WO2004102858A2 - Deriving contact information from emails - Google Patents

Deriving contact information from emails Download PDF

Info

Publication number
WO2004102858A2
WO2004102858A2 PCT/US2004/015030 US2004015030W WO2004102858A2 WO 2004102858 A2 WO2004102858 A2 WO 2004102858A2 US 2004015030 W US2004015030 W US 2004015030W WO 2004102858 A2 WO2004102858 A2 WO 2004102858A2
Authority
WO
WIPO (PCT)
Prior art keywords
correspondence
addressed
parties
database
relationships
Prior art date
Application number
PCT/US2004/015030
Other languages
French (fr)
Other versions
WO2004102858A3 (en
Inventor
Hunter C. Cohen
Original Assignee
Cohen Hunter C
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cohen Hunter C filed Critical Cohen Hunter C
Publication of WO2004102858A2 publication Critical patent/WO2004102858A2/en
Publication of WO2004102858A3 publication Critical patent/WO2004102858A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking

Definitions

  • This invention is related to data mining and in particular, to deriving and using relations and patterns of relationships from collections of correspondence and the like, such as e-mails.
  • a method for developing contact information from correspondence includes processing a set of correspondence to develop a database of relationships between addressed parties provided by one or more users, maintaining the database by further processing later received correspondence, and utilizing the database of relationships to provide relationship information between at least one of said users and the addressed parties.
  • a unique identification may be associated with each piece of correspondence and used to detect duplications of correspondence in order to more accurately determine a frequency of communication between addressed parties.
  • the database may be maintained on a web based database of relationships in which addressed parties from a plurality of users are combined. Directly and indirectly addressed parties may be processed in correspondence to develop the database of relationships.
  • Connection paths between each of said users and at least some of the addressed parties may be displayed and additional addressed parties may be displayed upon selection of certain displayed addressed parties.
  • Intermediate addressed parties, if any, between users and a selected addressed party may be visually displayed and/or prioritized together with the frequency of correspondence as well as the most recent correspondence between at least some of said addressed parties.
  • the connection paths may be displayed, and/or prioritized in accordance with the closest, most recent, most frequent or some combination of recency, frequency and proximity of the correspondence between users and a selected addressed party.
  • Incoming correspondence may be sorted in accordance with the number of intermediate contacts, if any, identified in the database of relationships between users and the addressors of said incoming correspondence.
  • Outgoing correspondence may be addressed to addressed parties in the database selected in accordance with the number of intermediate contacts, if any, between users and the addressed parties.
  • Data related to the skills and experience of third parties may be processed to identify paths between users and third parties having selected skills and experience.
  • Data related to the shopping experiences of third parties may be processed to identify paths between users and third parties having selected shopping experiences.
  • the database of relationships may be analyzed in accordance with statistic norms to determine any deviations from such statistical norms of the correspondence pattern of selected addressed parties.
  • a method for deriving qualitative information related to addressed parties on correspondence such as emails includes processing a set of correspondence to develop a database of relationships between addressed parties, maintaining the database by further processing later received correspondence, and utilizing the database of relationships to determine patterns of correspondence for one or more of said addressed parties.
  • Indirectly addressed parties on the correspondence may be processed to develop the database of relationships between directly and indirectly addressed parties.
  • Unique identification numbers may be associated with each piece of correspondence and used to detect duplications of correspondence in order to more accurately determine a frequency of communication between said addressed parties.
  • the database of relationships may be maintained on a network, such as the web, in which addressed parties from more than one user may be combined.
  • the frequency of correspondence, and the most recent correspondence, in the database of relationships between addressed parties may be determined.
  • Normal patterns of correspondence between addressed parties may be derived to determine patterns of correspondence for a selected addressed party is consistent with the derived normal patterns.
  • a method for developing contact information from a user's correspondence includes processing a collection of the user's correspondence to develop a database of relationships between said user and parties directly and indirectly addressed in said correspondence, maintaining the database by further processing later received correspondence, and utilizing the database of relationships to provide relationship information between the user and the addressed parties.
  • a unique identification may be associated with each piece of correspondence and used to detect duplications of correspondence before maintaining the database in order to more accurately determine a frequency of communication between the user and the addressed parties.
  • the database may be maintained on a web based database of relationships in which addressed parties from other sources may be combined. Connection paths between the user and at least some of the addressed parties may be displayed and additional addressed parties may also be displayed upon selection of certain displayed addressed parties.
  • Further displays may include intermediate addressed parties, if any, between the user and a selected addressed party, the frequency and most recent correspondence between the user and selected addressed parties while connection paths may be prioritized in accordance with the number of intermediate addressed parties, the most recent correspondence and/or the frequency of correspondence between said user and said pre-selected addressed party.
  • Incoming correspondence may be sorted in accordance with the number of intermediate contacts while outgoing correspondence may be addressed to parties selected in accordance with the number of intermediate contacts.
  • Fig. 1 is an illustration of a correspondence document including primary and secondary directly addressed parties as well as a forwarded document including a series of parties indirectly addressed in the correspondence document.
  • Fig. 2 is a visualization of the various contact paths, and some of the contact path secondary information related to contact path direction, of the document shown in Fig. 1.
  • Fig. 3 is a top level, block diagram flow chart of the operation of the overall technique disclosed for creating and using a database of contacts collected from email records.
  • Fig. 4 is a block level flow chart of the relationship visualization aspects of the technique.
  • Fig. 5 is a display of a relationship tree illustrating the contacts for User A.
  • Fig. 6 is a block level flow chart of the referral path identification aspects of the technique.
  • Fig. 7 is a display of a selected referral path in the relationship tree of Fig. 5.
  • Fig. 8 is a block level flow chart of the SPAM filter.
  • Fig. 9 is a block level flow chart of the marketing tools aspects of the technique.
  • Fig. 10 is a block level flow chart of the skill and experience based path selection aspects of the technique.
  • Fig. 11 is a block level flow chart of the interface with third party software developers.
  • Fig. 12 is a block level flow chart of the shopper connection aspects of the present invention.
  • Fig. 13 is a block level flow chart of the mail scoring service aspects of the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT(S)
  • nexus contacts although linked to Sally's clique only by Sally, are typically strongly linked to one or more other cliques, also with about 300 individuals.
  • These linked circles of acquaintances include multiple chains of acquaintances, as discussed above and may be used to identify potential contact paths between individual and may also be used to create actual contact paths, by for example referrals, between individuals.
  • the individuals within a clique are generally not randomly distributed throughout the general population, however, when we look at a similar size group of "linking" or "nexus" contacts, they are distributed throughout the general population in a surprisingly random pattern. Furthermore, when a small percentage of the population is represented, there is relatively little overlap in the membership between cliques that are connected by the nexus contacts. It is a consequence of this pattern of connection, that the number of individuals just a few handshakes away grows geometrically.
  • This geometric pattern of growth means, in the idealized case, that the average person is only six introductions away from over 300 million people.
  • the idealized case assumes an average clique size of 300, each with 10 nexus individuals and no overlap in member constituents between cliques.
  • the bottom line if you are looking for an introduction to a specific person, there is a very good chance that they are within a few degrees of separation from you.
  • the degrees of separation between two people in this context means the number of intermediary contacts needed to perform an introduction. For example, if Joe knows Sally and wants an introduction to Mary, one of Sally's friends, the degree of separation between Joe and Mary is one degree of separation because one intermediary, Sally, would be required to make an introduction or provide a referral between Joe and Mary.
  • a technique for determining which introductions you need to get to a person you are trying to reach, using information related to addressed parties derived from correspondence, using emails as an example.
  • a personal and private relationship tree is derived from a database of relationships which may be derived from some or all of the addresses of addressed parties included in emails sent or forwarded to you, and then, in a clear and actionable format, the possible contact paths, or paths of introduction, to the person you are trying to reach may be displayed and used.
  • the technique need not be limited to email communication and is applicable for other types of correspondence where a record of the communicating parties may be made available electronically. Examples include phone records, as from telephone bills, instant messaging logs, or similar compendiums of contact data.
  • the term "Relationship Finder" refers to the techniques for automatically building a personal and private relationship tree and the tools to access this information.
  • NQ Exus Quotient
  • ENQ Estimated Nexus Quotient
  • World View refers to an online subscription service that can be used to expand the reach of a user's database by enabling password protected access to the relationship trees of other subscribers in one or more predefined groups.
  • Skills Registry refers to an online service where individuals record their education, expertise, skills and experience, enabling users to search their relationship trees for introductions to people with specific qualifications.
  • Referral Marketing Toolkit refers to techniques allowing users to market products to their relationship tree through qualified referrals from people they know.
  • SpamGate refers to techniques for using knowledge of the addresses in a user's relationship tree to intelligently filter out unwanted bulk email solicitations, while insuring that all the messages they want get through.
  • email scoring service refers to a service that scores an email address based upon its observed frequency and pattern of communication as compared to some statistical norm.
  • One of the possible uses for the email scoring service is to provide a predictive assessment of the likelihood that a particular address is being used for valid commerce versus dishonest use. That is, an email address may be scored to indicate that it has been involved in a normal pattern of communications for a reasonable length of time or it may be scored to indicate that it has been used in a pattern of communication, such as only for outward bound mailings, that is not indicative of a normal email address for an individual. This information may be arrived at without regard to the identity of the email address holder and without regard to any specific individuals with whom communication has taken place.
  • Referral endorsement services refers to a service that can be integrated with retail commerce websites, auction websites, and other public websites with the purpose of providing website visitors a means to obtain website specific endorsements and or references from individuals they know or can reach indirectly.
  • the Email Relationship Finder may be provided as a "stand alone” software product or as a "plug-in” to Microsoft Outlook® and Outlook Express® or other email clients and may run on Microsoft Windows® 95, 98, 2000, NT and XP or other operating systems. In other embodiments, the Email Relationship Finder may work directly (either client-side or server-side) with POP3, MAPI, I MAP, and Hotmail or similar compliant online email account protocols.
  • the Email Relationship Finder may be used for extracting email or addressed party relationship pair information and also may serve as a user interface to the other services.
  • the discovery of additional email stores, and the selection of logical locations to search for additional valid addresses, may be valuable steps in expanding the breadth and depth of a database of relationships. For instance, consider that in Microsoft Outlook, it would not be prudent to search the "inbox” or “deleted” folders since they will invariably contain "spam" from people with whom the user has no relationship.
  • discovery and/or selection of folders may happen automatically and all emails could be analyzed without concern of pre-selection.
  • global information related to spam characteristics may optionally be employed to eliminate those communications from analysis.
  • Extraction, or parsing, of email addresses from all email headers and positional recognition of email addresses in text files, such as may be found in forwarded attachments, is an important step in the process. Extraction may be limited to the directly and indirectly addressed parties by for example extracting addresses following the "From:", “To:”, and "Cc:” markers on the email correspondence being processed and as well as on forwarded emails attached thereto.
  • the extraction process may optionally also extract secondary information, when present, related for example to the direction of the correspondence by extracting the email text labels attached to the email address and the date of communication (either sent date or received date).
  • the email internet ID may also be extracted for use in preventing duplicate emails from being parsed.
  • the process may provide the automatic building and maintenance of databases of relationships, such as relationship tree databases, on a logical local drive that may optionally be user selectable, from all extracted email addresses and "screen names" automatically as part of the extraction/parsing functionality.
  • databases of relationships such as relationship tree databases
  • logical local drive may optionally be user selectable, from all extracted email addresses and "screen names" automatically as part of the extraction/parsing functionality.
  • separate relationship trees may be maintained matching the separate lists of grouped folders processed.
  • the user may have control over and may maintain preferences for his relationship tree with respect to database sharing and privacy in conjunction with the online services.
  • the user may have control over, and may maintain preferences separately, for each relationship tree.
  • the data stored in the relationship tree databases may contain additional or secondary information, but for each instance of every email address pair extracted, the following information typically may be collected and stored: The email addresses forming each "end" of the email pair.
  • the relationship database may be cross referenced to other local, public, or private third party databases that are indexed by email address and contain relevant information that may be of interest either as a search term or a search result.
  • Report Display options may include:
  • the World View may be available by subscription that allows users to share selected personal relationship tree databases via a centralized online database and to gain access to a larger universe of email address paths than they have individually.
  • Access to the shared trees may be limited to the addresses on the direct path between addresses contained on the subscribers database and the target address. Therefore subscribers may only be shown email address information on paths that originated in their personal contact trees and end with the target address, i.e. the shared and personal relationship trees connect through a common email address.
  • users that share access may have full view of each others' information.
  • Each user optionally may maintain a list of email addresses that are to be excluded from the shared tree. Any time excluded addresses are encountered, those addresses, and any down-line addresses in those chains, may not transferred to the online database.
  • the Skills Registry may consist of two web based components that together allow introduction paths to people to be determined based upon the "target's" qualifications rather than knowledge of their email address.
  • the first component of the Skills Registry is a web based registry that may allow any individual, whether or not they are users of the email relationship finder, to enroll in the service and record their education, expertise, skills and experience on a secure and restricted database.
  • the enrollee can revisit the site at any time to update or modify their profile.
  • the profile is compiled by selecting from an extensive list (with optional temporal qualifiers; such as when, how long) of job functions, job titles, company names, school degrees, schools attended, professional development programs, professional expertise, geographic information, family information, hobbies, interests, etc.
  • Free form information may be the contact information, address, telephone, etc., and a non searchable file attachment, typically a resume, curriculum vitae, or portfolio.
  • the amount of information provided is at the discretion of the enrollee.
  • the enrollee must enter at least an email address. Each email address entered may receive a coded reply that may require a separate response before it is authorized in order to insure the validity of the address and its owner information.
  • the enrollee may also enter the maximum distance in degrees of separation that a inquirer can be from the enrollee in order to have access to this information.
  • the Profile information is used to generate search results.
  • the free form information, if any, is provided to inquirers that find the enrollee as a result of a profile search. In either case, the information can be restricted so that it is only accessible to inquirers within the distance defined by the enrollee.
  • registry users may be offered the option of learning their Estimated Nexus Quotient (ENQ) which is based largely upon the frequency and position that their email address appears in the global database of all users.
  • ENQ Estimated Nexus Quotient
  • the second component allows World View users to search their relationship trees for introductions to people with specific qualifications.
  • the Referral Marketing Toolkit ® allows users to market Email Relationship Finder and other select products. Once the software is installed, a popup window may periodically present an offer to promote the Email Relationship Finder product, and selected other tools, to all zero and one degree of separation email addresses, i.e. those addresses that have had direct contact with the user and need no intermediary introduction or need only one intermediary introduction.
  • the offer may provide some form of compensation, such as cash for each unit sold to the first degree address holder, or as a prize based upon the most units sold by referral, or with earned MLM points that are good to redeem products.
  • each referrer that provided the introduction prior to the purchase fractionally shares the credit.
  • a "multi-level marketing" or MLM version of this promotion plan allows credit to be awarded for "down line" sales as well.
  • a user can choose from a short list of pre-scripted promotional letters where a portion is user editable.
  • the letter is from the registered user's email address and each copy is individually addressed to all zero and one degree email addresses in the users contact tree.
  • the zero degree and one contact list is sent to a mail server that handles the outbound mailing for the user avoiding ISP bulk mail restriction issues, and at the same time, this facilitates tracking of referrals for reward purposes.
  • Each promotion has a unique identifier and the list server will only send the first 3 of a given promotion to an individual. This avoids over mailing popular promotions from a large number of users. If the user does not participate in the promotion, they are asked again periodically. An option to turn off this prompting is available.
  • active users may be offered to promote selected products using the same method and with various compensation or prizes.
  • Extended functionality may be available in which a special email composition tool may be provided for the user to market their own products.
  • referral marketing program may allow users to check off product types that they have interest in. When a user sends other users promotional letters, even through non-user intermediaries, they only go to those users that have interest in the types of products being marketed.
  • SpamGate installation may add "quarantine" folders to the user's email client, such as: lnbox_Filtered; lnbox_FollowUP; Deleted_Spam; and Saved_By_Name.
  • a toolbar may be added with selections such as
  • Emails that are deleted in step 4 or 5, or as a result of being placed on a list by steps 4 or 5, may be moved into the Deleted_Spam folder. Going to that folder and using the new Undelete key moves the message to the normal inbox and removes the email address or content from the always delete lists, but this may not return deleted email addresses to the relationship tree.
  • correspondence comes in many forms including printed correspondence delivered by post or forwarded by facsimile, email correspondence as well special purpose correspondence such as telephone bills.
  • Document 11 is a piece of correspondence sent by Tom, the addressor, to Bill, the addressee.
  • Bill and Tom are the primary addressed parties and form a correspondence, or contact pair, at the ends of a contact or correspondence path from Tom to Bill.
  • there may be other parties to the correspondence addressed at a different level such as secondary addressees Jane and John, who are addressed directly in document 11 by being indicated to receive copies of document 11.
  • Jane and John are each separate direct addressees at the end of a contact path from Tom although they have some level of connection as noted below.
  • Certain types of correspondence may also include addressed parties not directly addressed, that is indirectly addressed, in the current document.
  • document 11 may be a document forwarding a copy of other correspondence, such as document 13, which includes indirectly addressed parties Jim, George, Mary, Tom and John.
  • Other types of correspondence such as telephone bills, may include indirectly addressed parties in that information such as each identified telephone number called indicates at least one address form representing an addressed party even though the phone bill is not directed to any of these indirectly addressed parties.
  • Each indirectly addressed party on a telephone bill may be on the end of a contact path from the phone bill's addressee while the primary or direct contact path is from the phone company to the billed addressee.
  • each addressed party in a piece of correspondence may be said to have a relationship, such as a contact path, with the other directly addressed parties.
  • Bill and Tom may be said to be the ends of a contact pair as a result of document 11.
  • This contact pair may be identified by contact path 15 from Tom, the addressor, to Bill, the addressee.
  • the direction of the path may be indicated by the direction of the arrowhead or other means on contact path 15.
  • Jane and John are each at the end of a contact path from Tom shown as contact paths 17 and 19, respectively.
  • Contact paths in addition to having at least a pair of addressed parties, also at least potentially include additional or secondary information, such as the direction of flow of the correspondence and/or whether or not the parties were directly or indirectly addressed in the document being considered, such as document 11. Additionally this information could include all the dates of communication, pointers identifying the specific communication or the source of communication or any other meaningful information that can be extracted from the original source data.
  • contact paths 15, 17, 19, 21 , 23, 25 and 27 are shown with arrowheads to indicate the direction of contact
  • contact paths between addressed parties may therefore include secondary information such as the direction of correspondence as well as the addressed pair of parties.
  • data collected with regard to addressed parties may include such secondary information for some types of contact paths and may not include such secondary information for other types of contact paths.
  • Fig. 3 the process will be described in terms of steps taken with regard to a first user, User A, to develop a local data file, and/or the combination of that data with data from a similar user, such User B not shown, to create a web relational data base or database of relationships, followed by descriptions of a series of services or tools that may interact with the database of relationships.
  • step 10 operates to choose a group of email records to process.
  • record headers or equivalent text are parsed, including those in nested or forwarded email messages, in order to retrieve email addresses for all addressed parties along with From:, To: and Cc: relationships for each address.
  • data may be extracted, or an algorithm may be applied to each email and attachments, that provides a unique numeric result for each email processed as a unique source ID.
  • data may be written to a data store such as a local hard drive, for example as a relational or flat file 18, to temporarily store the extracted email headers and relationship information as well as the unique source ID.
  • a UDDI Universal Discover, Description and Integration database
  • a UDDI is a standards based XML database with restricted or controlled access to the data.
  • data is uploaded to a central web based relational database 20 which is protected by user ID and password available only to the user.
  • the user may optionally designate other users that have permission to access the owner's data.
  • the data to be written to relational data base 20 may then be processed by server side database pre-processing operations in step 40 with filters that prevent duplicates and process only incremental data from the flat file.
  • Step 40 may also key data to the user providing that data so it is only accessible by authorized users which may have been designated in step 24.
  • Step 40 in addition to uploading the preprocessed data to relational database 20, may also cause the writing back of data to local files, such as data file 18, to facilitate further processing by reducing need to reprocess previously processed data.
  • relational database 20 which may conveniently be accessible to a group of users by for example being located on a central server in a local network or preferably in a wide area network such as the Internet, various processes or tools may be used to work with this data.
  • relationship visualization tool 44 may provide visualization by display for the user of contact relationship data in central database 20 by loading the data in step 46 that the user is authorized to access.
  • data points representing contacts or addressed parties may be arranged to identify the most frequent links.
  • Color codes based upon recency of contact and/or degrees of separation, may be assigned.
  • the spatially arranged and color coded results may then be displayed on display monitor 50.
  • the results displayed on monitor 50 may represent the relationships, and paths there between, beginning with the user and extending through all contacts, or addressed parties, disclosed in the emails, or other source of data, processed by the steps disclosed and may be referred to herein as a relationship tree which shows the direct and indirect relationships of a user.
  • the data visualized from database 20 may show, for example, that User A has direct relationships, at least with regard to one or more existing emails, with Contacts B and E, while Contact B has additional direct relationships with Contacts C and F while Contact C has a direct relationship with Contact D and Contact E has a direct relationship with Contact F.
  • a typical useful visualization display of this type may be much more complicated than as shown in Fig. 5, it is apparent that User A may much more easily comprehend that he can make contact with Contact D via Contacts B and C by viewing the visualization in Fig. 5 than be reading the above provided text.
  • referral path identification 52 operates on the data, in step 54, by loading data that the user is authorized to access.
  • the user may then input target email address(s), or any other valid search criteria such as that available from directories cross referenced to email addresses, in step 56.
  • the data and email address(s) may then be processed in step 58 using a breadth-wise incremental search to determine linkage paths which are then used to create display 60 in which the results may be displayed as highlighted paths or list of contacts.
  • the closest path between User A and Contact D is shown as the highlighted path via Contacts B and F. It should be noted that a similar length path happens to exist via Contacts E and F, but is not shown as highlighted.
  • the selection of the path via Contacts B and F may be made automatically in processing step 58 on the basis of the most recent contacts made along this path of parts of it, on the basis of the number of contacts made along this path of parts of it and preferably upon a combination of both the above described recency and frequency criteria.
  • Spam filter 62 may operate upon data provided by the user in step 64 indicating the degrees of freedom or separation, the to use as a filter on the data loaded in step 66.
  • a single degree of freedom or a single step of separation refers to a direct contact, such as the relationship between User A and Contact B in Fig. 5.
  • a second degree of freedom, or two steps of separation refers to the indirect relationship between User A and Contacts C and D in Fig. 5.
  • inbound emails with origination addresses that match relationship tree addresses in accordance with the degrees of freedom data provided in step 64 are placed in a filtered inbox.
  • Inbound emails with origination addresses not matching addresses on the relationship tree may be left in the general inbox for review or may be further filtered based on other criteria to evaluate the likelihood that they are undesired emails such as SPAM.
  • multilevel marketing (MLM) & referral marketing step 70 combines the degrees of separation selection provided by the user in step 72, and a marketing offer or other letter provided by the user in step 74, with data loaded in step 76 to personalize each letter with the referrer's email address in merge program 78.
  • MLM multilevel marketing
  • skill registry tool 80 may be used to obtain introductions to individuals with specific skills.
  • the user provides a selected degree of separation in step 82 together with data related to the desired skill set, and/or experience, in step 84 which are compared with the relationship tree lists to form a qualified email list 86.
  • List 86 may be further processed in step 88 with a breadth-wise incremental search to determine linkage paths for creating display 90 which may display results as highlighted paths or list of contacts.
  • Other directories may be cross referenced to provide expanded search capabilities.
  • online registry 92 may be made available for individuals to post answers to detailed questions about their skills and experience while providing an email address. Data from online registry 92 may then be loaded from database 20 in step 94 and added for processing in list 86 to further qualify the email lists.
  • interface 96 may be used to provide and monitor licensed access to data in step 98 in which data is made available to third party software providers who can develop products that utilize the relationship tree database. Access to the data remains restricted to the owners of the data.
  • interface 100 may be used to provide a user with a reference from an individual known to the user regarding commerce activities at a participating website.
  • a context sensitive link 102 allows the user to expose their relationship tree 108, and the website to expose a visitor history file 112 from patrons who have elected to participate at 110.
  • the data is then matched for relevance in step 104 and then filtered data is made available to the user in step 106, where a list of potential endorsers is made known, possible with their posted comments.
  • interface 120 may be used to provide credit issuers (or credit card sales retailers) an additional means of evaluating the credit worthiness of a particular transaction.
  • Proprietary algorithms are employed at 122 to periodically review the pattern of connections of all email addresses in the database. This is performed on communication link history from all relationship trees without regard to the owners of the information. The algorithm assigns a "score" that indicates a deviation from "normal” usage.
  • Authorized subscribers can make inquiries at 124 that reveal the "score” at 126.
  • Authorized subscribers use this information along with other information they already have to help them in their decision regarding the validity of the transaction.

Abstract

Developing a database of relationships from emails (11) between parties and addressing the correspondence including forwarded correspondence (13). The database is used to determine the contact paths between parties. Patterns of correspondence, including frequency and recency of correspondence are detected and displayed. Statistically normal patterns of correspondence is derived in order to determine if correspondence patterns for selected addressed parties deviate there from.

Description

DERIVING CONTACT INFORMATION FROM EMAILS
Background of the Invention
1. Related Applications:
This application claims the priority of US Provisional Application Serial No. 60/470,000 filed May 13, 2003.
2. Field of the Invention:
This invention is related to data mining and in particular, to deriving and using relations and patterns of relationships from collections of correspondence and the like, such as e-mails.
3. Description of the Prior Art:
We have all had the experience of meeting someone for the first time and quickly discovering that you are "connected" by an unexpected chain of acquaintances, often a short chain of only two or three people. In fact this occurrence is so common that we have a catch phrase response that most everybody uses "It's a small world", and even a play based on the phenomena, John Guare's "Six Degrees of Separation".
With the U.S. population just over 290 million and almost 6 billion more in the rest of the world, how can this "small world phenomena" be such a common occurrence, and is there a way to systematically employ it to our benefit?
What are needed are techniques for determining and using data to derive and exploit these chains of acquaintances. Summary of the Invention
In a first aspect, a method for developing contact information from correspondence such as emails includes processing a set of correspondence to develop a database of relationships between addressed parties provided by one or more users, maintaining the database by further processing later received correspondence, and utilizing the database of relationships to provide relationship information between at least one of said users and the addressed parties.
A unique identification may be associated with each piece of correspondence and used to detect duplications of correspondence in order to more accurately determine a frequency of communication between addressed parties. The database may be maintained on a web based database of relationships in which addressed parties from a plurality of users are combined. Directly and indirectly addressed parties may be processed in correspondence to develop the database of relationships.
Connection paths between each of said users and at least some of the addressed parties may be displayed and additional addressed parties may be displayed upon selection of certain displayed addressed parties. Intermediate addressed parties, if any, between users and a selected addressed party may be visually displayed and/or prioritized together with the frequency of correspondence as well as the most recent correspondence between at least some of said addressed parties. The connection paths may be displayed, and/or prioritized in accordance with the closest, most recent, most frequent or some combination of recency, frequency and proximity of the correspondence between users and a selected addressed party. Incoming correspondence may be sorted in accordance with the number of intermediate contacts, if any, identified in the database of relationships between users and the addressors of said incoming correspondence. Outgoing correspondence may be addressed to addressed parties in the database selected in accordance with the number of intermediate contacts, if any, between users and the addressed parties. Data related to the skills and experience of third parties may be processed to identify paths between users and third parties having selected skills and experience. Data related to the shopping experiences of third parties may be processed to identify paths between users and third parties having selected shopping experiences. The database of relationships may be analyzed in accordance with statistic norms to determine any deviations from such statistical norms of the correspondence pattern of selected addressed parties.
In another aspect, a method for deriving qualitative information related to addressed parties on correspondence such as emails includes processing a set of correspondence to develop a database of relationships between addressed parties, maintaining the database by further processing later received correspondence, and utilizing the database of relationships to determine patterns of correspondence for one or more of said addressed parties. Indirectly addressed parties on the correspondence may be processed to develop the database of relationships between directly and indirectly addressed parties.
Unique identification numbers may be associated with each piece of correspondence and used to detect duplications of correspondence in order to more accurately determine a frequency of communication between said addressed parties. The database of relationships may be maintained on a network, such as the web, in which addressed parties from more than one user may be combined. The frequency of correspondence, and the most recent correspondence, in the database of relationships between addressed parties may be determined. Normal patterns of correspondence between addressed parties may be derived to determine patterns of correspondence for a selected addressed party is consistent with the derived normal patterns.
In a still further aspect, a method for developing contact information from a user's correspondence such as emails, includes processing a collection of the user's correspondence to develop a database of relationships between said user and parties directly and indirectly addressed in said correspondence, maintaining the database by further processing later received correspondence, and utilizing the database of relationships to provide relationship information between the user and the addressed parties. A unique identification may be associated with each piece of correspondence and used to detect duplications of correspondence before maintaining the database in order to more accurately determine a frequency of communication between the user and the addressed parties. The database may be maintained on a web based database of relationships in which addressed parties from other sources may be combined. Connection paths between the user and at least some of the addressed parties may be displayed and additional addressed parties may also be displayed upon selection of certain displayed addressed parties.
Further displays may include intermediate addressed parties, if any, between the user and a selected addressed party, the frequency and most recent correspondence between the user and selected addressed parties while connection paths may be prioritized in accordance with the number of intermediate addressed parties, the most recent correspondence and/or the frequency of correspondence between said user and said pre-selected addressed party. Incoming correspondence may be sorted in accordance with the number of intermediate contacts while outgoing correspondence may be addressed to parties selected in accordance with the number of intermediate contacts. Brief Description of the Drawings
Fig. 1 is an illustration of a correspondence document including primary and secondary directly addressed parties as well as a forwarded document including a series of parties indirectly addressed in the correspondence document.
Fig. 2 is a visualization of the various contact paths, and some of the contact path secondary information related to contact path direction, of the document shown in Fig. 1.
Fig. 3 is a top level, block diagram flow chart of the operation of the overall technique disclosed for creating and using a database of contacts collected from email records.
Fig. 4 is a block level flow chart of the relationship visualization aspects of the technique.
Fig. 5 is a display of a relationship tree illustrating the contacts for User A.
Fig. 6 is a block level flow chart of the referral path identification aspects of the technique.
Fig. 7 is a display of a selected referral path in the relationship tree of Fig. 5.
Fig. 8 is a block level flow chart of the SPAM filter.
Fig. 9 is a block level flow chart of the marketing tools aspects of the technique.
Fig. 10 is a block level flow chart of the skill and experience based path selection aspects of the technique.
Fig. 11 is a block level flow chart of the interface with third party software developers.
Fig. 12 is a block level flow chart of the shopper connection aspects of the present invention.
Fig. 13 is a block level flow chart of the mail scoring service aspects of the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT(S)
Why the "small world phenomena" occurs in the first place we believe is a function of the following factors. The average person has a loose clique of friends and acquaintances that form based to a considerable extent upon happenstance, but strongly influenced by a number of less random factors such as an individuals job position and location, schools attended, schools children attend, financial status, hobbies, religious practices, commuting habits, stores frequented, participation in community activities, and the long list of other activities that comprise everyday life. The "circle of acquaintances" that make up these cliques appear typically to number from 200 to 400 individuals. Obviously there are exceptions to the rule, the recluse that knows only his mailman, or the town socialite who seems to know everyone, and the actual number depends on many circumstances. For convenience, an average number of 300 individuals in a circle of acquaintances will be used.
Almost by definition, the nature of these cliques causes many if not most of the members to share essentially the same acquaintances. Inevitably however, if an arbitrary member, let's call her Sally, carefully maps the relationships between all the people she socializes with, she will find that a small subset of her clique will know almost none of the other members except for those where Sally made the introduction. These friends that are members of Sally's clique solely by virtue of their relationship with Sally are usually strong links to other cliques and may be called "nexus contacts". There appear typically to be on the order of about 5 to 15 nexus contacts per clique, for this discussion, an average of 10 will be used. These nexus contacts, although linked to Sally's clique only by Sally, are typically strongly linked to one or more other cliques, also with about 300 individuals. These linked circles of acquaintances include multiple chains of acquaintances, as discussed above and may be used to identify potential contact paths between individual and may also be used to create actual contact paths, by for example referrals, between individuals. The individuals within a clique are generally not randomly distributed throughout the general population, however, when we look at a similar size group of "linking" or "nexus" contacts, they are distributed throughout the general population in a surprisingly random pattern. Furthermore, when a small percentage of the population is represented, there is relatively little overlap in the membership between cliques that are connected by the nexus contacts. It is a consequence of this pattern of connection, that the number of individuals just a few handshakes away grows geometrically.
This geometric pattern of growth means, in the idealized case, that the average person is only six introductions away from over 300 million people. The idealized case assumes an average clique size of 300, each with 10 nexus individuals and no overlap in member constituents between cliques. The bottom line, if you are looking for an introduction to a specific person, there is a very good chance that they are within a few degrees of separation from you. The degrees of separation between two people in this context means the number of intermediary contacts needed to perform an introduction. For example, if Joe knows Sally and wants an introduction to Mary, one of Sally's friends, the degree of separation between Joe and Mary is one degree of separation because one intermediary, Sally, would be required to make an introduction or provide a referral between Joe and Mary.
A technique is disclosed for determining which introductions you need to get to a person you are trying to reach, using information related to addressed parties derived from correspondence, using emails as an example. A personal and private relationship tree is derived from a database of relationships which may be derived from some or all of the addresses of addressed parties included in emails sent or forwarded to you, and then, in a clear and actionable format, the possible contact paths, or paths of introduction, to the person you are trying to reach may be displayed and used. The technique need not be limited to email communication and is applicable for other types of correspondence where a record of the communicating parties may be made available electronically. Examples include phone records, as from telephone bills, instant messaging logs, or similar compendiums of contact data. The term "Relationship Finder" refers to the techniques for automatically building a personal and private relationship tree and the tools to access this information.
The terms "Nexus Quotient" (or NQ) and "Estimated Nexus Quotient" (or ENQ) refer to two methods of providing a normalized measure of the extent of an individual's connections as evidenced by his or her communications history.
The term "World View" refers to an online subscription service that can be used to expand the reach of a user's database by enabling password protected access to the relationship trees of other subscribers in one or more predefined groups.
The term "Skills Registry" refers to an online service where individuals record their education, expertise, skills and experience, enabling users to search their relationship trees for introductions to people with specific qualifications.
The term "Referral Marketing Toolkit" refers to techniques allowing users to market products to their relationship tree through qualified referrals from people they know.
The term SpamGate" refers to techniques for using knowledge of the addresses in a user's relationship tree to intelligently filter out unwanted bulk email solicitations, while insuring that all the messages they want get through.
The term "email scoring service" refers to a service that scores an email address based upon its observed frequency and pattern of communication as compared to some statistical norm. One of the possible uses for the email scoring service is to provide a predictive assessment of the likelihood that a particular address is being used for valid commerce versus dishonest use. That is, an email address may be scored to indicate that it has been involved in a normal pattern of communications for a reasonable length of time or it may be scored to indicate that it has been used in a pattern of communication, such as only for outward bound mailings, that is not indicative of a normal email address for an individual. This information may be arrived at without regard to the identity of the email address holder and without regard to any specific individuals with whom communication has taken place.
Referral endorsement services refers to a service that can be integrated with retail commerce websites, auction websites, and other public websites with the purpose of providing website visitors a means to obtain website specific endorsements and or references from individuals they know or can reach indirectly.
The Email Relationship Finder may be provided as a "stand alone" software product or as a "plug-in" to Microsoft Outlook® and Outlook Express® or other email clients and may run on Microsoft Windows® 95, 98, 2000, NT and XP or other operating systems. In other embodiments, the Email Relationship Finder may work directly (either client-side or server-side) with POP3, MAPI, I MAP, and Hotmail or similar compliant online email account protocols.
The Email Relationship Finder may be used for extracting email or addressed party relationship pair information and also may serve as a user interface to the other services. The discovery of additional email stores, and the selection of logical locations to search for additional valid addresses, may be valuable steps in expanding the breadth and depth of a database of relationships. For instance, consider that in Microsoft Outlook, it would not be prudent to search the "inbox" or "deleted" folders since they will invariably contain "spam" from people with whom the user has no relationship. In an alternate embodiment, it is possible to optionally maintain separate lists to process, each with multiple folders to search, in the event users wish to maintain separate relationship trees, such as business, personal, school, etc. A given folder may reside on multiple lists. In still another embodiment, discovery and/or selection of folders may happen automatically and all emails could be analyzed without concern of pre-selection. In this embodiment, global information related to spam characteristics may optionally be employed to eliminate those communications from analysis. Extraction, or parsing, of email addresses from all email headers and positional recognition of email addresses in text files, such as may be found in forwarded attachments, is an important step in the process. Extraction may be limited to the directly and indirectly addressed parties by for example extracting addresses following the "From:", "To:", and "Cc:" markers on the email correspondence being processed and as well as on forwarded emails attached thereto. The extraction process may optionally also extract secondary information, when present, related for example to the direction of the correspondence by extracting the email text labels attached to the email address and the date of communication (either sent date or received date). The email internet ID may also be extracted for use in preventing duplicate emails from being parsed.
The process may provide the automatic building and maintenance of databases of relationships, such as relationship tree databases, on a logical local drive that may optionally be user selectable, from all extracted email addresses and "screen names" automatically as part of the extraction/parsing functionality. In an alternate embodiment, separate relationship trees may be maintained matching the separate lists of grouped folders processed.
The user may have control over and may maintain preferences for his relationship tree with respect to database sharing and privacy in conjunction with the online services. In the alternate embodiment, the user may have control over, and may maintain preferences separately, for each relationship tree.
Optional embodiments may provide the user the ability to:
1 ) Maintain of a list of alternative (alias) email addresses that the user uses. All link searches may begin by default with these addresses.
2) Maintain lists of alias email addresses for their contacts so that all alias addresses may be automatically known to be the same contact when performing searches.
3) Maintain a global list, and individual lists, of email addresses to exclude from the relationship tree databases. The data stored in the relationship tree databases may contain additional or secondary information, but for each instance of every email address pair extracted, the following information typically may be collected and stored: The email addresses forming each "end" of the email pair.
The latest email communication date.
A pointer linking the email addresses that defines the contact pair relationship and direction of communication and the frequency of communication between the two addresses. A unique original email ID# to prevent duplicate processing. This is collected for each message processed, not each pair.
In alternate embodiments, the relationship database may be cross referenced to other local, public, or private third party databases that are indexed by email address and contain relevant information that may be of interest either as a search term or a search result.
The following reporting options may also be made available:
Ability to list all email addresses alphabetically by the degree of separation or visa versa. Ability to export email addresses to spreadsheets, with degrees of separation, or address books, with the category coded to show the source relationship tree name and degree of separation.
Ability to choose target email addresses with a list of alternates because many people have several email addresses. Ability to maintain several lists, that the user can select or deselect, of email addresses to exclude from email chains.
Ability to choose up to how many degrees of separation to report.
Ability to change default maximum number of linkages to show.
Ability to choose date range to include based upon email received date. Ability to list which email relationship trees to run search on.
Ability to override the default origin address and input a separate address to view chains between other individuals. Report Display options may include:
View on screen a text based report of results. View on screen a graphic report or display of results. Write to word processing file.
Write to spreadsheet file (by degree of separation and for 1st degree or greater showing link addresses in successive columns). Display/Hide date of email.
The World View may be available by subscription that allows users to share selected personal relationship tree databases via a centralized online database and to gain access to a larger universe of email address paths than they have individually. Access to the shared trees may be limited to the addresses on the direct path between addresses contained on the subscribers database and the target address. Therefore subscribers may only be shown email address information on paths that originated in their personal contact trees and end with the target address, i.e. the shared and personal relationship trees connect through a common email address. In other embodiments, users that share access may have full view of each others' information.
Each user optionally may maintain a list of email addresses that are to be excluded from the shared tree. Any time excluded addresses are encountered, those addresses, and any down-line addresses in those chains, may not transferred to the online database.
The Skills Registry may consist of two web based components that together allow introduction paths to people to be determined based upon the "target's" qualifications rather than knowledge of their email address.
The first component of the Skills Registry is a web based registry that may allow any individual, whether or not they are users of the email relationship finder, to enroll in the service and record their education, expertise, skills and experience on a secure and restricted database. The enrollee can revisit the site at any time to update or modify their profile. The profile is compiled by selecting from an extensive list (with optional temporal qualifiers; such as when, how long) of job functions, job titles, company names, school degrees, schools attended, professional development programs, professional expertise, geographic information, family information, hobbies, interests, etc. Free form information may be the contact information, address, telephone, etc., and a non searchable file attachment, typically a resume, curriculum vitae, or portfolio. The amount of information provided is at the discretion of the enrollee. The enrollee must enter at least an email address. Each email address entered may receive a coded reply that may require a separate response before it is authorized in order to insure the validity of the address and its owner information. The enrollee may also enter the maximum distance in degrees of separation that a inquirer can be from the enrollee in order to have access to this information. The Profile information is used to generate search results. The free form information, if any, is provided to inquirers that find the enrollee as a result of a profile search. In either case, the information can be restricted so that it is only accessible to inquirers within the distance defined by the enrollee. As an incentive to enroll in the registry, registry users may be offered the option of learning their Estimated Nexus Quotient (ENQ) which is based largely upon the frequency and position that their email address appears in the global database of all users.
The second component allows World View users to search their relationship trees for introductions to people with specific qualifications.
The Referral Marketing Toolkit® allows users to market Email Relationship Finder and other select products. Once the software is installed, a popup window may periodically present an offer to promote the Email Relationship Finder product, and selected other tools, to all zero and one degree of separation email addresses, i.e. those addresses that have had direct contact with the user and need no intermediary introduction or need only one intermediary introduction. The offer may provide some form of compensation, such as cash for each unit sold to the first degree address holder, or as a prize based upon the most units sold by referral, or with earned MLM points that are good to redeem products. When a purchaser is referred by more than one source or more than one time, each referrer that provided the introduction prior to the purchase fractionally shares the credit. A "multi-level marketing" or MLM version of this promotion plan allows credit to be awarded for "down line" sales as well.
If a user agrees to participate in the promotion, then the user can choose from a short list of pre-scripted promotional letters where a portion is user editable. The letter is from the registered user's email address and each copy is individually addressed to all zero and one degree email addresses in the users contact tree. When the user sends out promotions, the zero degree and one contact list is sent to a mail server that handles the outbound mailing for the user avoiding ISP bulk mail restriction issues, and at the same time, this facilitates tracking of referrals for reward purposes. Each promotion has a unique identifier and the list server will only send the first 3 of a given promotion to an individual. This avoids over mailing popular promotions from a large number of users. If the user does not participate in the promotion, they are asked again periodically. An option to turn off this prompting is available.
From time to time, active users may be offered to promote selected products using the same method and with various compensation or prizes.
Extended functionality may be available in which a special email composition tool may be provided for the user to market their own products.
Other embodiments of the referral marketing program may allow users to check off product types that they have interest in. When a user sends other users promotional letters, even through non-user intermediaries, they only go to those users that have interest in the types of products being marketed.
SpamGate is a spam filtering tool that in one embodiment works as follows:
1. SpamGate installation may add "quarantine" folders to the user's email client, such as: lnbox_Filtered; lnbox_FollowUP; Deleted_Spam; and Saved_By_Name. In addition, a toolbar may be added with selections such as
Delete Content, Delete Email Address, Undelete, File As, Follow Up, and/or Auto File buttons. 2. When SpamGate is active, emails that arrive go through a "vetting" process to filter the incoming messages. The user first decides how many degrees of separation on their relationship tree to use when matching incoming email addresses with relationship tree addresses. The assumption is that spam will not be coming from email addresses that are part of acceptable correspondence. When a "From:" email address matches a relationship tree address, the email goes into a special inbox-filtered folder otherwise it goes to the normal inbox.
In one embodiment, as the users view email in their normal inbox, they have several options:
1. They can move the email to a folder set to process addresses into a relationship tree and therefore add the addresses to a vetted list.
2. They can move the email to a folder set only to add the addresses to a vetted list but not process addresses into a relationship tree.
3. They can move the emails to a folder set to not do anything or use the normal delete key and the addresses will be added to none of the lists.
4. They can use the Delete Email address button and the address will be moved to a list where all future emails from that address will be deleted automatically. In the event that the address already exists in the user's relationship tree, the user is asked if that address should be deleted from the tree as well. If the answer is yes, then those address occurrences and all their down-line chains are removed as well.
5. They can use the Delete Content button and whenever the same content of the message arrives, regardless of the sender, the message will be deleted automatically. A formula converts each message to a unique number to accomplish the required matching. After the Delete Content key is pressed, the email does not move until either the normal delete key or the Delete Email address key is pressed (allowing the content and address to be placed on automatic delete lists as well, if desired).
6. They can use the Follow Up button and the email will be moved to the "lnbox_FollowUp" folder. A popup window asks when to follow up. When the follow up date and time is reached, if the email is still in the folder, it is automatically forwarded, from screen name Follow_Up, to the lnbox_filtered folder using the then current date and time and it is marked as unread.
7. They can use the File As button and the email will be moved to a subfolder of the Saved_By_Name folder. A popup window asks to name the subfolder as either the sender's email address, the sender's screen name, or some other name that the user specifies. If the user had previously processed an email from the same sender email address using the File As button, then the popup window does not appear and the email is simply moved to the same folder as the prior time.
8. Finally, the user could use the Auto File button and a popup window would ask which folder to automatically file this and all future emails from this address upon arrival. The user is also offered to create a new folder if the appropriate one does not already exist.
Emails that are deleted in step 4 or 5, or as a result of being placed on a list by steps 4 or 5, may be moved into the Deleted_Spam folder. Going to that folder and using the new Undelete key moves the message to the normal inbox and removes the email address or content from the always delete lists, but this may not return deleted email addresses to the relationship tree.
The techniques disclosed may provide the following advantages in one or more embodiments:
1. Parsing nested email addresses into a social network relationship tree that captures and preserves the multiple levels and interconnections, of email address relationships within a users private email corpus.
2. Use of the data in a social network relationship tree to determine and report the multiple paths of introduction to targeted individuals.
3. Sharing of personal social network relationship tree with others in order to expand the extent of contacts, i.e. the method of creating an extended social network relationship tree. 4. Sharing of personal social network relationship tree with others without disclosing the contents of the relationship tree that are not on direct paths to the target.
5. Use of the personal social network relationship tree in the filtering of undesirable bulk email advertising such as spam.
6. Use of the social network relationship tree to market products to personal contacts, and to their contacts and again to their contacts.
7. The method of building a confidential skills profile compendium that provides access only to individuals that are within a certain "diameter" or "distance", from the individual whose skills are recorded, based upon the inquirers personal and extended social network relationship tree.
8. Use of the "all users" aggregate database to provide an "email scoring" service that identifies email addresses as having historical communications activities that are statistically typical of addresses used for certain purposes, such as fraudulent purposes.
9. Use of the user's relationship tree to find an individual known to the user directly, or through introduction, that has experience with a particular commerce activity at a participating website.
Referring now to Fig. 1 , correspondence comes in many forms including printed correspondence delivered by post or forwarded by facsimile, email correspondence as well special purpose correspondence such as telephone bills. Document 11 , for example, is a piece of correspondence sent by Tom, the addressor, to Bill, the addressee. Bill and Tom are the primary addressed parties and form a correspondence, or contact pair, at the ends of a contact or correspondence path from Tom to Bill. As shown in document 11 , there may be other parties to the correspondence addressed at a different level, such as secondary addressees Jane and John, who are addressed directly in document 11 by being indicated to receive copies of document 11. In particular, Jane and John are each separate direct addressees at the end of a contact path from Tom although they have some level of connection as noted below. Certain types of correspondence may also include addressed parties not directly addressed, that is indirectly addressed, in the current document. For example, document 11 may be a document forwarding a copy of other correspondence, such as document 13, which includes indirectly addressed parties Jim, George, Mary, Tom and John. Other types of correspondence, such as telephone bills, may include indirectly addressed parties in that information such as each identified telephone number called indicates at least one address form representing an addressed party even though the phone bill is not directed to any of these indirectly addressed parties. Each indirectly addressed party on a telephone bill may be on the end of a contact path from the phone bill's addressee while the primary or direct contact path is from the phone company to the billed addressee.
Referring now to Fig. 2, each addressed party in a piece of correspondence may be said to have a relationship, such as a contact path, with the other directly addressed parties. For example, as shown, Bill and Tom may be said to be the ends of a contact pair as a result of document 11. This contact pair may be identified by contact path 15 from Tom, the addressor, to Bill, the addressee. The direction of the path may be indicated by the direction of the arrowhead or other means on contact path 15. Further, Jane and John are each at the end of a contact path from Tom shown as contact paths 17 and 19, respectively.
Contact paths, in addition to having at least a pair of addressed parties, also at least potentially include additional or secondary information, such as the direction of flow of the correspondence and/or whether or not the parties were directly or indirectly addressed in the document being considered, such as document 11. Additionally this information could include all the dates of communication, pointers identifying the specific communication or the source of communication or any other meaningful information that can be extracted from the original source data. For convenience, contact paths 15, 17, 19, 21 , 23, 25 and 27 are shown with arrowheads to indicate the direction of contact In summary, contact paths between addressed parties may therefore include secondary information such as the direction of correspondence as well as the addressed pair of parties. Depending on the intended usage, data collected with regard to addressed parties may include such secondary information for some types of contact paths and may not include such secondary information for other types of contact paths.
Referring now to Fig. 3, the process will be described in terms of steps taken with regard to a first user, User A, to develop a local data file, and/or the combination of that data with data from a similar user, such User B not shown, to create a web relational data base or database of relationships, followed by descriptions of a series of services or tools that may interact with the database of relationships.
Beginning with User A, step 10 operates to choose a group of email records to process. In step 12, record headers or equivalent text are parsed, including those in nested or forwarded email messages, in order to retrieve email addresses for all addressed parties along with From:, To: and Cc: relationships for each address. Thereafter, in step 14, data may be extracted, or an algorithm may be applied to each email and attachments, that provides a unique numeric result for each email processed as a unique source ID. In step 16, data may be written to a data store such as a local hard drive, for example as a relational or flat file 18, to temporarily store the extracted email headers and relationship information as well as the unique source ID.
Some of the functions may then be performed locally for User A based on data collected in flat file 18, but substantial advantages can be achieved by subsequent processing to create a Internet based relational database such as central web based UDDI relational data base 20. A UDDI, or Universal Discover, Description and Integration database, is a standards based XML database with restricted or controlled access to the data. In particular, in step 22, data is uploaded to a central web based relational database 20 which is protected by user ID and password available only to the user. In step 24, the user may optionally designate other users that have permission to access the owner's data. The data to be written to relational data base 20 may then be processed by server side database pre-processing operations in step 40 with filters that prevent duplicates and process only incremental data from the flat file. Step 40 may also key data to the user providing that data so it is only accessible by authorized users which may have been designated in step 24. Step 40, in addition to uploading the preprocessed data to relational database 20, may also cause the writing back of data to local files, such as data file 18, to facilitate further processing by reducing need to reprocess previously processed data.
Once the relevant data has been uploaded to relational database 20, which may conveniently be accessible to a group of users by for example being located on a central server in a local network or preferably in a wide area network such as the Internet, various processes or tools may be used to work with this data.
Referring now in more detail also to Figs. 4 and 5, relationship visualization tool 44 may provide visualization by display for the user of contact relationship data in central database 20 by loading the data in step 46 that the user is authorized to access. In step 48, data points representing contacts or addressed parties may be arranged to identify the most frequent links. Color codes, based upon recency of contact and/or degrees of separation, may be assigned. The spatially arranged and color coded results may then be displayed on display monitor 50. The results displayed on monitor 50 may represent the relationships, and paths there between, beginning with the user and extending through all contacts, or addressed parties, disclosed in the emails, or other source of data, processed by the steps disclosed and may be referred to herein as a relationship tree which shows the direct and indirect relationships of a user.
As shown in Fig. 5, the data visualized from database 20 may show, for example, that User A has direct relationships, at least with regard to one or more existing emails, with Contacts B and E, while Contact B has additional direct relationships with Contacts C and F while Contact C has a direct relationship with Contact D and Contact E has a direct relationship with Contact F. Although a typical useful visualization display of this type may be much more complicated than as shown in Fig. 5, it is apparent that User A may much more easily comprehend that he can make contact with Contact D via Contacts B and C by viewing the visualization in Fig. 5 than be reading the above provided text.
Referring now in greater detail to Figs. 6 and 7, referral path identification 52 operates on the data, in step 54, by loading data that the user is authorized to access. The user may then input target email address(s), or any other valid search criteria such as that available from directories cross referenced to email addresses, in step 56. The data and email address(s) may then be processed in step 58 using a breadth-wise incremental search to determine linkage paths which are then used to create display 60 in which the results may be displayed as highlighted paths or list of contacts.
As shown in Fig. 7, the closest path between User A and Contact D, the inputted email address, is shown as the highlighted path via Contacts B and F. It should be noted that a similar length path happens to exist via Contacts E and F, but is not shown as highlighted. The selection of the path via Contacts B and F may be made automatically in processing step 58 on the basis of the most recent contacts made along this path of parts of it, on the basis of the number of contacts made along this path of parts of it and preferably upon a combination of both the above described recency and frequency criteria.
Spam filter 62 may operate upon data provided by the user in step 64 indicating the degrees of freedom or separation, the to use as a filter on the data loaded in step 66. A single degree of freedom or a single step of separation refers to a direct contact, such as the relationship between User A and Contact B in Fig. 5. A second degree of freedom, or two steps of separation, refers to the indirect relationship between User A and Contacts C and D in Fig. 5.
In step 68, inbound emails with origination addresses that match relationship tree addresses in accordance with the degrees of freedom data provided in step 64 are placed in a filtered inbox. Inbound emails with origination addresses not matching addresses on the relationship tree may be left in the general inbox for review or may be further filtered based on other criteria to evaluate the likelihood that they are undesired emails such as SPAM.
As shown in Fig. 10, multilevel marketing (MLM) & referral marketing step 70 combines the degrees of separation selection provided by the user in step 72, and a marketing offer or other letter provided by the user in step 74, with data loaded in step 76 to personalize each letter with the referrer's email address in merge program 78.
Referring now to Fig. 10, skill registry tool 80 may be used to obtain introductions to individuals with specific skills. The user provides a selected degree of separation in step 82 together with data related to the desired skill set, and/or experience, in step 84 which are compared with the relationship tree lists to form a qualified email list 86. List 86 may be further processed in step 88 with a breadth-wise incremental search to determine linkage paths for creating display 90 which may display results as highlighted paths or list of contacts. Other directories may be cross referenced to provide expanded search capabilities.
Additionally online registry 92 may be made available for individuals to post answers to detailed questions about their skills and experience while providing an email address. Data from online registry 92 may then be loaded from database 20 in step 94 and added for processing in list 86 to further qualify the email lists.
Referring now to Fig. 11 , interface 96 may be used to provide and monitor licensed access to data in step 98 in which data is made available to third party software providers who can develop products that utilize the relationship tree database. Access to the data remains restricted to the owners of the data.
Referring now to Fig. 12, interface 100 may be used to provide a user with a reference from an individual known to the user regarding commerce activities at a participating website. Typically a context sensitive link 102 allows the user to expose their relationship tree 108, and the website to expose a visitor history file 112 from patrons who have elected to participate at 110. The data is then matched for relevance in step 104 and then filtered data is made available to the user in step 106, where a list of potential endorsers is made known, possible with their posted comments.
Referring now to Fig. 13, interface 120 may be used to provide credit issuers (or credit card sales retailers) an additional means of evaluating the credit worthiness of a particular transaction. Proprietary algorithms are employed at 122 to periodically review the pattern of connections of all email addresses in the database. This is performed on communication link history from all relationship trees without regard to the owners of the information. The algorithm assigns a "score" that indicates a deviation from "normal" usage. Authorized subscribers can make inquiries at 124 that reveal the "score" at 126. Authorized subscribers use this information along with other information they already have to help them in their decision regarding the validity of the transaction.

Claims

I Claim:
1. A method for developing contact information from correspondence such as emails, comprising:
processing a set of correspondence to develop a database of relationships between directly and indirectly addressed parties provided by one or more users, maintaining the database, on a network in which addressed parties from a plurality of users are combined, by further processing later received correspondence; and utilizing the database of relationships to provide relationship information between at least one of said users and the addressed parties.
2. The method of claim 1 further comprising: associating a unique identification with each piece of correspondence; and using the unique identification to detect duplications of correspondence in order to more accurately determine a frequency of communication between addressed parties.
3. The methods of claims 1 or 2 further comprising: displaying connection paths between each of said users and at least some of the addressed parties.
4. The method of claim 3 comprising: displaying additional addressed par
+ties upon selection of certain displayed addressed parties.
5. The method of claim 3 further comprising: visually identifying intermediate addressed parties, if any, between said one of said users and a selected addressed party.
6. The method of claim 3 further comprising: visually identifying the frequency of correspondence in the database of relationships between said one of said users and at least some of said addressed parties.
7. The method of claim 3 further comprising: visually identifying the most recent correspondence between at least some of said addressed parties.
8. The method of claim 7 further comprising: visually identifying the frequency of correspondence in the database of relationships between said one of said users and at least some of said addressed parties.
9. The method of claim 3 wherein the connection paths displayed are prioritized in accordance with the number of intermediate addressed parties, if any, between said one of said users and a selected addressed party.
10. The method of claim 3 wherein the connection paths displayed are prioritized in accordance with the most recent correspondence between said one of said users and said selected addressed party.
11. The method of claim 10 wherein the connection paths displayed are prioritized in accordance with the frequency of correspondence between said user and said preselected addressed party.
12. The methods of claims 1 , 2, 9, 10 or 11 further comprising: sorting incoming correspondence in accordance with the number of intermediate contacts, if any, identified in the database of relationships between said user and the addressors of said incoming correspondence.
13. The method of claims 1 , 2, 9, 10 or 11 further comprising: addressing outgoing correspondence to parties selected in accordance with the number of intermediate contacts, if any, identified in the database of relationships between said user and said addressed parties.
14. The method of claims 1 , 2, 9, 10 or 11 further comprising: combining said database of relationships with data related to the skills and experience of third parties to identify paths between said user and third parties having selected skills and experience.
15. The method of claims 1 , 2, 9, 10 or 11 further comprising: combining said database of relationships with data related to the shopping experiences of third parties to identify paths between said user and third parties having selected shopping experiences.
16. The method of claims 1 , 2, 9, 10 or 11 further comprising: analyzing said database of relationships in accordance with statistic norms to determine deviations from such statistical norms in patterns of correspondence of a selected addressed party.
17. A method for deriving qualitative information related to addressed parties on correspondence such as emails, comprising: processing a set of correspondence to develop a database of relationships between addressed parties; maintaining the database by further processing later received correspondence; and utilizing the database of relationships to determine patterns of correspondence for addressed parties.
18. The method of claim 17, wherein the processing further comprises: processing indirectly addressed parties to develop the database of relationships between directly and indirectly addressed parties.
19. The method of claims 17 or 18 further comprising: associating a unique identification with each piece of correspondence; and using the unique identification to detect duplications of correspondence in order to more accurately determine a frequency of communication between addressed parties.
20. The method of claims 17 or 18 further comprising: maintaining the database of relationships on a web based database of relationships in which addressed parties from correspondence of a plurality of users are combined.
21. The method of claims 17 or 18, further comprising: identifying a frequency of correspondence in the database of relationships between a selected addressed party and other addressed parties.
22. The method of claim 21 further comprising: identifying the most recent correspondence between said selected addressed party and other addressed parties.
23. The method of claims 17 or 18 further comprising: deriving normal patterns of correspondence between addressed parties; and determining if patterns of correspondence for the selected addressed party is consistent with the derived normal patterns.
24. A method for developing contact information from correspondence such as emails, comprising: processing a collection of a user's correspondence to develop a database of relationships between said user and parties directly and indirectly addressed in said correspondence; maintaining the database by further processing later received correspondence; and utilizing the database of relationships to provide relationship information between said user and the addressed parties.
25. The method of claim 24 further comprising: associating a unique identification with each piece of correspondence; and using the unique identification to detect duplications of correspondence before maintaining the database in order to more accurately determine a frequency of communication between said user and the addressed parties.
26. The method of claim 24 further comprising: maintaining the database of relationships on a web based database of relationships in which addressed parties from other sources may be combined.
27. The methods of claims 24, 25 or 26 further comprising: displaying connection paths between said user and at least some of the addressed parties.
28. The method of claim 27 comprising: displaying additional addressed parties upon selection of certain displayed addressed parties.
29. The method of claim 27 further comprising: displaying intermediate addressed parties, if any, between said user and a selected addressed party.
30. The method of claim 27 further comprising: displaying a frequency of correspondence in the database of relationships between said user and selected addressed parties.
31. The method of claim 27 further comprising: displaying a most recent correspondence between the user and selected addressed parties.
32. The method of claim 31 further comprising: display a frequency of correspondence in the database of relationships between said user and selected addressed parties.
33. The method of claim 27 wherein the connection paths displayed are prioritized in accordance with the number of intermediate addressed parties, if any, between said user and one or more addressed parties.
34. The method of claim 27 wherein the connection paths are prioritized in accordance with the most recent correspondence with selected addressed parties.
35. The method of claim 34 wherein the connection paths displayed are prioritized in accordance with the frequency of correspondence between said user and said preselected addressed party.
36. The methods of claims 33, 34 or 35 further comprising: sorting incoming correspondence in accordance with the number of intermediate contacts, if any, identified in the database of relationships between said user and the addressors of said incoming correspondence.
37. The method of claims 33, 34 or 35 further comprising: addressing outgoing correspondence to parties selected in accordance with the number of intermediate contacts, if any, identified in the database of relationships between said user and selected addressed parties.
PCT/US2004/015030 2003-05-13 2004-05-13 Deriving contact information from emails WO2004102858A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US47000003P 2003-05-13 2003-05-13
US60/470,000 2003-05-13

Publications (2)

Publication Number Publication Date
WO2004102858A2 true WO2004102858A2 (en) 2004-11-25
WO2004102858A3 WO2004102858A3 (en) 2006-01-12

Family

ID=33452350

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2004/015030 WO2004102858A2 (en) 2003-05-13 2004-05-13 Deriving contact information from emails

Country Status (2)

Country Link
US (1) US20050015432A1 (en)
WO (1) WO2004102858A2 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7636734B2 (en) * 2005-06-23 2009-12-22 Microsoft Corporation Method for probabilistic analysis of most frequently occurring electronic message addresses within personal store (.PST) files to determine owner with confidence factor based on relative weight and set of user-specified factors
WO2010029437A1 (en) * 2008-09-12 2010-03-18 Hans Michael Haschek System and method for searching for a target contact and for generating a contact path
GB2474126A (en) * 2009-09-30 2011-04-06 Bank Of America Relationship classification based upon email traffic
GB2474128A (en) * 2009-09-30 2011-04-06 Bank Of America Derivation of email addresses and determining of relationships
GB2474127A (en) * 2009-09-30 2011-04-06 Bank Of America Auditing search requests in a relationship analysis system
US8271597B2 (en) 2009-09-30 2012-09-18 Bank Of America Corporation Intelligent derivation of email addresses
US8341232B2 (en) 2009-09-30 2012-12-25 Bank Of America Corporation Relationship identification based on email traffic
US8458224B2 (en) 2009-09-30 2013-06-04 Bank Of America Corporation Auditing search requests in a relationship analysis system
US8856135B2 (en) 2009-09-30 2014-10-07 Bank Of America Corporation Intelligent sorting and correlation of email traffic

Families Citing this family (207)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6832245B1 (en) 1999-12-01 2004-12-14 At&T Corp. System and method for analyzing communications of user messages to rank users and contacts based on message content
US9736209B2 (en) 2000-03-17 2017-08-15 Facebook, Inc. State change alerts mechanism
US7624172B1 (en) 2000-03-17 2009-11-24 Aol Llc State change alerts mechanism
CA2403520C (en) * 2000-03-17 2008-06-03 America Online, Inc. Voice instant messaging
US8122363B1 (en) 2000-05-04 2012-02-21 Aol Inc. Presence status indicator
US7979802B1 (en) 2000-05-04 2011-07-12 Aol Inc. Providing supplemental contact information corresponding to a referenced individual
US9043418B2 (en) 2000-05-04 2015-05-26 Facebook, Inc. Systems and methods for instant messaging persons referenced in an electronic message
US9100221B2 (en) 2000-05-04 2015-08-04 Facebook, Inc. Systems for messaging senders and recipients of an electronic message
US6912564B1 (en) 2000-05-04 2005-06-28 America Online, Inc. System for instant messaging the sender and recipients of an e-mail message
US8132110B1 (en) 2000-05-04 2012-03-06 Aol Inc. Intelligently enabled menu choices based on online presence state in address book
US9356894B2 (en) 2000-05-04 2016-05-31 Facebook, Inc. Enabled and disabled menu choices based on presence state
US8001190B2 (en) 2001-06-25 2011-08-16 Aol Inc. Email integrated instant messaging
ATE502477T1 (en) 2000-07-25 2011-04-15 America Online Inc VIDEO MESSAGING
US7765484B2 (en) * 2001-09-28 2010-07-27 Aol Inc. Passive personalization of lists
US7774711B2 (en) * 2001-09-28 2010-08-10 Aol Inc. Automatic categorization of entries in a contact list
US7512652B1 (en) 2001-09-28 2009-03-31 Aol Llc, A Delaware Limited Liability Company Passive personalization of buddy lists
JP4386732B2 (en) 2002-01-08 2009-12-16 セブン ネットワークス, インコーポレイテッド Mobile network connection architecture
US7428580B2 (en) 2003-11-26 2008-09-23 Aol Llc Electronic message forwarding
US7899862B2 (en) 2002-11-18 2011-03-01 Aol Inc. Dynamic identification of other users to an online user
US8701014B1 (en) 2002-11-18 2014-04-15 Facebook, Inc. Account linking
CA2506585A1 (en) 2002-11-18 2004-06-03 Valerie Kucharewski People lists
US7590696B1 (en) 2002-11-18 2009-09-15 Aol Llc Enhanced buddy list using mobile device identifiers
US8965964B1 (en) 2002-11-18 2015-02-24 Facebook, Inc. Managing forwarded electronic messages
US8005919B2 (en) 2002-11-18 2011-08-23 Aol Inc. Host-based intelligent results related to a character stream
US8122137B2 (en) 2002-11-18 2012-02-21 Aol Inc. Dynamic location of a subordinate user
US7640306B2 (en) 2002-11-18 2009-12-29 Aol Llc Reconfiguring an electronic message to effect an enhanced notification
US8037150B2 (en) 2002-11-21 2011-10-11 Aol Inc. System and methods for providing multiple personas in a communications environment
US7636755B2 (en) 2002-11-21 2009-12-22 Aol Llc Multiple avatar personalities
US7945674B2 (en) * 2003-04-02 2011-05-17 Aol Inc. Degrees of separation for handling communications
US8538895B2 (en) * 2004-03-15 2013-09-17 Aol Inc. Sharing social network information
US7263614B2 (en) 2002-12-31 2007-08-28 Aol Llc Implicit access for communications pathway
US9742615B1 (en) 2002-12-31 2017-08-22 Aol Inc. Popularity index
US7949759B2 (en) * 2003-04-02 2011-05-24 AOL, Inc. Degrees of separation for handling communications
US8468126B2 (en) 2005-08-01 2013-06-18 Seven Networks, Inc. Publishing data in an information community
US7853563B2 (en) * 2005-08-01 2010-12-14 Seven Networks, Inc. Universal data aggregation
US7917468B2 (en) * 2005-08-01 2011-03-29 Seven Networks, Inc. Linking of personal information management data
US7913176B1 (en) * 2003-03-03 2011-03-22 Aol Inc. Applying access controls to communications with avatars
US7908554B1 (en) * 2003-03-03 2011-03-15 Aol Inc. Modifying avatar behavior based on user action or mood
US20040179037A1 (en) 2003-03-03 2004-09-16 Blattner Patrick D. Using avatars to communicate context out-of-band
US7613776B1 (en) 2003-03-26 2009-11-03 Aol Llc Identifying and using identities deemed to be known to a user
JP4322569B2 (en) * 2003-06-24 2009-09-02 Necインフロンティア株式会社 Address link system and method and program thereof
AU2004254999A1 (en) * 2003-06-27 2005-01-13 Generate, Inc. Method of and system for determining connections between parties using private links
US7653693B2 (en) 2003-09-05 2010-01-26 Aol Llc Method and system for capturing instant messages
US7734708B1 (en) 2003-12-22 2010-06-08 Aol Inc. Enabling identification of online identities between different messaging services
US8015119B2 (en) 2004-01-21 2011-09-06 Google Inc. Methods and systems for the display and navigation of a social network
US8010459B2 (en) * 2004-01-21 2011-08-30 Google Inc. Methods and systems for rating associated members in a social network
US20050165785A1 (en) * 2004-01-23 2005-07-28 Ibm Corporation Social network surfing
US20050171954A1 (en) * 2004-01-29 2005-08-04 Yahoo! Inc. Selective electronic messaging within an online social network for SPAM detection
US8612359B2 (en) * 2004-01-29 2013-12-17 Yahoo! Inc. Method and system for sharing portal subscriber information in an online social network
US7885901B2 (en) * 2004-01-29 2011-02-08 Yahoo! Inc. Method and system for seeding online social network contacts
US7707122B2 (en) * 2004-01-29 2010-04-27 Yahoo ! Inc. System and method of information filtering using measures of affinity of a relationship
US7269590B2 (en) * 2004-01-29 2007-09-11 Yahoo! Inc. Method and system for customizing views of information associated with a social network user
US8898239B2 (en) * 2004-03-05 2014-11-25 Aol Inc. Passively populating a participant list with known contacts
US20050204133A1 (en) * 2004-03-09 2005-09-15 Robert LaLonde Reduction in unwanted e-mail (spam) through the use of portable unique utilization of public key infrastructure (PKI)
US8595146B1 (en) 2004-03-15 2013-11-26 Aol Inc. Social networking permissions
US8019875B1 (en) 2004-06-04 2011-09-13 Google Inc. Systems and methods for indicating a user state in a social network
US7788260B2 (en) 2004-06-14 2010-08-31 Facebook, Inc. Ranking search results based on the frequency of clicks on the search results by members of a social network who are within a predetermined degree of separation
US7478078B2 (en) * 2004-06-14 2009-01-13 Friendster, Inc. Method for sharing relationship information stored in a social network database with third party databases
US8832132B1 (en) 2004-06-22 2014-09-09 Google Inc. Personalizing search queries based on user membership in social network communities
US7580981B1 (en) * 2004-06-30 2009-08-25 Google Inc. System for determining email spam by delivery path
US7664249B2 (en) * 2004-06-30 2010-02-16 Microsoft Corporation Methods and interfaces for probing and understanding behaviors of alerting and filtering systems based on models and simulation from logs
US7157327B2 (en) * 2004-07-01 2007-01-02 Infineon Technologies Ag Void free, silicon filled trenches in semiconductors
US8015019B1 (en) 2004-08-03 2011-09-06 Google Inc. Methods and systems for providing a document
US7890871B2 (en) * 2004-08-26 2011-02-15 Redlands Technology, Llc System and method for dynamically generating, maintaining, and growing an online social network
US8010460B2 (en) * 2004-09-02 2011-08-30 Linkedin Corporation Method and system for reputation evaluation of online users in a social networking scheme
US8234705B1 (en) * 2004-09-27 2012-07-31 Radix Holdings, Llc Contagion isolation and inoculation
US10248917B1 (en) 2004-10-14 2019-04-02 Capital One Services, Llc System and method for developing and utilizing a contactability profile
WO2006044939A2 (en) * 2004-10-19 2006-04-27 Rosen James S System and method for location based social networking
US11283885B2 (en) 2004-10-19 2022-03-22 Verizon Patent And Licensing Inc. System and method for location based matching and promotion
US8010082B2 (en) * 2004-10-20 2011-08-30 Seven Networks, Inc. Flexible billing architecture
US7441271B2 (en) 2004-10-20 2008-10-21 Seven Networks Method and apparatus for intercepting events in a communication system
US7706781B2 (en) * 2004-11-22 2010-04-27 Seven Networks International Oy Data security in a mobile e-mail service
US7643818B2 (en) * 2004-11-22 2010-01-05 Seven Networks, Inc. E-mail messaging to/from a mobile terminal
US8060566B2 (en) * 2004-12-01 2011-11-15 Aol Inc. Automatically enabling the forwarding of instant messages
US9002949B2 (en) 2004-12-01 2015-04-07 Google Inc. Automatically enabling the forwarding of instant messages
US7730143B1 (en) 2004-12-01 2010-06-01 Aol Inc. Prohibiting mobile forwarding
FI117152B (en) 2004-12-03 2006-06-30 Seven Networks Internat Oy E-mail service provisioning method for mobile terminal, involves using domain part and further parameters to generate new parameter set in list of setting parameter sets, if provisioning of e-mail service is successful
EP1828932A4 (en) * 2004-12-10 2008-03-05 Seven Networks Internat Oy Database synchronization
US9652809B1 (en) 2004-12-21 2017-05-16 Aol Inc. Using user profile information to determine an avatar and/or avatar characteristics
FI120165B (en) 2004-12-29 2009-07-15 Seven Networks Internat Oy Synchronization of a database through a mobile network
US10402457B1 (en) 2004-12-31 2019-09-03 Google Llc Methods and systems for correlating connections between users and links between articles
US7716140B1 (en) 2004-12-31 2010-05-11 Google Inc. Methods and systems for controlling access to relationship information in a social network
US8060405B1 (en) 2004-12-31 2011-11-15 Google Inc. Methods and systems for correlating connections between users and links between articles
US7593925B2 (en) * 2005-02-25 2009-09-22 Microsoft Corporation Method and system for locating contact information collected from contact sources
US7562104B2 (en) * 2005-02-25 2009-07-14 Microsoft Corporation Method and system for collecting contact information from contact sources and tracking contact sources
US20060195472A1 (en) * 2005-02-25 2006-08-31 Microsoft Corporation Method and system for aggregating contact information from multiple contact sources
DE102005011169B4 (en) * 2005-03-09 2010-09-30 1&1 Internet Ag Method and system for an e-mail service with preparation of information e-mails of another Internet service
US7752633B1 (en) 2005-03-14 2010-07-06 Seven Networks, Inc. Cross-platform event engine
US8412780B2 (en) * 2005-03-30 2013-04-02 Google Inc. Methods and systems for providing current email addresses and contact information for members within a social network
US7796742B1 (en) 2005-04-21 2010-09-14 Seven Networks, Inc. Systems and methods for simplified provisioning
US8438633B1 (en) 2005-04-21 2013-05-07 Seven Networks, Inc. Flexible real-time inbox access
US7606580B2 (en) * 2005-05-11 2009-10-20 Aol Llc Personalized location information for mobile devices
US7765265B1 (en) 2005-05-11 2010-07-27 Aol Inc. Identifying users sharing common characteristics
US7797287B2 (en) * 2005-05-27 2010-09-14 Yahoo! Inc. User interface for navigating a keyword space
WO2006136661A1 (en) 2005-06-21 2006-12-28 Seven Networks International Oy Network-initiated data transfer in a mobile network
WO2006136660A1 (en) * 2005-06-21 2006-12-28 Seven Networks International Oy Maintaining an ip connection in a mobile network
US8069166B2 (en) * 2005-08-01 2011-11-29 Seven Networks, Inc. Managing user-to-user contact with inferred presence information
US8731542B2 (en) 2005-08-11 2014-05-20 Seven Networks International Oy Dynamic adjustment of keep-alive message intervals in a mobile network
US8725811B2 (en) * 2005-12-29 2014-05-13 Microsoft Corporation Message organization and spam filtering based on user interaction
US7769395B2 (en) 2006-06-20 2010-08-03 Seven Networks, Inc. Location-based operations and messaging
US7702456B2 (en) 2006-04-14 2010-04-20 Scenera Technologies, Llc System and method for presenting a computed route
US20070290787A1 (en) * 2006-06-20 2007-12-20 Trevor Fiatal Systems and methods for group messaging
US20080001717A1 (en) * 2006-06-20 2008-01-03 Trevor Fiatal System and method for group management
JP4289379B2 (en) * 2006-08-24 2009-07-01 コニカミノルタビジネステクノロジーズ株式会社 E-mail processing apparatus, e-mail processing method, and e-mail processing program
US20080103907A1 (en) * 2006-10-25 2008-05-01 Pudding Ltd. Apparatus and computer code for providing social-network dependent information retrieval services
US7958117B2 (en) * 2006-11-17 2011-06-07 Yahoo! Inc. Initial impression analysis tool for an online dating service
US20080159114A1 (en) * 2007-01-02 2008-07-03 Dipietro Richard Anthony High density data storage medium, method and device
US8346307B2 (en) * 2007-01-19 2013-01-01 Tepa Datasolutions Co., Llc Method of displaying contact information
US8417675B2 (en) * 2007-01-19 2013-04-09 Tepa Datasolutions Co., Llc Method of distributing contact and calendar records
US8234244B2 (en) * 2007-01-19 2012-07-31 Tepa Datasolutions Co., Llc Method of distributing contact and calendar records
US8150422B2 (en) * 2007-01-19 2012-04-03 Tepa Datasolutions Co., Llc Method of displaying contact information
US20080177797A1 (en) * 2007-01-19 2008-07-24 Eldering Charles A Method of Updating Contact Information on Merchant Websites
US20080177796A1 (en) * 2007-01-19 2008-07-24 Eldering Charles A Method of Distributing Contact Information to Merchant Websites
US8693494B2 (en) 2007-06-01 2014-04-08 Seven Networks, Inc. Polling
US8805425B2 (en) * 2007-06-01 2014-08-12 Seven Networks, Inc. Integrated messaging
US20140355592A1 (en) 2012-11-01 2014-12-04 Datavalet Technologies System and method for wireless device detection, recognition and visit profiling
AU2008258222C1 (en) * 2007-06-06 2013-11-07 Datavalet Technologies Remote service access system and method
US9003488B2 (en) 2007-06-06 2015-04-07 Datavalet Technologies System and method for remote device recognition at public hotspots
US8468168B2 (en) * 2007-07-25 2013-06-18 Xobni Corporation Display of profile information based on implicit actions
US8364181B2 (en) * 2007-12-10 2013-01-29 Seven Networks, Inc. Electronic-mail filtering for mobile devices
US8793305B2 (en) 2007-12-13 2014-07-29 Seven Networks, Inc. Content delivery to a mobile device from a content service
US9002828B2 (en) 2007-12-13 2015-04-07 Seven Networks, Inc. Predictive content delivery
US9584343B2 (en) 2008-01-03 2017-02-28 Yahoo! Inc. Presentation of organized personal and public data using communication mediums
US8107921B2 (en) 2008-01-11 2012-01-31 Seven Networks, Inc. Mobile virtual network operator
US8862657B2 (en) * 2008-01-25 2014-10-14 Seven Networks, Inc. Policy based content service
US20090193338A1 (en) * 2008-01-28 2009-07-30 Trevor Fiatal Reducing network and battery consumption during content delivery and playback
US8090666B2 (en) 2008-02-15 2012-01-03 Your Net Works, Inc. System, method, and computer program product for providing an association between a first participant and a second participant in a social network
US20090248670A1 (en) * 2008-03-31 2009-10-01 Trevor Fiatal Content search engine
US8787947B2 (en) * 2008-06-18 2014-07-22 Seven Networks, Inc. Application discovery on mobile devices
US8078158B2 (en) 2008-06-26 2011-12-13 Seven Networks, Inc. Provisioning applications for a mobile device
US9195526B2 (en) * 2008-07-18 2015-11-24 Blackberry Limited Application integration in networked computing devices
US8548503B2 (en) 2008-08-28 2013-10-01 Aol Inc. Methods and system for providing location-based communication services
US8909759B2 (en) * 2008-10-10 2014-12-09 Seven Networks, Inc. Bandwidth measurement
US20100223119A1 (en) * 2009-03-02 2010-09-02 Yahoo! Inc. Advertising Through Product Endorsements in Social Networks
US20120047087A1 (en) 2009-03-25 2012-02-23 Waldeck Technology Llc Smart encounters
WO2010141216A2 (en) 2009-06-02 2010-12-09 Xobni Corporation Self populating address book
US9721228B2 (en) 2009-07-08 2017-08-01 Yahoo! Inc. Locally hosting a social network using social data stored on a user's computer
US8984074B2 (en) 2009-07-08 2015-03-17 Yahoo! Inc. Sender-based ranking of person profiles and multi-person automatic suggestions
US7930430B2 (en) 2009-07-08 2011-04-19 Xobni Corporation Systems and methods to provide assistance during address input
US8990323B2 (en) 2009-07-08 2015-03-24 Yahoo! Inc. Defining a social network model implied by communications data
EP2454897A1 (en) 2009-07-17 2012-05-23 Boldstreet Inc. Hotspot network access system and method
US9317537B2 (en) * 2009-09-25 2016-04-19 Adnan Fakeih Database and method for evaluating data therefrom
US9087323B2 (en) * 2009-10-14 2015-07-21 Yahoo! Inc. Systems and methods to automatically generate a signature block
US9020938B2 (en) * 2010-02-03 2015-04-28 Yahoo! Inc. Providing profile information using servers
TW201209697A (en) 2010-03-30 2012-03-01 Michael Luna 3D mobile user interface with configurable workspace management
US8972257B2 (en) 2010-06-02 2015-03-03 Yahoo! Inc. Systems and methods to present voice message information to a user of a computing device
US8620935B2 (en) 2011-06-24 2013-12-31 Yahoo! Inc. Personalizing an online service based on data collected for a user of a computing device
CA2857458A1 (en) 2010-07-26 2012-02-09 Michael Luna Mobile application traffic optimization
US9077630B2 (en) 2010-07-26 2015-07-07 Seven Networks, Inc. Distributed implementation of dynamic wireless traffic policy
US9043433B2 (en) 2010-07-26 2015-05-26 Seven Networks, Inc. Mobile network traffic coordination across multiple applications
US8838783B2 (en) 2010-07-26 2014-09-16 Seven Networks, Inc. Distributed caching for resource and mobile network traffic management
US9060032B2 (en) 2010-11-01 2015-06-16 Seven Networks, Inc. Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic
US8843153B2 (en) 2010-11-01 2014-09-23 Seven Networks, Inc. Mobile traffic categorization and policy for network use optimization while preserving user experience
WO2012061430A2 (en) 2010-11-01 2012-05-10 Michael Luna Distributed management of keep-alive message signaling for mobile network resource conservation and optimization
WO2012060995A2 (en) 2010-11-01 2012-05-10 Michael Luna Distributed caching in a wireless network of content delivered for a mobile application over a long-held request
US8166164B1 (en) 2010-11-01 2012-04-24 Seven Networks, Inc. Application and network-based long poll request detection and cacheability assessment therefor
US8190701B2 (en) 2010-11-01 2012-05-29 Seven Networks, Inc. Cache defeat detection and caching of content addressed by identifiers intended to defeat cache
US8484314B2 (en) 2010-11-01 2013-07-09 Seven Networks, Inc. Distributed caching in a wireless network of content delivered for a mobile application over a long-held request
US9330196B2 (en) 2010-11-01 2016-05-03 Seven Networks, Llc Wireless traffic management system cache optimization using http headers
GB2499534B (en) 2010-11-01 2018-09-19 Seven Networks Llc Caching adapted for mobile application behavior and network conditions
GB2500327B (en) 2010-11-22 2019-11-06 Seven Networks Llc Optimization of resource polling intervals to satisfy mobile device requests
CN103404193B (en) 2010-11-22 2018-06-05 七网络有限责任公司 The connection that adjustment data transmission is established with the transmission being optimized for through wireless network
US9325662B2 (en) 2011-01-07 2016-04-26 Seven Networks, Llc System and method for reduction of mobile network traffic used for domain name system (DNS) queries
US20120197733A1 (en) * 2011-01-27 2012-08-02 Linkedln Corporation Skill customization system
US8600970B2 (en) * 2011-02-22 2013-12-03 Apple Inc. Server-side search of email attachments
WO2012145541A2 (en) 2011-04-19 2012-10-26 Seven Networks, Inc. Social caching for device resource sharing and management
GB2505585B (en) 2011-04-27 2015-08-12 Seven Networks Inc Detecting and preserving state for satisfying application requests in a distributed proxy and cache system
CA2797631C (en) 2011-04-27 2013-11-19 Seven Networks, Inc. System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief
US10078819B2 (en) 2011-06-21 2018-09-18 Oath Inc. Presenting favorite contacts information to a user of a computing device
US9747583B2 (en) * 2011-06-30 2017-08-29 Yahoo Holdings, Inc. Presenting entity profile information to a user of a computing device
US8984581B2 (en) 2011-07-27 2015-03-17 Seven Networks, Inc. Monitoring mobile application activities for malicious traffic on a mobile device
US9171336B2 (en) * 2011-08-29 2015-10-27 Bank Of America Corporation Cumulative connectedness
US20130080521A1 (en) * 2011-09-28 2013-03-28 Microsoft Corporation Resolving contacts in conflict through suggestion
US20130124648A1 (en) * 2011-11-16 2013-05-16 Google Inc. Email Filtering Based on Social Networking Information
US8868753B2 (en) 2011-12-06 2014-10-21 Seven Networks, Inc. System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation
US8934414B2 (en) 2011-12-06 2015-01-13 Seven Networks, Inc. Cellular or WiFi mobile traffic optimization based on public or private network destination
WO2013086447A1 (en) 2011-12-07 2013-06-13 Seven Networks, Inc. Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol
US9009250B2 (en) 2011-12-07 2015-04-14 Seven Networks, Inc. Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation
US10169724B2 (en) 2011-12-14 2019-01-01 International Business Machines Corporation Display of user relationships
WO2013090821A1 (en) 2011-12-14 2013-06-20 Seven Networks, Inc. Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization
US20130159511A1 (en) 2011-12-14 2013-06-20 Seven Networks, Inc. System and method for generating a report to a network operator by distributing aggregation of data
US9832095B2 (en) 2011-12-14 2017-11-28 Seven Networks, Llc Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic
WO2013103988A1 (en) 2012-01-05 2013-07-11 Seven Networks, Inc. Detection and management of user interactions with foreground applications on a mobile device in distributed caching
US9203864B2 (en) 2012-02-02 2015-12-01 Seven Networks, Llc Dynamic categorization of applications for network access in a mobile network
WO2013116852A1 (en) 2012-02-03 2013-08-08 Seven Networks, Inc. User as an end point for profiling and optimizing the delivery of content and data in a wireless network
US9971993B2 (en) 2012-03-26 2018-05-15 Microsoft Technology Licensing, Llc Leveraging a social graph for use with electronic messaging
US8812695B2 (en) 2012-04-09 2014-08-19 Seven Networks, Inc. Method and system for management of a virtual network connection without heartbeat messages
US20130268656A1 (en) 2012-04-10 2013-10-10 Seven Networks, Inc. Intelligent customer service/call center services enhanced using real-time and historical mobile application and traffic-related statistics collected by a distributed caching system in a mobile network
US8775631B2 (en) 2012-07-13 2014-07-08 Seven Networks, Inc. Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications
US9161258B2 (en) 2012-10-24 2015-10-13 Seven Networks, Llc Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion
US9654592B2 (en) 2012-11-08 2017-05-16 Linkedin Corporation Skills endorsements
US9729695B2 (en) 2012-11-20 2017-08-08 Dropbox Inc. Messaging client application interface
US9654426B2 (en) 2012-11-20 2017-05-16 Dropbox, Inc. System and method for organizing messages
US9935907B2 (en) 2012-11-20 2018-04-03 Dropbox, Inc. System and method for serving a message client
US10192200B2 (en) 2012-12-04 2019-01-29 Oath Inc. Classifying a portion of user contact data into local contacts
US9473583B2 (en) 2012-12-10 2016-10-18 Linkedin Corporation Methods and systems for providing decision-making support
US9307493B2 (en) 2012-12-20 2016-04-05 Seven Networks, Llc Systems and methods for application management of mobile device radio state promotion and demotion
US9271238B2 (en) 2013-01-23 2016-02-23 Seven Networks, Llc Application or context aware fast dormancy
US8874761B2 (en) 2013-01-25 2014-10-28 Seven Networks, Inc. Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
US8750123B1 (en) 2013-03-11 2014-06-10 Seven Networks, Inc. Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network
US9065765B2 (en) 2013-07-22 2015-06-23 Seven Networks, Inc. Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network
US9697472B2 (en) 2013-09-20 2017-07-04 Linkedin Corporation Skills ontology creation
US9251470B2 (en) 2014-05-30 2016-02-02 Linkedin Corporation Inferred identity
US9825899B2 (en) * 2014-07-10 2017-11-21 Facebook, Inc. Systems and methods for directng messages based on social data
US20160012506A1 (en) * 2014-07-11 2016-01-14 Apprekon, Inc. Resident mobile contacts recommendation having a user requested target in their contact lists
US10372720B2 (en) * 2016-10-31 2019-08-06 Microsoft Technology Licensing, Llc Matching entities across multiple data sources
US10380552B2 (en) 2016-10-31 2019-08-13 Microsoft Technology Licensing, Llc Applicant skills inference for a job

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6647383B1 (en) * 2000-09-01 2003-11-11 Lucent Technologies Inc. System and method for providing interactive dialogue and iterative search functions to find information
US6847969B1 (en) * 1999-05-03 2005-01-25 Streetspace, Inc. Method and system for providing personalized online services and advertisements in public spaces

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5459859A (en) * 1991-06-18 1995-10-17 Mitsubishi Denki Kabushiki Kaisha Apparatus and system for providing information required for meeting with desired person while travelling
EP0732660A1 (en) * 1995-03-15 1996-09-18 Kabushiki Kaisha Toshiba Communication method and the system thereof applied for the network having plural client systems and server systems
US5796395A (en) * 1996-04-02 1998-08-18 Wegener Internet Projects Bv System for publishing and searching interests of individuals
US6453327B1 (en) * 1996-06-10 2002-09-17 Sun Microsystems, Inc. Method and apparatus for identifying and discarding junk electronic mail
US6052122A (en) * 1997-06-13 2000-04-18 Tele-Publishing, Inc. Method and apparatus for matching registered profiles
US5963951A (en) * 1997-06-30 1999-10-05 Movo Media, Inc. Computerized on-line dating service for searching and matching people
US6269369B1 (en) * 1997-11-02 2001-07-31 Amazon.Com Holdings, Inc. Networked personal contact manager
US5990886A (en) * 1997-12-01 1999-11-23 Microsoft Corporation Graphically creating e-mail distribution lists with geographic area selector on map
US6263362B1 (en) * 1998-09-01 2001-07-17 Bigfix, Inc. Inspector for computed relevance messaging
US6256664B1 (en) * 1998-09-01 2001-07-03 Bigfix, Inc. Method and apparatus for computed relevance messaging
US6832245B1 (en) * 1999-12-01 2004-12-14 At&T Corp. System and method for analyzing communications of user messages to rank users and contacts based on message content
DE10196385T1 (en) * 2000-06-22 2003-11-06 Yaron Mayer System and method for searching for and finding data and for contacting this data via the Internet in instant messaging networks and / or other methods which make it possible to find and establish contacts immediately
US6622909B1 (en) * 2000-10-24 2003-09-23 Ncr Corporation Mining data from communications filtering request
US7366759B2 (en) * 2001-02-22 2008-04-29 Parity Communications, Inc. Method and system for characterizing relationships in social networks
US7167910B2 (en) * 2002-02-20 2007-01-23 Microsoft Corporation Social mapping of contacts from computer communication information
US7039677B2 (en) * 2002-05-07 2006-05-02 International Business Machines Corporation Threaded text-based chat collaboration
US20040117249A1 (en) * 2002-12-16 2004-06-17 Wang Annie X. Business improvement program with on-line access
US7177880B2 (en) * 2002-12-19 2007-02-13 International Business Machines Corporation Method of creating and displaying relationship chains between users of a computerized network
US20040122803A1 (en) * 2002-12-19 2004-06-24 Dom Byron E. Detect and qualify relationships between people and find the best path through the resulting social network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6847969B1 (en) * 1999-05-03 2005-01-25 Streetspace, Inc. Method and system for providing personalized online services and advertisements in public spaces
US6647383B1 (en) * 2000-09-01 2003-11-11 Lucent Technologies Inc. System and method for providing interactive dialogue and iterative search functions to find information

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7636734B2 (en) * 2005-06-23 2009-12-22 Microsoft Corporation Method for probabilistic analysis of most frequently occurring electronic message addresses within personal store (.PST) files to determine owner with confidence factor based on relative weight and set of user-specified factors
WO2010029437A1 (en) * 2008-09-12 2010-03-18 Hans Michael Haschek System and method for searching for a target contact and for generating a contact path
GB2474126A (en) * 2009-09-30 2011-04-06 Bank Of America Relationship classification based upon email traffic
GB2474128A (en) * 2009-09-30 2011-04-06 Bank Of America Derivation of email addresses and determining of relationships
GB2474127A (en) * 2009-09-30 2011-04-06 Bank Of America Auditing search requests in a relationship analysis system
US8271597B2 (en) 2009-09-30 2012-09-18 Bank Of America Corporation Intelligent derivation of email addresses
US8341232B2 (en) 2009-09-30 2012-12-25 Bank Of America Corporation Relationship identification based on email traffic
US8458224B2 (en) 2009-09-30 2013-06-04 Bank Of America Corporation Auditing search requests in a relationship analysis system
US8856135B2 (en) 2009-09-30 2014-10-07 Bank Of America Corporation Intelligent sorting and correlation of email traffic

Also Published As

Publication number Publication date
WO2004102858A3 (en) 2006-01-12
US20050015432A1 (en) 2005-01-20

Similar Documents

Publication Publication Date Title
US20050015432A1 (en) Deriving contact information from emails
US20060218111A1 (en) Filtered search results
Gunter et al. Online versus offline research: implications for evaluating digital media
US9934297B2 (en) Method of facilitating contact between mutually interested people
Sexton et al. Appropriate uses and considerations for online surveying in human dimensions research
US6249282B1 (en) Method and apparatus for matching registered profiles
US6175831B1 (en) Method and apparatus for constructing a networking database and system
US6370139B2 (en) System and method for providing information dispersal in a networked computing environment
US8495045B2 (en) Method and apparatus for creating an activity record in a business management system from an email message
US20080103784A1 (en) Method and system for constructing an interactive online network of living and non-living entities
US20040034661A1 (en) Customer information management system and method
US20060195536A1 (en) Communication management apparatus, communication management method, and communication management program
US7412401B2 (en) Messaging system having recipient profiling
WO2006049905A2 (en) Method and apparatus for targeted event networking
US20070033203A1 (en) System and method for locating a lost person
US20040080534A1 (en) Front Message exchange system and method
Bowers‐Brown et al. Political parties’ use of the Web during the 2001 general election
RU2378987C1 (en) Method for getting acquainted in internet network by means of psychological test
Tuten Getting a foot in the electronic door: understanding why people read or delete electronic mail
WO2022186085A1 (en) Interaction management device, interaction management method, and program
Gross et al. Addressing constraints: Multiple usernames task spillage and notions of identity
CN101103368A (en) Open system for dynamically generating a network of contacts
Al‐Omiri A preliminary study of electronic surveys as a means to enhance management accounting research
JP2008293345A (en) Business activity support system, business activity support program and server device
KR100468093B1 (en) Electronic-Mail Management Method using Advertisement/Information Mail Filtering

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase