US20090228583A1 - Checking electronic messages for compliance with user intent - Google Patents
Checking electronic messages for compliance with user intent Download PDFInfo
- Publication number
- US20090228583A1 US20090228583A1 US12/044,892 US4489208A US2009228583A1 US 20090228583 A1 US20090228583 A1 US 20090228583A1 US 4489208 A US4489208 A US 4489208A US 2009228583 A1 US2009228583 A1 US 2009228583A1
- Authority
- US
- United States
- Prior art keywords
- user
- electronic communication
- message
- present
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/23—Reliability checks, e.g. acknowledgments or fault reporting
Definitions
- the invention relates in general to electronic communications and more specifically to a system for checking and/or revising electronic messages by using data about a user's intent.
- Electronic mail (email), text messages, chat messages, web logs (blogs), newsgroup postings, etc. are each examples of types of electronic communications, or messages.
- messages are often important, or even critical, to a sender's profession, education, relationship, happiness or other aspect of life, there is a tendency for senders to draft and send a message quickly. This haste may result in errors, omissions, inclusion of inappropriate or sub-optimal comments or statements, or other unwanted effects.
- email systems allow different options such as whether to reply to an original message using only the original message's sender, replying to everyone on the carbon copy (CC) list, using local or global distribution lists, placing some recipients in a blind carbon copy (BCC) list, forwarding the message; adding, deleting or editing names, content and attachments prior to sending, changing the order of name listing, sending to multiple email addresses or aliases for a same person, etc.
- CC carbon copy
- BCC blind carbon copy
- a sender may fail to consider all the necessary options or characteristics, or may make a mistake in handling a message characteristic, thereby sending an electronic communication that does not achieve an intended result.
- a preferred embodiment of the invention uses “intention data” to determine an intent of a sender of a message or other user in an electronic communication system. For example, a message to be sent can be compared to the sender's intention data which indicates the sender's probable intent. If a discrepancy is detected between the sender's determined intent and a part of the actual message then an action is taken.
- An action can include providing an alert to the sender or to another person, process or device.
- An action can also require that the sender confirm the message's content or characteristics, edit the message or the message's transmission parameters, further check the message against other external information, log an event, etc.
- Intention data can be acquired by a monitoring process executing within or in association with a part of an electronic communication system.
- a preferred embodiment uses “usage information” to derive a user's intent.
- the usage information can include past or current activity of the user, such as an identified pattern of use of the communication system by a sender with respect to one or more recipients.
- usage patterns can include frequency of correspondence, type of message content usually sent to a recipient, detecting common groups of recipients, etc.
- Intention data can also be obtained from non-pattern information such as by an analysis of one or a few email messages. For example, a degree of formality, friendliness or other relationship attributes may be determined from one message which does not necessarily depend on a pattern.
- a value for a relationship attribute can be used to analyze and react to subsequent messages.
- Intention data can also be obtained directly from a user or other person as, for example, in response to a question or prompt, or by monitoring a person's behavior. Intention data may also be obtained or derived from other non-human sources such as databases, records, files, other devices or processes (e.g., phone calls, global positioning system (GPS) determination of location, web page browsing, etc.), or other sources.
- non-human sources such as databases, records, files, other devices or processes (e.g., phone calls, global positioning system (GPS) determination of location, web page browsing, etc.
- intention data is obtained it is used by an analysis process to compare against a message to be sent. If a discrepancy is detected it is determined that the message to be sent (or received, transferred or otherwise processed) may not comport with a user's intent.
- a control process is invoked that takes an action such as generating an alert, suggesting a change, automatically making a change to the message or the way the message is handled, logging the event, etc.
- the invention provides a method for processing an electronic communication, the method comprising: obtaining intention data, wherein the intention data indicates an intent of a user with respect to the user's electronic communications; accepting a signal from an input device to define content for a present electronic communication; determining that the present electronic communication is associated with the user; detecting a deficiency by analyzing at least a portion of the present electronic communication and the intention data; and performing an act to correct the deficiency.
- FIG. 1 illustrates basic components in an electronic communications system suitable for use with the invention
- FIG. 2A shows a first example email message
- FIG. 2B shows a second email message in an example thread
- FIG. 2C shows a third email message in an example thread
- FIG. 2D shows a fourth email message in an example thread
- FIG. 3 illustrates basic components and steps of a messaging system.
- FIG. 1 illustrates basic components in an electronic communications system suitable for use with the invention. Note that although features may be discussed with respect to specific components or systems that the features can be adapted to any one or more suitable systems, devices, processes, components, networks or other combinations of hardware and/or software.
- users such as 1 , 2 , 3 , 4 and 5 operate devices for electronic communications.
- User 1 operates portable email device 10
- User 2 operates desktop computer 20
- User 3 operates cell phone 30
- User 4 operates laptop 40
- User 5 operates desktop computer 51 connected to local server 53 and other devices (not shown) via a local area network (LAN) 55 .
- LAN local area network
- any number and type of devices with different suitable network topologies and interconnections can be adapted for use with embodiments of the invention.
- features of the invention may be described with respect to a specific user associated with a specific device, other types of associations of human users with devices or processes can be used, as desired, in order to achieve the functional effects described herein.
- Multiple users can be associated with a device or devices and multiple devices can be associated with a user or users.
- communications need not involve a human sender, intermediary and/or receiver as these roles might be performed automatically as where an email system sends automatically generated messages to humans or devices.
- the devices communicate with each other and with server 60 via a digital network such as Internet 50 .
- a digital network such as Internet 50 .
- Such communication can be by any physical link, protocol, data format or other convention, as desired.
- wired connections such as shown for servers 60 and 53 , and for desktop computer 20 may be employed.
- wireless connections such as shown for portable email device 10 , cell phone 30 or laptop 40 may be used.
- Internet 50 allows for dynamic and varied communications between devices and processes such as switches, routers, repeaters, servers, etc. These are shown symbolically as components 52 , 54 and 56 .
- LAN 55 can be used to connect different devices at a locally controlled or maintained network such as a corporate or campus LAN, home network, etc.
- an email system may be organized as a point-of-presence (POP3) or Internet Message Access Protocol (IMAP) system with a local or remote email server.
- the email system can support message formats and protocols such as Multipurpose Internet Mail Extensions (MIME), Simple Mail Transfer Protocol (SMTP), etc.
- MIME Multipurpose Internet Mail Extensions
- SMTP Simple Mail Transfer Protocol
- a text messaging system can use cell phone or wireless data connections to handheld devices that comply with standards such as Global System for Mobile Communications (GSM) and include Short Message Service (SMS), Multimedia Messaging Service (MMS), etc.
- GSM Global System for Mobile Communications
- SMS Short Message Service
- MMS Multimedia Messaging Service
- Other custom or proprietary systems can be used such as J-Phone's SkyMailTM and NTT Docomo's Short MailTM, etc.
- any type of electronic communication system for delivery of information intended for at least one human recipient can be used with features of the present invention, including future-developed systems, standards and protocols.
- functions or features described herein can be performed by any number, type and combination of hardware and software components. Functions can be performed at the same or different places in time or space by one or more components. In some implementations, components may be omitted or called by a different name from those shown in the examples. Further, various aspects of the invention can apply regardless of the organization of components or resources into different managed or controlled groups, such as Internet access provided by a company, a server operated by a third party, etc.
- a typical method of sending an electronic communication such as an email message could involve User 1 creating message content and sending the content included in an initial email message.
- the message could be transferred first to server 60 for further processing such as to resolve recipient network addresses, determine destination servers, etc.
- message delivery need not use a server as some types of communication may be peer-to-peer or can use a device other than a server.
- the user of terms designating items such as “client,” “server,” “sender,” “recipient,” “initial message,” “reply message,” etc. should not be construed as limiting the invention. Rather they are used to provide an example. It should be apparent that such terms may be interchanged and the resulting system or method will remain within the scope of the invention. Items may also be omitted.
- a sender may send an initial message to a hardware device or software process such as to send a database query, purchase order, blog posting, turn on a light, etc.
- the monitor process provides the characteristic data to an analysis process to derive intent data—i.e., data that indicates intent of a sender, recipient or other participant (“users”) of the messages.
- intent data i.e., data that indicates intent of a sender, recipient or other participant (“users”) of the messages.
- intent data i.e., data that indicates intent of a sender, recipient or other participant (“users”) of the messages.
- One way of using the compiled message characteristic data to identify user intent is to analyze prior patterns of use.
- Another way to establish user intent is by querying users, analyzing the way user's or automated processes react to a particular user, and by other methods, described in more detail, below.
- Once user intent data is obtained then a particular user's electronic messages can be compared to the intent data by a control process. When a discrepancy is determined then the control process can initiate an action such as alerting a user, delaying transmission, automatically correcting or changing a characteristic of the communication, etc.
- FIG. 3 illustrates basic components and steps of a messaging system in a preferred embodiment of the invention, as described, above.
- participants 202 include multiple users of the messaging system. Portions of the participants' messages and activity are recorded by monitor process 220 . Monitor process uses observations about the messages and activity to generate intention data 222 . Such data can be any information that is useful to determine a user's intent with respect to a communication.
- each user's email traffic can be recorded to include header information (sender, receiver, other recipients, date and time sent or received, subject, etc.) and content, if desired.
- Statistics, summary data or other data of communications with another user, device, process, group of users, organization, or other entity can be maintained. Such data can include the frequency of corresponding with another user, the time intervals between responses, the amount of time spent composing or reading a message, the other people that were included in messages, the tone or meaning of a message, etc.
- Intention data is used by analysis process 230 along with other optional information such as user provided information 224 , or information from other sources such as external databases, devices, processes, etc.
- control process 240 determines whether there is a discrepancy between a user's intent and the probably meaning or effect of the message content or a message characteristic. If a discrepancy is detected then an action is taken such as alerting the user, requiring a user action before sending the message, requiring a change to the message, automatically making a change to the message, etc.
- Table II lists examples of types of actions that might be taken. Any one or more of these actions can be controlled by a system administrator or other entity, or provided in settings that are selectable by the user, as desired. Other actions are possible.
- FIGS. 2A-D show email communications and the development of an email thread.
- An initial sender Charlie@trellislaw.com, created and sent initial email 102 of FIG. 2A on Mar. 25, 2007 at 10:11 am to Richard@oqo.com.
- Another recipient jory@oqo.com, was also “carbon copied” in a “CC”.
- the subject of the email message is “Possible patents in next OQOTM product release”.
- the preceding information resides in header 104 .
- Body 106 includes the content of the email message which discusses ideas that might be patented in OQO, Inc.'s next product release.
- the content includes typical parts such as greeting 110 , first paragraph 112 , second paragraph 114 , signature 116 and contact information.
- FIG. 2B shows first reply 120 from Richard@oqo.com sent Mar. 28, 2007 at 3:40 pm to Charlie@trellislaw.com with a CC to jory@oqo.com and a blind CC (BCC) to Jacques@oqo.com with a subject “Possible patents in next OQO product release”. Note that a BCC is not shown to any of the recipients but is shown in FIG. 2B for discussion purposes.
- Separator 122 is used to indicate the end of the reply, and initial email 102 has been automatically copied and included in the response by Richard's email system.
- FIG. 2C shows a second reply from Jacques who was a blind CC.
- Jacques has replied to the sender and every other recipient on the prior email.
- Jacques email system automatically placed Richard on the “to” line and Jory and Charlie on the “CC” line so that all three would receive a response.
- Prior email in the thread i.e., initial email 102 and first reply 120 , are copied into Jacques reply, as shown.
- FIG. 2D shows third reply 140 from Charlie in response to Jacques' email. This completes the example thread which shows the entire communication as a series of the email messages in a reverse order from which they were sent, namely 140 , 130 , 120 and 102 .
- FIGS. 2A-D are discussed again to describe various features and functions of embodiments of the invention.
- intent data exists in the form of a profile associated with each of these users.
- the profile can be derived from characteristics of their prior communications.
- One basic function that can be provided includes handling of predefined text either for auto-insertion or for insertion on command, such as if a sender activates a control prior to sending a message.
- the notification text is typically appended automatically by an email sending process to every email sent by the sender. Naturally, the amount of appended notification text tends to become larger as time goes by, especially when it is drafted by lawyers.
- An embodiment of the invention acts to suppress the notification text when it has been established that the recipients on an email have already received the notification text before.
- the parameters of suppressing the text can vary. For example, the notification text may be sent only once and then suppressed. Or a threshold number of times (e.g., twice, 5 times, etc.), or frequency (once a week, month, etc.) can be implemented so that a recipient only receives the notification text every so often. If the content of the notification text changes then values or counters associated with the parameters can be reset so that recipients are treated as not having seen the text before.
- a pattern of use may be established so that the monitoring process can detect when an unusual or new combination of recipients is being used. For example, if a sender has used a group of recipients in the past and a present attempt at sending includes that same group plus a new recipient not in that group then the sender can be alerted about the new recipient prior to sending the message.
- Another alternative is to include the insertion text only for the new recipient. Detection of the new recipient can be by usage patterns, which are discussed in more detail, below. Or by analysis of the recipients' email domains, geographic location, use of external data to show affiliation with an organization, frequency of correspondence, etc. These factors are discussed in more detail, below.
- predefined text can be similarly handled.
- another popular type of predefined text is contact information 118 in FIG. 2A . If the monitor process already establishes that a user has already received the contact information with sufficient occurrence and/or frequency then a sender may have a parameter in their intent data or profile to suppress the contact information even if other settings in the email system call for insertion of the contact information. Variations on regulating predefined text are possible.
- a classification of a relationship of the sender to a recipient is maintained.
- the relationship classification can be made based on user input, monitoring of messages, or by other techniques.
- a relationship between the sender and receiver can be designated by relationship attributes such as “professional,” “friendly,” “trusted,” “romantic,” etc.
- Each relationship attribute can have a value such as ⁇ 10 to 10 where 10 could be “most friendly” and ⁇ 10 could be “least friendly,” for example.
- Many other attributes and ways to associate a value with an attribute are possible.
- a user can set the values of the relationship attributes in pairs based on the relationship of a particular user with each other possible participant in a communication. Or an automatic default can be used such as zero.
- modification of the relationship attributes can be modified based on an analysis process' analysis of messages from data obtained by a monitor process. For example, as explained in more detail below, if a sender continually uses familiar, funny, excited or intimate or other “friendly” types of language constructs with a particular recipient than the sender/recipient “friendly” value can be increased over time by the analysis process.
- the analysis process can use simplified or complex techniques to make a determination for a relationship attribute value adjustment. For example, predefined “friendly” keywords can be defined so that a simple keyword match can be used to analyze a message. If a user sends personal information such as a home phone number, cell phone number, bank account, password, social security number, etc., it can be registered that the recipient is at an elevated level of friendship or trust.
- the time of messages being sent can be considered in establishing a relationship attribute's value. If a pair of users are recorded as predominantly sending only during business hours then the relationship's professional attribute can increase and the friendship attribute can decrease. Similarly, if messages are sent at all hours of the day and night then the professional attribute can decrease while the friendship attribute can increase. Naturally, any one or more attributes may be affected by such monitoring of user characteristics.
- NLP natural language processing
- LSI latent semantic indexing
- LSA latent semantic analysis
- a relationship classification Once a relationship classification has been established then it can be used to analyze messages to determine if a discrepancy exists between a participant's intent and the likely meaning or predicted effect of a message to be sent.
- the hierarchy can be compared to the appropriate relationship attribute's value and a determination can be made to take action if there is a discrepancy. So, for example, if the “friendly” attribute between Richard and Charlie is 8 then any of the salutations in Table IV with values 7-10 may be deemed acceptable and use of other salutations may be flagged so that the sender, Charlie, would be alerted before the email is sent that the greeting may be more formal than is desired in order to maintain the friendship at a desired or intended level. Such mistakes in maintaining a social relationship may occur inadvertently as where more time than usual has gone by between communications, when a relationship is first being formed and is progressing, when an event occurs to change the relationship, etc.
- the Richard/Charlie friendship attribute can be defined by a parameter associated with Richard's profile or intent data. This number need not be the same as the Charlie/Richard friendship attribute.
- One feature allows checking the recipients' corresponding parameter and using the recipient parameter to alert the sender or to modify the salutation. For example, if Charlie is sending Richard an email but it is detected that Richard's profile has a Richard/Charlie friendship value of 3 then a more formal salutation may be suggested than what Charlie had initially used.
- the exposure of different users' profile parameters to other users can be by consent of each user, as desired.
- the Jory/Charlie relationship attributes can have an effect on how the salutation and content of the email is monitored and analyzed and on possible actions if a discrepancy is determined. For example, if Charlie attempts to use the salutation “Rich Wazzup!” in an email to Richard that also copies Jory where the Charlie/Richard friendship value is 10 and but the Jory/Charlie friendship attribute value is 5 and the Jory/Charlie professional attribute value is 10 then the salutation can be flagged to require affirmative approval from Charlie before the message is sent. Approval might be a dialogue box or other alert displayed that requires a “yes” or “no” selection after Charlie indicates the message is to be sent. Naturally, many variations on use of relationship attributes to determine intent are possible.
- line 114 of FIG. 2A states “BTW, did I tell you that a patent I wrote got licensed for $100M?”
- the monitoring process can record such statements and if a similar or identical statement had previously been sent to the same user then the statement can be flagged for possible deletion or modification by the sender.
- This approach can be used to send different variations to different users.
- Richard had been provided with text similar to line 114 in the past but Jory was not then two versions of the email can be automatically sent (or sent upon approval after informing the author, Charlie) so that Jory receives line 114 but Richard does not.
- a variation of this approach is to show Richard that line 114 is a repeated statement but was sent anyway for Jory's benefit. This might be shown by having line 114 grayed, or dimmed, in Richard's copy of the message. Or an annotation can be made on, adjacent to, or otherwise associated with line 114 's text such as “for Jory's benefit” or “—previously sent text omitted - - - ,” “Jory” etc. This approach can be especially useful where the amount of text is lengthy or may be sensitive to an individual. In general, any manner of suitable indication can be used to show that text has been included and/or removed specifically for one or more recipients but not for all recipients. In some applications, no indication to the recipients may be needed, or desired.
- One feature of the invention provides for “second order effects” whereby a first user's intent is checked not only when the first user sends an email to a second user (a “first order effect”) but also when the second user (or a different user) sends the first user's text to a third user (a “second order effect”). For example, if Charlie had included text to Richard and Richard then forwards that email to Jory, a second order effect might remove or modify a portion the text if the text was redundant, offending, restricted, etc. Another example is where text is intended for only a few people or for internal organization use. If text from the first user is attempted to be sent to a person not in a predetermined list, outside of an organization, etc.
- any of the operations described herein for a first order effect can be applied to a second order effect, or to any subsequent forwarding or re-sending of the first user's communication, as desired.
- FIG. 2B shows Richard's response to Charlie's initial email.
- An additional recipient, Jacques has been BCCed so that Jacques email address or the fact that Jacques had been copied is not apparent to the recipients Jory and Charlie.
- One check would include whether an attorney or other specialized consultant who is likely to generate or be copied on sensitive material is involved in a message distribution or thread. If so, and if it is also determined that others are copied who have not previously participated in these types of correspondence, then an alert mechanism can be invoked.
- FIG. 2C illustrates Jacques' response to Richard's email.
- Jacques has inadvertently copied everyone in the thread including Charlie who was not an intended recipient.
- One feature of the invention checks for whether a first-time recipient is the result of replying to an email sent by another person. Often when a first person is sending an email to another for the first time there should be a polite salutation or introduction. In a case where someone is being sent an email for the first time in the CC or BCC lines such an alert can be used to verify (e.g., by requiring affirmative assent from the sender) that the email should go to the first-time recipient.
- Tone can be determined by, for example, using natural language processing techniques, by looking for keywords (e.g., slang, cursing), by detecting punctuation (e.g., exclamation marks, capitalization of words, phrases or sentences, etc.).
- keywords e.g., slang, cursing
- punctuation e.g., exclamation marks, capitalization of words, phrases or sentences, etc.
- Charlie's response to Jacques' email can be analyzed with regard to this being a first-time reply to a person who has an email domain of a client.
- the tone in Charlie's reply could be detected by various processing methods, described above.
- the early morning time of sending the message can be used in evaluating the appropriateness of the message. In such cases a “hold” on sending the message can be imposed so that approval after a few hours is required to send the message.
- Other variations on detecting inappropriate messages can include requiring the sender to perform an action that requires patience, self-awareness or introspection, such as solving a puzzle, answering a question, performing a sobriety test, etc.
- the results from such actions or tests can be provided to the control process or another process in the system to decide whether the message should be sent, held, modified, or to have other action taken.
- Any suitable programming language can be used to implement the functionality of the present invention including C, C++, Java, assembly language, etc.
- Different programming techniques can be employed such as procedural or object oriented.
- the routines can execute on a single processing device or multiple processors. Although the steps, operations or computations may be presented in a specific order, this order may be changed in different embodiments unless otherwise specified. In some embodiments, multiple steps shown as sequential in this specification can be performed at the same time.
- the sequence of operations described herein can be interrupted, suspended, or otherwise controlled by another process, such as an operating system, kernel, etc.
- the routines can operate in an operating system environment or as stand-alone routines occupying all, or a substantial part, of the system processing.
- the functions may be performed in hardware, software or a combination of both.
- a “computer-readable medium” for purposes of embodiments of the present invention may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, system or device.
- the computer readable medium can be, by way of example only but not by limitation, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, system, device, propagation medium, or computer memory.
- a “processor” or “process” includes any human, hardware and/or software system, mechanism or component that processes data, signals or other information.
- a processor can include a system with a general-purpose central processing unit, multiple processing units, dedicated circuitry for achieving functionality, or other systems. Processing need not be limited to a geographic location, or have temporal limitations. Functions and parts of functions described herein can be achieved by devices in different places and operating at different times. For example, a processor can perform its functions in “real time,” “offline,” in a “batch mode,” etc. Parallel, distributed or other processing approaches can be used.
- Embodiments of the invention may be implemented by using a programmed general purpose digital computer, by using application specific integrated circuits, programmable logic devices, field programmable gate arrays, optical, chemical, biological, quantum or nanoengineered systems, components and mechanisms may be used.
- the functions of the present invention can be achieved by any means as is known in the art.
- distributed, networked systems, components and/or circuits can be used.
- Communication, or transfer, of data may be wired, wireless, or by any other means.
- any signal arrows in the drawings/ Figures should be considered only as exemplary, and not limiting, unless otherwise specifically noted.
- the term “or” as used herein is generally intended to mean “and/or” unless otherwise indicated. Combinations of components or steps will also be considered as being noted, where terminology is foreseen as rendering the ability to separate or combine is unclear.
Abstract
Description
- The invention relates in general to electronic communications and more specifically to a system for checking and/or revising electronic messages by using data about a user's intent.
- The prevalent use of electronic communications often requires a high level of care to make sure that the communication is properly crafted and sent to the proper recipients. Electronic mail (email), text messages, chat messages, web logs (blogs), newsgroup postings, etc. are each examples of types of electronic communications, or messages. Although these messages are often important, or even critical, to a sender's profession, education, relationship, happiness or other aspect of life, there is a tendency for senders to draft and send a message quickly. This haste may result in errors, omissions, inclusion of inappropriate or sub-optimal comments or statements, or other unwanted effects.
- Even where senders have the best intentions and are mindful of their message composition and sending parameters, the number of features and level of complexity in today's electronic communications can cause mistakes. For example, email systems allow different options such as whether to reply to an original message using only the original message's sender, replying to everyone on the carbon copy (CC) list, using local or global distribution lists, placing some recipients in a blind carbon copy (BCC) list, forwarding the message; adding, deleting or editing names, content and attachments prior to sending, changing the order of name listing, sending to multiple email addresses or aliases for a same person, etc. There are many other options associated with sending an email message and each option can lead to multiple possible parameters or values.
- Thus, a sender may fail to consider all the necessary options or characteristics, or may make a mistake in handling a message characteristic, thereby sending an electronic communication that does not achieve an intended result.
- A preferred embodiment of the invention uses “intention data” to determine an intent of a sender of a message or other user in an electronic communication system. For example, a message to be sent can be compared to the sender's intention data which indicates the sender's probable intent. If a discrepancy is detected between the sender's determined intent and a part of the actual message then an action is taken. An action can include providing an alert to the sender or to another person, process or device. An action can also require that the sender confirm the message's content or characteristics, edit the message or the message's transmission parameters, further check the message against other external information, log an event, etc.
- Intention data can be acquired by a monitoring process executing within or in association with a part of an electronic communication system. A preferred embodiment uses “usage information” to derive a user's intent. The usage information can include past or current activity of the user, such as an identified pattern of use of the communication system by a sender with respect to one or more recipients. For example, usage patterns can include frequency of correspondence, type of message content usually sent to a recipient, detecting common groups of recipients, etc. Intention data can also be obtained from non-pattern information such as by an analysis of one or a few email messages. For example, a degree of formality, friendliness or other relationship attributes may be determined from one message which does not necessarily depend on a pattern. A value for a relationship attribute can be used to analyze and react to subsequent messages. Intention data can also be obtained directly from a user or other person as, for example, in response to a question or prompt, or by monitoring a person's behavior. Intention data may also be obtained or derived from other non-human sources such as databases, records, files, other devices or processes (e.g., phone calls, global positioning system (GPS) determination of location, web page browsing, etc.), or other sources.
- Once intention data is obtained it is used by an analysis process to compare against a message to be sent. If a discrepancy is detected it is determined that the message to be sent (or received, transferred or otherwise processed) may not comport with a user's intent. In response to detecting a discrepancy, a control process is invoked that takes an action such as generating an alert, suggesting a change, automatically making a change to the message or the way the message is handled, logging the event, etc.
- In one embodiment the invention provides a method for processing an electronic communication, the method comprising: obtaining intention data, wherein the intention data indicates an intent of a user with respect to the user's electronic communications; accepting a signal from an input device to define content for a present electronic communication; determining that the present electronic communication is associated with the user; detecting a deficiency by analyzing at least a portion of the present electronic communication and the intention data; and performing an act to correct the deficiency.
-
FIG. 1 illustrates basic components in an electronic communications system suitable for use with the invention; -
FIG. 2A shows a first example email message; -
FIG. 2B shows a second email message in an example thread; -
FIG. 2C shows a third email message in an example thread; -
FIG. 2D shows a fourth email message in an example thread; and -
FIG. 3 illustrates basic components and steps of a messaging system. -
FIG. 1 illustrates basic components in an electronic communications system suitable for use with the invention. Note that although features may be discussed with respect to specific components or systems that the features can be adapted to any one or more suitable systems, devices, processes, components, networks or other combinations of hardware and/or software. - In
FIG. 1 , users such as 1, 2, 3, 4 and 5 operate devices for electronic communications. For example, User 1 operatesportable email device 10, User 2 operatesdesktop computer 20, User 3 operatescell phone 30, User 4 operateslaptop 40 and User 5 operatesdesktop computer 51 connected tolocal server 53 and other devices (not shown) via a local area network (LAN) 55. Note that any number and type of devices with different suitable network topologies and interconnections can be adapted for use with embodiments of the invention. Further, although features of the invention may be described with respect to a specific user associated with a specific device, other types of associations of human users with devices or processes can be used, as desired, in order to achieve the functional effects described herein. Multiple users can be associated with a device or devices and multiple devices can be associated with a user or users. In some applications, communications need not involve a human sender, intermediary and/or receiver as these roles might be performed automatically as where an email system sends automatically generated messages to humans or devices. - In
FIG. 1 , the devices communicate with each other and withserver 60 via a digital network such as Internet 50. Such communication can be by any physical link, protocol, data format or other convention, as desired. For example, wired connections such as shown forservers desktop computer 20 may be employed. Or wireless connections such as shown forportable email device 10,cell phone 30 orlaptop 40 may be used. As is known in the art, Internet 50 allows for dynamic and varied communications between devices and processes such as switches, routers, repeaters, servers, etc. These are shown symbolically ascomponents LAN 55 can be used to connect different devices at a locally controlled or maintained network such as a corporate or campus LAN, home network, etc. - As is known in the art, there are many ways to organize and interconnect devices and processes, and to arrange for communication protocols, formats and standards. For example, an email system may be organized as a point-of-presence (POP3) or Internet Message Access Protocol (IMAP) system with a local or remote email server. The email system can support message formats and protocols such as Multipurpose Internet Mail Extensions (MIME), Simple Mail Transfer Protocol (SMTP), etc. A text messaging system can use cell phone or wireless data connections to handheld devices that comply with standards such as Global System for Mobile Communications (GSM) and include Short Message Service (SMS), Multimedia Messaging Service (MMS), etc. Other custom or proprietary systems can be used such as J-Phone's SkyMail™ and NTT Docomo's Short Mail™, etc.
- In general, any type of electronic communication system for delivery of information intended for at least one human recipient can be used with features of the present invention, including future-developed systems, standards and protocols. Because of the large flexibility in communication systems and processing systems, it should be apparent that functions or features described herein can be performed by any number, type and combination of hardware and software components. Functions can be performed at the same or different places in time or space by one or more components. In some implementations, components may be omitted or called by a different name from those shown in the examples. Further, various aspects of the invention can apply regardless of the organization of components or resources into different managed or controlled groups, such as Internet access provided by a company, a server operated by a third party, etc.
- A typical method of sending an electronic communication such as an email message could involve User 1 creating message content and sending the content included in an initial email message. The message could be transferred first to
server 60 for further processing such as to resolve recipient network addresses, determine destination servers, etc. In other embodiments, message delivery need not use a server as some types of communication may be peer-to-peer or can use a device other than a server. The user of terms designating items such as “client,” “server,” “sender,” “recipient,” “initial message,” “reply message,” etc. should not be construed as limiting the invention. Rather they are used to provide an example. It should be apparent that such terms may be interchanged and the resulting system or method will remain within the scope of the invention. Items may also be omitted. For example, a sender may send an initial message to a hardware device or software process such as to send a database query, purchase order, blog posting, turn on a light, etc. - As correspondents and participants exchange messages, characteristics of the messages and exchanges are compiled by a monitor process. The monitor process provides the characteristic data to an analysis process to derive intent data—i.e., data that indicates intent of a sender, recipient or other participant (“users”) of the messages. One way of using the compiled message characteristic data to identify user intent is to analyze prior patterns of use. Another way to establish user intent is by querying users, analyzing the way user's or automated processes react to a particular user, and by other methods, described in more detail, below. Once user intent data is obtained then a particular user's electronic messages can be compared to the intent data by a control process. When a discrepancy is determined then the control process can initiate an action such as alerting a user, delaying transmission, automatically correcting or changing a characteristic of the communication, etc.
