US20090228583A1 - Checking electronic messages for compliance with user intent - Google Patents

Checking electronic messages for compliance with user intent Download PDF

Info

Publication number
US20090228583A1
US20090228583A1 US12/044,892 US4489208A US2009228583A1 US 20090228583 A1 US20090228583 A1 US 20090228583A1 US 4489208 A US4489208 A US 4489208A US 2009228583 A1 US2009228583 A1 US 2009228583A1
Authority
US
United States
Prior art keywords
user
electronic communication
message
email
present
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/044,892
Inventor
Richard Pocklington
Jonathan Betts-LaCroix
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Google LLC
Original Assignee
OQO LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OQO LLC filed Critical OQO LLC
Priority to US12/044,892 priority Critical patent/US20090228583A1/en
Assigned to OQO, INC. reassignment OQO, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BETTS-LACROIX, JONATHAN, POCKLINGTON, RICHARD
Publication of US20090228583A1 publication Critical patent/US20090228583A1/en
Priority to US12/756,435 priority patent/US9141940B2/en
Assigned to OQO (ASSIGNMENT FOR THE BENEFIT OF CREDITORS), LLC reassignment OQO (ASSIGNMENT FOR THE BENEFIT OF CREDITORS), LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: OQO, INC.
Assigned to ZETTA RESEARCH, LLC reassignment ZETTA RESEARCH, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: OQO (ASSIGNMENT FOR THE BENEFIT OF CREDITORS), LLC
Assigned to GOOGLE INC. reassignment GOOGLE INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ZETTA RESEARCH, LLC
Assigned to GOOGLE LLC reassignment GOOGLE LLC CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: GOOGLE INC.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/23Reliability checks, e.g. acknowledgments or fault reporting

Definitions

  • the invention relates in general to electronic communications and more specifically to a system for checking and/or revising electronic messages by using data about a user's intent.
  • Electronic mail (email), text messages, chat messages, web logs (blogs), newsgroup postings, etc. are each examples of types of electronic communications, or messages.
  • messages are often important, or even critical, to a sender's profession, education, relationship, happiness or other aspect of life, there is a tendency for senders to draft and send a message quickly. This haste may result in errors, omissions, inclusion of inappropriate or sub-optimal comments or statements, or other unwanted effects.
  • email systems allow different options such as whether to reply to an original message using only the original message's sender, replying to everyone on the carbon copy (CC) list, using local or global distribution lists, placing some recipients in a blind carbon copy (BCC) list, forwarding the message; adding, deleting or editing names, content and attachments prior to sending, changing the order of name listing, sending to multiple email addresses or aliases for a same person, etc.
  • CC carbon copy
  • BCC blind carbon copy
  • a sender may fail to consider all the necessary options or characteristics, or may make a mistake in handling a message characteristic, thereby sending an electronic communication that does not achieve an intended result.
  • a preferred embodiment of the invention uses “intention data” to determine an intent of a sender of a message or other user in an electronic communication system. For example, a message to be sent can be compared to the sender's intention data which indicates the sender's probable intent. If a discrepancy is detected between the sender's determined intent and a part of the actual message then an action is taken.
  • An action can include providing an alert to the sender or to another person, process or device.
  • An action can also require that the sender confirm the message's content or characteristics, edit the message or the message's transmission parameters, further check the message against other external information, log an event, etc.
  • Intention data can be acquired by a monitoring process executing within or in association with a part of an electronic communication system.
  • a preferred embodiment uses “usage information” to derive a user's intent.
  • the usage information can include past or current activity of the user, such as an identified pattern of use of the communication system by a sender with respect to one or more recipients.
  • usage patterns can include frequency of correspondence, type of message content usually sent to a recipient, detecting common groups of recipients, etc.
  • Intention data can also be obtained from non-pattern information such as by an analysis of one or a few email messages. For example, a degree of formality, friendliness or other relationship attributes may be determined from one message which does not necessarily depend on a pattern.
  • a value for a relationship attribute can be used to analyze and react to subsequent messages.
  • Intention data can also be obtained directly from a user or other person as, for example, in response to a question or prompt, or by monitoring a person's behavior. Intention data may also be obtained or derived from other non-human sources such as databases, records, files, other devices or processes (e.g., phone calls, global positioning system (GPS) determination of location, web page browsing, etc.), or other sources.
  • non-human sources such as databases, records, files, other devices or processes (e.g., phone calls, global positioning system (GPS) determination of location, web page browsing, etc.
  • intention data is obtained it is used by an analysis process to compare against a message to be sent. If a discrepancy is detected it is determined that the message to be sent (or received, transferred or otherwise processed) may not comport with a user's intent.
  • a control process is invoked that takes an action such as generating an alert, suggesting a change, automatically making a change to the message or the way the message is handled, logging the event, etc.
  • the invention provides a method for processing an electronic communication, the method comprising: obtaining intention data, wherein the intention data indicates an intent of a user with respect to the user's electronic communications; accepting a signal from an input device to define content for a present electronic communication; determining that the present electronic communication is associated with the user; detecting a deficiency by analyzing at least a portion of the present electronic communication and the intention data; and performing an act to correct the deficiency.
  • FIG. 1 illustrates basic components in an electronic communications system suitable for use with the invention
  • FIG. 2A shows a first example email message
  • FIG. 2B shows a second email message in an example thread
  • FIG. 2C shows a third email message in an example thread
  • FIG. 2D shows a fourth email message in an example thread
  • FIG. 3 illustrates basic components and steps of a messaging system.
  • FIG. 1 illustrates basic components in an electronic communications system suitable for use with the invention. Note that although features may be discussed with respect to specific components or systems that the features can be adapted to any one or more suitable systems, devices, processes, components, networks or other combinations of hardware and/or software.
  • users such as 1 , 2 , 3 , 4 and 5 operate devices for electronic communications.
  • User 1 operates portable email device 10
  • User 2 operates desktop computer 20
  • User 3 operates cell phone 30
  • User 4 operates laptop 40
  • User 5 operates desktop computer 51 connected to local server 53 and other devices (not shown) via a local area network (LAN) 55 .
  • LAN local area network
  • any number and type of devices with different suitable network topologies and interconnections can be adapted for use with embodiments of the invention.
  • features of the invention may be described with respect to a specific user associated with a specific device, other types of associations of human users with devices or processes can be used, as desired, in order to achieve the functional effects described herein.
  • Multiple users can be associated with a device or devices and multiple devices can be associated with a user or users.
  • communications need not involve a human sender, intermediary and/or receiver as these roles might be performed automatically as where an email system sends automatically generated messages to humans or devices.
  • the devices communicate with each other and with server 60 via a digital network such as Internet 50 .
  • a digital network such as Internet 50 .
  • Such communication can be by any physical link, protocol, data format or other convention, as desired.
  • wired connections such as shown for servers 60 and 53 , and for desktop computer 20 may be employed.
  • wireless connections such as shown for portable email device 10 , cell phone 30 or laptop 40 may be used.
  • Internet 50 allows for dynamic and varied communications between devices and processes such as switches, routers, repeaters, servers, etc. These are shown symbolically as components 52 , 54 and 56 .
  • LAN 55 can be used to connect different devices at a locally controlled or maintained network such as a corporate or campus LAN, home network, etc.
  • an email system may be organized as a point-of-presence (POP3) or Internet Message Access Protocol (IMAP) system with a local or remote email server.
  • the email system can support message formats and protocols such as Multipurpose Internet Mail Extensions (MIME), Simple Mail Transfer Protocol (SMTP), etc.
  • MIME Multipurpose Internet Mail Extensions
  • SMTP Simple Mail Transfer Protocol
  • a text messaging system can use cell phone or wireless data connections to handheld devices that comply with standards such as Global System for Mobile Communications (GSM) and include Short Message Service (SMS), Multimedia Messaging Service (MMS), etc.
  • GSM Global System for Mobile Communications
  • SMS Short Message Service
  • MMS Multimedia Messaging Service
  • Other custom or proprietary systems can be used such as J-Phone's SkyMailTM and NTT Docomo's Short MailTM, etc.
  • any type of electronic communication system for delivery of information intended for at least one human recipient can be used with features of the present invention, including future-developed systems, standards and protocols.
  • functions or features described herein can be performed by any number, type and combination of hardware and software components. Functions can be performed at the same or different places in time or space by one or more components. In some implementations, components may be omitted or called by a different name from those shown in the examples. Further, various aspects of the invention can apply regardless of the organization of components or resources into different managed or controlled groups, such as Internet access provided by a company, a server operated by a third party, etc.
  • a typical method of sending an electronic communication such as an email message could involve User 1 creating message content and sending the content included in an initial email message.
  • the message could be transferred first to server 60 for further processing such as to resolve recipient network addresses, determine destination servers, etc.
  • message delivery need not use a server as some types of communication may be peer-to-peer or can use a device other than a server.
  • the user of terms designating items such as “client,” “server,” “sender,” “recipient,” “initial message,” “reply message,” etc. should not be construed as limiting the invention. Rather they are used to provide an example. It should be apparent that such terms may be interchanged and the resulting system or method will remain within the scope of the invention. Items may also be omitted.
  • a sender may send an initial message to a hardware device or software process such as to send a database query, purchase order, blog posting, turn on a light, etc.
  • the monitor process provides the characteristic data to an analysis process to derive intent data—i.e., data that indicates intent of a sender, recipient or other participant (“users”) of the messages.
  • intent data i.e., data that indicates intent of a sender, recipient or other participant (“users”) of the messages.
  • intent data i.e., data that indicates intent of a sender, recipient or other participant (“users”) of the messages.
  • One way of using the compiled message characteristic data to identify user intent is to analyze prior patterns of use.
  • Another way to establish user intent is by querying users, analyzing the way user's or automated processes react to a particular user, and by other methods, described in more detail, below.
  • Once user intent data is obtained then a particular user's electronic messages can be compared to the intent data by a control process. When a discrepancy is determined then the control process can initiate an action such as alerting a user, delaying transmission, automatically correcting or changing a characteristic of the communication, etc.
  • FIG. 3 illustrates basic components and steps of a messaging system in a preferred embodiment of the invention, as described, above.
  • participants 202 include multiple users of the messaging system. Portions of the participants' messages and activity are recorded by monitor process 220 . Monitor process uses observations about the messages and activity to generate intention data 222 . Such data can be any information that is useful to determine a user's intent with respect to a communication.
  • each user's email traffic can be recorded to include header information (sender, receiver, other recipients, date and time sent or received, subject, etc.) and content, if desired.
  • Statistics, summary data or other data of communications with another user, device, process, group of users, organization, or other entity can be maintained. Such data can include the frequency of corresponding with another user, the time intervals between responses, the amount of time spent composing or reading a message, the other people that were included in messages, the tone or meaning of a message, etc.
  • Intention data is used by analysis process 230 along with other optional information such as user provided information 224 , or information from other sources such as external databases, devices, processes, etc.
  • control process 240 determines whether there is a discrepancy between a user's intent and the probably meaning or effect of the message content or a message characteristic. If a discrepancy is detected then an action is taken such as alerting the user, requiring a user action before sending the message, requiring a change to the message, automatically making a change to the message, etc.
  • Table II lists examples of types of actions that might be taken. Any one or more of these actions can be controlled by a system administrator or other entity, or provided in settings that are selectable by the user, as desired. Other actions are possible.
  • FIGS. 2A-D show email communications and the development of an email thread.
  • An initial sender Charlie@trellislaw.com, created and sent initial email 102 of FIG. 2A on Mar. 25, 2007 at 10:11 am to Richard@oqo.com.
  • Another recipient jory@oqo.com, was also “carbon copied” in a “CC”.
  • the subject of the email message is “Possible patents in next OQOTM product release”.
  • the preceding information resides in header 104 .
  • Body 106 includes the content of the email message which discusses ideas that might be patented in OQO, Inc.'s next product release.
  • the content includes typical parts such as greeting 110 , first paragraph 112 , second paragraph 114 , signature 116 and contact information.
  • FIG. 2B shows first reply 120 from Richard@oqo.com sent Mar. 28, 2007 at 3:40 pm to Charlie@trellislaw.com with a CC to jory@oqo.com and a blind CC (BCC) to Jacques@oqo.com with a subject “Possible patents in next OQO product release”. Note that a BCC is not shown to any of the recipients but is shown in FIG. 2B for discussion purposes.
  • Separator 122 is used to indicate the end of the reply, and initial email 102 has been automatically copied and included in the response by Richard's email system.
  • FIG. 2C shows a second reply from Jacques who was a blind CC.
  • Jacques has replied to the sender and every other recipient on the prior email.
  • Jacques email system automatically placed Richard on the “to” line and Jory and Charlie on the “CC” line so that all three would receive a response.
  • Prior email in the thread i.e., initial email 102 and first reply 120 , are copied into Jacques reply, as shown.
  • FIG. 2D shows third reply 140 from Charlie in response to Jacques' email. This completes the example thread which shows the entire communication as a series of the email messages in a reverse order from which they were sent, namely 140 , 130 , 120 and 102 .
  • FIGS. 2A-D are discussed again to describe various features and functions of embodiments of the invention.
  • intent data exists in the form of a profile associated with each of these users.
  • the profile can be derived from characteristics of their prior communications.
  • One basic function that can be provided includes handling of predefined text either for auto-insertion or for insertion on command, such as if a sender activates a control prior to sending a message.
  • the notification text is typically appended automatically by an email sending process to every email sent by the sender. Naturally, the amount of appended notification text tends to become larger as time goes by, especially when it is drafted by lawyers.
  • An embodiment of the invention acts to suppress the notification text when it has been established that the recipients on an email have already received the notification text before.
  • the parameters of suppressing the text can vary. For example, the notification text may be sent only once and then suppressed. Or a threshold number of times (e.g., twice, 5 times, etc.), or frequency (once a week, month, etc.) can be implemented so that a recipient only receives the notification text every so often. If the content of the notification text changes then values or counters associated with the parameters can be reset so that recipients are treated as not having seen the text before.
  • a pattern of use may be established so that the monitoring process can detect when an unusual or new combination of recipients is being used. For example, if a sender has used a group of recipients in the past and a present attempt at sending includes that same group plus a new recipient not in that group then the sender can be alerted about the new recipient prior to sending the message.
  • Another alternative is to include the insertion text only for the new recipient. Detection of the new recipient can be by usage patterns, which are discussed in more detail, below. Or by analysis of the recipients' email domains, geographic location, use of external data to show affiliation with an organization, frequency of correspondence, etc. These factors are discussed in more detail, below.
  • predefined text can be similarly handled.
  • another popular type of predefined text is contact information 118 in FIG. 2A . If the monitor process already establishes that a user has already received the contact information with sufficient occurrence and/or frequency then a sender may have a parameter in their intent data or profile to suppress the contact information even if other settings in the email system call for insertion of the contact information. Variations on regulating predefined text are possible.
  • a classification of a relationship of the sender to a recipient is maintained.
  • the relationship classification can be made based on user input, monitoring of messages, or by other techniques.
  • a relationship between the sender and receiver can be designated by relationship attributes such as “professional,” “friendly,” “trusted,” “romantic,” etc.
  • Each relationship attribute can have a value such as ⁇ 10 to 10 where 10 could be “most friendly” and ⁇ 10 could be “least friendly,” for example.
  • Many other attributes and ways to associate a value with an attribute are possible.
  • a user can set the values of the relationship attributes in pairs based on the relationship of a particular user with each other possible participant in a communication. Or an automatic default can be used such as zero.
  • modification of the relationship attributes can be modified based on an analysis process' analysis of messages from data obtained by a monitor process. For example, as explained in more detail below, if a sender continually uses familiar, funny, excited or intimate or other “friendly” types of language constructs with a particular recipient than the sender/recipient “friendly” value can be increased over time by the analysis process.
  • the analysis process can use simplified or complex techniques to make a determination for a relationship attribute value adjustment. For example, predefined “friendly” keywords can be defined so that a simple keyword match can be used to analyze a message. If a user sends personal information such as a home phone number, cell phone number, bank account, password, social security number, etc., it can be registered that the recipient is at an elevated level of friendship or trust.
  • the time of messages being sent can be considered in establishing a relationship attribute's value. If a pair of users are recorded as predominantly sending only during business hours then the relationship's professional attribute can increase and the friendship attribute can decrease. Similarly, if messages are sent at all hours of the day and night then the professional attribute can decrease while the friendship attribute can increase. Naturally, any one or more attributes may be affected by such monitoring of user characteristics.
  • NLP natural language processing
  • LSI latent semantic indexing
  • LSA latent semantic analysis
  • a relationship classification Once a relationship classification has been established then it can be used to analyze messages to determine if a discrepancy exists between a participant's intent and the likely meaning or predicted effect of a message to be sent.
  • the hierarchy can be compared to the appropriate relationship attribute's value and a determination can be made to take action if there is a discrepancy. So, for example, if the “friendly” attribute between Richard and Charlie is 8 then any of the salutations in Table IV with values 7-10 may be deemed acceptable and use of other salutations may be flagged so that the sender, Charlie, would be alerted before the email is sent that the greeting may be more formal than is desired in order to maintain the friendship at a desired or intended level. Such mistakes in maintaining a social relationship may occur inadvertently as where more time than usual has gone by between communications, when a relationship is first being formed and is progressing, when an event occurs to change the relationship, etc.
  • the Richard/Charlie friendship attribute can be defined by a parameter associated with Richard's profile or intent data. This number need not be the same as the Charlie/Richard friendship attribute.
  • One feature allows checking the recipients' corresponding parameter and using the recipient parameter to alert the sender or to modify the salutation. For example, if Charlie is sending Richard an email but it is detected that Richard's profile has a Richard/Charlie friendship value of 3 then a more formal salutation may be suggested than what Charlie had initially used.
  • the exposure of different users' profile parameters to other users can be by consent of each user, as desired.
  • the Jory/Charlie relationship attributes can have an effect on how the salutation and content of the email is monitored and analyzed and on possible actions if a discrepancy is determined. For example, if Charlie attempts to use the salutation “Rich Wazzup!” in an email to Richard that also copies Jory where the Charlie/Richard friendship value is 10 and but the Jory/Charlie friendship attribute value is 5 and the Jory/Charlie professional attribute value is 10 then the salutation can be flagged to require affirmative approval from Charlie before the message is sent. Approval might be a dialogue box or other alert displayed that requires a “yes” or “no” selection after Charlie indicates the message is to be sent. Naturally, many variations on use of relationship attributes to determine intent are possible.
  • line 114 of FIG. 2A states “BTW, did I tell you that a patent I wrote got licensed for $100M?”
  • the monitoring process can record such statements and if a similar or identical statement had previously been sent to the same user then the statement can be flagged for possible deletion or modification by the sender.
  • This approach can be used to send different variations to different users.
  • Richard had been provided with text similar to line 114 in the past but Jory was not then two versions of the email can be automatically sent (or sent upon approval after informing the author, Charlie) so that Jory receives line 114 but Richard does not.
  • a variation of this approach is to show Richard that line 114 is a repeated statement but was sent anyway for Jory's benefit. This might be shown by having line 114 grayed, or dimmed, in Richard's copy of the message. Or an annotation can be made on, adjacent to, or otherwise associated with line 114 's text such as “for Jory's benefit” or “—previously sent text omitted - - - ,” “Jory” etc. This approach can be especially useful where the amount of text is lengthy or may be sensitive to an individual. In general, any manner of suitable indication can be used to show that text has been included and/or removed specifically for one or more recipients but not for all recipients. In some applications, no indication to the recipients may be needed, or desired.
  • One feature of the invention provides for “second order effects” whereby a first user's intent is checked not only when the first user sends an email to a second user (a “first order effect”) but also when the second user (or a different user) sends the first user's text to a third user (a “second order effect”). For example, if Charlie had included text to Richard and Richard then forwards that email to Jory, a second order effect might remove or modify a portion the text if the text was redundant, offending, restricted, etc. Another example is where text is intended for only a few people or for internal organization use. If text from the first user is attempted to be sent to a person not in a predetermined list, outside of an organization, etc.
  • any of the operations described herein for a first order effect can be applied to a second order effect, or to any subsequent forwarding or re-sending of the first user's communication, as desired.
  • FIG. 2B shows Richard's response to Charlie's initial email.
  • An additional recipient, Jacques has been BCCed so that Jacques email address or the fact that Jacques had been copied is not apparent to the recipients Jory and Charlie.
  • One check would include whether an attorney or other specialized consultant who is likely to generate or be copied on sensitive material is involved in a message distribution or thread. If so, and if it is also determined that others are copied who have not previously participated in these types of correspondence, then an alert mechanism can be invoked.
  • FIG. 2C illustrates Jacques' response to Richard's email.
  • Jacques has inadvertently copied everyone in the thread including Charlie who was not an intended recipient.
  • One feature of the invention checks for whether a first-time recipient is the result of replying to an email sent by another person. Often when a first person is sending an email to another for the first time there should be a polite salutation or introduction. In a case where someone is being sent an email for the first time in the CC or BCC lines such an alert can be used to verify (e.g., by requiring affirmative assent from the sender) that the email should go to the first-time recipient.
  • Tone can be determined by, for example, using natural language processing techniques, by looking for keywords (e.g., slang, cursing), by detecting punctuation (e.g., exclamation marks, capitalization of words, phrases or sentences, etc.).
  • keywords e.g., slang, cursing
  • punctuation e.g., exclamation marks, capitalization of words, phrases or sentences, etc.
  • Charlie's response to Jacques' email can be analyzed with regard to this being a first-time reply to a person who has an email domain of a client.
  • the tone in Charlie's reply could be detected by various processing methods, described above.
  • the early morning time of sending the message can be used in evaluating the appropriateness of the message. In such cases a “hold” on sending the message can be imposed so that approval after a few hours is required to send the message.
  • Other variations on detecting inappropriate messages can include requiring the sender to perform an action that requires patience, self-awareness or introspection, such as solving a puzzle, answering a question, performing a sobriety test, etc.
  • the results from such actions or tests can be provided to the control process or another process in the system to decide whether the message should be sent, held, modified, or to have other action taken.
  • Any suitable programming language can be used to implement the functionality of the present invention including C, C++, Java, assembly language, etc.
  • Different programming techniques can be employed such as procedural or object oriented.
  • the routines can execute on a single processing device or multiple processors. Although the steps, operations or computations may be presented in a specific order, this order may be changed in different embodiments unless otherwise specified. In some embodiments, multiple steps shown as sequential in this specification can be performed at the same time.
  • the sequence of operations described herein can be interrupted, suspended, or otherwise controlled by another process, such as an operating system, kernel, etc.
  • the routines can operate in an operating system environment or as stand-alone routines occupying all, or a substantial part, of the system processing.
  • the functions may be performed in hardware, software or a combination of both.
  • a “computer-readable medium” for purposes of embodiments of the present invention may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, system or device.
  • the computer readable medium can be, by way of example only but not by limitation, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, system, device, propagation medium, or computer memory.
  • a “processor” or “process” includes any human, hardware and/or software system, mechanism or component that processes data, signals or other information.
  • a processor can include a system with a general-purpose central processing unit, multiple processing units, dedicated circuitry for achieving functionality, or other systems. Processing need not be limited to a geographic location, or have temporal limitations. Functions and parts of functions described herein can be achieved by devices in different places and operating at different times. For example, a processor can perform its functions in “real time,” “offline,” in a “batch mode,” etc. Parallel, distributed or other processing approaches can be used.
  • Embodiments of the invention may be implemented by using a programmed general purpose digital computer, by using application specific integrated circuits, programmable logic devices, field programmable gate arrays, optical, chemical, biological, quantum or nanoengineered systems, components and mechanisms may be used.
  • the functions of the present invention can be achieved by any means as is known in the art.
  • distributed, networked systems, components and/or circuits can be used.
  • Communication, or transfer, of data may be wired, wireless, or by any other means.
  • any signal arrows in the drawings/ Figures should be considered only as exemplary, and not limiting, unless otherwise specifically noted.
  • the term “or” as used herein is generally intended to mean “and/or” unless otherwise indicated. Combinations of components or steps will also be considered as being noted, where terminology is foreseen as rendering the ability to separate or combine is unclear.

Abstract

Intention data is used to determine an intent of a sender of a message, or other participant, in an electronic communication system such as an email system. For example, a message that is designated for sending can be compared to the sender's intention data and if a discrepancy or deficiency is detected between the sender's determined intent and the actual message then an action is taken such as providing an alert to the sender or to another person, process or device; requiring an action by the sender such as confirming the message, making an edit, checking information, etc.

Description

    FIELD OF THE INVENTION
  • The invention relates in general to electronic communications and more specifically to a system for checking and/or revising electronic messages by using data about a user's intent.
  • BACKGROUND
  • The prevalent use of electronic communications often requires a high level of care to make sure that the communication is properly crafted and sent to the proper recipients. Electronic mail (email), text messages, chat messages, web logs (blogs), newsgroup postings, etc. are each examples of types of electronic communications, or messages. Although these messages are often important, or even critical, to a sender's profession, education, relationship, happiness or other aspect of life, there is a tendency for senders to draft and send a message quickly. This haste may result in errors, omissions, inclusion of inappropriate or sub-optimal comments or statements, or other unwanted effects.
  • Even where senders have the best intentions and are mindful of their message composition and sending parameters, the number of features and level of complexity in today's electronic communications can cause mistakes. For example, email systems allow different options such as whether to reply to an original message using only the original message's sender, replying to everyone on the carbon copy (CC) list, using local or global distribution lists, placing some recipients in a blind carbon copy (BCC) list, forwarding the message; adding, deleting or editing names, content and attachments prior to sending, changing the order of name listing, sending to multiple email addresses or aliases for a same person, etc. There are many other options associated with sending an email message and each option can lead to multiple possible parameters or values.
  • Thus, a sender may fail to consider all the necessary options or characteristics, or may make a mistake in handling a message characteristic, thereby sending an electronic communication that does not achieve an intended result.
  • SUMMARY
  • A preferred embodiment of the invention uses “intention data” to determine an intent of a sender of a message or other user in an electronic communication system. For example, a message to be sent can be compared to the sender's intention data which indicates the sender's probable intent. If a discrepancy is detected between the sender's determined intent and a part of the actual message then an action is taken. An action can include providing an alert to the sender or to another person, process or device. An action can also require that the sender confirm the message's content or characteristics, edit the message or the message's transmission parameters, further check the message against other external information, log an event, etc.
  • Intention data can be acquired by a monitoring process executing within or in association with a part of an electronic communication system. A preferred embodiment uses “usage information” to derive a user's intent. The usage information can include past or current activity of the user, such as an identified pattern of use of the communication system by a sender with respect to one or more recipients. For example, usage patterns can include frequency of correspondence, type of message content usually sent to a recipient, detecting common groups of recipients, etc. Intention data can also be obtained from non-pattern information such as by an analysis of one or a few email messages. For example, a degree of formality, friendliness or other relationship attributes may be determined from one message which does not necessarily depend on a pattern. A value for a relationship attribute can be used to analyze and react to subsequent messages. Intention data can also be obtained directly from a user or other person as, for example, in response to a question or prompt, or by monitoring a person's behavior. Intention data may also be obtained or derived from other non-human sources such as databases, records, files, other devices or processes (e.g., phone calls, global positioning system (GPS) determination of location, web page browsing, etc.), or other sources.
  • Once intention data is obtained it is used by an analysis process to compare against a message to be sent. If a discrepancy is detected it is determined that the message to be sent (or received, transferred or otherwise processed) may not comport with a user's intent. In response to detecting a discrepancy, a control process is invoked that takes an action such as generating an alert, suggesting a change, automatically making a change to the message or the way the message is handled, logging the event, etc.
  • In one embodiment the invention provides a method for processing an electronic communication, the method comprising: obtaining intention data, wherein the intention data indicates an intent of a user with respect to the user's electronic communications; accepting a signal from an input device to define content for a present electronic communication; determining that the present electronic communication is associated with the user; detecting a deficiency by analyzing at least a portion of the present electronic communication and the intention data; and performing an act to correct the deficiency.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates basic components in an electronic communications system suitable for use with the invention;
  • FIG. 2A shows a first example email message;
  • FIG. 2B shows a second email message in an example thread;
  • FIG. 2C shows a third email message in an example thread;
  • FIG. 2D shows a fourth email message in an example thread; and
  • FIG. 3 illustrates basic components and steps of a messaging system.
  • DETAILED DESCRIPTION
  • FIG. 1 illustrates basic components in an electronic communications system suitable for use with the invention. Note that although features may be discussed with respect to specific components or systems that the features can be adapted to any one or more suitable systems, devices, processes, components, networks or other combinations of hardware and/or software.
  • In FIG. 1, users such as 1, 2, 3, 4 and 5 operate devices for electronic communications. For example, User 1 operates portable email device 10, User 2 operates desktop computer 20, User 3 operates cell phone 30, User 4 operates laptop 40 and User 5 operates desktop computer 51 connected to local server 53 and other devices (not shown) via a local area network (LAN) 55. Note that any number and type of devices with different suitable network topologies and interconnections can be adapted for use with embodiments of the invention. Further, although features of the invention may be described with respect to a specific user associated with a specific device, other types of associations of human users with devices or processes can be used, as desired, in order to achieve the functional effects described herein. Multiple users can be associated with a device or devices and multiple devices can be associated with a user or users. In some applications, communications need not involve a human sender, intermediary and/or receiver as these roles might be performed automatically as where an email system sends automatically generated messages to humans or devices.
  • In FIG. 1, the devices communicate with each other and with server 60 via a digital network such as Internet 50. Such communication can be by any physical link, protocol, data format or other convention, as desired. For example, wired connections such as shown for servers 60 and 53, and for desktop computer 20 may be employed. Or wireless connections such as shown for portable email device 10, cell phone 30 or laptop 40 may be used. As is known in the art, Internet 50 allows for dynamic and varied communications between devices and processes such as switches, routers, repeaters, servers, etc. These are shown symbolically as components 52, 54 and 56. Similarly, LAN 55 can be used to connect different devices at a locally controlled or maintained network such as a corporate or campus LAN, home network, etc.
  • As is known in the art, there are many ways to organize and interconnect devices and processes, and to arrange for communication protocols, formats and standards. For example, an email system may be organized as a point-of-presence (POP3) or Internet Message Access Protocol (IMAP) system with a local or remote email server. The email system can support message formats and protocols such as Multipurpose Internet Mail Extensions (MIME), Simple Mail Transfer Protocol (SMTP), etc. A text messaging system can use cell phone or wireless data connections to handheld devices that comply with standards such as Global System for Mobile Communications (GSM) and include Short Message Service (SMS), Multimedia Messaging Service (MMS), etc. Other custom or proprietary systems can be used such as J-Phone's SkyMail™ and NTT Docomo's Short Mail™, etc.
  • In general, any type of electronic communication system for delivery of information intended for at least one human recipient can be used with features of the present invention, including future-developed systems, standards and protocols. Because of the large flexibility in communication systems and processing systems, it should be apparent that functions or features described herein can be performed by any number, type and combination of hardware and software components. Functions can be performed at the same or different places in time or space by one or more components. In some implementations, components may be omitted or called by a different name from those shown in the examples. Further, various aspects of the invention can apply regardless of the organization of components or resources into different managed or controlled groups, such as Internet access provided by a company, a server operated by a third party, etc.
  • A typical method of sending an electronic communication such as an email message could involve User 1 creating message content and sending the content included in an initial email message. The message could be transferred first to server 60 for further processing such as to resolve recipient network addresses, determine destination servers, etc. In other embodiments, message delivery need not use a server as some types of communication may be peer-to-peer or can use a device other than a server. The user of terms designating items such as “client,” “server,” “sender,” “recipient,” “initial message,” “reply message,” etc. should not be construed as limiting the invention. Rather they are used to provide an example. It should be apparent that such terms may be interchanged and the resulting system or method will remain within the scope of the invention. Items may also be omitted. For example, a sender may send an initial message to a hardware device or software process such as to send a database query, purchase order, blog posting, turn on a light, etc.
  • As correspondents and participants exchange messages, characteristics of the messages and exchanges are compiled by a monitor process. The monitor process provides the characteristic data to an analysis process to derive intent data—i.e., data that indicates intent of a sender, recipient or other participant (“users”) of the messages. One way of using the compiled message characteristic data to identify user intent is to analyze prior patterns of use. Another way to establish user intent is by querying users, analyzing the way user's or automated processes react to a particular user, and by other methods, described in more detail, below. Once user intent data is obtained then a particular user's electronic messages can be compared to the intent data by a control process. When a discrepancy is determined then the control process can initiate an action such as alerting a user, delaying transmission, automatically correcting or changing a characteristic of the communication, etc.
  • FIG. 3 illustrates basic components and steps of a messaging system in a preferred embodiment of the invention, as described, above. In FIG. 3, participants 202 include multiple users of the messaging system. Portions of the participants' messages and activity are recorded by monitor process 220. Monitor process uses observations about the messages and activity to generate intention data 222. Such data can be any information that is useful to determine a user's intent with respect to a communication.
  • For example, each user's email traffic can be recorded to include header information (sender, receiver, other recipients, date and time sent or received, subject, etc.) and content, if desired. Statistics, summary data or other data of communications with another user, device, process, group of users, organization, or other entity can be maintained. Such data can include the frequency of corresponding with another user, the time intervals between responses, the amount of time spent composing or reading a message, the other people that were included in messages, the tone or meaning of a message, etc.
  • Many different characteristics of a message or communication can be monitored including those listed in Table I, below.
  • ****************** BEGIN TABLE I **********************
    Characteristics of Outgoing Messages:
    1: Lacks certain header properties
      i) given the messages other header information
      ii) given the messages other body content
      iii) given previous messages header information
      iv) given previous messages body content
      v)
    2: Lacks an characteristic or property it purports to contain
      I an attachement
      II a recipient
      III the response to a query
      IV information necessary for the effective delivery of the message
    3: Contains content that:
      i) is likely to have an effect on the recipent other than that which is intended
    A) in a response
    B) in a response in another medium
      ii) is likely to generate another recognizable pattern of response
      iii) is likley to generate an unrecognized pattern of response
      vi) has a low probability of generating a response
      vii) may caused anger, frustration or other negative effects on the recipient
      viii) is unlikey to cause the intended reponse or intended action
    4: is similar to other emails you have sent:
       i) within or outside some range of time
       ii) to the same recipient
       iii) to other recipients, either explictly or implicitly defined
       iv) to recepients which have a relationship to the chosen recipient(s)
       v) to recipients which have been flagged for some other reason or purpose
    5: differs in style, tone, format or content from emails from your chosen recipient(s) which
    have a relationship to the chosen recipient or recipients or are otherwise categorized as
    relevant
    6: differs in style, tone, format or content from emails sent by other senders to the chosen
    recipient(s) or recepients which have a relationship to the chosen recipient or recipients or are
    otherwise characterized as relevant
    7: falls within a certain range of times between receipt of other messages, either from the last
    message, or on average,
       a) from this recipient
       b) from other recipients
    8: contains information which can be identified as
       a) sensitive
       b) proprietary
       c) providing some legal risk
       d) referencing a Patent
    ************* ******* END TABLE I ******************
  • Intention data is used by analysis process 230 along with other optional information such as user provided information 224, or information from other sources such as external databases, devices, processes, etc.
  • When a user such as User 204 creates a new message such as present electronic communication 250, control process 240 determines whether there is a discrepancy between a user's intent and the probably meaning or effect of the message content or a message characteristic. If a discrepancy is detected then an action is taken such as alerting the user, requiring a user action before sending the message, requiring a change to the message, automatically making a change to the message, etc.
  • Table II lists examples of types of actions that might be taken. Any one or more of these actions can be controlled by a system administrator or other entity, or provided in settings that are selectable by the user, as desired. Other actions are possible.
  • ****************** BEGIN TABLE II *********************
    Examples of Actions:
    1: a hold time on a message before it leaves the sender's outbox
    2: the addition of an attatchment to a message
    3: modifications to outgoing message parameters, including
      i: changing a recipient
      ii: modifying the title
      iii: modification to the urgency level, date stamp or other parameters of the message
    header
      iv: alterations to the content of the message, including
       A: distortions, particularly in the case when the application which makes such
    distortions is executed without the knowledge of the email sender and or recipient
       B: modifications, including those meant to
        i: repair the message
        ii: remove the material which generated the flag
        iii: further stress the material which generated the flag
        iv: optimize, maximize, minimize or otherwise modify the likelihood of such
    events as:
         1) recepit of an email in return
         2) receipt of an email with particular parameters which include:
          a: presence of a similar flag
          b: presence of a specific flag
          c: of a certain length
          d: within a certain time range
          e: a number of responses
         3) the quantity of total emails in a thread
          4) the length of time the thread persisted
          5) any other measureable parameter of:
          a: the email message content
          b: its header information
          c: the headers of other emails in the thread
          d: the content of other messages in the thread
          e: the header or content of other messages linked to this thread
           A) by shared author
           B) by shared content
           C) by another algorithm which determines the two or
    more messages, authors or threads are related
       C: deletions: particularly in the case of the deletion of an area of the content of the
    message flagged as:
        1) incorrect
        2) dangerous
        3) provocative
        4) uninformatinve
        5) political
        6) unlikely to generate a desired response
        7) likely to generate an undersirable response
    4: the generation of a dialog box which requires further input to continue the message, such
    as:
       i: a password
       ii: a confirmation code
       iii: a unique identifier such as
       A: a citizenship code
       B: a passport number
       C: a social security number
       iv: the solution to a logic puzzle or other test of sobriety or patience
    ****************** END TABLE II *********************
  • FIGS. 2A-D show email communications and the development of an email thread. An initial sender, Charlie@trellislaw.com, created and sent initial email 102 of FIG. 2A on Mar. 25, 2007 at 10:11 am to Richard@oqo.com. Another recipient, jory@oqo.com, was also “carbon copied” in a “CC”. The subject of the email message is “Possible patents in next OQO™ product release”. The preceding information resides in header 104. Body 106 includes the content of the email message which discusses ideas that might be patented in OQO, Inc.'s next product release. The content includes typical parts such as greeting 110, first paragraph 112, second paragraph 114, signature 116 and contact information.
  • FIG. 2B shows first reply 120 from Richard@oqo.com sent Mar. 28, 2007 at 3:40 pm to Charlie@trellislaw.com with a CC to jory@oqo.com and a blind CC (BCC) to Jacques@oqo.com with a subject “Possible patents in next OQO product release”. Note that a BCC is not shown to any of the recipients but is shown in FIG. 2B for discussion purposes. Separator 122 is used to indicate the end of the reply, and initial email 102 has been automatically copied and included in the response by Richard's email system.
  • FIG. 2C shows a second reply from Jacques who was a blind CC. Jacques has replied to the sender and every other recipient on the prior email. Jacques email system automatically placed Richard on the “to” line and Jory and Charlie on the “CC” line so that all three would receive a response. Prior email in the thread, i.e., initial email 102 and first reply 120, are copied into Jacques reply, as shown.
  • FIG. 2D shows third reply 140 from Charlie in response to Jacques' email. This completes the example thread which shows the entire communication as a series of the email messages in a reverse order from which they were sent, namely 140, 130, 120 and 102.
  • Next FIGS. 2A-D are discussed again to describe various features and functions of embodiments of the invention.
  • Assuming that Richard and Charlie have corresponded before, intent data exists in the form of a profile associated with each of these users. The profile can be derived from characteristics of their prior communications. One basic function that can be provided includes handling of predefined text either for auto-insertion or for insertion on command, such as if a sender activates a control prior to sending a message.
  • For example, many professional such as attorneys, agents, corporate officers, or others who deal with confidential information include a paragraph or more of notification text appended to the bottom of every email message. An example of such notification text is shown below in Table III.
  • TABLE III
    ************** BEGIN TABLE III ********************
      This communication, including any attachments, is confidential and
     may be protected by privilege. If you are not the intended recipient, any
     use, dissemination, distribution, or copying of this communication is
     strictly prohibited. If you have received this communication in error,
     please immediately notify the sender by telephone or email, and
     permanently delete all copies, electronic or other, you may have.
      To ensure compliance with requirements imposed by the IRS, we
     inform you that any tax advice contained in this communication
     (including any attachments) was not intended or written to be used, and
     cannot be used, for the purpose of (i) avoiding penalties under the
     Internal Revenue Code or (ii) promoting, marketing or recommending to
     another party any transaction or matter addressed herein.
      The foregoing applies even if this notice is embedded in a message
     that is forwarded or attached.
    ************** END TABLE III ********************
  • The notification text is typically appended automatically by an email sending process to every email sent by the sender. Naturally, the amount of appended notification text tends to become larger as time goes by, especially when it is drafted by lawyers. An embodiment of the invention acts to suppress the notification text when it has been established that the recipients on an email have already received the notification text before. The parameters of suppressing the text can vary. For example, the notification text may be sent only once and then suppressed. Or a threshold number of times (e.g., twice, 5 times, etc.), or frequency (once a week, month, etc.) can be implemented so that a recipient only receives the notification text every so often. If the content of the notification text changes then values or counters associated with the parameters can be reset so that recipients are treated as not having seen the text before.
  • Other factors or conditions can be used to determine whether insertion text or other text should be included in an email or not. For example, a pattern of use may be established so that the monitoring process can detect when an unusual or new combination of recipients is being used. For example, if a sender has used a group of recipients in the past and a present attempt at sending includes that same group plus a new recipient not in that group then the sender can be alerted about the new recipient prior to sending the message. Another alternative is to include the insertion text only for the new recipient. Detection of the new recipient can be by usage patterns, which are discussed in more detail, below. Or by analysis of the recipients' email domains, geographic location, use of external data to show affiliation with an organization, frequency of correspondence, etc. These factors are discussed in more detail, below.
  • Other types of predefined text can be similarly handled. For example, another popular type of predefined text is contact information 118 in FIG. 2A. If the monitor process already establishes that a user has already received the contact information with sufficient occurrence and/or frequency then a sender may have a parameter in their intent data or profile to suppress the contact information even if other settings in the email system call for insertion of the contact information. Variations on regulating predefined text are possible.
  • In another embodiment, a classification of a relationship of the sender to a recipient is maintained. The relationship classification can be made based on user input, monitoring of messages, or by other techniques. For example, a relationship between the sender and receiver can be designated by relationship attributes such as “professional,” “friendly,” “trusted,” “romantic,” etc. Each relationship attribute can have a value such as −10 to 10 where 10 could be “most friendly” and −10 could be “least friendly,” for example. Many other attributes and ways to associate a value with an attribute are possible. A user can set the values of the relationship attributes in pairs based on the relationship of a particular user with each other possible participant in a communication. Or an automatic default can be used such as zero.
  • As time goes by the particular user (or another user) may modify the attributes' values. Or modification of the relationship attributes can be modified based on an analysis process' analysis of messages from data obtained by a monitor process. For example, as explained in more detail below, if a sender continually uses familiar, funny, excited or intimate or other “friendly” types of language constructs with a particular recipient than the sender/recipient “friendly” value can be increased over time by the analysis process. The analysis process can use simplified or complex techniques to make a determination for a relationship attribute value adjustment. For example, predefined “friendly” keywords can be defined so that a simple keyword match can be used to analyze a message. If a user sends personal information such as a home phone number, cell phone number, bank account, password, social security number, etc., it can be registered that the recipient is at an elevated level of friendship or trust.
  • The time of messages being sent can be considered in establishing a relationship attribute's value. If a pair of users are recorded as predominantly sending only during business hours then the relationship's professional attribute can increase and the friendship attribute can decrease. Similarly, if messages are sent at all hours of the day and night then the professional attribute can decrease while the friendship attribute can increase. Naturally, any one or more attributes may be affected by such monitoring of user characteristics. Other suitable approaches for analyzing message characteristics and user behavior or intent can include using natural language processing (NLP) techniques such as latent semantic indexing (LSI), latent semantic analysis (LSA), etc.
  • Once a relationship classification has been established then it can be used to analyze messages to determine if a discrepancy exists between a participant's intent and the likely meaning or predicted effect of a message to be sent.
  • For example, in FIG. 2A, there is evidence of a friendly relationship between Richard and Charlie since at line 110 the greeting is the more informal “Hey, Richard,” instead of simply “Richard,” or even “Hi, Richard,”. A hierarchy of familiarity or friendliness in salutations can be created as shown in the example of Table IV.
  • TABLE IV
    ************* BEGIN TABLE IV ********************
        Rich Whazzup! 10← More Familiar
        Hey, Richard, 9
        Hi, Richard, 8
        Richard, 7
        Dear Richard, 6
        Richard Smith 5
        Mr. Richard Smith 4
        Sir 3
        Sir/Madam 2
        To Whom It May Concern 1← Less Familiar
    ************ END TABLE IV ***********************
  • Naturally, many different types of keywords, classifications, and hierarchies can be used other than that shown in Table II. Once established, the hierarchy can be compared to the appropriate relationship attribute's value and a determination can be made to take action if there is a discrepancy. So, for example, if the “friendly” attribute between Richard and Charlie is 8 then any of the salutations in Table IV with values 7-10 may be deemed acceptable and use of other salutations may be flagged so that the sender, Charlie, would be alerted before the email is sent that the greeting may be more formal than is desired in order to maintain the friendship at a desired or intended level. Such mistakes in maintaining a social relationship may occur inadvertently as where more time than usual has gone by between communications, when a relationship is first being formed and is progressing, when an event occurs to change the relationship, etc.
  • Similarly, the Richard/Charlie friendship attribute can be defined by a parameter associated with Richard's profile or intent data. This number need not be the same as the Charlie/Richard friendship attribute. One feature allows checking the recipients' corresponding parameter and using the recipient parameter to alert the sender or to modify the salutation. For example, if Charlie is sending Richard an email but it is detected that Richard's profile has a Richard/Charlie friendship value of 3 then a more formal salutation may be suggested than what Charlie had initially used. The exposure of different users' profile parameters to other users can be by consent of each user, as desired. Some parameters will not be so sensitive and can be made global by assumed consent of all users, or an administrator or other manager, business owner, or entity (e.g., government, parent, etc.) may have overriding authority to view, use, manipulate, manage or otherwise control parameters of others.
  • Other recipients' relationship attributes can be taken into consideration. For example, the Jory/Charlie relationship attributes can have an effect on how the salutation and content of the email is monitored and analyzed and on possible actions if a discrepancy is determined. For example, if Charlie attempts to use the salutation “Rich Wazzup!” in an email to Richard that also copies Jory where the Charlie/Richard friendship value is 10 and but the Jory/Charlie friendship attribute value is 5 and the Jory/Charlie professional attribute value is 10 then the salutation can be flagged to require affirmative approval from Charlie before the message is sent. Approval might be a dialogue box or other alert displayed that requires a “yes” or “no” selection after Charlie indicates the message is to be sent. Naturally, many variations on use of relationship attributes to determine intent are possible.
  • A similar analysis to that described above with respect to including text can be used to check for text that should be removed or modified. For example, line 114 of FIG. 2A states “BTW, did I tell you that a patent I wrote got licensed for $100M?” The monitoring process can record such statements and if a similar or identical statement had previously been sent to the same user then the statement can be flagged for possible deletion or modification by the sender. This approach can be used to send different variations to different users. In the example of FIG. 2A, if Richard had been provided with text similar to line 114 in the past but Jory was not, then two versions of the email can be automatically sent (or sent upon approval after informing the author, Charlie) so that Jory receives line 114 but Richard does not. A variation of this approach is to show Richard that line 114 is a repeated statement but was sent anyway for Jory's benefit. This might be shown by having line 114 grayed, or dimmed, in Richard's copy of the message. Or an annotation can be made on, adjacent to, or otherwise associated with line 114's text such as “for Jory's benefit” or “—previously sent text omitted - - - ,” “Jory” etc. This approach can be especially useful where the amount of text is lengthy or may be sensitive to an individual. In general, any manner of suitable indication can be used to show that text has been included and/or removed specifically for one or more recipients but not for all recipients. In some applications, no indication to the recipients may be needed, or desired.
  • One feature of the invention provides for “second order effects” whereby a first user's intent is checked not only when the first user sends an email to a second user (a “first order effect”) but also when the second user (or a different user) sends the first user's text to a third user (a “second order effect”). For example, if Charlie had included text to Richard and Richard then forwards that email to Jory, a second order effect might remove or modify a portion the text if the text was redundant, offending, restricted, etc. Another example is where text is intended for only a few people or for internal organization use. If text from the first user is attempted to be sent to a person not in a predetermined list, outside of an organization, etc. then the first user's approval may be required before the email can be sent by a subsequent user. In general, any of the operations described herein for a first order effect can be applied to a second order effect, or to any subsequent forwarding or re-sending of the first user's communication, as desired.
  • FIG. 2B shows Richard's response to Charlie's initial email. An additional recipient, Jacques, has been BCCed so that Jacques email address or the fact that Jacques had been copied is not apparent to the recipients Jory and Charlie. One feature checks for types of content that a person, company or other entity may want to restrict and ensures that non-approved people are not sent the restricted information. For example, a check could be made to look for keywords for legal or patent-specific terms. If an attempt is made to send the content to a person who is not on a pre-approved list then an alert in the form of a dialogue box can be displayed to the sender stating the determination that has been made and asking for affirmative approval to send the email. One check would include whether an attorney or other specialized consultant who is likely to generate or be copied on sensitive material is involved in a message distribution or thread. If so, and if it is also determined that others are copied who have not previously participated in these types of correspondence, then an alert mechanism can be invoked.
  • FIG. 2C illustrates Jacques' response to Richard's email. In this case Jacques has inadvertently copied everyone in the thread including Charlie who was not an intended recipient. One feature of the invention checks for whether a first-time recipient is the result of replying to an email sent by another person. Often when a first person is sending an email to another for the first time there should be a polite salutation or introduction. In a case where someone is being sent an email for the first time in the CC or BCC lines such an alert can be used to verify (e.g., by requiring affirmative assent from the sender) that the email should go to the first-time recipient. This can be especially useful in situations where message tone (e.g., angry, informal, etc.) is determined as not suitable for someone that is being sent a message for the first time. Tone can be determined by, for example, using natural language processing techniques, by looking for keywords (e.g., slang, cursing), by detecting punctuation (e.g., exclamation marks, capitalization of words, phrases or sentences, etc.).
  • Similarly, Charlie's response to Jacques' email can be analyzed with regard to this being a first-time reply to a person who has an email domain of a client. The tone in Charlie's reply could be detected by various processing methods, described above. Additionally, the early morning time of sending the message can be used in evaluating the appropriateness of the message. In such cases a “hold” on sending the message can be imposed so that approval after a few hours is required to send the message. Other variations on detecting inappropriate messages can include requiring the sender to perform an action that requires patience, self-awareness or introspection, such as solving a puzzle, answering a question, performing a sobriety test, etc. The results from such actions or tests can be provided to the control process or another process in the system to decide whether the message should be sent, held, modified, or to have other action taken.
  • Although particular embodiments of the invention have been described, variations of such embodiments are possible and are within the scope of the invention. For example, although intent or intention data has been discussed as the basis for determining how communications are handled, other types of data can be used including behavior, intentions of others with respect to a sender's message, etc. Some features of the invention may be applied to non-text and non-visual information such as to voice transmissions.
  • Any suitable programming language can be used to implement the functionality of the present invention including C, C++, Java, assembly language, etc. Different programming techniques can be employed such as procedural or object oriented. The routines can execute on a single processing device or multiple processors. Although the steps, operations or computations may be presented in a specific order, this order may be changed in different embodiments unless otherwise specified. In some embodiments, multiple steps shown as sequential in this specification can be performed at the same time. The sequence of operations described herein can be interrupted, suspended, or otherwise controlled by another process, such as an operating system, kernel, etc. The routines can operate in an operating system environment or as stand-alone routines occupying all, or a substantial part, of the system processing. The functions may be performed in hardware, software or a combination of both.
  • In the description herein, numerous specific details are provided, such as examples of components and/or methods, to provide a thorough understanding of embodiments of the present invention. One skilled in the relevant art will recognize, however, that an embodiment of the invention can be practiced without one or more of the specific details, or with other apparatus, systems, assemblies, methods, components, materials, parts, and/or the like. In other instances, well-known structures, materials, or operations are not specifically shown or described in detail to avoid obscuring aspects of embodiments of the present invention.
  • A “computer-readable medium” for purposes of embodiments of the present invention may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, system or device. The computer readable medium can be, by way of example only but not by limitation, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, system, device, propagation medium, or computer memory.
  • A “processor” or “process” includes any human, hardware and/or software system, mechanism or component that processes data, signals or other information. A processor can include a system with a general-purpose central processing unit, multiple processing units, dedicated circuitry for achieving functionality, or other systems. Processing need not be limited to a geographic location, or have temporal limitations. Functions and parts of functions described herein can be achieved by devices in different places and operating at different times. For example, a processor can perform its functions in “real time,” “offline,” in a “batch mode,” etc. Parallel, distributed or other processing approaches can be used.
  • Reference throughout this specification to “one embodiment”, “an embodiment”, “a particular embodiment,” or “a specific embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention and not necessarily in all embodiments. Thus, respective appearances of the phrases “in one embodiment”, “in an embodiment”, or “in a specific embodiment” in various places throughout this specification are not necessarily referring to the same embodiment. Furthermore, the particular features, structures, or characteristics of any specific embodiment of the present invention may be combined in any suitable manner with one or more other embodiments. It is to be understood that other variations and modifications of the embodiments of the present invention described and illustrated herein are possible in light of the teachings herein and are to be considered as part of the spirit and scope of the present invention.
  • Embodiments of the invention may be implemented by using a programmed general purpose digital computer, by using application specific integrated circuits, programmable logic devices, field programmable gate arrays, optical, chemical, biological, quantum or nanoengineered systems, components and mechanisms may be used. In general, the functions of the present invention can be achieved by any means as is known in the art. For example, distributed, networked systems, components and/or circuits can be used. Communication, or transfer, of data may be wired, wireless, or by any other means.
  • It will also be appreciated that one or more of the elements depicted in the drawings/figures can also be implemented in a more separated or integrated manner, or even removed or rendered as inoperable in certain cases, as is useful in accordance with a particular application. It is also within the spirit and scope of the present invention to implement a program or code that can be stored in a machine-readable medium to permit a computer to perform any of the methods described above.
  • Additionally, any signal arrows in the drawings/Figures should be considered only as exemplary, and not limiting, unless otherwise specifically noted. Furthermore, the term “or” as used herein is generally intended to mean “and/or” unless otherwise indicated. Combinations of components or steps will also be considered as being noted, where terminology is foreseen as rendering the ability to separate or combine is unclear.
  • As used in the description herein and throughout the claims that follow, “a”, “an”, and “the” includes plural references unless the context clearly dictates otherwise. Also, as used in the description herein and throughout the claims that follow, the meaning of “in” includes “in” and “on” unless the context clearly dictates otherwise.
  • The foregoing description of illustrated embodiments of the present invention, including what is described in the Abstract, is not intended to be exhaustive or to limit the invention to the precise forms disclosed herein. While specific embodiments of, and examples for, the invention are described herein for illustrative purposes only, various equivalent modifications are possible within the spirit and scope of the present invention, as those skilled in the relevant art will recognize and appreciate. As indicated, these modifications may be made to the present invention in light of the foregoing description of illustrated embodiments of the present invention and are to be included within the spirit and scope of the present invention.
  • Thus, while the present invention has been described herein with reference to particular embodiments thereof, a latitude of modification, various changes and substitutions are intended in the foregoing disclosures, and it will be appreciated that in some instances some features of embodiments of the invention will be employed without a corresponding use of other features without departing from the scope and spirit of the invention as set forth. Therefore, many modifications may be made to adapt a particular situation or material to the essential scope and spirit of the present invention. It is intended that the invention not be limited to the particular terms used in following claims and/or to the particular embodiment disclosed as the best mode contemplated for carrying out this invention, but that the invention will include any and all embodiments and equivalents falling within the scope of the appended claims.
  • Thus, the scope of the invention is to be determined solely by the appended claims.

Claims (30)

1. A method for processing an electronic communication, the method comprising:
obtaining intention data, wherein the intention data indicates an intent of a user with respect to the user's electronic communications;
accepting a signal from an input device to define content for a present electronic communication;
determining that the present electronic communication is associated with the user;
detecting a deficiency by analyzing at least a portion of the present electronic communication and the intention data; and
performing an act to correct the deficiency.
2. The method of claim 1, wherein the intention data is derived from prior electronic communications associated with the user.
3. The method of claim 2, further comprising:
recording a pattern of the user's prior electronic communications;
determining that the present electronic communication does not fit the recorded pattern; and
modifying the present electronic communication to fit the pattern.
4. The method of claim 3, wherein the modifying is done at least in part automatically.
5. The method of claim 4, wherein the modifying is done at least in part manually.
6. The method of claim 3, wherein the recorded pattern includes an analysis of responses to the user's prior electronic communications.
7. The method of claim 3, wherein the recorded pattern includes characteristics of typical responses.
8. The method of claim 3, wherein the recorded pattern includes header properties.
9. The method of claim 3, wherein the recorded pattern includes determining a similarity to prior electronic communications.
10. The method of claim 9, further comprising:
alerting the user at a time of creating present content that at least a portion of the present content is identical to at least a portion of prior content.
11. The method of claim 9, further comprising:
using elapsed time between transmission of prior electronic communications in determining the similarity to prior electronic communications.
12. The method of claim 3, wherein the recorded pattern includes data about prior recipients of the user's electronic communications, the method further comprising:
analyzing the present electronic communication to determine an established human psychological factor present in the present electronic communication;
comparing the determined established human psychological factor with the present electronic communication; and
alerting the user if the present electronic communication deviates by more than a threshold amount from the established human psychological factor.
13. The method of claim 12, wherein the established human psychological factor includes a measure of the user.
14. The method of claim 12, wherein the established human psychological factor includes a measure of an intended recipient.
15. The method of claim 12, wherein the established human psychological factor includes a measure of affection.
16. The method of claim 12, wherein the established human psychological factor includes a measure of anger.
17. The method of claim 12, wherein the established human psychological factor includes a measure of style of the present electronic communication.
18. The method of claim 3, wherein the recorded pattern includes a measure of a time of response to prior electronic communications.
19. The method of claim 1, further comprising:
holding the electronic communication before transmission.
20. The method of claim 1, further comprising:
displaying a prompt to the user regarding at least a portion of the electronic communication that fails to meet a criterion based at least in part on the intention data.
21. The method of claim 20, further comprising:
requiring the user to perform a task before transmission of the present electronic communication.
22. The method of claim 21, wherein the task includes:
entering a password.
23. The method of claim 21, wherein the task includes:
solving a puzzle.
24. The method of claim 21, wherein the task includes:
performing a sobriety test.
25. The method of claim 1, further comprising:
displaying a suggested modification to the user regarding at least a portion of the electronic communication that fails to meet a criterion based at least in part on the intention data.
26. The method of claim 1,
27. The method of claim 1, further comprising:
indicating to the user a reason that the electronic communication fails to meet a criterion based at least in part on the intention data.
28. The method of claim 1, wherein the intention data is obtained at least in part from information in the user's email in-box.
29. The method of claim 1, wherein the intention data is obtained at least in part from information in the user's email sent items.
30. The method of claim 1, wherein the intention data is obtained at least in part from information on a server computer that sends electronic transmissions.
US12/044,892 2008-03-07 2008-03-07 Checking electronic messages for compliance with user intent Abandoned US20090228583A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/044,892 US20090228583A1 (en) 2008-03-07 2008-03-07 Checking electronic messages for compliance with user intent
US12/756,435 US9141940B2 (en) 2008-03-07 2010-04-08 Checking electronic messages for compliance with user intent

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/044,892 US20090228583A1 (en) 2008-03-07 2008-03-07 Checking electronic messages for compliance with user intent

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/756,435 Continuation US9141940B2 (en) 2008-03-07 2010-04-08 Checking electronic messages for compliance with user intent

Publications (1)

Publication Number Publication Date
US20090228583A1 true US20090228583A1 (en) 2009-09-10

Family

ID=41054746

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/044,892 Abandoned US20090228583A1 (en) 2008-03-07 2008-03-07 Checking electronic messages for compliance with user intent
US12/756,435 Active 2029-01-24 US9141940B2 (en) 2008-03-07 2010-04-08 Checking electronic messages for compliance with user intent

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/756,435 Active 2029-01-24 US9141940B2 (en) 2008-03-07 2010-04-08 Checking electronic messages for compliance with user intent

Country Status (1)

Country Link
US (2) US20090228583A1 (en)

Cited By (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100115033A1 (en) * 2008-10-30 2010-05-06 Microsoft Corporation Do not disturb filter for electronic messages
US20100122340A1 (en) * 2008-11-13 2010-05-13 Palo Alto Research Center Incorporated Enterprise password reset
US20100169445A1 (en) * 2008-12-26 2010-07-01 International Business Machines Corporation Device, method, and computer program product for supporting creation of reply mail
US20100198931A1 (en) * 2008-03-07 2010-08-05 Richard Pocklington Checking electronic messages for compliance with user intent
US20110055175A1 (en) * 2009-08-27 2011-03-03 International Business Machines System, method, and apparatus for management of media objects
US7921174B1 (en) * 2009-07-24 2011-04-05 Jason Adam Denise Electronic communication reminder technology
WO2012005804A1 (en) * 2010-07-09 2012-01-12 Bank Of America Corporation Monitoring communications
US20130179440A1 (en) * 2012-01-10 2013-07-11 Merlyn GORDON Identifying individual intentions and determining responses to individual intentions
US20130191898A1 (en) * 2012-01-04 2013-07-25 Harold H. KRAFT Identity verification credential with continuous verification and intention-based authentication systems and methods
US20150081824A1 (en) * 2012-07-05 2015-03-19 Microsoft Technology Licensing, Llc. Forgotten Attachment Detection
US20150304261A1 (en) * 2012-11-30 2015-10-22 Conversepoint Llc Systems and methods for echoing or redirecting electronic messages in a conversation
US20160269452A1 (en) * 2015-03-10 2016-09-15 International Business Machines Corporation Allow hidden and silent observers in a group conversation
US20170185591A1 (en) * 2015-12-23 2017-06-29 Yahoo! Inc. Method and system for automatic formality classification
US9847973B1 (en) * 2016-09-26 2017-12-19 Agari Data, Inc. Mitigating communication risk by detecting similarity to a trusted message contact
US20180091455A1 (en) * 2016-09-23 2018-03-29 Microsoft Technology Licensing, Llc. Recipient verification
US20180213043A1 (en) * 2017-01-25 2018-07-26 International Business Machines Corporation System and method to download file from common recipient devices in proximity
US10129194B1 (en) 2012-02-13 2018-11-13 ZapFraud, Inc. Tertiary classification of communications
US10171404B2 (en) * 2008-09-27 2019-01-01 International Business Machines Corporation Reply to most recent message
US10277628B1 (en) 2013-09-16 2019-04-30 ZapFraud, Inc. Detecting phishing attempts
US10353542B2 (en) * 2015-04-02 2019-07-16 Facebook, Inc. Techniques for context sensitive illustrated graphical user interface elements
US10361981B2 (en) 2015-05-15 2019-07-23 Microsoft Technology Licensing, Llc Automatic extraction of commitments and requests from communications and content
US10674009B1 (en) 2013-11-07 2020-06-02 Rightquestion, Llc Validating automatic number identification data
US10715543B2 (en) 2016-11-30 2020-07-14 Agari Data, Inc. Detecting computer security risk based on previously observed communications
US10721195B2 (en) 2016-01-26 2020-07-21 ZapFraud, Inc. Detection of business email compromise
US10805409B1 (en) 2015-02-10 2020-10-13 Open Invention Network Llc Location based notifications
US10805314B2 (en) 2017-05-19 2020-10-13 Agari Data, Inc. Using message context to evaluate security of requested data
US10880322B1 (en) 2016-09-26 2020-12-29 Agari Data, Inc. Automated tracking of interaction with a resource of a message
US10984387B2 (en) 2011-06-28 2021-04-20 Microsoft Technology Licensing, Llc Automatic task extraction and calendar entry
US11019076B1 (en) 2017-04-26 2021-05-25 Agari Data, Inc. Message security assessment using sender identity profiles
US11044267B2 (en) 2016-11-30 2021-06-22 Agari Data, Inc. Using a measure of influence of sender in determining a security risk associated with an electronic message
US11102244B1 (en) 2017-06-07 2021-08-24 Agari Data, Inc. Automated intelligence gathering
US11245654B2 (en) 2019-07-02 2022-02-08 International Business Machines Corporation System and method to create global conversation thread across communication channels
US20220138880A1 (en) * 2018-03-23 2022-05-05 Tingying Zeng Teaching method system for connecting and applying research needs with a teaching method
US11373039B2 (en) * 2019-09-26 2022-06-28 International Business Machines Corporation Content context aware message intent checker
US11398996B2 (en) * 2019-07-02 2022-07-26 International Business Machines Corporation System and method to create global conversation thread across communication channels
US11411894B2 (en) * 2013-12-31 2022-08-09 Google Llc Determining strength of association between user contacts
US11502976B1 (en) * 2021-02-18 2022-11-15 Walgreen Co. Automated agent messaging system
US11722513B2 (en) 2016-11-30 2023-08-08 Agari Data, Inc. Using a measure of influence of sender in determining a security risk associated with an electronic message
US11757914B1 (en) 2017-06-07 2023-09-12 Agari Data, Inc. Automated responsive message to determine a security risk of a message sender
US20230421518A1 (en) * 2022-06-23 2023-12-28 Rovi Guides, Inc. Systems and methods for a smart message alert and recall
US11936604B2 (en) 2016-09-26 2024-03-19 Agari Data, Inc. Multi-level security analysis and intermediate delivery of an electronic message

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8700072B2 (en) 2008-12-23 2014-04-15 At&T Mobility Ii Llc Scalable message fidelity
US8566403B2 (en) * 2008-12-23 2013-10-22 At&T Mobility Ii Llc Message content management system
US9443226B2 (en) * 2009-01-12 2016-09-13 Sri International Electronic assistant for making predictions based on user messages
US8990315B2 (en) * 2010-03-09 2015-03-24 International Business Machines Corporation Sending messages with limited awareness of recipients
US9406048B2 (en) * 2010-07-07 2016-08-02 Mark Meister Email system for preventing inadvertant transmission of propriety message or documents to unintended recipient
US9171291B2 (en) 2012-04-26 2015-10-27 Blackberry Limited Electronic device and method for updating message body content based on recipient changes
US9406049B2 (en) * 2012-04-26 2016-08-02 Blackberry Limited Electronic device and method for updating message recipients based on message body indicators
EP3028243A1 (en) * 2013-07-30 2016-06-08 Hewlett Packard Enterprise Development LP Determining topic relevance of an email thread
US10171400B2 (en) 2014-04-28 2019-01-01 International Business Machines Corporation Using organizational rank to facilitate electronic communication
US20180089308A1 (en) 2016-09-27 2018-03-29 International Business Machines Corporation Notification of potentially problematic textual messages
US20180262457A1 (en) * 2017-03-09 2018-09-13 Microsoft Technology Licensing, Llc Self-debugging of electronic message bugs
US10645044B2 (en) 2017-03-24 2020-05-05 International Business Machines Corporation Document processing
US10803250B2 (en) * 2018-08-23 2020-10-13 International Business Machines Corporation Control of message transmission
KR20200066933A (en) * 2018-12-03 2020-06-11 삼성전자주식회사 Electronic device and Method of controlling thereof
US11190470B2 (en) 2019-02-27 2021-11-30 International Business Machines Corporation Attachment analytics for electronic communications
US10965624B2 (en) * 2019-04-25 2021-03-30 Microsoft Technology Licensing, Llc Targeted auto-response messaging
US11876769B2 (en) * 2020-06-17 2024-01-16 Zafar Khan System and method for generating recommendations and transforming a message and providing a redacted reply service
US11665125B2 (en) 2020-08-26 2023-05-30 International Business Machines Corporation Message renotification
US20220131896A1 (en) * 2020-10-26 2022-04-28 Mcafee, Llc Contextual Data Security
US11916865B1 (en) 2022-03-17 2024-02-27 TagInbox Corporation Methods and systems for organizing and managing electronic messages

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040103162A1 (en) * 1999-06-28 2004-05-27 Mark Meister E-mail system with user send authorization
US20050278430A1 (en) * 2004-05-28 2005-12-15 International Business Machines Corp. Warning and avoidance of sending email messages to unintended recipients
US20060026246A1 (en) * 2004-07-08 2006-02-02 Fukuhara Keith T System and method for authorizing delivery of E-mail and reducing spam
US20060031338A1 (en) * 2004-08-09 2006-02-09 Microsoft Corporation Challenge response systems
US20060047766A1 (en) * 2004-08-30 2006-03-02 Squareanswer, Inc. Controlling transmission of email
US20090177617A1 (en) * 2008-01-03 2009-07-09 Apple Inc. Systems, methods and apparatus for providing unread message alerts
US20090210504A1 (en) * 2008-02-14 2009-08-20 Gary Stephen Shuster Erroneous addressing prevention for electronic messaging

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004001558A2 (en) * 2002-06-25 2003-12-31 Abs Software Partners Llc System and method for online monitoring of and interaction with chat and instant messaging participants
US20090228583A1 (en) * 2008-03-07 2009-09-10 Oqo, Inc. Checking electronic messages for compliance with user intent

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040103162A1 (en) * 1999-06-28 2004-05-27 Mark Meister E-mail system with user send authorization
US20050278430A1 (en) * 2004-05-28 2005-12-15 International Business Machines Corp. Warning and avoidance of sending email messages to unintended recipients
US20060026246A1 (en) * 2004-07-08 2006-02-02 Fukuhara Keith T System and method for authorizing delivery of E-mail and reducing spam
US20060031338A1 (en) * 2004-08-09 2006-02-09 Microsoft Corporation Challenge response systems
US20060047766A1 (en) * 2004-08-30 2006-03-02 Squareanswer, Inc. Controlling transmission of email
US20090177617A1 (en) * 2008-01-03 2009-07-09 Apple Inc. Systems, methods and apparatus for providing unread message alerts
US20090210504A1 (en) * 2008-02-14 2009-08-20 Gary Stephen Shuster Erroneous addressing prevention for electronic messaging

Cited By (81)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100198931A1 (en) * 2008-03-07 2010-08-05 Richard Pocklington Checking electronic messages for compliance with user intent
US9141940B2 (en) * 2008-03-07 2015-09-22 Google Inc. Checking electronic messages for compliance with user intent
US10171404B2 (en) * 2008-09-27 2019-01-01 International Business Machines Corporation Reply to most recent message
US20100115033A1 (en) * 2008-10-30 2010-05-06 Microsoft Corporation Do not disturb filter for electronic messages
US7996476B2 (en) * 2008-10-30 2011-08-09 Microsoft Corporation Do not disturb filter for electronic messages
US20100122340A1 (en) * 2008-11-13 2010-05-13 Palo Alto Research Center Incorporated Enterprise password reset
US8881266B2 (en) * 2008-11-13 2014-11-04 Palo Alto Research Center Incorporated Enterprise password reset
US8359359B2 (en) * 2008-12-26 2013-01-22 International Business Machines Corporation Device, method, and computer program product for supporting creation of reply mail
US20100169445A1 (en) * 2008-12-26 2010-07-01 International Business Machines Corporation Device, method, and computer program product for supporting creation of reply mail
US8661087B2 (en) 2009-07-24 2014-02-25 Google Inc. Electronic communication reminder technology
US8352561B1 (en) 2009-07-24 2013-01-08 Google Inc. Electronic communication reminder technology
US8224917B1 (en) 2009-07-24 2012-07-17 Google Inc. Electronic communication reminder technology
US7921174B1 (en) * 2009-07-24 2011-04-05 Jason Adam Denise Electronic communication reminder technology
US8046418B1 (en) 2009-07-24 2011-10-25 Jason Adam Denise Electronic communication reminder technology
US9137181B2 (en) 2009-07-24 2015-09-15 Google Inc. Electronic communication reminder technology
US8768846B2 (en) * 2009-08-27 2014-07-01 International Business Machines Corporation System, method, and apparatus for management of media objects
US20110055175A1 (en) * 2009-08-27 2011-03-03 International Business Machines System, method, and apparatus for management of media objects
WO2012005804A1 (en) * 2010-07-09 2012-01-12 Bank Of America Corporation Monitoring communications
US8832049B2 (en) 2010-07-09 2014-09-09 Bank Of America Corporation Monitoring communications
US10984387B2 (en) 2011-06-28 2021-04-20 Microsoft Technology Licensing, Llc Automatic task extraction and calendar entry
US20130191898A1 (en) * 2012-01-04 2013-07-25 Harold H. KRAFT Identity verification credential with continuous verification and intention-based authentication systems and methods
US9547832B2 (en) * 2012-01-10 2017-01-17 Oracle International Corporation Identifying individual intentions and determining responses to individual intentions
US20130179440A1 (en) * 2012-01-10 2013-07-11 Merlyn GORDON Identifying individual intentions and determining responses to individual intentions
US10129194B1 (en) 2012-02-13 2018-11-13 ZapFraud, Inc. Tertiary classification of communications
US10581780B1 (en) 2012-02-13 2020-03-03 ZapFraud, Inc. Tertiary classification of communications
US10129195B1 (en) 2012-02-13 2018-11-13 ZapFraud, Inc. Tertiary classification of communications
US10812427B2 (en) * 2012-07-05 2020-10-20 Microsoft Technology Licensing, Llc Forgotten attachment detection
US9843544B2 (en) * 2012-07-05 2017-12-12 Microsoft Technology Licensing, Llc Forgotten attachment detection
US20150081824A1 (en) * 2012-07-05 2015-03-19 Microsoft Technology Licensing, Llc. Forgotten Attachment Detection
US20180102998A1 (en) * 2012-07-05 2018-04-12 Microsoft Technology Licensing, Llc Forgotten attachment detection
US20150304261A1 (en) * 2012-11-30 2015-10-22 Conversepoint Llc Systems and methods for echoing or redirecting electronic messages in a conversation
US10609073B2 (en) 2013-09-16 2020-03-31 ZapFraud, Inc. Detecting phishing attempts
US10277628B1 (en) 2013-09-16 2019-04-30 ZapFraud, Inc. Detecting phishing attempts
US11729211B2 (en) 2013-09-16 2023-08-15 ZapFraud, Inc. Detecting phishing attempts
US11005989B1 (en) 2013-11-07 2021-05-11 Rightquestion, Llc Validating automatic number identification data
US11856132B2 (en) 2013-11-07 2023-12-26 Rightquestion, Llc Validating automatic number identification data
US10674009B1 (en) 2013-11-07 2020-06-02 Rightquestion, Llc Validating automatic number identification data
US10694029B1 (en) 2013-11-07 2020-06-23 Rightquestion, Llc Validating automatic number identification data
US11876760B2 (en) 2013-12-31 2024-01-16 Google Llc Determining strength of association between user contacts
US11411894B2 (en) * 2013-12-31 2022-08-09 Google Llc Determining strength of association between user contacts
US11245771B1 (en) 2015-02-10 2022-02-08 Open Invention Network Llc Location based notifications
US10805409B1 (en) 2015-02-10 2020-10-13 Open Invention Network Llc Location based notifications
US20160269452A1 (en) * 2015-03-10 2016-09-15 International Business Machines Corporation Allow hidden and silent observers in a group conversation
US9912618B2 (en) * 2015-03-10 2018-03-06 International Business Machines Corporation Allow hidden and silent observers in a group conversation
US9948581B2 (en) 2015-03-10 2018-04-17 International Business Machines Corporation Allow hidden and silent observers in a group conversation
US10353542B2 (en) * 2015-04-02 2019-07-16 Facebook, Inc. Techniques for context sensitive illustrated graphical user interface elements
US11644953B2 (en) 2015-04-02 2023-05-09 Meta Platforms, Inc. Techniques for context sensitive illustrated graphical user interface elements
US11221736B2 (en) 2015-04-02 2022-01-11 Facebook, Inc. Techniques for context sensitive illustrated graphical user interface elements
US10361981B2 (en) 2015-05-15 2019-07-23 Microsoft Technology Licensing, Llc Automatic extraction of commitments and requests from communications and content
US11669698B2 (en) 2015-12-23 2023-06-06 Yahoo Assets Llc Method and system for automatic formality classification
US10740573B2 (en) * 2015-12-23 2020-08-11 Oath Inc. Method and system for automatic formality classification
US20170185591A1 (en) * 2015-12-23 2017-06-29 Yahoo! Inc. Method and system for automatic formality classification
US10721195B2 (en) 2016-01-26 2020-07-21 ZapFraud, Inc. Detection of business email compromise
US11595336B2 (en) 2016-01-26 2023-02-28 ZapFraud, Inc. Detecting of business email compromise
US10560412B2 (en) * 2016-09-23 2020-02-11 Microsoft Technology Licensing, Llc Recipient verification
US20180091455A1 (en) * 2016-09-23 2018-03-29 Microsoft Technology Licensing, Llc. Recipient verification
US10880322B1 (en) 2016-09-26 2020-12-29 Agari Data, Inc. Automated tracking of interaction with a resource of a message
US10992645B2 (en) 2016-09-26 2021-04-27 Agari Data, Inc. Mitigating communication risk by detecting similarity to a trusted message contact
US10805270B2 (en) 2016-09-26 2020-10-13 Agari Data, Inc. Mitigating communication risk by verifying a sender of a message
US11936604B2 (en) 2016-09-26 2024-03-19 Agari Data, Inc. Multi-level security analysis and intermediate delivery of an electronic message
US9847973B1 (en) * 2016-09-26 2017-12-19 Agari Data, Inc. Mitigating communication risk by detecting similarity to a trusted message contact
US11595354B2 (en) 2016-09-26 2023-02-28 Agari Data, Inc. Mitigating communication risk by detecting similarity to a trusted message contact
US10326735B2 (en) 2016-09-26 2019-06-18 Agari Data, Inc. Mitigating communication risk by detecting similarity to a trusted message contact
US10715543B2 (en) 2016-11-30 2020-07-14 Agari Data, Inc. Detecting computer security risk based on previously observed communications
US11722513B2 (en) 2016-11-30 2023-08-08 Agari Data, Inc. Using a measure of influence of sender in determining a security risk associated with an electronic message
US11044267B2 (en) 2016-11-30 2021-06-22 Agari Data, Inc. Using a measure of influence of sender in determining a security risk associated with an electronic message
US20180213043A1 (en) * 2017-01-25 2018-07-26 International Business Machines Corporation System and method to download file from common recipient devices in proximity
US11888924B2 (en) 2017-01-25 2024-01-30 International Business Machines Corporation System and method to download file from common recipient devices in proximity
US10715581B2 (en) * 2017-01-25 2020-07-14 International Business Machines Corporation System and method to download file from common recipient devices in proximity
US11722497B2 (en) * 2017-04-26 2023-08-08 Agari Data, Inc. Message security assessment using sender identity profiles
US11019076B1 (en) 2017-04-26 2021-05-25 Agari Data, Inc. Message security assessment using sender identity profiles
US20210234870A1 (en) * 2017-04-26 2021-07-29 Agari Data, Inc. Message security assessment using sender identity profiles
US10805314B2 (en) 2017-05-19 2020-10-13 Agari Data, Inc. Using message context to evaluate security of requested data
US11102244B1 (en) 2017-06-07 2021-08-24 Agari Data, Inc. Automated intelligence gathering
US11757914B1 (en) 2017-06-07 2023-09-12 Agari Data, Inc. Automated responsive message to determine a security risk of a message sender
US20220138880A1 (en) * 2018-03-23 2022-05-05 Tingying Zeng Teaching method system for connecting and applying research needs with a teaching method
US11245654B2 (en) 2019-07-02 2022-02-08 International Business Machines Corporation System and method to create global conversation thread across communication channels
US11398996B2 (en) * 2019-07-02 2022-07-26 International Business Machines Corporation System and method to create global conversation thread across communication channels
US11373039B2 (en) * 2019-09-26 2022-06-28 International Business Machines Corporation Content context aware message intent checker
US11502976B1 (en) * 2021-02-18 2022-11-15 Walgreen Co. Automated agent messaging system
US20230421518A1 (en) * 2022-06-23 2023-12-28 Rovi Guides, Inc. Systems and methods for a smart message alert and recall

Also Published As

Publication number Publication date
US9141940B2 (en) 2015-09-22
US20100198931A1 (en) 2010-08-05

Similar Documents

Publication Publication Date Title
US9141940B2 (en) Checking electronic messages for compliance with user intent
US11595353B2 (en) Identity-based messaging security
US11902234B2 (en) Prohibited content propagation using a social network data structure
US8769022B2 (en) System and method for evaluating outbound messages
US9058590B2 (en) Content upload safety tool
US7774421B2 (en) Mitigating address book weaknesses that permit the sending of e-mail to wrong addresses
JP5406842B2 (en) E-mail communication pre-send evaluation
US20040064734A1 (en) Electronic message system
US20030200267A1 (en) Email management system
US20080162652A1 (en) System for Applying a Variety of Policies and Actions to Electronic Messages Before they Leave the Control of the Message Originator
US20030229672A1 (en) Enforceable spam identification and reduction system, and method thereof
US20120023182A1 (en) Security classification of e-mail in a web e-mail access client
US9032038B2 (en) Recipient control system for ensuring non-conflicting and comprehensive distribution of digital information and method thereof
US9990506B1 (en) Systems and methods of securing network-accessible peripheral devices
US20070192419A1 (en) Method and system for restricting automatic out-of-office email response to configured zone
US9619664B2 (en) Systems and methods for handling electronic messages
US10764220B1 (en) Message abuse sender feedback loop
JP2006059297A (en) Wrong transmission preventing device of e-mail
US10356034B2 (en) Electronically processing bounceback messages from communications networks
US20100057874A1 (en) Preventing wrongful transmission of message content
WO2022046029A1 (en) Email recipients determinations
AU2014215972B2 (en) Method of and system for message classification of web email
Csirt RTIR incident handling work-flow
US20190199672A1 (en) Digital messaging prioritization within an organization
AU2003205033A1 (en) Electronic message system

Legal Events

Date Code Title Description
AS Assignment

Owner name: OQO, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:POCKLINGTON, RICHARD;BETTS-LACROIX, JONATHAN;REEL/FRAME:021384/0354;SIGNING DATES FROM 20080809 TO 20080811

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: ZETTA RESEARCH, LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OQO (ASSIGNMENT FOR THE BENEFIT OF CREDITORS), LLC;REEL/FRAME:024981/0267

Effective date: 20100203

Owner name: OQO (ASSIGNMENT FOR THE BENEFIT OF CREDITORS), LLC

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OQO, INC.;REEL/FRAME:024981/0193

Effective date: 20090519

AS Assignment

Owner name: GOOGLE INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ZETTA RESEARCH, LLC;REEL/FRAME:025723/0633

Effective date: 20110129

AS Assignment

Owner name: GOOGLE LLC, CALIFORNIA

Free format text: CHANGE OF NAME;ASSIGNOR:GOOGLE INC.;REEL/FRAME:044142/0357

Effective date: 20170929