INFERRING EMAIL ACTION BASED ON USER INPUT
First Claim
Patent Images
1. A computer implemented method for assisting email users, comprising:
- receiving an action from a user which can be inferred to be a request to add an email source to a block list associated with the user;
determining whether blocking the source would be effective against exposing the user to additional email from the source; and
adding the source to the user block list if adding the source is determined to be effective.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer implemented computer method for assisting email users. When a user selects an action with respect to email source such as an email address, the user'"'"'s intended action is inferred. The source validity is checked. Where a user provides input identifying an email as spam, the inferred action may be to add the email address associated with the message to a user block list. The address may be added only where the address or domain are identified as valid sources of email.
114 Citations
20 Claims
-
1. A computer implemented method for assisting email users, comprising:
-
receiving an action from a user which can be inferred to be a request to add an email source to a block list associated with the user; determining whether blocking the source would be effective against exposing the user to additional email from the source; and adding the source to the user block list if adding the source is determined to be effective. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer implemented method maintaining user email block lists according to source, comprising;
-
presenting at least a portion of an email message to a user for review; presenting an action selection interface to the user; receiving an action from a user which can be inferred to be a request to add the source to a user block list or safelist; determining whether blocking the source would be effective against exposing the user to additional email from the source; and if the determination is that blocking the source would be effective, adding the email to a block list or safelist based on the user action. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A method implemented by an email service provider having a plurality of users accessing email via the provider, the method for assisting email users, comprising:
-
receiving a command from a user which can be inferred to be a request to add the source to a block list associated with the user; determining whether blocking the source would prevent additional email from the source from reaching the user based upon one or more criteria identifying the source as a valid source I; adding the source to the user block list if the source is determined to be effective. - View Dependent Claims (19, 20)
-
Specification