Enhancing communication
First Claim
Patent Images
1. A computer-implemented method comprising by one or more processors of a computer system:
- receiving data representing at least a portion of content of at least one communication composed and sent by a first user;
receiving target information that is related to the at least a portion of content composed and sent by a first user;
identifying restricted information in the target information, the restricted information including content composed by a second user and not sent to the first user, and having access restrictions that prohibit reporting the restricted information to the first user;
generating a first transmission intended for the second user, the second user being associated with at least some of the restricted information, the first transmission representing a request for the second user to authorize access to the at least some of the restricted information;
receiving a second transmission, the second transmission indicative of authorization to access the restricted information; and
in response to the authorization, reporting, to the first user, at least some of the selected target information, the at least some target information including the at least some of the restricted information.
5 Assignments
0 Petitions
Accused Products
Abstract
Among other things, from content of a communication composed by a user, a strategy is inferred for selecting target information related to the content. The strategy is used to select target information from a body of target information. And information about the selected target information is reported to the user.
-
Citations
23 Claims
-
1. A computer-implemented method comprising by one or more processors of a computer system:
-
receiving data representing at least a portion of content of at least one communication composed and sent by a first user; receiving target information that is related to the at least a portion of content composed and sent by a first user; identifying restricted information in the target information, the restricted information including content composed by a second user and not sent to the first user, and having access restrictions that prohibit reporting the restricted information to the first user; generating a first transmission intended for the second user, the second user being associated with at least some of the restricted information, the first transmission representing a request for the second user to authorize access to the at least some of the restricted information; receiving a second transmission, the second transmission indicative of authorization to access the restricted information; and in response to the authorization, reporting, to the first user, at least some of the selected target information, the at least some target information including the at least some of the restricted information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method comprising by one or more processors of a computer system:
-
receiving a first communication, the first communication representing a request to authorize access to information identified in a body of target information as restricted information, the restricted information being associated with at least a portion of content of at least one communication composed and sent by a first user, the restricted information including content composed by a second user and not sent to the first user; receiving an authorization for the first user to access the restricted information, the authorization given by the second user in a user interface, the second user being associated with access restrictions of the restricted information; and transmitting a second communication, the second communication indicating that the second user has authorized the first user to access to the restricted information. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
Specification