Managing electronic messages
First Claim
1. A method, comprising:
- at a recipient computer system;
receiving an electronic message, sent from a sender system, that includes information about activities that occurred at the sender system during creation of the electronic message, wherein the information about activities that occurred at the sender system during creation of the electronic message includes information about keystroke activity, mouse activity, user-interface activity, and/or time spent composing the electronic message;
determining whether the information included in the electronic message about activities that occurred at the sender system during the creation of the electronic message indicates the electronic message is a personal electronic message or an unsolicited message;
in accordance with a determination that the information included in the electronic message about activities that occurred at the sender system during the creation of the electronic message indicates the electronic message is a personal electronic message, processing the electronic message in a first manner, wherein the first manner delivers the electronic message to an intended recipient; and
in accordance with a determination that the information included in the electronic message about activities that occurred at the sender system during the creation of the electronic message indicates the electronic message is an unsolicited message, processing the electronic message in a second manner that is distinct from the first manner, wherein the second manner filters out the electronic message.
12 Assignments
0 Petitions
Accused Products
Abstract
A recipient computer system may receive one or more electronic messages. The recipient computer system may send one, two, or more challenge messages to the sender of the electronic messages in determining whether to deliver the electronic message. The recipient computer system may accept or reject an electronic message based on the response, or lack of response, to the challenge messages. The recipient computer system may send two or more challenge messages at intervals. A sender computer system may record activity of the sender computer system for a recipient computer system to use in determining whether to deliver an electronic message. A sender computer system may provide a summary of that activity with an electronic message. A sender computer system may provide an authorization key for a recipient computer system to use in determining whether to deliver an electronic message. The authorization key may be generated by a third party.
-
Citations
9 Claims
-
1. A method, comprising:
at a recipient computer system; receiving an electronic message, sent from a sender system, that includes information about activities that occurred at the sender system during creation of the electronic message, wherein the information about activities that occurred at the sender system during creation of the electronic message includes information about keystroke activity, mouse activity, user-interface activity, and/or time spent composing the electronic message; determining whether the information included in the electronic message about activities that occurred at the sender system during the creation of the electronic message indicates the electronic message is a personal electronic message or an unsolicited message; in accordance with a determination that the information included in the electronic message about activities that occurred at the sender system during the creation of the electronic message indicates the electronic message is a personal electronic message, processing the electronic message in a first manner, wherein the first manner delivers the electronic message to an intended recipient; and in accordance with a determination that the information included in the electronic message about activities that occurred at the sender system during the creation of the electronic message indicates the electronic message is an unsolicited message, processing the electronic message in a second manner that is distinct from the first manner, wherein the second manner filters out the electronic message. - View Dependent Claims (2, 3)
-
4. A recipient computer system, comprising:
-
one or more processors; memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for; receiving an electronic message, sent from a sender system, that includes information about activities that occurred at the sender system during creation of the electronic message, wherein the information about activities that occurred at the sender system during creation of the electronic message includes information about keystroke activity, mouse activity, user-interface activity, and/or time spent composing the electronic message; determining whether the information included in the electronic message about activities that occurred at the sender system during the creation of the electronic message indicates the electronic message is a personal electronic message or an unsolicited message; in accordance with a determination that the information included in the electronic message about activities that occurred at the sender system during the creation of the electronic message indicates the electronic message is a personal electronic message, processing the electronic message in a first manner, wherein the first manner delivers the electronic message to an intended recipient; and in accordance with a determination that the information included in the electronic message about activities that occurred at the sender system during the creation of the electronic message indicates the electronic message is an unsolicited message, processing the electronic message in a second manner that is distinct from the first manner, wherein the second manner filters out the electronic message. - View Dependent Claims (5, 6)
-
-
7. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a recipient computer system cause the recipient computer system to:
-
receive an electronic message, sent from a sender system, that includes information about activities that occurred at the sender system during creation of the electronic message, wherein the information about activities that occurred at the sender system during creation of the electronic message includes information about keystroke activity, mouse activity, user-interface activity, and/or time spent composing the electronic message; determine whether the information included in the electronic message about activities that occurred at the sender system during the creation of the electronic message indicates the electronic message is a personal electronic message or an unsolicited message; in accordance with a determination that the information included in the electronic message about activities that occurred at the sender system during the creation of the electronic message indicates the electronic message is a personal electronic message, process the electronic message in a first manner, wherein the first manner delivers the electronic message to an intended recipient; and in accordance with a determination that the information included in the electronic message about activities that occurred at the sender system during the creation of the electronic message indicates the electronic message is an unsolicited message, process the electronic message in a second manner that is distinct from the first manner, wherein the second manner filters out the electronic message. - View Dependent Claims (8, 9)
-
Specification