Prioritization of incoming communications
First Claim
1. A method performed by a computing device having at least one processor, the method comprising:
- determining an identity of an originator of an incoming communication using an originating address of the incoming communication;
applying a first set of rules to the identity of the originator of the incoming communication to determine an importance of the incoming communication, wherein the first set of rules comprise rules generated based at least on information about the originator of the incoming communication included in a directory of the computing device, and wherein the directory includes information about potential originators of incoming communications based on a location of each of the potential originators;
applying a second set of rules to the identity of the originator of the incoming communication to determine the importance of the incoming communication, wherein the second set of rules comprise rules generated based at least on previous interactions between the computing device and the originator of the incoming communication;
generating a prioritization score based on the importance determined by the first and second sets of rules;
outputting, by the computing device, at least one of information about the originator of the incoming communication and a basis for the generated prioritization score;
transmitting usage data of the incoming communication to a server, wherein the server collects usage data from multiple recipients of communications to update the importance of a contact and to maintain one or more block lists; and
receiving at least one of an updated importance of a contact and one or more updated block lists.
2 Assignments
0 Petitions
Accused Products
Abstract
The subject matter of this disclosure can be implemented in, among other things, a method performed by a computing device. In these examples, the method includes determining an identity of an originator of an incoming communication using an originating address of the incoming communication, and applying a first set of rules to the identity of the originator of the incoming communication to determine an importance of the incoming communication. The first set of rules includes rules generated based at least on information about the originator included in a directory of the computing device. The method may also include applying a second set of rules to the identity of the originator. The second set of rules includes rules generated based at least on previous interactions between the computing device and the originator.
-
Citations
19 Claims
-
1. A method performed by a computing device having at least one processor, the method comprising:
-
determining an identity of an originator of an incoming communication using an originating address of the incoming communication; applying a first set of rules to the identity of the originator of the incoming communication to determine an importance of the incoming communication, wherein the first set of rules comprise rules generated based at least on information about the originator of the incoming communication included in a directory of the computing device, and wherein the directory includes information about potential originators of incoming communications based on a location of each of the potential originators; applying a second set of rules to the identity of the originator of the incoming communication to determine the importance of the incoming communication, wherein the second set of rules comprise rules generated based at least on previous interactions between the computing device and the originator of the incoming communication; generating a prioritization score based on the importance determined by the first and second sets of rules; outputting, by the computing device, at least one of information about the originator of the incoming communication and a basis for the generated prioritization score; transmitting usage data of the incoming communication to a server, wherein the server collects usage data from multiple recipients of communications to update the importance of a contact and to maintain one or more block lists; and receiving at least one of an updated importance of a contact and one or more updated block lists. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
one or more processors; a directory configured to store information about potential originators of incoming communications based on a location of the potential originators; an originator identification module that identifies an originator of an incoming communication using an originating address of the incoming communication; and a message prioritization module operable by the one or more processors to apply a first set of rules to the identity of the originator of the incoming communication to determine an importance of the incoming communication, wherein the first set of rules comprise rules generated based at least on information about the originator of the incoming communication included in a directory of the computing device, apply a second set of rules to the identity of the originator of the incoming communication to determine the importance of the incoming communication, wherein the second set of rules comprise rules generated based at least on previous interactions between the computing device and the originator of the incoming communication, generate a prioritization score based on the importance determined by the first and second sets of rules, output at least one of information about the originator of the incoming communication and a basis for the generated prioritization score, transmit usage data of the incoming communication to a server, wherein the server collects data from multiple recipients of communications to update the importance of a contact and to maintain one or more block lists, and receive at least one of an updated importance of a contact and one or more updated block lists.
-
-
19. A non-transitory computer readable medium encoded with instructions that if executed by one or more programmable processors of a computing device cause the computing device to perform operations comprising:
-
determining an identity of an originator of an incoming communication using an originating address of the incoming communication; applying a first set of rules to the identity of the originator of the incoming communication to determine an importance of the incoming communication, wherein the first set of hierarchical rules comprise rules generated based at least on information about the originator of the incoming communication included in a directory of the computing device, and wherein the directory includes information about potential originators of incoming communications based on a location of each of the potential originators; applying a second set of rules to the identity of the originator of the incoming communication to determine the importance of the incoming communication, wherein the second set of rules comprise rules generated based at least on previous interactions between the computing device and the originator of the incoming communication; generating a prioritization score based on the importance determined by the first and second sets of rules; outputting at least one of information about the originator of the incoming communication and a basis for the generated prioritization score; transmitting usage data of the incoming communication to a server, wherein the server collects usage data from multiple recipients of communications to update the importance of a contact and to maintain one or more block lists; and receiving at least one of an updated importance of a contact and one or more updated block lists.
-
Specification