Patent application number | Description | Published |
20140250178 | CONTENT BASED DISCOVERY OF SOCIAL CONNECTIONS - Methods, systems, and computer-readable media are provided for identifying social connections. In some implementations, the occurrence of a first reference to a first person and a second reference to a second person is identified in unstructured data. A relationship metric is calculated between the first reference and the second reference, wherein the relationship metric is based at least in part on the co-occurrence of the first reference and the second reference. The existence of a potential connection between the first reference and the second reference is determined based at least in part on the relationship metric. A recommendation is provided to at least one of the first person and the second person to acknowledge the potential connection as an actual connection. Input is received from at least one of the first person and the second person confirming the potential connection as an actual connection. | 09-04-2014 |
20140344259 | ANSWERING PEOPLE-RELATED QUESTIONS - A computer device may receive a search query from a user of a user device, determine that the search query is a people-related question, and identify, using a data structure, a set of people related to the search query, where the data structure is associated with the user, and where the data structure stores people-related data for a group of people with which the user is associated. The computer device may also determine whether to provide information relating to the set of people, and selectively provide, to the user device, one of a first document or a second document. The first document identifies at least one person in the set of people and provides information relating to the at least one person, where the information, relating to the at least one person, provides an answer to the people-related question. The second document excludes information relating to the set of people. | 11-20-2014 |
20150161519 | NAME RECOGNITION - A computer-implemented technique includes obtaining training electronic messages, identifying name context in the training electronic messages, and determining patterns from the name context. The technique can include applying the patterns to the training electronic messages to extract candidate names and selecting a set of the patterns based on the extracted candidate names to obtain a set of patterns. In some implementations, the technique can further include applying the set of patterns to electronic messages associated with a first user having a registered profile, extracting candidate names, and selecting a set of alternate names for the first user from the candidate names. The technique can also include detecting a use of one alternate name from the set of alternate names by a second user, and outputting a suggestion to the second user in response to the detecting, the suggestion being based on the registered profile of the first user. | 06-11-2015 |
20150200829 | TASK-BASED STATE RECOVERY IN A WEB BROWSER - A method includes identifying one or more browsing sessions from a plurality of browsing activities, each of the one or more browsing sessions comprising browsing activities having a common theme, identifying a browser state of each of the one or more browsing sessions, generating a record representing the browser state of each of the one or more browsing sessions, wherein the record is associated with the common theme of the browsing activities comprising each of the one or more browsing sessions, storing the generated record representing the browser state of each of the one or more browsing sessions and retrieving the stored record when a current online activity has a theme that corresponds to the common theme of the at least one of the one or more browsing sessions. | 07-16-2015 |
20150201040 | CLOUD-BASED BROWSER HISTORY - A method includes receiving browsing data from the plurality of client devices associated with the user, receiving a request from one of the plurality of client devices to access the received browsing data, determining whether the request to access the received browsing data is a request to utilize the received browsing data for a task associated with the one of the plurality of client devices or a deletion request, wherein the deletion request is a request to delete a portion of the received browsing data and automatically deleting the portion of the received browsing data on the server and synchronizing the deletion across each of the plurality of client devices associated with the user when the request is determined to be a deletion request, otherwise providing access to the received browsing data to the one of the plurality of client devices. | 07-16-2015 |
20150358447 | POPULATING USER CONTACT ENTRIES - Methods and apparatus for populating a contact entry of a user based on information obtained from one or more sources that are external to the contact entry. Some implementations are directed generally to analyzing text of a document associated with the user to identify contact information in the document. In some versions of those implementations, an affinity measure associated with the document may be determined that is indicative of an amount of interest of the user in the document and a contact entry may be populated with one or more aspects of the contact information based on the affinity measure satisfying a threshold. | 12-10-2015 |
20150371138 | AUTOMATIC IDENTIFICATION AND USE OF ALTERNATE USER CONTACT INFORMATION - Computer-implemented techniques for automatic identification and use of alternate user contact information can include identifying, at a server having one or more processors, a set of patterns from training electronic messages, each pattern indicating a pattern of contact information context. The techniques can include storing and utilizing, at the server, the set of patterns to obtain a set of alternate contact information for a target user. In response to a use of a specific alternate contact information for the target user by a source user at a computing device, the techniques can include providing, from the server to the computing device, a suggestion for the source user. Examples of the suggestion may include a virtual address for an electronic message or at a social network, a physical address for navigation, and a telephone number for calling or incoming caller identification. | 12-24-2015 |
20160124948 | POPULATING USER CONTACT ENTRIES - Methods and apparatus for populating a contact entry of a user based on information obtained from one or more sources that are external to the contact entry. Some implementations are directed generally to analyzing text of a document associated with the user to identify contact information in the document. In some versions of those implementations, an affinity measure associated with the document may be determined that is indicative of an amount of interest of the user in the document and a contact entry may be populated with one or more aspects of the contact information based on the affinity measure satisfying a threshold. | 05-05-2016 |