WO2004088943A2 - Identifying and using indentities of communication partners deemed to be known to a user - Google Patents

Identifying and using indentities of communication partners deemed to be known to a user Download PDF

Info

Publication number
WO2004088943A2
WO2004088943A2 PCT/US2004/009422 US2004009422W WO2004088943A2 WO 2004088943 A2 WO2004088943 A2 WO 2004088943A2 US 2004009422 W US2004009422 W US 2004009422W WO 2004088943 A2 WO2004088943 A2 WO 2004088943A2
Authority
WO
WIPO (PCT)
Prior art keywords
list
user
person
people
medium
Prior art date
Application number
PCT/US2004/009422
Other languages
French (fr)
Other versions
WO2004088943A3 (en
Inventor
Roy Ben-Yoseph
Barry Appelman
Original Assignee
America Online, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/747,263 external-priority patent/US7603417B2/en
Application filed by America Online, Inc. filed Critical America Online, Inc.
Priority to JP2006509384A priority Critical patent/JP2006524866A/en
Priority to CA002520419A priority patent/CA2520419A1/en
Priority to EP04758463A priority patent/EP1616419A2/en
Publication of WO2004088943A2 publication Critical patent/WO2004088943A2/en
Publication of WO2004088943A3 publication Critical patent/WO2004088943A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/50Business processes related to the communications industry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/48Message addressing, e.g. address format or anonymous messages, aliases

Definitions

  • a list of people associated with a user is maintained An inference that a person is associated with the user is made based, at least in part, on inclusion ofthe person in a contact list of a second person, where the second person is not the user. The inferred person is added to the list of people associated with the user and the list is used to control aspects of communications between the user and others based on whether the others are included on the list.
  • a list of people associated with a user is maintained An inference that a person is associated with the user is made based, at least in part, on a membership ofthe first person in a contact list that is associated with another person, wherein the contact list is not configured for direct access by the user. The inferred person is added to the list of people associated with the user and the list is used to control aspects of communications between the user and others based on whether the others are included on the list.
  • a list of people associated with a user is maintained An inference that a person is associated with the user is made based, at least in part, on the characteristics of one or more contact lists associated with other users, wherein the contact lists associated with the other users include communication identifiers selected by the other users. The inferred person is added to the list of people associated with the user and the list is used to control aspects of communications between the user and others based on whether the others are included on the list.
  • Implementations may include one or more ofthe following.
  • the person may be include in a contact list ofthe user and the contact list ofthe user may be a buddy list.
  • the communications may include e-mail communications and the inference that a person is associated with the user may be based, at least in part, on positive user actions related to e-mail communications from the person.
  • the positive actions may include sending an e-mail to the person; replying to, forwarding, saving, or printing an e-mail received from the person; moving an e-mail from a first folder to a second folder; or maintaining an e-mail from the person in an open state for a predetermined period of time.
  • the positive actions include moving an e-mail from a first folder to a second folder, the first folder may be an inbox folder and the second folder may be a folder other than a delete folder or a spam folder.
  • An inference that a person is associated with the user may be based, at least in part, on detecting a communication between the user and the person.
  • the communication may be an instant messaging communication.
  • the inference that a person is associated with the user may include detecting user actions that mitigate against factors that otherwise are used to infer a person is associated with the user.
  • the user actions may include the user taking steps to report a communication from the person as spam; the user taking steps to add a person to a blacklist; or the user taking steps to move a communication from the person to at least one of a spam folder or a delete folder.
  • People associated with the user may be people not distrusted by the user. People associated with the user may be people known to the user.
  • Using the list may include using the list as a white list such that communications received from people on the list are exempt from spam filtering. Using the list may include using the list to restrict received communications to those communications from people on the list.
  • the communications may be e-mails or instant messages.
  • Using the list may include using the list to filter a display of e-mail such that e- mails from people on the list are shown on the display and e-mails from people not on the list are absent from the display.
  • Using the list may include using the list to filter a display of e-mail such that e-mails from people not on the list are shown on the display and e- mails from people on the list are absent from the display.
  • Using the list may include using the list to restrict which instant messaging interfaces display an online presence of the user to those instant messaging interfaces associated with people on the list.
  • Using the list may include using the list as a white list operating in conjunction with parental controls to filter communications from people not on the list when the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
  • Filtering communications may include blocking the communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
  • Filtering communications may include placing communications from people not on the list in a spam folder the communications include indicia that the content of the communication is inappropriate for a teen or child account user. The spam folder may be locked from the teen or child account user.
  • FIG. 1 is a block diagram of an exemplary networked computing environment.
  • FIG. 2 is a flow chart showing a process for maintaining and using a list of known people.
  • FIG. 3 is an illustration showing an interface for manually specifying white and black lists.
  • FIG. 4 is an illustration showing an interface for an address book.
  • FIG. 5 is an illustration showing an interface for an instant messaging client program.
  • FIG. 6 is an illustration showing an interface for reading e-mail messages.
  • FIG. 7 is an illustration showing an interface for writing e-mail messages.
  • FIG. 8 is a flow chart showing a process for inferring contacts of other users as known.
  • FIGS. 9, 10, and 11 are illustrations showing an interface for managing e-mail messages.
  • FIG. 12 is an illustration showing an interface for setting and modifying mail and spam controls.
  • FIGS. 13-15 are illustrations showing environments in which online presence information can be restricted using the list of known people.
  • FIG. 16 is a flow chart showing a process for filtering communications sent to a teen or child account.
  • the people a user is presumed to know or be associated with may be determined using a number of techniques.
  • the user may specify the people known to him manually, for example, by making manual changes to an address book, buddy list, or white list.
  • the people known to a user may be inferred by monitoring the actions ofthe user. For example, people to whom the user sends e-mail may be considered as known to the user. Likewise, saving a message from a person may signal that the user knows that person.
  • This information about people that the user knows is used in relation to the user's communications. For example, a display of e-mail may only show the user e-mails from people on the list of known people.
  • the names on the list also may be added to a white list, whereby the list of known people may be used to restrict accepted e-mail to only those people the user knows or otherwise.
  • the list also may be used to restrict instant messages or chat request to only those people who the user knows.
  • the list may be used to restrict access to a user's presence, such that access to presence may be provided only to those people that the user knows.
  • an exemplary networked computing environment 100 supports communications between computer users. Computer users are distributed geographically and communicate using client systems 102.
  • a network 104 interconnects client systems 102.
  • Client systems 102 are connected to network 104 through various communication mediums, such as a modem connected to a telephone line (using, for example, serial line internet protocol (SLIP) or point-to-point protocol (PPP)) or a direct internetwork connection (using, for example, transmission control protocol/internet protocol (TCP/IP)).
  • SLIP serial line internet protocol
  • PPP point-to-point protocol
  • TCP/IP transmission control protocol/internet protocol
  • Each ofthe client systems 102 may be implemented using, for example, a general- purpose computer capable of responding to and executing instructions in a defined manner, a personal computer, a special-purpose computer, a workstation, a server, a device, a component, or other equipment or some combination thereof capable of responding to and executing instructions.
  • Client systems 102 may receive instructions from, for example, a software application, a program, apiece of code, a device, a computer, a computer system, or a combination thereof, which independently or collectively direct operations, as described herein. These instructions may take the fomi of one or more communications programs that facilitate communications between the users of client systems 102.
  • such communications programs may include e- mail programs, instant messaging (IM) programs, file transfer protocol (FTP) programs, and voice over internet protocol (VoIP) programs.
  • IM instant messaging
  • FTP file transfer protocol
  • VoIP voice over internet protocol
  • the instructions may be embodied permanently or temporarily in any type of machine, component, equipment, storage medium, or propagated signal that is capable of being delivered to the client systems 102.
  • Client systems 102 include a communications interface (not shown) used by the communications programs to send communications through network 104.
  • the communications may include e-mail, audio data, video data, general binary data, or text data (e.g., encoded in American Standard Code for Information Interchange (ASCII) format).
  • Client systems also include one or more input devices, such as a keyboard, mouse, stylus, or microphone, as well as one or more output devices, such as a monitor, touch screen, speakers, or a printer.
  • the network 104 typically includes a series of portals interconnected through a coherent system. Examples ofthe network 104 include the Internet, Wide Area Networks (WANs), Local Area Networks (LANs), analog or digital wired and wireless telephone networks (e.g.
  • the network 104 may include multiple networks or subnetworks, each of which may include, for example, a wired or wireless data pathway.
  • a host server 106 also may be connected to network 104 and may be used to facilitate some direct or indirect communications between the client systems 102.
  • host server 106 may be implemented using, for example, a general-purpose computer capable of responding to and executing instructions in a defined manner, a personal computer, a special-purpose computer, a workstation, a server, a device, a component, or other equipment or some combination thereof capable of responding to and executing instructions.
  • Host server 106 may receive instructions from, for example, a software application, a program, a piece of code, a device, a computer, a computer system, or a combination thereof, which independently or collectively direct operations, as described herein. These instructions may take the form of one or more communications programs.
  • such communications programs may include e- mail programs, EVI programs, FTP programs, VoIP programs, etc.
  • the instructions may be embodied permanently or temporarily in any type of machine, component, equipment, storage medium, or propagated signal that is capable of being delivered to the host server 106.
  • host server 106 includes a communications interface (not shown) used by the communications programs to send communications through network 104.
  • the communications may include e-mail, audio data, video data, general binary data, or text data (e.g., encoded in American Standard Code for Information Interchange (ASCII) format).
  • ASCII American Standard Code for Information Interchange
  • Each client system 102 has one or more associated users, and a user of a client system 102 may desire to have aspects of his or her communications with other users controlled based on whether the other users are known. In order to facilitate such control, a list is maintained. The list contains the people the user is presumed to know. The list may be maintained on a client system 102, host server 106, or another device connected to network 104.
  • people is used throughout to refer to the entities with which communication occurs. However, communication can occur with entities that are not individual human beings. Communications can occur with a company, an organization, or a system that is not itself a human being. For example, e-mail can be sent to the technical support group at a computer software company.
  • the term "people” is used throughout to more generally refer to all entities with which communications can occur, including entities that are not natural people. In addition, when "people" are described as known, it means that at least one ofthe various communication identifiers associated with them are known, whether or not the people/entities themselves are actually known.
  • a communication identifier is an identifier ofthe "person" used to communicate with the "person.”
  • Communication identifiers can be, for example, an address, such as an e-mail address, a screen name, or an internet protocol (IP) address, or it can be a number, such as a telephone number or a VoIP number.
  • IP internet protocol
  • these communication identifiers are stored in the list of known people. Storing the communication identifier in the list facilitates easy recognition of communications from a known person, thereby facilitating control over aspects of such communications based on whether the sender is known.
  • the term "people” or "person” should be understood as having a meaning that includes any identifier of a person or organization.
  • a process 200 is used to maintain and use the list of people known to the user.
  • a list of people known to the user is stored (202).
  • Communication identifiers are stored in the list to indicate the known people.
  • the user can make manual additions to the list of known people (210).
  • the user is enabled to expressly designate communication identifiers as known (212).
  • a graphical user interface GUI
  • GUI graphical user interface
  • speech-based interface allows the user to add communications identifiers to the list of known people by saying them.
  • These interfaces may allow the user to augment the list of known people indirectly by allowing them to make additions to a contact list such as, for example, a custom sender list, an address book, or a buddy list.
  • An interface optionally may be presented to enable the user to confirm that the manually entered communication identifiers should be added to the list of known people (214).
  • the confirmation may be enabled by way of a GUI that allows the user to select the entered communication identifiers that the user actually wants to be included in the list of known people. This confirmation may occur after a predetermined number of communication identifiers have been entered, or at login or logoff to seek confirmation of any people entered during the previous online session. Those identifiers that the user confirms then are added to the list (216).
  • a confirmation interface is not presented, all entered communication identifiers are added to the list of known people.
  • communication identifiers may be inferred as being known based on the actions ofthe user (220).
  • the communication identifiers known to the user are inferred (222).
  • a communication identifier may be inferred as known if an e-mail message to that communication identifier is sent.
  • the communication identifier ofthe person with whom the user is communicating may be designated as known to the user.
  • Known communication identifiers may be inferred based on user interactions with a received message. For example, a communication identifier also may be inferred as known if a message from that communication identifier is read, replied to, forwarded, saved, or printed. Likewise, the communication identifier that sent the e-mail message may be designated as known if the message is moved from the "inbox" to a folder that is not marked for deletion or for spam, or if the message is left open for a predetermined amount of time.
  • Known communication identifiers also may be inferred based on indicia other than user actions.
  • the people designated as known to the people the user knows may be designated as being "known" to the user. For instance, if a person B is designated as someone user A knows, then the people designated as known to person B also may be designated as "known" to user A.
  • One way this may be implemented is, for example, to designate the people in an address book and/or buddy list of person B as known to user A.
  • some actions may be taken into account to negate an inference that the person is known (224). For instance, if an e-mail received from a person is forwarded to an e-mail address that has been designated for reporting spam, then the inference that the user knows the person may be negated. As another example, an inference that a person is known may be negated if the person is included on an explicit black list of people with which communication should not occur, created by the user or the network administrator.
  • an interface optionally may be presented to enable the user to confirm that the inferred communication identifiers are in fact known (226).
  • the confirmation may be enabled by way of a GUI that allows the user to select inferred communication identifiers that the user actually knows or wants to be included in the list of known people. This confirmation may occur after a predetermined number of communication identifiers have been inferred as known, or at login or logoff to seek confirmation of any people identified in the previous online session. Those identifiers that the user confirms then are added to the list (228). When a confirmation interface is not presented, the inferred identifiers are added to the list.
  • the list of inferred communication identifiers may be stored as a part ofthe user's address book or other contact list. That is, the user's address book or other contact list may be passively personalized based on the inferred communication identifiers.
  • the inferred communication identifiers may be added to a transparent group (i.e., on that is not seen by the user) in the user's address book or other contact list.
  • the inferred commumcation identifiers may be added to a group that is shown to the user.
  • Branches 210 and 220 may occur simultaneously or sequentially. After at least one ofthe branches has occurred, the user optionally may view the list of known people, and he or she may delete those users that are no longer known or needed (230).
  • communication identifiers in the list of known people can be used optionally to find other communication identifiers for that person (232). For example, a person's e- mail address may be obtained from a profile associated with a screen name. Similarly, if the e-mail address is known, it may be used to obtain the screen name. The screen name, e-mail, or other determined communication identifiers may be used to determine other ways in which the known person may communicate with the user or in which the user may communicate with the known person.
  • the list can be used to control aspects ofthe electronic communications between the user and other users based on whether the communication identifiers ofthe other users are known or unknown (234). For example, in an e-mail system that performs spam filtering, the e-mail addresses of known people may be added to a white list, which designates e-mail addresses that should not be filtered or otherwise treated as spam. As another example, when a user's address book or other contact list has been passively personalized, the list of inferred communication identifiers that were added to the address book or other contact list may be used as a white list for spam filtering, along with the communication identifiers explicitly entered into the contact list by the user.
  • the e-mail addresses ofthe known people also may be used to filter or sort a display of e-mail such that e-mails from people on the list are shown more prominently than e-mails from people not on the list. For instance, the user may be able to indicate that only e-mails from known people are shown. In this case, only e-mails from people on the list of known people are shown in the display of e-mail. Alternatively, or additionally, e-mails from known people may be displayed in bold, while e-mails from people not on the list are not displayed in bold. Another manner of displaying known people prominently includes grouping all ofthe e-mail from known people in one position ofthe display, for example, at the beginning or at the end of a list of e-mails.
  • the e-mail addresses of known people may be used to restrict accepted e-mail to only those people the user knows.
  • the EVI screen names of known people may be used to restrict instant messages or chat requests to only those people who the user knows.
  • the list of known people maybe used to restrict displays of online presence information t those people on the list.
  • the EVI screen names of known people may be used to restrict who can view presence information ofthe user to those people the user knows. That is, other users may be restricted from viewing whether the user is online unless the other users are people the user knows.
  • some services such as ICQ (which is an instant messaging service) and America Online display online presence information through channels other than an EVI buddy list. Such displays of online presence information also may be restricted, as described further below.
  • aspects ofthe user's communication on multiple different messaging mediums can be controlled. For example, aspects ofthe user's communication using a combination of, for example, e-mail and instant messaging clients can be controlled using the list of known people.
  • FIGS. 3-5 show exemplary manners in which known people can be expressly designated by putting them in a contact list.
  • the contact list may be, for example, a white list, an address book, or an instant messaging buddy list.
  • the people added to one or more ofthe contact lists then are added to the list of known people.
  • a custom sender list interface 300 allows for manual addition of communication identifiers to the list of known people through specification of a white list and a black list.
  • a white list designates the e-mail addresses that should not be filtered such that e-mail messages from those addresses are delivered to the user without, e.g., subjecting the e-mails to spam filtering.
  • a black list designates the e- mail addresses that should be filtered such that e-mail messages from those addresses are treated as spam and are not shown to the user.
  • the custom sender list interface 300 enables the user to expressly designate communication identifiers as known by adding them to the white list. The identifiers placed on the white list then are added to the list of known people.
  • Radio button 302 signals specification of a black list
  • selecting radio button 304 signals specification of a white list. Only one of radio buttons 302 and
  • a communication identifier can be typed into the text field
  • the communication identifier entered in the text field 306 can be added to the black list or white list, depending on whether radio button 302 or radio button 304 is selected, by clicking on the "Add" button 308. This action will add the entered communication identifier, along with all other previously entered communications identifiers, into the text box 310.
  • a communication identifier can be selected from the list contained in the text box
  • an address book interface 400 allows for manual addition of people to the list of known people through the addition of entries to an address book.
  • Each entry in the address book contains information about a specific person, including the communication identifiers for that person.
  • the address book interface 400 enables the user to expressly designate communication identifiers as known by adding them to entries within the address book. These identifiers are then added to the list of known people.
  • the address book interface 400 may provide the user with an option for preventing the addition of communication identifier to the list of known people when the identifier is added to the address book.
  • the option may prevent the addition for the identifier currently being added, or when the option is selected, may prevent all entered identifiers from being added to the list of known people.
  • the address book interface 400 contains a contact list 406 in which the contacts in the address book are listed. All entries in a selected category and/or matching a current searching criteria are listed by name in the contact list 406.
  • the contact list 406 illustrated contains three entries, entry 408a for "Kevin Greene," entry 408b for
  • the address book interface 400 also contains a personal information list 410 for displaying the personal information for an entry in the address book. Selecting an entry from those listed in the contact list 406 causes the information for the corresponding person to be displayed in personal information list 410. For example, selecting entry 408a for Kevin Greene lists his personal information in the personal information list 410.
  • the personal information includes his contact name 412 (Kevin Greene), an e-mail address 414 (kg@somewhere.com), and a category 416 (Uncategorized, which means the entry 408a was never placed into a category). Other pieces of information, including other communication identifiers, may be included in the personal information list 410.
  • Address book interface 400 also includes buttons 418-422 for adding, deleting, and modifying entries in the address book.
  • Entries may be added to the address book by clicking on the "Add" button 418. This will invoke a dialog box in which the necessary information for a new entry in the address book can be entered. Existing entries can also be modified by selecting an entry from those listed in text box 406 and subsequently clicking on the "Edit” button 420. This will invoke a dialog box populated with information from the existing entry. This information can be changed, and information can be added to it. Finally, existing entries can be removed from the address book by selecting an entry from those listed in text box 406 and subsequently clicking on the "Delete” button 422. Any communication identifiers added to the address book through use ofthe address book interface 400 are considered to be known, so they are added to the list of known people. Entries in the address book may be filed into different categories.
  • the address book interface enables the user to view all entries in a specific category; it also enables the user to view all entries in the address book, regardless of category.
  • the available categories are listed in a drop down category selection box 402. Selecting a category name from the category selection box 402 will filter the set of entries in the address book to include only those belonging to the selected category. Selecting "AU" from the category selection box 402 will include all entries in the address book.
  • the set of entries in the address book can be searched using the search text box 404.
  • the search criteria can be entered into the search text box 404.
  • the set of entries is filtered to contain only those entries meeting the search criteria entered into the search text box 404.
  • the illustrated entries are the total entries may in the address book because the option "AU" was selected from the selection box 402, and no search criteria have been entered into search text box
  • a buddy list interface 500 allows for manual addition of people to the list of known people through addition of screen names to a buddy list.
  • a screen name is a communication identifier for a person in an instant messaging system. Messages are addressed to users ofthe instant messaging system using their screen names.
  • the buddy list for a user ofthe instant messaging system is a list of screen names for people with which the user communicates.
  • the buddy list interface 500 enables the user to expressly designate communication identifiers as known by adding them to his or her buddy list. These identifiers are then added to the list of known people.
  • the buddy list interface 500 contains a text box 502 that contains the buddy list for a screen name "InternetAnn".
  • the buddy list includes multiple screen names.
  • the buddy list in buddy list interface 500 contains the screen name 504a, "randomcontact2," the screen name 504b, "Boss,” the screen name 504c, "Mom,” the screen name 504d, "Dad,” and the screen name 504e, "Brother.”
  • the buddy list may be separated into one or more buddy groups, and each buddy may belong to one ofthe buddy groups.
  • an EVI client program for a person appearing in the buddy list is available to receive communications (i.e., a state commonly referred to as "present")
  • the screen name ofthe buddy in the buddy list is displayed or visually distinguished from other buddies not presently available to receive communications or otherwise not having an equivalent state.
  • present buddies have their screen names displayed under a buddy group heading for the buddy group to which they belong.
  • the buddy group headings also contain the number of screen names from that buddy group currently logged into the instant messaging system and the total number of people in that buddy group.
  • the buddy group heading 506a says that one out ofthe ten members ofthe buddy group named "Buddies" is logged into the system. That one member is the user with screen name 504a, since that screen name 504a is listed under the buddy group heading 506a.
  • buddy group heading 506b says that one out of three members ofthe "Co-Workers" buddy group is logged in, and that member is the user with screen name 504b.
  • the users with the screen names 504c, 504d, and 504e are logged into the system and are members ofthe buddy group named "Family,” which only has one member currently not logged in, according to buddy group heading 506c.
  • the buddy list interface 500 contains a "Setup" button 508, which, when selected enables the user to add screen names to the displayed buddy list. The screen names added to a user's buddy list using the buddy list interface
  • 500 are considered to be known to the user, and are added to the list of known people.
  • the address book interface 400 may provide the user with an option for preventing the addition of communication identifier to the list of known people when the identifier is added to the address book.
  • the option may prevent the addition for the identifier currently being added, or when the option is selected, may prevent all entered identifiers from being added to the list of known people.
  • Actions ofthe user while reading, sending and managing e-mail can lead to the inference that the people sending and receiving that e- mail are known to the user.
  • the contacts of those people known to the user may be inferred to be known directly by the user.
  • Inferred people are added to the list of known people after an optional user confirmation.
  • use of an e-mail reading interface 600 can lead to the inference of people as known to the user.
  • the user may perfomi certain actions while reading a message that signal that the user knows the person who sent the message.
  • the user may perform certain actions that signal that the user does not know the person who sent the message. If the sender ofthe e-mail is inferred to be known to the user based on these actions, the person who sent the e-mail is added to the list of known people.
  • the e-mail reading interface 600 has two major sections, 602 and 604, that show the details ofthe message that is currently being read.
  • Section 602 lists the header information for the message that is currently being read.
  • the header information includes the sender's address 606, the recipient's address 608, the subject 610 ofthe message, and the time 612 the message was received.
  • the message shown was sent to IntemetAnn@aol.com with a subject of "Hi" by kg@somewhere.com at 10:24 AM on 9/4/2003.
  • Section 604 contains the body ofthe message, which in this case is "So, how are you?" To the right and below the contents ofthe displayed message are a series of buttons 614-630 that enable activity based on the displayed message.
  • a "Reply” button 614 invokes an interface for writing a reply to the sender ofthe displayed message.
  • a "Forward” button 616 invokes an interface for forwarding the displayed message.
  • a "Reply AU” button 618 has the same function as the "Reply” button 614, except that the reply message is addressed to all recipients ofthe displayed message.
  • An "Add Address” button 620 adds an entry to the address book for the sender of the displayed message.
  • the entry includes the sender's address 606.
  • a "Report Spam” button 622 sends a message to a service responsible for blocking spam e-mail messages.
  • a "Print” button 624 sends the message to the printer.
  • a "Save” button 626 expands into two options, one for saving the message on a host server, and one for saving the message locally.
  • a "Keep As New” button 628 marks the displayed message as never having been read, and a "Delete” button 630 may immediately delete the message, or it may move the message to a temporary holding place for deleted messages.
  • the actions ofthe user while interacting with the e-mail reading interface 600 may lead to the inference that the user knows or does not know the sender ofthe messages that he is reading.
  • the sender's e-mail address is added to the list of known people. For example, replying to the message by clicking on the "Reply” button 614 may support the inference that the sender is known.
  • pressing the "Forward” button 616 to forward the message may support an inference that the sender, as well as all people to which the message is forwarded, are known.
  • pressing the "Reply AU" button 618 may lead to an inference that the sender and all other recipients are known.
  • Pressing the "Add Address” button 620 to create an entry in the user's address book for the sender ofthe e-mail may lead to the inference that sender is known.
  • clicking on the "Report Spam” button 622 may negate an inference that the sender is known to the user.
  • Clicking the "Print” button 624, using the “Save” button 626, or marking the displayed message as not read with the "Keep As New” button 628 also may support an inference that the sender is known.
  • Leaving interface 600 open for a predetermined period of time is another action that may support an inference that the sender is know.
  • a number of techniques maybe used to determine when a sender is inferred as known based on the above described actions. For example, a sender may be inferred as known based simply on the user performing a single one ofthe actions that support an inference that the sender is known. Alternatively, or additionally, combinations of actions may result in the inference that the sender is known. For example, some number of actions greater than one may be required to add the sender to the list of known people. Also, certain fixed combinations of actions may result in the addition ofthe sender to the list of known people. That is, certain combinations may be designated as indicating that the communication identifier is know and, when those combinations occur, the identifier is added to the list of known people.
  • replying to and saving the message may cause the sender to be added to the list of known people, but keeping the message as new and printing it may not.
  • each ofthe different possible actions may have an associated score indicative of how strongly the action suggests the identifier is known, and a certain aggregate score (a threshold score) may be required to add the sender to the list of known people. That is, the actions may be detected, an aggregate score may be determined from the associated scores, and a comparison to a threshold score may be made to infer whether the person is known to the user and, consequently, is added to the list of known people.
  • An implementation of this technique may assign positive scores to actions supporting an inference, assign negative scores to actions negating an inference, and require a particular positive aggregate score before the identifier is inferred as known.
  • Other methods of combining the actions of the user to infer that the sender is known to the user are possible.
  • the user may perform certain actions while writing a message that will signal that the user knows the people to whom the message will be sent. If the recipients ofthe e-mail are inferred to be known to the user, they are added to the list of known people.
  • the e-mail writing interface 700 contains multiple text fields 702-708 that can be used to specify the different parts ofthe message to be sent. For example, the user can specify the recipients ofthe message using a text field 702, labeled "Send To,” and a text field 704, labeled "Copy To.” The user can also specify the subject ofthe message in a "Subject" text field 706. Finally, the user can type the body ofthe message in a body text field 708.
  • buttons 710 to 716 to the right ofthe text fields 702-708 govern how the message specified by the text fields 702-708 is processed. Clicking on a "Send Now" button 710 immediately processes and sends the message to the specified recipients.
  • Clicking on a "Send Later” button 712 processes the message for sending to its intended recipients at a later time.
  • An "Address Book” button 714 will invoke an address book interface 400.
  • the address book interface 400 may be used to specify the recipients ofthe message. E-mail addresses from entries in the address book can be used to populate the text fields 702 and 704 that contain the recipients ofthe message.
  • Clicking a "Print" button 716 sends the message to the printer.
  • the actions ofthe user while using the e-mail writing interface may lead to the inference that the intended recipients ofthe message that is being written are known to the user.
  • the people entered in these text boxes 702 and 704 will be added to the list of known people if the user is inferred to know the people to whom the message will be sent.
  • using either the "Send Now" button or the “Send Later” button to send the message that is being written leads to the inference that the recipients ofthe message listed in text fields 702 and 704 are known.
  • printing the message with the "Print" button 716 leads to the inference that the intended recipients are known.
  • the address book interface 400 that was invoked by the "Address Book” button 714 can be used to manually add entries to the address book, which will result in additions to the list of known people, as was described above.
  • the recipients are inferred to be known, then they are added to the list of known people.
  • Individual actions ofthe user while using the e-mail writing interface 700 that lead to the inference that the recipients are known may cause the recipients to be added to the list of known people, or a combination of actions may signal that the recipients should be added to the list of known people, as was described above.
  • the e-mail reading interface 600 and the e-mail writing interface 700 may also contain a button that enables the user to manually add the people with whom the user is communicating to the list of known people if the people are not added automatically in the manners described above. For example, clicking on the button in the e-mail reading interface 600 would cause the sender ofthe message to be added to the list of known people. Likewise, clicking on the button in the e-mail writing interface 700 would cause the recipient ofthe e-mail to be added to the list of known people.
  • a process 800 may be used to infer people within a certain number of degrees of separation from the user as known to the user.
  • the degree of separation between two entities describes a relationship between those entities.
  • the characteristics of user contact lists e.g., address book, buddy list, and/or white list
  • recipient A may list user B in recipient A's address book
  • user B may list user C in user B's address book
  • user C may list sender D in user C's address book.
  • sender D is linked to recipient A by two degrees of separation (with user B as the first degree and user C as the second degree).
  • Recipient A is related to user C by one degree of separation (user B) and user B is separated from sender D by one degree of separation (user C).
  • Recipient A and user B, users B and C, and user C and sender D are each respectively separated by zero degrees of separation.
  • a list of contacts is maintained for the user (802).
  • the list of contacts may be any personally maintained list or lists, for example, an address book, a buddy list for instant messaging, and/or a white list.
  • the rest of process 800 will be described using an address book as an example of a list of contacts.
  • the contacts in the user's address book are added to the user's list of known people (804).
  • the contacts linked to the user i.e., up to a desired degree of separation
  • the address books of each contact in the user's address book are accessed (806).
  • These address books are not normally configured for direct accessed by the user. That is, the user does not normally have access to other user's address books such as the address books ofthe contacts in the user's address book (the user's address book is configured for direct access by the user).
  • the other users' address books typically include communication identifiers selected by the other users.
  • the contacts in the user's contacts' address books (i.e., the contacts separated by one degree) then are added to the list of known people (808). If another degree of separation is desired (810), the degree of separation is incremented (812) such that the address books ofthe contacts that are separated from the user by one degree are accessed (806) and the contacts in those address books are added to the list of known people list (808).
  • the contact's degree of separation from the user also may be added. The addition of contacts continues until the desired degree of separation is reached (810). Once the desired degree of separation has been reached, all ofthe contacts within that desired degree of separation from the user have been inferred as known to the user (814).
  • the desired degrees of separation may be a system parameter or, in some implementations, the user may be provided the user with the ability to set the desired degrees of separation.
  • the user may be provided with an interface that allows the user to decide whether degrees of separation will be used, and, if so, how many degrees should be used.
  • the desired degrees of separation may be both a system parameter and able to be set by the user.
  • the system may include a default degrees of separation, which can be adjusted by the user if he or she so desires.
  • Process 800 may result in the list of known people not being updated when any users related to the intended user update their contact lists.
  • using an e-mail managing interface 900 may result in additions to the list of known people.
  • the actions ofthe user while interacting with the e- mail managing interface 900 may lead to the inference that certain people are known to the user. Conversely, the user may perform certain actions that signal that the user does not know certain people. If people are infen-ed as known to the user from these actions, the people are added to the list of known people.
  • Two main components ofthe e-mail managing interface 900 are the folder list 902 and the message list 904.
  • the folder list 902 contains the different folders into which messages can be filed. When a folder is selected from the folder list 902, its contents are listed in the message list 904.
  • Drop down selection box 906 allows for the filtering ofthe messages shown in the message list 904 based on their sender.
  • "Everyone” is chosen in the selection box 906, so all messages in the "New" folder are shown in the message list 904.
  • These include a message 908 from kg@somewhere.com, and a message 910 from noone@fr.com, both sent on September 4, 2003. Clicking and dragging a message from the message list 904 to the folder list 902 with the mouse files that message in the folder whose name is under the current position ofthe mouse, thus removing the message from the folder selected in the folder list 902.
  • buttons below the message list 904 allow the user to work with the messages in the message list 904.
  • a "Read” button 912 will create an e-mail reading interface 600 for the message selected in the message list 904.
  • Clicking on a "Save” button 914 will save the message selected in the message list 904, either to the hard drive ofthe local machine or to a remote server.
  • a "Keep As New” button 916 will mark the selected message as never having been read.
  • Clicking on a "Report Spam” button 918 will send a message to a service responsible for blocking spam messages with regards to the message selected in the message list 904.
  • a "Delete” button 920 either immediately deletes the selected message or temporarily moves the selected message to a holding place for deleted messages.
  • the user's actions while using folders, messages, and buttons present in the e-mail managing interface 900 may result in the addition of people to the list of known people.
  • Moving a message between the different folders ofthe folder list 902 may lead to the inference that the sender or recipients ofthe message are known.
  • dragging message 908 from the "New" folder to another folder, except for a spam or delete folder may result in the inference that the sender of message is known to the user.
  • Opening a message with the "Read” button 912 may support an inference that the sender ofthe message is known.
  • Pressing the "Save” button 914 or the "Keep As New” button 916 also may result in the inference that the sender ofthe message is known to the user.
  • FIGS. 10-12 illustrate exemplary uses ofthe list of known people in controlling aspects ofthe user's communication.
  • the list of known people can be used to control aspects ofthe user's communication using, for example, an e-mail or instant messaging client.
  • the list of known people can be used to control the e-mail messages displayed on an e-mail managing interface 900.
  • the e-mail managing interface contains a folder list 902 into which messages can be filed. When a folder is selected from the folder list 902, its contents are listed in the message list 904. In this case, the folder called "New" has been selected from the folder list 902, and its contents are listed in the message list 904.
  • Drop down selection box 906 allows for the filtering ofthe messages shown in the message list 904 based on their sender. In this case, the option "People I Know" has been selected from the selection box 906. This causes the displayed messages to be filtered against the list of known people for the user. Messages from people that are in the list of known people are displayed in the message list 904, while messages from senders that are not in the list of known people do not appear in the message list 904.
  • the e-mail address kg@somewhere.com is in the list of known people for the user, while noone@fr.com is not.
  • message 910 is filtered out from the set of messages shown to the user in the message list 904.
  • the only message that is displayed is message 908 from kg@somewhere.com. Therefore, the list of known senders was used to limit the e-mail messages shown to the user to only those coming from people on the list.
  • the list of known people can be used to control the e-mail messages displayed on an e-mail managing interface 900 in the opposite manner as was done with respect to FIG 10.
  • the e-mail managing interface contains a folder list 902 into which messages can be filed. When a folder is selected from the folder list 902, its contents are listed in the message list 904. In this case, the folder called "New" has been selected from the folder list 902, and its contents are listed in the message list 904.
  • Drop down selection box 906 allows for the filtering ofthe messages shown in the message list 904 based on their sender.
  • the option "Unknown Senders" has been selected from the selection box 906. This causes the displayed messages to be filtered against the list of known people for the user in the opposite manner as was done with respect to FIG. 10. In other words, messages from people that are not in the list of known people are displayed in the message list 904, while messages from senders that are in the list of known people do not appear in the message list 904.
  • the e-mail address kg@somewhere.com is in the list of known people, while noone@fr.com is not.
  • message 908 is filtered out from the set of messages shown to the user in the message list 904.
  • the only message that is displayed is message 910 from noone@fr.com. Therefore, the list of known senders is used to limit the e-mail messages shown to the user to only those coming from people not on the list.
  • an e-mail control interface 1200 enables further control over a user's e-mail messages based on the list of known people.
  • the e-mail control interface contains a user selection box 1202. The user to which the controls specified in the e-mail control interface 1200 will apply is selected with user selection box 1202.
  • a series of options 1204-1224 provide for different manners of filtering received e-mail.
  • Options 1204-1212 allow the user to define the senders from whom the selected user will receive e-mail.
  • Option 1204 enables the user to receive e-mail from all senders. Selecting option 1204 will cause the selected user to receive e-mail from anyone, regardless of whether they appear on the list of known people.
  • Option 1206 enables the user to receive e-mail only from America Online (AOL) members. Selecting option 1206 will cause the selected user to receive e-mail messages only from customers ofthe America Online internet service provider, while all other messages are blocked.
  • Option 1208 enables the user to receive e-mail only from known people. Selecting option 1208 causes the selected user's e-mail to be filtered against the list of known people.
  • Option 1210 enables the user to block e-mail from all senders. Selecting this option 1210 will cause all ofthe e-mail messages addressed to the selected user to be blocked.
  • Option 1212 enables the user to use a custom sender list to determine what mail is received.
  • the custom sender list contains a white list and a black list. Messages from those people appearing on the white list are shown to the user, while messages from people appearing on the black list are blocked from the user.
  • Options 1204-1212 may be mutually exclusive.
  • Option 1214 enables blocking any e-mail messages containing pictures or files.
  • Selection of option 1214 causes all messages containing pictures or files to be blocked.
  • Options 1216 and 1218 allow the user to define what happens to blocked messages.
  • Option 1216 enables permanently deleting blocked messages.
  • Selecting option 1216 causes all blocked messages to be deleted immediately, leaving no opportunity for the user to view them.
  • Option 1218 enables delivery of blocked messages to a folder designated for spam.
  • Selecting option 1218 causes blocked messages to be placed in the folder designated for spam. The user has the option of viewing these messages after they have been placed in the spam folder.
  • a third option (not shown) may cause the blocked messages to be maintained in a temporary holding folder. The messages stored in the temporary holding folder may be deleted after a certain amount of time that may be selected by the user.
  • Options 1216, 1218, and the third option are mutually exclusive.
  • Options 1220-1224 control what mail is received by the user selected in the selection box 1202.
  • Option 1220 enables filtering ofthe incoming e-mail messages with a spam filter. Selecting this option 1220 will cause a user's e-mail messages to be filtered based on whether or not the messages are spam messages or not.
  • the list of known people may be used by the spam filter when determining if a message is a spam message.
  • the spam filter could use the list of known people as a white list when determining which messages to keep. Messages from people on the white list may be accepted, while messages from people that are not on the list are rejected.
  • the white list may be used to exempt communications from people on the white list from spam filtering, while communications from people not on the white list are subjected to spam filtering.
  • the spam filter could use the list of known people to assign a spam score to incoming messages. Messages from people that are not on the list of known people may receive a higher spam score than those messages from people on the list. Those messages that are dete ⁇ nined to be spam are delivered to the user's spam mailbox, and those messages that are not spam are delivered to the user's main mailbox.
  • Option 1222 enables filtering the incoming e-mail messages based on whether they contain one or more clickable hyperlinks or uniform resource locators (URLs). If this option 1222 is selected, messages with clickable URLs are delivered to the user's spam folder, and those messages that do not are delivered to the user's main mailbox.
  • a second option (not shown) for handling messages with clickable URLs enables delivering messages with URLs directed to inappropriate or parentally controlled content to the user's spam folder and delivering all other messages to the user's main mailbox.
  • Option 1224 enables filtering ofthe user's incoming e-mail messages based on whether they contain any ofthe words contained in a custom word list. If this option 1224 is selected, messages that contain words from the custom word list are delivered to the user's spam folder, and those messages that do not are delivered to the user's main mailbox.
  • the list of known people may be used in conjunction with the filtering performed by options 1222 and 1224 by exempting messages from known people from these controls.
  • messages meeting the criteria indicated by options 1222 and 1224, when selected, may be sent to a spam folder, except for when the sender ofthe message is on the known list. For example, a message with a URL may be received.
  • the message with the URL is place in a spam folder.
  • the message with the URL is from a known person, however, the message is not sent to the spam folder, but rather is delivered as normal.
  • a save button 1226 and a cancel button 1228 are also present on the e-mail control interface 1200.
  • the save button 1226 saves any changes made to the options 1204-1224 for the user selected in the selection box 1202, while the cancel button 1228 discards any changes that have been made and restores the options to their previous settings.
  • the EVI screen names of known people may be used to restrict instant messages or chat requests to only those people who the user knows.
  • the EVI screen names of known people also may be used to restrict who can view presence information ofthe user to those people the user knows. That is, other users may be restricted from viewing whether the user is online (i.e., logged into the EVI system) unless the other users are people the user knows.
  • FIGS. 13, 14 and 15 show additional environments in which online presence infomiation can be restricted using the list of known people.
  • an interface 1300 includes a window 1310 that displays search results for a person's search criteria (e.g., members who have John Doe somewhere in their profile).
  • the search results include a list of members matching the search criteria.
  • the results include the screen name, the member name, and the location of each member matching the criteria.
  • An icon 1314 provides online presence information. Icon 1314 is displayed in window 1310 next to members who are currently online.
  • America Online display online presence information in a user's member profile.
  • a user's member profile may be displayed as the result of selecting a member from search results such as those shown in
  • the member profile may be invoked by a user when the user comes across a screen name while using a communication service such chat or message boards.
  • a communication service such chat or message boards.
  • Other manners manner of invoking the member profile may be available depending on the service.
  • an interface 1400 When a user invokes another user's member profile, an interface 1400 is provided.
  • the interface includes the screen name 1402 ofthe user whose profile is being shown.
  • Interface 1400 also includes a number of buttons 1404 that allow the invoking user to interact with the user whose profile is being shown.
  • Interface 1400 also has an area 1406 that provides online presence information. In the exemplary profile illustrated, the member is currently online an in the chat room "louisianam4m.” Area 1406 indicates that the member is not online when the member is not online.
  • a web browser 1500 displays a search page 1502 for ICQ in which a person can search profiles of ICQ users.
  • Profiles 1510 and 1520 are shown as a result of a search using the criteria "John Doe" anywhere in the profile.
  • Icons 1512 and 1522 which are part of profiles 1510 and 1520 respectively, provide online presence information. Icons 1512 and 1522 are shown in one color when the user is online and in a different color when the user is not online.
  • the online presence information may be restricted based on the list of known people.
  • the online presence information may be restricted such that only some or all ofthe people known to a user may view the user's online presence information.
  • icon 1314 may be absent when the person viewing the search results is not a person known to the user whose screen name is "Hotxjock28.”
  • area 1406 may not provide any online presence information when the person viewing the profile is not known to the user whose screen name is "Hotxjock28.”
  • icon 1512 or 1522 may indicate the user is not online, or indicate that the online presence infomiation is unavailable, when the person viewing the profile 1510 or 1520 is not known to the user whose profile information is shown.
  • the online presence information may be restricted or not provided to a potential receiver ofthe online presence information when the potential receiver requests the online presence information through an application such as an instant messaging application, or by virtue of displaying a web page, member profile, or member search result.
  • the information may be provided in response to a request to receive the online presence information.
  • a determination as to whether the online presence information is communicated may be based on whether the potential receiver is included in the list of known people.
  • the online presence information may be restricted or not provided to the potential receiver when the potential receiver is not included in the list.
  • the online presence information may be restricted or not provided to a potential receiver ofthe online presence information absent a request for the online presence information.
  • online presence information may be broadcast generally to users. Certain users may be excluded from the broadcast of online presence information when those users are not on the list of people known to the user. Another use ofthe list of known people may include filtering out communications with questionable content sent to teens or younger individuals when the communication is from someone unknown to the teen or younger individual. Many times, inappropriate (e.g., pornographic) communications such as e-mail is sent to teens or younger individuals. There may be certain indicia that a communication is inappropriate, or that it may lead to inappropriate content. One such indicia, for instance, is the presence of a Uniform Resource Locator (URL) located in the body of an e-mail.
  • URL Uniform Resource Locator
  • indicia may include certain words or phrases, such as vulgar or lewd words, included in the communication. Such indicia may be a stronger indicator that the communication is inappropriate when the e-mail is from someone unknown to the teen or young adult.
  • Some Internet Service Providers ISPs
  • AOL America Online, Inc.
  • FIG. 16 is a flow chart showing a process 1600 for filtering communications sent to a teen or child account.
  • a list of people known to the user ofthe teen or child account is maintained for example, using the techniques described above (1605).
  • the sender ofthe communication is determined (1615).
  • the commumcation may include, for example, an e-mail or an instant message.
  • a determination also is made as to whether the communication contains indicia that the communication is inappropriate for the user ofthe teen or child account (1620). As described above, such indicia may include a URL located in the body ofthe communication and/or certain words being included in the body ofthe communication.
  • Filtering may include blocking or deleting the communication.
  • filtering may include placing the communication in a secured place that the master account owner can access, but the teen or child user can not.
  • the communications may be placed in a secure spam folder.
  • the spam folder may be secured, for example, by preventing the teen or child account user from seeing the folder or by password protecting the folder.
  • emails that contain URLs or certain words or phrases and that are sent to a teen or child account by someone not known to the teen or child may be automatically deleted or blocked.
  • e-mails may be sent to a spam folder.
  • the spam folder is designed to be locked from teens or younger adults (e.g., by preventing them from seeing the folder or requiring a password to access the folder), this can potentially prevent them from being exposed to inappropriate content.
  • the techniques described above are not limited to any particular hardware or software configuration. Rather, they may be implemented using hardware, software, or a combination of both.
  • the methods and processes described may be implemented as computer programs that are executed on programmable computers comprising at least one processor and at least one data storage system.
  • the programs may be implemented in a high-level programming language and may also be implemented in assembly or other lower level languages, if desired.
  • Any such program will typically be stored on a computer-usable storage medium or device (e.g., CD-Rom, RAM, or magnetic disk).
  • a computer-usable storage medium or device e.g., CD-Rom, RAM, or magnetic disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The people a user is presumed to know or be associated with may be determined using a number of techniques. This information about people that the user knows is used in relation to the user’s communications. Furthermore, online presence information for the user is communicated only to potential receivers that are known to the user.

Description

Identifying and Using Identities Deemed to be
Known to a User
CLAIM OF PRIORITY This application claims priority under 35 USC §119(e) to U.S. Provisional Patent
Application Serial No. 60/457,320, filed on March 26, 2003, and U.S. Provisional Patent Application Serial No. 60/488,376, filed on July 21, 2003, both of which are hereby incorporated by reference.
TECHNICAL FIELD This description relates to network communications.
BACKGROUND
With the advent ofthe Internet and a decline in computer prices, many people are communicating with one another through computers interconnected by networks. A number of different communication mediums have been developed to facilitate such communications between computer users.
SUMMARY hi one aspect, a list of people associated with a user is maintained An inference that a person is associated with the user is made based, at least in part, on inclusion ofthe person in a contact list of a second person, where the second person is not the user. The inferred person is added to the list of people associated with the user and the list is used to control aspects of communications between the user and others based on whether the others are included on the list.
In another aspect, a list of people associated with a user is maintained An inference that a person is associated with the user is made based, at least in part, on a membership ofthe first person in a contact list that is associated with another person, wherein the contact list is not configured for direct access by the user. The inferred person is added to the list of people associated with the user and the list is used to control aspects of communications between the user and others based on whether the others are included on the list. In another aspect, a list of people associated with a user is maintained An inference that a person is associated with the user is made based, at least in part, on the characteristics of one or more contact lists associated with other users, wherein the contact lists associated with the other users include communication identifiers selected by the other users. The inferred person is added to the list of people associated with the user and the list is used to control aspects of communications between the user and others based on whether the others are included on the list.
Implementations may include one or more ofthe following. For example, the person may be include in a contact list ofthe user and the contact list ofthe user may be a buddy list.
The communications may include e-mail communications and the inference that a person is associated with the user may be based, at least in part, on positive user actions related to e-mail communications from the person. The positive actions may include sending an e-mail to the person; replying to, forwarding, saving, or printing an e-mail received from the person; moving an e-mail from a first folder to a second folder; or maintaining an e-mail from the person in an open state for a predetermined period of time. When the positive actions include moving an e-mail from a first folder to a second folder, the first folder may be an inbox folder and the second folder may be a folder other than a delete folder or a spam folder. An inference that a person is associated with the user may be based, at least in part, on detecting a communication between the user and the person. The communication may be an instant messaging communication.
The inference that a person is associated with the user may include detecting user actions that mitigate against factors that otherwise are used to infer a person is associated with the user. The user actions may include the user taking steps to report a communication from the person as spam; the user taking steps to add a person to a blacklist; or the user taking steps to move a communication from the person to at least one of a spam folder or a delete folder.
People associated with the user may be people not distrusted by the user. People associated with the user may be people known to the user.
Using the list may include using the list as a white list such that communications received from people on the list are exempt from spam filtering. Using the list may include using the list to restrict received communications to those communications from people on the list. The communications may be e-mails or instant messages. Using the list may include using the list to filter a display of e-mail such that e- mails from people on the list are shown on the display and e-mails from people not on the list are absent from the display. Using the list may include using the list to filter a display of e-mail such that e-mails from people not on the list are shown on the display and e- mails from people on the list are absent from the display. Using the list may include using the list to restrict which instant messaging interfaces display an online presence of the user to those instant messaging interfaces associated with people on the list.
Using the list may include using the list as a white list operating in conjunction with parental controls to filter communications from people not on the list when the communications include indicia that the content of the communication is inappropriate for a teen or child account user. Filtering communications may include blocking the communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user. Filtering communications may include placing communications from people not on the list in a spam folder the communications include indicia that the content of the communication is inappropriate for a teen or child account user. The spam folder may be locked from the teen or child account user.
Inferring that a person is associated with the user may be based, at least in part, on inclusion ofthe person in a contact list of a person who is listed in a contact list ofthe user. Inferring that a person is associated with the user may be based, at least in part, on inclusion ofthe person in a contact list of a person who is listed in a buddy list ofthe user. Inferring that a person is associated with the user may be based, at least in part, on the inclusion ofthe person in a contact list of a person who the user has added to a buddy list ofthe user. Implementations ofthe described techniques may include hardware, a method or process, or computer software on a computer-accessible medium.
The details of one or more implementations are set forth in the accompanying drawings and the description below. Other features will be apparent from the description and drawings, and from the claims.
DESCRIPTION OF DRAWINGS
FIG. 1 is a block diagram of an exemplary networked computing environment. FIG. 2 is a flow chart showing a process for maintaining and using a list of known people. FIG. 3 is an illustration showing an interface for manually specifying white and black lists.
FIG. 4 is an illustration showing an interface for an address book.
FIG. 5 is an illustration showing an interface for an instant messaging client program.
FIG. 6 is an illustration showing an interface for reading e-mail messages.
FIG. 7 is an illustration showing an interface for writing e-mail messages.
FIG. 8 is a flow chart showing a process for inferring contacts of other users as known. FIGS. 9, 10, and 11 are illustrations showing an interface for managing e-mail messages.
FIG. 12 is an illustration showing an interface for setting and modifying mail and spam controls.
FIGS. 13-15 are illustrations showing environments in which online presence information can be restricted using the list of known people.
FIG. 16 is a flow chart showing a process for filtering communications sent to a teen or child account.
DETAILED DESCRIPTION
The people a user is presumed to know or be associated with may be determined using a number of techniques. The user may specify the people known to him manually, for example, by making manual changes to an address book, buddy list, or white list. Alternatively, or additionally, the people known to a user may be inferred by monitoring the actions ofthe user. For example, people to whom the user sends e-mail may be considered as known to the user. Likewise, saving a message from a person may signal that the user knows that person.
This information about people that the user knows is used in relation to the user's communications. For example, a display of e-mail may only show the user e-mails from people on the list of known people. The names on the list also may be added to a white list, whereby the list of known people may be used to restrict accepted e-mail to only those people the user knows or otherwise. The list also may be used to restrict instant messages or chat request to only those people who the user knows. In addition, the list may be used to restrict access to a user's presence, such that access to presence may be provided only to those people that the user knows. Referring to FIG. 1, an exemplary networked computing environment 100 supports communications between computer users. Computer users are distributed geographically and communicate using client systems 102. A network 104 interconnects client systems 102. Client systems 102 are connected to network 104 through various communication mediums, such as a modem connected to a telephone line (using, for example, serial line internet protocol (SLIP) or point-to-point protocol (PPP)) or a direct internetwork connection (using, for example, transmission control protocol/internet protocol (TCP/IP)).
Each ofthe client systems 102 may be implemented using, for example, a general- purpose computer capable of responding to and executing instructions in a defined manner, a personal computer, a special-purpose computer, a workstation, a server, a device, a component, or other equipment or some combination thereof capable of responding to and executing instructions. Client systems 102 may receive instructions from, for example, a software application, a program, apiece of code, a device, a computer, a computer system, or a combination thereof, which independently or collectively direct operations, as described herein. These instructions may take the fomi of one or more communications programs that facilitate communications between the users of client systems 102. For instance, such communications programs may include e- mail programs, instant messaging (IM) programs, file transfer protocol (FTP) programs, and voice over internet protocol (VoIP) programs. The instructions may be embodied permanently or temporarily in any type of machine, component, equipment, storage medium, or propagated signal that is capable of being delivered to the client systems 102.
Client systems 102 include a communications interface (not shown) used by the communications programs to send communications through network 104. The communications may include e-mail, audio data, video data, general binary data, or text data (e.g., encoded in American Standard Code for Information Interchange (ASCII) format). Client systems also include one or more input devices, such as a keyboard, mouse, stylus, or microphone, as well as one or more output devices, such as a monitor, touch screen, speakers, or a printer. The network 104 typically includes a series of portals interconnected through a coherent system. Examples ofthe network 104 include the Internet, Wide Area Networks (WANs), Local Area Networks (LANs), analog or digital wired and wireless telephone networks (e.g. a Public Switched Telephone Network (PSTN)), an Integrated Services Digital Network (ISDN), or a Digital Subscriber Line (xDSL)), or any other wired or wireless network. The network 104 may include multiple networks or subnetworks, each of which may include, for example, a wired or wireless data pathway.
A host server 106 also may be connected to network 104 and may be used to facilitate some direct or indirect communications between the client systems 102. As with the client systems 102, host server 106 may be implemented using, for example, a general-purpose computer capable of responding to and executing instructions in a defined manner, a personal computer, a special-purpose computer, a workstation, a server, a device, a component, or other equipment or some combination thereof capable of responding to and executing instructions. Host server 106 may receive instructions from, for example, a software application, a program, a piece of code, a device, a computer, a computer system, or a combination thereof, which independently or collectively direct operations, as described herein. These instructions may take the form of one or more communications programs. For instance, such communications programs may include e- mail programs, EVI programs, FTP programs, VoIP programs, etc. The instructions may be embodied permanently or temporarily in any type of machine, component, equipment, storage medium, or propagated signal that is capable of being delivered to the host server 106.
Further, host server 106 includes a communications interface (not shown) used by the communications programs to send communications through network 104. The communications may include e-mail, audio data, video data, general binary data, or text data (e.g., encoded in American Standard Code for Information Interchange (ASCII) format).
Each client system 102 has one or more associated users, and a user of a client system 102 may desire to have aspects of his or her communications with other users controlled based on whether the other users are known. In order to facilitate such control, a list is maintained. The list contains the people the user is presumed to know. The list may be maintained on a client system 102, host server 106, or another device connected to network 104.
The term "people" is used throughout to refer to the entities with which communication occurs. However, communication can occur with entities that are not individual human beings. Communications can occur with a company, an organization, or a system that is not itself a human being. For example, e-mail can be sent to the technical support group at a computer software company. The term "people" is used throughout to more generally refer to all entities with which communications can occur, including entities that are not natural people. In addition, when "people" are described as known, it means that at least one ofthe various communication identifiers associated with them are known, whether or not the people/entities themselves are actually known.
A communication identifier is an identifier ofthe "person" used to communicate with the "person." Communication identifiers can be, for example, an address, such as an e-mail address, a screen name, or an internet protocol (IP) address, or it can be a number, such as a telephone number or a VoIP number. In one implementation, these communication identifiers are stored in the list of known people. Storing the communication identifier in the list facilitates easy recognition of communications from a known person, thereby facilitating control over aspects of such communications based on whether the sender is known. Thus, the term "people" or "person" should be understood as having a meaning that includes any identifier of a person or organization.
Referring to FIG. 2, a process 200 is used to maintain and use the list of people known to the user. A list of people known to the user is stored (202). Communication identifiers are stored in the list to indicate the known people.
The user can make manual additions to the list of known people (210). To that end, the user is enabled to expressly designate communication identifiers as known (212). For example, a graphical user interface (GUI) that allows the user to enter communication identifiers may be provided. There may also be a speech-based interface that allows the user to add communications identifiers to the list of known people by saying them. These interfaces may allow the user to augment the list of known people indirectly by allowing them to make additions to a contact list such as, for example, a custom sender list, an address book, or a buddy list.
However, the user may want to manually add a person to a contact list but not to the list of known people. An interface optionally may be presented to enable the user to confirm that the manually entered communication identifiers should be added to the list of known people (214). The confirmation may be enabled by way of a GUI that allows the user to select the entered communication identifiers that the user actually wants to be included in the list of known people. This confirmation may occur after a predetermined number of communication identifiers have been entered, or at login or logoff to seek confirmation of any people entered during the previous online session. Those identifiers that the user confirms then are added to the list (216). When a confirmation interface is not presented, all entered communication identifiers are added to the list of known people. Alternatively, there may be an interface that allows the user to directly enter identifiers into the list of known people.
On the other hand, communication identifiers may be inferred as being known based on the actions ofthe user (220). First, the communication identifiers known to the user are inferred (222). For example, a communication identifier may be inferred as known if an e-mail message to that communication identifier is sent. When an instant messaging program is used, the communication identifier ofthe person with whom the user is communicating may be designated as known to the user.
Known communication identifiers may be inferred based on user interactions with a received message. For example, a communication identifier also may be inferred as known if a message from that communication identifier is read, replied to, forwarded, saved, or printed. Likewise, the communication identifier that sent the e-mail message may be designated as known if the message is moved from the "inbox" to a folder that is not marked for deletion or for spam, or if the message is left open for a predetermined amount of time.
Known communication identifiers also may be inferred based on indicia other than user actions. As an example, the people designated as known to the people the user knows may be designated as being "known" to the user. For instance, if a person B is designated as someone user A knows, then the people designated as known to person B also may be designated as "known" to user A. One way this may be implemented is, for example, to designate the people in an address book and/or buddy list of person B as known to user A.
When inferring known people, some actions may be taken into account to negate an inference that the person is known (224). For instance, if an e-mail received from a person is forwarded to an e-mail address that has been designated for reporting spam, then the inference that the user knows the person may be negated. As another example, an inference that a person is known may be negated if the person is included on an explicit black list of people with which communication should not occur, created by the user or the network administrator. After known communication identifiers are inferred, an interface optionally may be presented to enable the user to confirm that the inferred communication identifiers are in fact known (226). The confirmation may be enabled by way of a GUI that allows the user to select inferred communication identifiers that the user actually knows or wants to be included in the list of known people. This confirmation may occur after a predetermined number of communication identifiers have been inferred as known, or at login or logoff to seek confirmation of any people identified in the previous online session. Those identifiers that the user confirms then are added to the list (228). When a confirmation interface is not presented, the inferred identifiers are added to the list. The list of inferred communication identifiers may be stored as a part ofthe user's address book or other contact list. That is, the user's address book or other contact list may be passively personalized based on the inferred communication identifiers. For instance, the inferred communication identifiers may be added to a transparent group (i.e., on that is not seen by the user) in the user's address book or other contact list. Alternatively, the inferred commumcation identifiers may be added to a group that is shown to the user.
Branches 210 and 220 may occur simultaneously or sequentially. After at least one ofthe branches has occurred, the user optionally may view the list of known people, and he or she may delete those users that are no longer known or needed (230). hi addition, communication identifiers in the list of known people can be used optionally to find other communication identifiers for that person (232). For example, a person's e- mail address may be obtained from a profile associated with a screen name. Similarly, if the e-mail address is known, it may be used to obtain the screen name. The screen name, e-mail, or other determined communication identifiers may be used to determine other ways in which the known person may communicate with the user or in which the user may communicate with the known person.
At this point, the list can be used to control aspects ofthe electronic communications between the user and other users based on whether the communication identifiers ofthe other users are known or unknown (234). For example, in an e-mail system that performs spam filtering, the e-mail addresses of known people may be added to a white list, which designates e-mail addresses that should not be filtered or otherwise treated as spam. As another example, when a user's address book or other contact list has been passively personalized, the list of inferred communication identifiers that were added to the address book or other contact list may be used as a white list for spam filtering, along with the communication identifiers explicitly entered into the contact list by the user.
The e-mail addresses ofthe known people also may be used to filter or sort a display of e-mail such that e-mails from people on the list are shown more prominently than e-mails from people not on the list. For instance, the user may be able to indicate that only e-mails from known people are shown. In this case, only e-mails from people on the list of known people are shown in the display of e-mail. Alternatively, or additionally, e-mails from known people may be displayed in bold, while e-mails from people not on the list are not displayed in bold. Another manner of displaying known people prominently includes grouping all ofthe e-mail from known people in one position ofthe display, for example, at the beginning or at the end of a list of e-mails.
The e-mail addresses of known people may be used to restrict accepted e-mail to only those people the user knows. Similarly, the EVI screen names of known people may be used to restrict instant messages or chat requests to only those people who the user knows.
Further, the list of known people maybe used to restrict displays of online presence information t those people on the list. For example, the EVI screen names of known people may be used to restrict who can view presence information ofthe user to those people the user knows. That is, other users may be restricted from viewing whether the user is online unless the other users are people the user knows. Also, some services such as ICQ (which is an instant messaging service) and America Online display online presence information through channels other than an EVI buddy list. Such displays of online presence information also may be restricted, as described further below.
Additionally, by determining multiple communication identifiers as described above, aspects ofthe user's communication on multiple different messaging mediums can be controlled. For example, aspects ofthe user's communication using a combination of, for example, e-mail and instant messaging clients can be controlled using the list of known people.
FIGS. 3-5 show exemplary manners in which known people can be expressly designated by putting them in a contact list. The contact list may be, for example, a white list, an address book, or an instant messaging buddy list. The people added to one or more ofthe contact lists then are added to the list of known people.
Referring to FIG. 3, a custom sender list interface 300 allows for manual addition of communication identifiers to the list of known people through specification of a white list and a black list. A white list designates the e-mail addresses that should not be filtered such that e-mail messages from those addresses are delivered to the user without, e.g., subjecting the e-mails to spam filtering. On the other hand, a black list designates the e- mail addresses that should be filtered such that e-mail messages from those addresses are treated as spam and are not shown to the user. The custom sender list interface 300 enables the user to expressly designate communication identifiers as known by adding them to the white list. The identifiers placed on the white list then are added to the list of known people.
Selecting radio button 302 signals specification of a black list, while selecting radio button 304 signals specification of a white list. Only one of radio buttons 302 and
304 may be selected at once. A communication identifier can be typed into the text field
306. The communication identifier entered in the text field 306 can be added to the black list or white list, depending on whether radio button 302 or radio button 304 is selected, by clicking on the "Add" button 308. This action will add the entered communication identifier, along with all other previously entered communications identifiers, into the text box 310.
A communication identifier can be selected from the list contained in the text box
310 by clicking on the communication identifier. Subsequently clicking on a "Remove" button 312 will eliminate that communication identifier from the list. Any changes made to the black list or the white list can be saved by clicking on a "Save" button 314, and any changes can be undone and discarded using a "Cancel" button 316.
Referring to FIG. 4, an address book interface 400 allows for manual addition of people to the list of known people through the addition of entries to an address book.
Each entry in the address book contains information about a specific person, including the communication identifiers for that person. The address book interface 400 enables the user to expressly designate communication identifiers as known by adding them to entries within the address book. These identifiers are then added to the list of known people.
The address book interface 400 may provide the user with an option for preventing the addition of communication identifier to the list of known people when the identifier is added to the address book. The option may prevent the addition for the identifier currently being added, or when the option is selected, may prevent all entered identifiers from being added to the list of known people.
The address book interface 400 contains a contact list 406 in which the contacts in the address book are listed. All entries in a selected category and/or matching a current searching criteria are listed by name in the contact list 406. The contact list 406 illustrated contains three entries, entry 408a for "Kevin Greene," entry 408b for
"quoteomatic," and entry 408c for "zolaonaol."
The address book interface 400 also contains a personal information list 410 for displaying the personal information for an entry in the address book. Selecting an entry from those listed in the contact list 406 causes the information for the corresponding person to be displayed in personal information list 410. For example, selecting entry 408a for Kevin Greene lists his personal information in the personal information list 410. The personal information includes his contact name 412 (Kevin Greene), an e-mail address 414 (kg@somewhere.com), and a category 416 (Uncategorized, which means the entry 408a was never placed into a category). Other pieces of information, including other communication identifiers, may be included in the personal information list 410. Address book interface 400 also includes buttons 418-422 for adding, deleting, and modifying entries in the address book. Entries may be added to the address book by clicking on the "Add" button 418. This will invoke a dialog box in which the necessary information for a new entry in the address book can be entered. Existing entries can also be modified by selecting an entry from those listed in text box 406 and subsequently clicking on the "Edit" button 420. This will invoke a dialog box populated with information from the existing entry. This information can be changed, and information can be added to it. Finally, existing entries can be removed from the address book by selecting an entry from those listed in text box 406 and subsequently clicking on the "Delete" button 422. Any communication identifiers added to the address book through use ofthe address book interface 400 are considered to be known, so they are added to the list of known people. Entries in the address book may be filed into different categories. The address book interface enables the user to view all entries in a specific category; it also enables the user to view all entries in the address book, regardless of category. The available categories are listed in a drop down category selection box 402. Selecting a category name from the category selection box 402 will filter the set of entries in the address book to include only those belonging to the selected category. Selecting "AU" from the category selection box 402 will include all entries in the address book. The set of entries in the address book can be searched using the search text box 404. The search criteria can be entered into the search text box 404. The set of entries is filtered to contain only those entries meeting the search criteria entered into the search text box 404. The illustrated entries are the total entries may in the address book because the option "AU" was selected from the selection box 402, and no search criteria have been entered into search text box
404. Thus the address book only contains the three entries listed in contact list 406.
Referring to FIG. 5, a buddy list interface 500 allows for manual addition of people to the list of known people through addition of screen names to a buddy list. A screen name is a communication identifier for a person in an instant messaging system. Messages are addressed to users ofthe instant messaging system using their screen names. The buddy list for a user ofthe instant messaging system is a list of screen names for people with which the user communicates. The buddy list interface 500 enables the user to expressly designate communication identifiers as known by adding them to his or her buddy list. These identifiers are then added to the list of known people.
The buddy list interface 500 contains a text box 502 that contains the buddy list for a screen name "InternetAnn". The buddy list includes multiple screen names. The buddy list in buddy list interface 500 contains the screen name 504a, "randomcontact2," the screen name 504b, "Boss," the screen name 504c, "Mom," the screen name 504d, "Dad," and the screen name 504e, "Brother."
The buddy list may be separated into one or more buddy groups, and each buddy may belong to one ofthe buddy groups. When an EVI client program for a person appearing in the buddy list is available to receive communications (i.e., a state commonly referred to as "present"), the screen name ofthe buddy in the buddy list is displayed or visually distinguished from other buddies not presently available to receive communications or otherwise not having an equivalent state. In the interface shown, present buddies have their screen names displayed under a buddy group heading for the buddy group to which they belong. The buddy group headings also contain the number of screen names from that buddy group currently logged into the instant messaging system and the total number of people in that buddy group. For example, the buddy group heading 506a says that one out ofthe ten members ofthe buddy group named "Buddies" is logged into the system. That one member is the user with screen name 504a, since that screen name 504a is listed under the buddy group heading 506a. Likewise, buddy group heading 506b says that one out of three members ofthe "Co-Workers" buddy group is logged in, and that member is the user with screen name 504b. Similarly, the users with the screen names 504c, 504d, and 504e are logged into the system and are members ofthe buddy group named "Family," which only has one member currently not logged in, according to buddy group heading 506c. The buddy list interface 500 contains a "Setup" button 508, which, when selected enables the user to add screen names to the displayed buddy list. The screen names added to a user's buddy list using the buddy list interface
500 are considered to be known to the user, and are added to the list of known people.
The address book interface 400 may provide the user with an option for preventing the addition of communication identifier to the list of known people when the identifier is added to the address book. The option may prevent the addition for the identifier currently being added, or when the option is selected, may prevent all entered identifiers from being added to the list of known people.
Exemplary techniques for inferring known people from the actions ofthe user are described in conjunction with FIGS 6-9. Actions ofthe user while reading, sending and managing e-mail can lead to the inference that the people sending and receiving that e- mail are known to the user. In addition, the contacts of those people known to the user may be inferred to be known directly by the user. Inferred people are added to the list of known people after an optional user confirmation. Referring to FIG. 6, use of an e-mail reading interface 600 can lead to the inference of people as known to the user. In using the e-mail reading interface 600, the user may perfomi certain actions while reading a message that signal that the user knows the person who sent the message. Conversely, the user may perform certain actions that signal that the user does not know the person who sent the message. If the sender ofthe e-mail is inferred to be known to the user based on these actions, the person who sent the e-mail is added to the list of known people.
The e-mail reading interface 600 has two major sections, 602 and 604, that show the details ofthe message that is currently being read. Section 602 lists the header information for the message that is currently being read. The header information includes the sender's address 606, the recipient's address 608, the subject 610 ofthe message, and the time 612 the message was received. The message shown was sent to IntemetAnn@aol.com with a subject of "Hi" by kg@somewhere.com at 10:24 AM on 9/4/2003. Section 604 contains the body ofthe message, which in this case is "So, how are you?" To the right and below the contents ofthe displayed message are a series of buttons 614-630 that enable activity based on the displayed message. For example, a "Reply" button 614 invokes an interface for writing a reply to the sender ofthe displayed message. Similarly, a "Forward" button 616 invokes an interface for forwarding the displayed message. A "Reply AU" button 618 has the same function as the "Reply" button 614, except that the reply message is addressed to all recipients ofthe displayed message.
An "Add Address" button 620 adds an entry to the address book for the sender of the displayed message. The entry includes the sender's address 606. A "Report Spam" button 622 sends a message to a service responsible for blocking spam e-mail messages. A "Print" button 624 sends the message to the printer. A "Save" button 626 expands into two options, one for saving the message on a host server, and one for saving the message locally. A "Keep As New" button 628 marks the displayed message as never having been read, and a "Delete" button 630 may immediately delete the message, or it may move the message to a temporary holding place for deleted messages.
The actions ofthe user while interacting with the e-mail reading interface 600 may lead to the inference that the user knows or does not know the sender ofthe messages that he is reading. In cases where the user is believed to know the sender ofthe message, the sender's e-mail address is added to the list of known people. For example, replying to the message by clicking on the "Reply" button 614 may support the inference that the sender is known. In addition, pressing the "Forward" button 616 to forward the message may support an inference that the sender, as well as all people to which the message is forwarded, are known. Similarly, pressing the "Reply AU" button 618 may lead to an inference that the sender and all other recipients are known. Pressing the "Add Address" button 620 to create an entry in the user's address book for the sender ofthe e-mail may lead to the inference that sender is known. On the other hand, clicking on the "Report Spam" button 622 may negate an inference that the sender is known to the user. Clicking the "Print" button 624, using the "Save" button 626, or marking the displayed message as not read with the "Keep As New" button 628 also may support an inference that the sender is known.
Leaving interface 600 open for a predetermined period of time (e.g., 30 seconds) is another action that may support an inference that the sender is know.
A number of techniques maybe used to determine when a sender is inferred as known based on the above described actions. For example, a sender may be inferred as known based simply on the user performing a single one ofthe actions that support an inference that the sender is known. Alternatively, or additionally, combinations of actions may result in the inference that the sender is known. For example, some number of actions greater than one may be required to add the sender to the list of known people. Also, certain fixed combinations of actions may result in the addition ofthe sender to the list of known people. That is, certain combinations may be designated as indicating that the communication identifier is know and, when those combinations occur, the identifier is added to the list of known people. For example, replying to and saving the message may cause the sender to be added to the list of known people, but keeping the message as new and printing it may not. As another example, each ofthe different possible actions may have an associated score indicative of how strongly the action suggests the identifier is known, and a certain aggregate score (a threshold score) may be required to add the sender to the list of known people. That is, the actions may be detected, an aggregate score may be determined from the associated scores, and a comparison to a threshold score may be made to infer whether the person is known to the user and, consequently, is added to the list of known people. An implementation of this technique may assign positive scores to actions supporting an inference, assign negative scores to actions negating an inference, and require a particular positive aggregate score before the identifier is inferred as known. Other methods of combining the actions of the user to infer that the sender is known to the user are possible.
When replying to a message using the "Reply AU" button 618, all recipients ofthe message may not be known, especially when there is a large number of people to whom the original message was carbon copied. Additional actions may be required to show that the people to whom the message was carbon copied are known even though a message is sent to them, which might normally lead to the inference that the people are known. The number of people to whom the original message was carbon copied may influence the number or combinations of actions further needed to add the carbon copied recipients to the list of known people. Referring to FIG. 7, use of an e-mail writing interface 700 can lead to people being added to the list of known people. In using the e-mail writing interface 700, the user may perform certain actions while writing a message that will signal that the user knows the people to whom the message will be sent. If the recipients ofthe e-mail are inferred to be known to the user, they are added to the list of known people. The e-mail writing interface 700 contains multiple text fields 702-708 that can be used to specify the different parts ofthe message to be sent. For example, the user can specify the recipients ofthe message using a text field 702, labeled "Send To," and a text field 704, labeled "Copy To." The user can also specify the subject ofthe message in a "Subject" text field 706. Finally, the user can type the body ofthe message in a body text field 708.
A series of buttons 710 to 716 to the right ofthe text fields 702-708 govern how the message specified by the text fields 702-708 is processed. Clicking on a "Send Now" button 710 immediately processes and sends the message to the specified recipients.
Clicking on a "Send Later" button 712 processes the message for sending to its intended recipients at a later time. An "Address Book" button 714 will invoke an address book interface 400. The address book interface 400 may be used to specify the recipients ofthe message. E-mail addresses from entries in the address book can be used to populate the text fields 702 and 704 that contain the recipients ofthe message. Clicking a "Print" button 716 sends the message to the printer.
The actions ofthe user while using the e-mail writing interface may lead to the inference that the intended recipients ofthe message that is being written are known to the user. The people entered in these text boxes 702 and 704 will be added to the list of known people if the user is inferred to know the people to whom the message will be sent. For example, using either the "Send Now" button or the "Send Later" button to send the message that is being written leads to the inference that the recipients ofthe message listed in text fields 702 and 704 are known. Likewise, printing the message with the "Print" button 716 leads to the inference that the intended recipients are known. In addition, the address book interface 400 that was invoked by the "Address Book" button 714 can be used to manually add entries to the address book, which will result in additions to the list of known people, as was described above.
If the recipients are inferred to be known, then they are added to the list of known people. Individual actions ofthe user while using the e-mail writing interface 700 that lead to the inference that the recipients are known may cause the recipients to be added to the list of known people, or a combination of actions may signal that the recipients should be added to the list of known people, as was described above.
The e-mail reading interface 600 and the e-mail writing interface 700 may also contain a button that enables the user to manually add the people with whom the user is communicating to the list of known people if the people are not added automatically in the manners described above. For example, clicking on the button in the e-mail reading interface 600 would cause the sender ofthe message to be added to the list of known people. Likewise, clicking on the button in the e-mail writing interface 700 would cause the recipient ofthe e-mail to be added to the list of known people.
Referring to FIG. 8, a process 800 may be used to infer people within a certain number of degrees of separation from the user as known to the user. The degree of separation between two entities describes a relationship between those entities. Typically, the characteristics of user contact lists (e.g., address book, buddy list, and/or white list) are evaluated to determine the number of degrees (or hops) that are required to link or relate two users. For example, recipient A may list user B in recipient A's address book, user B may list user C in user B's address book, and user C may list sender D in user C's address book. Here, sender D is linked to recipient A by two degrees of separation (with user B as the first degree and user C as the second degree). Recipient A is related to user C by one degree of separation (user B) and user B is separated from sender D by one degree of separation (user C). Recipient A and user B, users B and C, and user C and sender D are each respectively separated by zero degrees of separation.
A list of contacts is maintained for the user (802). The list of contacts may be any personally maintained list or lists, for example, an address book, a buddy list for instant messaging, and/or a white list. The rest of process 800 will be described using an address book as an example of a list of contacts. The contacts in the user's address book are added to the user's list of known people (804).
Next, the contacts linked to the user (i.e., up to a desired degree of separation) are identified and added to the user's list of known people. To do so, the address books of each contact in the user's address book are accessed (806). These address books are not normally configured for direct accessed by the user. That is, the user does not normally have access to other user's address books such as the address books ofthe contacts in the user's address book (the user's address book is configured for direct access by the user). The other users' address books typically include communication identifiers selected by the other users.
The contacts in the user's contacts' address books (i.e., the contacts separated by one degree) then are added to the list of known people (808). If another degree of separation is desired (810), the degree of separation is incremented (812) such that the address books ofthe contacts that are separated from the user by one degree are accessed (806) and the contacts in those address books are added to the list of known people list (808). When a contact is added to the list of known people list, the contact's degree of separation from the user also may be added. The addition of contacts continues until the desired degree of separation is reached (810). Once the desired degree of separation has been reached, all ofthe contacts within that desired degree of separation from the user have been inferred as known to the user (814).
The desired degrees of separation may be a system parameter or, in some implementations, the user may be provided the user with the ability to set the desired degrees of separation. For example, the user may be provided with an interface that allows the user to decide whether degrees of separation will be used, and, if so, how many degrees should be used. Alternatively, the desired degrees of separation may be both a system parameter and able to be set by the user. For example, the system may include a default degrees of separation, which can be adjusted by the user if he or she so desires. Process 800 may result in the list of known people not being updated when any users related to the intended user update their contact lists. That is, if a user related to the intended user adds a contact to the user's contact list, the new contact may not be reflected in the intended user's list of known people. This situation may not be overly detrimental, particularly in implementations where the list of known people is used as a white list to exempt certain e-mails from spam filtering. However, repeating process 800 on a periodic or aperiodic basis may mitigate this situation. Another manner of mitigating this situation is to use an update system in which changes to contact lists are tracked and lists of known people are updated accordingly in an incremental fashion or by triggering an update or re-initiation of process 800 when an update occurs.
Referring to FIG. 9, using an e-mail managing interface 900 may result in additions to the list of known people. The actions ofthe user while interacting with the e- mail managing interface 900 may lead to the inference that certain people are known to the user. Conversely, the user may perform certain actions that signal that the user does not know certain people. If people are infen-ed as known to the user from these actions, the people are added to the list of known people. Two main components ofthe e-mail managing interface 900 are the folder list 902 and the message list 904. The folder list 902 contains the different folders into which messages can be filed. When a folder is selected from the folder list 902, its contents are listed in the message list 904. In this case, the folder called "New" has been selected from the folder list 902, and its contents are listed in the message list 904. Drop down selection box 906 allows for the filtering ofthe messages shown in the message list 904 based on their sender. In this case, "Everyone" is chosen in the selection box 906, so all messages in the "New" folder are shown in the message list 904. These include a message 908 from kg@somewhere.com, and a message 910 from noone@fr.com, both sent on September 4, 2003. Clicking and dragging a message from the message list 904 to the folder list 902 with the mouse files that message in the folder whose name is under the current position ofthe mouse, thus removing the message from the folder selected in the folder list 902.
A series of buttons below the message list 904 allow the user to work with the messages in the message list 904. For example, a "Read" button 912 will create an e-mail reading interface 600 for the message selected in the message list 904. Clicking on a "Save" button 914 will save the message selected in the message list 904, either to the hard drive ofthe local machine or to a remote server. A "Keep As New" button 916 will mark the selected message as never having been read. Clicking on a "Report Spam" button 918 will send a message to a service responsible for blocking spam messages with regards to the message selected in the message list 904. A "Delete" button 920 either immediately deletes the selected message or temporarily moves the selected message to a holding place for deleted messages.
The user's actions while using folders, messages, and buttons present in the e-mail managing interface 900 may result in the addition of people to the list of known people. Moving a message between the different folders ofthe folder list 902 may lead to the inference that the sender or recipients ofthe message are known. For example, dragging message 908 from the "New" folder to another folder, except for a spam or delete folder, may result in the inference that the sender of message is known to the user. Opening a message with the "Read" button 912 may support an inference that the sender ofthe message is known. Pressing the "Save" button 914 or the "Keep As New" button 916 also may result in the inference that the sender ofthe message is known to the user. On the other hand, use ofthe "Report Spam" button 918 and the "Delete" button 920 may negate an inference that the senders or recipients are known to the user. Similar to what was described above with respect to FIG. 6, individual actions or a combination of actions when using the e-mail managing interface 900 may lead to the inference that people are known to the user. Those people that are inferred to be known to the user are added to the list of known people after an optional confirmation by the user.
FIGS. 10-12 illustrate exemplary uses ofthe list of known people in controlling aspects ofthe user's communication. The list of known people can be used to control aspects ofthe user's communication using, for example, an e-mail or instant messaging client.
Referring to FIG 10, the list of known people can be used to control the e-mail messages displayed on an e-mail managing interface 900. The e-mail managing interface contains a folder list 902 into which messages can be filed. When a folder is selected from the folder list 902, its contents are listed in the message list 904. In this case, the folder called "New" has been selected from the folder list 902, and its contents are listed in the message list 904. Drop down selection box 906 allows for the filtering ofthe messages shown in the message list 904 based on their sender. In this case, the option "People I Know" has been selected from the selection box 906. This causes the displayed messages to be filtered against the list of known people for the user. Messages from people that are in the list of known people are displayed in the message list 904, while messages from senders that are not in the list of known people do not appear in the message list 904.
For example, the message list 904 from FIG. 9, which also displayed the messages in the "New" folder, had two messages: message 908 from kg@somewhere.com and message 910 from noone@fr.com. The e-mail address kg@somewhere.com is in the list of known people for the user, while noone@fr.com is not. When "People I Know" is selected from the selection box 906, message 910 is filtered out from the set of messages shown to the user in the message list 904. The only message that is displayed is message 908 from kg@somewhere.com. Therefore, the list of known senders was used to limit the e-mail messages shown to the user to only those coming from people on the list. Referring to FIG 11 , the list of known people can be used to control the e-mail messages displayed on an e-mail managing interface 900 in the opposite manner as was done with respect to FIG 10. The e-mail managing interface contains a folder list 902 into which messages can be filed. When a folder is selected from the folder list 902, its contents are listed in the message list 904. In this case, the folder called "New" has been selected from the folder list 902, and its contents are listed in the message list 904.
Drop down selection box 906 allows for the filtering ofthe messages shown in the message list 904 based on their sender. In this case, the option "Unknown Senders" has been selected from the selection box 906. This causes the displayed messages to be filtered against the list of known people for the user in the opposite manner as was done with respect to FIG. 10. In other words, messages from people that are not in the list of known people are displayed in the message list 904, while messages from senders that are in the list of known people do not appear in the message list 904.
For example, the message list 904 from FIG. 9, which also showed the messages in the "New" folder, had two messages: message 908 from kg@somewhere.com and message 910 from noone@fr.com. The e-mail address kg@somewhere.com is in the list of known people, while noone@fr.com is not. When "Unknown Senders" is selected from the selection box 906, message 908 is filtered out from the set of messages shown to the user in the message list 904. The only message that is displayed is message 910 from noone@fr.com. Therefore, the list of known senders is used to limit the e-mail messages shown to the user to only those coming from people not on the list.
Referring to FIG. 12, an e-mail control interface 1200 enables further control over a user's e-mail messages based on the list of known people. The e-mail control interface contains a user selection box 1202. The user to which the controls specified in the e-mail control interface 1200 will apply is selected with user selection box 1202. A series of options 1204-1224 provide for different manners of filtering received e-mail.
Options 1204-1212 allow the user to define the senders from whom the selected user will receive e-mail. Option 1204 enables the user to receive e-mail from all senders. Selecting option 1204 will cause the selected user to receive e-mail from anyone, regardless of whether they appear on the list of known people. Option 1206 enables the user to receive e-mail only from America Online (AOL) members. Selecting option 1206 will cause the selected user to receive e-mail messages only from customers ofthe America Online internet service provider, while all other messages are blocked. Option 1208 enables the user to receive e-mail only from known people. Selecting option 1208 causes the selected user's e-mail to be filtered against the list of known people. Messages from people appearing on the list are accepted, while all other messages are blocked. Option 1210 enables the user to block e-mail from all senders. Selecting this option 1210 will cause all ofthe e-mail messages addressed to the selected user to be blocked. Option 1212 enables the user to use a custom sender list to determine what mail is received. The custom sender list contains a white list and a black list. Messages from those people appearing on the white list are shown to the user, while messages from people appearing on the black list are blocked from the user. Options 1204-1212 may be mutually exclusive. Option 1214 enables blocking any e-mail messages containing pictures or files.
Selection of option 1214 causes all messages containing pictures or files to be blocked. Options 1216 and 1218 allow the user to define what happens to blocked messages. Option 1216 enables permanently deleting blocked messages. Selecting option 1216 causes all blocked messages to be deleted immediately, leaving no opportunity for the user to view them. Option 1218 enables delivery of blocked messages to a folder designated for spam. Selecting option 1218 causes blocked messages to be placed in the folder designated for spam. The user has the option of viewing these messages after they have been placed in the spam folder. A third option (not shown) may cause the blocked messages to be maintained in a temporary holding folder. The messages stored in the temporary holding folder may be deleted after a certain amount of time that may be selected by the user. Options 1216, 1218, and the third option are mutually exclusive.
Options 1220-1224 control what mail is received by the user selected in the selection box 1202. Option 1220 enables filtering ofthe incoming e-mail messages with a spam filter. Selecting this option 1220 will cause a user's e-mail messages to be filtered based on whether or not the messages are spam messages or not. The list of known people may be used by the spam filter when determining if a message is a spam message. For example, the spam filter could use the list of known people as a white list when determining which messages to keep. Messages from people on the white list may be accepted, while messages from people that are not on the list are rejected. Alternatively, the white list may be used to exempt communications from people on the white list from spam filtering, while communications from people not on the white list are subjected to spam filtering. As another example, the spam filter could use the list of known people to assign a spam score to incoming messages. Messages from people that are not on the list of known people may receive a higher spam score than those messages from people on the list. Those messages that are deteπnined to be spam are delivered to the user's spam mailbox, and those messages that are not spam are delivered to the user's main mailbox.
Option 1222 enables filtering the incoming e-mail messages based on whether they contain one or more clickable hyperlinks or uniform resource locators (URLs). If this option 1222 is selected, messages with clickable URLs are delivered to the user's spam folder, and those messages that do not are delivered to the user's main mailbox. A second option (not shown) for handling messages with clickable URLs enables delivering messages with URLs directed to inappropriate or parentally controlled content to the user's spam folder and delivering all other messages to the user's main mailbox. Option 1224 enables filtering ofthe user's incoming e-mail messages based on whether they contain any ofthe words contained in a custom word list. If this option 1224 is selected, messages that contain words from the custom word list are delivered to the user's spam folder, and those messages that do not are delivered to the user's main mailbox.
The list of known people may be used in conjunction with the filtering performed by options 1222 and 1224 by exempting messages from known people from these controls. In other words, messages meeting the criteria indicated by options 1222 and 1224, when selected, may be sent to a spam folder, except for when the sender ofthe message is on the known list. For example, a message with a URL may be received.
Normally, when option 1222 is selected, the message with the URL is place in a spam folder. When the message with the URL is from a known person, however, the message is not sent to the spam folder, but rather is delivered as normal.
A save button 1226 and a cancel button 1228 are also present on the e-mail control interface 1200. The save button 1226 saves any changes made to the options 1204-1224 for the user selected in the selection box 1202, while the cancel button 1228 discards any changes that have been made and restores the options to their previous settings.
In addition to the uses ofthe list of known people discussed with respect to FIGS. 10-12, there are other uses related to a user's communications with an instant messaging client. For example, the EVI screen names of known people may be used to restrict instant messages or chat requests to only those people who the user knows. The EVI screen names of known people also may be used to restrict who can view presence information ofthe user to those people the user knows. That is, other users may be restricted from viewing whether the user is online (i.e., logged into the EVI system) unless the other users are people the user knows. Referring again to FIG 5, presence information for "randomcontact2" is shown because "IntemetAnn" is on the list of known people for "randomcontact2." Other people that do not have "IntemetAnn" on their list of known people do not appear in the buddy list interface 500 because "IntemetAnn" is restricted from viewing their presence information.
The list of known people also may be used to restrict displays of online presence information more generally. FIGS. 13, 14 and 15 show additional environments in which online presence infomiation can be restricted using the list of known people.
Referring to FIG. 13, some services, such as America Online, allow users to search for other members. The list of members matching the users search criteria includes indications as to whether a member is online. As shown, an interface 1300 includes a window 1310 that displays search results for a person's search criteria (e.g., members who have John Doe somewhere in their profile). The search results include a list of members matching the search criteria. The results include the screen name, the member name, and the location of each member matching the criteria. An icon 1314 provides online presence information. Icon 1314 is displayed in window 1310 next to members who are currently online.
Referring to FIG. 14, some services such as America Online display online presence information in a user's member profile. A user's member profile may be displayed as the result of selecting a member from search results such as those shown in
FIG. 13, or, for example, the member profile may be invoked by a user when the user comes across a screen name while using a communication service such chat or message boards. Other manners manner of invoking the member profile may be available depending on the service.
When a user invokes another user's member profile, an interface 1400 is provided. The interface includes the screen name 1402 ofthe user whose profile is being shown. Interface 1400 also includes a number of buttons 1404 that allow the invoking user to interact with the user whose profile is being shown. Interface 1400 also has an area 1406 that provides online presence information. In the exemplary profile illustrated, the member is currently online an in the chat room "louisianam4m." Area 1406 indicates that the member is not online when the member is not online.
Referring to FIG. 15, some instant messaging and other online services provide web pages that display online presence information. As shown, a web browser 1500 displays a search page 1502 for ICQ in which a person can search profiles of ICQ users. Profiles 1510 and 1520 are shown as a result of a search using the criteria "John Doe" anywhere in the profile. Icons 1512 and 1522, which are part of profiles 1510 and 1520 respectively, provide online presence information. Icons 1512 and 1522 are shown in one color when the user is online and in a different color when the user is not online.
In any of these environments, the online presence information may be restricted based on the list of known people. The online presence information may be restricted such that only some or all ofthe people known to a user may view the user's online presence information. For instance, icon 1314 may be absent when the person viewing the search results is not a person known to the user whose screen name is "Hotxjock28." Likewise, area 1406 may not provide any online presence information when the person viewing the profile is not known to the user whose screen name is "Hotxjock28." Lastly, icon 1512 or 1522 may indicate the user is not online, or indicate that the online presence infomiation is unavailable, when the person viewing the profile 1510 or 1520 is not known to the user whose profile information is shown.
Further, the online presence information may be restricted or not provided to a potential receiver ofthe online presence information when the potential receiver requests the online presence information through an application such as an instant messaging application, or by virtue of displaying a web page, member profile, or member search result. In some environments that provide online presence information, the information may be provided in response to a request to receive the online presence information. In such environments, when the request is received, a determination as to whether the online presence information is communicated may be based on whether the potential receiver is included in the list of known people. The online presence information may be restricted or not provided to the potential receiver when the potential receiver is not included in the list. In other implementations, the online presence information may be restricted or not provided to a potential receiver ofthe online presence information absent a request for the online presence information. In some environments, online presence information may be broadcast generally to users. Certain users may be excluded from the broadcast of online presence information when those users are not on the list of people known to the user. Another use ofthe list of known people may include filtering out communications with questionable content sent to teens or younger individuals when the communication is from someone unknown to the teen or younger individual. Many times, inappropriate (e.g., pornographic) communications such as e-mail is sent to teens or younger individuals. There may be certain indicia that a communication is inappropriate, or that it may lead to inappropriate content. One such indicia, for instance, is the presence of a Uniform Resource Locator (URL) located in the body of an e-mail. Other indicia may include certain words or phrases, such as vulgar or lewd words, included in the communication. Such indicia may be a stronger indicator that the communication is inappropriate when the e-mail is from someone unknown to the teen or young adult. Some Internet Service Providers (ISPs), e.g. America Online, Inc. (AOL), allow a master account owner to designate associated accounts as teen or child accounts. Indicia of inappropriate communications, along with the list of known people, can be used to filter out potentially inappropriate content sent to a teen or child account.
FIG. 16 is a flow chart showing a process 1600 for filtering communications sent to a teen or child account. A list of people known to the user ofthe teen or child account is maintained for example, using the techniques described above (1605). When a communication sent to the teen or child account is received (1610), the sender ofthe communication is determined (1615). The commumcation may include, for example, an e-mail or an instant message. A determination also is made as to whether the communication contains indicia that the communication is inappropriate for the user ofthe teen or child account (1620). As described above, such indicia may include a URL located in the body ofthe communication and/or certain words being included in the body ofthe communication. When the communication contains such indicia and the sender is not on the list of known people, the communication is filtered (1625). Filtering may include blocking or deleting the communication. Alternatively, or additionally, filtering may include placing the communication in a secured place that the master account owner can access, but the teen or child user can not. For example, the communications may be placed in a secure spam folder. The spam folder may be secured, for example, by preventing the teen or child account user from seeing the folder or by password protecting the folder.
Thus, for example, emails that contain URLs or certain words or phrases and that are sent to a teen or child account by someone not known to the teen or child (i.e., someone not on the list of known people) may be automatically deleted or blocked. Alternatively, such e-mails may be sent to a spam folder. When the spam folder is designed to be locked from teens or younger adults (e.g., by preventing them from seeing the folder or requiring a password to access the folder), this can potentially prevent them from being exposed to inappropriate content. The techniques described above are not limited to any particular hardware or software configuration. Rather, they may be implemented using hardware, software, or a combination of both. The methods and processes described may be implemented as computer programs that are executed on programmable computers comprising at least one processor and at least one data storage system. The programs may be implemented in a high-level programming language and may also be implemented in assembly or other lower level languages, if desired.
Any such program will typically be stored on a computer-usable storage medium or device (e.g., CD-Rom, RAM, or magnetic disk). When read into the processor ofthe computer and executed, the instractions ofthe program cause the programmable computer to carry out the various operations described above.
A number of implementations have been described. Nevertheless, it will be understood that various modifications may be made. Accordingly, implementations other than those specifically described are within the scope ofthe following claims.

Claims

WHAT IS CLAIMED IS:
1. A method comprising: maintaining a list of people associated with a user; inferring that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a second person, wherein the second person is not the user; adding the inferred person to the list of people associated with the user; and using the list to control aspects of communications between the user and others based on whether the others are included on the list.
2. The method of claim 1 wherein the person is included in a contact list ofthe user.
• 3. The method of claim 2 wherein the contact list of the user is a buddy list.
4. The method of claim 1 wherein the communications comprise e-mail communications, the method further comprising inferring that a person is associated with the user based, at least in part, on positive user actions related to e-mail communications from the person.
5. The method of claim 4 wherein the positive actions include sending an e-mail to the person.
6. The method of claim 4 wherein the positive actions include replying to, forwarding, saving, or printing an e-mail received from the person.
7. The method of claim 4 wherein the positive actions include moving an e-mail from a first folder to a second folder.
8. The method of claim 7 wherein the first folder is an inbox folder and the second folder is a folder other than a delete folder or a spam folder.
9. The method of claim 4 wherein the positive action includes maintaining an e-mail from the person in an open state for a predetermined period of time.
10. The method of claim 1 further comprising inferring that a person is associated with the user based, at least in part, on detecting a communication between the user and the person.
11. The method of claim 10 wherein the communication is an instant messaging 5 communication.
12. The method of claim 1 wherein inferring that a person is associated with the user includes detecting user actions that mitigate against factors that otherwise are used to infer a person is associated with the user.
13. The method of claim 12 wherein the user actions comprise the user taking steps to o report a communication from the person as spam.
14. The method of claim 12 wherein the user actions comprise the user taking steps to add a person to a blacklist.
15. The method of claim 12 wherein the user actions comprise the user taking steps to move a communication from the person to at least one of a spam folder or a delete 5 folder.
16. The method of claim 1 wherein people associated with the user are people not distrusted by the user.
17. The method of claim 16 wherein using the list comprises using the list as a white list such that communications received from people on the list are exempt from spam 0 filtering.
18. The method of claim 1 wherein using the list comprises using the list to restrict received communications to those commumcations from people on the list.
19. The method of claim 18 wherein the communications are e-mails.
20. The method of claim 18 wherein the communications are instant messages.
21. The method of claim 1 wherein people associated with the user are people known to the user.
22. The method of claim 21 wherein using the list comprises using the list to filter a display of e-mail such that e-mails from people on the list are shown on the display and e-mails from people not on the list are absent from the display.
23. The method of claim 21 wherein using the list comprises using the list to filter a display of e-mail such that e-mails from people not on the list are shown on the display and e-mails from people on the list are absent from the display.
24. The method of claim 1 wherein using the list comprises using the list to restrict which instant messaging interfaces display an online presence of the user to those instant messaging interfaces associated with people on the list.
25. The method of claim 1 wherein using the list comprises using the list as a white list operating in conjunction with parental controls to filter communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
26. The method of claim 25 wherein filtering communications comprises blocking the communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
27. The method of claim 25 wherein filtering communications comprises placing communications from people not on the list in a spam folder the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
28. The method of claim 27 wherein the spam folder is locked from the teen or child account user.
29. The method of claim 25 wherein the communications are e-mails.
30. The method of claim 1 wherein inferring that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person other than the user comprises inferring that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person who is listed in a contact list ofthe user.
31. The method of claim 1 wherein inferring that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person other than the user comprises inferring that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person who is listed in a buddy list ofthe user.
32. The method of claim 1 wherein inferring that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person other than the user comprises inferring that a person is associated with the user based, at least in part, on the inclusion ofthe person in a contact list of a person who the user has added to a buddy list of the user.
33. A method comprising: maintaining a list of people associated with a user; inferring that a person is associated with the user based, at least in part, on a membership ofthe first person in a contact list that is associated with another person, wherein the contact list is not configured for direct access by the user; adding the inferred person to the list of people associated with the user; and using the list to control aspects of communications between the user and others based on whether the others are included on the list.
34. The method of claim 33 wherein the person is included in a contact list ofthe user.
35. The method of claim 34 wherein the contact list ofthe user is a buddy list.
36. The method of claim 33 wherein the communications comprise e-mail communications, the method further comprising inferring that a person is associated with the user based, at least in part, on positive user actions related to e-mail communications from the person.
37. The method of claim 36 wherein the positive actions include sending an e-mail to the person.
38. The method of claim 36 wherein the positive actions include replying to, forwarding, saving, or printing an e-mail received from the person.
39. The method of claim 36 wherein the positive actions include moving an e-mail from a first folder to a second folder.
40. The method of claim 39 wherein the first folder is an inbox folder and the second folder is a folder other than a delete folder or a spam folder.
41. The method of claim 36 wherein the positive action includes maintaining an e- mail from the person in an open state for a predetermined period of time.
42. The method of claim 33 further comprising inferring that a person is associated with the user based, at least in part, on detecting a communication between the user and the person.
43. The method of claim 42 wherein the communication is an instant messaging communication.
44. The method of claim 33 wherein inferring that a person is associated with the user includes detecting user actions that mitigate against factors that otherwise are used to infer a person is associated with the user.
45. The method of claim 44 wherein the user actions comprise the user taking steps to report a communication from the person as spam.
46. The method of claim 44 wherein the user actions comprise the user taking steps to add a person to a blacklist.
47. The method of claim 44 wherein the user actions comprise the user taking steps to move a communication from the person to at least one of a spam folder or a delete folder.
48. The method of claim 33 wherein people associated with the user are people not distrusted by the user.
49. The method of claim 48 wherein using the list comprises using the list as a white list such that communications received from people on the list are exempt from spam filtering.
50. The method of claim 33 wherein using the list comprises using the list to restrict received communications to those communications from people on the list.
51. The method of claim 50 wherein the communications are e-mails.
52. The method of claim 50 wherein the communications are instant messages.
53. The method of claim 33 wherein people associated with the user are people known to the user.
54. The method of claim 53 wherein using the list comprises using the list to filter a display of e-mail such that e-mails from people on the list are shown on the display and e-mails from people not on the list are absent from the display.
55. The method of claim 53 wherein using the list comprises using the list to filter a display of e-mail such that e-mails from people not on the list are shown on the display and e-mails from people on the list are absent from the display.
56. The method of claim 33 wherein using the list comprises using the list to restrict which instant messaging interfaces display an online presence ofthe user to those instant messaging interfaces associated with people on the list.
57. The method of claim 33 wherein using the list comprises using the list as a white list operating in conjunction with parental controls to filter communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
58. The method of claim 57 wherein filtering communications comprises blocking the communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
59. The method of claim 57 wherein filtering communications comprises placing communications from people not on the list in a spam folder the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
60. The method of claim 59 wherein the spam folder is locked from the teen or child account user.
61. The method of claim 57 wherein the communications are e-mails.
62. The method of claim 33 wherein inferring that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person other than the user comprises inferring that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person who is listed in a contact list ofthe user.
63. The method of claim 33 wherein inferring that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person other than the user comprises inferring that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person who is listed in a buddy list ofthe user.
64. The method of claim 33 wherein inferring that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person other than the user comprises inferring that a person is associated with the user based, at least in part, on the inclusion ofthe person in a contact list of a person who the user has added to a buddy list ofthe user.
65. A method comprising: maintaining a list of people associated with a user; inferring that a person is associated with the user based, at least in part, on the characteristics of one or more contact lists associated with other users, wherein the contact lists associated with the other users include communication identifiers selected by the other users; adding the inferred person to the list of people associated with the user; and using the list to control aspects of communications between the user and others based on whether the others are included on the list.
66. The method of claim 65 wherein the person is included in a contact list of the user.
67. The method of claim 66 wherein the contact list of the user is a buddy list.
68. The method of claim 65 wherein the communications comprise e-mail communications, the method further comprising inferring that a person is associated with the user based, at least in part, on positive user actions related to e-mail communications from the person.
69. The method of claim 68 wherein the positive actions include sending an e-mail to the person.
70. The method of claim 68 wherein the positive actions include replying to, forwarding, saving, or printing an e-mail received from the person.
71. The method of claim 68 wherein the positive actions include moving an e-mail from a first folder to a second folder.
72. The method of claim 71 wherein the first folder is an inbox folder and the second folder is a folder other than a delete folder or a spam folder.
73. The method of claim 68 wherein the positive action includes maintaining an e- mail from the person in an open state for a predetermined period of time.
74. The method of claim 65 further comprising inferring that a person is associated with the user based, at least in part, on detecting a commumcation between the user and the person.
75. The method of claim 74 wherein the communication is an instant messaging communication.
76. The method of claim 65 wherein inferring that a person is associated with the user includes detecting user actions that mitigate against factors that otherwise are used to infer a person is associated with the user.
77. The method of claim 76 wherein the user actions comprise the user taking steps to report a communication from the person as spam.
78. The method of claim 76 wherein the user actions comprise the user taking steps to add a person to a blacklist.
79. The method of claim 76 wherein the user actions comprise the user taking steps to move a communication from the person to at least one of a spam folder or a delete folder.
80. The method of claim 65 wherein people associated with the user are people not distrusted by the user.
81. The method of claim 80 wherein using the list comprises using the list as a white list such that communications received from people on the list are exempt from spam filtering.
82. The method of claim 65 wherein using the list comprises using the list to restrict received communications to those communications from people on the list.
83. The method of claim 82 wherein the communications are e-mails.
84. The method of claim 82 wherein the communications are instant messages.
85. The method of claim 65 wherein people associated with the user are people known to the user.
86. The method of claim 85 wherein using the list comprises using the list to filter a display of e-mail such that e-mails from people on the list are shown on the display and e-mails from people not on the list are absent from the display.
87. The method of claim 85 wherein using the list comprises using the list to filter a display of e-mail such that e-mails from people not on the list are shown on the display and e-mails from people on the list are absent from the display.
88. The method of claim 65 wherein using the list comprises using the list to restrict which instant messaging interfaces display an online presence ofthe user to those instant messaging interfaces associated with people on the list.
89. The method of claim 65 wherein using the list comprises using the list as a white list operating in conjunction with parental controls to filter communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
90. The method of claim 89 wherein filtering communications comprises blocking the communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
91. The method of claim 89 wherein filtering communications comprises placing communications from people not on the list in a spam folder the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
92. The method of claim 91 wherein the spam folder is locked from the teen or child account user.
93. The method of claim 89 wherein the communications are e-mails.
94. The method of claim 65 wherein inferring that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person other than the user comprises inferring that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person who is listed in a contact list ofthe user.
95. The method of claim 65 wherein inferring that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person other than the user comprises inferring that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person who is listed in a buddy list ofthe user.
96. The method of claim 65 wherein inferring that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person other than the user comprises inferring that a person is associated with the user based, at least in part, on the inclusion ofthe person in a contact list of a person who the user has added to a buddy list of the user.
97. A computer usable medium have a computer program embodied thereon, wherein the computer program comprises instructions for causing a computer to perform the following operations: maintain a list of people associated with a user; infer that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a second person, wherein the second person is not the user; add the inferred person to the list of people associated with the user; and use the list to control aspects of communications between the user and others based on whether the others are included on the list.
98. The medium of claim 97 wherein the person is included in a contact list ofthe user.
99. The medium of claim 98 wherein the contact list ofthe user is a buddy list.
100. The medium of claim 97 wherein the communications comprise e-mail communications, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on positive user actions related to e-mail communications from the person.
101. The medium of claim 100 wherein the positive actions include sending an e-mail to the person.
102. The medium of claim 100 wherein the positive actions include replying to, forwarding, saving, or printing an e-mail received from the person.
103. The medium of claim 100 wherein the positive actions include moving an e-mail from a first folder to a second folder.
104. The medium of claim 103 wherein the first folder is an inbox folder and the second folder is a folder other than a delete folder or a spam folder.
105. The medium of claim 100 wherein the positive action includes maintaining an e- mail from the person in an open state for a predetermined period of time.
106. The medium of claim 97 wherein the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on detecting a communication between the user and the person.
107. The medium of claim 106 wherein the communication is an instant messaging communication.
108. The medium of claim 97 wherein, to infer that a person is associated with the user, the computer program further comprises instructions for causing a computer to detect user actions that mitigate against factors that otherwise are used to infer a person is associated with the user.
109. The medium of claim 108 wherein the user actions comprise the user taking steps to report a communication from the person as spam.
110. The medium of claim 108 wherein the user actions comprise the user taking steps to add a person to a blacklist.
111. The medium of claim 108 wherein the user actions comprise the user taking steps to move a communication from the person to at least one of a spam folder or a delete
5 folder.
112. The medium of claim 97 wherein people associated with the user are people not distrusted by the user.
113. The medium of claim 112 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list as a white list such that o communications received from people on the list are exempt from spam filtering.
114. The medium of claim 97 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to restrict received communications to those communications from people on the list.
115. The medium of claim 114 wherein the communications are e-mails.
5 116. The medium of claim 114 wherein the communications are instant messages.
117. The medium of claim 1 wherein people associated with the user are people known to the user.
118. The medium of claim 117 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to filter a display of e- 0 mail such that e-mails from people on the list are shown on the display and e-mails from people not on the list are absent from the display.
119. The medium of claim 117 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to filter a display of e- mail such that e-mails from people not on the list are shown on the display and e- 5 mails from people on the list are absent from the display.
120. The medium of claim 97 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to restrict which instant messaging interfaces display an online presence ofthe user to those instant messaging interfaces associated with people on the list.
121. The medium of claim 97 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list as a white list operating in conjunction with parental controls to filter communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
122. The medium of claim 121 wherein to filter communications, the computer program further comprises instructions for causing a computer to block the communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
123. The medium of claim 121 wherein to filter communications, the computer program further comprises instructions for causing a computer to placing communications from people not on the list in a spam folder the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
124. The medium of claim 123 wherein the spam folder is locked from the teen or child account user.
125. The medium of claim 121 wherein the communications are e-mails.
126. The medium of claim 97 wherein, to infer that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person other than the user, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person who is listed in a contact list ofthe user.
127. The medium of claim 97 wherein, to infer that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person other than the user, the computer program further comprises instractions for causing a computer to infer that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person who is listed in a buddy list of the user.
128. The medium of claim 97 wherein, to infer that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person other than the user, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on the inclusion ofthe person in a contact list of a person who the user has added to a buddy list ofthe user.
129. A computer usable medium have a computer program embodied thereon, wherein the computer program comprises instructions for causing a computer to perform the following operations: maintaining a list of people associated with a user; inferring that a person is associated with the user based, at least in part, on a membership ofthe first person in a contact list that is associated with another person, wherein the contact list is not configured for direct access by the user; adding the inferred person to the list of people associated with the user; and using the list to control aspects of communications between the user and others based on whether the others are included on the list.
130. The medium of claim 129 wherein the person is included in a contact list ofthe user.
131. The medium of claim 130 wherein the contact list of the user is a buddy list.
132. The medium of claim 129 wherein the communications comprise e-mail communications, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on positive user actions related to e-mail communications from the person.
133. The medium of claim 132 wherein the positive actions include sending an e-mail to the person.
134. The medium of claim 132 wherein the positive actions include replying to, forwarding, saving, or printing an e-mail received from the person.
5 135. The medium of claim 132 wherein the positive actions include moving an e-mail from a first folder to a second folder.
136. The medium of claim 135 wherein the first folder is an inbox folder and the second folder is a folder other than a delete folder or a spam folder.
137. The medium of claim 132 wherein the positive action includes maintaining an e- o mail from the person in an open state for a predetermined period of time.
138. The medium of claim 130 wherein the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on detecting a communication between the user and the person.
139. The medium of claim 138 wherein the communication is an instant messaging 5 communication.
140. The medium of claim 129 wherein, to infer that a person is associated with the user, the computer program further comprises instructions for causing a computer to detect user actions that mitigate against factors that otherwise are used to infer a person is associated with the user.
0 141. The medium of claim 140 wherein the user actions comprise the user taking steps to report a communication from the person as spam.
142. The medium of claim 140 wherein the user actions comprise the user taking steps to add a person to a blacklist.
143. The medium of claim 140 wherein the user actions comprise the user taking steps to move a communication from the person to at least one of a spam folder or a delete folder.
144. The medium of claim 129 wherein people associated with the user are people not distrusted by the user.
145. The medium of claim 144 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list as a white list such that communications received from people on the list are exempt from spam filtering.
146. The medium of claim 129 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to restrict received communications to those communications from people on the list.
147. The medium of claim 146 wherein the communications are e-mails.
148. The medium of claim 146 wherein the communications are instant messages.
149. The medium of claim 129 wherein people associated with the user are people known to the user.
150. The medium of claim 149 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to filter a display of e- mail such that e-mails from people on the list are shown on the display and e-mails from people not on the list are absent from the display.
151. The medium of claim 149 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to filter a display of e- mail such that e-mails from people not on the list are shown on the display and e- mails from people on the list are absent from the display.
152. The medium of claim 129 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to restrict which instant messaging interfaces display an online presence ofthe user to those instant messaging interfaces associated with people on the list.
153. The medium of claim 129 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list as a white list operating
5 in conjunction with parental controls to filter commumcations from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
154. The medium of claim 153 wherein to filter communications, the computer program further comprises instructions for causing a computer to block the o communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
155. The medium of claim 153 wherein to filter communications, the computer program further comprises instructions for causing a computer to placing communications from people not on the list in a spam folder the communications 5 include indicia that the content ofthe communication is inappropriate for a teen or child account user.
156. The medium of claim 155 wherein the spam folder is locked from the teen or child account user.
157. The medium of claim 153 wherein the communications are e-mails.
0 158. The medium of claim 129 wherein, to infer that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person other than the user, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person who is listed in a contact list ofthe 5 user.
159. The medium of claim 129 wherein, to infer that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person other than the user, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person who is listed in a buddy list ofthe user.
5 160. The medium of claim 129 wherein, to infer that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person other than the user, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on the inclusion ofthe person in a contact list of a person who the user has added to a o buddy list of the user.
161. A computer usable medium have a computer program embodied thereon, wherein the computer program comprises instructions for causing a computer to perform the following operations: maintaining a list of people associated with a user; 5 inferring that a person is associated with the user based, at least in part, on the characteristics of one or more contact lists associated with other users, wherein the contact lists associated with the other users include communication identifiers selected by the other users; adding the infereed person to the list of people associated with the user; and 0 using the list to control aspects of communications between the user and others based on whether the others are included on the list.
162. The medium of claim 161 wherein the person is included in a contact list ofthe user.
163. The medium of claim 162 wherein the contact list of the user is a buddy list.
5 164. The medium of claim 161 wherein the communications comprise e-mail communications, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on positive user actions related to e-mail communications from the person.
165. The medium of claim 164 wherein the positive actions include sending an e-mail to the person.
166. The medium of claim 164 wherein the positive actions include replying to, forwarding, saving, or printing an e-mail received from the person.
5 167. The medium of claim 164 wherein the positive actions include moving an e-mail from a first folder to a second folder.
168. The medium of claim 167 wherein the first folder is an inbox folder and the second folder is a folder other than a delete folder or a spam folder.
169. The medium of claim 164 wherein the positive action includes maintaining an e- o . mail from the person in an open state for a predetermined period of time.
170. The medium of claim 161 wherein the computer program further comprises instractions for causing a computer to infer that a person is associated with the user based, at least in part, on detecting a communication between the user and the person.
171. The medium of claim 170 wherein the communication is an instant messaging 5 communication.
172. The medium of claim 161 wherein, to infer that a person is associated with the user, the computer program further comprises instructions for causing a computer to detect user actions that mitigate against factors that otherwise are used to infer a person is associated with the user.
0 173. The medium of claim 172 wherein the user actions comprise the user taking steps to report a communication from the person as spam.
174. The medium of claim 172 wherein the user actions comprise the user taking steps to add a person to a blacklist.
175. The medium of claim 172 wherein the user actions comprise the user taking steps to move a communication from the person to at least one of a spam folder or a delete folder.
176. The medium of claim 161 wherein people associated with the user are people not distrusted by the user.
177. The medium of claim 176 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list as a white list such that communications received from people on the list are exempt from spam filtering.
178. The medium of claim 161 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to restrict received communications to those communications from people on the list.
179. The medium of claim 178 wherein the communications are e-mails.
180. The medium of claim 178 wherein the communications are instant messages.
181. The medium of claim 161 wherein people associated with the user are people known to the user.
182. The medium of claim 181 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to filter a display of e- mail such that e-mails from people on the list are shown on the display and e-mails from people not on the list are absent from the display.
183. The medium of claim 181 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to filter a display of e- mail such that e-mails from people not on the list are shown on the display and e- mails from people on the list are absent from the display.
184. The medium of claim 161 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to restrict which instant messaging interfaces display an online presence ofthe user to those instant messaging interfaces associated with people on the list.
185. The medium of claim 161 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list as a white list operating in conjunction with parental controls to filter communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
186. The medium of claim 185 wherein to filter communications, the computer program further comprises instructions for causing a computer to block the communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
187. The medium of claim 185 wherein to filter communications, the computer program further comprises instructions for causing a computer to placing communications from people not on the list in a spam folder the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
188. The medium of claim 187 wherein the spam folder is locked from the teen or child account user.
189. The medium of claim 185 wherein the communications are e-mails.
190. The medium of claim 161 wherein, to infer that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person other than the user, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person who is listed in a contact list ofthe user.
191. The medium of claim 161 wherein, to infer that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person other than the user, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person who is listed in a buddy list ofthe user.
192. The medium of claim 161 wherein, to infer that a person is associated with the user based, at least in part, on inclusion ofthe person in a contact list of a person other than the user, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on the inclusion ofthe person in a contact list of a person who the user has added to a buddy list of the user.
193. A method comprising: maintaining a list of people associated with a user; inferring that a person is associated with the user based, at least in part, on a combination of two or more user actions, each of which separately support an inference that the person is associated with the user; adding the inferred person to the list; and using the list to control aspects of communications between the user and others based on whether the others are included on the list.
194. The method of claim 193 wherein inferring comprises detecting positive user actions related to e-mail communications from the person as at least one ofthe two or more actions.
195. The method of claim 194 wherein the positive actions include sending an e-mail to the person.
196. The method of claim 194 wherein the positive actions include replying to, forwarding, saving, or printing an e-mail received from the person.
197. The method of claim 194 wherein the positive actions include moving an e-mail from a first folder to a second folder.
198. The method of claim 197 wherein the first folder is an inbox folder and the second folder is a folder other than a delete folder or a spam folder.
199. The method of claim 194 wherein the positive action includes maintaining an e- mail from the person in an open state for a predetermined period of time.
200. The method of claim 193 wherein inferring comprises detecting a communication between the user and the person as at least one ofthe two or more actions.
201. The method of claim 200 wherein the communication is an instant messaging communication.
202. The method of claim 193 further comprising inferring that a person is associated with the user based, at least in part, on indicia other than actions performed by the user, wherein inferring based on indicia other than actions performed by the user comprises: accessing a contact list ofthe user to determine a first contact on the user's contact list; and accessing a contact list ofthe first contact to determine a second contact on the first contact's contact list.
203. The method of claim 193 wherein inferring comprises detecting user actions that mitigate against factors that otherwise are used to infer a person is associated with the user.
204. The method of claim 203 wherein the user actions comprise the user taking steps to report a communication from the person as spam.
205. The method of claim 203 wherein the user actions comprise the user taking steps to add a person to a blacklist.
206. The method of claim 203 wherein the user actions comprise the user taking steps to move a communication from the person to at least one of a spam folder or a delete folder.
207. The method of claim 193 wherein people associated with the user are people not distrusted by the user.
208. The method of claim 207 wherein using the list comprises using the list as a white list such that communications received from people on the list are exempt from spam filtering.
209. The method of claim 193 wherein using the list comprises using the list to restrict received communications to those communications from people on the list.
210. The method of claim 209 wherein the communications are e-mails.
211. The method of claim 209 wherein the communications are instant messages .
212. The method of claim 193 wherein people associated with the user are people known to the user.
213. The method of claim 212 wherein using the list comprises using the list to filter a display of e-mail such that e-mails from people on the list are shown on the display and e-mails from people not on the list are absent from the display.
214. The method of claim 212 wherein using the list comprises using the list to filter a display of e-mail such that e-mails from people not on the list are shown on the display and e-mails from people on the list are absent from the display.
215. The method of claim 193 wherein using the list comprises using the list to restrict which instant messaging interfaces display an online presence ofthe user to those instant messaging interfaces associated with people on the list.
216. The method of claim 193 wherein using the list comprises using the list as a white list operating in conjunction with parental controls to filter communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
217. The method of claim 216 wherein filtering communications comprises blocking the communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
218. The method of claim 216 wherein filtering communications comprises placing communications from people not on the list in a spam folder the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
219. The method of claim 218 wherein the spam folder is locked from the teen or child account user.
220. The method of claim 216 wherein the communications are e-mails.
221. The method of claim 193 wherein each ofthe two or more actions has an associated score and wherein inferring comprises: detecting the two or more actions; determining an aggregate score from the scores associated with the two or more actions; and comparing the aggregate score to a threshold score to infer whether the person is known to the user.
222. The method of claim 221 wherein the scores associated with the two or more actions include positive scores for actions that support an inference that the person is known to the user and negative scores for actions that negate an inference that the person is known to the user.
223. The method of claim 193 wherein inferring comprises: detecting the two or more actions; determining whether the two or more actions are a combination of actions that is designated as indicating that the person is known to the user.
224. A computer usable medium have a computer program embodied thereon, wherein the computer program comprises instructions for causing a computer to perform the following operations: maintain a list of people associated with a user; 5 infer that a person is associated with the user based, at least in part, on a combination of two or more user actions, each of which separately support an inference that the person is associated with the user; add the inferred person to the list; and use the list to control aspects of communications between the user and others o based on whether the others are included on the list.
225. The medium of claim 224 wherein, to infer, the computer program further comprises instructions for causing a computer to detect positive user actions related to e-mail communications from the person as at least one ofthe two or more actions.
226. The medium of claim 225 wherein the positive actions include sending an e-mail 5 to the person.
227. The medium of claim 225 wherein the positive actions include replying to, forwarding, saving, or printing an e-mail received from the person.
228. The medium of claim 225 wherein the positive actions include moving an e-mail from a first folder to a second folder.
0 229. The medium of claim 228 wherein the first folder is an inbox folder and the second folder is a folder other than a delete folder or a spam folder.
230. The medium of claim 225 wherein the positive action includes maintaining an e- mail from the person in an open state for a predetermined period of time.
231. The medium of claim 224 wherein, to infer, the computer program further 5 comprises instructions for causing a computer to detect a communication between the user and the person as at least one ofthe two or more actions.
232. The medium of claim 231 wherein the communication is an instant messaging communication.
233. The medium of claim 224 wherein the computer program further comprises instructions for causing a computer to infer that a person is associated with the user
5 based, at least in part, on indicia other than actions performed by the user, wherein inferring based on indicia other than actions performed by the user comprises: accessing a contact list ofthe user to determine a first contact on the user's contact list; and accessing a contact list ofthe first contact to determine a second contact on the o first contact's contact list.
234. The medium of claim 224 wherein, to infer, the computer program further comprises instructions for causing a computer to detect user actions that mitigate against factors that otherwise are used to infer a person is associated with the user.
235. The medium of claim 234 wherein the user actions comprise the user taking steps 5 to report a communication from the person as spam.
236. The medium of claim 234 wherein the user actions comprise the user taking steps to add a person to a blacklist.
237. The medium of claim 234 wherein the user actions comprise the user taking steps to move a communication from the person to at least one of a spam folder or a delete 0 folder.
238. The medium of claim 224 wherein people associated with the user are people not distrusted by the user.
239. The medium of claim 238 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list as a white list such that 5 communications received from people on the list are exempt from spam filtering.
240. The medium of claim 224 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to restrict received communications to those commumcations from people on the list.
241. The medium of claim 240 wherein the communications are e-mails.
242. The medium of claim 240 wherein the communications are instant messages.
243. The medium of claim 224 wherein people associated with the user are people known to the user.
244. The medium of claim 243 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to filter a display of e- mail such that e-mails from people on the list are shown on the display and e-mails from people not on the list are absent from the display.
245. The medium of claim 243 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to filter a display of e- mail such that e-mails from people not on the list are shown on the display and e- mails from people on the list are absent from the display.
246. The medium of claim 224 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to restrict which instant messaging interfaces display an online presence ofthe user to those instant messaging interfaces associated with people on the list.
247. The medium of claim 224 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list as a white list operating in conjunction with parental controls to filter communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
248. The medium of claim 247 wherein, to filter communications, the computer program further comprises instructions for causing a computer to block the communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
249. The medium of claim 247 wherein, to filter communications, the computer program further comprises instructions for causing a computer to place commumcations from people not on the list in a spam folder the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
250. The medium of claim 249 wherein the spam folder is locked from the teen or child account user.
251. The medium of claim 247 wherein the communications are e-mails.
252. The medium of claim 224 wherein each ofthe two or more actions has an associated score and wherein, to infer, the computer program further comprises instructions for causing a computer to: detect the two or more actions; determine an aggregate score from the scores associated with the two or more actions; and compare the aggregate score to a threshold score to infer whether the person is known to the user.
253. The medium of claim 252 wherein the scores associated with the two or more actions include positive scores for actions that support an inference that the person is known to the user and negative scores for actions that negate an inference that the person is known to the user.
254. The medium of claim 224 wherein, to infer, the computer program further comprises instructions for causing a computer to: detect the two or more actions; determine whether the two or more actions are a combination of actions that is designated as indicating that the person is known to the user.
255. An apparatus comprising: means for maintaining a list of people associated with a user; means for inferring that a person is associated with the user based, at least in part, on a combination of two or more user actions, each of which separately support an inference that the person is associated with the user; means for adding the inferred person to the list; and means for using the list to control aspects of communications between the user and others based on whether the others are included on the list.
256. A method comprising: maintaining a list of people known to a user; inferring that a person is associated with the user based, at least in part, on interactions between the user and a received message; adding the inferred person to the list; and using the list to control aspects of communications between the user and others based on whether the others are included on the list.
257. The method of claim 256 wherein the received message is an e-mail message received from the person.
258. The method of claim 257 wherein the interactions include replying to, forwarding, saving, or printing the e-mail message received from the person.
259. The method of claim 257 wherein the interactions include moving the e-mail from a first folder to a second folder.
260. The method of claim 259 wherein the first folder is an inbox folder and the second folder is a folder other than a delete folder or a spam folder.
261. The method of claim 257 wherein the interactions include maintaining the e-mail received from the person in an open state for a predetermined period of time.
262. The method of claim 256 further comprising inferring that a person is associated with the user based, at least in part, on the user sending a message to the person.
263. The method of claim 256 wherein the received message is an instant message.
264. The method of claim 256 further comprising inferring that a person is associated with the user based, at least in part, on indicia other than actions performed by the user, wherein inferring based on indicia other than actions performed by the user
5 comprises: accessing a contact list ofthe user to determine a first contact on the user's contact list; and accessing a contact list ofthe first contact to determine a second contact on the first contact's contact list.
o
265. The method of claim 256 further comprising inferring that a person is associated with the user based, at least in part, on detecting user actions that mitigate against factors that otherwise are used to infer a person is associated with the user.
266. The method of claim 265 wherein the user actions comprise the user taking steps to report a communication from the person as spam.
5 267. The method of claim 265 wherein the user actions comprise the user taking steps to add a person to a blacklist.
268. The method of claim 265 wherein the user actions comprise the user taking steps to move a communication from the person to at least one of a spam folder or a delete folder.
0 269. The method of claim 256 wherein people associated with the user are people not distrusted by the user.
270. The method of claim 269 wherein using the list comprises using the list as a white list such that communications received from people on the list are exempt from spam filtering.
5 271. The method of claim 256 wherein using the list comprises using the list to restrict received communications to those communications from people on the list.
272. The method of claim 271 wherein the communications are e-mails.
273. The method of claim 271 wherein the communications are instant messages.
274. The method of claim 256 wherein people associated with the user are people known to the user.
275. The method of claim 274 wherein using the list comprises using the list to filter a display of e-mail such that e-mails from people on the list are shown on the display and e-mails from people not on the list are absent from the display.
276. The method of claim 274 wherein using the list comprises using the list to filter a display of e-mail such that e-mails from people not on the list are shown on the display and e-mails from people on the list are absent from the display.
277. The method of claim 256 wherein using the list comprises using the list to restrict which instant messaging interfaces display an online presence ofthe user to those instant messaging interfaces associated with people on the list.
278. The method of claim 256 wherein using the list comprises using the list as a white list operating in conjunction with parental controls to filter communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
279. The method of claim 278 wherein filtering communications comprises blocking the communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
280. The method of claim 278 wherein filtering communications comprises placing communications from people not on the list in a spam folder the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
281. The method of claim 280 wherein the spam folder is locked from the teen or child account user.
282. The method of claim 278 wherein the communications are e-mails.
283. A computer usable medium having a computer program embodied thereon, wherein the computer program comprises instructions for causing a computer to perform the following operations: maintain a list of people known to a user; infer that a person is associated with the user based, at least in part, on interactions between the user and a received message; add the infened person to the list; and use the list to control aspects of communications between the user and others based on whether the others are included on the list.
284. The medium of claim 283 wherein the received message is an e-mail message received from the person.
285. The medium of claim 284 wherein the interactions include replying to, forwarding, saving, or printing the e-mail message received from the person.
286. The medium of claim 284 wherein the interactions include moving the e-mail from a first folder to a second folder.
287. The medium of claim 286 wherein the first folder is an inbox folder and the second folder is a folder other than a delete folder or a spam folder.
288. The medium of claim 286 wherein the interactions include maintaining the e-mail received from the person in an open state for a predetermined period of time.
289. The medium of claim 283 wherein the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on the user sending a message to the person.
290. The medium of claim 283 wherein the received message is an instant message.
291. The medium of claim 283 wherein the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on indicia other than actions performed by the user, wherein, to infer based on indicia other than actions performed by the user, the computer program 5 further comprises instractions for causing a computer to: access a contact list ofthe user to determine a first contact on the user's contact list; and access a contact list ofthe first contact to determine a second contact on the first contact's contact list.
o 292. The medium of claim 283 wherein the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on detecting user actions that mitigate against factors that otherwise are used to infer a person is associated with the user.
293. The medium of claim 292 wherein the user actions comprise the user taking steps 5 to report a communication from the person as spam.
294. The medium of claim 292 wherein the user actions comprise the user taking steps to add a person to a blacklist.
295. The medium of claim 292 wherein the user actions comprise the user taking steps to move a communication from the person to at least one of a spam folder or a delete 0 folder.
296. The medium of claim 283 wherein people associated with the user are people not distrusted by the user.
297. The medium of claim 296 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list as a white list such that 5 commumcations received from people on the list are exempt from spam filtering.
298. The medium of claim 283 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to restrict received communications to those communications from people on the list.
299. The medium of claim 298 wherein the communications are e-mails.
300. The medium of claim 298 wherein the communications are instant messages.
301. The medium of claim 283 wherein people associated with the user are people known to the user.
302. The medium of claim 301 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to filter a display of e- mail such that e-mails from people on the list are shown on the display and e-mails from people not on the list are absent from the display.
303. The medium of claim 302 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to filter a display of e- mail such that e-mails from people not on the list are shown on the display and e- mails from people on the list are absent from the display.
304. The medium of claim 283 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to restrict which instant messaging interfaces display an online presence ofthe user to those instant messaging interfaces associated with people on the list.
305. The medium of claim 283 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list as a white list operating in conjunction with parental controls to filter communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
306. The medium of claim 305 wherein, to filter communications, the computer program further comprises instructions for causing a computer to block the communications from people not on the list when the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
307. The medium of claim 305 wherein, to filter communications, the computer program further comprises instructions for causing a computer to place communications from people not on the list in a spam folder the communications include indicia that the content ofthe communication is inappropriate for a teen or child account user.
308. The medium of claim 307 wherein the spam folder is locked from the teen or child account user.
309. The medium of claim 305 wherein the communications are e-mails.
310. An apparatus comprising: means for maintaining a list of people known to a user; means for inferring that a person is associated with the user based, at least in part, on interactions between the user and a received message; means for adding the inferred person to the list; and means for using the list to control aspects of communications between the user and others based on whether the others are included on the list.
311. A method of providing online presence information: accessing a list of people inferred as known to a user; accessing online presence information for the user; determining a potential receiver ofthe online presence information; comparing the potential receiver to the accessed list to determine if the potential receiver is included on the list; and determining whether to communicate the online presence information to the potential receiver based on whether the potential receiver is included in the list.
312. The method of claim 311 wherein determining whether to communicate the online presence information to the potential receiver comprises determining to not communicate the online presence information to the potential receiver when the potential receiver is not included in the list.
313. The method of claim 311 wherein determining whether to communicate the online presence information to the potential receiver comprises determining whether to communicate the online presence information to an instant messaging application of the potential receiver.
314. The method of claim 311 wherein determining whether to communicate the online presence information to the potential receiver comprises determining whether to display the online presence information on a web page.
315. The method of claim 311 wherein determining whether to communicate the online presence information to the potential receiver comprises determining whether to display the online presence information in member search results.
316. The method of claim 311 wherein detem ining whether to communicate the online presence infomiation to the potential receiver comprises determining whether to display the online presence information in a member profile.
317. The method of claim 311 wherein determining whether to communicate the online presence information to the potential receiver comprises determining whether to communicate the online presence information to the potential receiver when a request for online presence information is received from the potential receiver.
318. The method of claim 311 wherein determining whether to communicate the online presence infomiation to the potential receiver comprises determining whether to communicate the online presence infomiation to the potential receiver absent a request from the potential receiver for the online presence information.
319. The method of claim 311 further comprising: inferring that a person is known to the user based on positive user actions related to e-mail communications from the person; adding the inferred person to the list.
320. The method of claim 320 wherein the positive actions include sending an e-mail to the person.
321. The method of claim 320 wherein the positive actions include replying to, forwarding, saving, or printing an e-mail received from the person.
322. The method of claim 320 wherein the positive actions include moving an e-mail from a first folder to a second folder.
323. The method of claim 322 wherein the first folder is an inbox folder and the second folder is a folder other than a delete folder or a spam folder.
324. The method of claim 320 wherein the positive action includes leaving an e-mail from the person open for a predetermined period of time.
325. The method of claim 311 further comprising: inferring that a person is known to the user based, at least in part, on detecting a communication between the user and the person; adding the inferred person to the list.
326. The method of claim 325 wherein the communication is an instant messaging communication.
327. The method of claim 311 further comprising inferring that a person is known to the user, wherein inferring comprises: accessing a contact list ofthe user to determine a first contact on the user's contact list; and accessing a contact list ofthe first contact to determine a second contact on the first contact's contact list.
328. The method of claim 311 further comprising inferring that a person is known to the user based, at least in part, on detecting user actions that mitigate against factors that otherwise are used to infer a person is known to the user.
329. The method of claim 328 wherein the user actions comprise the user taking steps to report a communication from the person as spam.
330. The method of claim 328 wherein the user actions comprise the user taking steps to add a person to a blacklist.
331. The method of claim 328 wherein the user actions comprise the user taking steps to move a communication from the person to either of a spam folder or a delete folder.
332. The method of claim 311 further comprising: enabling the user to expressly designate a person as known to the user; and adding the designated person to the list.
333. The method of claim 311 further comprising: inferring that a person is known to the user; and adding the inferred person to the list.
334. The method of claim 333 further comprising: determining that a person is known to the user by accessing a contact list ofthe user; adding the determined person to the list.
335. A computer-usable medium having a computer program embodied thereon for providing online presence information, the computer program comprising instructions for causing a computer to perform the following operations: access a list of people inferred as known to a user; access online presence information for the user; determine a potential receiver ofthe online presence information; compare the potential receiver to the accessed list to determine if the potential receiver is included on the list; and determine whether to communicate the online presence information to the potential receiver based on whether the potential receiver is included in the list.
336. The medium of claim 335 wherein, to determine whether to communicate the online presence information to the potential receiver, the computer program further comprises instructions for causing the computer to determine to not communicate the online presence information to the potential receiver when the potential receiver is not included in the list.
337. The medium of claim 335 wherein, to determine whether to communicate the online presence information to the potential receiver, the computer program further comprises instructions for causing the computer to determine whether to communicate the online presence information to an instant messaging application ofthe potential receiver.
338. The medium of claim 335 wherein, to determine whether to communicate the online presence information to the potential receiver, the computer program further comprises instructions for causing the computer to determine whether to display the online presence information on a web page.
339. The medium of claim 335 wherein, to determine whether to communicate the online presence information to the potential receiver, the computer program further comprises instructions for causing the computer to determine whether to display the online presence information in member search results.
340. The medium of claim 335 wherein, to determine whether to communicate the online presence information to the potential receiver, the computer program further comprises instructions for causing the computer to determine whether to display the online presence information in a member profile.
341. The medium of claim 335 wherein, to determine whether to communicate the online presence information to the potential receiver, the computer program further comprises instructions for causing the computer to determine whether to communicate the online presence information to the potential receiver when a request for online presence information is received from the potential receiver.
342. The medium of claim 335 wherein, to determine whether to communicate the online presence information to the potential receiver, the computer program further comprises instructions for causing the computer to determine whether to communicate the online presence information to the potential receiver absent a request from the potential receiver for the online presence information.
343. The medium of claim 335 wherein the computer program further comprises instructions for causing the computer to: infer that a person is known to the user based on positive user actions related to e- mail communications from the person; add the inferred person to the list.
344. The medium of claim 343 wherein the positive actions include sending an e-mail to the person.
345. The medium of claim 343 wherein the positive actions include replying to, forwarding, saving, or printing an e-mail received from the person.
346. The medium of claim 343 wherein the positive actions include moving an e-mail from a first folder to a second folder.
347. The medium of claim 346 wherein the first folder is an inbox folder and the second folder is a folder other than a delete folder or a spam folder.
348. The medium of claim 343 wherein the positive action includes leaving an e-mail from the person open for a predetermined period of time.
349. The medium of claim 335 wherein the computer program further comprises instractions for causing the computer to: inferring that a person is known to the user based, at least in part, on detecting a communication between the user and the person; adding the inferred person to the list.
350. The medium of claim 349 wherein the communication is an instant messaging communication.
351. The medium of claim 335 wherein the computer program further comprises instructions for causing the computer to infer that a person is known to the user and wherein, to infer that a person is known to the user the computer program further comprises instractions for causing the computer to: access a contact list ofthe user to determine a first contact on the user's contact list; and access a contact list ofthe first contact to determine a second contact on the first contact's contact list.
352. The medium of claim 335 wherein the computer program further comprises instructions for causing the computer to infer that a person is known to the user based, at least in part, on detecting user actions that mitigate against factors that otherwise are used to infer a person is known to the user.
353. The medium of claim 352 wherein the user actions comprise the user taking steps to report a communication from the person as spam.
354. The medium of claim 352 wherein the user actions comprise the user taking steps to add a person to a blacklist.
355. The medium of claim 352 wherein the user actions comprise the user taking steps to move a communication from the person to either of a spam folder or a delete folder.
356. The medium of claim 335 wherein the computer program further comprises instructions for causing the computer to: enable the user to expressly designate a person as known to the user; and add the designated person to the list.
357. The medium of claim 335 wherein the computer program further comprises instructions for causing the computer to: infer that a person is known to the user; and add the inferred person to the list.
358. The medium of claim 357 wherein the computer program further comprises instructions for causing the computer to: determine that a person is known to the user by accessing a contact list ofthe user; add the determined person to the list.
359. An apparatus for providing online presence information: means for accessing a list of people inferred as known to a user; means for accessing online presence information for the user; means for determining a potential receiver ofthe online presence information; means for comparing the potential receiver to the maintained list to determine if the potential receiver is included on the list; and means for determining whether to communicate the online presence information to the potential receiver based on whether the potential receiver is included in the list.
PCT/US2004/009422 2003-03-26 2004-03-26 Identifying and using indentities of communication partners deemed to be known to a user WO2004088943A2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2006509384A JP2006524866A (en) 2003-03-26 2004-03-26 Identification of the communication partner considered to be known to the user, and specific use
CA002520419A CA2520419A1 (en) 2003-03-26 2004-03-26 Identifying and using identities of communication partners deemed to be known to a user
EP04758463A EP1616419A2 (en) 2003-03-26 2004-03-26 Identifying and using indentities deemed to be known to a user

Applications Claiming Priority (12)

Application Number Priority Date Filing Date Title
US45732003P 2003-03-26 2003-03-26
US60/457,320 2003-03-26
US48837603P 2003-07-21 2003-07-21
US60/488,376 2003-07-21
US10/747,682 2003-12-30
US10/747,676 2003-12-30
US10/747,263 US7603417B2 (en) 2003-03-26 2003-12-30 Identifying and using identities deemed to be known to a user
US10/747,682 US8117265B2 (en) 2003-03-26 2003-12-30 Identifying and using identities deemed to be known to a user
US10/747,263 2003-12-30
US10/747,651 US20040210639A1 (en) 2003-03-26 2003-12-30 Identifying and using identities deemed to be known to a user
US10/747,676 US20040205127A1 (en) 2003-03-26 2003-12-30 Identifying and using identities deemed to be known to a user
US10/747,651 2003-12-30

Publications (2)

Publication Number Publication Date
WO2004088943A2 true WO2004088943A2 (en) 2004-10-14
WO2004088943A3 WO2004088943A3 (en) 2005-03-17

Family

ID=33136351

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2004/009422 WO2004088943A2 (en) 2003-03-26 2004-03-26 Identifying and using indentities of communication partners deemed to be known to a user

Country Status (5)

Country Link
EP (1) EP1616419A2 (en)
JP (1) JP2006524866A (en)
KR (1) KR20050121222A (en)
CA (1) CA2520419A1 (en)
WO (1) WO2004088943A2 (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1591939A2 (en) * 2004-04-28 2005-11-02 Microsoft Corporation Social Network Email Filtering
WO2007100737A1 (en) * 2006-02-28 2007-09-07 Lucent Technologies Inc. Instant messaging control
WO2007109691A2 (en) 2006-03-20 2007-09-27 Google Inc. Synchronous message management system
EP1873669A1 (en) 2006-10-26 2008-01-02 Philip Behrens Method, system and device for controlling and/or limiting electronic communication
JP2008021308A (en) * 2006-07-10 2008-01-31 Internatl Business Mach Corp <Ibm> Method and apparatus to organize file based on download location
CN100424693C (en) * 2005-08-08 2008-10-08 腾讯科技(深圳)有限公司 Identification method of user identifier
WO2009021567A1 (en) * 2007-08-13 2009-02-19 Mikhail Kolobov Method and apparatus for a safe communication between two or more computers
JP2009514321A (en) * 2005-10-26 2009-04-02 サムスン エレクトロニクス カンパニー リミテッド System and method for sending connection list entries with presence subscriptions
EP2264958A1 (en) * 2009-06-15 2010-12-22 Research In Motion Limited A method, devices and system having out of office based presence
US7984105B2 (en) 2009-06-15 2011-07-19 Research In Motion Limited Method, devices and system having out of office based presence
US9047364B2 (en) 2002-11-18 2015-06-02 Facebook, Inc. Intelligent client capability-based results related to a character stream
US9070118B2 (en) 2003-09-05 2015-06-30 Facebook, Inc. Methods for capturing electronic messages based on capture rules relating to user actions regarding received electronic messages
US9621376B2 (en) 2002-11-18 2017-04-11 Facebook, Inc. Dynamic location of a subordinate user
US9647872B2 (en) 2002-11-18 2017-05-09 Facebook, Inc. Dynamic identification of other users to an online user
US9667585B2 (en) 2002-11-18 2017-05-30 Facebook, Inc. Central people lists accessible by multiple applications
US9729489B2 (en) 2002-11-18 2017-08-08 Facebook, Inc. Systems and methods for notification management and delivery
US9736255B2 (en) 2003-03-26 2017-08-15 Facebook, Inc. Methods of providing access to messages based on degrees of separation
US9736209B2 (en) 2000-03-17 2017-08-15 Facebook, Inc. State change alerts mechanism
US9894018B2 (en) 2002-11-18 2018-02-13 Facebook, Inc. Electronic messaging using reply telephone numbers
WO2018071236A1 (en) * 2016-10-11 2018-04-19 Microsoft Technology Licensing, Llc Controlling permissions in a communication system
US10089363B2 (en) 2015-10-15 2018-10-02 At&T Intellectual Property I, L.P. Method and apparatus for identifying users who know each other
US10187334B2 (en) 2003-11-26 2019-01-22 Facebook, Inc. User-defined electronic message preferences

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7624172B1 (en) 2000-03-17 2009-11-24 Aol Llc State change alerts mechanism
US8965964B1 (en) 2002-11-18 2015-02-24 Facebook, Inc. Managing forwarded electronic messages
US7809797B2 (en) * 2007-04-06 2010-10-05 Symantec Corporation Parental control using social metrics system and method
JP2009140419A (en) * 2007-12-10 2009-06-25 Toshiba Corp Communications equipment
KR101043003B1 (en) * 2009-08-25 2011-06-21 (주)이월리서치 Zombie PC IP extraction method using a pattern for contents interception
KR101266141B1 (en) 2011-10-11 2013-05-21 (주)카카오 Instant messaging service providing method and system
JP5968352B2 (en) * 2014-03-27 2016-08-10 Kddi株式会社 Electronic device, display method and program
KR102414436B1 (en) * 2015-06-16 2022-06-29 삼성전자주식회사 Method for controlling notification and electronic device thereof

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10048653A1 (en) * 2000-09-26 2002-04-18 Mannesmann Ag Digital directory for use in a communication system
US20020083136A1 (en) * 2000-12-22 2002-06-27 Whitten William B. Method of authorizing receipt of instant messages by a recipient user
US20030009698A1 (en) * 2001-05-30 2003-01-09 Cascadezone, Inc. Spam avenger
US20030023692A1 (en) * 2001-07-27 2003-01-30 Fujitsu Limited Electronic message delivery system, electronic message delivery managment server, and recording medium in which electronic message delivery management program is recorded
US20030037112A1 (en) * 2001-08-20 2003-02-20 International Business Machines Corporation Method and system for providing contact management to chat session participants
US20030045272A1 (en) * 2001-09-06 2003-03-06 Jeremy Burr Controlling communications between devices within a mobile and ad hoc network
US20030078981A1 (en) * 2001-10-24 2003-04-24 Infowave Software, Inc. System for and method of populating a contact list on a portable device
US20030083046A1 (en) * 2001-10-29 2003-05-01 Mathis James Earl Multicast distribution of presence information for an instant messaging system
US20040059781A1 (en) * 2002-09-19 2004-03-25 Nortel Networks Limited Dynamic presence indicators

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10048653A1 (en) * 2000-09-26 2002-04-18 Mannesmann Ag Digital directory for use in a communication system
US20020083136A1 (en) * 2000-12-22 2002-06-27 Whitten William B. Method of authorizing receipt of instant messages by a recipient user
US20030009698A1 (en) * 2001-05-30 2003-01-09 Cascadezone, Inc. Spam avenger
US20030023692A1 (en) * 2001-07-27 2003-01-30 Fujitsu Limited Electronic message delivery system, electronic message delivery managment server, and recording medium in which electronic message delivery management program is recorded
US20030037112A1 (en) * 2001-08-20 2003-02-20 International Business Machines Corporation Method and system for providing contact management to chat session participants
US20030045272A1 (en) * 2001-09-06 2003-03-06 Jeremy Burr Controlling communications between devices within a mobile and ad hoc network
US20030078981A1 (en) * 2001-10-24 2003-04-24 Infowave Software, Inc. System for and method of populating a contact list on a portable device
US20030083046A1 (en) * 2001-10-29 2003-05-01 Mathis James Earl Multicast distribution of presence information for an instant messaging system
US20040059781A1 (en) * 2002-09-19 2004-03-25 Nortel Networks Limited Dynamic presence indicators

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
[Online] 1 February 2003 (2003-02-01), pages 1-2, XP002297111 Webpage of SLIPSTICK SYSTEMS: To add addresses automatically to Microsoft Outlook Contacts Retrieved from the Internet: URL:http://web.archive.org/web/20030201082058/http://www.slipstick.com/contacts/addauto.htm> [retrieved on 2004-09-17] *

Cited By (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9736209B2 (en) 2000-03-17 2017-08-15 Facebook, Inc. State change alerts mechanism
US9774560B2 (en) 2002-11-18 2017-09-26 Facebook, Inc. People lists
US9053175B2 (en) 2002-11-18 2015-06-09 Facebook, Inc. Intelligent results using a spelling correction agent
US10778635B2 (en) 2002-11-18 2020-09-15 Facebook, Inc. People lists
US10389661B2 (en) 2002-11-18 2019-08-20 Facebook, Inc. Managing electronic messages sent to mobile devices associated with electronic messaging accounts
US9053173B2 (en) 2002-11-18 2015-06-09 Facebook, Inc. Intelligent results related to a portion of a search query
US9647872B2 (en) 2002-11-18 2017-05-09 Facebook, Inc. Dynamic identification of other users to an online user
US9667585B2 (en) 2002-11-18 2017-05-30 Facebook, Inc. Central people lists accessible by multiple applications
US9075868B2 (en) 2002-11-18 2015-07-07 Facebook, Inc. Intelligent results based on database queries
US10033669B2 (en) 2002-11-18 2018-07-24 Facebook, Inc. Managing electronic messages sent to reply telephone numbers
US9894018B2 (en) 2002-11-18 2018-02-13 Facebook, Inc. Electronic messaging using reply telephone numbers
US9852126B2 (en) 2002-11-18 2017-12-26 Facebook, Inc. Host-based intelligent results related to a character stream
US9769104B2 (en) 2002-11-18 2017-09-19 Facebook, Inc. Methods and system for delivering multiple notifications
US9075867B2 (en) 2002-11-18 2015-07-07 Facebook, Inc. Intelligent results using an assistant
US9729489B2 (en) 2002-11-18 2017-08-08 Facebook, Inc. Systems and methods for notification management and delivery
US9047364B2 (en) 2002-11-18 2015-06-02 Facebook, Inc. Intelligent client capability-based results related to a character stream
US9053174B2 (en) 2002-11-18 2015-06-09 Facebook, Inc. Intelligent vendor results related to a character stream
US9621376B2 (en) 2002-11-18 2017-04-11 Facebook, Inc. Dynamic location of a subordinate user
US9736255B2 (en) 2003-03-26 2017-08-15 Facebook, Inc. Methods of providing access to messages based on degrees of separation
US9070118B2 (en) 2003-09-05 2015-06-30 Facebook, Inc. Methods for capturing electronic messages based on capture rules relating to user actions regarding received electronic messages
US10102504B2 (en) 2003-09-05 2018-10-16 Facebook, Inc. Methods for controlling display of electronic messages captured based on community rankings
US10187334B2 (en) 2003-11-26 2019-01-22 Facebook, Inc. User-defined electronic message preferences
US7673003B2 (en) 2004-04-28 2010-03-02 Microsoft Corporation Social network email filtering
EP1591939A3 (en) * 2004-04-28 2007-01-17 Microsoft Corporation Social Network Email Filtering
EP1591939A2 (en) * 2004-04-28 2005-11-02 Microsoft Corporation Social Network Email Filtering
CN100424693C (en) * 2005-08-08 2008-10-08 腾讯科技(深圳)有限公司 Identification method of user identifier
JP2009514321A (en) * 2005-10-26 2009-04-02 サムスン エレクトロニクス カンパニー リミテッド System and method for sending connection list entries with presence subscriptions
WO2007100737A1 (en) * 2006-02-28 2007-09-07 Lucent Technologies Inc. Instant messaging control
WO2007109691A2 (en) 2006-03-20 2007-09-27 Google Inc. Synchronous message management system
US8683373B2 (en) 2006-07-10 2014-03-25 International Business Machines Corporation Organizing files based on download locations
JP2008021308A (en) * 2006-07-10 2008-01-31 Internatl Business Mach Corp <Ibm> Method and apparatus to organize file based on download location
EP1873669A1 (en) 2006-10-26 2008-01-02 Philip Behrens Method, system and device for controlling and/or limiting electronic communication
CN101611404A (en) * 2006-10-26 2009-12-23 菲利普·贝伦斯 Be used to control and/or method, system and the equipment of limiting electronic communication
WO2009021532A1 (en) * 2007-08-13 2009-02-19 Mikhail Kolobov Method and apparatus for a safe communication between two or more computers
WO2009021567A1 (en) * 2007-08-13 2009-02-19 Mikhail Kolobov Method and apparatus for a safe communication between two or more computers
EP2264958A1 (en) * 2009-06-15 2010-12-22 Research In Motion Limited A method, devices and system having out of office based presence
US7984105B2 (en) 2009-06-15 2011-07-19 Research In Motion Limited Method, devices and system having out of office based presence
US9680777B2 (en) 2009-06-15 2017-06-13 Blackberry Limited Method, devices and system having out of office based presence
US10666585B2 (en) 2009-06-15 2020-05-26 Blackberry Limited Method, devices, and system for determining the presence status of a message recipient and displaying the name and presence indication of entries in an address book matching partial input based on the location of a mobile communication device
US10089363B2 (en) 2015-10-15 2018-10-02 At&T Intellectual Property I, L.P. Method and apparatus for identifying users who know each other
WO2018071236A1 (en) * 2016-10-11 2018-04-19 Microsoft Technology Licensing, Llc Controlling permissions in a communication system

Also Published As

Publication number Publication date
JP2006524866A (en) 2006-11-02
CA2520419A1 (en) 2004-10-14
EP1616419A2 (en) 2006-01-18
WO2004088943A3 (en) 2005-03-17
KR20050121222A (en) 2005-12-26

Similar Documents

Publication Publication Date Title
US20190037038A1 (en) Methods of providing access to messages based on degrees of separation
WO2004088943A2 (en) Identifying and using indentities of communication partners deemed to be known to a user
EP1836595B1 (en) Automatically enabling the forwarding of instant messages
US7475109B1 (en) Personalized auto-reply messages based on categories
US8060566B2 (en) Automatically enabling the forwarding of instant messages
US9479638B2 (en) Methods and systems for dispatching messages to mobile devices
US20160301654A1 (en) E-mail integrated instant messaging
US20160150386A1 (en) Prohibiting Mobile Forwarding
US7548956B1 (en) Spam control based on sender account characteristics
IL180566A (en) Electronic messaging system and method
US7912905B2 (en) System and method for filtering network messages
WO2002001823A2 (en) E-mail integrated instant messaging
CN1998202A (en) Identifying and using identities deemed to be known to a user
WO2005119994A1 (en) System and method for filtering network messages

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2520419

Country of ref document: CA

Ref document number: 1020057018101

Country of ref document: KR

Ref document number: 2006509384

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 4437/DELNP/2005

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2004758463

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 20048134439

Country of ref document: CN

WWP Wipo information: published in national office

Ref document number: 1020057018101

Country of ref document: KR

WWP Wipo information: published in national office

Ref document number: 2004758463

Country of ref document: EP