US20070294428A1 - Method and System for Email Messaging - Google Patents
Method and System for Email Messaging Download PDFInfo
- Publication number
- US20070294428A1 US20070294428A1 US11/424,889 US42488906A US2007294428A1 US 20070294428 A1 US20070294428 A1 US 20070294428A1 US 42488906 A US42488906 A US 42488906A US 2007294428 A1 US2007294428 A1 US 2007294428A1
- Authority
- US
- United States
- Prior art keywords
- intended recipients
- groups
- recipients
- group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 62
- 230000008520 organization Effects 0.000 claims abstract description 42
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 claims description 9
- 229910052799 carbon Inorganic materials 0.000 claims description 9
- 238000004590 computer program Methods 0.000 claims description 3
- 238000012546 transfer Methods 0.000 claims description 3
- 230000004044 response Effects 0.000 claims description 2
- 238000011524 similarity measure Methods 0.000 claims description 2
- 230000015654 memory Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 10
- 230000009471 action Effects 0.000 description 6
- 238000012552 review Methods 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 238000012937 correction Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 235000006508 Nelumbo nucifera Nutrition 0.000 description 2
- 240000002853 Nelumbo nucifera Species 0.000 description 2
- 235000006510 Nelumbo pentapetala Nutrition 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 239000011159 matrix material Substances 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 241000295146 Gallionellaceae Species 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000003997 social interaction Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
Definitions
- This invention relates to the field of email messaging systems.
- this invention relates to preventing the sending of email messages to incorrect email recipients.
- Email messaging systems have become a regular form of communication for people in their work and social interactions.
- the use of email messages is particularly effective when communicating the same message to multiple recipients.
- the information that develops in a user's email application shows groups that the user communicates with.
- the groups may be defined by social activities, work, study, sport, committees, etc. This organizational information that exists in email messaging systems is very valuable to the user and any organization they work for.
- Email messages are often sent to incorrect addressees when the sender is sending an email to a group of recipients. Much of email messaging traffic is generated by email messages addressed to a group of recipients and handling these groups of contacts in a careful way is desired. This will lower the chances of a recipient receiving an irrelevant message as well as protecting the sender's privacy.
- a method for email messaging comprising: determining the intended recipients of an email message prior to sending, where there are two or more intended recipients; comparing the intended recipients to defined recipient groups; and providing a prompt to amend the intended recipients.
- the method includes identifying a potential error in the intended recipients compared to the defined recipient groups. Comparing the intended recipients to defined recipient groups may use a similarity measure to identify a potential error. The method may include comparing the intended recipients to defined recipient groups defined for a sender of the email message.
- the method includes identifying one or more of the defined groups which include the intended recipients, and providing a prompt to complete the list of intended recipients in accordance with an identified defined group.
- Providing a prompt to amend the intended recipients may provide a suggestion to replace, add or remove an intended recipient.
- the defined recipient groups may include one or more of: groups of recipients formed from an organization data structure, groups of recipients defined by a user, and groups of recipients mined from one or more user's previous email correspondence.
- An organization data structure may define a Boolean value for each pair of an individual in an organization and a group indicating the likelihood of the individual sending a message to the group.
- the method may include comparing the pair of the sender of the email message and the group of intended recipients with the Boolean value for the pair to identify a potential error.
- Groups of recipients may be mined from one or more user's previous email correspondence and ranked by the strength of the group.
- groups may be defined as the set of the sender of a previous email message and the recipients of the message, and a ranking is applied to the defined groups according to the number of messages and/or the date of the messages.
- groups may be defined by: building a graph with vertices of individuals who are senders and/or recipients of previous email messages joined by edges between individuals who correspond; and determining groups with many edges connecting vertices of a group and few edges between groups.
- Providing a prompt to amend the intended recipients may add recipients to the intended recipients to complete a defined recipient group.
- Providing a prompt to amend the intended recipients may also suggests moving intended recipients from a “to” addressee list to a blind carbon copy (“bcc”) addressee list, if the number of intended recipients exceeds a threshold value.
- a computer program product stored on a computer readable storage medium, comprising computer readable program code means for performing the steps of: determining the intended recipients of an email message prior to sending, where there are two or more intended recipients; comparing the intended recipients to defined recipient groups; and providing a prompt to amend the intended recipients.
- a system for email messaging comprising: a data structure of defined recipient groups; an agent including: means for determining the intended recipients of an email message prior to sending, where there are two or more intended recipients; and means for comparing the intended recipients to the defined recipient groups; and a prompt means on a graphical user interface to generate a prompt to amend the intended recipients.
- the agent may includes means for identifying a potential error in the intended recipients.
- the agent may include means for identifying one or more of the defined groups which includes the intended recipients, and the prompt means may generate a prompt to complete the list of intended recipients in accordance with an identified defined group.
- the agent may be provided as part of an email client application in which the email message is created.
- the agent may be provided by a server over a network to an email client application in which the email message is created.
- the data structure of predefined recipient groups may be an organization data structure.
- the data structure of predefined recipient groups may store recipient groups mined from one or more user's previous email correspondence.
- a method of providing a service to a customer over a network comprising the method steps of: determining the intended recipients of an email message prior to sending, where there are two or more intended recipients; comparing the intended recipients to defined recipient groups; and providing a prompt to amend the intended recipients.
- a method for email messaging comprising: determining the number of intended recipients of an email message prior to sending; determining if the number of intended recipients exceeds a predefined threshold number; and if the number of intended recipients exceeds the threshold number, providing a prompt to transfer the intended recipients to blind carbon copy (“bcc”) addressees.
- the intended recipients may be separate “to” or carbon copy (“cc”) addressees and the method may include automatically transferring addressees from “to” and/or carbon copy (“cc”) addressees following a user response to the prompt.
- the embodiments of the present invention include the advantage that the content of an email message is not used to determine the predefined recipient groups or when comparing the intended recipients to predefined recipient groups. This means that sensitive content data is not accessed and the method is language independent.
- the user input is also minimal as the user may accept or reject prompts to amend the intended recipients.
- FIG. 1 is a block diagram of an email system in accordance with embodiments of the present invention.
- FIG. 2 is a block diagram of a computer system in which the embodiments of the present invention may be implemented
- FIGS. 3A and 3B are examples of organization data structures used in accordance with embodiments of the present invention.
- FIG. 4 is a flow diagram of an overall method in accordance with embodiments of the present invention.
- FIGS. 5A to 5D are flow diagrams of methods of determining potential errors in addressee groups in accordance with embodiments of the present invention.
- FIGS. 6A to 6C are representations of graphical user interfaces in accordance with embodiments of the present invention.
- the described method and system provide a prompt when a user is forwarding, replying to, or sending an email message, to check if the email is intended to be sent to the message addressees.
- the described method and system provide an opportunistic approach which aims to prevent irrelevant email messages being sent.
- Email applications are extended in a way that assists email users in sending messages to the correct addressees in groups and helps users avoid common mistakes related to email addressee groups.
- the email user may be provided with appropriate recommendations and warnings, based an organizational chart, the user's own social or contact network, and other factors as described below.
- an email system 100 including an email user 101 who interacts with an email user interface 102 of an email client application 103 running on a client computer system 104 .
- the email client application 103 may be a stand alone email application or part of a combined scheduling and calendar application.
- the email client application 103 communicates via a network 105 with other client computer systems 106 - 108 each running their own email client application.
- a server system 110 provides an email server application 112 for the email client application 103 .
- the email client application 103 enables a user to organize their email messages by creating folders for storing mail 128 , searching through email messages, keeping an address book of people to whom the user sends email messages, creating group mailing lists, creating and adding a signature file, and many more functions.
- an agent 120 which reviews a list of intended recipients in an email message created by a user to check if the list of intended recipients is likely to include any incorrect recipients.
- the agent 120 reviews the list of intended recipients using a provided algorithm.
- a prompt 125 is provided in the form of a dialogue box on the email user interface 102 if the agent 120 determines that the user should review one or more of the intended recipients of the email message.
- the prompt 125 on the email user interface 102 may include appropriate recommendations, warnings, etc.
- the user 101 can select the relevant/irrelevant addressees and amend the email message appropriately or the user 101 can choose to disregard the prompt 125 .
- the agent 120 can be provided as part of the email client application 103 .
- the agent 120 can be provided as a service provided over a network from a server.
- An email user 101 can configure the agent 120 to provide the desired prompts 125 tailored to the user's requirements.
- This configuration of the agent 120 can include a complete disablement of the agent 120 .
- the agent 120 uses an algorithm to review the list of intended recipients.
- the algorithm is based on correct group data.
- the correct group data may be determined by any one or more of the following: predefined organizational groups, the groups defined by the user in his email application 103 , and/or groups previously used by the user.
- Predefined organizational groups can be provided by an organizational chart 122 which may be provided on an organization's server system 112 .
- the server system 112 on which the organization chart resides may be the same or different to the server system 110 of the email server application 112 .
- a user can define groups of recipients in his email client application 103 . These defined groups can be used as correct groupings by the agent 120 .
- a group monitor 124 determines groups or communities based on previous email correspondence of the user 101 .
- a data structure 126 holds a ranking of groups within which a user corresponds based on previous email correspondence.
- Each group includes meta-data such as a graph representing the internal relationships, the number of messages sent to it, and dates of correspondence. Based on this meta-data, the rank of the group is determined.
- the data structure is persistently stored either locally to the client system 104 , remotely on a server system 110 , 112 , or duplicated across a client/server system.
- an exemplary system for implementing a client system 104 includes a data processing system 200 suitable for storing and/or executing program code including at least one processor 201 coupled directly or indirectly to memory elements through a bus system 203 .
- the memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
- the memory elements may include system memory 202 in the form of read only memory (ROM) 204 and random access memory (RAM) 205 .
- ROM read only memory
- RAM random access memory
- a basic input/output system (BIOS) 206 may be stored in ROM 204 .
- System software 207 may be stored in RAM 205 including operating system software 208 .
- Software applications 210 may also be stored in RAM 205 .
- the system 200 may also include a primary storage means 211 such as a magnetic hard disk drive and secondary storage means 212 such as a magnetic disc drive and an optical disc drive.
- the drives and their associated computer-readable media provide non-volatile storage of computer-executable instructions, data structures, program modules and other data for the system 200 .
- Software applications may be stored on the primary and secondary storage means 211 , 212 as well as the system memory 202 .
- the computing system 200 may operate in a networked environment using logical connections to one or more remote computers via a network adapter 216 .
- Input/output devices 213 can be coupled to the system either directly or through intervening I/O controllers.
- a user may enter commands and information into the system 200 through input devices such as a keyboard, pointing device, or other input devices (for example, microphone, joy stick, game pad, satellite dish, scanner, or the like).
- Output devices may include speakers, printers, etc.
- a display device 214 is also connected to system bus 203 via an interface, such as video adapter 215 .
- the agent 120 uses correct group data to review a list of intended recipients. Correct group data is provided by different sources and provides reliable information on members belonging to recognised groups.
- Correct group data may be provided by an organization data structure defined for an organization.
- a data structure 122 may be provided on a server system 112 and accessed by the agent 120 of the email client application 103 via the network 105 .
- the organization data structure may be defined in many different ways but generally takes the form of a hierarchical data structure with members of the organization ordered in the hierarchy.
- Organization data structures may be defined for any form of organization and the user may have access to more than one organization data structure if he belongs to more than one organization, for example, his employer, professional body, committees, etc.
- FIGS. 3A and 3B of company structures two forms of organization data structures are shown in FIGS. 3A and 3B of company structures.
- a data structure 310 is shown in the form of a list hierarchy with a member's name 311 , position 312 , department 313 , and location 314 .
- the chief executive officer 314 of the company is listed at the top with members of the company provided in order of seniority with their department members.
- a data structure 320 is shown in the form of an organization chart with a chief executive officer 324 at the root node, with child nodes showing employees designated to each superior node.
- Information, relating to a member is provided at the node, for example, name 321 , position 322 , department 323 , and location 324 .
- groups can be retrieved by common elements, such as location, department, position or ranking, etc.
- Members of a group having one or more common elements are extracted from the data structure. For example, regional managers in United States, or trainees in the state of California, or legal department members across the organization, etc.
- the data structure defines a Boolean value for each pair of an individual and a group. This value indicates whether the individual is likely to send a message to the group. Groups are defined within the data structure for each recognisable set or sub-set of the structure.
- Boolean values are given in a matrix M that includes rows for all employees and columns for all groups whose size is larger than a threshold t. Each cell has a value of 1 if the employee is likely to send to the group, 0 otherwise.
- the values may be set by a system administrator or by a set of rules. The rules may be set according to organization data structure parameters. When employee x sends to group g whose size is larger than t, the value of M[x][g] is considered. If it is 0, an appropriate warning is issued.
- a rule may say that each employee is likely to send to the smallest group she belongs to.
- the rules should also take into account the level of the employee in the organization data structure hierarchy. Normally, the higher the level is, the larger the groups the employee is likely to send to.
- Correct group data may also be provided in an email client application 103 in which a user has defined correct group members under a group heading. For example, members of a football squad that meet regularly may all be defined in a user's email client application under the heading “Football”.
- Correct group data may also be provided by mining an email client application 103 for group information. This is referred to as the user's social network.
- the group monitor 124 shown in FIG. 1 uses group information for determining when a prompt is need to a user. Based on previous email correspondence of the mailbox owner, a list of the groups or communities with which the user corresponds is constructed.
- This procedure can also be applied centrally to multiple email client applications to determine group information mined from users across an organization.
- Such correct group data may be stored centrally on a server and accessed by each email client application via a network.
- the groups in the list are ranked according to their strength.
- a strength of the groups is determined by the number of messages sent to its members, the dates of these messages, and the number of members in the group.
- the messages in one or more mailboxes are reviewed.
- Each message defines a group which is a set of the following: the sender of the message, the recipients in the “to” list, recipients in the “cc” list and the recipients in the “bcc”.
- the mailbox owner is not removed from this set to provide a group the mailbox owner would send to.
- Each message adds a unit to the score of the group it defines.
- a list of groups is formed where the score of each group is the number of messages sent to it. Sorting the list by score in descending order gives the desired ranked list of groups. Some adjustments can be made to the score each message gives to its group by taking the date of the message into account, i.e. messages with a more recent date will give higher score to their group.
- a method is based on a graph built based on the headers of messages in one or more mailboxes. This graph is then partitioned into groups. Details can be found in the following paper: http://www.hpl.hp.com/research/idl/papers/email/index.html. The paper describes automatic identification of communities from email logs within an organization. An algorithm is used that finds communities within a graph representing information flows.
- a method is described in the referenced paper in which vertices represent people (senders and recipients of email messages) and edges are added between people who correspond. Subsets of vertices with many edges connecting vertices of the same subset and few edges lying between subsets define community structure. Inter-community edges of highest betweeness are identified and removed leaving the defined communities. The groups detected by the algorithm can be ranked by the total weight of the corresponding edges in the graph.
- the conclusion of the process is a ranked list of the mailbox's or mailboxes' groups.
- This list can be stored in a persistent location on an individual client system or on a server.
- a group correction or group completion can be achieved by using the groups in the ranked list.
- the intended group is compared to the list of popular groups with which the sender corresponds. If the group to which the email is proposed to be sent differs by one person, then an appropriate suggestion (to either add or change an addressee) is issued.
- a flow diagram 400 is shown of the method carried out by the agent 120 .
- An email message is created 401 by a user of an email client application and it is determined 402 whether there is more than one intended recipient of the message. If there is a single recipient 403 , then no action is taken 404 by the agent.
- the defined correct groups may be retrieved from an organization data structure, may be defined by the user in the email client application, or may be retrieved from a ranked list of groups mined from the user's mailbox.
- a suggested action may be to replace, add or omit a recipient.
- the following are example categories of occurrences or anomalies that may be monitored by the agent 120 as a user creates an email message with more than one intended recipient, instigating a prompt by the agent 120 .
- Another example would be when a user belongs to a group with a similar name to another group. For example, if a member of the “Information Services” group types by mistake “Information Retrieval”, an appropriate warning will be issued. This will be done in spite of the fact that the typed group is a correct name of a predefined group, but according to the organizational information the group is unlikely to be correct.
- This category includes correcting a specific address in a group which is highly unlikely to be included. For example, an email message may be created to be sent relating to a particular project to the project members. A mistake to include “Beth Brown” instead of “Beth Brownholtz” may be identified as the project members form a group which is regularly used by the user. According to the user's social communities and possibly the syntactic similarity between the addresses, a correction will be suggested.
- Syntactic similarity occurs, for example, when two addresses in the organization differ by one character or when both have the same prefix. (For example, beth_brown/us/company and beth_brownholtz/uk/company, or john_smith/almaden/company & john_smith/haifa/company).
- Similarity scores can be computed of the username to other usernames and a threshold set for deciding that the name sufficiently similar to raise a warning.
- the similarity score can be based on text similarity techniques, but should take into account both edit distance (how many characters need to be replaced to get from one string to another) and prefixes, as mentioned above.
- the mistake may be identified if all the intended recipients belong to an organization's department with the exception of one incorrect member.
- the category also includes adding a specific address that is normally included in a group.
- inclusion of certain individuals may be inferred by the inclusion of others.
- An individual X may be copied on all correspondences with an individual Y. Based on previous correspondence, in which individual Y is always copied correspondence to individual X, an appropriate suggestion will be made.
- the rank of the possibilities can include parameters such as the total amount of communication with the group, the size of the group, the communication in the last week/month, etc.
- the most likely possibilities to complete a group can be determined according to the user defined groups, or according to groups of an organizational data structure.
- the prompt may suggest an automatic move of the addresses from the “to” list to the “bcc” list with the “to” list remaining empty, or containing the sender's own address, or just a dummy address. This should be done both for security reasons, to prevent email addresses being explicitly distributed among many users, and for privacy reasons.
- the “bcc” (blind carbon copy) list sends a message to the listed recipients in a way that the message they receive does not contain a complete list of recipients.
- Group completion is done based on an explicit user request and thus is not included in this example pseudo code.
- the pseudo code may be extended to include checking for similarity of groups with the predefined organizational groups and/or the predefined user groups:
- predefined organizational group g′′ For each predefined organizational group g′′, or predefined user group g′′′
- FIGS. 5A to 5D are flow diagrams illustrating the above methods.
- FIG. 5A shows a flow diagram 510 of a method of comparing a proposed group of recipients g to an organization data structure.
- a user x creates 511 a message to send to a group g.
- FIG. 5B shows a flow diagram 520 of a method of comparing a proposed group to groups mined from a user's mailbox.
- a user x creates 521 a message to send to a group g.
- the method of FIG. 5B may also be applied to compare a proposed group to other correct data groups, for example, groups of an organizational data structure or groups defined by a user.
- FIG. 5C shows a flow diagram 530 of a method of determining if a list of addressees should be amended to move the addressees to a bcc list.
- a user x creates 531 a message to send to a group g. It is determined 532 if g includes more than t′ separate addresses, where t′ is a predefined threshold. If the threshold is not exceeded, no action is taken and the method ends 533 . If the threshold is exceeded, a recommendation is issued 534 to move all the recipients to the bcc list for security.
- FIG. 5D shows a flow diagram 540 of a method of completion of groups.
- a user creates 541 a message to send to a plurality of recipients ⁇ r 1 , r 2 , r 3 , . . . r n >.
- the user requests 542 completion of the group.
- the defined groups (for example, in an organization data structure, user defined groups, or groups mined from mailboxes) are searched 543 to identify groups including the members ⁇ r 1 , r 2 , r 3 , . . . r n >. It is determined 544 if one or more groups are identified. If no groups are identified, this is reported 545 to the user. If one or more groups are identified, a list is displayed 546 to the user who selects 547 the appropriate group. The remaining members of the chosen group are added 548 to the list of recipients of the message.
- the defined groups for example, in an organization data structure, user defined groups, or groups mined from mailboxes
- a combination of one or more of the above methods can be applied to a message. For example, if a group is corrected according to FIG. 5B , it may then be determined if the corrected group is appropriate according to the method of FIG. 5A . Similarly, if a group is completed according to the method of FIG. 5D , it may then be determined if the number of recipients is above the threshold according to the method of FIG. 5C . Other combinations are also applicable.
- FIGS. 6A to 6C examples of prompts provided on a graphical user interface are shown.
- a graphical user interface 600 of an email client application is shown in which a new message 601 has been created.
- the message 601 has a list of intended recipients 602 formed of the “to” addressees, “cc” addressees, and “bcc” addressees.
- a prompt in the form of a dialog box 610 which recommends adding a member to a group.
- the intended recipients have been compared to correct groups, in this case mined from the user's mailbox, and an omission identified.
- the dialog box 610 suggests an additional recipient and has input options to add the recipient to the “to” addressees 611 , to add the recipient to the “cc” addressees 612 , or to ignore 613 .
- An option is also provided to disable the prompt 614 .
- a prompt in the form of a dialog box 620 is shown which recommends replacing a member of a group.
- the intended recipients have been compared to correct groups, in this case mined from the user's mailbox, and a correction identified.
- the dialog box 620 suggests a replacement and has input options to replace 621 or ignore 622 the replacement. An option is also provided to disable the prompt 624 .
- a prompt in the form of a dialog box 630 is shown alerting a user before sending an email to a large group which is unlikely according to the organization chart.
- the dialog box 630 queries the send action and has input options abort the send 631 or to continue with the send 632 .
- An option is also provided to disable the prompt 634 .
- the method of providing a prompt to correct or complete intended recipients or to transfer recipients to a bcc list may be provided as a service to a customer over a network.
- the invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements.
- the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, etc.
- the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system.
- a computer usable or computer readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus or device.
- the medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium.
- Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read only memory (ROM), a rigid magnetic disk and an optical disk.
- Current examples of optical disks include compact disk read only memory (CD-ROM), compact disk read/write (CD-R/W), and DVD.
Abstract
A method and system for preventing sending of messages to incorrect email recipients are provided. The method includes determining (120) the intended recipients of an email message prior to sending and comparing the intended recipients to defined recipient groups (126, 122). Potential errors in the intended recipients are identified and a prompt (125) is provided to amend the intended recipients. The prompt (125) provides a suggestion to replace, add or remove an intended recipient. The defined recipient groups include one or more of groups of recipients formed from an organization data structure (122), groups of recipients defined by a user, and groups of recipients (126) mined from one or more user's previous email correspondence.
Description
- This invention relates to the field of email messaging systems. In particular, this invention relates to preventing the sending of email messages to incorrect email recipients.
- Email messaging systems have become a regular form of communication for people in their work and social interactions. The use of email messages is particularly effective when communicating the same message to multiple recipients. The information that develops in a user's email application shows groups that the user communicates with. The groups may be defined by social activities, work, study, sport, committees, etc. This organizational information that exists in email messaging systems is very valuable to the user and any organization they work for.
- People receive irrelevant email messages when users forward, reply to, or send email messages to irrelevant addressees by mistake. Receiving an irrelevant email message can be annoying as the recipient must ascertain that it is not intended for him, and this may waste valuable working time and distract the recipient from other tasks. Privacy may also be compromised by the wrong recipient receiving confidential information contained in an erroneously sent message.
- Email messages are often sent to incorrect addressees when the sender is sending an email to a group of recipients. Much of email messaging traffic is generated by email messages addressed to a group of recipients and handling these groups of contacts in a careful way is desired. This will lower the chances of a recipient receiving an irrelevant message as well as protecting the sender's privacy.
- Current email applications support groups of contacts in the following ways.
-
- Groups of users are predefined for the organization as a whole. For example, this is done in Lotus Notes for IBM (Lotus Notes and IBM are trade marks of International Business Machines Corporation). Most of the groups are taken from an organizational chart in which employees positions in the organization are defined.
- Users of email applications are able to manually define their own groups of contacts. In practice, most email users do not use the manual definition of groups and make use of only those groups who have been predefined for their organization.
- It is an aim of the present invention to provide a method and system for using groups of contacts in an email system in order to decrease the chances of sending an email message to an incorrect contact. It is also an aim to improve the protection of user privacy that may be affected by messages sent to large groups of contacts.
- According to a first aspect of the present invention there is provided a method for email messaging, comprising: determining the intended recipients of an email message prior to sending, where there are two or more intended recipients; comparing the intended recipients to defined recipient groups; and providing a prompt to amend the intended recipients.
- In one embodiment, the method includes identifying a potential error in the intended recipients compared to the defined recipient groups. Comparing the intended recipients to defined recipient groups may use a similarity measure to identify a potential error. The method may include comparing the intended recipients to defined recipient groups defined for a sender of the email message.
- In another embodiment, the method includes identifying one or more of the defined groups which include the intended recipients, and providing a prompt to complete the list of intended recipients in accordance with an identified defined group.
- Providing a prompt to amend the intended recipients may provide a suggestion to replace, add or remove an intended recipient.
- The defined recipient groups may include one or more of: groups of recipients formed from an organization data structure, groups of recipients defined by a user, and groups of recipients mined from one or more user's previous email correspondence.
- An organization data structure may define a Boolean value for each pair of an individual in an organization and a group indicating the likelihood of the individual sending a message to the group. The method may include comparing the pair of the sender of the email message and the group of intended recipients with the Boolean value for the pair to identify a potential error.
- Groups of recipients may be mined from one or more user's previous email correspondence and ranked by the strength of the group. In one embodiment, groups may be defined as the set of the sender of a previous email message and the recipients of the message, and a ranking is applied to the defined groups according to the number of messages and/or the date of the messages. In another embodiment, groups may be defined by: building a graph with vertices of individuals who are senders and/or recipients of previous email messages joined by edges between individuals who correspond; and determining groups with many edges connecting vertices of a group and few edges between groups.
- Identifying a potential error in the intended recipients may include: identifying a mismatch between the sender and the intended recipients according to an organization data structure. Identifying a potential error in the intended recipients may include identifying a mismatch between the intended recipients and a defined recipient group.
- Providing a prompt to amend the intended recipients may add recipients to the intended recipients to complete a defined recipient group. Providing a prompt to amend the intended recipients may also suggests moving intended recipients from a “to” addressee list to a blind carbon copy (“bcc”) addressee list, if the number of intended recipients exceeds a threshold value.
- According to a second aspect of the present invention there is provided a computer program product stored on a computer readable storage medium, comprising computer readable program code means for performing the steps of: determining the intended recipients of an email message prior to sending, where there are two or more intended recipients; comparing the intended recipients to defined recipient groups; and providing a prompt to amend the intended recipients.
- According to a third aspect of the present invention there is provided a system for email messaging comprising: a data structure of defined recipient groups; an agent including: means for determining the intended recipients of an email message prior to sending, where there are two or more intended recipients; and means for comparing the intended recipients to the defined recipient groups; and a prompt means on a graphical user interface to generate a prompt to amend the intended recipients.
- The agent may includes means for identifying a potential error in the intended recipients. The agent may include means for identifying one or more of the defined groups which includes the intended recipients, and the prompt means may generate a prompt to complete the list of intended recipients in accordance with an identified defined group.
- The agent may be provided as part of an email client application in which the email message is created. Alternatively, the agent may be provided by a server over a network to an email client application in which the email message is created.
- The data structure of predefined recipient groups may be an organization data structure. The data structure of predefined recipient groups may store recipient groups mined from one or more user's previous email correspondence.
- According to a fourth aspect of the present invention there is provided a method of providing a service to a customer over a network, the service comprising the method steps of: determining the intended recipients of an email message prior to sending, where there are two or more intended recipients; comparing the intended recipients to defined recipient groups; and providing a prompt to amend the intended recipients.
- According to a fifth aspect of the present invention there is provided a method for email messaging, comprising: determining the number of intended recipients of an email message prior to sending; determining if the number of intended recipients exceeds a predefined threshold number; and if the number of intended recipients exceeds the threshold number, providing a prompt to transfer the intended recipients to blind carbon copy (“bcc”) addressees.
- The intended recipients may be separate “to” or carbon copy (“cc”) addressees and the method may include automatically transferring addressees from “to” and/or carbon copy (“cc”) addressees following a user response to the prompt.
- The embodiments of the present invention include the advantage that the content of an email message is not used to determine the predefined recipient groups or when comparing the intended recipients to predefined recipient groups. This means that sensitive content data is not accessed and the method is language independent.
- The user input is also minimal as the user may accept or reject prompts to amend the intended recipients.
- The subject matter regarded as the invention is particularly pointed out and distinctly claimed in the concluding portion of the specification. The invention, both as to organization and method of operation, together with objects, features, and advantages thereof, may best be understood by reference to the following detailed description when read with the accompanying drawings in which:
-
FIG. 1 is a block diagram of an email system in accordance with embodiments of the present invention; -
FIG. 2 is a block diagram of a computer system in which the embodiments of the present invention may be implemented; -
FIGS. 3A and 3B are examples of organization data structures used in accordance with embodiments of the present invention; -
FIG. 4 is a flow diagram of an overall method in accordance with embodiments of the present invention; -
FIGS. 5A to 5D are flow diagrams of methods of determining potential errors in addressee groups in accordance with embodiments of the present invention; and -
FIGS. 6A to 6C are representations of graphical user interfaces in accordance with embodiments of the present invention. - It will be appreciated that for simplicity and clarity of illustration, elements shown in the figures have not necessarily been drawn to scale. For example, the dimensions of some of the elements may be exaggerated relative to other elements for clarity. Further, where considered appropriate, reference numbers may be repeated among the figures to indicate corresponding or analogous features.
- In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, and components have not been described in detail so as not to obscure the present invention.
- The described method and system provide a prompt when a user is forwarding, replying to, or sending an email message, to check if the email is intended to be sent to the message addressees. The described method and system provide an opportunistic approach which aims to prevent irrelevant email messages being sent.
- Email applications are extended in a way that assists email users in sending messages to the correct addressees in groups and helps users avoid common mistakes related to email addressee groups. According to the described approach, upon sending an email message to a group (either a predefined group or just a set of several individual addresses), the email user may be provided with appropriate recommendations and warnings, based an organizational chart, the user's own social or contact network, and other factors as described below.
- Referring to
FIG. 1 , anemail system 100 is shown including anemail user 101 who interacts with anemail user interface 102 of anemail client application 103 running on aclient computer system 104. Theemail client application 103 may be a stand alone email application or part of a combined scheduling and calendar application. - The
email client application 103 communicates via anetwork 105 with other client computer systems 106-108 each running their own email client application. Aserver system 110 provides anemail server application 112 for theemail client application 103. - The
email client application 103 enables a user to organize their email messages by creating folders for storingmail 128, searching through email messages, keeping an address book of people to whom the user sends email messages, creating group mailing lists, creating and adding a signature file, and many more functions. - In the described system, an
agent 120 is provided which reviews a list of intended recipients in an email message created by a user to check if the list of intended recipients is likely to include any incorrect recipients. Theagent 120 reviews the list of intended recipients using a provided algorithm. A prompt 125 is provided in the form of a dialogue box on theemail user interface 102 if theagent 120 determines that the user should review one or more of the intended recipients of the email message. The prompt 125 on theemail user interface 102 may include appropriate recommendations, warnings, etc. Theuser 101 can select the relevant/irrelevant addressees and amend the email message appropriately or theuser 101 can choose to disregard the prompt 125. - The
agent 120 can be provided as part of theemail client application 103. Alternatively, theagent 120 can be provided as a service provided over a network from a server. - An
email user 101 can configure theagent 120 to provide the desiredprompts 125 tailored to the user's requirements. This configuration of theagent 120 can include a complete disablement of theagent 120. - The
agent 120 uses an algorithm to review the list of intended recipients. The algorithm is based on correct group data. The correct group data may be determined by any one or more of the following: predefined organizational groups, the groups defined by the user in hisemail application 103, and/or groups previously used by the user. - Predefined organizational groups can be provided by an
organizational chart 122 which may be provided on an organization'sserver system 112. Theserver system 112 on which the organization chart resides may be the same or different to theserver system 110 of theemail server application 112. - A user can define groups of recipients in his
email client application 103. These defined groups can be used as correct groupings by theagent 120. - Community or group information can also be gathered from previous messages in one or more user's
client email application 103. A group monitor 124 determines groups or communities based on previous email correspondence of theuser 101. Adata structure 126 holds a ranking of groups within which a user corresponds based on previous email correspondence. Each group includes meta-data such as a graph representing the internal relationships, the number of messages sent to it, and dates of correspondence. Based on this meta-data, the rank of the group is determined. The data structure is persistently stored either locally to theclient system 104, remotely on aserver system - Referring to
FIG. 2 , an exemplary system for implementing aclient system 104 includes adata processing system 200 suitable for storing and/or executing program code including at least oneprocessor 201 coupled directly or indirectly to memory elements through abus system 203. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution. - The memory elements may include
system memory 202 in the form of read only memory (ROM) 204 and random access memory (RAM) 205. A basic input/output system (BIOS) 206 may be stored inROM 204.System software 207 may be stored inRAM 205 includingoperating system software 208.Software applications 210 may also be stored inRAM 205. - The
system 200 may also include a primary storage means 211 such as a magnetic hard disk drive and secondary storage means 212 such as a magnetic disc drive and an optical disc drive. The drives and their associated computer-readable media provide non-volatile storage of computer-executable instructions, data structures, program modules and other data for thesystem 200. Software applications may be stored on the primary and secondary storage means 211, 212 as well as thesystem memory 202. - The
computing system 200 may operate in a networked environment using logical connections to one or more remote computers via anetwork adapter 216. - Input/
output devices 213 can be coupled to the system either directly or through intervening I/O controllers. A user may enter commands and information into thesystem 200 through input devices such as a keyboard, pointing device, or other input devices (for example, microphone, joy stick, game pad, satellite dish, scanner, or the like). Output devices may include speakers, printers, etc. Adisplay device 214 is also connected tosystem bus 203 via an interface, such asvideo adapter 215. - The
agent 120 uses correct group data to review a list of intended recipients. Correct group data is provided by different sources and provides reliable information on members belonging to recognised groups. - Correct group data may be provided by an organization data structure defined for an organization. Such a
data structure 122 may be provided on aserver system 112 and accessed by theagent 120 of theemail client application 103 via thenetwork 105. The organization data structure may be defined in many different ways but generally takes the form of a hierarchical data structure with members of the organization ordered in the hierarchy. Organization data structures may be defined for any form of organization and the user may have access to more than one organization data structure if he belongs to more than one organization, for example, his employer, professional body, committees, etc. - As examples, two forms of organization data structures are shown in
FIGS. 3A and 3B of company structures. InFIG. 3A , adata structure 310 is shown in the form of a list hierarchy with a member'sname 311,position 312,department 313, andlocation 314. The chiefexecutive officer 314 of the company is listed at the top with members of the company provided in order of seniority with their department members. - In
FIG. 3B , adata structure 320 is shown in the form of an organization chart with a chiefexecutive officer 324 at the root node, with child nodes showing employees designated to each superior node. Information, relating to a member is provided at the node, for example,name 321,position 322,department 323, andlocation 324. - In any form of organization data structure, groups can be retrieved by common elements, such as location, department, position or ranking, etc. Members of a group having one or more common elements are extracted from the data structure. For example, regional managers in United States, or trainees in the state of California, or legal department members across the organization, etc.
