Closed loop communication
First Claim
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, comprising:
- code that monitors a plurality of anonymous communications between a first party associated with a first client device and a plurality of second parties associated with a plurality of second client devices, wherein individual anonymous communications are exchanged between the first party and a corresponding second party of the plurality of second parties, wherein the first party can be a sender of a first portion of the plurality of anonymous communications and the first party can also be an intended recipient for a second portion of the plurality of anonymous communications, wherein a sender email address is substituted with an active sender proxy email address and the intended recipient uses an intended recipient proxy email address;
code that analyzes the plurality of anonymous communications to at least determine an average response time of individual response times of the first party responding to individual received communications of the second portion of the plurality of anonymous communications sent from individual second parties of the plurality of second parties;
code that generates an analysis report of the plurality of anonymous communications, the analysis report including at least a feedback of suggestion for improvement related to the average response time; and
code that provides the analysis report including the feedback of suggestion for improving the average response time to the first client device of the first party.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments of a system. In one embodiment, among others, a method comprises intercepting a communication between a first party and a second party in a communication forum. The communication includes first party proxy information as an intended recipient information. The method further comprises accessing a communication pair using the intended recipient information. The intended recipient information is associated with second party proxy information. The second party proxy information is associated with second party information. Additionally, the method comprises determining whether the identity of the sender is valid.
-
Citations
20 Claims
-
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, comprising:
-
code that monitors a plurality of anonymous communications between a first party associated with a first client device and a plurality of second parties associated with a plurality of second client devices, wherein individual anonymous communications are exchanged between the first party and a corresponding second party of the plurality of second parties, wherein the first party can be a sender of a first portion of the plurality of anonymous communications and the first party can also be an intended recipient for a second portion of the plurality of anonymous communications, wherein a sender email address is substituted with an active sender proxy email address and the intended recipient uses an intended recipient proxy email address; code that analyzes the plurality of anonymous communications to at least determine an average response time of individual response times of the first party responding to individual received communications of the second portion of the plurality of anonymous communications sent from individual second parties of the plurality of second parties; code that generates an analysis report of the plurality of anonymous communications, the analysis report including at least a feedback of suggestion for improvement related to the average response time; and code that provides the analysis report including the feedback of suggestion for improving the average response time to the first client device of the first party. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system, comprising:
-
at least one computing device; a memory accessible to the at least one computing device; and a closed loop communication manager executable in the at least one computing device, the closed loop communication manager comprising; logic that monitors a plurality of anonymous communications associated with a plurality of communication pairs and being exchanged between a first client device and a plurality of second client devices, wherein individual communication pairs comprise a first party and a second party, and wherein the first party can be a sender of a first portion of the plurality of anonymous communications and the first party can also be an intended recipient for a second portion of the plurality of anonymous communications, wherein a sender email address is substituted with an active sender proxy email address and the intended recipient uses an intended recipient proxy email address; logic that analyzes the plurality of anonymous communications to at least determine an average response time of individual response times of the first party responding to individual received communications of the second portion of the plurality of anonymous communications sent from the second party; logic that generates an analysis report that includes at least a feedback of suggestion for improvement related to the average response time; and logic that sends the analysis report including the feedback of suggestion for improving the average response time to the first client device of the first party. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A method, comprising:
-
monitoring, via at least one of one or more computing devices, a plurality of anonymous communications among a plurality of communication pairs, wherein individual communication pairs comprise a first party and a second party, wherein the first party can be a sender of a first portion of the plurality of anonymous communications and the first party also can be an intended recipient for a second portion of the plurality of anonymous communications, wherein a sender email address is substituted with an active sender proxy email address and the intended recipient uses an intended recipient proxy email address; analyzing, via at least one of the one or more computing devices, a communications metric associated with the plurality of anonymous communications; calculating, via at least one of the one or more computing devices, an average response time of individual response times of the first party responding to individual received communications of the second portion of the plurality of anonymous communications send from the second party; generating, via at least one of the one or more computing devices, an analysis report including at least a feedback of suggestion for improvement related to the average response time; and sending, via at least one of the one or more computing devices, the analysis report including the feedback of suggestion for improving the average response time to a first client device of the first party. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification