US20130031183A1 - Electronic mail processing and publication for shared environments - Google Patents
Electronic mail processing and publication for shared environments Download PDFInfo
- Publication number
- US20130031183A1 US20130031183A1 US13/191,412 US201113191412A US2013031183A1 US 20130031183 A1 US20130031183 A1 US 20130031183A1 US 201113191412 A US201113191412 A US 201113191412A US 2013031183 A1 US2013031183 A1 US 2013031183A1
- Authority
- US
- United States
- Prior art keywords
- electronic message
- shared
- processed
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/42—Mailbox-related aspects, e.g. synchronisation of mailboxes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/0482—Interaction with lists of selectable items, e.g. menus
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/06—Message adaptation to terminal or network requirements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/52—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/40—Support for services or applications
- H04L65/403—Arrangements for multi-party communication, e.g. for conferences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2203/00—Indexing scheme relating to G06F3/00 - G06F3/048
- G06F2203/048—Indexing scheme relating to G06F3/048
- G06F2203/04803—Split screen, i.e. subdividing the display area or the window area into separate subareas
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
- G06F40/205—Parsing
- G06F40/221—Parsing markup language streams
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
Definitions
- the present invention relates generally to computer software, computer program architecture, data and database management, social media, and web applications. More specifically, techniques for electronic mail processing and publication for shared environments are described.
- Electronic messaging is an important function for sharing data with other individuals, organizations, or entities.
- Conventional electronic messaging solutions such as electronic mail (hereafter “email”) applications, servers, and platforms allow users to forward, send, and receive emails.
- email electronic mail
- Some problems associated with conventional solutions do not facilitate searching of emails to locate specific messages or groups of related messages (i.e., “threads”) by a particular topic, but instead rely upon general search or indexing facilities built into conventional electronic messaging solutions, which can be very time consuming for users.
- general search or indexing facilities are typically keyword-based and fail to provide for chronologically-ordered and relevant groupings of emails.
- finding timely specific emails is often important for uses such as auditing, but can be expensive and require specialized computer programs, software, or applications (hereafter “applications”) in order to sift through large volumes of email data.
- emails and data stored or attached to these emails can lead to inefficient techniques for organizing electronic messaging data.
- users are often reliant upon the use of internal file folders or structures that must be created manually into which emails (and attachments) can be classified. Further, once classified or stored, it is time consuming to retrieve an email or share it with other users who may find the data contained within a particular message to be useful or valuable, requiring a user to manually forward the email.
- FIG. 1 illustrates an exemplary system for electronic mail processing and publication for shared environments
- FIG. 2 an exemplary application architecture for electronic mail processing and publication for shared environments
- FIG. 3 illustrates an exemplary shared environment for publication of processed electronic mail messages
- FIG. 4A illustrates a further exemplary shared environment for publication of processed electronic mail messages
- FIG. 4B illustrates an alternative exemplary shared environment for publication of processed electronic mail messages
- FIG. 5 illustrates another exemplary shared environment for publication of processed electronic mail messages
- FIG. 6A illustrates an exemplary process for electronic mail processing and publication for shared environments
- FIG. 6B illustrates an alternative exemplary process for electronic mail processing and publication for shared environments
- FIG. 7 illustrates a further exemplary process for electronic mail processing and publication for shared environments
- FIG. 8 illustrates an exemplary process for transforming email addresses for electronic mail processing and publication for shared environments
- FIG. 9 illustrates an exemplary computer system suitable for electronic mail processing and publication for shared environments.
- the described techniques may be implemented as a computer program or application (“application”) or as a plug-in, module, or sub-component of another application.
- the described techniques may be implemented as software, hardware, firmware, circuitry, or a combination thereof. If implemented as software, the described techniques may be implemented using various types of programming, development, scripting, or formatting languages, frameworks, syntax, applications, protocols, objects, or techniques, including ASP, ASP.net, .Net framework, Ruby, Ruby on Rails, C, Objective C, C++, C#, Adobe® Integrated RuntimeTM (Adobe® AIRTTM), ActionScriptTM, FIexTM, LingoTM, JavaTM, JavascriptTM, Ajax, Perl, COBOL, Fortran, ADA, XML, MXML.
- DBMS Database management systems
- search facilities and platforms web crawlers
- web crawlers i.e., computer programs that automatically or semi-automatically visit, index, archive or copy content from, various websites (hereafter referred to as “crawlers”)
- crawlers i.e., computer programs that automatically or semi-automatically visit, index, archive or copy content from, various websites (hereafter referred to as “crawlers”)
- crawlers i.e., computer programs that automatically or semi-automatically visit, index, archive or copy content from, various websites (hereafter referred to as “crawlers”)
- other features may be implemented using various types of proprietary or open source technologies, including MySQL, Oracle (from Oracle of Redwood Shores, Calif.), Solr and Nutch from The Apache Software Foundation of Forest Hill, Md., among others and without limitation.
- the described techniques may be varied and are not limited to the examples or descriptions provided.
- FIG. 1 illustrates an exemplary system for electronic mail processing and publication for shared environments.
- system 100 includes network 102 , clients 104 - 110 , server 112 , databases 114 - 116 , and website 118 .
- “Elements” may refer to one or more of network 102 , clients 104 - 110 , server 112 , databases 114 - 116 , and website 118 shown in association with system 100 .
- the type, quantity, configuration, topology, and other characteristics are provided for purposes of illustration only and may be varied beyond the examples shown and provided.
- network 102 may be any type of data network including, without limitation, a local area network (LAN), wide area network (WAN), municipal area network (MAN), wireless local area network (WLAN), computing cloud, or any other type of aggregation of computing, networking, storage, or processing resources.
- clients 104 - 110 may be implemented as a desktop computer (e.g. client 104 ), mobile communication (i.e., voice and data) device (e.g., client 106 ), mobile computing device (e.g., client 108 ), or notebook or laptop (i.e. portable) computing device (client 110 ).
- Each of clients 104 - 110 may be in data communication with server 112 using network 102 .
- server 112 may be a web, application, email, or other type of server, without limitation.
- Databases 114 - 116 may be directly or indirectly in data communication with server 112 , which may be implemented as described above to perform one or more applications, deliver services or resources to clients 104 - 110 , execute or compile applications, or otherwise provide any type of processing capability or facility, without limitation.
- Data associated with the techniques described herein may be stored in one or both of databases 114 - 116 .
- data may also be stored in embedded memory, of any type, with server 112 or any of clients 104 - 110 .
- data may be stored and retrieved by server 112 or any of clients 104 - 110 from any of databases 114 - 116 without limitation as to any given database schema or structure.
- an email may be transmitted to a “shared destination,” which may be an email server (e.g., server 112 ), email account, or other resource that is configured to accept email messages sent using messaging protocols such as Simple Mail Transfer Protocol (hereafter “SMTP”) and received using other protocols such as Internet Message Access Protocol (hereafter “IMAP”) or Post Office Protocol (hereafter “POP”), among others.
- email receipt may be indicated automatically or semi-automatically to server 112 .
- received emails sent to an email account or client may be retrieved periodically based on a set or irregular schedule.
- an application hosted and running on server 112 may be configured to retrieve emails for further processing, as described below, on a set schedule (e.g., every 1, 5, 30, 60 minutes, or the like).
- emails may be retrieved from an email account or shared destination.
- emails may be stored in database 114 and/or 116 and processed further to generated processed messages for posting to a shared environment (e.g., website 118 ).
- a shared environment e.g., website 118
- an email account to which emails are sent for posting in a shared environment may be referred to as a “shared destination.”
- a shared destination may be, in some examples, an email account hosted on server 112 that is configured to receive emails sent from various sources and intended for posting to a given website (e.g., website 118 ).
- Data associated with emails sent to a shared destination may be stored in database 114 or, in other examples, remotely stored in database 116 .
- website 118 may be described as a “shared environment” or facility to which data, information, or other content may be posted or published.
- posting or “publication” may be used interchangeably and are intended to refer to the format, transmission, upload, design, layout, and other parameters of content manipulated relative to a given environment (e.g. website 118 , among others).
- website 118 may be a website at which emails, attachments, data, information, or other types of content may be viewed, retrieved, posted, or deleted, without limitation.
- system 100 and the above-described elements may be varied in function, structure, configuration, topology, quantity, type, or other aspects and are not limited to the examples shown.
- FIG. 2 an exemplary application architecture for electronic mail processing and publication for shared environments.
- application 200 includes bus 202 , logic module 204 , database 206 , retrieval module 208 , XML engine 210 , email processing engine 212 , security module 214 , and posting module 216 .
- bus 202 may be implemented as any type of data communication bus for transferring data between any of logic module 204 , database 206 , retrieval module 208 .
- XML engine 210 , email processing engine 212 , security module 214 , and posting module 216 without limitation to any given type, configuration, capacity, rating, or other characteristic.
- application 200 and the elements described herein may be implemented as hardware, software, firmware, circuitry, or a combination thereof and are not limited to any specific application structure or formatting, scripting, or programming language.
- logic module 204 may be configured to provide command and/or control signals, instructions, and functions to direct one or more of database 206 , retrieval module 208 , XML engine 210 , email processing engine 212 , security module 214 , and posting module 216 .
- Logic module 204 may direct retrieval module 208 to identify, locate, and retrieve emails sent to a shared destination (e.g., IMAP or POP email account).
- Logic module 204 may also be configured to process retrieved emails to generate processed messages (i.e., retrieved emails that have been processed by email processing engine 212 ) for posting or publication in a shared environment (e.g., website 118 ( FIG.
- logic module 204 may be configured to evaluate retrieved emails to determine whether a security threat (e.g., malicious software (hereafter “malware”), spyware (i.e., malware intended to passively gather data and information from a host operating system, computer, or application), cross site scripting, and others.
- a security threat e.g., malicious software (hereafter “malware”), spyware (i.e., malware intended to passively gather data and information from a host operating system, computer, or application), cross site scripting, and others.
- Security module 214 may be implemented using various types of security software, firmware, or hardware, such as intrusion detection and prevention systems, anti-virus, or others, without limitation, that are intended to detect whether an email to be processed by email processing engine 212 is a security threat that, once posted to a shared environment (e.g., website 118 ) may be accessible and pose a security risk to other clients.
- security software firmware, or hardware, such as intrusion detection and prevention systems, anti-virus, or others, without limitation, that are intended to detect whether an email to be processed by email processing engine 212 is a security threat that, once posted to a shared environment (e.g., website 118 ) may be accessible and pose a security risk to other clients.
- data may be stored in database 206 using any type of database, database schema, or storage mechanism, without limitation, including storage area networks (hereafter “SAN”), network attached storage (hereafter “NAS”), cloud storage, or the like.
- SAN storage area networks
- NAS network attached storage
- retrieved emails may be stored using various types of markup and formatting languages such as XML and others.
- XML engine 210 is an example of a type of facility or resource that may be used to evaluate, format, and generate XML-formatted data to be stored, for example, in database 206 or, as another example, to be processed for posting to a shared environment (e.g., website 118 ) by email processing engine 212 and posting module 216 .
- application 200 may be implemented in any type of application environment, distributed or otherwise, using one or more application servers, computers, or computing platforms from which to host.
- application 200 and the above-described elements may be varied in function, structure, format, language, configuration, or other aspects and are not limited to any specific implementation.
- FIG. 3 illustrates an exemplary shared environment for publication of processed electronic mail messages.
- window 300 includes shared environment 302 , title tag 304 , process messages 306 , sitemap link 308 , sort window 310 , pulldown menu 312 , and search field 314 .
- window 300 may be representative of a graphical user interface display that is presented by website 118 ( FIG. 1 ).
- shared environment 302 may be a graphical display environment in which processed messages may be displayed and reviewed.
- emails may be listed and displayed based on, for example, popularity (e.g.
- title tag 304 may be a descriptive title or categorical reference associated with a given email and other emails that are contextually or thematically related.
- title tag 305 may use a format such as “ ⁇ subject line of email>
- a header tag e.g., H1 tag
- the content, data, or information contained may be used to enhance search engine optimization to allow other users to find and retrieve processed messages 306 .
- processed messages 306 can be improved for SEO, facilitating searches performed for various topics, themes, keywords, or emails.
- the quantity of processed messages may be set to a discrete number per page (e.g., 10 per page, 100, 1000, customizable, user-specified, system-specified, rules-based, and others).
- a web i.e., the World Wide Web (hereafter “web”)
- processed messages 306 may be sorted based on criteria specified in sort window 310 by using pulldown menu 312 .
- criteria such as “Newest,” “Trending Now,” “Most Popular Today,” “Most Popular Past Week,” and “Most Popular Past Month” may be chosen in order to sort processed messages 306 .
- a criterion may cause processed shared environment 302 to be rendered such that the order is determined based on the selected criteria.
- posted emails may be ranked using various techniques and, as an example, identified using the “Trending Now” feature. For example, posted emails may be ranked based on determining the number of users to which the posted email has been forwarded (e.g., if a posted email has been forwarded previously multiple times to an aggregate pool of 20 recipients, a quantitative rank may be assigned using various techniques, including assigning a weighted or unweighted ranking value based on the number of recipients (e.g., in the example above, 20)). In other examples, rankings may be performed differently using various techniques or algorithms, without limitation.
- an “activity stream” or other type of feed or data stream may be created in which one or more posted emails, replies, comments, votes, rankings, or other activities occurring may be posted generally for users to view (in some contexts such as within corporate enterprises, this and other features may be suppressed in order to confine the applicability of the described techniques to prescribed enterprise purposes).
- users may opt-in and subscribe to an activity stream in order to ensure that those users who do not elect to receive updates as to activity are not receiving unwanted notifications.
- processed messages 306 may be sorted or displayed differently and are not limited to those shown and described.
- processed messages 306 may also be searched using a facility that has an interface such as search field 314 to permit the entry of keywords or other items that may be used to select the appearance of processed messages 306 .
- a search of processed messages 306 may be used to find email content (i.e., content, data, information, media, rich media, text, or the like) from a given pool of emails posted to shared environment 302 .
- emails may be made “anonymous” (i.e., remove identifying information such as email addresses) in order to protect user privacy, as described in greater detail below in connection with FIG. 5 .
- each of processed messages 306 may be treated like an individual post that, when selected, is hyperlinked to another page where related emails of the same topic may be listed, as described below in connection with FIGS. 4A-4B .
- shared environment 302 can be provided as a destination website (e.g. website 118 ) that enables the entry or submission of email content for various types of purposes (e.g., interest, humor, amusement, fun, business, enterprise/corporate, collaborative work sharing, and others, without limitation).
- Email content may be submitted using shared environment 302 to permit other users to enter comments or submit other emails related to a given topic or original email (i.e., threading), as indicated by title topic 304 .
- Each email submitted may be processed by email processing engine 212 ( FIG. 2 ) to be generated into a processed message and posted as part of a thread.
- users can view emails associated with topics of various types of interests.
- emails may be submitted for collective sharing and collaborative input by other members of the same organization.
- security module 214 FIG. 2
- shared environment 302 may be used as a forum for the sharing of email content that does not require the manual formatting of email content for posting.
- a user having an account recorded in one or both of databases 114 - 116 may forward or send emails to a service hosted by server 112 , which may be processed by email processing engine 212 (as described in greater detail below in connection with FIG. 5 ) and posted to shared environment 302 .
- email processing engine 212 as described in greater detail below in connection with FIG. 5
- shared environment 302 Once made available to a community (e.g., public, closed, non-public, corporate, enterprise, and the like) of users, other emails may be posted directly to shared environment 302 .
- sitemap link 308 may be used to hyperlink (i.e., linking (i.e. pointing a web browsing application to another address and retrieving and displaying content from that location) to another page of website 118 ) to another page of website 118 to retrieve and view information associated with posts (i.e. publications) of processed messages to shared environment 302 .
- sitemap link 308 by interacting with sitemap link 308 , another web page is rendered that displays a list of processed messages classified by the month and year (i.e., posting date). Each entry of the list of processed messages (not shown) may be hyperlinked to another page that, when invoked, displays another page listing subject lines of individual posted processed messages and an excerpt of the related email.
- the subject lines may also be hyperlinked to the complete post, which is displayed when the links are invoked.
- the above-described examples may be varied in function, structure, format, language, configuration, or other aspects and are not limited to any specific implementation.
- FIG. 4A illustrates a further exemplary shared environment for publication of processed electronic mail messages.
- window 400 includes shared environment 402 , title tag 404 , processed messages 406 , attachment icon 408 , and threaded messages 410 .
- a hyperlink associated with one of processed messages 306 FIG. 3
- another web page may be rendered similarly to that presented in window 400 .
- a processed message and related processed messages may be presented in shared environment 402 .
- a selected processed message may be indicated by title tag 404 and subsequent processed messages submitted in response or in relation to title tag 404 may be presented as a thread, as shown by processed messages 406 .
- one or more of processed messages 406 may have an attachment (i.e., an attached file, document, image, or other data or information), which may be indicated using, for example, attachment icon 408 .
- attachment icon 408 may be hyperlinked to enable downloading, opening, viewing, or otherwise interacting with an attachment when a mouse pointer of other human computing interface (i.e., “HCI”) or input or input-output device is used to select (i.e., invoke) attachment icon 408 .
- other emails may be submitted for generation of additional processed messages as extended threads, as shown by threaded messages 410 .
- each of processed messages 406 may be hyperlinked and, when invoked, may initiate the instantiation and rendering of another window that displays data, information, or other content associated with the selected processed message.
- a selected processed message may be configured to direct a web browsing application (not shown) to an address that is associated with another web page that presents content such as the original email of the processed message selected.
- Some data, information, or content may also be modified in the new window (not shown) in order to provide data security, prevent unauthorized access, or perform other functions that would be beneficial to a collaborative data sharing environment such as shared environment 402 .
- window and shared environment 402 may be implemented differently in layout, design, function, structure, features, or other aspects and are not limited to those shown and provided.
- FIG. 4B illustrates an alternative exemplary shared environment for publication of processed electronic mail messages.
- window 400 includes shared environment 402 , sections 420 - 430 , data 432 - 434 , and button 436 .
- window 400 may be implemented as a graphical user interface such as that associated with a web browser or other web browsing application. As shown window 400 may be configured to present a page that displays several different functions or structures.
- section 420 may be implemented to present the number of votes associated with a given email that is submitted and posted, as indicated by data 432 (e.g., “Subject of email,” which may be identified from a processed email), data 434 (e.g., “time of post,” which may also be posted from a processed email), section 422 (e.g., the body of the email, section 426 (e.g., identification of a posting user based on an “anonymized” email address or other user name (e.g., “user xyz,” which may be hyperlinked to another page that provides one or more details associated with a given user.
- a user may “claim” ownership of a given email by creating a user account, such as that described herein, associated with the sending email address of the posted email.
- any email that is posted in window 400 may also include information associated with the number of votes received by other users (e.g., section 420 ), comments from one or more other users, which may also include replies to comments from the posting email sender (e.g., section 424 ), people indicating their “like” (or in some examples, dislike (not shown)) of the posted email (e.g., section 428 ), or related information or data (e.g., other posts that may be related contextually, thematically, by sender, by topic, and others, without limitation) associated with the given posted email (e.g., section 430 ).
- information or data e.g., other posts that may be related contextually, thematically, by sender, by topic, and others, without limitation
- users may vote for various purposes, including expressing their like, dislike, favor, disfavor, or other action or expression associated with a given posted email. Still further, if a given reader (i.e., user) likes the posted email, she may elect to share the post with another user by using an interactive feature or function such as button 436 that may open another window (not shown), field (not shown), interface (not shown), or the like that permits entry of another user's identifying information (e.g., email address, user name, or the like) in order to share the posted content.
- third party applications such as Facebook. Inc.
- the described techniques may be coupled to an application implementing the described techniques (including, but not limited to window 400 ) enabling users (e.g., user xyz) to share the posted content with other users using the third party application (e.g., Facebook, Twitter (as developed by Twitter, Inc. of San Francisco, Calif.), blogs, and other online applications, social media, media, or the like, without limitation).
- the third party application e.g., Facebook, Twitter (as developed by Twitter, Inc. of San Francisco, Calif.), blogs, and other online applications, social media, media, or the like, without limitation.
- users may not have an account with other social media business, websites, or the like.
- the described techniques enable users to post content (e.g., mails) and share them with other users through, for example, an application programming interface (API) to these other websites using posting module 216 ( FIG. 2 ).
- API application programming interface
- users may also have accounts with third party websites and features may be included to enable these users to share content using the described techniques.
- the described techniques may be implemented as a service apart from various types of content or social media or entertainment websites, but enable users to share, send, forward, reply to, retrieve, or perform other functions associated with posted emails without requiring the creation of user accounts.
- the techniques described herein may be used by individual or organizations such as corporate enterprises.
- a corporate enterprise may use the described techniques in order to provide a closed or private (e.g., corporate or in-enterprise) forum or enterprise for its employees to share email content in a collaborative manner.
- corporate employees may post emails using their corporate email addresses.
- corporate employees may post emails using assigned or self-identified user names that mask an individual email address in order to prevent unwanted responsive email or comments to the posted content.
- by posting emails using the described techniques various individuals or stakeholders within a corporate organization may be placed on a notice of a given user's posted email without requiring the user to individually and specifically identify various addressees.
- the described techniques aid in eliminating time and labor-intensive email creation efforts that corporate users often must undergo in order to notify supervisors, managers, executives, co-workers, project team members, and the like.
- posted email subject lines may be used to initiate a discussion forum associated with the given subject. For example, if a subject line states “Sales Contract,” the subject line may render the posted email and associated content (e.g., FIG. 4B ) available to a user when constructing an email, regardless of whether the user is the original author of the email.
- window and shared environment 402 may be implemented differently in layout, design, function, structure, features, or other aspects and are not limited to those shown and provided.
- FIG. 5 illustrates another exemplary shared environment for publication of processed electronic mail messages.
- window 500 includes shared environment 502 , title tag 504 , processed message content 506 , comment function 508 , share function 510 , flag function 512 , like function 514 , do not like function 516 , and plug-in function 518 .
- the quantity, type, function, structure, or other aspects of window 500 and the elements shown may be varied and are not limited to those presented, which are provided for purposes of exemplary explanation.
- a web browsing application or other type of client interface may be opened in window 500 , displaying processed message content 506 and indicating it is related to the selected processed message by title tag 504
- shared environment 502 may be designed and implemented to provide one or more functions that may be used in connection with processed message content 506 .
- a comment may be entered in association with processed message content 506 by interacting with comment function 508 , which may be implemented as a button or link.
- comment function 508 may be configured to open a field, form, or altogether new web page in which a user may enter a subsequent comment using a variety of formats.
- share function 510 may be used to share processed message content 506 with another user by, for example, mailing or using text-based messages via simple messaging service (i.e. “SMS”) or another format or protocol.
- SMS simple messaging service
- processed message content 506 may also be “flagged” or indicated as being inappropriate, undesirable, copied, or otherwise by invoking flag function 512 .
- Other functions that may be invoked include like function 514 and do not like function 516 .
- plug-in function 518 may be invoked to connect, couple, distribute, publish, send, re-send, or perform other functions associated with a third-party website or service.
- social media websites that permit user posting of data may provide an application programming interface (“API”) that may be used to feed content in a given format for posting or publication.
- API application programming interface
- processed message content 506 may be posted to other shared environments such as Facebook (as developed by Facebook, Inc. of Palo Alto, Calif.), LinkedIn (as developed by LinkedIn, Inc. of Mountain View, Calif.), and many other social media-related services, sites, and destinations.
- window 500 and the above-described elements may be implemented differently in layout, design, function, structure, features, or other aspects and are not limited to those shown and provided.
- FIG. 6A illustrates an exemplary process for electronic mail processing and publication for shared environments.
- process 600 starts by evaluating one or more data packets associated with an email that is received at a shared destination such as an email account or server ( 602 ). Upon detecting, based upon the evaluation of data packets to determine whether mail has been received (using either an IMAP or POP-based protocol), the received email is retrieved ( 604 ). Once retrieved, the email is processed to generate a processed message, such as that described above in connection with FIGS. 3-5 ( 606 ). Once processed, a processed message is posted to a shared environment such as website 118 ( FIG. 1 ) ( 608 ).
- a shared environment such as website 118 ( FIG. 1 ) ( 608 ).
- data may be analyzed using various techniques.
- data packets may be evaluated by analyzing a given domain associated with the sending email address.
- a corporate enterprise may have a given domain (e.g., company.com) that is evaluated in order to provide message visibility to other users having the same domain. This may be implemented in order to provide a service to users and/or accounts within the given domain in order to prevent access to information or data.
- the above-described process may be varied in the implementation, order, function, or structure of each or all steps and is not limited to those provided.
- FIG. 6B illustrates an alternative exemplary process for electronic mail processing and publication for shared environments.
- process 610 begins by processing an email submitted using the described techniques by removing email headers, which may include one or more email addresses (e.g., sender, destination, intermediate (i.e., email addresses found within a thread of emails such as a forward or chain of multiple replies, and the like) ( 612 ).
- email addresses e.g., sender, destination, intermediate (i.e., email addresses found within a thread of emails such as a forward or chain of multiple replies, and the like
- source-identifying information such as email addresses may be removed.
- a received email may be processed for privacy reasons by parsing data associated with the posted email.
- the email address may be stored along with any non-message data, which may include attachments or embedded images of any kind or format ( 614 ).
- Non-message data may also be identified as any type of information or data that is not related to the message body.
- non-message data may be any data that is not found within the payload of a message body.
- data to be stored in a database e.g., database 206 ( FIG. 2 ) may be determined differently.
- the email address is then processed to identify any email addresses within the header or the body, which may be stored as fields or records associated with the sending email address in a database ( 616 ).
- a determination is made as to whether the email being processed is in HTML (i.e., Hyper Text Markup Language) or an HTML-based format ( 618 ).
- the email being processed is in HTML or an HTML-based format (e.g., XHTML, DHTML, XML, and others, without limitation)
- security threats e.g., virus, malware, spyware, cross-site scripting, and others, without limitation
- a check may be performed to determine whether the email being processed was previously processed ( 622 ). If the email was not previously processed, a new post with the email should be created ( 624 ). If the email was previously processed, in some examples, a vote count associated with the email may be incremented or increased. In other examples, the above-described process may be performed or implemented differently in steps, order, function, or other aspects, without limitation to those provided.
- FIG. 7 illustrates a further exemplary process for electronic mail processing and publication for shared environments.
- process 700 may be implemented.
- process 700 starts by storing a copy of a retrieved email and recording the email address of the sending account or client ( 702 ).
- database 114 and/or 116 FIG. 1
- the retrieved email is evaluated to identify whether there are email addresses within the header or body (i.e., payload) data of the email ( 704 ).
- a determination is made as to whether any email addresses are identified ( 706 ). If an email address is identified in either the header or body of the retrieved email, then the identified email addresses are transformed, which is described in greater detail below in connection with FIG. 8 ( 708 ).
- the retrieved email is further processed by evaluating the format of the email to determine whether it is in an HTML-based format ( 710 ). A determination is made as to whether the retrieved email is in an HTML-based format ( 712 ). If the email is in an HTML-based format, then it is further evaluated for security threats such as cross site scripting and others as described above ( 714 ). A determination is made as to whether a security threat is present ( 716 ). If a security threat is identified, then the retrieved email is purged and not stored in database 114 and/or 116 ( 718 ). In other examples, an alert message or other warning may be sent to the user of system 100 ( FIG.
- a processed message is generated using the transformed email addresses ( 720 ). After generating a processed message, it may be posted to a shared environment (e.g., website 118 or shared environments 302 ( FIG. 3 ), 402 ( FIG. 4 ), or 502 ( FIG. 5 )) ( 722 ).
- a shared environment e.g., website 118 or shared environments 302 ( FIG. 3 ), 402 ( FIG. 4 ), or 502 ( FIG. 5 )
- the above-described process may be varied in the implementation, order, function, or structure of each or all steps and is not limited to those provided.
- FIG. 8 illustrates an exemplary process for transforming email addresses for electronic mail processing and publication for shared environments.
- process 800 beings by marking or otherwise indicating a top-level domain (hereafter “TLD”) associated with the email in order to prevent modification (i.e., transformation) as described herein ( 802 ).
- TLD top-level domain
- FIG. 8 illustrates an exemplary process for transforming email addresses for electronic mail processing and publication for shared environments.
- process 800 beings by marking or otherwise indicating a top-level domain (hereafter “TLD”) associated with the email in order to prevent modification (i.e., transformation) as described herein ( 802 ).
- TLD top-level domain
- an email address “joe@smith.com” may be transformed by marking the “.com” for non-modification and replacing “joe@smith” with unidentifiable characters such as “xxx@xxxxx”.
- the email address in the example above may be transformed from “joe@smith.com” to xxx@xxxxx.com.”
- the process then returns to step 710 ( FIG. 7 ) to continue processing for generating a processed message ( 806 ).
- the above-described process may be varied in the implementation, order, function, or structure of each or all steps and is not limited to those provided.
- FIG. 9 illustrates an exemplary computer system suitable for electronic mail processing and publication for shared environments.
- computer system 900 may be used to implement computer programs, applications, methods, processes, or other software to perform the above-described techniques.
- Computer system 900 includes a bus 902 or other communication mechanism for communicating information, which interconnects subsystems and devices, such as processor 904 , system memory 906 (e.g., RAM), storage device 908 (e.g., ROM), disk drive 910 (e.g., magnetic or optical), communication interface 912 (e.g., modem or Ethernet card), display 914 (e.g., CRT or LCD), input device 916 (e.g. keyboard), and cursor control 918 (e.g., mouse or trackball).
- processor 904 system memory 906 (e.g., RAM), storage device 908 (e.g., ROM), disk drive 910 (e.g., magnetic or optical), communication interface 912 (e.g., modem or Ethernet card), display 914 (e.g
- computer system 900 performs specific operations by processor 904 executing one or more sequences of one or more instructions stored in system memory 906 .
- Such instructions may be read into system memory 906 from another computer readable medium, such as static storage device 908 or disk drive 910 .
- static storage device 908 or disk drive 910 may be used in place of or in combination with software instructions for implementation.
- Non-volatile media includes, for example, optical or magnetic disks, such as disk drive 910 .
- Volatile media includes dynamic memory, such as system memory 906 .
- Computer readable media includes, for example, floppy disk, flexible disk, hard disk, magnetic tape, any other magnetic medium, CD-ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, RAM, PROM, EPROM, FLASH-EPROM, any other memory chip or cartridge, or any other medium from which a computer can read.
- Transmission medium may include any tangible or intangible medium that is capable of storing, encoding or carrying instructions for execution by the machine, and includes digital or analog communications signals or other intangible medium to facilitate communication of such instructions.
- Transmission media includes coaxial cables, copper wire, and fiber optics, including wires that comprise bus 902 for transmitting a computer data signal.
- execution of the sequences of instructions may be performed by a single computer system 900 .
- two or more computer systems 900 coupled by communication link 920 may perform the sequence of instructions in coordination with one another.
- Computer system 900 may transmit and receive messages, data, and instructions, including program, i.e., application code, through communication link 920 and communication interface 912 .
- Received program code may be executed by processor 904 as it is received, and/or stored in disk drive 910 , or other non-volatile storage for later execution.
Abstract
Techniques for electronic mail processing and publication for shared environments are described, including evaluating a data packet indicating receipt of an electronic message at a shared destination, retrieving the electronic message from the shared destination, processing the electronic message to generate a processed message configured to be posted to a shared environment, and posting the processed message to the shared environment.
Description
- The present invention relates generally to computer software, computer program architecture, data and database management, social media, and web applications. More specifically, techniques for electronic mail processing and publication for shared environments are described.
- Electronic messaging is an important function for sharing data with other individuals, organizations, or entities. Conventional electronic messaging solutions such as electronic mail (hereafter “email”) applications, servers, and platforms allow users to forward, send, and receive emails. However, due to large amounts of information and data transferred using email, there are significant problems associated with conventional solutions that create substantial time and cost inefficiencies.
- Some problems associated with conventional solutions do not facilitate searching of emails to locate specific messages or groups of related messages (i.e., “threads”) by a particular topic, but instead rely upon general search or indexing facilities built into conventional electronic messaging solutions, which can be very time consuming for users. Inaccurate and difficult to use, general search or indexing facilities are typically keyword-based and fail to provide for chronologically-ordered and relevant groupings of emails. In a corporate or business context, finding timely specific emails is often important for uses such as auditing, but can be expensive and require specialized computer programs, software, or applications (hereafter “applications”) in order to sift through large volumes of email data. For individuals, finding emails is also difficult, but for various types of users, sharing emails is typically reliant upon manual forwarding or sending operations. In other words, conventional solutions are limited in their ability to provide for collaborative tools to share emails, which often acts as a primary form of communication for individuals and organizations. Some conventional forms of social media allow for users to share data with each other, including manually posting emails and included content. However, these conventional solutions do not allow for the protection of user privacy nor provide for collaborative actions such as commenting or forwarding to yet other users.
- Further, large quantities of emails and data stored or attached to these emails can lead to inefficient techniques for organizing electronic messaging data. As a conventional example, users are often reliant upon the use of internal file folders or structures that must be created manually into which emails (and attachments) can be classified. Further, once classified or stored, it is time consuming to retrieve an email or share it with other users who may find the data contained within a particular message to be useful or valuable, requiring a user to manually forward the email.
- Thus, what is needed is a solution for electronic mail processing and publication for shared environments without the limitations of conventional techniques.
- Various embodiments or examples (“examples”) are disclosed in the following detailed description and the accompanying drawings:
-
FIG. 1 illustrates an exemplary system for electronic mail processing and publication for shared environments; -
FIG. 2 an exemplary application architecture for electronic mail processing and publication for shared environments; -
FIG. 3 illustrates an exemplary shared environment for publication of processed electronic mail messages; -
FIG. 4A illustrates a further exemplary shared environment for publication of processed electronic mail messages; -
FIG. 4B illustrates an alternative exemplary shared environment for publication of processed electronic mail messages; -
FIG. 5 illustrates another exemplary shared environment for publication of processed electronic mail messages; -
FIG. 6A illustrates an exemplary process for electronic mail processing and publication for shared environments; -
FIG. 6B illustrates an alternative exemplary process for electronic mail processing and publication for shared environments; -
FIG. 7 illustrates a further exemplary process for electronic mail processing and publication for shared environments; -
FIG. 8 illustrates an exemplary process for transforming email addresses for electronic mail processing and publication for shared environments; and -
FIG. 9 illustrates an exemplary computer system suitable for electronic mail processing and publication for shared environments. - Various embodiments or examples may be implemented in numerous ways, including as a system, a process, an apparatus, a user interface, or a series of program instructions on a computer readable medium such as a computer readable storage medium or a computer network where the program instructions are sent over optical, electronic, or wireless communication links. In general, operations of disclosed processes may be performed in an arbitrary order, unless otherwise provided in the claims.
- A detailed description of one or more examples is provided below along with accompanying figures. The detailed description is provided in connection with such examples, but is not limited to any particular example. The scope is limited only by the claims and numerous alternatives, modifications, and equivalents are encompassed. Numerous specific details are set forth in the following description in order to provide a thorough understanding. These details are provided for the purpose of example and the described techniques may be practiced according to the claims without some or all of these specific details. For clarity, technical material that is known in the technical fields related to the examples has not been described in detail to avoid unnecessarily obscuring the description.
- In some examples, the described techniques may be implemented as a computer program or application (“application”) or as a plug-in, module, or sub-component of another application. The described techniques may be implemented as software, hardware, firmware, circuitry, or a combination thereof. If implemented as software, the described techniques may be implemented using various types of programming, development, scripting, or formatting languages, frameworks, syntax, applications, protocols, objects, or techniques, including ASP, ASP.net, .Net framework, Ruby, Ruby on Rails, C, Objective C, C++, C#, Adobe® Integrated Runtime™ (Adobe® AIRT™), ActionScript™, FIex™, Lingo™, Java™, Javascript™, Ajax, Perl, COBOL, Fortran, ADA, XML, MXML. HTML, DHTML, XHTML, HTTP, XMPP, PHP, and others. Design, publishing, and other types of applications such as Drcamweaver®, Shockwave®, Flash®, Drupal and Fireworks® may also be used to implement the described techniques. Database management systems (i.e., “DBMS”), search facilities and platforms, web crawlers (i.e., computer programs that automatically or semi-automatically visit, index, archive or copy content from, various websites (hereafter referred to as “crawlers”)), and other features may be implemented using various types of proprietary or open source technologies, including MySQL, Oracle (from Oracle of Redwood Shores, Calif.), Solr and Nutch from The Apache Software Foundation of Forest Hill, Md., among others and without limitation. The described techniques may be varied and are not limited to the examples or descriptions provided.
-
FIG. 1 illustrates an exemplary system for electronic mail processing and publication for shared environments. Here,system 100 includesnetwork 102, clients 104-110, server 112, databases 114-116, andwebsite 118. “Elements” may refer to one or more ofnetwork 102, clients 104-110, server 112, databases 114-116, andwebsite 118 shown in association withsystem 100. As shown, the type, quantity, configuration, topology, and other characteristics are provided for purposes of illustration only and may be varied beyond the examples shown and provided. In some examples,network 102 may be any type of data network including, without limitation, a local area network (LAN), wide area network (WAN), municipal area network (MAN), wireless local area network (WLAN), computing cloud, or any other type of aggregation of computing, networking, storage, or processing resources. As shown, clients 104-110 may be implemented as a desktop computer (e.g. client 104), mobile communication (i.e., voice and data) device (e.g., client 106), mobile computing device (e.g., client 108), or notebook or laptop (i.e. portable) computing device (client 110). Each of clients 104-110 may be in data communication with server 112 usingnetwork 102. In some examples, server 112 may be a web, application, email, or other type of server, without limitation. - Databases 114-116, in some examples, may be directly or indirectly in data communication with server 112, which may be implemented as described above to perform one or more applications, deliver services or resources to clients 104-110, execute or compile applications, or otherwise provide any type of processing capability or facility, without limitation. Data associated with the techniques described herein may be stored in one or both of databases 114-116. In other examples, data may also be stored in embedded memory, of any type, with server 112 or any of clients 104-110. Still further, data may be stored and retrieved by server 112 or any of clients 104-110 from any of databases 114-116 without limitation as to any given database schema or structure. For example, an email may be transmitted to a “shared destination,” which may be an email server (e.g., server 112), email account, or other resource that is configured to accept email messages sent using messaging protocols such as Simple Mail Transfer Protocol (hereafter “SMTP”) and received using other protocols such as Internet Message Access Protocol (hereafter “IMAP”) or Post Office Protocol (hereafter “POP”), among others. In some examples, email receipt may be indicated automatically or semi-automatically to server 112. In other examples, received emails sent to an email account or client may be retrieved periodically based on a set or irregular schedule. For example, an application hosted and running on server 112 may be configured to retrieve emails for further processing, as described below, on a set schedule (e.g., every 1, 5, 30, 60 minutes, or the like). Using various types of email receipt protocols (e.g., IMAP, POP, or others), emails may be retrieved from an email account or shared destination. Once retrieved by server 112, emails may be stored in
database 114 and/or 116 and processed further to generated processed messages for posting to a shared environment (e.g., website 118). As used herein, an email account to which emails are sent for posting in a shared environment may be referred to as a “shared destination.” - A shared destination may be, in some examples, an email account hosted on server 112 that is configured to receive emails sent from various sources and intended for posting to a given website (e.g., website 118). Data associated with emails sent to a shared destination may be stored in
database 114 or, in other examples, remotely stored indatabase 116. - As shown here,
website 118 may be described as a “shared environment” or facility to which data, information, or other content may be posted or published. As used herein, “posting” or “publication” may be used interchangeably and are intended to refer to the format, transmission, upload, design, layout, and other parameters of content manipulated relative to a given environment (e.g. website 118, among others). In some examples,website 118 may be a website at which emails, attachments, data, information, or other types of content may be viewed, retrieved, posted, or deleted, without limitation. In other examples,system 100 and the above-described elements may be varied in function, structure, configuration, topology, quantity, type, or other aspects and are not limited to the examples shown. -
FIG. 2 an exemplary application architecture for electronic mail processing and publication for shared environments. Here,application 200 includesbus 202,logic module 204,database 206,retrieval module 208,XML engine 210,email processing engine 212,security module 214, andposting module 216. In some examples,bus 202 may be implemented as any type of data communication bus for transferring data between any oflogic module 204,database 206,retrieval module 208.XML engine 210,email processing engine 212,security module 214, andposting module 216, without limitation to any given type, configuration, capacity, rating, or other characteristic. As shown,application 200 and the elements described herein (i.e.,logic module 204,database 206,retrieval module 208,XML engine 210,email processing engine 212,security module 214, and posting module 216) may be implemented as hardware, software, firmware, circuitry, or a combination thereof and are not limited to any specific application structure or formatting, scripting, or programming language. - In some examples,
logic module 204 may be configured to provide command and/or control signals, instructions, and functions to direct one or more ofdatabase 206,retrieval module 208,XML engine 210,email processing engine 212,security module 214, andposting module 216.Logic module 204, for example, may directretrieval module 208 to identify, locate, and retrieve emails sent to a shared destination (e.g., IMAP or POP email account).Logic module 204 may also be configured to process retrieved emails to generate processed messages (i.e., retrieved emails that have been processed by email processing engine 212) for posting or publication in a shared environment (e.g., website 118 (FIG. 1 )) prior to being directed to postingmodule 216 for posting to the shared environment (e.g., website 118). Further,logic module 204 may be configured to evaluate retrieved emails to determine whether a security threat (e.g., malicious software (hereafter “malware”), spyware (i.e., malware intended to passively gather data and information from a host operating system, computer, or application), cross site scripting, and others.Security module 214 may be implemented using various types of security software, firmware, or hardware, such as intrusion detection and prevention systems, anti-virus, or others, without limitation, that are intended to detect whether an email to be processed byemail processing engine 212 is a security threat that, once posted to a shared environment (e.g., website 118) may be accessible and pose a security risk to other clients. - As shown, data may be stored in
database 206 using any type of database, database schema, or storage mechanism, without limitation, including storage area networks (hereafter “SAN”), network attached storage (hereafter “NAS”), cloud storage, or the like. Further, retrieved emails may be stored using various types of markup and formatting languages such as XML and others.XML engine 210 is an example of a type of facility or resource that may be used to evaluate, format, and generate XML-formatted data to be stored, for example, indatabase 206 or, as another example, to be processed for posting to a shared environment (e.g., website 118) byemail processing engine 212 andposting module 216. In other examples,application 200 may be implemented in any type of application environment, distributed or otherwise, using one or more application servers, computers, or computing platforms from which to host. Apart from the examples shown and described,application 200 and the above-described elements may be varied in function, structure, format, language, configuration, or other aspects and are not limited to any specific implementation. -
FIG. 3 illustrates an exemplary shared environment for publication of processed electronic mail messages. Here,window 300 includes sharedenvironment 302,title tag 304,process messages 306, sitemap link 308,sort window 310,pulldown menu 312, andsearch field 314. In some examples,window 300 may be representative of a graphical user interface display that is presented by website 118 (FIG. 1 ). As shown, sharedenvironment 302 may be a graphical display environment in which processed messages may be displayed and reviewed. Based ontitle tag 304, emails may be listed and displayed based on, for example, popularity (e.g. the number of comments posted in response to a given email posting, most popular today, most popular in past week, most popular in past month, and the like), age (i.e., newest-to-oldest, oldest-to-newest, and the like), trends of immediate interest (i.e., emails that are of immediate interest to the overall user or viewer population), or other factors apart from those described. As used herein,title tag 304 may be a descriptive title or categorical reference associated with a given email and other emails that are contextually or thematically related. In some examples, title tag 305 may use a format such as “<subject line of email>|SocialMail” in order to aid in search engine optimization (hereafter “SEO”). By using the subject line of an email as part of a header tag (e.g., H1 tag), the content, data, or information contained may be used to enhance search engine optimization to allow other users to find and retrieve processedmessages 306. By using modifying the header tags of retrieved emails, processedmessages 306 can be improved for SEO, facilitating searches performed for various topics, themes, keywords, or emails. - In some examples, the quantity of processed messages may be set to a discrete number per page (e.g., 10 per page, 100, 1000, customizable, user-specified, system-specified, rules-based, and others). Further, when a user navigates to a given page using, for example, a web (i.e., the World Wide Web (hereafter “web”)) browsing application processed
messages 306 may be sorted based on criteria specified insort window 310 by usingpulldown menu 312. In this example, criteria such as “Newest,” “Trending Now,” “Most Popular Today,” “Most Popular Past Week,” and “Most Popular Past Month” may be chosen in order to sort processedmessages 306. When selected, a criterion may cause processed sharedenvironment 302 to be rendered such that the order is determined based on the selected criteria. In other examples, posted emails may be ranked using various techniques and, as an example, identified using the “Trending Now” feature. For example, posted emails may be ranked based on determining the number of users to which the posted email has been forwarded (e.g., if a posted email has been forwarded previously multiple times to an aggregate pool of 20 recipients, a quantitative rank may be assigned using various techniques, including assigning a weighted or unweighted ranking value based on the number of recipients (e.g., in the example above, 20)). In other examples, rankings may be performed differently using various techniques or algorithms, without limitation. As an indicator of activity within aservice providing window 300, an “activity stream” or other type of feed or data stream may be created in which one or more posted emails, replies, comments, votes, rankings, or other activities occurring may be posted generally for users to view (in some contexts such as within corporate enterprises, this and other features may be suppressed in order to confine the applicability of the described techniques to prescribed enterprise purposes). In some examples, users may opt-in and subscribe to an activity stream in order to ensure that those users who do not elect to receive updates as to activity are not receiving unwanted notifications. In other examples, processedmessages 306 may be sorted or displayed differently and are not limited to those shown and described. - Here, processed
messages 306 may also be searched using a facility that has an interface such assearch field 314 to permit the entry of keywords or other items that may be used to select the appearance of processedmessages 306. A search of processedmessages 306 may be used to find email content (i.e., content, data, information, media, rich media, text, or the like) from a given pool of emails posted to sharedenvironment 302. When posted, emails may be made “anonymous” (i.e., remove identifying information such as email addresses) in order to protect user privacy, as described in greater detail below in connection withFIG. 5 . In some examples, each of processedmessages 306 may be treated like an individual post that, when selected, is hyperlinked to another page where related emails of the same topic may be listed, as described below in connection withFIGS. 4A-4B . - Referring back to
FIG. 3 , sharedenvironment 302 can be provided as a destination website (e.g. website 118) that enables the entry or submission of email content for various types of purposes (e.g., interest, humor, amusement, fun, business, enterprise/corporate, collaborative work sharing, and others, without limitation). Email content may be submitted using sharedenvironment 302 to permit other users to enter comments or submit other emails related to a given topic or original email (i.e., threading), as indicated bytitle topic 304. Each email submitted may be processed by email processing engine 212 (FIG. 2 ) to be generated into a processed message and posted as part of a thread. - In other examples, users can view emails associated with topics of various types of interests. Within a corporate organization or enterprise (including for-profit, non-profit, governmental organizations), emails may be submitted for collective sharing and collaborative input by other members of the same organization. Likewise, security module 214 (
FIG. 2 ) may be configured to provide additional security to permit authenticated use by members of a given organization as opposed to enabling sharedenvironment 302 to be publicly accessible. Generally, sharedenvironment 302 may be used as a forum for the sharing of email content that does not require the manual formatting of email content for posting. In other words, a user having an account recorded in one or both of databases 114-116 may forward or send emails to a service hosted by server 112, which may be processed by email processing engine 212 (as described in greater detail below in connection withFIG. 5 ) and posted to sharedenvironment 302. Once made available to a community (e.g., public, closed, non-public, corporate, enterprise, and the like) of users, other emails may be posted directly to sharedenvironment 302. - Additionally, sitemap link 308 may be used to hyperlink (i.e., linking (i.e. pointing a web browsing application to another address and retrieving and displaying content from that location) to another page of website 118) to another page of
website 118 to retrieve and view information associated with posts (i.e. publications) of processed messages to sharedenvironment 302. In some examples, by interacting with sitemap link 308, another web page is rendered that displays a list of processed messages classified by the month and year (i.e., posting date). Each entry of the list of processed messages (not shown) may be hyperlinked to another page that, when invoked, displays another page listing subject lines of individual posted processed messages and an excerpt of the related email. In some examples, the subject lines may also be hyperlinked to the complete post, which is displayed when the links are invoked. In other examples, the above-described examples may be varied in function, structure, format, language, configuration, or other aspects and are not limited to any specific implementation. -
FIG. 4A illustrates a further exemplary shared environment for publication of processed electronic mail messages. Here,window 400 includes sharedenvironment 402,title tag 404, processedmessages 406,attachment icon 408, and threadedmessages 410. As shown, if a hyperlink associated with one of processed messages 306 (FIG. 3 ) is invoked another web page may be rendered similarly to that presented inwindow 400. In some examples, a processed message and related processed messages may be presented in sharedenvironment 402. A selected processed message may be indicated bytitle tag 404 and subsequent processed messages submitted in response or in relation totitle tag 404 may be presented as a thread, as shown by processedmessages 406. Further, one or more of processedmessages 406 may have an attachment (i.e., an attached file, document, image, or other data or information), which may be indicated using, for example,attachment icon 408. In other examples, different types of icons, indicators, or indicia may be used to indicate visually or graphically whether an attachment is present. Further,attachment icon 408 may be hyperlinked to enable downloading, opening, viewing, or otherwise interacting with an attachment when a mouse pointer of other human computing interface (i.e., “HCI”) or input or input-output device is used to select (i.e., invoke)attachment icon 408. Still further, other emails may be submitted for generation of additional processed messages as extended threads, as shown by threadedmessages 410. - As shown, each of processed
messages 406 may be hyperlinked and, when invoked, may initiate the instantiation and rendering of another window that displays data, information, or other content associated with the selected processed message. As described in greater detail below in connection withFIG. 5 , a selected processed message may be configured to direct a web browsing application (not shown) to an address that is associated with another web page that presents content such as the original email of the processed message selected. Some data, information, or content may also be modified in the new window (not shown) in order to provide data security, prevent unauthorized access, or perform other functions that would be beneficial to a collaborative data sharing environment such as sharedenvironment 402. In still other examples, window and sharedenvironment 402 may be implemented differently in layout, design, function, structure, features, or other aspects and are not limited to those shown and provided. -
FIG. 4B illustrates an alternative exemplary shared environment for publication of processed electronic mail messages. Here,window 400 includes sharedenvironment 402, sections 420-430, data 432-434, andbutton 436. In some examples,window 400 may be implemented as a graphical user interface such as that associated with a web browser or other web browsing application. As shownwindow 400 may be configured to present a page that displays several different functions or structures. For example,section 420 may be implemented to present the number of votes associated with a given email that is submitted and posted, as indicated by data 432 (e.g., “Subject of email,” which may be identified from a processed email), data 434 (e.g., “time of post,” which may also be posted from a processed email), section 422 (e.g., the body of the email, section 426 (e.g., identification of a posting user based on an “anonymized” email address or other user name (e.g., “user xyz,” which may be hyperlinked to another page that provides one or more details associated with a given user. Alternatively, when an email is posted, a user may “claim” ownership of a given email by creating a user account, such as that described herein, associated with the sending email address of the posted email. - Further, any email that is posted in
window 400 may also include information associated with the number of votes received by other users (e.g., section 420), comments from one or more other users, which may also include replies to comments from the posting email sender (e.g., section 424), people indicating their “like” (or in some examples, dislike (not shown)) of the posted email (e.g., section 428), or related information or data (e.g., other posts that may be related contextually, thematically, by sender, by topic, and others, without limitation) associated with the given posted email (e.g., section 430). In some examples, users may vote for various purposes, including expressing their like, dislike, favor, disfavor, or other action or expression associated with a given posted email. Still further, if a given reader (i.e., user) likes the posted email, she may elect to share the post with another user by using an interactive feature or function such asbutton 436 that may open another window (not shown), field (not shown), interface (not shown), or the like that permits entry of another user's identifying information (e.g., email address, user name, or the like) in order to share the posted content. As an example, third party applications such as Facebook. Inc. of Menlo Park, Calif., may be coupled to an application implementing the described techniques (including, but not limited to window 400) enabling users (e.g., user xyz) to share the posted content with other users using the third party application (e.g., Facebook, Twitter (as developed by Twitter, Inc. of San Francisco, Calif.), blogs, and other online applications, social media, media, or the like, without limitation). In some examples, users may not have an account with other social media business, websites, or the like. However, the described techniques enable users to post content (e.g., mails) and share them with other users through, for example, an application programming interface (API) to these other websites using posting module 216 (FIG. 2 ). Referring back toFIG. 4B , users may also have accounts with third party websites and features may be included to enable these users to share content using the described techniques. In other words, the described techniques may be implemented as a service apart from various types of content or social media or entertainment websites, but enable users to share, send, forward, reply to, retrieve, or perform other functions associated with posted emails without requiring the creation of user accounts. As another example, the techniques described herein may be used by individual or organizations such as corporate enterprises. - For example, a corporate enterprise may use the described techniques in order to provide a closed or private (e.g., corporate or in-enterprise) forum or enterprise for its employees to share email content in a collaborative manner. In some examples, corporate employees may post emails using their corporate email addresses. In other examples, corporate employees may post emails using assigned or self-identified user names that mask an individual email address in order to prevent unwanted responsive email or comments to the posted content. In still other examples, by posting emails using the described techniques, various individuals or stakeholders within a corporate organization may be placed on a notice of a given user's posted email without requiring the user to individually and specifically identify various addressees. The described techniques aid in eliminating time and labor-intensive email creation efforts that corporate users often must undergo in order to notify supervisors, managers, executives, co-workers, project team members, and the like.
- As shown, various types of purposes may motivate the described techniques for use within a corporate enterprise. In some examples, when a user is included as an addressee on a posted email, she may elect to stop or continue receiving notification of the posted emails, comments, votes, and other actions associated with these. In other examples, posted email subject lines may be used to initiate a discussion forum associated with the given subject. For example, if a subject line states “Sales Contract,” the subject line may render the posted email and associated content (e.g.,
FIG. 4B ) available to a user when constructing an email, regardless of whether the user is the original author of the email. In other words, a user can use the described techniques to send an “inline” or in-thread reply or forward the email to another user who is separate and apart from the population having access to the posted email (in some examples, the user may be outside of the corporate enterprise or organization). In still other examples, window and sharedenvironment 402 may be implemented differently in layout, design, function, structure, features, or other aspects and are not limited to those shown and provided. -
FIG. 5 illustrates another exemplary shared environment for publication of processed electronic mail messages. Here,window 500 includes sharedenvironment 502,title tag 504, processedmessage content 506,comment function 508,share function 510,flag function 512, likefunction 514, do not likefunction 516, and plug-infunction 518. In some examples, the quantity, type, function, structure, or other aspects ofwindow 500 and the elements shown may be varied and are not limited to those presented, which are provided for purposes of exemplary explanation. As shown, when one of processedmessages 406 is selected, a web browsing application or other type of client interface may be opened inwindow 500, displaying processedmessage content 506 and indicating it is related to the selected processed message bytitle tag 504 - Further, shared
environment 502 may be designed and implemented to provide one or more functions that may be used in connection with processedmessage content 506. For example, a comment may be entered in association with processedmessage content 506 by interacting withcomment function 508, which may be implemented as a button or link. When selected,comment function 508 may be configured to open a field, form, or altogether new web page in which a user may enter a subsequent comment using a variety of formats. Likewise, if selected,share function 510 may be used to share processedmessage content 506 with another user by, for example, mailing or using text-based messages via simple messaging service (i.e. “SMS”) or another format or protocol. Further, processedmessage content 506 may also be “flagged” or indicated as being inappropriate, undesirable, copied, or otherwise by invokingflag function 512. Other functions that may be invoked include likefunction 514 and do not likefunction 516. - In some examples, if a user “likes” or wishes to publicly indicate her favor for processed
message content 506, she may place a tag or mark to indicate such by invoking likefunction 514. Likewise, she may also invoke do not likefunction 516 to indicate that processedmessage content 506 is undesirable to her. By invoking popularity-related functions such as these, ranking of publishedmessage content 506 may be performed. As yet another function, plug-infunction 518 may be invoked to connect, couple, distribute, publish, send, re-send, or perform other functions associated with a third-party website or service. For example, social media websites that permit user posting of data may provide an application programming interface (“API”) that may be used to feed content in a given format for posting or publication. By invoking plug-infunction 518, processedmessage content 506 may be posted to other shared environments such as Facebook (as developed by Facebook, Inc. of Palo Alto, Calif.), LinkedIn (as developed by LinkedIn, Inc. of Mountain View, Calif.), and many other social media-related services, sites, and destinations. In other examples,window 500 and the above-described elements may be implemented differently in layout, design, function, structure, features, or other aspects and are not limited to those shown and provided. -
FIG. 6A illustrates an exemplary process for electronic mail processing and publication for shared environments. Here,process 600 starts by evaluating one or more data packets associated with an email that is received at a shared destination such as an email account or server (602). Upon detecting, based upon the evaluation of data packets to determine whether mail has been received (using either an IMAP or POP-based protocol), the received email is retrieved (604). Once retrieved, the email is processed to generate a processed message, such as that described above in connection withFIGS. 3-5 (606). Once processed, a processed message is posted to a shared environment such as website 118 (FIG. 1 ) (608). - As shown, data may be analyzed using various techniques. For example, data packets may be evaluated by analyzing a given domain associated with the sending email address. A corporate enterprise, as an example, may have a given domain (e.g., company.com) that is evaluated in order to provide message visibility to other users having the same domain. This may be implemented in order to provide a service to users and/or accounts within the given domain in order to prevent access to information or data. In other examples, the above-described process may be varied in the implementation, order, function, or structure of each or all steps and is not limited to those provided.
-
FIG. 6B illustrates an alternative exemplary process for electronic mail processing and publication for shared environments. Here,process 610 begins by processing an email submitted using the described techniques by removing email headers, which may include one or more email addresses (e.g., sender, destination, intermediate (i.e., email addresses found within a thread of emails such as a forward or chain of multiple replies, and the like) (612). For privacy, security, and other similar reasons, source-identifying information such as email addresses may be removed. In some examples, a received email may be processed for privacy reasons by parsing data associated with the posted email. The email address may be stored along with any non-message data, which may include attachments or embedded images of any kind or format (614). Non-message data, in some examples, may also be identified as any type of information or data that is not related to the message body. In other examples, non-message data may be any data that is not found within the payload of a message body. In still other examples, data to be stored in a database (e.g., database 206 (FIG. 2 )) may be determined differently. The email address is then processed to identify any email addresses within the header or the body, which may be stored as fields or records associated with the sending email address in a database (616). A determination is made as to whether the email being processed is in HTML (i.e., Hyper Text Markup Language) or an HTML-based format (618). If the email being processed is in HTML or an HTML-based format (e.g., XHTML, DHTML, XML, and others, without limitation), then the email is processed for security threats (e.g., virus, malware, spyware, cross-site scripting, and others, without limitation) (620). If the email is not in HTML or an HTML-related format, then process 610 does not perform a security check. - In some examples, a check may be performed to determine whether the email being processed was previously processed (622). If the email was not previously processed, a new post with the email should be created (624). If the email was previously processed, in some examples, a vote count associated with the email may be incremented or increased. In other examples, the above-described process may be performed or implemented differently in steps, order, function, or other aspects, without limitation to those provided.
-
FIG. 7 illustrates a further exemplary process for electronic mail processing and publication for shared environments. As an exemplary illustration of generating processed messages,process 700 may be implemented. Here,process 700 starts by storing a copy of a retrieved email and recording the email address of the sending account or client (702). After storing indatabase 114 and/or 116 (FIG. 1 ) a copy of the retrieved email and email address of the sending account or client, the retrieved email is evaluated to identify whether there are email addresses within the header or body (i.e., payload) data of the email (704). A determination is made as to whether any email addresses are identified (706). If an email address is identified in either the header or body of the retrieved email, then the identified email addresses are transformed, which is described in greater detail below in connection withFIG. 8 (708). - Referring back to
FIG. 7 , if no email address is identified, then the retrieved email is further processed by evaluating the format of the email to determine whether it is in an HTML-based format (710). A determination is made as to whether the retrieved email is in an HTML-based format (712). If the email is in an HTML-based format, then it is further evaluated for security threats such as cross site scripting and others as described above (714). A determination is made as to whether a security threat is present (716). If a security threat is identified, then the retrieved email is purged and not stored indatabase 114 and/or 116 (718). In other examples, an alert message or other warning may be sent to the user of system 100 (FIG. 1 ) to indicate that a security threat was found. If no security threat is found, then a processed message is generated using the transformed email addresses (720). After generating a processed message, it may be posted to a shared environment (e.g.,website 118 or shared environments 302 (FIG. 3 ), 402 (FIG. 4 ), or 502 (FIG. 5 )) (722). In other examples, the above-described process may be varied in the implementation, order, function, or structure of each or all steps and is not limited to those provided. -
FIG. 8 illustrates an exemplary process for transforming email addresses for electronic mail processing and publication for shared environments. Here,process 800 beings by marking or otherwise indicating a top-level domain (hereafter “TLD”) associated with the email in order to prevent modification (i.e., transformation) as described herein (802). After marking or indicating the TLD associated with the email, all other characters associated with the domain name are replaced with unidentifiable characters or numbers (804). - For example, an email address “joe@smith.com” may be transformed by marking the “.com” for non-modification and replacing “joe@smith” with unidentifiable characters such as “xxx@xxxxx”. Thus, when the email address in the example above may be transformed from “joe@smith.com” to xxx@xxxxx.com.” After transforming identified email addresses in the header or body (i.e., payload data) of a retrieved email message, the process then returns to step 710 (
FIG. 7 ) to continue processing for generating a processed message (806). In other examples, the above-described process may be varied in the implementation, order, function, or structure of each or all steps and is not limited to those provided. -
FIG. 9 illustrates an exemplary computer system suitable for electronic mail processing and publication for shared environments. In some examples,computer system 900 may be used to implement computer programs, applications, methods, processes, or other software to perform the above-described techniques.Computer system 900 includes abus 902 or other communication mechanism for communicating information, which interconnects subsystems and devices, such asprocessor 904, system memory 906 (e.g., RAM), storage device 908 (e.g., ROM), disk drive 910 (e.g., magnetic or optical), communication interface 912 (e.g., modem or Ethernet card), display 914 (e.g., CRT or LCD), input device 916 (e.g. keyboard), and cursor control 918 (e.g., mouse or trackball). - According to some examples,
computer system 900 performs specific operations byprocessor 904 executing one or more sequences of one or more instructions stored insystem memory 906. Such instructions may be read intosystem memory 906 from another computer readable medium, such asstatic storage device 908 ordisk drive 910. In some examples, hard-wired circuitry may be used in place of or in combination with software instructions for implementation. - The term “computer readable medium” refers to any tangible medium that participates in providing instructions to
processor 904 for execution. Such a medium may take many forms, including but not limited to, non-volatile media and volatile media. Non-volatile media includes, for example, optical or magnetic disks, such asdisk drive 910. Volatile media includes dynamic memory, such assystem memory 906. - Common forms of computer readable media includes, for example, floppy disk, flexible disk, hard disk, magnetic tape, any other magnetic medium, CD-ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, RAM, PROM, EPROM, FLASH-EPROM, any other memory chip or cartridge, or any other medium from which a computer can read.
- Instructions may further be transmitted or received using a transmission medium. The term “transmission medium” may include any tangible or intangible medium that is capable of storing, encoding or carrying instructions for execution by the machine, and includes digital or analog communications signals or other intangible medium to facilitate communication of such instructions. Transmission media includes coaxial cables, copper wire, and fiber optics, including wires that comprise
bus 902 for transmitting a computer data signal. - In some examples, execution of the sequences of instructions may be performed by a
single computer system 900. According to some examples, two ormore computer systems 900 coupled by communication link 920 (e.g., LAN, PSTN, or wireless network) may perform the sequence of instructions in coordination with one another.Computer system 900 may transmit and receive messages, data, and instructions, including program, i.e., application code, throughcommunication link 920 andcommunication interface 912. Received program code may be executed byprocessor 904 as it is received, and/or stored indisk drive 910, or other non-volatile storage for later execution. - Although the foregoing examples have been described in some detail for purposes of clarity of understanding, the above-described inventive techniques are not limited to the details provided. There are many alternative ways of implementing the above-described invention techniques. The disclosed examples are illustrative and not restrictive.
Claims (18)
1. A method, comprising:
evaluating a data packet indicating receipt of an electronic message at a shared destination;
retrieving the electronic message from the shared destination;
processing the electronic message to generate a processed message configured to be posted to a shared environment; and
posting the processed message to the shared environment.
2. The method of claim 1 , wherein the shared destination is a website.
3. The method of claim 1 , wherein the electronic message is retrieved from the shared destination using one or more protocols.
4. The method of claim 3 , wherein at least one of the one or more protocols is SMTP.
5. The method of claim 3 , wherein at least one of the one or more protocols is POP.
6. The method of claim 1 , wherein processing the electronic message further comprises determining whether an address is present within a header of the electronic message.
7. The method of claim 1 , wherein processing the electronic message further comprises determining whether an address is present within a body of the electronic message.
8. The method of claim 1 , wherein processing the electronic message further comprises transforming an address if the address is identified within a header or body of the electronic message.
9. The method of claim 1 , wherein processing the electronic message further comprises evaluating the electronic message to identify a security threat, the electronic message being evaluated if a format of the electronic message is based on HTML.
10. A system, comprising:
a database configured to store data associated with an electronic message and a shared environment; and
a logic module configured to evaluate a data packet indicating receipt of the electronic message at a shared destination, to retrieving the electronic message from the shared destination, to process the electronic message to generate a processed message configured to be posted to the shared environment, and to post the processed message to the shared environment.
11. The system of claim 10 , further comprising a security module configured to evaluate the data packet and the electronic message to identify a security threat.
12. The system of claim 10 , wherein the logic module is configured to determine if an address is included in the electronic message.
13. The system of claim 10 , wherein the logic module is configured to determine if an address is included in the electronic message and to transform the address after retrieving the electronic message from the shared destination.
14. The system of 13, wherein the address is transformed by replacing at least a portion of the address.
15. The system of claim 10 , wherein the shared destination is an electronic mail account.
16. The system of claim 10 , wherein the database is configured to store the data and the electronic message after being retrieved by a retrieval module from the shared destination.
17. The system of claim 10 , wherein the database is configured to store other data associated with processing performed by the logic module after being retrieved from the shared destination.
18. A computer program product embodied in a computer readable medium and comprising computer instructions for:
evaluating a data packet indicating receipt of an electronic message at a shared destination;
retrieving the electronic message from the shared destination;
processing the electronic message to generate a processed message configured to be posted to a shared environment; and
posting the processed message to the shared environment.
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/191,412 US20130031183A1 (en) | 2011-07-26 | 2011-07-26 | Electronic mail processing and publication for shared environments |
US13/712,870 US9832151B2 (en) | 2011-07-26 | 2012-12-12 | Aggregate electronic mail message handling |
US14/049,204 US9521100B2 (en) | 2011-07-26 | 2013-10-08 | Aggregate electronic mail message handling |
US15/169,707 US20170032408A1 (en) | 2011-07-26 | 2016-05-31 | Automated subscriber engagement |
US15/202,461 US20170034101A1 (en) | 2011-07-26 | 2016-07-05 | Aggregate electronic mail message handling |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/191,412 US20130031183A1 (en) | 2011-07-26 | 2011-07-26 | Electronic mail processing and publication for shared environments |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/712,870 Continuation-In-Part US9832151B2 (en) | 2011-07-26 | 2012-12-12 | Aggregate electronic mail message handling |
US14/049,204 Continuation-In-Part US9521100B2 (en) | 2011-07-26 | 2013-10-08 | Aggregate electronic mail message handling |
Related Child Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/712,870 Continuation-In-Part US9832151B2 (en) | 2011-07-26 | 2012-12-12 | Aggregate electronic mail message handling |
US14/049,204 Continuation-In-Part US9521100B2 (en) | 2011-07-26 | 2013-10-08 | Aggregate electronic mail message handling |
US14/485,013 Continuation-In-Part US20150256499A1 (en) | 2011-07-26 | 2014-09-12 | Ranking, collection, organization, and management of non-subscription electronic messages |
Publications (1)
Publication Number | Publication Date |
---|---|
US20130031183A1 true US20130031183A1 (en) | 2013-01-31 |
Family
ID=47598175
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/191,412 Abandoned US20130031183A1 (en) | 2011-07-26 | 2011-07-26 | Electronic mail processing and publication for shared environments |
US13/712,870 Expired - Fee Related US9832151B2 (en) | 2011-07-26 | 2012-12-12 | Aggregate electronic mail message handling |
US14/049,204 Expired - Fee Related US9521100B2 (en) | 2011-07-26 | 2013-10-08 | Aggregate electronic mail message handling |
US15/202,461 Abandoned US20170034101A1 (en) | 2011-07-26 | 2016-07-05 | Aggregate electronic mail message handling |
Family Applications After (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/712,870 Expired - Fee Related US9832151B2 (en) | 2011-07-26 | 2012-12-12 | Aggregate electronic mail message handling |
US14/049,204 Expired - Fee Related US9521100B2 (en) | 2011-07-26 | 2013-10-08 | Aggregate electronic mail message handling |
US15/202,461 Abandoned US20170034101A1 (en) | 2011-07-26 | 2016-07-05 | Aggregate electronic mail message handling |
Country Status (1)
Country | Link |
---|---|
US (4) | US20130031183A1 (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130036125A1 (en) * | 2011-08-02 | 2013-02-07 | Bank Of America Corporation | System for Analyzing Device Performance Data |
US20130036130A1 (en) * | 2011-08-02 | 2013-02-07 | Bank Of America Corporation | System for Analyzing Device Performance Data |
US20140149482A1 (en) * | 2012-11-26 | 2014-05-29 | Red Hat, Inc. | Systems and methods for providing specification of a location of a user of a communication device |
US20150058957A1 (en) * | 2013-05-24 | 2015-02-26 | erodr, Inc. | Systems and methods to present messages in location-based social networking communities |
US20150312201A1 (en) * | 2014-04-25 | 2015-10-29 | International Business Machines Corporation | Organizing social network messages based on temporal characteristics |
US20150363092A1 (en) * | 2014-05-30 | 2015-12-17 | Contatta, Inc. | Systems and methods for collaborative electronic communications |
US9544263B1 (en) | 2013-01-27 | 2017-01-10 | Bryant Christopher Lee | Method and system for sending an indication of response to an online post from a text message |
US20170272394A1 (en) * | 2016-03-18 | 2017-09-21 | International Business Machines Corporation | Email threads related to messaging content |
US9832151B2 (en) | 2011-07-26 | 2017-11-28 | Socialmail LLC | Aggregate electronic mail message handling |
US9866513B2 (en) | 2013-12-31 | 2018-01-09 | erodr, Inc. | Systems and methods to control the lifetime of online posts |
US9954807B2 (en) | 2015-03-11 | 2018-04-24 | Microsoft Technology Licensing, Llc | Endorsement indications in communication environments |
US10089409B2 (en) * | 2014-04-29 | 2018-10-02 | Microsoft Technology Licensing, Llc | Event-triggered data quality verification |
US10404634B2 (en) * | 2015-07-01 | 2019-09-03 | Sean P. Fenlon | Method for publishing and sharing content on the internet |
US10462087B2 (en) | 2015-03-11 | 2019-10-29 | Microsoft Technology Licensing, Llc | Tags in communication environments |
US10877955B2 (en) | 2014-04-29 | 2020-12-29 | Microsoft Technology Licensing, Llc | Using lineage to infer data quality issues |
US11087083B1 (en) * | 2020-03-31 | 2021-08-10 | Coupa Software Incorporated | Managing bundles of digital objects in an e-procurement system |
US11265282B2 (en) * | 2020-03-17 | 2022-03-01 | Slack Technologies, Llc | Methods and apparatuses for managing external approval provisioning and external messaging communication requests in a group-based communication system |
Families Citing this family (177)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7421661B1 (en) * | 2002-04-30 | 2008-09-02 | Aol Llc | Instant messaging interface having an informational tool tip |
US9817556B2 (en) | 2012-12-26 | 2017-11-14 | Roovy, Inc. | Federated commenting for digital content |
WO2014138415A1 (en) * | 2013-03-06 | 2014-09-12 | Northwestern University | Linguistic expression of preferences in social media for prediction and recommendation |
WO2014167474A2 (en) * | 2013-04-07 | 2014-10-16 | Namir Yoav Shalom | Method and systems for archiving a document |
US20140379799A1 (en) * | 2013-06-21 | 2014-12-25 | Microsoft Corporation | Augmenting content obtained from different content sources |
US9229976B2 (en) * | 2013-09-30 | 2016-01-05 | Microsoft Technology Licensing, Llc | Identifying entities based on interactivity models |
US9483529B1 (en) * | 2014-02-14 | 2016-11-01 | Twitter, Inc. | Selection and presentation of unviewed messages |
US20150365363A1 (en) * | 2014-06-17 | 2015-12-17 | Satellite Technologies, Llc | Method and system for exchanging instant messages between one or more users using media as reference |
US10187339B2 (en) * | 2014-06-26 | 2019-01-22 | MailWise Email Solutions Ltd. | Email message grouping |
JP5995220B2 (en) * | 2014-07-11 | 2016-09-21 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | Apparatus and method for processing messages |
US20160014060A1 (en) * | 2014-07-11 | 2016-01-14 | Yahoo! Inc. | Native ad format for interest-based content subscriptions in email |
US9729583B1 (en) | 2016-06-10 | 2017-08-08 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US9942182B2 (en) | 2014-11-17 | 2018-04-10 | At&T Intellectual Property I, L.P. | System and method for cloud based IP mobile messaging spam detection and defense |
US11875392B1 (en) * | 2014-12-23 | 2024-01-16 | Amazon Technologies, Inc. | Method and system for determining and presenting information related to a semantic context of electronic message text or voice data |
US9582574B2 (en) * | 2015-01-06 | 2017-02-28 | International Business Machines Corporation | Generating navigable content overviews |
US20160269341A1 (en) * | 2015-03-11 | 2016-09-15 | Microsoft Technology Licensing, Llc | Distribution of endorsement indications in communication environments |
US10084736B2 (en) | 2016-08-23 | 2018-09-25 | Microsoft Technology Licensing, Llc | Conversation enrichment through component re-order |
US10003561B2 (en) * | 2015-08-24 | 2018-06-19 | Microsoft Technology Licensing, Llc | Conversation modification for enhanced user interaction |
US20170131864A1 (en) * | 2015-11-06 | 2017-05-11 | Facebook, Inc. | Interface for Presenting Feed to a User Based on Scroll Inputs |
US9734248B2 (en) | 2015-12-09 | 2017-08-15 | International Business Machines Corporation | Interest-based message-aggregation alteration |
CN108369665B (en) * | 2015-12-10 | 2022-05-27 | 爱维士软件有限责任公司 | Prediction of (mobile) application usage churn |
US9473440B1 (en) * | 2016-01-19 | 2016-10-18 | International Business Machines Corporation | Hyperlink validation |
US20220164840A1 (en) | 2016-04-01 | 2022-05-26 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US10706447B2 (en) | 2016-04-01 | 2020-07-07 | OneTrust, LLC | Data processing systems and communication systems and methods for the efficient generation of privacy risk assessments |
US11244367B2 (en) | 2016-04-01 | 2022-02-08 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US11004125B2 (en) | 2016-04-01 | 2021-05-11 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US11354434B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US10706176B2 (en) | 2016-06-10 | 2020-07-07 | OneTrust, LLC | Data-processing consent refresh, re-prompt, and recapture systems and related methods |
US11366909B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11481710B2 (en) | 2016-06-10 | 2022-10-25 | OneTrust, LLC | Privacy management systems and methods |
US11138299B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US10839102B2 (en) | 2016-06-10 | 2020-11-17 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US11651104B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US10169609B1 (en) | 2016-06-10 | 2019-01-01 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11651106B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11038925B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11023842B2 (en) | 2016-06-10 | 2021-06-01 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US11544667B2 (en) | 2016-06-10 | 2023-01-03 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US10503926B2 (en) | 2016-06-10 | 2019-12-10 | OneTrust, LLC | Consent receipt management systems and related methods |
US11586700B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
US10909265B2 (en) | 2016-06-10 | 2021-02-02 | OneTrust, LLC | Application privacy scanning systems and related methods |
US11343284B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US11074367B2 (en) | 2016-06-10 | 2021-07-27 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US10878127B2 (en) | 2016-06-10 | 2020-12-29 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11461500B2 (en) | 2016-06-10 | 2022-10-04 | OneTrust, LLC | Data processing systems for cookie compliance testing with website scanning and related methods |
US10769301B2 (en) | 2016-06-10 | 2020-09-08 | OneTrust, LLC | Data processing systems for webform crawling to map processing activities and related methods |
US10242228B2 (en) | 2016-06-10 | 2019-03-26 | OneTrust, LLC | Data processing systems for measuring privacy maturity within an organization |
US10949565B2 (en) | 2016-06-10 | 2021-03-16 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11222139B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems and methods for automatic discovery and assessment of mobile software development kits |
US10416966B2 (en) | 2016-06-10 | 2019-09-17 | OneTrust, LLC | Data processing systems for identity validation of data subject access requests and related methods |
US11418492B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US11100444B2 (en) | 2016-06-10 | 2021-08-24 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US10726158B2 (en) | 2016-06-10 | 2020-07-28 | OneTrust, LLC | Consent receipt management and automated process blocking systems and related methods |
US11222142B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems for validating authorization for personal data collection, storage, and processing |
US11636171B2 (en) | 2016-06-10 | 2023-04-25 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11416590B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11138242B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US10282559B2 (en) | 2016-06-10 | 2019-05-07 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11025675B2 (en) | 2016-06-10 | 2021-06-01 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US11277448B2 (en) | 2016-06-10 | 2022-03-15 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US10706131B2 (en) | 2016-06-10 | 2020-07-07 | OneTrust, LLC | Data processing systems and methods for efficiently assessing the risk of privacy campaigns |
US11625502B2 (en) | 2016-06-10 | 2023-04-11 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US11520928B2 (en) | 2016-06-10 | 2022-12-06 | OneTrust, LLC | Data processing systems for generating personal data receipts and related methods |
US10282700B2 (en) | 2016-06-10 | 2019-05-07 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US10606916B2 (en) | 2016-06-10 | 2020-03-31 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US10510031B2 (en) | 2016-06-10 | 2019-12-17 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11562097B2 (en) | 2016-06-10 | 2023-01-24 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US11416109B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US10585968B2 (en) | 2016-06-10 | 2020-03-10 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11144622B2 (en) | 2016-06-10 | 2021-10-12 | OneTrust, LLC | Privacy management systems and methods |
US11227247B2 (en) | 2016-06-10 | 2022-01-18 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US10318761B2 (en) | 2016-06-10 | 2019-06-11 | OneTrust, LLC | Data processing systems and methods for auditing data request compliance |
US10678945B2 (en) | 2016-06-10 | 2020-06-09 | OneTrust, LLC | Consent receipt management systems and related methods |
US10706379B2 (en) | 2016-06-10 | 2020-07-07 | OneTrust, LLC | Data processing systems for automatic preparation for remediation and related methods |
US10997318B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Data processing systems for generating and populating a data inventory for processing data access requests |
US10873606B2 (en) | 2016-06-10 | 2020-12-22 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US10565161B2 (en) | 2016-06-10 | 2020-02-18 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US10776514B2 (en) | 2016-06-10 | 2020-09-15 | OneTrust, LLC | Data processing systems for the identification and deletion of personal data in computer systems |
US11238390B2 (en) | 2016-06-10 | 2022-02-01 | OneTrust, LLC | Privacy management systems and methods |
US10592648B2 (en) | 2016-06-10 | 2020-03-17 | OneTrust, LLC | Consent receipt management systems and related methods |
US11366786B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US11228620B2 (en) | 2016-06-10 | 2022-01-18 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US10572686B2 (en) | 2016-06-10 | 2020-02-25 | OneTrust, LLC | Consent receipt management systems and related methods |
US11416798B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US10944725B2 (en) | 2016-06-10 | 2021-03-09 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US10607028B2 (en) | 2016-06-10 | 2020-03-31 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US10885485B2 (en) | 2016-06-10 | 2021-01-05 | OneTrust, LLC | Privacy management systems and methods |
US10798133B2 (en) | 2016-06-10 | 2020-10-06 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US10467432B2 (en) | 2016-06-10 | 2019-11-05 | OneTrust, LLC | Data processing systems for use in automatically generating, populating, and submitting data subject access requests |
US10783256B2 (en) | 2016-06-10 | 2020-09-22 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US11157600B2 (en) | 2016-06-10 | 2021-10-26 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11416589B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11438386B2 (en) | 2016-06-10 | 2022-09-06 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US10706174B2 (en) | 2016-06-10 | 2020-07-07 | OneTrust, LLC | Data processing systems for prioritizing data subject access requests for fulfillment and related methods |
US10997315B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11200341B2 (en) | 2016-06-10 | 2021-12-14 | OneTrust, LLC | Consent receipt management systems and related methods |
US11210420B2 (en) | 2016-06-10 | 2021-12-28 | OneTrust, LLC | Data subject access request processing systems and related methods |
US10592692B2 (en) | 2016-06-10 | 2020-03-17 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US11146566B2 (en) | 2016-06-10 | 2021-10-12 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US10949170B2 (en) | 2016-06-10 | 2021-03-16 | OneTrust, LLC | Data processing systems for integration of consumer feedback with data subject access requests and related methods |
US11336697B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US10496846B1 (en) | 2016-06-10 | 2019-12-03 | OneTrust, LLC | Data processing and communications systems and methods for the efficient implementation of privacy by design |
US11188862B2 (en) | 2016-06-10 | 2021-11-30 | OneTrust, LLC | Privacy management systems and methods |
US10565236B1 (en) | 2016-06-10 | 2020-02-18 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11188615B2 (en) | 2016-06-10 | 2021-11-30 | OneTrust, LLC | Data processing consent capture systems and related methods |
US10846433B2 (en) | 2016-06-10 | 2020-11-24 | OneTrust, LLC | Data processing consent management systems and related methods |
US10776518B2 (en) | 2016-06-10 | 2020-09-15 | OneTrust, LLC | Consent receipt management systems and related methods |
US10776517B2 (en) | 2016-06-10 | 2020-09-15 | OneTrust, LLC | Data processing systems for calculating and communicating cost of fulfilling data subject access requests and related methods |
US11151233B2 (en) | 2016-06-10 | 2021-10-19 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US10803200B2 (en) | 2016-06-10 | 2020-10-13 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US11475136B2 (en) | 2016-06-10 | 2022-10-18 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US11675929B2 (en) | 2016-06-10 | 2023-06-13 | OneTrust, LLC | Data processing consent sharing systems and related methods |
US11134086B2 (en) | 2016-06-10 | 2021-09-28 | OneTrust, LLC | Consent conversion optimization systems and related methods |
US10853501B2 (en) | 2016-06-10 | 2020-12-01 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11301796B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US11354435B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11222309B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US10762236B2 (en) | 2016-06-10 | 2020-09-01 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US10284604B2 (en) | 2016-06-10 | 2019-05-07 | OneTrust, LLC | Data processing and scanning systems for generating and populating a data inventory |
US11403377B2 (en) | 2016-06-10 | 2022-08-02 | OneTrust, LLC | Privacy management systems and methods |
US11294939B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11727141B2 (en) | 2016-06-10 | 2023-08-15 | OneTrust, LLC | Data processing systems and methods for synching privacy-related user consent across multiple computing devices |
US11328092B2 (en) | 2016-06-10 | 2022-05-10 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US11087260B2 (en) | 2016-06-10 | 2021-08-10 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US10909488B2 (en) | 2016-06-10 | 2021-02-02 | OneTrust, LLC | Data processing systems for assessing readiness for responding to privacy-related incidents |
US10565397B1 (en) | 2016-06-10 | 2020-02-18 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US10685140B2 (en) | 2016-06-10 | 2020-06-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US10796260B2 (en) | 2016-06-10 | 2020-10-06 | OneTrust, LLC | Privacy management systems and methods |
US11295316B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US10740487B2 (en) | 2016-06-10 | 2020-08-11 | OneTrust, LLC | Data processing systems and methods for populating and maintaining a centralized database of personal data |
US10848523B2 (en) | 2016-06-10 | 2020-11-24 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11341447B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Privacy management systems and methods |
US10708305B2 (en) | 2016-06-10 | 2020-07-07 | OneTrust, LLC | Automated data processing systems and methods for automatically processing requests for privacy-related information |
US10896394B2 (en) | 2016-06-10 | 2021-01-19 | OneTrust, LLC | Privacy management systems and methods |
US11392720B2 (en) | 2016-06-10 | 2022-07-19 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11057356B2 (en) | 2016-06-10 | 2021-07-06 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US10713387B2 (en) | 2016-06-10 | 2020-07-14 | OneTrust, LLC | Consent conversion optimization systems and related methods |
US10719845B2 (en) * | 2016-06-29 | 2020-07-21 | Paypal, Inc. | Marketplace-like presentation system |
US10346448B2 (en) | 2016-07-13 | 2019-07-09 | Google Llc | System and method for classifying an alphanumeric candidate identified in an email message |
US11671383B2 (en) | 2016-09-26 | 2023-06-06 | Microsoft Technology Licensing, Llc | Natural language service interaction through an inbox |
US10645052B2 (en) | 2016-09-26 | 2020-05-05 | Microsoft Technology Licensing, Llc | Service integration into electronic mail inbox |
US10757053B2 (en) * | 2017-03-02 | 2020-08-25 | Microsoft Technology Licensing, Llc | High confidence digital content treatment |
US10013577B1 (en) | 2017-06-16 | 2018-07-03 | OneTrust, LLC | Data processing systems for identifying whether cookies contain personally identifying information |
US10904194B2 (en) | 2017-09-11 | 2021-01-26 | Salesforce.Com, Inc. | Dynamic email content engine |
US20190080358A1 (en) * | 2017-09-11 | 2019-03-14 | Salesforce.Com, Inc. | Dynamic Email System |
US10567156B2 (en) | 2017-11-30 | 2020-02-18 | Bank Of America Corporation | Blockchain-based unexpected data detection |
US10693891B2 (en) | 2017-12-06 | 2020-06-23 | Chicago Mercantile Exchange Inc. | Electronic mail security system |
US11029809B2 (en) * | 2018-05-10 | 2021-06-08 | Citrix Systems, Inc. | System for displaying electronic mail metadata and related methods |
US11544409B2 (en) | 2018-09-07 | 2023-01-03 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11144675B2 (en) | 2018-09-07 | 2021-10-12 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US10803202B2 (en) | 2018-09-07 | 2020-10-13 | OneTrust, LLC | Data processing systems for orphaned data identification and deletion and related methods |
US11017430B2 (en) * | 2018-11-16 | 2021-05-25 | International Business Machines Corporation | Delivering advertisements based on user sentiment and learned behavior |
US10778838B2 (en) * | 2018-12-11 | 2020-09-15 | Nextiva, Inc. | System and method of capturing, tracking, composing, analyzing and automating analog and digital interactions |
US11961108B2 (en) * | 2018-12-19 | 2024-04-16 | Yahoo Assets Llc | Computerized system and method for a mail integrated content delivery and alert system |
US11082378B2 (en) * | 2019-04-10 | 2021-08-03 | Microsoft Technology Licensing, Llc | Tracing messages within a message chain |
US11095600B2 (en) * | 2019-12-09 | 2021-08-17 | Oracle International Corporation | End-to-end email tag prediction |
US11797528B2 (en) | 2020-07-08 | 2023-10-24 | OneTrust, LLC | Systems and methods for targeted data discovery |
WO2022026564A1 (en) | 2020-07-28 | 2022-02-03 | OneTrust, LLC | Systems and methods for automatically blocking the use of tracking tools |
US11722548B2 (en) * | 2020-07-29 | 2023-08-08 | Vmware, Inc. | Smart link generation |
US20230289376A1 (en) | 2020-08-06 | 2023-09-14 | OneTrust, LLC | Data processing systems and methods for automatically redacting unstructured data from a data subject access request |
WO2022060860A1 (en) | 2020-09-15 | 2022-03-24 | OneTrust, LLC | Data processing systems and methods for detecting tools for the automatic blocking of consent requests |
WO2022061270A1 (en) | 2020-09-21 | 2022-03-24 | OneTrust, LLC | Data processing systems and methods for automatically detecting target data transfers and target data processing |
US11425077B2 (en) * | 2020-10-06 | 2022-08-23 | Yandex Europe Ag | Method and system for determining a spam prediction error parameter |
US11397819B2 (en) | 2020-11-06 | 2022-07-26 | OneTrust, LLC | Systems and methods for identifying data processing activities based on data discovery results |
US20220188713A1 (en) * | 2020-12-11 | 2022-06-16 | International Business Machines Corporation | Controlled deferrals of marketing action in sequential workflows |
WO2022159901A1 (en) | 2021-01-25 | 2022-07-28 | OneTrust, LLC | Systems and methods for discovery, classification, and indexing of data in a native computing system |
US11442906B2 (en) | 2021-02-04 | 2022-09-13 | OneTrust, LLC | Managing custom attributes for domain objects defined within microservices |
EP4288889A1 (en) | 2021-02-08 | 2023-12-13 | OneTrust, LLC | Data processing systems and methods for anonymizing data samples in classification analysis |
US11601464B2 (en) | 2021-02-10 | 2023-03-07 | OneTrust, LLC | Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system |
WO2022178089A1 (en) | 2021-02-17 | 2022-08-25 | OneTrust, LLC | Managing custom workflows for domain objects defined within microservices |
US11546661B2 (en) | 2021-02-18 | 2023-01-03 | OneTrust, LLC | Selective redaction of media content |
EP4305539A1 (en) | 2021-03-08 | 2024-01-17 | OneTrust, LLC | Data transfer discovery and analysis systems and related methods |
US11562078B2 (en) | 2021-04-16 | 2023-01-24 | OneTrust, LLC | Assessing and managing computational risk involved with integrating third party computing functionality within a computing system |
WO2023107098A1 (en) * | 2021-12-07 | 2023-06-15 | Google Llc | Immersive, multi-state uni-card |
US11962559B2 (en) * | 2022-01-10 | 2024-04-16 | Yahoo Ad Tech Llc | System and method for providing social interaction interface for emails |
US20230319064A1 (en) * | 2022-03-30 | 2023-10-05 | Sophos Limited | Administration of electronic mail unsubscribe links |
US11620142B1 (en) | 2022-06-03 | 2023-04-04 | OneTrust, LLC | Generating and customizing user interfaces for demonstrating functions of interactive user environments |
Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6146026A (en) * | 1996-12-27 | 2000-11-14 | Canon Kabushiki Kaisha | System and apparatus for selectively publishing electronic-mail |
US20030135565A1 (en) * | 2002-01-14 | 2003-07-17 | Julio Estrada | Electronic mail application with integrated collaborative space management |
US6684239B1 (en) * | 2000-05-16 | 2004-01-27 | At&T Corp. | System and method for automatically publishing electronic mail messages on the internet |
US20060129602A1 (en) * | 2004-12-15 | 2006-06-15 | Microsoft Corporation | Enable web sites to receive and process e-mail |
US20060206578A1 (en) * | 2005-03-11 | 2006-09-14 | Niklas Heidloff | Publication to shared content sources using natural language electronic mail destination addresses and interest profiles registered by the shared content sources |
US20070136354A1 (en) * | 2005-12-10 | 2007-06-14 | International Business Machines Corporation | System and method for importing content into a content management system using an e-mail application |
US20080005284A1 (en) * | 2006-06-29 | 2008-01-03 | The Trustees Of The University Of Pennsylvania | Method and Apparatus For Publishing Textual Information To A Web Page |
US20080103906A1 (en) * | 2006-10-26 | 2008-05-01 | Gurvinder Singh | Online publishing of multimedia content |
US20080120379A1 (en) * | 2001-06-25 | 2008-05-22 | Malik Dale W | System and method for sorting e-mail |
US20080126476A1 (en) * | 2004-08-04 | 2008-05-29 | Nicholas Frank C | Method and System for the Creating, Managing, and Delivery of Enhanced Feed Formatted Content |
US20080215591A1 (en) * | 2006-11-06 | 2008-09-04 | Robert Howard | Email interface for weblog entries |
US20090013043A1 (en) * | 2004-07-30 | 2009-01-08 | Thirdsight Pte. Ltd. | Method of populating a collaborative workspace and a system for providing the same |
US20090043852A1 (en) * | 2007-08-06 | 2009-02-12 | International Business Machines Corporation | System and method for collaboration |
US20090157708A1 (en) * | 2003-09-22 | 2009-06-18 | Jean-Christophe Denis Bandini | Delay technique in e-mail filtering system |
US20100250683A1 (en) * | 2009-03-30 | 2010-09-30 | International Business Machines Corporation | Automatic conversion of email threads into collaborative workspaces |
US20110119593A1 (en) * | 2009-11-16 | 2011-05-19 | Xobni Corporation | Collecting and presenting data including links from communications sent to or from a user |
US20110219087A1 (en) * | 2008-01-18 | 2011-09-08 | Craig Jorasch | Systems and methods for webpage creation and updating |
US8082308B1 (en) * | 2006-12-04 | 2011-12-20 | Andrey Filev | Online collaboration and planning system transparently integrated with e-mail |
US20130024522A1 (en) * | 2011-07-22 | 2013-01-24 | Wall Street Network. Inc. | Email to Content Conversion and Publication System for Use in Knowledge Management Solutions |
Family Cites Families (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7032030B1 (en) * | 1999-03-11 | 2006-04-18 | John David Codignotto | Message publishing system and method |
US7596606B2 (en) * | 1999-03-11 | 2009-09-29 | Codignotto John D | Message publishing system for publishing messages from identified, authorized senders |
US6993559B2 (en) * | 2000-02-14 | 2006-01-31 | Bigbow.Com, Inc. | System, method, apparatus and computer program product for operating a web site by electronic mail |
JP2002132677A (en) * | 2000-10-20 | 2002-05-10 | Oki Electric Ind Co Ltd | Electronic mail transferring device and electronic mail device |
US20020105545A1 (en) * | 2000-11-10 | 2002-08-08 | John Carter | Method and apparatus for automatic conversion of electronic mail to an internet web site |
US7222156B2 (en) * | 2001-01-25 | 2007-05-22 | Microsoft Corporation | Integrating collaborative messaging into an electronic mail program |
US20030225850A1 (en) * | 2002-05-28 | 2003-12-04 | Teague Alan H. | Message processing based on address patterns |
US7606865B2 (en) * | 2002-11-29 | 2009-10-20 | Grouptivity | Collaboration system and method |
US20060155581A1 (en) * | 2005-01-10 | 2006-07-13 | George Eisenberger | Systems with user selectable data attributes for automated electronic search, identification and publication of relevant data from electronic data records at multiple data sources |
US7778926B1 (en) * | 2006-03-29 | 2010-08-17 | Amazon Technologies, Inc. | Processes for verifying, and accepting content postings from, creators of works represented in an electronic catalog |
US20080178125A1 (en) * | 2007-01-23 | 2008-07-24 | Microsoft Corporation | Providing dynamic content in a user interface in an application |
US9224132B1 (en) * | 2007-02-02 | 2015-12-29 | Leydig, Voit & Mayer, Ltd. | Case management system |
US20080263056A1 (en) | 2007-04-19 | 2008-10-23 | Youbiquity, Llc | Electronic content asset publication system |
JP4600521B2 (en) | 2008-06-03 | 2010-12-15 | ソニー株式会社 | Information processing apparatus, information processing method, and program |
US8538809B2 (en) * | 2008-09-29 | 2013-09-17 | Yahoo! Inc. | Estimating on-line advertising inventory value based on contract eligibility information |
US8594711B2 (en) | 2008-12-03 | 2013-11-26 | Zumobi, Inc. | Systems and methods for remotely controlling and customizing applications resident on a mobile device |
US20110055264A1 (en) * | 2009-08-28 | 2011-03-03 | Microsoft Corporation | Data mining organization communications |
US8396857B2 (en) * | 2009-08-31 | 2013-03-12 | Accenture Global Services Limited | System to modify websites for organic search optimization |
US9143478B2 (en) * | 2009-11-08 | 2015-09-22 | Venkat Ramaswamy | Email with social attributes |
US8615442B1 (en) * | 2009-12-15 | 2013-12-24 | Project Rover, Inc. | Personalized content delivery system |
US8560731B2 (en) | 2010-04-09 | 2013-10-15 | Mobila, Inc. | Subscription-based dynamic content optimization |
GB2493875A (en) * | 2010-04-26 | 2013-02-20 | Trustees Of Stevens Inst Of Technology | Systems and methods for automatically detecting deception in human communications expressed in digital form |
US8527436B2 (en) * | 2010-08-30 | 2013-09-03 | Stratify, Inc. | Automated parsing of e-mail messages |
US8824748B2 (en) * | 2010-09-24 | 2014-09-02 | Facebook, Inc. | Auto tagging in geo-social networking system |
US20140032306A1 (en) * | 2010-12-29 | 2014-01-30 | Christopher Sukornyk | System and method for real-time search re-targeting |
US9852401B2 (en) * | 2011-04-04 | 2017-12-26 | Microsoft Technology Licensing, Llc | Providing additional email content in an email client |
US20120271729A1 (en) * | 2011-04-19 | 2012-10-25 | Perfect Commerce, LLC. | Method and System for Managing Sourcing Program Requests |
US20170032408A1 (en) | 2011-07-26 | 2017-02-02 | Socialmail LLC | Automated subscriber engagement |
US20150256499A1 (en) | 2013-10-08 | 2015-09-10 | Socialmail LLC | Ranking, collection, organization, and management of non-subscription electronic messages |
US20130031183A1 (en) | 2011-07-26 | 2013-01-31 | Socialmail LLC | Electronic mail processing and publication for shared environments |
US20130218801A1 (en) * | 2012-02-01 | 2013-08-22 | Openonward, Llc | Method and system for grant management and funding |
US8892524B1 (en) * | 2012-05-22 | 2014-11-18 | International Business Machines Corporation | Collection of data from collaboration platforms |
WO2014081727A1 (en) * | 2012-11-20 | 2014-05-30 | Denninghoff Karl L | Search and navigation to specific document content |
US9805124B2 (en) | 2013-04-25 | 2017-10-31 | Microsoft Technology Licensing, Llc | Automatic generation of a collection of content |
-
2011
- 2011-07-26 US US13/191,412 patent/US20130031183A1/en not_active Abandoned
-
2012
- 2012-12-12 US US13/712,870 patent/US9832151B2/en not_active Expired - Fee Related
-
2013
- 2013-10-08 US US14/049,204 patent/US9521100B2/en not_active Expired - Fee Related
-
2016
- 2016-07-05 US US15/202,461 patent/US20170034101A1/en not_active Abandoned
Patent Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6146026A (en) * | 1996-12-27 | 2000-11-14 | Canon Kabushiki Kaisha | System and apparatus for selectively publishing electronic-mail |
US6684239B1 (en) * | 2000-05-16 | 2004-01-27 | At&T Corp. | System and method for automatically publishing electronic mail messages on the internet |
US20080120379A1 (en) * | 2001-06-25 | 2008-05-22 | Malik Dale W | System and method for sorting e-mail |
US20030135565A1 (en) * | 2002-01-14 | 2003-07-17 | Julio Estrada | Electronic mail application with integrated collaborative space management |
US20090157708A1 (en) * | 2003-09-22 | 2009-06-18 | Jean-Christophe Denis Bandini | Delay technique in e-mail filtering system |
US20090013043A1 (en) * | 2004-07-30 | 2009-01-08 | Thirdsight Pte. Ltd. | Method of populating a collaborative workspace and a system for providing the same |
US20080126476A1 (en) * | 2004-08-04 | 2008-05-29 | Nicholas Frank C | Method and System for the Creating, Managing, and Delivery of Enhanced Feed Formatted Content |
US20060129602A1 (en) * | 2004-12-15 | 2006-06-15 | Microsoft Corporation | Enable web sites to receive and process e-mail |
US20060206578A1 (en) * | 2005-03-11 | 2006-09-14 | Niklas Heidloff | Publication to shared content sources using natural language electronic mail destination addresses and interest profiles registered by the shared content sources |
US20070136354A1 (en) * | 2005-12-10 | 2007-06-14 | International Business Machines Corporation | System and method for importing content into a content management system using an e-mail application |
US20080005284A1 (en) * | 2006-06-29 | 2008-01-03 | The Trustees Of The University Of Pennsylvania | Method and Apparatus For Publishing Textual Information To A Web Page |
US20080103906A1 (en) * | 2006-10-26 | 2008-05-01 | Gurvinder Singh | Online publishing of multimedia content |
US20080215591A1 (en) * | 2006-11-06 | 2008-09-04 | Robert Howard | Email interface for weblog entries |
US8082308B1 (en) * | 2006-12-04 | 2011-12-20 | Andrey Filev | Online collaboration and planning system transparently integrated with e-mail |
US20090043852A1 (en) * | 2007-08-06 | 2009-02-12 | International Business Machines Corporation | System and method for collaboration |
US20110219087A1 (en) * | 2008-01-18 | 2011-09-08 | Craig Jorasch | Systems and methods for webpage creation and updating |
US20100250683A1 (en) * | 2009-03-30 | 2010-09-30 | International Business Machines Corporation | Automatic conversion of email threads into collaborative workspaces |
US20110119593A1 (en) * | 2009-11-16 | 2011-05-19 | Xobni Corporation | Collecting and presenting data including links from communications sent to or from a user |
US20130024522A1 (en) * | 2011-07-22 | 2013-01-24 | Wall Street Network. Inc. | Email to Content Conversion and Publication System for Use in Knowledge Management Solutions |
Non-Patent Citations (1)
Title |
---|
"Craigslist Online Community." Craigslist.org. July 6, 2010. * |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9832151B2 (en) | 2011-07-26 | 2017-11-28 | Socialmail LLC | Aggregate electronic mail message handling |
US9613385B2 (en) | 2011-08-02 | 2017-04-04 | Bank Of America Corporation | System for analyzing device performance data |
US20130036130A1 (en) * | 2011-08-02 | 2013-02-07 | Bank Of America Corporation | System for Analyzing Device Performance Data |
US20130036125A1 (en) * | 2011-08-02 | 2013-02-07 | Bank Of America Corporation | System for Analyzing Device Performance Data |
US9317821B2 (en) * | 2011-08-02 | 2016-04-19 | Bank Of America Corporation | System for analyzing device performance data |
US20140149482A1 (en) * | 2012-11-26 | 2014-05-29 | Red Hat, Inc. | Systems and methods for providing specification of a location of a user of a communication device |
US10021528B2 (en) * | 2012-11-26 | 2018-07-10 | Red Hat, Inc. | Providing specification of a location of a communication device |
US9544263B1 (en) | 2013-01-27 | 2017-01-10 | Bryant Christopher Lee | Method and system for sending an indication of response to an online post from a text message |
US9807049B2 (en) * | 2013-05-24 | 2017-10-31 | erodr, Inc. | Systems and methods to present messages in location-based social networking communities |
US20150058957A1 (en) * | 2013-05-24 | 2015-02-26 | erodr, Inc. | Systems and methods to present messages in location-based social networking communities |
US9866513B2 (en) | 2013-12-31 | 2018-01-09 | erodr, Inc. | Systems and methods to control the lifetime of online posts |
US20150312201A1 (en) * | 2014-04-25 | 2015-10-29 | International Business Machines Corporation | Organizing social network messages based on temporal characteristics |
US9560004B2 (en) | 2014-04-25 | 2017-01-31 | International Business Machines Corporation | Organizing social network messages based on temporal characteristics |
US9560005B2 (en) * | 2014-04-25 | 2017-01-31 | International Business Machines Corporation | Organizing social network messages based on temporal characteristics |
US10877955B2 (en) | 2014-04-29 | 2020-12-29 | Microsoft Technology Licensing, Llc | Using lineage to infer data quality issues |
US10089409B2 (en) * | 2014-04-29 | 2018-10-02 | Microsoft Technology Licensing, Llc | Event-triggered data quality verification |
US20150363092A1 (en) * | 2014-05-30 | 2015-12-17 | Contatta, Inc. | Systems and methods for collaborative electronic communications |
US9954807B2 (en) | 2015-03-11 | 2018-04-24 | Microsoft Technology Licensing, Llc | Endorsement indications in communication environments |
US10462087B2 (en) | 2015-03-11 | 2019-10-29 | Microsoft Technology Licensing, Llc | Tags in communication environments |
US10404634B2 (en) * | 2015-07-01 | 2019-09-03 | Sean P. Fenlon | Method for publishing and sharing content on the internet |
US9992145B2 (en) * | 2016-03-18 | 2018-06-05 | International Business Machines Corporation | Email threads related to messaging content |
US20170272394A1 (en) * | 2016-03-18 | 2017-09-21 | International Business Machines Corporation | Email threads related to messaging content |
US11265282B2 (en) * | 2020-03-17 | 2022-03-01 | Slack Technologies, Llc | Methods and apparatuses for managing external approval provisioning and external messaging communication requests in a group-based communication system |
US11271891B2 (en) * | 2020-03-17 | 2022-03-08 | Slack Technologies, Llc | Methods and apparatuses for managing external approval provisioning and external messaging communication requests in a group-based communication system |
US11087083B1 (en) * | 2020-03-31 | 2021-08-10 | Coupa Software Incorporated | Managing bundles of digital objects in an e-procurement system |
Also Published As
Publication number | Publication date |
---|---|
US9832151B2 (en) | 2017-11-28 |
US20170034101A1 (en) | 2017-02-02 |
US9521100B2 (en) | 2016-12-13 |
US20150032824A1 (en) | 2015-01-29 |
US20150100894A1 (en) | 2015-04-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20130031183A1 (en) | Electronic mail processing and publication for shared environments | |
US10666597B2 (en) | Recipient location aware notifications in response to related posts | |
US8095551B2 (en) | Annotating shared contacts with public descriptors | |
US9325653B1 (en) | Notifying content owners of related posts | |
US8838564B2 (en) | Method to increase content relevance using insights obtained from user activity updates | |
US20150256499A1 (en) | Ranking, collection, organization, and management of non-subscription electronic messages | |
US20140052791A1 (en) | Task Based Filtering of Unwanted Electronic Communications | |
US20130138428A1 (en) | Systems and methods for automatically detecting deception in human communications expressed in digital form | |
JP2013543610A (en) | System and method for reputation management of consumer sent media | |
Ahsan et al. | Spams classification and their diffusibility prediction on Twitter through sentiment and topic models | |
Carvalho et al. | Applying semantic technologies to fight online banking fraud | |
US8769420B2 (en) | Systems and methods for webpage creation and updating | |
US7693907B1 (en) | Selection for a mobile device using weighted virtual titles | |
US9021373B2 (en) | Systems and methods for webpage creation and updating | |
West et al. | Autonomous link spam detection in purely collaborative environments | |
Roussas | Visualization of client-side web browsing and email activity | |
Kolari | Detecting Spam Blogs: An Adaptive Online Approach | |
Orman | Towards a semantics of phish | |
Chew | Cyberstalking on facebook: examining the relationship between facebook usage characteristics and cyberstalking victimization among young malaysian facebook users | |
Iqbal et al. | Analyzing Network Level Information | |
Kim et al. | BlogForever: D2. 5 Weblog spam filtering report and associated methodology | |
Agrawal et al. | Autonomous Link Spam Detection in Purely Collaborative Environments | |
Carvalho | Online banking malware ontology | |
Lehmann | Student. world: a solution to pragmatic waste? |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SOCIALMAIL LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KUMAR, ANKESH;GOWDRA, YOGESH;IOANNIDIS, JAMES;SIGNING DATES FROM 20110725 TO 20110726;REEL/FRAME:026660/0628 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |