Method, system and program product for verifying an attachment file within an e-mail
First Claim
1. A method of managing a first file attached to an e-mail, the first file having a file name, the method comprising the steps of:
- a first computer determining the file name of the first file attached to the e-mail, the e-mail being addressed to a recipient utilizing a second computer;
the first computer sending a second file including a voice message to a third computer, the voice message including a description of contents of the first file;
responsive to the first computer sending the second file to the third computer, the first computer receiving from the third computer an address of the second file, the address indicating a location at which the second file is stored;
the first computer modifying the address of the second file to comply with a set of rules for naming files in a file system of the second computer;
the first computer modifying the file name of the first file attached to the e-mail by enclosing the modified address between a first delimiter and a second delimiter and inserting the enclosed modified address into the file name, the first file having remained attached to the e-mail from the step of determining the file name up to and including the step of modifying the file name; and
the first computer sending to the second computer the e-mail with the modified file name to indicate to the recipient that the first file is associated with the voice message.
0 Assignments
0 Petitions
Accused Products
Abstract
System, method and program product for managing a file attached to an e-mail. The attached file'"'"'s file name is obtained. A voice message file address is received and encoded into a modified address to comply with file naming rules of a recipient computer. A composite file name results from inserting the modified address into the attached file'"'"'s file name and is displayed in the e-mail. The recipient computer extracts the modified address from the composite file name in the e-mail and decodes the modified address to obtain the voice message file address. Using the voice message file address, the recipient computer requests and receives the voice message file. The voice message is analyzed and verified prior to accessing the attached file. Verifying the voice message includes comparing a voice of the voice message to a voice signature.
-
Citations
18 Claims
-
1. A method of managing a first file attached to an e-mail, the first file having a file name, the method comprising the steps of:
-
a first computer determining the file name of the first file attached to the e-mail, the e-mail being addressed to a recipient utilizing a second computer; the first computer sending a second file including a voice message to a third computer, the voice message including a description of contents of the first file; responsive to the first computer sending the second file to the third computer, the first computer receiving from the third computer an address of the second file, the address indicating a location at which the second file is stored; the first computer modifying the address of the second file to comply with a set of rules for naming files in a file system of the second computer; the first computer modifying the file name of the first file attached to the e-mail by enclosing the modified address between a first delimiter and a second delimiter and inserting the enclosed modified address into the file name, the first file having remained attached to the e-mail from the step of determining the file name up to and including the step of modifying the file name; and the first computer sending to the second computer the e-mail with the modified file name to indicate to the recipient that the first file is associated with the voice message. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product, comprising:
a computer-readable, tangible storage device and computer-readable program code stored on the computer-readable, tangible storage device, the computer-readable program code when executed by a central processing unit (CPU) of a first computer implementing a method of managing a first file attached to an e-mail, the first file having a file name, the method comprising the steps of; determining the file name of the first file attached to the e-mail, the e-mail being addressed to a recipient utilizing a second computer; sending a second file including a voice message to a third computer, the voice message including a description of contents of the first file; responsive to sending the second file to the third computer, receiving from the third computer an address of the second file, the address indicating a location at which the second file is stored; modifying the address of the second file to comply with a set of rules for naming files in a file system of the second computer; modifying the file name of the first file attached to the e-mail by enclosing the modified address between a first delimiter and a second delimiter and inserting the enclosed modified address into the file name, the first file having remained attached to the e-mail from the step of determining the file name up to and including the step of modifying the file name; and sending to the second computer the e-mail with the modified file name to indicate to the recipient that the first file is associated with the voice message. - View Dependent Claims (9, 10)
-
11. A method of authenticating a first file attached to an e-mail, the method comprising the steps of:
-
a computer receiving the e-mail with the first file attached thereto, wherein the e-mail includes a modified file name of the first file, the modified file name including an original file name of the first file and an encoded address of a second file inserted into the original file name, the modified file name further including a first delimiter and a second delimiter enclosing the encoded address, the first file having remained attached to the e-mail from a determination of the original file name up to and including a generation of the modified file name, wherein the encoded address is a string of characters that complies with a set of rules for naming files in a file system of the computer; the computer extracting the encoded address from the modified file name; the computer decoding the encoded address to identify an address of a second file including a voice message, the voice message including a description of contents of the first file; the computer sending a request to fetch the second file from a computing data storage device, wherein the request includes the identified address of the second file; responsive to the step of sending the request to fetch the second file, the computer receiving the second file; and the computer sending to a recipient of the e-mail, the voice message included in the second file. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
Specification