Time travelling email messages after delivery
First Claim
Patent Images
1. A method of reviewing email messages after delivery to an inbox of a user, said inbox being associated with a mailbox, comprising:
- maintaining a suspect list of sources, the sources being undesirable based on user complaints or feedback loops;
monitoring the user'"'"'s actions relative to the inbox;
determining a read/view state of each email message;
in response to a user command, identifying, based on said determined state, each email message that has not been accessed by the user and that is stored in the mailbox of the user, said identifying further occurring periodically during periods when the mailbox is not being accessed by the user, wherein said identifying also occurs periodically in response to the monitoring indicating that user is no longer accessing the inbox;
determining the source of each of the identified email messages that has not been accessed; and
indicating to the user each identified email message in the inbox when the determined source of the identified email message is contained in the suspect list of sources.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for reviewing email messages after delivery to an inbox. An inbox filter maintains a suspect list identifying of the email messages including unwanted content and identifies unread email messages in the inbox of the user. The inbox filter moves each identified unread email message to a suspect folder when the determined source of the identified unread email message is contained in the suspect list of sources.
30 Citations
16 Claims
-
1. A method of reviewing email messages after delivery to an inbox of a user, said inbox being associated with a mailbox, comprising:
-
maintaining a suspect list of sources, the sources being undesirable based on user complaints or feedback loops; monitoring the user'"'"'s actions relative to the inbox; determining a read/view state of each email message; in response to a user command, identifying, based on said determined state, each email message that has not been accessed by the user and that is stored in the mailbox of the user, said identifying further occurring periodically during periods when the mailbox is not being accessed by the user, wherein said identifying also occurs periodically in response to the monitoring indicating that user is no longer accessing the inbox; determining the source of each of the identified email messages that has not been accessed; and indicating to the user each identified email message in the inbox when the determined source of the identified email message is contained in the suspect list of sources. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
an email server for delivering email messages to a mailbox of a user and for reviewing email messages after delivery to the mailbox, said email server comprising; a system memory storing computer-executable components, said components comprising; an email receipt component for receiving a plurality of email messages and storing said plurality of email messages in the mailbox of the user; and a suspect list component for maintaining a suspect list of sources wherein the reputation of source is undesirable based on user complaints or feedback loops; and an inbox filter for; monitoring the user'"'"'s actions relative to the mailbox while the user is accessing the mailbox; and in response to a user command, said inbox filter then; determining a read/view state of each email message; identifying, based on said determined state, each email message stored in the mailbox of the user which has not been seen, displayed, previewed, opened, or otherwise accessed by the user; determining the source of each of the identified email messages; and displaying each identified email message to indicate to the user that the determined source of the identified email message is contained in the suspect list of sources; wherein said identifying occurs periodically during periods when the mailbox is not being accessed by the user; and wherein said identifying also occurs periodically in response to the monitoring indicating that user is no longer accessing the inbox. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification