WO2009041982A8 - Dialogue analyzer configured to identify predatory behavior - Google Patents

Dialogue analyzer configured to identify predatory behavior Download PDF

Info

Publication number
WO2009041982A8
WO2009041982A8 PCT/US2007/080008 US2007080008W WO2009041982A8 WO 2009041982 A8 WO2009041982 A8 WO 2009041982A8 US 2007080008 W US2007080008 W US 2007080008W WO 2009041982 A8 WO2009041982 A8 WO 2009041982A8
Authority
WO
WIPO (PCT)
Prior art keywords
communications
identify
online
match
parent
Prior art date
Application number
PCT/US2007/080008
Other languages
French (fr)
Other versions
WO2009041982A1 (en
Inventor
David Lee Giffin
Robert Thomas Mcclung
Jason Scott Stirman
Brandon Labranche Watson
Original Assignee
Crisp Thinking (U.S.) Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Crisp Thinking (U.S.) Inc. filed Critical Crisp Thinking (U.S.) Inc.
Priority to GB1006973A priority Critical patent/GB2466606A/en
Priority to PCT/US2007/080008 priority patent/WO2009041982A1/en
Publication of WO2009041982A1 publication Critical patent/WO2009041982A1/en
Publication of WO2009041982A8 publication Critical patent/WO2009041982A8/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/06Message adaptation to terminal or network requirements
    • H04L51/063Content adaptation, e.g. replacement of unsuitable content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1895Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for short real-time information, e.g. alarms, notifications, alerts, updates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Operations Research (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A dialogue analyzer configured to identify online communications relating to lewd, predatory, hostile, and/or otherwise inappropriate subject matter is disclosed. Identified communications include those occurring via social networks, instant messaging, online chat rooms, computer in-game chat, email and the like. The communications of a monitored computer user (100) are scanned to identify those communications that match predetermined lexical rules. The rules comprise sets of word-concepts that may be associated based on spelling, sound, meaning, appearance or probability of appearance in a text string, etc. Various numbers and configurations of word concepts may be implemented in a rule in order to more accurately scan the online communication data for a potential match. When a match is found, a copy of the communication, along with contextual information, is presented to a parent or guardian user (180). This information is presented at a central website and via an email notification to the parent or guardian. Various embodiments are described.
PCT/US2007/080008 2007-09-28 2007-09-28 Dialogue analyzer configured to identify predatory behavior WO2009041982A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
GB1006973A GB2466606A (en) 2007-09-28 2007-09-28 Dialogue analyzer configured to identify predatory behavior
PCT/US2007/080008 WO2009041982A1 (en) 2007-09-28 2007-09-28 Dialogue analyzer configured to identify predatory behavior

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2007/080008 WO2009041982A1 (en) 2007-09-28 2007-09-28 Dialogue analyzer configured to identify predatory behavior

Publications (2)

Publication Number Publication Date
WO2009041982A1 WO2009041982A1 (en) 2009-04-02
WO2009041982A8 true WO2009041982A8 (en) 2009-11-26

Family

ID=39567837

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/080008 WO2009041982A1 (en) 2007-09-28 2007-09-28 Dialogue analyzer configured to identify predatory behavior

Country Status (2)

Country Link
GB (1) GB2466606A (en)
WO (1) WO2009041982A1 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7912828B2 (en) 2007-02-23 2011-03-22 Apple Inc. Pattern searching methods and apparatuses
US8738360B2 (en) 2008-06-06 2014-05-27 Apple Inc. Data detection of a character sequence having multiple possible data types
US8311806B2 (en) 2008-06-06 2012-11-13 Apple Inc. Data detection in a sequence of tokens using decision tree reductions
US8489388B2 (en) 2008-11-10 2013-07-16 Apple Inc. Data detection
US8621011B2 (en) * 2009-05-12 2013-12-31 Avaya Inc. Treatment of web feeds as work assignment in a contact center
AR082117A1 (en) * 2010-07-06 2012-11-14 Telefonica Sa SYSTEM FOR MONITORING INTERACTION ONLINE
US9083757B2 (en) * 2012-11-21 2015-07-14 Telefonaktiebolaget L M Ericsson LLP Multi-objective server placement determination
US10592612B2 (en) 2017-04-07 2020-03-17 International Business Machines Corporation Selective topics guidance in in-person conversations

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1433037A2 (en) * 2001-08-06 2004-06-30 Matsushita Electric Industrial Co., Ltd. License management server, terminal device, license management system and usage restriction control method
US20060218575A1 (en) * 2003-06-26 2006-09-28 Blair Ronald L Parental monitoring of digital content
US7594019B2 (en) * 2003-11-12 2009-09-22 Intel Corporation System and method for adult approval URL pre-screening
US7046139B2 (en) * 2004-04-26 2006-05-16 Matsushita Electric Industrial Co., Ltd. Method and parental control and monitoring of usage of devices connected to home network

Also Published As

Publication number Publication date
GB201006973D0 (en) 2010-06-09
WO2009041982A1 (en) 2009-04-02
GB2466606A (en) 2010-06-30

Similar Documents

Publication Publication Date Title
WO2009041982A8 (en) Dialogue analyzer configured to identify predatory behavior
Dubey The resurgence of cyber racism during the COVID-19 pandemic and its aftereffects: analysis of sentiments and emotions in tweets
Reyes et al. A multidimensional approach for detecting irony in twitter
US10825449B1 (en) Systems and methods for analyzing a characteristic of a communication using disjoint classification models for parsing and evaluation of the communication
Lewin-Jones et al. Understanding style, language and etiquette in email communication in higher education: a survey
US20180032907A1 (en) Detecting abusive language using character n-gram features
De Seta (Un) civil Society in Digital China| Wenming Bu Wenming: The Socialization of Incivility in Postdigital China
Nikogosian et al. WHO’s first global health treaty: 10 years in force
CN106021232A (en) Swap account recognition method based on dependency syntax relations in Weibo
Rúa Keeping up with the times
Barbieri Machine learning methods for understanding social media communication: modeling irony and emojis
Utaliyeva et al. ChatGPT: A Threat to Spam Filtering Systems
Guice Predators, decoys, and teens: A corpus analysis of online language
Christopherson What are people really saying in World of Warcraft® chat?
Shen How Socioeconomic Status Affects Cancel Culture Propensity
GALSTYAN AGGRESSION IN ONLINE COMMUNICATION
Winters A Smol Perspective: Internet Sociolinguistics and the Border Between Written and Spoken Word
Ygartua Linguistic Feature Spread in Online Social Networks
Nakajima et al. A Study of Unsounded Code Strings at the End of Online Messages of a Q&A Site and a Micro Blog
Wilson Lions & Liars
Herther The changing language of search.
Almond The Darkness Within: IN PRAISE OF THE UNLIKABLE
Feldman Bredes, Don. Polly and the One and Only World
Nakajima et al. An analysis of unsounded code strings in online messages of a q&a site and a micro blog
Wutiolarn et al. A study of nonstandard orthography and vowel omission in an international online game: AuditionSEA

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07843569

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 1006973

Country of ref document: GB

Kind code of ref document: A

Free format text: PCT FILING DATE = 20070928

WWE Wipo information: entry into national phase

Ref document number: 1006973.0

Country of ref document: GB

122 Ep: pct application non-entry in european phase

Ref document number: 07843569

Country of ref document: EP

Kind code of ref document: A1