Abstract:
Disclosed is a system, method, and non-transitory computer readable storage medium for predicting future messages. A processor receives a message sent to a user operating a client device, analyzes the message in light of previously identified patterns and scores assigned to scanned messages, determines a future message that should be received by the client device based on the received message, and transmits an item of information based on the determined future message.
Abstract:
Disclosed is a system and method for email management that leverages information derived from automatically generated templates in order to identify types of message and message content. The systems and methods discussed herein involve identifying messages matching specific template types and structures, and automatically extracting important data from email messages matching those templates. The extracted data enables improvements for a user's experience and increased monetization. That is, templates can be analyzed to determine a type of email message, which in turn can be presented to a receiving user within an automatic folder or tag designation. Additionally, email snippets or previews can be generated from the extracted data for display within a user's inbox. Also, the extracted data can be used for monetization purposes, by serving targeted advertisements based upon the data extracted from such messages.
Abstract:
A computer system, computer program product, and computer-implemented method for communicating electronic messages over a communication network coupled thereto are provided. The computer system comprises a network interface for receiving messages sent over the network and addressed to a user of the computer system; and computer executable electronic message processing software. The software comprises instructions for directing the computer system to receive a message over the network, and to identify whether a sender of the received electronic message is a human or a machine. The identifying includes first and second phases of operation. The first phase includes an offline phase employing information and activities resident on the computer system. The second phase includes an online phase employing resources remotely accessible over the network. The software further includes instructions for providing the user with the results of the identification as human or machine; and for performing automatic data extraction from the message if the message was identified to be from a machine.