Private anonymous electronic messaging
First Claim
1. A method, comprising:
- authenticating by a disinterested third-party computing system a message originator based on a known true identity;
generating by the computing system an alert based on an updated profile of the message originator based on an electronic message; and
sending by the computing system the electronic message and the alert to a device of a message recipient without revealing the known true identity of the message originator unless the alert exceeds a predefined threshold that triggers revealing the known true identity of the message originator or if the message recipient is authorized by the organization to receive the known true identity.
11 Assignments
0 Petitions
Accused Products
Abstract
Private anonymous electronic messaging between a message originator and a message recipient within an organization encourages open communication which can provide information to the organization that might otherwise be secreted from the organization, and can allow the message originator to obtain desired help (e.g., counseling). By profiling of the message originator based on current and previous electronic messaging within the system as well as external organizational information (e.g., behavioral or financial information), the system can assess concerns yet act as a gateway to protect the message originator'"'"'s true identity through escalating levels of concern unless a genuine concern about the health, well-being, and/or safety of the message originator, others, or the organization is indicated, in which case the system can reveal the true identity of the message originator as appropriate.
-
Citations
20 Claims
-
1. A method, comprising:
-
authenticating by a disinterested third-party computing system a message originator based on a known true identity; generating by the computing system an alert based on an updated profile of the message originator based on an electronic message; and sending by the computing system the electronic message and the alert to a device of a message recipient without revealing the known true identity of the message originator unless the alert exceeds a predefined threshold that triggers revealing the known true identity of the message originator or if the message recipient is authorized by the organization to receive the known true identity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
11. A non-transitory computer readable medium having stored thereupon computing instructions comprising:
-
a code segment to authenticate by a disinterested third-party computing system a message originator of an organization based on a known true identity; a code segment to generate by the computing system an alert based on an updated profile of the message originator based on an electronic message or the electronic message; and a code segment to send by the computing system the electronic message and the alert to a device of a message recipient of the same organization without revealing the known true identity of the message originator unless the alert exceeds a predefined threshold that triggers revealing the known true identity of the message originator or if the message recipient is authorized by the organization to receive the known true identity.
-
Specification