Lex Olorenshaw - Half Moon Bay CA, US Gustavo Hernandez Abrego - San Jose CA, US Eugene Koontz - Mountain View CA, US
Assignee:
Sony Corporation - Tokyo Sony Electronics Inc. - Park Ridge NJ
International Classification:
G10L 11/00
US Classification:
704270, 704235
Abstract:
A system and method for utilizing speech recognition to efficiently perform data indexing procedures includes an authoring module that coordinates an authoring procedure for creating an index file that has pattern word sets corresponding to data objects stored in a memory of a host electronic device. The pattern word sets are generated with a speech recognition engine that transforms spoken data descriptions into text data descriptions for creating the pattern word sets. The pattern word sets are associated in the index file with data object identifiers that uniquely identify the corresponding data objects. A retrieval module manages a retrieval procedure in which the speech recognition engine converts a spoken data request into a text data request. The retrieval module compares the text data request and the pattern word sets to identify a requested object identifier for locating a requested data object from among the data objects stored in the memory of the host electronic device.
System And Method For Automatically Implementing A Finite State Automaton For Speech Recognition
Gustavo Abrego - San Jose CA, US Atsuo Hiroe - Yokohama-shi, JP Eugene Koontz - Mountain View CA, US
International Classification:
G10L 15/14
US Classification:
704256000
Abstract:
A system and method for automatically implementing a finite state automaton for speech recognition includes a finite state automaton generator that analyzes one or more input text sequences and automatically creates a node table and a link table to define the finite state automaton. The node table includes N-tuples from the input text sequences. Each N-tuple includes a current word and a corresponding history of one or more prior words from the input text sequences. The node table also includes unique node identifiers that each correspond to a different respective one of the current words. The link table includes specific links between successive words from the input text sequences. The links identified in the link table are defined by utilizing start node identifiers and end node identifiers from the unique node identifiers of the node table.
Jonathan Oliver - San Carlos CA, US Gleb Budman - Palo Alto CA, US Andrew Oliver - Glenhuntly Victoria, AU Eugene Koontz - Mountain View CA, US Christine Drake - San Mateo CA, US
International Classification:
G06F 21/00
US Classification:
726027000
Abstract:
A method of controlling distribution of content in a message sent by a message sender comprises receiving an indication from the message sender that the message is to be protected, identifying content in the message to be protected, adding the identified content to a database of protected content, and determining whether subsequently received content in a subsequently received message is associated with the identified content. A system for controlling distribution of content in a message sent by a message sender comprises a processor configured to receive an indication from the message sender that the message is to be protected, identify content in the message to be protected, add the identified content to a database of protected content, and determine whether subsequently received content in a subsequently received message is associated with the identified content.
Sony Corporation - Tokyo Sony Electronics Inc. - Park Ridge NJ
International Classification:
G06F 1730
US Classification:
707102, 707 6, 704 9
Abstract:
A method and system for compressing a data structure. A segment is identified within the data structure. Each segment identified is counted for the number of occurrences of the segment within the data structure. If the number of occurrences is greater than one, the segment is saved in a recurring data structure. Also, the recurring segment within the data structure is replaced with an index to the segment stored in the recurring data structure.
- Round Rock TX, US Gleb Budman - Palo Alto CA, US Andrew F. Oliver - Glenhuntly, AU Eugene Koontz - Mountain View CA, US Christine Drake - San Mateo CA, US
International Classification:
H04L 29/06 G06F 21/62 H04L 12/58
Abstract:
A method of controlling distribution of content in a message sent by a message sender comprises receiving an indication from the message sender that the message is to be protected, identifying content in the message to be protected, adding the identified content to a database of protected content, and determining whether subsequently received content in a subsequently received message is associated with the identified content. A system for controlling distribution of content in a message sent by a message sender comprises a processor configured to receive an indication from the message sender that the message is to be protected, identify content in the message to be protected, add the identified content to a database of protected content, and determine whether subsequently received content in a subsequently received message is associated with the identified content.
- San Jose CA, US Gleb Budman - Palo Alto CA, US Andrew F. Oliver - Glenhuntly, AU Eugene Koontz - Mountain View CA, US Christine Drake - San Mateo CA, US
International Classification:
G06F 21/62 G06F 17/30 H04L 12/58
US Classification:
726 28
Abstract:
A method of controlling distribution of content in a message sent by a message sender comprises receiving an indication from the message sender that the message is to be protected, identifying content in the message to be protected, adding the identified content to a database of protected content, and determining whether subsequently received content in a subsequently received message is associated with the identified content. A system for controlling distribution of content in a message sent by a message sender comprises a processor configured to receive an indication from the message sender that the message is to be protected, identify content in the message to be protected, add the identified content to a database of protected content, and determine whether subsequently received content in a subsequently received message is associated with the identified content.