- The data structure defines a Boolean value for each pair of an individual and a group. This value indicates whether the individual is likely to send a message to the group. Groups are defined within the data structure for each recognisable set or sub-set of the structure.
- Boolean values are given in a matrix M that includes rows for all employees and columns for all groups whose size is larger than a threshold t. Each cell has a value of 1 if the employee is likely to send to the group, 0 otherwise. The values may be set by a system administrator or by a set of rules. The rules may be set according to organization data structure parameters. When employee x sends to group g whose size is larger than t, the value of M[x][g] is considered. If it is 0, an appropriate warning is issued.
- For example, a rule may say that each employee is likely to send to the smallest group she belongs to. The rules should also take into account the level of the employee in the organization data structure hierarchy. Normally, the higher the level is, the larger the groups the employee is likely to send to.
- Correct group data may also be provided in an
email client application 103 in which a user has defined correct group members under a group heading. For example, members of a football squad that meet regularly may all be defined in a user's email client application under the heading “Football”. - Correct group data may also be provided by mining an
email client application 103 for group information. This is referred to as the user's social network. The group monitor 124 shown inFIG. 1 uses group information for determining when a prompt is need to a user. Based on previous email correspondence of the mailbox owner, a list of the groups or communities with which the user corresponds is constructed. - This procedure can also be applied centrally to multiple email client applications to determine group information mined from users across an organization. Such correct group data may be stored centrally on a server and accessed by each email client application via a network.
- The groups in the list are ranked according to their strength. A strength of the groups is determined by the number of messages sent to its members, the dates of these messages, and the number of members in the group.
- Two examples of how a ranked list of the groups can be achieved are described.
- In one embodiment, the messages in one or more mailboxes are reviewed. Each message defines a group which is a set of the following: the sender of the message, the recipients in the “to” list, recipients in the “cc” list and the recipients in the “bcc”. The mailbox owner is not removed from this set to provide a group the mailbox owner would send to.
- Each message adds a unit to the score of the group it defines. After reviewing all messages, a list of groups is formed where the score of each group is the number of messages sent to it. Sorting the list by score in descending order gives the desired ranked list of groups. Some adjustments can be made to the score each message gives to its group by taking the date of the message into account, i.e. messages with a more recent date will give higher score to their group.
- In a second embodiment, a method is based on a graph built based on the headers of messages in one or more mailboxes. This graph is then partitioned into groups. Details can be found in the following paper: http://www.hpl.hp.com/research/idl/papers/email/index.html. The paper describes automatic identification of communities from email logs within an organization. An algorithm is used that finds communities within a graph representing information flows.
- A method is described in the referenced paper in which vertices represent people (senders and recipients of email messages) and edges are added between people who correspond. Subsets of vertices with many edges connecting vertices of the same subset and few edges lying between subsets define community structure. Inter-community edges of highest betweeness are identified and removed leaving the defined communities. The groups detected by the algorithm can be ranked by the total weight of the corresponding edges in the graph.
- Using either of the embodiments, the conclusion of the process is a ranked list of the mailbox's or mailboxes' groups. This list can be stored in a persistent location on an individual client system or on a server. Upon sending a message to a group, a group correction or group completion can be achieved by using the groups in the ranked list.
- The intended group is compared to the list of popular groups with which the sender corresponds. If the group to which the email is proposed to be sent differs by one person, then an appropriate suggestion (to either add or change an addressee) is issued.
- Referring to
FIG. 4 , a flow diagram 400 is shown of the method carried out by theagent 120. An email message is created 401 by a user of an email client application and it is determined 402 whether there is more than one intended recipient of the message. If there is asingle recipient 403, then no action is taken 404 by the agent. - If there is more than one intended
recipient 405, the intended recipients are compared 406 with defined correct groups. The defined correct groups may be retrieved from an organization data structure, may be defined by the user in the email client application, or may be retrieved from a ranked list of groups mined from the user's mailbox. - It is determined 407 if there are any anomalies between the intended recipients and the defined correct groups. If there are no
anomalies 408, then no action is taken 409 by the agent. If there is one ormore anomaly 410, then a relevant prompt is generated 411 and an action suggested 412. A suggested action may be to replace, add or omit a recipient. - The following are example categories of occurrences or anomalies that may be monitored by the
agent 120 as a user creates an email message with more than one intended recipient, instigating a prompt by theagent 120. - 1. A user sending an email message to a predefined group, which is highly unlikely according to the organizational chart or involves special risks.
- An example of this would be that if a director sends a message to all employees, no warning will be issued, but when a regular employee does so, an appropriate warning window will pop up. Some of the mistakes of this kind are caused by inadvertently using the “reply all” option rather than the “reply”.
- Another example would be when a user belongs to a group with a similar name to another group. For example, if a member of the “Information Services” group types by mistake “Information Retrieval”, an appropriate warning will be issued. This will be done in spite of the fact that the typed group is a correct name of a predefined group, but according to the organizational information the group is unlikely to be correct.
- 2. Group correction.
- This category includes correcting a specific address in a group which is highly unlikely to be included. For example, an email message may be created to be sent relating to a particular project to the project members. A mistake to include “Beth Brown” instead of “Beth Brownholtz” may be identified as the project members form a group which is regularly used by the user. According to the user's social communities and possibly the syntactic similarity between the addresses, a correction will be suggested.
- Syntactic similarity occurs, for example, when two addresses in the organization differ by one character or when both have the same prefix. (For example, beth_brown/us/company and beth_brownholtz/uk/company, or john_smith/almaden/company & john_smith/haifa/company).
- Similarity scores can be computed of the username to other usernames and a threshold set for deciding that the name sufficiently similar to raise a warning. The similarity score can be based on text similarity techniques, but should take into account both edit distance (how many characters need to be replaced to get from one string to another) and prefixes, as mentioned above.
- Similarly, the mistake may be identified if all the intended recipients belong to an organization's department with the exception of one incorrect member.
- The category also includes adding a specific address that is normally included in a group.
- For example, when creating an email message from a previous message and not using the “reply all” option, users tend to forget to include the sender of the original message in the list of recipients. This can occur by the user copying just the “to” list and the “cc” list and forgetting to include the original sender. Based on the user's social communities, a suggestion to include a certain individual will be prompted in case the group is missing one of its regular members.
- In another example, inclusion of certain individuals may be inferred by the inclusion of others. An individual X may be copied on all correspondences with an individual Y. Based on previous correspondence, in which individual Y is always copied correspondence to individual X, an appropriate suggestion will be made.
- 3. Group completion.
- When typing a list of individual addresses, a completion will be offered to the user upon request of the most likely possibilities to complete the group according to the user's social network. The rank of the possibilities can include parameters such as the total amount of communication with the group, the size of the group, the communication in the last week/month, etc.
- Similarly, the most likely possibilities to complete a group can be determined according to the user defined groups, or according to groups of an organizational data structure.
- 4. Automatic conversion of addresses to the “bcc” list.
- When sending an email message to a large number of individual addresses, the prompt may suggest an automatic move of the addresses from the “to” list to the “bcc” list with the “to” list remaining empty, or containing the sender's own address, or just a dummy address. This should be done both for security reasons, to prevent email addresses being explicitly distributed among many users, and for privacy reasons. The “bcc” (blind carbon copy) list sends a message to the listed recipients in a way that the message they receive does not contain a complete list of recipients.
- All of the above can be carried in an off-line or on-line mode.
- The following is an example pseudo code upon user x sending to group g:
- If g is a predefined organizational group and M[x][g]=0
-
- Issue a warning (are you sure you want to send to g whose size is g.size)
- For each group g′ in the top ranked list of groups with which the user corresponds
- If g is similar to g′ (i.e. misses one contact or has one different contact than)
-
- Issue an appropriate recommendation (to either add or change the contact)
- If g includes more than t′ (where t′ is a certain threshold) separate addresses
-
- Issue a recommendation to move all recipients to the bcc list
- Group completion is done based on an explicit user request and thus is not included in this example pseudo code. The pseudo code may be extended to include checking for similarity of groups with the predefined organizational groups and/or the predefined user groups:
- For each predefined organizational group g″, or predefined user group g′″
- If g is similar to g″ or g′″ (i.e. misses one contact or has one different contact than)
-
- Issue an appropriate recommendation (to either add or change the contact)
-
FIGS. 5A to 5D are flow diagrams illustrating the above methods. -
FIG. 5A shows a flow diagram 510 of a method of comparing a proposed group of recipients g to an organization data structure. A user x creates 511 a message to send to a group g. The Boolean value M[x][g] in a matrix M generated for groups of an organization data structure is looked up 512. It is determined 513 if g is a predefined organizational group. If it is not a predefined organizational group, then the method ends 514. However, if g is a predefined organizational group, it is determined 515 if M[x][g]=0. If M[x][g]≠0, no warning is issued 516. If M[x][g]=0, a warning is issued 517 as this indicates that the user x is unlikely to send a message to this group. -
FIG. 5B shows a flow diagram 520 of a method of comparing a proposed group to groups mined from a user's mailbox. A user x creates 521 a message to send to a group g. Group gn′ is selected 522 from the top ranked list of groups. It is determined 523 if g is similar to gn′. If it is similar, a warning with an appropriate change is provided 524. If g is not similar to gn′, it may either be the same, or dissimilar. It is determined 525 if n=nmax or if there is at least another group gn′ in the ranked list. If there is another group, gn′ is changed to gn+1′ 526 and the method loops to step 522. If there are no further groups, the method ends 527. - The method of
FIG. 5B may also be applied to compare a proposed group to other correct data groups, for example, groups of an organizational data structure or groups defined by a user. -
FIG. 5C shows a flow diagram 530 of a method of determining if a list of addressees should be amended to move the addressees to a bcc list. A user x creates 531 a message to send to a group g. It is determined 532 if g includes more than t′ separate addresses, where t′ is a predefined threshold. If the threshold is not exceeded, no action is taken and the method ends 533. If the threshold is exceeded, a recommendation is issued 534 to move all the recipients to the bcc list for security. -
FIG. 5D shows a flow diagram 540 of a method of completion of groups. A user creates 541 a message to send to a plurality of recipients <r1, r2, r3, . . . rn>. The user requests 542 completion of the group. The defined groups (for example, in an organization data structure, user defined groups, or groups mined from mailboxes) are searched 543 to identify groups including the members <r1, r2, r3, . . . rn>. It is determined 544 if one or more groups are identified. If no groups are identified, this is reported 545 to the user. If one or more groups are identified, a list is displayed 546 to the user who selects 547 the appropriate group. The remaining members of the chosen group are added 548 to the list of recipients of the message. - A combination of one or more of the above methods can be applied to a message. For example, if a group is corrected according to
FIG. 5B , it may then be determined if the corrected group is appropriate according to the method ofFIG. 5A . Similarly, if a group is completed according to the method ofFIG. 5D , it may then be determined if the number of recipients is above the threshold according to the method ofFIG. 5C . Other combinations are also applicable. - Referring to
FIGS. 6A to 6C , examples of prompts provided on a graphical user interface are shown. In each of the figures, agraphical user interface 600 of an email client application is shown in which anew message 601 has been created. Themessage 601 has a list of intendedrecipients 602 formed of the “to” addressees, “cc” addressees, and “bcc” addressees. - In
FIG. 6A , a prompt in the form of adialog box 610 is shown which recommends adding a member to a group. The intended recipients have been compared to correct groups, in this case mined from the user's mailbox, and an omission identified. Thedialog box 610 suggests an additional recipient and has input options to add the recipient to the “to”addressees 611, to add the recipient to the “cc”addressees 612, or to ignore 613. An option is also provided to disable the prompt 614. - In
FIG. 6B , a prompt in the form of adialog box 620 is shown which recommends replacing a member of a group. The intended recipients have been compared to correct groups, in this case mined from the user's mailbox, and a correction identified. Thedialog box 620 suggests a replacement and has input options to replace 621 or ignore 622 the replacement. An option is also provided to disable the prompt 624. - In
FIG. 6C , a prompt in the form of adialog box 630 is shown alerting a user before sending an email to a large group which is unlikely according to the organization chart. Thedialog box 630 queries the send action and has input options abort the send 631 or to continue with thesend 632. An option is also provided to disable the prompt 634. - The method of providing a prompt to correct or complete intended recipients or to transfer recipients to a bcc list may be provided as a service to a customer over a network.
- The invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements. In a preferred embodiment, the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, etc.
- The invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer usable or computer readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus or device.
- The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk read only memory (CD-ROM), compact disk read/write (CD-R/W), and DVD.
- Improvements and modifications can be made to the foregoing without departing from the scope of the present invention.
Claims (27)
1. A method for email messaging, comprising:
determining the intended recipients of an email message prior to sending, wherein there are two or more intended recipients;
comparing the intended recipients to defined recipient groups; and
providing a prompt to amend the intended recipients.
2. The method as claimed in claim 1 , including:
identifying a potential error in the intended recipients compared to the defined recipient groups.
3. The method as claimed in claim 2 , wherein comparing the intended recipients to defined recipient groups uses a similarity measure to identify a potential error.
4. The method as claimed in claim 2 , including comparing the intended recipients to defined recipient groups defined for a sender of the email message.
5. The method as claimed in claim 1 , including:
identifying one or more of the defined groups which include the intended recipients, and providing a prompt to complete the list of intended recipients in accordance with an identified defined group.
6. The method as claimed in claim 1 , wherein providing a prompt to amend the intended recipients provides a suggestion to replace, add or remove an intended recipient.
7. The method as claimed in claim 1 , wherein the defined recipient groups include one or more of groups of recipients formed from an organization data structure, groups of recipients defined by a user, and groups of recipients mined from one or more user's previous email correspondence.
8. The method as claimed in claim 7 , wherein an organization data structure defines a Boolean value for each pair of an individual in an organization and a group indicating the likelihood of the individual sending a message to the group.
9. The method as claimed in claim 8 , including comparing the pair of the sender of the email message and the group of intended recipients with the Boolean value for the pair to identify a potential error.
10. The method as claimed in claim 7 , wherein groups of recipients are mined from one or more user's previous email correspondence and ranked by the strength of the group.
11. The method as claimed in claim 10 , wherein a group is defined as the set of the sender of a previous email message and the recipients of the message, and a ranking is applied to the defined groups according to the number of messages and/or the date of the messages.
12. The method as claimed in claim 10 , wherein groups are defined by: building a graph with vertices of individuals who are senders and/or recipients of previous email messages joined by edges between individuals who correspond; and determining groups with many edges connecting vertices of a group and few edges between groups.
13. The method as claimed in claim 2 , wherein identifying a potential error in the intended recipients includes identifying a mismatch between the sender and the intended recipients according to an organization data structure.
14. The method as claimed in claim 2 , wherein identifying a potential error in the intended recipients includes identifying a mismatch between the intended recipients and a defined recipient group.
15. The method as claimed in claim 1 , wherein providing a prompt to amend the intended recipients suggests moving intended recipients from a “to” addressee list to a blind carbon copy (“bcc”) addressee list.
16. A computer program product stored on a computer readable storage medium, comprising computer readable program code means for performing the steps of:
determining the intended recipients of an email message prior to sending, wherein there are two or more intended recipients;
comparing the intended recipients to defined recipient groups; and
providing a prompt to amend the intended recipients.
17. A system for email messaging comprising:
a data structure of defined recipient groups;
an agent including:
means for determining the intended recipients of an email message prior to sending, wherein there are two or more intended recipients; and
means for comparing the intended recipients to the defined recipient groups; and
a prompt means on a graphical user interface to generate a prompt to amend the intended recipients.
18. The system as claimed in claim 17 , wherein the agent includes means for identifying a potential error in the intended recipients.
19. The system as claimed in claim 17 , wherein the agent includes means for identifying one or more of the defined groups which includes the intended recipients, and the prompt means generates a prompt to complete the list of intended recipients in accordance with an identified defined group.
20. The system as claimed in claim 17 , wherein the agent is provided as part of an email client application in which the email message is created.
21. The system as claimed in claim 17 , wherein the agent is provided by a server over a network to an email client application in which the email message is created.
22. The system as claimed in claim 17 , wherein the data structure of predefined recipient groups is an organization data structure.
23. The system as claimed in claim 17 , wherein the data structure of predefined recipient groups stores recipient groups mined from one or more user's previous email correspondence.
24. A method of providing a service to a customer over a network, the service comprising the method steps of:
determining the intended recipients of an email message prior to sending, wherein there are two or more intended recipients;
comparing the intended recipients to defined recipient groups; and
providing a prompt to amend the intended recipients.
25. A method for email messaging, comprising:
determining the number of intended recipients of an email message prior to sending;
determining if the number of intended recipients exceeds a predefined threshold number;
if the number of intended recipients exceeds the threshold number, providing a prompt to transfer the intended recipients to blind carbon copy (“bcc”) addressees.
26. The method as claimed in claim 25 , wherein the intended recipients are separate “to” or carbon copy (“cc”) addressees.
27. The method as claimed in claim 25 , including automatically transferring addressees from “to” and/or carbon copy (“cc”) addressees following a user response to the prompt.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/424,889 US20070294428A1 (en) | 2006-06-19 | 2006-06-19 | Method and System for Email Messaging |
US12/963,658 US8271598B2 (en) | 2006-06-19 | 2010-12-09 | Method and system for email messaging |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/424,889 US20070294428A1 (en) | 2006-06-19 | 2006-06-19 | Method and System for Email Messaging |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/963,658 Division US8271598B2 (en) | 2006-06-19 | 2010-12-09 | Method and system for email messaging |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070294428A1 true US20070294428A1 (en) | 2007-12-20 |
Family
ID=38862825
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/424,889 Abandoned US20070294428A1 (en) | 2006-06-19 | 2006-06-19 | Method and System for Email Messaging |
US12/963,658 Active 2026-09-26 US8271598B2 (en) | 2006-06-19 | 2010-12-09 | Method and system for email messaging |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/963,658 Active 2026-09-26 US8271598B2 (en) | 2006-06-19 | 2010-12-09 | Method and system for email messaging |
Country Status (1)
Country | Link |
---|---|
US (2) | US20070294428A1 (en) |
Cited By (68)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050278430A1 (en) * | 2004-05-28 | 2005-12-15 | International Business Machines Corp. | Warning and avoidance of sending email messages to unintended recipients |
US20080071873A1 (en) * | 2006-09-20 | 2008-03-20 | John Nicholas Gross | Electronic Message System Recipient Recommender |
US20080071774A1 (en) * | 2006-09-20 | 2008-03-20 | John Nicholas Gross | Web Page Link Recommender |
US20080071872A1 (en) * | 2006-09-20 | 2008-03-20 | John Nicholas Gross | Document Distribution Recommender System & Method |
US20080120556A1 (en) * | 2006-11-17 | 2008-05-22 | Bellsouth Intellectual Property Corporation | Systems and Methods for Displaying Electronic Mail Messages |
US20080250114A1 (en) * | 2005-10-14 | 2008-10-09 | International Business Machines Corporation | Mitigating address book weaknesses that permit the sending of e-mail to wrong addresses |
US20090030933A1 (en) * | 2007-07-25 | 2009-01-29 | Matthew Brezina | Display of Information in Electronic Communications |
US20090077026A1 (en) * | 2007-09-17 | 2009-03-19 | Apple Inc. | Electronic Communication Messaging |
US20090113001A1 (en) * | 2007-10-29 | 2009-04-30 | Microsoft Corporation | Pre-send evaluaton of e-mail communications |
US7552185B1 (en) | 2008-07-28 | 2009-06-23 | International Business Machines Corporation | Method for associating individuals or email groups with a specific recipient field |
US20090241197A1 (en) * | 2008-03-19 | 2009-09-24 | Websense, Inc. | System and method for analysis of electronic information dissemination events |
WO2009126387A2 (en) | 2008-04-10 | 2009-10-15 | Microsoft Corporation | Caching and exposing pre-send data relating to the sender or recipient of an electronic mail message |
US20100017753A1 (en) * | 2008-07-17 | 2010-01-21 | Li Fuyi | Automatically populating recipients in an instant messaging or other computer communication system |
US20110099220A1 (en) * | 2009-10-23 | 2011-04-28 | International Business Machines Corporation | Dynamic type-ahead for lists of prior specified addressees |
US20120072519A1 (en) * | 2009-05-20 | 2012-03-22 | Panasonic Corporation | Device For Preventing Erroneous E-Mail Transmission |
US20120158860A1 (en) * | 2010-12-16 | 2012-06-21 | International Business Machines Corporation | Electronic mail messaging system and method |
US20130054710A1 (en) * | 2011-08-31 | 2013-02-28 | International Business Machines Corporation | Categorizing email recipients into logical groups when sending a mass email |
US8423578B2 (en) | 2008-12-23 | 2013-04-16 | At&T Intellectual Property I, L.P. | Messaging personalization |
US20130246545A1 (en) * | 2010-11-04 | 2013-09-19 | Huawei Device Co., Ltd. | Method and Apparatus for Quickly Adding Recipient and Mobile Terminal |
US20140052795A1 (en) * | 2012-08-20 | 2014-02-20 | Jenny Q. Ta | Social network system and method |
US20140108526A1 (en) * | 2012-10-16 | 2014-04-17 | Google Inc. | Social gathering-based group sharing |
US20140222815A1 (en) * | 2010-02-05 | 2014-08-07 | Google Inc. | Generating contact suggestions |
US20140330917A1 (en) * | 2012-01-19 | 2014-11-06 | Fujitsu Limited | Computer readable non-transitory medium, electronic mail information send method and electronic mail information send device |
US8924956B2 (en) | 2010-02-03 | 2014-12-30 | Yahoo! Inc. | Systems and methods to identify users using an automated learning process |
US8938773B2 (en) | 2007-02-02 | 2015-01-20 | Websense, Inc. | System and method for adding context to prevent data leakage over a computer network |
US8949359B2 (en) | 2009-03-23 | 2015-02-03 | Google Inc. | Systems and methods for searching multiple instant messages |
US8959634B2 (en) | 2008-03-19 | 2015-02-17 | Websense, Inc. | Method and system for protection against information stealing software |
US8984074B2 (en) | 2009-07-08 | 2015-03-17 | Yahoo! Inc. | Sender-based ranking of person profiles and multi-person automatic suggestions |
US8982053B2 (en) | 2010-05-27 | 2015-03-17 | Yahoo! Inc. | Presenting a new user screen in response to detection of a user motion |
US8990323B2 (en) | 2009-07-08 | 2015-03-24 | Yahoo! Inc. | Defining a social network model implied by communications data |
US9015842B2 (en) | 2008-03-19 | 2015-04-21 | Websense, Inc. | Method and system for protection against information stealing software |
US9021386B1 (en) | 2009-05-28 | 2015-04-28 | Google Inc. | Enhanced user interface scrolling system |
US9020938B2 (en) | 2010-02-03 | 2015-04-28 | Yahoo! Inc. | Providing profile information using servers |
US9026935B1 (en) | 2010-05-28 | 2015-05-05 | Google Inc. | Application user interface with an interactive overlay |
WO2015085885A1 (en) * | 2013-12-11 | 2015-06-18 | Tencent Technology (Shenzhen) Company Limited | Method and device for prompting messages |
US9087323B2 (en) | 2009-10-14 | 2015-07-21 | Yahoo! Inc. | Systems and methods to automatically generate a signature block |
US9130972B2 (en) | 2009-05-26 | 2015-09-08 | Websense, Inc. | Systems and methods for efficient detection of fingerprinted data and information |
US9130986B2 (en) | 2008-03-19 | 2015-09-08 | Websense, Inc. | Method and system for protection against information stealing software |
US9166939B2 (en) | 2009-05-28 | 2015-10-20 | Google Inc. | Systems and methods for uploading media content in an instant messaging conversation |
US20150358266A1 (en) * | 2014-06-05 | 2015-12-10 | International Business Machines Corporation | Preventing messages from being sent using inappropriate communication accounts |
US9241259B2 (en) | 2012-11-30 | 2016-01-19 | Websense, Inc. | Method and apparatus for managing the transfer of sensitive information to mobile devices |
US9275126B2 (en) | 2009-06-02 | 2016-03-01 | Yahoo! Inc. | Self populating address book |
CN105468357A (en) * | 2015-11-16 | 2016-04-06 | 广东欧珀移动通信有限公司 | Message prompting method and device of social application and mobile terminal |
US9380011B2 (en) | 2010-05-28 | 2016-06-28 | Google Inc. | Participant-specific markup |
US9501561B2 (en) | 2010-06-02 | 2016-11-22 | Yahoo! Inc. | Personalizing an online service based on data collected for a user of a computing device |
US9514466B2 (en) | 2009-11-16 | 2016-12-06 | Yahoo! Inc. | Collecting and presenting data including links from communications sent to or from a user |
US20160366088A1 (en) * | 2015-06-09 | 2016-12-15 | International Business Machines Corporation | Ensuring that a composed message is being sent to the appropriate recipient |
US9559999B1 (en) * | 2014-05-30 | 2017-01-31 | EMC IP Holding Company LLC | Method and system for processing large scale emails and limiting resource consumption and interruption therefrom |
US9584343B2 (en) | 2008-01-03 | 2017-02-28 | Yahoo! Inc. | Presentation of organized personal and public data using communication mediums |
US9602444B2 (en) | 2009-05-28 | 2017-03-21 | Google Inc. | Participant suggestion system |
US9667577B2 (en) | 2015-01-13 | 2017-05-30 | International Business Machines Corporation | Correlating contact type with appropriate communications to eliminate inadvertent communications |
US9685158B2 (en) | 2010-06-02 | 2017-06-20 | Yahoo! Inc. | Systems and methods to present voice message information to a user of a computing device |
US9721228B2 (en) | 2009-07-08 | 2017-08-01 | Yahoo! Inc. | Locally hosting a social network using social data stored on a user's computer |
US9747583B2 (en) | 2011-06-30 | 2017-08-29 | Yahoo Holdings, Inc. | Presenting entity profile information to a user of a computing device |
US9760866B2 (en) | 2009-12-15 | 2017-09-12 | Yahoo Holdings, Inc. | Systems and methods to provide server side profile information |
US9819765B2 (en) | 2009-07-08 | 2017-11-14 | Yahoo Holdings, Inc. | Systems and methods to provide assistance during user input |
GB2555580A (en) * | 2016-10-28 | 2018-05-09 | Egress Software Tech Ltd | Controlling data transmission |
US10003563B2 (en) | 2015-05-26 | 2018-06-19 | Facebook, Inc. | Integrated telephone applications on online social networks |
US10013672B2 (en) | 2012-11-02 | 2018-07-03 | Oath Inc. | Address extraction from a communication |
US10078819B2 (en) | 2011-06-21 | 2018-09-18 | Oath Inc. | Presenting favorite contacts information to a user of a computing device |
US10192200B2 (en) | 2012-12-04 | 2019-01-29 | Oath Inc. | Classifying a portion of user contact data into local contacts |
US20190384897A1 (en) * | 2018-06-18 | 2019-12-19 | Oracle International Corporation | System and method for protecting online resources against guided username guessing attacks |
CN111742337A (en) * | 2017-12-22 | 2020-10-02 | 谷歌有限责任公司 | Message analysis using machine learning models |
US10977285B2 (en) | 2012-03-28 | 2021-04-13 | Verizon Media Inc. | Using observations of a person to determine if data corresponds to the person |
US20210273950A1 (en) * | 2020-02-28 | 2021-09-02 | Darktrace Limited | Method and system for determining and acting on a structured document cyber threat risk |
US11379336B2 (en) * | 2019-05-13 | 2022-07-05 | Microsoft Technology Licensing, Llc | Mailbox management based on user activity |
US20220292209A1 (en) * | 2021-03-15 | 2022-09-15 | Jpmorgan Chase Bank, N.A. | System and method for intelligent identification of content data in files and multi-recipients control |
US11888804B2 (en) * | 2013-02-19 | 2024-01-30 | Zoho Corporation Private Limited | User interface enhancements and associated processes in email communication |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8880989B2 (en) * | 2012-01-30 | 2014-11-04 | Microsoft Corporation | Educating users and enforcing data dissemination policies |
US9087039B2 (en) | 2012-02-07 | 2015-07-21 | Microsoft Technology Licensing, Llc | Language independent probabilistic content matching |
US9319373B1 (en) * | 2012-03-15 | 2016-04-19 | PlayStudios, Inc. | Social networking game with prioritized message queue |
US9172671B2 (en) * | 2012-04-18 | 2015-10-27 | International Business Machines Corporation | Filtering message posts in a social network |
US9406049B2 (en) * | 2012-04-26 | 2016-08-02 | Blackberry Limited | Electronic device and method for updating message recipients based on message body indicators |
US9832284B2 (en) | 2013-12-27 | 2017-11-28 | Facebook, Inc. | Maintaining cached data extracted from a linked resource |
US8832832B1 (en) | 2014-01-03 | 2014-09-09 | Palantir Technologies Inc. | IP reputation |
US9442903B2 (en) * | 2014-02-06 | 2016-09-13 | Facebook, Inc. | Generating preview data for online content |
US10133710B2 (en) | 2014-02-06 | 2018-11-20 | Facebook, Inc. | Generating preview data for online content |
US10567327B2 (en) * | 2014-05-30 | 2020-02-18 | Facebook, Inc. | Automatic creator identification of content to be shared in a social networking system |
US9043894B1 (en) | 2014-11-06 | 2015-05-26 | Palantir Technologies Inc. | Malicious software detection in a computing system |
US9684798B2 (en) | 2015-05-01 | 2017-06-20 | International Business Machines Corporation | Audience-based sensitive information handling for shared collaborative documents |
US10073926B2 (en) | 2015-08-04 | 2018-09-11 | International Business Machines Corporation | Team analytics context graph generation and augmentation |
US9456000B1 (en) | 2015-08-06 | 2016-09-27 | Palantir Technologies Inc. | Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications |
US10546020B2 (en) | 2016-02-29 | 2020-01-28 | International Business Machines Corporation | Conversation purpose-based team analytics |
US10554610B2 (en) | 2016-06-23 | 2020-02-04 | International Business Machines Corporation | Method and a system for email address validation |
US10305840B2 (en) * | 2017-06-16 | 2019-05-28 | International Business Machines Corporation | Mail bot and mailing list detection |
US10931611B2 (en) | 2018-05-24 | 2021-02-23 | Microsoft Technology Licensing, Llc | Message propriety determination and alert presentation on a computing device |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6205472B1 (en) * | 1998-09-18 | 2001-03-20 | Tacit Knowledge System, Inc. | Method and apparatus for querying a user knowledge profile |
US6539421B1 (en) * | 1999-09-24 | 2003-03-25 | America Online, Inc. | Messaging application user interface |
US20040021526A1 (en) * | 2002-07-30 | 2004-02-05 | Agency For Defense Development | Wideband 180° bit phase shifter |
US20040039786A1 (en) * | 2000-03-16 | 2004-02-26 | Horvitz Eric J. | Use of a bulk-email filter within a system for classifying messages for urgency or importance |
US6832245B1 (en) * | 1999-12-01 | 2004-12-14 | At&T Corp. | System and method for analyzing communications of user messages to rank users and contacts based on message content |
US20050198171A1 (en) * | 2004-02-11 | 2005-09-08 | Landsman Richard A. | Managing electronic messages using contact information |
US20050204001A1 (en) * | 2002-09-30 | 2005-09-15 | Tzvi Stein | Method and devices for prioritizing electronic messages |
US20060026244A1 (en) * | 2004-07-30 | 2006-02-02 | Xerox Corporation | Electronic mail system having a recipient field modifier function |
US20070050455A1 (en) * | 2005-09-01 | 2007-03-01 | David Yach | Method and device for predicting message recipients |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6671718B1 (en) * | 1999-06-28 | 2003-12-30 | Mark Meister | Email client application incorporating an active transmit authorization request |
US7275214B2 (en) * | 2002-01-30 | 2007-09-25 | International Business Machines Corporation | Method of setting destinations of electronic mail |
US7130887B2 (en) * | 2002-04-18 | 2006-10-31 | Bernel Goldberg | Method and system for generating separate e-mail transmissions to copied recipients for providing additional information |
US7660855B2 (en) * | 2002-09-24 | 2010-02-09 | International Business Machines Corporation | Using a prediction algorithm on the addressee field in electronic mail systems |
US20050171954A1 (en) | 2004-01-29 | 2005-08-04 | Yahoo! Inc. | Selective electronic messaging within an online social network for SPAM detection |
US7673003B2 (en) | 2004-04-28 | 2010-03-02 | Microsoft Corporation | Social network email filtering |
US20070050456A1 (en) * | 2005-08-30 | 2007-03-01 | John Vuong | Automated creation of e-mail distribution lists |
-
2006
- 2006-06-19 US US11/424,889 patent/US20070294428A1/en not_active Abandoned
-
2010
- 2010-12-09 US US12/963,658 patent/US8271598B2/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6205472B1 (en) * | 1998-09-18 | 2001-03-20 | Tacit Knowledge System, Inc. | Method and apparatus for querying a user knowledge profile |
US6539421B1 (en) * | 1999-09-24 | 2003-03-25 | America Online, Inc. | Messaging application user interface |
US6832245B1 (en) * | 1999-12-01 | 2004-12-14 | At&T Corp. | System and method for analyzing communications of user messages to rank users and contacts based on message content |
US20040039786A1 (en) * | 2000-03-16 | 2004-02-26 | Horvitz Eric J. | Use of a bulk-email filter within a system for classifying messages for urgency or importance |
US20040021526A1 (en) * | 2002-07-30 | 2004-02-05 | Agency For Defense Development | Wideband 180° bit phase shifter |
US20050204001A1 (en) * | 2002-09-30 | 2005-09-15 | Tzvi Stein | Method and devices for prioritizing electronic messages |
US20050198171A1 (en) * | 2004-02-11 | 2005-09-08 | Landsman Richard A. | Managing electronic messages using contact information |
US20060026244A1 (en) * | 2004-07-30 | 2006-02-02 | Xerox Corporation | Electronic mail system having a recipient field modifier function |
US20070050455A1 (en) * | 2005-09-01 | 2007-03-01 | David Yach | Method and device for predicting message recipients |
Cited By (147)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7499976B2 (en) * | 2004-05-28 | 2009-03-03 | International Business Machines Corporation | Warning and avoidance of sending email messages to unintended recipients |
US20050278430A1 (en) * | 2004-05-28 | 2005-12-15 | International Business Machines Corp. | Warning and avoidance of sending email messages to unintended recipients |
US20080250114A1 (en) * | 2005-10-14 | 2008-10-09 | International Business Machines Corporation | Mitigating address book weaknesses that permit the sending of e-mail to wrong addresses |
US7774421B2 (en) | 2005-10-14 | 2010-08-10 | International Business Machines Corporation | Mitigating address book weaknesses that permit the sending of e-mail to wrong addresses |
US20080071872A1 (en) * | 2006-09-20 | 2008-03-20 | John Nicholas Gross | Document Distribution Recommender System & Method |
US7996456B2 (en) * | 2006-09-20 | 2011-08-09 | John Nicholas and Kristin Gross Trust | Document distribution recommender system and method |
US8321519B2 (en) * | 2006-09-20 | 2012-11-27 | Facebook, Inc. | Social network site recommender system and method |
US8959167B2 (en) * | 2006-09-20 | 2015-02-17 | Facebook, Inc. | Social network site recommender system and method |
US20080071774A1 (en) * | 2006-09-20 | 2008-03-20 | John Nicholas Gross | Web Page Link Recommender |
US9298711B2 (en) * | 2006-09-20 | 2016-03-29 | Facebook, Inc. | Social network site recommender system and method |
US20080071873A1 (en) * | 2006-09-20 | 2008-03-20 | John Nicholas Gross | Electronic Message System Recipient Recommender |
US20130268609A1 (en) * | 2006-09-20 | 2013-10-10 | Facebook, Inc. | Social Network Site Recommender System and Method |
US8301704B2 (en) * | 2006-09-20 | 2012-10-30 | Facebook, Inc. | Electronic message system recipient recommender |
US20150161118A1 (en) * | 2006-09-20 | 2015-06-11 | Facebook, Inc. | Social Network Site Recommender System & Method |
US20080120556A1 (en) * | 2006-11-17 | 2008-05-22 | Bellsouth Intellectual Property Corporation | Systems and Methods for Displaying Electronic Mail Messages |
US8484296B2 (en) * | 2006-11-17 | 2013-07-09 | At&T Intellectual Property I, L.P. | Systems and methods for displaying electronic mail messages |
US8938773B2 (en) | 2007-02-02 | 2015-01-20 | Websense, Inc. | System and method for adding context to prevent data leakage over a computer network |
US9609001B2 (en) | 2007-02-02 | 2017-03-28 | Websense, Llc | System and method for adding context to prevent data leakage over a computer network |
US9591086B2 (en) | 2007-07-25 | 2017-03-07 | Yahoo! Inc. | Display of information in electronic communications |
US11552916B2 (en) | 2007-07-25 | 2023-01-10 | Verizon Patent And Licensing Inc. | Indexing and searching content behind links presented in a communication |
US9275118B2 (en) * | 2007-07-25 | 2016-03-01 | Yahoo! Inc. | Method and system for collecting and presenting historical communication data |
US9298783B2 (en) | 2007-07-25 | 2016-03-29 | Yahoo! Inc. | Display of attachment based information within a messaging system |
US9716764B2 (en) | 2007-07-25 | 2017-07-25 | Yahoo! Inc. | Display of communication system usage statistics |
US9596308B2 (en) | 2007-07-25 | 2017-03-14 | Yahoo! Inc. | Display of person based information including person notes |
US10356193B2 (en) | 2007-07-25 | 2019-07-16 | Oath Inc. | Indexing and searching content behind links presented in a communication |
US10069924B2 (en) | 2007-07-25 | 2018-09-04 | Oath Inc. | Application programming interfaces for communication systems |
US9699258B2 (en) | 2007-07-25 | 2017-07-04 | Yahoo! Inc. | Method and system for collecting and presenting historical communication data for a mobile device |
US9058366B2 (en) | 2007-07-25 | 2015-06-16 | Yahoo! Inc. | Indexing and searching content behind links presented in a communication |
US9954963B2 (en) | 2007-07-25 | 2018-04-24 | Oath Inc. | Indexing and searching content behind links presented in a communication |
US10958741B2 (en) * | 2007-07-25 | 2021-03-23 | Verizon Media Inc. | Method and system for collecting and presenting historical communication data |
US10623510B2 (en) | 2007-07-25 | 2020-04-14 | Oath Inc. | Display of person based information including person notes |
US10554769B2 (en) | 2007-07-25 | 2020-02-04 | Oath Inc. | Method and system for collecting and presenting historical communication data for a mobile device |
US20090030933A1 (en) * | 2007-07-25 | 2009-01-29 | Matthew Brezina | Display of Information in Electronic Communications |
US20090031245A1 (en) * | 2007-07-25 | 2009-01-29 | Matthew Brezina | Method and System for Collecting and Presenting Historical Communication Data |
US11394679B2 (en) | 2007-07-25 | 2022-07-19 | Verizon Patent And Licensing Inc | Display of communication system usage statistics |
US20090077026A1 (en) * | 2007-09-17 | 2009-03-19 | Apple Inc. | Electronic Communication Messaging |
US8868566B2 (en) * | 2007-09-17 | 2014-10-21 | Apple Inc. | Electronic communication messaging |
US10305830B2 (en) | 2007-10-29 | 2019-05-28 | Microsoft Technology Licensing, Llc | Pre-send evaluation of E-mail communications |
US8539029B2 (en) * | 2007-10-29 | 2013-09-17 | Microsoft Corporation | Pre-send evaluation of E-mail communications |
US20090113001A1 (en) * | 2007-10-29 | 2009-04-30 | Microsoft Corporation | Pre-send evaluaton of e-mail communications |
US10200321B2 (en) | 2008-01-03 | 2019-02-05 | Oath Inc. | Presentation of organized personal and public data using communication mediums |
US9584343B2 (en) | 2008-01-03 | 2017-02-28 | Yahoo! Inc. | Presentation of organized personal and public data using communication mediums |
US9455981B2 (en) | 2008-03-19 | 2016-09-27 | Forcepoint, LLC | Method and system for protection against information stealing software |
US9495539B2 (en) | 2008-03-19 | 2016-11-15 | Websense, Llc | Method and system for protection against information stealing software |
US8959634B2 (en) | 2008-03-19 | 2015-02-17 | Websense, Inc. | Method and system for protection against information stealing software |
US9015842B2 (en) | 2008-03-19 | 2015-04-21 | Websense, Inc. | Method and system for protection against information stealing software |
US20090241197A1 (en) * | 2008-03-19 | 2009-09-24 | Websense, Inc. | System and method for analysis of electronic information dissemination events |
US9130986B2 (en) | 2008-03-19 | 2015-09-08 | Websense, Inc. | Method and system for protection against information stealing software |
US8370948B2 (en) * | 2008-03-19 | 2013-02-05 | Websense, Inc. | System and method for analysis of electronic information dissemination events |
EP2266278A2 (en) * | 2008-03-19 | 2010-12-29 | Websense, Inc. | System and method for analysis of electronic information dissemination events |
US20090259723A1 (en) * | 2008-04-10 | 2009-10-15 | Microsoft Corporation | Caching and exposing pre-send data relating to the sender or recipient of an electronic mail message |
US9305289B2 (en) | 2008-04-10 | 2016-04-05 | Microsoft Technology Licensing, Llc | Caching and exposing pre-send data relating to the sender or recipient of an electronic mail message |
EP2289041A4 (en) * | 2008-04-10 | 2013-01-09 | Microsoft Corp | Caching and exposing pre-send data relating to the sender or recipient of an electronic mail message |
US8280963B2 (en) | 2008-04-10 | 2012-10-02 | Microsoft Corporation | Caching and exposing pre-send data relating to the sender or recipient of an electronic mail message |
EP2289041A2 (en) * | 2008-04-10 | 2011-03-02 | Microsoft Corporation | Caching and exposing pre-send data relating to the sender or recipient of an electronic mail message |
WO2009126387A2 (en) | 2008-04-10 | 2009-10-15 | Microsoft Corporation | Caching and exposing pre-send data relating to the sender or recipient of an electronic mail message |
US9363211B2 (en) | 2008-07-17 | 2016-06-07 | International Business Machines Corporation | Automatically populating recipients in an instant messaging or other computer communication system |
US8423905B2 (en) * | 2008-07-17 | 2013-04-16 | International Business Machines Corporation | Automatically populating recipients in an instant messaging or other computer communication system |
US20100017753A1 (en) * | 2008-07-17 | 2010-01-21 | Li Fuyi | Automatically populating recipients in an instant messaging or other computer communication system |
US7552185B1 (en) | 2008-07-28 | 2009-06-23 | International Business Machines Corporation | Method for associating individuals or email groups with a specific recipient field |
US8423578B2 (en) | 2008-12-23 | 2013-04-16 | At&T Intellectual Property I, L.P. | Messaging personalization |
US9294421B2 (en) | 2009-03-23 | 2016-03-22 | Google Inc. | System and method for merging edits for a conversation in a hosted conversation system |
US8984139B2 (en) | 2009-03-23 | 2015-03-17 | Google Inc. | System and method for editing a conversation in a hosted conversation system |
US8949359B2 (en) | 2009-03-23 | 2015-02-03 | Google Inc. | Systems and methods for searching multiple instant messages |
US20120072519A1 (en) * | 2009-05-20 | 2012-03-22 | Panasonic Corporation | Device For Preventing Erroneous E-Mail Transmission |
US9130972B2 (en) | 2009-05-26 | 2015-09-08 | Websense, Inc. | Systems and methods for efficient detection of fingerprinted data and information |
US9692762B2 (en) | 2009-05-26 | 2017-06-27 | Websense, Llc | Systems and methods for efficient detection of fingerprinted data and information |
US9602444B2 (en) | 2009-05-28 | 2017-03-21 | Google Inc. | Participant suggestion system |
US9166939B2 (en) | 2009-05-28 | 2015-10-20 | Google Inc. | Systems and methods for uploading media content in an instant messaging conversation |
US9021386B1 (en) | 2009-05-28 | 2015-04-28 | Google Inc. | Enhanced user interface scrolling system |
US10963524B2 (en) | 2009-06-02 | 2021-03-30 | Verizon Media Inc. | Self populating address book |
US9275126B2 (en) | 2009-06-02 | 2016-03-01 | Yahoo! Inc. | Self populating address book |
US9721228B2 (en) | 2009-07-08 | 2017-08-01 | Yahoo! Inc. | Locally hosting a social network using social data stored on a user's computer |
US8984074B2 (en) | 2009-07-08 | 2015-03-17 | Yahoo! Inc. | Sender-based ranking of person profiles and multi-person automatic suggestions |
US9159057B2 (en) | 2009-07-08 | 2015-10-13 | Yahoo! Inc. | Sender-based ranking of person profiles and multi-person automatic suggestions |
US11755995B2 (en) | 2009-07-08 | 2023-09-12 | Yahoo Assets Llc | Locally hosting a social network using social data stored on a user's computer |
US9819765B2 (en) | 2009-07-08 | 2017-11-14 | Yahoo Holdings, Inc. | Systems and methods to provide assistance during user input |
US8990323B2 (en) | 2009-07-08 | 2015-03-24 | Yahoo! Inc. | Defining a social network model implied by communications data |
US9800679B2 (en) | 2009-07-08 | 2017-10-24 | Yahoo Holdings, Inc. | Defining a social network model implied by communications data |
US9087323B2 (en) | 2009-10-14 | 2015-07-21 | Yahoo! Inc. | Systems and methods to automatically generate a signature block |
US20110099220A1 (en) * | 2009-10-23 | 2011-04-28 | International Business Machines Corporation | Dynamic type-ahead for lists of prior specified addressees |
US7958197B2 (en) | 2009-10-23 | 2011-06-07 | International Business Machines Corporation | Dynamic type-ahead for lists of prior specified addressees |
US9514466B2 (en) | 2009-11-16 | 2016-12-06 | Yahoo! Inc. | Collecting and presenting data including links from communications sent to or from a user |
US10768787B2 (en) | 2009-11-16 | 2020-09-08 | Oath Inc. | Collecting and presenting data including links from communications sent to or from a user |
US9760866B2 (en) | 2009-12-15 | 2017-09-12 | Yahoo Holdings, Inc. | Systems and methods to provide server side profile information |
US11037106B2 (en) | 2009-12-15 | 2021-06-15 | Verizon Media Inc. | Systems and methods to provide server side profile information |
US8924956B2 (en) | 2010-02-03 | 2014-12-30 | Yahoo! Inc. | Systems and methods to identify users using an automated learning process |
US9842145B2 (en) | 2010-02-03 | 2017-12-12 | Yahoo Holdings, Inc. | Providing profile information using servers |
US9842144B2 (en) | 2010-02-03 | 2017-12-12 | Yahoo Holdings, Inc. | Presenting suggestions for user input based on client device characteristics |
US9020938B2 (en) | 2010-02-03 | 2015-04-28 | Yahoo! Inc. | Providing profile information using servers |
US9934286B2 (en) | 2010-02-05 | 2018-04-03 | Google Llc | Generating contact suggestions |
US9311415B2 (en) * | 2010-02-05 | 2016-04-12 | Google Inc. | Generating contact suggestions |
US20140222815A1 (en) * | 2010-02-05 | 2014-08-07 | Google Inc. | Generating contact suggestions |
US8982053B2 (en) | 2010-05-27 | 2015-03-17 | Yahoo! Inc. | Presenting a new user screen in response to detection of a user motion |
US9380011B2 (en) | 2010-05-28 | 2016-06-28 | Google Inc. | Participant-specific markup |
US9026935B1 (en) | 2010-05-28 | 2015-05-05 | Google Inc. | Application user interface with an interactive overlay |
US10685072B2 (en) | 2010-06-02 | 2020-06-16 | Oath Inc. | Personalizing an online service based on data collected for a user of a computing device |
US9594832B2 (en) | 2010-06-02 | 2017-03-14 | Yahoo! Inc. | Personalizing an online service based on data collected for a user of a computing device |
US9569529B2 (en) | 2010-06-02 | 2017-02-14 | Yahoo! Inc. | Personalizing an online service based on data collected for a user of a computing device |
US9501561B2 (en) | 2010-06-02 | 2016-11-22 | Yahoo! Inc. | Personalizing an online service based on data collected for a user of a computing device |
US9685158B2 (en) | 2010-06-02 | 2017-06-20 | Yahoo! Inc. | Systems and methods to present voice message information to a user of a computing device |
US9130891B2 (en) * | 2010-11-04 | 2015-09-08 | Huawei Device Co., Ltd. | Method and apparatus for quickly adding recipient and mobile terminal |
US20130246545A1 (en) * | 2010-11-04 | 2013-09-19 | Huawei Device Co., Ltd. | Method and Apparatus for Quickly Adding Recipient and Mobile Terminal |
US9762525B2 (en) * | 2010-12-16 | 2017-09-12 | International Business Machines Corporation | Electronic mail messaging system and method |
US20120158860A1 (en) * | 2010-12-16 | 2012-06-21 | International Business Machines Corporation | Electronic mail messaging system and method |
US10089986B2 (en) | 2011-06-21 | 2018-10-02 | Oath Inc. | Systems and methods to present voice message information to a user of a computing device |
US10078819B2 (en) | 2011-06-21 | 2018-09-18 | Oath Inc. | Presenting favorite contacts information to a user of a computing device |
US10714091B2 (en) | 2011-06-21 | 2020-07-14 | Oath Inc. | Systems and methods to present voice message information to a user of a computing device |
US9747583B2 (en) | 2011-06-30 | 2017-08-29 | Yahoo Holdings, Inc. | Presenting entity profile information to a user of a computing device |
US11232409B2 (en) | 2011-06-30 | 2022-01-25 | Verizon Media Inc. | Presenting entity profile information to a user of a computing device |
US20130054710A1 (en) * | 2011-08-31 | 2013-02-28 | International Business Machines Corporation | Categorizing email recipients into logical groups when sending a mass email |
US20140330917A1 (en) * | 2012-01-19 | 2014-11-06 | Fujitsu Limited | Computer readable non-transitory medium, electronic mail information send method and electronic mail information send device |
US9736087B2 (en) * | 2012-01-19 | 2017-08-15 | Fujitsu Limited | Computer readable non-transitory medium, electronic mail information send method and electronic mail information send device |
US10977285B2 (en) | 2012-03-28 | 2021-04-13 | Verizon Media Inc. | Using observations of a person to determine if data corresponds to the person |
US20140052795A1 (en) * | 2012-08-20 | 2014-02-20 | Jenny Q. Ta | Social network system and method |
US20140108526A1 (en) * | 2012-10-16 | 2014-04-17 | Google Inc. | Social gathering-based group sharing |
US9361626B2 (en) * | 2012-10-16 | 2016-06-07 | Google Inc. | Social gathering-based group sharing |
US10013672B2 (en) | 2012-11-02 | 2018-07-03 | Oath Inc. | Address extraction from a communication |
US11157875B2 (en) | 2012-11-02 | 2021-10-26 | Verizon Media Inc. | Address extraction from a communication |
US9241259B2 (en) | 2012-11-30 | 2016-01-19 | Websense, Inc. | Method and apparatus for managing the transfer of sensitive information to mobile devices |
US10135783B2 (en) | 2012-11-30 | 2018-11-20 | Forcepoint Llc | Method and apparatus for maintaining network communication during email data transfer |
US10192200B2 (en) | 2012-12-04 | 2019-01-29 | Oath Inc. | Classifying a portion of user contact data into local contacts |
US11888804B2 (en) * | 2013-02-19 | 2024-01-30 | Zoho Corporation Private Limited | User interface enhancements and associated processes in email communication |
WO2015085885A1 (en) * | 2013-12-11 | 2015-06-18 | Tencent Technology (Shenzhen) Company Limited | Method and device for prompting messages |
US9559999B1 (en) * | 2014-05-30 | 2017-01-31 | EMC IP Holding Company LLC | Method and system for processing large scale emails and limiting resource consumption and interruption therefrom |
US9736099B2 (en) | 2014-06-05 | 2017-08-15 | International Business Machines Corporation | Preventing messages from being sent using inappropriate communication accounts |
US20150358266A1 (en) * | 2014-06-05 | 2015-12-10 | International Business Machines Corporation | Preventing messages from being sent using inappropriate communication accounts |
US10044657B2 (en) | 2014-06-05 | 2018-08-07 | International Business Machines Corporation | Preventing messages from being sent using inappropriate communication accounts |
US9736100B2 (en) * | 2014-06-05 | 2017-08-15 | International Business Machines Corporation | Preventing messages from being sent using inappropriate communication accounts |
US9667577B2 (en) | 2015-01-13 | 2017-05-30 | International Business Machines Corporation | Correlating contact type with appropriate communications to eliminate inadvertent communications |
US10003563B2 (en) | 2015-05-26 | 2018-06-19 | Facebook, Inc. | Integrated telephone applications on online social networks |
US10812438B1 (en) | 2015-05-26 | 2020-10-20 | Facebook, Inc. | Integrated telephone applications on online social networks |
US20180048613A1 (en) * | 2015-06-09 | 2018-02-15 | International Business Machines Corporation | Ensuring that a composed message is being sent to the appropriate recipient |
US9866511B2 (en) * | 2015-06-09 | 2018-01-09 | International Business Machines Corporation | Ensuring that a composed message is being sent to the appropriate recipient |
US20160366088A1 (en) * | 2015-06-09 | 2016-12-15 | International Business Machines Corporation | Ensuring that a composed message is being sent to the appropriate recipient |
US10129199B2 (en) * | 2015-06-09 | 2018-11-13 | International Business Machines Corporation | Ensuring that a composed message is being sent to the appropriate recipient |
CN105468357A (en) * | 2015-11-16 | 2016-04-06 | 广东欧珀移动通信有限公司 | Message prompting method and device of social application and mobile terminal |
GB2555580A (en) * | 2016-10-28 | 2018-05-09 | Egress Software Tech Ltd | Controlling data transmission |
US10911556B2 (en) * | 2016-10-28 | 2021-02-02 | Egress Software Technologies Ip Limited | Method and system for controlling data transmission based on user access data |
US11223695B2 (en) | 2016-10-28 | 2022-01-11 | Egress Software Technologies Ip Limited | Controlling data transmission |
CN111742337A (en) * | 2017-12-22 | 2020-10-02 | 谷歌有限责任公司 | Message analysis using machine learning models |
US10956543B2 (en) * | 2018-06-18 | 2021-03-23 | Oracle International Corporation | System and method for protecting online resources against guided username guessing attacks |
US20190384897A1 (en) * | 2018-06-18 | 2019-12-19 | Oracle International Corporation | System and method for protecting online resources against guided username guessing attacks |
US11379336B2 (en) * | 2019-05-13 | 2022-07-05 | Microsoft Technology Licensing, Llc | Mailbox management based on user activity |
US20210273950A1 (en) * | 2020-02-28 | 2021-09-02 | Darktrace Limited | Method and system for determining and acting on a structured document cyber threat risk |
US20220292209A1 (en) * | 2021-03-15 | 2022-09-15 | Jpmorgan Chase Bank, N.A. | System and method for intelligent identification of content data in files and multi-recipients control |
US11687662B2 (en) * | 2021-03-15 | 2023-06-27 | Jpmorgan Chase Bank, N.A. | System and method for intelligent identification of content data in files and multi-recipients control |
Also Published As
Publication number | Publication date |
---|---|
US20110078587A1 (en) | 2011-03-31 |
US8271598B2 (en) | 2012-09-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8271598B2 (en) | Method and system for email messaging | |
US11037175B2 (en) | Method and system for monitoring an issue | |
US7953805B2 (en) | Methods for creating and using electronic mailing groups | |
KR101173812B1 (en) | Displaying expanded messages in a conversation-based email system | |
US8443045B2 (en) | Storage of selected e-mails including attachments in document management system | |
US7222157B1 (en) | Identification and filtration of digital communications | |
US8682984B2 (en) | Method and apparatus for transferring content to a number of recipients via multiple independent communication mediums | |
US20070050456A1 (en) | Automated creation of e-mail distribution lists | |
US20020010743A1 (en) | Method and system for distributing and collecting spreadsheet information | |
US8543650B2 (en) | Method and system for sending electronic mail over a network | |
US20070100950A1 (en) | Method for automatic retention of critical corporate data | |
US8631504B2 (en) | Document security within a business enterprise | |
US20080086506A1 (en) | Automated records management with hold notification and automatic receipts | |
US9235641B1 (en) | Method and apparatus for archive processing of electronic messages | |
Ingham | E‐mail overload in the UK workplace | |
US20120042019A1 (en) | Techniques for filtering selective users in distribution lists | |
US20070143420A1 (en) | Methods, systems, and computer program products for sorting electronic-mail messages | |
US20060277258A1 (en) | Managing and organizing electronic mail messages via a cross tabulation summary or a histogram | |
US9021345B2 (en) | Managing references related to patent applications | |
JP2006252223A (en) | Communication analyzing device, communication analyzing method, and computer program | |
JP2004334505A (en) | Email address input support program | |
JP7078570B2 (en) | Server equipment, terminals, methods, and programs | |
WO2005116889A1 (en) | A method of managing electronic mail | |
US20080263478A1 (en) | System for viewing complex data | |
Pennock | on IMAP service for customers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GUY, IDO;MIZRACHI, BOAZ;SOROKA, VLADIMIR;REEL/FRAME:017805/0664;SIGNING DATES FROM 20060612 TO 20060619 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |