises a processor. An evidence analysis module is connected to the processor. A first interface is connected to the processor. A second interface is connected to the processor. A corpus of data is connected to the evidence analysis module. The first interface provides a first question to be answered by the QA system. The processor creates a collection of candidate answers to the first question from the corpus of data. Each candidate answer has supporting evidence and a confidence score generated by the processor. The evidence analysis module produces a second question based on the supporting evidence. The processor presents the second question through the second interface to one or more external sources separate from the QA system to obtain responses to the second question. The processor receives at least one response or knowledge item from one or more external sources through the second interface. The processor determines whether a user is human based on one of: a previous determination that a respondent is human and syntactic or semantic characteristics of the at least one response or knowledge item obtained for the second question.
- According to another embodiment herein, a non-transitory computer readable storage medium readable by a computerized device is disclosed. The computerized device comprises a question-answer system comprising question answering processes. The non-transitory computer readable storage medium stores instructions executable by the computerized device to perform a method. According to the method, a user question is generated. The user question is output to a user. A user response to the user question is received from the user. The user response is validated as having been provided by a human.
- The embodiments herein will be better understood from the following detailed description with reference to the drawings, which are not necessarily drawn to scale and in which:
-
FIG. 1 is a flow diagram of a method according to an embodiment herein; -
FIG. 2 is an illustration of aspects of a system according to an embodiment herein; -
FIG. 3 is an illustration of aspects of a system according to an embodiment herein; -
FIG. 4 is an illustration of aspects of a system according to an embodiment herein; -
FIG. 5 is an illustration of inquiry examples according to an embodiment herein; -
FIG. 6 is an illustration of aspects of a system according to an embodiment herein; -
FIG. 7 is an illustration of aspects of a system according to an embodiment herein; -
FIG. 8 is an illustration of aspects of a system according to an embodiment herein; -
FIG. 9 is a flow diagram of a method according to an embodiment herein; -
FIG. 10 is an illustration of articles of manufacture according to embodiments herein; -
FIG. 11 is a schematic diagram of a hardware system according to embodiments herein. -
FIG. 12 is a schematic diagram of a deployment system according to embodiments herein; -
FIG. 13 is a schematic diagram of an integration system according to embodiments herein; -
FIG. 14 is a schematic diagram of an on demand system according to embodiments herein; -
FIG. 15 is a schematic diagram of a virtual private network system according to embodiments herein; and -
FIG. 16 is a schematic diagram of a virtual private network system according to embodiments herein. - It will be readily understood that the embodiments herein, as generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations in addition to the described embodiments. Thus, the following detailed description of the embodiments herein, as represented in the figures, is not intended to limit the scope of the invention, as defined by the appended claims, but is merely representative of selected embodiments. The following description is intended only by way of example, and simply illustrates certain selected embodiments herein.
- The QA system described herein is not merely a document search system. One key difference between QA technology and simple document search technology is that document search typically takes a keyword query and merely returns a list of documents, ranked in order of relevance to the query. On the other hand, QA technology takes a question expressed in natural language, seeks to understand it in detail, and returns a precise answer to the question. A typical scenario is for an end user to enter a question in natural language form, much as if they were asking another person, and for the system to sift through vast amounts of potential evidence to return a ranked list of the most compelling, precise answers. These answers may also include summaries of their justifying or supporting evidence, allowing the user to quickly assess the evidence and select the correct answer.
- Given sufficient search data, a document search can usually find documents or passages containing some keywords in common with the query, but lack the precision, depth, and understanding necessary to deliver correct answers with accurate confidence.
- While an Internet web search engine has access to an immense source of information and can quickly find relevant web pages given a small number of query terms, such a search engine does not generate precise answers to the questions. A web search engine does not return answers; rather, it is designed to return a ranked list of web pages that the user may be trying to find.
- A challenge for even finding the relevant documents is the issue of choosing the right set of keywords to retrieve those documents. Many questions contain information that is not critical for answering the question, but is provided for educational and/or entertainment purposes. Moreover, the question may use terms different from those used in evidence that may contain a correct answer. As a result, formulating an effective query that returns the relevant documents is a critical and non-trivial task.
- In some cases, the question requires an answer that must be synthesized from multiple pieces of evidence from multiple source documents; that is, the answer is a list of items or a logical combination of two or more items. These answers do not appear in any one place. Rather, the QA technology must synthesize the answer from independent sources to form a final answer.
- Classic knowledge-based artificial intelligence approaches to QA systems try to logically prove an answer is correct from a logical encoding of the question and all the domain knowledge required to answer it. Such approaches are stymied by the prohibitive time and manual effort required to acquire massive volumes of knowledge and formally encode it as logical formulas accessible to computer algorithms, and the difficulty of understanding natural language questions well enough to exploit such formal encodings if available. Consequently, QA systems tend to falter in terms of breadth, but when they succeed, they are very precise.
- Aspects of the various embodiments implement the use of failures in QA systems to motivate inquiries for common sense knowledge, and employ crowd sourcing to respond to those inquiries. These failures can be used in QA processes to determine what common-sense knowledge would be useful to have in order to improve answer retrieval. One aspect of the QA system is to be able to discover and pose follow-on inquiries to a user (or an external expert community) that, if answered, will improve the ability of the QA system to understand and evaluate supporting evidence for questions. Additionally, the acquired common-sense knowledge can be applied either off-line or during a live question answering session. Furthermore, specific QA process failures can be identified and used to specify specific gaps in the system's common-sense knowledge, which can then be filled. Moreover, specific user-interface elements for common-sense knowledge questions are provided and employed.
- According to embodiments herein, when the QA system is unable to obtain an answer with a high degree of confidence, the QA system generates and poses follow-on inquiries in order to acquire information that can change the degree of confidence in an answer. The QA system solicits responses to the follow-on inquiries from external sources either in online mode, in which case the external sources' response to the follow-on inquiry will influence the QA system's answer to the current question, or in offline mode, where follow-on inquiries are dispatched to an external expert community at a later time.
- It is often the case that the information need is not well captured by the QA system, as the question processing part may fail to classify the question properly or the information needed for extracting and generating the answer is not easily retrieved. In such cases, the QA system may reformulate the question or request assistance from an outside source.
- The use of an external source of information to obtain information is known in the art as crowd sourcing. Crowd sourcing is a process that involves sending tasks to a distributed group of people. In crowd sourcing, the task or problem is typically sent to an undefined public rather than a specific body. Using failures of the QA system to motivate inquiries for common sense knowledge and employing crowd sourcing to respond to those inquiries, embodiments herein can evaluate agreement among the various respondents regarding responses to the inquiries in order to validate that the respondents are human and that the responses were not generated by an automated script.
- In some embodiments, a question may be related to an interrogatory searching for specific information, such as, “What is the capital of New York?” In some embodiments, a question may be posed in the form of an answer or statement, such as done in the popular game show “Jeopardy!”
-
FIG. 1 is a flow diagram illustrating one non-limiting embodiment herein. According toFIG. 1 , one embodiment described herein enables a computer implemented method for enhancing the accuracy of a question-answer system in providing responses to questions inputted to the question-answer system. - The first step of the method, at 110, involves providing the QA system. The QA system uses multiple question answering processes and evidence from a corpus of data to provide answers to questions. The details regarding processes and evidence for an example QA system that can be used in a preferred embodiment are described in co-pending U.S. patent application Ser. No. 12/152,411, incorporated herein by reference.
- In the next step of the method, at 120, a question is input to the QA system. The question may be in the form of a statement or an answer seeking an appropriate question.
- Next, at 130, a failure in a question answering process is determined. The QA system generates one or more candidate answers to the question with associated confidence scores based on results from scoring processes/algorithms for pieces of evidence extracted from a corpus of data. A failure may result either from an inability to generate a candidate answer with a confidence score above a threshold value or if the QA system cannot correctly interpret the question. Additionally, a failure may also result from an individual piece of evidence receiving a score below a threshold value.
- At 140, the failure is used to determine a missing piece of information. The missing piece of data/information may be data/information that would enable the QA system to improve a score for a piece of evidence, for example a passage, wherein the score for the piece of evidence is used in a confidence score for a candidate answer. The missing information may be any item of data, a fact, a syntactical relationship, a grammatical relationship, a logical rule, a taxonomy rule, a grammatical rule, or any other information that would increase a determined score for a piece of evidence that may support or refute a candidate answer to the question.
- Next, at 150, a follow-on inquiry is output to obtain the missing piece of information. The inquiry may be directed to outside sources that can include a variety of users in an expert community who may be human users or may be other electronic systems capable of providing a response, such as other QA systems. A follow-on inquiry may involve, for example, keyword matching, expansion of the original question, and/or a request for lexical semantic relationships. For example, the QA system might request a clarification of what sense a word is being used, or what type of information is being requested in the question.
- At 160, the QA system receives a response to the follow-on inquiry. The response is returned by a human user, expert community or other QA system. At 170, the response to the follow-on inquiry is validated to confirm the missing piece of data. The validation may include validation that the response is supported by a threshold number of experts, humans, or QA systems.
- Finally, at 180, the obtained missing piece of data is added into the question-answer system. Again, the missing piece of data may any item of data, a fact, a syntactical relationship, a grammatical relationship, a logical rule, a taxonomy rule, a grammatical rule, or any other information that would increase a determined score for a piece of evidence that may support or refute a candidate answer to the question. The missing piece of data may be input into the corpus, algorithm, process, logical rule, or any other location or combination thereof wherein the data may affect the resulting score for a piece of evidence.
- In some embodiments, at least one step of the method is carried out using a computer device. In some embodiments, the response to the follow-on inquiry may be evaluated to determine whether or not the response was provided by a human respondent.
- Referring to
FIG. 2 , a general workflow of theQA system 210 is shown. TheQA system 210 receives a question orquestions 220 and searches a corpus ofdata 225 to extract pieces ofevidence question 220. TheQA system 210 attempts to generate many candidate answers 285 to thequestion 220 presented. To do so, theQA system 210 considers a wide variety of information, e.g., texts of all kinds, web documents, reference books, novels, plays, encyclopedias, dictionaries, thesauri, textbooks, and technical reports, included in the corpus ofdata 225. - The corpus of
data 225 includes quantities of digitally encoded, structured and unstructured information, such as fragments of documents, passages, internal or external knowledge bases, natural language documents, corporate intranets, reference books, textbooks, technical reports, blogs, etc. These lists are intended to be non-limiting examples of sources of information for theQA system 210. The vast majority of the corpus ofdata 225 comprises a wide variety of natural language text. Some of the data may be structured (formal knowledge bases) and some of the data may be semi-structured (tagged text) or unstructured (untagged text) in order to help interpret text and refine answers. - As used herein, ‘pieces of evidence’ refers to the specific information or data that the
QA system 210 evaluates to refute or support candidate answers 285 to thequestion 220. TheQA system 210 draws pieces of evidence from the corpus ofdata 225. The term piece of evidence is not intended to limit the length of evidence used and may include a document, passage from a document, data, meta-data, entry in a database or any other information capable of contributing to a confidence score for a candidate answer. Additionally, as used herein, ‘logical rules’ refer to the lexical, grammatical, and/or semantic relationships that theQA system 210 uses to generate and score candidate answers 285 to thequestion 220 based on the pieces of evidence. The logical rules enable theQA system 210 to draw an inference from the pieces of evidence in order to evaluate the candidate answers 285. - In trying to generate candidate answers 285, the
QA system 210 extracts pieces of evidence from the corpus ofdata 225. The pieces of evidence, based on the question, can be fit into three categories:good evidence 230,bad evidence 240, andmarginal evidence 250. TheQA system 210 compares thequestion 220 to the data in the corpus ofdata 225 and assigns an evidence score to the extracted evidence based on how well the evidence matches thequestion 220. Sometimes there is data in the corpus ofdata 225 that clearly and directly relates to the input question. This is referred to as “good” evidence.Good evidence 230 is a piece of evidence with a high evidence score; that is, an evidence score above a previously established evidence threshold value such that it contributes significantly to a confidence score for a candidate answer. Conversely,bad evidence 240 is a piece of evidence with such low relevance that it does not contribute to a confidence score for a candidate answer. AQA system 210 may not extract bad evidence from the corpus, or may extract bad evidence in order to evaluate and determine outright that this evidence will not provide a candidate answer with any confidence. Lastly, there are also pieces of evidence that theQA system 210 is able to identify as relevant to the question and may produce an evidence score that contributes significantly to a confidence score for a candidate answer if a missing link or missing piece of information is provided. A missing link or missing piece of information could be described as all the marginal evidence, or a subset of the marginal evidence (either all relatively high scoring marginal evidence, all relatively low scoring marginal evidence, or some middle range of scores for the marginal evidence (based on predetermined score parameters)). Thus, if a piece of marginal evidence falls within some predetermined score range, it would be considered a piece of missing information, for which additional information will be obtained. In other words, themarginal evidence 250 is evidence that theQA system 210 can use in generating candidate answers 285, but is lacking in some manner, such that the score for the piece of evidence does not contribute significantly to the overall confidence score for acandidate answer 285. A low confidence score for all candidate answers 285 indicates that theQA system 210 should obtain additional information or assistance to further develop the confidence scores of the candidate answers 285. In other words, low confidence scores may serve as a trigger for theQA system 210 to evaluate whether pieces ofevidence candidate answer 285 aremarginal evidence 250 such that a missing information or missing link may be identified. - The
QA system 210 uses thegood evidence 230 and themarginal evidence 250 to generate candidate answers 285. Eachcandidate answer 285 is assigned a confidence score, which is an aggregation of the evidence scores. Acandidate answer 285 with a low confidence scores; that is, confidence scored below a previously established confidence threshold value indicates that theQA system 210 should obtain additional information or assistance to further develop the confidence scores of the candidate answers 285. In other words, bad evidence does not contribute to the candidate answers 285, marginal evidence contributes only partially to the candidate answers 285, and good evidence provides high confidence in the candidate answers 285. - For a candidate answer generated, the
QA system 210 evaluates a self-assessed probability that thecandidate answer 285 is a correct answer to thequestion 220, or in other words, theQA system 210 generates a confidence score for acandidate answer 285. In order to generate candidate answers 285, theQA system 210 analyzes the question to figure out what is being asked. It also analyzes the corpus ofdata 225 based on thequestion 220 in order to extract candidate answers 285, and computes a reliable confidence in light of whatever supporting or refuting pieces ofevidence candidate answer 285, theQA system 210 attempts to justify the answer by multiple sources in the corpus ofdata 225. The degree to which the probability that thecandidate answer 285 is a correct answer to thequestion 220 correlates to the confidence score for thecandidate answer 285. TheQA system 210 can then rank the candidate answers 285 based on the confidence scores. - The
QA system 210 generates follow-oninquiries 260 to supplement themarginal evidence 250 by identifying an aspect of the piece of evidence that is lacking, in other words, identifying the missing piece of information or missing link. TheQA system 210 uses follow-oninquiries 260 to clarify the aspect of the evidence that theQA system 210 failed to understand. According to an embodiment herein, the follow-oninquiries 260 are sent to anexternal source 272, which may include a community ofpotential respondents 270, which may be on an electronic network, such as theInternet 275. After theresponses 280 to the follow-on inquiries have been evaluated, the validated responses may then be fed back into theQA system 210 as data, a fact, a syntactical relationship, a grammatical relationship, a logical rule, a taxonomy rule, a grammatical rule, or any other information that would increase a determined score for a piece of evidence that may support or refute a candidate answer to the question. Thepotential respondents 270 may be from an external expert community who may be human users or other electronic systems capable of providing a response, such as other QA systems. Theresponses 280 to the follow-on inquiries may include the missing information or missing link necessary to make themarginal evidence 250 useful in order to improve the confidence scores of one or more candidate answers 285. Such missing information can be used to produce improved candidate answers 285 to the inputted question or can be used to produce subsequent follow-oninquiries 260. In either case, the information can be used to enhance the internal knowledge base of theQA system 210 and improve the confidence in the candidate answers 285. The missing information included in theresponses 280 to the follow-on inquiries can also help repair flaws in the question answering processes used by theQA system 210 by incorporating the information of the response, and the manner that provided the response, into the question answering processes. - In some embodiments herein, the
QA system 210 evaluates theresponses 280 to the follow-on inquiries to determine agreement among the various respondents regarding theresponses 280 to the follow-on inquiries, in order to validate that the respondents are human and that the responses were not generated by an automated script. - Inputs to the
QA system 210 may includequestions 220, the evidence extracted from the corpus ofdata 225, andresponses 280 to follow-on inquiries. Outputs from theQA system 210 include candidate answers 285 and follow-oninquiries 260. This provides low cost, continuous knowledge acquisition. -
FIG. 3 shows one approach to identifyingmarginal evidence 250. TheQA system 210 receives aquestion 320 and parses the question into a collection ofelements 340. TheQA system 210 searches the corpus ofdata 225 for a piece of evidence, for example a passage, such as 330, to support or refute acandidate answer 285 to the question. TheQA system 210 parses thepassage 330 into a collection ofelements 350. TheQA system 210 analyzes thepassage 330 by seeking to match, or associate in some manner, theelements 340 in thequestion 320 and theelements 350 in thepassage 330 based on lexical, grammatical, and/or semantic relationships. TheQA system 210 may, for example, attempt to match the various individual elements, such as 345, 355 with corresponding semantic roles in thequestion 320 and thepassage 330. TheQA system 210 then classifies the passage as good, bad, or marginal as indicated at 360. As used herein, ‘marginal’ means that some part of thepassage 330 may be relevant, but it needs additional information to improve a score for the piece of evidence based on a scoring algorithm or process. This additional information can be labeled as a “missing link” or “missing information” that, when connected or combined with the other information in thepassage 330, enables theQA system 210 to further develop the confidence score of the candidate answers 285. - In the approach illustrated in
FIG. 3 , the inputs to theQA system 210 include thequestion 320 and thepassage 330 that is used for comparison to thequestion 320. Outputs from theQA system 210 include classification of thepassage 330 into good, bad, and marginal matches to thequestion 320, or simply identification of the marginal evidence without requiring identification of the good or bad evidence. The marginal evidence includes missing information thus follow-oninquiries 260 can be generated in order provide the missing information from an external source. - The
QA system 210 may employ a variety of specific mechanisms for finding marginal evidence. Aligning questions to sample passages is one of the ways that theQA system 210 uses evidence to evaluate candidate answers 285. Given an answer key, it can be used to drive the search for near misses. In general, there are many kinds of “near miss” failures that theQA system 210 could encounter, for example: -
- Answer typing: the system could have determined that the answer had the correct type if only it had known that two types were equivalent
- Keyword search: the system could have found a relevant passage using a keyword search if only it had expanded some keyword in the clue; e.g., by synonyms, antonyms, related terms, etc.
- Relation detection for knowledge-base lookup: the system could have looked up the answer in a knowledge base if only it had figured out what relationship the question was asking for.
Each kind of near miss can imply some kind of semantic inquiry.
- In some embodiments, mismatched elements, such as 345, 355, may actually be equivalent or have a counterpart as a logically necessary consequence. A follow-on
inquiry 260 can be used to determine whether the mismatched elements are equivalent. Such follow-oninquiry 260 can use the equivalence to decide if thepassage 330 aligns with thequestion 320, and can also be used to resolve similar alignment problems in future questions. - The
QA system 210 analyzes lexical, grammatical, and semantic relationships of the words within eachquestion 320; therefore, theQA system 210 breaks eachquestion 320 down into many separate elements 340 (including keywords, equivalent keywords, logical relationships, restrictions, subject categories, etc.). For example, thegood evidence 230 matches a sufficient number of the elements to provide high score for the piece of evidence; that is, a score above a threshold value that contributes significantly to a confidence score for acandidate answer 285. For example, themarginal evidence 250 matches some of the elements of thequestion 320, but not all such elements resulting in a score for the piece of evidence below a previously established threshold value. The systems and methods herein identify the elements of thequestion 320 that the marginal evidence elements were not able to match. Thus, the systems and methods herein identify the portions of thequestion 320 that were not provided by themarginal evidence 250, and generate follow-oninquiries 260 to request theexternal sources 272 to supply information to clarify the portions of thequestion 320 that were not provided by themarginal evidence 250. In some embodiments, the follow-oninquiries 260 may use a natural language format. - In other words, the systems and methods herein automatically identify the missing link that, if known, would increase the confidence score for one or more candidate answers 285. This missing link can be an item of data, a fact, a syntactical relationship, a grammatical relationship, a logical rule, a taxonomy rule, a grammatical rule, etc. By generating the follow-on inquiry, systems and methods herein can receive a number of responses (from, for example, a crowd sourcing environment). These responses can be filtered to make sure that the responses are from actual humans (as opposed to computerized answering systems), for example, based on responses to supply missing information that a machine would have trouble answering. Additionally, the responses can be filtered to make sure that the responses are above a certain level of accuracy (based upon the reputation of the responder, correlation with the known correct answer, agreement of the responses with one another, etc.). Then, once the responses are filtered, the high-quality, human-based responses can be utilized to increase of the knowledge base of the question answer system, and/or also used to generate additional rules to help the question answer system score and rank the candidate answers 285.
-
FIG. 4 demonstrates a practical application of the approach to identify marginal evidence illustrated inFIG. 3 . InFIG. 4 , theQA system 210 compares thequestion 420 to thepassage 430. In the example ofFIG. 4 , thequestion 420 is “Eleazar killed one of these huge beasts.” In other words, thequestion 420 is looking for an answer as to what type of beast was killed by Eleazar. In other aspects of theQA system 210 not shown, the piece of evidence, orpassage 430, has been identified as relevant to answering thequestion 420. In performing the analysis between thepassage 430 and thequestion 420, theQA system 210 evaluates the text for lexical, grammatical, and/or semantic relationships among theelements 440 of thequestion 420 and theelements 450 of thepassage 430. In the example ofFIG. 4 , theQA system 210 can match some elements, such asEleazar 445, to conclude that the passage is of some relevance. However, theQA system 210 may not be able to determine that “stabbed” 457 and “killed” 447 have a logical relationship. This failure of theQA system 210 reveals the missing information ormissing link 460. In this example, the missing link is to resolve whether “killed” 447 is logically related to “stabbed” 457. Therefore, in this example, the systems and methods herein could generate a follow-oninquiry 260 that asks for a crowd source response to the question “does stabbing imply killing?” If theresponse 280 to this follow-on inquiry is to the affirmative, the systems and methods herein can automatically learn that the two words may be synonyms. According to an embodiment herein, the system concludes that thepassage 430 would receive a higher score and contribute more significantly to the confidence score for acandidate answer 285 of “elephant” if “killed” is logically related to “stabbed.” - According to an embodiment herein,
FIG. 5 provides examples of some specific examples of follow-oninquiries 260. As illustrated in Example 1 ofFIG. 5 , natural language follow-oninquiries 510 are actual natural language questions generated by theQA system 210 that can be supplied directly toexternal sources 272, such as another QA system, another information source, orhuman respondents 270 on an electronic network (such as the Internet 275), so that theQA system 210 can acquire the missing information needed to better respond to thequestion 220. - As illustrated in Example 2 of
FIG. 5 , given the context of the question and passage, the follow-on inquiries can be multiple-choice taxonomies using text and/or diagrams 515. As would be known in the relevant art, synonyms are different words with similar or almost identical meanings, a hyponym is a word or phrase whose semantic field is included within that of another word; for example: rose is a hyponym of flower, and a hypernym is a word with a general meaning that has basically the same meaning of a more specific word; for example, the word “color” is a hypernym for red, green, blue, brown, etc. - By acquiring responses in a crowd sourcing manner, the systems and methods herein allow the
QA system 210 to answer questions more similarly to a human expert and to be customized for different localities. More specifically (with reference to answering the question ofFIG. 4 ), purely logical rules may require that the correct answer in the multiple-choice example 515 be selection “D” because “stab” and “kill” sometimes overlap, but not always (surely logically eliminating answers A-C). However, depending upon local speech customs, “killing” and “stabbing” can be considered synonyms. By automatically learning that “killing” and “stabbing” are considered synonyms in a sufficient number of situations, the systems and methods herein allow theQA system 210 to answer questions with higher confidence, and provides more flexibility in its word definitions and grammatical/logical rules. The ability of the systems and methods herein to automatically learn of human peculiarities by utilizing crowd sourced responses allows theQA system 210 to respond more consistently as a human would when generating answers to questions. This further underscores the need to filter outnon-human responses 280 to the follow-on inquiry because non-human responses may give the correct, albeit purely logical response, if supplied by a machine-based answering system. TheQA system 210 herein is able to receive information a human would consider to be a correct response (even if such a response might not be the most correct answer in a purely logical sense). - According to embodiments herein, the
QA system 210 can receive a number of responses, for example, from a crowd sourcing environment or an external expert community. These responses can be filtered to make sure that the responses are from actual humans, as opposed to computerized answering systems, and that the responses are above a certain level of accuracy either based upon the reputation of the responder, correlation with the known correct answer, or agreement of the responses with one another. - An additional example of using follow-on inquiries is described below: Question: This star of “Emmerdale Farm” also plays Elvis in “If You Ever Get to Heaven.”
- In this example, the question is looking for a “star”; however, the
QA system 210 may not know if that means a star in the sky or a star on the stage. An appropriate answer to the question is “Samuel Kane”. It is possible that a first source from the corpus of data identifies Samuel Kane as an actor. However, the QA system may not be able to determine that Samuel Kane is a “star.” As such, the QA system has identified missing information or a missing link regarding the lexical relationship between an actor and a star. In an embodiment herein, theQA system 210 may direct some follow-on inquiries. Some examples of follow-on inquiries may include: -
- Is every actor a star?
- Is every star an actor?
- Are most actors also stars?
- Are many actors also stars?
- If I know that some entity is a star, would I suspect that this entity is an actor?
- If I know that some entity is an actor, would I suspect that this entity is a star?
- If I know that some entity is an actor, can I be certain that this entity is a star?
- Using follow-on inquiries, the
QA system 210 tries to determine more about being an actor and being a star. By evaluating the responses to the follow-on inquiries, theQA system 210 determines that this question is asking for a “star.” If theQA system 210 finds a possible answer that is an actor, can it be certain that this answer is a star? Conversely, if theQA system 210 finds a possible answer that is an actor, should it suspect that this answer is a star? According to one resource, theQA system 210 has found a possible answer: Samuel Kane. Based on that information, theQA system 210 believes that Samuel Kane is an actor. Should theQA system 210 conclude that Samuel Kane is a star because it believes that Samuel Kane is an actor? Should theQA system 210 suspect that Samuel Kane is a star because it believes that Samuel Kane is an actor? - An additional example herein employs question expansion to generate follow-on inquires, as follows:
- Question: “This television quiz show host from Mexico was born in the last few days of the 60's.”
- In this example, the question is looking for several specific elements. An appropriate answer to the question is “Marco Antonio Regil.” According to an embodiment herein, the
QA system 210 uses the question text to build a keyword search question. TheQA system 210 considers many possible expansions of the question; e.g., show is related to program, born is related to birth, television is related to TV, etc. There is a relevant piece of evidence or passage that states, “Marco Antonio Regil (born Dec. 27, 1969) is a Mexican television personality and game show host, born in Tijuana, Mexico.” An embodiment herein can find this relevant passage since it contains the correct answer and some keywords from the clue. TheQA system 210 can then look for expansions to the original question that would have produced this passage. TheQA system 210 finds several expansions: quiz show is related to game show, Mexico is related to Mexican, 60's is related to 1969. These could be used as training data to train a more effective question expander if they are actually implied by the clue. Thus, this embodiment can enable the following follow-on inquiries: -
- If a question is requesting information about a quiz show, can I be certain that information about a game show is relevant?
- If a question is requesting information about a quiz show, should I be suspect that information about a game show is relevant?
- If a question is requesting information about the 60's, can I be certain that information about 1969 is relevant?
- If a question is requesting information about the 60's, should I be certain that information about a 1969 is relevant?
- Additionally, the
QA system 210 can present follow-on inquiries to potential respondents 270 (internet users, other QA system, etc.) requestingpotential respondents 270 to rank the terms of the question from most relevant to the topic of this question to least relevant: - a) game show
- b) birth
- c) Mexican
- d) program
- e) TV
- f) 1969
- The
QA system 210 can present follow-on inquiries to potential respondents 270 (internet users, other QA system, etc.) requestingpotential respondents 270 to rate the terms on a number scale based on relevance to the topic of this question, for example rate from 1-10 in term of relevance the following terms: - a) game show
- b) birth
- c) Mexican
- d) program
- e) TV
- f) 1969
- Another embodiment herein employs relation detection for knowledge-based lookup to generate follow-on inquiries. An example of relation detection is described below: Question: “She appeared on the big screen as Rachel Powell in the Hollywood blockbuster K-PAX.”
- In this example, the question is looking for a specific person's name. An appropriate answer to the question is “Mary McCormack.” According to an embodiment herein, the
QA system 210 may use the question text and a structured knowledge base to arrive at the correct answer. The structured knowledge base may have an entry labeled Role_In_Movie (“Mary McCormack”, “Rachel Powell,” “K-PAX”). Thus, theQA system 210 would have gotten the answer correct had it concluded that the question was asking for the specific variable that satisfies the following structured question: played_Role_In_Movie (???, “Rachel Powell,” “K-PAX”). However, the system does not have a detection pattern for Played_Role_In_Movie that matches this clue. It does have a pattern for Played_Role_In_Movie (X,Y,Z) of the form “X played Y in Z”. Thus, it knows that if the text had been “She played Rachel Powell in K-PAX,” then it would have detected this relation and gotten the question right; and as such, it could present a context like this to therespondents 270. However, theQA system 210 did not fully understand the following question: “She appeared on the big screen as Rachel Powell in the Hollywood blockbuster K-PAX.” It thinks it may be able to simplify this question into the following question: “She played Rachel Powell in K-PAX.” It could then present one or more of the following questions given this context: Is this a valid simplification? Can you imagine a correct answer to the simplified form that is not a correct answer to the original question? Can you imagine a correct answer to the original question that is not a correct answer to the simplified form? The original question uses the word “Hollywood” but the simplified form does not. Is “Hollywood” implied in the simplified form? The original question uses the word “Hollywood” but the simplified form does not. Is “Hollywood” a very important concept for answering this question? Please rank the following terms from the original clue that are not in the simplified form as most important to least important in terms of what was lost in simplifying: - a) appeared
- b) big
- c) screen
- d) Hollywood
- e) blockbuster
- To compute the confidence scores for the candidate answers, the
QA system 210 uses several criteria: e.g., is the candidate answer satisfying similar lexical and semantic relations (e.g. for a query about an actress starring in a movie, is the candidate answer a female, and does the candidate answer satisfy actor-in-movie relation?); how well does the candidate answer and the query align; how well do the terms match, and do the terms exist in similar order. - The language and knowledge processing infrastructure of the
QA system 210 combines statistical and heuristic techniques to assess its own knowledge and produce itsbest candidate answer 285 with an accurate confidence—a measure of the likelihood it is correct based on a self-assessment of its sources, inference methods, and prior performance. Unfortunately, some of therespondents 270 on theInternet 275 may provide incorrect or misleading result. As noted above, the systems and methods herein can utilize a crowd sourcing technique to obtain responses to the follow-oninquiries 260. Crowd sourcing involves askingexternal sources 272, such as an expert community, which can be many human Internet/computer users, to provide individual responses to the follow-on inquiries. Understandably, some of the responses from somerespondents 270 will be incorrect. However, the “correctness” of the response is a relative statement because, as shown above in the examples inFIG. 5 , some semantic and grammatical human ways of asking and answering questions may not be purely logically “correct.” Therefore, what is considered a strong synonym by humans may not be considered a synonym under purely logical rules. Thus, the systems and methods herein learn what the majority of therespondents 270 consider to be the “correct” responses to the follow-on inquiries and use such as a standard of what is “correct” in order to become more humanlike. - Further, what is considered to be the “correct” response to a follow-on
inquiry 260 can vary from geographic place to place, depending upon local language usage of humans in the different areas. Therefore, the systems and methods herein not only learn from the majority of all respondents as to what is “correct”, but also learn what the “correct” response is for each of the different geographic areas in which theQA system 210 may be utilized. That is, what may be considered a very close synonym is North America may not be considered a synonym at all in Ireland despite sharing the common English language. The systems and methods herein, therefore, learn what humans consider to be the correct answer component on many different levels. - According to embodiments herein, the
