Systems and methods for contextual memory capture and recall

ABSTRACT

Systems and methods for contextual memory capture and recall are provided. The contextual memory capture and recall systems and methods help a user create, store, and recall memory information associated with an identified activity. The contextual memory capture and recall systems and methods are capable of identifying user activities where a memory inquiry may be desirable, creating a memory inquiry with a recommended memory action based on the activity, providing the memory inquiry to the user, and automatically linking an accepted memory action, along with any received memory information for the memory action, with the identified activity.

BACKGROUND

Language understanding systems, personal digital assistants, agents andartificial intelligence (AI) are changing the way users interact withthe computers. Developers of computers, web services, and/orapplications are always trying to improve the interactions betweenhumans and computers. The language understanding systems, personaldigital assistants, agents and artificial intelligence are typicallyutilized to communicate with users and/or to complete basic tasks.

It is with respect to these and other general considerations thataspects disclosed herein have been made. Also, although relativelyspecific problems may be discussed, it should be understood that theaspects should not be limited to solving the specific problemsidentified in the background or elsewhere in this disclosure.

SUMMARY

In summary, the disclosure generally relates to systems and methods forcontextual memory capture and recall. The contextual memory capture andrecall systems and methods help a user create, store, and recall memoryinformation associated with an identified activity. The contextualmemory capture and recall systems and methods are capable of identifyinguser activities and determining if a memory inquiry would be desirablefor each identified activity. In response to a determination that amemory inquiry would be desirable for an activity, the contextual memorycapture and recall systems and methods are further capable of creating amemory inquiry with a recommended memory action based on the activity,providing the memory inquiry to the user, and automatically linking anaccepted memory action, along with any received memory information forthe memory action, with the identified activity.

One aspect of the disclosure is directed to a system for contextualmemory capture and recall. The system includes at least one processorand a memory. The memory encodes computer executable instruction that,when executed by the at least one processor, are operative to:

-   -   collect user context signals from a client computing device of a        user;    -   enrich user context elements from the user context signals with        world knowledge to form enriched context elements;    -   identify an activity of the user based on the enriched context        elements, wherein the activity is a future activity;    -   evaluate the activity based on inquiry rules;    -   determine that a memory inquiry for the activity is desirable        based on the evaluation of the activity;    -   create an appropriate memory inquiry based on the activity and        creation rules;    -   evaluate the enriched context elements based on notification        rules in response to the determination that the memory inquiry        is desirable;    -   collect memory input from the client computing device in        response to the memory inquiry;    -   create a memory action based on the memory input, wherein the        memory action includes a recall of the memory information;    -   link the memory action with a first boundary of the activity;    -   detect the first boundary based on the enriched context        elements; and    -   in response to detection of the first boundary, send        instructions to the client computing device to provide the        memory information to the user.        The memory input includes memory information.

In another aspect, a method for contextual memory capture and recall isdisclosed. The method includes:

-   -   collecting context signals from at least one client computing        device of a user;    -   enriching context elements from the context signals with world        knowledge to form enriched context elements;    -   identifying an activity of the user based on the enriched        context elements;    -   determining that a memory inquiry for the activity is desirable        based on an evaluation of the activity;    -   providing the memory inquiry to the user;    -   collecting memory input from the user in response to the memory        inquiry;    -   creating a memory action in response the memory input, wherein        the memory action includes a recall of the memory information;        and    -   linking the memory input with at least one boundary of the        activity.        The memory input includes memory information input by the user.

In yet another aspect of the invention, the disclosure is directed to asystem for contextual memory capture and recall. The system includes atleast one processor and a memory. The memory encodes computer executableinstruction that, when executed by the at least one processor, areoperative to:

collect context signals from at least one client computing device of auser;

-   -   enrich the context signals with world knowledge to form enriched        context elements;    -   identify an activity of the user based on the enriched context        elements;    -   determine that a memory inquiry for the activity is desirable        based on an evaluation of the activity;    -   creating the memory inquiry based on the activity in response to        a determination that the memory inquiry is desirable for the        activity;    -   provide the memory inquiry to the at least one client computing        device;    -   collecting memory input from the at least one client computing        device in response to the memory inquiry; and    -   link a memory action with a boundary of the activity in response        to the memory input.

This summary is provided to introduce a selection of concepts in asimplified form that are further described below in the DetailedDescription. This summary is not intended to identify key features oressential features of the claimed subject matter, nor is it intended tobe used to limit the scope of the claimed subject matter.

BRIEF DESCRIPTION OF THE DRAWINGS

Non-limiting and non-exhaustive embodiments are described with referenceto the following Figures.

FIG. 1A is a schematic diagram illustrating a contextual memory captureand recall system on a client computing device, in accordance withaspects of the disclosure.

FIG. 1B is a schematic diagram illustrating a contextual memory captureand recall system on a server computing device being utilized by a uservia a client computing device, in accordance with aspects of thedisclosure.

FIG. 2 is a simplified schematic block diagram illustrating use of acontextual memory capture and recall system, in accordance with aspectsof the disclosure.

FIG. 3A is a simplified schematic diagram illustrating a user interfaceof a client computing device displaying a first memory inquiry for afirst identified activity of the user, in accordance with aspects of thedisclosure.

FIG. 3B is a simplified schematic diagram illustrating the userinterface of FIG. 3A displaying, in response to a boundary detection ofthe first identified activity, memory information from memory input forthe first identified activity, in accordance with aspects of thedisclosure.

FIG. 3C is a simplified schematic diagram illustrating the userinterface of FIG. 3A displaying a second memory inquiry for a secondidentified activity of the user, in accordance with aspects of thedisclosure.

FIG. 4 is a block flow diagram illustrating a method for contextualmemory capture and recall, in accordance with aspects of the disclosure.

FIG. 5 is a block diagram illustrating example physical components of acomputing device with which various aspects of the disclosure may bepracticed.

FIG. 6A is a simplified block diagram of a mobile computing device withwhich various aspects of the disclosure may be practiced.

FIG. 6B is a simplified block diagram of the mobile computing deviceshown in FIG. 6A with which various aspects of the disclosure may bepracticed.

FIG. 7 is a simplified block diagram of a distributed computing systemin which various aspects of the disclosure may be practiced.

FIG. 8 illustrates a tablet computing device with which various aspectsof the disclosure may be practiced

DETAILED DESCRIPTION

In the following detailed description, references are made to theaccompanying drawings that form a part hereof, and in which are shown byway of illustrations specific aspects or examples. These aspects may becombined, other aspects may be utilized, and structural changes may bemade without departing from the spirit or scope of the presentdisclosure. The following detailed description is therefore not to betaken in a limiting sense, and the scope of the present disclosure isdefined by the claims and their equivalents.

Progress in machine learning, language understanding and artificialintelligence are changing the way users interact with the computers.Digital assistant applications, such as Siri, Google Now and Cortana areexamples of the shift in human computer interaction.

Human memory cannot record and recall everything. It is almostimpossible to remember everything that a person needs to remember tocomplete every activity every time. Often, people find themselvesthinking ‘oh I did not ask this question to this person I met’ or ‘Iforgot to call this person as promised before my flight took off,’ etc.

Currently, language understanding systems, personal digital assistants,agents and artificial intelligence are utilized to communicate withusers and/or to complete basic tasks. These previously utilized systemsand methods are capable of providing reminders with user enteredinformation. However, these reminders are only created upon userrequest. Further, the user has to identify a trigger event fordisplaying a created reminder, such as an activity, a location, or atime of day. In other words, the user has to identify that a reminder isdesired, enter any desired memory information, and/or then link thisreminder and information to a desired trigger activity. Further, whilethese previously utilized systems and methods may suggest actions basedon detected user activities, these previously utilized systems andmethods do not suggest the performance of memory actions, such as thecreation reminders with memory input related to current or futureidentified activities. As such, these previously utilized systems andmethods had only user initiated memory capture and recall and/or userprovided associations for memory capture and recall.

Therefore, systems and methods for contextual memory capture and recallare disclosed herein. The systems and methods for contextual memorycapture and recall utilize enriched user context signals to identifyuser activities and to determine if a memory inquiry would be desirable,beneficial, or appropriate for the user for each identified activity.The systems and methods for contextual memory capture and recall thencreate an appropriate memory inquiry with a memory action recommendationbased at least on the activity. A memory inquiry as used herein refersto a request for approval to perform a memory action associated with anidentified activity. The memory inquiry is presented to the user for anidentified activity and requests memory input in response from the user.The memory input may be an approval of a memory action along with userprovided memory information. The system and methods automatically linkthe memory action and/or the memory information with the identifiedactivity. The ability of the systems and methods described herein toidentify user activities that may benefit from a memory inquiry and toautomatically link memory input received in response to this inquirywith the activity creates an application, such as a digital assistant,that improves a user's ability to accomplish tasks, improves the recalland capture of needed memory items, and improves the usability,performance, and/or user interactions of/with the application whencompared to previously utilized applications that do not provide memoryinquires in response to identifying a user activity and/or that to notautomatically link user entered memory input with a user activity.

FIGS. 1A and 1B illustrate different examples of a contextual memorycapture and recall system 100 on a client computing device 104 beingutilized by a user 102, in accordance with aspects of the disclosure.The contextual memory capture and recall system 100 is a system thathelps a user create, store, and recall memory information for anactivity. The contextual memory capture and recall system 100 includesan activity framework 108, a notification agent 109, and a linkingsystem 111. The contextual memory capture and recall system 100 iscapable of determining whether a memory inquiry is desirable to the userfor an identified activity, creating a memory inquiry that recommends amemory action based on the activity, providing the memory inquiry to theuser, and automatically linking the memory action and any receivedmemory information with the identified activity. The contextual memorycapture and recall system 100 is able to perform the above takes bydetermining the context of the user by analyzing received user contextsignals generated by the one or more of the user's devices 104 based onworld knowledge 110. In contrast, previously utilized systems, such asdigital assistants, only offered user initiated memory capture andrecall and/or user provided associations for memory capture and recall.

The contextual memory capture and recall system 100 may also include amemory store 106 for storing memory input, memory information, enrichedmemory elements (such as enriched context elements), memory inquiries,memory actions, user patterns, and/or user feedback. In alternativeaspects, the memory store 106 is stored on a database 115 separate anddistinct from the contextual memory capture and recall system 100.

The contextual memory capture and recall system 100 may further includea pattern detection framework 112 for determining user patterns and/oruser feedback based on the analysis of user context signals, other usersignals, and/or world knowledge. In alternative aspects, the patterndetection framework 112 is on a server 105 separate and distinct fromthe contextual memory capture and recall system 100. In other aspects,the pattern detection framework 112 and/or the memory store 106 are notpart of the contextual memory capture and recall system 100 but may bein communication with the contextual memory capture and recall system100 for exchanging data.

In some aspects, the contextual memory capture and recall system 100 isimplemented on the client computing device 104 as illustrated in FIG.1A. In a basic configuration, the client computing device 104 is acomputer having both input elements and output elements. The clientcomputing device 104 may be any suitable computing device forimplementing the contextual memory capture and recall system 100. Forexample, the client computing device 104 may be a mobile telephone, asmart phone, a tablet, a phablet, a smart watch, a wearable computer, apersonal computer, a gaming system, a desktop computer, a laptopcomputer, and/or etc. This list is exemplary only and should not beconsidered as limiting. Any suitable client computing device 104 forimplementing the contextual memory capture and recall system 100 may beutilized.

In other aspects, the contextual memory capture and recall system 100 isimplemented on a server computing device 105, as illustrated in FIG. 1B.The server computing device 105 may provide data to and/or receive datafrom the client computing device 104 through a network 113. In someaspects, the network 113 is a distributed computing network, such as theinternet. In further aspects, that contextual memory capture and recallsystem 100 is implemented on more than one server computing device 105,such as a plurality or network of server computing devices 105. In someaspects, the contextual memory capture and recall system 100 is a hybridsystem with portions of the contextual memory capture and recall system100 on the client computing device 104 and with portions of thecontextual memory capture and recall system 100 on the server computingdevice 105.

FIG. 2 is an example of a simplified schematic block diagramillustrating the use of a contextual memory capture and recall system100, in accordance with aspects of the disclosure. As discussed aboveand as shown in FIG. 2, the contextual memory capture and recall system100 includes an activity detection framework 108. The activity detectionframework 108 of the contextual memory capture and recall system 100collects user signals 116 including context signals. The term collect asutilized herein refers the active retrieval of items and/or to thepassive receiving of items. The activity detection framework 108 of thecontextual memory capture and recall system 100 may also collect worldknowledge and/or additional user information 128, such as user feedback,user patterns, and/or other user enriched memory elements from a patterndetection framework 112.

The user signals 116 are produced by signal generators 138. The signalgenerators are one or more devices 104 of the user 102 and/or one ormore applications 138 that run on the user's devices 104. For example,the client computing device 104 may include a user's desktop computerand/or a user's smart phone. In further examples, the applications 138on the client computing device 104 that send user signals 116 mayinclude a digital assistant application, a voice recognitionapplication, an email application, a social networking application, acollaboration application, an enterprise management application, amessaging application, a word processing application, a spreadsheetapplication, a database application, a presentation application, acontacts application, a gaming application, an e-commerce application,photo application, mapping application, an e-business application, atransactional application, an exchange application, a device controlapplication, a web interface application, a calendaring application,etc.

The activity detection framework 108 of the contextual memory captureand recall system 100 receives the user signals 116 and/or theadditional user information 128. The activity detection framework 108includes an enrichment system 118, a detection system 119, an inquirydecision system 120, and a creation system 122.

The enrichment system 118 of the activity detection framework platform108 collects the user signals 116 including user context signals. Theuser context signals include context elements of the user 102 and/ordigital artifacts. The enrichment system 118 converts the digitalartifacts into context elements utilizing world knowledge 110.Additionally, the enrichment system 118 enriches the context elementsutilizing world knowledge 110. World knowledge 110 as utilized hereinincludes any information that can be accessed utilizing a networkconnection, such as search engines and databases. The user contextsignals are specific to and relate to a given user 102. The user contextsignals are signals that relate to the current state of the user 102.The current state or user context is the current environment of the user102 and/or client computing device 104. For example, the current stateor user context may be based on the current location of the user,current time, current weather, current digital behavior of the user,and/or current user physical actions. In additional aspects, theenrichment system 118 enriches all user signals to form memory elementsand is not limited to the enrichment of user context signals.

For example, a digital artifact, such as GPS coordinates, has no contextvalue to the user 102. However, upon a search of the world knowledge110, the enrichment system 118 can determine that these coordinates arefor a Starbucks at a specific address in Seattle, Wash. In response tothis determination, the enrichment system 118 may convert the digitalGPS coordinates into a context element of “Starbucks” and “Seattle.”Further, the enrichment system 118 could search the world knowledge 110to enrich the “Starbucks” context element and determine that “Starbucks”is a coffee shop. In this embodiment, the enrichment system 118 mayenrich the “Starbucks” context element by tagging this context elementas a “coffee shop.” As such, the enrichment system 118 tags contextelements and determines additional context elements to form enrichedcontext elements.

The detection system 119 collects enriched context elements generated bythe enrichment system 118. The detection system 119 analyzes theenriched context elements to identify a user activity. The user activitymay be an activity that is going to occur in the future (a futureactivity) or an activity currently occurring (a current activity). Forexample, the identified future activity may be a doctor's appointment, atrip to New York, a relative's birthday, work meeting, etc. For example,an identified current activity may be the user's commute to work, day 1of a trip to New York, a work meeting, etc. In some aspects, thedetection system 119 analyzes or evaluates the enriched context signalsbased on a set of context rules. In further aspects, the detectionsystem 118 also collects the additional user information 128, such asuser feedback and user patterns. In these aspects, the context rules maybe updated utilizing a learning algorithm based on the additional userinformation 128. Any learning algorithm referred to herein may includemachine learning and/or statistical modeling techniques. The ability ofthe detection system 118 to update the context rules based on userfeedback and/or user patterns allows the detection system 118 tocontinually evolve with the user 102 based on the user's patterns and/orfeedback.

The identified user activity is collected by the inquiry decision system120. The inquiry decision system 120 evaluates the identified useractivity to determine if a memory inquiry for the activity is desirable.The inquiry decision system 120 utilizes inquiry rules to evaluate thefirst activity. In some aspects, the inquiry decision system 120 alsocollects the additional user information 128. In these aspects, the setof inquiry rules may be updated utilizing a learning algorithm based onthe additional user information 128. The ability of the inquiry decisionsystem 120 to update the inquiry rules based on user feedback and/oruser patterns allows the inquiry decision system 120 to continuallyevolve with the user 102 based on the user's patterns and/or feedback.If the activity meets the inquiry rules, the inquiry decision system 120determines that the memory inquiry for the identified activity isappropriate. If the activity does not meet the inquiry rules, theinquiry decision system 120 determines that the memory inquiry for theidentified activity is not appropriate. For example, an identifiedactivity of the user commute to work may not meet the rules for a memoryinquiry. In another example, an identified activity of a doctor'sappointment or an upcoming trip may meet the inquiry rules and qualifyfor memory inquiry. In some aspects, the inquiry rules are a list ofidentified current and future activities that are appropriate ordesirable for a memory inquiry. In other aspects, the inquiry rules arelist of identified current and future activities that are notappropriate or no desirable for a memory inquiry. However, this list ofrules is exemplary only and is not limiting. Any suitable inquiry rulesfor determining if a memory inquiry is appropriate may be utilized byinquiry decision operation 120 as would be understood by a person ofskill in the art.

In response to a determination that a memory inquiry is desirable by theinquiry decision system 120, the creation system 122 creates or forms amemory inquiry. The memory inquiry identifies the activity and requestsapproval to perform a memory action. A memory action as utilized hereinrefers to any action performed or the generation of instructions toperform any action related to the storage and/or recall of memoryinformation in association with the identified activity. The recall ofmemory information associated with the identified activity is referredto herein as a memory recall. In some aspects, a memory recall mayinclude a reminder or reminder information (also referred to herein asmemory information) for an activity. In additional aspects, a memoryrecall may include memory information related to an activity that theuser wants to store in association with the activity so that thisactivity related information can be recalled upon request. The creationsystem 122 creates the memory inquiry 132 based at least on theactivity. In some aspects, the creation system 122 creates the memoryinquiry 132 based further on world knowledge and/or the additional userinformation 128. In some aspects, the memory inquiry is determined orcreated by the creation system 122 based on which inquiry rule is met bythe activity. For example, each inquiry rule or each identified activitythat is suitable for a memory inquiry may be associated with apredetermined memory inquiry. The predetermined memory inquiry may be atemplate that is filled in based on an analysis of the activity, worldknowledge and/or additional user information 128. In other aspects, thepredetermined memory inquiry is a static prompt that does not change.

In alternative aspects, the memory inquiry is determined based onanalysis of the activity along with world knowledge and/or additionaluser information 128 and is not based on predetermined memory inquiry.In aspects where the memory inquiry is not static, the creation system122 may analyze or evaluate the activity based on a set of creationrules to form the memory inquiry. In further aspects, the creationsystem 122 also collects the additional user information 128 and/orworld knowledge. In these aspects, the creation rules may be updatedutilizing a learning algorithm based on the additional user information128. The ability of the creation system 122 to update the creation rulesbased on user feedback and/or user patterns allows the creation system122 to continually evolve with the user 102 based on the user's patternsand/or feedback.

Further, in these aspects, the creation system 122 may evaluate otherenriched memory elements, world knowledge, and/or additional userinformation to determine if any memory information should be provided(or recommended) in the memory inquiry based on the creation rules. Ifany recommended memory information for the activity is identified by thecreation system 122, the recommended memory information is provided inthe created memory inquiry. In some aspects, creation system 122 createsthe memory inquiry with a user interface or a selectable icon or buttonfor accepting and/or rejecting the provided memory inquiry.

Additionally, the creation system 122 may add an explanation of aprovided memory inquiry based on the activity and analysis of additionaluser information with the creations rules. For example, an explanationmay only be provided the first time a specific kind of memory inquiry isprovided or for a predetermined number of times that the specific kindof memory inquiry is provided. In other aspects, an explanation isprovided by the creations system 122 based on how complicated theoffered memory action is in the memory inquiry. These aspects areexemplary only and are not meant to be limiting. The explanation may beprovided for any suitable reason as would be understood by a person ofskill in the art.

For example, FIGS. 3A and 3C illustrate examples of different memoryinquiries 132 displayed on a user interface 140. FIG. 3A displays amemory inquiry 132 a in response to the identification of a useractivity of a future doctor's appointment. The memory inquiry 132 anotifies the user of the identified activity by reciting, “I noticedthat you have doctor's appointment today.” The memory inquiry 132 afurther includes a memory action of a request to provide reminderinformation for that activity by reciting, “Do you want me to rememberquestions you want to ask the doctor?” Additionally, the memory inquiry132 a provides additional relevant elements based on an analysis of theadditional user information that relates to the identified doctor'sappointment by reciting, “I can keep . . . your last prescriptionavailable for you when your reach the doctor's office.” Further, thememory inquiry 132 a also includes an acceptance button 142 and arejection button 142 for the recommended memory action of the memoryinquiry 132 a.

FIG. 3C displays a memory inquiry 132 b in response to theidentification of a user activity of a 3 day trip to New York. Unlikethe memory inquiry 132 a, this memory inquiry 132 b is for a currentactivity, such as day 1 of the three day trip. The memory inquiry 132 anotifies the user of the identified activity by reciting, “I noticedthat you are on a 3 day trip to New York and just completed your firstday.” The memory inquiry 132 b further includes a request to perform amemory action related to the activity by reciting, “Do you want me torecord a summary of how your first day on this trip was so that I canhelp you recall it anytime or add it to your tour diary at the end ofthe trip?” Additionally, the memory inquiry 132 b provides anexplanation of the things that would be recorded upon acceptance of thememory inquiry 132 b by reciting, “I can help you record things likeplaces you visited and what you like the most about those places.”Further, the memory inquiry 132 b also includes an acceptance button 142and a rejection button 144 for the proposed memory action of the memoryinquiry 132 b.

The notification agent 109 determines a time period that is appropriatefor providing a notification 130 to a user 102. The notification agent109 sends instructions to the client computing device 104 to provide anotification 130 to the user 102. The notification 130 may include amemory inquiry 132 and/or a memory recall 134 (also referred to hereinas recalled memory input). The notification agent 109 collects thememory inquiries 132 and/or recalled memory input 134 from the activitydetection framework 108.

In response to the creation of memory inquiry 132 by the creation system122 of the activity detection framework 108 and/or in response to adetermination that a memory inquiry is desirable for the activity byinquiry decision system 120 of the activity detection framework 108, thenotification agent 109 determines an appropriate time for providing thememory inquiry 132 to the user 102. The notification agent 109 collectsthe enriched context elements. In some aspects, the notification agent109 also collects world knowledge and/or additional user information128. The notification agent 109 evaluates the enriched context signalsbased on notification rules in response to the determination that thememory inquiry is desirable by the inquiry decision system 120 or inresponse to the creation of a memory inquiry 132 by the creation system122. The notification rules may be updated utilizing a learningalgorithm based on world knowledge and/or additional user information128. The ability of notification agent 109 to update the notificationrules based on user feedback and/or user patterns allows thenotification agent 109 to continually evolve with the user 102 based onthe user's patterns and/or feedback.

If the notification agent 109 determines that the current time period isappropriate for providing the memory inquiry to the user, thenotification agent 109 provides or sends instructions to one or moreuser devices 104 to provide the memory inquiry 132 to the user 102. Theone or more client computing devices 104 of the user provide the memoryinquiry 132 to the user 102 in response to receiving the instructionsfrom the notification agent 109. The client computing device 104 mayprovide the notification 130, such as the memory inquiry 132, to theuser 104 via any suitable notification media, such visual, audio,tactile, and/or other sensory outputs. For example, the client computingdevice 104 may display the memory inquiry 132 and/or verbally recite thememory inquiry 132 utilizing artificial voice intelligence.

If the notification agent 109 determines that the current time period isnot appropriate for providing the memory inquiry 132 to the user 102,the notification agent 109 does not send instructions to one or moreuser devices 104 to provide the memory inquiry 132 to the user 102 andinstead continues to monitor for an appropriate time period forproviding the memory inquiry 132 to the user 102. For example, if thenotification agent 109 determines that the user is driving or sleepingbased on an analysis of the enriched context elements, the notificationagent 109 may determine that this time period is not appropriate for adisplay of a notification 130.

In response to receiving the memory inquiry 132, the user may input intoa user interface 140 of the one or more client computing device 104 amemory input 134. The contextual memory capture and recall system 100collects the memory input 134 from the one or more client computingdevices 104. The linking system 111 of the contextual memory capture andrecall system 100 collects the memory input 134. The linking system 111is a memory read and write application programming interface (API). Thelinking system 111 reads or understands the received memory input 132.The memory input 134 includes an acceptance or a rejection of theproposed memory action in the memory inquiry. In some aspects, thememory input 134 includes memory information provided by the user. Infurther aspects, the receipt of memory information is interpreted by thelinking system 111 as an implicit acceptance of the memory inquiry 132.If the linking agent reads the memory input 134 and determines that thememory input is a rejection of the memory inquiry, the linking agent 111sends the rejection to the memory store 106.

If the linking agent reads the memory input 134 and determines that thememory input is an acceptance of the memory inquiry, the linking agent111 links or associates the memory action with the activity. In someaspects, the linking agent 111, in response to an acceptance of theproposed memory action also gathers memory information for the activity.For example, the linking system 111 may request or send instructions tothe one or more user devices 104 to request memory information inresponse to the acceptance. The one or more user devices 104 provide thememory information request to the user. The user 102 may provideadditional memory information via the user interface 140 in response tothe memory information request. The user device 104 sends the userinputted memory information to the contextual memory capture and recallsystem 100. The linking system 111 of the contextual memory capture andrecall system 100 collects the user inputted memory information from theuser device 104. Memory information collected after the acceptance ofthe memory inquiry 132 by the linking system 111 is considered part ofthe memory input 134.

In further aspects, the linking system 111 analyzes the proposed memoryaction and/or the memory information in the memory input. Based on thisanalysis, the linking system 111 may collect additional memoryinformation from world knowledge and/or additional user information.This additional memory information collected by the linking system 111is considered part of the memory input 134.

Once all of the memory input has been collected by the linking system111, the linking system 111 creates or writes instructions to perform amemory action. In some aspects, the linking system 111 links the memoryaction to the activity by links or associating the memory action withone or more boundaries of the activity. In further aspects, the linkingsystem 111 links the memory action to the activity by linking orassociating the storage of memory information with the activity. Thememory action may be the display of inputted memory information from theuser and/or gathered additional memory information by the linking system111. Alternatively, the memory action may be the recording of specificmemory events, such as the detection and recording of memory elementsfor activities associated with the identified activity, such as placesthat were visited during a trip, things a user liked during a trip,and/or adding recorded memory elements to a specific store or database.

Once the linking system 111 has created the memory action and linked thememory action to the activity, the linking system 111 sends thisinformation to the memory store 106. The memory store 106 stores thecreated memory action and the associated one or more activityboundaries. The memory store 106 may collect and store any enrichedmemory elements of the user. In some aspects, the enriched memoryelements or a portion of the enriched memory elements may be formed bythe contextual memory capture and recall system 100. The enriched memoryelements may include enriched context elements formed by the contextualmemory capture and recall system 100. In other aspects, the enrichedmemory elements or a portion of the enriched memory elements are formedby systems separate from the contextual memory capture and recall system100. The contextual memory capture and recall system 100 and/or with thepattern detection system 112 collect information from the memory store106.

The pattern detection framework 112 collects enriched memory elementsfrom the user. The enriched memory elements include user feedback. Thefeedback may be explicit or implicit. Explicit feedback from the user isfeedback input by the user. For example, explicit user feedback is whenthe user selects or provides input that indicates that a specific memoryinquiry or memory action was helpful or not helpful. In contrast,implicit feedback is determined by monitoring of user behavior inresponse to a provided memory action. For example, theselection/non-selection of presented memory information, the duration ofuse, and/or the pattern of use of provided memory actions may bemonitored to determine user feedback 148.

In some aspects, the pattern detection framework 112 may collect usersignals from one or more signal generators and enrich the user signalsto form enriched memory elements. In other aspects, the enriched memoryelements are collected from systems separate and distinct from thepattern detection framework 112. The enriched memory elements are formedby enriching elements in the user signals collected from signalgenerators with world knowledge 110. The user signals include all typesof user elements, such as user context elements.

The pattern detection framework 112 includes a mapping system 126 and arecommendation system 124. The mapping detection system 126 determines auser pattern by mapping user enriched memory elements to differentactivities. The recommendation engine 124 may utilize the determineduser pattern to recommend additional memory information for a memoryinquiry and/or to recommend an update of a learning algorithm.

In some aspects, the mapping system 126 of the pattern detectionframework analyzes the activity. The mapping system 126 analyzes theactivity by mapping the activity to enriched memory elements ofdifferent activities. The recommendation engine 124 identifies a relatedactivity based on the analysis of the activity. The recommendationengine 124 links or associates one or more boundaries of the relatedactivity to the memory action created for the activity. In some aspects,the related activities are future activities. The recommendation enginesends a recommendation to the activity state detection framework 108 tomonitor for the one or more boundaries of the related activity toprovide the memory action of the activity in response to a detection ofthe one or more boundaries of the related activity. In alternativeaspects, the recommendation engine sends a recommendation to theactivity state detection framework 108 to monitor for the one or moreboundaries of the related activity to provide a new memory inquiry forthe related activity that relates to the activity in response to adetection of the one or more boundaries of the related activity. The newmemory inquiry may request to record memory information for the relatedactivity and to associate this memory information with memoryinformation for the activity and/or the related activity. Alternatively,the new memory inquiry may request approval to display memoryinformation related to the activity in response to detection of aboundary for the related activity.

For example, the activity state detection framework 108 may detectboundaries for related activities that occur during a main activity of athree day trip to New York (as illustrated by the memory inquiry 132 cin FIG. 3C). In this example, in response to detecting a boundary for arelated activity (such as trip to the Metropolitan Art Museum), memoryinformation (such as pictures taken at the museum) is recorded for therelated activity and associated with the main activity (three day tripto New York) and/or the related activity. Alternatively in this example,in response to detecting a boundary for a related activity, a memoryinquiry is provided requesting permission to record memory informationfor the related activity and associate the memory information with therelated activity and/or the main activity (3 day trip to NY).

In response to receiving a recommendation from the recommendation engine124 of the pattern detection framework 112, the activity detectionframework 108 may monitor for and detect the one or more boundaries ofthe related activity based on the enriched context elements. If theactivity detection framework 108 does not detect the one or moreboundaries of the related activity, the activity detection framework 108continues to monitor for the one or more boundaries. If the activitydetection framework 108 detects the one or more boundaries of therelated activity, the activity detection framework 108 performs thememory action created in response to the activity again in response tothe detection of the one or more boundaries for the related activity.Alternatively, if the activity detection framework 108 detects the oneor more boundaries of the related activity, the activity detectionframework 108 presents a memory inquiry requesting permission to performthe memory action created in response to the main activity again inresponse to the detection of the one or more boundaries for the relatedactivity. If the memory action includes a display notification, theactivity framework 108, as discussed above, may send this notificationto the notification agent.

The pattern detection framework 112 collects or shares any determineduser pattern, user feedback, enriched memory elements, and/orrecommendation as additional user information to the memory store 106for storage. Further, the pattern detection framework 112 sends orshares any determined user pattern, user feedback, enriched memoryelements, and/or recommendation as additional user information to/withthe activity detection framework 108.

The activity detection framework 108 receives instructions to detect oneor more boundaries for the activity. The boundaries of the activity mayinclude before a start of the activity, a start time of the activity,occurrence of the activity, and/or a completion of the activity. Theactivity detection framework 108 detects one or more boundaries of theactivity based on analysis of the enriched context signals. If theactivity detection framework 108 does not detect a boundary of an actionthat is linked to a memory action, the activity state detectionframework 108 continues to monitor for the boundary of the activity. Ifthe activity detection framework 108 detects a boundary of an activitythat is linked to a memory action, the activity state detectionframework 108 performs the memory action linked to that activity. If thememory action requires sending a notification to the user, such as thedisplay of memory information, the activity state detection framework108 sends the notification to the notification agent 109. The display ofmemory information may also be referred to herein as a memory recall128.

As discussed above, the notification agent 109 determines a time periodthat is appropriate for providing a notification 130 to a user 102. Thenotification agent 109 provides or sends instructions to the clientcomputing device 104 to provide a notification 130 to the user 102. Inalternative aspects, a notification 140 required by a memory action isautomatically provided by the notification agent 109 to the clientcomputing device 104 upon receipt.

FIG. 3B illustrates an example of the user interface of FIG. 3Adisplaying, in response to a boundary detection of the first identifiedactivity, recalled memory input 128 for the first identified activity,in accordance with aspects of the disclosure. As discussed above, theidentified activity is a doctor's appointment. The boundary linked tothe doctor's appointment may be before a start of the activity, a starttime of the activity, and/or occurrence of the activity. The recalledmemory input 128 b includes memory information input by the user inresponse to the memory inquiry 132 a. The memory information input bythe user includes questions for the doctor for his or her doctorappointment. In some embodiments, memory information associated with amemory input recall 128 can be requested and/or edited by the user priorto the occurrence of a linked activity boundary for that memory inputrecall 128 upon a search for the activity by the user.

FIG. 4 illustrates a flow diagram conceptually illustrating an exampleof a method 400 for contextual memory capture and recall. In someaspects, method 400 is performed by the contextual memory capture andrecall system 100 as described above. Method 400 provides an applicationthat improves a user's ability to accomplish tasks, improves the recallof needed memory items, improves the usability, performance, and/or userinteractions of/with an application when compared to previously utilizedapplications that do not provide memory inquiries based on a detectedactivity, or link memory actions to the detected activity based on thereceipt of memory input in response to the memory inquiry. For example,method 400 may ask the user if memory information for later use isdesired even before the user realizes that storage of memory informationwould be beneficial.

Method 400 includes operation 402. At operation 402, user signals,including user context signals, are collected. The user signals arecollected from signal generators. In some aspects, the signal generatorsare at least one of client devices, servers, and/or applications. Theuser signals include memory elements and/or digital artifacts. Asutilized herein, digital artifacts are converted into element utilizingworld knowledge and/or other user information. In some aspects, thememory elements and/or digital artifacts in the user signals may includeuser feedback, GPS coordinates, photos, browser history, emails, textmessages, social data, notebooks, to-dos, calendar items, professionaldata, events, and/or application data. As utilized herein, digitalartifacts are data that the user would not recognize as a memory elementuntil it is further processed. For example, a digital artifact mayinclude GPS coordinates or computer encoded data. The user signals arecollected continuously, upon predetermined conditions, and/or after apredetermined amount of time at operation 402. As such, new or updateduser contexts, user patterns, user feedback, activities, etc. may bedetermined based on each newly received user signal during method 400.

The user context signals are indicative of the current state of the useror the user context. The user context is consistently changing and/orbeing updated as time passes, the environment changes, user locationchanges, user behavior changes and/or user physical actions change. Asdiscussed above, the current state of the user or the current usercontext is based on user context signals, such as the current locationof the user, the current time, current weather, the current digitalbehavior of the user, and/or current user physical actions of the user.

Next, method 400 includes operation 404. At operation 404, memoryelements, including user context elements, are enriched with the worldknowledge to form enriched elements. In some aspects, at operation 404,digital artifacts in the user signals are converted into memoryelements, such as context elements utilizing world knowledge and/orother user information. These memory elements may also be enriched atoperation 404 utilizing world knowledge and/or other user information toform the enriched elements.

In some aspects, method 400 includes operation 406. At operation 406 theenriched memory elements are analyzed to determine user patterns and/oruser feedback. In some aspects, operation 406 updates or trains themachine learning techniques and/or statistical modeling techniques of alearning algorithm based on the determined user feedback and/or userpatterns. In additional aspects, the user feedback and/or the userpatterns are added to the enriched memory elements.

It is understood by a person of skill in the art, that operations 402,404, and/or 406 may be continuously performed by method 400. Further, itis understood by a person of skill in the art that the performance ofoperations 402, 404, and/or 406 may overlap with the performance ofother operations of method 400. For example, method 400 may continue tocollect and enrich user signals at operations 402 and 404 during thecreation of a memory inquiry at operation 410.

After operation 404 and/or 406, operation 407 is performed during method400. At operation 407, an activity of the user is identified based onthe enriched context elements, world knowledge, and/or other userinformation. In some aspects, at operation 407, a related activity to amain activity is identified utilizing enriched context elements, worldknowledge, and/or other user information. A main activity as utilizedherein refers to an activity previously identified at operation 407. Therelated activity as utilized herein refers to any activity that isassociated with or linked to a main activity. The activity and/or therelated activity may be a future or current activity. The activity asutilized herein refers to any event, place, and/or occasion related tothe user. For example, the activity may include a relative's birthday, afuture doctor's appointment, being on vacation, arriving at a workmeeting, etc. The activity is identified by analyzing the enrichedcontext element, world knowledge, and/or other user information in viewa set of context rules. In some aspects the context rules are updatedutilizing a learning algorithm.

After operation 407, operation 408 is performed during method 400. Atoperation 408, the activity identified by operation 407 is evaluated todetermine if a memory inquiry is desirable and/or appropriate. In someaspects, the activity is evaluated in view of a set of inquiry rules atoperation 408. In some aspects, the inquiry rules are updated utilizinga learning algorithm. In these aspects, if the activity meets one ormore inquiry rules, a memory inquiry is desirable or appropriate for adetected activity. In these aspects, if the activity does not meet oneor more inquiry rules, a memory inquiry is not desirable or appropriatefor a detected activity. If a determination is made at operation 408that a memory inquiry is desirable or appropriate, operation 410 isperformed. If a determination is made at operation 408 that a memoryinquiry is not desirable or is not appropriate, operation 410 is notperformed and method 400 may continue to perform operation 402.

Next, operation 410 is performed. At operation 410, a memory inquiry iscreated or formed based on the activity in response to a determinationthat the memory inquiry is desirable for the activity at operation 408.The memory inquiry is created by analyzing the activity, worldknowledge, and/or other user information utilizing a set of creationrules. In some aspects, the creation rules are updated utilizing alearning algorithm. The memory inquiry created at operation 410 includesthe identified activity and a request to perform one or more memoryactions that relate to the identified activity. The memory action mayinclude a request to collect memory information related to the activityfrom the user and/or from world knowledge and/or other user information.In further aspects, the memory inquiry includes recommended memoryinformation that relate to the identified activity. The recommendedmemory information may be identified based on world knowledge, enricheduser context elements, and/or other user information. In these aspects,the memory action may include a request to provide the recommendedmemory elements listed in the memory inquiry in a memory recall for theactivity. In other aspects, the memory action is a request to identifyand store one or more memory element for the activity for a memoryrecall for the activity. In further aspects, the memory action is arequest to identify and store one or more memory elements for relatedactivities for a memory recall for the main activity.

In some aspects, method 400 includes operation 412. At operation 412 adetermination is made as to whether a current time period is appropriateto provide the memory inquiry. In these aspects, the enriched usercontext elements are evaluated to determine if the current time periodis appropriate for providing the memory inquiry at operation 412. Theenriched user context elements may be evaluated utilizing notificationrules. In some aspects, the notification rules are updated utilizing alearning algorithm. In these aspects, if the enriched context elementsmeet one or more of the notification rules, the current time period isdetermined to be appropriate for providing the memory inquiry andoperation 413 is performed. In these aspects, if the enriched contextelements do not meet one or more of the notification rules, the currenttime period is determined to not be appropriate for providing the memoryinquiry the received enriched user context elements are evaluated untilan appropriate time period is determined or until the memory inquiry isno longer appropriate or desirable at operation 412.

After operation 410 and/or 412 is performed, operation 413 is performedduring method 400. At operation 413 the memory inquiry is provided tothe user or instructions are sent to one or more client computingdevices to provide the memory inquiry to the user.

Next, at operation 414, memory input from the at least one clientcomputing device is collected in response to the memory inquiry. Thememory input is input by the user into the user interface of the clientcomputing device. The memory input includes an acceptance or a rejectionof the proposed memory action included in the memory inquiry. The memoryinput also includes any memory information for the activity input by theuser via the user interface of client device in response to the memoryinquiry. In some aspects, entry of memory information by the user inresponse to a memory inquiry is considered an acceptance of the memoryaction in the memory inquiry.

In some aspects, method 400 includes operations 416 and 417. Atoperation 416 the memory action and/or any received memory informationthe user is evaluated in view of world knowledge and/or other userinformation utilizing a learning algorithm to determine any supplementalmemory information should be added to memory information utilizing bythe memory action. If supplemental memory information is detected atoperation 416, operation 417 is performed. If supplemental memoryinformation is not detected at operation 416, operation 418 isperformed.

At operation 417, the identified supplement memory information that isassociated with the activity is added and stored with any memoryinformation already associated with memory action.

Next, operation 418 is performed. At operation 418, the memory action islinked to the activity in response to receiving an acceptance of thememory action in the memory input and/or in response to the creation ofthe memory inquiry. In other words, the memory action is associated withactivity. In some aspects, the memory action is linked to the activityby linking the memory action to one or more boundaries of the activity.For example, the memory action of a memory recall of memory informationmay be linked the activity, such that the memory information can befound by searching for the activity or presented upon detection of oneor more boundaries of the activity.

At operation 420, an activity boundary linked to the activity isdetected based on the enriched context signals. As discussed above, anactivity boundary may be before a start of the activity, a start time ofthe activity, occurrence of the activity, and/or a completion of theactivity. The activity boundary may be determined by evaluating theenriched context elements utilizing a learning algorithm at operation420. If one or more boundaries associated with activity are detected atoperation 420, then operation 422 is performed. If one or moreboundaries associated with the activity are not detected at operation420, then operation 420 continues to monitor newly received enrichedcontext signals for the one or more boundaries.

In some aspect, method 400 includes operation 422. At operation 422 adetermination is made as to whether a current time period is appropriateto provide the memory action. In these aspects, the enriched usercontext elements are evaluated to determine if the current time periodis appropriate for providing the memory action at operation 422. Theenriched user context elements may be evaluated utilizing notificationrules. In some aspects, the notification rules are updated utilizing alearning algorithm. In these aspects, if the enriched context elementsmeet one or more of the notification rules, the current time period isdetermined to be appropriate for performing the memory action andoperation 424 is performed. In these aspects, if the enriched contextelements do not meet one or more of the notification rules, the currenttime period is determined to not be appropriate for performing thememory action and operation 422 continues to monitor received enricheduser context elements until an appropriate time period is determined oruntil the memory action is no longer appropriate or desirable.

After operation 420 and/or 422 is performed, operation 424 is performedduring method 400. At operation 424 the memory action is performed orinstructions are sent to one or more client computing devices to performthe memory action.

In some aspects, method 400 includes operation 426. At operation 426,user feedback is requested and/or determined for the performed memoryaction. As discussed above, the user feedback may be implicit orexplicit. Any determined user feedback at operation 426 is provided tooperation 402 as a user signal.

FIGS. 5-8 and the associated descriptions provide a discussion of avariety of operating environments in which aspects of the disclosure maybe practiced. However, the devices and systems illustrated and discussedwith respect to FIGS. 5-8 are for purposes of example and illustrationand are not limiting of a vast number of computing device configurationsthat may be utilized for practicing aspects of the disclosure, describedherein.

FIG. 5 is a block diagram illustrating physical components (e.g.,hardware) of a computing device 500 with which aspects of the disclosuremay be practiced. For example, the contextual memory capture and recallsystem 100 could be implemented by the computing device 500. In someaspects, the computing device 500 is a mobile telephone, a smart phone,a tablet, a phablet, a smart watch, a wearable computer, a personalcomputer, a desktop computer, a gaming system, a laptop computer, and/oretc. The computing device components described below may includecomputer executable instructions for the contextual memory capture andrecall system 100 that can be executed to employ method 400 to buildand/or use AI that models the human brain as disclosed herein.

In a basic configuration, the computing device 500 may include at leastone processing unit 502 and a system memory 504. Depending on theconfiguration and type of computing device, the system memory 504 maycomprise, but is not limited to, volatile storage (e.g., random accessmemory), non-volatile storage (e.g., read-only memory), flash memory, orany combined of such memories. The system memory 504 may include anoperating system 505 and one or more program modules 506 suitable forrunning software applications 520. The operating system 505, forexample, may be suitable for controlling the operation of the computingdevice 500. Furthermore, aspects of the disclosure may be practiced inconjunction with a graphics library, other operating systems, or anyother application program and is not limited to any particularapplication or system. This basic configuration is illustrated in FIG. 7by those components within a dashed line 508. The computing device 500may have additional features or functionality. For example, thecomputing device 500 may also include additional data storage devices(removable and/or non-removable) such as, for example, magnetic disks,optical disks, or tape. Such additional storage is illustrated in FIG. 5by a removable storage device 509 and a non-removable storage device510.

As stated above, a number of program modules and data files may bestored in the system memory 504. While executing on the processing unit502, the program modules 506 (e.g., the contextual memory capture andrecall system 100) may perform processes including, but not limited to,performing method 400 as described herein. For example, the processingunit 502 may implement the contextual memory capture and recall system100. Other program modules that may be used in accordance with aspectsof the present disclosure, and in particular to generate screen content,may include a digital assistant application, a voice recognitionapplication, an email application, a social networking application, acollaboration application, an enterprise management application, amessaging application, a word processing application, a spreadsheetapplication, a database application, a presentation application, acontacts application, a gaming application, an e-commerce application,an e-business application, a transactional application, exchangeapplication, a device control application, a web interface application,a calendaring application, etc. In some aspect, the contextual memorycapture and recall system 100 builds a user centric memory graph for oneor more of the above referenced applications.

Furthermore, aspects of the disclosure may be practiced in an electricalcircuit comprising discrete electronic elements, packaged or integratedelectronic chips containing logic gates, a circuit utilizing amicroprocessor, or on a single chip containing electronic elements ormicroprocessors. For example, aspects of the disclosure may be practicedvia a system-on-a-chip (SOC) where each or many of the componentsillustrated in FIG. 5 may be integrated onto a single integratedcircuit. Such an SOC device may include one or more processing units,graphics units, communications units, system virtualization units andvarious application functionality all of which are integrated (or“burned”) onto the chip substrate as a single integrated circuit. Whenoperating via an SOC, the functionality, described herein, with respectto the capability of client to switch protocols may be operated viaapplication-specific logic integrated with other components of thecomputing device 500 on the single integrated circuit (chip).

Aspects of the disclosure may also be practiced using other technologiescapable of performing logical operations such as, for example, AND, OR,and NOT, including but not limited to mechanical, optical, fluidic, andquantum technologies. In addition, aspects of the disclosure may bepracticed within a general purpose computer or in any other circuits orsystems.

The computing device 500 may also have one or more input device(s) 512such as a keyboard, a mouse, a pen, a microphone or other sound or voiceinput device, a touch or swipe input device, etc. The output device(s)514 such as a display, speakers, a printer, etc. may also be included.The aforementioned devices are examples and others may be used. Thecomputing device 500 may include one or more communication connections516 allowing communications with other computing devices 550. Examplesof suitable communication connections 516 include, but are not limitedto, RF transmitter, receiver, and/or transceiver circuitry, universalserial bus (USB), parallel, and/or serial ports.

The term computer readable media or storage media as used herein mayinclude computer storage media. Computer storage media may includevolatile and nonvolatile, removable and non-removable media implementedin any method or technology for storage of information, such as computerreadable instructions, data structures, or program modules. The systemmemory 504, the removable storage device 509, and the non-removablestorage device 510 are all computer storage media examples (e.g., memorystorage). Computer storage media may include RAM, ROM, electricallyerasable read-only memory (EEPROM), flash memory or other memorytechnology, CD-ROM, digital versatile disks (DVD) or other opticalstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, or any other article of manufacturewhich can be used to store information and which can be accessed by thecomputing device 500. Any such computer storage media may be part of thecomputing device 500. Computer storage media does not include a carrierwave or other propagated or modulated data signal.

Communication media may be embodied by computer readable instructions,data structures, program modules, or other data in a modulated datasignal, such as a carrier wave or other transport mechanism, andincludes any information delivery media. The term “modulated datasignal” may describe a signal that has one or more characteristics setor changed in such a manner as to encode information in the signal. Byway of example, and not limitation, communication media may includewired media such as a wired network or direct-wired connection, andwireless media such as acoustic, radio frequency (RF), infrared, andother wireless media.

FIGS. 6A and 6B illustrate a mobile computing device 600, for example, amobile telephone, a smart phone, a tablet, a phablet, a smart watch, awearable computer, a personal computer, a desktop computer, a gamingsystem, a laptop computer, or the like, with which aspects of thedisclosure may be practiced. With reference to FIG. 6A, one aspect of amobile computing device 600 suitable for implementing the aspects isillustrated. In a basic configuration, the mobile computing device 600is a handheld computer having both input elements and output elements.The mobile computing device 600 typically includes a display 605 and oneor more input buttons 610 that allow the user to enter information intothe mobile computing device 600. The display 605 of the mobile computingdevice 600 may also function as an input device (e.g., a touch screendisplay).

If included, an optional side input element 615 allows further userinput. The side input element 615 may be a rotary switch, a button, orany other type of manual input element. In alternative aspects, mobilecomputing device 600 may incorporate more or less input elements. Forexample, the display 605 may not be a touch screen in some aspects. Inyet another alternative aspect, the mobile computing device 600 is aportable phone system, such as a cellular phone. The mobile computingdevice 600 may also include an optional keypad 635. Optional keypad 635may be a physical keypad or a “soft” keypad generated on the touchscreen display.

In addition to, or in place of a touch screen input device associatedwith the display 605 and/or the keypad 635, a Natural User Interface(NUI) may be incorporated in the mobile computing device 600. As usedherein, a NUI includes as any interface technology that enables a userto interact with a device in a “natural” manner, free from artificialconstraints imposed by input devices such as mice, keyboards, remotecontrols, and the like. Examples of NUI methods include those relying onspeech recognition, touch and stylus recognition, gesture recognitionboth on screen and adjacent to the screen, air gestures, head and eyetracking, voice and speech, vision, touch, gestures, and machineintelligence.

In various aspects, the output elements include the display 605 forshowing a graphical user interface (GUI). In aspects disclosed herein,the various user information collections could be displayed on thedisplay 605. Further output elements may include a visual indicator 620(e.g., a light emitting diode), and/or an audio transducer 625 (e.g., aspeaker). In some aspects, the mobile computing device 600 incorporatesa vibration transducer for providing the user with tactile feedback. Inyet another aspect, the mobile computing device 600 incorporates inputand/or output ports, such as an audio input (e.g., a microphone jack),an audio output (e.g., a headphone jack), and a video output (e.g., aHDMI port) for sending signals to or receiving signals from an externaldevice.

FIG. 6B is a block diagram illustrating the architecture of one aspectof a mobile computing device. That is, the mobile computing device 600can incorporate a system (e.g., an architecture) 602 to implement someaspects. In one aspect, the system 602 is implemented as a “smart phone”capable of running one or more applications (e.g., browser, e-mail,calendaring, contact managers, messaging clients, games, and mediaclients/players). In some aspects, the system 602 is integrated as acomputing device, such as an integrated personal digital assistant (PDA)and wireless phone.

One or more application programs 666, the contextual memory capture andrecall system 100 runs on or in association with the operating system664. Examples of the application programs include phone dialer programs,e-mail programs, personal information management (PIM) programs, wordprocessing programs, spreadsheet programs, Internet browser programs,messaging programs, and so forth. The system 602 also includes anon-volatile storage area 668 within the memory 662. The non-volatilestorage area 668 may be used to store persistent information that shouldnot be lost if the system 602 is powered down. The application programs666 may use and store information in the non-volatile storage area 668,such as e-mail or other messages used by an e-mail application, and thelike. A synchronization application (not shown) also resides on thesystem 602 and is programmed to interact with a correspondingsynchronization application resident on a host computer to keep theinformation stored in the non-volatile storage area 668 synchronizedwith corresponding information stored at the host computer. As should beappreciated, other applications may be loaded into the memory 662 andrun on the mobile computing device 600.

The system 602 has a power supply 670, which may be implemented as oneor more batteries. The power supply 670 might further include anexternal power source, such as an AC adapter or a powered docking cradlethat supplements or recharges the batteries.

The system 602 may also include a radio 672 that performs the functionof transmitting and receiving radio frequency communications. The radio672 facilitates wireless connectivity between the system 602 and the“outside world,” via a communications carrier or service provider.Transmissions to and from the radio 672 are conducted under control ofthe operating system 664. In other words, communications received by theradio 672 may be disseminated to the application programs 666 via theoperating system 664, and vice versa.

The visual indicator 620 may be used to provide visual notifications,and/or an audio interface 674 may be used for producing audiblenotifications via the audio transducer 625. In the illustrated aspect,the visual indicator 620 is a light emitting diode (LED) and the audiotransducer 625 is a speaker. These devices may be directly coupled tothe power supply 670 so that when activated, they remain on for aduration dictated by the notification mechanism even though theprocessor 660 and other components might shut down for conservingbattery power. The LED may be programmed to remain on indefinitely untilthe user takes action to indicate the powered-on status of the device.The audio interface 674 is used to provide audible signals to andreceive audible signals from the user. For example, in addition to beingcoupled to the audio transducer 625, the audio interface 674 may also becoupled to a microphone to receive audible input. The system 602 mayfurther include a video interface 676 that enables an operation of anon-board camera 630 to record still images, video stream, and the like.

A mobile computing device 600 implementing the system 602 may haveadditional features or functionality. For example, the mobile computingdevice 600 may also include additional data storage devices (removableand/or non-removable) such as, magnetic disks, optical disks, or tape.Such additional storage is illustrated in FIG. 6B by the non-volatilestorage area 668.

Data/information generated or captured by the mobile computing device600 and stored via the system 602 may be stored locally on the mobilecomputing device 600, as described above, or the data may be stored onany number of storage media that may be accessed by the device via theradio 672 or via a wired connection between the mobile computing device600 and a separate computing device associated with the mobile computingdevice 600, for example, a server computer in a distributed computingnetwork, such as the Internet. As should be appreciated suchdata/information may be accessed via the mobile computing device 600 viathe radio 672 or via a distributed computing network. Similarly, suchdata/information may be readily transferred between computing devicesfor storage and use according to well-known data/information transferand storage means, including electronic mail and collaborativedata/information sharing systems.

FIG. 7 illustrates one aspect of the architecture of a system forprocessing data received at a computing system from a remote source,such as a general computing device 704, tablet 706, or mobile device708, as described above. Content displayed and/or utilized at serverdevice 702 may be stored in different communication channels or otherstorage types. For example, various documents may be stored using adirectory service 722, a web portal 724, a mailbox service 726, aninstant messaging store 728, and/or a social networking site 730. By wayof example, the contextual memory capture and recall system 100 may beimplemented in a general computing device 704, a tablet computing device706 and/or a mobile computing device 708 (e.g., a smart phone). In someaspects, the server 702 is configured to implement a contextual memorycapture and recall system 100, via the network 715 as illustrated inFIG. 7.

FIG. 8 illustrates an exemplary tablet computing device 800 that mayexecute one or more aspects disclosed herein. In addition, the aspectsand functionalities described herein may operate over distributedsystems (e.g., cloud-based computing systems), where applicationfunctionality, memory, data storage and retrieval and various processingfunctions may be operated remotely from each other over a distributedcomputing network, such as the Internet or an intranet. User interfacesand information of various types may be displayed via on-board computingdevice displays or via remote display units associated with one or morecomputing devices. For example user interfaces and information ofvarious types may be displayed and interacted with on a wall surfaceonto which user interfaces and information of various types areprojected. Interaction with the multitude of computing systems withwhich aspects of the invention may be practiced include, keystrokeentry, touch screen entry, voice or other audio entry, gesture entrywhere an associated computing device is equipped with detection (e.g.,camera) functionality for capturing and interpreting user gestures forcontrolling the functionality of the computing device, and the like.

Embodiments of the present disclosure, for example, are described abovewith reference to block diagrams and/or operational illustrations ofmethods, systems, and computer program products according to aspects ofthe disclosure. The functions/acts noted in the blocks may occur out ofthe order as shown in any flowchart. For example, two blocks shown insuccession may in fact be executed substantially concurrently or theblocks may sometimes be executed in the reverse order, depending uponthe functionality/acts involved.

This disclosure described some embodiments of the present technologywith reference to the accompanying drawings, in which only some of thepossible aspects were described. Other aspects can, however, be embodiedin many different forms and the specific aspects disclosed herein shouldnot be construed as limited to the various aspects of the disclosure setforth herein. Rather, these exemplary aspects were provided so that thisdisclosure was thorough and complete and fully conveyed the scope of theother possible aspects to those skilled in the art. For example, aspectsof the various aspects disclosed herein may be modified and/or combinedwithout departing from the scope of this disclosure.

Although specific aspects were described herein, the scope of thetechnology is not limited to those specific aspects. One skilled in theart will recognize other aspects or improvements that are within thescope and spirit of the present technology. Therefore, the specificstructure, acts, or media are disclosed only as illustrative aspects.The scope of the technology is defined by the following claims and anyequivalents therein.

The invention claimed is:
 1. A system for contextual memory capture andrecall, the system comprising: at least one processor; and a memory forstoring and encoding computer executable instructions that, whenexecuted by the at least one processor is operative to: collect usercontext signals from a client computing device of a user; enrich usercontext elements from the user context signals with world knowledge toform enriched context elements; identify an activity of the user basedon the enriched context elements, wherein the activity is a futureactivity; evaluate the activity based on inquiry rules; determine that amemory inquiry for the activity is desirable based on the evaluation ofthe activity, the memory inquiry including a proposed memory action;create the memory inquiry based on the activity and creation rules;evaluate the enriched context elements based on notification rules inresponse to the determination that the memory inquiry is desirable;collect memory input from the client computing device in response to thememory inquiry, wherein the memory input includes memory information andan acceptance or rejection by the user of the proposed memory action;create a memory action based on the memory input, wherein the memoryaction includes a recall of the memory information, and wherein thememory action is created in response to acceptance of the proposedmemory action; link the memory action with a first boundary of theactivity, wherein the first boundary relates to occurrence of theactivity by the user; detect the first boundary based on the enrichedcontext elements; and in response to detection of the first boundary,send the memory action to the client computing device of the user,wherein the memory action includes the recall of the memory information.2. The system of claim 1, the at least one processor is furtheroperative to: determine a user pattern based on user signals; and updatethe inquiry rules based on the user pattern utilizing a learningalgorithm.
 3. The system of claim 1, the at least one processor isfurther operative to: receive additional user information from a userpattern detection framework, wherein the additional user information isat least one of a user pattern or user feedback; and update the inquiryrules based on the additional user information utilizing a learningalgorithm.
 4. The system of claim 1, the at least one processor isfurther operative to: analyze user signals to determine user feedback;and update the inquiry rules based on the user feedback utilizing alearning algorithm.
 5. The system of claim 1, the at least one processoris further operative to: receive user feedback and a user pattern from auser pattern detection framework; and update the inquiry rules based onthe user feedback and the user pattern utilizing a learning algorithm.6. The system of claim 1, the at least one processor is furtheroperative to: update the inquiry rules, creation rules, and thenotification rules based on at least one of a user pattern and userfeedback utilizing a learning algorithm.
 7. The system of claim 1,wherein the first boundary is before a start of the activity.
 8. Thesystem of claim 1, the at least one processor is further operative to:analyze the memory input; collect additional memory information from theworld knowledge based on the analysis of the memory input; link theadditional memory information with the first boundary of the activity;and in response to the detection of the first boundary, send the memoryaction to the client computing device, wherein the memory action furtherincludes a recall of the additional memory information.
 9. The system ofclaim 1, the at least one processor is further operative to: analyze theactivity; identify a related activity based on the analysis of theactivity; link the memory action to a second boundary of the relatedactivity; detect the second boundary for the related activity based onthe enriched context elements; in response to a detection of the secondboundary, send the memory action to the client computing device, whereinthe memory action includes the recall of the memory information.
 10. Thesystem of claim 1, the at least one processor is further operative to:determine an appropriate time period for providing the memory inquirybased on the evaluation of the enriched context elements; and send thememory inquiry to the client computing device of the user during theappropriate time period.
 11. A method for contextual memory capture andrecall, the method comprising: collecting context signals from at leastone client computing device of a user; enriching context elements fromthe context signals with world knowledge to form enriched contextelements; identifying an activity of the user based on the enrichedcontext elements; determining that a memory inquiry for the activity isdesirable based on an evaluation of the activity, the memory inquiryincluding a proposed memory action; providing the memory inquiry to theuser; collecting memory input from the user in response to the memoryinquiry, wherein the memory input includes memory information and anacceptance or rejection by the user of the proposed memory action;creating a memory action in response to acceptance of the proposedmemory action and based on the collection of the memory input, whereinthe memory action includes a recall of the memory information; linkingthe memory input with at least one boundary of the activity, wherein theat least one boundary relates to occurrence of the activity; and inresponse to detection of the at least one boundary, sending the memoryaction to the user, wherein the memory action includes the recall of thememory information.
 12. The method of claim 11, further comprising:detecting a first boundary for the activity based on the enrichedcontext elements; and in response to detection of the first boundary,perform the memory action.
 13. The method of claim 12, wherein thememory inquiry further comprises the activity and a request for memoryinformation related to the activity.
 14. The method of claim 13, whereinthe memory input comprises the memory information related to theactivity.
 15. The method of claim 12, further comprising: identifyingadditional memory information related to the activity based on ananalysis of the activity utilizing world knowledge and additional userinformation, wherein the memory inquiry includes the activity, theadditional memory information related to the activity, and a request forapproval for using the additional memory information in a memory recallrelated to the activity.
 16. The method of claim 15, wherein the memoryinput comprises the approval to create the memory recall for theactivity.
 17. The method of claim 15, wherein the memory inquiry furtherincludes a request for memory information related to the activity, andwherein the memory input further comprises the memory informationrelated to the activity from the user.
 18. A system for contextualmemory capture and recall, the system comprising: at least oneprocessor; and a memory for storing and encoding computer executableinstructions that, when executed by the at least one processor isoperative to: collect context signals from at least one client computingdevice of a user; enrich the context signals with world knowledge toform enriched context elements; identify an activity of the user basedon the enriched context elements; determine that a memory inquiry forthe activity is desirable based on an evaluation of the activity, thememory inquiry including a proposed memory action; provide the memoryinquiry to the at least one client computing device; collect memoryinput from the at least one client computing device in response to thememory inquiry, wherein the memory input includes memory information andan acceptance or rejection of the proposed memory action; create,responsive to acceptance of the proposed memory action, a memory actionbased on the memory input; link a memory action with a boundary of theactivity in response to the memory input, wherein the boundary relatesto occurrence of the activity; and send, responsive to detection of theboundary, the memory action to the at least one client computing device,wherein the memory action includes the recall of the memory information.19. The system of claim 18, is further operative to: detect the boundarybased on the enriched context elements; in response to detection of theboundary, send instructions to the at least one client computing deviceto perform the memory action.
 20. The system of claim 19, furthercomprising: identify a related activity to the activity based onadditional user information, where the related activity is a futureactivity; link the memory action to a second boundary of the relatedactivity; detect the second boundary; in response to a detection of thesecond boundary, perform the memory action.