User interface for email inbox to call attention differently to different classes of email
First Claim
1. A computer-implemented method residing in a non-transitory computer-readable medium and executed by a computer for performing the method, including:
- detecting attempts by an embedded service within a browser to communicate with an external messaging service;
inspecting events before or as the events are returned from the external messaging service and before the events are processed by the embedded service within the browser, the events are published by the browser;
augmenting the events with additional functionality to enhance the embedded service within the browser, the additional functionality monitors emails being received and sent from the embedded service, and wherein the embedded service is an email client and the external messaging service is a web mail server and the additional functionality is not otherwise provided by or available from the external messaging service, the added functionality detects the browser contacting the external messaging service and intercepts data sent between the external messaging service and the embedded service, and wherein the added functionality is automatically launched for execution whenever the browser launches for execution; and
customizing, by the additional functionality, presentation of the emails within the browser by calling attention to the emails within the browser for;
presenting a branding visual indication for some of the senders of the emails, presenting a whitelist visual indication for the some of the senders, presenting a fraudulent visual indication for some of the senders, and providing additional visual and audio effects for each of the visual indications when that visual indication is brought into focus within the browser.
1 Assignment
0 Petitions
Accused Products
Abstract
A user interface for email users which calls attention to one or more categories of emails in different ways. In some species, at least three categories are used: branded senders with Trumarks; white list buddies; and fraudulent emails which are either not from the domain they purport to be from or in which the content was tampered. The preferred embodiment authenticates emails from branded senders and displays them with the sender'"'"'s Truemark. Branded sender emails have their Truemarks displayed in the sender column of a list view in the preferred embodiment. In a preferred embodiment, white list senders have either an icon or other graphic or photo they choose displayed to the left or right of the sender column with their name in the sender column. In a preferred embodiment, fraudulent emails have a fraud icon displayed to the left or right of the sender column with a warning in the sender column. Antiphishing processing is also disclosed.
21 Citations
20 Claims
-
1. A computer-implemented method residing in a non-transitory computer-readable medium and executed by a computer for performing the method, including:
-
detecting attempts by an embedded service within a browser to communicate with an external messaging service; inspecting events before or as the events are returned from the external messaging service and before the events are processed by the embedded service within the browser, the events are published by the browser; augmenting the events with additional functionality to enhance the embedded service within the browser, the additional functionality monitors emails being received and sent from the embedded service, and wherein the embedded service is an email client and the external messaging service is a web mail server and the additional functionality is not otherwise provided by or available from the external messaging service, the added functionality detects the browser contacting the external messaging service and intercepts data sent between the external messaging service and the embedded service, and wherein the added functionality is automatically launched for execution whenever the browser launches for execution; and customizing, by the additional functionality, presentation of the emails within the browser by calling attention to the emails within the browser for;
presenting a branding visual indication for some of the senders of the emails, presenting a whitelist visual indication for the some of the senders, presenting a fraudulent visual indication for some of the senders, and providing additional visual and audio effects for each of the visual indications when that visual indication is brought into focus within the browser. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium having instructions residing therein, the instructions when accessed by a computer performs a method, including:
-
detecting, by the computer, communications between a browser service processing within a browser and an external messaging service; inspecting, by the computer, information and events passed with those communications; adding, by the computer, features to the browser that appear to be associated with the external messaging service or that appear to be associated with the browser service in response to the inspected information or the events, the browser service is an email client and the external messaging service is a web mail server, the events are published by the browser, and the features monitor emails being received by the email client and sent by the email client and the features are not otherwise provided by or available from the external messaging service, the features detect the browser contacting the web mail server and intercepts data sent between the web mail server and the email client, and wherein the features are launched for execution whenever the browser is launched for execution; and customizing, by the features, presentation of the emails within the browser by calling attention to the emails within the browser for;
presenting a branding visual indication for some of the senders of the emails, presenting a whitelist visual indication for the some of the senders, presenting a fraudulent visual indication for some of the senders, and providing additional visual and audio effects for each of the visual indications when that visual indication is brought into focus within the browser. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented system, including:
a computer configured with a browser plug-in service implemented in a non-transitory computer-readable medium and to execute on the computer, the browser plug-in service is to interpose its processing between a browser-client messaging service and an external messaging service within a browser, and the browser plug-in service is to intercept messages and events communicated from the external messaging service to the browser-client messaging service and is to augment content and presentation of the content within the browser in response to processing the messages and the events, and the browser-client messaging service is an email client and the external messaging service is a web mail server, the events are published by the browser, the browser-client messaging service monitors emails being received by the email client and being sent by the email client and the augmentation of the content and the presentation is not otherwise provided by or available from the external messaging service, the added functionality detects the browser contacting the external messaging service and intercepts data sent between the external messaging service and the browser-client messaging service, and wherein the added functionality is launched for execution whenever the browser is launched for execution, and wherein the added functionality is to customize presentation of the emails within the browser by calling attention to the emails within the browser to;
present a branding visual indication for some of the senders of the emails, present a whitelist visual indication for the some of the senders, present a fraudulent visual indication for some of the senders, and provide additional visual and audio effects for each of the visual indications when that visual indication is brought into focus within the browser.- View Dependent Claims (16, 17, 18, 19, 20)
Specification