Messaging policy controlled email de-duplication
First Claim
1. A non-transitory, computer-readable medium storing computer-executable instructions that when executed by a personal communication device, control the personal communication device to perform a method, the method comprising:
- accessing a messaging policy;
interfacing with an email application running on the personal communication device;
accessing an email message associated with the email application;
determining a degree of duplication in the email message;
upon determining that the degree of duplication exceeds a threshold identified in the messaging policy, deduplicating the email message to produce a reduced email message having less information than the email message, and providing the reduced email message to a recipient;
where deduplicating the email message to produce the reduced email message comprises chunking the email message into a plurality of sub-blocks and identifying a member of the plurality as a duplicate sub-block or a unique sub-block with respect to a repository of sub-blocks specific to the email application,where deduplicating the email message to produce the reduced email message comprises selectively replacing a member of the plurality of sub-blocks with a sub-block identifier upon determining that the member is a duplicate sub-block with respect to the repository of sub-blocks, where the sub-block identifier is smaller than the member, andwhere deduplicating the email message comprises removing an attachment to the email message upon determining that the attachment has more than a threshold number of duplicate sub-blocks with respect to the repository of sub-blocks; and
upon determining that the degree of duplication does not exceed a threshold identified in the messaging policy, providing the email message.
8 Assignments
0 Petitions
Accused Products
Abstract
Example methods and apparatus associated with a messaging policy controlled email deduplication are provided. In one example a messaging policy is accessed. It is determined whether a received message complies with the policy based on rules of the messaging policy. If a message complies with the messaging policy, the message is displayed. If the message does not comply with the messaging policy, it is determined whether the message is duplicative. If the message is deemed duplicative it is not displayed. Conversely, if the message is not deemed duplicative it is displayed.
-
Citations
8 Claims
-
1. A non-transitory, computer-readable medium storing computer-executable instructions that when executed by a personal communication device, control the personal communication device to perform a method, the method comprising:
-
accessing a messaging policy; interfacing with an email application running on the personal communication device; accessing an email message associated with the email application; determining a degree of duplication in the email message; upon determining that the degree of duplication exceeds a threshold identified in the messaging policy, deduplicating the email message to produce a reduced email message having less information than the email message, and providing the reduced email message to a recipient; where deduplicating the email message to produce the reduced email message comprises chunking the email message into a plurality of sub-blocks and identifying a member of the plurality as a duplicate sub-block or a unique sub-block with respect to a repository of sub-blocks specific to the email application, where deduplicating the email message to produce the reduced email message comprises selectively replacing a member of the plurality of sub-blocks with a sub-block identifier upon determining that the member is a duplicate sub-block with respect to the repository of sub-blocks, where the sub-block identifier is smaller than the member, and where deduplicating the email message comprises removing an attachment to the email message upon determining that the attachment has more than a threshold number of duplicate sub-blocks with respect to the repository of sub-blocks; and upon determining that the degree of duplication does not exceed a threshold identified in the messaging policy, providing the email message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification