US20150381533A1 - System and Method for Email Management Through Detection and Analysis of Dynamically Variable Behavior and Activity Patterns - Google Patents
System and Method for Email Management Through Detection and Analysis of Dynamically Variable Behavior and Activity Patterns Download PDFInfo
- Publication number
- US20150381533A1 US20150381533A1 US14/318,676 US201414318676A US2015381533A1 US 20150381533 A1 US20150381533 A1 US 20150381533A1 US 201414318676 A US201414318676 A US 201414318676A US 2015381533 A1 US2015381533 A1 US 2015381533A1
- Authority
- US
- United States
- Prior art keywords
- recipient
- sender
- messages
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/02—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/04—Inference or reasoning models
- G06N5/046—Forward inferencing; Production systems
- G06N5/047—Pattern matching networks; Rete networks
Definitions
- Embodiments of the present invention generally relate to messaging in communication systems and, more particularly, to systems and methods for managing high volumes of incoming messages.
- the method extracts characteristics from new email messages addressed to the recipient and received from a plurality of senders.
- the method analyzes statistics accumulated from the extraction of characteristics from email messages previously received by the recipient.
- the statistics include time and date of receipt in the recipient's inbox, time and date first read by the recipient, the frequency of email messages received by the recipient from each of a plurality of senders over time, and the rate(s) at which emails received from each sender and/or a plurality of senders in the aggregate are read, responded to, and/or managed by the recipient.
- the method identifies one or more patterns of behavior or activity in the accumulated statistics.
- the method identifies patterns specific to the e-mail messages sent by a particular sender, patterns applicable to the way the recipient responds to and/or manages email sent by a particular sender, and/or patterns applicable to the way the recipient responds to and/or manages email sent by a group of senders in the aggregate, wherein the group may comprise all senders from whom the recipient has received email messages, or a subset of such senders.
- “manages” includes categorizing emails, filing email under various subfolders, flagging email as “To Do” items, and deleting emails.
- a pre-existing rule is slightly modified based on a combination of recently monitored behavior and longer term behavioral history? Or, if such a rule does not exist yet, a new own is established based on the recipient's behavior.
- an apparatus for aiding an email recipient in the management of inbound messages by detecting, and configurably responding to, dynamically variable patterns of activity and behavior is described.
- a computer having one or more processors, memory and at least one network interface, further comprises a message manager module including instructions executable by the one or more processors.
- the message manager module is operative to receive a new email message for a recipient from a first sender, and to extract email characteristics from the received email message.
- the message manager module is further operative to determine one or more of the following: (a) a contemporaneous volume or rate of change in a volume of new e-mail messages from the first sender and intended for the recipient; (b) a contemporaneous volume or rate of change in a volume of new e-mail messages from a plurality of senders and intended for the recipient; (c) a contemporaneous rate of change in a volume of at least one of new messages received from the first sender and read by the recipient or email messages received from the first sender and managed by the recipient; and (d) a contemporaneous rate of change in a volume of at least one of new messages received from a plurality of senders and read by the recipient or email messages received from the plurality of senders and managed by the recipient.
- the message manager module is further operative to access usage statistics comprising at least one of sender frequency statistics, recipient response statistics or management rate statistics gathered by extraction of email characteristics from prior email messages, and to perform, on the received email message, an action according to a determined contemporaneous volume or rate.
- a computer readable medium for aiding an email recipient in the management of inbound messages by detecting, and configurably responding to, dynamically variable patterns of activity and behavior.
- the computer readable medium comprises instructions that, when executed by a processor, cause a system to: extract email characteristics from a new message received from a first sender and intended for a recipient, and to identify, from statistics derived from previously received messages, at least one of a pattern of recipient message management or message response behavior relating to treatment of messages from each of a plurality of senders or a pattern of sender activity.
- the medium further comprises instructions that, when executed by a processor, cause a system to detect, prior to reading of the new message by the recipient, whether any deviation from an identified recipient response/management pattern exists and, if a deviation is detected, to perform an action on the received message or propose taking of such action to the recipient.
- the system if the system detects the absence of any recipient action, contrary to an identified behavioral pattern on the part of the recipient, the system proposes taking the “typical” action normally undertaken by the recipient. For example, if the recipient typically reads an email from a particular sender within ninety minutes but now fails to do so, the system could remind the user to read that particular sender's email.
- FIG. 1A is a block diagram depicting a communication system configured to aid email recipients in the management of their email, through detection and analysis of dynamically variable behavior and activity patterns, according to one or more network centric embodiments;
- FIG. 1B is a block diagram depicting a communication system configured to aid email recipients in the management of their email, through detection and analysis of dynamically variable behavior and activity patterns, according to one or more communication terminal (e.g., “endpoint”) centric embodiments;
- FIG. 2 is a block diagram depicting, in greater detail, the interaction between the functional components according to the embodiments exemplified by FIG. 1A ;
- FIG. 3A is a graphical representation depicting the frequency at which a plurality of senders have sent messages, including email messages, to a recipient over time, forming a portion of statistics gathered according to one or more embodiments;
- FIG. 3B is a graphical representation depicting the time taken by a recipient to respond to email messages received from a plurality of recipients over time, as well as average response times computed for selected senders, forming a portion of statistics gathered according to one or more embodiments;
- FIG. 3C is a graphical representation depicting monitored changes in the rate at which new unread messaged are accumulated in a recipient's email inbox, over a time window preceding but contemporaneous with receipt of email messages from a plurality of senders vs. monitored changes in the rate at which the recipient has replied to or managed received email messages during the same time window;
- FIG. 3D is a graphical representation depicting the classification of e-mail management outcomes over a time window preceding but contemporaneous with receipt of email messages from a plurality of senders, during which a recipient has either archived, forwarded, deleted, replied to, or forwarded messages received from one specific sender;
- FIG. 3E is a graphical representation depicting the classification of e-mail management outcomes over a time window preceding but contemporaneous with receipt of email messages from a plurality of senders, during which a recipient has either archived, forwarded, deleted, replied to, or forwarded messages received from another specific sender;
- FIG. 3F is a graphical representation depicting the correlation of recipient response times to received email messages to the presence of one or more key words in those messages, over a time window preceding but contemporaneous with receipt of email messages from a plurality of senders;
- FIG. 4 is a flow diagram depicting a technique for aiding recipients in the management of their email, through detection and analysis of dynamically variable behavior and activity patterns, according to one or more embodiments;
- FIG. 5 is a flow diagram depicting discrete sub-steps applicable to the identification of one or more patterns through analysis of collected email account statistics, according to embodiments exemplified by FIG. 4 ;
- FIG. 6 is a flow diagram depicting discrete sub-steps applicable to the analysis of contemporaneous email account statistics in order to indentify deviations from identified patterns, according to embodiments exemplified by FIG. 4 ;
- FIG. 7A is a screen shot depicting a user interface, displayed on a recipient's communication terminal, obtained by local execution of an e-mail messaging client application by a processor of the terminal and depicting an inbox managed through detection and analysis of dynamically variable behavior and activity patterns, according to one or more embodiments;
- FIGS. 7B and 7C are respective screen shots depicting the display of an alert notification generated by an email message management application, and the corresponding prompt displayed to the recipient, each according to one or more embodiments.
- the word “may” is used in a permissive sense (i.e., meaning having the potential to), rather than the mandatory sense (i.e., meaning must).
- the words “include”, “including”, and “includes” mean including, but not limited to.
- Examples of a deviating pattern or behavior change detected include an inability to read or respond to any new inbound email messages over a period of selectable duration, an inability to reduce the volume of new/unread email messages in an inbox below a threshold for a period of time, or the existence of a scheduled conference call or meeting at a time when the number of new unread email messages exceeds a selectable threshold.
- such quantities may take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared or otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to such signals as bits, data, values, elements, symbols, characters, terms, numbers, numerals or the like. It should be understood, however, that all of these or similar terms are to be associated with appropriate physical quantities and are merely convenient labels. Unless specifically stated otherwise, as apparent from the following discussion, it is appreciated that throughout this specification discussions utilizing terms such as “processing,” “computing,” “calculating,” “determining” or the like refer to actions or processes of a specific apparatus, such as a special purpose computer or a similar special purpose electronic computing device.
- a special purpose computer or a similar special purpose electronic computing device is capable of manipulating or transforming signals, typically represented as physical electronic or magnetic quantities within memories, registers, or other information storage devices, transmission devices, or display devices of the special purpose computer or similar special purpose electronic computing device.
- FIG. 1A is a block diagram depicting a communication system 100 configured to aid email recipients in the management of their email, through detection and analysis of dynamically variable behavior and activity patterns, according to one or more network centric embodiments.
- system 100 includes a unified communication server 102 having a messaging manager module 110 which includes a behavior analyzer 140 , a data repository 150 containing email user account behavior profiles 152 (“recipient profiles”), including the recipient profile of a user of communication terminal 160 which executes an e-mail browser client or client email application program 162 .
- Message manager module 110 further includes a message management agent 170 .
- System 100 further includes one or more messaging servers including at least an email server and optionally an instant messaging server, and SMS messaging server, and a voice mail server and corresponding speech to text processor, collectively referred to as messaging server 120 , and an event calendar server 130 .
- FIG. 1B is a block diagram depicting an embodiment of a communication system 100 ′ configured to aid email recipients in the management of their email, through detection and analysis of dynamically variable behavior and activity patterns, according to one or more communication terminal (“user endpoint”) centric embodiments.
- the arrangement of and interrelationships between the various functional components of the embodiment of FIG. 1B are very similar to those of the embodiment of FIG. 1A .
- a principal difference between the respective embodiments is that in the former case, contemporaneous monitoring and evaluation of contemporaneous e-mail behavior and/or activity patterns against a recipient profile, are performed locally by a message manager module 110 ′ program executed locally on the recipient device rather than at a central server.
- a message manager module 110 ′ program executed locally on the recipient device rather than at a central server.
- at least some of the message manager module's behavior/activity data collection and/or pattern and usage monitoring functions are performed remotely at a central server.
- system 100 ′ includes a communication terminal 160 ′ having a central processing unit (CPU) 107 ′, support circuits, a memory 109 ′ containing an operating system 111 ′ and applications executable by CPU 107 ′, and an associated display 162 ′.
- CPU central processing unit
- message manager module 110 ′ contains message management agent 170 ′, which is communicatively coupled by a network connection to one or more remote messaging server(s) 120 ′.
- message manager agent is programmed to:
- FIG. 2 is a block diagram depicting, in greater detail, the interaction between the functional components in a system 200 according to embodiments exemplified by FIG. 1A .
- the various components of system 200 including unified communication server 202 , email server 220 , calendar/contact management server 230 , voicemail messaging server 240 , call server 250 , and an LDAP directory server 254 , and user communication terminals 260 - 1 to 260 - n are connected by one or more network links.
- Some of the links are established by a network which includes a communication system that connects computers (or devices) by wire, cable, fiber optic and/or wireless link facilitated by various types of well-known network elements, such as hubs, switches, routers, and the like.
- the network interconnecting some components may also be part of the Intranet using various communications infrastructure, such as Ethernet, Wi-Fi, a personal area network (PAN), a wireless PAN, Bluetooth, Near field communication, and the like.
- the various servers 202 , 220 , 230 , 240 , 250 and 254 are each a computing device, or may be the same computing device as, for example, a desktop computer, laptop, tablet computer, and the like, or they may be cloud based servers e.g., a blade server, virtual machine, and the like.
- calendar/contact management server 230 For each provisioned calendar/contract management services user or subscriber, calendar/contact management server 230 provides services to a calendar application on user terminals 260 - 1 to 260 - n .
- calendar server 230 provides to user terminal 260 - 1 an event calendar 232 , including schedule information, directory services (“Contacts”) 234 , event history 236 , and email services.
- voice mail server 240 maintains a voice mail message queue 242 and message envelope date 244 indicating a date and time when a voice mail message was left for the user, an identification of the caller or caller's extension (if available), whether and when a voice mail message was forwarded to another extension (a voice message forwarded to another party qualifying as a “response” according to one or more embodiments), and an indication of a date and time when the user first accessed the voice mail.
- server 202 further includes a speech-to-text interface (not shown) operative to convert voice messages into email messages.
- call server 250 For each provisioned telephony services user or subscriber, call server 250 maintains call event logs 252
- the call event logs include an incoming call log indicating a date and time when a call for the user was received, an identification of the caller's identity, phone number or extension (if available), and an indication of whether and when (date/time) each call was answered by the user or forwarded to voice mail message or to another extension (with answering or forwarding a call received from an email sender each qualifying as a “response” to an email message received from the sender if performed subsequent to receiving and reading the email message, according to some embodiments), and an indication of a date and time when the user first accessed the voice mail.
- a speech to text converter associated with unified communication system 202 may be configured to search transcribed content of the dialog between a caller and call recipient to identify the presence of any key words in the call also present in the received email.
- the call event logs 252 further include an outgoing call log indicating a date and time when a call by the user was made, an identification of a number of the number dialed, and an indication of the duration of the call.
- a call log entry indicating that the user called the sender of an email qualifies as a “response” to an email message received from the sender if performed subsequent to receiving and reading the email message.
- speech to text converter (not shown) associated with unified communication system 202 may be configured to search transcribed content of the dialog between a caller and call recipient to identify the presence of any key words in the call also present in the received email.
- LDAP directory server 254 provides caller and call recipient directory lookups as needed to support the aforementioned response classifications.
- email server sever 220 For each provisioned email user or subscriber, email server sever 220 maintains an email message queue 222 and message envelope information 224 identifying the sender's email address, recipient's email address, the date and time of delivery to an email inbox, and user account settings 226 including rules and preferences 228 and rules 229 defined by the user.
- rules are enforceable by the email server 220 and are typically designed to reduce the amount of email which must be stored on the server pending user review, to separate and prioritize email for the user so that the limited time the user may have to review his or her email is effectively utilized, to organize the user's email to make it easier to find and/or reference email as needed, and/or to send a simple message to email senders during a particular time interval selected by the user.
- these rules are supplemented by rules generated and proposed, for adoption by the email account user, by detecting, and configurably responding to, dynamically variable patterns of activity and behavior.
- some or all of the supplemental rules, once adopted by an email user, are stored as part of the rules 229 .
- unified communication server 202 includes a messaging manager module 210 comprising a set of instructions residing in memory 204 and executable by a Central Processing Unit (CPU) 201 .
- the CPU 201 may include one or more commercially available microprocessors or microcontrollers that facilitate data processing and storage.
- Various support circuits 203 facilitate the operation of the CPU 201 and include one or more clock circuits, power supplies, cache, input/output circuits, and the like.
- the memory 204 includes at least one of Read Only Memory (ROM), Random Access Memory (RAM), disk drive storage, optical storage, removable storage and/or the like.
- memory 204 includes an operating system 205 , and a plurality of applications including 206 including the aforementioned optional speech-to-text converter.
- Message manager module 210 includes a message management agent 270 comprising a notification manager 272 for generating prompts and alerts to be sent or presented to the users of terminals 260 - 1 to 260 - n as well and for generating notifications to be sent or presented to email senders according to one or more rules or preferences 274 adopted by the user and in response to patterns and/or activity monitored by volume/management monitor (“monitor”) 276 .
- monitor 276 is operative, through instructions executed by CPU 201 , to monitor the flow of incoming new email messages over a contemporaneous monitoring window.
