Method and apparatus for constructing and maintaining a user knowledge profile
First Claim
1. A computer-implemented method, comprising:
- intercepting, by the computer, emails sent by a first entity while the emails are being transmitted on a network;
automatically constructing, by the computer, a knowledge profile of the first entity based on a plurality of sets of text from the intercepted emails;
storing, by the computer, the knowledge profile as part of a knowledge base stored in a machine-accessible storage facility;
in response to preparation of a particular email to be sent by a second entity to at least one other entity of the network, identifying, by the computer, prior to sending the particular email by the second entity, one or more suggested potential recipients as meeting one or more criteria based at least in part on a comparison of the knowledge profile of the one or more suggested potential recipients and text contained in the particular email to be sent by the second entity;
outputting, by the computer, a recommendation to include at least a first entity as a recipient of the particular email to be sent by the second entity, the first entity meeting the one or more criteria and being one of the one or more suggested potential recipients; and
providing, by the computer, a matching metric indicative of a relative strength of the recommendation for the one or more suggested potential recipients, the matching metric comprises a sum of confidence level values associated with the one or more suggested potential recipients.
6 Assignments
0 Petitions
Accused Products
Abstract
A method of constructing an entity profile, having private and public portions with different access restrictions, commences with the assignment of a confidence level to content within an electronic document. The electronic document may be associated with the first entity (e.g., may have been authored by or addressed to the first entity). The content may furthermore potentially be descriptive of the first entity. If the confidence level assigned to the content is less than a predetermined threshold, the content is automatically rejected for inclusion within the entity profile. On the other hand, if the confidence level assigned to the content exceeds the predetermined threshold, the content is included within the private portion of the entity profile. Thereafter, the content is automatically presented to the first entity for authorization, by the first entity, for inclusion of the content within the public portion of the profile. The public portion of the entity profile may be freely accessible by other entities, whereas the private portion may have access restrictions.
-
Citations
24 Claims
-
1. A computer-implemented method, comprising:
-
intercepting, by the computer, emails sent by a first entity while the emails are being transmitted on a network; automatically constructing, by the computer, a knowledge profile of the first entity based on a plurality of sets of text from the intercepted emails; storing, by the computer, the knowledge profile as part of a knowledge base stored in a machine-accessible storage facility; in response to preparation of a particular email to be sent by a second entity to at least one other entity of the network, identifying, by the computer, prior to sending the particular email by the second entity, one or more suggested potential recipients as meeting one or more criteria based at least in part on a comparison of the knowledge profile of the one or more suggested potential recipients and text contained in the particular email to be sent by the second entity; outputting, by the computer, a recommendation to include at least a first entity as a recipient of the particular email to be sent by the second entity, the first entity meeting the one or more criteria and being one of the one or more suggested potential recipients; and providing, by the computer, a matching metric indicative of a relative strength of the recommendation for the one or more suggested potential recipients, the matching metric comprises a sum of confidence level values associated with the one or more suggested potential recipients. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
-
a memory; a management server to intercept emails while the emails are being transmitted on a network by a first user and to automatically construct a knowledge profile of the first user based on a plurality of sets of text from the intercepted emails, the management server further to store the knowledge profile in a database in the memory; and
an access server to identify, prior to sending a particular email by a second user, one or more suggested potential recipients as meeting one or more criteria in response to preparation of the particular email to be sent by the second user and intended for at least one other user of the network, without reliance upon any user-defined association between the first user and the second user, by at least comparing the knowledge profile of the one or more suggested potential recipients with text contained in the particular email intended for the at least one other user, the access server further to recommend to include at least the first user as a recipient of the particular email to be sent by the second user, the first user meeting the one or more criteria and being one of the one or more suggested potential recipients, without reliance upon any user-defined association between the first user and the second user, the access server further to provide a matching metric indicative of a relative strength of the recommendation for the one or more suggested potential recipients, the matching metric comprises a sum of confidence level values associated with the one or more suggested potential recipients. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A processing system, comprising:
-
a processor; and a memory coupled with the processor and storing instructions which, when executed by the processor, cause the processing system to perform a process that includes; intercepting emails sent by a first entity while the emails are being transmitted on a network; automatically constructing a knowledge profile of the first entity based on a plurality of sets of text from the intercepted emails; storing the knowledge profile as part of a knowledge base stored in a machine-accessible storage facility; in response to preparation of a particular email prepared by a second entity and intended for at least one other entity, identifying, prior to sending the particular email by the second entity, one or more suggested potential recipients as meeting one or more criteria based at least in part on a comparison of the knowledge profile of the one or more suggested potential recipients and text contained in the particular email prepared by the second entity; outputting a recommendation to include at least a first entity as a recipient of the particular email prepared by the second entity, the first entity meeting the one or more criteria and being one of the one or more suggested potential recipients; and
providing a matching metric indicative of a relative strength of the recommendation for the one or more suggested potential recipients, the matching metric comprises a sum of confidence level values associated with the one or more suggested potential recipients. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24)
-
Specification