×

Rendering subject identification on protected messages lacking such identification

  • US 8,650,652 B2
  • Filed: 09/26/2006
  • Issued: 02/11/2014
  • Est. Priority Date: 09/26/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method for generating subject information in a message list for a protected message received and stored at an electronic communications device, wherein the protected message has been protected at an originating sender'"'"'s device and is initially received by the electronic communications device without subject information, the method comprising:

  • generating on a display screen of the electronic communications device the message list identifying messages that are stored on the electronic communications device and available to be viewed, the message list including a subject display field for subject information for each of a plurality of messages stored on the electronic communications device, the plurality of messages including at least one protected message, the generating including;

    for each protected message in the plurality of messages for which the subject display field is blank;

    determining if subject information for the protected message is stored on the electronic communications device;

    in response to determining that the subject information for the protected message is stored on the electronic communications device, including at least part of the stored subject information in the subject display field for the protected message; and

    in response to determining that the subject information for the protected message is not stored on the electronic communications device;

    extracting selected information from the protected message and including the selected information in the subject display field for the protected message, and storing the selected information on the electronic communications device as subject information for the protected message,wherein entry of a shared secret is required to open the protected message, the method comprising detecting that the protected message has been opened following successful entry of the shared secret and wherein the selected information is extracted from the protected message as a consequence to the protected message being successfully opened.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×