Prioritization of incoming communications
First Claim
1. A method performed by a computing device having at least one processor, the method comprising:
- determining, by the computing device, based at least in part on an originating address of an incoming communication, an identity of an originator of the incoming communication;
applying, by the computing device, a first set of rules to the identity of the originator of the incoming communication to determine a first importance of the incoming communication, wherein the first set of rules comprise rules generated based at least in part on information about the originator of the incoming communication included in a directory of the computing device, and wherein the directory includes location information about potential originators of incoming communications, and wherein the first importance of the incoming communication is based on a respective location of each of the potential originators and one or more of a geographic location of the computing device or a social location of a user of the computing device;
applying, by the computing device, a second set of rules to the identity of the originator of the incoming communication to determine a second importance of the incoming communication, wherein the second set of rules comprise rules generated based at least in part on previous interactions between the computing device and the originator of the incoming communication, wherein the previous interactions between the computing device and the originator of the incoming communication comprise a frequency of interaction between the originator of the incoming communication and the user of the computing device;
generating, by the computing device, a prioritization score based at least in part on the first importance of the incoming communication and the second importance of the incoming communication; and
selectively outputting, by the computing device, based at least in part on the prioritization score, an indication of the incoming communication.
2 Assignments
0 Petitions
Accused Products
Abstract
The subject matter of this disclosure can be implemented in, among other things, a method performed by a computing device. In these examples, the method includes determining an identity of an originator of an incoming communication using an originating address of the incoming communication, and applying a first set of rules to the identity of the originator of the incoming communication to determine an importance of the incoming communication. The first set of rules includes rules generated based at least on information about the originator included in a directory of the computing device. The method may also include applying a second set of rules to the identity of the originator. The second set of rules includes rules generated based at least on previous interactions between the computing device and the originator.
-
Citations
20 Claims
-
1. A method performed by a computing device having at least one processor, the method comprising:
-
determining, by the computing device, based at least in part on an originating address of an incoming communication, an identity of an originator of the incoming communication; applying, by the computing device, a first set of rules to the identity of the originator of the incoming communication to determine a first importance of the incoming communication, wherein the first set of rules comprise rules generated based at least in part on information about the originator of the incoming communication included in a directory of the computing device, and wherein the directory includes location information about potential originators of incoming communications, and wherein the first importance of the incoming communication is based on a respective location of each of the potential originators and one or more of a geographic location of the computing device or a social location of a user of the computing device; applying, by the computing device, a second set of rules to the identity of the originator of the incoming communication to determine a second importance of the incoming communication, wherein the second set of rules comprise rules generated based at least in part on previous interactions between the computing device and the originator of the incoming communication, wherein the previous interactions between the computing device and the originator of the incoming communication comprise a frequency of interaction between the originator of the incoming communication and the user of the computing device; generating, by the computing device, a prioritization score based at least in part on the first importance of the incoming communication and the second importance of the incoming communication; and selectively outputting, by the computing device, based at least in part on the prioritization score, an indication of the incoming communication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system comprising:
-
one or more processors; a directory configured to store information about potential originators of incoming communications based on a location of the potential originators; an originator identification module that identifies, based at least in part on an originating address of an incoming communication, an originator of the incoming communication; and a message prioritization module operable by the one or more processors to apply a first set of rules to the identity of the originator of the incoming communication to determine a first importance of the incoming communication, wherein the first set of rules comprise rules generated based at least in part on information about the originator of the incoming communication included in a directory of the computing device, and wherein the directory includes location information about potential originators of incoming communications, and wherein the first importance of the incoming communication is based on a respective location of each of the potential originators and one or more of a geographic location of the computing device or a social location of a user of the computing device, apply a second set of rules to the identity of the originator of the incoming communication to determine a second importance of the incoming communication, wherein the second set of rules comprise rules generated based at least in part on previous interactions between the computing device and the originator of the incoming communication, wherein the previous interactions between the computing device and the originator of the incoming communication comprises the frequency of interaction between the originator of the incoming communication and the computing device, and generate a prioritization score based at least in part on the first importance of the incoming communication and the second importance of the incoming communication.
-
-
20. A non-transitory computer readable medium encoded with instructions that if executed by one or more programmable processors of a computing device cause the computing device to perform operations comprising:
-
determining, based at least in part on an originating address of an incoming communication, an identity of an originator of the incoming communication; applying a first set of rules to the identity of the originator of the incoming communication to determine a first importance of the incoming communication, wherein the first set of rules comprise rules generated based at least in part on information about the originator of the incoming communication included in a directory of the computing device, and wherein the directory includes location information about potential originators of incoming communications, and wherein the first importance of the incoming communication is based on a respective location of each of the potential originators and one or more of a geographic location of the computing device or a social location of a user of the computing device; applying a second set of rules to the identity of the originator of the incoming communication to determine a second importance of the incoming communication, wherein the second set of rules comprise rules generated based at least in part on previous interactions between the computing device and the originator of the incoming communication,. wherein the previous interactions between the computing device and the originator of the incoming communication comprises the frequency of interaction between the originator of the incoming communication and the computing device; and generating a prioritization score based at least in part on the first importance of the incoming communication and the second importance of the incoming communication.
-
Specification