US20010002469A1 - Apparatus, program products and methods utilizing intelligent contact management - Google Patents
Apparatus, program products and methods utilizing intelligent contact management Download PDFInfo
- Publication number
- US20010002469A1 US20010002469A1 US09/736,600 US73660000A US2001002469A1 US 20010002469 A1 US20010002469 A1 US 20010002469A1 US 73660000 A US73660000 A US 73660000A US 2001002469 A1 US2001002469 A1 US 2001002469A1
- Authority
- US
- United States
- Prior art keywords
- user
- users
- electronic messaging
- subset
- electronic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 230000004044 response Effects 0.000 claims abstract description 37
- 238000012544 monitoring process Methods 0.000 claims description 9
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 claims description 8
- 229910052799 carbon Inorganic materials 0.000 claims description 8
- 238000004891 communication Methods 0.000 claims description 5
- 230000006870 function Effects 0.000 description 34
- 230000008569 process Effects 0.000 description 17
- 238000012545 processing Methods 0.000 description 14
- 230000015654 memory Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 8
- 230000000881 depressing effect Effects 0.000 description 6
- 239000002131 composite material Substances 0.000 description 5
- 238000012423 maintenance Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 239000000203 mixture Substances 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000004590 computer program Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000009825 accumulation Methods 0.000 description 1
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000000994 depressogenic effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000010845 search algorithm Methods 0.000 description 1
- 238000004904 shortening Methods 0.000 description 1
- 230000000153 supplemental effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/33—Querying
- G06F16/335—Filtering based on additional data, e.g. user or group profiles
Definitions
- the invention is generally related to computers and computer software. More specifically, the invention is related to contact management in electronic messaging systems and the like.
- Electronic messaging has dramatically changed the manner in which people communicate with one another in the digital age.
- Electronic messaging systems permit users on different computers to communicate with one another by transmitting information such as text messages and the like between the different computers.
- Electronic messaging is often used to permit employees in a company to communicate with other employees connected to the company's internal network, regardless of whether they are in the same or another company facility.
- due to the explosive growth of the Internet electronic messaging has now become a relatively common way for anyone with a computer to communicate with other computer users all over the world.
- users are assigned user identifiers, or “user id's” that uniquely identify each user.
- each user is typically assigned one or more “mailboxes,” (also referred to as “post office boxes”) that have a unique address so that any user wishing to send an electronic message (often referred to as an “e-mail”) to another user can do so by addressing the electronic message to the mailbox assigned to that user.
- emailboxes also referred to as “post office boxes” that have a unique address so that any user wishing to send an electronic message (often referred to as an “e-mail”) to another user can do so by addressing the electronic message to the mailbox assigned to that user.
- Many electronic messaging systems furthermore keep electronic “address books,” which typically include contact databases within which are stored records of the mailbox addresses for different users. Therefore, for example, a user wishing to send an electronic message to a user named John Smith, whose mailbox address is “smithj@xyz.com”, is then able to search through an address book to find an entry for “Smith, John”, rather than having to remember a relatively cryptic mailbox address that is assigned to that user.
- address books typically include contact databases within which are stored records of the mailbox addresses for different users. Therefore, for example, a user wishing to send an electronic message to a user named John Smith, whose mailbox address is “smithj@xyz.com”, is then able to search through an address book to find an entry for “Smith, John”, rather than having to remember a relatively cryptic mailbox address that is assigned to that user.
- Some address books also store additional information about users, such as telephone numbers, mailing addresses, job titles, and other information that is more or less unrelated to electronic messaging. Moreover, such address books have also been integrated with other personal information management (PIM) tools such as electronic calendars, to-do lists, project planners, and meeting scheduling tools.
- PIM personal information management
- An address book is often referred to as a “contact manager,” as a user is capable of using an address book to maintain a wide variety of information about many different people (referred to in this context as “contacts”).
- contact manager As the use of electronic messaging has become more widespread, many computer users send and receive more electronic messages to and from a larger number of other computer users. Contact management therefore becomes more important for these users so that they can accurately keep track of other users with whom they correspond.
- a global or master address book is maintained on a central computer for shared access by all users of such a system.
- a global address book typically includes information about all users of the system, and may include hundreds or thousands of records for larger organizations.
- Any individual user often may also keep a local address book that contains only the users with which that user regularly corresponds. However, whenever that user wishes to correspond with another user that is not in his or her local address book, the user often must search through the global address book to find the mailbox address for the other user (a process referred to as “name lookup”), which can be relatively time consuming in a large global address book that is shared by many users.
- Some systems also permit a process known as “partial” name lookup to permit a search to be performed concurrently with a user typing in the name of a user to locate in an address book.
- the partial name lookup processes searches first for matching entries in a user's local address book, and if none are found, searches for matching entries in a global address book. For example, as a user types in the name “Smith, John”, a partial name lookup process would retrieve all address book entries that start with a user name “s” after the user typed the letter “s”, then retrieve only the address book entries that start with the user name “sm” after the user typed the letter “m”, etc. Eventually, the user would be left with a relatively manageable list of entries to select from as the intended recipient of an electronic message.
- the searching user may have worked with John Smith many times before, and may have never even met any of the other users. Or, for example, the searching user and John Smith may be located in the same office building, or may both be engineers, while the other users are located in other facilities or are managers, assembly line workers, lawyers, etc. Nonetheless, the searching user still receives an alphabetical list, and he or she must scan down through the list of users before selecting the desired entry.
- Conventional electronic messaging systems lack any capability to suggest any particular entry from a list of search results on any basis other than alphabetically.
- Some electronic messaging systems also provide the ability to automatically add an entry to a user's local address book in response to receiving an electronic message from another user.
- many users receive literally hundreds of electronic messages a day, with many coming from other users that a particular user has no intention of ever corresponding with again.
- Creating an entry for each and every user that sends a message can significantly clutter up a user's local address book and make it more difficult for the user to locate specific entries.
- a user may be required to periodically sweep through his or her local address book and remove all useless entries—a process that can be wasteful and time consuming.
- the invention addresses these and other problems associated with the prior art by providing apparatus, program products, and methods that implement various intelligent contact management operations to improve the productivity of users of electronic messaging systems and the like.
- intelligent name lookup functionality may be supported to facilitate location of a user from a contact database such as an address book or the like.
- a particular user may be suggested among multiple possible candidates by recognizing that some users may have a greater “affinity” to a particular user than to other users, and thus, may be more likely to be the intended subjects of a name lookup operation. For example, two users that have corresponded with one another in the past may be considered to have a greater affinity than two users that have not. Similarly, two users that work in the same facility or in the same building, or that both have the same type of job, likely have a greater affinity than two users that are located in other facilities or that perform vastly different jobs. By identifying one or more of these characteristics of possible candidates, often a relatively intelligent suggestion may be made as to which of such candidates is the likely lookup target for a particular user.
- Intelligent name lookup consistent with the invention identifies a subset of the users in a contact database that meet a predetermined search criteria. A favored user is selected therefrom based upon a predetermined affinity criteria. Furthermore, a display representation associated with the favored user is displayed. As a result, a user may be presented with a suggested user among the multiple identified users, thereby providing more helpful search results and potentially shortening the time required to locate a particular user stored in the contact database.
- intelligent contact database management functionality may also be supported to facilitate the automated addition of new entries to the contact database for a given user.
- the number of contacts between a first user and a second user are accumulated, and a new entry associated with the second user is added to the contact database associated with the first user in response to the number of contacts between the first and second users exceeding a predetermined threshold. It is anticipated that requiring a threshold to be exceeded prior to automatically adding any entry in a contact database may result in a higher probability that such added entries are meaningful and helpful to a user.
- additional functionality may be supported to facilitate the use of electronic messaging groups.
- automated addressing of electronic messages may be provided, whereby, in response to a first user addressing an electronic message to a second user, a determination is made whether the second user is a member of an electronic messaging group that defines a plurality of member users. If the second user is a member of the electronic messaging group, the electronic message is addressed to at least one additional member user in the electronic messaging group.
- additional functionality may be supported to facilitate the management of electronic messaging groups.
- the automated creation of electronic messaging groups may be provided, whereby an electronic message is addressed to a plurality of recipient users in response to user input, and a new electronic messaging group is automatically created including the plurality of recipient users.
- the automated updating of electronic messaging groups may be provided, whereby an electronic message is addressed to an electronic messaging group including a plurality of member users in response to user input, an address list for the electronic message is selectively updated in response to user input, and the electronic messaging group is selectively updated based upon the updates to the address list.
- FIG. 1 is a block diagram of a computer system consistent with the invention.
- FIG. 2 is a block diagram of an exemplary hardware and software environment consistent with the invention.
- FIG. 3 is a block diagram illustrating the primary software components in an electronic messaging system consistent with the invention.
- FIG. 4 is a block diagram of a contact database entry from one of the contact databases in FIG. 3.
- FIG. 5 is a block diagram of a contact table from one of the contact databases in FIG. 3.
- FIG. 6 is a flowchart illustrating the program flow of a main routine executed by a mail application in one of the client computers of FIG. 3.
- FIG. 7 is a flowchart illustrating the program flow of the partial name lookup routine of FIG. 6.
- FIG. 8 is a block diagram illustrating an exemplary multiple entry display representation of a favored entry consistent with the invention.
- FIG. 9 is a block diagram illustrating an exemplary single entry display representation of a favored entry consistent with the invention.
- FIG. 10 is a flowchart illustrating the program flow of the update contact routine of FIG. 7.
- FIG. 11 is a flowchart illustrating the program flow of the send/receive message routine of FIG. 6.
- FIG. 12 is a flowchart illustrating the program flow of the auto-add entry routine of FIG. 10.
- FIG. 13 is a flowchart illustrating the program flow of the compose message routine of FIG. 6.
- FIG. 14 is a flowchart illustrating the program flow of the auto-address routine of FIG. 13.
- FIG. 15 is a block diagram of a group found dialog box used by the auto-address routine of FIG. 14.
- FIG. 16 is a flowchart illustrating the program flow of the maintain groups routine of FIG. 11.
- FIG. 17 is a flowchart illustrating the program flow of a process dialog box routine for the group found dialog box of FIG. 15.
- FIG. 18 is a flowchart illustrating the program flow of a monitor location contacts routine executed by a messaging manager in one of the servers of FIG. 3.
- FIG. 1 illustrates a computer system 10 consistent with the invention.
- Computer system 10 is illustrated as a networked computer system including one or more client computers 12 , 13 , 14 and 20 (e.g., desktop or PC-based computers, workstations, etc.) coupled to one or more servers 16 , 17 (e.g., PC-based servers, minicomputers, midrange computers, mainframe computers, etc.) through a network 18 .
- Network 18 may represent practically any type of networked interconnection, including but not limited to local-area, wide-area, wireless, and public networks (e.g., the Internet), and combinations thereof.
- any number of computers and other electronic devices may be networked through network.
- Client computer 20 which may be similar to computers 12 , 14 , may include a central processing unit (CPU) 21 ; a number of peripheral components such as a computer display 22 ; a storage device 23 ; a printer 24 ; and various input devices (e.g., a mouse 26 and keyboard 27 ), among others.
- Server computers 16 and 17 may be similarly configured, albeit typically with greater processing performance and storage capacity, as is well known in the art.
- FIG. 2 illustrates in another way an exemplary hardware and software environment for an apparatus 30 consistent with the invention.
- apparatus 30 may represent practically any type of computer, computer system or other programmable electronic device, including a client computer (e.g., similar to computers 12 , 13 , 14 and 20 of FIG. 1), a server computer (e.g., similar to servers 16 and 17 of FIG. 1), a portable computer, an embedded controller, etc.
- Apparatus 30 may be coupled in a network as shown in FIG. 1, or may be a stand-alone device in the alternative.
- Apparatus 30 will hereinafter also be referred to as a “computer”, although it should be appreciated the term “apparatus” may also include other suitable programmable electronic devices consistent with the invention.
- Computer 30 typically includes at least one processor 31 coupled to a memory 32 .
- Processor 31 may represent one or more processors (e.g., microprocessors), and memory 32 may represent the random access memory (RAM) devices comprising the main storage of computer 30 , as well as any supplemental levels of memory, e.g., cache memories, non-volatile or backup memories (e.g., programmable or flash memories), read-only memories, etc.
- RAM random access memory
- memory 32 may be considered to include memory storage physically located elsewhere in computer 30 , e.g., any cache memory in a processor 31 , as well as any storage capacity used as a virtual memory, e.g., as stored on a mass storage device 36 or on another computer coupled to computer 30 via network 38 .
- Computer 30 also typically receives a number of inputs and outputs for communicating information externally.
- computer 30 typically includes one or more user input devices 33 (e.g., a keyboard, a mouse, a trackball, a joystick, a touchpad, and/or a microphone, among others) and a display 34 (e.g., a CRT monitor, an LCD display panel, and/or a speaker, among others).
- user input devices 33 e.g., a keyboard, a mouse, a trackball, a joystick, a touchpad, and/or a microphone, among others
- a display 34 e.g., a CRT monitor, an LCD display panel, and/or a speaker, among others.
- direct user input and output may not be supported by the computer.
- computer 30 may also include one or more mass storage devices 36 , e.g., a floppy or other removable disk drive, a hard disk drive, a direct access storage device (DASD), an optical drive (e.g., a CD drive, a DVD drive, etc.), and/or a tape drive, among others.
- mass storage devices 36 e.g., a floppy or other removable disk drive, a hard disk drive, a direct access storage device (DASD), an optical drive (e.g., a CD drive, a DVD drive, etc.), and/or a tape drive, among others.
- computer 30 may include an interface with one or more networks 38 (e.g., a LAN, a WAN, a wireless network, and/or the Internet, among others) to permit the communication of information with other computers coupled to the network.
- networks 38 e.g., a LAN, a WAN, a wireless network, and/or the Internet, among others
- computer 30 typically includes suitable analog and/or
- Computer 30 operates under the control of an operating system 40 , and executes various computer software applications, components, programs, objects, modules, etc. (e.g., communication application 42 and contact database 44 , among others). Moreover, various applications, components, programs, objects, modules, etc. may also execute on one or more processors in another computer coupled to computer 30 via a network 38 , e.g., in a distributed or client-server computing environment, whereby the processing required to implement the functions of a computer program may be allocated to multiple computers over a network.
- various computer software applications, components, programs, objects, modules, etc. e.g., communication application 42 and contact database 44 , among others.
- various applications, components, programs, objects, modules, etc. may also execute on one or more processors in another computer coupled to computer 30 via a network 38 , e.g., in a distributed or client-server computing environment, whereby the processing required to implement the functions of a computer program may be allocated to multiple computers over a network.
- routines executed to implement the embodiments of the invention whether implemented as part of an operating system or a specific application, component, program, object, module or sequence of instructions will be referred to herein as “computer programs”, or simply “programs”.
- the computer programs typically comprise one or more instructions that are resident at various times in various memory and storage devices in a computer, and that, when read and executed by one or more processors in a computer, cause that computer to perform the steps necessary to execute steps or elements embodying the various aspects of the invention.
- signal bearing media include but are not limited to recordable type media such as volatile and non-volatile memory devices, floppy and other removable disks, hard disk drives, optical disks (e.g., CD-ROM's, DVD's, etc.), among others, and transmission type media such as digital and analog communication links.
- FIGS. 1 and 2 are not intended to limit the present invention. Indeed, those skilled in the art will recognize that other alternative hardware and/or software environments may be used without departing from the scope of the invention.
- Electronic messaging system 50 is distributed over one or more servers (e.g., servers 51 , 52 ) and one or more clients (e.g., 54 , 56 and 58 coupled to server 51 , and clients 60 and 62 coupled to server 52 ).
- Server 51 includes a messaging manager application 64 coupled to a master contact database 66 .
- the messaging manager application may be any form of server-based electronic messaging application, e.g., a mail or groupware server, among others.
- master contact database 66 may be any form of database that maintains records of users of the electronic messaging system, e.g., a global address book or the like.
- server 52 may include a messaging manager application 68 and a master contact database 70 .
- databases 66 , 70 contain the same information, and may be synchronized with one another to insure consistent information for applications 64 , 68 .
- only one master copy of the contact database may be utilized in one of servers 51 , 52 with the other server accessing the common master database as necessary.
- Servers 51 , 52 are coupled over a logical connection.
- the servers may be disposed within the same facility and coupled via a local area network (LAN), or may disposed at different facilities or other locations and coupled via a logical connection such as a wide area network (WAN) or the Internet.
- LAN local area network
- WAN wide area network
- Each client 54 - 62 is typically coupled to one or both of servers 51 , 52 through a suitable logical connection (e.g., over a LAN, a WAN or the Internet). It should be appreciated, however, that the logical connections illustrated in FIG. 3 are merely exemplary, as different numbers and/or arrangements of clients and servers may be present in an electronic messaging system consistent with the invention.
- each client typically includes a mail application 74 , a local contact database 76 and a contact table 78 .
- the mail application may typically be any suitable messaging client for interfacing with the messaging manager applications in servers 51 , 52 .
- mail application 74 may be any known Internet-based email client. In the alternative, the electronic messaging system may rely on another standard or on a proprietary protocol.
- Local contact database 76 in client 54 is typically a personal address book or other database that permits the user to maintain local records of other users of interest to that client.
- the local contact database includes a subset of the records of the master contact database, although if external messaging is supported to other users outside of the electronic messaging system (e.g., to other users over the Internet), the local contact database may also include other records that are not found in the master contact database.
- Each client also includes a contact table 78 that stores a record of the number of “contacts” between the user of the client (also referred to herein as the “local user”) and other users in the electronic messaging system.
- the contact table maintains such information so that a contact affinity for different users may be readily obtained for use in various intelligent contact management functions.
- user entry 80 from one of the contact databases in electronic messaging system 50 is illustrated in greater detail in FIG. 4.
- user entry 80 includes a plurality of fields within which is maintained various information about the user. For example, a “name” field stores the user name for the user represented by entry 80 , and an “address” field maintains the address of the user on the electronic messaging system.
- Additional information about a user may also be maintained in entry 80 , e.g., the user's office address, phone number, fax number, etc.
- entry 80 e.g., the user's office address, phone number, fax number, etc.
- location and functions may be defined that are useful in determining the location and functional affinity of different users in the electronic messaging system.
- the location affinity between two users may be based upon a number of factors that define the relatedness of two particular users.
- a location identifier may include one or more of a facility identifier, a building identifier, a telephone number, an address, a zip code, a floor, a mail station, a network, a distance and a network domain, among others. Only one location identifier may be used to determine the location affinity between a pair of users, or in the alternative, multiple factors may be used in determining the location affinity between users.
- Functional affinity which may be used to determine the relation between users based upon non-location information, may include a number of function identifiers, including department, job title, job family, shift, supervisor, and combinations thereof, among others. Function identifiers may also include key words that a user might use to identify himself or herself to other users on the system.
- location and/or function identifiers may either be based on existing fields in a user entry that are relied upon in a contact database, or may be specifically input by a particular user to customize such an entry. For example, in a local database copy of a particular user entry, the owner of the local contact database may desire to input additional information about a particular user so that user is favored for certain types of intelligent contact management functions. Other alternatives will be apparent to one of ordinary skill in the art.
- Each user entry may also include a group flag 81 that indicates whether the entry is for a group, rather than an individual user.
- flag 81 is discussed in greater detail with reference to FIG. 14.
- Each user entry 80 also typically includes a “groups” pointer that points to a linked list of electronic messaging groups associated with that user.
- a linked list of group records 82 may be defined, with each group record 82 including a next pointer 84 that points to the next group 82 in the linked list.
- Each group record 82 also includes a pointer to a group header including a priority field 86 and a members pointer 88 .
- the priority field 86 may be used to store a relative priority for the group that is updated based upon the usage of each group so that one group that a particular user is a member of may be favored relative to other groups when a particular user is required to select among a plurality of such groups.
- the members pointer 88 points to a linked list of member records 90 , each of which includes an identification of a member user, any additional information about that particular member, and a next pointer 91 that points to the next member record 90 in the group.
- each client also maintains a contact table 78 that includes a plurality of table entries 92 for different users for which correspondence or other contacts have been made with the local user for a given client.
- Each entry includes a name field 94 that identifies a user, as well as a count field 96 and function field 98 .
- the count field 96 maintains records of the number of contacts with the particular user represented by name field 94 .
- the location and function identifiers field 98 includes a list of the relevant location and/or function identifiers for a particular user.
- Field 98 typically maintains copies of such information from the user entries in the local contact database to facilitate lookup of location and/or functional affinity; however, it will be appreciated that field 98 may be omitted, whereby a determination of location or functional affinity may be based upon a search of user entries in a contact database. It should also be appreciated that alternate data structures may be utilized to maintain contact information in the alternative (e.g., maintaining contact information within each user entry, among others).
- routines for a mail application 74 are illustrated in greater detail in FIG. 6.
- the routine is an event-based routine that retrieves events at block 100 , determines at blocks 102 , 104 and 106 whether the retrieved event corresponds to any of several events relative to an understanding of the invention, and if no such events are found, passes control to block 108 to handle other mail events conventionally handled by a mail application but which are not relevant to an understanding of the invention.
- other models e.g., procedural-based models, may be used in the alternative.
- Block 102 detects a “lookup name” event, and in response, diverts control to a perform partial name lookup routine 110 .
- a “lookup name” event may be initiated, for example, in response to a user's request to retrieve a user's name from a local or global contact database.
- routine 110 may also be initiated during composition of an electronic message, among other instances.
- send/receive message Another event, a “send/receive message” event, is detected in block 104 and handled by a send/receive message routine 112 .
- This event is generally initiated in response to a user request to send any pending messages in a user's out box and retrieve from the server any messages sent by other users to that particular user.
- Yet another event is a “compose message” event, which is detected by block 106 and handled by a compose message routine 114 .
- the “compose message” event is generated in response to a user's desire to compose a new message to another user.
- Different variations of composing a message may be utilized, e.g., replying to another message, forwarding a message, or drafting a new message, among others.
- Routines 110 , 112 and 114 may be configured to perform several intelligent management functions consistent with the invention, as will become more apparent below.
- a first intelligent management function is that of intelligent name lookup, where a favored user may be located from a contact database based upon a predetermined affinity criteria.
- a second intelligent contact management function that may be supported is that of the automated addition of new entries to a contact database based upon the number of contacts between users.
- a third intelligent contact management function is that of automated addressing of electronic messages based upon user participation within electronic messaging groups.
- a fourth intelligent contact management function is that of the creation and/or maintenance of electronic messaging groups.
- Intelligent name lookup consistent with the invention is typically implemented in a search routine, such as perform partial name lookup routine 110 of FIG. 7.
- a predetermined search criteria is utilized to select a subset of users from a contact database. Then, rather than organizing the search results based upon alphabetical ordering, one or more of the users in the subset are favored relative to others based upon a predetermined affinity criteria so that users having a greater affinity to the local user are highlighted relative to other users.
- the search is performed on the basis of partial name lookup, whereby search results are retrieved as a user inputs the characters that form the predetermined search criteria, rather than requiring the user to type in a plurality of characters and then initiate the search.
- search results are retrieved as a user inputs the characters that form the predetermined search criteria, rather than requiring the user to type in a plurality of characters and then initiate the search.
- the principles of the invention also may be applied to other types of search algorithms in the alternative.
- Routine 110 begins in block 120 clearing a search criteria defined for the local user.
- the system waits for additional input from a user, e.g., depression of a character or other key.
- additional input e.g., depression of a character or other key.
- block 124 it is determined whether the additional input indicates that the displayed name should be accepted, e.g., by a user depressing the “ENTER” key or depressing a toolbar button or other user interface control on a display. If the additional input is not a request to accept the displayed name, block 124 passes control to block 125 to update the search criteria based upon the additional user input. For example, if the user has depressed a character key, that character is appended to the search criteria.
- block 126 builds a list of all entries that match the search criteria from the local contact database for the local user. It should be appreciated that searching a database based upon a search criteria is well known in the art, and thus, need not be discussed in greater detail herein.
- block 128 it is determined whether the list of entries built from the local contact database is empty. If so, a search is performed in the global contact database in block 130 to build a list of entries therefrom matching the search criteria.
- block 132 if the list is still empty, control returns to block 122 to wait for additional input from the user.
- Determining an affinity rank for each entry in the list is performed using a predetermined affinity criteria, which may be based on one or more factors. For example, as discussed above, an affinity criteria may be based upon one or more location and/or function identifiers. In addition to, or in the alternative to, the use of function and/or location identifiers, the determined affinity criteria may be based upon the contact affinity between the searching user and the users found in the search.
- affinity is determined based upon the number of contacts between the local user and the users found in the search.
- Contacts are typically monitored during certain operations performed in the electronic messaging system to determine the number of times certain activities occur with respect to a pair of users. Different types of contacts may be monitored, including the number of messages sent by the local user to the other users, the number of messages received from the other users by the local user, and the number of times the local user has searched for other users, among others.
- block 134 is implemented by determining first what the predetermined affinity criteria is for the user.
- the predetermined affinity criteria may be set, for example, through a properties or preferences dialog box, or may not be user configurable. Moreover, only a subset of the affinity criteria discussed herein may be supported in other implementations.
- the selected affinity criteria is based at least in part on functional affinity
- one or more selected function identifiers for the local user are compared with those of the list entries, and a rank is determined for each list entry based upon the relative number of matches therebetween.
- one or more selected location identifiers for the local user are compared with those of the list entries, and a rank is determined for each list entry based upon the relative number of matches therebetween.
- a message may be sent to a messaging manager to request affinity information about different locations to determine the relatedness of such locations based upon communications that occur between all users of such locations. Then, this returned information may also be used in the determination of an affinity rank for different users.
- the count stored in the contact table entry for each list entry is used in determining the affinity rank for each list entry. Moreover, if separate counts are used for different contact types (discussed below), one or more of such counts may be used in determining an affinity rank.
- information from one or more of location identifiers, function identifiers, and numbers of contacts may be combined in a number of manners to generate composite scores that are used in ranking the list entries.
- different factors may be separately scaled to favor certain factors over others.
- a hierarchical ranking process may be used, with ties broken by less important factors (e.g., rank entries by number of contacts, break ties based on facility, break remaining ties based on building, and break remaining ties on job title).
- ties broken by less important factors e.g., rank entries by number of contacts, break ties based on facility, break remaining ties based on building, and break remaining ties on job title.
- various additional known manners of generally ranking different data elements based upon their proximity to another data element may be used in the alternative.
- the “multiple names” option is an optional setting that may be configured by a user to control whether the user receives all the favored entries, or only the most favored entry, among the subset of entries in the list. If the option is enabled, block 140 is executed to display the top N favored entries from the sorted list. If the “multiple names” option is not enabled, block 142 is instead executed to display only the top ranked entry in the list. In either event, upon completion of blocks 140 or 142 , control returns to block 122 to process additional user input. It should also be appreciated that the multiple names setting may not be configurable by a user, so that either multiple names, or a single name, are always presented to a user.
- a multiple entry display representation 154 e.g., a combo box, a list box, a pop-up menu or drop-down menu, among others
- a separate panel may be displayed proximate an edit box, with the panel constantly displaying a portion of the database entries and being continually updated in response to changes to the search criteria.
- a cursor e.g., cursor 156
- the cursor may be manipulated by a user to permit, for example, the user to select other entries in the list to select such alternate entry.
- a single entry display representation such as an edit box 158 or similar user interface control may be used.
- the edit box may be separate from, or more typically, the same control within which a user is inputting a search criteria.
- an “auto-complete” function may also be used to display within edit box 158 the remainder of the favored entry matching that search term (e.g., as illustrated at 159 ). The use of an “auto-complete” function is well known in the art, and thus, need not be discussed in greater detail herein.
- an auto-complete function would add the letters “TH, JOHN” to the search term in the edit box, typically with the additional letters highlighted. Then, a user would be able to accept or reject the proposed user by either depressing the ENTER button to accept or depressing additional character keys to reject and modify the search term.
- Update contact routine 142 is generally used to track contacts between the local user and other users in the electronic messaging system so that the contact affinity therebetween may be determined. As such, one possible contact is that the local user has attempted to retrieve information about a particular user in a name lookup operation. Hence, update contact routine 142 is called in routine 110 in the illustrated embodiment.
- Update contact routine 142 is illustrated in greater detail in FIG. 10.
- Routine 142 is implemented in the illustrated embodiment as a generic routine that receives as input a type of contact, as well as the name of the user with which the contact has been made. In the alternative, different routines for handling different types of contacts may be utilized, rather than a common routine.
- the contact types supported in the illustrated embodiment are a “Send” contact, a “Receive” contact, a “Copy” contact, and a “Search” contact.
- the “Send” contact indicates that a message has been sent from the local user to another user in the electronic messaging system, with the other user indicated to be a primary recipient of the message.
- the “Receive” contact indicates that a message has ben received by the local user from another user in the electronic messaging system.
- the “Copy” contact indicates that the local user has sent a message in which the contacted user has been copied, e.g., by inclusion on a “carbon copy” or “CC” list, and optionally, on a “blind carbon copy”, or “BCC” list.
- the “Search” contact indicates that the local user has search for, and accepted, the contacted user.
- Routine 142 begins in block 144 by determining whether the contact type passed to the routine is enabled. This permits a user to set preferences or properties for the electronic messaging system as to whether or not the user wishes to track different types of contacts. In the alternative, the user may not be permitted the option of selecting one or more contacts, but must accept whichever combination of contacts is presented by the mail application, and thus, block 144 may be omitted in the alternative. Also, it should be appreciated that any number of combinations of contact types, including all or some of those mentioned above, as well as others not explicitly mention, may be monitored in this fashion.
- the count field for the entry corresponding to the user name supplied to the routine is incremented by a scaled value representative of the contact type. For example, it may be determined that a “Send” contact indicates more of an affinity between users than a “Copy” or “Search” contact, whereby the incremental value therefor is greater than that for either of the latter contact types.
- each type of contact may be granted the same relative priority, whereby block 150 may merely increment the count by one whenever any contact occurs.
- separate counts may be maintained for different contact types, rather than being maintained as a composite number.
- an auto-add entry routine 152 is called to determine whether, as a result of the new contact, a new entry for the user name supplied to routine 142 should be automatically added to the local user's contact database. This routine is discussed in greater detail in connection with the automated entry addition feature described hereinafter.
- update contact routine 142 may also be called to track other types of contacts consistent with the invention. Such other types of contacts are typically tracked during send/receive message routine 112 , illustrated in greater detail in FIG. 11.
- Routine 112 which is initiated in response to a user's request to send and/or receive messages, begins in block 160 by connecting with the messaging manager in a manner well known in the art.
- a loop is initiated for processing each message that is pending in the out box for the local user.
- block 162 passes control to block 164 to send the message in a manner well known in the art.
- a maintain groups routine 166 is called to update any electronic messaging groups, in a manner that will be described below in connection with FIG. 16.
- block 168 performs another loop that calls update contact routine 142 for each addressee in the message that was just sent. It should be appreciated that, for each addressee, update contact routine 142 is passed the name of such addressee, as well as whether or not the addressee is a primary recipient or a copied recipient so that the update contact routine may distinguish between “Send” contacts and “Copy” contacts. In the alternative, it may be appreciated that the type of addressee may not be separately tracked, and thus, the “Copy” contact may not be used.
- block 162 passes control to block 170 to receive from the messaging manager all messages pending for the local user, in a manner well known in the art.
- a loop is initiated in block 172 to call the update contact routine 142 for each received message, passing the name of the sender of each received message, as well as the contact type of “Receive”, to routine 142 so that a contact is logged for the sender of each received message.
- block 172 passes control to block 174 to disconnect from the messaging manager, whereby routine 112 is then complete.
- send/Receive message functions may be implemented in other manners consistent with the invention. For example, rather than integrating these functions into the same routine, different routines may be utilized to send and receive messages, respectively. In this instance, the send routine may be appended to a compose routine so that, once a user has completed the composition of a message, that message is automatically sent without any additional user input. Other modifications will become apparent to one of ordinary skill in the art.
- Another intelligent contact management feature that may be implemented consistent with the invention is that of the automated addition of entries to a local contact database. This is typically performed in response to an accumulation of contacts between a pair of users exceeding a predetermined threshold. This feature is implemented in the illustrated embodiment in an auto-add entry routine 152 , which is called upon completion of update contact routine 142 of FIG. 10. Auto-add entry routine 152 is illustrated in greater detail in FIG. 12.
- Auto-add entry routine 152 is passed as input the user name being processed by update contact routine 142 .
- routine 152 may be incorporated into routine 142 , rather than utilizing a separate function.
- routine 152 may be utilized to process all of the entries in the contact table at once and add any entries having count fields that exceed a predetermined threshold. In the latter instance, the routine would typically be called on a periodic basis, rather than directly by routine 142 .
- Routine 152 begins in block 180 by determining whether the count field for the entry in the contact table corresponding to the user name passed to the routine exceeds a predetermined threshold. If it does not, no further processing is required, and routine 152 terminates. If the count field is greater than the threshold, however, control passes to block 182 to determine whether or not the user name passed to the routine has an entry in the local contact database for the local user. If such an entry already exists, no further processing is required, and routine 152 terminates. However, if no such entry exists, control passes to block 184 to add an entry in the local contact database for the user by copying the corresponding entry from the master contact database.
- a new entry may be created in the local contact database with any corresponding fields blanked, thereby enabling the local user to input desired information into the new entry.
- the information pertaining to a particular user is synchronized with that stored in the master contact database.
- routine 152 terminates.
- the predetermined threshold with which the count field for a user is compared may be set to any number of values to control the frequency at which new entries are added to the local database via routine 152 . It will be appreciated that, the higher the threshold, the more contacts are required between any pair of users prior to addition of a new entry to the local contact database. It should be appreciated that the threshold value may be configurable by a user, or may be fixed in the mail application. Moreover, it should also be appreciated that, rather than using a composite count, separate counts may be maintained for different contact types, whereby each count type could be compared to a separate threshold, and an entry created if any one count exceeded its corresponding threshold. Other alternatives will become apparent to one of ordinary skill in the art.
- Yet another intelligent contact management feature that may be implemented consistent with the invention is that of the automated addressing of electronic messages.
- a determination may be made as to whether the addressee user is a member of an electronic messaging group. If so, the message may be addressed to at least one additional member user in that group.
- Automated addressing of electronic messages may be implemented in the illustrated embodiment in a compose message routine 114 , which is illustrated in greater detail in FIG. 13.
- the routine begins by calling perform partial name lookup routine 110 to retrieve one or more addressees for the message.
- block 190 is called to determine whether the auto-address is enabled, indicating that a user has configured the mail application to permit additional users in groups to which a particular addressee is a member to be automatically added to the addressee list for the message. It should be appreciated that the use of auto-addressing may be mandatory in other embodiments, and as such, block 190 may be omitted if desired.
- an auto-address routine 192 is called. Next, the message is edited and composed in block 194 , and the message is placed in an out box in block 196 , prior to terminating routine 114 . Returning to block 190 , if auto-addressing is not enabled, control passes directly to block 194 , thereby bypassing the function call to routine 192 .
- routine 114 generally follows the flow by which a user addresses and composes an electronic message.
- routine 114 the various operations performed in routine 114 are typically performed in most mail applications using subroutines tied to different user controls on a dialog box.
- function calls to perform partial name lookup routine 110 are typically performed in response to a user inputting addressee information into one or more edit boxes representing the addressee list for the message.
- Multiple edit boxes may be provided for different classes of recipients, e.g., primary recipients (e.g., a “TO:” list), copy recipients (e.g., in a carbon copy or cc list), and/or blind recipients (e.g., in a blind carbon copy or bcc list).
- primary recipients e.g., a “TO:” list
- copy recipients e.g., in a carbon copy or cc list
- blind recipients e.g., in a blind carbon copy or bcc list.
- the editing and composition of a message is typically tied to one or more editing windows that are open for a given message, with a multitude of editing functions being supported. During this attachments may also be added to a message, and various non-textual data may be attached or inserted into a message, e.g., image data, audio data, video data, etc.
- the placing of a message in an out box is typically performed in response to a user depressing a “Send” or “Save” toolbar button, or an appropriate selection in a menu.
- routine 114 assumes that a single user is retrieved and processed as the addressee for the composed message. However, often multiple addressees may be manually input by a user, and as such, it should be appreciated that name lookup and auto-addressing routines 110 and 192 may be executed to retrieve and perform auto-addressing for each recipient user input by a local user. Moreover, it should be appreciated that additional functionality may be supported to coordinate the addressing of members of multiple groups to eliminate any duplicate user names from the address list for a message.
- Auto-address routine 192 is illustrated in greater detail in FIG. 14. Routine 192 receives as input the accepted name for which it is desirable to determine whether additional addressees should be added based upon the group membership thereof.
- Routine 192 begins in block 200 by determining whether the accepted name has an entry therefor in the local contact database. If not, no further processing is required, and routine 192 terminates. If, however, the accepted name does have an entry in the local contact database, control passes to block 202 to determine whether the accepted name is a primary addressee for the message. If not, routine 192 terminates. In the alternative, it should be appreciated that auto-addressing may be enabled for all types of addressees for a given message, and thus, block 202 may be omitted.
- the “auto-group add” option may be optionally set by a user in the preferences or properties of the mail application to determine whether or not the mail application asks the user to accept or reject the members of a group prior to addressing the message for those additional users.
- priority e.g., by accessing the priority fields 86 for each group 82 (FIG. 4).
- each group has a priority that is incremented every time the group is utilized by a user, so that the messaging groups utilized more frequently by a particular local user will be prioritized relative to other less-frequently used groups.
- block 212 is executed to determine whether the “multiple names” option is enabled. Similar to block 138 in FIG. 7, block 212 may be omitted if such an option is not configurable by a user. If the “multiple names” option is enabled, control passes to block 214 to display a sorted group list and allow a user to select one or more of the groups in the list. If only one group is in the list, block 214 may also be bypassed in the alternative. Next, block 216 adds the users from the selected groups as carbon copies to the address list for the message if such users do not have their group flags set, otherwise, any users with group flags set therefor are added as primary recipients. Processing of routine 192 is then complete.
- block 220 is executed to add those selected names as either carbon copies or primary recipients for the message, based upon the group flags thereof. Processing of routine 192 is then complete.
- One suitable implementation of a group found dialog box is illustrated at 230 in FIG. 15. It should be appreciated that if multiple groups are present in the group list, multiple dialog boxes may be displayed in sequence, or in the alternative, a composite list of all the members of the groups for which the addressee is a member may be combined in the same dialog box.
- Dialog box 230 includes a text message 232 that indicates the group that a particular addressee is a member of. For example, as shown in FIG. 15, if an addressee is “Smith, John” and that user is a member of the “Java Team” group with “Doe, Jane” and “Public, John Q.”, the text message would indicate as such, and alert the user that the user has the option of addressing the message to the other members of the group.
- Dialog box 230 also includes a display representation 234 of a list of the additional members of a group that the addressee is a member of.
- display representation 234 includes a pair of check boxes 236 , 238 , which permit a user to accept or reject each of the additional members through user manipulation thereof.
- Control button 240 is an “OK” button that accepts only the additional members specified via the appropriate check boxes, and closes the dialog box.
- Control button 242 is an “Accept All” button that accepts all additional members as addressees for the message, and control button 244 is a “Reject All” button that rejects all additional members, essentially over-riding the auto-address feature.
- Control buttons 246 and 248 permit automated maintenance of the group, and are discussed separately below in connection with FIG. 17.
- Yet another intelligent contact management feature that may be implemented consistent with the invention is that of the automated maintenance of electronic messaging groups.
- electronic messaging groups may be created and/or updated based upon the addressing of an electronic message created by a local user.
- the automated creation of new electronic messaging groups may be implemented in the illustrated embodiment in part in send/receive message routine 112 by calling a maintain groups routine 166 after each message is sent by the mail application.
- maintain groups routine 166 is illustrated in greater detail in FIG. 16.
- Routine 166 begins in block 250 by building a message group from the list of addressees for the message that was just sent. Then, in block 251 , a FOR loop is initiated to process each addressee in the message. For each such addressee, block 252 is executed to determine whether an entry for the addressee exists in the local contact database. If not, control returns to block 251 to process the next addressee for the message.
- FIG. 17 illustrates one implementation of a process group found dialog routine 260 that handles user input for group found dialog box 230 of FIG. 15.
- routine 260 generally operates by waiting for events in block 262 , and then processing those events as with a conventional event-driven model.
- One relevant event is a “save group” event, which is detected at block 264 , and is typically initiated as a result of user depression of “save group” control button 246 (FIG. 15).
- the save group event is processed in block 266 by updating the local contact database entry to replace the previous copy of the group being processed with the selected names in the dialog box. For example, depression of control button 246 with dialog box 230 in the configuration shown in FIG. 15 would result in the “Java Team” group being updated to include only members “Smith, John” and “Doe, Jane.” Once the group is updated, control is returned to block 262 . It will be appreciated that, as a component of such an operation, it may also be desirable to prompt the user to permit the user to decline to update the group if he or she so desires.
- another relevant event is a “save as” event, which is detected at block 268 , and which is typically initiated in response to depression of “save as” control button 248 (FIG. 15).
- the save as event is processed by block 270 and 272 , prior to returning control to block 262 .
- the user is prompted for the name of the new group to add to the local contact database.
- an entry is added for the new group, with the group flag set for the entry to indicate the entry as being for a group rather than an individual user.
- buttons 274 , 278 and 282 Other events, discussed above with reference to automated message addressing, are detected in blocks 274 , 278 and 282 .
- Depression of OK button 240 (FIG. 15) is detected by block 274 , resulting in the selected user names being returned from the dialog box, as well as closing of the dialog box, via block 276 (discussed above with reference to FIG. 15).
- Depression of accept all button 242 (FIG. 15) is detected by block 278 , resulting in all the user names in the group being returned from the dialog box, as well as closing of the dialog box, via block 280 (also discussed above with reference to FIG. 15).
- block 282 is detected by block 282 , resulting in none of the user names in the group being returned from the dialog box, as well as closing of the dialog box, via block 284 (also discussed above with reference to FIG. 15).
- Other events are detected and handled in block 286 , which then returns control to block 262 to wait for additional events.
- electronic message groups may be treated in a similar manner to other addressees, with contact to and from those groups and a local user being monitored for contact affinity.
- a message group could be added to a group list for a local user only after a contact affinity with the group exceeded a predetermined threshold.
- users may be permitted to utilize multiple address books or other contact databases, and to use such address books selectively or in a composite fashion with the various features described herein.
- a user may use separate address books to represent different categories of users, e.g., as pertaining to different jobs that the local user may have. Additional synchronization between such multiple contact databases may also be required.
- one additional feature that may be implemented in an embodiment consistent with the invention is that of determining the relatedness of different locations, and using such relatedness in the determination of a location affinity between two users located at different locations.
