`N"|"|"|N
`(19) World Intellectual Property
`=
`
`Organization
`International Bureau
`
`AIEEETEE ES Ta
`
`We
`
`(43) International Publication Date
`13 August 2055 (13.08.2015)
`
`WIPO PCT
`
`(1)) international Publication Number
`WO 2015/119605 Al
`
`VERNAL, Michael, 1601 Willow Road. Mlenfo Park, CA
`94025 (US)
`
`Agent: CHOL Hogene, L., Baker Tiotts LLP,
`Avenne, Suite ON}, Dallas,TX 75205 (US)
`
`2001 Ross
`
`Designated States fanless odiemadse indicated. Jar every
`ind afnational profecdon avediaties AB, AG, AL, AM,
`AQ, AY, ALU, AZ, BA, BB, BG, BR, BN, BR, BW, BY,
`Bg, CA, CH, Ch. CN, CO. CR, OO, C4, DEL DR, DM,
`
`DO, DZ, BC, BE, BG, ES, FL GB, OD, GH, GH, GM, GT,
`
`HN, OR, HU, BD, TLIN, IRIS, JPL RE, KG, BN, RPL RR,
`KY, LA, LO, ER, LR, LS, LT, LU, LY, MA, MB, ME,
`MG, MK, MIN, MEW, MAL MV MZ, BALISGL NE NOL NZ,
`OM, PAL PR, PO, PH, PL, PY, QA, RO, RS, RE RW, SAL
`
`
`3, SEL SG, SK, SL. SM.
`ST. SY, SY. TUL PE TM,
` TN,
`TR, TP, T2. UA, DG, OS, D2. VC, WN, 2A, 2M,
`ZW,
`Desiguated States :fanless othervdse indicated, jor every
`egicnal protection avaiiables: ARIPO (Bw, HH,
`
`
`S. MW, MZ, NA, RW) Sb, SL. SZ TZ.
`Ur ZM, ZW), Eurasian (AM, AZ, BY, AG, KZ, RU, TJ,
`
`
`iCuntinued om next pages
`
`($1) Ynternational Patent Classification:
`GO6P £7788 (2006004
`GO6P3/74 (2006.11)
`GU6O $630 (O12.01)
`
`(2}} Enternational Application Number
`
`PCTAUS201 4°01 5026
`
`{74}
`
`{813
`
`(22) Entersational Fibkag Gate:
`
`@&) Filing Language:
`
`(26) Publication Language:
`
`6 February 2014 (06.02 20t4)
`
`Lsolish
`
`Unglish
`
`(30) Prierity Data:
`IVPTT3 ATO
`
`3 February 2014 (03 (2014)
`
`fOSAUS8]. 160) Withow
`C7) Applicant. FACEBOOK, EXC.
`Road, Mente Park, CA 84025 (LIS),
`
`Ss
`
`(72)
`
`160! Wilkow Road,
`ftnventers: ERERSMAN, Thevids
`Menlo Park, CA S023 COS} LESSE Samuel 160) Wil-
`
`low Road, Menlo Park, CA STS (US) STOCKY,
`Fhomas, 160) Wither Road, Metilo Park, CLA $4025 (LIS).
`
`(84)
`
`) Abstract: Particular embodiments of a method comprise ana-
`wl
`ly
`“INE a Messsatge) ertone§sentiment analysis with Jespent1at
`iththe at te
`
`tets, Byimbols
`«or images
`Written char:
`One or more id
`
`
`}, each corre
`that represent an idea ar t
`
`
`ing to an identiped
`msettion inte a mes-
`
`sentiment, maythen be suggested 1 a ase t
`ne or raare of the kleo-
`
`sage, Upon receiving 4 user achectios
`
`
`
`grams in telstion bo some portion
`TOSSA, Ast
`relation.
`
`ecilic digheary Hnking the user-selected
`thay be saved in a user-s
`one or smote of the idex
`
`sms with the portion of the message, In
` HUH
`particular embodiments, the sentiment analysis mayincorporat
`cial-networking
`infonmaticn andor historical iengram usage in-
`Jormatiot,
`
`
`
`(54) Tithe IDBOGRAMS BASED ON SENTIMENT ANALYSIS
`ae
`
`lea z
`
`wo2015/119605ATTEEEn
`
`
`
`wo2015/119605 AQ TUITE
`
`TM), European (AL, AT, BRE, BG, CH, CY, C4, DE, DE, Published:
`
`iH,
`ES, #1, RR, GB GR, AR, AU, IB IS, IT. LT. LU,
`ith international secareh report (den. 213)
`LV, MC, MK, MT, NL, NO, 8L, PT, RO, RS, SE, SI. SK,
`EARPIECE GE
`SORES
`POPE NEES. ANTS
`SM, TR), GAPE (BR, BE, CE, CO, CL CM, GA, GN, GO,
`GW, KM, ML, MR, NE, SN, PDR, FG).
`
`
`
`WO 2035/E19608
`
`POEBOS26034015026
`
`1 of 50
`
`Ideograms Based on Sentiment Analysis
`
`TECHNICALFIELD
`
`iE]
`
`This disclosure generally relates to presentation of content on a conyputing device.
`
`BACKGROUND
`
`}2]
`
`A social-networking system, which may include a social-networking website,
`
`may enable its users (such as persons or organizations) to interact with it and with cach other
`
`through it. The social-networking system may, with input from a eser, create and store in the
`
`social-networking system a user profile associated with the user. The user profile may inchide
`
`demographic information, communication-channel information, and information en personal
`
`interests of the user. The social-networking system may also, with input fromm a user, create and
`
`store a record of relationships of the user with other users of the social-networking system, as
`
`well as provide services (¢.g., wall posts, photo-sharing, event organization, messaging, games,
`
`or advertisements) to facilitate social interaction betweenor amoung users.
`
`{3]
`
`The social-networking system may send over one or more networks content or
`
`messages related to its services fo a mobile or other computing device of a user. A user mayalso
`
`install software applications on a mobile or other computing device of the uscr for accessing a
`
`user profile of the user and other data within the soctal-networking system. The social-
`
`networking syslem may generate a personalized set of content objects to display to a user, sach
`
`as a newsfeed of apgreyatedstories of other users connected to the user.
`
`SUMMARYOF PARTICULAR EMBODIMENTS
`
`i]
`
`Particular embodiments described inthis disclosure relate to the use of ideograms
`
`in a text message input by an authoring user on a computing device. The author may input text
`
`on a mobile device to be sent to other asers through a numberof methods, including for example
`
`a messaging platform or a social-networking system. The ideograms will be sent to other users
`
`
`
`WO21S/119608
`
`PCT/US2044/013026
`
`2 of 30
`
`along with the message, and the receiving users will be able to view the ideogram in conjunction
`
`with the text message in the sare relative layout as the author's created message.
`
`[5]
`
`In ones particular embodiment, one or more of the ideograrms that maybe placed in
`
`a message may have restrictions on use or viewing. A user of the messaging platform or secial-
`
`networking system may need to be authorized in order te ase the ideogramin 3 message sent by
`
`that user, or to viewthe ideogram in messages sent by other users. User authorization may be set
`
`by any of maltipic methods, for cxarmple by membership in a particular group, certain attributes
`
`af the user’s profile, or by purchasing access to a sticker pack containing the restricted ideogram.
`
`if an unauthorized user attempts to use or view the restricted ideogram,
`
`the user may be
`
`presented instead with a warning message that he or she is imable to use or view the idcogram.
`
`The warming message may further inform the unauthorized user how he or she may gam
`
`authorization.
`
`[6|
`
`In another particular embodiment, the author of a message mayinput text that can.
`
`be analyzed by the computing device for the sentiment contained within the text. Sentiment
`
`analysis conducted on at least a portion ofthe input text may result in the identification of one or
`
`more sentiments, One or more ideograms maythen be suggested to the author that can substitute
`
`or supplementthe analyzed text. The suggestion of ideograms maybe user-specific, by the use of
`
`that individual author's idcogram usage history or personal ideogram dictionary. The suggestion
`
`may also be based on the ideogram usage history of others connected to the user, such as users
`
`sharing a cammon demographic attribute with the author or directed connected to the authorie a
`
`social network,
`
`[7}
`
`In another particular embodiment, expression analysis may be performed on the
`
`subject(s} of a captured image. The expression analysis may resulé in one or more expressions
`
`displayed by the subjects of the captured image. One or more ideoprams that can be substituted
`
`for the captured image may be suggested. The suggestion of ideagrams may be user-specific, by
`
`the use of that individual author's ideagram usage history or personal ideogram dictionary, The
`
`suggestion mayalso be based on the ideogramusage history of others connected to the user, such
`
`as users sharing a common demographic attmbete with the author or directed connected to the
`
`author in a social netwark,
`
`
`
`WO21S/119608
`
`PCT/US2044/013026
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`3 of 30
`
`[Sf
`
`BIG.
`
`IA ilustrates a mobile device with a text message thread containing
`
`ideagrams withinthe messages.
`
`[9]
`
`FIG. 1B illustrates a mobile device with a text message thread and a text entry
`
`area displayed, with the user typing in characters to trigger the display of Unicode ideograms.
`
`[18]
`
`FIG. 1C illustrates a mobile device showing 4 text message thread anda text entry
`
`area, with a pull-down menudisplaying a sticker pack of ideograms.
`
`(1¥]
`
`BIG. 2A illustrates a mobile device with a social network newsfeed displaying
`
`status update messages from other users that contain ideograms within the status updates.
`
`[12]
`
`FG. 2B ilustrates a mobile device displaying a status update user interface,
`
`where the user mayinsert ideograms into a text status update.
`
`[13]
`
`FRG. 2€ illustrates a mobile device with a social network newsfeed displaying
`
`status update messages from other users that are filtered for onty updates containing a particular
`
`idcozram.
`
`[14]
`
`FIG. 2D ilustrates a mobile device displaying a lst of trending ideograms, sorted.
`
`bypopularity amongst direct connections in a social network.
`
`[iS]
`
`FIG. 3 ilustrates an example method of restricting access to use or viewing of
`
`particular ideograms that require user authorization.
`
`}16]
`
`EG. 4A illustrates a mobile device showing an input text message where the
`
`author has attempted to insert a restricted idcogram and the messaging platform displays 4
`
`warming to the author that the ideagram is restricted.
`
`[17]
`
`FIG. 4B illustrates a mobile device that has sent a restricted ideovram, and an
`
`unauthorized recipient mobile device that displays a text message without
`
`the restricted
`
`ideogram.
`
`[18]
`
`FG. 5 illustrates an example method for suggesting ideograms to the author ofa
`
`message based on sentiment analysis condacted on the text that the eathor has imput.
`
`[19]
`
`PEG. OA ilfustrates a mobile device with a pop-up list of ideograms that are
`
`sugeested to the author based onsentiment analysis of the highlighted portion oftext.
`
`
`
`WO21S/119608
`
`PCT/US2044/013026
`
`4 of 30
`
`[28]
`
`FIG. 6B illustrates a mobile device with a soctal network newsfeed displaying
`
`status update messages from other users that inchide ideograms, with text descriptions of an
`
`ideoyram appearing on the display when the ideagramis tapped.
`
`[21]
`
`FIG. 6C iflustrates a robe device with a text message containing a hashtagged
`
`text phrase, and a recipient mobile device that has incorporated the hashtagged text phrase into
`
`an ideogram.
`
`[22]
`
`FIG. 7 illustrates an crample method for suggesting idcograms to the author of a
`
`message based on expression analysis conducted on a captured image including a person’s face.
`
`[23]
`
`FIG. 8Aillustrates a mobile device showing a front-facing camera view of the
`
`user of the mobile device.
`
`[24]
`
`£1G. &B illustrates a mobile device presenting the user with a hist of ideograms
`
`based on the expression analysis conducted on the captured image.
`
`[25]
`
`FIG. 8C illustrates a mobile device presenting the aser with a list of ideagrams
`
`basedon the expression analysis conducted on two subjects in a captured image.
`
`[26]
`
`FIG. 9 ilustrates an example network environment associated with a sacial-
`
`networking system.
`
`[27]
`
`[28]
`
`FIG. 10 illustrates an example social graph.
`
`EG. 11 illustrates an example computer systern.
`
`DESCRIPTION OF EXAMPLE EMBODIMENTS
`
`[29|
`
`Particular embodirnents feature the use of ideograms within visual digital
`
`messages, Ideograms may be written characters, symbols or images that represent an idea or
`thing without using letters or words; examples may be the wender symbols
`and ©, or images
`
`of a bunny with a snuling or angry expression. Ideagrams may be insertedinto text using digital
`
`images presented to an author ofthe text in a “sticker pack”, where a group of ideograms sharing
`
`a common theme or style may be displayed in a user interface cnabling the author to select
`
`idsograms to be inserted into the text. Alfernatively ideograms maybe insertedthrough standards
`
`hike Unicode which convert specific text strings to ideograms. For example,
`
`typing in the
`
`
`
`WO21S/119608
`
`PCT/US2044/013026
`
`5 of 30
`
`characters “:)" into an application that recognizes Unicode ideograms will convert
`
`those
`
`characters into the ideogram ©,
`
`[30] Messages may be sent between two computing devices using any of a number of
`
`messaging platforms including but not limited to e-mail, Short Messages Service (SMS), or
`
`instant message (IM), Messages may also be “breadcast” by an author to one or more recipients,
`
`ep. through posting a message or status update on a sacial networking system, or by posting a
`
`message on a platform such as Twitter. An idcogram may be mserted info a message and.
`
`displayed withm the image at any of a numberof points in time: they may be displayed when the
`
`author types in the ideograminto the message: when the author chooses to send the finished
`
`message: on the recetving device as the message is being received; or when the recipient opens
`
`the message ta read the message.
`
`[3#]
`
`FIG. LA shows an example embodiment wherein ideograms depicting expressive
`
`faces (sometimes called ernoticans or “emoji”)}, may be embedded within the text 120A-Eof a
`
`messapime platform LOL depicted on a front display 105 of a mobile device 100, The messaging
`
`platform 185 may be configured to send and receive image files representing ideograms or
`
`certain text strings corresponding to certam ideograms, and to display them to the author and
`
`recipient as an ideogram 121A within the message fleld E284.
`
`[32]
`
`FUG, 1B shows an example embodiment wherein the user authoring a message
`
`122 mayinsert one or more ideograms 721B mto the hody of the text message being sent. The
`
`messaging system may contain an aute-correcting system where the text message field
`
`automatically converts certain feat strmgs £28 into idcograms. This may occur through a
`
`standard such as Unicode, The author may select certain emofi fo convey a message consistent
`
`with or supplementing the text content of the message 122. Ideograrms may be placed at any
`
`position within the message, such as, by way of example and not limitation, the beginning,
`
`middie, or end of a text message. Alternatively, the author may choose io send a message
`
`containing only one or more idcegrams, without accompanying text.
`
`[33]
`
`FIG. §Cdepicts an example embodiment where the author of a message may be
`
`presented with a “sticker pack” window130 of ideograms 134 to be sent in the message. The
`
`sticker pack 130 may be displayed to the author for selection of one or more ideograms 135, The
`
`sticker pack 130 maybe displayed based on user input, e.g. if the user inputs a hashtag symbol,
`
`
`
`WO21S/119608
`
`PCT/US2044/013026
`
`6 of 30
`
`#, or by selection of a dedicated button [37 on the messaginy platform. Asticker pack 138 may
`
`consist of one or more ideograms 135 that has been classified into a particular group 131. The
`
`author may select a particular group from the category tabs I32A-C, and the sticker pack
`
`window [30 displays the selected group of ideagrams. For example,
`
`ideograms depicting 4
`
`particular artistic theme or character (such as Nappy Poe or Cute Bunny ideograms) may be
`
`grouped together. Other sticker packs may be selected by the author to insert other types of
`
`idcograms. The author’s device 100 may be preloaded with certain sets of sticker packs 130 for
`
`use In messaging: the author may also be presented with the option to purchase additional sticker
`
`packs containing additional ideograms. Alternatively, the messaging system may be configured
`
`to present the auther with the sticker pack of ideograms when certain conditions are met, for
`
`example by displaying the sticker packs at the end of eachsentence.
`
`[34]
`
`FIG. 2A depicts the use of ideograms im status Messages In a social network news
`
`feed 210. A receiving device 200 receives status messages sent by the recipient’s friends and
`
`acquaintances, and presents the status messages in a news feedto the recipient. The news feed
`
`contains one or more posts from other users, 226A-D. The status updates may also contain
`
`ideourams 225A-E contained within the body text of the status updates. The recipient may
`
`choose to comment on the status update, and may insert Ideograms into the body of the
`
`comments.
`
`[35]
`
`FIG. 2B depicts a user status update screen 230 for a social network, wherein the
`
`author may input a status or message 235 to be sent fo one or more other social network users.
`
`The group of users which may see the status update may be configured by the author. The status
`
`update input field may receive text, images, or video input by the author to post as a status
`
`update. The status update inpat field 235 mayalso be configured to present the author with the
`
`option of inserting ideograms 248. In FIG. 2B, a particular embodiment may present the option
`
`of inserting ideograms to the authorin a sticker pack format 240,
`
`[36]
`
`FIG. 2€
`
`depicts an interface of a social network that allows a recipient to sort
`
`status updates in a news feed by the ideograms contained within cach status update. For example,
`
`the recient may select any ideogramfrom the category tabs 250A-C. The ideograms displayed
`
`in the category tab may be selected based upon actual use of the ideograms by others a the
`
`social network; i.¢. by displaying the ideograms in order of popular use, Alternatively, the news
`
`
`
`WO21S/119608
`
`PCT/US2044/013026
`
`7 of 30
`
`feed may display only category tabs for ideograms that the recipient has explicitly selected to be
`
`placed on the category tabs (e.g. if the recipient docs not wish to sce status updates sorted by a
`
`sad emoticon, they could remove that option fromthe category tabs 250A-C).
`
`|37| When the recipient selects a particular ideogram 225A from the category tab
`
`280A,the list of status updates in the news feed 210 maybe refreshed to contain only messages
`
`containing the particular ideogram selected. For example, in FIG. 2C, the recipient has selected
`
`the tab 280A containing an ideogram of a smiling face. The hist of status updates belowhas
`
`filtered out messages that do not contain the same meogram, and has listed only messages with
`
`the same ideogram.
`
`[38]
`
`The selection of a particular tdeagram may be configured to show messages or
`
`status updates that contain onlythat particular ideogram, or messages or status updates that can
`
`contain other status updates so long as the selected ideogram is also included. For example,
`
`status updates 226A and 220B both display the selected ideogram of a smiling face, but also
`
`contain other ideoprams. A particular embodiment mayfilter those status updates out of the fist
`
`as well, and onlyfist status update 220D which contains only the selected ideogram. In another
`
`embodiment, the news feed mayinclude status updates 220A and 220B in addition to 220D.
`
`[39]
`
`FIG, 2B depicts an example embodiment where the recipient may view a list of
`
`idcograms 224 by a configured filter. The filter for display maybe the ideograms’ popularity in
`
`use by other users of the social network. The hist of ideograms maybe sorted by their popularity
`
`forall-time, or over a certain subset of time, suchas a particular month or year. One embadiment
`
`may list the most popular ideograms over a subset of tune dating to the present, such as the
`
`previous 7 or 30 days. This type of filtering, which may displaythe most popular ideograms over
`
`the most recent period of time, ray be called “wending”. The recipient may view the list of
`
`ideograms 265A-Eunder the particular filter 260, and view who if any friends or acquaintances
`
`have usedthat particular ideogram. Upon selection of ane of the ideograms 265A-E in the list,
`
`the recipient maybe directed to a list of the actual status updates using cach ideogram, similar to
`
`the interface in FIG. 2C.
`
`[46|
`
`FIG. 3 illustrates an example method 300 for providing ideograms into # messa
`ct3>
`wherein the ideograms may be restricted in use or in viewing by arecipient. An ideogram may
`
`ge=
`
`be restricted only in use; that is, an unauthorized author may be prevented from inserting a
`3
`:
`:
`¥
`i
`2
`
`
`
`WO21S/119608
`
`PCT/US2044/013026
`
`8 of 30
`
`restricted ideogram into a message. An ideogram may be additionally restricted in viewership,
`
`where ifa recipient is not an authorized user of the ideogram, he or she maybe restricted from
`
`even viewing the ideogram. Determination of who is authorized to use or view @ particular
`
`ideogramor set of ideograms maybe based on conditions set by the author, or by another entity.
`
`Restrictions to access to certain ideograms may include membership in a certain group. Groups
`
`determining authorization may consist of, for example: members of a certain social chub: people
`
`who have purchased access rights to the particular idecogram or sct of idcograms; direct
`
`connection to a particular user node or concept node ofa soctal network; people with phone
`
`numbers with a certain area code or prefix; or people whoaare registered users of a downloaded
`
`app en ther mobile device. Restrictions ta access may further be based on user-specific
`
`information inchiding a demographic attribute of the user (such as age, sex, gender, nationality,
`
`racial
`
`idennfication), a profile attribute of the user on the messaping platform or social
`
`networking systern, a status of the user (e.g, the device is in “pairing made” or “game mode”),
`
`parental controls set for the user's account, or a transaction history of the user. Transaction
`
`history requirements mayinchide requiring that users have played more than a preset number of
`
`games on a social-networking system, have attained a certainlevel within a game or have played
`
`a game more than a certain number of hours, have posted a certain number of comments orstatus
`
`updates, or are designated as administrators or officers of an organization.
`
`[4#|
`
`At step 380,
`
`ideograms may be selected for insertion mto a message or as a
`
`standalone message. Examples of messages are a fext message using a messaging platform to be
`
`str to one or more recipients, or a posted status update of the author’s profile on a social-
`
`networking system. The example method of FIG. 3 will embodya messaging platform.
`
`[42] Atstep 315, the messaging platform determines whether the ideogramselected by
`
`the author is restricted. If the author selects an ideogram with no restrictions, the ideagram may
`
`be inserted into the message as soon as the author selects it, step 316. Upon selection of an
`
`ideogramwith restricted access, a request for authorization to access the restricted ideogram may
`
`be sent bythe author's device.
`
`[43|
`
`Aft step 320,
`
`the messaging platform compares the author’s user profile to a
`
`database of authorized users. An example method of this step may be for a messaging platform
`
`on a social-networking system to connect to a server ofthe social-networking system to access a
`
`
`
`WO21S/119608
`
`PCT/US2044/013026
`
`9 of 30
`
`centralized database.Another example method maybe for the authonzation database to be stored
`
`locaily on the author’s computing device.
`
`[44]
`
`At step 325,
`
`the messaging platform may determine whether the author is
`
`authorized fo access the restricted ideogram. Determination of authorization may be based on
`
`whether the request for access comprises an authorization code or token, e.g. a cookie or SSL
`
`certificate.
`
`[45]
`
`At step 326, 1f the author is not authorized, the messaging platform may prevent
`
`the ideagram from being inserted, and may display a warning message informing the author that
`
`the ideogramis restricted. The author may then choose to abandon insertion of the ideogram, or
`
`find a way to gain authorization(e.g. by purchasing the sticker pack conlaining the restricted
`
`ideogram).
`
`[46]
`
`At step 330, if the author is an authorized user of the ideogram, the restricted
`
`ideogram maybe displayed to the author. The messaging platform may additionally determine if
`
`the author bas determined the recipients who will view this message. The author may choose as
`
`recipients one or several individuals, a specific group of individuals, or may be sending the
`
`message fo a wider group, ¢.g. a status update that is viewable by anydirect connections in a
`
`soctal network.
