Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Using distributed state machines for human-to-computer dialogs with automated assistants to protect private data

An automatic assistant and state machine technology, applied in digital data protection, electronic digital data processing, digital data information retrieval, etc., can solve problems such as inaccessibility, privacy or sensitive information exposure, and achieve the effect of simplifying audit and improving delay

Pending Publication Date: 2020-06-19
GOOGLE LLC
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While it is possible to grant cloud-based automated assistant components access to such user-controlled resources, doing so may expose private or sensitive information to third parties that the user does not wish to have access to
And in some cases, users may not even want cloud-based automated assistant components to have access to sensitive or private information
Additionally, cloud-based automated assistant components may not be able to access some information stored, for example, at resources (e.g., computing devices) within a protected "secure zone," such as a corporate network located behind one or more firewalls

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Using distributed state machines for human-to-computer dialogs with automated assistants to protect private data
  • Using distributed state machines for human-to-computer dialogs with automated assistants to protect private data
  • Using distributed state machines for human-to-computer dialogs with automated assistants to protect private data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] now go to figure 1 , illustrating an example environment in which the techniques disclosed herein may be implemented. The example environment includes one or more client computing devices 106 1-N . Each client device 106 may execute a respective instance of the automated assistant client 118 . Can be communicatively coupled to client device 106 via one or more local area networks and / or wide area networks (e.g., the Internet), generally indicated at 110 1-N One or more cloud-based automated assistant components 119 (such as natural language processor 122) are implemented on one or more computing systems in the cloud (collectively referred to as "cloud" computing systems).

[0025] In various implementations, an instance of auto-assistant client 118 through its interaction with one or more cloud-based auto-assistant components 119 may form a logical instance of what appears to be auto-assistant 120 from the user's perspective. A user may engage this logical instance ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Techniques are described related to for generating / distributing state machines that are implemented within a security zone to obtain private information from one or more resources within the securityzone. In various implementations, an automated assistant client implemented by processor(s) within the security zone may receive a free form natural language query (FFNLQ) that is answerable using private information available from resource(s) within the security zone. Data indicative of the FFNLQ may be provided to a semantic processor outside of the security zone, and the online semantic processor may return a state machine that is implemented by processor(s) within the security zone to obtain the private information from resource(s) within the security zone. Based on the state machine and the obtained private information, natural language output may be generated and presented to convey information responsive to the FFNLQ.

Description

Background technique [0001] People can use interactive software applications referred to herein as "automated assistants" (also referred to as "chatbots," "interactive personal assistants," "intelligent personal assistants," "personal voice assistants," "conversational agents," etc.) Participate in man-machine dialogue. For example, humans (who may be referred to as "users" when interacting with automated assistants) may provide commands, queries, and / or requests (collectively referred to herein as "queries") using free-form natural language input that The form of natural language input may be a spoken utterance converted to text and then processed and / or free-form natural language input by typing. [0002] In many cases, logical instances of an automated assistant can be implemented across multiple computing devices. For example, a logical instance of an auto-assistant may include an auto-assistant client installed on a user's mobile phone and one or more cloud-based auto-a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F16/242
CPCG06F21/6245H04W4/021G06F16/90332G06F16/243G06F40/30G06F9/451G10L15/08H04L63/0272
Inventor 阿多马斯·帕尔塔纳维丘斯安德列·安布
Owner GOOGLE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products