- the locations may be defined by any number of criteria, e.g., domain, network, facility, office, floor, etc.
- location monitoring is performed by each messaging manager in an electronic messaging system, and thus, the location is based upon the particular server, e.g., network or domain, to which the different users connect.
- a monitor location contacts routine 300 may be executed by each messaging manager (e.g., messaging managers 64 , 68 of FIG. 3) in an electronic messaging system to maintain location relation information.
- Routine 300 may be executed as a monitoring thread that executes periodically or continuously and updates location affinities for different locations related to a local location for a given messaging manager.
- the location affinities may be stored, for example, in an affinities table similar in arrangement to the contact table of FIG. 5, with a plurality of entries therein representing each location to which the local location for the messaging manager may be connected. Each entry may include a count that indicates the relative number of messages sent between all users of a local location and another location in the electronic messaging system.
- Routine 300 detects several events.
- a first event which is detected by block 302 of routine 300 , is generated in response to a message being sent from the local location for the messaging manager to another location in the electronic messaging system.
- control is passed to block 304 to determine the destination location(s) for each addressee of the message—an operation that is often integral with the actual dispatching of a message to its recipients.
- the affinity for each destination location for the sent message is updated, e.g., by incrementing the count stored in the table entry corresponding to each destination location, and control then returns to block 302 to detect other events. It should be appreciated that, as with update contact routine 142 , it may be necessary in block 306 to add a new entry for a destination location in the affinities table if no such entry already exists.
- a second event which is detected by block 308 of routine 300 , is generated in response to a message being sent to (received by) the local location from another location in the electronic messaging system.
- control is passed to block 310 to determine the source location for the originator of the message, and then to block 312 to update the affinity for the source location in the affinity table (including adding a new entry if no such entry exists).
- Control then returns to block 302 . It should be appreciated that, as with different contact types, it may be desirable to relatively scale the updates to the affinities for locations based upon whether messages were sent to or sent from a local location. Moreover, separate counts may be maintained in the alternative.
- a third event which is detected by block 314 , is a retrieve affinities event generated by a mail application as a component of determining the affinities between different users.
- an ordered list of the affinities for all monitored locations is returned, whereby the mail application can determine the relatedness of two locations.
- This information may be considered by the mail application (e.g., during the determination of affinity ranks for retrieved search results during partial name lookup) so that, all other factors being equal, users in more related locations may be favored more than users in other locations.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- General Business, Economics & Management (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Operations Research (AREA)
- Marketing (AREA)
- Economics (AREA)
- Computer Hardware Design (AREA)
- Computational Linguistics (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Apparatus, program products, and methods implement various intelligent contact management operations to improve the productivity of users of electronic messaging systems and the like. To perform an intelligent name lookup, for example, a subset of the users in a contact database that meet a predetermined search criteria is identified, and a favored user is selected therefrom based upon a predetermined affinity criteria. Also, the automated addition of new entries to a contact database is supported by accumulating the number of contacts between a first user and a second user, with a new entry associated with the second user added to the contact database associated with the first user in response to the number of contacts between the first and second users exceeding a predetermined threshold. The automated addressing of electronic messages is also supported by determining, in response to a first user addressing an electronic message to a second user, whether the second user is a member of an electronic messaging group that defines a plurality of member users, and if so, to address the electronic message to at least one additional member user in the electronic messaging group. The automated creation of electronic messaging groups is also supported by addressing an electronic message to a plurality of recipient users in response to user input, and automatically creating a new electronic messaging group including the plurality of recipient users. Furthermore, the automated updating of electronic messaging groups is supported by addressing an electronic message to an electronic messaging group including a plurality of member users in response to user input, selectively updating an address list for the electronic message in response to user input, and selectively updating the electronic messaging group based upon the updates to the address list.
Description
- This application is a divisional application of U.S. patent application Ser. No. 09/096,243, filed Jun. 11, 1998 by Cary Lee Bates et al. and entitled “Apparatus, Program Products and Methods Utilizing Intelligent Contact Management,” which is incorporated by reference herein.
- The invention is generally related to computers and computer software. More specifically, the invention is related to contact management in electronic messaging systems and the like.
- Electronic messaging has dramatically changed the manner in which people communicate with one another in the digital age. Electronic messaging systems, for example, permit users on different computers to communicate with one another by transmitting information such as text messages and the like between the different computers. Electronic messaging is often used to permit employees in a company to communicate with other employees connected to the company's internal network, regardless of whether they are in the same or another company facility. Also, due to the explosive growth of the Internet, electronic messaging has now become a relatively common way for anyone with a computer to communicate with other computer users all over the world.
- In most electronic messaging systems, users are assigned user identifiers, or “user id's” that uniquely identify each user. Furthermore, each user is typically assigned one or more “mailboxes,” (also referred to as “post office boxes”) that have a unique address so that any user wishing to send an electronic message (often referred to as an “e-mail”) to another user can do so by addressing the electronic message to the mailbox assigned to that user.
- Many electronic messaging systems furthermore keep electronic “address books,” which typically include contact databases within which are stored records of the mailbox addresses for different users. Therefore, for example, a user wishing to send an electronic message to a user named John Smith, whose mailbox address is “smithj@xyz.com”, is then able to search through an address book to find an entry for “Smith, John”, rather than having to remember a relatively cryptic mailbox address that is assigned to that user.
- Some address books also store additional information about users, such as telephone numbers, mailing addresses, job titles, and other information that is more or less unrelated to electronic messaging. Moreover, such address books have also been integrated with other personal information management (PIM) tools such as electronic calendars, to-do lists, project planners, and meeting scheduling tools. One type of electronic messaging system, known as “groupware”, tightly integrates all of these functions together to enable users that work together to collaborate more effectively with one another.
- An address book is often referred to as a “contact manager,” as a user is capable of using an address book to maintain a wide variety of information about many different people (referred to in this context as “contacts”). As the use of electronic messaging has become more widespread, many computer users send and receive more electronic messages to and from a larger number of other computer users. Contact management therefore becomes more important for these users so that they can accurately keep track of other users with whom they correspond.
- Particularly in many groupware systems, a global or master address book is maintained on a central computer for shared access by all users of such a system. A global address book typically includes information about all users of the system, and may include hundreds or thousands of records for larger organizations.
- Any individual user often may also keep a local address book that contains only the users with which that user regularly corresponds. However, whenever that user wishes to correspond with another user that is not in his or her local address book, the user often must search through the global address book to find the mailbox address for the other user (a process referred to as “name lookup”), which can be relatively time consuming in a large global address book that is shared by many users.
- Some systems also permit a process known as “partial” name lookup to permit a search to be performed concurrently with a user typing in the name of a user to locate in an address book. Often, the partial name lookup processes searches first for matching entries in a user's local address book, and if none are found, searches for matching entries in a global address book. For example, as a user types in the name “Smith, John”, a partial name lookup process would retrieve all address book entries that start with a user name “s” after the user typed the letter “s”, then retrieve only the address book entries that start with the user name “sm” after the user typed the letter “m”, etc. Eventually, the user would be left with a relatively manageable list of entries to select from as the intended recipient of an electronic message.
- Particularly with large global address books, partial name lookup can be somewhat time consuming, so it is often desirable to locate a desired recipient with a minimum number of input characters. However, one problem associated with the search processes for conventional address books is that such processes typically order search results alphabetically. Therefore, for example, if a user is attempting to locate the entry for “Smith, John” in an address book that contains entries for users such as “Smith, Aaron”, “Smith, Betty”, “Smith, Fred”, “Smith, John”, “Smith, Joseph”, and “Smith, Stephanie”, a user typing in the letters “smith” would be presented with an alphabetically-arranged list of these users.
- The searching user may have worked with John Smith many times before, and may have never even met any of the other users. Or, for example, the searching user and John Smith may be located in the same office building, or may both be engineers, while the other users are located in other facilities or are managers, assembly line workers, lawyers, etc. Nonetheless, the searching user still receives an alphabetical list, and he or she must scan down through the list of users before selecting the desired entry. Conventional electronic messaging systems lack any capability to suggest any particular entry from a list of search results on any basis other than alphabetically.
- Some electronic messaging systems also provide the ability to automatically add an entry to a user's local address book in response to receiving an electronic message from another user. However, many users receive literally hundreds of electronic messages a day, with many coming from other users that a particular user has no intention of ever corresponding with again. Creating an entry for each and every user that sends a message can significantly clutter up a user's local address book and make it more difficult for the user to locate specific entries. Moreover, a user may be required to periodically sweep through his or her local address book and remove all useless entries—a process that can be wasteful and time consuming.
- Many electronic messaging systems further permit users to be grouped together into “groups” that can be separately named and utilized to send electronic messages to multiple users at once. However, management of groups can become somewhat burdensome, as a user is typically required to manually create the groups by locating and adding each desired user to the groups. Furthermore, unless the user can remember the particular name assigned to a group, the user must either perform a search for the group or manually address an electronic message to each member of the group individually. These additional steps often distract a user and consume additional time, thereby decreasing a user's productivity.
- It should therefore be appreciated that the contact management capabilities of many conventional electronic messaging systems are significantly limited and can often have a negative impact on user productivity. Therefore, a significant need has arisen for a manner of improving electronic messaging systems to provide for more intelligent and useful contact management.
- The invention addresses these and other problems associated with the prior art by providing apparatus, program products, and methods that implement various intelligent contact management operations to improve the productivity of users of electronic messaging systems and the like.
- Consistent with one aspect of the invention, intelligent name lookup functionality may be supported to facilitate location of a user from a contact database such as an address book or the like. In particular, a particular user may be suggested among multiple possible candidates by recognizing that some users may have a greater “affinity” to a particular user than to other users, and thus, may be more likely to be the intended subjects of a name lookup operation. For example, two users that have corresponded with one another in the past may be considered to have a greater affinity than two users that have not. Similarly, two users that work in the same facility or in the same building, or that both have the same type of job, likely have a greater affinity than two users that are located in other facilities or that perform vastly different jobs. By identifying one or more of these characteristics of possible candidates, often a relatively intelligent suggestion may be made as to which of such candidates is the likely lookup target for a particular user.
- Intelligent name lookup consistent with the invention identifies a subset of the users in a contact database that meet a predetermined search criteria. A favored user is selected therefrom based upon a predetermined affinity criteria. Furthermore, a display representation associated with the favored user is displayed. As a result, a user may be presented with a suggested user among the multiple identified users, thereby providing more helpful search results and potentially shortening the time required to locate a particular user stored in the contact database.
- Consistent with another aspect of the invention, intelligent contact database management functionality may also be supported to facilitate the automated addition of new entries to the contact database for a given user. In particular, consistent with the invention the number of contacts between a first user and a second user are accumulated, and a new entry associated with the second user is added to the contact database associated with the first user in response to the number of contacts between the first and second users exceeding a predetermined threshold. It is anticipated that requiring a threshold to be exceeded prior to automatically adding any entry in a contact database may result in a higher probability that such added entries are meaningful and helpful to a user.
- Consistent with another aspect of the invention, additional functionality may be supported to facilitate the use of electronic messaging groups. In particular, automated addressing of electronic messages may be provided, whereby, in response to a first user addressing an electronic message to a second user, a determination is made whether the second user is a member of an electronic messaging group that defines a plurality of member users. If the second user is a member of the electronic messaging group, the electronic message is addressed to at least one additional member user in the electronic messaging group.
- Consistent with a further aspect of the invention, additional functionality may be supported to facilitate the management of electronic messaging groups. In particular, the automated creation of electronic messaging groups may be provided, whereby an electronic message is addressed to a plurality of recipient users in response to user input, and a new electronic messaging group is automatically created including the plurality of recipient users. Also, the automated updating of electronic messaging groups may be provided, whereby an electronic message is addressed to an electronic messaging group including a plurality of member users in response to user input, an address list for the electronic message is selectively updated in response to user input, and the electronic messaging group is selectively updated based upon the updates to the address list.
- These and other advantages and features, which characterize the invention, are set forth in the claims annexed hereto and forming a further part hereof. However, for a better understanding of the invention, and of the advantages and objectives attained through its use, reference should be made to the Drawings, and to the accompanying descriptive matter, in which there is described exemplary embodiments of the invention.
- FIG. 1 is a block diagram of a computer system consistent with the invention.
- FIG. 2 is a block diagram of an exemplary hardware and software environment consistent with the invention.
- FIG. 3 is a block diagram illustrating the primary software components in an electronic messaging system consistent with the invention.
- FIG. 4 is a block diagram of a contact database entry from one of the contact databases in FIG. 3.
- FIG. 5 is a block diagram of a contact table from one of the contact databases in FIG. 3.
- FIG. 6 is a flowchart illustrating the program flow of a main routine executed by a mail application in one of the client computers of FIG. 3.
- FIG. 7 is a flowchart illustrating the program flow of the partial name lookup routine of FIG. 6.
- FIG. 8 is a block diagram illustrating an exemplary multiple entry display representation of a favored entry consistent with the invention.
- FIG. 9 is a block diagram illustrating an exemplary single entry display representation of a favored entry consistent with the invention.
- FIG. 10 is a flowchart illustrating the program flow of the update contact routine of FIG. 7.
- FIG. 11 is a flowchart illustrating the program flow of the send/receive message routine of FIG. 6.
- FIG. 12 is a flowchart illustrating the program flow of the auto-add entry routine of FIG. 10.
- FIG. 13 is a flowchart illustrating the program flow of the compose message routine of FIG. 6.
- FIG. 14 is a flowchart illustrating the program flow of the auto-address routine of FIG. 13.
- FIG. 15 is a block diagram of a group found dialog box used by the auto-address routine of FIG. 14.
- FIG. 16 is a flowchart illustrating the program flow of the maintain groups routine of FIG. 11.
- FIG. 17 is a flowchart illustrating the program flow of a process dialog box routine for the group found dialog box of FIG. 15.
- FIG. 18 is a flowchart illustrating the program flow of a monitor location contacts routine executed by a messaging manager in one of the servers of FIG. 3.
- Turning to the Drawings, wherein like numbers denote like parts throughout the several views, FIG. 1 illustrates a
computer system 10 consistent with the invention.Computer system 10 is illustrated as a networked computer system including one ormore client computers more servers 16, 17 (e.g., PC-based servers, minicomputers, midrange computers, mainframe computers, etc.) through anetwork 18.Network 18 may represent practically any type of networked interconnection, including but not limited to local-area, wide-area, wireless, and public networks (e.g., the Internet), and combinations thereof. Moreover, any number of computers and other electronic devices may be networked through network. -
Client computer 20, which may be similar tocomputers computer display 22; astorage device 23; aprinter 24; and various input devices (e.g., amouse 26 and keyboard 27), among others.Server computers - FIG. 2 illustrates in another way an exemplary hardware and software environment for an
apparatus 30 consistent with the invention. For the purposes of the invention,apparatus 30 may represent practically any type of computer, computer system or other programmable electronic device, including a client computer (e.g., similar tocomputers servers Apparatus 30 may be coupled in a network as shown in FIG. 1, or may be a stand-alone device in the alternative.Apparatus 30 will hereinafter also be referred to as a “computer”, although it should be appreciated the term “apparatus” may also include other suitable programmable electronic devices consistent with the invention. -
Computer 30 typically includes at least oneprocessor 31 coupled to amemory 32.Processor 31 may represent one or more processors (e.g., microprocessors), andmemory 32 may represent the random access memory (RAM) devices comprising the main storage ofcomputer 30, as well as any supplemental levels of memory, e.g., cache memories, non-volatile or backup memories (e.g., programmable or flash memories), read-only memories, etc. In addition,memory 32 may be considered to include memory storage physically located elsewhere incomputer 30, e.g., any cache memory in aprocessor 31, as well as any storage capacity used as a virtual memory, e.g., as stored on amass storage device 36 or on another computer coupled tocomputer 30 vianetwork 38. -
Computer 30 also typically receives a number of inputs and outputs for communicating information externally. For interface with a user or operator,computer 30 typically includes one or more user input devices 33 (e.g., a keyboard, a mouse, a trackball, a joystick, a touchpad, and/or a microphone, among others) and a display 34 (e.g., a CRT monitor, an LCD display panel, and/or a speaker, among others). It should be appreciated, however, that with some implementations ofcomputer 30, e.g., some server implementations, direct user input and output may not be supported by the computer. - For additional storage,
computer 30 may also include one or moremass storage devices 36, e.g., a floppy or other removable disk drive, a hard disk drive, a direct access storage device (DASD), an optical drive (e.g., a CD drive, a DVD drive, etc.), and/or a tape drive, among others. Furthermore,computer 30 may include an interface with one or more networks 38 (e.g., a LAN, a WAN, a wireless network, and/or the Internet, among others) to permit the communication of information with other computers coupled to the network. It should be appreciated thatcomputer 30 typically includes suitable analog and/or digital interfaces betweenprocessor 31 and each ofcomponents -
Computer 30 operates under the control of anoperating system 40, and executes various computer software applications, components, programs, objects, modules, etc. (e.g.,communication application 42 andcontact database 44, among others). Moreover, various applications, components, programs, objects, modules, etc. may also execute on one or more processors in another computer coupled tocomputer 30 via anetwork 38, e.g., in a distributed or client-server computing environment, whereby the processing required to implement the functions of a computer program may be allocated to multiple computers over a network. - In general, the routines executed to implement the embodiments of the invention, whether implemented as part of an operating system or a specific application, component, program, object, module or sequence of instructions will be referred to herein as “computer programs”, or simply “programs”. The computer programs typically comprise one or more instructions that are resident at various times in various memory and storage devices in a computer, and that, when read and executed by one or more processors in a computer, cause that computer to perform the steps necessary to execute steps or elements embodying the various aspects of the invention. Moreover, while the invention has and hereinafter will be described in the context of fully functioning computers and computer systems, those skilled in the art will appreciate that the various embodiments of the invention are capable of being distributed as a program product in a variety of forms, and that the invention applies equally regardless of the particular type of signal bearing media used to actually carry out the distribution. Examples of signal bearing media include but are not limited to recordable type media such as volatile and non-volatile memory devices, floppy and other removable disks, hard disk drives, optical disks (e.g., CD-ROM's, DVD's, etc.), among others, and transmission type media such as digital and analog communication links.
- In addition, various programs described hereinafter may be identified based upon the application for which they are implemented in a specific embodiment of the invention. However, it should be appreciated that any particular program nomenclature that follows is used merely for convenience, and thus the invention should not be limited to use solely in any specific application identified and/or implied by such nomenclature.
- Those skilled in the art will recognize that the exemplary environments illustrated in FIGS. 1 and 2 are not intended to limit the present invention. Indeed, those skilled in the art will recognize that other alternative hardware and/or software environments may be used without departing from the scope of the invention.
- As discussed above, the various embodiments of the invention implement several intelligent contact management features to improve the performance and usability of an electronic messaging system. One typical arrangement of an electronic
messaging system implementation 50 is illustrated in greater detail in FIG. 3.Electronic messaging system 50 is distributed over one or more servers (e.g.,servers 51, 52) and one or more clients (e.g., 54, 56 and 58 coupled toserver 51, andclients Server 51 includes amessaging manager application 64 coupled to amaster contact database 66. The messaging manager application may be any form of server-based electronic messaging application, e.g., a mail or groupware server, among others. Moreover,master contact database 66 may be any form of database that maintains records of users of the electronic messaging system, e.g., a global address book or the like. Similarly,server 52 may include amessaging manager application 68 and amaster contact database 70. It should be appreciated that typicallydatabases applications servers -
Servers - Each client54-62 is typically coupled to one or both of
servers client 54, each client typically includes amail application 74, alocal contact database 76 and a contact table 78. The mail application may typically be any suitable messaging client for interfacing with the messaging manager applications inservers mail application 74 may be any known Internet-based email client. In the alternative, the electronic messaging system may rely on another standard or on a proprietary protocol. -
Local contact database 76 inclient 54 is typically a personal address book or other database that permits the user to maintain local records of other users of interest to that client. Typically, the local contact database includes a subset of the records of the master contact database, although if external messaging is supported to other users outside of the electronic messaging system (e.g., to other users over the Internet), the local contact database may also include other records that are not found in the master contact database. - Each client also includes a contact table78 that stores a record of the number of “contacts” between the user of the client (also referred to herein as the “local user”) and other users in the electronic messaging system. For reasons that will become more apparent below, the contact table maintains such information so that a contact affinity for different users may be readily obtained for use in various intelligent contact management functions.
- An
exemplary user entry 80 from one of the contact databases inelectronic messaging system 50 is illustrated in greater detail in FIG. 4. Generally,user entry 80 includes a plurality of fields within which is maintained various information about the user. For example, a “name” field stores the user name for the user represented byentry 80, and an “address” field maintains the address of the user on the electronic messaging system. - Additional information about a user may also be maintained in
entry 80, e.g., the user's office address, phone number, fax number, etc. Among this information, several “location” and “function” identifiers may be defined that are useful in determining the location and functional affinity of different users in the electronic messaging system. - The location affinity between two users may be based upon a number of factors that define the relatedness of two particular users. For example, a location identifier may include one or more of a facility identifier, a building identifier, a telephone number, an address, a zip code, a floor, a mail station, a network, a distance and a network domain, among others. Only one location identifier may be used to determine the location affinity between a pair of users, or in the alternative, multiple factors may be used in determining the location affinity between users. Moreover, when multiple location identifiers are used, it may be desirable to scale or prioritize different location identifiers relative to others to favor certain identifiers relative to others. Furthermore, as discussed in greater detail below with reference to FIG. 18, it may be desirable to track the contacts between different locations to determine whether two identifiers are related in some fashion other than being an exact match. For example, if a work group is distributed at multiple facilities, those facilities, while having different identifiers, may be related to one another for the purpose of intelligent contact management.
- Functional affinity, which may be used to determine the relation between users based upon non-location information, may include a number of function identifiers, including department, job title, job family, shift, supervisor, and combinations thereof, among others. Function identifiers may also include key words that a user might use to identify himself or herself to other users on the system.
- It should also be appreciated that location and/or function identifiers may either be based on existing fields in a user entry that are relied upon in a contact database, or may be specifically input by a particular user to customize such an entry. For example, in a local database copy of a particular user entry, the owner of the local contact database may desire to input additional information about a particular user so that user is favored for certain types of intelligent contact management functions. Other alternatives will be apparent to one of ordinary skill in the art.
- Each user entry may also include a
group flag 81 that indicates whether the entry is for a group, rather than an individual user. The use offlag 81 is discussed in greater detail with reference to FIG. 14. - Each
user entry 80 also typically includes a “groups” pointer that points to a linked list of electronic messaging groups associated with that user. A linked list of group records 82, for example, may be defined, with eachgroup record 82 including anext pointer 84 that points to thenext group 82 in the linked list. Eachgroup record 82 also includes a pointer to a group header including apriority field 86 and amembers pointer 88. Thepriority field 86 may be used to store a relative priority for the group that is updated based upon the usage of each group so that one group that a particular user is a member of may be favored relative to other groups when a particular user is required to select among a plurality of such groups. Themembers pointer 88 points to a linked list ofmember records 90, each of which includes an identification of a member user, any additional information about that particular member, and anext pointer 91 that points to thenext member record 90 in the group. - It should be appreciated that other data structures may be utilized to store user entry and/or group information consistent with the invention. For example, public and/or private groups may be accessible via the master and/or local contact databases. Separate group lists may be maintained for each user entry, or each user entry may share common groups via the pointers in group records82, for example. Other modifications will be readily apparent to one of ordinary skill in the art.
- As shown in FIG. 5, each client also maintains a contact table78 that includes a plurality of
table entries 92 for different users for which correspondence or other contacts have been made with the local user for a given client. Each entry includes aname field 94 that identifies a user, as well as acount field 96 andfunction field 98. Thecount field 96 maintains records of the number of contacts with the particular user represented byname field 94. The location andfunction identifiers field 98 includes a list of the relevant location and/or function identifiers for a particular user.Field 98 typically maintains copies of such information from the user entries in the local contact database to facilitate lookup of location and/or functional affinity; however, it will be appreciated thatfield 98 may be omitted, whereby a determination of location or functional affinity may be based upon a search of user entries in a contact database. It should also be appreciated that alternate data structures may be utilized to maintain contact information in the alternative (e.g., maintaining contact information within each user entry, among others). - The operation of a main routine for a
mail application 74 is illustrated in greater detail in FIG. 6. Generally, the routine is an event-based routine that retrieves events atblock 100, determines atblocks - Three events that are relevant to an understanding of the intelligent contact management functions consistent with the invention are detected respectively in
blocks Block 102 detects a “lookup name” event, and in response, diverts control to a perform partialname lookup routine 110. A “lookup name” event may be initiated, for example, in response to a user's request to retrieve a user's name from a local or global contact database. In addition, as will be discussed in greater detail below, routine 110 may also be initiated during composition of an electronic message, among other instances. - Another event, a “send/receive message” event, is detected in
block 104 and handled by a send/receivemessage routine 112. This event is generally initiated in response to a user request to send any pending messages in a user's out box and retrieve from the server any messages sent by other users to that particular user. - Yet another event is a “compose message” event, which is detected by
block 106 and handled by a composemessage routine 114. The “compose message” event is generated in response to a user's desire to compose a new message to another user. Different variations of composing a message may be utilized, e.g., replying to another message, forwarding a message, or drafting a new message, among others. -
Routines - Each of the above-described intelligent contact management functions may be utilized separately or in conjunction with one or more of other such functions. Therefore, the invention should not be limited to the particular combination of functions described herein. Each intelligent management contact function will now be described separately herein.
- Intelligent Name Lookup
- Intelligent name lookup consistent with the invention is typically implemented in a search routine, such as perform partial
name lookup routine 110 of FIG. 7. With intelligent name lookup, a predetermined search criteria is utilized to select a subset of users from a contact database. Then, rather than organizing the search results based upon alphabetical ordering, one or more of the users in the subset are favored relative to others based upon a predetermined affinity criteria so that users having a greater affinity to the local user are highlighted relative to other users. - In addition, in the implementation illustrated herein, the search is performed on the basis of partial name lookup, whereby search results are retrieved as a user inputs the characters that form the predetermined search criteria, rather than requiring the user to type in a plurality of characters and then initiate the search. However, it should be appreciated that the principles of the invention also may be applied to other types of search algorithms in the alternative.
-
Routine 110 begins inblock 120 clearing a search criteria defined for the local user. Next, inblock 122, the system waits for additional input from a user, e.g., depression of a character or other key. Next, inblock 124, it is determined whether the additional input indicates that the displayed name should be accepted, e.g., by a user depressing the “ENTER” key or depressing a toolbar button or other user interface control on a display. If the additional input is not a request to accept the displayed name, block 124 passes control to block 125 to update the search criteria based upon the additional user input. For example, if the user has depressed a character key, that character is appended to the search criteria. In the alternative, the user may perform other editing operations on the search criteria, e.g., by depressing the backspace key, highlighting a portion using a mouse pointer, etc., or by other mechanisms by which updates of the search criteria may be made. Next, block 126 builds a list of all entries that match the search criteria from the local contact database for the local user. It should be appreciated that searching a database based upon a search criteria is well known in the art, and thus, need not be discussed in greater detail herein. - Next, in
block 128, it is determined whether the list of entries built from the local contact database is empty. If so, a search is performed in the global contact database inblock 130 to build a list of entries therefrom matching the search criteria. Next, inblock 132, if the list is still empty, control returns to block 122 to wait for additional input from the user. - If either blocks128 or 132 determine that the list is not empty, control passes to block 134 to determine the affinity rank for each entry in the list based upon the selected affinity criteria for the searching user.
- Determining an affinity rank for each entry in the list is performed using a predetermined affinity criteria, which may be based on one or more factors. For example, as discussed above, an affinity criteria may be based upon one or more location and/or function identifiers. In addition to, or in the alternative to, the use of function and/or location identifiers, the determined affinity criteria may be based upon the contact affinity between the searching user and the users found in the search.
- In this latter instance, affinity is determined based upon the number of contacts between the local user and the users found in the search. Contacts are typically monitored during certain operations performed in the electronic messaging system to determine the number of times certain activities occur with respect to a pair of users. Different types of contacts may be monitored, including the number of messages sent by the local user to the other users, the number of messages received from the other users by the local user, and the number of times the local user has searched for other users, among others.
- Typically, block134 is implemented by determining first what the predetermined affinity criteria is for the user. The predetermined affinity criteria may be set, for example, through a properties or preferences dialog box, or may not be user configurable. Moreover, only a subset of the affinity criteria discussed herein may be supported in other implementations.
- If the selected affinity criteria is based at least in part on functional affinity, one or more selected function identifiers for the local user are compared with those of the list entries, and a rank is determined for each list entry based upon the relative number of matches therebetween. Similarly, if the selected affinity criteria is based at least in part on location affinity, one or more selected location identifiers for the local user are compared with those of the list entries, and a rank is determined for each list entry based upon the relative number of matches therebetween. Also at this time, as discussed below in connection with FIG. 18, a message may be sent to a messaging manager to request affinity information about different locations to determine the relatedness of such locations based upon communications that occur between all users of such locations. Then, this returned information may also be used in the determination of an affinity rank for different users.
- If the selected affinity criteria is based at least in part on contact affinity, the count stored in the contact table entry for each list entry is used in determining the affinity rank for each list entry. Moreover, if separate counts are used for different contact types (discussed below), one or more of such counts may be used in determining an affinity rank.
- It should be appreciated that information from one or more of location identifiers, function identifiers, and numbers of contacts may be combined in a number of manners to generate composite scores that are used in ranking the list entries. Moreover, different factors may be separately scaled to favor certain factors over others. In the alternative, a hierarchical ranking process may be used, with ties broken by less important factors (e.g., rank entries by number of contacts, break ties based on facility, break remaining ties based on building, and break remaining ties on job title). It should be appreciated that various additional known manners of generally ranking different data elements based upon their proximity to another data element may be used in the alternative.
- Once the affinity ranks for the list entries are determined, control passes from
block 134 to block 136 to sort the list according to the affinity rank for each entry in the list. Then, based upon whether a “multiple names” option is enabled, block 138 passes control to eitherblocks - The “multiple names” option is an optional setting that may be configured by a user to control whether the user receives all the favored entries, or only the most favored entry, among the subset of entries in the list. If the option is enabled, block140 is executed to display the top N favored entries from the sorted list. If the “multiple names” option is not enabled, block 142 is instead executed to display only the top ranked entry in the list. In either event, upon completion of
blocks - Any number of user interface mechanisms may be utilized to display one or more entries from the list consistent with the invention. For example, as shown in FIG. 8, to display multiple list entries, a multiple entry display representation154 (e.g., a combo box, a list box, a pop-up menu or drop-down menu, among others) may be displayed proximate an
edit box 155 or other user interface control within which the search criteria is being input by a user. In the alternative, a separate panel may be displayed proximate an edit box, with the panel constantly displaying a portion of the database entries and being continually updated in response to changes to the search criteria. In either instance, a cursor (e.g., cursor 156) may highlight the most favored entry in the list. The cursor may be manipulated by a user to permit, for example, the user to select other entries in the list to select such alternate entry. - As shown in FIG. 9, to display only the most favored entry, a single entry display representation such as an
edit box 158 or similar user interface control may be used. The edit box may be separate from, or more typically, the same control within which a user is inputting a search criteria. In addition, an “auto-complete” function may also be used to display withinedit box 158 the remainder of the favored entry matching that search term (e.g., as illustrated at 159). The use of an “auto-complete” function is well known in the art, and thus, need not be discussed in greater detail herein. For example, if a user were to type in the letters “SMI” in an edit box, and the most favored entry was “Smith, John,” an auto-complete function would add the letters “TH, JOHN” to the search term in the edit box, typically with the additional letters highlighted. Then, a user would be able to accept or reject the proposed user by either depressing the ENTER button to accept or depressing additional character keys to reject and modify the search term. - It should be appreciated that other user interface mechanisms known in the art may be utilized to display and/or highlight the favored entry relative to other entries retrieved from a search.
- Now returning to block124, once it is determined that a user has accepted the displayed name, control is passed to an
update contact routine 142, prior to terminating and returning the accepted name as the result of the routine.Update contact routine 142 is generally used to track contacts between the local user and other users in the electronic messaging system so that the contact affinity therebetween may be determined. As such, one possible contact is that the local user has attempted to retrieve information about a particular user in a name lookup operation. Hence,update contact routine 142 is called in routine 110 in the illustrated embodiment. -
Update contact routine 142 is illustrated in greater detail in FIG. 10.Routine 142 is implemented in the illustrated embodiment as a generic routine that receives as input a type of contact, as well as the name of the user with which the contact has been made. In the alternative, different routines for handling different types of contacts may be utilized, rather than a common routine. - The contact types supported in the illustrated embodiment are a “Send” contact, a “Receive” contact, a “Copy” contact, and a “Search” contact. The “Send” contact indicates that a message has been sent from the local user to another user in the electronic messaging system, with the other user indicated to be a primary recipient of the message. The “Receive” contact indicates that a message has ben received by the local user from another user in the electronic messaging system. The “Copy” contact indicates that the local user has sent a message in which the contacted user has been copied, e.g., by inclusion on a “carbon copy” or “CC” list, and optionally, on a “blind carbon copy”, or “BCC” list. Finally, the “Search” contact indicates that the local user has search for, and accepted, the contacted user.
-
Routine 142 begins inblock 144 by determining whether the contact type passed to the routine is enabled. This permits a user to set preferences or properties for the electronic messaging system as to whether or not the user wishes to track different types of contacts. In the alternative, the user may not be permitted the option of selecting one or more contacts, but must accept whichever combination of contacts is presented by the mail application, and thus, block 144 may be omitted in the alternative. Also, it should be appreciated that any number of combinations of contact types, including all or some of those mentioned above, as well as others not explicitly mention, may be monitored in this fashion. - If the contact type passed to the routine is enabled, control passes to block146 to determine whether an entry exists in the contact table for the user name supplied to the routine. If no entries exist in the contact table for the name, an entry is added to the contact table in
block 148, and control then passes to block 150. Returning to block 146, if an entry already exists in the contact table, block 148 is bypassed and control passes directly to block 150. - In
block 150, the count field for the entry corresponding to the user name supplied to the routine is incremented by a scaled value representative of the contact type. For example, it may be determined that a “Send” contact indicates more of an affinity between users than a “Copy” or “Search” contact, whereby the incremental value therefor is greater than that for either of the latter contact types. In the alternative, each type of contact may be granted the same relative priority, whereby block 150 may merely increment the count by one whenever any contact occurs. As another alternative, separate counts may be maintained for different contact types, rather than being maintained as a composite number. - Next, an auto-add
entry routine 152 is called to determine whether, as a result of the new contact, a new entry for the user name supplied to routine 142 should be automatically added to the local user's contact database. This routine is discussed in greater detail in connection with the automated entry addition feature described hereinafter. - As discussed above,
update contact routine 142 may also be called to track other types of contacts consistent with the invention. Such other types of contacts are typically tracked during send/receive message routine 112, illustrated in greater detail in FIG. 11.Routine 112, which is initiated in response to a user's request to send and/or receive messages, begins inblock 160 by connecting with the messaging manager in a manner well known in the art. Next, inblock 162, a loop is initiated for processing each message that is pending in the out box for the local user. For each such message, block 162 passes control to block 164 to send the message in a manner well known in the art. Next, a maintain groups routine 166 is called to update any electronic messaging groups, in a manner that will be described below in connection with FIG. 16. - Next, block168 performs another loop that calls
update contact routine 142 for each addressee in the message that was just sent. It should be appreciated that, for each addressee,update contact routine 142 is passed the name of such addressee, as well as whether or not the addressee is a primary recipient or a copied recipient so that the update contact routine may distinguish between “Send” contacts and “Copy” contacts. In the alternative, it may be appreciated that the type of addressee may not be separately tracked, and thus, the “Copy” contact may not be used. - Returning to block168, once the contacts for each addressee in the message have been processed, control is returned to block 162 to process each additional message in the out box. Once each message has been processed, block 162 passes control to block 170 to receive from the messaging manager all messages pending for the local user, in a manner well known in the art. Next, a loop is initiated in
block 172 to call theupdate contact routine 142 for each received message, passing the name of the sender of each received message, as well as the contact type of “Receive”, to routine 142 so that a contact is logged for the sender of each received message. Once each received message has been processed, block 172 then passes control to block 174 to disconnect from the messaging manager, whereby routine 112 is then complete. - It should be appreciated that the “Send/Receive” message functions may be implemented in other manners consistent with the invention. For example, rather than integrating these functions into the same routine, different routines may be utilized to send and receive messages, respectively. In this instance, the send routine may be appended to a compose routine so that, once a user has completed the composition of a message, that message is automatically sent without any additional user input. Other modifications will become apparent to one of ordinary skill in the art.
- Automated Addition of Entries to a Local Contact Database
- As discussed above, another intelligent contact management feature that may be implemented consistent with the invention is that of the automated addition of entries to a local contact database. This is typically performed in response to an accumulation of contacts between a pair of users exceeding a predetermined threshold. This feature is implemented in the illustrated embodiment in an auto-add
entry routine 152, which is called upon completion ofupdate contact routine 142 of FIG. 10. Auto-addentry routine 152 is illustrated in greater detail in FIG. 12. - Auto-add
entry routine 152 is passed as input the user name being processed byupdate contact routine 142. In the alternative, routine 152 may be incorporated intoroutine 142, rather than utilizing a separate function. Moreover, as another alternative, routine 152 may be utilized to process all of the entries in the contact table at once and add any entries having count fields that exceed a predetermined threshold. In the latter instance, the routine would typically be called on a periodic basis, rather than directly byroutine 142. -
Routine 152 begins inblock 180 by determining whether the count field for the entry in the contact table corresponding to the user name passed to the routine exceeds a predetermined threshold. If it does not, no further processing is required, and routine 152 terminates. If the count field is greater than the threshold, however, control passes to block 182 to determine whether or not the user name passed to the routine has an entry in the local contact database for the local user. If such an entry already exists, no further processing is required, and routine 152 terminates. However, if no such entry exists, control passes to block 184 to add an entry in the local contact database for the user by copying the corresponding entry from the master contact database. In the alternative, a new entry may be created in the local contact database with any corresponding fields blanked, thereby enabling the local user to input desired information into the new entry. However, by copying the existing information from the master contact database, the information pertaining to a particular user is synchronized with that stored in the master contact database. - After an entry is created in the local database, processing is complete, and routine152 terminates.
- The predetermined threshold with which the count field for a user is compared may be set to any number of values to control the frequency at which new entries are added to the local database via
routine 152. It will be appreciated that, the higher the threshold, the more contacts are required between any pair of users prior to addition of a new entry to the local contact database. It should be appreciated that the threshold value may be configurable by a user, or may be fixed in the mail application. Moreover, it should also be appreciated that, rather than using a composite count, separate counts may be maintained for different contact types, whereby each count type could be compared to a separate threshold, and an entry created if any one count exceeded its corresponding threshold. Other alternatives will become apparent to one of ordinary skill in the art. - Automated Addressing of Electronic Messages
- Yet another intelligent contact management feature that may be implemented consistent with the invention is that of the automated addressing of electronic messages. With this feature, in response to the local user addressing an electronic message to a particular user, a determination may be made as to whether the addressee user is a member of an electronic messaging group. If so, the message may be addressed to at least one additional member user in that group.
- Automated addressing of electronic messages may be implemented in the illustrated embodiment in a compose message routine114, which is illustrated in greater detail in FIG. 13. The routine begins by calling perform partial
name lookup routine 110 to retrieve one or more addressees for the message. Next, block 190 is called to determine whether the auto-address is enabled, indicating that a user has configured the mail application to permit additional users in groups to which a particular addressee is a member to be automatically added to the addressee list for the message. It should be appreciated that the use of auto-addressing may be mandatory in other embodiments, and as such, block 190 may be omitted if desired. - If auto-addressing is enabled, an auto-
address routine 192 is called. Next, the message is edited and composed inblock 194, and the message is placed in an out box inblock 196, prior to terminating routine 114. Returning to block 190, if auto-addressing is not enabled, control passes directly to block 194, thereby bypassing the function call to routine 192. - It should be appreciated that the implementation illustrated in FIG. 13 for
routine 114 generally follows the flow by which a user addresses and composes an electronic message. However, it should be appreciated that the various operations performed inroutine 114 are typically performed in most mail applications using subroutines tied to different user controls on a dialog box. For example, function calls to perform partialname lookup routine 110 are typically performed in response to a user inputting addressee information into one or more edit boxes representing the addressee list for the message. Multiple edit boxes may be provided for different classes of recipients, e.g., primary recipients (e.g., a “TO:” list), copy recipients (e.g., in a carbon copy or cc list), and/or blind recipients (e.g., in a blind carbon copy or bcc list). - Moreover, the editing and composition of a message is typically tied to one or more editing windows that are open for a given message, with a multitude of editing functions being supported. During this attachments may also be added to a message, and various non-textual data may be attached or inserted into a message, e.g., image data, audio data, video data, etc.
- In addition, the placing of a message in an out box is typically performed in response to a user depressing a “Send” or “Save” toolbar button, or an appropriate selection in a menu.
- Thus, in a typical message composition process, a sequential flow similar to that of routine114 will not be followed directly, but will be performed separately by different routines that implement the same basic functionality. The invention should therefore not be limited to the exemplary implementation illustrated in FIG. 13. Moreover, it should also be appreciated that routine 114 assumes that a single user is retrieved and processed as the addressee for the composed message. However, often multiple addressees may be manually input by a user, and as such, it should be appreciated that name lookup and auto-addressing
routines - Auto-
address routine 192 is illustrated in greater detail in FIG. 14.Routine 192 receives as input the accepted name for which it is desirable to determine whether additional addressees should be added based upon the group membership thereof. -
Routine 192 begins inblock 200 by determining whether the accepted name has an entry therefor in the local contact database. If not, no further processing is required, and routine 192 terminates. If, however, the accepted name does have an entry in the local contact database, control passes to block 202 to determine whether the accepted name is a primary addressee for the message. If not, routine 192 terminates. In the alternative, it should be appreciated that auto-addressing may be enabled for all types of addressees for a given message, and thus, block 202 may be omitted. - If the accepted name is a primary addressee, control passes to block204 to retrieve a list of groups for the accepted name. This is typically performed by accessing the group list in the local contact database for the accepted name, then tracing through the linked list of groups to retrieve an identifier for each group. It should be appreciated that if no such facility is provided within each entry in the local contact database, block 204 may be implemented by searching through a list of groups for the local user to determine the membership of the accepted name therein.
