(12) INTERNATIONAL APPLICATION PUBLISHED ONDER THE PATENT COOPERATION TREATY (PCT)
`N"|"|"|N
`(19) World Intellectual Property
`=
`
`Organization
`International Bureau
`
`AIEEETEE ES Ta
`
`We
`
`(43) International Publication Date
`13 August 2055 (13.08.2015)
`
`WIPO PCT
`
`(1)) international Publication Number
`WO 2015/119605 Al
`
`VERNAL, Michael, 1601 Willow Road. Mlenfo Park, CA
`94025 (US)
`
`Agent: CHOL Hogene, L., Baker Tiotts LLP,
`Avenne, Suite ON}, Dallas,TX 75205 (US)
`
`2001 Ross
`
`Designated States fanless odiemadse indicated. Jar every
`ind afnational profecdon avediaties AB, AG, AL, AM,
`AQ, AY, ALU, AZ, BA, BB, BG, BR, BN, BR, BW, BY,
`Bg, CA, CH, Ch. CN, CO. CR, OO, C4, DEL DR, DM,
`
`DO, DZ, BC, BE, BG, ES, FL GB, OD, GH, GH, GM, GT,
`
`HN, OR, HU, BD, TLIN, IRIS, JPL RE, KG, BN, RPL RR,
`KY, LA, LO, ER, LR, LS, LT, LU, LY, MA, MB, ME,
`MG, MK, MIN, MEW, MAL MV MZ, BALISGL NE NOL NZ,
`OM, PAL PR, PO, PH, PL, PY, QA, RO, RS, RE RW, SAL
`
`
`3, SEL SG, SK, SL. SM.
`ST. SY, SY. TUL PE TM,
` TN,
`TR, TP, T2. UA, DG, OS, D2. VC, WN, 2A, 2M,
`ZW,
`Desiguated States :fanless othervdse indicated, jor every
`egicnal protection avaiiables: ARIPO (Bw, HH,
`
`
`S. MW, MZ, NA, RW) Sb, SL. SZ TZ.
`Ur ZM, ZW), Eurasian (AM, AZ, BY, AG, KZ, RU, TJ,
`
`
`iCuntinued om next pages
`
`($1) Ynternational Patent Classification:
`GO6P £7788 (2006004
`GO6P3/74 (2006.11)
`GU6O $630 (O12.01)
`
`(2}} Enternational Application Number
`
`PCTAUS201 4°01 5026
`
`{74}
`
`{813
`
`(22) Entersational Fibkag Gate:
`
`@&) Filing Language:
`
`(26) Publication Language:
`
`6 February 2014 (06.02 20t4)
`
`Lsolish
`
`Unglish
`
`(30) Prierity Data:
`IVPTT3 ATO
`
`3 February 2014 (03 (2014)
`
`fOSAUS8]. 160) Withow
`C7) Applicant. FACEBOOK, EXC.
`Road, Mente Park, CA 84025 (LIS),
`
`Ss
`
`(72)
`
`160! Wilkow Road,
`ftnventers: ERERSMAN, Thevids
`Menlo Park, CA S023 COS} LESSE Samuel 160) Wil-
`
`low Road, Menlo Park, CA STS (US) STOCKY,
`Fhomas, 160) Wither Road, Metilo Park, CLA $4025 (LIS).
`
`(84)
`
`) Abstract: Particular embodiments of a method comprise ana-
`wl
`ly
`“INE a Messsatge) ertone§sentiment analysis with Jespent1at
`iththe at te
`
`tets, Byimbols
`«or images
`Written char:
`One or more id
`
`
`}, each corre
`that represent an idea ar t
`
`
`ing to an identiped
`msettion inte a mes-
`
`sentiment, maythen be suggested 1 a ase t
`ne or raare of the kleo-
`
`sage, Upon receiving 4 user achectios
`
`
`
`grams in telstion bo some portion
`TOSSA, Ast
`relation.
`
`ecilic digheary Hnking the user-selected
`thay be saved in a user-s
`one or smote of the idex
`
`sms with the portion of the message, In
` HUH
`particular embodiments, the sentiment analysis mayincorporat
`cial-networking
`infonmaticn andor historical iengram usage in-
`Jormatiot,
`
`
`
`(54) Tithe IDBOGRAMS BASED ON SENTIMENT ANALYSIS
`ae
`
`lea z
`
`wo2015/119605ATTEEEn
`
`

`

`wo2015/119605 AQ TUITE
`
`TM), European (AL, AT, BRE, BG, CH, CY, C4, DE, DE, Published:
`
`iH,
`ES, #1, RR, GB GR, AR, AU, IB IS, IT. LT. LU,
`ith international secareh report (den. 213)
`LV, MC, MK, MT, NL, NO, 8L, PT, RO, RS, SE, SI. SK,
`EARPIECE GE
`SORES
`POPE NEES. ANTS
`SM, TR), GAPE (BR, BE, CE, CO, CL CM, GA, GN, GO,
`GW, KM, ML, MR, NE, SN, PDR, FG).
`
`

`

`WO 2035/E19608
`
`POEBOS26034015026
`
`1 of 50
`
`Ideograms Based on Sentiment Analysis
`
`TECHNICALFIELD
`
`iE]
`
`This disclosure generally relates to presentation of content on a conyputing device.
`
`BACKGROUND
`
`}2]
`
`A social-networking system, which may include a social-networking website,
`
`may enable its users (such as persons or organizations) to interact with it and with cach other
`
`through it. The social-networking system may, with input from a eser, create and store in the
`
`social-networking system a user profile associated with the user. The user profile may inchide
`
`demographic information, communication-channel information, and information en personal
`
`interests of the user. The social-networking system may also, with input fromm a user, create and
`
`store a record of relationships of the user with other users of the social-networking system, as
`
`well as provide services (¢.g., wall posts, photo-sharing, event organization, messaging, games,
`
`or advertisements) to facilitate social interaction betweenor amoung users.
`
`{3]
`
`The social-networking system may send over one or more networks content or
`
`messages related to its services fo a mobile or other computing device of a user. A user mayalso
`
`install software applications on a mobile or other computing device of the uscr for accessing a
`
`user profile of the user and other data within the soctal-networking system. The social-
`
`networking syslem may generate a personalized set of content objects to display to a user, sach
`
`as a newsfeed of apgreyatedstories of other users connected to the user.
`
`SUMMARYOF PARTICULAR EMBODIMENTS
`
`i]
`
`Particular embodiments described inthis disclosure relate to the use of ideograms
`
`in a text message input by an authoring user on a computing device. The author may input text
`
`on a mobile device to be sent to other asers through a numberof methods, including for example
`
`a messaging platform or a social-networking system. The ideograms will be sent to other users
`
`

`

`WO21S/119608
`
`PCT/US2044/013026
`
`2 of 30
`
`along with the message, and the receiving users will be able to view the ideogram in conjunction
`
`with the text message in the sare relative layout as the author's created message.
`
`[5]
`
`In ones particular embodiment, one or more of the ideograrms that maybe placed in
`
`a message may have restrictions on use or viewing. A user of the messaging platform or secial-
`
`networking system may need to be authorized in order te ase the ideogramin 3 message sent by
`
`that user, or to viewthe ideogram in messages sent by other users. User authorization may be set
`
`by any of maltipic methods, for cxarmple by membership in a particular group, certain attributes
`
`af the user’s profile, or by purchasing access to a sticker pack containing the restricted ideogram.
`
`if an unauthorized user attempts to use or view the restricted ideogram,
`
`the user may be
`
`presented instead with a warning message that he or she is imable to use or view the idcogram.
`
`The warming message may further inform the unauthorized user how he or she may gam
`
`authorization.
`
`[6|
`
`In another particular embodiment, the author of a message mayinput text that can.
`
`be analyzed by the computing device for the sentiment contained within the text. Sentiment
`
`analysis conducted on at least a portion ofthe input text may result in the identification of one or
`
`more sentiments, One or more ideograms maythen be suggested to the author that can substitute
`
`or supplementthe analyzed text. The suggestion of ideograms maybe user-specific, by the use of
`
`that individual author's idcogram usage history or personal ideogram dictionary. The suggestion
`
`may also be based on the ideogram usage history of others connected to the user, such as users
`
`sharing a cammon demographic attribute with the author or directed connected to the authorie a
`
`social network,
`
`[7}
`
`In another particular embodiment, expression analysis may be performed on the
`
`subject(s} of a captured image. The expression analysis may resulé in one or more expressions
`
`displayed by the subjects of the captured image. One or more ideoprams that can be substituted
`
`for the captured image may be suggested. The suggestion of ideagrams may be user-specific, by
`
`the use of that individual author's ideagram usage history or personal ideogram dictionary, The
`
`suggestion mayalso be based on the ideogramusage history of others connected to the user, such
`
`as users sharing a common demographic attmbete with the author or directed connected to the
`
`author in a social netwark,
`
`

`

`WO21S/119608
`
`PCT/US2044/013026
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`3 of 30
`
`[Sf
`
`BIG.
`
`IA ilustrates a mobile device with a text message thread containing
`
`ideagrams withinthe messages.
`
`[9]
`
`FIG. 1B illustrates a mobile device with a text message thread and a text entry
`
`area displayed, with the user typing in characters to trigger the display of Unicode ideograms.
`
`[18]
`
`FIG. 1C illustrates a mobile device showing 4 text message thread anda text entry
`
`area, with a pull-down menudisplaying a sticker pack of ideograms.
`
`(1¥]
`
`BIG. 2A illustrates a mobile device with a social network newsfeed displaying
`
`status update messages from other users that contain ideograms within the status updates.
`
`[12]
`
`FG. 2B ilustrates a mobile device displaying a status update user interface,
`
`where the user mayinsert ideograms into a text status update.
`
`[13]
`
`FRG. 2€ illustrates a mobile device with a social network newsfeed displaying
`
`status update messages from other users that are filtered for onty updates containing a particular
`
`idcozram.
`
`[14]
`
`FIG. 2D ilustrates a mobile device displaying a lst of trending ideograms, sorted.
`
`bypopularity amongst direct connections in a social network.
`
`[iS]
`
`FIG. 3 ilustrates an example method of restricting access to use or viewing of
`
`particular ideograms that require user authorization.
`
`}16]
`
`EG. 4A illustrates a mobile device showing an input text message where the
`
`author has attempted to insert a restricted idcogram and the messaging platform displays 4
`
`warming to the author that the ideagram is restricted.
`
`[17]
`
`FIG. 4B illustrates a mobile device that has sent a restricted ideovram, and an
`
`unauthorized recipient mobile device that displays a text message without
`
`the restricted
`
`ideogram.
`
`[18]
`
`FG. 5 illustrates an example method for suggesting ideograms to the author ofa
`
`message based on sentiment analysis condacted on the text that the eathor has imput.
`
`[19]
`
`PEG. OA ilfustrates a mobile device with a pop-up list of ideograms that are
`
`sugeested to the author based onsentiment analysis of the highlighted portion oftext.
`
`

`

`WO21S/119608
`
`PCT/US2044/013026
`
`4 of 30
`
`[28]
`
`FIG. 6B illustrates a mobile device with a soctal network newsfeed displaying
`
`status update messages from other users that inchide ideograms, with text descriptions of an
`
`ideoyram appearing on the display when the ideagramis tapped.
`
`[21]
`
`FIG. 6C iflustrates a robe device with a text message containing a hashtagged
`
`text phrase, and a recipient mobile device that has incorporated the hashtagged text phrase into
`
`an ideogram.
`
`[22]
`
`FIG. 7 illustrates an crample method for suggesting idcograms to the author of a
`
`message based on expression analysis conducted on a captured image including a person’s face.
`
`[23]
`
`FIG. 8Aillustrates a mobile device showing a front-facing camera view of the
`
`user of the mobile device.
`
`[24]
`
`£1G. &B illustrates a mobile device presenting the user with a hist of ideograms
`
`based on the expression analysis conducted on the captured image.
`
`[25]
`
`FIG. 8C illustrates a mobile device presenting the aser with a list of ideagrams
`
`basedon the expression analysis conducted on two subjects in a captured image.
`
`[26]
`
`FIG. 9 ilustrates an example network environment associated with a sacial-
`
`networking system.
`
`[27]
`
`[28]
`
`FIG. 10 illustrates an example social graph.
`
`EG. 11 illustrates an example computer systern.
`
`DESCRIPTION OF EXAMPLE EMBODIMENTS
`
`[29|
`
`Particular embodirnents feature the use of ideograms within visual digital
`
`messages, Ideograms may be written characters, symbols or images that represent an idea or
`thing without using letters or words; examples may be the wender symbols
`and ©, or images
`
`of a bunny with a snuling or angry expression. Ideagrams may be insertedinto text using digital
`
`images presented to an author ofthe text in a “sticker pack”, where a group of ideograms sharing
`
`a common theme or style may be displayed in a user interface cnabling the author to select
`
`idsograms to be inserted into the text. Alfernatively ideograms maybe insertedthrough standards
`
`hike Unicode which convert specific text strings to ideograms. For example,
`
`typing in the
`
`

`

`WO21S/119608
`
`PCT/US2044/013026
`
`5 of 30
`
`characters “:)" into an application that recognizes Unicode ideograms will convert
`
`those
`
`characters into the ideogram ©,
`
`[30] Messages may be sent between two computing devices using any of a number of
`
`messaging platforms including but not limited to e-mail, Short Messages Service (SMS), or
`
`instant message (IM), Messages may also be “breadcast” by an author to one or more recipients,
`
`ep. through posting a message or status update on a sacial networking system, or by posting a
`
`message on a platform such as Twitter. An idcogram may be mserted info a message and.
`
`displayed withm the image at any of a numberof points in time: they may be displayed when the
`
`author types in the ideograminto the message: when the author chooses to send the finished
`
`message: on the recetving device as the message is being received; or when the recipient opens
`
`the message ta read the message.
`
`[3#]
`
`FIG. LA shows an example embodiment wherein ideograms depicting expressive
`
`faces (sometimes called ernoticans or “emoji”)}, may be embedded within the text 120A-Eof a
`
`messapime platform LOL depicted on a front display 105 of a mobile device 100, The messaging
`
`platform 185 may be configured to send and receive image files representing ideograms or
`
`certain text strings corresponding to certam ideograms, and to display them to the author and
`
`recipient as an ideogram 121A within the message fleld E284.
`
`[32]
`
`FUG, 1B shows an example embodiment wherein the user authoring a message
`
`122 mayinsert one or more ideograms 721B mto the hody of the text message being sent. The
`
`messaging system may contain an aute-correcting system where the text message field
`
`automatically converts certain feat strmgs £28 into idcograms. This may occur through a
`
`standard such as Unicode, The author may select certain emofi fo convey a message consistent
`
`with or supplementing the text content of the message 122. Ideograrms may be placed at any
`
`position within the message, such as, by way of example and not limitation, the beginning,
`
`middie, or end of a text message. Alternatively, the author may choose io send a message
`
`containing only one or more idcegrams, without accompanying text.
`
`[33]
`
`FIG. §Cdepicts an example embodiment where the author of a message may be
`
`presented with a “sticker pack” window130 of ideograms 134 to be sent in the message. The
`
`sticker pack 130 may be displayed to the author for selection of one or more ideograms 135, The
`
`sticker pack 130 maybe displayed based on user input, e.g. if the user inputs a hashtag symbol,
`
`

`

`WO21S/119608
`
`PCT/US2044/013026
`
`6 of 30
`
`#, or by selection of a dedicated button [37 on the messaginy platform. Asticker pack 138 may
`
`consist of one or more ideograms 135 that has been classified into a particular group 131. The
`
`author may select a particular group from the category tabs I32A-C, and the sticker pack
`
`window [30 displays the selected group of ideagrams. For example,
`
`ideograms depicting 4
`
`particular artistic theme or character (such as Nappy Poe or Cute Bunny ideograms) may be
`
`grouped together. Other sticker packs may be selected by the author to insert other types of
`
`idcograms. The author’s device 100 may be preloaded with certain sets of sticker packs 130 for
`
`use In messaging: the author may also be presented with the option to purchase additional sticker
`
`packs containing additional ideograms. Alternatively, the messaging system may be configured
`
`to present the auther with the sticker pack of ideograms when certain conditions are met, for
`
`example by displaying the sticker packs at the end of eachsentence.
`
`[34]
`
`FIG. 2A depicts the use of ideograms im status Messages In a social network news
`
`feed 210. A receiving device 200 receives status messages sent by the recipient’s friends and
`
`acquaintances, and presents the status messages in a news feedto the recipient. The news feed
`
`contains one or more posts from other users, 226A-D. The status updates may also contain
`
`ideourams 225A-E contained within the body text of the status updates. The recipient may
`
`choose to comment on the status update, and may insert Ideograms into the body of the
`
`comments.
`
`[35]
`
`FIG. 2B depicts a user status update screen 230 for a social network, wherein the
`
`author may input a status or message 235 to be sent fo one or more other social network users.
`
`The group of users which may see the status update may be configured by the author. The status
`
`update input field may receive text, images, or video input by the author to post as a status
`
`update. The status update inpat field 235 mayalso be configured to present the author with the
`
`option of inserting ideograms 248. In FIG. 2B, a particular embodiment may present the option
`
`of inserting ideograms to the authorin a sticker pack format 240,
`
`[36]
`
`FIG. 2€
`
`depicts an interface of a social network that allows a recipient to sort
`
`status updates in a news feed by the ideograms contained within cach status update. For example,
`
`the recient may select any ideogramfrom the category tabs 250A-C. The ideograms displayed
`
`in the category tab may be selected based upon actual use of the ideograms by others a the
`
`social network; i.¢. by displaying the ideograms in order of popular use, Alternatively, the news
`
`

`

`WO21S/119608
`
`PCT/US2044/013026
`
`7 of 30
`
`feed may display only category tabs for ideograms that the recipient has explicitly selected to be
`
`placed on the category tabs (e.g. if the recipient docs not wish to sce status updates sorted by a
`
`sad emoticon, they could remove that option fromthe category tabs 250A-C).
`
`|37| When the recipient selects a particular ideogram 225A from the category tab
`
`280A,the list of status updates in the news feed 210 maybe refreshed to contain only messages
`
`containing the particular ideogram selected. For example, in FIG. 2C, the recipient has selected
`
`the tab 280A containing an ideogram of a smiling face. The hist of status updates belowhas
`
`filtered out messages that do not contain the same meogram, and has listed only messages with
`
`the same ideogram.
`
`[38]
`
`The selection of a particular tdeagram may be configured to show messages or
`
`status updates that contain onlythat particular ideogram, or messages or status updates that can
`
`contain other status updates so long as the selected ideogram is also included. For example,
`
`status updates 226A and 220B both display the selected ideogram of a smiling face, but also
`
`contain other ideoprams. A particular embodiment mayfilter those status updates out of the fist
`
`as well, and onlyfist status update 220D which contains only the selected ideogram. In another
`
`embodiment, the news feed mayinclude status updates 220A and 220B in addition to 220D.
`
`[39]
`
`FIG, 2B depicts an example embodiment where the recipient may view a list of
`
`idcograms 224 by a configured filter. The filter for display maybe the ideograms’ popularity in
`
`use by other users of the social network. The hist of ideograms maybe sorted by their popularity
`
`forall-time, or over a certain subset of time, suchas a particular month or year. One embadiment
`
`may list the most popular ideograms over a subset of tune dating to the present, such as the
`
`previous 7 or 30 days. This type of filtering, which may displaythe most popular ideograms over
`
`the most recent period of time, ray be called “wending”. The recipient may view the list of
`
`ideograms 265A-Eunder the particular filter 260, and view who if any friends or acquaintances
`
`have usedthat particular ideogram. Upon selection of ane of the ideograms 265A-E in the list,
`
`the recipient maybe directed to a list of the actual status updates using cach ideogram, similar to
`
`the interface in FIG. 2C.
`
`[46|
`
`FIG. 3 illustrates an example method 300 for providing ideograms into # messa
`ct3>
`wherein the ideograms may be restricted in use or in viewing by arecipient. An ideogram may
`
`ge=
`
`be restricted only in use; that is, an unauthorized author may be prevented from inserting a
`3
`:
`:

`i
`2
`
`

`

`WO21S/119608
`
`PCT/US2044/013026
`
`8 of 30
`
`restricted ideogram into a message. An ideogram may be additionally restricted in viewership,
`
`where ifa recipient is not an authorized user of the ideogram, he or she maybe restricted from
`
`even viewing the ideogram. Determination of who is authorized to use or view @ particular
`
`ideogramor set of ideograms maybe based on conditions set by the author, or by another entity.
`
`Restrictions to access to certain ideograms may include membership in a certain group. Groups
`
`determining authorization may consist of, for example: members of a certain social chub: people
`
`who have purchased access rights to the particular idecogram or sct of idcograms; direct
`
`connection to a particular user node or concept node ofa soctal network; people with phone
`
`numbers with a certain area code or prefix; or people whoaare registered users of a downloaded
`
`app en ther mobile device. Restrictions ta access may further be based on user-specific
`
`information inchiding a demographic attribute of the user (such as age, sex, gender, nationality,
`
`racial
`
`idennfication), a profile attribute of the user on the messaping platform or social
`
`networking systern, a status of the user (e.g, the device is in “pairing made” or “game mode”),
`
`parental controls set for the user's account, or a transaction history of the user. Transaction
`
`history requirements mayinchide requiring that users have played more than a preset number of
`
`games on a social-networking system, have attained a certainlevel within a game or have played
`
`a game more than a certain number of hours, have posted a certain number of comments orstatus
`
`updates, or are designated as administrators or officers of an organization.
`
`[4#|
`
`At step 380,
`
`ideograms may be selected for insertion mto a message or as a
`
`standalone message. Examples of messages are a fext message using a messaging platform to be
`
`str to one or more recipients, or a posted status update of the author’s profile on a social-
`
`networking system. The example method of FIG. 3 will embodya messaging platform.
`
`[42] Atstep 315, the messaging platform determines whether the ideogramselected by
`
`the author is restricted. If the author selects an ideogram with no restrictions, the ideagram may
`
`be inserted into the message as soon as the author selects it, step 316. Upon selection of an
`
`ideogramwith restricted access, a request for authorization to access the restricted ideogram may
`
`be sent bythe author's device.
`
`[43|
`
`Aft step 320,
`
`the messaging platform compares the author’s user profile to a
`
`database of authorized users. An example method of this step may be for a messaging platform
`
`on a social-networking system to connect to a server ofthe social-networking system to access a
`
`

`

`WO21S/119608
`
`PCT/US2044/013026
`
`9 of 30
`
`centralized database.Another example method maybe for the authonzation database to be stored
`
`locaily on the author’s computing device.
`
`[44]
`
`At step 325,
`
`the messaging platform may determine whether the author is
`
`authorized fo access the restricted ideogram. Determination of authorization may be based on
`
`whether the request for access comprises an authorization code or token, e.g. a cookie or SSL
`
`certificate.
`
`[45]
`
`At step 326, 1f the author is not authorized, the messaging platform may prevent
`
`the ideagram from being inserted, and may display a warning message informing the author that
`
`the ideogramis restricted. The author may then choose to abandon insertion of the ideogram, or
`
`find a way to gain authorization(e.g. by purchasing the sticker pack conlaining the restricted
`
`ideogram).
`
`[46]
`
`At step 330, if the author is an authorized user of the ideogram, the restricted
`
`ideogram maybe displayed to the author. The messaging platform may additionally determine if
`
`the author bas determined the recipients who will view this message. The author may choose as
`
`recipients one or several individuals, a specific group of individuals, or may be sending the
`
`message fo a wider group, ¢.g. a status update that is viewable by anydirect connections in a
`
`soctal network.
`
`[47]
`
`At step 338, af the author has selected one or more recipients, the messaging
`
`platform may determine if the recipients also are authorized users of the restricted ideogram.
`
`Deternmunation of authorization for the recipients may be conducted similarly to determination of
`
`authorization for the author, as discussed. in step 325.
`
`[48]
`
`At step 336, if one or more of the selected recipients are not authorized, the
`
`messaging platformmay display a warning to the author that the ideogram is restricted and that
`
`certain recigients may not be able to viewthe ideogram. The author may then have the option of
`
`deleting the ideogram from the message, or overriding the warming and proceeding with the
`
`message with the restricted ideogram.
`
`[49]
`
`At step 340, if all of the selected recipients are authorized, then the messaging
`
`platform may not display a wamuing and the ideagram will be inserted into the message. The
`
`idcozram may be placed at any number oflocations within the body of the message, far example
`
`

`

`WO21S/119608
`
`PCT/US2044/013026
`
`10 of 58
`
`at the beginning ofthe text, the end, or in the middie of the text. The text content of the message
`
`maywrap around the idsogramso that both the text andideogram are easily viewable.
`
`[50]
`
`At step 350, after the author has completed the message, he or she may choose to
`
`send ont the message to the intended one or more recipients. The messaging platform will send
`
`the message to the recipient devices, and the recipients will be able to view the message using a
`
`compatible messaging systern,
`
`[St]
`
`At step 355, the messaging platforms on the recipient devices may determine
`
`again if the particular recyent
`
`is an authorized user of the ideogram. This additional
`
`authorization check is used im case the author overrode the restricted-content response when the
`
`idcogram was inserted inte the message. Determinationof asthorration may be conducted in the
`
`same fushion as described in steps 325 and 335.
`
`[52]
`
`At step 356, if the recipient is not authorized to view the ideogram, then the
`
`recipient maybe able to viewthe message without the restricted ideogram; Le. the ideogram will
`
`be deleted or redacted from the message. The messaging platform or social network interface
`
`may inform the unauthorized recipient of the presence of a restricted ideagram. The recipient
`
`may then be presented with potential options for gaining authorization to that ideogram;: c.g. by
`
`purchasing a sticker packor byjoining a certain group.
`
`[33]
`
`At step 360, 1f the recipients are authorized users of the restricted ideogram, they
`
`may viewthe message exactly as the author sent it, ic. with the restricted ideograms.
`
`[54]
`
`Particular embodiments may repeat one or more steps of the method of FIG. 3,
`
`where appropnate. Although this disclosure describes and Ulustrates particular steps of the
`
`method of FIG. 3 as occurring in 4 particular order, this disclosure contemplates any suitable
`
`steps of the method of FIG. 3 occurring in any suitable order. Moreover, althoughthis disclosure
`
`describes and Ulustrates particular components, devices, or systems carrying out particular steps
`
`of the method of FIG. 3, this disclosure contemplates any suitable combination of any suitable
`
`corsponents, devices, or systems carrying out any suitable steps of the method of FIG. 3.
`
`[55]
`
`FIG. 4A depicts restrictions being placed on the user of particular ideograms. Tn.
`
`one embodiment,
`
`the author may be attempting fo insert an ideogram 405 belonging to a
`
`particular sticker pack 132D imto a text message 124. The ideogram 405 is restricted for use onty
`
`by authorized users. Unauthorized users may be unable to use the particular ideagram 465 or
`
`

`

`WO21S/119608
`
`PCT/US2044/013026
`
`Li of 50
`
`viewthe ideogram 405 in messages sent by authorizedusers. The device may display a warnmg
`
`410 to the author that the ideogram is restricted. This warning may be sent for all uses of the
`
`restricted ideogram, or only if the messaging platform determines that the message is being sent
`
`to an unauthorized recipient.
`
`[56]
`
`In FIG. 4B,
`
`the author has attempted to send a message 124 containing a
`
`restricted ideogram 405 to a device 260 belonging to a recipient who is not an authorized user.
`
`While the author may be able to input the restricted idcogram 405 inte the message 124, when
`
`the message 124 ts sent to the recipient, the ideozram 408 may have beon deleted from the
`
`received message I2QFE, The recipient may sec a message 120H containing the rest ofthe sent
`
`message 124 without the restricted ;deogram 405.
`
`[37]
`
`In particular embodiments, restrictions may serve to block the author from
`
`sending particular ideograms or any ideogramsat all to a designated recipient. Restrictions may
`
`be based on anyfactors, including but not limited to: attribates of the author and/or the recipient
`
`(¢.g., age or gender), the type of relationship between the authorandthe recipient (¢.g., manager-
`
`employee or mother-son)}, time of day, location. Such restrictions may be configured bythe
`
`author, by the recipient, by an entity in control of licensing usage rights to the ideogram, or by a
`
`site/system moderator.
`
`[58]
`
`FUG, § illustrates an example method 500 wherein the messaging platform may
`
`suggest certain ideagrams to the author of a message, based at least partly on the text content that
`
`the author has input. In the example method of FIG. 5, the suggestions made by the messaging
`
`platform may include sentiment analysis on the text content
`
`[39]
`
`At step S10, the author may input a text message into a messaging platform. Some
`
`text messages may be devoid of anyparticular attached sentiment, for example a reply of “yes.”
`
`Manyother text messages may contain one or more sentiments in the message.
`
`[66]
`
`At step 520, the messaging platform mayselect at least a part of the imput text
`
`message. As discussed in step 510 above, for some messages the messaging platform may
`
`determine that no part of the text can be selected for analysis. 1f the messaging platformdoes
`
`select at least a portion of the iyput message, the messaging platform mayproceed to the next
`
`step.
`
`

`

`WO21S/119608
`
`PCT/US2044/013026
`
`12 of 50
`
`[ot]
`
`At step 530,
`
`the messaging platform may conduct sentiment analysis on the
`
`selected text, Particular embodiments may incorporate any methodology of performing sentiment
`
`analysis upon a word, phrase, or other body of text (which mayor may not inchide idcograms),
`
`including by way of example and not limitation: polarity classification, sentiment classification
`
`according to a pre-defined set of emotional states, subjectivity/objectivity identification, or
`
`feature/aspect-based sentiment analysis. Sentiment analysis may be based upon, not just words,
`
`punctuation, and idcoegram usage, but also other indicia, such as, by way of cxample and not
`
`limitation: (1} analysis of audio including a voice to detect volume, tone, and/or inflection, (2)
`
`analysis of video to performfacial/gesture recognition and emotion detection, and/or (3) analysis
`
`of biametric sensor data to detect pulse, temperature, skin conductance, pressure and/or speed
`
`while typmg/clicking on a touchscreen, and/or papil constrictiondilation. At step 540, a
`
`messaging platform mayidentify oue or more sentiments to be associated with the input text.
`
`[62]
`
`Atstep §50, the messaging platform may then compare the available ideogramsto
`
`the identified one or more sentinicnts to Suggest at least one ideogram to the author of the ayput
`
`message. Factors incorporated into the sentiment analysis may inchide, by way of example and.
`
`not
`
`limitation: social networking information associated with the author of the message,
`
`information associated with the social networking connection betweenthe author and one or
`
`more recipients of the message, membership of the author or recipient in a group authorized to
`
`use a restricted ideogram, an ideogram usage history for the author of the message, or an
`
`idcogram usage history for other users of the social networksystem. In particudar embodiments,
`
`methods for perfornung sentiment analysis mayalso include not just such information associated
`
`with the author or recipient(s} of a message, but also semilar information associated with a
`
`“target” of a message: a person or concept mentioned in the message. In one ermbodimentt, the
`
`messaging platform may have indexed records in a database associating certain idcograms to a
`
`sentiment, The indexed records may be user-specific; each author may have different indices for
`
`various sentinrents and ideograms. Upon identification of at least one sentiment, the messaging
`
`platformmaydisplay the ideograms that are contained in the indexed record for that sentiment,
`
`and. present them to the author for selec

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.

We are unable to display this document.

PTO Denying Access

Refresh this Document
Go to the Docket