`
`[47]
`
`At step 338, af the author has selected one or more recipients, the messaging
`
`platform may determine if the recipients also are authorized users of the restricted ideogram.
`
`Deternmunation of authorization for the recipients may be conducted similarly to determination of
`
`authorization for the author, as discussed. in step 325.
`
`[48]
`
`At step 336, if one or more of the selected recipients are not authorized, the
`
`messaging platformmay display a warning to the author that the ideogram is restricted and that
`
`certain recigients may not be able to viewthe ideogram. The author may then have the option of
`
`deleting the ideogram from the message, or overriding the warming and proceeding with the
`
`message with the restricted ideogram.
`
`[49]
`
`At step 340, if all of the selected recipients are authorized, then the messaging
`
`platform may not display a wamuing and the ideagram will be inserted into the message. The
`
`idcozram may be placed at any number oflocations within the body of the message, far example
`
`
`
`WO21S/119608
`
`PCT/US2044/013026
`
`10 of 58
`
`at the beginning ofthe text, the end, or in the middie of the text. The text content of the message
`
`maywrap around the idsogramso that both the text andideogram are easily viewable.
`
`[50]
`
`At step 350, after the author has completed the message, he or she may choose to
`
`send ont the message to the intended one or more recipients. The messaging platform will send
`
`the message to the recipient devices, and the recipients will be able to view the message using a
`
`compatible messaging systern,
`
`[St]
`
`At step 355, the messaging platforms on the recipient devices may determine
`
`again if the particular recyent
`
`is an authorized user of the ideogram. This additional
`
`authorization check is used im case the author overrode the restricted-content response when the
`
`idcogram was inserted inte the message. Determinationof asthorration may be conducted in the
`
`same fushion as described in steps 325 and 335.
`
`[52]
`
`At step 356, if the recipient is not authorized to view the ideogram, then the
`
`recipient maybe able to viewthe message without the restricted ideogram; Le. the ideogram will
`
`be deleted or redacted from the message. The messaging platform or social network interface
`
`may inform the unauthorized recipient of the presence of a restricted ideagram. The recipient
`
`may then be presented with potential options for gaining authorization to that ideogram;: c.g. by
`
`purchasing a sticker packor byjoining a certain group.
`
`[33]
`
`At step 360, 1f the recipients are authorized users of the restricted ideogram, they
`
`may viewthe message exactly as the author sent it, ic. with the restricted ideograms.
`
`[54]
`
`Particular embodiments may repeat one or more steps of the method of FIG. 3,
`
`where appropnate. Although this disclosure describes and Ulustrates particular steps of the
`
`method of FIG. 3 as occurring in 4 particular order, this disclosure contemplates any suitable
`
`steps of the method of FIG. 3 occurring in any suitable order. Moreover, althoughthis disclosure
`
`describes and Ulustrates particular components, devices, or systems carrying out particular steps
`
`of the method of FIG. 3, this disclosure contemplates any suitable combination of any suitable
`
`corsponents, devices, or systems carrying out any suitable steps of the method of FIG. 3.
`
`[55]
`
`FIG. 4A depicts restrictions being placed on the user of particular ideograms. Tn.
`
`one embodiment,
`
`the author may be attempting fo insert an ideogram 405 belonging to a
`
`particular sticker pack 132D imto a text message 124. The ideogram 405 is restricted for use onty
`
`by authorized users. Unauthorized users may be unable to use the particular ideagram 465 or
`
`
`
`WO21S/119608
`
`PCT/US2044/013026
`
`Li of 50
`
`viewthe ideogram 405 in messages sent by authorizedusers. The device may display a warnmg
`
`410 to the author that the ideogram is restricted. This warning may be sent for all uses of the
`
`restricted ideogram, or only if the messaging platform determines that the message is being sent
`
`to an unauthorized recipient.
`
`[56]
`
`In FIG. 4B,
`
`the author has attempted to send a message 124 containing a
`
`restricted ideogram 405 to a device 260 belonging to a recipient who is not an authorized user.
`
`While the author may be able to input the restricted idcogram 405 inte the message 124, when
`
`the message 124 ts sent to the recipient, the ideozram 408 may have beon deleted from the
`
`received message I2QFE, The recipient may sec a message 120H containing the rest ofthe sent
`
`message 124 without the restricted ;deogram 405.
`
`[37]
`
`In particular embodiments, restrictions may serve to block the author from
`
`sending particular ideograms or any ideogramsat all to a designated recipient. Restrictions may
`
`be based on anyfactors, including but not limited to: attribates of the author and/or the recipient
`
`(¢.g., age or gender), the type of relationship between the authorandthe recipient (¢.g., manager-
`
`employee or mother-son)}, time of day, location. Such restrictions may be configured bythe
`
`author, by the recipient, by an entity in control of licensing usage rights to the ideogram, or by a
`
`site/system moderator.
`
`[58]
`
`FUG, § illustrates an example method 500 wherein the messaging platform may
`
`suggest certain ideagrams to the author of a message, based at least partly on the text content that
`
`the author has input. In the example method of FIG. 5, the suggestions made by the messaging
`
`platform may include sentiment analysis on the text content
`
`[39]
`
`At step S10, the author may input a text message into a messaging platform. Some
`
`text messages may be devoid of anyparticular attached sentiment, for example a reply of “yes.”
`
`Manyother text messages may contain one or more sentiments in the message.
`
`[66]
`
`At step 520, the messaging platform mayselect at least a part of the imput text
`
`message. As discussed in step 510 above, for some messages the messaging platform may
`
`determine that no part of the text can be selected for analysis. 1f the messaging platformdoes
`
`select at least a portion of the iyput message, the messaging platform mayproceed to the next
`
`step.
`
`
`
`WO21S/119608
`
`PCT/US2044/013026
`
`12 of 50
`
`[ot]
`
`At step 530,
`
`the messaging platform may conduct sentiment analysis on the
`
`selected text, Particular embodiments may incorporate any methodology of performing sentiment
`
`analysis upon a word, phrase, or other body of text (which mayor may not inchide idcograms),
`
`including by way of example and not limitation: polarity classification, sentiment classification
`
`according to a pre-defined set of emotional states, subjectivity/objectivity identification, or
`
`feature/aspect-based sentiment analysis. Sentiment analysis may be based upon, not just words,
`
`punctuation, and idcoegram usage, but also other indicia, such as, by way of cxample and not
`
`limitation: (1} analysis of audio including a voice to detect volume, tone, and/or inflection, (2)
`
`analysis of video to performfacial/gesture recognition and emotion detection, and/or (3) analysis
`
`of biametric sensor data to detect pulse, temperature, skin conductance, pressure and/or speed
`
`while typmg/clicking on a touchscreen, and/or papil constrictiondilation. At step 540, a
`
`messaging platform mayidentify oue or more sentiments to be associated with the input text.
`
`[62]
`
`Atstep §50, the messaging platform may then compare the available ideogramsto
`
`the identified one or more sentinicnts to Suggest at least one ideogram to the author of the ayput
`
`message. Factors incorporated into the sentiment analysis may inchide, by way of example and.
`
`not
`
`limitation: social networking information associated with the author of the message,
`
`information associated with the social networking connection betweenthe author and one or
`
`more recipients of the message, membership of the author or recipient in a group authorized to
`
`use a restricted ideogram, an ideogram usage history for the author of the message, or an
`
`idcogram usage history for other users of the social networksystem. In particudar embodiments,
`
`methods for perfornung sentiment analysis mayalso include not just such information associated
`
`with the author or recipient(s} of a message, but also semilar information associated with a
`
`“target” of a message: a person or concept mentioned in the message. In one ermbodimentt, the
`
`messaging platform may have indexed records in a database associating certain idcograms to a
`
`sentiment, The indexed records may be user-specific; each author may have different indices for
`
`various sentinrents and ideograms. Upon identification of at least one sentiment, the messaging
`
`platformmaydisplay the ideograms that are contained in the indexed record for that sentiment,
`
`and. present them to the author for selec