- Upon completion of
block 204, control passes to block 206 to determine whether the group list built inblock 204 is empty. If so, no further processing is required, and routine 192 terminates. If, however, the group list is not empty, control passes to block 208 to determine whether an “auto-group add” option has been enabled by a user. - The “auto-group add” option may be optionally set by a user in the preferences or properties of the mail application to determine whether or not the mail application asks the user to accept or reject the members of a group prior to addressing the message for those additional users.
- First, assuming the option is enabled, control passes to block210 to sort the group list based upon priority, e.g., by accessing the priority fields 86 for each group 82 (FIG. 4). As will be discussed below with reference to FIG. 16, each group has a priority that is incremented every time the group is utilized by a user, so that the messaging groups utilized more frequently by a particular local user will be prioritized relative to other less-frequently used groups.
- Next, block212 is executed to determine whether the “multiple names” option is enabled. Similar to block 138 in FIG. 7, block 212 may be omitted if such an option is not configurable by a user. If the “multiple names” option is enabled, control passes to block 214 to display a sorted group list and allow a user to select one or more of the groups in the list. If only one group is in the list, block 214 may also be bypassed in the alternative. Next, block 216 adds the users from the selected groups as carbon copies to the address list for the message if such users do not have their group flags set, otherwise, any users with group flags set therefor are added as primary recipients. Processing of
routine 192 is then complete. - Returning to block212, if the “multiple names” option is not enabled, control passes instead to block 218 to add each user from the highest priority group as either a carbon copy (if the group flag therefore is not set) or a primary recipient (if the group flag therefor is set and the group name is specified as a primary recipient), whereby processing of
routine 192 is complete. - Returning to block208, if the “auto-group add” option is not enabled, control passes instead to block 220 to display a group found dialog box for each group, which permits a user to build a list of accepted names from the membership of each group to which the addressee belongs. In response to user selection of one or more of the names, block 220 is executed to add those selected names as either carbon copies or primary recipients for the message, based upon the group flags thereof. Processing of
routine 192 is then complete. - The program flows of blocks214-216, 218, and 220-222 represent three alternative manners of automatically addressing a message based upon membership of an addressee in an electronic messaging group. It should be appreciated that any of these alternatives may be utilized alone or in combination with the others. Moreover, it should be appreciated that, when multiple groups are processed, it may be desirable to check the automated addressing for earlier groups during processing of later groups so that duplicate addressees are not created. Therefore, the invention should not be limited to the particular embodiment disclosed herein.
- One suitable implementation of a group found dialog box is illustrated at230 in FIG. 15. It should be appreciated that if multiple groups are present in the group list, multiple dialog boxes may be displayed in sequence, or in the alternative, a composite list of all the members of the groups for which the addressee is a member may be combined in the same dialog box.
-
Dialog box 230 includes atext message 232 that indicates the group that a particular addressee is a member of. For example, as shown in FIG. 15, if an addressee is “Smith, John” and that user is a member of the “Java Team” group with “Doe, Jane” and “Public, John Q.”, the text message would indicate as such, and alert the user that the user has the option of addressing the message to the other members of the group. -
Dialog box 230 also includes adisplay representation 234 of a list of the additional members of a group that the addressee is a member of. For example, for the “Java Team” group, the additional users are “Doe, Jane” and “Public, John Q.”, and as such,display representation 234 includes a pair ofcheck boxes - A number of
control buttons Control button 240 is an “OK” button that accepts only the additional members specified via the appropriate check boxes, and closes the dialog box.Control button 242 is an “Accept All” button that accepts all additional members as addressees for the message, andcontrol button 244 is a “Reject All” button that rejects all additional members, essentially over-riding the auto-address feature.Control buttons - It should be appreciated that other user input mechanisms may be used to perform automated addressing in the manner described herein. Therefore, the invention should not be limited to the particular implementation described herein.
- Automated Maintenance of Electronic Messaging Groups
- Yet another intelligent contact management feature that may be implemented consistent with the invention is that of the automated maintenance of electronic messaging groups. In particular, electronic messaging groups may be created and/or updated based upon the addressing of an electronic message created by a local user.
- The automated creation of new electronic messaging groups may be implemented in the illustrated embodiment in part in send/receive message routine112 by calling a maintain groups routine 166 after each message is sent by the mail application. One suitable implementation of maintain groups routine 166 is illustrated in greater detail in FIG. 16.
Routine 166 begins inblock 250 by building a message group from the list of addressees for the message that was just sent. Then, inblock 251, a FOR loop is initiated to process each addressee in the message. For each such addressee, block 252 is executed to determine whether an entry for the addressee exists in the local contact database. If not, control returns to block 251 to process the next addressee for the message. If, however, such an entry exists, control passes to block 254 to determine whether the message group is already present in the group list for the addressee, e.g., by proceeding through the linked list of groups in the entry in the local contact database. If the message group does not already exist, a new message group is automatically added to the group list inblock 256. In addition, at this time it may or may not be desirable to prompt the user to input a group name so that the user may access the group at a later date. Control then returns to block 251 to process additional addressees in the message. - Returning to block254, if the message group is already present in the group list for the addressee, control passes to block 258 to increment the priority value for the group, indicating an additional usage thereof, and prioritizing the group relative to other less-frequently used groups. Control then returns to block 251. Once each addressee in the message has been processed, block 251 terminates routine 166.
- Automated updating of an existing electronic messaging group may be supported, for example, as a component of the automated addressing operation described above, among other possible implementations. For example, FIG. 17 illustrates one implementation of a process group found
dialog routine 260 that handles user input for group founddialog box 230 of FIG. 15. As shown in FIG. 17, routine 260 generally operates by waiting for events inblock 262, and then processing those events as with a conventional event-driven model. - One relevant event is a “save group” event, which is detected at
block 264, and is typically initiated as a result of user depression of “save group” control button 246 (FIG. 15). The save group event is processed inblock 266 by updating the local contact database entry to replace the previous copy of the group being processed with the selected names in the dialog box. For example, depression ofcontrol button 246 withdialog box 230 in the configuration shown in FIG. 15 would result in the “Java Team” group being updated to include only members “Smith, John” and “Doe, Jane.” Once the group is updated, control is returned to block 262. It will be appreciated that, as a component of such an operation, it may also be desirable to prompt the user to permit the user to decline to update the group if he or she so desires. - Returning to FIG. 17, another relevant event is a “save as” event, which is detected at
block 268, and which is typically initiated in response to depression of “save as” control button 248 (FIG. 15). The save as event is processed byblock block 270, the user is prompted for the name of the new group to add to the local contact database. Then, inblock 272 an entry is added for the new group, with the group flag set for the entry to indicate the entry as being for a group rather than an individual user. - Other events, discussed above with reference to automated message addressing, are detected in
blocks block 274, resulting in the selected user names being returned from the dialog box, as well as closing of the dialog box, via block 276 (discussed above with reference to FIG. 15). Depression of accept all button 242 (FIG. 15) is detected byblock 278, resulting in all the user names in the group being returned from the dialog box, as well as closing of the dialog box, via block 280 (also discussed above with reference to FIG. 15). Depression of reject all button 244 (FIG. 15) is detected byblock 282, resulting in none of the user names in the group being returned from the dialog box, as well as closing of the dialog box, via block 284 (also discussed above with reference to FIG. 15). Other events, not relevant to the invention, are detected and handled inblock 286, which then returns control to block 262 to wait for additional events. - Other implementations may be developed to automatically maintain message groups consistent with the invention. Thus, the invention should not be limited to the particular implementation described herein.
- Various modifications may be made to the embodiments described herein without departing from the spirit and scope of the invention. For example, electronic message groups may be treated in a similar manner to other addressees, with contact to and from those groups and a local user being monitored for contact affinity. In such an implementation, a message group could be added to a group list for a local user only after a contact affinity with the group exceeded a predetermined threshold.
- In addition, in other embodiments users may be permitted to utilize multiple address books or other contact databases, and to use such address books selectively or in a composite fashion with the various features described herein. For example, a user may use separate address books to represent different categories of users, e.g., as pertaining to different jobs that the local user may have. Additional synchronization between such multiple contact databases may also be required.
- As another example, as discussed above, one additional feature that may be implemented in an embodiment consistent with the invention is that of determining the relatedness of different locations, and using such relatedness in the determination of a location affinity between two users located at different locations. To implement such an embodiment, it may be desirable to monitor message traffic between different locations to determine the relatedness of different locations. The locations may be defined by any number of criteria, e.g., domain, network, facility, office, floor, etc. In the illustrated embodiment, location monitoring is performed by each messaging manager in an electronic messaging system, and thus, the location is based upon the particular server, e.g., network or domain, to which the different users connect.
- For example, as shown in FIG. 18, a monitor location contacts routine300 may be executed by each messaging manager (e.g.,
messaging managers Routine 300 may be executed as a monitoring thread that executes periodically or continuously and updates location affinities for different locations related to a local location for a given messaging manager. The location affinities may be stored, for example, in an affinities table similar in arrangement to the contact table of FIG. 5, with a plurality of entries therein representing each location to which the local location for the messaging manager may be connected. Each entry may include a count that indicates the relative number of messages sent between all users of a local location and another location in the electronic messaging system. -
Routine 300 detects several events. A first event, which is detected byblock 302 of routine 300, is generated in response to a message being sent from the local location for the messaging manager to another location in the electronic messaging system. In response to this event, control is passed to block 304 to determine the destination location(s) for each addressee of the message—an operation that is often integral with the actual dispatching of a message to its recipients. Next, inblock 306 the affinity for each destination location for the sent message is updated, e.g., by incrementing the count stored in the table entry corresponding to each destination location, and control then returns to block 302 to detect other events. It should be appreciated that, as withupdate contact routine 142, it may be necessary inblock 306 to add a new entry for a destination location in the affinities table if no such entry already exists. - A second event, which is detected by
block 308 of routine 300, is generated in response to a message being sent to (received by) the local location from another location in the electronic messaging system. In response to this event, control is passed to block 310 to determine the source location for the originator of the message, and then to block 312 to update the affinity for the source location in the affinity table (including adding a new entry if no such entry exists). Control then returns to block 302. It should be appreciated that, as with different contact types, it may be desirable to relatively scale the updates to the affinities for locations based upon whether messages were sent to or sent from a local location. Moreover, separate counts may be maintained in the alternative. - A third event, which is detected by
block 314, is a retrieve affinities event generated by a mail application as a component of determining the affinities between different users. In response to this event, an ordered list of the affinities for all monitored locations is returned, whereby the mail application can determine the relatedness of two locations. This information may be considered by the mail application (e.g., during the determination of affinity ranks for retrieved search results during partial name lookup) so that, all other factors being equal, users in more related locations may be favored more than users in other locations. - Various additional modifications to the embodiments described herein will become apparent to one of ordinary skill in the art. Therefore, the invention lies in the claims hereinafter appended.
Claims (23)
1. A computer-implemented method of locating for a user from a contact database including a plurality of users, the method comprising:
(a) identifying a subset of the plurality of users in the contact database that meet a predetermined search criteria;
(b) selecting a favored user among the subset of users based upon a predetermined affinity criteria; and
(c) displaying a display representation associated with the favored user.
2. The method of , wherein the predetermined search criteria includes a character string search term, and wherein identifying the subset of users that meet the predetermined search criteria includes comparing the character string search term with a character string stored in a predetermined field of an entry in the contact database corresponding to each user.
claim 1
3. The method of , wherein identifying the subset of users that meet the predetermined search criteria is performed during a partial name lookup operation.
claim 2
4. The method of , further comprising, in response to an additional character being appended to the character string search term, updating the predetermined search criteria and narrowing the subset of users to include only users that meet the updated predetermined search criteria.
claim 3
5. The method of , wherein identifying the subset of users is performed in response to a lookup request from a requesting user, and wherein selecting the favored user among the subset of users includes comparing a location identifier associated with the requesting user with a location identifier associated with each user in the subset of users.
claim 1
6. The method of , wherein the location identifier is selected from the group consisting of facility, building, telephone number, address, ZIP code, floor, mail station, network, domain, and combinations thereof.
claim 5
7. The method of , wherein comparing the location identifier associated with the requesting user with the location identifier associated with each user in the subset of users includes determining if the location identifier associated with each user identifies a related location to a predetermined location identified by the location identifier associated with the requesting user.
claim 5
8. The method of , further comprising monitoring communications between first and second locations to determine whether the first and second locations are related to one another.
claim 7
9. The method of , wherein identifying the subset of users is performed in response to a lookup request from a requesting user, and wherein selecting the favored user among the subset of users includes comparing a function identifier associated with the requesting user with a function identifier associated with each user in the subset of users.
claim 1
10. The method of , wherein the function identifier is selected from the group consisting of department, job title, job family, shift, supervisor, and combinations thereof.
claim 9
11. The method of , wherein identifying the subset of users is performed in response to a lookup request from a requesting user, and wherein selecting the favored user among the subset of users includes determining a contact affinity between the requesting user and each user in the subset of users and selecting as the favored user the user among the subset of users having the greatest contact affinity with the requesting user.
claim 1
12. The method of , further comprising monitoring contacts between the requesting user and each of the subset of users, wherein selection of the favored user is based upon the relative number of contacts between the user and each user in the subset of users.
claim 11
13. The method of , wherein monitoring contacts between the requesting user and each of the subset of users includes at least one of monitoring messages sent by the requesting user to each of the subset of users, monitoring messages received by the requesting user from each of the subset of users, monitoring messages sent by the requesting user as carbon copies to each of the subset of users, and monitoring attempts by the requesting user to retrieve information from the contact database regarding each of the subset of users.
claim 12
14. The method of , further comprising displaying a display representation of at least one additional user from the subset of users, wherein displaying the display representation associated with the favored user includes highlighting the display representation of the favored user relative to the display representation of the additional user.
claim 1
15. A computer-implemented method of preparing an electronic message, the method comprising:
(a) in response to a first user addressing an electronic message to a second user, determining whether the second user is a member of an electronic messaging group, the electronic messaging group defining a plurality of member users; and
(b) if the second user is a member of the electronic messaging group, addressing the electronic message to at least one additional member user in the electronic messaging group.
16. The method of , wherein addressing the electronic message to at least one additional member user in the electronic messaging group includes adding each additional member user to an address list for the electronic message.
claim 15
17. The method of , wherein adding each additional member to the address list includes adding at least one additional member to a copy list for the electronic message.
claim 16
18. The method of , wherein addressing the electronic message to at least one additional member user in the electronic messaging group includes requesting user input from the first user to either accept or reject addressing to each additional member user in the electronic messaging group, and in response to the user input, addressing the electronic message to any accepted additional member users.
claim 15
19. The method of , wherein the electronic messaging group is a first electronic messaging group among a plurality of electronic messaging groups additionally including a second electronic messaging group defining a second plurality of member users, and wherein determining whether the second user is a member of the electronic messaging group includes determining whether the second user is a member of any of the plurality of electronic messaging groups.
claim 15
20. The method of , wherein, if the second user is a member of both of the first and second electronic messaging groups, receiving user input from the first user that selects at least one of the first and second electronic messaging groups, and wherein addressing the electronic message to at least one additional member user in the first electronic messaging group is performed only if the first user selects the first electronic messaging group.
claim 19
21. The method of , further comprising, if the second user is a member of the second electronic messaging group, addressing the electronic message to at least one additional member user in the second electronic messaging group.
claim 19
22. A computer-implemented method of maintaining electronic messaging groups, the method comprising:
(a) addressing an electronic message to an electronic messaging group including a plurality of member users in response to user input, including generating an address list for the electronic message that includes a list entry associated with each member user;
(b) selectively updating the address list for the electronic message in response to user input; and
(c) automatically updating the electronic messaging group based upon the updates to the address list for the electronic message.
23. The method of , wherein automatically updating the electronic messaging group is performed in response to user input to send the electronic message.
claim 22
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/736,600 US20010002469A1 (en) | 1998-06-11 | 2000-12-13 | Apparatus, program products and methods utilizing intelligent contact management |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/096,243 US6247043B1 (en) | 1998-06-11 | 1998-06-11 | Apparatus, program products and methods utilizing intelligent contact management |
US09/736,600 US20010002469A1 (en) | 1998-06-11 | 2000-12-13 | Apparatus, program products and methods utilizing intelligent contact management |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/096,243 Division US6247043B1 (en) | 1998-06-11 | 1998-06-11 | Apparatus, program products and methods utilizing intelligent contact management |
Publications (1)
Publication Number | Publication Date |
---|---|
US20010002469A1 true US20010002469A1 (en) | 2001-05-31 |
Family
ID=22256516
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/096,243 Expired - Lifetime US6247043B1 (en) | 1998-06-11 | 1998-06-11 | Apparatus, program products and methods utilizing intelligent contact management |
US09/736,600 Abandoned US20010002469A1 (en) | 1998-06-11 | 2000-12-13 | Apparatus, program products and methods utilizing intelligent contact management |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/096,243 Expired - Lifetime US6247043B1 (en) | 1998-06-11 | 1998-06-11 | Apparatus, program products and methods utilizing intelligent contact management |
Country Status (3)
Country | Link |
---|---|
US (2) | US6247043B1 (en) |
EP (1) | EP0964343A3 (en) |
CA (1) | CA2265331A1 (en) |
Cited By (88)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030065786A1 (en) * | 2001-10-03 | 2003-04-03 | David Park | Method and system to access address books |
US20030070093A1 (en) * | 2001-10-10 | 2003-04-10 | International Business Machines Corporation | Method for implementing a server-based, common communication identifier for multiple communication applications |
US20030080998A1 (en) * | 2001-10-31 | 2003-05-01 | Manuel Gonzalez | Electronic document handling system and method |
US20040093317A1 (en) * | 2002-11-07 | 2004-05-13 | Swan Joseph G. | Automated contact information sharing |
WO2004053649A2 (en) * | 2002-12-06 | 2004-06-24 | Ziffren, Brittenham, Branca & Fischer | Contact event management system |
US20040122838A1 (en) * | 2002-12-18 | 2004-06-24 | International Business Machines Corporation | Method, system and program product for transmitting electronic communications using implicitly formed contact groups |
WO2004081804A1 (en) * | 2003-03-10 | 2004-09-23 | Amazon.Com, Inc. | Method for selecting relevant campaign messages for transmission to recipients |
US20040199582A1 (en) * | 2002-11-18 | 2004-10-07 | Valerie Kucharewski | People lists |
US20050097109A1 (en) * | 2003-10-30 | 2005-05-05 | Microsoft Corporation | Term database extension for label system |
US20050160107A1 (en) * | 2003-12-29 | 2005-07-21 | Ping Liang | Advanced search, file system, and intelligent assistant agent |
US20050223061A1 (en) * | 2004-03-31 | 2005-10-06 | Auerbach David B | Methods and systems for processing email messages |
US20050234875A1 (en) * | 2004-03-31 | 2005-10-20 | Auerbach David B | Methods and systems for processing media files |
US20050262197A1 (en) * | 2002-06-25 | 2005-11-24 | Liang Chua C | Networking system |
US20060013487A1 (en) * | 2004-07-09 | 2006-01-19 | Longe Michael R | Disambiguating ambiguous characters |
US20060031366A1 (en) * | 2004-05-20 | 2006-02-09 | International Business Machines Corporation | Method for dynamically ordering instant messaging lists |
US20060080284A1 (en) * | 2003-11-07 | 2006-04-13 | Masonis John T | Viral engine for network deployment |
US20060085752A1 (en) * | 2004-10-14 | 2006-04-20 | International Business Machines Corporation | Method and apparatus for dynamically creating historical groups in a messaging client |
US20060116139A1 (en) * | 2004-12-01 | 2006-06-01 | Barry Appelman | Automatically enabling the forwarding of instant messages |
US20060168204A1 (en) * | 2004-12-01 | 2006-07-27 | Barry Appelman | Mobile blocking indicators on a contact list |
US20060190622A1 (en) * | 2002-04-24 | 2006-08-24 | Hiroshi Kitada | System, computer program product and method for scanning and managing documents |
US20060195472A1 (en) * | 2005-02-25 | 2006-08-31 | Microsoft Corporation | Method and system for aggregating contact information from multiple contact sources |
US20060195474A1 (en) * | 2005-02-25 | 2006-08-31 | Microsoft Corporation | Method and system for locating contact information collected from contact sources |
US20060195422A1 (en) * | 2005-02-25 | 2006-08-31 | Microsoft Corporation | Method and system for collecting contact information from contact sources and tracking contact sources |
US20060242210A1 (en) * | 2003-11-07 | 2006-10-26 | Plaxo, Inc. | Contact management update protocols |
US20060248465A1 (en) * | 2005-04-28 | 2006-11-02 | Samsung Electronics Co., Ltd. | Method of storing phone book data in mobile communication terminal and a mobile communication terminal implementing the same |
US20070050455A1 (en) * | 2005-09-01 | 2007-03-01 | David Yach | Method and device for predicting message recipients |
US20070282790A1 (en) * | 2006-06-05 | 2007-12-06 | Igor Goulko | Online Propagation of Data Updates |
US20070288648A1 (en) * | 2002-11-18 | 2007-12-13 | Lara Mehanna | Host-based intelligent results related to a character stream |
US20070288578A1 (en) * | 2006-06-09 | 2007-12-13 | Brett Anthony Pantalone | E-mail address inspection |
US7349700B1 (en) | 2001-08-30 | 2008-03-25 | Aol Llc | Communication system and method |
US20080155471A1 (en) * | 2006-12-20 | 2008-06-26 | Angelo Lynn | Method and system for providing auto-sorting of collaborative partners or components based on frequency of communication and/or access in a collaboration system user interface |
US20080222118A1 (en) * | 2004-01-30 | 2008-09-11 | Scian Anthony F | Contact query data system and method |
US20080222256A1 (en) * | 2007-03-08 | 2008-09-11 | Rosenberg Greg A | Autocomplete for intergrating diverse methods of electronic communication |
US20080235334A1 (en) * | 2007-03-20 | 2008-09-25 | Deepak Gupta | Methods for creating and using electronic mailing groups |
US20090070326A1 (en) * | 2004-07-29 | 2009-03-12 | Reiner Kraft | Search systems and methods using in-line contextual queries |
US20090222493A1 (en) * | 2008-02-29 | 2009-09-03 | Plaxo, Inc. | Enabling Synchronization With A Difference Unaware Data Source |
US20090228513A1 (en) * | 2008-03-06 | 2009-09-10 | Nokia Corporation | Methods, apparatuses, and computer program products for modeling contact networks |
US20090234922A1 (en) * | 2004-12-01 | 2009-09-17 | Aol Llc | Automatically Enabling the Forwarding of Instant Messages |
US20090300546A1 (en) * | 2008-05-30 | 2009-12-03 | Microsoft Corporation | Creation and suggestion of contact distribution lists |
US20100077049A1 (en) * | 2002-11-18 | 2010-03-25 | Aol Llc | Reconfiguring an Electronic Message to Effect an Enhanced Notification |
US7730143B1 (en) | 2004-12-01 | 2010-06-01 | Aol Inc. | Prohibiting mobile forwarding |
US20100138434A1 (en) * | 2008-12-02 | 2010-06-03 | Aisin Aw Co., Ltd. | Search device, search method, and computer-readable medium that stores search program |
US7783637B2 (en) | 2003-09-30 | 2010-08-24 | Microsoft Corporation | Label system-translation of text and multi-language support at runtime and design |
US20100306250A1 (en) * | 2009-06-02 | 2010-12-02 | Ricoh Company, Ltd. | Data processing apparatus, data transmission method, and computer-readable recording medium for data transmission |
US20100325113A1 (en) * | 2004-12-20 | 2010-12-23 | Aol Inc. | Automatic categorization of entries in a contact list |
US7962504B1 (en) | 2005-05-26 | 2011-06-14 | Aol Inc. | Sourcing terms into a search engine |
US7966647B1 (en) | 2006-08-16 | 2011-06-21 | Resource Consortium Limited | Sending personal information to a personal information aggregator |
US20110208772A1 (en) * | 2010-02-22 | 2011-08-25 | Nokia Corporation | Method and Apparatus for Providing a Search Tool in Connection with Address Management |
US20110235790A1 (en) * | 2010-03-26 | 2011-09-29 | Google Inc. | Computing Device With Remote Contact Lists |
US8112437B1 (en) | 2005-12-29 | 2012-02-07 | Google Inc. | Automatically maintaining an address book |
US8156193B1 (en) | 2002-11-18 | 2012-04-10 | Aol Inc. | Enhanced buddy list using mobile device identifiers |
US8161053B1 (en) | 2004-03-31 | 2012-04-17 | Google Inc. | Methods and systems for eliminating duplicate events |
US8306506B1 (en) | 2002-11-07 | 2012-11-06 | Swan Joseph G | Apparatuses for requesting, retrieving and storing contact records |
US8346777B1 (en) | 2004-03-31 | 2013-01-01 | Google Inc. | Systems and methods for selectively storing event data |
US20130024474A1 (en) * | 2004-07-29 | 2013-01-24 | Yahoo! Inc. | User interfaces for search systems using in-line contextual queries |
US8386728B1 (en) | 2004-03-31 | 2013-02-26 | Google Inc. | Methods and systems for prioritizing a crawl |
US8577972B1 (en) | 2003-09-05 | 2013-11-05 | Facebook, Inc. | Methods and systems for capturing and managing instant messages |
US20130318108A1 (en) * | 2003-02-20 | 2013-11-28 | Sonicwall, Inc. | Message classification using legitimate contact points |
US8631076B1 (en) | 2004-03-31 | 2014-01-14 | Google Inc. | Methods and systems for associating instant messenger events |
US20140047335A1 (en) * | 2012-08-10 | 2014-02-13 | Gabriel A. LEWIS | Systems and methods for providing and updating live-streaming online content in an interactive web platform |
US8701014B1 (en) | 2002-11-18 | 2014-04-15 | Facebook, Inc. | Account linking |
US20140129973A1 (en) * | 2012-11-08 | 2014-05-08 | Microsoft Corporation | Interaction model for serving popular queries in search box |
US8812515B1 (en) * | 2004-03-31 | 2014-08-19 | Google Inc. | Processing contact information |
US8832070B1 (en) * | 2009-01-02 | 2014-09-09 | Google Inc. | Pre-computed impression lists |
US8874672B2 (en) | 2003-03-26 | 2014-10-28 | Facebook, Inc. | Identifying and using identities deemed to be known to a user |
USRE45254E1 (en) | 2002-12-31 | 2014-11-18 | Facebook, Inc. | Implicit population of access control lists |
US8918460B2 (en) | 2004-03-05 | 2014-12-23 | Facebook, Inc. | Organizing entries in participant lists based on communications strengths |
US8930480B2 (en) | 2003-04-02 | 2015-01-06 | Facebook, Inc. | Degrees of separation for filtering communications |
US8930204B1 (en) | 2006-08-16 | 2015-01-06 | Resource Consortium Limited | Determining lifestyle recommendations using aggregated personal information |
US8954420B1 (en) | 2003-12-31 | 2015-02-10 | Google Inc. | Methods and systems for improving a search ranking using article information |
US8965964B1 (en) | 2002-11-18 | 2015-02-24 | Facebook, Inc. | Managing forwarded electronic messages |
US20150195312A1 (en) * | 2014-01-07 | 2015-07-09 | International Business Machines Corporation | Allowing a user to view network contacts of other users when visiting an environment of a different organization |
US20150253987A1 (en) * | 2004-02-23 | 2015-09-10 | Hillcrest Laboratories, Inc. | Keyboardless Text Entry |
US9185067B1 (en) | 1999-12-01 | 2015-11-10 | Facebook, Inc. | System and method for analyzing communications |
US9189516B2 (en) | 2003-02-20 | 2015-11-17 | Dell Software Inc. | Using distinguishing properties to classify messages |
US9203647B2 (en) | 2002-11-18 | 2015-12-01 | Facebook, Inc. | Dynamic online and geographic location of a user |
US9203879B2 (en) | 2000-03-17 | 2015-12-01 | Facebook, Inc. | Offline alerts mechanism |
US20160014056A1 (en) * | 2009-06-15 | 2016-01-14 | Blackberry Limited | Method, devices and system having out of office based presence |
US9246975B2 (en) | 2000-03-17 | 2016-01-26 | Facebook, Inc. | State change alerts mechanism |
US9262446B1 (en) | 2005-12-29 | 2016-02-16 | Google Inc. | Dynamically ranking entries in a personal data book |
US9325649B2 (en) | 2003-02-20 | 2016-04-26 | Dell Software Inc. | Signature generation using message summaries |
US20160283719A1 (en) * | 2015-03-26 | 2016-09-29 | Fujitsu Limited | Method for evaluation, computer-readable recording medium having stored therein program for evaluation, and evaluator |
US9647872B2 (en) | 2002-11-18 | 2017-05-09 | Facebook, Inc. | Dynamic identification of other users to an online user |
US9973572B2 (en) * | 2015-04-14 | 2018-05-15 | SkyKick, Inc. | Server load management for data migration |
US10187334B2 (en) | 2003-11-26 | 2019-01-22 | Facebook, Inc. | User-defined electronic message preferences |
US20190303855A1 (en) * | 2011-09-16 | 2019-10-03 | United States Postal Service | Systems and methods for creating and using a hybrid-digital mailbox |
CN113326363A (en) * | 2021-05-27 | 2021-08-31 | 北京百度网讯科技有限公司 | Searching method and device, prediction model training method and device, and electronic device |
US11362982B2 (en) * | 2017-06-16 | 2022-06-14 | Hcl Technologies Limited | Mail bot and mailing list detection |
Families Citing this family (130)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6385312B1 (en) * | 1993-02-22 | 2002-05-07 | Murex Securities, Ltd. | Automatic routing and information system for telephonic services |
DE19717948C2 (en) * | 1997-04-29 | 2003-07-31 | Deutsche Telekom Ag | Procedure for the transmission of information |
US6269369B1 (en) * | 1997-11-02 | 2001-07-31 | Amazon.Com Holdings, Inc. | Networked personal contact manager |
US7272604B1 (en) | 1999-09-03 | 2007-09-18 | Atle Hedloy | Method, system and computer readable medium for addressing handling from an operating system |
IL128935A (en) | 1998-09-18 | 2003-10-31 | Direct & Clear Inc | Communication method and system utilizing a specific communication code |
WO2000022551A1 (en) | 1998-10-13 | 2000-04-20 | Chris Cheah | Method and system for controlled distribution of information over a network |
US7505974B2 (en) * | 1999-02-12 | 2009-03-17 | Gropper Robert L | Auto update utility for digital address books |
US9607041B2 (en) * | 1999-07-15 | 2017-03-28 | Gula Consulting Limited Liability Company | System and method for efficiently accessing internet resources |
US7613695B1 (en) * | 1999-12-06 | 2009-11-03 | Reed Elsevier Inc. | Relationship management system that provides an indication of users having a relationship with a specified contact |
US7359938B1 (en) | 1999-12-14 | 2008-04-15 | Nortel Networks Limited | System indicating the presence of an individual or group of individuals |
US6853634B1 (en) * | 1999-12-14 | 2005-02-08 | Nortel Networks Limited | Anonymity in a presence management system |
US7603411B1 (en) | 1999-12-14 | 2009-10-13 | Nortel Networks Limited | Presence management system |
US7221658B1 (en) * | 1999-12-14 | 2007-05-22 | Nortel Networks Ltd | Independent contact spanning multiple access networks |
US6816878B1 (en) * | 2000-02-11 | 2004-11-09 | Steven L. Zimmers | Alert notification system |
US7136915B2 (en) * | 2000-03-14 | 2006-11-14 | Rieger Iii Charles J | System for communicating through maps |
US6654800B1 (en) | 2000-03-14 | 2003-11-25 | Rieger, Iii Charles J. | System for communicating through maps |
AU3321800A (en) * | 2000-03-22 | 2001-10-03 | Direct And Clear Inc. | A method and system for exchanging users related information via their communication systems |
US7127404B1 (en) * | 2000-05-11 | 2006-10-24 | Ebay, Incorporated | Method and apparatus for a dual online registration contact information system |
AU2001273246A1 (en) * | 2000-07-06 | 2002-01-21 | Bill Good Marketing, Inc. | Systems and methods for contact management and campaign management |
US20020026480A1 (en) * | 2000-08-25 | 2002-02-28 | Takanori Terada | E-mail system |
US20020049751A1 (en) * | 2000-09-01 | 2002-04-25 | Mei-Na Chen | Managing contact information through a communication network |
US7243075B1 (en) * | 2000-10-03 | 2007-07-10 | Shaffer James D | Real-time process for defining, processing and delivering a highly customized contact list over a network |
US7711611B2 (en) * | 2000-10-27 | 2010-05-04 | Microsoft Corporation | Wish list |
JP2002132429A (en) * | 2000-10-27 | 2002-05-10 | Canon Inc | Method and device for inputting character and storage medium |
KR100706503B1 (en) * | 2000-12-19 | 2007-04-10 | 엘지전자 주식회사 | Method of Memory Field Using |
US6701348B2 (en) * | 2000-12-22 | 2004-03-02 | Goodcontacts.Com | Method and system for automatically updating contact information within a contact database |
US6941346B2 (en) * | 2001-02-28 | 2005-09-06 | Hall Aluminum Llc | Email—expanded addressee sort/listing |
US6694353B2 (en) | 2001-03-28 | 2004-02-17 | Good Contacts.Com | Method and system for automatically updating electronic mail address information within an electronic mail address database |
US7162474B1 (en) * | 2001-05-10 | 2007-01-09 | Nortel Networks Limited | Recipient controlled contact directories |
US7043471B2 (en) * | 2001-08-03 | 2006-05-09 | Overture Services, Inc. | Search engine account monitoring |
US8112529B2 (en) * | 2001-08-20 | 2012-02-07 | Masterobjects, Inc. | System and method for asynchronous client server session communication |
US7752326B2 (en) * | 2001-08-20 | 2010-07-06 | Masterobjects, Inc. | System and method for utilizing asynchronous client server communication objects |
US7007085B1 (en) * | 2001-09-28 | 2006-02-28 | Bellsouth Intellectual Property Corporation | Message log for wireline, voice mail, email, fax, pager, instant messages and chat |
US7472187B2 (en) * | 2001-09-28 | 2008-12-30 | At&T Intellectual Property I, L.P. | Communications and information resource manager |
US7313617B2 (en) | 2001-09-28 | 2007-12-25 | Dale Malik | Methods and systems for a communications and information resource manager |
JP3701231B2 (en) * | 2001-11-30 | 2005-09-28 | 京セラミタ株式会社 | Communication device |
US7228335B2 (en) * | 2002-02-19 | 2007-06-05 | Goodcontacts Research Ltd. | Method of automatically populating contact information fields for a new contract added to an electronic contact database |
AUPS107202A0 (en) * | 2002-03-13 | 2002-04-11 | K W Dinn Holdings Pty Limited | Improved device interface |
US7130887B2 (en) * | 2002-04-18 | 2006-10-31 | Bernel Goldberg | Method and system for generating separate e-mail transmissions to copied recipients for providing additional information |
US7305483B2 (en) * | 2002-04-25 | 2007-12-04 | Yahoo! Inc. | Method for the real-time distribution of streaming data on a network |
US20030212745A1 (en) * | 2002-05-08 | 2003-11-13 | Caughey David A. | Selective multi-step email message marketing |
US9697264B2 (en) * | 2002-08-20 | 2017-07-04 | Kannuu Pty. Ltd. | Process and apparatus for selecting an item from a database |
US7636755B2 (en) | 2002-11-21 | 2009-12-22 | Aol Llc | Multiple avatar personalities |
US8037150B2 (en) | 2002-11-21 | 2011-10-11 | Aol Inc. | System and methods for providing multiple personas in a communications environment |
US7360174B2 (en) | 2002-12-19 | 2008-04-15 | Microsoft Corporation | Contact user interface |
US7240298B2 (en) * | 2002-12-19 | 2007-07-03 | Microsoft Corporation | Contact page |
US7313760B2 (en) * | 2002-12-19 | 2007-12-25 | Microsoft Corporation | Contact picker |
US7418663B2 (en) * | 2002-12-19 | 2008-08-26 | Microsoft Corporation | Contact picker interface |
US7360172B2 (en) | 2002-12-19 | 2008-04-15 | Microsoft Corporation | Contact controls |
US7636719B2 (en) * | 2002-12-19 | 2009-12-22 | Microsoft Corporation | Contact schema |
US7949759B2 (en) | 2003-04-02 | 2011-05-24 | AOL, Inc. | Degrees of separation for handling communications |
US7543243B2 (en) * | 2003-01-15 | 2009-06-02 | Microsoft Corporation | Identifying likely recipients of a message |
US7068768B2 (en) * | 2003-01-29 | 2006-06-27 | America Online, Inc. | Method for populating a caller's information to a host-based address book |
US7941762B1 (en) | 2003-02-14 | 2011-05-10 | Shoretel, Inc. | Display of real time information for selected possibilities |
US20040167982A1 (en) * | 2003-02-26 | 2004-08-26 | Cohen Michael A. | Multiple registrars |
US7908554B1 (en) | 2003-03-03 | 2011-03-15 | Aol Inc. | Modifying avatar behavior based on user action or mood |
US7913176B1 (en) | 2003-03-03 | 2011-03-22 | Aol Inc. | Applying access controls to communications with avatars |
US20040179037A1 (en) | 2003-03-03 | 2004-09-16 | Blattner Patrick D. | Using avatars to communicate context out-of-band |
US7783617B2 (en) * | 2003-04-16 | 2010-08-24 | Yahoo! Inc. | Personals advertisement affinities in a networked computer system |
US7433920B2 (en) * | 2003-10-10 | 2008-10-07 | Microsoft Corporation | Contact sidebar tile |
US7549125B2 (en) | 2003-10-23 | 2009-06-16 | Microsoft Corporation | Information picker |
US20050144033A1 (en) * | 2003-12-30 | 2005-06-30 | Rational Systems, Llc | Structured products based enterprise management system |
US7885901B2 (en) * | 2004-01-29 | 2011-02-08 | Yahoo! Inc. | Method and system for seeding online social network contacts |
US7953759B2 (en) * | 2004-02-17 | 2011-05-31 | Microsoft Corporation | Simplifying application access to schematized contact data |
WO2005089286A2 (en) | 2004-03-15 | 2005-09-29 | America Online, Inc. | Sharing social network information |
US8595146B1 (en) | 2004-03-15 | 2013-11-26 | Aol Inc. | Social networking permissions |
US7530021B2 (en) | 2004-04-01 | 2009-05-05 | Microsoft Corporation | Instant meeting preparation architecture |
US8914383B1 (en) | 2004-04-06 | 2014-12-16 | Monster Worldwide, Inc. | System and method for providing job recommendations |
US7739142B2 (en) * | 2004-05-17 | 2010-06-15 | Yahoo! Inc. | System and method for providing automobile marketing research information |
US7430719B2 (en) * | 2004-07-07 | 2008-09-30 | Microsoft Corporation | Contact text box |
US7917587B2 (en) | 2004-07-30 | 2011-03-29 | Microsoft Corporation | Method and system for prioritizing communications based on interpersonal relationships |
US7567895B2 (en) * | 2004-08-31 | 2009-07-28 | Microsoft Corporation | Method and system for prioritizing communications based on sentence classifications |
FR2877178A1 (en) * | 2004-10-26 | 2006-04-28 | France Telecom | Message filtering method for e.g. Internet network, involves verifying if filtering is defined in list of contacts of one client intended to receive message, and sending message to third client, upon positive verification |
US9652809B1 (en) | 2004-12-21 | 2017-05-16 | Aol Inc. | Using user profile information to determine an avatar and/or avatar characteristics |
US7818295B2 (en) * | 2005-02-22 | 2010-10-19 | Inter-Tel, Inc. | Methods for handling communication requests received for former users of a communication system |
EP1861774A4 (en) * | 2005-03-11 | 2009-11-11 | Yahoo Inc | System and method for managing listings |
US20060206517A1 (en) * | 2005-03-11 | 2006-09-14 | Yahoo! Inc. | System and method for listing administration |
US8433713B2 (en) | 2005-05-23 | 2013-04-30 | Monster Worldwide, Inc. | Intelligent job matching system and method |
US8527510B2 (en) * | 2005-05-23 | 2013-09-03 | Monster Worldwide, Inc. | Intelligent job matching system and method |
US8375067B2 (en) * | 2005-05-23 | 2013-02-12 | Monster Worldwide, Inc. | Intelligent job matching system and method including negative filtration |
US7895200B2 (en) * | 2005-07-29 | 2011-02-22 | Jaime Baldovinos | IntelligentAdvisor™, a contact, calendar, workflow, business method, and intelligence gathering application |
US20090013350A1 (en) * | 2005-08-11 | 2009-01-08 | Vvond, Llc | Display of movie titles in a library |
AU2006281970B2 (en) * | 2005-08-12 | 2012-05-03 | Kannuu Pty Ltd | Improved process and apparatus for selecting an item from a database |
GB0516672D0 (en) * | 2005-08-13 | 2005-09-21 | Ibm | A system for transmitting an electronic message |
US8516056B2 (en) * | 2005-08-16 | 2013-08-20 | International Business Machines Corporation | Programmatic message partner list management |
JP4455462B2 (en) | 2005-09-12 | 2010-04-21 | キヤノン株式会社 | Data distribution apparatus, data distribution method, and program for realizing the same |
US8159959B2 (en) * | 2005-11-07 | 2012-04-17 | Vudu, Inc. | Graphic user interface for playing video data |
US20090024602A1 (en) * | 2005-11-07 | 2009-01-22 | Vvond, Llc | Method and apparatus for searching a video library by genre |
US8195657B1 (en) | 2006-01-09 | 2012-06-05 | Monster Worldwide, Inc. | Apparatuses, systems and methods for data entry correlation |
US8600931B1 (en) | 2006-03-31 | 2013-12-03 | Monster Worldwide, Inc. | Apparatuses, methods and systems for automated online data submission |
US7886011B2 (en) | 2006-05-01 | 2011-02-08 | Buchheit Brian K | Dynamic set operations when specifying email recipients |
US20070255714A1 (en) * | 2006-05-01 | 2007-11-01 | Nokia Corporation | XML document permission control with delegation and multiple user identifications |
US20070288308A1 (en) * | 2006-05-25 | 2007-12-13 | Yahoo Inc. | Method and system for providing job listing affinity |
US7577921B2 (en) * | 2006-07-18 | 2009-08-18 | Vudu, Inc. | Method and system for performing search using acronym |
US7822754B2 (en) * | 2006-08-02 | 2010-10-26 | International Business Machines Corporation | Method and system to provide contextual, intelligent address book listings |
US8006190B2 (en) | 2006-10-31 | 2011-08-23 | Yahoo! Inc. | Social namespace addressing for non-unique identifiers |
US8599801B2 (en) * | 2007-02-01 | 2013-12-03 | Yahoo! Inc. | Collecting implicit information for determining context of event actions |
US8370349B2 (en) * | 2007-02-28 | 2013-02-05 | Yahoo! Inc. | Instant contact searching and presentation by category |
US20100153880A1 (en) * | 2007-03-07 | 2010-06-17 | Kannuu Pty Ltd. | Method system and apparatus for entering text on a computing device |
US20080235337A1 (en) * | 2007-03-21 | 2008-09-25 | Cisco Technology, Inc. | Adaptive buddy lists |
US8635278B2 (en) * | 2007-10-15 | 2014-01-21 | International Business Machines Corporation | System and method for interruption management |
US10387837B1 (en) | 2008-04-21 | 2019-08-20 | Monster Worldwide, Inc. | Apparatuses, methods and systems for career path advancement structuring |
CN101616102A (en) * | 2008-06-27 | 2009-12-30 | 国际商业机器公司 | Automatically creating contact group and suggesting E-mail send the method and apparatus of tabulation |
US20100082356A1 (en) * | 2008-09-30 | 2010-04-01 | Yahoo! Inc. | System and method for recommending personalized career paths |
US20100161369A1 (en) * | 2008-12-23 | 2010-06-24 | International Business Machines Corporation | Application of relationship weights to social network connections |
US9424541B2 (en) * | 2009-06-25 | 2016-08-23 | Oracle International Corporation | Policy based user contacts list management |
US20110047212A1 (en) * | 2009-08-20 | 2011-02-24 | Stephen Levy | Adjustment of a contact list |
US20110087747A1 (en) * | 2009-10-14 | 2011-04-14 | Research In Motion Limited | Management of contact information on a communication device |
US20110184723A1 (en) * | 2010-01-25 | 2011-07-28 | Microsoft Corporation | Phonetic suggestion engine |
US9152660B2 (en) | 2010-07-23 | 2015-10-06 | Donato Diorio | Data normalizer |
CN101980552A (en) | 2010-11-04 | 2011-02-23 | 华为终端有限公司 | Method and device for quickly adding addressees and mobile terminal |
EP2455844A1 (en) * | 2010-11-10 | 2012-05-23 | Michael Rabben | Computerized method to associatively and efficiently select elements in textual electronic lists and to operate computer-implemented programs using natural language commands |
US8751588B2 (en) * | 2010-12-15 | 2014-06-10 | Apple Inc. | Message thread clustering |
US8990318B2 (en) | 2010-12-15 | 2015-03-24 | Apple Inc. | Message focusing |
US8549086B2 (en) | 2010-12-15 | 2013-10-01 | Apple Inc. | Data clustering |
US20120297294A1 (en) * | 2011-05-17 | 2012-11-22 | Microsoft Corporation | Network search for writing assistance |
US20130159143A1 (en) * | 2011-11-28 | 2013-06-20 | Lavelle Industries, Inc. | Method, system and software product for selecting toilet repair products |
US9348479B2 (en) | 2011-12-08 | 2016-05-24 | Microsoft Technology Licensing, Llc | Sentiment aware user interface customization |
US9378290B2 (en) | 2011-12-20 | 2016-06-28 | Microsoft Technology Licensing, Llc | Scenario-adaptive input method editor |
US9477698B2 (en) * | 2012-02-22 | 2016-10-25 | Salesforce.Com, Inc. | System and method for inferring reporting relationships from a contact database |
WO2014000143A1 (en) | 2012-06-25 | 2014-01-03 | Microsoft Corporation | Input method editor application platform |
CN102769687B (en) * | 2012-06-29 | 2014-11-05 | 北京奇虎科技有限公司 | Mass texting system and method |
CN104243654B (en) * | 2012-06-29 | 2017-04-12 | 北京奇虎科技有限公司 | Information groupsend system and information groupsend method |
US8606973B1 (en) * | 2012-07-05 | 2013-12-10 | International Business Machines Corporation | Managing monitored conditions in adaptors in a multi-adaptor system |
US8959109B2 (en) | 2012-08-06 | 2015-02-17 | Microsoft Corporation | Business intelligent in-document suggestions |
JP6122499B2 (en) | 2012-08-30 | 2017-04-26 | マイクロソフト テクノロジー ライセンシング,エルエルシー | Feature-based candidate selection |
WO2015018055A1 (en) | 2013-08-09 | 2015-02-12 | Microsoft Corporation | Input method editor providing language assistance |
US20170330153A1 (en) | 2014-05-13 | 2017-11-16 | Monster Worldwide, Inc. | Search Extraction Matching, Draw Attention-Fit Modality, Application Morphing, and Informed Apply Apparatuses, Methods and Systems |
KR101678168B1 (en) * | 2015-03-13 | 2016-11-21 | 네이버 주식회사 | Mail service system and method for effective mail search |
US10158594B2 (en) | 2015-09-16 | 2018-12-18 | Microsoft Technology Licensing, Llc | Group headers for differentiating conversation scope and exposing interactive tools |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5913032A (en) * | 1994-04-04 | 1999-06-15 | Inprise Corporation | System and methods for automatically distributing a particular shared data object through electronic mail |
US5619648A (en) * | 1994-11-30 | 1997-04-08 | Lucent Technologies Inc. | Message filtering techniques |
US5742769A (en) * | 1996-05-06 | 1998-04-21 | Banyan Systems, Inc. | Directory with options for access to and display of email addresses |
US5909679A (en) * | 1996-11-08 | 1999-06-01 | At&T Corp | Knowledge-based moderator for electronic mail help lists |
AU5462598A (en) * | 1996-11-27 | 1998-06-22 | Kevin C. Treider | Data comparison and matching method and apparatus |
US5870744A (en) * | 1997-06-30 | 1999-02-09 | Intel Corporation | Virtual people networking |
US5999932A (en) * | 1998-01-13 | 1999-12-07 | Bright Light Technologies, Inc. | System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing |
-
1998
- 1998-06-11 US US09/096,243 patent/US6247043B1/en not_active Expired - Lifetime
-
1999
- 1999-03-15 CA CA002265331A patent/CA2265331A1/en not_active Abandoned
- 1999-05-19 EP EP99303902A patent/EP0964343A3/en not_active Withdrawn
-
2000
- 2000-12-13 US US09/736,600 patent/US20010002469A1/en not_active Abandoned
Cited By (250)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9405843B2 (en) | 1999-12-01 | 2016-08-02 | Facebook, Inc. | System and method for analyzing communications |
US9819629B2 (en) | 1999-12-01 | 2017-11-14 | Facebook, Inc. | System and method for analyzing communications |
US9813370B2 (en) | 1999-12-01 | 2017-11-07 | Facebook, Inc. | System and method for analyzing communications |
US9749279B2 (en) | 1999-12-01 | 2017-08-29 | Facebook, Inc. | System and method for analyzing communications |
US9749276B2 (en) | 1999-12-01 | 2017-08-29 | Facebook, Inc. | System and method for analyzing communications |
US9705834B2 (en) | 1999-12-01 | 2017-07-11 | Facebook, Inc. | System and method for analyzing communications |
US9185067B1 (en) | 1999-12-01 | 2015-11-10 | Facebook, Inc. | System and method for analyzing communications |
US9619575B2 (en) | 1999-12-01 | 2017-04-11 | Facebook, Inc. | System and method for analyzing communications |
US9514233B2 (en) | 1999-12-01 | 2016-12-06 | Facebook, Inc. | System and method for analyzing communications |
US9736209B2 (en) | 2000-03-17 | 2017-08-15 | Facebook, Inc. | State change alerts mechanism |
US9246975B2 (en) | 2000-03-17 | 2016-01-26 | Facebook, Inc. | State change alerts mechanism |
US9203879B2 (en) | 2000-03-17 | 2015-12-01 | Facebook, Inc. | Offline alerts mechanism |
US7933588B1 (en) | 2001-08-30 | 2011-04-26 | Aol Inc. | Communication system and method |
US7349700B1 (en) | 2001-08-30 | 2008-03-25 | Aol Llc | Communication system and method |
US9391931B2 (en) | 2001-08-30 | 2016-07-12 | Aol Inc. | Communication system and method |
US7502608B1 (en) | 2001-08-30 | 2009-03-10 | Aol Llc, A Delaware Limited Liability Company | Communication system and method |
US20030065786A1 (en) * | 2001-10-03 | 2003-04-03 | David Park | Method and system to access address books |
US7265858B2 (en) * | 2001-10-03 | 2007-09-04 | Kabushiki Kaisha Toshiba | Method and system to access address books |
US20030070093A1 (en) * | 2001-10-10 | 2003-04-10 | International Business Machines Corporation | Method for implementing a server-based, common communication identifier for multiple communication applications |
US20030080998A1 (en) * | 2001-10-31 | 2003-05-01 | Manuel Gonzalez | Electronic document handling system and method |
US7315986B2 (en) * | 2001-10-31 | 2008-01-01 | Hewlett-Packard Development Company L.P. | Electronic document handling system and method |
US20060190622A1 (en) * | 2002-04-24 | 2006-08-24 | Hiroshi Kitada | System, computer program product and method for scanning and managing documents |
US7756918B2 (en) * | 2002-06-25 | 2010-07-13 | Chua Chien Liang | Group networking utilizing screening methods |
US20050262197A1 (en) * | 2002-06-25 | 2005-11-24 | Liang Chua C | Networking system |
US20040093317A1 (en) * | 2002-11-07 | 2004-05-13 | Swan Joseph G. | Automated contact information sharing |
US8306506B1 (en) | 2002-11-07 | 2012-11-06 | Swan Joseph G | Apparatuses for requesting, retrieving and storing contact records |
US8798584B1 (en) | 2002-11-07 | 2014-08-05 | Joseph G. Swan | Apparatuses for requesting, retrieving and storing contact records |
US9647872B2 (en) | 2002-11-18 | 2017-05-09 | Facebook, Inc. | Dynamic identification of other users to an online user |
US8001199B2 (en) | 2002-11-18 | 2011-08-16 | Aol Inc. | Reconfiguring an electronic message to effect an enhanced notification |
US8775560B2 (en) | 2002-11-18 | 2014-07-08 | Facebook, Inc. | Host-based intelligent results related to a character stream |
US8819176B2 (en) | 2002-11-18 | 2014-08-26 | Facebook, Inc. | Intelligent map results related to a character stream |
US10033669B2 (en) | 2002-11-18 | 2018-07-24 | Facebook, Inc. | Managing electronic messages sent to reply telephone numbers |
US20070288648A1 (en) * | 2002-11-18 | 2007-12-13 | Lara Mehanna | Host-based intelligent results related to a character stream |
US8701014B1 (en) | 2002-11-18 | 2014-04-15 | Facebook, Inc. | Account linking |
US8954531B2 (en) | 2002-11-18 | 2015-02-10 | Facebook, Inc. | Intelligent messaging label results related to a character stream |
US8954534B2 (en) | 2002-11-18 | 2015-02-10 | Facebook, Inc. | Host-based intelligent results related to a character stream |
US8954530B2 (en) | 2002-11-18 | 2015-02-10 | Facebook, Inc. | Intelligent results related to a character stream |
US9894018B2 (en) | 2002-11-18 | 2018-02-13 | Facebook, Inc. | Electronic messaging using reply telephone numbers |
US9852126B2 (en) | 2002-11-18 | 2017-12-26 | Facebook, Inc. | Host-based intelligent results related to a character stream |
US8965964B1 (en) | 2002-11-18 | 2015-02-24 | Facebook, Inc. | Managing forwarded electronic messages |
US9047364B2 (en) | 2002-11-18 | 2015-06-02 | Facebook, Inc. | Intelligent client capability-based results related to a character stream |
US10389661B2 (en) | 2002-11-18 | 2019-08-20 | Facebook, Inc. | Managing electronic messages sent to mobile devices associated with electronic messaging accounts |
US8452849B2 (en) | 2002-11-18 | 2013-05-28 | Facebook, Inc. | Host-based intelligent results related to a character stream |
US9774560B2 (en) | 2002-11-18 | 2017-09-26 | Facebook, Inc. | People lists |
US9769104B2 (en) | 2002-11-18 | 2017-09-19 | Facebook, Inc. | Methods and system for delivering multiple notifications |
US9053174B2 (en) | 2002-11-18 | 2015-06-09 | Facebook, Inc. | Intelligent vendor results related to a character stream |
US9053173B2 (en) | 2002-11-18 | 2015-06-09 | Facebook, Inc. | Intelligent results related to a portion of a search query |
US9053175B2 (en) | 2002-11-18 | 2015-06-09 | Facebook, Inc. | Intelligent results using a spelling correction agent |
US9075868B2 (en) | 2002-11-18 | 2015-07-07 | Facebook, Inc. | Intelligent results based on database queries |
US9729489B2 (en) | 2002-11-18 | 2017-08-08 | Facebook, Inc. | Systems and methods for notification management and delivery |
US20100077049A1 (en) * | 2002-11-18 | 2010-03-25 | Aol Llc | Reconfiguring an Electronic Message to Effect an Enhanced Notification |
US10778635B2 (en) | 2002-11-18 | 2020-09-15 | Facebook, Inc. | People lists |
US9667585B2 (en) | 2002-11-18 | 2017-05-30 | Facebook, Inc. | Central people lists accessible by multiple applications |
US9075867B2 (en) | 2002-11-18 | 2015-07-07 | Facebook, Inc. | Intelligent results using an assistant |
US9171064B2 (en) | 2002-11-18 | 2015-10-27 | Facebook, Inc. | Intelligent community based results related to a character stream |
US8224916B2 (en) | 2002-11-18 | 2012-07-17 | Aol Inc. | People lists |
US9203647B2 (en) | 2002-11-18 | 2015-12-01 | Facebook, Inc. | Dynamic online and geographic location of a user |
US8156193B1 (en) | 2002-11-18 | 2012-04-10 | Aol Inc. | Enhanced buddy list using mobile device identifiers |
US9203794B2 (en) | 2002-11-18 | 2015-12-01 | Facebook, Inc. | Systems and methods for reconfiguring electronic messages |
US20040199582A1 (en) * | 2002-11-18 | 2004-10-07 | Valerie Kucharewski | People lists |
US9621376B2 (en) | 2002-11-18 | 2017-04-11 | Facebook, Inc. | Dynamic location of a subordinate user |
US9253136B2 (en) | 2002-11-18 | 2016-02-02 | Facebook, Inc. | Electronic message delivery based on presence information |
US9571439B2 (en) | 2002-11-18 | 2017-02-14 | Facebook, Inc. | Systems and methods for notification delivery |
US9571440B2 (en) | 2002-11-18 | 2017-02-14 | Facebook, Inc. | Notification archive |
US7908327B2 (en) | 2002-11-18 | 2011-03-15 | Aol Inc. | People lists |
US9560000B2 (en) | 2002-11-18 | 2017-01-31 | Facebook, Inc. | Reconfiguring an electronic message to effect an enhanced notification |
US9313046B2 (en) | 2002-11-18 | 2016-04-12 | Facebook, Inc. | Presenting dynamic location of a user |
US9319356B2 (en) | 2002-11-18 | 2016-04-19 | Facebook, Inc. | Message delivery control settings |
US9356890B2 (en) | 2002-11-18 | 2016-05-31 | Facebook, Inc. | Enhanced buddy list using mobile device identifiers |
US20040199581A1 (en) * | 2002-11-18 | 2004-10-07 | Valerie Kucharewski | People lists |
US8005919B2 (en) | 2002-11-18 | 2011-08-23 | Aol Inc. | Host-based intelligent results related to a character stream |
US9515977B2 (en) | 2002-11-18 | 2016-12-06 | Facebook, Inc. | Time based electronic message delivery |
US20110167116A1 (en) * | 2002-11-18 | 2011-07-07 | Aol Inc. | People lists |
WO2004053649A2 (en) * | 2002-12-06 | 2004-06-24 | Ziffren, Brittenham, Branca & Fischer | Contact event management system |
WO2004053649A3 (en) * | 2002-12-06 | 2004-09-10 | Ziffren Brittenham Branca & Fi | Contact event management system |
US20040122838A1 (en) * | 2002-12-18 | 2004-06-24 | International Business Machines Corporation | Method, system and program product for transmitting electronic communications using implicitly formed contact groups |
US8825681B2 (en) * | 2002-12-18 | 2014-09-02 | International Business Machines Corporation | Method, system and program product for transmitting electronic communications using automatically formed contact groups |
USRE48102E1 (en) | 2002-12-31 | 2020-07-14 | Facebook, Inc. | Implicit population of access control lists |
USRE45254E1 (en) | 2002-12-31 | 2014-11-18 | Facebook, Inc. | Implicit population of access control lists |
US9325649B2 (en) | 2003-02-20 | 2016-04-26 | Dell Software Inc. | Signature generation using message summaries |
US9189516B2 (en) | 2003-02-20 | 2015-11-17 | Dell Software Inc. | Using distinguishing properties to classify messages |
US9524334B2 (en) | 2003-02-20 | 2016-12-20 | Dell Software Inc. | Using distinguishing properties to classify messages |
US10042919B2 (en) | 2003-02-20 | 2018-08-07 | Sonicwall Inc. | Using distinguishing properties to classify messages |
US8935348B2 (en) * | 2003-02-20 | 2015-01-13 | Sonicwall, Inc. | Message classification using legitimate contact points |
US10785176B2 (en) | 2003-02-20 | 2020-09-22 | Sonicwall Inc. | Method and apparatus for classifying electronic messages |
US10027611B2 (en) | 2003-02-20 | 2018-07-17 | Sonicwall Inc. | Method and apparatus for classifying electronic messages |
US20130318108A1 (en) * | 2003-02-20 | 2013-11-28 | Sonicwall, Inc. | Message classification using legitimate contact points |
US7742944B2 (en) | 2003-03-10 | 2010-06-22 | Amazon Technologies, Inc. | Method for selecting relevant campaign messages for transmission to recipients |
WO2004081804A1 (en) * | 2003-03-10 | 2004-09-23 | Amazon.Com, Inc. | Method for selecting relevant campaign messages for transmission to recipients |
US20040204989A1 (en) * | 2003-03-10 | 2004-10-14 | Russell Dicker | Method for selecting relevant campaign messages for transmission to recipients |
US9516125B2 (en) | 2003-03-26 | 2016-12-06 | Facebook, Inc. | Identifying and using identities deemed to be known to a user |
US8874672B2 (en) | 2003-03-26 | 2014-10-28 | Facebook, Inc. | Identifying and using identities deemed to be known to a user |
US9531826B2 (en) | 2003-03-26 | 2016-12-27 | Facebook, Inc. | Managing electronic messages based on inference scores |
US9736255B2 (en) | 2003-03-26 | 2017-08-15 | Facebook, Inc. | Methods of providing access to messages based on degrees of separation |
US9462046B2 (en) | 2003-04-02 | 2016-10-04 | Facebook, Inc. | Degrees of separation for handling communications |
US8930480B2 (en) | 2003-04-02 | 2015-01-06 | Facebook, Inc. | Degrees of separation for filtering communications |
US8577972B1 (en) | 2003-09-05 | 2013-11-05 | Facebook, Inc. | Methods and systems for capturing and managing instant messages |
US9070118B2 (en) | 2003-09-05 | 2015-06-30 | Facebook, Inc. | Methods for capturing electronic messages based on capture rules relating to user actions regarding received electronic messages |
US10102504B2 (en) | 2003-09-05 | 2018-10-16 | Facebook, Inc. | Methods for controlling display of electronic messages captured based on community rankings |
US7783637B2 (en) | 2003-09-30 | 2010-08-24 | Microsoft Corporation | Label system-translation of text and multi-language support at runtime and design |
US20060074987A1 (en) * | 2003-10-30 | 2006-04-06 | Microsoft Corporation | Term database extension for label system |
US20050097109A1 (en) * | 2003-10-30 | 2005-05-05 | Microsoft Corporation | Term database extension for label system |
US7814101B2 (en) * | 2003-10-30 | 2010-10-12 | Microsoft Corporation | Term database extension for label system |
US10848593B2 (en) | 2003-11-07 | 2020-11-24 | Plaxo, Inc. | Viral engine for network deployment |
US10356205B2 (en) | 2003-11-07 | 2019-07-16 | Plaxo, Inc. | Viral engine for network deployment |
US11445033B2 (en) | 2003-11-07 | 2022-09-13 | Plaxo, Inc. | Viral engine for network deployment |
US7389324B2 (en) | 2003-11-07 | 2008-06-17 | Plaxo, Inc. | Viral engine for network deployment |
US20100268742A1 (en) * | 2003-11-07 | 2010-10-21 | Plaxo, Inc. | Contact Management Update Protocols |
US8032559B2 (en) | 2003-11-07 | 2011-10-04 | Plaxo, Inc. | Contact management update protocols |
US20060080284A1 (en) * | 2003-11-07 | 2006-04-13 | Masonis John T | Viral engine for network deployment |
US7774368B2 (en) | 2003-11-07 | 2010-08-10 | Plaxo, Inc. | Contact management update protocols |
US20060242210A1 (en) * | 2003-11-07 | 2006-10-26 | Plaxo, Inc. | Contact management update protocols |
US8271535B2 (en) | 2003-11-07 | 2012-09-18 | Plaxo, Inc. | Contact management update protocols |
US10187334B2 (en) | 2003-11-26 | 2019-01-22 | Facebook, Inc. | User-defined electronic message preferences |
US20050160107A1 (en) * | 2003-12-29 | 2005-07-21 | Ping Liang | Advanced search, file system, and intelligent assistant agent |
US8954420B1 (en) | 2003-12-31 | 2015-02-10 | Google Inc. | Methods and systems for improving a search ranking using article information |
US10423679B2 (en) | 2003-12-31 | 2019-09-24 | Google Llc | Methods and systems for improving a search ranking using article information |
US8285712B2 (en) * | 2004-01-30 | 2012-10-09 | Research In Motion Limited | Contact query data system and method |
US8626751B2 (en) | 2004-01-30 | 2014-01-07 | Blackberry Limited | Contact query data system and method |
US20080222118A1 (en) * | 2004-01-30 | 2008-09-11 | Scian Anthony F | Contact query data system and method |
US20150253987A1 (en) * | 2004-02-23 | 2015-09-10 | Hillcrest Laboratories, Inc. | Keyboardless Text Entry |
US8918460B2 (en) | 2004-03-05 | 2014-12-23 | Facebook, Inc. | Organizing entries in participant lists based on communications strengths |
US10341289B2 (en) | 2004-03-05 | 2019-07-02 | Facebook, Inc. | Systems and methods of calculating communications strengths |
US8812515B1 (en) * | 2004-03-31 | 2014-08-19 | Google Inc. | Processing contact information |
US9189553B2 (en) | 2004-03-31 | 2015-11-17 | Google Inc. | Methods and systems for prioritizing a crawl |
US8346777B1 (en) | 2004-03-31 | 2013-01-01 | Google Inc. | Systems and methods for selectively storing event data |
US20050223061A1 (en) * | 2004-03-31 | 2005-10-06 | Auerbach David B | Methods and systems for processing email messages |
US20050234875A1 (en) * | 2004-03-31 | 2005-10-20 | Auerbach David B | Methods and systems for processing media files |
US8161053B1 (en) | 2004-03-31 | 2012-04-17 | Google Inc. | Methods and systems for eliminating duplicate events |
US8631076B1 (en) | 2004-03-31 | 2014-01-14 | Google Inc. | Methods and systems for associating instant messenger events |
US8386728B1 (en) | 2004-03-31 | 2013-02-26 | Google Inc. | Methods and systems for prioritizing a crawl |
US9311408B2 (en) | 2004-03-31 | 2016-04-12 | Google, Inc. | Methods and systems for processing media files |
US9836544B2 (en) | 2004-03-31 | 2017-12-05 | Google Inc. | Methods and systems for prioritizing a crawl |
US8099407B2 (en) | 2004-03-31 | 2012-01-17 | Google Inc. | Methods and systems for processing media files |
US10180980B2 (en) | 2004-03-31 | 2019-01-15 | Google Llc | Methods and systems for eliminating duplicate events |
US8275839B2 (en) | 2004-03-31 | 2012-09-25 | Google Inc. | Methods and systems for processing email messages |
US20060031366A1 (en) * | 2004-05-20 | 2006-02-09 | International Business Machines Corporation | Method for dynamically ordering instant messaging lists |
US8583087B2 (en) | 2004-07-09 | 2013-11-12 | Nuance Communications, Inc. | Disambiguating ambiguous characters |
US7966003B2 (en) | 2004-07-09 | 2011-06-21 | Tegic Communications, Inc. | Disambiguating ambiguous characters |
US20060013487A1 (en) * | 2004-07-09 | 2006-01-19 | Longe Michael R | Disambiguating ambiguous characters |
US9342602B2 (en) | 2004-07-29 | 2016-05-17 | Yahoo! Inc. | User interfaces for search systems using in-line contextual queries |
US20090070326A1 (en) * | 2004-07-29 | 2009-03-12 | Reiner Kraft | Search systems and methods using in-line contextual queries |
US8655872B2 (en) | 2004-07-29 | 2014-02-18 | Yahoo! Inc. | Search systems and methods using in-line contextual queries |
US8812540B2 (en) * | 2004-07-29 | 2014-08-19 | Yahoo! Inc. | User interfaces for search systems using in-line contextual queries |
US20130024474A1 (en) * | 2004-07-29 | 2013-01-24 | Yahoo! Inc. | User interfaces for search systems using in-line contextual queries |
US20080189276A1 (en) * | 2004-10-14 | 2008-08-07 | Beadle Gary St Mark | Method and apparatus for dynamically creating historical groups in a messaging client |
US20060085752A1 (en) * | 2004-10-14 | 2006-04-20 | International Business Machines Corporation | Method and apparatus for dynamically creating historical groups in a messaging client |
US9043406B2 (en) * | 2004-10-14 | 2015-05-26 | International Business Machines Corporation | Dynamically creating historical groups in a messaging client |
US20090234922A1 (en) * | 2004-12-01 | 2009-09-17 | Aol Llc | Automatically Enabling the Forwarding of Instant Messages |
US9510168B2 (en) | 2004-12-01 | 2016-11-29 | Google Inc. | Prohibiting mobile forwarding |
US9049569B2 (en) | 2004-12-01 | 2015-06-02 | Google Inc. | Prohibiting mobile forwarding |
US9002949B2 (en) | 2004-12-01 | 2015-04-07 | Google Inc. | Automatically enabling the forwarding of instant messages |
US9560495B2 (en) | 2004-12-01 | 2017-01-31 | Google Inc. | Automatically enabling the forwarding of instant messages |
US8706826B2 (en) | 2004-12-01 | 2014-04-22 | Bright Sun Technologies | Automatically enabling the forwarding of instant messages |
US8060566B2 (en) | 2004-12-01 | 2011-11-15 | Aol Inc. | Automatically enabling the forwarding of instant messages |
US9088879B2 (en) | 2004-12-01 | 2015-07-21 | Google Inc. | Automatically enabling the forwarding of instant messages |
US20100285843A1 (en) * | 2004-12-01 | 2010-11-11 | Aol Inc. | Prohibiting mobile forwarding |
US9615225B2 (en) | 2004-12-01 | 2017-04-04 | Google Inc. | Automatically enabling the forwarding of instant messages |
US20060116139A1 (en) * | 2004-12-01 | 2006-06-01 | Barry Appelman | Automatically enabling the forwarding of instant messages |
US9872157B2 (en) | 2004-12-01 | 2018-01-16 | Google Inc. | Prohibiting mobile forwarding |
US20060168204A1 (en) * | 2004-12-01 | 2006-07-27 | Barry Appelman | Mobile blocking indicators on a contact list |
US7730143B1 (en) | 2004-12-01 | 2010-06-01 | Aol Inc. | Prohibiting mobile forwarding |
US20140317122A1 (en) * | 2004-12-20 | 2014-10-23 | Facebook, Inc. | Automatic categorization of entries in a contact list |
US20100325113A1 (en) * | 2004-12-20 | 2010-12-23 | Aol Inc. | Automatic categorization of entries in a contact list |
US9727631B2 (en) | 2004-12-20 | 2017-08-08 | Facebook, Inc. | Automatic categorization of entries in a contact list |
US8910056B2 (en) * | 2004-12-20 | 2014-12-09 | Facebook, Inc. | Automatic categorization of entries in a contact list |
US8775950B2 (en) | 2004-12-20 | 2014-07-08 | Facebook, Inc. | Automatic categorization of entries in a contact list |
US7562104B2 (en) | 2005-02-25 | 2009-07-14 | Microsoft Corporation | Method and system for collecting contact information from contact sources and tracking contact sources |
US20060195422A1 (en) * | 2005-02-25 | 2006-08-31 | Microsoft Corporation | Method and system for collecting contact information from contact sources and tracking contact sources |
US7593925B2 (en) * | 2005-02-25 | 2009-09-22 | Microsoft Corporation | Method and system for locating contact information collected from contact sources |
US20060195472A1 (en) * | 2005-02-25 | 2006-08-31 | Microsoft Corporation | Method and system for aggregating contact information from multiple contact sources |
KR101031942B1 (en) | 2005-02-25 | 2011-04-29 | 마이크로소프트 코포레이션 | Method and system for locating contact information collected from contact sources |
US20060195474A1 (en) * | 2005-02-25 | 2006-08-31 | Microsoft Corporation | Method and system for locating contact information collected from contact sources |
US8195658B2 (en) * | 2005-04-28 | 2012-06-05 | Samsung Electronics Co., Ltd. | Method of storing phone book data in mobile communication terminal and a mobile communication terminal implementing the same |
US20060248465A1 (en) * | 2005-04-28 | 2006-11-02 | Samsung Electronics Co., Ltd. | Method of storing phone book data in mobile communication terminal and a mobile communication terminal implementing the same |
US20120233162A1 (en) * | 2005-04-28 | 2012-09-13 | Samsung Electronics Co., Ltd. | Method of storing phone book data in mobile communication terminal and a mobile communication terminal implementing the same |
US9753972B2 (en) | 2005-05-26 | 2017-09-05 | Facebook, Inc. | Searching based on user interest |
US20110208768A1 (en) * | 2005-05-26 | 2011-08-25 | Aol Inc. | Sourcing terms into a search engine |
US8874606B2 (en) | 2005-05-26 | 2014-10-28 | Facebook, Inc. | Sourcing terms into a search engine |
US7962504B1 (en) | 2005-05-26 | 2011-06-14 | Aol Inc. | Sourcing terms into a search engine |
US8996560B2 (en) | 2005-05-26 | 2015-03-31 | Facebook, Inc. | Search engine utilizing user navigated documents |
US7853656B2 (en) * | 2005-09-01 | 2010-12-14 | Research In Motion Limited | Method and device for predicting message recipients |
US8542606B2 (en) * | 2005-09-01 | 2013-09-24 | Blackberry Limited | Method and device for predicting message recipients |
US20070050455A1 (en) * | 2005-09-01 | 2007-03-01 | David Yach | Method and device for predicting message recipients |
US20110078265A1 (en) * | 2005-09-01 | 2011-03-31 | Research In Motion Limited | Method and device for predicting message recipients |
US9262446B1 (en) | 2005-12-29 | 2016-02-16 | Google Inc. | Dynamically ranking entries in a personal data book |
US8112437B1 (en) | 2005-12-29 | 2012-02-07 | Google Inc. | Automatically maintaining an address book |
US20070282790A1 (en) * | 2006-06-05 | 2007-12-06 | Igor Goulko | Online Propagation of Data Updates |
US8515929B2 (en) | 2006-06-05 | 2013-08-20 | International Business Machines Corporation | Online propagation of data updates |
US9405785B2 (en) | 2006-06-05 | 2016-08-02 | International Business Machines Corporation | Online propagation of data updates |
US7836134B2 (en) * | 2006-06-09 | 2010-11-16 | Sony Ericsson Mobile Communications Ab | E-mail address inspection |
US20070288578A1 (en) * | 2006-06-09 | 2007-12-13 | Brett Anthony Pantalone | E-mail address inspection |
US8073708B1 (en) | 2006-08-16 | 2011-12-06 | Resource Consortium Limited | Aggregating personal healthcare informatoin |
US7966647B1 (en) | 2006-08-16 | 2011-06-21 | Resource Consortium Limited | Sending personal information to a personal information aggregator |
US7970827B1 (en) | 2006-08-16 | 2011-06-28 | Resource Consortium Limited | Providing notifications to an individual in a multi-dimensional personal information network |
US8775287B1 (en) | 2006-08-16 | 2014-07-08 | Resource Consortium Limited | Method and system for determining insurance needs |
US8635087B1 (en) | 2006-08-16 | 2014-01-21 | Resource Consortium Limited | Aggregating personal information |
US8121915B1 (en) | 2006-08-16 | 2012-02-21 | Resource Consortium Limited | Generating financial plans using a personal information aggregator |
US8185597B1 (en) | 2006-08-16 | 2012-05-22 | Resource Consortium Limited | Providing notifications to an individual in a multi-dimensional personal information network |
US8930204B1 (en) | 2006-08-16 | 2015-01-06 | Resource Consortium Limited | Determining lifestyle recommendations using aggregated personal information |
US8255811B2 (en) * | 2006-12-20 | 2012-08-28 | International Business Machines Corporation | Providing auto-sorting of collaborative partners or components based on frequency of communication and/or access in a collaboration system user interface |
US20080155471A1 (en) * | 2006-12-20 | 2008-06-26 | Angelo Lynn | Method and system for providing auto-sorting of collaborative partners or components based on frequency of communication and/or access in a collaboration system user interface |
US9219809B2 (en) | 2006-12-20 | 2015-12-22 | International Business Machines Corporation | Providing auto-sorting of collaborative partners or components based on frequency of communication and/or access in a collaboration system user interface |
US10452763B2 (en) * | 2007-03-08 | 2019-10-22 | Oath Inc. | Autocomplete for integrating diverse methods of electronic communication |
US20080222256A1 (en) * | 2007-03-08 | 2008-09-11 | Rosenberg Greg A | Autocomplete for intergrating diverse methods of electronic communication |
US7953805B2 (en) | 2007-03-20 | 2011-05-31 | International Business Machines Corporation | Methods for creating and using electronic mailing groups |
US20080235334A1 (en) * | 2007-03-20 | 2008-09-25 | Deepak Gupta | Methods for creating and using electronic mailing groups |
US20090222493A1 (en) * | 2008-02-29 | 2009-09-03 | Plaxo, Inc. | Enabling Synchronization With A Difference Unaware Data Source |
US7996357B2 (en) | 2008-02-29 | 2011-08-09 | Plaxo, Inc. | Enabling synchronization with a difference unaware data source |
US8620860B2 (en) | 2008-02-29 | 2013-12-31 | Plaxo, Inc. | Enabling synchronization with a difference unaware data source |
US9298762B2 (en) | 2008-02-29 | 2016-03-29 | Plaxo, Inc. | Enabling synchronization with a difference unaware data source |
US20090228513A1 (en) * | 2008-03-06 | 2009-09-10 | Nokia Corporation | Methods, apparatuses, and computer program products for modeling contact networks |
US8677251B2 (en) * | 2008-05-30 | 2014-03-18 | Microsoft Corporation | Creation and suggestion of contact distribution lists |
US20090300546A1 (en) * | 2008-05-30 | 2009-12-03 | Microsoft Corporation | Creation and suggestion of contact distribution lists |
US20100138434A1 (en) * | 2008-12-02 | 2010-06-03 | Aisin Aw Co., Ltd. | Search device, search method, and computer-readable medium that stores search program |
US8832070B1 (en) * | 2009-01-02 | 2014-09-09 | Google Inc. | Pre-computed impression lists |
US8326901B2 (en) * | 2009-06-02 | 2012-12-04 | Ricoh Company, Ltd. | Data processing apparatus, data transmission method, and computer-readable recording medium for data transmission |
US20100306250A1 (en) * | 2009-06-02 | 2010-12-02 | Ricoh Company, Ltd. | Data processing apparatus, data transmission method, and computer-readable recording medium for data transmission |
US20160014056A1 (en) * | 2009-06-15 | 2016-01-14 | Blackberry Limited | Method, devices and system having out of office based presence |
US10666585B2 (en) * | 2009-06-15 | 2020-05-26 | Blackberry Limited | Method, devices, and system for determining the presence status of a message recipient and displaying the name and presence indication of entries in an address book matching partial input based on the location of a mobile communication device |
US20110208772A1 (en) * | 2010-02-22 | 2011-08-25 | Nokia Corporation | Method and Apparatus for Providing a Search Tool in Connection with Address Management |
US9824163B2 (en) * | 2010-02-22 | 2017-11-21 | Nokia Technologies Oy | Method and apparatus for providing a search tool in connection with address management |
US8238531B2 (en) * | 2010-03-26 | 2012-08-07 | Google Inc. | Computing device with remote contact lists |
US8503629B2 (en) * | 2010-03-26 | 2013-08-06 | Google Inc. | Computing device with remote contact lists |
US9210258B2 (en) | 2010-03-26 | 2015-12-08 | Google Inc. | Computing device with remote contact lists |
US20120020254A1 (en) * | 2010-03-26 | 2012-01-26 | Google Inc. | Computing device with remote contact lists |
US10148609B2 (en) | 2010-03-26 | 2018-12-04 | Google Llc | Computing device with remote contact lists |
US20110235790A1 (en) * | 2010-03-26 | 2011-09-29 | Google Inc. | Computing Device With Remote Contact Lists |
US12014315B2 (en) * | 2011-09-16 | 2024-06-18 | United States Postal Service | Systems and methods for creating and using a hybrid-digital mailbox |
US20230162132A1 (en) * | 2011-09-16 | 2023-05-25 | United States Postal Service | Systems and methods for creating and using a hybrid-digital mailbox |
US20190303855A1 (en) * | 2011-09-16 | 2019-10-03 | United States Postal Service | Systems and methods for creating and using a hybrid-digital mailbox |
US11587016B2 (en) * | 2011-09-16 | 2023-02-21 | United States Postal Service | Systems and methods for creating and using a hybrid-digital mailbox |
US10198152B2 (en) * | 2012-08-10 | 2019-02-05 | Oath Inc. | Systems and methods for providing and updating live-streaming online content in an interactive web platform |
US11550451B2 (en) | 2012-08-10 | 2023-01-10 | Verizon Patent And Licensing Inc. | Systems and methods for providing and updating live-streaming online content in an interactive web platform |
US20140047335A1 (en) * | 2012-08-10 | 2014-02-13 | Gabriel A. LEWIS | Systems and methods for providing and updating live-streaming online content in an interactive web platform |
US20140129973A1 (en) * | 2012-11-08 | 2014-05-08 | Microsoft Corporation | Interaction model for serving popular queries in search box |
US20150195312A1 (en) * | 2014-01-07 | 2015-07-09 | International Business Machines Corporation | Allowing a user to view network contacts of other users when visiting an environment of a different organization |
US10755365B2 (en) | 2014-01-07 | 2020-08-25 | International Business Machines Corporation | Allowing a user to view network contacts of other users when visiting an environment of a different organization |
US10055799B2 (en) | 2014-01-07 | 2018-08-21 | International Business Machines Corporation | Allowing a user to view network contacts of other users when visiting an environment of a different organization |
US9684937B2 (en) * | 2014-01-07 | 2017-06-20 | International Business Machines Corporation | Allowing a user to view network contacts of other users when visiting an environment of a different organization |
US20160283719A1 (en) * | 2015-03-26 | 2016-09-29 | Fujitsu Limited | Method for evaluation, computer-readable recording medium having stored therein program for evaluation, and evaluator |
US20190273776A1 (en) * | 2015-04-14 | 2019-09-05 | SkyKick, Inc. | Server load management for data migration |
US10917459B2 (en) * | 2015-04-14 | 2021-02-09 | SkyKick, Inc. | Server load management for data migration |
US10623482B2 (en) * | 2015-04-14 | 2020-04-14 | SkyKick, Inc. | Server load management for data migration |
US20200045103A1 (en) * | 2015-04-14 | 2020-02-06 | SkyKick, Inc. | Server load management for data migration |
US10447774B2 (en) * | 2015-04-14 | 2019-10-15 | SkyKick, Inc. | Server load management for data migration |
US9973572B2 (en) * | 2015-04-14 | 2018-05-15 | SkyKick, Inc. | Server load management for data migration |
US10298669B2 (en) * | 2015-04-14 | 2019-05-21 | SkyKick, Inc. | Server load management for data migration |
US11362982B2 (en) * | 2017-06-16 | 2022-06-14 | Hcl Technologies Limited | Mail bot and mailing list detection |
CN113326363A (en) * | 2021-05-27 | 2021-08-31 | 北京百度网讯科技有限公司 | Searching method and device, prediction model training method and device, and electronic device |
Also Published As
Publication number | Publication date |
---|---|
US6247043B1 (en) | 2001-06-12 |
CA2265331A1 (en) | 1999-12-11 |
EP0964343A2 (en) | 1999-12-15 |
EP0964343A3 (en) | 2004-07-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6247043B1 (en) | Apparatus, program products and methods utilizing intelligent contact management | |
US10757055B2 (en) | Email conversation management system | |
US7539699B2 (en) | Apparatus, system and method for use in generating and maintaining an electronic address book | |
US7747690B2 (en) | Method for extracting and managing message addresses | |
US6725228B1 (en) | System for managing and organizing stored electronic messages | |
US6212553B1 (en) | Method for sending and receiving flags and associated data in e-mail transmissions | |
CA2449597C (en) | Dynamic collaboration assistant | |
US5873095A (en) | System and method for maintaining current status of employees in a work force | |
US7035903B1 (en) | Systems and methods for the discovery and presentation of electronic messages that are related to an electronic message | |
US20030233419A1 (en) | Enhanced email management system | |
CA2561580C (en) | Displaying conversations in a conversation-based email system | |
US9699129B1 (en) | System and method for increasing email productivity | |
JPH0777380B2 (en) | E-mail tracking system | |
US20060047811A1 (en) | Method and system of providing access to various data associated with a project | |
US20030154212A1 (en) | Method and apparatus for determining attributes among objects | |
US20080040126A1 (en) | Social Categorization in Electronic Mail | |
US20070282660A1 (en) | Task management systems and methods | |
US20050102368A1 (en) | Email attribute system using external databases | |
US20050223058A1 (en) | Identifying messages relevant to a search query in a conversation-based email system | |
US20070130369A1 (en) | Email and Taskmanaging Software | |
WO2000017784A1 (en) | Method of constructing and displaying an entity profile constructed utilizing input from entities other than the owner | |
US8051133B2 (en) | E-mail filing system and method | |
US7756811B2 (en) | Agenda awareness in a communication client | |
JP2000172586A (en) | Mail sorting method and system therefor and recording medium | |
US20060277258A1 (en) | Managing and organizing electronic mail messages via a cross tabulation summary or a histogram |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |