Method and system for the automatic recognition of deceptive language
First Claim
1. A system for identifying deception within a text, comprising:
- a processor for storing and processing a text file containing statements from a particular person whose credibility is being weighed as to verifiable propositions included in the text; and
a memory;
a deception indicator tag analyzer stored in memory and executing on the processor for inserting into the stored text file at least one deception indicator tag that identifies a potentially deceptive word or phrase at its location within the text file, andan interpreter stored in memory and executing on the processor for(a) interpreting the at least one deception indicator tag to determine a distribution of potentially deceptive words or phrases within the text file and for computing and storing for user review deception likelihood data based upon the distribution of potentially deceptive words or phrases within the text file, said deception likelihood data including a calculated distribution proximity metric for a plurality of words or phrases in the text file based upon the proximity of a word or phrase to the at least one deception indicator tag; and
(b) marking words in the text file with differentiating indicia showing the proximity level calculated, to identify areas of the text file more likely to involve deception.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for identifying deception within a text includes a processor for receiving and processing a text file. The processor includes a deception indicator tag analyzer for inserting into the text file at least one deception indicator tag that identifies a potentially deceptive word or phrase within the text file, and an interpreter for interpreting the at least one deception indicator tag to determine a distribution of potentially deceptive word or phrases within the text file and generating deception likelihood data based upon the density or distribution of potentially deceptive word or phrases within the text file. A method for identifying deception within a text includes the steps of receiving a first text to be analyzed, normalizing the first text to produce a normalized text, inserting into the normalized text at least one part-of-speech tag that identifies a part of speech of a word associated with the part-of-speech tag, inserting into the normalized text at least one syntactic label that identifies a linguistic construction of one or more words associated with the syntactic label, inserting into the normalized text at least one deception indicator tag that identifies a potentially deceptive word or phrase within the normalized text, interpreting the at least one deception indicator tag to determine a distribution of potentially deceptive word or phrases within the normalized text, and generating deception likelihood data based upon the density or frequency of distribution of potentially deceptive word or phrases within the normalized text.
-
Citations
22 Claims
-
1. A system for identifying deception within a text, comprising:
-
a processor for storing and processing a text file containing statements from a particular person whose credibility is being weighed as to verifiable propositions included in the text; and a memory; a deception indicator tag analyzer stored in memory and executing on the processor for inserting into the stored text file at least one deception indicator tag that identifies a potentially deceptive word or phrase at its location within the text file, and an interpreter stored in memory and executing on the processor for (a) interpreting the at least one deception indicator tag to determine a distribution of potentially deceptive words or phrases within the text file and for computing and storing for user review deception likelihood data based upon the distribution of potentially deceptive words or phrases within the text file, said deception likelihood data including a calculated distribution proximity metric for a plurality of words or phrases in the text file based upon the proximity of a word or phrase to the at least one deception indicator tag; and (b) marking words in the text file with differentiating indicia showing the proximity level calculated, to identify areas of the text file more likely to involve deception. - View Dependent Claims (2)
-
-
3. A system for identifying deception within a text, comprising:
-
a processor for storing and processing a text file containing statements from a particular person whose credibility is being weighed as to verifiable propositions included in the text; and a memory; a deception indicator tag analyzer stored in memory and executing on the processor for inserting into the stored text file at least one deception indicator tag that identifies a potentially deceptive word or phrase at its location within the text file, and an interpreter stored in memory and executing on the processor for interpreting the at least one deception indicator tag to determine a distribution of potentially deceptive words or phrases within the text file and for computing and storing for user review deception likelihood data based upon the distribution of potentially deceptive words or phrases within the text file, said deception likelihood data including a calculated distribution proximity metric for a plurality of words or phrases in the text file based upon the proximity of a word or phrase to the at least one deception indicator tag, the proximity metric comprising a moving average metric for the plurality of words and phrases in the text file based upon the proximity metric of the word or phrase, wherein the moving average metric comprises a portion of the deception likelihood data and said interpreter inserts in the text file the proximity metric for the plurality of words and phrases to identify areas of the text file that are likely or unlikely to be deceptive. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10)
-
-
11. A method performed by a programmed processor for identifying deception within a text, comprising the steps of:
-
receiving by the processor a first text to be analyzed containing statements from a particular person whose credibility is being weighed as to verifiable propositions included in the text; normalizing the first text by the processor to produce a normalized text; inserting into the normalized text by the processor at least one part-of-speech tag that identifies a part of speech of a word associated with the part-of-speech tag; inserting into the normalized text by the processor at least one syntactic label that identifies a linguistic construction of one or more words associated with the syntactic label; responsive to a deception tag analyzer that analyzes the normalized text and identifies potentially deceptive words and phrases, inserting into the normalized text by the processor at least one deception indicator tag that identifies a potentially deceptive word or phrase indicating a non-truthful statement at its location within the normalized text; and interpreting the at least one deception indicator tag by (a) generating, by the processor computing and storing for user review, deception likelihood data based upon the distribution of potentially deceptive words or phrases within the normalized text, said deception likelihood data including a calculated distribution proximity metric for a plurality of words or phrases in the text file based upon the proximity of a word or phrase to the at least one deception indicator tag, and (b) marking words in the text file with differentiating indicia showing the proximity level calculated, to identify areas of the text file more likely to involve deception. - View Dependent Claims (12)
-
-
13. A method performed by a programmed processor for identifying deception within a text, comprising the steps of:
-
receiving by the processor a first text to be analyzed containing statements from a particular person whose credibility is being weighed as to verifiable propositions included in the text; normalizing the first text by the processor to produce a normalized text; inserting into the normalized text by the processor at least one part-of-speech tag that identifies a part of speech of a word associated with the part-of-speech tag; inserting into the normalized text by the processor at least one syntactic label that identifies a linguistic construction of one or more words associated with the syntactic label; responsive to a deception tag analyzer that analyzes the normalized text and identifies potentially deceptive words and phrases, inserting into the normalized text by the processor at least one deception indicator tag that identifies a potentially deceptive word or phrase indicating a non-truthful statement at its location within the normalized text; and interpreting the at least one deception indicator tag by generating, by the processor computing and storing for user review, deception likelihood data based upon the distribution of potentially deceptive words or phrases within the normalized text, said deception likelihood data including a calculated distribution proximity metric for a plurality of words or phrases in the text file based upon the proximity of a word or phrase to the at least one deception indicator tag, wherein the step of interpreting the at least one deception indicator tag further comprises the steps of; calculating a moving average metric for the plurality of words or phrases in the text file based upon the proximity metric of the word or phrase, wherein the moving average metric comprises a portion of the deception likelihood data and inserting in the text the calculated proximity metric for the plurality of words or phrases in the text to identify areas of the text file that are likely or unlikely to be deceptive. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
-
21. An article of manufacture comprising:
-
a computer readable non-transitory storage medium for identifying deception within a text containing statements from a particular person whose credibility is being weighed as to verifiable propositions included in the text, wherein the program code directs a computer to perform a method comprising the steps of; controlling a deception indicator tag analyzer for inserting into the text file at least one deception indicator tag that identifies a potentially deceptive word or phrase at its location within the text file, and controlling an interpreter for interpreting the at least one deception indicator tag to determine a distribution of potentially deceptive words or phrases within the text file and for computing and storing for user review deception likelihood data based upon the distribution of potentially deceptive words or phrases within the text file, said deception likelihood data including a calculated distribution proximity metric for a plurality of words or phrases in the text file based upon the proximity of a word or phrase to the at least one deception indicator tag, the proximity metric comprising a moving average metric for the plurality of words or phrases in the text file based upon the proximity metric of a word or phrase, wherein the moving average metric comprises a portion of the deception likelihood data and said interpreter inserts in the text file the proximity metric for the plurality of words or phrases to identify areas of the text file that are likely or unlikely to be deceptive. - View Dependent Claims (22)
-
Specification