- Such monitoring can include refers to counting the number of new email messages over the monitoring window, from which calculations like a rate of change in the volume of new and/or unread email messages with respect to time can be computed.
- a “contemporaneous monitoring window” or, simply, “monitoring window” refers to a period of time (whether of predetermined or selectable duration) that immediately precedes or encompasses a moment in time when a particular new message to be processed by message management agent 270 , has been received in a recipient (“user”) inbox.
- the messages include emails, but can also include voice mail messages, as well as SMS text messages, and instant messages received by SMS and Instant Messaging servers (not shown), respectively.
- a contemporaneous monitoring window may be from four minutes in duration to four hours in duration.
- Monitor 276 is further operative, through instructions executed by CPU 201 , to collect instantaneous message management rate volume measurements over a contemporaneous monitoring window.
- the management rate refers, according to some embodiments, to the rate at which the user performs on or more actions on new or unread messages.
- the actions typically include reading plus one more action such as forwarding a message to a colleague, sending a reply, sending a text message, sending an SMS, sending an instant (IM) message, calling or leaving a voice mail to the originator of the message. Even the act of reading a message, however, is included as part of the management rate in some embodiments, however.
- monitor 276 is able to perform instantaneous computations of the rate of change in unread message volume.
- message management agent 270 can identity any change in the pattern substantial enough to be a deviation from the historical pattern.
- message manager module 210 further includes a behavior analyzer 280 which comprises an envelope/calendar event inspector/call log inspector (“inspector”) 282 , a management rate analyzer (“analyzer”) 284 , and a volume analyzer 286 .
- a behavior analyzer 280 comprises an envelope/calendar event inspector/call log inspector (“inspector”) 282 , a management rate analyzer (“analyzer”) 284 , and a volume analyzer 286 .
- inspector 282 is operative, through instructions executed by CPU 201 , to collect incoming (new) rate, and/or accumulated unread rate, as well as management rate statistics. However, these are collected over a longer time frame and form the basis of deriving and identifying a baseline for user and sender behavior and/or activity patterns.
- baseline window The longer time frame is referred to herein as a baseline pattern identification window (or, simply “baseline window”).
- the baseline window can be substantially longer than the contemporaneous monitoring window and generally precedes (though it can also encompass) the moment in time when a particular new message, to be processed by message management agent 270 , has been received in a recipient (or “user”) inbox.
- a baseline pattern identification window may be from 5 minutes in duration to 5 months in duration.
- Management rate analyzer 284 includes a window selector which allows the duration of the baseline window to be dilated or compressed, as needed, depending for example, on the volume of email and other messages which might be accumulated by an especially busy recipient vs. one who has fewer incoming emails on an average basis but periodic spikes requiring individualized treatment.
- Volume analyzer 286 also includes a window selector 287 , as well as a threshold selector 288 .
- the latter selector in some embodiments allows independent and selectable configuration of multiple thresholds as will be explained shortly, and therefore enables fine tuning specific to each recipient over time as the base of statistics collected for a particular recipient grows.
- Message manager module 210 further includes data repository 290 .
- data repository 290 includes an envelope/calendar datastore 292 containing such data as currently scheduled meeting dates and times (retrieved, for example, from the event calendar 234 of server 230 ), as well as previously scheduled meeting dates and times (retrieved from event history 236 of server 230 ).
- Contact information including the email address of other meeting invitees (any of whom may be originators of email, voicemail, SMS, IM and other kinds of messages managed by messaging manager module 210 according to one or more embodiments).
- Data repository 290 further includes user behavior profiles (also referred to herein as “recipient profiles) 294 .
- Each recipient profile 294 includes, for example, message volume statistics and management rate statistics accumulated over the baseline windows and monitoring windows applicable to a particular recipient.
- Each of user communication terminals or devices 260 - 1 to 260 - n is a computing device, for example a desktop computer, laptop, tablet computer, Smartphone, and the like that includes or is connected to a display and user input devices such as a mouse, keyboard, touch screen, camera, microphone, etc.
- the user device 260 - 1 is a computer tablet that includes a touch screen display (not shown), Central Processing Unit (CPU) 207 , support circuits 208 , a memory 209 , as well as a network interface adapted to communicatively couple terminal 260 - 1 to server 202 via a wireless internet connection or other network connection.
- CPU Central Processing Unit
- CPU 207 includes one or more commercially available microprocessors or microcontrollers that facilitate data processing and storage.
- the various support circuits 208 facilitate the operation of CPU 207 and include one or more clock circuits, power supplies, cache, input/output circuits, and the like.
- the memory 209 includes at least one of Read Only Memory (ROM), Random Access Memory (RAM), disk drive storage, optical storage, removable storage and/or the like.
- the memory 209 includes an operating system 211 that provides a computing foundation for software applications 213 of the user device 260 - 1 .
- the memory 209 includes applications such as a locally installed messaging application or a browser application for invoking a client messaging hosted by server 202 .
- FIGS. 3A-3F depict the gathering of statistics for detecting, and the setting of one or more thresholds for use in responding to dynamically variable patterns of activity and behavior according to one or more embodiments.
- FIG. 3A is a graphical representation depicting the frequency at which a plurality of senders have sent messages, including email messages, to a recipient over time, forming a portion of statistics gathered according to one or more embodiments.
- the number of new messages received by recipient R 1 from senders S 1 to S n over a 24 day monitoring window is shown.
- a possible response by message management agent 270 would be to offer the recipient R 1 the opportunity to “unsubscribe” to messages from that sender, as previously described.
- FIG. 3B is a graphical representation depicting the time taken by recipient R 2 to respond to email messages received from a plurality of recipients (S 1 to S m ) over time, as well as average response times computed for selected senders, forming a portion of statistics gathered and evaluated according to embodiments.
- Different average response e.g., reply, forwarding, return call, etc
- T 2 R 2 is set at, say the mean response time+3*standard deviation, such that those senders who receive responses below this threshold, such as sender S 1 in the instant example, may receive special notifications generated by message management agent 270 at times when the recipient cannot respond or is not responding with the same usual level of dispatch reserved for that recipient.
- an average response time is computed for all senders, in which case sender S 2 may receive the same treatment as sender S 1 .
- FIG. 3C is a graphical representation depicting monitored changes in the rate at which new unread messaged are accumulated in a recipient's email inbox, over a time window preceding but contemporaneous with receipt of email messages from a plurality of senders vs. monitored changes in the rate at which the recipient has replied to or managed received email messages during the same time window.
- a spike in the accumulation of new/unread email messages in the inbox of recipient R 1 is experienced beginning at about 8 hours into the twenty four hour monitoring window depicted.
- a message received during this time might receive a message automatically generated and transmitted by message management agent to the effect that the recipient is currently in a meeting or otherwise unavailable but that the recipient's message is important and will receive immediate attention upon return.
- Other possible treatments might be to route the message to a colleague or even prompt the colleague of recipient R 1 to schedule a call with the sender.
- FIG. 3D is a graphical representation depicting the classification of e-mail management outcomes over a time window preceding but contemporaneous with receipt of email messages from a plurality of senders, during which a recipient R 1 has either archived, forwarded, deleted, replied to, or forwarded messages received from one specific sender S n-2 .
- a recipient R 1 has either archived, forwarded, deleted, replied to, or forwarded messages received from one specific sender S n-2 .
- 3E is a graphical representation depicting the classification of e-mail management outcomes over a time window preceding but contemporaneous with receipt of email messages from a plurality of senders, during which the same recipient (R 2 ) has either archived, forwarded, deleted, replied to, or forwarded messages received from another specific S n-1 . In this case, however, all of the messages received over the monitoring window were deleted without reading the messages. In this case, even without a baseline window representing a broader data set for comparison, message management agent 270 might prompt the recipient R 1 to “unsubscribe” to email messages received from sender S n-1 . Should the recipient accepting this new rule of application, the current messages as well as any future messages from that sender are deleted or sent to an archive or trash folder upon receipt.
- FIG. 3E is a graphical representation depicting the classification of e-mail management outcomes over a time window preceding but contemporaneous with receipt of email messages from a plurality of senders, during which a recipient has either archived, forwarded, deleted, replied to, or forwarded messages received from another specific sender.
- FIG. 3F is a graphical representation depicting the correlation of recipient response times to received email messages to the presence of one or more key words in those messages, over a time window preceding but contemporaneous with receipt of email messages from a plurality of senders.
- the keyword(s) and phrases can be identified a priori by the user/email subscriber or they can be identified automatically by selecting all keywords for certain senders and/or certain read and/or reply time thresholds.
- FIG. 4 is a flow diagram depicting a technique for aiding recipients in the management of their email, through detection and analysis of dynamically variable behavior and activity patterns, according to one or more embodiments.
- the method 400 starts at step 402 and proceeds to step 404 .
- the method receives a new email message (or voice-, SMS-, text-, or IM-message) originated by a first sender and intended for a recipient.
- the method extracts email envelope information from the received email message. This includes data and time of receipt and phone number of the sender. In some embodiments, other information available for the sender such as the sender's phone number may be associated with the extracted information.
- the method identifies at least one pattern, from email account statistics of the recipient.
- the identified pattern may relate to prior sender activity (frequency of sending to the recipient), recipient response activity, and/or message management activity.
- the method 400 analyzes the extracted envelop information and/or contemporaneous recipient message response activity and/or contemporaneous recipient message management activity. The method 400 proceeds to determination step
- the method determines whether the recipient has replied to or otherwise managed the received new message. If so, the method classifies the response at step 414 , stores the time/date and classification of the response at step 416 , and proceeds to determination step 418 . Otherwise, the method proceeds directly to step 418 .
- the method determines whether a deviation from any identified pattern is detected. If not, then the method returns to step 404 and receives another new message as so far described. If so, however, the method 400 determines first whether a rule for the deviation already exists and, if so this rule is enforced at step 422 . If, not, then a new rule is proposed at step 424 .
- the rule proposes a treatment to be applied to all messages from the sender.
- the treatment proposed applies only during certain times (such, for example, as in the event of a gross mismatch between accumulating unread email messages and management rate). The process then terminates at step 426 or returns to step 404 for processing of other messages already in the user's inbox.
- FIG. 5 is a flow diagram depicting discrete sub-steps applicable to the identification of one or more patterns through analysis of collected email account statistics, according to embodiments exemplified by the method 400 of FIG. 4 .
- the method 500 retrieves, at step 502 , sender email frequency statistics, for a first sender, from the recipient messaging profile. The method proceeds to step 504 .
- the method computers an average frequency for the first sender over a collection or baseline window.
- the method determines whether an existing volume or rate threshold has been set for the first sender. If not, one is generated at step 508 , otherwise the method proceeds directly to step 510 .
- the method retrieves sender-specific response time statistics derived from receipt and transmit times, respectively, for emails received from the first sender and replies to the emails by the recipient (which can be via SMS text, IM, and voice mail as well as email in some embodiments). The method advances to step 512 .
- the average time taken by the recipient to reply, call back or otherwise respond to the first sender i.e., “response time” is computed.
- aggregate response time statistics derived from dates/times of messages to and from all or a subset of all recipients (each, “a plurality”) is retrieved and at step 516 , an average aggregate response rate is computed.
- the method determines whether an existing threshold response rate has been set for use in evaluating the sender-specific response rate. If not, one is generated at step 520 and the process proceeds to step 522 .
- aggregate management rate statistics are derived from recipient reply, deletion and forwarding activity. For purposes of the aggregate rate calculation, the deletions without reading are excluded since these would tend to reduce the overall management rate and have little to no diagnostic value in an aggregate metric.
- the method retrieves a set of key words and phrases from all emails responded to by the sender in a faster than average time for a specific sender, faster than an average response time computed for all senders, and faster than average for senders, and/or faster than a threshold time.
- a user fails to respond to emails containing certain key words at a historic baseline rate, this could mean that the recipient has inadvertently skipped over the message.
- FIG. 6 is a flow diagram depicting discrete sub-steps applicable to the analysis of contemporaneous email account statistics in order to indentify deviations from identified patterns, according to embodiments exemplified by the method 400 of FIG. 4 .
- the method 600 is entered at the initiation of step 410 of method 400 , and at step 602 , the method 600 retrieves contemporaneous statistics corresponding to a rate of change in a volume of messages received from the first sender or to a number of unread messages from the first sender currently in the recipient's email inbox.
- the method retrieves contemporaneous statistics corresponding to a rate of change in a volume of messages received from all or a subset of all senders or to a number of unread messages from this plurality of senders and currently in the recipient's email inbox.
- the method 600 retrieves contemporaneous statistics corresponding to a rate of change in a volume of messages received from the first sender and read and/or managed by the recipient.
- the method retrieves contemporaneous statistics corresponding to a rate of change in a volume of messages received from all or a subset of all senders and read and/or managed by the recipient.
- statistics corresponding to any messages received by any recipient containing a key word from a set of key words and phrases previously responded to by the recipient, on average, within a response time faster than average time for a specific sender, faster than an average response time computed for all senders, and faster than average for senders, and/or faster than a threshold time.
- FIG. 7A is a screen shot depicting a user interface 700 , displayed on a recipient's communication terminal, obtained by local execution of an e-mail messaging client application by a processor of the terminal and depicting an inbox managed through detection and analysis of dynamically variable behavior and activity patterns, according to one or more embodiments.
- a user of communication terminal 160 ′ accesses an email client application or a browser application providing the interface of a hosted email application.
- the requests are transmitted to, and the responses are returned by, a remote server having access to one or more data sources and the analytical resources needed to analyze accessible data attributes.
- Buttons 702 - 708 enable the user to navigate between individual functions of the messaging client application, and buttons 710 to 716 enable the user to reply, forward, delete and save specific messages, respectively, when using the email client application.
- FIGS. 7B and 7C are respective screen shots depicting the display of an alert notification generated by an email message management application, and the corresponding prompt displayed to the recipient, each according to one or more embodiments.
- the invention has largely been described and illustrated in the context of email volume management, the invention should also be understood as being directed to other types of incoming messages, including voice mails, SMS (text messages), and instant messages.
- voice mails including voice mails, SMS (text messages), and instant messages.
- SMS text messages
- instant messages The difference between the different communication modalities is the action taken, which depends on the technology that this communication modality provides.
- the system could automatically change the outgoing voice message.
- the system could change the presence indicator and text associated with the recipient, in addition to blocking incoming messages from particular senders or auto-responding to them.
- the embodiments of the present invention may be embodied as methods, apparatus, electronic devices, and/or computer program products. Accordingly, the embodiments of the present invention may be embodied in hardware and/or in software (including firmware, resident software, micro-code, etc.), which may be generally referred to herein as a “circuit” or “module”. Furthermore, the present invention may take the form of a computer program product on a computer-usable or computer-readable storage medium having computer-usable or computer-readable program code embodied in the medium for use by or in connection with an instruction execution system.
- a computer-usable or computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
- These computer program instructions may also be stored in a computer-usable or computer-readable memory that may direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer usable or computer-readable memory produce an article of manufacture including instructions that implement the function specified in the flowchart and/or block diagram block or blocks.
- the computer-usable or computer-readable medium may be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. More specific examples (a non-exhaustive list) of the computer-readable medium include the following: hard disks, optical storage devices, a transmission media such as those supporting the Internet or an intranet, magnetic storage devices, an electrical connection having one or more wires, a portable computer diskette, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, and a compact disc read-only memory (CD-ROM).
- RAM random access memory
- ROM read-only memory
- EPROM or Flash memory erasable programmable read-only memory
- CD-ROM compact disc read-only memory
- Computer program code for carrying out operations of the present invention may be written in an object oriented programming language, such as Java®, Smalltalk or C++, and the like. However, the computer program code for carrying out operations of the present invention may also be written in conventional procedural programming languages, such as the “C” programming language and/or any other lower level assembler languages. It will be further appreciated that the functionality of any or all of the program modules may also be implemented using discrete hardware components, one or more Application Specific Integrated Circuits (ASICs), or programmed Digital Signal Processors or microcontrollers.
- ASICs Application Specific Integrated Circuits
- microcontrollers programmed Digital Signal Processors or microcontrollers.
Abstract
Description
- 1. Field of the Invention
- Embodiments of the present invention generally relate to messaging in communication systems and, more particularly, to systems and methods for managing high volumes of incoming messages.
- 2. Description of the Related Art
- The volume of e-mail, inclusive of voice-to-text messages, arriving in a recipient's inbox can be both unpredictable and overwhelming. Depending on a person's meeting schedule, there may be insufficient time to read, let alone acknowledge and respond to, even a fraction of the e-mail that may arrive in the course of a business day. This issue is only exacerbated when the recipient must travel, attend training or seminars, or is out of the office (e.g., on vacation).
- While rules-based approaches to dealing within the management of e-mail messages are well known, they are somewhat inflexible and typically require a substantial effort on the part of the user for setup and maintenance. As a result, e-mail users may be slow or unwilling to embrace such approaches.
- Moreover, the inventors herein have observed that current email applications, whether hosted at a server or executing as a client application on a recipient's communication terminal, neither track dynamically changing e-mail account patterns in email usage, activity, or behavior, nor provide any suggestion of what action might be taken on the recipient's behalf, when certain patterns or changes in patterns are detected. A lack of effective techniques and systems for dealing with such problems as a transient increase in the volume of unread messages in an inbox can be stressful to the email recipient and result in less efficient usage of email as a business tool.
- A need therefore exists for configurable, dynamically adaptive, and user friendly techniques for managing excessive email volumes.
- The Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
- A method for aiding an email recipient in the management of inbound email by detecting, and configurably responding to, dynamically variable patterns of activity and behavior is described. According to one or more embodiments, the method extracts characteristics from new email messages addressed to the recipient and received from a plurality of senders. In some embodiments, the method analyzes statistics accumulated from the extraction of characteristics from email messages previously received by the recipient. In embodiments, the statistics include time and date of receipt in the recipient's inbox, time and date first read by the recipient, the frequency of email messages received by the recipient from each of a plurality of senders over time, and the rate(s) at which emails received from each sender and/or a plurality of senders in the aggregate are read, responded to, and/or managed by the recipient. The method identifies one or more patterns of behavior or activity in the accumulated statistics.
- In some embodiments, the method identifies patterns specific to the e-mail messages sent by a particular sender, patterns applicable to the way the recipient responds to and/or manages email sent by a particular sender, and/or patterns applicable to the way the recipient responds to and/or manages email sent by a group of senders in the aggregate, wherein the group may comprise all senders from whom the recipient has received email messages, or a subset of such senders. As used herein, “manages” includes categorizing emails, filing email under various subfolders, flagging email as “To Do” items, and deleting emails. Before the recipient reads and/or manages a new email message, a determination is made as to whether any deviation from an identified pattern exists; and, if so, a pre-existing rule for treatment of the new message can be enforced and/or a new rule specifying treatment of at least some messages from the sender of the email is proposed. In some embodiments, a pre-existing rule is slightly modified based on a combination of recently monitored behavior and longer term behavioral history? Or, if such a rule does not exist yet, a new own is established based on the recipient's behavior.
- In another embodiment, an apparatus for aiding an email recipient in the management of inbound messages by detecting, and configurably responding to, dynamically variable patterns of activity and behavior is described. A computer having one or more processors, memory and at least one network interface, further comprises a message manager module including instructions executable by the one or more processors. According to one or more embodiments, the message manager module is operative to receive a new email message for a recipient from a first sender, and to extract email characteristics from the received email message. In an embodiment, the message manager module is further operative to determine one or more of the following: (a) a contemporaneous volume or rate of change in a volume of new e-mail messages from the first sender and intended for the recipient; (b) a contemporaneous volume or rate of change in a volume of new e-mail messages from a plurality of senders and intended for the recipient; (c) a contemporaneous rate of change in a volume of at least one of new messages received from the first sender and read by the recipient or email messages received from the first sender and managed by the recipient; and (d) a contemporaneous rate of change in a volume of at least one of new messages received from a plurality of senders and read by the recipient or email messages received from the plurality of senders and managed by the recipient. In an embodiment, the message manager module is further operative to access usage statistics comprising at least one of sender frequency statistics, recipient response statistics or management rate statistics gathered by extraction of email characteristics from prior email messages, and to perform, on the received email message, an action according to a determined contemporaneous volume or rate.
- In yet another embodiment, a computer readable medium for aiding an email recipient in the management of inbound messages by detecting, and configurably responding to, dynamically variable patterns of activity and behavior is described. According to one or more embodiments, the computer readable medium comprises instructions that, when executed by a processor, cause a system to: extract email characteristics from a new message received from a first sender and intended for a recipient, and to identify, from statistics derived from previously received messages, at least one of a pattern of recipient message management or message response behavior relating to treatment of messages from each of a plurality of senders or a pattern of sender activity. The medium further comprises instructions that, when executed by a processor, cause a system to detect, prior to reading of the new message by the recipient, whether any deviation from an identified recipient response/management pattern exists and, if a deviation is detected, to perform an action on the received message or propose taking of such action to the recipient.
- In an embodiment, if the system detects the absence of any recipient action, contrary to an identified behavioral pattern on the part of the recipient, the system proposes taking the “typical” action normally undertaken by the recipient. For example, if the recipient typically reads an email from a particular sender within ninety minutes but now fails to do so, the system could remind the user to read that particular sender's email.
-
FIG. 1A is a block diagram depicting a communication system configured to aid email recipients in the management of their email, through detection and analysis of dynamically variable behavior and activity patterns, according to one or more network centric embodiments; -
FIG. 1B is a block diagram depicting a communication system configured to aid email recipients in the management of their email, through detection and analysis of dynamically variable behavior and activity patterns, according to one or more communication terminal (e.g., “endpoint”) centric embodiments; -
FIG. 2 is a block diagram depicting, in greater detail, the interaction between the functional components according to the embodiments exemplified byFIG. 1A ; -
FIG. 3A is a graphical representation depicting the frequency at which a plurality of senders have sent messages, including email messages, to a recipient over time, forming a portion of statistics gathered according to one or more embodiments; -
FIG. 3B is a graphical representation depicting the time taken by a recipient to respond to email messages received from a plurality of recipients over time, as well as average response times computed for selected senders, forming a portion of statistics gathered according to one or more embodiments; -
FIG. 3C is a graphical representation depicting monitored changes in the rate at which new unread messaged are accumulated in a recipient's email inbox, over a time window preceding but contemporaneous with receipt of email messages from a plurality of senders vs. monitored changes in the rate at which the recipient has replied to or managed received email messages during the same time window; -
FIG. 3D is a graphical representation depicting the classification of e-mail management outcomes over a time window preceding but contemporaneous with receipt of email messages from a plurality of senders, during which a recipient has either archived, forwarded, deleted, replied to, or forwarded messages received from one specific sender; -
FIG. 3E is a graphical representation depicting the classification of e-mail management outcomes over a time window preceding but contemporaneous with receipt of email messages from a plurality of senders, during which a recipient has either archived, forwarded, deleted, replied to, or forwarded messages received from another specific sender; -
FIG. 3F is a graphical representation depicting the correlation of recipient response times to received email messages to the presence of one or more key words in those messages, over a time window preceding but contemporaneous with receipt of email messages from a plurality of senders; -
FIG. 4 is a flow diagram depicting a technique for aiding recipients in the management of their email, through detection and analysis of dynamically variable behavior and activity patterns, according to one or more embodiments; -
FIG. 5 is a flow diagram depicting discrete sub-steps applicable to the identification of one or more patterns through analysis of collected email account statistics, according to embodiments exemplified byFIG. 4 ; -
FIG. 6 is a flow diagram depicting discrete sub-steps applicable to the analysis of contemporaneous email account statistics in order to indentify deviations from identified patterns, according to embodiments exemplified byFIG. 4 ; -
FIG. 7A is a screen shot depicting a user interface, displayed on a recipient's communication terminal, obtained by local execution of an e-mail messaging client application by a processor of the terminal and depicting an inbox managed through detection and analysis of dynamically variable behavior and activity patterns, according to one or more embodiments; -
FIGS. 7B and 7C are respective screen shots depicting the display of an alert notification generated by an email message management application, and the corresponding prompt displayed to the recipient, each according to one or more embodiments. - While the method and apparatus is described herein by way of example for several embodiments and illustrative drawings, those skilled in the art will recognize that the method and apparatus for dynamically responding to requests and queries for information relating to one or more event invitees or attendees is not limited to the embodiments or drawings described. It should be understood, that the drawings and detailed description thereto are not intended to limit embodiments to the particular form disclosed. Rather, the intention is to cover all modifications, equivalents and alternatives falling within the spirit and scope of the method and apparatus for dynamically responding to requests and queries for information relating to one or more event invitees or attendees defined by the appended claims. Any headings used herein are for organizational purposes only and are not meant to limit the scope of the description or the claims. As used herein, the word “may” is used in a permissive sense (i.e., meaning having the potential to), rather than the mandatory sense (i.e., meaning must). Similarly, the words “include”, “including”, and “includes” mean including, but not limited to.
- Systems and techniques for aiding an email recipient in the management of inbound email by detecting, and configurably responding to, dynamically variable patterns of activity and behavior are described. Characteristics are extracted from new email messages originated by a plurality of senders and intended for a recipient. Patterns of sender activity, recipient message management behavior, and/or message response behavior are identified by analyzing statistics collected by the extraction of characteristics from email messages previously received by the recipient and correlating them with recipient behavior Before the recipient reads or manages a new email, a determination is made as to whether any deviation from an identified pattern exists with respect to the volume or a rate of change in the volume of new emails in the recipient's email account, or the rate at which the recipient is to read or manage (e.g., to reply, delete without reading, delete after reading, forward, flag, categorize, or archive new incoming emails). Examples of a deviating pattern or behavior change detected according to one or more embodiments include an inability to read or respond to any new inbound email messages over a period of selectable duration, an inability to reduce the volume of new/unread email messages in an inbox below a threshold for a period of time, or the existence of a scheduled conference call or meeting at a time when the number of new unread email messages exceeds a selectable threshold.
- Current email applications hosted at a server or executing as a client application on a recipient's communication terminal neither track dynamically changing e-mail account patterns in email usage, activity, or behavior, nor provide any suggestion of what action might be taken on the recipient's behalf, when certain patterns or changes in patterns are detected. A lack of effective techniques and systems for dealing with such problems as a transient increase in the volume of unread messages in an inbox can be stressful to the email recipient and result in less efficient usage of email as a business tool.
- Various embodiments of a method and apparatus for aiding an email recipient in the management of inbound email by detecting, and configurably responding to, dynamically variable patterns of activity and behavior are described. In the following detailed description, numerous specific details are set forth to provide a thorough understanding of claimed subject matter. However, it will be understood by those skilled in the art that claimed subject matter may be practiced without these specific details. In other instances, methods, apparatuses or systems that would be known by one of ordinary skill have not been described in detail so as not to obscure claimed subject matter.
- Some portions of the detailed description that follow are presented in terms of algorithms or symbolic representations of operations on binary digital signals stored within a memory of a specific apparatus or special purpose computing device or platform. In the context of this particular specification, the term specific apparatus or the like includes a general-purpose computer once it is programmed to perform particular functions pursuant to instructions from program software. Algorithmic descriptions or symbolic representations are examples of techniques used by those of ordinary skill in the signal processing or related arts to convey the substance of their work to others skilled in the art. An algorithm is here, and is generally, considered to be a self-consistent sequence of operations or similar signal processing leading to a desired result. In this context, operations or processing involve physical manipulation of physical quantities. Typically, although not necessarily, such quantities may take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared or otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to such signals as bits, data, values, elements, symbols, characters, terms, numbers, numerals or the like. It should be understood, however, that all of these or similar terms are to be associated with appropriate physical quantities and are merely convenient labels. Unless specifically stated otherwise, as apparent from the following discussion, it is appreciated that throughout this specification discussions utilizing terms such as “processing,” “computing,” “calculating,” “determining” or the like refer to actions or processes of a specific apparatus, such as a special purpose computer or a similar special purpose electronic computing device. In the context of this specification, therefore, a special purpose computer or a similar special purpose electronic computing device is capable of manipulating or transforming signals, typically represented as physical electronic or magnetic quantities within memories, registers, or other information storage devices, transmission devices, or display devices of the special purpose computer or similar special purpose electronic computing device.
- Reference will now be made in detail to exemplary embodiments of the present invention, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts
-
FIG. 1A is a block diagram depicting acommunication system 100 configured to aid email recipients in the management of their email, through detection and analysis of dynamically variable behavior and activity patterns, according to one or more network centric embodiments. According to some embodiments,system 100 includes aunified communication server 102 having amessaging manager module 110 which includes abehavior analyzer 140, adata repository 150 containing email user account behavior profiles 152 (“recipient profiles”), including the recipient profile of a user ofcommunication terminal 160 which executes an e-mail browser client or clientemail application program 162.Message manager module 110 further includes amessage management agent 170.System 100 further includes one or more messaging servers including at least an email server and optionally an instant messaging server, and SMS messaging server, and a voice mail server and corresponding speech to text processor, collectively referred to asmessaging server 120, and anevent calendar server 130. -
FIG. 1B is a block diagram depicting an embodiment of acommunication system 100′ configured to aid email recipients in the management of their email, through detection and analysis of dynamically variable behavior and activity patterns, according to one or more communication terminal (“user endpoint”) centric embodiments. The arrangement of and interrelationships between the various functional components of the embodiment ofFIG. 1B are very similar to those of the embodiment ofFIG. 1A . A principal difference between the respective embodiments is that in the former case, contemporaneous monitoring and evaluation of contemporaneous e-mail behavior and/or activity patterns against a recipient profile, are performed locally by amessage manager module 110′ program executed locally on the recipient device rather than at a central server. In the illustrative embodiment ofFIG. 1A , on the other hand, at least some of the message manager module's behavior/activity data collection and/or pattern and usage monitoring functions are performed remotely at a central server. - In an embodiment,
system 100′ includes acommunication terminal 160′ having a central processing unit (CPU) 107′, support circuits, amemory 109′ containing anoperating system 111′ and applications executable byCPU 107′, and an associateddisplay 162′. One of the applications residing inmemory 109′,message manager module 110′ containsmessage management agent 170′, which is communicatively coupled by a network connection to one or more remote messaging server(s) 120′. Also communicatively coupled to themessage management agent 170′ are anevent calendar application 130′, a behavioranalyzer application module 140′, and arecipient profile 152′ containing information derived from email usage and behavior statistics collected over time for the user ofcommunication terminal 160′. - Each of the embodiments of
FIGS. 1A and 1B require the adoption and enforcement of a set of rules which, after a period of monitoring email account usage to identify baseline usage, behavior and/or activity patterns and thresholds, are proposed to and/or adopted by the user. According to some embodiments, message manager agent is programmed to: -
- inspect the sender field of each email envelope over time, gathering frequency statistics to determine how often a particular sender sends email to a recipient of
email using terminal 160. In an embodiment, if the message management agent determines that the send rate from a particular sender exceeds a threshold set, for example, at themean plus 3*standard deviation, a prompt is generated to ask if the user wishes to adopt a new rule by “unsubscribing ” to future emails from the sender and, if so,message management agent 170 thereafter enforces that rule by, for example assigning the senders email to a folder; - gather response statistics so as to enable
message management agent 170 to determine how often and how quickly the recipient responds to email from a particular sender (e.g., as by reply email, return phone call, a phone call responsive to the email, or forwarding an email or voice mail message to a colleague for attention). According to some embodiments,message management agent 170 analyzes the response statistics to determine if a contemporaneous response rate (which may be, for example, an aggregate average response rate applicable to all message senders/originators, a sender-specific average rate applicable only to the specific sender, or both)—collected during a monitoring interval immediately prior to or encompassing the time of receiving a current new message—is at or below or above a threshold. By way of illustrative example, the threshold may be set at themean plus 2*standard deviation; - monitor the rate at which new email is arriving in the recipient's inbox. According to an embodiment,
message management agent 170 compares the new incoming rate to the recipient's contemporaneous inbox management rate (e.g. the rate at which the recipient has been recently/currently replying to, filing, deleting before reading, deleting after reading, archiving, or forwarding emails and, optionally, voice mails). In an embodiment, ifmessage management agent 170 detects that the incoming email rate exceeds the management rate by a threshold number or fraction, one or more rules are enforced, or proposed to the user for future enforcement. For example, for those senders identified bymessage management agent 170 as being persons or entities to whom the recipient responds, on average, below a threshold rate, a message is automatically sent (with an optional prompting to the recipient to confirm that it should be sent) to notify the sender that the message has been received and that the user will respond shortly but is currently in a meeting (or is otherwise unavailable); - determine, according to an embodiment, whether one or more senders who have, on average, received a response within a first threshold during a time have sent an email or left a message at a time when the recipient's contemporaneous ratio of incoming email rate to management rate is above a second threshold. In an embodiment,
message management agent 170 is operative to deal with an apparently transient drop in responsiveness/management wherein it may be an indefinite but lengthy amount of time before the recipient will be able to respond to the email of important senders. To this end,message management agent 170 is configured, in accordance with a rule or with temporary authority requested from and granted by the recipient), to automatically generate and transmit an automated e-mail response (or voice mail message, as the case may be). Examples of such a message include “I am overwhelmed with e-mail” or “I currently have limited availability, but will get to your email as soon as I can”, or the like; - prompt the recipient to specify whether s/he would like to unsubscribe from e-mails sent, by a particular sender, from which point that sender's messages (email and, optionally voicemail as well) would be deleted upon receipt. In some embodiments,
message management agent 170 determines whether there is a prolonged delay (e.g., in excess of a selectable or default threshold), on average, for reading/responding or reading/deleting messages from certain message originators (or email domains). In an embodiment, the aforementioned prompt is sent, or corresponding action taken by message management agent, if themessage management agent 170 determines also that the recipient's response to email and/or voice mail messages from this particular originator/sender is often/always to delete the email unread, or that the sender/originator typically deletes emails from a sender very quickly (e. g., within 10 seconds of receipt), and this manner of treatment recurs over time. In some embodiments, a distinction is made between “destructive” pattern deviations as opposed to “constructive” ones. For example, if the recipient typically does not respond to Sender A's emails, but more recently has done so (which may or may not be an incipient “constructive” trend), the system can keep silent (or prompt the recipient to adopt a new rule). If, on the other hand, the recipient has historically responded to Sender B's emails but now deletes one from that sender unread (which may or may not be an incipient “destructive” trend), the system could alert the recipient; - take into account the recipient's event calendar such that any of the illustrative actions discussed above, which might otherwise be proposed or taken by
message management agent 170 based on contemporaneous measurements of incoming rate vs. management rate are modified or suspended based on the recipient's current and upcoming (“near term”) schedule. For example, if a recipient has seventeen new emails and back-to-back meetings scheduled in 2 minutes, different messages can be sent to senders which take this into account, and prompts can be directed to the recipient to proactively take action on the recipient's behalf; - identify and monitor any correlation between received email content and recipient action and, in some embodiments, alert the user if the user breaks a pattern. In an embodiment,
message management agent 170 examines not just the envelope but also the content of a message. If an email account user tends to read/respond quickly to those emails or voicemails that contain certain keywords, and then departs from the standard treatment message management agent is operative to generate and send an alert to the recipient. In some embodiments, the key words are predefined by the user, and in others, words and phrases contained in email messages which are recurrently responded to quickly are stored, automatically and without user intervention, as data attributes in a data repository. Over time, a weighted distribution based on such criteria as frequency, average response time, sender identity, markings of critical or urgent in the message envelop, and the like can be used to refine the contents of the database. In some embodiments, after a period of monitoring, a list of keywords generated automatically can be presented to the user for further refinement (i.e., supplementation by the adding of keywords and phrases, the redaction of key words and phrases, or the like. As an example, if emails or voicemail message containing a combination of the words “meeting”, “review”, “performance” are consistently responded to with dispatch, and the user invokes an email client action to delete a message containing such keyword(s) without reading the email, thenmessage management agent 170 generates an alert and asks the user to confirm such action. - deduce an “out of office” situation based on a detected sender/receiver email/response pattern. The
user management agent 170 can then follow the user by sending a notification of a proposed action outside of corporate email: it can call, text, instant message, personal-email the intended recipient and install out of office messages automatically based on a received response; - automatically (or with user consent) simulate a “bounce back” to mitigate spam based on the speed of email deletion or prior deletion of unread emails originating from a particular sender. Such an implementation can be implemented from the client application, enabling the granular application of user defined or automatically rules in a way that is not supported by hosted commercial email servers and solutions; and
- “override” any rules developed, proposed and implemented according to one or more embodiments, as in the case of a recipient's key colleagues, supervisors, and subordinates. According to an embodiment, the user of
systems
- inspect the sender field of each email envelope over time, gathering frequency statistics to determine how often a particular sender sends email to a recipient of
-
FIG. 2 is a block diagram depicting, in greater detail, the interaction between the functional components in asystem 200 according to embodiments exemplified byFIG. 1A . The various components ofsystem 200, includingunified communication server 202,email server 220, calendar/contact management server 230,voicemail messaging server 240,call server 250, and anLDAP directory server 254, and user communication terminals 260-1 to 260-n are connected by one or more network links. Some of the links are established by a network which includes a communication system that connects computers (or devices) by wire, cable, fiber optic and/or wireless link facilitated by various types of well-known network elements, such as hubs, switches, routers, and the like. The network interconnecting some components may also be part of the Intranet using various communications infrastructure, such as Ethernet, Wi-Fi, a personal area network (PAN), a wireless PAN, Bluetooth, Near field communication, and the like. - The
various servers contact management server 230 provides services to a calendar application on user terminals 260-1 to 260-n. For example,calendar server 230 provides to user terminal 260-1 anevent calendar 232, including schedule information, directory services (“Contacts”) 234,event history 236, and email services. Likewise, for each provisioned voice mail user or subscriber,voice mail server 240 maintains a voicemail message queue 242 andmessage envelope date 244 indicating a date and time when a voice mail message was left for the user, an identification of the caller or caller's extension (if available), whether and when a voice mail message was forwarded to another extension (a voice message forwarded to another party qualifying as a “response” according to one or more embodiments), and an indication of a date and time when the user first accessed the voice mail. In some embodiments,server 202 further includes a speech-to-text interface (not shown) operative to convert voice messages into email messages. - For each provisioned telephony services user or subscriber,
call server 250 maintains call event logs 252 The call event logs include an incoming call log indicating a date and time when a call for the user was received, an identification of the caller's identity, phone number or extension (if available), and an indication of whether and when (date/time) each call was answered by the user or forwarded to voice mail message or to another extension (with answering or forwarding a call received from an email sender each qualifying as a “response” to an email message received from the sender if performed subsequent to receiving and reading the email message, according to some embodiments), and an indication of a date and time when the user first accessed the voice mail. By way of illustrative example, a speech to text converter (not shown) associated withunified communication system 202 may be configured to search transcribed content of the dialog between a caller and call recipient to identify the presence of any key words in the call also present in the received email. - The call event logs 252 further include an outgoing call log indicating a date and time when a call by the user was made, an identification of a number of the number dialed, and an indication of the duration of the call. According to one or more embodiments, a call log entry indicating that the user called the sender of an email qualifies as a “response” to an email message received from the sender if performed subsequent to receiving and reading the email message. As already mentioned, speech to text converter (not shown) associated with
unified communication system 202 may be configured to search transcribed content of the dialog between a caller and call recipient to identify the presence of any key words in the call also present in the received email. According to one or more embodiments,LDAP directory server 254 provides caller and call recipient directory lookups as needed to support the aforementioned response classifications. - For each provisioned email user or subscriber, email server sever 220 maintains an
email message queue 222 andmessage envelope information 224 identifying the sender's email address, recipient's email address, the date and time of delivery to an email inbox, anduser account settings 226 including rules and preferences 228 andrules 229 defined by the user. Such rules are enforceable by theemail server 220 and are typically designed to reduce the amount of email which must be stored on the server pending user review, to separate and prioritize email for the user so that the limited time the user may have to review his or her email is effectively utilized, to organize the user's email to make it easier to find and/or reference email as needed, and/or to send a simple message to email senders during a particular time interval selected by the user. According to one or more network embodiments, these rules are supplemented by rules generated and proposed, for adoption by the email account user, by detecting, and configurably responding to, dynamically variable patterns of activity and behavior. In an embodiment, some or all of the supplemental rules, once adopted by an email user, are stored as part of therules 229. - To this end, according to some embodiments,
unified communication server 202 includes amessaging manager module 210 comprising a set of instructions residing inmemory 204 and executable by a Central Processing Unit (CPU) 201. TheCPU 201 may include one or more commercially available microprocessors or microcontrollers that facilitate data processing and storage.Various support circuits 203 facilitate the operation of theCPU 201 and include one or more clock circuits, power supplies, cache, input/output circuits, and the like. Thememory 204 includes at least one of Read Only Memory (ROM), Random Access Memory (RAM), disk drive storage, optical storage, removable storage and/or the like. - In addition to
message manager module 210,memory 204 includes anoperating system 205, and a plurality of applications including 206 including the aforementioned optional speech-to-text converter.Message manager module 210 includes amessage management agent 270 comprising anotification manager 272 for generating prompts and alerts to be sent or presented to the users of terminals 260-1 to 260-n as well and for generating notifications to be sent or presented to email senders according to one or more rules orpreferences 274 adopted by the user and in response to patterns and/or activity monitored by volume/management monitor (“monitor”) 276. In some embodiments, monitor 276 is operative, through instructions executed byCPU 201, to monitor the flow of incoming new email messages over a contemporaneous monitoring window. Such monitoring can include refers to counting the number of new email messages over the monitoring window, from which calculations like a rate of change in the volume of new and/or unread email messages with respect to time can be computed. As used herein, a “contemporaneous monitoring window” or, simply, “monitoring window” refers to a period of time (whether of predetermined or selectable duration) that immediately precedes or encompasses a moment in time when a particular new message to be processed bymessage management agent 270, has been received in a recipient (“user”) inbox. The messages include emails, but can also include voice mail messages, as well as SMS text messages, and instant messages received by SMS and Instant Messaging servers (not shown), respectively. By way of illustrative example, a contemporaneous monitoring window may be from four minutes in duration to four hours in duration. -
Monitor 276 is further operative, through instructions executed byCPU 201, to collect instantaneous message management rate volume measurements over a contemporaneous monitoring window. The management rate refers, according to some embodiments, to the rate at which the user performs on or more actions on new or unread messages. The actions typically include reading plus one more action such as forwarding a message to a colleague, sending a reply, sending a text message, sending an SMS, sending an instant (IM) message, calling or leaving a voice mail to the originator of the message. Even the act of reading a message, however, is included as part of the management rate in some embodiments, however. By tracking the number of such actions over time, monitor 276 is able to perform instantaneous computations of the rate of change in unread message volume. By comparing the ratio of the management rate to the new email incoming rate and/or the unread message accumulation rate, or the numbering distance between these values,message management agent 270 can identity any change in the pattern substantial enough to be a deviation from the historical pattern. - To allow such identification to take place, however,
message manager module 210 further includes abehavior analyzer 280 which comprises an envelope/calendar event inspector/call log inspector (“inspector”) 282, a management rate analyzer (“analyzer”) 284, and avolume analyzer 286. Similar in all respects to monitor 276 (and is combined therewith in some embodiments),inspector 282 is operative, through instructions executed byCPU 201, to collect incoming (new) rate, and/or accumulated unread rate, as well as management rate statistics. However, these are collected over a longer time frame and form the basis of deriving and identifying a baseline for user and sender behavior and/or activity patterns. The longer time frame is referred to herein as a baseline pattern identification window (or, simply “baseline window”). The baseline window can be substantially longer than the contemporaneous monitoring window and generally precedes (though it can also encompass) the moment in time when a particular new message, to be processed bymessage management agent 270, has been received in a recipient (or “user”) inbox. By way of illustrative example, a baseline pattern identification window may be from 5 minutes in duration to 5 months in duration. -
Management rate analyzer 284 includes a window selector which allows the duration of the baseline window to be dilated or compressed, as needed, depending for example, on the volume of email and other messages which might be accumulated by an especially busy recipient vs. one who has fewer incoming emails on an average basis but periodic spikes requiring individualized treatment.Volume analyzer 286 also includes awindow selector 287, as well as athreshold selector 288. The latter selector, in some embodiments allows independent and selectable configuration of multiple thresholds as will be explained shortly, and therefore enables fine tuning specific to each recipient over time as the base of statistics collected for a particular recipient grows. -
Message manager module 210 further includesdata repository 290. In some embodiments,data repository 290 includes an envelope/calendar datastore 292 containing such data as currently scheduled meeting dates and times (retrieved, for example, from theevent calendar 234 of server 230), as well as previously scheduled meeting dates and times (retrieved fromevent history 236 of server 230). Contact information, including the email address of other meeting invitees (any of whom may be originators of email, voicemail, SMS, IM and other kinds of messages managed bymessaging manager module 210 according to one or more embodiments).Data repository 290 further includes user behavior profiles (also referred to herein as “recipient profiles) 294. Eachrecipient profile 294 includes, for example, message volume statistics and management rate statistics accumulated over the baseline windows and monitoring windows applicable to a particular recipient. - Each of user communication terminals or devices 260-1 to 260-n is a computing device, for example a desktop computer, laptop, tablet computer, Smartphone, and the like that includes or is connected to a display and user input devices such as a mouse, keyboard, touch screen, camera, microphone, etc. The user device 260-1, for example, is a computer tablet that includes a touch screen display (not shown), Central Processing Unit (CPU) 207,
support circuits 208, amemory 209, as well as a network interface adapted to communicatively couple terminal 260-1 toserver 202 via a wireless internet connection or other network connection. -
CPU 207 includes one or more commercially available microprocessors or microcontrollers that facilitate data processing and storage. Thevarious support circuits 208 facilitate the operation ofCPU 207 and include one or more clock circuits, power supplies, cache, input/output circuits, and the like. Thememory 209 includes at least one of Read Only Memory (ROM), Random Access Memory (RAM), disk drive storage, optical storage, removable storage and/or the like. Thememory 209 includes anoperating system 211 that provides a computing foundation forsoftware applications 213 of the user device 260-1. Thememory 209 includes applications such as a locally installed messaging application or a browser application for invoking a client messaging hosted byserver 202. -
FIGS. 3A-3F depict the gathering of statistics for detecting, and the setting of one or more thresholds for use in responding to dynamically variable patterns of activity and behavior according to one or more embodiments. -
FIG. 3A is a graphical representation depicting the frequency at which a plurality of senders have sent messages, including email messages, to a recipient over time, forming a portion of statistics gathered according to one or more embodiments. In the representative example ofFIG. 3 , the number of new messages received by recipient R1 from senders S1 to Sn over a 24 day monitoring window is shown. As a consequence of Sender S1 exceeding the threshold T1R1, a possible response bymessage management agent 270 would be to offer the recipient R1 the opportunity to “unsubscribe” to messages from that sender, as previously described. -
FIG. 3B is a graphical representation depicting the time taken by recipient R2 to respond to email messages received from a plurality of recipients (S1 to Sm) over time, as well as average response times computed for selected senders, forming a portion of statistics gathered and evaluated according to embodiments. Different average response (e.g., reply, forwarding, return call, etc) are computed and shown. For comparison an threshold T2R2 is set at, say the mean response time+3*standard deviation, such that those senders who receive responses below this threshold, such as sender S1 in the instant example, may receive special notifications generated bymessage management agent 270 at times when the recipient cannot respond or is not responding with the same usual level of dispatch reserved for that recipient. As an alternative threshold, an average response time is computed for all senders, in which case sender S2 may receive the same treatment as sender S1. -
FIG. 3C is a graphical representation depicting monitored changes in the rate at which new unread messaged are accumulated in a recipient's email inbox, over a time window preceding but contemporaneous with receipt of email messages from a plurality of senders vs. monitored changes in the rate at which the recipient has replied to or managed received email messages during the same time window. In the instant case a spike in the accumulation of new/unread email messages in the inbox of recipient R1 is experienced beginning at about 8 hours into the twenty four hour monitoring window depicted. A message received during this time, for example, might receive a message automatically generated and transmitted by message management agent to the effect that the recipient is currently in a meeting or otherwise unavailable but that the recipient's message is important and will receive immediate attention upon return. Other possible treatments might be to route the message to a colleague or even prompt the colleague of recipient R1 to schedule a call with the sender. -
FIG. 3D is a graphical representation depicting the classification of e-mail management outcomes over a time window preceding but contemporaneous with receipt of email messages from a plurality of senders, during which a recipient R1 has either archived, forwarded, deleted, replied to, or forwarded messages received from one specific sender Sn-2. For granular treatment of senders according to one or more embodiments, it may be helpful to track the disposition of each message and the speed at which the disposition was reached.FIG. 3E , for comparison purposes, is a graphical representation depicting the classification of e-mail management outcomes over a time window preceding but contemporaneous with receipt of email messages from a plurality of senders, during which the same recipient (R2) has either archived, forwarded, deleted, replied to, or forwarded messages received from another specific Sn-1. In this case, however, all of the messages received over the monitoring window were deleted without reading the messages. In this case, even without a baseline window representing a broader data set for comparison,message management agent 270 might prompt the recipient R1 to “unsubscribe” to email messages received from sender Sn-1. Should the recipient accepting this new rule of application, the current messages as well as any future messages from that sender are deleted or sent to an archive or trash folder upon receipt. -
FIG. 3E is a graphical representation depicting the classification of e-mail management outcomes over a time window preceding but contemporaneous with receipt of email messages from a plurality of senders, during which a recipient has either archived, forwarded, deleted, replied to, or forwarded messages received from another specific sender. -
FIG. 3F is a graphical representation depicting the correlation of recipient response times to received email messages to the presence of one or more key words in those messages, over a time window preceding but contemporaneous with receipt of email messages from a plurality of senders. As noted previously, the keyword(s) and phrases can be identified a priori by the user/email subscriber or they can be identified automatically by selecting all keywords for certain senders and/or certain read and/or reply time thresholds. -
FIG. 4 is a flow diagram depicting a technique for aiding recipients in the management of their email, through detection and analysis of dynamically variable behavior and activity patterns, according to one or more embodiments. Themethod 400 starts atstep 402 and proceeds to step 404. Atstep 404 the method receives a new email message (or voice-, SMS-, text-, or IM-message) originated by a first sender and intended for a recipient. Atstep 406, the method extracts email envelope information from the received email message. This includes data and time of receipt and phone number of the sender. In some embodiments, other information available for the sender such as the sender's phone number may be associated with the extracted information. Atstep 408, the method identifies at least one pattern, from email account statistics of the recipient. The identified pattern may relate to prior sender activity (frequency of sending to the recipient), recipient response activity, and/or message management activity. Atstep 410, themethod 400 analyzes the extracted envelop information and/or contemporaneous recipient message response activity and/or contemporaneous recipient message management activity. Themethod 400 proceeds to determination step - At
step 412, the method determines whether the recipient has replied to or otherwise managed the received new message. If so, the method classifies the response atstep 414, stores the time/date and classification of the response atstep 416, and proceeds todetermination step 418. Otherwise, the method proceeds directly to step 418. Atstep 418, the method determines whether a deviation from any identified pattern is detected. If not, then the method returns to step 404 and receives another new message as so far described. If so, however, themethod 400 determines first whether a rule for the deviation already exists and, if so this rule is enforced atstep 422. If, not, then a new rule is proposed atstep 424. In an embodiment, the rule proposes a treatment to be applied to all messages from the sender. In another embodiment, the treatment proposed applies only during certain times (such, for example, as in the event of a gross mismatch between accumulating unread email messages and management rate). The process then terminates atstep 426 or returns to step 404 for processing of other messages already in the user's inbox. -
FIG. 5 is a flow diagram depicting discrete sub-steps applicable to the identification of one or more patterns through analysis of collected email account statistics, according to embodiments exemplified by themethod 400 ofFIG. 4 . Fromstep 406 ofmethod 400, themethod 500 retrieves, atstep 502, sender email frequency statistics, for a first sender, from the recipient messaging profile. The method proceeds to step 504. Atstep 504, the method computers an average frequency for the first sender over a collection or baseline window. Atstep 506, the method determines whether an existing volume or rate threshold has been set for the first sender. If not, one is generated atstep 508, otherwise the method proceeds directly to step 510. Atstep 510, the method retrieves sender-specific response time statistics derived from receipt and transmit times, respectively, for emails received from the first sender and replies to the emails by the recipient (which can be via SMS text, IM, and voice mail as well as email in some embodiments). The method advances to step 512. - At
step 512, the average time taken by the recipient to reply, call back or otherwise respond to the first sender (i.e., “response time) is computed. Atstep 514, aggregate response time statistics, derived from dates/times of messages to and from all or a subset of all recipients (each, “a plurality”) is retrieved and atstep 516, an average aggregate response rate is computed. Atstep 518, the method determines whether an existing threshold response rate has been set for use in evaluating the sender-specific response rate. If not, one is generated atstep 520 and the process proceeds to step 522. Atstep 522, aggregate management rate statistics are derived from recipient reply, deletion and forwarding activity. For purposes of the aggregate rate calculation, the deletions without reading are excluded since these would tend to reduce the overall management rate and have little to no diagnostic value in an aggregate metric. - At
step 524, the method retrieves a set of key words and phrases from all emails responded to by the sender in a faster than average time for a specific sender, faster than an average response time computed for all senders, and faster than average for senders, and/or faster than a threshold time. As previously described, when a user fails to respond to emails containing certain key words at a historic baseline rate, this could mean that the recipient has inadvertently skipped over the message. -
FIG. 6 is a flow diagram depicting discrete sub-steps applicable to the analysis of contemporaneous email account statistics in order to indentify deviations from identified patterns, according to embodiments exemplified by themethod 400 ofFIG. 4 . Themethod 600 is entered at the initiation ofstep 410 ofmethod 400, and atstep 602, themethod 600 retrieves contemporaneous statistics corresponding to a rate of change in a volume of messages received from the first sender or to a number of unread messages from the first sender currently in the recipient's email inbox. Atstep 604, the method retrieves contemporaneous statistics corresponding to a rate of change in a volume of messages received from all or a subset of all senders or to a number of unread messages from this plurality of senders and currently in the recipient's email inbox. - At
step 606, themethod 600 retrieves contemporaneous statistics corresponding to a rate of change in a volume of messages received from the first sender and read and/or managed by the recipient. Atstep 608, the method retrieves contemporaneous statistics corresponding to a rate of change in a volume of messages received from all or a subset of all senders and read and/or managed by the recipient. Atstep 610, statistics corresponding to any messages received by any recipient containing a key word from a set of key words and phrases previously responded to by the recipient, on average, within a response time faster than average time for a specific sender, faster than an average response time computed for all senders, and faster than average for senders, and/or faster than a threshold time. -
FIG. 7A is a screen shot depicting auser interface 700, displayed on a recipient's communication terminal, obtained by local execution of an e-mail messaging client application by a processor of the terminal and depicting an inbox managed through detection and analysis of dynamically variable behavior and activity patterns, according to one or more embodiments. According to some embodiments, a user ofcommunication terminal 160′ accesses an email client application or a browser application providing the interface of a hosted email application. In some embodiments, the requests are transmitted to, and the responses are returned by, a remote server having access to one or more data sources and the analytical resources needed to analyze accessible data attributes. Buttons 702-708 enable the user to navigate between individual functions of the messaging client application, andbuttons 710 to 716 enable the user to reply, forward, delete and save specific messages, respectively, when using the email client application. -
FIGS. 7B and 7C are respective screen shots depicting the display of an alert notification generated by an email message management application, and the corresponding prompt displayed to the recipient, each according to one or more embodiments. - Although the invention has largely been described and illustrated in the context of email volume management, the invention should also be understood as being directed to other types of incoming messages, including voice mails, SMS (text messages), and instant messages. The difference between the different communication modalities is the action taken, which depends on the technology that this communication modality provides. For example, for incoming voice mails the system could automatically change the outgoing voice message. For instant messaging systems, the system could change the presence indicator and text associated with the recipient, in addition to blocking incoming messages from particular senders or auto-responding to them.
- The embodiments of the present invention may be embodied as methods, apparatus, electronic devices, and/or computer program products. Accordingly, the embodiments of the present invention may be embodied in hardware and/or in software (including firmware, resident software, micro-code, etc.), which may be generally referred to herein as a “circuit” or “module”. Furthermore, the present invention may take the form of a computer program product on a computer-usable or computer-readable storage medium having computer-usable or computer-readable program code embodied in the medium for use by or in connection with an instruction execution system. In the context of this document, a computer-usable or computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. These computer program instructions may also be stored in a computer-usable or computer-readable memory that may direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer usable or computer-readable memory produce an article of manufacture including instructions that implement the function specified in the flowchart and/or block diagram block or blocks.
- The computer-usable or computer-readable medium may be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. More specific examples (a non-exhaustive list) of the computer-readable medium include the following: hard disks, optical storage devices, a transmission media such as those supporting the Internet or an intranet, magnetic storage devices, an electrical connection having one or more wires, a portable computer diskette, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, and a compact disc read-only memory (CD-ROM).
- Computer program code for carrying out operations of the present invention may be written in an object oriented programming language, such as Java®, Smalltalk or C++, and the like. However, the computer program code for carrying out operations of the present invention may also be written in conventional procedural programming languages, such as the “C” programming language and/or any other lower level assembler languages. It will be further appreciated that the functionality of any or all of the program modules may also be implemented using discrete hardware components, one or more Application Specific Integrated Circuits (ASICs), or programmed Digital Signal Processors or microcontrollers.
- The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to best explain the principles of the present disclosure and its practical applications, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as may be suited to the particular use contemplated.
- The methods described herein may be implemented in software, hardware, or a combination thereof, in different embodiments. In addition, the order of methods may be changed, and various elements may be added, reordered, combined, omitted, modified, etc. All examples described herein are presented in a non-limiting manner. Various modifications and changes may be made as would be obvious to a person skilled in the art having benefit of this disclosure. Realizations in accordance with embodiments have been described in the context of particular embodiments. These embodiments are meant to be illustrative and not limiting. Many variations, modifications, additions, and improvements are possible. Accordingly, plural instances may be provided for components described herein as a single instance. Boundaries between various components, operations and data stores are somewhat arbitrary, and particular operations are illustrated in the context of specific illustrative configurations. Other allocations of functionality are envisioned and may fall within the scope of claims that follow. Finally, structures and functionality presented as discrete components in the example configurations may be implemented as a combined structure or component. These and other variations, modifications, additions, and improvements may fall within the scope of embodiments as defined in the claims that follow.
- While the foregoing is directed to embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.
Claims (22)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/318,676 US20150381533A1 (en) | 2014-06-29 | 2014-06-29 | System and Method for Email Management Through Detection and Analysis of Dynamically Variable Behavior and Activity Patterns |
US16/832,735 US11019000B2 (en) | 2014-06-29 | 2020-03-27 | System and method for email management through detection and analysis of dynamically variable behavior and activity patterns |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/318,676 US20150381533A1 (en) | 2014-06-29 | 2014-06-29 | System and Method for Email Management Through Detection and Analysis of Dynamically Variable Behavior and Activity Patterns |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/832,735 Continuation US11019000B2 (en) | 2014-06-29 | 2020-03-27 | System and method for email management through detection and analysis of dynamically variable behavior and activity patterns |
Publications (1)
Publication Number | Publication Date |
---|---|
US20150381533A1 true US20150381533A1 (en) | 2015-12-31 |
Family
ID=54931782
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/318,676 Abandoned US20150381533A1 (en) | 2014-06-29 | 2014-06-29 | System and Method for Email Management Through Detection and Analysis of Dynamically Variable Behavior and Activity Patterns |
US16/832,735 Active US11019000B2 (en) | 2014-06-29 | 2020-03-27 | System and method for email management through detection and analysis of dynamically variable behavior and activity patterns |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/832,735 Active US11019000B2 (en) | 2014-06-29 | 2020-03-27 | System and method for email management through detection and analysis of dynamically variable behavior and activity patterns |
Country Status (1)
Country | Link |
---|---|
US (2) | US20150381533A1 (en) |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160057082A1 (en) * | 2014-08-20 | 2016-02-25 | International Business Machines Corporation | Out-of-office notification mechanism for email clients |
US20160203207A1 (en) * | 2015-01-12 | 2016-07-14 | Htc Corporation | Electronic apparatus and classifying method |
US20160277334A1 (en) * | 2015-03-16 | 2016-09-22 | International Business Machines Corporation | Auto clean-up of unused email rules |
US20170149720A1 (en) * | 2015-11-20 | 2017-05-25 | Accenture Global Solutions Limited | Managing messaging services |
US9686308B1 (en) * | 2014-05-12 | 2017-06-20 | GraphUS, Inc. | Systems and methods for detecting and/or handling targeted attacks in the email channel |
US20170200015A1 (en) * | 2016-01-07 | 2017-07-13 | Emmanuel Gonzalez | System and method to reduce inappropriate email and online behavior |
US20180054413A1 (en) * | 2015-03-27 | 2018-02-22 | Ent. Services Development Corporation Lp | Communication association model |
US20180091467A1 (en) * | 2016-09-26 | 2018-03-29 | Linkedin Corporation | Calculating efficient messaging parameters |
US10163005B2 (en) * | 2015-12-01 | 2018-12-25 | Imatrix Corp. | Document structure analysis device with image processing |
US20180375814A1 (en) * | 2017-06-27 | 2018-12-27 | Microsoft Technology Licensing, Llc | Tracking and controlling mass communications |
US20190182063A1 (en) * | 2017-12-12 | 2019-06-13 | Microsoft Technology Licensing, Llc | Mailbox protection in web conferencing systems |
US20200104728A1 (en) * | 2018-09-28 | 2020-04-02 | International Business Machines Corporation | Cognitive rule generation based on data analytics |
US20200151649A1 (en) * | 2018-11-14 | 2020-05-14 | Servicenow, Inc. | Workflows with rule-based assignments |
US10715473B2 (en) * | 2018-07-24 | 2020-07-14 | International Business Machines Corporation | Optimized message exchange |
US10860984B1 (en) * | 2019-06-18 | 2020-12-08 | Microsoft Technology Licensing, Llc | Out of office email detection system |
US10951565B2 (en) * | 2015-06-23 | 2021-03-16 | International Business Machines Corporation | Handling various scenarios where an email recipient is not available |
US10951570B2 (en) | 2015-07-08 | 2021-03-16 | International Business Machines Corporation | Preventing a user from missing unread documents |
US20210210094A1 (en) * | 2016-12-27 | 2021-07-08 | Amazon Technologies, Inc. | Messaging from a shared device |
US11108723B2 (en) * | 2014-08-29 | 2021-08-31 | Google Llc | Systems and methods for triggering redisplay of a postponed message |
US20210281653A1 (en) * | 2018-05-24 | 2021-09-09 | People.ai, Inc. | Systems and methods for updating email addresses based on email generation patterns |
US11196693B2 (en) | 2019-03-20 | 2021-12-07 | Allstate Insurance Company | Unsubscribe automation |
US11232229B2 (en) | 2019-03-20 | 2022-01-25 | Infoarmor, Inc. | Unsubscribe and delete automation |
CN113971196A (en) * | 2021-08-13 | 2022-01-25 | 荣耀终端有限公司 | Push information processing method and terminal equipment |
US11316806B1 (en) * | 2020-01-28 | 2022-04-26 | Snap Inc. | Bulk message deletion |
US11374889B2 (en) | 2019-03-20 | 2022-06-28 | Infoarmor, Inc. | Unsubscribe and delete automation |
US11625751B2 (en) | 2020-05-26 | 2023-04-11 | Twilio Inc. | Message-transmittal strategy optimization |
US11924297B2 (en) | 2018-05-24 | 2024-03-05 | People.ai, Inc. | Systems and methods for generating a filtered data set |
US11948219B1 (en) * | 2023-06-27 | 2024-04-02 | PrivacyHawk, Inc. | Determining opt-out compliance to prevent fraud risk from user data exposure |
US11949682B2 (en) | 2018-05-24 | 2024-04-02 | People.ai, Inc. | Systems and methods for managing the generation or deletion of record objects based on electronic activities and communication policies |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11916873B1 (en) | 2022-08-15 | 2024-02-27 | Virtual Connect Technologies, Inc. | Computerized system for inserting management information into electronic communication systems |
Citations (78)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6073142A (en) * | 1997-06-23 | 2000-06-06 | Park City Group | Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments |
US6249807B1 (en) * | 1998-11-17 | 2001-06-19 | Kana Communications, Inc. | Method and apparatus for performing enterprise email management |
US20020116641A1 (en) * | 2001-02-22 | 2002-08-22 | International Business Machines Corporation | Method and apparatus for providing automatic e-mail filtering based on message semantics, sender's e-mail ID, and user's identity |
US20020169667A1 (en) * | 2001-03-13 | 2002-11-14 | Leonard Marotta | Content submission and distribution system for use in clearing advertisement spots |
US20030135737A1 (en) * | 2001-12-31 | 2003-07-17 | Nicolas Bouthors | Method for protecting an exchange of data by remote means |
US20030158905A1 (en) * | 2002-02-19 | 2003-08-21 | Postini Corporation | E-mail management services |
US20030188194A1 (en) * | 2002-03-29 | 2003-10-02 | David Currie | Method and apparatus for real-time security verification of on-line services |
US20040030917A1 (en) * | 2002-08-07 | 2004-02-12 | Karamchedu Murali M. | Opaque message archives |
US20040030893A1 (en) * | 2002-08-07 | 2004-02-12 | Karamchedu Murali M. | Selective encryption of electronic messages and data |
US20040030918A1 (en) * | 2002-08-07 | 2004-02-12 | Karamchedu Murali M. | Enterprise based opaque message archives |
US20040030916A1 (en) * | 2002-08-07 | 2004-02-12 | Karamchedu Murali M. | Preemptive and interactive data solicitation for electronic messaging |
US20040059790A1 (en) * | 2002-08-27 | 2004-03-25 | Austin-Lane Christopher Emery | Delivery of an electronic communication using a lifespan |
US20040088359A1 (en) * | 2002-11-04 | 2004-05-06 | Nigel Simpson | Computer implemented system and method for predictive management of electronic messages |
US20040172454A1 (en) * | 2002-11-18 | 2004-09-02 | Barry Appelman | Reconfiguring an electronic message to effect an enhanced notification |
US20040177120A1 (en) * | 2003-03-07 | 2004-09-09 | Kirsch Steven T. | Method for filtering e-mail messages |
US20040199598A1 (en) * | 2003-04-03 | 2004-10-07 | Kalfas Plato John | System and method for email notification |
US20050004989A1 (en) * | 2003-07-01 | 2005-01-06 | Microsoft Corporation | Automatic grouping of electronic mail |
US20050015451A1 (en) * | 2001-02-15 | 2005-01-20 | Sheldon Valentine D'arcy | Automatic e-mail address directory and sorting system |
US20050063365A1 (en) * | 2003-07-11 | 2005-03-24 | Boban Mathew | System and method for multi-tiered rule filtering |
US20050066005A1 (en) * | 2003-09-18 | 2005-03-24 | Sbc Knowledge Ventures, L.P. | Intelligent email detection and auto replay email technique |
US20050160286A1 (en) * | 2002-03-29 | 2005-07-21 | Scanalert | Method and apparatus for real-time security verification of on-line services |
US20050198181A1 (en) * | 2004-03-02 | 2005-09-08 | Jordan Ritter | Method and apparatus to use a statistical model to classify electronic communications |
US20060010213A1 (en) * | 2004-05-19 | 2006-01-12 | Jignesh Mehta | Method for personal email archiving and organization for electronic data, including email, which can be utilized by both the user and the provider in a variety of ways |
US20060031347A1 (en) * | 2004-06-17 | 2006-02-09 | Pekka Sahi | Corporate email system |
US20060053199A1 (en) * | 2004-09-03 | 2006-03-09 | Thorsten Pricken | Displaying monitored information in an email response management system |
US20060059238A1 (en) * | 2004-05-29 | 2006-03-16 | Slater Charles S | Monitoring the flow of messages received at a server |
US7020688B2 (en) * | 2000-09-05 | 2006-03-28 | Financial Network, Inc. | Methods and systems for archiving and verification of electronic communications |
US20060123083A1 (en) * | 2004-12-03 | 2006-06-08 | Xerox Corporation | Adaptive spam message detector |
US20060123084A1 (en) * | 2004-12-02 | 2006-06-08 | Niklas Heidloff | Method and system for automatically providing notifications regarding interesting content from shared sources based on important persons and important sources for a user |
US7113948B2 (en) * | 2003-03-21 | 2006-09-26 | Acellion Pte Ltd. | Methods and systems for email attachment distribution and management |
US20060253537A1 (en) * | 2005-05-04 | 2006-11-09 | Ragy Thomas | Method and system for providing automated email optimization |
US20060288076A1 (en) * | 2005-06-20 | 2006-12-21 | David Cowings | Method and apparatus for maintaining reputation lists of IP addresses to detect email spam |
US20070027717A1 (en) * | 2005-07-29 | 2007-02-01 | Karamchedu Murali M | Automatic patient record update enabled clinical messaging |
US20070198677A1 (en) * | 2006-01-24 | 2007-08-23 | Microsoft Corporation | Web based client/server notification engine |
US20080005249A1 (en) * | 2006-07-03 | 2008-01-03 | Hart Matt E | Method and apparatus for determining the importance of email messages |
US20080001492A1 (en) * | 2000-09-06 | 2008-01-03 | Quebec Metal Powders Limited | Brush dc motors and ac commutator motor structures with concentrated windings |
US20080014982A1 (en) * | 2003-04-28 | 2008-01-17 | Eral Foxenland | Changing presentation of items of information based on message reception frequency |
US20080065736A1 (en) * | 2006-09-12 | 2008-03-13 | William Gross | System and method for managing emails based on user response time |
US20080086305A1 (en) * | 2006-10-02 | 2008-04-10 | Bighand Ltd. | Digital dictation workflow system and method |
US20080168347A1 (en) * | 2007-01-09 | 2008-07-10 | Hallyn Serge E | Geographical Email Presentation |
US20080195664A1 (en) * | 2006-12-13 | 2008-08-14 | Quickplay Media Inc. | Automated Content Tag Processing for Mobile Media |
US20080250114A1 (en) * | 2005-10-14 | 2008-10-09 | International Business Machines Corporation | Mitigating address book weaknesses that permit the sending of e-mail to wrong addresses |
US20080250106A1 (en) * | 2007-04-03 | 2008-10-09 | George Leslie Rugg | Use of Acceptance Methods for Accepting Email and Messages |
US20090007143A1 (en) * | 2007-06-28 | 2009-01-01 | Microsoft Corporation | Server quota notification |
US20090094340A1 (en) * | 2007-10-05 | 2009-04-09 | Saar Gillai | Intelligence of the crowd electronic mail management system |
US20090106370A1 (en) * | 2007-10-19 | 2009-04-23 | International Business Machines Corporation | Processing Electronic Messages According to Sender Classification |
US20090106367A1 (en) * | 2007-10-18 | 2009-04-23 | Banerjee Dwip N | Triggering a communication system to automatically reply to communications |
US20090319918A1 (en) * | 2008-06-24 | 2009-12-24 | Microsoft Corporation | Multi-modal communication through modal-specific interfaces |
US20090319584A1 (en) * | 2008-05-13 | 2009-12-24 | Song Michael R | System and method for managing electronic mail and documents |
US20100077041A1 (en) * | 2008-09-19 | 2010-03-25 | Mailrank, Inc. | Ranking Messages in an Electronic Messaging Environment |
US7712136B2 (en) * | 2005-05-05 | 2010-05-04 | Ironport Systems, Inc. | Controlling a message quarantine |
US20100153325A1 (en) * | 2008-12-12 | 2010-06-17 | At&T Intellectual Property I, L.P. | E-Mail Handling System and Method |
US20100169264A1 (en) * | 2008-12-29 | 2010-07-01 | O'sullivan Patrick Joseph | Predicting email response patterns |
US20100205259A1 (en) * | 2009-02-11 | 2010-08-12 | Microsoft Corporation | Email management based on user behavior |
US20100273456A1 (en) * | 2007-11-05 | 2010-10-28 | Visto Corporation | Service management system & associated methodology of providing service related message prioritization in a mobile client |
US7831676B1 (en) * | 2007-02-21 | 2010-11-09 | Nagar Ajay R | Method and system for handling email |
US7849142B2 (en) * | 2004-05-29 | 2010-12-07 | Ironport Systems, Inc. | Managing connections, messages, and directory harvest attacks at a server |
US20110075828A1 (en) * | 2009-09-30 | 2011-03-31 | Okita Glen K | Maintaining history information for a user across multiple types of end points |
US20110161437A1 (en) * | 2009-12-31 | 2011-06-30 | International Business Machines Corporation | Action-based e-mail message quota monitoring |
US20110161933A1 (en) * | 2009-12-24 | 2011-06-30 | International Business Machines Corporation | Software defect tracking |
US20110185345A1 (en) * | 2010-01-27 | 2011-07-28 | Microsoft Corporation | Type-Preserving Compiler for Security Verification |
US20110208852A1 (en) * | 2010-02-25 | 2011-08-25 | Looney Erin C | Regionally-Tiered Internet Banner Delivery and Platform for Transaction Fulfillment of E-Commerce |
US20110252107A1 (en) * | 2008-12-16 | 2011-10-13 | The Rocket Science Group, Llc | Systems and Methods for Sending an Electronic Mail Communication at a Selected Time Based on the Recipient's Time Zone |
US20120005284A1 (en) * | 2010-07-03 | 2012-01-05 | Tse Edward T | Adaptive Method to Automatically Classify Emails Based on Bio-Signature Association |
US8095613B1 (en) * | 2009-01-06 | 2012-01-10 | Kiha Software Inc. | Electronic message prioritization |
US8135778B1 (en) * | 2005-04-27 | 2012-03-13 | Symantec Corporation | Method and apparatus for certifying mass emailings |
US8255811B2 (en) * | 2006-12-20 | 2012-08-28 | International Business Machines Corporation | Providing auto-sorting of collaborative partners or components based on frequency of communication and/or access in a collaboration system user interface |
US20130018964A1 (en) * | 2011-07-12 | 2013-01-17 | Microsoft Corporation | Message categorization |
US8443049B1 (en) * | 2004-08-20 | 2013-05-14 | Sprint Spectrum L.P. | Call processing using trust scores based on messaging patterns of message source |
US20130191759A1 (en) * | 2012-01-19 | 2013-07-25 | International Business Machines Corporation | Systems and methods for detecting and managing recurring electronic communications |
US20130204946A1 (en) * | 2012-02-03 | 2013-08-08 | Scott Forstall | Email mailbox management |
US20130232206A1 (en) * | 2012-03-02 | 2013-09-05 | Computer Associates Think, Inc. | Self-management of group email reception |
US20140082521A1 (en) * | 2012-09-20 | 2014-03-20 | Handle, Inc. | Email and task management services and user interface |
US20140280616A1 (en) * | 2013-03-14 | 2014-09-18 | Microsoft Corporation | Email assistant for efficiently managing emails |
US20140280624A1 (en) * | 2013-03-15 | 2014-09-18 | Return Path, Inc. | System and method for providing actionable recomendations to improve electronic mail inbox placement and engagement |
US20150249633A1 (en) * | 2014-03-03 | 2015-09-03 | Yahool Inc. | System and method for email notification |
US20150302540A1 (en) * | 2014-04-16 | 2015-10-22 | Voxer Ip Llc | Embeddable communications software module |
US9237121B1 (en) * | 2015-03-24 | 2016-01-12 | OTC Systems, Ltd. | Commercial email management system |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150089007A1 (en) * | 2008-12-12 | 2015-03-26 | At&T Intellectual Property I, L.P. | E-mail handling based on a behavioral history |
US20110289162A1 (en) * | 2010-04-02 | 2011-11-24 | Furlong Wesley J | Method and system for adaptive delivery of digital messages |
US10223369B2 (en) * | 2013-08-16 | 2019-03-05 | Sanebox, Inc. | Processing electronic messages |
US9197590B2 (en) * | 2014-03-27 | 2015-11-24 | Dropbox, Inc. | Dynamic filter generation for message management systems |
RU2608880C2 (en) * | 2014-05-22 | 2017-01-25 | Общество С Ограниченной Ответственностью "Яндекс" | Electronic device and method of electronic message processing |
US9967219B2 (en) * | 2015-03-23 | 2018-05-08 | Ca, Inc. | Privacy preserving method and system for limiting communications to targeted recipients using behavior-based categorizing of recipients |
-
2014
- 2014-06-29 US US14/318,676 patent/US20150381533A1/en not_active Abandoned
-
2020
- 2020-03-27 US US16/832,735 patent/US11019000B2/en active Active
Patent Citations (110)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6073142A (en) * | 1997-06-23 | 2000-06-06 | Park City Group | Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments |
US6249807B1 (en) * | 1998-11-17 | 2001-06-19 | Kana Communications, Inc. | Method and apparatus for performing enterprise email management |
US7020688B2 (en) * | 2000-09-05 | 2006-03-28 | Financial Network, Inc. | Methods and systems for archiving and verification of electronic communications |
US20080001492A1 (en) * | 2000-09-06 | 2008-01-03 | Quebec Metal Powders Limited | Brush dc motors and ac commutator motor structures with concentrated windings |
US20050015451A1 (en) * | 2001-02-15 | 2005-01-20 | Sheldon Valentine D'arcy | Automatic e-mail address directory and sorting system |
US20020116641A1 (en) * | 2001-02-22 | 2002-08-22 | International Business Machines Corporation | Method and apparatus for providing automatic e-mail filtering based on message semantics, sender's e-mail ID, and user's identity |
US20020169667A1 (en) * | 2001-03-13 | 2002-11-14 | Leonard Marotta | Content submission and distribution system for use in clearing advertisement spots |
US20030135737A1 (en) * | 2001-12-31 | 2003-07-17 | Nicolas Bouthors | Method for protecting an exchange of data by remote means |
US8725889B2 (en) * | 2002-02-19 | 2014-05-13 | Google Inc. | E-mail management services |
US20060206938A1 (en) * | 2002-02-19 | 2006-09-14 | Postini Corporation | E-mail management services |
US20050182959A1 (en) * | 2002-02-19 | 2005-08-18 | Postini, Inc. | Systems and methods for managing the transmission of electronic messages via message source data |
US20050182960A1 (en) * | 2002-02-19 | 2005-08-18 | Postini, Inc. | Systems and methods for managing the transmission of electronic messages via throttling and delaying delivery |
US20030158905A1 (en) * | 2002-02-19 | 2003-08-21 | Postini Corporation | E-mail management services |
US8769020B2 (en) * | 2002-02-19 | 2014-07-01 | Google, Inc. | Systems and methods for managing the transmission of electronic messages via message source data |
US20070156830A1 (en) * | 2002-02-19 | 2007-07-05 | Postini Corporation | E-mail management services |
US6941348B2 (en) * | 2002-02-19 | 2005-09-06 | Postini, Inc. | Systems and methods for managing the transmission of electronic messages through active message date updating |
US20030188194A1 (en) * | 2002-03-29 | 2003-10-02 | David Currie | Method and apparatus for real-time security verification of on-line services |
US20050160286A1 (en) * | 2002-03-29 | 2005-07-21 | Scanalert | Method and apparatus for real-time security verification of on-line services |
US20040030917A1 (en) * | 2002-08-07 | 2004-02-12 | Karamchedu Murali M. | Opaque message archives |
US20040030918A1 (en) * | 2002-08-07 | 2004-02-12 | Karamchedu Murali M. | Enterprise based opaque message archives |
US20040030893A1 (en) * | 2002-08-07 | 2004-02-12 | Karamchedu Murali M. | Selective encryption of electronic messages and data |
US20040030916A1 (en) * | 2002-08-07 | 2004-02-12 | Karamchedu Murali M. | Preemptive and interactive data solicitation for electronic messaging |
US20040059790A1 (en) * | 2002-08-27 | 2004-03-25 | Austin-Lane Christopher Emery | Delivery of an electronic communication using a lifespan |
US20040088359A1 (en) * | 2002-11-04 | 2004-05-06 | Nigel Simpson | Computer implemented system and method for predictive management of electronic messages |
US7469280B2 (en) * | 2002-11-04 | 2008-12-23 | Sun Microsystems, Inc. | Computer implemented system and method for predictive management of electronic messages |
US20040172454A1 (en) * | 2002-11-18 | 2004-09-02 | Barry Appelman | Reconfiguring an electronic message to effect an enhanced notification |
US20040177120A1 (en) * | 2003-03-07 | 2004-09-09 | Kirsch Steven T. | Method for filtering e-mail messages |
US7113948B2 (en) * | 2003-03-21 | 2006-09-26 | Acellion Pte Ltd. | Methods and systems for email attachment distribution and management |
US20040199598A1 (en) * | 2003-04-03 | 2004-10-07 | Kalfas Plato John | System and method for email notification |
US20080014982A1 (en) * | 2003-04-28 | 2008-01-17 | Eral Foxenland | Changing presentation of items of information based on message reception frequency |
US7567657B2 (en) * | 2003-04-28 | 2009-07-28 | Sony Ericsson Mobile Communications Ab | Changing presentation of items of information based on message reception frequency |
US8150930B2 (en) * | 2003-07-01 | 2012-04-03 | Microsoft Corporation | Automatic grouping of electronic mail |
US20100191818A1 (en) * | 2003-07-01 | 2010-07-29 | Microsoft Corporation | Automatic Grouping of Electronic Mail |
US20120215866A1 (en) * | 2003-07-01 | 2012-08-23 | Microsoft Corporation | Automatic Grouping of Electronic Mail |
US20050004989A1 (en) * | 2003-07-01 | 2005-01-06 | Microsoft Corporation | Automatic grouping of electronic mail |
US7707255B2 (en) * | 2003-07-01 | 2010-04-27 | Microsoft Corporation | Automatic grouping of electronic mail |
US20050063365A1 (en) * | 2003-07-11 | 2005-03-24 | Boban Mathew | System and method for multi-tiered rule filtering |
US7027463B2 (en) * | 2003-07-11 | 2006-04-11 | Sonolink Communications Systems, Llc | System and method for multi-tiered rule filtering |
US8032600B2 (en) * | 2003-09-18 | 2011-10-04 | At&T Intellectual Property I, L.P. | Treatment of email messages sent to a no-reply destination email address |
US20080235344A1 (en) * | 2003-09-18 | 2008-09-25 | Sbc Knowledge Ventures, L.P. | Auto reply email and auto reply email method |
US7406504B2 (en) * | 2003-09-18 | 2008-07-29 | Sbc Knowledge Ventures, L.P. | Intelligent email detection and auto reply email technique to emails destined to no reply email addresses |
US20050066005A1 (en) * | 2003-09-18 | 2005-03-24 | Sbc Knowledge Ventures, L.P. | Intelligent email detection and auto replay email technique |
US20050198181A1 (en) * | 2004-03-02 | 2005-09-08 | Jordan Ritter | Method and apparatus to use a statistical model to classify electronic communications |
US20060010213A1 (en) * | 2004-05-19 | 2006-01-12 | Jignesh Mehta | Method for personal email archiving and organization for electronic data, including email, which can be utilized by both the user and the provider in a variety of ways |
US7849142B2 (en) * | 2004-05-29 | 2010-12-07 | Ironport Systems, Inc. | Managing connections, messages, and directory harvest attacks at a server |
US20060059238A1 (en) * | 2004-05-29 | 2006-03-16 | Slater Charles S | Monitoring the flow of messages received at a server |
US20060031347A1 (en) * | 2004-06-17 | 2006-02-09 | Pekka Sahi | Corporate email system |
US8443049B1 (en) * | 2004-08-20 | 2013-05-14 | Sprint Spectrum L.P. | Call processing using trust scores based on messaging patterns of message source |
US20060053199A1 (en) * | 2004-09-03 | 2006-03-09 | Thorsten Pricken | Displaying monitored information in an email response management system |
US20060123084A1 (en) * | 2004-12-02 | 2006-06-08 | Niklas Heidloff | Method and system for automatically providing notifications regarding interesting content from shared sources based on important persons and important sources for a user |
US20060123083A1 (en) * | 2004-12-03 | 2006-06-08 | Xerox Corporation | Adaptive spam message detector |
US8135778B1 (en) * | 2005-04-27 | 2012-03-13 | Symantec Corporation | Method and apparatus for certifying mass emailings |
US20060253537A1 (en) * | 2005-05-04 | 2006-11-09 | Ragy Thomas | Method and system for providing automated email optimization |
US7712136B2 (en) * | 2005-05-05 | 2010-05-04 | Ironport Systems, Inc. | Controlling a message quarantine |
US8010609B2 (en) * | 2005-06-20 | 2011-08-30 | Symantec Corporation | Method and apparatus for maintaining reputation lists of IP addresses to detect email spam |
US20060288076A1 (en) * | 2005-06-20 | 2006-12-21 | David Cowings | Method and apparatus for maintaining reputation lists of IP addresses to detect email spam |
US20070027717A1 (en) * | 2005-07-29 | 2007-02-01 | Karamchedu Murali M | Automatic patient record update enabled clinical messaging |
US7774421B2 (en) * | 2005-10-14 | 2010-08-10 | International Business Machines Corporation | Mitigating address book weaknesses that permit the sending of e-mail to wrong addresses |
US20080250114A1 (en) * | 2005-10-14 | 2008-10-09 | International Business Machines Corporation | Mitigating address book weaknesses that permit the sending of e-mail to wrong addresses |
US20070198677A1 (en) * | 2006-01-24 | 2007-08-23 | Microsoft Corporation | Web based client/server notification engine |
US20080005249A1 (en) * | 2006-07-03 | 2008-01-03 | Hart Matt E | Method and apparatus for determining the importance of email messages |
US20080065736A1 (en) * | 2006-09-12 | 2008-03-13 | William Gross | System and method for managing emails based on user response time |
US20080086305A1 (en) * | 2006-10-02 | 2008-04-10 | Bighand Ltd. | Digital dictation workflow system and method |
US20080195664A1 (en) * | 2006-12-13 | 2008-08-14 | Quickplay Media Inc. | Automated Content Tag Processing for Mobile Media |
US8255811B2 (en) * | 2006-12-20 | 2012-08-28 | International Business Machines Corporation | Providing auto-sorting of collaborative partners or components based on frequency of communication and/or access in a collaboration system user interface |
US20080168347A1 (en) * | 2007-01-09 | 2008-07-10 | Hallyn Serge E | Geographical Email Presentation |
US7831676B1 (en) * | 2007-02-21 | 2010-11-09 | Nagar Ajay R | Method and system for handling email |
US20080250106A1 (en) * | 2007-04-03 | 2008-10-09 | George Leslie Rugg | Use of Acceptance Methods for Accepting Email and Messages |
US20090007143A1 (en) * | 2007-06-28 | 2009-01-01 | Microsoft Corporation | Server quota notification |
US8346875B2 (en) * | 2007-10-05 | 2013-01-01 | Saar Gillai | Intelligence of the crowd electronic mail management system |
US20090094340A1 (en) * | 2007-10-05 | 2009-04-09 | Saar Gillai | Intelligence of the crowd electronic mail management system |
US20090106367A1 (en) * | 2007-10-18 | 2009-04-23 | Banerjee Dwip N | Triggering a communication system to automatically reply to communications |
US8271590B2 (en) * | 2007-10-19 | 2012-09-18 | International Business Machines Corporation | Processing electronic messages according to sender classification |
US20090106370A1 (en) * | 2007-10-19 | 2009-04-23 | International Business Machines Corporation | Processing Electronic Messages According to Sender Classification |
US20100273456A1 (en) * | 2007-11-05 | 2010-10-28 | Visto Corporation | Service management system & associated methodology of providing service related message prioritization in a mobile client |
US20090319584A1 (en) * | 2008-05-13 | 2009-12-24 | Song Michael R | System and method for managing electronic mail and documents |
US20090319918A1 (en) * | 2008-06-24 | 2009-12-24 | Microsoft Corporation | Multi-modal communication through modal-specific interfaces |
US8095612B2 (en) * | 2008-09-19 | 2012-01-10 | Mailrank, Inc. | Ranking messages in an electronic messaging environment |
US20100077041A1 (en) * | 2008-09-19 | 2010-03-25 | Mailrank, Inc. | Ranking Messages in an Electronic Messaging Environment |
US8935190B2 (en) * | 2008-12-12 | 2015-01-13 | At&T Intellectual Property I, L.P. | E-mail handling system and method |
US20100153325A1 (en) * | 2008-12-12 | 2010-06-17 | At&T Intellectual Property I, L.P. | E-Mail Handling System and Method |
US20110252107A1 (en) * | 2008-12-16 | 2011-10-13 | The Rocket Science Group, Llc | Systems and Methods for Sending an Electronic Mail Communication at a Selected Time Based on the Recipient's Time Zone |
US8862519B2 (en) * | 2008-12-29 | 2014-10-14 | International Business Machines Corporation | Predicting email response patterns |
US20100169264A1 (en) * | 2008-12-29 | 2010-07-01 | O'sullivan Patrick Joseph | Predicting email response patterns |
US8095613B1 (en) * | 2009-01-06 | 2012-01-10 | Kiha Software Inc. | Electronic message prioritization |
US20100205259A1 (en) * | 2009-02-11 | 2010-08-12 | Microsoft Corporation | Email management based on user behavior |
US8255468B2 (en) * | 2009-02-11 | 2012-08-28 | Microsoft Corporation | Email management based on user behavior |
US20110075828A1 (en) * | 2009-09-30 | 2011-03-31 | Okita Glen K | Maintaining history information for a user across multiple types of end points |
US20110161933A1 (en) * | 2009-12-24 | 2011-06-30 | International Business Machines Corporation | Software defect tracking |
US20110161437A1 (en) * | 2009-12-31 | 2011-06-30 | International Business Machines Corporation | Action-based e-mail message quota monitoring |
US20110185345A1 (en) * | 2010-01-27 | 2011-07-28 | Microsoft Corporation | Type-Preserving Compiler for Security Verification |
US20110208852A1 (en) * | 2010-02-25 | 2011-08-25 | Looney Erin C | Regionally-Tiered Internet Banner Delivery and Platform for Transaction Fulfillment of E-Commerce |
US20120005284A1 (en) * | 2010-07-03 | 2012-01-05 | Tse Edward T | Adaptive Method to Automatically Classify Emails Based on Bio-Signature Association |
US20130018964A1 (en) * | 2011-07-12 | 2013-01-17 | Microsoft Corporation | Message categorization |
US20180205691A1 (en) * | 2011-07-12 | 2018-07-19 | Microsoft Technology Licensing, Llc | Message categorization |
US9954810B2 (en) * | 2011-07-12 | 2018-04-24 | Microsoft Technology Licensing, Llc | Message categorization |
US20150326521A1 (en) * | 2011-07-12 | 2015-11-12 | Microsoft Technology Licensing, Llc | Message categorization |
US9087324B2 (en) * | 2011-07-12 | 2015-07-21 | Microsoft Technology Licensing, Llc | Message categorization |
US20130191759A1 (en) * | 2012-01-19 | 2013-07-25 | International Business Machines Corporation | Systems and methods for detecting and managing recurring electronic communications |
US20130204946A1 (en) * | 2012-02-03 | 2013-08-08 | Scott Forstall | Email mailbox management |
US8886734B2 (en) * | 2012-02-03 | 2014-11-11 | Apple Inc. | Email mailbox management with sender-specific message lists |
US20150033145A1 (en) * | 2012-02-03 | 2015-01-29 | Apple Inc. | Email mailbox management with sender-specific message lists |
US8868668B2 (en) * | 2012-03-02 | 2014-10-21 | Ca, Inc. | Self-management of group email reception |
US20130232206A1 (en) * | 2012-03-02 | 2013-09-05 | Computer Associates Think, Inc. | Self-management of group email reception |
US20140082521A1 (en) * | 2012-09-20 | 2014-03-20 | Handle, Inc. | Email and task management services and user interface |
US20140280616A1 (en) * | 2013-03-14 | 2014-09-18 | Microsoft Corporation | Email assistant for efficiently managing emails |
US20140280624A1 (en) * | 2013-03-15 | 2014-09-18 | Return Path, Inc. | System and method for providing actionable recomendations to improve electronic mail inbox placement and engagement |
US20150249633A1 (en) * | 2014-03-03 | 2015-09-03 | Yahool Inc. | System and method for email notification |
US20150302540A1 (en) * | 2014-04-16 | 2015-10-22 | Voxer Ip Llc | Embeddable communications software module |
US9237121B1 (en) * | 2015-03-24 | 2016-01-12 | OTC Systems, Ltd. | Commercial email management system |
Cited By (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9686308B1 (en) * | 2014-05-12 | 2017-06-20 | GraphUS, Inc. | Systems and methods for detecting and/or handling targeted attacks in the email channel |
US10181957B2 (en) * | 2014-05-12 | 2019-01-15 | GraphUS, Inc. | Systems and methods for detecting and/or handling targeted attacks in the email channel |
US20160055456A1 (en) * | 2014-08-20 | 2016-02-25 | International Business Machines Corporation | Out-of-office notification mechanism for email clients |
US20160057082A1 (en) * | 2014-08-20 | 2016-02-25 | International Business Machines Corporation | Out-of-office notification mechanism for email clients |
US9508061B2 (en) * | 2014-08-20 | 2016-11-29 | International Business Machines Corporation | Out-of office notification mechanism for email clients |
US9536229B2 (en) * | 2014-08-20 | 2017-01-03 | International Business Machines Corporation | Out-of-office notification mechanism for email clients |
US11463396B2 (en) * | 2014-08-29 | 2022-10-04 | Google Llc | Systems and methods for triggering redisplay of a postponed message |
US11895073B2 (en) * | 2014-08-29 | 2024-02-06 | Google Llc | Systems and methods for triggering redisplay of a postponed message |
US11108723B2 (en) * | 2014-08-29 | 2021-08-31 | Google Llc | Systems and methods for triggering redisplay of a postponed message |
US20160203207A1 (en) * | 2015-01-12 | 2016-07-14 | Htc Corporation | Electronic apparatus and classifying method |
US10326722B2 (en) * | 2015-03-16 | 2019-06-18 | International Business Machines Corporation | Auto clean-up of unused email rules |
US20160277334A1 (en) * | 2015-03-16 | 2016-09-22 | International Business Machines Corporation | Auto clean-up of unused email rules |
US10333878B2 (en) * | 2015-03-16 | 2019-06-25 | International Business Machines Corporation | Auto clean-up of unused email rules |
US20180054413A1 (en) * | 2015-03-27 | 2018-02-22 | Ent. Services Development Corporation Lp | Communication association model |
US10951565B2 (en) * | 2015-06-23 | 2021-03-16 | International Business Machines Corporation | Handling various scenarios where an email recipient is not available |
US10951570B2 (en) | 2015-07-08 | 2021-03-16 | International Business Machines Corporation | Preventing a user from missing unread documents |
US11223593B2 (en) * | 2015-11-20 | 2022-01-11 | Accenture Global Solutions Limited | Managing messaging services |
US20170149720A1 (en) * | 2015-11-20 | 2017-05-25 | Accenture Global Solutions Limited | Managing messaging services |
US10469436B2 (en) * | 2015-11-20 | 2019-11-05 | Accenture Global Solutions Limited | Managing messaging services |
US11095598B2 (en) | 2015-11-20 | 2021-08-17 | Accenture Global Solutions Limited | Managing messaging services |
US10163005B2 (en) * | 2015-12-01 | 2018-12-25 | Imatrix Corp. | Document structure analysis device with image processing |
US10303889B2 (en) * | 2016-01-07 | 2019-05-28 | Emmanuel Gonzalez | System and method to reduce inappropriate email and online behavior |
US10936733B2 (en) * | 2016-01-07 | 2021-03-02 | Emmanuel Gonzalez | Reducing inappropriate online behavior using analysis of email account usage data to select a level of network service |
US20170200015A1 (en) * | 2016-01-07 | 2017-07-13 | Emmanuel Gonzalez | System and method to reduce inappropriate email and online behavior |
US20180091467A1 (en) * | 2016-09-26 | 2018-03-29 | Linkedin Corporation | Calculating efficient messaging parameters |
US10931620B2 (en) * | 2016-09-26 | 2021-02-23 | Microsoft Technology Licensing, Llc | Calculating efficient messaging parameters |
US20210210094A1 (en) * | 2016-12-27 | 2021-07-08 | Amazon Technologies, Inc. | Messaging from a shared device |
US20180375814A1 (en) * | 2017-06-27 | 2018-12-27 | Microsoft Technology Licensing, Llc | Tracking and controlling mass communications |
US20190182063A1 (en) * | 2017-12-12 | 2019-06-13 | Microsoft Technology Licensing, Llc | Mailbox protection in web conferencing systems |
US10708206B2 (en) * | 2017-12-12 | 2020-07-07 | Microsoft Technology Licensing, Llc | Mailbox protection in web conferencing systems |
US11924297B2 (en) | 2018-05-24 | 2024-03-05 | People.ai, Inc. | Systems and methods for generating a filtered data set |
US20210281653A1 (en) * | 2018-05-24 | 2021-09-09 | People.ai, Inc. | Systems and methods for updating email addresses based on email generation patterns |
US11930086B2 (en) | 2018-05-24 | 2024-03-12 | People.ai, Inc. | Systems and methods for maintaining an electronic activity derived member node network |
US11909836B2 (en) | 2018-05-24 | 2024-02-20 | People.ai, Inc. | Systems and methods for updating confidence scores of labels based on subsequent electronic activities |
US11949751B2 (en) | 2018-05-24 | 2024-04-02 | People.ai, Inc. | Systems and methods for restricting electronic activities from being linked with record objects |
US11949682B2 (en) | 2018-05-24 | 2024-04-02 | People.ai, Inc. | Systems and methods for managing the generation or deletion of record objects based on electronic activities and communication policies |
US11909837B2 (en) | 2018-05-24 | 2024-02-20 | People.ai, Inc. | Systems and methods for auto discovery of filters and processing electronic activities using the same |
US10715473B2 (en) * | 2018-07-24 | 2020-07-14 | International Business Machines Corporation | Optimized message exchange |
US11605008B2 (en) * | 2018-09-28 | 2023-03-14 | International Business Machines Corporation | Cognitive rule generation based on data analytics |
US20200104728A1 (en) * | 2018-09-28 | 2020-04-02 | International Business Machines Corporation | Cognitive rule generation based on data analytics |
US11625655B2 (en) * | 2018-11-14 | 2023-04-11 | Servicenow, Inc. | Workflows with rule-based assignments |
US20200151649A1 (en) * | 2018-11-14 | 2020-05-14 | Servicenow, Inc. | Workflows with rule-based assignments |
US11374889B2 (en) | 2019-03-20 | 2022-06-28 | Infoarmor, Inc. | Unsubscribe and delete automation |
US11232229B2 (en) | 2019-03-20 | 2022-01-25 | Infoarmor, Inc. | Unsubscribe and delete automation |
US11196693B2 (en) | 2019-03-20 | 2021-12-07 | Allstate Insurance Company | Unsubscribe automation |
US11848902B2 (en) | 2019-03-20 | 2023-12-19 | Allstate Insurance Company | Unsubscribe and delete automation |
US10860984B1 (en) * | 2019-06-18 | 2020-12-08 | Microsoft Technology Licensing, Llc | Out of office email detection system |
US20220217102A1 (en) * | 2020-01-28 | 2022-07-07 | Snap Inc. | Bulk message deletion |
US11902224B2 (en) * | 2020-01-28 | 2024-02-13 | Snap Inc. | Bulk message deletion |
US11316806B1 (en) * | 2020-01-28 | 2022-04-26 | Snap Inc. | Bulk message deletion |
US11720919B2 (en) * | 2020-05-26 | 2023-08-08 | Twilio Inc. | Message-transmittal strategy optimization |
US11625751B2 (en) | 2020-05-26 | 2023-04-11 | Twilio Inc. | Message-transmittal strategy optimization |
CN113971196A (en) * | 2021-08-13 | 2022-01-25 | 荣耀终端有限公司 | Push information processing method and terminal equipment |
US11948219B1 (en) * | 2023-06-27 | 2024-04-02 | PrivacyHawk, Inc. | Determining opt-out compliance to prevent fraud risk from user data exposure |
Also Published As
Publication number | Publication date |
---|---|
US11019000B2 (en) | 2021-05-25 |
US20200228471A1 (en) | 2020-07-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11019000B2 (en) | System and method for email management through detection and analysis of dynamically variable behavior and activity patterns | |
US20200267109A1 (en) | Data transmission management for computer based inter-user communication | |
US20170005954A1 (en) | System and method for communication management through analysis of recipient behavior and/or contact relationships | |
TWI479329B (en) | Method, article, and apparatus for automatic conversation techniques | |
EP3061215B1 (en) | Conditional delivery of electronic messages | |
US8725811B2 (en) | Message organization and spam filtering based on user interaction | |
US9503399B1 (en) | E-mail enhancement based on user-behavior | |
US9672270B2 (en) | Systems and methods for aggregation, correlation, display and analysis of personal communication messaging and event-based planning | |
AU2011338871B2 (en) | Electronic communications triage | |
EP2005722B1 (en) | Techniques for tracking communication frequency across communication modalities | |
US20030105827A1 (en) | Method and system for contextual prioritization of unified messages | |
US10237228B2 (en) | Initiating social interaction based on E-mail content | |
US8751596B2 (en) | Communication monitoring and management system | |
US10069775B2 (en) | Systems and methods for detecting spam in outbound transactional emails | |
US10375001B2 (en) | Performing predefined actions based on scheduled user events in response to incoming email messages | |
US9467401B1 (en) | Enabling conext aware ehancement for automatic electronic mail reply to mitigate risk | |
US20150095800A1 (en) | Prioritizing communications based on communication patterns | |
US9461956B2 (en) | Adaptive guidance for managing a communications repository | |
US9276889B2 (en) | Using distance from a forum posting as criteria to selectively convey email notifications or not | |
US9084099B2 (en) | Mediation and presentation of communications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: AVAYA INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KLEMM, REINHARD;KRISHNAN, PARAMESHWARAN;SINGH, NAVJOT;REEL/FRAME:033519/0536 Effective date: 20140627 |
|
AS | Assignment |
Owner name: CITIBANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNORS:AVAYA INC.;AVAYA INTEGRATED CABINET SOLUTIONS INC.;OCTEL COMMUNICATIONS CORPORATION;AND OTHERS;REEL/FRAME:041576/0001 Effective date: 20170124 |
|
AS | Assignment |
Owner name: OCTEL COMMUNICATIONS LLC (FORMERLY KNOWN AS OCTEL COMMUNICATIONS CORPORATION), CALIFORNIA Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531 Effective date: 20171128 Owner name: AVAYA INTEGRATED CABINET SOLUTIONS INC., CALIFORNIA Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531 Effective date: 20171128 Owner name: VPNET TECHNOLOGIES, INC., CALIFORNIA Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531 Effective date: 20171128 Owner name: OCTEL COMMUNICATIONS LLC (FORMERLY KNOWN AS OCTEL Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531 Effective date: 20171128 Owner name: AVAYA INC., CALIFORNIA Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531 Effective date: 20171128 Owner name: AVAYA INTEGRATED CABINET SOLUTIONS INC., CALIFORNI Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531 Effective date: 20171128 |
|
AS | Assignment |
Owner name: GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNORS:AVAYA INC.;AVAYA INTEGRATED CABINET SOLUTIONS LLC;OCTEL COMMUNICATIONS LLC;AND OTHERS;REEL/FRAME:045034/0001 Effective date: 20171215 Owner name: GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT, NEW Y Free format text: SECURITY INTEREST;ASSIGNORS:AVAYA INC.;AVAYA INTEGRATED CABINET SOLUTIONS LLC;OCTEL COMMUNICATIONS LLC;AND OTHERS;REEL/FRAME:045034/0001 Effective date: 20171215 |
|
AS | Assignment |
Owner name: CITIBANK, N.A., AS COLLATERAL AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNORS:AVAYA INC.;AVAYA INTEGRATED CABINET SOLUTIONS LLC;OCTEL COMMUNICATIONS LLC;AND OTHERS;REEL/FRAME:045124/0026 Effective date: 20171215 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STCV | Information on status: appeal procedure |
Free format text: NOTICE OF APPEAL FILED |
|
STCV | Information on status: appeal procedure |
Free format text: APPEAL BRIEF (OR SUPPLEMENTAL BRIEF) ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE |
|
AS | Assignment |
Owner name: AVAYA INTEGRATED CABINET SOLUTIONS LLC, NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124/FRAME 0026;ASSIGNOR:CITIBANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:063457/0001 Effective date: 20230403 Owner name: AVAYA MANAGEMENT L.P., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124/FRAME 0026;ASSIGNOR:CITIBANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:063457/0001 Effective date: 20230403 Owner name: AVAYA INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124/FRAME 0026;ASSIGNOR:CITIBANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:063457/0001 Effective date: 20230403 Owner name: AVAYA HOLDINGS CORP., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124/FRAME 0026;ASSIGNOR:CITIBANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:063457/0001 Effective date: 20230403 |
|
AS | Assignment |
Owner name: AVAYA MANAGEMENT L.P., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: CAAS TECHNOLOGIES, LLC, NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: HYPERQUALITY II, LLC, NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: HYPERQUALITY, INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: ZANG, INC. (FORMER NAME OF AVAYA CLOUD INC.), NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: VPNET TECHNOLOGIES, INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: OCTEL COMMUNICATIONS LLC, NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: AVAYA INTEGRATED CABINET SOLUTIONS LLC, NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: INTELLISIST, INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: AVAYA INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 |