SYSTEM AND METHOD FOR SELF-DESTRUCTING MESSAGES
First Claim
1. A method comprising:
- receiving, at a computing device over a network from a first user, a message addressed to an inbox associated with a second user, said message comprising message content and a time-to-live (TTL) restriction embedded within metadata of the message, said TTL restriction comprising a TTL trigger indicating the message is being sent via short-lived (SL) protocol that enables said message to self-destruct in accordance with the TTL restriction;
determining, via the computing device, that the second user'"'"'s message account hosting the inbox of said second user supports SL protocol;
delivering, over the network, the message to the inbox of said second user;
parsing, via the computing device, said message to determine when said TTL restriction is satisfied, said parsing comprising parsing said metadata to identify the TTL trigger;
monitoring, via the computing device, an environment to detect an event satisfying said trigger; and
causing, in response to said trigger detection, deletion, via the computing device, of said message from said second user inbox when said TTL restriction expires.
6 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are systems and methods for automatically deleting messages from a recipient'"'"'s inbox. The disclosed systems and methods provide the ability for automatic actions to be taken on delivered messages based on a passage of time. This enables a sender of messages, email service provider and/or email platform to exert control over sent messages to limit the number and type of operations that may be performed on such messages. For example, operations such as saving, forwarding, printing, copying, or otherwise duplicating the message and/or message data can be prohibited and all together rendered impossible. The disclosed systems and methods enables the purging of messages and associated message data from a recipient'"'"'s inbox at a certain specified time, after the passage of a pre-determined amount of time, or upon the detection of a specified event.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, at a computing device over a network from a first user, a message addressed to an inbox associated with a second user, said message comprising message content and a time-to-live (TTL) restriction embedded within metadata of the message, said TTL restriction comprising a TTL trigger indicating the message is being sent via short-lived (SL) protocol that enables said message to self-destruct in accordance with the TTL restriction; determining, via the computing device, that the second user'"'"'s message account hosting the inbox of said second user supports SL protocol; delivering, over the network, the message to the inbox of said second user; parsing, via the computing device, said message to determine when said TTL restriction is satisfied, said parsing comprising parsing said metadata to identify the TTL trigger; monitoring, via the computing device, an environment to detect an event satisfying said trigger; and causing, in response to said trigger detection, deletion, via the computing device, of said message from said second user inbox when said TTL restriction expires. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable storage medium tangibly encoded with computer-executable instructions, that when executed by a processor associated with a computing device, performs a method comprising:
-
receiving, over a network from a first user, a message addressed to an inbox associated with a second user, said message comprising message content and a time-to-live (TTL) restriction embedded within metadata of the message, said TTL restriction comprising a TTL trigger indicating the message is being sent via short-lived (SL) protocol that enables said message to self-destruct in accordance with the TTL restriction; determining that the second user'"'"'s message account hosting the inbox of said second user supports SL protocol; delivering, over the network, the message to the inbox of said second user; parsing said message to determine when said TTL restriction is satisfied, said parsing comprising parsing said metadata to identify the TTL trigger; monitoring an environment to detect an event satisfying said trigger; and causing, in response to said trigger detection, deletion of said message from said second user inbox when said TTL restriction expires. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
a processor; a non-transitory computer-readable storage medium for tangibly storing thereon program logic for execution by the processor, the program logic comprising; receiving logic executed by the processor for receiving, over a network from a first user, a message addressed to an inbox associated with a second user, said message comprising message content and a time-to-live (TTL) restriction embedded within metadata of the message, said TTL restriction comprising a TTL trigger indicating the message is being sent via short-lived (SL) protocol that enables said message to self-destruct in accordance with the TTL restriction; determination logic executed by the processor for determining that the second user'"'"'s message account hosting the inbox of said second user supports SL protocol; communication logic executed by the processor for delivering, over the network, the message to the inbox of said second user; parsing logic executed by the processor for parsing said message to determine when said TTL restriction is satisfied, said parsing comprising parsing said metadata to identify the TTL trigger; monitoring logic executed by the processor for monitoring an environment to detect an event satisfying said trigger; and deletion logic executed by the processor for causing, in response to said trigger detection, deletion of said message from said second user inbox when said TTL restriction expires. - View Dependent Claims (19, 20)
-
Specification