ENHANCING COMMUNICATION
5 Assignments
0 Petitions
Accused Products
Abstract
Among other things, from content of a communication composed by a user, a strategy is inferred for selecting target information related to the content. The strategy is used to select target information from a body of target information. And information about the selected target information is reported to the user.
12 Citations
50 Claims
-
1-30. -30. (canceled)
-
31. A computer-implemented method comprising
by one or more processors of a computer system: -
receiving data representing at least a portion of at least one communication composed by a first user; receiving target information that is related to the at least a portion of the at least one communication composed by a first user; identifying restricted information in the selected target information, the restricted information having access restrictions that prohibit reporting the secure information to the user; generating a first transmission intended for a second user, the second user being associated with at least some of the restricted information, the transmission representing a request for the second user to authorize access to the at least some of the restricted information; receiving a second transmission, the second transmission indicative of authorization to access the restricted information; and in response to the authorization, reporting, to the first user, at least some of the selected target information, the at least some target information including the at least some of the restricted information. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A computer-implemented method comprising
by one or more processors of a computer system: -
receiving a first communication, the first communication representing a request to authorize access to information identified in a body of target information as restricted information, the information being associated with at least a portion of at least one communication composed by a first user; receiving an authorization for the first user to access the restricted information, the authorization given by a second user in a user interface, the second user being associated with access restrictions of the restricted information; and transmitting a second communication, the second transmission indicating that the second user has authorized the first user to access to the restricted information - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 49, 50)
-
Specification