-
FIG. 3 illustrates basic components and steps of a messaging system in a preferred embodiment of the invention, as described, above. InFIG. 3 , participants 202 include multiple users of the messaging system. Portions of the participants' messages and activity are recorded bymonitor process 220. Monitor process uses observations about the messages and activity to generate intention data 222. Such data can be any information that is useful to determine a user's intent with respect to a communication. - For example, each user's email traffic can be recorded to include header information (sender, receiver, other recipients, date and time sent or received, subject, etc.) and content, if desired. Statistics, summary data or other data of communications with another user, device, process, group of users, organization, or other entity can be maintained. Such data can include the frequency of corresponding with another user, the time intervals between responses, the amount of time spent composing or reading a message, the other people that were included in messages, the tone or meaning of a message, etc.
- Many different characteristics of a message or communication can be monitored including those listed in Table I, below.
-
****************** BEGIN TABLE I ********************** Characteristics of Outgoing Messages: 1: Lacks certain header properties i) given the messages other header information ii) given the messages other body content iii) given previous messages header information iv) given previous messages body content v) 2: Lacks an characteristic or property it purports to contain I an attachement II a recipient III the response to a query IV information necessary for the effective delivery of the message 3: Contains content that: i) is likely to have an effect on the recipent other than that which is intended A) in a response B) in a response in another medium ii) is likely to generate another recognizable pattern of response iii) is likley to generate an unrecognized pattern of response vi) has a low probability of generating a response vii) may caused anger, frustration or other negative effects on the recipient viii) is unlikey to cause the intended reponse or intended action 4: is similar to other emails you have sent: i) within or outside some range of time ii) to the same recipient iii) to other recipients, either explictly or implicitly defined iv) to recepients which have a relationship to the chosen recipient(s) v) to recipients which have been flagged for some other reason or purpose 5: differs in style, tone, format or content from emails from your chosen recipient(s) which have a relationship to the chosen recipient or recipients or are otherwise categorized as relevant 6: differs in style, tone, format or content from emails sent by other senders to the chosen recipient(s) or recepients which have a relationship to the chosen recipient or recipients or are otherwise characterized as relevant 7: falls within a certain range of times between receipt of other messages, either from the last message, or on average, a) from this recipient b) from other recipients 8: contains information which can be identified as a) sensitive b) proprietary c) providing some legal risk d) referencing a Patent ************* ******* END TABLE I ****************** - Intention data is used by
analysis process 230 along with other optional information such as user providedinformation 224, or information from other sources such as external databases, devices, processes, etc. - When a user such as
User 204 creates a new message such as presentelectronic communication 250,control process 240 determines whether there is a discrepancy between a user's intent and the probably meaning or effect of the message content or a message characteristic. If a discrepancy is detected then an action is taken such as alerting the user, requiring a user action before sending the message, requiring a change to the message, automatically making a change to the message, etc. - Table II lists examples of types of actions that might be taken. Any one or more of these actions can be controlled by a system administrator or other entity, or provided in settings that are selectable by the user, as desired. Other actions are possible.
-
****************** BEGIN TABLE II ********************* Examples of Actions: 1: a hold time on a message before it leaves the sender's outbox 2: the addition of an attatchment to a message 3: modifications to outgoing message parameters, including i: changing a recipient ii: modifying the title iii: modification to the urgency level, date stamp or other parameters of the message header iv: alterations to the content of the message, including A: distortions, particularly in the case when the application which makes such distortions is executed without the knowledge of the email sender and or recipient B: modifications, including those meant to i: repair the message ii: remove the material which generated the flag iii: further stress the material which generated the flag iv: optimize, maximize, minimize or otherwise modify the likelihood of such events as: 1) recepit of an email in return 2) receipt of an email with particular parameters which include: a: presence of a similar flag b: presence of a specific flag c: of a certain length d: within a certain time range e: a number of responses 3) the quantity of total emails in a thread 4) the length of time the thread persisted 5) any other measureable parameter of: a: the email message content b: its header information c: the headers of other emails in the thread d: the content of other messages in the thread e: the header or content of other messages linked to this thread A) by shared author B) by shared content C) by another algorithm which determines the two or more messages, authors or threads are related C: deletions: particularly in the case of the deletion of an area of the content of the message flagged as: 1) incorrect 2) dangerous 3) provocative 4) uninformatinve 5) political 6) unlikely to generate a desired response 7) likely to generate an undersirable response 4: the generation of a dialog box which requires further input to continue the message, such as: i: a password ii: a confirmation code iii: a unique identifier such as A: a citizenship code B: a passport number C: a social security number iv: the solution to a logic puzzle or other test of sobriety or patience ****************** END TABLE II ********************* -
FIGS. 2A-D show email communications and the development of an email thread. An initial sender, Charlie@trellislaw.com, created and sentinitial email 102 ofFIG. 2A on Mar. 25, 2007 at 10:11 am to Richard@oqo.com. Another recipient, jory@oqo.com, was also “carbon copied” in a “CC”. The subject of the email message is “Possible patents in next OQO™ product release”. The preceding information resides inheader 104.Body 106 includes the content of the email message which discusses ideas that might be patented in OQO, Inc.'s next product release. The content includes typical parts such asgreeting 110,first paragraph 112, second paragraph 114,signature 116 and contact information. -
FIG. 2B showsfirst reply 120 from Richard@oqo.com sent Mar. 28, 2007 at 3:40 pm to Charlie@trellislaw.com with a CC to jory@oqo.com and a blind CC (BCC) to Jacques@oqo.com with a subject “Possible patents in next OQO product release”. Note that a BCC is not shown to any of the recipients but is shown inFIG. 2B for discussion purposes.Separator 122 is used to indicate the end of the reply, andinitial email 102 has been automatically copied and included in the response by Richard's email system. -
FIG. 2C shows a second reply from Jacques who was a blind CC. Jacques has replied to the sender and every other recipient on the prior email. Jacques email system automatically placed Richard on the “to” line and Jory and Charlie on the “CC” line so that all three would receive a response. Prior email in the thread, i.e.,initial email 102 andfirst reply 120, are copied into Jacques reply, as shown. -
FIG. 2D showsthird reply 140 from Charlie in response to Jacques' email. This completes the example thread which shows the entire communication as a series of the email messages in a reverse order from which they were sent, namely 140, 130, 120 and 102. - Next
FIGS. 2A-D are discussed again to describe various features and functions of embodiments of the invention. - Assuming that Richard and Charlie have corresponded before, intent data exists in the form of a profile associated with each of these users. The profile can be derived from characteristics of their prior communications. One basic function that can be provided includes handling of predefined text either for auto-insertion or for insertion on command, such as if a sender activates a control prior to sending a message.
- For example, many professional such as attorneys, agents, corporate officers, or others who deal with confidential information include a paragraph or more of notification text appended to the bottom of every email message. An example of such notification text is shown below in Table III.
-
TABLE III ************** BEGIN TABLE III ******************** This communication, including any attachments, is confidential and may be protected by privilege. If you are not the intended recipient, any use, dissemination, distribution, or copying of this communication is strictly prohibited. If you have received this communication in error, please immediately notify the sender by telephone or email, and permanently delete all copies, electronic or other, you may have. To ensure compliance with requirements imposed by the IRS, we inform you that any tax advice contained in this communication (including any attachments) was not intended or written to be used, and cannot be used, for the purpose of (i) avoiding penalties under the Internal Revenue Code or (ii) promoting, marketing or recommending to another party any transaction or matter addressed herein. The foregoing applies even if this notice is embedded in a message that is forwarded or attached. ************** END TABLE III ******************** - The notification text is typically appended automatically by an email sending process to every email sent by the sender. Naturally, the amount of appended notification text tends to become larger as time goes by, especially when it is drafted by lawyers. An embodiment of the invention acts to suppress the notification text when it has been established that the recipients on an email have already received the notification text before. The parameters of suppressing the text can vary. For example, the notification text may be sent only once and then suppressed. Or a threshold number of times (e.g., twice, 5 times, etc.), or frequency (once a week, month, etc.) can be implemented so that a recipient only receives the notification text every so often. If the content of the notification text changes then values or counters associated with the parameters can be reset so that recipients are treated as not having seen the text before.
- Other factors or conditions can be used to determine whether insertion text or other text should be included in an email or not. For example, a pattern of use may be established so that the monitoring process can detect when an unusual or new combination of recipients is being used. For example, if a sender has used a group of recipients in the past and a present attempt at sending includes that same group plus a new recipient not in that group then the sender can be alerted about the new recipient prior to sending the message. Another alternative is to include the insertion text only for the new recipient. Detection of the new recipient can be by usage patterns, which are discussed in more detail, below. Or by analysis of the recipients' email domains, geographic location, use of external data to show affiliation with an organization, frequency of correspondence, etc. These factors are discussed in more detail, below.
- Other types of predefined text can be similarly handled. For example, another popular type of predefined text is
contact information 118 inFIG. 2A . If the monitor process already establishes that a user has already received the contact information with sufficient occurrence and/or frequency then a sender may have a parameter in their intent data or profile to suppress the contact information even if other settings in the email system call for insertion of the contact information. Variations on regulating predefined text are possible. - In another embodiment, a classification of a relationship of the sender to a recipient is maintained. The relationship classification can be made based on user input, monitoring of messages, or by other techniques. For example, a relationship between the sender and receiver can be designated by relationship attributes such as “professional,” “friendly,” “trusted,” “romantic,” etc. Each relationship attribute can have a value such as −10 to 10 where 10 could be “most friendly” and −10 could be “least friendly,” for example. Many other attributes and ways to associate a value with an attribute are possible. A user can set the values of the relationship attributes in pairs based on the relationship of a particular user with each other possible participant in a communication. Or an automatic default can be used such as zero.
- As time goes by the particular user (or another user) may modify the attributes' values. Or modification of the relationship attributes can be modified based on an analysis process' analysis of messages from data obtained by a monitor process. For example, as explained in more detail below, if a sender continually uses familiar, funny, excited or intimate or other “friendly” types of language constructs with a particular recipient than the sender/recipient “friendly” value can be increased over time by the analysis process. The analysis process can use simplified or complex techniques to make a determination for a relationship attribute value adjustment. For example, predefined “friendly” keywords can be defined so that a simple keyword match can be used to analyze a message. If a user sends personal information such as a home phone number, cell phone number, bank account, password, social security number, etc., it can be registered that the recipient is at an elevated level of friendship or trust.
- The time of messages being sent can be considered in establishing a relationship attribute's value. If a pair of users are recorded as predominantly sending only during business hours then the relationship's professional attribute can increase and the friendship attribute can decrease. Similarly, if messages are sent at all hours of the day and night then the professional attribute can decrease while the friendship attribute can increase. Naturally, any one or more attributes may be affected by such monitoring of user characteristics. Other suitable approaches for analyzing message characteristics and user behavior or intent can include using natural language processing (NLP) techniques such as latent semantic indexing (LSI), latent semantic analysis (LSA), etc.
- Once a relationship classification has been established then it can be used to analyze messages to determine if a discrepancy exists between a participant's intent and the likely meaning or predicted effect of a message to be sent.
- For example, in
FIG. 2A , there is evidence of a friendly relationship between Richard and Charlie since atline 110 the greeting is the more informal “Hey, Richard,” instead of simply “Richard,” or even “Hi, Richard,”. A hierarchy of familiarity or friendliness in salutations can be created as shown in the example of Table IV. -
TABLE IV ************* BEGIN TABLE IV ******************** Rich Whazzup! 10← More Familiar Hey, Richard, 9 Hi, Richard, 8 Richard, 7 Dear Richard, 6 Richard Smith 5 Mr. Richard Smith 4 Sir 3 Sir/Madam 2 To Whom It May Concern 1← Less Familiar ************ END TABLE IV *********************** - Naturally, many different types of keywords, classifications, and hierarchies can be used other than that shown in Table II. Once established, the hierarchy can be compared to the appropriate relationship attribute's value and a determination can be made to take action if there is a discrepancy. So, for example, if the “friendly” attribute between Richard and Charlie is 8 then any of the salutations in Table IV with values 7-10 may be deemed acceptable and use of other salutations may be flagged so that the sender, Charlie, would be alerted before the email is sent that the greeting may be more formal than is desired in order to maintain the friendship at a desired or intended level. Such mistakes in maintaining a social relationship may occur inadvertently as where more time than usual has gone by between communications, when a relationship is first being formed and is progressing, when an event occurs to change the relationship, etc.
- Similarly, the Richard/Charlie friendship attribute can be defined by a parameter associated with Richard's profile or intent data. This number need not be the same as the Charlie/Richard friendship attribute. One feature allows checking the recipients' corresponding parameter and using the recipient parameter to alert the sender or to modify the salutation. For example, if Charlie is sending Richard an email but it is detected that Richard's profile has a Richard/Charlie friendship value of 3 then a more formal salutation may be suggested than what Charlie had initially used. The exposure of different users' profile parameters to other users can be by consent of each user, as desired. Some parameters will not be so sensitive and can be made global by assumed consent of all users, or an administrator or other manager, business owner, or entity (e.g., government, parent, etc.) may have overriding authority to view, use, manipulate, manage or otherwise control parameters of others.
- Other recipients' relationship attributes can be taken into consideration. For example, the Jory/Charlie relationship attributes can have an effect on how the salutation and content of the email is monitored and analyzed and on possible actions if a discrepancy is determined. For example, if Charlie attempts to use the salutation “Rich Wazzup!” in an email to Richard that also copies Jory where the Charlie/Richard friendship value is 10 and but the Jory/Charlie friendship attribute value is 5 and the Jory/Charlie professional attribute value is 10 then the salutation can be flagged to require affirmative approval from Charlie before the message is sent. Approval might be a dialogue box or other alert displayed that requires a “yes” or “no” selection after Charlie indicates the message is to be sent. Naturally, many variations on use of relationship attributes to determine intent are possible.
- A similar analysis to that described above with respect to including text can be used to check for text that should be removed or modified. For example, line 114 of
FIG. 2A states “BTW, did I tell you that a patent I wrote got licensed for $100M?” The monitoring process can record such statements and if a similar or identical statement had previously been sent to the same user then the statement can be flagged for possible deletion or modification by the sender. This approach can be used to send different variations to different users. In the example ofFIG. 2A , if Richard had been provided with text similar to line 114 in the past but Jory was not, then two versions of the email can be automatically sent (or sent upon approval after informing the author, Charlie) so that Jory receives line 114 but Richard does not. A variation of this approach is to show Richard that line 114 is a repeated statement but was sent anyway for Jory's benefit. This might be shown by having line 114 grayed, or dimmed, in Richard's copy of the message. Or an annotation can be made on, adjacent to, or otherwise associated with line 114's text such as “for Jory's benefit” or “—previously sent text omitted - - - ,” “Jory” etc. This approach can be especially useful where the amount of text is lengthy or may be sensitive to an individual. In general, any manner of suitable indication can be used to show that text has been included and/or removed specifically for one or more recipients but not for all recipients. In some applications, no indication to the recipients may be needed, or desired. - One feature of the invention provides for “second order effects” whereby a first user's intent is checked not only when the first user sends an email to a second user (a “first order effect”) but also when the second user (or a different user) sends the first user's text to a third user (a “second order effect”). For example, if Charlie had included text to Richard and Richard then forwards that email to Jory, a second order effect might remove or modify a portion the text if the text was redundant, offending, restricted, etc. Another example is where text is intended for only a few people or for internal organization use. If text from the first user is attempted to be sent to a person not in a predetermined list, outside of an organization, etc. then the first user's approval may be required before the email can be sent by a subsequent user. In general, any of the operations described herein for a first order effect can be applied to a second order effect, or to any subsequent forwarding or re-sending of the first user's communication, as desired.
-
FIG. 2B shows Richard's response to Charlie's initial email. An additional recipient, Jacques, has been BCCed so that Jacques email address or the fact that Jacques had been copied is not apparent to the recipients Jory and Charlie. One feature checks for types of content that a person, company or other entity may want to restrict and ensures that non-approved people are not sent the restricted information. For example, a check could be made to look for keywords for legal or patent-specific terms. If an attempt is made to send the content to a person who is not on a pre-approved list then an alert in the form of a dialogue box can be displayed to the sender stating the determination that has been made and asking for affirmative approval to send the email. One check would include whether an attorney or other specialized consultant who is likely to generate or be copied on sensitive material is involved in a message distribution or thread. If so, and if it is also determined that others are copied who have not previously participated in these types of correspondence, then an alert mechanism can be invoked. -
FIG. 2C illustrates Jacques' response to Richard's email. In this case Jacques has inadvertently copied everyone in the thread including Charlie who was not an intended recipient. One feature of the invention checks for whether a first-time recipient is the result of replying to an email sent by another person. Often when a first person is sending an email to another for the first time there should be a polite salutation or introduction. In a case where someone is being sent an email for the first time in the CC or BCC lines such an alert can be used to verify (e.g., by requiring affirmative assent from the sender) that the email should go to the first-time recipient. This can be especially useful in situations where message tone (e.g., angry, informal, etc.) is determined as not suitable for someone that is being sent a message for the first time. Tone can be determined by, for example, using natural language processing techniques, by looking for keywords (e.g., slang, cursing), by detecting punctuation (e.g., exclamation marks, capitalization of words, phrases or sentences, etc.). - Similarly, Charlie's response to Jacques' email can be analyzed with regard to this being a first-time reply to a person who has an email domain of a client. The tone in Charlie's reply could be detected by various processing methods, described above. Additionally, the early morning time of sending the message can be used in evaluating the appropriateness of the message. In such cases a “hold” on sending the message can be imposed so that approval after a few hours is required to send the message. Other variations on detecting inappropriate messages can include requiring the sender to perform an action that requires patience, self-awareness or introspection, such as solving a puzzle, answering a question, performing a sobriety test, etc. The results from such actions or tests can be provided to the control process or another process in the system to decide whether the message should be sent, held, modified, or to have other action taken.
- Although particular embodiments of the invention have been described, variations of such embodiments are possible and are within the scope of the invention. For example, although intent or intention data has been discussed as the basis for determining how communications are handled, other types of data can be used including behavior, intentions of others with respect to a sender's message, etc. Some features of the invention may be applied to non-text and non-visual information such as to voice transmissions.
- Any suitable programming language can be used to implement the functionality of the present invention including C, C++, Java, assembly language, etc. Different programming techniques can be employed such as procedural or object oriented. The routines can execute on a single processing device or multiple processors. Although the steps, operations or computations may be presented in a specific order, this order may be changed in different embodiments unless otherwise specified. In some embodiments, multiple steps shown as sequential in this specification can be performed at the same time. The sequence of operations described herein can be interrupted, suspended, or otherwise controlled by another process, such as an operating system, kernel, etc. The routines can operate in an operating system environment or as stand-alone routines occupying all, or a substantial part, of the system processing. The functions may be performed in hardware, software or a combination of both.
- In the description herein, numerous specific details are provided, such as examples of components and/or methods, to provide a thorough understanding of embodiments of the present invention. One skilled in the relevant art will recognize, however, that an embodiment of the invention can be practiced without one or more of the specific details, or with other apparatus, systems, assemblies, methods, components, materials, parts, and/or the like. In other instances, well-known structures, materials, or operations are not specifically shown or described in detail to avoid obscuring aspects of embodiments of the present invention.
- A “computer-readable medium” for purposes of embodiments of the present invention may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, system or device. The computer readable medium can be, by way of example only but not by limitation, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, system, device, propagation medium, or computer memory.
- A “processor” or “process” includes any human, hardware and/or software system, mechanism or component that processes data, signals or other information. A processor can include a system with a general-purpose central processing unit, multiple processing units, dedicated circuitry for achieving functionality, or other systems. Processing need not be limited to a geographic location, or have temporal limitations. Functions and parts of functions described herein can be achieved by devices in different places and operating at different times. For example, a processor can perform its functions in “real time,” “offline,” in a “batch mode,” etc. Parallel, distributed or other processing approaches can be used.
- Reference throughout this specification to “one embodiment”, “an embodiment”, “a particular embodiment,” or “a specific embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention and not necessarily in all embodiments. Thus, respective appearances of the phrases “in one embodiment”, “in an embodiment”, or “in a specific embodiment” in various places throughout this specification are not necessarily referring to the same embodiment. Furthermore, the particular features, structures, or characteristics of any specific embodiment of the present invention may be combined in any suitable manner with one or more other embodiments. It is to be understood that other variations and modifications of the embodiments of the present invention described and illustrated herein are possible in light of the teachings herein and are to be considered as part of the spirit and scope of the present invention.
- Embodiments of the invention may be implemented by using a programmed general purpose digital computer, by using application specific integrated circuits, programmable logic devices, field programmable gate arrays, optical, chemical, biological, quantum or nanoengineered systems, components and mechanisms may be used. In general, the functions of the present invention can be achieved by any means as is known in the art. For example, distributed, networked systems, components and/or circuits can be used. Communication, or transfer, of data may be wired, wireless, or by any other means.
- It will also be appreciated that one or more of the elements depicted in the drawings/figures can also be implemented in a more separated or integrated manner, or even removed or rendered as inoperable in certain cases, as is useful in accordance with a particular application. It is also within the spirit and scope of the present invention to implement a program or code that can be stored in a machine-readable medium to permit a computer to perform any of the methods described above.
- Additionally, any signal arrows in the drawings/Figures should be considered only as exemplary, and not limiting, unless otherwise specifically noted. Furthermore, the term “or” as used herein is generally intended to mean “and/or” unless otherwise indicated. Combinations of components or steps will also be considered as being noted, where terminology is foreseen as rendering the ability to separate or combine is unclear.
- As used in the description herein and throughout the claims that follow, “a”, “an”, and “the” includes plural references unless the context clearly dictates otherwise. Also, as used in the description herein and throughout the claims that follow, the meaning of “in” includes “in” and “on” unless the context clearly dictates otherwise.
- The foregoing description of illustrated embodiments of the present invention, including what is described in the Abstract, is not intended to be exhaustive or to limit the invention to the precise forms disclosed herein. While specific embodiments of, and examples for, the invention are described herein for illustrative purposes only, various equivalent modifications are possible within the spirit and scope of the present invention, as those skilled in the relevant art will recognize and appreciate. As indicated, these modifications may be made to the present invention in light of the foregoing description of illustrated embodiments of the present invention and are to be included within the spirit and scope of the present invention.
- Thus, while the present invention has been described herein with reference to particular embodiments thereof, a latitude of modification, various changes and substitutions are intended in the foregoing disclosures, and it will be appreciated that in some instances some features of embodiments of the invention will be employed without a corresponding use of other features without departing from the scope and spirit of the invention as set forth. Therefore, many modifications may be made to adapt a particular situation or material to the essential scope and spirit of the present invention. It is intended that the invention not be limited to the particular terms used in following claims and/or to the particular embodiment disclosed as the best mode contemplated for carrying out this invention, but that the invention will include any and all embodiments and equivalents falling within the scope of the appended claims.
- Thus, the scope of the invention is to be determined solely by the appended claims.
Claims (30)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/044,892 US20090228583A1 (en) | 2008-03-07 | 2008-03-07 | Checking electronic messages for compliance with user intent |
US12/756,435 US9141940B2 (en) | 2008-03-07 | 2010-04-08 | Checking electronic messages for compliance with user intent |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/044,892 US20090228583A1 (en) | 2008-03-07 | 2008-03-07 | Checking electronic messages for compliance with user intent |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/756,435 Continuation US9141940B2 (en) | 2008-03-07 | 2010-04-08 | Checking electronic messages for compliance with user intent |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090228583A1 true US20090228583A1 (en) | 2009-09-10 |
Family
ID=41054746
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/044,892 Abandoned US20090228583A1 (en) | 2008-03-07 | 2008-03-07 | Checking electronic messages for compliance with user intent |
US12/756,435 Active 2029-01-24 US9141940B2 (en) | 2008-03-07 | 2010-04-08 | Checking electronic messages for compliance with user intent |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/756,435 Active 2029-01-24 US9141940B2 (en) | 2008-03-07 | 2010-04-08 | Checking electronic messages for compliance with user intent |
Country Status (1)
Country | Link |
---|---|
US (2) | US20090228583A1 (en) |
Cited By (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100115033A1 (en) * | 2008-10-30 | 2010-05-06 | Microsoft Corporation | Do not disturb filter for electronic messages |
US20100122340A1 (en) * | 2008-11-13 | 2010-05-13 | Palo Alto Research Center Incorporated | Enterprise password reset |
US20100169445A1 (en) * | 2008-12-26 | 2010-07-01 | International Business Machines Corporation | Device, method, and computer program product for supporting creation of reply mail |
US20100198931A1 (en) * | 2008-03-07 | 2010-08-05 | Richard Pocklington | Checking electronic messages for compliance with user intent |
US20110055175A1 (en) * | 2009-08-27 | 2011-03-03 | International Business Machines | System, method, and apparatus for management of media objects |
US7921174B1 (en) * | 2009-07-24 | 2011-04-05 | Jason Adam Denise | Electronic communication reminder technology |
WO2012005804A1 (en) * | 2010-07-09 | 2012-01-12 | Bank Of America Corporation | Monitoring communications |
US20130179440A1 (en) * | 2012-01-10 | 2013-07-11 | Merlyn GORDON | Identifying individual intentions and determining responses to individual intentions |
US20130191898A1 (en) * | 2012-01-04 | 2013-07-25 | Harold H. KRAFT | Identity verification credential with continuous verification and intention-based authentication systems and methods |
US20150081824A1 (en) * | 2012-07-05 | 2015-03-19 | Microsoft Technology Licensing, Llc. | Forgotten Attachment Detection |
US20150304261A1 (en) * | 2012-11-30 | 2015-10-22 | Conversepoint Llc | Systems and methods for echoing or redirecting electronic messages in a conversation |
US20160269452A1 (en) * | 2015-03-10 | 2016-09-15 | International Business Machines Corporation | Allow hidden and silent observers in a group conversation |
US20170185591A1 (en) * | 2015-12-23 | 2017-06-29 | Yahoo! Inc. | Method and system for automatic formality classification |
US9847973B1 (en) * | 2016-09-26 | 2017-12-19 | Agari Data, Inc. | Mitigating communication risk by detecting similarity to a trusted message contact |
US20180091455A1 (en) * | 2016-09-23 | 2018-03-29 | Microsoft Technology Licensing, Llc. | Recipient verification |
US20180213043A1 (en) * | 2017-01-25 | 2018-07-26 | International Business Machines Corporation | System and method to download file from common recipient devices in proximity |
US10129194B1 (en) | 2012-02-13 | 2018-11-13 | ZapFraud, Inc. | Tertiary classification of communications |
US10171404B2 (en) * | 2008-09-27 | 2019-01-01 | International Business Machines Corporation | Reply to most recent message |
US10277628B1 (en) | 2013-09-16 | 2019-04-30 | ZapFraud, Inc. | Detecting phishing attempts |
US10353542B2 (en) * | 2015-04-02 | 2019-07-16 | Facebook, Inc. | Techniques for context sensitive illustrated graphical user interface elements |
US10361981B2 (en) | 2015-05-15 | 2019-07-23 | Microsoft Technology Licensing, Llc | Automatic extraction of commitments and requests from communications and content |
US10674009B1 (en) | 2013-11-07 | 2020-06-02 | Rightquestion, Llc | Validating automatic number identification data |
US10715543B2 (en) | 2016-11-30 | 2020-07-14 | Agari Data, Inc. | Detecting computer security risk based on previously observed communications |
US10721195B2 (en) | 2016-01-26 | 2020-07-21 | ZapFraud, Inc. | Detection of business email compromise |
US10805409B1 (en) | 2015-02-10 | 2020-10-13 | Open Invention Network Llc | Location based notifications |
US10805314B2 (en) | 2017-05-19 | 2020-10-13 | Agari Data, Inc. | Using message context to evaluate security of requested data |
US10880322B1 (en) | 2016-09-26 | 2020-12-29 | Agari Data, Inc. | Automated tracking of interaction with a resource of a message |
US10984387B2 (en) | 2011-06-28 | 2021-04-20 | Microsoft Technology Licensing, Llc | Automatic task extraction and calendar entry |
US11019076B1 (en) | 2017-04-26 | 2021-05-25 | Agari Data, Inc. | Message security assessment using sender identity profiles |
US11044267B2 (en) | 2016-11-30 | 2021-06-22 | Agari Data, Inc. | Using a measure of influence of sender in determining a security risk associated with an electronic message |
US11102244B1 (en) | 2017-06-07 | 2021-08-24 | Agari Data, Inc. | Automated intelligence gathering |
US11245654B2 (en) | 2019-07-02 | 2022-02-08 | International Business Machines Corporation | System and method to create global conversation thread across communication channels |
US20220138880A1 (en) * | 2018-03-23 | 2022-05-05 | Tingying Zeng | Teaching method system for connecting and applying research needs with a teaching method |
US11373039B2 (en) * | 2019-09-26 | 2022-06-28 | International Business Machines Corporation | Content context aware message intent checker |
US11398996B2 (en) * | 2019-07-02 | 2022-07-26 | International Business Machines Corporation | System and method to create global conversation thread across communication channels |
US11411894B2 (en) * | 2013-12-31 | 2022-08-09 | Google Llc | Determining strength of association between user contacts |
US11502976B1 (en) * | 2021-02-18 | 2022-11-15 | Walgreen Co. | Automated agent messaging system |
US11722513B2 (en) | 2016-11-30 | 2023-08-08 | Agari Data, Inc. | Using a measure of influence of sender in determining a security risk associated with an electronic message |
US11757914B1 (en) | 2017-06-07 | 2023-09-12 | Agari Data, Inc. | Automated responsive message to determine a security risk of a message sender |
US20230421518A1 (en) * | 2022-06-23 | 2023-12-28 | Rovi Guides, Inc. | Systems and methods for a smart message alert and recall |
US11936604B2 (en) | 2016-09-26 | 2024-03-19 | Agari Data, Inc. | Multi-level security analysis and intermediate delivery of an electronic message |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8700072B2 (en) | 2008-12-23 | 2014-04-15 | At&T Mobility Ii Llc | Scalable message fidelity |
US8566403B2 (en) * | 2008-12-23 | 2013-10-22 | At&T Mobility Ii Llc | Message content management system |
US9443226B2 (en) * | 2009-01-12 | 2016-09-13 | Sri International | Electronic assistant for making predictions based on user messages |
US8990315B2 (en) * | 2010-03-09 | 2015-03-24 | International Business Machines Corporation | Sending messages with limited awareness of recipients |
US9406048B2 (en) * | 2010-07-07 | 2016-08-02 | Mark Meister | Email system for preventing inadvertant transmission of propriety message or documents to unintended recipient |
US9171291B2 (en) | 2012-04-26 | 2015-10-27 | Blackberry Limited | Electronic device and method for updating message body content based on recipient changes |
US9406049B2 (en) * | 2012-04-26 | 2016-08-02 | Blackberry Limited | Electronic device and method for updating message recipients based on message body indicators |
EP3028243A1 (en) * | 2013-07-30 | 2016-06-08 | Hewlett Packard Enterprise Development LP | Determining topic relevance of an email thread |
US10171400B2 (en) | 2014-04-28 | 2019-01-01 | International Business Machines Corporation | Using organizational rank to facilitate electronic communication |
US20180089308A1 (en) | 2016-09-27 | 2018-03-29 | International Business Machines Corporation | Notification of potentially problematic textual messages |
US20180262457A1 (en) * | 2017-03-09 | 2018-09-13 | Microsoft Technology Licensing, Llc | Self-debugging of electronic message bugs |
US10645044B2 (en) | 2017-03-24 | 2020-05-05 | International Business Machines Corporation | Document processing |
US10803250B2 (en) * | 2018-08-23 | 2020-10-13 | International Business Machines Corporation | Control of message transmission |
KR20200066933A (en) * | 2018-12-03 | 2020-06-11 | 삼성전자주식회사 | Electronic device and Method of controlling thereof |
US11190470B2 (en) | 2019-02-27 | 2021-11-30 | International Business Machines Corporation | Attachment analytics for electronic communications |
US10965624B2 (en) * | 2019-04-25 | 2021-03-30 | Microsoft Technology Licensing, Llc | Targeted auto-response messaging |
US11876769B2 (en) * | 2020-06-17 | 2024-01-16 | Zafar Khan | System and method for generating recommendations and transforming a message and providing a redacted reply service |
US11665125B2 (en) | 2020-08-26 | 2023-05-30 | International Business Machines Corporation | Message renotification |
US20220131896A1 (en) * | 2020-10-26 | 2022-04-28 | Mcafee, Llc | Contextual Data Security |
US11916865B1 (en) | 2022-03-17 | 2024-02-27 | TagInbox Corporation | Methods and systems for organizing and managing electronic messages |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040103162A1 (en) * | 1999-06-28 | 2004-05-27 | Mark Meister | E-mail system with user send authorization |
US20050278430A1 (en) * | 2004-05-28 | 2005-12-15 | International Business Machines Corp. | Warning and avoidance of sending email messages to unintended recipients |
US20060026246A1 (en) * | 2004-07-08 | 2006-02-02 | Fukuhara Keith T | System and method for authorizing delivery of E-mail and reducing spam |
US20060031338A1 (en) * | 2004-08-09 | 2006-02-09 | Microsoft Corporation | Challenge response systems |
US20060047766A1 (en) * | 2004-08-30 | 2006-03-02 | Squareanswer, Inc. | Controlling transmission of email |
US20090177617A1 (en) * | 2008-01-03 | 2009-07-09 | Apple Inc. | Systems, methods and apparatus for providing unread message alerts |
US20090210504A1 (en) * | 2008-02-14 | 2009-08-20 | Gary Stephen Shuster | Erroneous addressing prevention for electronic messaging |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2490475A1 (en) * | 2002-06-25 | 2003-12-31 | Abs Software Partners Llc | System and method for online monitoring of and interaction with chat and instant messaging participants |
US20090228583A1 (en) * | 2008-03-07 | 2009-09-10 | Oqo, Inc. | Checking electronic messages for compliance with user intent |
-
2008
- 2008-03-07 US US12/044,892 patent/US20090228583A1/en not_active Abandoned
-
2010
- 2010-04-08 US US12/756,435 patent/US9141940B2/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040103162A1 (en) * | 1999-06-28 | 2004-05-27 | Mark Meister | E-mail system with user send authorization |
US20050278430A1 (en) * | 2004-05-28 | 2005-12-15 | International Business Machines Corp. | Warning and avoidance of sending email messages to unintended recipients |
US20060026246A1 (en) * | 2004-07-08 | 2006-02-02 | Fukuhara Keith T | System and method for authorizing delivery of E-mail and reducing spam |
US20060031338A1 (en) * | 2004-08-09 | 2006-02-09 | Microsoft Corporation | Challenge response systems |
US20060047766A1 (en) * | 2004-08-30 | 2006-03-02 | Squareanswer, Inc. | Controlling transmission of email |
US20090177617A1 (en) * | 2008-01-03 | 2009-07-09 | Apple Inc. | Systems, methods and apparatus for providing unread message alerts |
US20090210504A1 (en) * | 2008-02-14 | 2009-08-20 | Gary Stephen Shuster | Erroneous addressing prevention for electronic messaging |
Cited By (81)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100198931A1 (en) * | 2008-03-07 | 2010-08-05 | Richard Pocklington | Checking electronic messages for compliance with user intent |
US9141940B2 (en) * | 2008-03-07 | 2015-09-22 | Google Inc. | Checking electronic messages for compliance with user intent |
US10171404B2 (en) * | 2008-09-27 | 2019-01-01 | International Business Machines Corporation | Reply to most recent message |
US20100115033A1 (en) * | 2008-10-30 | 2010-05-06 | Microsoft Corporation | Do not disturb filter for electronic messages |
US7996476B2 (en) * | 2008-10-30 | 2011-08-09 | Microsoft Corporation | Do not disturb filter for electronic messages |
US20100122340A1 (en) * | 2008-11-13 | 2010-05-13 | Palo Alto Research Center Incorporated | Enterprise password reset |
US8881266B2 (en) * | 2008-11-13 | 2014-11-04 | Palo Alto Research Center Incorporated | Enterprise password reset |
US8359359B2 (en) * | 2008-12-26 | 2013-01-22 | International Business Machines Corporation | Device, method, and computer program product for supporting creation of reply mail |
US20100169445A1 (en) * | 2008-12-26 | 2010-07-01 | International Business Machines Corporation | Device, method, and computer program product for supporting creation of reply mail |
US8661087B2 (en) | 2009-07-24 | 2014-02-25 | Google Inc. | Electronic communication reminder technology |
US8352561B1 (en) | 2009-07-24 | 2013-01-08 | Google Inc. | Electronic communication reminder technology |
US8224917B1 (en) | 2009-07-24 | 2012-07-17 | Google Inc. | Electronic communication reminder technology |
US7921174B1 (en) * | 2009-07-24 | 2011-04-05 | Jason Adam Denise | Electronic communication reminder technology |
US8046418B1 (en) | 2009-07-24 | 2011-10-25 | Jason Adam Denise | Electronic communication reminder technology |
US9137181B2 (en) | 2009-07-24 | 2015-09-15 | Google Inc. | Electronic communication reminder technology |
US8768846B2 (en) * | 2009-08-27 | 2014-07-01 | International Business Machines Corporation | System, method, and apparatus for management of media objects |
US20110055175A1 (en) * | 2009-08-27 | 2011-03-03 | International Business Machines | System, method, and apparatus for management of media objects |
WO2012005804A1 (en) * | 2010-07-09 | 2012-01-12 | Bank Of America Corporation | Monitoring communications |
US8832049B2 (en) | 2010-07-09 | 2014-09-09 | Bank Of America Corporation | Monitoring communications |
US10984387B2 (en) | 2011-06-28 | 2021-04-20 | Microsoft Technology Licensing, Llc | Automatic task extraction and calendar entry |
US20130191898A1 (en) * | 2012-01-04 | 2013-07-25 | Harold H. KRAFT | Identity verification credential with continuous verification and intention-based authentication systems and methods |
US9547832B2 (en) * | 2012-01-10 | 2017-01-17 | Oracle International Corporation | Identifying individual intentions and determining responses to individual intentions |
US20130179440A1 (en) * | 2012-01-10 | 2013-07-11 | Merlyn GORDON | Identifying individual intentions and determining responses to individual intentions |
US10129194B1 (en) | 2012-02-13 | 2018-11-13 | ZapFraud, Inc. | Tertiary classification of communications |
US10581780B1 (en) | 2012-02-13 | 2020-03-03 | ZapFraud, Inc. | Tertiary classification of communications |
US10129195B1 (en) | 2012-02-13 | 2018-11-13 | ZapFraud, Inc. | Tertiary classification of communications |
US10812427B2 (en) * | 2012-07-05 | 2020-10-20 | Microsoft Technology Licensing, Llc | Forgotten attachment detection |
US9843544B2 (en) * | 2012-07-05 | 2017-12-12 | Microsoft Technology Licensing, Llc | Forgotten attachment detection |
US20150081824A1 (en) * | 2012-07-05 | 2015-03-19 | Microsoft Technology Licensing, Llc. | Forgotten Attachment Detection |
US20180102998A1 (en) * | 2012-07-05 | 2018-04-12 | Microsoft Technology Licensing, Llc | Forgotten attachment detection |
US20150304261A1 (en) * | 2012-11-30 | 2015-10-22 | Conversepoint Llc | Systems and methods for echoing or redirecting electronic messages in a conversation |
US10609073B2 (en) | 2013-09-16 | 2020-03-31 | ZapFraud, Inc. | Detecting phishing attempts |
US11729211B2 (en) | 2013-09-16 | 2023-08-15 | ZapFraud, Inc. | Detecting phishing attempts |
US10277628B1 (en) | 2013-09-16 | 2019-04-30 | ZapFraud, Inc. | Detecting phishing attempts |
US10674009B1 (en) | 2013-11-07 | 2020-06-02 | Rightquestion, Llc | Validating automatic number identification data |
US11856132B2 (en) | 2013-11-07 | 2023-12-26 | Rightquestion, Llc | Validating automatic number identification data |
US11005989B1 (en) | 2013-11-07 | 2021-05-11 | Rightquestion, Llc | Validating automatic number identification data |
US10694029B1 (en) | 2013-11-07 | 2020-06-23 | Rightquestion, Llc | Validating automatic number identification data |
US11876760B2 (en) | 2013-12-31 | 2024-01-16 | Google Llc | Determining strength of association between user contacts |
US11411894B2 (en) * | 2013-12-31 | 2022-08-09 | Google Llc | Determining strength of association between user contacts |
US10805409B1 (en) | 2015-02-10 | 2020-10-13 | Open Invention Network Llc | Location based notifications |
US11245771B1 (en) | 2015-02-10 | 2022-02-08 | Open Invention Network Llc | Location based notifications |
US9912618B2 (en) * | 2015-03-10 | 2018-03-06 | International Business Machines Corporation | Allow hidden and silent observers in a group conversation |
US9948581B2 (en) | 2015-03-10 | 2018-04-17 | International Business Machines Corporation | Allow hidden and silent observers in a group conversation |
US20160269452A1 (en) * | 2015-03-10 | 2016-09-15 | International Business Machines Corporation | Allow hidden and silent observers in a group conversation |
US10353542B2 (en) * | 2015-04-02 | 2019-07-16 | Facebook, Inc. | Techniques for context sensitive illustrated graphical user interface elements |
US11644953B2 (en) | 2015-04-02 | 2023-05-09 | Meta Platforms, Inc. | Techniques for context sensitive illustrated graphical user interface elements |
US11221736B2 (en) | 2015-04-02 | 2022-01-11 | Facebook, Inc. | Techniques for context sensitive illustrated graphical user interface elements |
US10361981B2 (en) | 2015-05-15 | 2019-07-23 | Microsoft Technology Licensing, Llc | Automatic extraction of commitments and requests from communications and content |
US10740573B2 (en) * | 2015-12-23 | 2020-08-11 | Oath Inc. | Method and system for automatic formality classification |
US11669698B2 (en) | 2015-12-23 | 2023-06-06 | Yahoo Assets Llc | Method and system for automatic formality classification |
US20170185591A1 (en) * | 2015-12-23 | 2017-06-29 | Yahoo! Inc. | Method and system for automatic formality classification |
US10721195B2 (en) | 2016-01-26 | 2020-07-21 | ZapFraud, Inc. | Detection of business email compromise |
US11595336B2 (en) | 2016-01-26 | 2023-02-28 | ZapFraud, Inc. | Detecting of business email compromise |
US20180091455A1 (en) * | 2016-09-23 | 2018-03-29 | Microsoft Technology Licensing, Llc. | Recipient verification |
US10560412B2 (en) * | 2016-09-23 | 2020-02-11 | Microsoft Technology Licensing, Llc | Recipient verification |
US10880322B1 (en) | 2016-09-26 | 2020-12-29 | Agari Data, Inc. | Automated tracking of interaction with a resource of a message |
US10805270B2 (en) | 2016-09-26 | 2020-10-13 | Agari Data, Inc. | Mitigating communication risk by verifying a sender of a message |
US11936604B2 (en) | 2016-09-26 | 2024-03-19 | Agari Data, Inc. | Multi-level security analysis and intermediate delivery of an electronic message |
US9847973B1 (en) * | 2016-09-26 | 2017-12-19 | Agari Data, Inc. | Mitigating communication risk by detecting similarity to a trusted message contact |
US10326735B2 (en) | 2016-09-26 | 2019-06-18 | Agari Data, Inc. | Mitigating communication risk by detecting similarity to a trusted message contact |
US10992645B2 (en) | 2016-09-26 | 2021-04-27 | Agari Data, Inc. | Mitigating communication risk by detecting similarity to a trusted message contact |
US11595354B2 (en) | 2016-09-26 | 2023-02-28 | Agari Data, Inc. | Mitigating communication risk by detecting similarity to a trusted message contact |
US11044267B2 (en) | 2016-11-30 | 2021-06-22 | Agari Data, Inc. | Using a measure of influence of sender in determining a security risk associated with an electronic message |
US11722513B2 (en) | 2016-11-30 | 2023-08-08 | Agari Data, Inc. | Using a measure of influence of sender in determining a security risk associated with an electronic message |
US10715543B2 (en) | 2016-11-30 | 2020-07-14 | Agari Data, Inc. | Detecting computer security risk based on previously observed communications |
US10715581B2 (en) * | 2017-01-25 | 2020-07-14 | International Business Machines Corporation | System and method to download file from common recipient devices in proximity |
US11888924B2 (en) | 2017-01-25 | 2024-01-30 | International Business Machines Corporation | System and method to download file from common recipient devices in proximity |
US20180213043A1 (en) * | 2017-01-25 | 2018-07-26 | International Business Machines Corporation | System and method to download file from common recipient devices in proximity |
US11019076B1 (en) | 2017-04-26 | 2021-05-25 | Agari Data, Inc. | Message security assessment using sender identity profiles |
US11722497B2 (en) * | 2017-04-26 | 2023-08-08 | Agari Data, Inc. | Message security assessment using sender identity profiles |
US20210234870A1 (en) * | 2017-04-26 | 2021-07-29 | Agari Data, Inc. | Message security assessment using sender identity profiles |
US10805314B2 (en) | 2017-05-19 | 2020-10-13 | Agari Data, Inc. | Using message context to evaluate security of requested data |
US11102244B1 (en) | 2017-06-07 | 2021-08-24 | Agari Data, Inc. | Automated intelligence gathering |
US11757914B1 (en) | 2017-06-07 | 2023-09-12 | Agari Data, Inc. | Automated responsive message to determine a security risk of a message sender |
US20220138880A1 (en) * | 2018-03-23 | 2022-05-05 | Tingying Zeng | Teaching method system for connecting and applying research needs with a teaching method |
US11245654B2 (en) | 2019-07-02 | 2022-02-08 | International Business Machines Corporation | System and method to create global conversation thread across communication channels |
US11398996B2 (en) * | 2019-07-02 | 2022-07-26 | International Business Machines Corporation | System and method to create global conversation thread across communication channels |
US11373039B2 (en) * | 2019-09-26 | 2022-06-28 | International Business Machines Corporation | Content context aware message intent checker |
US11502976B1 (en) * | 2021-02-18 | 2022-11-15 | Walgreen Co. | Automated agent messaging system |
US20230421518A1 (en) * | 2022-06-23 | 2023-12-28 | Rovi Guides, Inc. | Systems and methods for a smart message alert and recall |
Also Published As
Publication number | Publication date |
---|---|
US9141940B2 (en) | 2015-09-22 |
US20100198931A1 (en) | 2010-08-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9141940B2 (en) | Checking electronic messages for compliance with user intent | |
US10979393B2 (en) | Identity-based messaging security | |
US11902234B2 (en) | Prohibited content propagation using a social network data structure | |
US8769022B2 (en) | System and method for evaluating outbound messages | |
US9058590B2 (en) | Content upload safety tool | |
US8239473B2 (en) | Security classification of e-mail in a web e-mail access client | |
US7774421B2 (en) | Mitigating address book weaknesses that permit the sending of e-mail to wrong addresses | |
JP5406842B2 (en) | E-mail communication pre-send evaluation | |
US20040064734A1 (en) | Electronic message system | |
US20030200267A1 (en) | Email management system | |
US20080162652A1 (en) | System for Applying a Variety of Policies and Actions to Electronic Messages Before they Leave the Control of the Message Originator | |
US20030229672A1 (en) | Enforceable spam identification and reduction system, and method thereof | |
US9032038B2 (en) | Recipient control system for ensuring non-conflicting and comprehensive distribution of digital information and method thereof | |
US9990506B1 (en) | Systems and methods of securing network-accessible peripheral devices | |
US9619664B2 (en) | Systems and methods for handling electronic messages | |
US10764220B1 (en) | Message abuse sender feedback loop | |
JP2006059297A (en) | Wrong transmission preventing device of e-mail | |
US10356034B2 (en) | Electronically processing bounceback messages from communications networks | |
US20100057874A1 (en) | Preventing wrongful transmission of message content | |
WO2022046029A1 (en) | Email recipients determinations | |
AU2014215972B2 (en) | Method of and system for message classification of web email | |
Csirt | RTIR incident handling work-flow | |
US20190199672A1 (en) | Digital messaging prioritization within an organization | |
AU2003205033A1 (en) | Electronic message system | |
KR20040095008A (en) | Method for filtering spam mail using quiz mail |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: OQO, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:POCKLINGTON, RICHARD;BETTS-LACROIX, JONATHAN;REEL/FRAME:021384/0354;SIGNING DATES FROM 20080809 TO 20080811 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: ZETTA RESEARCH, LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OQO (ASSIGNMENT FOR THE BENEFIT OF CREDITORS), LLC;REEL/FRAME:024981/0267 Effective date: 20100203 Owner name: OQO (ASSIGNMENT FOR THE BENEFIT OF CREDITORS), LLC Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OQO, INC.;REEL/FRAME:024981/0193 Effective date: 20090519 |
|
AS | Assignment |
Owner name: GOOGLE INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ZETTA RESEARCH, LLC;REEL/FRAME:025723/0633 Effective date: 20110129 |
|
AS | Assignment |
Owner name: GOOGLE LLC, CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:GOOGLE INC.;REEL/FRAME:044142/0357 Effective date: 20170929 |