EP1340156A4 - System, method, and computer program product for providing a multi-user e-mail system - Google Patents

System, method, and computer program product for providing a multi-user e-mail system

Info

Publication number
EP1340156A4
EP1340156A4 EP01990661A EP01990661A EP1340156A4 EP 1340156 A4 EP1340156 A4 EP 1340156A4 EP 01990661 A EP01990661 A EP 01990661A EP 01990661 A EP01990661 A EP 01990661A EP 1340156 A4 EP1340156 A4 EP 1340156A4
Authority
EP
European Patent Office
Prior art keywords
user
mail
computer
email
users
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP01990661A
Other languages
German (de)
French (fr)
Other versions
EP1340156A2 (en
Inventor
Robert C Ross Jr
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xante Corp
Original Assignee
Xante Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/714,997 external-priority patent/US7421472B1/en
Application filed by Xante Corp filed Critical Xante Corp
Publication of EP1340156A2 publication Critical patent/EP1340156A2/en
Publication of EP1340156A4 publication Critical patent/EP1340156A4/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]

Definitions

  • the present invention relates to electronic mail (e-mail) systems and more particularly, to multiple user e-mail systems.
  • Electronic mail also known as e-mail
  • a conventional e-mail system enables sending e-mail notes or e-mail messages much like a conventional postal letter from a source to a destination.
  • a sender could send an e-mail message including a return e-mail address to a receiver at the receiver's e-mail address on another computer through a network connecting the computers.
  • E-mail messages provide several advantages over conventional postal mail, such as, for example, faster preparation time, faster delivery time, a simpler addressing scheme than using name, street address or post office box, city, state and zip code, and lower cost.
  • E-mail systems can provide an efficient means of distributing information internal to and external from an enterprise or business.
  • conventional e-mail systems have limitations when used in, e.g., a manufacturing plant or production environment such as, e.g., a hospital, or retail business.
  • conventional e-mail systems require that each user have a computer with which to access the e-mail system, h a production or manufacturing environment, a machine operator often will not have access to a computer.
  • it may be unsafe in certain environments to permit a worker to be distracted by e-mail while performing tasks such as, e.g., monitoring a mission critical operation, such as where a worker is operating heavy machinery or a nurse in a hospital.
  • Limitations of conventional e-mail systems can prevent many users within organizations from, e.g., accessing important corporate information which is most efficiently distributed over e-mail.
  • e-mail messages have included primarily text.
  • users were able to attach files for delivery along with an e-mail textual message.
  • Such attached files are often called "attachments.”
  • Many e-mail systems support attaching multiple documents to an e-mail message.
  • the attachment is conventionally forwarded along with the message containing it causing the forwarded e-mail with attachment to be encapsulated within the new e-mail.
  • e-mail system is a client/server e-mail system.
  • the e-mail system can use a centralized post office box that resides on a server somewhere on the network to which client e-mail user computers are attached.
  • the post office box can be used, e.g., to store a message from a sender which can then forward the message later to a temporarily disconnected addressed receiver.
  • the centralized post office can also permit messages to be centrally backed up on a periodic basis.
  • a client/server e-mail system a portion of the e-mail generating program can reside on a client's computer (the computer of the sender or receiver), and another portion of the e-mail system can reside on a server computer.
  • E-mail application software can run on a variety of operating systems and computer system platforms. Conventionally, e-mail messages are stored on the central server computer and are accessed via the client user computers.
  • Groupware enables functions in addition to the communication capability of e-mail including, for example, project management, location independent cooperation and information accessibility links.
  • Examples of e-mail systems include, for example, Lotus cc:Mail available from IBM, Outlook, Exchange, and MS Mail available from MICROSOFT of Redmond, Washington, USA, PROFS and OFFICENISION available from IBM of Armonk, New York, USA, All-in-One from Compaq of Houston, Texas, USA, online service provider integrated e-mail systems such as, e.g., that provided by AMERICA ONLINE (AOL) of Vienna, Virginia, USA, the Internet Protocol's Simple Mail Transfer Protocol (SMTP), and various Internet based e-mail systems such as those available from JUNO and NETZERO.
  • Examples of groupware include Lotus Notes available from IBM, Exchange available from MICROSOFT, Collabra Share available from NETSCAPE, and Groupwise available from NOVELL.
  • An intranet is a term often used to describe a stand alone network or group of networks which includes a related group of senders and receivers, such as, for example, the employees of a commercial company.
  • TCP/IP transmission control protocol/internet protocol
  • An internet is a network which couples two separate networks to one another.
  • the global Internet i.e. with a capitalized "i" is an internet that grew out of a U.S. Defense Advanced Research Projects Agency (DARPA) project.
  • DRPA Defense Advanced Research Projects Agency
  • the Internet originally served a largely technical audience composed of the military, government agencies, and academic researchers and scientists. The original goals of the project were to allow researchers to share computing resources and to exchange information, regardless of their locations, and to create a resilient, fault-tolerant wide area network (WAN) for military communications.
  • the global Internet implements communication using the TCP/IP communications protocols.
  • On-line service providers originally provided e-mail system access to individuals via modem connections.
  • On-line service providers include, for example, American On Line (AOL), CompuServe, and Prodigy. Online services traditionally created offerings targeted toward home computer users. These providers often provided proprietary e-mail systems to connect their users to one another. In time, users on proprietary on-line services, were able to send messages to users on other e-mail services via the Internet.
  • AOL American On Line
  • CompuServe CompuServe
  • Prodigy Prodigy.
  • Online services traditionally created offerings targeted toward home computer users. These providers often provided proprietary e-mail systems to connect their users to one another. In time, users on proprietary on-line services, were able to send messages to users on other e-mail services via the Internet.
  • Small and medium sized businesses have many users which do not have access to a computer with which to send and receive e-mail.
  • Workers in various professions including, e.g., healthcare workers in a hospital and retail, because of their jobs, may not have access to conventional email.
  • the employer not be required to purchase a computer for use by each of the employees.
  • the employer be able to filter out any junk e-mail, commonly known as "spam," being sent to the employees.
  • employees such as, e.g., in a retail business, production, or operations such as a hospital, not be permitted to access their e-mail at all times in order to maintain high worker productivity.
  • the e-mail can include various new and useful features, such as, e.g., human resource communication and statistics tools, timeclock in/out, incoming mail filters, delayed receipt of e-mail, delayed message sending, auto-reply, auto-forwarding, encryption, automatic passing of a public key, advertising banners, embedded voicemail and video attachments, removal of embedded characters, direct attachment viewing, direct sending of attachments, spell-check, thesaurus, text view formatting (HTML or standard text), personal memo creation, address book, smartnames callup of addressee by typing letters of the name, user-selectable hotkey functions, remote logon to file folder from web interface, and an administration system for setup of passwords, secure folders, and filtering.
  • human resource communication and statistics tools such as, e.g., human resource communication and statistics tools, timeclock in/out, incoming mail filters, delayed receipt of e-mail, delayed message sending, auto-reply, auto-forwarding, encryption, automatic passing of a public key, advertising banners, embedded voicemail
  • FIG. 1A is a block diagram of a distributed client/server e-mail system
  • FIG. IB is a block diagram of an exemplary system depicting an e-mail application program running on a computer hardware and operating system platform;
  • FIG. 2 depicts a conventional e-mail
  • FIG. 3 is an example embodiment of a multi-user shared e-mail system according to the present invention.
  • FIG. 4 depicts an exemplary computer system of the present invention.
  • FIG. 5 depicts an exemplary embodiment of a user interface of the multi-user e-mail system of the present invention.
  • FIG. 6 depicts an exemplary embodiment of a personal file folder system of the present invention.
  • FIG. 7 depicts an exemplary embodiment of a read receipt report according to the present invention.
  • FIG. 8 A depicts an exemplary setup process of a public key inf astructure
  • PKI public and a private key
  • FIG. 8B depicts a exemplary embodiment of an improved setup process for configuring public and private keys according to the present invention.
  • FIG. 8C depicts an exemplary embodiment of a source code view of an email including an automatic embedded public key according to the present invention.
  • the present invention is directed to a system, method and computer program product that enables multiple users to access a single shared computer to send, receive and store e-mail messages.
  • the system can be used continually in real-time working environment.
  • the multiple user, shared single computer e-mail system permits these multiple users to view the computer and through a user interface identify whether new e-mail has arrived for any of the users.
  • the users can use a touchscreen to identify themselves to the system and the system can then require entry of a password to authenticate the user.
  • a conventional display monitor can be used for output of status information and a mouse or other pointing device or keyboard or other device can be used for input.
  • the system can through its user interface identify a priority level of newly received e-mail, to prioritize which of the multiple users should gain access to the shared computer first.
  • the priority level can be identified by, e.g., providing a colored representation as to the urgency of the e-mail, such as, e.g., a colored or blinking name or button, or alphanumeric or other indication of priority such as, e.g., a ranked list.
  • the user with the highest priority could then access the shared e-mail system first.
  • the user with the highest priority e-mail message can then select to open his or her e-mail.
  • a user can select to open the user's name by, e.g., using a mouse, key or highlighting a name or button with a cursor.
  • the user can then be prompted to provide authentication information such as, e.g., a password and/or company badge, to gain access to that user's personal e-mail environment.
  • a user's personal e-mail environment can include, e.g., an inbox, an outbox, and at least one user definable file folder into which received messages can be stored, h an embodiment of the invention, the system can store messages in file folders named by sender of the message or can permit the user to provide another name for the folder such as "personal", h one embodiment of the invention, the file folders can include different security features such as, e.g., passwords for access to the specific file folder.
  • An encryption feature can be used to encrypt and decrypt the contents of e-mail messages to prevent unauthorized access to the contents of a message, h one embodiment, a public key can be automatically sent with an email.
  • the public key can be included at the top of an email in one embodiment.
  • two users can send emails to one another.
  • a first group including a first subset of all users can use a first single shared computer and a second group including a second subset of all users can use a second single shared computer.
  • a banner can be included onscreen to display advertising or other relevant information to users of the shared e-mail system.
  • the banner can be used, e.g., to display advertising information which can be used, e.g., to offer the e-mail system for free or a discount to businesses.
  • the shared e-mail system can include other useful features such as, e.g., a dictionary for spellcheck, a thesaurus, a grammar checker, multiple standard replies, or standard reply lists (such as, e.g., an informal reply, a business or formal reply), address book for selecting recipients, special text viewing (e.g., permitting viewing HTML or text), smart names (e.g., permitting entry of letters of a name causing, e.g., lookup of one or more addressbook entries having those letters, a list of names, or the addressbook interface itself by a function key combination), user selectable function keys (e.g., permitting a user to assign particular functions to key combinations such as, e.g., Alt-k to bring up the address book), a memo feature (i.e., enabling preparing brief memos to oneself).
  • a dictionary for spellcheck e.g., a thesaurus
  • a grammar checker e.g., multiple standard replies, or standard reply lists
  • a user can access the user's e-mail environment from the Internet's world wide web.
  • storage of the user's e-mail environment is mirrored to a server on the world wide web and is kept in synchrony, one embodiment, a user from the web interface can send, receive, store in folders, move and delete messages.
  • the e-mail system can use a version of the standard POP3 mail application modified for the specific features of the shared e-mail system.
  • the present invention can also include human resource features.
  • a user can clock in and clock out via the system to provide an automated timeclock.
  • Another human resource feature can permit tracking user statistics by capturing user data via the system including, e.g., the number of employees, the number of hourly employees, the number of female and males workers, hours worked, whether someone is in or out.
  • Another human resource feature of the present invention includes provision of a company wide e-mail for use in, e.g., notifying all employees of events, company policy and other announcements.
  • the present invention in one embodiment, can require each employee to acknowledge that they have read an e-mail (e.g., regarding a company policy) and the system can automatically compile a single record regarding all employees indicating which employees opened the e-mail and which did not.
  • a report referred to as a read receipt report can be generated that can track which recipients have accessed a sent file, one embodiment, the date and time of access can be tracked also, i one embodiment the report can be continually updated.
  • the present invention provides several other features applicable to general e-mail systems.
  • the present invention can include an e-mail system having a function that automatically removes greater-than (">") signs that other e-mail systems could have embedded into forwarded e-mails.
  • Another e-mail feature includes in the window interface that presents the contents of an open e-mail, a graphical display indicating a hierarchy of forwarded e-mails and attachments.
  • the graphical display enables forwarding of only an included forwarded e-mail or attachment.
  • Another embodiment of the present invention can filter e-mail obtained from a list of internet locations (e.g., addresses or domain names), which can be maintained by an administrator (i.e., in one embodiment of the invention for a single user version, the administrator can be the user).
  • the filter can refuse acceptance of e-mails from those designated locations by maintaining a so-called "no spam" list.
  • the filter can be used to block other e-mail based on criteria set by the administrator, such as, e.g., limiting the size of an e-mail or attachments.
  • incoming e-mail can be queued and can be forwarded to the recipient e-mail user, only at a particular time (such as, e.g., break time, lunch time, or after hours).
  • a particular time such as, e.g., break time, lunch time, or after hours.
  • this feature can prevent employees from sneaking off at non-break times to check e-mail
  • access to a user's e-mail box can be restricted to only particular times of the day, avoiding employee temptation to check e-mail.
  • sending of a message can be delayed to a given time by inputting a send date and time upon creation of the e-mail.
  • the delayed send e-mail feature can enable earlier entry of e-mail birthday greetings to be sent on an employee's birthday.
  • a feature can be provided to store e-mail in a folder which can default to be titled by the sender's e-mail userid (i.e., also commonly referred to as username, screenname, or e-mail address).
  • the user can be permitted to modify the folder name such as, e.g., to replace it with the sender's company name, or department name, or other designation for the folder such as, e.g., "personal,” or "confidential.”
  • the system can automatically timeout and close a user's e-mail if no action has been made for a selectable period of time, to prevent unauthorized access to the user's e-mail environment.
  • FIG. 1A illustrates a block diagram of e-mail system environment 100 which includes an exemplary distributed client/server computer e-mail system.
  • E-mail system environment 100 includes a sending user 102 which sends an e-mail message to a receiving user 104.
  • Sending user 102 creates the e-mail on a client computer 106.
  • Client computer 106 transmits the e-mail from sending user 102 to receiving user 104 on a client computer 110.
  • An e-mail message may be created via mail client 116 of client computer 106 and may be sent via interaction with a mail server 118 on a server 112 over a communications network 114.
  • An e-mail 200 described further below with reference to FIG.
  • communications network 114 includes an intranet.
  • communications network 114 includes the global Internet. It would be apparent to a person having ordinary skill in the art that the features of the present invention can be used in alternative e-mail system environments and architectures.
  • FIG. IB depicts an exemplary computer environment 120 for client computer 106. It would be apparent to a person having skill in the art that environment 120 could also depict client computer 110 and server 112.
  • Operating system 124 provides a uniform interface of application programming interfaces (APIs) to applications 126, 128 and 130 for access to hardware 122.
  • An exemplary application 126 is an e-mail application program, mail program 132.
  • Mail program 132 is an example of mail client 116 and mail server 118.
  • a mail program 134 can be included as part of operating system 124 to provide e-mail functionality to applications 126, 128 and 130.
  • mail client 116 can include an authentication input module which can accept a password from user 102 to validate that user 102 is authorized to access the e-mail account of user 102.
  • Authentication input module 108 can interact with an authentication server module 136 of mail server 118 to determine whether user 102 is authorized to access the personal e-mail box of user 102.
  • authentication server module 136 can provide user 102 access via a storage module 138 to the mailbox of user 102 of e-mail storage 140.
  • FIG. 2 illustrates an example of a conventional e-mail 200.
  • E-mail 200 includes various data components.
  • Example data components included in e-mail 200 are creation information 202, a body 204, address information 206, and a subject 208.
  • creation information 202 can include, e.g., the date and time e-mail 200 was sent from sending user 102 to receiving user 104.
  • the body 204 of e-mail 200 can include, e.g., a text portion 210 and embedded objects 212.
  • Embedded objects 212 can include, e.g., attachments 214.
  • Other embedded objects 216 can include, e.g., bit map images, graphics objects, executable programs, compressed text and applets.
  • Embedded objects 216 can also include a forwarded e-mail 200.
  • Address information 206 can include the
  • Attachments 214 can also include other embedded objects 212.
  • Subject 208 can include a brief description of the contents of e-mail 200. It would be apparent to persons skilled in the art that e-mail 200 can include a subset of the listed components.
  • FIG. 3 illustrates an example embodiment of an implementation of the present invention, including e-mail system 300.
  • E-mail system 300 can include a computer 302 in communication with users 304, 306 and 308.
  • Computer 302 includes a multi-user mail system 310.
  • multi-user mail system 310 is a Point Clear e-mail system available from Point Clear.net, Inc. a wholly owned subsidiary of XANTE Corporation of Mobile, Alabama, USA.
  • E-mail system 310 can include, in one embodiment, a prioritization module 312, an authentication module 314, a storage module 316, an e-mail storage module 318, an in queue 326 and an out queue 328.
  • Prioritization module 312 can indicate which of users 304, 306 and 308 should have priority to access computer 302 and multi-user mail system 310.
  • the urgency of e-mail messages can be indicated as a form of priority. For example, e-mails from a particular e-mail address could trigger a higher priority, such as, e.g., an e-mail from the CEO of a company. Other indications of priority could include, receipt of an e-mail message, versus having no new messages. Informally, a supervisor could have a higher priority than a line worker who, in turn, could have higher priority than a part-time worker.
  • user 304 can proceed to authenticate using authentication module 314 by, e.g., entering a password, to access a storage environment 320.
  • storage module 316 can provide user 304 access to storage environment 320 of e-mail storage 318 via storage module 316.
  • the e-mail can be routed via an out queue 328 to its final destination.
  • the e-mail can be queued at in queue 326.
  • in queue 326 and out queue 324 can be used to delay sending or receipt and for filtering operations.
  • the present invention enables status of multiple users' e-mail accounts to be monitored and accessed from a single computer where each user is identified on a name screen. See FIG. 5 below depicting diagram 500 of an exemplary embodiment of a multi-user interface of the present invention.
  • the exemplary embodiment of FIG. 5 depicts a graphical user interface (GUI) application, applet, or browser interface to the multi-user email system of the present invention.
  • GUI graphical user interface
  • An exemplary implementation embodiment of the multi-user email system of the present invention is the PointClear TM system available from PointClear.net, Inc., a wholly owned subsidiary of XANTE Corporation of Mobile, Alabama, U. S .A.
  • the single shared computer multiple e-mail system supports greater than 7 users and up to 64 users on the single computer, hi another exemplary embodiment, 4 columns of 16 users can be displayed using the multi-user interface of the multi-user email system of the present invention as shown in diagram 500.
  • a system administration tool can be used to configure each e-mail account at a company.
  • the name screen is the default screen for the multiple e-mail account system listing e-mail accounts by user name associated with the computer.
  • a time clock feature is included providing an electronic time clock.
  • a system administrator can identify time clock employees, in one embodiment, and can setup specific features that need to be logged such as, e.g., log-in, log-out, overtime, human resource reporting and supervisor warnings.
  • Log out can be based on, e.g., passage of a time duration or other criteria. This feature prevents unauthorized access to an account by public viewing after a user leaves the system computer without logging out.
  • the system of the present invention can be provided for a discount such as, e.g., free, if users are willing to watch advertising.
  • Free evaluation use could also be provided. With a free evaluation use, a date is identified after which use is disabled. After completion of particular criteria, access can be re-enabled preserving all file folders, hi one embodiment, an advertising banner can be included and can be placed in a fixed location. Advertising, in one embodiment, can be provided from
  • an address book importer can be provided to import address listings from other application programs.
  • attachments of all types can be accessible for adding to an e-mail, saving from an e-mail, deleting from an e-mail, executing from the e-mail, and forwarding as an e-mail.
  • An e-mail can also be forwarded as an attacliment.
  • a user can select from multiple attachments by highlighting selected attachments for forwarding and the selected attachments only can be forwarded, in one embodiment.
  • a spam eliminator can maintain a dynamic list of e-mail addresses that can be identified as sources from which e-mail is not accepted.
  • the spam eliminator is a filter which can be based on e-mail address, domain name, or other identifier.
  • online help can be provided.
  • the address book can include groups of e-mail users.
  • e-mail folder security can be provided restricting access to stored folders to only users entering authentication criteria such as, e.g., a password associated with that folder.
  • a spell-checking feature can be provided.
  • messages can be marked as urgent, (also referred to as hot, or hot mail), or can be identified as a priority level by inclusion in their body or otherwise of identifying priority information.
  • receipt of an urgent e-mail can initiate an urgency signal such as, e.g., a visual, graphical, or audio indication.
  • Diagram 500 of FIG. 5, for example, depicts new mail via an envelope icon 512, 508.
  • Urgency of the emails waiting a review by the multiple users can be indicated by, e.g., color coding such as, e.g., red 506 for the highest urgency, yellow 510 for intermediate urgency and white 502 for the lowest priority. Alternatively, other colors can be used.
  • an audio, visual, iconic, numeric, alpha numeric, or other indication of priority can be provided.
  • a higher priority can trigger, e.g., an audio alarm, or a wireless alertor page.
  • No new mail 504 can be indicated on the multi-user interface as well.
  • inclusion of specific words or phrases in an e-mail, or subject portion can be recognized by consulting a library of words and phrases, and prior to receiving the e-mail containing the words or phrases, the e-mail can be rejected.
  • An automatic response can be initiated to the sender of the message indicating what has happened, or even warning the sender of consequences of sending such e-mail.
  • delayed message delivery can permit identification of a delivery date and time for delivery of the e-mail message.
  • an e-mail account can be set up to auto forward any received e-mails to another e-mail address.
  • an autoreceipt feature can be enabled by a sender of an e-mail to verify that a receiver has, e.g., accessed, received, or opened e-mail, h an exemplary embodiment, a read receipt report can be displayed such as, e.g., the read receipt report as shown in FIG. 7 is described further below.
  • an encryption feature can enable entry of a personal encryption key between sender and receiver to control access to an e-mail.
  • Multiple algorithms can be supported for encryption.
  • legacy algorithms can continue to be supported. Users of earlier revisions of the e-mail system set up with a first algorithm, can continue to use the first algorithm even when the program defaults to, e.g., a tenth algorithm, h one exemplary embodiment, a user's public key can be automatically generated by the present invention, h one embodiment, a public key can be automatically embedded in an email message that is being sent. The reader is referred to FIGs.
  • 8A, 8B, and 8C for examples of a conventional public key infrastructure, exchange of public keys according to the present invention, and an email indicating a public key embedded at the top of the email shown when viewing the source code according to the present invention, respectively.
  • a user need not go through a complicated set up process as is conventionally required.
  • a list of names can be parsed as potential e-mail recipients based on the keys depressed by the sender of the e-mail. The more characters that are typed, in one embodiment, the narrower the selection of names. Pressing a key combination can list all possible candidates for the keys pressed, from which the user can select.
  • a key or key combination can be defined by a user to perform tasks. Using this feature, a user can set desired actions for, e.g., function keys, and alternate and control key combinations.
  • a user can insert a voicemail into an e-mail while composing the e-mail. h an embodiment of the invention, a user can insert an audio/video recording into an e-mail.
  • personal reminder memos can be created in the e-mail user environment.
  • the sender of the e-mail when an e-mail is received, the sender of the e-mail, automatically, or through prompting, can be added to the address book, another embodiment, the carbon copy list can similarly be added to the address book.
  • an e-mail includes inserted greater than signs (">")
  • a feature can be included that deletes any greater than symbols from the beginning of a string. This character is often added by an e-mail system when forwarding an e-mail message.
  • the ">" is a default character in many e-mail systems, but can be eliminated or changed to another character in some systems. Thus, in another embodiment, the character to be removed can be designated.
  • FIG. 6 depicts a user interface illustrating an exemplary embodiment of a personal filing system 600 of the present invention.
  • the personal filing system 600 can include a user's e-mail environment including a file cabinet 602.
  • the file cabinet 602 is a folder identified as a location to create personal nested sub-folders into which a user can organize incoming and outgoing e-mail.
  • the user in one embodiment, can set the properties for sending and receiving e-mail related to the file cabinet. For example, all e-mails sent by a sending user can be automatically stored in a personal folder in the sending user's personal file cabinet 600.
  • the email stored in a file folder named by the recipient's e-mail address or user name.
  • a read receipts continually updateable file can be stored in an assigned folder.
  • a user can also modify the folder into which the e-mail can be stored upon sending.
  • the e-mail can be stored automatically into an assigned folder such as, e.g., a folder that can be set by the sending user's e-mail address or user name.
  • a recipient by selection of a single button can cause the email to be automatically stored in the assigned personal folder.
  • a user's e-mail configuration can be mirrored on a server that can be accessible from a web browser, or a remote version of the mail system.
  • This interface can give a user access to the user's address book and all the user's folders as if the user were sitting in front of the multi-user shared e-mail system computer.
  • the user that is sending and receiving e-mail can also be viewed, by the recipients of the e-mail, as being at the recipient's desks.
  • the present invention is computer platform independent.
  • Client computer is computer platform independent.
  • 106 in a preferred embodiment is a personal computer (PC) system running an operating system such as Windows Mac/OS, or a version of UNLX.
  • PC personal computer
  • an operating system such as Windows Mac/OS, or a version of UNLX.
  • the invention is not limited to these platforms. Instead, the invention can be implemented on any appropriate computer system running any appropriate operating system, such as, for example, Solaris, fr ⁇ x, Linux, HPUX, OSF, Windows, Windows NT, OS/2, Mac/OS.
  • the present invention is implemented on a computer system operating as discussed herein, h another embodiment, the present invention can be implemented on hardware such as a handheld device, such as, e.g., a two-way pager, a cellular phone, a digital phone, a watch, a wireless device, a laptop, notebook or sub-notebook computer, and other computer type device such as, e.g., a micro-computer, a mini-computer and a mainframe computer.
  • a handheld device such as, e.g., a two-way pager, a cellular phone, a digital phone, a watch, a wireless device, a laptop, notebook or sub-notebook computer, and other computer type device such as, e.g., a micro-computer, a mini-computer and a mainframe computer.
  • FIG. 4 depicts an exemplary client computer 106 computer system.
  • Other components of the invention such as client computer 110, computer 302, and/or server computer 112, could also be implemented using a computer such as that shown in FIG. 4.
  • the computer system 106 includes one or more processors, such as processor 402.
  • the processor 402 is connected to a communication bus 404.
  • Client computer 106 also includes a main memory 406, preferably random access memory (RAM), and a secondary memory 408.
  • the secondary memory 408 includes, for example, a hard disk drive 410 and/or a removable storage drive 412, representing a floppy diskette drive, a magnetic tape drive, a compact disk drive, etc.
  • the removable storage drive 412 reads from and/or writes to a removable storage unit 414 in a well-known manner.
  • Removable storage unit 414 also called a program storage device or a computer program product, represents a floppy disk, magnetic tape, compact disk, etc.
  • the removable storage unit 414 includes a computer usable storage medium having stored therein computer software and/or data, such as an object's methods and data.
  • Client computer 106 also includes an input device such as (but not limited to) a mouse 416 or other pointing device such as a digitizer, and a keyboard 418 or other data entry device. Client computer 106 also includes an output device such as display 418, which in one embodiment is a touch enabled monitor. Client computer 106 can also include a network interface card 422 and/or a modem 424 which can be used to access network 114.
  • an input device such as (but not limited to) a mouse 416 or other pointing device such as a digitizer, and a keyboard 418 or other data entry device.
  • Client computer 106 also includes an output device such as display 418, which in one embodiment is a touch enabled monitor.
  • Client computer 106 can also include a network interface card 422 and/or a modem 424 which can be used to access network 114.
  • Computer programs also called computer control logic
  • object oriented computer programs are stored in main memory 416 and/or the secondary memory 418 and/or removable storage units 414, also called computer program products.
  • Such computer programs when executed, enable the computer system 106 to perform the features of the present invention as discussed herein, hi particular, the computer programs, when executed, enable the processor 402 to perform the features of the present invention. Accordingly, such computer programs represent controllers of the computer system 106.
  • the invention is directed to a computer program product comprising a computer readable medium having control logic (computer software) stored therein.
  • control logic when executed by the processor 402, causes the processor 402 to perform the functions of the invention as described herein.
  • the invention is implemented primarily in hardware using, for example, one or more state machines. Implementation of these state machines so as to perform the functions described herein will be apparent to persons skilled in the relevant arts.
  • FIG. 5 depicts an exemplary embodiment of multi-user graphical user interface (GUI) 500 including an indication of status of a plurality of different user email accounts.
  • GUI graphical user interface
  • the GUI illustrated is a personal computer based software application program.
  • the GUI could just have easily been a workstation application, a UNLX application, a JAVA applet, or an Internet or world wide web ("WWW" or web) browser based homepage, or applet GUI.
  • an indication of priority can be included.
  • a prioritization indication can be provided to indicate which email account should have priority.
  • a visual indication can be used, hi another, an audio indication can be provided, h one embodiment, a color scheme can be used, as shown, including white record 502, 504, with lowest priority.
  • An icon 508, 512, or no icon 504 can be used to indicate whether new mail has been received for one of the multi-user accounts.
  • a yellow colored indication 510, 512 can stress a medium priority message.
  • a higher priority message 506, 508 can be stressed by coloring them red.
  • a low priority message can be colored white.
  • FIG. 6 depicts an exemplary embodiment of a personal file system 600.
  • Personal file system 600 can include a plurality of personal folders 602-640 for storing sent and received emails.
  • FIG. 6 depicts a user interface illustrating an exemplary embodiment of a personal filing system 600 of the present invention.
  • the personal filing system 600 can include a user's e-mail environment including a file cabinet 602.
  • the file cabinet 602 is a folder identified as a location to create personal nested sub-folders into which a user can organize incoming and outgoing e-mail.
  • the user in one embodiment, can set the properties for sending and receiving e-mail related to the file cabinet.
  • all e-mails sent by a sending user can be automatically stored in a personal folder in the sending user's personal file cabinet 600.
  • the email stored in a file folder named by the recipient's e-mail address or user name hi an exemplary embodiment, a read receipts continually updateable file can be stored in an assigned folder.
  • a user can also modify the folder into which the e-mail can be stored upon sending.
  • the e-mail can be stored automatically into an assigned folder such as, e.g., a folder that can be set by the sending user's e-mail address or user name.
  • a recipient by selection of a single button can cause the email to be automatically stored in the assigned personal folder upon receiving an email.
  • FIG. 7 depicts an exemplary embodiment of an assigned read receipt folder's read receipt report 700.
  • Read receipt report 700 can include names 706, and email addresses 708 of recipients of the email. Upon access of the email by recipients, the read receipt report 700 can be automatically updated to include, e.g., a date and time 712 of the access, and type of access 710.
  • the read receipt report 700 can provide various types of information in a record 702. If the email has not been accessed yet, then a blank record 704 can be provided.
  • FIG. 8A depicts a conventional public key infrastructure (PKI) 800 indicating an exemplary configuration of a user 1 802 in communication with a public/private key provider 804.
  • Public/Private key 804 can provide information from user 2 806 to provide communication between users 802, 806.
  • a conventional process 800 as shown in FIG. 8A can begin with step 808.
  • step 808 User 1 802 sets up an account with an encryption public/private key provider 804. From step 808, process 800 can continue with step 810.
  • step 810 User 2 806 sets up an account with the encryption public/private key provider 804.
  • User 1 802 desires to send an encrypted message to User 2 806. From step 810, process 800 continues with step 812.
  • step 812 User 1 802 must learn the public key of User 2 806 by communicating with the public/private key provider 804, must search for User 2 806, and must add the key information to the email address book of User 1 802 relating to User 2 806.
  • Process 800 continues with step 814.
  • step 814 User 2 806 also must learn the public key of User 1 802 by communicating with the public/private key provider 804, must search for User 1 802 and must add the key information to the email address book of User 2 806, relating to User 1 802. From step 814, process 800 can continue with step 816.
  • FIG. 8 A An example of a conventional system implementing the system of FIG. 8 A is that of Microsoft Outlook Express, available from Microsoft Corporation of Redmond, Washington, U.S.A. Such conventional systems are cumbersome to operate and require extensive user customization as already detailed, unlike the present invention.
  • Microsoft Outlook Express Help Index describes a difficult process by which the public/private key encryption features can be setup in Outlook. The following excerpt is demonstrative of the difficulty of such conventional solutions as shown in FIG. 8 A:
  • a digital ID is composed of a "public key,” a "private key,” and a "digital signature.”
  • a digital signature When you digitally sign your messages, you are adding your digital signature and public key to the message.
  • the combination of a digital signature and public key is called a "certificate.”
  • Recipients can use your digital signature to verify your identity and use your public key to send you encrypted mail that only you can read by using your private key. hi order to send encrypted messages, your address book must contain digital IDs for the recipients. That way, you can their public keys to encrypt the messages. When a recipient gets an encrypted message, their private key is used to decrypt the message for reading.
  • Digital IDs are issued by independent certification authorities. When you apply for a digital ID at a certification authority's Web site, they verify your identity before issuing an ID. There are different classes of digital IDs, each certifying to a different level of trustworthiness. For more information, use the Help at the certification authority's Web site.
  • FIG. 8B depicts an exemplary embodiment of an improved configuration method that configures a secure public/private key configuration method 818.
  • User 1 802 can send in step 824 a message to user 2 822.
  • user 2 822 can send an email to user 1 820. Since, according to the present invention, a user 820, 822 can automatically have a public key be embedded in the email, the exchange shown can automatically provide public keys to the recipients of the messages.
  • two users interested in exchanging public keys can perform the following steps:
  • Userl 802 can send a message to User2 822;
  • User2 822 can send a message to Userl 802.
  • the above listed steps can be performed using the PointClear e-mail program of PointClear.net, h e. of Mobile, Alabama, USA.
  • FIG. 8C shows an exemplary embodiment of a view 828 of an email in which a public key has been embedded for ease of providing a user's public key to another user for use in communicating via an encrypted communication, according to the present invention.
  • the view 828 is shown in a view revealing the source code of the email.

Abstract

A system, method, and computer program product for providing a multi-use shared e-mail system on a single computer is described. The system (Figure 3) enables multiple users (Figure 3)(304, 306, and 308) to use a single computer (figure 3)(302) to provide for each user, one at a time, access to a personal secure e-mail account environment for that user. The e-mail account environment can include an inbox, an outbox and one or more folders to store received e-mail. The multiple e-mail account environments are all stored on the single computer. The single computer can be standalone, or can include an interface to a network, such as the Internet, for delivery of e-mail to users whose e-mail accounts do not reside on the single computer.

Description

SYSTEM, METHOD, AND COMPUTER PROGRAM
PRODUCT FOR PROVIDING
A MULTI-USER E-MAIL SYSTEM
BACKGROUND OF THE INVENTION
Field of the Invention
The present invention relates to electronic mail (e-mail) systems and more particularly, to multiple user e-mail systems.
Related Art
Electronic mail, also known as e-mail, is a widely used means of communicating between communication devices such as computers. A conventional e-mail system enables sending e-mail notes or e-mail messages much like a conventional postal letter from a source to a destination. For example, a sender could send an e-mail message including a return e-mail address to a receiver at the receiver's e-mail address on another computer through a network connecting the computers. E-mail messages provide several advantages over conventional postal mail, such as, for example, faster preparation time, faster delivery time, a simpler addressing scheme than using name, street address or post office box, city, state and zip code, and lower cost. E-mail systems can provide an efficient means of distributing information internal to and external from an enterprise or business. However, conventional e-mail systems have limitations when used in, e.g., a manufacturing plant or production environment such as, e.g., a hospital, or retail business. For example, conventional e-mail systems require that each user have a computer with which to access the e-mail system, h a production or manufacturing environment, a machine operator often will not have access to a computer. Also, it may be unsafe in certain environments to permit a worker to be distracted by e-mail while performing tasks such as, e.g., monitoring a mission critical operation, such as where a worker is operating heavy machinery or a nurse in a hospital. Limitations of conventional e-mail systems can prevent many users within organizations from, e.g., accessing important corporate information which is most efficiently distributed over e-mail.
Historically, e-mail messages have included primarily text. Eventually, users were able to attach files for delivery along with an e-mail textual message. Such attached files are often called "attachments." Many e-mail systems support attaching multiple documents to an e-mail message. Unfortunately, when an e-mail user desires to forward an attachment, the attachment is conventionally forwarded along with the message containing it causing the forwarded e-mail with attachment to be encapsulated within the new e-mail.
One type of e-mail system is a client/server e-mail system. The e-mail system can use a centralized post office box that resides on a server somewhere on the network to which client e-mail user computers are attached. The post office box can be used, e.g., to store a message from a sender which can then forward the message later to a temporarily disconnected addressed receiver. The centralized post office can also permit messages to be centrally backed up on a periodic basis. With a client/server e-mail system, a portion of the e-mail generating program can reside on a client's computer (the computer of the sender or receiver), and another portion of the e-mail system can reside on a server computer. E-mail application software can run on a variety of operating systems and computer system platforms. Conventionally, e-mail messages are stored on the central server computer and are accessed via the client user computers.
Another type of client/server e-mail system is known as "groupware." Groupware enables functions in addition to the communication capability of e-mail including, for example, project management, location independent cooperation and information accessibility links.
Examples of e-mail systems include, for example, Lotus cc:Mail available from IBM, Outlook, Exchange, and MS Mail available from MICROSOFT of Redmond, Washington, USA, PROFS and OFFICENISION available from IBM of Armonk, New York, USA, All-in-One from Compaq of Houston, Texas, USA, online service provider integrated e-mail systems such as, e.g., that provided by AMERICA ONLINE (AOL) of Vienna, Virginia, USA, the Internet Protocol's Simple Mail Transfer Protocol (SMTP), and various Internet based e-mail systems such as those available from JUNO and NETZERO. Examples of groupware include Lotus Notes available from IBM, Exchange available from MICROSOFT, Collabra Share available from NETSCAPE, and Groupwise available from NOVELL.
Early e-mail systems sent messages to users within an organization known as an intranet system, with little consideration taken to interacting with other e-mail systems or networks. An intranet is a term often used to describe a stand alone network or group of networks which includes a related group of senders and receivers, such as, for example, the employees of a commercial company.
Some intranet e-mail systems are equipped to inter-operate with other e-mail systems. Computers coupled by a network communicate by using communication software programs which in turn use a communication language or "protocol." Some e-mail systems are implemented using a so-called "open systems" communications method such as the transmission control protocol/internet protocol (TCP/IP) suite of protocols. The TCP/IP protocol suite includes the SMTP e-mail functionality already mentioned.
An internet (i.e. with a lower case "i") is a network which couples two separate networks to one another. The global Internet (i.e. with a capitalized "i") is an internet that grew out of a U.S. Defense Advanced Research Projects Agency (DARPA) project. The Internet originally served a largely technical audience composed of the military, government agencies, and academic researchers and scientists. The original goals of the project were to allow researchers to share computing resources and to exchange information, regardless of their locations, and to create a resilient, fault-tolerant wide area network (WAN) for military communications. The global Internet implements communication using the TCP/IP communications protocols.
On-line service providers originally provided e-mail system access to individuals via modem connections. On-line service providers include, for example, American On Line (AOL), CompuServe, and Prodigy. Online services traditionally created offerings targeted toward home computer users. These providers often provided proprietary e-mail systems to connect their users to one another. In time, users on proprietary on-line services, were able to send messages to users on other e-mail services via the Internet.
During the mid-1990's, commercial enterprises and individuals increasingly discovered the benefits of being connected to the Internet, eventually creating a mass-market phenomenon. Today, although access is limited in some areas, most countries have ties to the Internet. Thus, the Internet has enabled widespread, standardized intercommunication between users of disparate e-mail systems.
Small and medium sized businesses have many users which do not have access to a computer with which to send and receive e-mail. Workers in various professions including, e.g., healthcare workers in a hospital and retail, because of their jobs, may not have access to conventional email. It is desirable that all employees of a business have access to e-mail resources for such purposes as, e.g., for efficient distribution of information to employees from an employer. In many cases, it can be desirable that the employer not be required to purchase a computer for use by each of the employees. It is also desirable that the employer be able to filter out any junk e-mail, commonly known as "spam," being sent to the employees. It is also desirable that employees such as, e.g., in a retail business, production, or operations such as a hospital, not be permitted to access their e-mail at all times in order to maintain high worker productivity.
Thus, what is needed in an improved e-mail system which can provide access to various users in a production, or operational environment such as, e.g., healthcare, retail or other professionals in an environment without individual access to a personal computer, who presently are unable to access e-mail and other useful functions. SUMMARY OF THE INVENTION
A method, system, and computer program product are provided that enable multiple users to access e-mail through a single shared computer including password authentication, secure definable file folder storage and a user access priority indicator. In one embodiment of the invention, the e-mail can include various new and useful features, such as, e.g., human resource communication and statistics tools, timeclock in/out, incoming mail filters, delayed receipt of e-mail, delayed message sending, auto-reply, auto-forwarding, encryption, automatic passing of a public key, advertising banners, embedded voicemail and video attachments, removal of embedded characters, direct attachment viewing, direct sending of attachments, spell-check, thesaurus, text view formatting (HTML or standard text), personal memo creation, address book, smartnames callup of addressee by typing letters of the name, user-selectable hotkey functions, remote logon to file folder from web interface, and an administration system for setup of passwords, secure folders, and filtering.
Further features and advantages of the invention, as well as the structure and operation of various embodiments of the invention, are described in detail below with reference to the accompanying drawings, h the drawings, like reference numbers generally indicate identical, functionally similar, and/or structurally similar elements. The drawing in which an element first appears is indicated by the leftmost digits in the corresponding reference number.
BRIEF DESCRIPTION OF THE DRAWINGS
The foregoing and other features and advantages of the invention will be apparent from the following, more particular description of a preferred embodiment of the invention, as illustrated in the accompanying drawings.
FIG. 1A is a block diagram of a distributed client/server e-mail system;
FIG. IB is a block diagram of an exemplary system depicting an e-mail application program running on a computer hardware and operating system platform;
FIG. 2 depicts a conventional e-mail;
FIG. 3 is an example embodiment of a multi-user shared e-mail system according to the present invention; and
FIG. 4 depicts an exemplary computer system of the present invention.
FIG. 5 depicts an exemplary embodiment of a user interface of the multi-user e-mail system of the present invention.
FIG. 6 depicts an exemplary embodiment of a personal file folder system of the present invention.
FIG. 7 depicts an exemplary embodiment of a read receipt report according to the present invention.
FIG. 8 A depicts an exemplary setup process of a public key inf astructure
(PKI) using a public and a private key.
FIG. 8B depicts a exemplary embodiment of an improved setup process for configuring public and private keys according to the present invention.
FIG. 8C depicts an exemplary embodiment of a source code view of an email including an automatic embedded public key according to the present invention. DETAILED DESCRIPTION OF THE INVENTION
The preferred embodiment of the invention is discussed in detail below. While specific implementations are discussed, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without parting from the spirit and scope of the invention.
Overview of the Invention
In many production, retail, healthcare, hospital, manufacturing or other environments, workers do not have access to a computer and e-mail, and at scheduled times go to a break room for a brealc. The present invention is directed to a system, method and computer program product that enables multiple users to access a single shared computer to send, receive and store e-mail messages. The system can be used continually in real-time working environment.
In one embodiment of the invention, the multiple user, shared single computer e-mail system permits these multiple users to view the computer and through a user interface identify whether new e-mail has arrived for any of the users.
In one embodiment, the users can use a touchscreen to identify themselves to the system and the system can then require entry of a password to authenticate the user. Alternatively, a conventional display monitor can be used for output of status information and a mouse or other pointing device or keyboard or other device can be used for input.
In another embodiment, the system can through its user interface identify a priority level of newly received e-mail, to prioritize which of the multiple users should gain access to the shared computer first. In one embodiment, the priority level can be identified by, e.g., providing a colored representation as to the urgency of the e-mail, such as, e.g., a colored or blinking name or button, or alphanumeric or other indication of priority such as, e.g., a ranked list. In an embodiment of the invention, the user with the highest priority could then access the shared e-mail system first. The user with the highest priority e-mail message can then select to open his or her e-mail.
In one embodiment of the invention, a user can select to open the user's name by, e.g., using a mouse, key or highlighting a name or button with a cursor. In an embodiment, the user can then be prompted to provide authentication information such as, e.g., a password and/or company badge, to gain access to that user's personal e-mail environment.
hi one embodiment of the invention, a user's personal e-mail environment can include, e.g., an inbox, an outbox, and at least one user definable file folder into which received messages can be stored, h an embodiment of the invention, the system can store messages in file folders named by sender of the message or can permit the user to provide another name for the folder such as "personal", h one embodiment of the invention, the file folders can include different security features such as, e.g., passwords for access to the specific file folder.
An encryption feature can be used to encrypt and decrypt the contents of e-mail messages to prevent unauthorized access to the contents of a message, h one embodiment, a public key can be automatically sent with an email. The public key can be included at the top of an email in one embodiment. Advantageously, to exchange public keys, two users can send emails to one another.
In one embodiment of the invention, a first group including a first subset of all users can use a first single shared computer and a second group including a second subset of all users can use a second single shared computer.
h another embodiment of the invention, a banner can be included onscreen to display advertising or other relevant information to users of the shared e-mail system. Advantageously, the banner can be used, e.g., to display advertising information which can be used, e.g., to offer the e-mail system for free or a discount to businesses. The shared e-mail system can include other useful features such as, e.g., a dictionary for spellcheck, a thesaurus, a grammar checker, multiple standard replies, or standard reply lists (such as, e.g., an informal reply, a business or formal reply), address book for selecting recipients, special text viewing (e.g., permitting viewing HTML or text), smart names (e.g., permitting entry of letters of a name causing, e.g., lookup of one or more addressbook entries having those letters, a list of names, or the addressbook interface itself by a function key combination), user selectable function keys (e.g., permitting a user to assign particular functions to key combinations such as, e.g., Alt-k to bring up the address book), a memo feature (i.e., enabling preparing brief memos to oneself).
In another embodiment of the invention, a user can access the user's e-mail environment from the Internet's world wide web. In one embodiment, storage of the user's e-mail environment is mirrored to a server on the world wide web and is kept in synchrony, one embodiment, a user from the web interface can send, receive, store in folders, move and delete messages. In one embodiment of the invention, the e-mail system can use a version of the standard POP3 mail application modified for the specific features of the shared e-mail system.
The present invention can also include human resource features. For example, in one embodiment of the invention, a user can clock in and clock out via the system to provide an automated timeclock.
Another human resource feature can permit tracking user statistics by capturing user data via the system including, e.g., the number of employees, the number of hourly employees, the number of female and males workers, hours worked, whether someone is in or out.
Another human resource feature of the present invention includes provision of a company wide e-mail for use in, e.g., notifying all employees of events, company policy and other announcements. The present invention, in one embodiment, can require each employee to acknowledge that they have read an e-mail (e.g., regarding a company policy) and the system can automatically compile a single record regarding all employees indicating which employees opened the e-mail and which did not. A report referred to as a read receipt report can be generated that can track which recipients have accessed a sent file, one embodiment, the date and time of access can be tracked also, i one embodiment the report can be continually updated.
The present invention provides several other features applicable to general e-mail systems. For example, the present invention can include an e-mail system having a function that automatically removes greater-than (">") signs that other e-mail systems could have embedded into forwarded e-mails.
Another e-mail feature includes in the window interface that presents the contents of an open e-mail, a graphical display indicating a hierarchy of forwarded e-mails and attachments. Advantageously, the graphical display enables forwarding of only an included forwarded e-mail or attachment.
Another embodiment of the present invention can filter e-mail obtained from a list of internet locations (e.g., addresses or domain names), which can be maintained by an administrator (i.e., in one embodiment of the invention for a single user version, the administrator can be the user). In one embodiment of the invention, the filter can refuse acceptance of e-mails from those designated locations by maintaining a so-called "no spam" list. The filter can be used to block other e-mail based on criteria set by the administrator, such as, e.g., limiting the size of an e-mail or attachments.
In one embodiment of the invention, incoming e-mail can be queued and can be forwarded to the recipient e-mail user, only at a particular time (such as, e.g., break time, lunch time, or after hours). Advantageously, this feature can prevent employees from sneaking off at non-break times to check e-mail, h another embodiment of the invention, access to a user's e-mail box can be restricted to only particular times of the day, avoiding employee temptation to check e-mail.
In another embodiment of the invention, sending of a message can be delayed to a given time by inputting a send date and time upon creation of the e-mail. Advantageously, the delayed send e-mail feature can enable earlier entry of e-mail birthday greetings to be sent on an employee's birthday.
In another embodiment of the invention, a feature can be provided to store e-mail in a folder which can default to be titled by the sender's e-mail userid (i.e., also commonly referred to as username, screenname, or e-mail address). The user can be permitted to modify the folder name such as, e.g., to replace it with the sender's company name, or department name, or other designation for the folder such as, e.g., "personal," or "confidential."
h another embodiment of the invention, the system can automatically timeout and close a user's e-mail if no action has been made for a selectable period of time, to prevent unauthorized access to the user's e-mail environment.
An Exemplary Embodiment of the Invention
FIG. 1A illustrates a block diagram of e-mail system environment 100 which includes an exemplary distributed client/server computer e-mail system. E-mail system environment 100 includes a sending user 102 which sends an e-mail message to a receiving user 104. Sending user 102 creates the e-mail on a client computer 106. Client computer 106 transmits the e-mail from sending user 102 to receiving user 104 on a client computer 110. An e-mail message may be created via mail client 116 of client computer 106 and may be sent via interaction with a mail server 118 on a server 112 over a communications network 114. An e-mail 200, described further below with reference to FIG. 2, in being sent from its source, i.e., sending user 102, can travel over communications network 114, and can pass through other computers (i.e., not shown) enroute to its final destination, client computer 110 for receipt by receiving user 104. h one embodiment of the invention, communications network 114 includes an intranet. In another embodiment, communications network 114 includes the global Internet. It would be apparent to a person having ordinary skill in the art that the features of the present invention can be used in alternative e-mail system environments and architectures. FIG. IB depicts an exemplary computer environment 120 for client computer 106. It would be apparent to a person having skill in the art that environment 120 could also depict client computer 110 and server 112. Environment 120 includes hardware 122, operating system 124 and application programs 126, 128 and 130. Operating system 124 provides a uniform interface of application programming interfaces (APIs) to applications 126, 128 and 130 for access to hardware 122. An exemplary application 126 is an e-mail application program, mail program 132. Mail program 132 is an example of mail client 116 and mail server 118. Alternatively, a mail program 134 can be included as part of operating system 124 to provide e-mail functionality to applications 126, 128 and 130.
Referring back to FIG. 1 A, mail client 116 can include an authentication input module which can accept a password from user 102 to validate that user 102 is authorized to access the e-mail account of user 102. Authentication input module 108 can interact with an authentication server module 136 of mail server 118 to determine whether user 102 is authorized to access the personal e-mail box of user 102. After authenticating user 102, authentication server module 136 can provide user 102 access via a storage module 138 to the mailbox of user 102 of e-mail storage 140.
FIG. 2 illustrates an example of a conventional e-mail 200. E-mail 200 includes various data components. Example data components included in e-mail 200, are creation information 202, a body 204, address information 206, and a subject 208.
In an example embodiment, creation information 202 can include, e.g., the date and time e-mail 200 was sent from sending user 102 to receiving user 104.
The body 204 of e-mail 200 can include, e.g., a text portion 210 and embedded objects 212. Embedded objects 212 can include, e.g., attachments 214. Other embedded objects 216 can include, e.g., bit map images, graphics objects, executable programs, compressed text and applets. Embedded objects 216 can also include a forwarded e-mail 200. Address information 206 can include the
-mail address of sending user 102 and receiving user 104 of e-mail 200. Attachments 214 can also include other embedded objects 212. Subject 208 can include a brief description of the contents of e-mail 200. It would be apparent to persons skilled in the art that e-mail 200 can include a subset of the listed components.
FIG. 3 illustrates an example embodiment of an implementation of the present invention, including e-mail system 300. E-mail system 300 can include a computer 302 in communication with users 304, 306 and 308. Computer 302 includes a multi-user mail system 310. In a preferred embodiment, multi-user mail system 310 is a Point Clear e-mail system available from Point Clear.net, Inc. a wholly owned subsidiary of XANTE Corporation of Mobile, Alabama, USA. E-mail system 310 can include, in one embodiment, a prioritization module 312, an authentication module 314, a storage module 316, an e-mail storage module 318, an in queue 326 and an out queue 328.
