The present invention relates to systems and methods for natural language processing and generation of more “human” sounding artificially generated conversations. Such natural language processing techniques may be employed in the context of machine learned conversation systems. These conversational AIs include, but are not limited to, message response generation, AI assistant performance, and other language processing, primarily in the context of the generation and management of a dynamic conversations. Such systems and methods provide a wide range of business people more efficient tools for outreach, knowledge delivery, automated task completion, and also improve computer functioning as it relates to processing documents for meaning. In turn, such system and methods enable more productive business conversations and other activities with a majority of tasks performed previously by human workers delegated to artificial intelligence assistants.
Artificial Intelligence (AI) is becoming ubiquitous across many technology platforms. AI enables enhanced productivity and enhanced functionality through “smarter” tools. Examples of AI tools include stock managers, chatbots, and voice activated search-based assistants such as Siri and Alexa. With the proliferation of these AI systems, however, come challenges for user engagement, quality assurance and oversight.
When it comes to user engagement, many people do not feel comfortable communicating with a machine outside of certain discrete situations. A computer system intended to converse with a human is typically considered limiting and frustrating. This has manifested in a deep anger many feel when dealing with automated phone systems, or spammed, non-personal emails.
These attitudes persist even when the computer system being conversed with is remarkably capable. For example, many personal assistants such as Siri and Alexa include very powerful natural language processing capabilities; however, the frustration when dealing with such systems, especially when they do not “get it” persists. Ideally an automated conversational system provides more organic sounding messages in order to reduce this natural frustration on behalf of the user. Indeed, in the perfect scenario, the user interfacing with the AI conversation system would be unaware that they are speaking with a machine rather than another human.
In order for a machine to sound more human or organic includes improvements in natural language processing and the generation of accurate, specific and contextual action to meaning rules.
It is therefore apparent that an urgent need exists for advancements in the natural language processing techniques used by AI conversation systems, including contextual analysis by leveraging speech acts, and through the advanced construction of a rule data base populated by sophisticated recommendations. Such systems and methods allow for improved conversations and for added functionalities.
To achieve the foregoing and in accordance with the present invention, systems and methods for natural language processing, automated conversations, and enhanced system functionality are provided. Such systems and methods allow for more effective AI operations, improvements to the experience of a conversation target, and increased productivity through AI assistance.
In some embodiments, systems and methods are provided for setting service appointments in an automated conversation system. This involves receiving a triggering event (sale, lease, service appointment, etc.) that is used to generate a delay for a service to be undertaken. The system automatically schedules an appointment for the service, and performs all necessary follow-up activity. If a target ever becomes stale then the target gets automatically deactivated from the service setting system. The delays are calculated based upon what the triggering event is, and the service type according to preconfigured rules. Additionally this may cause many appointments to be set, or daisy chained over time.
Other embodiments include data fidelity systems and methods, which perform internal target duplication checks (using exact matching and fuzzy logic matches), as well as external duplication testing across different conversation groups. When targets are duplicated within a conversation exchange, they are de-duplicated. In external conversations, however, the degree of conflict between the conversations in which the target duplicates is first ascertained before there is a conversation termination to eliminate the duplicates. On the flip side, the data fidelity system may also identify internal representatives that are missing in the system from data such as HR feeds, payroll data and from circumstantial evidence (such as email exchanges). New representatives may be added into the workflow, with assignments automatically given to this individual based upon workload leveling.
Other embodiments include return on investment (ROI) analysis systems and methods, which compile metrics for the conversation system to prove its value to clients. The collected metrics include things like total numbers of appointments set, number of targets being actively managed, number of response messages sent, engagement rates, amount of contact information received, and number of messages sent per response. These metric numbers are compared against thresholds, and if above the necessary threshold are eligible for display to the user. Which metrics are to be displayed may be randomized over time, but it is generally beneficial to sort the metrics by those deemed to be most ‘impressive’. This sorting can multiply the sheer numbers of the events by a weight of how important that metric is viewed. The resulting score can be used to sort the metrics for display purposes.
Other embodiments include systems and methods for accelerating response time, which estimate the time required to process a message, generate a response and send the response and compares this against goals for these activities (based upon the communication type). For example a chat goal may be one second for each of these activities, whereas for real-time audio exchanges the goals may be closer to 300 ms or less. When there is a difference between the expected timing and timing goals then it is necessary to truncate processing activity, add resources for message generation and re-order sending queues in order to meet the needed goals. The truncating could include any of limiting a number of models used to classify in the message processing, elimination of entity replacement activity and shifting reliance upon rule based decisions over deep learning analysis. If after all these steps are taken and it is still not possible to meet the timing goals, the system may need to prioritize some message exchanges over others in order to meet the timing requirements of the message exchanges that are deemed a higher priority.
Lastly, other embodiments include systems and methods for scraping third party system to populate the conversation system. Here phantoms are deployed to the third party systems to collect the needed data. The third party system includes customer relationship management (CRM) applications, calendars, resource management software, inventory management software, and email communication systems. The phantoms are scripts which crawl the third party systems for the data. The phantoms are managed by shared phantom classes, which are the logic behind the phantoms' operation. Core functions communicate with the phantoms and direct them through operations directed by the shared phantom class. Control functions define global variables, set time limits for phantoms, and instantiate the core functions. The target in the third party system is identified and a determination is made if target lacks a valid stopclock. Likewise, a determination is made if the target meets stopclock permissions, and if the target is below an age threshold. If so, then stopclock event for the target may be initiated. Lastly, APIs enable the phantoms to communicate with databases and the conversation system.
Note that the various features of the present invention described above may be practiced alone or in combination. These and other features of the present invention will be described in more detail below in the detailed description of the invention and in conjunction with the following figures.
In order that the present invention may be more clearly ascertained, some embodiments will now be described, by way of example, with reference to the accompanying drawings, in which:
The present invention will now be described in detail with reference to several embodiments thereof as illustrated in the accompanying drawings. In the following description, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the present invention. It will be apparent, however, to one skilled in the art, that embodiments may be practiced without some or all of these specific details. In other instances, well known process steps and/or structures have not been described in detail in order to not unnecessarily obscure the present invention. The features and advantages of embodiments may be better understood with reference to the drawings and discussions that follow.
Aspects, features and advantages of exemplary embodiments of the present invention will become better understood with regard to the following description in connection with the accompanying drawing(s). It should be apparent to those skilled in the art that the described embodiments of the present invention provided herein are illustrative only and not limiting, having been presented by way of example only. All features disclosed in this description may be replaced by alternative features serving the same or similar purpose, unless expressly stated otherwise. Therefore, numerous other embodiments of the modifications thereof are contemplated as falling within the scope of the present invention as defined herein and equivalents thereto. Hence, use of absolute and/or sequential terms, such as, for example, “will,” “will not,” “shall,” “shall not,” “must,” “must not,” “first,” “initially,” “next,” “subsequently,” “before,” “after,” “lastly,” and “finally,” are not meant to limit the scope of the present invention as the embodiments disclosed herein are merely exemplary.
The present invention relates to enhancements to traditional natural language processing techniques and subsequent actions taken by an automated system. While such systems and methods may be utilized with any AI system, such natural language processing particularly excel in AI systems relating to the generation of automated messaging for business conversations such as marketing and other sales functions. While the following disclosure is applicable for other combinations, we will focus upon natural language processing in AI marketing systems as an example, to demonstrate the context within which the enhanced natural language processing excels.
The following description of some embodiments will be provided in relation to numerous subsections. The use of subsections, with headings, is intended to provide greater clarity and structure to the present invention. In no way are the subsections intended to limit or constrain the disclosure contained therein. Thus, disclosures in any one section are intended to apply to all other sections, as is applicable.
The following systems and methods are for improvements in natural language processing and actions taken in response to such message exchanges, within conversation systems, and for employment of domain specific assistant systems that leverage these enhanced natural language processing techniques. The goal of the message conversations is to enable a logical dialog exchange with a recipient, where the recipient is not necessarily aware that they are communicating with an automated machine as opposed to a human user. This may be most efficiently performed via a written dialog, such as email, text messaging, chat, etc. However, given the advancement in audio and video processing, it may be entirely possible to have the dialog include audio or video components as well.
In order to effectuate such an exchange, an AI system is employed within an AI platform within the messaging system to process the responses and generate conclusions regarding the exchange. These conclusions include calculating the context of a document, intents, entities, sentiment and confidence for the conclusions. Human operators, through a “training desk” interface, cooperate with the AI to ensure as seamless an experience as possible, even when the AI system is not confident or unable to properly decipher a message. The natural language techniques disclosed herein assist in making the outputs of the AI conversation system more effective, and more ‘human sounding’, which may be preferred by the recipient/target of the conversation.
To facilitate the discussion,
The network 106 most typically includes the internet but may also include other networks such as a corporate WAN, cellular network, corporate local area network, or combination thereof, for example. The messaging server 108 may distribute the generated messages to the various message delivery platforms 112 for delivery to the individual recipients. The message delivery platforms 112 may include any suitable messaging platform. Much of the present disclosure will focus on email messaging, and in such embodiments the message delivery platforms 112 may include email servers (Gmail, Yahoo, Outlook, etc.). However, it should be realized that the presently disclosed systems for messaging are not necessarily limited to email messaging. Indeed, any messaging type is possible under some embodiments of the present messaging system. Thus, the message delivery platforms 112 could easily include a social network interface, instant messaging system, text messaging (SMS) platforms, or even audio or video telecommunications systems.
One or more data sources 110 may be available to the messaging server 108 to provide user specific information, message template data, knowledge sets, intents, and target information. These data sources may be internal sources for the system's utilization or may include external third-party data sources (such as business information belonging to a customer for whom the conversation is being generated). These information types will be described in greater detail below. This information may be leveraged, in some embodiments, to generate a profile regarding the conversation target. A profile for the target may be particularly useful in a sales setting where differing approaches may yield dramatically divergent outcomes. For example, if it is known that the target is a certain age, with young children, and with an income of $75,000 per year, a conversation assistant for a car dealership will avoid presenting the target with information about luxury sports cars, and instead focus on sedans, SUVs and minivans within a budget the target is likely able to afford. By engaging the target with information relevant to them, and sympathetic to their preferences, the goals of any given conversation are more likely to be met. The external data sources typically relied upon to build out a target profile may include, but are not limited to, credit applications, CRM data sources, public records data sets, loyalty programs, social media analytics, and other “pay to play” data sets, for example.
The other major benefit of a profile for the target is that data that the system “should know” may be incorporated into the conversation to further personalize the message exchange. Information the system “should know” is data that is evident trough the exchange, or the target would expect the AI system would know. Much of the profile data may be public, but a conversation target would feel strange (or even violated) to know that the other party they are communicating with has such a full set of information regarding them. For example, a consumer doesn't typically assume a retailer knows how they voted in the last election, but through an AI conversational system with access to third party data sets, this kind of information may indeed be known. Bringing up such knowledge in a conversation exchange would strike the target as strange, at a minimum, and may actually interfere with achieving the conversation objectives. In contrast, offered information, or information the target assumes the other party has access to, can be incorporated into the conversation in a manner that personalizes the exchange, and makes the conversation more organic sounding. For example if the target mentions having children, and is engaging an AI system deployed for an automotive dealer, a very natural message exchange could include “You mentioned wanting more information on the Highlander SUV. We have a number in stock, and one of our sales reps would love to show you one and go for a test drive. Plus they are great for families. I'm sure your kids would love this car.”
Moving on,
The conversation builder 310 allows the user to define a conversation, and input message templates for each series/exchange within the conversation. A knowledge set and target data may be associated with the conversation to allow the system to automatically effectuate the conversation once built. Target data includes all the information collected on the intended recipients, and the knowledge set includes a database from which the AI can infer context and perform classifications on the responses received from the recipients.
The conversation manager 320 provides activity information, status, and logs of the conversation once it has been implemented. This allows the user 102a to keep track of the conversation's progress, success and allows the user to manually intercede if required. The conversation may likewise be edited or otherwise altered using the conversation manager 320.
The AI manager 330 allows the user to access the training of the artificial intelligence which analyzes responses received from a recipient. One purpose of the given systems and methods is to allow very high throughput of message exchanges with the recipient with relatively minimal user input. To perform this correctly, natural language processing by the AI is required, and the AI (or multiple AI models) must be correctly trained to make the appropriate inferences and classifications of the response message. The user may leverage the AI manager 330 to review documents the AI has processed and has made classifications for.
In some embodiments, the training of the AI system may be enabled by, or supplemented with, conventional CRM data. The existing CRM information that a business has compiled over years of operation is incredibly rich in detail, and specific to the business. As such, by leveraging this existing data set the AI models may be trained in a manner that is incredibly specific and valuable to the business. CRM data may be particularly useful when used to augment traditional training sets, and input from the training desk. Additionally, social media exchanges may likewise be useful as a training source for the AI models. For example, a business often engages directly with customers on social media, leading to conversations back and forth that are again, specific and accurate to the business. As such this data may also be beneficial as a source of training material.
The intent manager 340 allows the user to manage intents. As previously discussed, intents are a collection of categories used to answer some question about a document. For example, a question for the document could include “is the lead looking to purchase a car in the next month?” Answering this question can have direct and significant importance to a car dealership. Certain categories that the AI system generates may be relevant toward the determination of this question. These categories are the ‘intent’ to the question and may be edited or newly created via the intent manager 340. As will be discussed in greater detail below, the generation of questions and associated intents may be facilitated by leveraging historical data via a recommendation engine.
In a similar manner, the knowledge base manager 350 enables the management of knowledge sets by the user. As discussed, a knowledge set is a set of tokens with their associated category weights used by an aspect (AI algorithm) during classification. For example, a category may include “continue contact?”, and associated knowledge set tokens could include statements such as “stop”, “do no contact”, “please respond” and the like.
Moving on to
The rule builder 410 may provide possible phrases for the message based upon available target data. The message builder 420 incorporates those possible phrases into a message template, where variables are designated, to generate the outgoing message. Multiple selection approaches and algorithms may be used to select specific phrases from a large phrase library of semantically similar phrases for inclusion into the message template. For example, specific phrases may be assigned category rankings related to various dimensions such as “formal vs. informal, education level, friendly tone vs. unfriendly tone, and other dimensions,” Additional category rankings for individual phrases may also be dynamically assigned based upon operational feedback in achieving conversational objectives so that more “successful” phrases may be more likely to be included in a particular message template. Phrase package selection will be discussed in further detail below. The selected phrases incorporated into the template message is provided to the message sender 430 which formats the outgoing message and provides it to the messaging platforms for delivery to the appropriate recipient.
Feedback may be collected from the conversational exchanges, in many embodiments. For example if the goal of a given message exchange is to set up a meeting, and the target agrees to said meeting, this may be counted as successful feedback. However, it may also be desirable to collect feedback from external systems, such as transaction logs in a point of sales system, or through records in a CRM system.
The message delivery handler 540 enables not only the delivery of the generated responses, but also may effectuate the additional actions beyond mere response delivery. The message delivery handler 540 may include phrase selections, contextualizing the response by historical activity, through language selection, and execute additional actions like status updates, appointment setting, and the like.
An appointment setter 550 may set appointments for targets of a conversation with advanced follow-up capabilities. These systems allow for access to other third party calendar and scheduling platforms, and enable entirely autonomous scheduling of appointments from initial target contact all the way through appointment completion.
A specialized service assistant 560 may leverage a number of the same components as the appointment setter 550, but be designed to perform specific use case scheduling. Prototypical examples of a specialized service assistant 550 include any situation where an event triggers an ongoing follow-up activity on a set schedule. For example medical care and car servicing are both areas where such a system particularly excels.
A data fidelity engine 570 performs cleansing of stale data records to ensure that targets are not redundantly contacted by the messaging system, and likewise that the user is accurately represented in the system despite personnel changes or the like. An ROI engine 580 provides analytics and feedback to the client on the value generated by the automated messaging system.
As the systems are required to perform more “real-time” conversation (e.g., chat or audio exchanges), there is an increased need to perform message analysis and response in a very short amount of time. For example, a typical person grows impatient if after three seconds their chat is not responded to. In order to meet these tight timing requirements, processing activities may be optimized by a real-time response accelerator 590.
Many of the aforementioned system components benefit from collecting detailed information from existing external systems within an organization (or more globally). A scraper 500 enables the collection of these data streams to allow these systems to operate more effectively.
Lastly, the continual and high volume conversation exchanges disclosed herein are well suited for maximizing goal achievement through optimization procedures. An A/B tester 515 may be configured to perform binary and multivariate (despite the nomenclature of the component) testing of conversational exchanges to narrow the most effective variables to achieve a given goal.
A/B testing is a powerful tool for making data-driven decisions. At the most basic level, the A/B tester 515 is a tool for analyzing whenever a change is made to the configuration of an AI-driven conversation. If, for example, conversion rates are different before and after a single change, that is a good first indicator of a causal effect of that difference. Every variable is an opportunity for this analysis, down to the names chosen for the virtual assistants. For example, perhaps female names are more effective at sales outreach, but male names are more effective at service outreach. Or possibly names popular in the 1970s are more efficacious than those more popular in the 1990s. These types of hypotheses are easily tested via the A/B tester 515—the data to answer questions like that can best be acquired through multivariate A/B testing (and the simple before/after comparisons described above).
The A/B tester 515 may be automated to test different factors when any change is made, even when multiple variables may change at once. This automated system may test a proposed change in configuration in the real world in such a way that it minimizes the risk of a negative effect and rolls out the change gradually in order to be confident of the positive effect. Consider the example of changing “Hi” to “Hello”—the AI might start by trying the new greeting on a representative sample of 1% of targets, then ramp up to 10% if that seems promising, then completely change over once enough data is collected that we can be confident that the new setting is conclusively performing better.
The A/B tester 515 can also be utilized when the variables are continuous (like price), instead of discrete (like conversation type). In those cases, the A/B tester 515 may use machine learning to intelligently test different points along the continuous axis and optimize the value of that continuous variable—e.g., what if you could tell the minimum percentage discount that was linked with better conversion rate? What if you could get that benefit without having to decide (as a human) anything more than “a discount may be offered in order to increase conversion”? Machine learning enables efficiently zeroing-in on the most effective discount amount (or price, or message timing, etc.) without direct human intervention. This is different in continuous variables because the different options are related in a consistent way, unlike for discrete variables. For example, if a 10% discount is X effective, and a 20% discount is Y effective, there is a reasonable expectation that a 15% discount will be between-X-and-Y effective.
One major benefit derived from the AB tester 515 is that since data is collected from many different clients, the system gets smarter over time as it learns what works from the experiments that the individual customers run. In this way, their domain expertise eventually becomes folded into a larger body of aggregated expertise. Eventually, this shall reach a state where the system itself is the gold standard source of evidence-based expertise about sales conversations. Every client not only gains the benefit of that accumulated expertise (in the form of suggested configuration, or just improved performance that they didn't have to configure), but provides another set of data points to make the system smarter. In a sense, the clients become the “human in the loop” of the machine learning process optimizing these configurations.
The A/B tester 515 may initially be tasked with eliminate or alleviate many of the challenges encountered when studying human behavior, including experimenter bias/inconsistency. Since the conversations are automated, these are essentially already double blind studies and we can be confident that every ‘subject’ received the exact message intended. Sampling can likewise be addressed, as the targets the population of interest and the system has some background information on them, therefore the system can ensure that every group has a comparable and representative sample. Sample size should also not be a problem, since in theory the system has access to the entire population (a given set of targets) that are the subject of the study. Validity may also be addressed, since these experiments are conducted as part of real sales conversations, they are inherently valid (as opposed to a focus group for example, which is not a real world situation). The downside of this is that it does not protect against a change potentially having a negative effect, but by automatically and continuously varying the size of the A/B groups based on confidence level, negative effects can be minimized, as previously discussed. Lastly, Confounding variables may be alleviated, since the system can use statistics not only to control for the variables that are being tracked, but also to identify where there may be an untracked variable having an effect (if there is no statistically significant link between any input/variable and some output/KPI). This is an opportunity for a domain expert to investigate new variables, resulting in a feedback loop—a virtuous cycle where data makes the system smarter, which makes it more effective, which in turn again increases data acquisition, and so forth.
Turning to
Each line of the raw message is classified on a line-by-line basis by a logical regression model. The model consumer the message ‘features’ that include both words/n-grams and placeholder elements. Examples of placeholder elements include “name present”, “date present” and similar logical variables. The construction of models that consume both n-gram data and placeholder elements has greater accuracy over traditional models in that it is able to generalize for message elements that would normally cause model confusion. For example, a traditional message segment classifier would likely have an error when a current date is encountered unless the model is updated daily and trained on the current date. In contrast, the present placeholder based model will more readily identify this to indicate a header/salutation of the message, whereas a non-present date would be indicative of message body content, for example.
After each line of the message has been classified, the conglomerate of classifications are passed through a series of logical statements to be divided into the categories of “salutation”, “reply”, “close”, “signature” and “other”.
After the smart parser 521 is a language detector 522 which detects the language used in the raw text resulting from the smart parser 521. This language test is run against multiple language models, and the highest scoring model is selected as the model language. A binary confidence level—either ‘confident’ or ‘not confident’ is also output if the model score is above a configured threshold.
After language detection, a tokenizer 523 divides the raw text into individual sentences. The motivation behind this preprocessing is to divide the prospect's response into separate ideas (usually indicated grammatically by sentences) and later predict meanings/intends at the more granular sentence level. This prevents the words/grams/features in one idea from contaminating/creating noise in the prediction of a second idea.
Subsequent to the tokenization, a normalizer 524 generates three new variables for the message. These include a classified text, clean text and the raw text. These different versions are each consumed in later operations. To make the best predictions of intents and meanings in the message, the system should eliminate possible sources of noise. Logic relating to lowercase strings, splitting the text into tokens, looking for entities with special expressions, replacement of these entities with special elements, removal of stop words, removal of intelligens stopwords, and string normalization results in the return of classification text. Once the normalization process is completed a new clean string is generated to be sent to the next step plus other variables that may be stored.
After the raw text has been received and pre-processed in the above manner, the data processor 530 performs the main analysis on the message data. The data processor 530 is provided in greater detail in relation to
The pre-processed response 529 that results from the function is provided next to a critical intent detector 531 which is applied to all incoming message. The critical intent detector's 531 purpose is to find critical (special case) scenarios that occur across the system regardless of client/industry/date/etc. These may include situations like “do not contact”, “out of office” and “spam detection”. The critical intent detector 531 is flexible to allow any intent to be designated as critical by adding it to a table in a relational database where the intent is declared with the name.
A determination of any critical intent being present being negative (“false”), results in the response processing forwarded to a model query engine 532 for additional analysis. If a critical intent is detected, the system would rather immediately provide the response to the entity extractor 536 for entity extraction and output 538 generation.
Entities may include people, objects, locations, phone numbers, email addresses, dates, businesses and the like. Intents, on the other hand, are coded based upon business needs, or may be identified automatically through training or through interaction with a training desk. Particular intents of interest for a business conversation could include, for example, satisfied, disqualified, no further action and further action, in some embodiments. These intents may correspond to situations where the goals for a conversation target have been met (satisfied intent), where such goals are unable to be met (disqualified), where the goal is in progress without need for additional messaging (no further action), and where the goal is in process but requires additional information or messaging to be fully resolved (further action).
The model query engine 532 pulls all models declared in a table for the response situation (industry, client, campaign, etc.). The model query engine 532 executes checks to ensure that it is utilizing the most current version of a query function which has a viable endpoint. This function returns a list of models with their ID and their label translation (from binary to meaning).
Subsequently, the system includes a parallel predictor 533 which elicits predictions from all models available. The parallel predictor 533 returns a list of the highest scoring predictions across all the sentences, with their labels mapped to the meanings. For example, if a message contains three sentences and the predictions for the meaning is “call by phone” for sentence 1 is a 0.23 probability, sentence 2 is a 0.18 probability, and for sentence 3 a 0.93 probability, then the prediction score for the meaning “call by phone” will be 0.93 (e.g., the maximum of the multiple scores).
After parallel prediction the system processes the outputs in a hard code rule engine 534. The hard code rule engine 534 analyzes the text with a set of hard-coded rules. The purpose of this analysis is to prevent trivial errors from happening. If the function does identify a meaning within the text it will remove that model as to not waste time predicting meanings for which there is already an answer and place the prediction (with a score of 1) within the “prediction” section of the event.
Following the hard code rule engine 534 is a prediction filter and sorter 535 which sorts the predictions based upon confidence scores/levels (placing the highest confidences on the top), and filters out predictions where “none” is indicated (the intent is not predicted in the message). This sorting and filtering cleans the prediction dataset, and the information may be stored, along with attendant meanings and their corresponding scores.
After filtering and sorting, entity extraction is performed by the entity extractor 536. As noted previously, if a critical intent was found earlier, the system also immediately would forward to the entity extractor 536 as well. Examples of entities that may be extracted from the raw text could include product brands, product models, emails, phone numbers, Urls, cities, countries, districts, and the like.
Lastly, after entity extraction, analysis is performed by a meaning mapper 537 to generate an output 538 of the data processor 530. The meaning mapper 537 maps the intents identified in the conversation to meanings. The mapping is between all the predictions available in the response and the meanings as a list in a relational database table. Here candidates are created by a system administrator, and these candidates are attached to their scores, if one is higher than another and it is available in the table then it is used to return to the workflow of the prospect. In some embodiments, the meaning mapper 537 also defines which messages are going to manual evaluation or automatic evaluation based on the threshold set for each meaning or intent definition in the relational database.
Turning to
In addition to merely responding to a message with a response, the message delivery handler 540 may also include a set of actions that may be undertaken linked to specific triggers, these actions and associations to triggering events may be stored in an action response library 542. For example, a trigger may include “Please send me the brochure.” This trigger may be linked to the action of attaching a brochure document to the response message, which may be actionable via a webhook or the like. The system may choose attachment materials from a defined library (SalesForce repository, etc.), driven by insights gained from parsing and classifying the previous response, or other knowledge obtained about the target, client, and conversation. Other actions could include initiating a purchase (order a pizza for delivery for example) or pre-starting an ancillary process with data known about the target (kick of an application for a car loan, with name, etc. already pre-filled in for example). Another action that is considered is the automated setting and confirmation of appointments.
The message delivery handler 540 may have a weighted phrase package selector 543 that incorporates phrase packages into a generated message based upon their common usage together, or by some other metric. Lastly, the message delivery handler 540 may operate to select which language to communicate using. Rather than perform classifications using full training sets for each language, as is the traditional mechanism, the systems leverage dictionaries for all supported languages, and translations to reduce the needed level of training sets. In such systems, a primary language is selected, and a full training set is used to build a model for the classification using this language. Smaller training sets for the additional languages may be added into the machine learned model. These smaller sets may be less than half the size of a full training set, or even an order of magnitude smaller. When a response is received, it may be translated into all the supported languages, and this concatenation of the response may be processed for classification. The flip side of this analysis is the ability to alter the language in which new messages are generated. For example, if the system detects that a response is in French, the classification of the response may be performed in the above-mentioned manner, and similarly any additional messaging with this contact may be performed in French.
Determination of which language to use is easiest if the entire exchange is performed in a particular language. The system may default to this language for all future conversation. Likewise, an explicit request to converse in a particular language may be used to determine which language a conversation takes place in. However, when a message is not requesting a preferred language, and has multiple language elements, the system may query the user on a preferred language and conduct all future messaging using the preferred language.
A scheduler 545 used rules for messaging timing and learned behaviors in order to output the message at an appropriate time. For example, when emailing, humans generally have a latency in responding that varies from a few dozen minutes to a day or more. Having a message response sent out too quickly seems artificial. A response exceeding a couple of days, depending upon the context, may cause frustration, irrelevance, or may not be remembered by the other party. As such, the scheduler 545 aims to respond in a more ‘human’ timeframe and is designed to maximize a given conversation objective.
Turning to
After the scheduler 551 determines a day and time that is suitable for the target and the user of the system, a confirmation system 552 engages with the target, the user directly, and the user's calendar system to ensure that the time is accurately reflected in the calendar (or other resource management platform), and also to ensure that the target and user are adequately reminded of the appointment. Humans are fallible, and our memory is frequently imperfect. An appointment, even if discussed with the messaging system and the time is decided through negotiation, may be easily forgotten by the target. The user, on the other hand, isn't even involved in the appointment setting process, and unless informed of the event may not realize they have an obligation. The confirmation system 552 thus, in addition to updating the calendar, sends out periodic notifications to both the target and the user via any number of channels. For example, a one day advanced notice email may be sent to the target in some embodiment, a digest email may be sent to the user the morning of the meeting, and half hour reminder text messages may be provided to both the user and target to ensure the parties are prepared for the appointment. Of course the channel of messaging, frequency and timing may all be configured by the user.
Lastly, a follow-up system 553 may engage after the date of the appointment to ensure the meeting actually occurred. When available, CRM notes or other already generated business documents may be used to determine if the meeting actually occurred. Alternatively, the user could be contacted after the set appointment time with a feedback request on if the meeting occurred, and in some cases, if there is any specific follow-up activity required.
When the meeting did occur, the follow-up system 553 may contact the user with tasks that still are required, provide the target a follow-up message (a generic ‘thank you’ message for example), and any tasks that may be required and automated. Particularly, the follow-up system 553 may, in some situation, engage with the specialized service assistant 560 to schedule subsequent tasks, as will be discussed in greater detail below.
If however, the follow-up system 553 is informed that the meeting did not occur as expected, the system may re-engage with the target in order to attempt to reschedule the meeting. The user may be able to interrupt this rescheduling process if the meeting was missed for a systemic reason that would make a meeting undesirable.
Turning now to
Tracking targets in this manner is required to properly set delay timers 562, as these delays are use specific. Returning to the car dealership example, a target who has purchased a new vehicle may be contacted at certain times for service activities to maintain warranty. In contrast, a used vehicle customer may also be contacted but for other types of services, as well as for upgrading their vehicle after a certain mileage or model age has been reached.
Continuing to
In a similar vein, a missing representative detector 572 may periodically sweep an organizations' records to determine if new representatives have been hired, or have since left an organization. This system component, when able to access human resources systems (such as payroll data) may be automated to regularly and accurately update representatives.
The rectifier 573 updates the system to remove duplicate targets from conversations that are incompatible with one another, and ensure that only valid representatives are used in appointment setting and as a backend contact for the targets.
Moving on, in
The purpose of the ROI engine 580 is to provide a user a snapshot of how effective the messaging system is, but importantly it is also a promotional tool to convince skeptical users of the value of the messaging system. For this reason, it may be desirable to not provide all the collected ROI metrics to the user, but rather select from the collected data only information that best exemplifies the system's benefits. A display determiner 582 may make these decisions regarding what metrics to display. At a minimum the metrics are first compared against display thresholds. A new system that has recently been deployed and has only set up ten appointments isn't particularly impressive. It may be desirable instead to wait for additional accomplishments before displaying any data. In one example the threshold may be forty appointments set, one hundred response messages sent, and at least ten other goals accomplished before any of these metrics are displayed. Additionally, when a large number of metrics have been collected above the thresholds, the determiner 582 may still order the metrics by multiplying the number of the metric by a weight, and only displaying the highest calculated metrics. For example, if the system is configured to only display the top two ROI metrics, and it has been determined that the system has completed 250 responses, set 100 appointments and completed 70 sales. The system may be configured to provide weights of 1, 3, and 10, respectively. So the scores of these metrics would be 250, 300 and 700 respectively. Thus, for the purposes of this limited example, the ROI metrics selected for display would be the number of sales completed and the number of appointments set, even though the largest activity (by a significant margin) has been responses sent. Ultimately, the ROI metrics selected for display are compiled for display by a reporter 583.
Turning to
Processing a message and generating an appropriate response is a computationally intensive process, especially when performed at volume and scale. As such, in order to meet these strict time requirements, it is necessary to implement specialized processes and systems to ensure response acceleration. The backbone of this system is predicting the time required to perform the analysis of the incoming message, and the time needed to formulate the outgoing response. A response time estimator 591 performs this timing prediction using the available system resources, the size and complexity of the incoming message, and the other message processing workloads. Based upon these estimates a resource monitor 592 can determine which processing assets are needed to complete the response generation in acceptable timeframes, and a task manager 593 can coordinate these assets between the various processing tasks to ensure that the ‘best’ outcome is achieved. Obviously, the best outcome is that all responses are generated within the aforementioned time constraints. However, this may not always be possible, in which case certain tasks may need to be prioritized based upon sensitivity. For example if the system is servicing 5 real-time audio exchanges, 10 chat exchanges and 25 email exchanges, it may be possible to respond to each message in the order it is received on a 5 second average response time. Obviously this is less than ideal. Instead the system may prioritize the audio exchanges with a 1 second maximum delay threshold, 8 of the ten chat exchanges with a three second delay, the remaining two chat exchanges with a 5 second delay, and the email exchanges will be processed at a later time when additional processing resources are available.
Moving on,
Now that the systems for dynamic messaging and natural language processing techniques have been broadly described, attention will be turned to processes employed to perform AI driven conversations with attendant actions and enhanced functionalities.
In
Next, the target data associated with the user is imported, or otherwise aggregated, to provide the system with a target database for message generation (at 720). Likewise, context knowledge data may be populated as it pertains to the user (at 730). Often there are general knowledge data sets that can be automatically associated with a new user; however, it is sometimes desirable to have knowledge sets that are unique to the user's conversation that wouldn't be commonly applied. These more specialized knowledge sets may be imported or added by the user directly.
Lastly, the user is able to configure their preferences and settings (at 740). This may be as simple as selecting dashboard layouts, to configuring confidence thresholds required before alerting the user for manual intervention.
Moving on,
After the conversation is described, the message templates in the conversation are generated (at 820). If the series is populated (at 830), then the conversation is reviewed and submitted (at 840). Otherwise, the next message in the template is generated (at 820).
If an existing conversation is used, the new message templates are generated by populating the templates with existing templates (at 920). The user is then afforded the opportunity to modify the message templates to better reflect the new conversation (at 930). Since the objectives of many conversations may be similar, the user will tend to generate a library of conversations and conversation fragments that may be reused, with or without modification, in some situations. Reusing conversations has time saving advantages, when it is possible.
However, if there is no suitable conversation to be leveraged, the user may opt to write the message templates from scratch using the Conversation Editor (at 940). When a message template is generated, the bulk of the message is written by the user, and variables are imported for regions of the message that will vary based upon the target data. Successful messages are designed to elicit responses that are readily classified. Higher classification accuracy enables the system to operate longer without user interference, which increases conversation efficiency and user workload.
Messaging conversations can be broken down into individual objectives for each target. Designing conversation objectives allows for a smoother transition between messaging series. Table 1 provides an example set of messaging objectives for a sales conversation.
Likewise, conversations can have other arbitrary set of objectives as dictated by client preference, business function, business vertical, channel of communication and language. Objective definition can track the state of every target. Inserting personalized objectives allows immediate question answering at any point in the lifecycle of a target. The state of the conversation objectives can be tracked individually as shown below in reference to Table 2.
Table 2 displays the state of an individual target assigned to conversation 1, as an example. With this design, the state of individual objectives depends on messages sent and responses received. Objectives can be used with an informational template to make a series transition seamless. Tracking a target's objective completion allows for improved definition of target's state, and alternative approaches to conversation message building. Conversation objectives are not immediately required for dynamic message building implementation but become beneficial soon after the start of a conversation to assist in determining when to move forward in a series.
Dynamic message building design depends on ‘message building’ rules in order to compose an outbound document. A Rules child class is built to gather applicable phrase components for an outbound message. Applicable phrases depend on target variables and target state.
To recap, to build a message, possible phrases are gathered for each template component in a template iteration. In some embodiment, a single phrase can be chosen randomly from possible phrases for each template component. Alternatively, as noted before, phrases are gathered and ranked by “relevance”. Each phrase can be thought of as a rule with conditions that determine whether or not the rule can apply and an action describing the phrase's content.
Relevance is calculated based on the number of passing conditions that correlate with a target's state. A single phrase is selected from a pool of most relevant phrases for each message component. Chosen phrases are then imploded to obtain an outbound message. Logic can be universal or data specific as desired for individual message components.
Variable replacement can occur on a per phrase basis, or after a message is composed. Post message-building validation can be integrated into a message-building class. All rules interaction will be maintained with a messaging rules model and user interface.
Once the conversation has been built out it is ready for implementation.
An appropriate delay period is allowed to elapse (at 1020) before the message is prepared and sent out (at 1030). The waiting period is important so that the target does not feel overly pressured, nor the user appears overly eager. Additionally, this delay more accurately mimics a human correspondence (rather than an instantaneous automated message). Additionally, as the system progresses and learns, the delay period may be optimized by a cadence optimizer to be ideally suited for the given message, objective, industry involved, and actor receiving the message.
After the message template is selected from the series, the target data is parsed through, and matches for the variable fields in the message templates are populated (at 1120). Variable filed population, as touched upon earlier, is a complex process that may employ personality matching, and weighting of phrases or other inputs by success rankings. These methods will also be described in greater detail when discussed in relation to variable field population in the context of response generation. Such processes may be equally applicable to this initial population of variable fields.
In addition, or alternate to, personality matching or phrase weighting, selection of wording in a response could, in some embodiments, include matching wording or style of the conversation target. People, in normal conversation, often mirror each other's speech patterns, mannerisms and diction. This is a natural process, and an AI system that similarly incorporates a degree of mimicry results in a more ‘humanlike’ exchange.
Additionally, messaging may be altered by the class of the audience (rather than information related to a specific target personality). For example, the system may address an enterprise customer differently than an individual consumer. Likewise, consumers of one type of good or service may be addressed in subtly different ways than other customers. Likewise, a customer service assistant may have a different tone than an HR assistant, etc.
The populated message is output to the communication channel appropriate messaging platform (at 1130), which as previously discussed typically includes an email service, but may also include SMS services, instant messages, social networks, audio networks using telephony or speakers and microphone, or video communication devices or networks or the like. In some embodiments, the contact receiving the messages may be asked if he has a preferred channel of communication. If so, the channel selected may be utilized for all future communication with the contact. In other embodiments, communication may occur across multiple different communication channels based upon historical efficacy and/or user preference. For example, in some particular situations a contact may indicate a preference for email communication. However, historically, in this example, it has been found that objectives are met more frequently when telephone messages are utilized. In this example, the system may be configured to initially use email messaging with the contact, and only if the contact becomes unresponsive is a phone call utilized to spur the conversation forward. In another embodiment, the system may randomize the channel employed with a given contact, and over time adapt to utilize the channel that is found to be most effective for the given contact.
Returning to
However, if a response is received, the process may continue with the response being processed (at 1070). This processing of the response is described in further detail in relation to
Document cleaning is described in greater detail in relation with
After smart parsing, the system may detect the language (at 1320) of the response using multiple language models and selecting the model with the highest confidence level. Next, the sentences are tokenized (at 1330) which divides the response into separate sentences. This is performed because generally each sentence of a conversation includes a separate/discrete idea or intention. By separating each sentence the risk of token contamination between the sentences is reduced. Only after all this does the normalization process occur (at 1340) where characters and tokens are removed in order to reduce the complexity of the document without changing the intended classification.
After the normalization, documents are further processed through lemmatization, name entity replacement, the creation of n-grams, noun-phrase identification, and extraction of out-of-office features and/or other named entity recognition. Each of these steps may be considered a feature extraction of the document. Historically, extractions have been combined in various ways, which results in an exponential increase in combinations as more features are desired. In response, the present method performs each feature extraction in discrete steps (on an atomic level) and the extractions can be “chained” as desired to extract a specific feature set.
Returning to
Each speech act includes its own feature set and models used for classification of sentences that fall into the given speech acts. The metadata of the meaning models is stored into the database containing a key that links to the correct speech act (at 1520). This generates a hierarchy on a meaning level using a more natural approach to the language, and enables appropriate models to be used for each sentence based upon it's respective speech act (at 1530).
Returning to
However, if the message is not ambiguous, or after a clarification has been received, the process may proceed to a query of the model list (at 1450). This function pulls all models declared in a table for that situation (industry, client, campaign and speech act). It executes checks to ensure that it is the most current version and has a viable endpoint. Then the function returns a list of models with their ID and their label translation (from binary to meaning). Once the models have been identified, they may be executed in parallel to perform parallel predictions (at 1460). This component asks for predictions from all models available in the input to all of the “clean text” instances availed. It will return a list of the highest scoring predictions across all the sentences with their labels mapped to the meanings.
Subsequently, hard coded rules may be applied (at 1470) which analyzes the text with a set of hard-coded rules. The purpose is to prevent silly errors from happening. If the function does identify a meaning within the text it will remove that model from the “model-query-list” as to not waste time predicting meanings for which there is already an answer and place the prediction (with a score of 1) within the “prediction” section of the event. Next, the predictions are filtered and sorted (at 1480). Sorting and filtering places highest level predictions on the top of the prediction listing, and removes predictions of ‘none’ from the dataset. This process cleans up the prediction data. The results are then stored, along with the meanings and corresponding scores.
Next, entity recognition is performed (at 1490). A more detailed explanation of this entity recognition process is provided in relation to
Returning to
As an extension, a template key for each intent for a given action exists. This allows conversations to send prospects to the same actions but replies to them in a different way for different intents. In this manner actions may be identified that apply in response to the meaning (at 1720). This response is generated (at 1730) by identifying an appropriate response template, and populating the variable fields within the template. Population of the variable fields includes replacement of facts and entity fields from the conversation library based upon an inheritance hierarchy. The conversation library is curated and includes specific rules for inheritance along organization levels and degree of access. This results in the insertion of customer/industry specific values at specific place in the outgoing messages, as well as employing different lexica or jargon for different industries or clients. Wording and structure may also be influenced by defined conversation objectives and/or specific data or properties of the specific target.
Specific phrases may be selected based upon weighted outcomes (success ranks). The system calculates phrase relevance scores to determine the most relevant phrases given a lead state, sending template, and message component. Some (not all) of the attributes used to describe lead state are: the client, the conversation, the objective (primary versus secondary objective), series in the conversation, and attempt number in the series, insights, target language and target variables. For each message component, the builder filters (potentially thousands of) phrases to obtain a set of maximum-relevance candidates. In some embodiments, within this set of maximum-relevance candidates, a single phrase is randomly selected to satisfy a message component. As feedback is collected, phrase selection is impacted by phrase performance over time, as discussed previously. In some embodiments, every phrase selected for an outgoing message is logged. Sent phrases are aggregated into daily windows by Client, Conversation, Series, and Attempt. When a response is received, phrases in the last outgoing message are tagged as ‘engaged’. When a positive response triggers another outgoing message, the previous sent phrases are tagged as ‘continue’. The following metrics are aggregated into daily windows: total sent, total engaged, total continue, engage ratio, and continue ratio.
To impact message-building, phrase performance must be quantified and calculated for each phrase. This may be performed using the following equation:
Engagement and continuation percentages are gathered based on messages sent within the last 90 days, or some other predefined history period. Performance calculations enable performance-driven phrase selection. Relative scores within maximum-relevance phrases can be used to calculate a selection distribution in place of random distribution.
Phrase performance can fluctuate significantly when sending volume is low. To minimize error at low sending volumes, a
padding window is applied to augment all phrase-performance scores. The padding is effectively zero when total_sent is larger than 1,500 sent messages. This padded performance is performed using the following equation:
Performance scores are augmented with the performance pad prior to calculating distribution weights using the following equation:
performance′=performance+performance_pad Equation 3: Augmented phrase performance
As noted, phrase performance may be calculated based on metrics gathered in the last 90 days. That window can change to alter selection behavior. Weighting of metrics may also be based on time. For example, metrics gathered in the last 30 days may be assigned a different weight than metrics gathered in the last 30-60 days. Weighting metrics based on time may affect selection behaviors as well. Phrases can be shared across client, conversation series, attempt, etc. It should be noted that alternate mechanisms for calculating phrase performance are also possible, such as King of the Hill or Reinforcement Learning, deep learning, etc.
Due to the fact that message attempt is correlated with engagement; metrics are gathered per attempt to avoid introducing engagement bias. Additionally, variable values can impact phrase performance; thus, calculating metrics per client is done to avoid introducing variable value bias.
Adding performance calculations to message building increases the amount of time to build a single message. System improvements are required to offset this additional time requirement. These may include caching performance data to minimize redundant database queries, aggregating performance data into windows larger than one day, and aggregating performance values to minimize calculations made at runtime.
In addition to performance-based selection, as discussed above, phrase selection may be influenced by the “personality” of the system for the given conversation. Personality of an AI assistant may not just be set, as discussed previously, but may likewise be learned using machine learning techniques that determines what personality traits are desirable to achieve a particular goal, or that generally has more favorable results.
Message phrase packages are constructed to be tone, cadence, and timbre consistent throughout, and are tagged with descriptions of these traits (professional, firm, casual, friendly, etc.), using standard methods from cognitive psychology. Additionally, in some embodiments, each phrase may include a matrix of metadata that quantifies the degree a particular phrase applies to each of the traits. The system will then map these traits to the correct set of descriptions of the phrase packages and enable the correct packages. This will allow customers or consultants to more easily get exactly the right Assistant personality (or conversation personality) for their company, particular target, and conversation. This may then be compared to the identity personality profile, and the phrases which are most similar to the personality may be preferentially chosen, in combination with the phrase performance metrics. A random element may additionally be incorporated in some circumstances to add phrase selection variability and/or continued phrase performance measurement accuracy. After phrase selection, the phrases replace the variables in the template. The completed templates are then output as a response (at 1750). The system may determine if additional actions are needed (at 1740), which may include attaching documents, setting calendar appointments, inclusion of web hooks, or similar activities.
Returning all the way back to
Returning then to
However, if the conversation is not yet complete, the process may return to the delay period (at 1020) before preparing and sending out the next message in the series (at 1030). The process iterates in this manner until the target requests deactivation, or until all objectives are met. This concludes the main process for a comprehensive messaging conversation.
Turning now to
Turning now to
Similarly, in
Turning now to
Once the duplicate target records are identified, those above thresholds for confidence of being duplicates (or determined to be in a significant conflict with one another) may be deactivated (at 2030). On the flip side, missing employees/representatives of the user's system are identified (at 2040) using HR feeds, manual input, payroll data and/or circumstantial evidence, such as email exchanges. These identified representatives are then added to the system (at 2050) and assignments between the various representatives and targets may be assessed and remapped accordingly (at 2060) to balance workloads.
Moving on to
Moving on,
Similarly, the time required to generate a response message is also estimated (at 2230). Historically, response generation is less processing intensive than the analysis of a received message, and as such mere scaling of processing resources is sufficient to meet the timing goals for the generation of a response (at 2240). Similarly, message sending is estimated (at 2250) which is generally much easier to control and manage as compared to initial intent processing and message classification. Sending a message is very fast, and the only reason timing goals may be difficult to obtain is if a very large number of messages are queued for being sent out. Thus to ensure the timing goal for the message sending is met, the process may adjust the order in which messages are delivered (at 2260).
Turning to
Likewise,
For each target, the phantom checks the target information and return it to the shared phantom class. The shared phantom class determines if the target is an update, or an insert. If it is an update there is no need to collect additional information, however if the target is new, or requires a stopclock, the shared phantom class determines that more information should be collected for the target; particularly the target's name, contact information and a stopclock (if applicable).
When the first target is inputted into the CRM (or other third party system as applicable) a clock is started. When the representative initially contacts the target the clock may be stopped. This indicates the response time for the organization. If the messaging system is directed at acting on behalf of the representative, the message system may instead contact the target and stop the clock accordingly. This activity is what is referred to as a “stopclock”.
The determination of whether a target requires a stopclock event can be quite difficult, and this logical component is managed exclusively by the shared phantom class. Additionally, the medium of contact used to effectuate the stopclock (e.g., email, text, phone call, etc.) is determined by the shared phantom class logic. A set of customized rules for the user or organization may be applied to assist in the decision of whether a stopclock event is desired, and if so the type to use.
Between the shared phantom class and the messaging systems API, the core functions are interposed, as seen generally at 2300F of
In a similar manner, the child phantom class requires an object to interact with the third party system. This object contains the properties of a webpage, such as cookies and headers. It also includes methods for opening new pages and evaluating these pages to collect information from within the third party system. These methods may include simple functions, or page behaviors.
There are many ways to open a page as described above. Two exemplary methods include the usage of a GET or POST parameters used to open a new webpage. The page is verified as elements are loaded until all elements are present. If, however, multiple pages need to be opened for a single task, then upon load completion an additional loading instruction may be employed/linked in order to claim page opening activity. After the page(s) have been opened the system may parse the pages to collect the desired information.
Moving on,
For example, returning to the above example, assume the initial messages were sent two days after a prescription was provided to the patient. The system could start varying the time of day, or which day the email is sent to the patients. Collected data from the physician's electronic health record system (a third party system that may be scraped by the phantoms) may be used to determine how well the patients adhere to their medication regiments. Over time, the system may learn that a delay of three days, for example, is more effective, and this aggregated testing result may be applied to the instant case, and even across domains to other similar situations (at 2430). For example, a car dealership may experiment using this data to contact a new purchaser of a vehicle about an extended warranty product after a similar three day delay period. In this manner the results of the testing may be applied (at 2440) both in the original context of the testing, and to the degree it is shown to be effectuations, to other domains.
Now that the systems and methods for the conversation generation with improved functionalities have been described, attention shall now be focused upon systems capable of executing the above functions. To facilitate this discussion,
Processor 2522 is also coupled to a variety of input/output devices, such as Display 2504, Keyboard 2510, Mouse 2512 and Speakers 2530. In general, an input/output device may be any of: video displays, track balls, mice, keyboards, microphones, touch-sensitive displays, transducer card readers, magnetic or paper tape readers, tablets, styluses, voice or handwriting recognizers, biometrics readers, motion sensors, brain wave readers, or other computers. Processor 2522 optionally may be coupled to another computer or telecommunications network using Network Interface 2540. With such a Network Interface 2540, it is contemplated that the Processor 2522 might receive information from the network or might output information to the network in the course of performing the above-described dynamic messaging processes. Furthermore, method embodiments of the present invention may execute solely upon Processor 2522 or may execute over a network such as the Internet in conjunction with a remote CPU that shares a portion of the processing.
Software is typically stored in the non-volatile memory and/or the drive unit. Indeed, for large programs, it may not even be possible to store the entire program in the memory. Nevertheless, it should be understood that for software to run, if necessary, it is moved to a computer readable location appropriate for processing, and for illustrative purposes, that location is referred to as the memory in this disclosure. Even when software is moved to the memory for execution, the processor will typically make use of hardware registers to store values associated with the software, and local cache that, ideally, serves to speed up execution. As used herein, a software program is assumed to be stored at any known or convenient location (from non-volatile storage to hardware registers) when the software program is referred to as “implemented in a computer-readable medium.” A processor is considered to be “configured to execute a program” when at least one value associated with the program is stored in a register readable by the processor.
In operation, the computer system 2500 can be controlled by operating system software that includes a file management system, such as a storage operating system. One example of operating system software with associated file management system software is the family of operating systems known as Windows® from Microsoft Corporation of Redmond, Wash., and their associated file management systems. Another example of operating system software with its associated file management system software is the Linux operating system and its associated file management system. The file management system is typically stored in the non-volatile memory and/or drive unit and causes the processor to execute the various acts required by the operating system to input and output data and to store data in the memory, including storing files on the non-volatile memory and/or drive unit.
Some portions of the detailed description may be presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is, here and generally, conceived to be a self-consistent sequence of operations leading to a desired result. The operations are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general-purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct more specialized apparatus to perform the methods of some embodiments. The required structure for a variety of these systems will appear from the description below. In addition, the techniques are not described with reference to any particular programming language, and various embodiments may, thus, be implemented using a variety of programming languages.
In alternative embodiments, the machine operates as a standalone device or may be connected (e.g., networked) to other machines. In a networked deployment, the machine may operate in the capacity of a server or a client machine in a client-server network environment or as a peer machine in a peer-to-peer (or distributed) network environment.
The machine may be a server computer, a client computer, a virtual machine, a personal computer (PC), a tablet PC, a laptop computer, a set-top box (STB), a personal digital assistant (PDA), a cellular telephone, an iPhone, a Blackberry, a processor, a telephone, a web appliance, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
While the machine-readable medium or machine-readable storage medium is shown in an exemplary embodiment to be a single medium, the term “machine-readable medium” and “machine-readable storage medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term “machine-readable medium” and “machine-readable storage medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the presently disclosed technique and innovation.
In general, the routines executed to implement the embodiments of the disclosure may be implemented as part of an operating system or a specific application, component, program, object, module or sequence of instructions referred to as “computer programs.” The computer programs typically comprise one or more instructions set at various times in various memory and storage devices in a computer, and when read and executed by one or more processing units or processors in a computer, cause the computer to perform operations to execute elements involving the various aspects of the disclosure.
Moreover, while embodiments have been described in the context of fully functioning computers and computer systems, those skilled in the art will appreciate that the various embodiments are capable of being distributed as a program product in a variety of forms, and that the disclosure applies equally regardless of the particular type of machine or computer-readable media used to actually effect the distribution
While this invention has been described in terms of several embodiments, there are alterations, modifications, permutations, and substitute equivalents, which fall within the scope of this invention. Although sub-section titles have been provided to aid in the description of the invention, these titles are merely illustrative and are not intended to limit the scope of the present invention. It should also be noted that there are many alternative ways of implementing the methods and apparatuses of the present invention. It is therefore intended that the following appended claims be interpreted as including all such alterations, modifications, permutations, and substitute equivalents as fall within the true spirit and scope of the present invention.
This continuation-in-part application is a non-provisional and claims the benefit of U.S. provisional application of the same title, U.S. provisional application No. 62/783,198, Attorney Docket No. CVSC-18H-P, filed in the USPTO on Dec. 20, 2018, currently pending. This continuation-in-part application also claims the benefit of U.S. application entitled “Systems and Methods for Natural Language Processing and Classification,” U.S. application Ser. No. 16/019,382, Attorney Docket No. CVSC-17A1-US, filed in the USPTO on Jun. 26, 2018, pending, which is a continuation-in-part application which claims the benefit of U.S. application entitled “Systems and Methods for Configuring Knowledge Sets and AI Algorithms for Automated Message Exchanges,” U.S. application Ser. No. 14/604,610, Attorney Docket No. CVSC-1403, filed in the USPTO on Jan. 23, 2015, now U.S. Pat. No. 10,026,037 issued Jul. 17, 2018. Additionally, U.S. application Ser. No. 16/019,382 claims the benefit of U.S. application entitled “Systems and Methods for Processing Message Exchanges Using Artificial Intelligence,” U.S. application Ser. No. 14/604,602, Attorney Docket No. CVSC-1402, filed in the USPTO on Jan. 23, 2015, pending, and U.S. application entitled “Systems and Methods for Management of Automated Dynamic Messaging,” U.S. application Ser. No. 14/604,594, Attorney Docket No. CVSC-1401, filed in the USPTO on Jan. 23, 2015, pending. All of the above-referenced applications/patents are incorporated herein in their entirety by this reference.
Number | Date | Country | |
---|---|---|---|
62783198 | Dec 2018 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16019382 | Jun 2018 | US |
Child | 16718038 | US | |
Parent | 14604610 | Jan 2015 | US |
Child | 16019382 | US | |
Parent | 14604602 | Jan 2015 | US |
Child | 14604610 | US | |
Parent | 14604594 | Jan 2015 | US |
Child | 14604602 | US |