Preference visualization system and censorship system
First Claim
1. A method for making a preference available, the method comprising the steps of:
- receiving, by a processor, from a censorship device, data generated by an individual person that is within a field-of-censorship;
generating, by the processor, historical information regarding a history of an object indicated by text data based on the received individual person generated data;
extracting, by the processor, historical text data that satisfies a predetermined historical condition regarding the generated historical information;
generating, by the processor, a number of references in connection with a user ID that identifies the individual person who has generated the individual person generated data, the number of references indicating a number of times the text data is at least one of;
re-posted, re-tweeted or referred to in an email chain;
extracting, by the processor, particular text data that satisfies a predetermined reference condition, based on the number of references, out of the historical text data;
transmitting, by the processor, to the censorship device, the particular text data thereby making the particular text data available to the censorship system; and
generating, by the censorship device, a censorship control command as a specific executable command for the individual person based on the related text data, wherein the censorship control command causes blocking of information containing the particular text data.
2 Assignments
0 Petitions
Accused Products
Abstract
The information processing system of the present application extracts data that satisfies both a predetermined relation condition characterized for each community regarding an object and a predetermined characteristic condition characterized for each community regarding an attribute of the object, from the decomposed text data that can identify the meaning, the decomposed text data obtained by decomposing text data based on individual person generated data generated by many individual persons who take part in and configure a main system, and extracts data that satisfies a particular condition indicating a predetermined particularity characterized for each community regarding the object so as to detect the predetermined particularity to make it available, thereby determining an individual person to be monitored and the contents of monitoring for controlling the monitoring.
-
Citations
24 Claims
-
1. A method for making a preference available, the method comprising the steps of:
-
receiving, by a processor, from a censorship device, data generated by an individual person that is within a field-of-censorship; generating, by the processor, historical information regarding a history of an object indicated by text data based on the received individual person generated data; extracting, by the processor, historical text data that satisfies a predetermined historical condition regarding the generated historical information; generating, by the processor, a number of references in connection with a user ID that identifies the individual person who has generated the individual person generated data, the number of references indicating a number of times the text data is at least one of;
re-posted, re-tweeted or referred to in an email chain;extracting, by the processor, particular text data that satisfies a predetermined reference condition, based on the number of references, out of the historical text data; transmitting, by the processor, to the censorship device, the particular text data thereby making the particular text data available to the censorship system; and generating, by the censorship device, a censorship control command as a specific executable command for the individual person based on the related text data, wherein the censorship control command causes blocking of information containing the particular text data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of censorship, the method comprising the steps of:
-
generating, by an information availability device, historical information regarding a history of an object indicated by individual person generated data generated by an individual person; extracting, by the information availability device, text data that satisfies a predetermined historical condition regarding the generated historical information out of the individual person generated data; determining, by the information availability device, a number of references to an object in the extracted text data in connection with a user ID capable of identifying the individual person who has generated the individual person generated data, the number of references to the object indicating a number of times the object indicated by the individual person generated data is referred to, the number of times the object is referred to being a number of times the object is one of;
re-posted, re-tweeted and referred to in an email chain;extracting, by the information availability device, related text data that satisfies a predetermined reference condition based on the number of references; transmitting, by the information availability device to a censorship device via a network, a particular expression related to the object; generating, by the censorship device, monitoring information based on the related text data; and generating, by the censorship device, a censorship control command as a specific executable command for the individual person based on the monitoring information, wherein the censorship control command causes blocking of information containing the particular expression. - View Dependent Claims (15)
-
-
16. A censorship system comprising:
one or more processors programmed to; receive, from a censorship device, data generated by an individual person that is within a field-of-censorship; generate historical information regarding a history of an object indicated by text data based on the received individual person generated data; extract historical text data that satisfies a predetermined historical condition regarding the generated historical information; generate a number of references in connection with a user ID that identifies the individual person who has generated the individual person generated data, the number of references indicating a number of times the text data is at least one of;
re-posted, re-tweeted or referred to in an email chain;extract particular text data that satisfies a predetermined reference condition, based on the number of references, out of the historical text data; transmit, to the censorship device, the particular text data thereby making the particular text data available to the censorship system; and generate a censorship control command as a specific executable command for the individual person based on the related text data, wherein the censorship control command causes blocking of information containing the particular text data. - View Dependent Claims (17, 18, 19, 22)
-
20. A censorship system comprising:
one or more processors programmed to; generate historical information regarding a history of an object indicated by individual person generated data generated by an individual person; extract text data that satisfies a predetermined historical condition regarding the generated historical information out of the individual person generated data; determine a number of references to an object in the extracted text data in connection with a user ID capable of identifying the individual person who has generated the individual person generated data, the number of references to the object indicating a number of times the object indicated by the individual person generated data is referred to, the number of times the object is referred to being a number of times the object is one of;
re-posted, re-tweeted and referred to in an email chain;extract related text data that satisfies a predetermined reference condition based on the number of references; and transmit, to a censorship device via a network, a particular expression related to the object, wherein the censorship device generates;
(i) monitoring information based on the related text data, and (ii) a censorship control command as a specific executable command for the individual person based on the monitoring information, andthe censorship control command causes blocking of information containing the particular expression. - View Dependent Claims (21, 23, 24)
Specification