Since multi-user mail system 310 runs on a single computer 302, only one of users 304, 306 and 308 can access computer 302 at one time. Access to computer 302 can be prioritized using prioritization module 312. Prioritization module 312 can indicate which of users 304, 306 and 308 should have priority to access computer 302 and multi-user mail system 310. hi one embodiment, the urgency of e-mail messages can be indicated as a form of priority. For example, e-mails from a particular e-mail address could trigger a higher priority, such as, e.g., an e-mail from the CEO of a company. Other indications of priority could include, receipt of an e-mail message, versus having no new messages. Informally, a supervisor could have a higher priority than a line worker who, in turn, could have higher priority than a part-time worker.
If the highest priority user is user 304 then user 304 can proceed to authenticate using authentication module 314 by, e.g., entering a password, to access a storage environment 320.
Assuming the proper authentication information is provided, then storage module 316 can provide user 304 access to storage environment 320 of e-mail storage 318 via storage module 316. When user 304 sends an e-mail to another user, the e-mail can be routed via an out queue 328 to its final destination.
When user 304 receives an e-mail message from another user, the e-mail can be queued at in queue 326.
hi one embodiment, in queue 326 and out queue 324 can be used to delay sending or receipt and for filtering operations.
The present invention enables status of multiple users' e-mail accounts to be monitored and accessed from a single computer where each user is identified on a name screen. See FIG. 5 below depicting diagram 500 of an exemplary embodiment of a multi-user interface of the present invention. The exemplary embodiment of FIG. 5 depicts a graphical user interface (GUI) application, applet, or browser interface to the multi-user email system of the present invention. An exemplary implementation embodiment of the multi-user email system of the present invention is the PointClear ™ system available from PointClear.net, Inc., a wholly owned subsidiary of XANTE Corporation of Mobile, Alabama, U. S .A.
hi one embodiment, the single shared computer multiple e-mail system supports greater than 7 users and up to 64 users on the single computer, hi another exemplary embodiment, 4 columns of 16 users can be displayed using the multi-user interface of the multi-user email system of the present invention as shown in diagram 500.
In one embodiment, a system administration tool can be used to configure each e-mail account at a company.
h one embodiment, the name screen is the default screen for the multiple e-mail account system listing e-mail accounts by user name associated with the computer.
hi one embodiment, a time clock feature is included providing an electronic time clock. For example, a system administrator can identify time clock employees, in one embodiment, and can setup specific features that need to be logged such as, e.g., log-in, log-out, overtime, human resource reporting and supervisor warnings.
hi another embodiment, if an e-mail environment window is left open and is idle for a specified time then the individual's e-mail window logs out of the system. Log out can be based on, e.g., passage of a time duration or other criteria. This feature prevents unauthorized access to an account by public viewing after a user leaves the system computer without logging out.
In one embodiment, the system of the present invention can be provided for a discount such as, e.g., free, if users are willing to watch advertising. Free evaluation use could also be provided. With a free evaluation use, a date is identified after which use is disabled. After completion of particular criteria, access can be re-enabled preserving all file folders, hi one embodiment, an advertising banner can be included and can be placed in a fixed location. Advertising, in one embodiment, can be provided from
h another embodiment, an address book importer can be provided to import address listings from other application programs.
h one embodiment of the invention, attachments of all types can be accessible for adding to an e-mail, saving from an e-mail, deleting from an e-mail, executing from the e-mail, and forwarding as an e-mail. An e-mail can also be forwarded as an attacliment. Where an e-mail has several attachments, a user can select from multiple attachments by highlighting selected attachments for forwarding and the selected attachments only can be forwarded, in one embodiment.
In one embodiment, a spam eliminator can maintain a dynamic list of e-mail addresses that can be identified as sources from which e-mail is not accepted. The spam eliminator is a filter which can be based on e-mail address, domain name, or other identifier.
In one embodiment, online help can be provided. In another embodiment, the address book can include groups of e-mail users.
In another embodiment, e-mail folder security can be provided restricting access to stored folders to only users entering authentication criteria such as, e.g., a password associated with that folder.
h another embodiment a spell-checking feature can be provided.
hi another embodiment, messages can be marked as urgent, (also referred to as hot, or hot mail), or can be identified as a priority level by inclusion in their body or otherwise of identifying priority information. In one embodiment, receipt of an urgent e-mail can initiate an urgency signal such as, e.g., a visual, graphical, or audio indication. Diagram 500 of FIG. 5, for example, depicts new mail via an envelope icon 512, 508. Urgency of the emails waiting a review by the multiple users can be indicated by, e.g., color coding such as, e.g., red 506 for the highest urgency, yellow 510 for intermediate urgency and white 502 for the lowest priority. Alternatively, other colors can be used. Alternatively an audio, visual, iconic, numeric, alpha numeric, or other indication of priority can be provided. Also, a higher priority can trigger, e.g., an audio alarm, or a wireless alertor page. No new mail 504 can be indicated on the multi-user interface as well.
In another embodiment of the present invention, inclusion of specific words or phrases in an e-mail, or subject portion, for example, can be recognized by consulting a library of words and phrases, and prior to receiving the e-mail containing the words or phrases, the e-mail can be rejected. An automatic response can be initiated to the sender of the message indicating what has happened, or even warning the sender of consequences of sending such e-mail.
In another embodiment of the invention, delayed message delivery can permit identification of a delivery date and time for delivery of the e-mail message.
hi another embodiment of the present invention, an e-mail account can be set up to auto forward any received e-mails to another e-mail address. In another, an autoreceipt feature can be enabled by a sender of an e-mail to verify that a receiver has, e.g., accessed, received, or opened e-mail, h an exemplary embodiment, a read receipt report can be displayed such as, e.g., the read receipt report as shown in FIG. 7 is described further below.
hi another embodiment of the present invention, an encryption feature can enable entry of a personal encryption key between sender and receiver to control access to an e-mail. Multiple algorithms can be supported for encryption. Advantageously, in one embodiment, as new algorithms are developed, legacy algorithms can continue to be supported. Users of earlier revisions of the e-mail system set up with a first algorithm, can continue to use the first algorithm even when the program defaults to, e.g., a tenth algorithm, h one exemplary embodiment, a user's public key can be automatically generated by the present invention, h one embodiment, a public key can be automatically embedded in an email message that is being sent. The reader is referred to FIGs. 8A, 8B, and 8C for examples of a conventional public key infrastructure, exchange of public keys according to the present invention, and an email indicating a public key embedded at the top of the email shown when viewing the source code according to the present invention, respectively. Advantageously a user need not go through a complicated set up process as is conventionally required.
hi an embodiment of the invention, when composing an e-mail and filling in the destination address field, for example, a list of names can be parsed as potential e-mail recipients based on the keys depressed by the sender of the e-mail. The more characters that are typed, in one embodiment, the narrower the selection of names. Pressing a key combination can list all possible candidates for the keys pressed, from which the user can select.
hi an embodiment of the invention, a key or key combination can be defined by a user to perform tasks. Using this feature, a user can set desired actions for, e.g., function keys, and alternate and control key combinations.
In an embodiment of the invention, a user can insert a voicemail into an e-mail while composing the e-mail. h an embodiment of the invention, a user can insert an audio/video recording into an e-mail.
In an embodiment of the invention, personal reminder memos can be created in the e-mail user environment.
hi another embodiment, when an e-mail is received, the sender of the e-mail, automatically, or through prompting, can be added to the address book, another embodiment, the carbon copy list can similarly be added to the address book.
h another embodiment of the invention, where an e-mail includes inserted greater than signs (">"), a feature can be included that deletes any greater than symbols from the beginning of a string. This character is often added by an e-mail system when forwarding an e-mail message. The ">" is a default character in many e-mail systems, but can be eliminated or changed to another character in some systems. Thus, in another embodiment, the character to be removed can be designated.
FIG. 6 depicts a user interface illustrating an exemplary embodiment of a personal filing system 600 of the present invention. The personal filing system 600 can include a user's e-mail environment including a file cabinet 602. The file cabinet 602 is a folder identified as a location to create personal nested sub-folders into which a user can organize incoming and outgoing e-mail. The user, in one embodiment, can set the properties for sending and receiving e-mail related to the file cabinet. For example, all e-mails sent by a sending user can be automatically stored in a personal folder in the sending user's personal file cabinet 600. In an exemplary embodiment, the email stored in a file folder named by the recipient's e-mail address or user name. In an exemplary embodiment, a read receipts continually updateable file can be stored in an assigned folder. A user can also modify the folder into which the e-mail can be stored upon sending. Similarly, for an email received from a sender at a recipient, the e-mail can be stored automatically into an assigned folder such as, e.g., a folder that can be set by the sending user's e-mail address or user name. In an exemplary embodiment, upon receiving an email, a recipient by selection of a single button can cause the email to be automatically stored in the assigned personal folder.
In an embodiment of the invention, a user's e-mail configuration can be mirrored on a server that can be accessible from a web browser, or a remote version of the mail system. This interface can give a user access to the user's address book and all the user's folders as if the user were sitting in front of the multi-user shared e-mail system computer. The user that is sending and receiving e-mail, can also be viewed, by the recipients of the e-mail, as being at the recipient's desks.
The present invention is computer platform independent. Client computer
106 in a preferred embodiment is a personal computer (PC) system running an operating system such as Windows Mac/OS, or a version of UNLX. However, the invention is not limited to these platforms. Instead, the invention can be implemented on any appropriate computer system running any appropriate operating system, such as, for example, Solaris, frϊx, Linux, HPUX, OSF, Windows, Windows NT, OS/2, Mac/OS. hi one embodiment, the present invention is implemented on a computer system operating as discussed herein, h another embodiment, the present invention can be implemented on hardware such as a handheld device, such as, e.g., a two-way pager, a cellular phone, a digital phone, a watch, a wireless device, a laptop, notebook or sub-notebook computer, and other computer type device such as, e.g., a micro-computer, a mini-computer and a mainframe computer.
FIG. 4 depicts an exemplary client computer 106 computer system. Other components of the invention, such as client computer 110, computer 302, and/or server computer 112, could also be implemented using a computer such as that shown in FIG. 4.
The computer system 106 includes one or more processors, such as processor 402. The processor 402 is connected to a communication bus 404.
Client computer 106 also includes a main memory 406, preferably random access memory (RAM), and a secondary memory 408. The secondary memory 408 includes, for example, a hard disk drive 410 and/or a removable storage drive 412, representing a floppy diskette drive, a magnetic tape drive, a compact disk drive, etc. The removable storage drive 412 reads from and/or writes to a removable storage unit 414 in a well-known manner.
Removable storage unit 414, also called a program storage device or a computer program product, represents a floppy disk, magnetic tape, compact disk, etc. The removable storage unit 414 includes a computer usable storage medium having stored therein computer software and/or data, such as an object's methods and data.
Client computer 106 also includes an input device such as (but not limited to) a mouse 416 or other pointing device such as a digitizer, and a keyboard 418 or other data entry device. Client computer 106 also includes an output device such as display 418, which in one embodiment is a touch enabled monitor. Client computer 106 can also include a network interface card 422 and/or a modem 424 which can be used to access network 114.
Computer programs (also called computer control logic), including object oriented computer programs, are stored in main memory 416 and/or the secondary memory 418 and/or removable storage units 414, also called computer program products. Such computer programs, when executed, enable the computer system 106 to perform the features of the present invention as discussed herein, hi particular, the computer programs, when executed, enable the processor 402 to perform the features of the present invention. Accordingly, such computer programs represent controllers of the computer system 106.
In another embodiment, the invention is directed to a computer program product comprising a computer readable medium having control logic (computer software) stored therein. The control logic, when executed by the processor 402, causes the processor 402 to perform the functions of the invention as described herein.
In yet another embodiment, the invention is implemented primarily in hardware using, for example, one or more state machines. Implementation of these state machines so as to perform the functions described herein will be apparent to persons skilled in the relevant arts.
FIG. 5 depicts an exemplary embodiment of multi-user graphical user interface (GUI) 500 including an indication of status of a plurality of different user email accounts. The GUI illustrated is a personal computer based software application program. The GUI could just have easily been a workstation application, a UNLX application, a JAVA applet, or an Internet or world wide web ("WWW" or web) browser based homepage, or applet GUI. an exemplary embodiment, an indication of priority can be included. For example, a prioritization indication can be provided to indicate which email account should have priority. In one embodiment, a visual indication can be used, hi another, an audio indication can be provided, h one embodiment, a color scheme can be used, as shown, including white record 502, 504, with lowest priority. An icon 508, 512, or no icon 504 can be used to indicate whether new mail has been received for one of the multi-user accounts. To provide prioritization, a yellow colored indication 510, 512 can stress a medium priority message. In the exemplary embodiment, a higher priority message 506, 508 can be stressed by coloring them red. A low priority message can be colored white. Selection of a user account by touching a touch screen, or selecting with a mouse or other input device such as, e.g., a keyboard, remote control, or cursor keys, can cause the email account environment to be opened, assuming the user can provide authentication such as, e.g., a password, abiometric, or other identification information.
FIG. 6 depicts an exemplary embodiment of a personal file system 600. Personal file system 600 can include a plurality of personal folders 602-640 for storing sent and received emails. FIG. 6 depicts a user interface illustrating an exemplary embodiment of a personal filing system 600 of the present invention. The personal filing system 600 can include a user's e-mail environment including a file cabinet 602. The file cabinet 602 is a folder identified as a location to create personal nested sub-folders into which a user can organize incoming and outgoing e-mail. The user, in one embodiment, can set the properties for sending and receiving e-mail related to the file cabinet. For example, all e-mails sent by a sending user can be automatically stored in a personal folder in the sending user's personal file cabinet 600. hi an exemplary embodiment, the email stored in a file folder named by the recipient's e-mail address or user name, hi an exemplary embodiment, a read receipts continually updateable file can be stored in an assigned folder. A user can also modify the folder into which the e-mail can be stored upon sending. Similarly, for an email received from a sender at a recipient, the e-mail can be stored automatically into an assigned folder such as, e.g., a folder that can be set by the sending user's e-mail address or user name. In an exemplary embodiment, upon receiving an email, a recipient by selection of a single button can cause the email to be automatically stored in the assigned personal folder.
FIG. 7 depicts an exemplary embodiment of an assigned read receipt folder's read receipt report 700. Read receipt report 700 can include names 706, and email addresses 708 of recipients of the email. Upon access of the email by recipients, the read receipt report 700 can be automatically updated to include, e.g., a date and time 712 of the access, and type of access 710. The read receipt report 700, can provide various types of information in a record 702. If the email has not been accessed yet, then a blank record 704 can be provided.
FIG. 8A depicts a conventional public key infrastructure (PKI) 800 indicating an exemplary configuration of a user 1 802 in communication with a public/private key provider 804. Public/Private key 804 can provide information from user 2 806 to provide communication between users 802, 806.
A conventional process 800 as shown in FIG. 8A can begin with step 808.
h step 808, User 1 802 sets up an account with an encryption public/private key provider 804. From step 808, process 800 can continue with step 810.
hi step 810, User 2 806 sets up an account with the encryption public/private key provider 804. Suppose User 1 802 desires to send an encrypted message to User 2 806. From step 810, process 800 continues with step 812. hi step 812, User 1 802 must learn the public key of User 2 806 by communicating with the public/private key provider 804, must search for User 2 806, and must add the key information to the email address book of User 1 802 relating to User 2 806.
Suppose User 2 806 also desires to send an encrypted message to User 1
802. Process 800 continues with step 814.
hi step 814, User 2 806 also must learn the public key of User 1 802 by communicating with the public/private key provider 804, must search for User 1 802 and must add the key information to the email address book of User 2 806, relating to User 1 802. From step 814, process 800 can continue with step 816.
h step 816, User 1 802 and User 2 806 can finally send encrypted messages to each other.
An example of a conventional system implementing the system of FIG. 8 A is that of Microsoft Outlook Express, available from Microsoft Corporation of Redmond, Washington, U.S.A. Such conventional systems are cumbersome to operate and require extensive user customization as already detailed, unlike the present invention. For example, the Microsoft Outlook Express Help Index describes a difficult process by which the public/private key encryption features can be setup in Outlook. The following excerpt is demonstrative of the difficulty of such conventional solutions as shown in FIG. 8 A:
Sending Secure Messages
As more people send confidential information by e-mail, it is increasingly important to be sure that documents sent in e-mail are not forged, and to be certain that messages you send cannot be intercepted and read by anyone other than your intended recipient.
By using "digital IDs" with Outlook Express, you can prove your identity in electronic transactions in a way similar to showing your driver's license when you cash a check. You can also use your digital ID to encrypt messages, keeping them private. Digital IDs incorporate the S/MIME specification for secure electronic mail.
How Do Digital Ids Work?
A digital ID is composed of a "public key," a "private key," and a "digital signature." When you digitally sign your messages, you are adding your digital signature and public key to the message. The combination of a digital signature and public key is called a "certificate."
Recipients can use your digital signature to verify your identity and use your public key to send you encrypted mail that only you can read by using your private key. hi order to send encrypted messages, your address book must contain digital IDs for the recipients. That way, you can their public keys to encrypt the messages. When a recipient gets an encrypted message, their private key is used to decrypt the message for reading.
Before you can start sending digitally signed messages, you must obtain a digital ID and set up your mail account to use it. If you are sending encrypted messages, your address book must contain a digital ID for each recipient.
Where Do You Get Digital Ids?
Digital IDs are issued by independent certification authorities. When you apply for a digital ID at a certification authority's Web site, they verify your identity before issuing an ID. There are different classes of digital IDs, each certifying to a different level of trustworthiness. For more information, use the Help at the certification authority's Web site.
hi order to obtain someone else's digital JD, you can request they send you digitally signed mail, or you can search the digital ID database on a certification authority's Web site. You can also search Internet directory services that list digital IDs along with other properties. How Do You Verify A Digital Signature?
With "revocation checking," you can verify the validity of a digitally signed message. When you make such a check, Outlook Express requests information on the digital ID from the appropriate certification authority. The certification authority sends back information on the status of the digital ID, including whether the ID has been revoked. Certification authorities keep track of certificates that have been revoked due to loss or termination.
FIG. 8B depicts an exemplary embodiment of an improved configuration method that configures a secure public/private key configuration method 818. User 1 802 can send in step 824 a message to user 2 822. In step 826, user 2 822 can send an email to user 1 820. Since, according to the present invention, a user 820, 822 can automatically have a public key be embedded in the email, the exchange shown can automatically provide public keys to the recipients of the messages.
Using the present invention, two users interested in exchanging public keys can perform the following steps:
1. Both sender and receiver can be using PointClear on their respective systems or computers);
2. Userl 802 can send a message to User2 822; and
3. User2 822 can send a message to Userl 802.
In an exemplary implementation embodiment, the above listed steps can be performed using the PointClear e-mail program of PointClear.net, h e. of Mobile, Alabama, USA.
FIG. 8C shows an exemplary embodiment of a view 828 of an email in which a public key has been embedded for ease of providing a user's public key to another user for use in communicating via an encrypted communication, according to the present invention. The view 828 is shown in a view revealing the source code of the email. While various embodiments of the present invention have been described above, it should be understood that they have been presented by way of example only, and not limitation. Thus, the breadth and scope of the present invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.

Claims

WHAT IS CLAIMED IS:
1. A shared multi-user e-mail system on a single computer, comprising: a shared computer; a multi-user e-mail system configured to run on said shared computer configured to enable a plurality of users, one at a time, to access said multi-user e-mail system running on said shared computer; a multi-user graphical user interface (GUI) configured to display concurrently current status of multiple email accounts of said plurality of users, wherein said multi-user GUI permits one user of said plurality of users at a time to access an e-mail user account environment of said one user of said plurality of users on said multi-user e-mail system, wherein said one user, if authenticated, can access only said e-mail user account environment belonging to said one user, wherein each of said e-mail user account environments includes an inbox, an outbox, and at least one personal file folder; and a network interface coupled to said shared computer through which e-mails can be routed to destination addresses not included in said multi-user e-mail system.
2. The system according to claim 1, wherein said multi-user GUI includes an indication of the priority of e-mail received in said multi-user e-mail system enabling prioritization of access to said shared computer by said users.
3. The system according to claim 2, wherein said indication of priority includes at least one of the following indications of priority: an audio; a visual; a color; an iconic; a communication to a communication device; a page to a pager; a numeric; an alphabetic; a letter; a character; an alert; and a wireless alert.
4. The system according to claim 1, wherein the system is used in at least one of a production, operations, healthcare, retail, hospital, and nursing environments.
5. A real time multi-user graphical user interface (GUI) comprising: a status module enabling a computer to indicate current status of multiple email accounts of a plurality of users, concurrently, on a shared multi-user computer.
6. The GUI according to claim 5, wherein said status module comprises: a priority indicator enabling the computer to indicate priority of access to the shared multi-user computer.
7. The GUI according to claim 6, wherein said priority indicator comprises at least one of: a visual indicator; an audio indicator; a color indicator; a numeric indicator; a alphabetic indicator; an alphanumeric indicator; an iconic indicator; a communication; a communication device; an alert; a wireless alert; and a page.
8. The GUI according to claim 5, wherein said status module comprises: a new mail indicator enabling the computer to indicate that a new mail has arrived for one of said plurality of users of said shared multi-user computer.
9. An electronic mail system comprising: a user-assignable personal file folder.
10. The system according to claim 9, wherein emails sent from at least one of a sender and a recipient automatically stored in one or more of said user-assignable personal file folders.
11. The system according to claim 10, wherein said user assignable file folders are automatically tagged by the email address of a sender of a received email and a receiver of a sent email.
' 12. The system according to claim 9, wherein each of said user-assignable personal file folders comprises: a dynamic, active read receipt report stored on a system of a sender of an email.
13. The system according to claim 12, wherein said dynamic, active read receipt report comprises: a single file indicating read receipt status indicating which of a plurality of recipients of an email have and have not accessed said email.
14. The system according to claim 13, further comprising tracking a date and time of access by one of said plurality of recipients.
15. An electronic mail method for allowing emails to be encrypted or digitally signed, the method comprising:
(a) embedding a public key in an email message; and (b) sending said email message from a first user to a second user.
16. The method according to claim 15, wherein said public key embedded in said step (a) includes performing embedding including at least one of: automatically embedding, embedding by sending user interaction, and prompting.
17. The method according to claim 16, wherein a sender can encrypt said email using a private key and said recipient can decrypt said email using said embedded public key.
18. The method according to claim 16, wherein a receiver can use said embedded public key to decrypt said email.
EP01990661A 2000-11-20 2001-11-13 System, method, and computer program product for providing a multi-user e-mail system Withdrawn EP1340156A4 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US714997 1985-03-22
US09/714,997 US7421472B1 (en) 1999-11-19 2000-11-20 System, method, and computer program product for providing a multi-user e-mail system
PCT/US2001/043060 WO2002042860A2 (en) 2000-11-20 2001-11-13 System, method, and computer program product for providing a multi-user e-mail system

Publications (2)

Publication Number Publication Date
EP1340156A2 EP1340156A2 (en) 2003-09-03
EP1340156A4 true EP1340156A4 (en) 2007-06-20

Family

ID=24872293

Family Applications (1)

Application Number Title Priority Date Filing Date
EP01990661A Withdrawn EP1340156A4 (en) 2000-11-20 2001-11-13 System, method, and computer program product for providing a multi-user e-mail system

Country Status (4)

Country Link
EP (1) EP1340156A4 (en)
JP (1) JP2004514977A (en)
AU (1) AU2002230428A1 (en)
WO (1) WO2002042860A2 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7451187B2 (en) * 2000-05-04 2008-11-11 At&T Intellectual Property I, L.P. Viewing attachments to electronic communications via pushing the attachment to a networked viewing site
US8316128B2 (en) * 2004-01-26 2012-11-20 Forte Internet Software, Inc. Methods and system for creating and managing identity oriented networked communication
EP1775924A1 (en) * 2005-10-14 2007-04-18 Research In Motion Limited Using separate icons for invoking a computer program for presenting distinct sets of service-specific electronic mail messages stored at a wireless communication device
US9369284B2 (en) * 2014-04-03 2016-06-14 Google Inc. Browser based identity with multiple login
CN114095468B (en) * 2021-11-19 2023-04-07 中国银行股份有限公司 Message middleware system, post office system and message receiving and transmitting method

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4868877A (en) * 1988-02-12 1989-09-19 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
US5093918A (en) * 1988-12-22 1992-03-03 International Business Machines Corporation System using independent attribute lists to show status of shared mail object among respective users
ATE119726T1 (en) * 1990-10-24 1995-03-15 Omnisec Ag SECRET TRANSMISSION SYSTEM WITH THE POSSIBILITY OF ENCRYPTED COMMUNICATION BETWEEN USERS WITH A SECURED KEY, WHICH IS DETERMINED WITHOUT USER INTERVENTION.
US5283856A (en) * 1991-10-04 1994-02-01 Beyond, Inc. Event-driven rule-based messaging system
US5513126A (en) * 1993-10-04 1996-04-30 Xerox Corporation Network having selectively accessible recipient prioritized communication channel profiles
DK0739560T3 (en) * 1994-01-13 2001-10-01 Certco Inc Cryptographic system and method with key deposit function
US5528745A (en) * 1994-10-28 1996-06-18 King; C. David Method and system for the display of scheduling information for users within a single viewport
US5675637A (en) * 1995-05-16 1997-10-07 Inventions, Inc. Method for automatically obtaining and presenting data from multiple data sources
US5956486A (en) * 1995-12-20 1999-09-21 Hickman; Paul Lawrence Method and apparatus for monitoring multiple electronic mail systems
US5867822A (en) * 1996-06-26 1999-02-02 Sun Microsystems, Inc. Method and apparatus for management of electronic calendars throughout an enterprise and management of events in a distributed system
US6108420A (en) * 1997-04-10 2000-08-22 Channelware Inc. Method and system for networked installation of uniquely customized, authenticable, and traceable software application
US5960406A (en) * 1998-01-22 1999-09-28 Ecal, Corp. Scheduling system for use between users on the web

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
No further relevant documents disclosed *

Also Published As

Publication number Publication date
WO2002042860A3 (en) 2003-03-06
JP2004514977A (en) 2004-05-20
WO2002042860A2 (en) 2002-05-30
AU2002230428A1 (en) 2002-06-03
EP1340156A2 (en) 2003-09-03

Similar Documents

Publication Publication Date Title
US7174368B2 (en) Encrypted e-mail reader and responder system, method, and computer program product
US7421472B1 (en) System, method, and computer program product for providing a multi-user e-mail system
EP2443608B1 (en) Certified email system and method
US8374930B2 (en) Certified email system and method
US7054906B2 (en) System and method for controlling and organizing Email
US7233992B1 (en) Computerized method and system for managing the exchange and distribution of confidential documents
US8539029B2 (en) Pre-send evaluation of E-mail communications
US5875302A (en) Communication management system having communication thread structure including a plurality of interconnected threads
US20040260710A1 (en) Messaging system
US20060031775A1 (en) Action pad
US20070005708A1 (en) Authorizing control for electronic communications
US20040215623A1 (en) Method and apparatus for sending and tracking resume data sent via URL
WO2002084500A1 (en) Method for managing multiple dynamic e-mail aliases
US7269624B1 (en) Method and apparatus for dynamically managing electronic mail messages on a remote electronic mail messaging system
US20070156819A1 (en) System for handling electronic mail in a multiple user environment
CA2522754A1 (en) Secure messaging center
US20170026329A1 (en) Certified Email System and Method
EP1340156A2 (en) System, method, and computer program product for providing a multi-user e-mail system
Gupta et al. E-mail management: A techno-managerial research perspective
US7409559B2 (en) System and method of exchanging information via electronic mail
KR100354478B1 (en) Cyber post-office box service system and method using the postal code
James Introduction to Email
JP3962768B2 (en) E-mail transfer system and e-mail transfer method
Awad Deploying e-mail as an official communication tool: Technical prospect
Daniel Email

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20030527

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

AX Request for extension of the european patent

Extension state: AL LT LV MK RO SI

A4 Supplementary search report drawn up and despatched

Effective date: 20070522

17Q First examination report despatched

Effective date: 20101018

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20110301