QA system 210 can employ many alternative approaches to validating responses, three examples of which are illustrated inFIGS. 6-8 . More specifically,FIGS. 6 , 7, and 8 illustrate verification schemes that may be employed to determine the accuracy of the information submitted to theQA system 210. - According to
FIG. 6 , one embodiment herein permits only outside sources with demonstrated accuracy in providingprevious information 645, such ascorrect answers 285 to previous questions, to provide answers to follow-oninquiries 260. TheQA system 210 can fill-in and classify marginal evidence, and supply answers generally. In the embodiment ofFIG. 6 , the same follow-oninquiry 260 is given to multiplepotential respondents 270. Ifseveral respondents 270 provide the same result, theQA system 210 can generally trust the answer. - According to
FIG. 7 , one embodiment herein permits outside sources to supply answers that match with the results theQA system 210 has determined regarding all the good andbad evidence 775. Using results that theQA system 210 has already marked as “good” 750 or “bad” 760, theQA system 210 can generally trust therespondents 270 that agree with theQA system 210 on the good evidence andbad evidence 775. Since the accuracy of theQA system 210 regarding the classifications of thegood evidence 750 and thebad evidence 760 is beyond dispute, it can be implied thatrespondents 270 that agree with these assessments are more likely than not to be accurate in order to provide responses to follow-oninquiries 780 that match with its own assessments, can fill-in and classify marginal evidence, and supply responses generally. - According to
FIG. 8 , one embodiment herein permits specifically identified outside sources to supplyanswers 885 if they demonstrate a sufficient amount of accuracy in relation to a known trustedsource 880, such as a human expert. According to this embodiment, atrusted source 880 provides a response for several examples. TheQA system 210 can generally trustrespondents 270 that often agree with the trustedsource 880 on those examples. - Accuracy in any of the embodiments can be determined by tracking the success rate of the outside source or
sources 272 in relation to the metrics and comparisons indicated in the above embodiments. This can be done by keeping track of responses in relation to the above embodiments for definite duration or an infinite duration, and it can be done internally by theQA system 210, or by another tracking system or method known in the art. - Furthermore, the embodiments disclosed in
FIGS. 6 , 7, and 8 can be employed individually, or they can be combined in any manner. In some embodiments, the verification techniques illustrated inFIGS. 6 , 7, and 8 can be used in hybrid verification schemes by mixing the features of portions of each method. For example, the verification scheme shown inFIG. 8 can compare the determinations of the reliabletrusted source 880 on good andbad evidence 775 to those of theother respondents 270 to determine which outside source will be permitted to respond to theQA system 210. Similarly, the verification scheme can be a combination metric of answers provided to questions, answers to follow-on inquiries, and/or classifications regarding evidence provided by the reliable outside source in relation to the answers provided to questions, answers to follow-on inquiries, and/or classifications regarding evidence provided by the other outside sources. Furthermore, the verification scheme can combine any of the methods in any manner in order to generate a hybrid metric that permits the outside source to respond to theQA system 210. - All of the above schemes and methods enable a QA system to expand its knowledge base as can be contained in a database, correct its processes for future questions using external sources, such as human users on a network or other QA systems, and generally increase its accuracy. As should be apparent, the external or outside sources referenced throughout this application, whether explicitly stated or not, include, but are not limited to, sources accessible to the
QA system 210 such as human sources, electronic sources, such as another QA system, or any other source accessible by theQA system 210 that is capable to facilitate responses to theQA system 210 according to the principles embodied in the present disclosure. - The
QA system 210 described herein is an application of advanced natural language processing, information retrieval, knowledge representation and reasoning, and machine learning technologies to the field of open-domain question answering using technology for hypothesis generation, massive evidence gathering, analysis, and scoring. In addition to identifying ananswer 285, theQA system 210 described herein determines a confidence in itsanswer 285. If that confidence is low, the system realizes that it may not understand the question. For example, there may be a pun or some syntax that theQA system 210 does not understand. On the other hand, if the confidence is high, theQA system 210 knows it likely understood the question and stands a good chance of getting that question right. Having sufficient information, theQA system 210 can always find documents or passages containing some keywords in common with the question but may lack the precision, depth, and understanding necessary to deliver correct answers with accurate confidence. - An additional embodiment herein uses the failures of the QA system to generate questions to determine whether the outside responding source is a human source. As described above, the failures of the QA system motivate follow-on inquiries to employ common sense knowledge and crowd sourcing techniques in order to respond to those follow-on inquiries. According to another embodiment, the QA system can evaluate the nature of the responses received and determine that a respondent is human.
-
FIG. 9 is a flow diagram illustrating one non-limiting embodiment herein. According toFIG. 9 , one embodiment described herein enables a computer implemented method for validating that a user is human. - The first step of the method, at 910, involves providing a question answering system. The QA system uses question answering processes and evidence passages to provide responses to questions.
- In the next step of the method, at 920, a question is input to the QA system. The question may be in the form of a statement or an answer seeking an appropriate question.
- Next, at 930, a failure in a question answering process is determined. The QA system generates one or more candidate answers to the question with associated confidence scores based on results from scoring processes/algorithms for pieces of evidence extracted from a corpus of data. A failure may result either from an inability to generate a candidate answer with a confidence score above a threshold value or if the QA system cannot correctly interpret the question. Additionally, a failure may also result from an individual piece of evidence receiving a score below a threshold value.
- At 940, the failure is used to determine a missing piece of information. The missing piece of data/information may be data/information that would enable the QA system to improve a score for a piece of evidence, for example a passage, wherein the score for the piece of evidence is used in a confidence score for a candidate answer. The missing information may be any item of data, a fact, a syntactical relationship, a grammatical relationship, a logical rule, a taxonomy rule, a grammatical rule, or any other information that would increase a determined score for a piece of evidence that may support or refute a candidate answer to the question.
- Next, at 950, an inquiry is output to outside sources in order to obtain the missing piece of data. The inquiry may be directed to outside sources that can include a variety of users who can be human users or electronic systems capable of providing a response, such as other QA systems. A follow-on inquiry may involve, for example, keyword matching, expansion of the original question, and/or a request for lexical semantic relationships. For example, the QA system might request a clarification of what sense a word is being used, or what type of information is being requested. In some embodiments, the follow-on inquiry may ask a question for which the answer is known by the QA system. In some embodiments, the follow-on inquiry may ask a question for which the answer is not known by the QA system.
- At 960, after receiving a response from the responding source, the QA system evaluates the nature of the response to determine whether the outside or external responding source is human 970.
- The
QA system 210 can do this by keeping track of how other humans have responded to questions or follow-on inquiries, and it can compare a response from an external source to the tracked responses. Responses that agree with responses from other humans can indicate that a respondent is human. These can be the same, similar, or different follow-on inquiries and questions. If the response matches well, the QA system can determine that the respondent was human. Afterwards, the QA system may determine the answers to questions for which the answer is not already known based on consensus among users who were previously known to be human. - Another method that the QA system can use to determine if the responding source is human is to phrase the question or follow-on inquiry in natural language fashion. The QA system can then assess the accuracy of the response and/or determine whether or not the response itself is in natural language format. To determine if a response is in natural language format the system can perform several types of analyses. In one non-limiting example, the
QA system 210 can perform a syntactic analysis by parsing the answer to determine if the answer conformation to syntactic rules of a language, for example English. Similarly, theQA system 210 can check to see if the answer is semantically similar by comparing the predicate argument structure to a collection of human produced text. For example, the phrase “A quasar can star in a honor movie” is syntactically well formed but the predicate “star” never occurs together with “quasar” and “honor movie.” This can be checked in a lexical database such as Prismatic, as described in J. Fan et al., “Prismatic: Introducing Knowledge from a Large Scale Lexical Relation Resource,” Proceedings of the NAACL HLT 2010 First International Workshop on Formalisms and Methodology by Reading, pages 122-127, June 2010. In some embodiments, the QA system can use general questions, natural language or otherwise, that humans have a known particular way of responding. Using such general questions, the QA system can determine whether the responding source is human. These descriptions are merely exemplary in nature. It is contemplated that those skilled in the art can conceive and apply additional methods and techniques that will achieve the same result in accordance with the present disclosure and its principles. - The present invention applies to all QA systems now known and as may be developed in the art, and can be implemented by computer or electronic devices now know (or that may become known) in the art.
- According to another embodiment herein, a question answering (QA) system includes a processor, an evidence analysis module connected to the processor, a first interface connected to the processor and a second interface connected to the processor, and a corpus of data connected to the evidence analysis module. The QA system is the type capable of producing evidence in support of a candidate answer. A first question to be answered by the QA system is provided through the first interface. The processor creates a collection of candidate answers to the first question from the corpus of data. Each candidate answer has supporting evidence and a score generated by the processor. The evidence analysis module produces a second question (i.e. follow-up inquiry) based on the supporting evidence. The processor presents the second question through the second interface to one or more users. The processor receives at least one response or knowledge item from one or more users through the second interface. The processor validates the at least one response and determines whether a user is human based on comparing the at least one response or knowledge item with other answers provided to the second question. In some embodiments, the processor inputs validated responses into the corpus of data to improve the ability of the QA system to answer questions. The new response or knowledge item changes the supporting evidence for the first question and the scores for the candidate answers. Based on the changed evidence, the QA system generates an answer to the first question through the first interface. The system can be scaled up or down depending on different application requirements.
- According to a further embodiment herein, an article of manufacture is provided that includes a computer readable medium having computer readable instructions embodied therein for performing the steps of the computer implemented methods, including but not limited to the methods illustrated in
FIGS. 1 and 9 . Any combination of one or more computer readable non-transitory medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. The non-transitory computer storage medium stores instructions, and a processor executes the instructions to perform the methods described herein. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing.FIG. 10 illustrates exemplary articles of manufacture, such as, amagnetic storage device 560, a portable compact disc read-only memory (CD-ROM) 570, and a “plug-and-play”memory device 580, like a USB flash drive. Any of these devices may have computer readable instructions for carrying out the steps of the methods described above with reference toFIGS. 1 and 9 . - Aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to various embodiments. It will be understood that each block of the flowchart illustrations and/or two-dimensional block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. The computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- The computer program instructions may be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
- Furthermore, the computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- In case of implementing the embodiments herein by software and/or firmware, a program constituting the software may be installed into a computer with dedicated hardware, from a storage medium or a network, and the computer is capable of performing various functions if with various programs installed therein.
- A representative hardware environment for practicing the embodiments herein is depicted in
FIG. 11 . This schematic drawing illustrates a hardware configuration of an information handling/computer system in accordance with the embodiments herein. The system comprises at least one processor or central processing unit (CPU) 610. TheCPUs 610 are interconnected viasystem bus 612 to various devices such as a random access memory (RAM) 614, read-only memory (ROM) 616, and an input/output (I/O)adapter 618. The I/O adapter 618 can connect to peripheral devices, such asdisk units 611 and tape drives 613, or other program storage devices that are readable by the system. The system can read the inventive instructions on the program storage devices and follow these instructions to execute the methodology of the embodiments herein. - In
FIG. 11 ,CPUs 610 perform various processing based on a program stored in a Read Only Memory (ROM) 616 or a program loaded from a peripheral device, such asdisk units 611 and tape drives 613 to a Random Access Memory (RAM) 614. In theRAM 614, required data when theCPU 610 performs the various processing or the like is also stored as necessary. TheCPU 610, theROM 616, and theRAM 614 are connected to one another via abus 612. An input/output adapter 618 is also connected to thebus 612 to provide an input/output interface, as necessary. A removable medium, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like, is installed on the peripheral device, as necessary, so that a computer program read therefrom may be installed into theRAM 614, as necessary. - The system further includes a
user interface adapter 619 that connects akeyboard 615,mouse 617,speaker 624,microphone 622, and/or other user interface devices such as a touch screen device (not shown) to thebus 612 to gather user input. Additionally, acommunication adapter 620 including a network interface card such as a LAN card, a modem, or the like connects thebus 612 to adata processing network 625. Thecommunication adapter 620 performs communication processing via a network such as the Internet. Adisplay adapter 621 connects thebus 612 to adisplay device 623, which may be embodied as an output device such as a monitor (such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), or the like), printer, or transmitter, for example. - In the case where the above-described series of processing is implemented with software, the program that constitutes the software may be installed from a network such as the Internet or a storage medium such as the removable medium.
- Those skilled in the art would appreciate that, the storage medium is not limited to the peripheral device having the program stored therein as illustrated in
FIG. 11 , which is distributed separately from the device for providing the program to the user. Examples of a removable medium include a magnetic disk (including a floppy disk), an optical disk (including a Compact Disk-Read Only Memory (CD-ROM) and a Digital Versatile Disk (DVD)), a magneto-optical disk (including a Mini-Disk (MD) (registered trademark)), and a semiconductor memory. Alternatively, the storage medium may be theROM 616, a hard disk contained in thestorage section 611, or the like, which has the program stored therein and is distributed to the user together with the device that contains them. - As will be appreciated by one skilled in the art, aspects of the systems and methods herein may be embodied as a system, method, or computer program product. Accordingly, aspects of the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present disclosure may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
- Any combination of one or more computer readable non-transitory medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. The non-transitory computer storage medium stores instructions, and a processor executes the instructions to perform the methods described herein. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a magnetic storage device 560 (
FIG. 10 ), a portable compact disc read-only memory (CD-ROM) 570, an optical storage device, a “plug-and-play”memory device 580, like a USB flash drive, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. - A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
- Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
- Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++, or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
- The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments herein. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
- Deployment types include loading directly in the client, server, and proxy computers via loading a storage medium such as a CD, DVD, etc. The process software may also be automatically or semi-automatically deployed into a computer system by sending the process software to a central server or a group of central servers. The process software is then downloaded into the client computers that will execute the process software. The process software is sent directly to the client system via e-mail. The process software is then either detached to a directory or loaded into a directory by a button on the e-mail that executes a program that detaches the process software into a directory. Alternatively, the process software is sent directly to a directory on the client computer hard drive. When there are proxy servers, the process will select the proxy server code, determine on which computers to place the proxy servers' code, transmit the proxy server code, and then install the proxy server code on the proxy computer. The process software will be transmitted to the proxy server, and then stored on the proxy server.
- While it is understood that the process software may be deployed by manually loading directly in the client, server, and proxy computers via loading a storage medium such as a CD, DVD, etc., the process software may also be automatically or semi-automatically deployed into a computer system by sending the process software to a central server or a group of central servers. The process software is then downloaded into the client computers that will execute the process software. Alternatively, the process software is sent directly to the client system via e-mail. The process software is then either detached to a directory or loaded into a directory by a button on the e-mail that executes a program that detaches the process software into a directory. Another alternative is to send the process software directly to a directory on the client computer hard drive. When there are proxy servers, the process will select the proxy server code, determine on which computers to place the proxy servers' code, transmit the proxy server code, and then install the proxy server code on the proxy computer. The process software will be transmitted to the proxy server, and then stored on the proxy server.
- In
FIG. 12 ,step 700 begins the deployment of the process software. The first thing is to determine if there are any programs that will reside on a server or servers when the process software is executed 701. If this is the case, then the servers that will contain the executables are identified 809. The process software for the server or servers is transferred directly to the servers' storage via FTP or some other protocol, or by copying through the use of a sharedfile system 810. The process software is then installed on theservers 811. - Next, a determination is made on whether the process software is to be deployed by having users access the process software on a server or
servers 702. If the users are to access the process software on servers, then the server addresses that will store the process software are identified 703. - A determination is made if a proxy server is to be built 800 to store the process software. A proxy server is a server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server. The two primary benefits of a proxy server are to improve performance and to filter requests. If a proxy server is required, then the proxy server is installed 801. The process software is sent to the servers either via a protocol such as FTP or it is copied directly from the source files to the server files via
file sharing 802. Another embodiment would be to send a transaction to the servers that contain the process software and have the server process the transaction, then receive and copy the process software to the server's file system. Once the process software is stored at the servers, the users, via their client computers, then access the process software on the servers and copy it to their client computers filesystems 803. Another embodiment is to have the servers automatically copy the process software to each client and then run the installation program for the process software at each client computer. The users execute the program that installs the process software on theirclient computer 812, and then exit theprocess 708. - In
step 704, a determination is made whether the process software is to be deployed by sending the process software to users via e-mail. The set of users where the process software will be deployed are identified together with the addresses of theuser client computers 705. The process software is sent viae-mail 804 to each of the users' client computers. The users receive thee-mail 805 and then detach the process software from the e-mail to a directory on theirclient computers 806. The users execute the program that installs the process software on theirclient computer 812, and then exit theprocess 708. - Lastly, a determination is made on whether to the process software will be sent directly to user directories on their
client computers 706. If so, the user directories are identified 707. The process software is transferred directly to the users'client computer directory 807. This can be done in several ways such as but not limited to sharing of the file system directories and then copying from the sender's file system to the recipient users' file system or alternatively using a transfer protocol such as File Transfer Protocol (FTP). The users access the directories on their client file systems in preparation for installing theprocess software 808. The users execute the program that installs the process software on theirclient computer 812, and then exit theprocess 708. - The process software is integrated into a client, server, and network environment by providing for the process software to coexist with applications, operating systems, and network operating systems software, and then installing the process software on the clients and servers in the environment where the process software will function.
- The first step is to identify any software on the clients and servers including the network operating system where the process software will be deployed that are required by the process software or that work in conjunction with the process software. This includes the network operating system that is software that enhances a basic operating system by adding networking features.
- Next, the software applications and version numbers will be identified and compared to the list of software applications and version numbers that have been tested to work with the process software. Those software applications that are missing or that do not match the correct version will be upgraded with the correct version numbers. Program instructions that pass parameters from the process software to the software applications will be checked to ensure the parameter lists match the parameter lists required by the process software. Conversely, parameters passed by the software applications to the process software will be checked to ensure the parameters match the parameters required by the process software. The client and server operating systems including the network operating systems will be identified and compared to the list of operating systems, version numbers, and network software that have been tested to work with the process software. Those operating systems, version numbers, and network software that do not match the list of tested operating systems and version numbers will be upgraded on the clients and servers to the required level.
- After ensuring that the software, where the process software is to be deployed, is at the correct version level that has been tested to work with the process software, the integration is completed by installing the process software on the clients and servers.
- In
FIG. 13 ,step 820 begins the integration of the process software. The first thing is to determine if there are any process software programs that will execute on a server orservers 821. If this is not the case, then integration proceeds to 827. If this is the case, then the server addresses are identified 822. The servers are checked to see if they contain software that includes the operating system (OS), applications, and network operating systems (NOS), together with their version numbers, that have been tested with theprocess software 823. The servers are also checked to determine if there is any missing software that is required by theprocess software 823. - A determination is made if the version numbers match the version numbers of OS, applications, and NOS that have been tested with the
process software 824. If all of the versions match and there is no missing required software, the integration continues in 827. - If one or more of the version numbers do not match, then the unmatched versions are updated on the server or servers with the
correct versions 825. Additionally, if there is missing required software, then it is updated on the server orservers 825. The server integration is completed by installing theprocess software 826. -
Step 827, which follows eitherstep - The clients are checked to see if they contain software that includes the operating system (OS), applications, and network operating systems (NOS), together with their version numbers, that have been tested with the
process software 829. The clients are also checked to determine if there is any missing software that is required by theprocess software 829. - A determination is made as to whether the version numbers match the version numbers of OS, applications, and NOS that have been tested with the
process software 831. If all of the versions match and there is no missing required software, then the integration proceeds to 830 and exits. - If one or more of the version numbers do not match, then the unmatched versions are updated on the clients with the
correct versions 832. In addition, if there is missing required software then it is updated on theclients 832. The client integration is completed by installing the process software on theclients 833. The integration proceeds to 830 and exits. - The process software can be stored on a shared file system accessible from one or more servers. The process software is executed via transactions that contain data and server processing requests that use CPU units on the accessed server. CPU units are units of time such as minutes, seconds, hours on the central processor of the server. Additionally, the assessed server may make requests of other servers that require CPU units. CPU units are an example that represents one measurement of use. Other measurements of use include but are not limited to network bandwidth, memory usage, storage usage, packet transfers, complete transactions etc. When multiple customers use the same process software application, their transactions are differentiated by the parameters included in the transactions that identify the unique customer and the type of service for that customer. All of the CPU units and other measurements of use that are used for the services for each customer are recorded. When the number of transactions to any one server reaches a number that begins to affect the performance of that server, other servers are accessed to increase the capacity and to share the workload. Likewise, when other measurements of use such as network bandwidth, memory usage, storage usage, etc. approach a capacity so as to affect performance, additional network bandwidth, memory usage, storage etc. are added to share the workload. The measurements of use used for each service and customer are sent to a collecting server that sums the measurements of use for each customer for each service that was processed anywhere in the network of servers that provide the shared execution of the process software. The summed measurements of use units are periodically multiplied by unit costs and the resulting total process software application service costs are alternatively sent to the customer and/or indicated on a web site accessed by the customer, which then remits payment to the service provider. In another embodiment, the service provider requests payment directly from a customer account at a banking or financial institution. In another embodiment, if the service provider is also a customer of the customer that uses the process software application, the payment owed to the service provider is reconciled to the payment owed by the service provider to minimize the transfer of payments.
- The process software is shared, simultaneously serving multiple customers in a flexible, automated fashion. It is standardized, requiring little customization, and it is scalable, providing capacity on demand in a pay-as-you-go model.
- The process software can be stored on a shared file system accessible from one or more servers. The process software is executed via transactions that contain data and server processing requests that use CPU units on the accessed server. CPU units are units of time such as minutes, seconds, hours on the central processor of the server. Additionally, the assessed server may make requests of other servers that require CPU units. CPU units are an example that represents one measurement of use. Other measurements of use include but are not limited to network bandwidth, memory usage, storage usage, packet transfers, complete transactions etc.
- When multiple customers use the same process software application, their transactions are differentiated by the parameters included in the transactions that identify the unique customer and the type of service for that customer. All of the CPU units and other measurements of use that are used for the services for each customer are recorded. When the number of transactions to any one server reaches a number that begins to affect the performance of that server, other servers are accessed to increase the capacity and to share the workload. Likewise, when other measurements of use such as network bandwidth, memory usage, storage usage, etc. approach a capacity so as to affect performance, additional network bandwidth, memory usage, storage etc. are added to share the workload.
- The measurements of use used for each service and customer are sent to a collecting server that sums the measurements of use for each customer for each service that was processed anywhere in the network of servers that provide the shared execution of the process software. The summed measurements of use units are periodically multiplied by unit costs and the resulting total process software application service costs are alternatively sent to the customer and/or indicated on a web site accessed by the customer, which then remits payment to the service provider.
- In another embodiment, the service provider requests payment directly from a customer account at a banking or financial institution.
- In another embodiment, if the service provider is also a customer of the customer that uses the process software application, the payment owed to the service provider is reconciled to the payment owed by the service provider to minimize the transfer of payments.
- In
FIG. 14 ,step 840 begins the On Demand process. A transaction is created that contains the unique customer identification, the requested service type, and any service parameters that further specify the type ofservice 841. The transaction is then sent to themain server 842. In an On Demand environment, the main server can initially be the only server, then, as capacity is consumed, other servers are added to the On Demand environment. - The server central processing unit (CPU) capacities in the On Demand environment are queried 843. The CPU requirement of the transaction is estimated, then the servers' available CPU capacity in the On Demand environment are compared to the transaction CPU requirement to see if there is sufficient CPU capacity available in any server to process the
transaction 844. If there is not sufficient server CPU capacity available, then additional server CPU capacity is allocated to process thetransaction 848. If there was already sufficient CPU capacity available, then the transaction is sent to a selectedserver 845. - Before executing the transaction, a check is made of the remaining On Demand environment to determine if the environment has sufficient available capacity for processing the transaction. This environment capacity consists of such things as, but not limited to, network bandwidth, processor memory, storage etc. 846. If there is not sufficient available capacity, then capacity will be added to the
On Demand environment 847. Next, the required software to process the transaction is accessed, loaded into memory, then the transaction is executed 849. - The usage measurements are recorded 850. The usage measurements consist of the portions of those functions in the On Demand environment that are used to process the transaction. The usage of such functions as, but not limited to, network bandwidth, processor memory, storage and CPU cycles are what is recorded. The usage measurements are summed, multiplied by unit costs, and then recorded as a charge to the requesting
customer 851. If the customer has requested that the On Demand costs be posted to aweb site 852, then they are posted 853. - If the customer has requested that the On Demand costs be sent via e-mail to a
customer address 854, then they are sent 855. If the customer has requested that the On Demand costs be paid directly from a customer account 856, then payment is received directly from thecustomer account 857. The last step is to exit theOn Demand process 858. - The process software may be deployed, accessed and executed through the use of a virtual private network (VPN), which is any combination of technologies that can be used to secure a connection through an otherwise unsecured or untrusted network. The use of VPNs is to improve security and for reduced operational costs. The VPN makes use of a public network, usually the Internet, to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, the VPN uses “virtual” connections routed through the Internet from the company's private network to the remote site or employee.
- The process software may be deployed, accessed, and executed through either a remote-access or a site-to-site VPN. When using the remote-access VPNs, the process software is deployed, accessed, and executed via the secure, encrypted connections between a company's private network and remote users through a third-party service provider. The enterprise service provider (ESP) sets a network access server (NAS) and provides the remote users with desktop client software for their computers. The telecommuters can then dial a toll-free number or attach directly via a cable or DSL modem to reach the NAS and use their VPN client software to access the corporate network and to access, download, and execute the process software.
- When using the site-to-site VPN, the process software is deployed, accessed, and executed through the use of dedicated equipment and large-scale encryption, which are used to connect a company's multiple fixed sites over a public network, such as the Internet.
- The process software is transported over the VPN via tunneling, which is the process of placing an entire packet within another packet and sending it over a network. The protocol of the outer packet is understood by the network and both points, called tunnel interfaces, where the packet enters and exits the network.
- In
FIGS. 15 and 16 ,step 860 begins the Virtual Private Network (VPN) process. A determination is made to see if a VPN for remote access is required 861. If it is not required, then proceed to 862. If it is required, then determine if the remote access VPN exists 864. - If it does exist, then proceed to 865. Otherwise, identify the third party provider that will provide the secure, encrypted connections between the company's private network and the company's
remote users 876. The company's remote users are identified 877. The third party provider then sets up a network access server (NAS) 878 that allows the remote users to dial a toll-free number or attach directly via a cable or DSL modem to access, download, and install the desktop client software for the remote-access VPN 879. - After the remote access VPN has been built, or if it been previously installed, the remote users can then access the process software by dialing into the NAS or attaching directly via a cable or DSL modem into the
NAS 865. This allows entry into the corporate network where the process software is accessed 866. The process software is transported to the remote users' desktop over the network via tunneling. That is, the process software is divided into packets and each packet, including the data and protocol, is placed within anotherpacket 867. When the process software arrives at the remote users' desktop, it is removed from the packets, reconstituted, and executed on the remote users'desktop 868. - A determination is made to see if a VPN for site-to-site access is required 862. If it is not required, then proceed to exit the
process 863. Otherwise, determine if the site-to-site VPN exists 869. If it does exist, then proceed to 872. Otherwise, install the dedicated equipment required to establish a site-to-site VPN 870. Then build the large-scale encryption into theVPN 871. - After the site-to-site VPN has been built, or if it had been previously established, the users access the process software via the
VPN 872. The process software is transported to the site users over the network viatunneling 873. That is, the process software is divided into packets and each packet, including the data and protocol, is placed within anotherpacket 874. When the process software arrives at the remote users' desktop, it is removed from the packets, reconstituted, and executed on the site users'desktop 875. Proceed to exit theprocess 863. - The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of this disclosure. As used herein, the singular forms “a”, “an”, and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
- The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The descriptions of the various embodiments herein have been presented for purposes of illustration, but are not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein was chosen to best explain the principles of the embodiments, the practical application or technical improvement over technologies found in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.
Claims (25)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/564,023 US20130019286A1 (en) | 2011-07-15 | 2012-08-01 | Validating that a user is human |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201161508287P | 2011-07-15 | 2011-07-15 | |
US13/547,436 US9146917B2 (en) | 2011-07-15 | 2012-07-12 | Validating that a user is human |
US13/564,023 US20130019286A1 (en) | 2011-07-15 | 2012-08-01 | Validating that a user is human |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/547,436 Continuation US9146917B2 (en) | 2011-07-15 | 2012-07-12 | Validating that a user is human |
Publications (1)
Publication Number | Publication Date |
---|---|
US20130019286A1 true US20130019286A1 (en) | 2013-01-17 |
Family
ID=47519730
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/547,436 Active 2032-08-08 US9146917B2 (en) | 2011-07-15 | 2012-07-12 | Validating that a user is human |
US13/564,023 Abandoned US20130019286A1 (en) | 2011-07-15 | 2012-08-01 | Validating that a user is human |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/547,436 Active 2032-08-08 US9146917B2 (en) | 2011-07-15 | 2012-07-12 | Validating that a user is human |
Country Status (1)
Country | Link |
---|---|
US (2) | US9146917B2 (en) |
Cited By (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130263230A1 (en) * | 2012-03-30 | 2013-10-03 | Anchorfree Inc. | Method and system for statistical access control with data aggregation |
US20150186193A1 (en) * | 2013-12-27 | 2015-07-02 | Microsoft Corporation | Generation of client-side application programming interfaces |
US20150261744A1 (en) * | 2014-03-12 | 2015-09-17 | Asuman Suenbuel | Systems and methods for natural language processing |
KR20150128862A (en) * | 2013-03-12 | 2015-11-18 | 가날리아, 엘엘씨 | Systems and methods for providing security via interactive media |
US20150356089A1 (en) * | 2014-06-10 | 2015-12-10 | International Business Machines Corporation | Weighting Search Criteria Based on Similarities to an Ingested Corpus in a Question and Answer (QA) System |
US20160048498A1 (en) * | 2014-08-18 | 2016-02-18 | Samsung Electronics Co., Ltd. | Method for providing alternative service and electronic device thereof |
US20160062735A1 (en) * | 2013-05-07 | 2016-03-03 | Psigenics Corporation | Acquisition and assessment of classically non-inferable information |
US20160147739A1 (en) * | 2014-11-20 | 2016-05-26 | Electronics And Telecommunications Research Institute | Apparatus and method for updating language analysis result |
US20160188535A1 (en) * | 2014-12-29 | 2016-06-30 | International Business Machines Corporation | Verification of natural language processing derived attributes |
US9471668B1 (en) * | 2016-01-21 | 2016-10-18 | International Business Machines Corporation | Question-answering system |
US9686269B2 (en) | 2013-04-03 | 2017-06-20 | Alibaba Group Holding Limited | Method and system for distinguishing humans from machines and for controlling access to network services |
US9723005B1 (en) * | 2014-09-29 | 2017-08-01 | Amazon Technologies, Inc. | Turing test via reaction to test modifications |
US9767263B1 (en) | 2014-09-29 | 2017-09-19 | Amazon Technologies, Inc. | Turing test via failure |
US9985943B1 (en) * | 2013-12-18 | 2018-05-29 | Amazon Technologies, Inc. | Automated agent detection using multiple factors |
US10083213B1 (en) * | 2015-04-27 | 2018-09-25 | Intuit Inc. | Method and system for routing a question based on analysis of the question content and predicted user satisfaction with answer content before the answer content is generated |
US10134050B1 (en) | 2015-04-29 | 2018-11-20 | Intuit Inc. | Method and system for facilitating the production of answer content from a mobile device for a question and answer based customer support system |
US10147037B1 (en) | 2015-07-28 | 2018-12-04 | Intuit Inc. | Method and system for determining a level of popularity of submission content, prior to publicizing the submission content with a question and answer support system |
US10162734B1 (en) | 2016-07-20 | 2018-12-25 | Intuit Inc. | Method and system for crowdsourcing software quality testing and error detection in a tax return preparation system |
US10242093B2 (en) | 2015-10-29 | 2019-03-26 | Intuit Inc. | Method and system for performing a probabilistic topic analysis of search queries for a customer support system |
US10268956B2 (en) | 2015-07-31 | 2019-04-23 | Intuit Inc. | Method and system for applying probabilistic topic models to content in a tax environment to improve user satisfaction with a question and answer customer support system |
US10319363B2 (en) * | 2012-02-17 | 2019-06-11 | Microsoft Technology Licensing, Llc | Audio human interactive proof based on text-to-speech and semantics |
US10394804B1 (en) | 2015-10-08 | 2019-08-27 | Intuit Inc. | Method and system for increasing internet traffic to a question and answer customer support system |
US10438225B1 (en) | 2013-12-18 | 2019-10-08 | Amazon Technologies, Inc. | Game-based automated agent detection |
US10445332B2 (en) | 2016-09-28 | 2019-10-15 | Intuit Inc. | Method and system for providing domain-specific incremental search results with a customer self-service system for a financial management system |
US10447629B2 (en) * | 2014-03-31 | 2019-10-15 | Orange | Method of constructing a message by means of a terminal |
US10447777B1 (en) | 2015-06-30 | 2019-10-15 | Intuit Inc. | Method and system for providing a dynamically updated expertise and context based peer-to-peer customer support system within a software application |
US10460398B1 (en) | 2016-07-27 | 2019-10-29 | Intuit Inc. | Method and system for crowdsourcing the detection of usability issues in a tax return preparation system |
US10467541B2 (en) | 2016-07-27 | 2019-11-05 | Intuit Inc. | Method and system for improving content searching in a question and answer customer support system by using a crowd-machine learning hybrid predictive model |
US10475044B1 (en) | 2015-07-29 | 2019-11-12 | Intuit Inc. | Method and system for question prioritization based on analysis of the question content and predicted asker engagement before answer content is generated |
US10475043B2 (en) | 2015-01-28 | 2019-11-12 | Intuit Inc. | Method and system for pro-active detection and correction of low quality questions in a question and answer based customer support system |
US10552843B1 (en) | 2016-12-05 | 2020-02-04 | Intuit Inc. | Method and system for improving search results by recency boosting customer support content for a customer self-help system associated with one or more financial management systems |
US10572954B2 (en) | 2016-10-14 | 2020-02-25 | Intuit Inc. | Method and system for searching for and navigating to user content and other user experience pages in a financial management system with a customer self-service system for the financial management system |
US10599699B1 (en) | 2016-04-08 | 2020-03-24 | Intuit, Inc. | Processing unstructured voice of customer feedback for improving content rankings in customer support systems |
US10614725B2 (en) | 2012-09-11 | 2020-04-07 | International Business Machines Corporation | Generating secondary questions in an introspective question answering system |
US10733677B2 (en) | 2016-10-18 | 2020-08-04 | Intuit Inc. | Method and system for providing domain-specific and dynamic type ahead suggestions for search query terms with a customer self-service system for a tax return preparation system |
US10748157B1 (en) | 2017-01-12 | 2020-08-18 | Intuit Inc. | Method and system for determining levels of search sophistication for users of a customer self-help system to personalize a content search user experience provided to the users and to increase a likelihood of user satisfaction with the search experience |
US10755294B1 (en) | 2015-04-28 | 2020-08-25 | Intuit Inc. | Method and system for increasing use of mobile devices to provide answer content in a question and answer based customer support system |
US10922367B2 (en) | 2017-07-14 | 2021-02-16 | Intuit Inc. | Method and system for providing real time search preview personalization in data management systems |
US10937551B2 (en) | 2017-11-27 | 2021-03-02 | International Business Machines Corporation | Medical concept sorting based on machine learning of attribute value differentiation |
US11093951B1 (en) | 2017-09-25 | 2021-08-17 | Intuit Inc. | System and method for responding to search queries using customer self-help systems associated with a plurality of data management systems |
US11170181B2 (en) * | 2017-11-30 | 2021-11-09 | International Business Machines Corporation | Document preparation with argumentation support from a deep question answering system |
US11269665B1 (en) | 2018-03-28 | 2022-03-08 | Intuit Inc. | Method and system for user experience personalization in data management systems using machine learning |
US11288355B2 (en) * | 2020-05-05 | 2022-03-29 | International Business Machines Corporation | Detector for online user verification |
US11301630B1 (en) * | 2019-09-19 | 2022-04-12 | Express Scripts Strategic Development, Inc. | Computer-implemented automated authorization system using natural language processing |
US11436642B1 (en) | 2018-01-29 | 2022-09-06 | Intuit Inc. | Method and system for generating real-time personalized advertisements in data management self-help systems |
US20230008868A1 (en) * | 2021-07-08 | 2023-01-12 | Nippon Telegraph And Telephone Corporation | User authentication device, user authentication method, and user authentication computer program |
US20230142543A1 (en) * | 2012-05-10 | 2023-05-11 | Eugene S. Santos | Augmented knowledge base and reasoning with uncertainties and/or incompleteness |
CN116401339A (en) * | 2023-06-07 | 2023-07-07 | 北京百度网讯科技有限公司 | Data processing method, device, electronic equipment, medium and program product |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9047567B2 (en) | 2011-07-15 | 2015-06-02 | International Business Machines Corporation | Utilizing failures in question and answer system responses to enhance the accuracy of question and answer systems |
US9465928B2 (en) * | 2014-12-31 | 2016-10-11 | Verizon Patent And Licensing Inc. | No-CAPTCHA CAPTCHA |
JP6805765B2 (en) | 2016-10-21 | 2020-12-23 | 富士通株式会社 | Systems, methods, and programs for running software services |
EP3312724B1 (en) | 2016-10-21 | 2019-10-30 | Fujitsu Limited | Microservice-based data processing apparatus, method, and program |
JP7100422B2 (en) | 2016-10-21 | 2022-07-13 | 富士通株式会社 | Devices, programs, and methods for recognizing data properties |
EP3312722A1 (en) | 2016-10-21 | 2018-04-25 | Fujitsu Limited | Data processing apparatus, method, and program |
US10776170B2 (en) | 2016-10-21 | 2020-09-15 | Fujitsu Limited | Software service execution apparatus, system, and method |
CN109960489B (en) * | 2017-12-25 | 2024-01-02 | 上海智臻智能网络科技股份有限公司 | Method, device, equipment, medium and question-answering system for generating intelligent question-answering system |
CA3061152A1 (en) * | 2018-11-08 | 2020-05-08 | Royal Bank Of Canada | System and method for reverse-turing bot detection |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110125734A1 (en) * | 2009-11-23 | 2011-05-26 | International Business Machines Corporation | Questions and answers generation |
US20120054834A1 (en) * | 2010-08-31 | 2012-03-01 | Yahoo! Inc. | Multi-step challenge-response test |
US8380503B2 (en) * | 2008-06-23 | 2013-02-19 | John Nicholas and Kristin Gross Trust | System and method for generating challenge items for CAPTCHAs |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7841940B2 (en) * | 2003-07-14 | 2010-11-30 | Astav, Inc | Human test based on human conceptual capabilities |
JP3882048B2 (en) | 2003-10-17 | 2007-02-14 | 独立行政法人情報通信研究機構 | Question answering system and question answering processing method |
US20060286530A1 (en) | 2005-06-07 | 2006-12-21 | Microsoft Corporation | System and method for collecting question and answer pairs |
US7680891B1 (en) | 2006-06-19 | 2010-03-16 | Google Inc. | CAPTCHA-based spam control for content creation systems |
US8108683B2 (en) | 2006-08-10 | 2012-01-31 | International Business Machines Corporation | Mitigating dictionary attacks on password-protected local storage |
EP2245568A4 (en) * | 2008-02-20 | 2012-12-05 | Univ Mcmaster | Expert system for determining patient treatment response |
US7512978B1 (en) | 2008-02-24 | 2009-03-31 | International Business Machines Corporation | Human-read-only configured e-mail |
US8332394B2 (en) | 2008-05-23 | 2012-12-11 | International Business Machines Corporation | System and method for providing question and answers with deferred type evaluation |
US8275803B2 (en) | 2008-05-14 | 2012-09-25 | International Business Machines Corporation | System and method for providing answers to questions |
US10332054B2 (en) | 2009-02-09 | 2019-06-25 | Mandometer Ab | Method, generator device, computer program product and system for generating medical advice |
-
2012
- 2012-07-12 US US13/547,436 patent/US9146917B2/en active Active
- 2012-08-01 US US13/564,023 patent/US20130019286A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8380503B2 (en) * | 2008-06-23 | 2013-02-19 | John Nicholas and Kristin Gross Trust | System and method for generating challenge items for CAPTCHAs |
US20110125734A1 (en) * | 2009-11-23 | 2011-05-26 | International Business Machines Corporation | Questions and answers generation |
US20120054834A1 (en) * | 2010-08-31 | 2012-03-01 | Yahoo! Inc. | Multi-step challenge-response test |
Cited By (66)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10319363B2 (en) * | 2012-02-17 | 2019-06-11 | Microsoft Technology Licensing, Llc | Audio human interactive proof based on text-to-speech and semantics |
US20130263230A1 (en) * | 2012-03-30 | 2013-10-03 | Anchorfree Inc. | Method and system for statistical access control with data aggregation |
US20230142543A1 (en) * | 2012-05-10 | 2023-05-11 | Eugene S. Santos | Augmented knowledge base and reasoning with uncertainties and/or incompleteness |
US11763185B2 (en) * | 2012-05-10 | 2023-09-19 | Eugene S. Santos | Augmented knowledge base and reasoning with uncertainties and/or incompleteness |
US10621880B2 (en) | 2012-09-11 | 2020-04-14 | International Business Machines Corporation | Generating secondary questions in an introspective question answering system |
US10614725B2 (en) | 2012-09-11 | 2020-04-07 | International Business Machines Corporation | Generating secondary questions in an introspective question answering system |
US10893047B2 (en) | 2013-03-12 | 2021-01-12 | Ganalila, Llc | Systems and methods for providing security via interactive media |
KR102228714B1 (en) * | 2013-03-12 | 2021-03-18 | 가날리아, 엘엘씨 | Systems and methods for providing security via interactive media |
US11695771B2 (en) | 2013-03-12 | 2023-07-04 | Ganalila, Llc | Systems and methods for providing security via interactive media |
KR20150128862A (en) * | 2013-03-12 | 2015-11-18 | 가날리아, 엘엘씨 | Systems and methods for providing security via interactive media |
US9686269B2 (en) | 2013-04-03 | 2017-06-20 | Alibaba Group Holding Limited | Method and system for distinguishing humans from machines and for controlling access to network services |
US10104061B2 (en) | 2013-04-03 | 2018-10-16 | Alibaba Group Holding Limited | Method and system for distinguishing humans from machines and for controlling access to network services |
US20160062735A1 (en) * | 2013-05-07 | 2016-03-03 | Psigenics Corporation | Acquisition and assessment of classically non-inferable information |
US9985943B1 (en) * | 2013-12-18 | 2018-05-29 | Amazon Technologies, Inc. | Automated agent detection using multiple factors |
US10438225B1 (en) | 2013-12-18 | 2019-10-08 | Amazon Technologies, Inc. | Game-based automated agent detection |
US20150186193A1 (en) * | 2013-12-27 | 2015-07-02 | Microsoft Corporation | Generation of client-side application programming interfaces |
US10515154B2 (en) * | 2014-03-12 | 2019-12-24 | Sap Se | Systems and methods for natural language processing using machine-oriented inference rules |
US20150261744A1 (en) * | 2014-03-12 | 2015-09-17 | Asuman Suenbuel | Systems and methods for natural language processing |
US10447629B2 (en) * | 2014-03-31 | 2019-10-15 | Orange | Method of constructing a message by means of a terminal |
US20150356089A1 (en) * | 2014-06-10 | 2015-12-10 | International Business Machines Corporation | Weighting Search Criteria Based on Similarities to an Ingested Corpus in a Question and Answer (QA) System |
US20160224566A1 (en) * | 2014-06-10 | 2016-08-04 | International Business Machines Corporation | Weighting Search Criteria Based on Similarities to an Ingested Corpus in a Question and Answer (QA) System |
US9720977B2 (en) * | 2014-06-10 | 2017-08-01 | International Business Machines Corporation | Weighting search criteria based on similarities to an ingested corpus in a question and answer (QA) system |
US9715531B2 (en) * | 2014-06-10 | 2017-07-25 | International Business Machines Corporation | Weighting search criteria based on similarities to an ingested corpus in a question and answer (QA) system |
US20160048498A1 (en) * | 2014-08-18 | 2016-02-18 | Samsung Electronics Co., Ltd. | Method for providing alternative service and electronic device thereof |
US10482151B2 (en) * | 2014-08-18 | 2019-11-19 | Samsung Electronics Co., Ltd. | Method for providing alternative service and electronic device thereof |
US9767263B1 (en) | 2014-09-29 | 2017-09-19 | Amazon Technologies, Inc. | Turing test via failure |
US10262121B2 (en) | 2014-09-29 | 2019-04-16 | Amazon Technologies, Inc. | Turing test via failure |
US9723005B1 (en) * | 2014-09-29 | 2017-08-01 | Amazon Technologies, Inc. | Turing test via reaction to test modifications |
US20160147739A1 (en) * | 2014-11-20 | 2016-05-26 | Electronics And Telecommunications Research Institute | Apparatus and method for updating language analysis result |
US20160188535A1 (en) * | 2014-12-29 | 2016-06-30 | International Business Machines Corporation | Verification of natural language processing derived attributes |
US10031912B2 (en) * | 2014-12-29 | 2018-07-24 | International Business Machines Corporation | Verification of natural language processing derived attributes |
US10475043B2 (en) | 2015-01-28 | 2019-11-12 | Intuit Inc. | Method and system for pro-active detection and correction of low quality questions in a question and answer based customer support system |
US10083213B1 (en) * | 2015-04-27 | 2018-09-25 | Intuit Inc. | Method and system for routing a question based on analysis of the question content and predicted user satisfaction with answer content before the answer content is generated |
US10755294B1 (en) | 2015-04-28 | 2020-08-25 | Intuit Inc. | Method and system for increasing use of mobile devices to provide answer content in a question and answer based customer support system |
US11429988B2 (en) | 2015-04-28 | 2022-08-30 | Intuit Inc. | Method and system for increasing use of mobile devices to provide answer content in a question and answer based customer support system |
US10134050B1 (en) | 2015-04-29 | 2018-11-20 | Intuit Inc. | Method and system for facilitating the production of answer content from a mobile device for a question and answer based customer support system |
US10447777B1 (en) | 2015-06-30 | 2019-10-15 | Intuit Inc. | Method and system for providing a dynamically updated expertise and context based peer-to-peer customer support system within a software application |
US10147037B1 (en) | 2015-07-28 | 2018-12-04 | Intuit Inc. | Method and system for determining a level of popularity of submission content, prior to publicizing the submission content with a question and answer support system |
US10475044B1 (en) | 2015-07-29 | 2019-11-12 | Intuit Inc. | Method and system for question prioritization based on analysis of the question content and predicted asker engagement before answer content is generated |
US10861023B2 (en) | 2015-07-29 | 2020-12-08 | Intuit Inc. | Method and system for question prioritization based on analysis of the question content and predicted asker engagement before answer content is generated |
US10268956B2 (en) | 2015-07-31 | 2019-04-23 | Intuit Inc. | Method and system for applying probabilistic topic models to content in a tax environment to improve user satisfaction with a question and answer customer support system |
US10394804B1 (en) | 2015-10-08 | 2019-08-27 | Intuit Inc. | Method and system for increasing internet traffic to a question and answer customer support system |
US10242093B2 (en) | 2015-10-29 | 2019-03-26 | Intuit Inc. | Method and system for performing a probabilistic topic analysis of search queries for a customer support system |
US9471668B1 (en) * | 2016-01-21 | 2016-10-18 | International Business Machines Corporation | Question-answering system |
US11734330B2 (en) | 2016-04-08 | 2023-08-22 | Intuit, Inc. | Processing unstructured voice of customer feedback for improving content rankings in customer support systems |
US10599699B1 (en) | 2016-04-08 | 2020-03-24 | Intuit, Inc. | Processing unstructured voice of customer feedback for improving content rankings in customer support systems |
US10162734B1 (en) | 2016-07-20 | 2018-12-25 | Intuit Inc. | Method and system for crowdsourcing software quality testing and error detection in a tax return preparation system |
US10460398B1 (en) | 2016-07-27 | 2019-10-29 | Intuit Inc. | Method and system for crowdsourcing the detection of usability issues in a tax return preparation system |
US10467541B2 (en) | 2016-07-27 | 2019-11-05 | Intuit Inc. | Method and system for improving content searching in a question and answer customer support system by using a crowd-machine learning hybrid predictive model |
US10445332B2 (en) | 2016-09-28 | 2019-10-15 | Intuit Inc. | Method and system for providing domain-specific incremental search results with a customer self-service system for a financial management system |
US10572954B2 (en) | 2016-10-14 | 2020-02-25 | Intuit Inc. | Method and system for searching for and navigating to user content and other user experience pages in a financial management system with a customer self-service system for the financial management system |
US11403715B2 (en) | 2016-10-18 | 2022-08-02 | Intuit Inc. | Method and system for providing domain-specific and dynamic type ahead suggestions for search query terms |
US10733677B2 (en) | 2016-10-18 | 2020-08-04 | Intuit Inc. | Method and system for providing domain-specific and dynamic type ahead suggestions for search query terms with a customer self-service system for a tax return preparation system |
US10552843B1 (en) | 2016-12-05 | 2020-02-04 | Intuit Inc. | Method and system for improving search results by recency boosting customer support content for a customer self-help system associated with one or more financial management systems |
US11423411B2 (en) | 2016-12-05 | 2022-08-23 | Intuit Inc. | Search results by recency boosting customer support content |
US10748157B1 (en) | 2017-01-12 | 2020-08-18 | Intuit Inc. | Method and system for determining levels of search sophistication for users of a customer self-help system to personalize a content search user experience provided to the users and to increase a likelihood of user satisfaction with the search experience |
US10922367B2 (en) | 2017-07-14 | 2021-02-16 | Intuit Inc. | Method and system for providing real time search preview personalization in data management systems |
US11093951B1 (en) | 2017-09-25 | 2021-08-17 | Intuit Inc. | System and method for responding to search queries using customer self-help systems associated with a plurality of data management systems |
US10937551B2 (en) | 2017-11-27 | 2021-03-02 | International Business Machines Corporation | Medical concept sorting based on machine learning of attribute value differentiation |
US11170181B2 (en) * | 2017-11-30 | 2021-11-09 | International Business Machines Corporation | Document preparation with argumentation support from a deep question answering system |
US11436642B1 (en) | 2018-01-29 | 2022-09-06 | Intuit Inc. | Method and system for generating real-time personalized advertisements in data management self-help systems |
US11269665B1 (en) | 2018-03-28 | 2022-03-08 | Intuit Inc. | Method and system for user experience personalization in data management systems using machine learning |
US11301630B1 (en) * | 2019-09-19 | 2022-04-12 | Express Scripts Strategic Development, Inc. | Computer-implemented automated authorization system using natural language processing |
US11288355B2 (en) * | 2020-05-05 | 2022-03-29 | International Business Machines Corporation | Detector for online user verification |
US20230008868A1 (en) * | 2021-07-08 | 2023-01-12 | Nippon Telegraph And Telephone Corporation | User authentication device, user authentication method, and user authentication computer program |
CN116401339A (en) * | 2023-06-07 | 2023-07-07 | 北京百度网讯科技有限公司 | Data processing method, device, electronic equipment, medium and program product |
Also Published As
Publication number | Publication date |
---|---|
US20130019285A1 (en) | 2013-01-17 |
US9146917B2 (en) | 2015-09-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9165252B2 (en) | Utilizing failures in question and answer system responses to enhance the accuracy of question and answer systems | |
US9146917B2 (en) | Validating that a user is human | |
US10621880B2 (en) | Generating secondary questions in an introspective question answering system | |
US10936821B2 (en) | Testing and training a question-answering system | |
US9569724B2 (en) | Using ontological information in open domain type coercion | |
US8943051B2 (en) | Lexical answer type confidence estimation and application | |
US9378273B2 (en) | System and method for question answering by reformulating word problems | |
US8600986B2 (en) | Lexical answer type confidence estimation and application | |
US9754207B2 (en) | Corpus quality analysis | |
US9092988B2 (en) | Multi-dimensional feature merging for open domain question answering | |
US10108904B2 (en) | Combining different type coercion components for deferred type evaluation | |
US9754504B2 (en) | Generating multiple choice questions and answers based on document text | |
Sulistiani et al. | ES‐Plag: Efficient and sensitive source code plagiarism detection tool for academic environment | |
Chowdhury et al. | Scaling the Authoring of AutoTutors with Large Language Models | |
An | Ontology learning for the semantic deep web | |
Essam et al. | Deciphering Arabic question: a dedicated survey on Arabic question analysis methods, challenges, limitations and future pathways | |
Rahman | Exploiting Context in Dealing with Programming Errors and Exceptions in the IDE |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BARBORAK, MICHAEL A.;CHU-CARROLL, JENNIFER;FERRUCCI, DAVID A.;AND OTHERS;REEL/FRAME:057402/0249 Effective date: 20120717 |
|
AS | Assignment |
Owner name: ARKOSE LABS, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:057418/0615 Effective date: 20210827 |
|
AS | Assignment |
Owner name: ARKOSE LABS HOLDINGS, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ARKOSE LABS, INC.;REEL/FRAME:057455/0455 Effective date: 20210910 |