BRIEF DESCRIPTION OF THE DRAWINGS
The subject matter which is regarded as the invention is particularly pointed out and distinctly claimed in the claims at the conclusion of the specification. The foregoing and other objects, features, and advantages of the invention are apparent from the following detailed description taken in conjunction with the accompanying drawings in which:
FIG. 1 illustrates a system for practicing one or more embodiments of the present invention.
FIG. 2 shows one exemplary embodiment of a sender pull down menu user interface for specifying email reply length constraint parameters.
FIG. 3A is a flow diagram illustrating one embodiment of a method for a sending party to provide email reply length and attachment constraint parameters.
FIG. 3B is a flow diagram illustrating one embodiment of a method of handling reply mail when subject to the reply email constraints.
The detailed description explains the preferred embodiments of the invention, together with advantages and features, by way of example with reference to the drawings.
DETAILED DESCRIPTION OF SPECIFIC EMBODIMENTS
Turning now to the drawings as described in detail below, the present invention provides for a sender of an email to specify to a receiver(s) a reply length constraint for the text body of the reply message, as well as a criteria for the size, number, and types of allowed attachment files associated with the reply message.
FIG. 1 is a block diagram of an exemplary system 1 for implementing the email reply controls of the present invention and graphically illustrates how those blocks interact in operation. The system includes one or more email sending workstations 2 coupled to a server system 4 via a network 6. Each email sending workstation 2 may be implemented using a general-purpose computer executing a computer program for carrying out the processes described herein. The computer program may be resident on a storage medium local to the sending workstation 2, or maybe stored on the server system 4. The server system 4 may belong to a public email service. The network 6 may be any type of known network including a local area network (LAN), wide area network (WAN), global network (e.g., Internet), intranet, etc. The email sending workstations 2 may be coupled to the server system 4 through multiple networks (e.g., intranet and Internet) so that not all email sending workstations 2 are coupled to the server system 4 via the same network. The sending workstations 2 and the server system 4 may be connected to the network 6 in a wireless fashion, and network 6 may be a wireless network. In a preferred embodiment, the network 6 is a LAN and each sending workstation 2 executes a user interface application (e.g., web browser) to contact the server system 4 through the network 6. Alternatively, a sending workstation 2 may be implemented using a device programmed primarily for accessing network 6 such as a remote client.
In addition to sending workstations 2, the system includes one or more email receiving workstations 10 coupled to server system 4. Each receiving workstation 10 may be implemented using a general-purpose computer executing a computer program for carrying out the processes described herein. The computer program may be resident on a storage medium local to the receiving workstation 10, or maybe stored on the server system 4. The sending workstations 2 and the receiving workstations 10 may access the server system 4 over the same or different networks (e.g., an intranet and Internet). In a preferred embodiment, the receiver workstations 10 execute a user interface application (e.g., web browser) to contact the server system 4 through the network 6. Alternatively, the receiver workstations 10 may be implemented using a device programmed primarily for accessing network 6 such as a remote client. It should also be noted that both the email sending workstations 2 and receiving workstations 10 could change roles and act as receiver or sender work station, respectively.
The e-mail program of the present invention provides functionality to the user with the same options for sending e-mail messages as in prior art programs, but with the additional ability to allow the user to specify to a recipient(s) a reply length constraint for the text body of the reply message, as well as a criteria for the size, number, and types of allowed file attachments associated with the reply message.
The program of the present invention generates and displays, by well-known software methods, a graphical user interface to the user of a computer on which the program is running. An example of such a user interface is shown in FIG. 2. In the figure, graphical user interface (GUI) 20, as displayed on the screen 3 of sending workstation 2 (please see FIG. 1), presents the user with a suite of functions allowing him or her to set up and send an e-mail message to one or more recipients. A pull down menu 22 is provided by the GUI 20 to allow the user to select certain options and/or shortcuts to options by clicking on representative icons with a mouse or other similar selecting or pointing device. Among the functions provided in the pull down menu 22 is the ability to control reply messages from recipients. In the example provided, when the user selects Reply length constraint 24, the GUI 20 presents further user selectable options 26 for number of characters, sentences, or lines. In the present example, the user chose to set a limit of ten sentences (28) in a reply message from a recipient. In a similar fashion the GUI 20 can provide options for the user to control the size, number, and types of allowed file attachments associated with the reply message from a recipient. At a receiver workstation 10 that supports the novel features of the present invention, the email will be displayed on screen 8 with additional marked text that may be highlighted, italicized, colorized, placed in boxes, etc. to alert the reader that the sender prefers the reply to be constrained within the specified limits. If a receiving terminal does not support the novel features of the present invention, a simple text message will appear with the sender reply constraint parameters.
FIG. 3A is a flow diagram illustrating a process for generating e-mail with reply constraints in accordance with a preferred embodiment of the present invention. As shown in the figure, in step 300, a sender composes an email message in a customary manner. At step 306, the sender can optionally choose to use the features of the present invention to constrain the reply messages, or proceed to send the email at step 336. If the sender does in fact decide to add reply constraints the process flows to step 312, where the sender decides on adding constraints based on the message itself and proceeds to step 318 to define constraint parameters and/or the sender may also optionally choose (324) to add reply file attachment constraints (330). Subsequently, the sender emails the message (336) to the recipient(s).
The recipient generates a message (360) in FIG. 3B in response to the email of FIG. 3A. If the message conforms to the reply constraints (366) it is allowed to proceed to the email inbox of the original sender. If the reply email does not conform to the reply constraints (366), an email is sent to the recipient with an explanation for the non-delivery (390) of the reply email. In addition, at step 372 the email is checked for file attachments. In a similar fashion, if the file attachment(s) conform to the constraints (378), the attachment(s) are allowed to proceed to the senders email inbox (384), or an email is sent to the recipient with an explanation for the non-delivery (390) of the file attachments.
The flow diagrams depicted herein are just examples. There may be many variations to these diagrams or the steps (or operations) described therein without departing from the spirit of the invention. For instance, the steps may be performed in a differing order, or steps may be added, deleted or modified. All of these variations are considered a part of the claimed invention.
While the preferred embodiment to the invention has been described, it will be understood that those skilled in the art, both now and in the future, may make various improvements and enhancements which fall within the scope of the claims which follow. These claims should be construed to maintain the proper protection for the invention first described.