WO2017052563A1 - Identification et prévention de spoiler dans une discussion multi-utilisateurs - Google Patents

Identification et prévention de spoiler dans une discussion multi-utilisateurs Download PDF

Info

Publication number
WO2017052563A1
WO2017052563A1 PCT/US2015/052034 US2015052034W WO2017052563A1 WO 2017052563 A1 WO2017052563 A1 WO 2017052563A1 US 2015052034 W US2015052034 W US 2015052034W WO 2017052563 A1 WO2017052563 A1 WO 2017052563A1
Authority
WO
WIPO (PCT)
Prior art keywords
content
consumed
list
lists
safe
Prior art date
Application number
PCT/US2015/052034
Other languages
English (en)
Inventor
Brian ERIKSSON
Jean C. Bolot
Azin ASHKAN
Original Assignee
Thomson Licensing
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thomson Licensing filed Critical Thomson Licensing
Priority to PCT/US2015/052034 priority Critical patent/WO2017052563A1/fr
Publication of WO2017052563A1 publication Critical patent/WO2017052563A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Definitions

  • Such groups may include discussion regarding content items such as movies, television shows, music, books, etc. Some users may not want to participate in discussion that would reveal subject matter in the content (i.e., "spoilers" or particular aspects of a plot that summarize surprises or narrative twists in the content).
  • Some embodiments provide ways to identify spoilers and prevent unwanted disclosure of the identified spoilers among a group of discussion participants.
  • Such participants may be participating in live person-to-person discussion, network-based discussion such as chat, messaging, message boards, etc., voice discussion such as telephonic or voice over internet protocol.
  • the participants may be identified based on proximity, associated with a discussion group, and/or other appropriate ways.
  • Each participant may be associated with a list of consumed content. Such a list may be generated in various appropriate ways (e.g., user selection, retrieving content viewed through a service provider, etc.). In addition, each participant may be associated with a list of opt-out content where the participant may or may not have consumed the content but does not care to avoid spoilers.
  • participant When a participant accesses a discussion forum, the participant may be presented with a list of "safe" content that has been consumed (and/or opted out of) by all other active participants. In addition, each participant may be able to access consumed content lists (and/or safe content lists) associated with a subset of participants.
  • Figure 1 illustrates a schematic block diagram of an exemplary system provided by some embodiments
  • Figure 2 illustrates a set of exemplary data structures used by some embodiments
  • Figure 3 illustrates a flow chart of an exemplary process used by some embodiments to generate a list of consumed content items
  • Figure 4 illustrates a flow chart of an exemplary process used by some embodiments to provide safe content listings to a set of users
  • Figure 5 illustrates a flow chart of an exemplary process used by some embodiments to generate a list of content items that are safe for discussion.
  • Figure 6 illustrates a schematic block diagram of an exemplary computer system used to implement some embodiments.
  • inventive features are described below that can each be used independently of one another or in combination with other features.
  • the content items may include, for instance, television shows, movies, videos, music, books, graphic depictions, and/or other multimedia content items. Such lists may allow participants to avoid unwanted disclosure of spoilers to other participants.
  • the term "participant” and the term "user” may be used interchangeably.
  • references to participants and/or users may actually be references to devices associated with such entities.
  • Each participant may be associated with a user device such as a smartphone, tablet, personal computer, etc.
  • a user device such as a smartphone, tablet, personal computer, etc.
  • all user devices within an area associated with a discussion venue may be sent a notification and/or otherwise be allowed to join the discussion.
  • participants may be identified by status regarding a message board or other such resource (e.g., active, inactive, logged in, etc.).
  • the list of participants may be used to generate a listing of safe content for discussion. Users may be able to select and/or define various sub-groups (e.g., by selecting one or more other participants) and generate safe lists associated with each sub-group.
  • a first exemplary embodiment provides a method that generates consumed content lists.
  • the method includes determining a user identity, retrieving a set of consumed content item selections associated with the user identity, and generating a consumed content list based at least partly on the set of content selections and the user identity.
  • a second exemplary embodiment provides a server that generates consumed content lists.
  • the server includes a processor for executing a set of instructions, and a non- transitory medium that stores the set of instructions.
  • the set of instructions includes determining a user identity, retrieving a set of consumed content item selections associated with the user identity, and generating a consumed content list based at least partly on the set of content selections and the user identity.
  • a third exemplary embodiment provides a method that generates safe content discussion lists for a group of participants.
  • the method includes identifying a set of user identities associated with the group, retrieving a consumed content list for each user identity in the set of user identities, and generating a safe content list based at least partly on the consumed content lists.
  • a fourth exemplary embodiment provides a server that generates safe content discussion lists for a group of participants.
  • the server includes a processor for executing a set of instructions, and a non-transitory medium that stores the set of instructions.
  • the set of instructions includes identifying a set of user identities associated with the group, retrieving a consumed content list for each user identity in the set of user identities, and generating a safe content list based at least partly on the consumed content lists.
  • Section I provides a description of an exemplary system architecture used by some embodiments. Section II then describes various exemplary methods of operation used by some embodiments. Next, Section II described several example use cases of some embodiments. Lastly, Section IV describes a computer system which implements some of the embodiments. I. SYSTEM ARCHITECTURE
  • Figure 1 illustrates a schematic block diagram of an exemplary system 100 of some embodiments.
  • the system may include a set of user devices 110, one or more content servers 120, one or more consumption trackers 130, one or more spoiler trackers 140, a set of discussion servers 150, a set of storages 160, and a set of networks 170.
  • Each user device 110 may be a computing device such as, for instance, a smartphone, tablets, personal computer, laptop, television, monitor, etc.
  • the user device may be able to communicate with various other system components across one or more networks 170 and/or other appropriate communication channels.
  • Each content server 120 may be a computing device that is able to communicate
  • the content server 120 may provide multimedia content for consumption using the user device 110.
  • the content server 120 may provide content via various appropriate utilities and/or interfaces.
  • some user devices 110 may execute a dedicated application that interacts with the content server 120 to provide content via the user device 110.
  • some user devices 110 may access a content server using a web 115 browser and a web interface.
  • Some embodiments may provide content using one or more application programming interfaces (APIs) such that the content may be accessed by numerous players, web resources, etc.
  • APIs application programming interfaces
  • Each consumption tracker 130 may be a computing device that is able to generate, modify, and/or otherwise manage a set of user profiles associated with content consumption.
  • content “consumption” and/or “consumed content” may be referred to throughout the disclosure, such referenced lists and/or profiles may include “opted out” content as well.
  • Some embodiments may provide an application with a checklist interface that the participant interacts with to identify viewed content. Some embodiments may utilize an online
  • Some embodiments may use an audio/video watermarking service that automatically determines the content viewed by the user regardless of delivery system.
  • a database may include records or profiles for each user detailing what specific content the user has consumed. Such profiles may be stored at varying levels of granularity and
  • Each spoiler tracker 140 may be a computing device that is able to analyze one or more user profiles and/or consumed content lists and generate a set of safe content (i.e., content where no active participants wished to avoid disclosure of spoilers by indicating the content has 135 been viewed or opting-out).
  • the spoiler tracker may identify the participants in a conversation.
  • the tracker may be implemented via a mobile application that uses Bluetooth beacons to discover nearby users, or in the case of Internet conversation, the list of everyone in a current chat. After querying the database using the list of users, the database may return the intersection of all 140 content consumed by the group (i.e., content that is safe to discuss).
  • the spoiler tracker may also detail the content consumed by each participant, such that side conversations may be started among individuals that have consumed the same content.
  • Each discussion server 150 may be a computing device that allows communication among a group of user devices. Such a server may allow various types of user 145 interactions over various combinations of networks 170.
  • the discussion server 150 may allow users to define groups of users from which to generate safe content lists. Some embodiments may allow users to generate sub-groups and/or otherwise modify the user associations such that safe content lists may be generated for the sub-groups.
  • the storages 160 may be local and/or remote devices that are able to receive,
  • system 150 store, and/or provide data and/or instructions to other system components.
  • Some system elements may be associated with a local storage (e.g., an internal drive of a computing device) and/or remote storages (e.g., a network accessible storage).
  • the network(s) 170 may include various wired and/or wireless pathways among components.
  • the networks may include, for instance, Ethernet networks, WiFi networks, cellular
  • system 100 may be implemented in various different ways without departing from the scope of the disclosure. For instance, different embodiments may include additional elements and/or omit various elements. In addition, some elements may be provided using groups of components (and/or may be divided
  • Figure 2 illustrates a set of exemplary data structures 200 used by some embodiments.
  • the data structures may include multiple consumed content lists or user profiles 210-240 and one or more safe lists 250-260.
  • the safe items common to the group of profiles 210-240 are represented by a first highlight 270, while the additional safe
  • each user is associated with a list of consumed and/or opted out content.
  • the content may be represented using various identifiers (e.g., title, type, season, episode, version, performers, rating, etc.).
  • Safe list 250 includes items that have been viewed by all participants. Such a list
  • List 260 includes items viewed by participants associated with profiles 230-240. Such a list may be distributed to only those participants.
  • Some embodiments may provide safe lists within an appropriate user interface.
  • the lists may include summaries of the subject matter associated with each content item. In this way, users may be able to recognize the subject matter 175 disclosed by the content item.
  • Figure 3 illustrates a flow chart of an exemplary process 300 used by some embodiments to generate a list of consumed content items.
  • a process may be executed by a device such as, for example, consumption tracker 130, user device 110, and/or content 185 server 120.
  • the process may begin, for instance, when a user launches an application, navigates to a website, etc.
  • the process may identify (at 310) the user. Such an identification may be performed in various appropriate ways (e.g., by receiving a username and password or other account information, by retrieving information related to a user device associated with the user, 190 etc.). If the user is an existing user, information may be retrieved, whereas a new user may proceed through an appropriate registration process.
  • the process may retrieve (at 320) a list of user selections. Such selections may be received through various appropriate interfaces provided via a user device. The selections may identify previously consumed content, opted-out content, and/or any other content to be 195 excluded from spoiler protection. Opted-out content may include, for example, television series and/or specific episodes, movies and/or series of movies, genres, types of content (e.g., movies, books, etc.), and/or other appropriate sets of content items.
  • the process may then identify (at 330) any content sources associated with the user.
  • content sources may include, streaming or online services, in-home providers (e.g., 200 cable television, satellite television, etc.), cellular sources, etc.
  • the content sources may be identified using user identification information (e.g., username and password) associated with the various services to perform queries regarding content consumption.
  • the process may retrieve (at 340) lists of consumed content based on the user input, content sources, and/or other appropriate sources. Such lists may include various 205 identifiers and/or relevant information regarding the content.
  • the process may then determine (at 350) whether there is an existing consumed content list associated with the user. If the process determines that there is an existing list, the process may retrieve (at 360) the list (e.g., from an appropriate storage), and update (at 370) the list based on the information retrieved at 320 and/or 340.
  • the process may retrieve (at 360) the list (e.g., from an appropriate storage), and update (at 370) the list based on the information retrieved at 320 and/or 340.
  • the process may generate (at 380) a list. After generating (at 380) the list or updating (at 370) the list, the process may store (at 390) the list to an appropriate storage (and/or otherwise provide the list) and then may end.
  • Figure 4 illustrates a flow chart of an exemplary process 400 used by some
  • Such a process may be executed by a device such as, for example, spoiler tracker 140, user device 110, content server 120, and/or content tracker 130.
  • the process may begin, for instance, when a user launches an application, navigates to a website, joins or leaves a discussion, etc.
  • process 400 may identify (at 410) users in a conversation.
  • the users may be identified (at 410) users in a conversation. The users
  • 220 may be identified based on various appropriate criteria (e.g., physical presence, chat status, etc.).
  • the process may retrieve (at 420) consumed content lists associated with the identified participants. Such lists may be retrieved from an appropriate storage or server resource. The lists may be generated using a process such as process 300.
  • Process 400 may then generate (at 430) a list of safe content.
  • the list may be
  • Process 400 may then provide (at 440) the safe content list to the identified users.
  • the list may be provided in various appropriate ways (e.g., by pushing the list via a dedicated application, by making the list available through a web-based resource, etc.).
  • the process may optionally provide (at 450) the consumed content lists to each user and then may end.
  • Such lists may be provided such that participants in the discussion may be provided with information related to individual users (and/or sub-sets of users).
  • Figure 5 illustrates a flow chart of an exemplary process 500 used by some embodiments to generate a list of content items that are safe for discussion. Such a process may
  • Process 235 be executed by a device such as, for example, spoiler tracker 140, user device 110, content server 120, and/or content tracker 130.
  • the process may begin, for instance, when a user launches an application, navigates to a website, joins or leaves a discussion, etc.
  • Process 500 may performed as part of operation 440 described above.
  • process 500 may retrieve (at 510) a consumed content list associated
  • the process may then retrieve (at 520) a next content item from the list and add (at 530) the item to a safe list.
  • the process may compare (at 540) the content item to a next consumed content list from among the lists associated with the identified users. The process may then determine (at 550) whether the content item is present in the next consumed content list. If the 245 process determines that the item is not present, the process may remove (at 450) the item from the safe list. The process may repeat operations 520-550 until the process determines (at 550) that the item is present in the next consumed content list.
  • the process may then determine (at 570) whether all consumed content lists have been analyzed. If the process determines that all lists have not been analyzed, the process may 250 repeat operations 540-570 until the process determines (at 570) that all consumed content lists have been analyzed.
  • the process may determine (at 580) whether all items in the list retrieved at 510 have been analyzed. If the process determines (at 580) that all items have not been analyzed, the process may repeat operations 520-580 until the process determines (at 580)
  • Process 500 may be repeated to identify safe content among sub-sets of participants. Some embodiments may analyze multiple combinations of users to identify a number of safe content lists. Depending on the number of users, all possible groupings may be analyzed by some embodiments.
  • processes 300, 400, and/or 500 may be implemented in various different ways without departing from the scope of the disclosure. For instance, different embodiments may perform the operations in different orders than shown. As another example, some embodiments may include additional operations and/or omit some operations. Each process may be divided into a set of sub-processes and/or included as
  • Each process (and/or portions thereof) may be performed iteratively, based on some appropriate criteria.
  • a number of participants may define consumed content
  • 270 lists (e.g., using a process such as process 300).
  • the participants may plan to meet at a local coffee shop for discussion. Each user may launch a spoiler application on a cell phone as they approach or enter the coffee shop.
  • a device such as discussion server 150 may be used to determine when participants are at the coffee shop. Such a determination may be made in various ways (e.g., using global positioning system data from smartphones associated with the users, 275 determining that smartphones associated with the users are accessing a network resource using a wireless network provided by the coffee shop, etc.).
  • the process may retrieve consumed content lists associated with the active users and generate one or more safe content lists.
  • two or three of the participants may identify common subject matter that is not shared by the group.
  • Such participants may form 280 a sub-group (or sub-conversation) where additional material is included in the safe content list associated with the sub-set of users.
  • a number of users may form a message board using a social media resource.
  • the resource hosting the message board may request and receive consumed content lists (e.g., from a resource such as consumption tracker 130) and a safe content list (e.g., 285 from a resource such as spoiler tracker 140).
  • consumed content lists e.g., from a resource such as consumption tracker 130
  • a safe content list e.g., 285 from a resource such as spoiler tracker 140
  • the current safe content list may be displayed to users as they access the message board.
  • the safe content list may be updated as users consume additional content.
  • a group of users may wish to participate in a discussion group related to a particular television series.
  • Such a series may include multiple sets of episodes spread
  • the discussion group may include a listing of safe content that is based on active users (and/or sub/groups of users). In this way, users that have consumed additional content may discuss the additional subject matter when users with more limited
  • various processes and modules described above may be implemented completely using electronic circuitry that may include various sets of devices or elements (e.g., sensors, logic gates, analog to digital converters, digital to analog converters, comparators, etc.). Such circuitry may be able to perform functions and/or features that may be associated with various software elements described throughout.
  • Figure 6 illustrates a schematic block diagram of an exemplary computer system 600 used to implement some embodiments.
  • the system described above in reference to Figures 1-2 may be at least partially implemented using computer system 600.
  • the processes described in reference to Figures 3-5 may be at least partially implemented using sets of instructions that are executed using computer system 600.
  • Computer system 600 may be implemented using various appropriate devices.
  • the computer system may be implemented using one or more personal computers (PCs), servers, mobile devices (e.g., a smartphone), tablet devices, and/or any other appropriate devices.
  • the various devices may work alone (e.g., the computer system may be implemented as a single PC) or in conjunction (e.g., some components of the computer system may be provided by a PC).
  • computer system 600 may include at least one communication bus 605, one or more processors 610, a system memory 615, a read-only memory (ROM) 620, permanent storage devices 625, input devices 630, output devices 635, various other components 640 (e.g., a graphics processing unit), and one or more network interfaces 645.
  • Bus 605 represents all communication pathways among the elements of computer system 600. Such pathways may include wired, wireless, optical, and/or other appropriate communication pathways.
  • input devices 630 and/or output devices 635 may be coupled to the system 600 using a wireless connection protocol or system.
  • the processor 610 may, in order to execute the processes of some embodiments,
  • 330 retrieve instructions to execute and/or data to process from components such as system memory 615, ROM 620, and permanent storage device 625. Such instructions and data may be passed over bus 605.
  • System memory 615 may be a volatile read-and-write memory, such as a random access memory (RAM).
  • the system memory may store some of the instructions and data that the 335 processor uses at runtime.
  • the sets of instructions and/or data used to implement some embodiments may be stored in the system memory 615, the permanent storage device 625, and/or the read-only memory 620.
  • ROM 620 may store static data and instructions that may be used by processor 610 and/or other elements of the computer system.
  • Permanent storage device 625 may be a read-and-write memory device.
  • Permanent storage device may be a non-volatile memory unit that stores instructions and data even when computer system 600 is off or unpowered.
  • Computer system 600 may use a removable storage device and/or a remote storage device as the permanent storage device.
  • Input devices 630 may enable a user to communicate information to the computer system and/or manipulate various operations of the system.
  • the input devices may include 345 keyboards, cursor control devices, audio input devices and/or video input devices.
  • Output devices 635 may include printers, displays, and/or audio devices. Some or all of the input and/or output devices may be wirelessly or optically connected to the computer system.
  • Other components 640 may perform various other functions. These functions may include performing specific functions (e.g., graphics processing, sound processing, etc.),
  • computer system 600 may be coupled to one or more networks 650 through one or more network interfaces 645.
  • computer system 600 may be coupled to a web server on the Internet such that a web browser executing on computer system 600 may interact with the web server as a user interacts with an interface that
  • Computer system 600 may be able to access one or more remote storages 660 and one or more external components 665 through the network interface 645 and network 650.
  • the network interface(s) 645 may include one or more application programming interfaces (APIs) that may allow the computer system 600 to access remote systems and/or storages and also may allow remote systems and/or storages to access computer system 600 (or
  • APIs application programming interfaces
  • 370 may also be used in conjunction with some embodiments or components of some embodiments.
  • modules may be combined into a single functional block or element.
  • modules may be divided into multiple modules.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

L'invention concerne des manières de générer des listes de contenu utilisé. Ces listes comprennent des éléments de contenu basés sur des sélections reçues de l'utilisateur et/ou des listes d'un contenu visualisé récupérées à partir de fournisseurs de contenu. Les choix de l'utilisateur comprennent un contenu utilisé et un contenu retiré. Les listes de contenu utilisé sont utilisées pour générer une liste de contenu sûr destinée à une discussion dans un groupe d'utilisateurs. La liste de contenu sûr comprend un contenu qui a été utilisé (et/ou retiré) par tous les utilisateurs dans le groupe. Des listes de contenu sûr peuvent être générées pour divers sous-groupes d'utilisateurs. L'invention concerne également un procédé qui génère des listes de contenu utilisé, consistant à déterminer une identité d'utilisateur (310), à récupérer un ensemble de sélections d'éléments de contenu utilisé (320), et à générer une liste de contenu utilisé (380). L'invention concerne également un procédé qui génère des listes de discussion de contenu sûr pour un groupe, consistant à identifier un ensemble d'identités d'utilisateurs associées au groupe (410), à récupérer une liste de contenu utilisé pour chaque identité d'utilisateur (420), et à générer une liste de contenu sûr (430).
PCT/US2015/052034 2015-09-24 2015-09-24 Identification et prévention de spoiler dans une discussion multi-utilisateurs WO2017052563A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/US2015/052034 WO2017052563A1 (fr) 2015-09-24 2015-09-24 Identification et prévention de spoiler dans une discussion multi-utilisateurs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2015/052034 WO2017052563A1 (fr) 2015-09-24 2015-09-24 Identification et prévention de spoiler dans une discussion multi-utilisateurs

Publications (1)

Publication Number Publication Date
WO2017052563A1 true WO2017052563A1 (fr) 2017-03-30

Family

ID=54291641

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2015/052034 WO2017052563A1 (fr) 2015-09-24 2015-09-24 Identification et prévention de spoiler dans une discussion multi-utilisateurs

Country Status (1)

Country Link
WO (1) WO2017052563A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10978066B2 (en) 2019-01-08 2021-04-13 International Business Machines Corporation Analyzing information to provide topic avoidance alerts
US11011158B2 (en) 2019-01-08 2021-05-18 International Business Machines Corporation Analyzing data to provide alerts to conversation participants

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008132240A1 (fr) * 2007-04-30 2008-11-06 Mehdi Aminian Procédé d'intermédiation au sein d'un réseau social d'utilisateurs d'un service/d'une application pour exposer des articles de media pertinents
US20090083161A1 (en) * 2007-09-21 2009-03-26 Microsoft Corporation Preferred items list management
US20090083141A1 (en) * 2007-09-25 2009-03-26 Ari Craine Methods, systems, and computer program products for detecting and predicting user content interest
US20090240732A1 (en) * 2008-03-24 2009-09-24 Concert Technology Corporation Active playlist having dynamic media item groups
WO2010033946A2 (fr) * 2008-09-22 2010-03-25 Qualcomm Incorporated Procédés et appareils de réconciliation des versions des listes de contenu média dans des réseaux de communication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008132240A1 (fr) * 2007-04-30 2008-11-06 Mehdi Aminian Procédé d'intermédiation au sein d'un réseau social d'utilisateurs d'un service/d'une application pour exposer des articles de media pertinents
US20090083161A1 (en) * 2007-09-21 2009-03-26 Microsoft Corporation Preferred items list management
US20090083141A1 (en) * 2007-09-25 2009-03-26 Ari Craine Methods, systems, and computer program products for detecting and predicting user content interest
US20090240732A1 (en) * 2008-03-24 2009-09-24 Concert Technology Corporation Active playlist having dynamic media item groups
WO2010033946A2 (fr) * 2008-09-22 2010-03-25 Qualcomm Incorporated Procédés et appareils de réconciliation des versions des listes de contenu média dans des réseaux de communication

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10978066B2 (en) 2019-01-08 2021-04-13 International Business Machines Corporation Analyzing information to provide topic avoidance alerts
US11011158B2 (en) 2019-01-08 2021-05-18 International Business Machines Corporation Analyzing data to provide alerts to conversation participants

Similar Documents

Publication Publication Date Title
US10637941B2 (en) Contextual connection invitations
CN110383772B (zh) 用于消息收发机器人丰富通信的技术
CN107846569B (zh) 聚合当前的、依场境和/或依成员而相关的视频会议列表
US10139917B1 (en) Gesture-initiated actions in videoconferences
US20180359293A1 (en) Conducting private communications during a conference session
CN105900467B (zh) 离线内容共享
US9246917B2 (en) Live representation of users within online systems
US20180341374A1 (en) Populating a share-tray with content items that are identified as salient to a conference session
US9185134B1 (en) Architecture for moderating shared content consumption
WO2020236341A1 (fr) Fourniture de modèles d'interaction cohérents dans des sessions de communication
US10904481B1 (en) Broadcasting and managing call participation
US11824647B2 (en) Promotion of users in collaboration sessions
EP4307616A2 (fr) Permissions a commande dynamique pour gerer la communication de messages diriges sur un presentateur
US20220385607A1 (en) Dynamic control of access permissions for split message threads of a communication system
WO2013151791A1 (fr) Système et procédé de superposition de connexions multiples à partir d'une interface de navigateur unique
US10007410B2 (en) Incorporating user content within a communication session interface
US20140114992A1 (en) System and method for an awareness platform
WO2017052563A1 (fr) Identification et prévention de spoiler dans une discussion multi-utilisateurs
US20150295964A1 (en) Methods and systems for conducting an electronic device enhanced meeting
US10374988B2 (en) Activity beacon
US11038830B2 (en) Creating and sharing customizable chat spaces
WO2013102545A1 (fr) Procédé de communication instantanée entre des clients de messagerie instantanée
US11443348B1 (en) Conversational targeted content
US9047641B2 (en) Methods and systems for using metadata to represent social context information
CN111566687A (zh) 跨多个设备提供内容

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15778469

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15778469

Country of ref document: EP

Kind code of ref document: A1