Claims
- 1. A method comprising:
maintaining a list of people associated with a user; inferring that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a second person, wherein the second person is not the user; adding the inferred person to the list of people associated with the user; and using the list to control aspects of communications between the user and others based on whether the others are included on the list.
- 2. The method of claim 1 wherein the person is included in a contact list of the user.
- 3. The method of claim 2 wherein the contact list of the user is a buddy list.
- 4. The method of claim 1 wherein the communications comprise e-mail communications, the method further comprising inferring that a person is associated with the user based, at least in part, on positive user actions related to e-mail communications from the person.
- 5. The method of claim 4 wherein the positive actions include sending an e-mail to the person.
- 6. The method of claim 4 wherein the positive actions include replying to, forwarding, saving, or printing an e-mail received from the person.
- 7. The method of claim 4 wherein the positive actions include moving an e-mail from a first folder to a second folder.
- 8. The method of claim 7 wherein the first folder is an inbox folder and the second folder is a folder other than a delete folder or a spam folder.
- 9. The method of claim 4 wherein the positive action includes maintaining an e-mail from the person in an open state for a predetermined period of time.
- 10. The method of claim 1 further comprising inferring that a person is associated with the user based, at least in part, on detecting a communication between the user and the person.
- 11. The method of claim 10 wherein the communication is an instant messaging communication.
- 12. The method of claim 1 wherein inferring that a person is associated with the user includes detecting user actions that mitigate against factors that otherwise are used to infer a person is associated with the user.
- 13. The method of claim 12 wherein the user actions comprise the user taking steps to report a communication from the person as spam.
- 14. The method of claim 12 wherein the user actions comprise the user taking steps to add a person to a blacklist.
- 15. The method of claim 12 wherein the user actions comprise the user taking steps to move a communication from the person to at least one of a spam folder or a delete folder.
- 16. The method of claim 1 wherein people associated with the user are people not distrusted by the user.
- 17. The method of claim 16 wherein using the list comprises using the list as a white list such that communications received from people on the list are exempt from spam filtering.
- 18. The method of claim 1 wherein using the list comprises using the list to restrict received communications to those communications from people on the list.
- 19. The method of claim 18 wherein the communications are e-mails.
- 20. The method of claim 18 wherein the communications are instant messages.
- 21. The method of claim 1 wherein people associated with the user are people known to the user.
- 22. The method of claim 21 wherein using the list comprises using the list to filter a display of e-mail such that e-mails from people on the list are shown on the display and e-mails from people not on the list are absent from the display.
- 23. The method of claim 21 wherein using the list comprises using the list to filter a display of e-mail such that e-mails from people not on the list are shown on the display and e-mails from people on the list are absent from the display.
- 24. The method of claim 1 wherein using the list comprises using the list to restrict which instant messaging interfaces display an online presence of the user to those instant messaging interfaces associated with people on the list.
- 25. The method of claim 1 wherein using the list comprises using the list as a white list operating in conjunction with parental controls to filter communications from people not on the list when the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
- 26. The method of claim 25 wherein filtering communications comprises blocking the communications from people not on the list when the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
- 27. The method of claim 25 wherein filtering communications comprises placing communications from people not on the list in a spam folder the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
- 28. The method of claim 27 wherein the spam folder is locked from the teen or child account user.
- 29. The method of claim 25 wherein the communications are e-mails.
- 30. The method of claim 1 wherein inferring that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person other than the user comprises inferring that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person who is listed in a contact list of the user.
- 31. The method of claim 1 wherein inferring that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person other than the user comprises inferring that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person who is listed in a buddy list of the user.
- 32. The method of claim 1 wherein inferring that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person other than the user comprises inferring that a person is associated with the user based, at least in part, on the inclusion of the person in a contact list of a person who the user has added to a buddy list of the user.
- 33. A method comprising:
maintaining a list of people associated with a user; inferring that a person is associated with the user based, at least in part, on a membership of the first person in a contact list that is associated with another person, wherein the contact list is not configured for direct access by the user; adding the inferred person to the list of people associated with the user; and using the list to control aspects of communications between the user and others based on whether the others are included on the list.
- 34. The method of claim 33 wherein the person is included in a contact list of the user.
- 35. The method of claim 34 wherein the contact list of the user is a buddy list.
- 36. The method of claim 33 wherein the communications comprise e-mail communications, the method further comprising inferring that a person is associated with the user based, at least in part, on positive user actions related to e-mail communications from the person.
- 37. The method of claim 36 wherein the positive actions include sending an e-mail to the person.
- 38. The method of claim 36 wherein the positive actions include replying to, forwarding, saving, or printing an e-mail received from the person.
- 39. The method of claim 36 wherein the positive actions include moving an e-mail from a first folder to a second folder.
- 40. The method of claim 39 wherein the first folder is an inbox folder and the second folder is a folder other than a delete folder or a spam folder.
- 41. The method of claim 36 wherein the positive action includes maintaining an e-mail from the person in an open state for a predetermined period of time.
- 42. The method of claim 33 further comprising inferring that a person is associated with the user based, at least in part, on detecting a communication between the user and the person.
- 43. The method of claim 42 wherein the communication is an instant messaging communication.
- 44. The method of claim 33 wherein inferring that a person is associated with the user includes detecting user actions that mitigate against factors that otherwise are used to infer a person is associated with the user.
- 45. The method of claim 44 wherein the user actions comprise the user taking steps to report a communication from the person as spam.
- 46. The method of claim 44 wherein the user actions comprise the user taking steps to add a person to a blacklist.
- 47. The method of claim 44 wherein the user actions comprise the user taking steps to move a communication from the person to at least one of a spam folder or a delete folder.
- 48. The method of claim 33 wherein people associated with the user are people not distrusted by the user.
- 49. The method of claim 48 wherein using the list comprises using the list as a white list such that communications received from people on the list are exempt from spam filtering.
- 50. The method of claim 33 wherein using the list comprises using the list to restrict received communications to those communications from people on the list.
- 51. The method of claim 50 wherein the communications are e-mails.
- 52. The method of claim 50 wherein the communications are instant messages.
- 53. The method of claim 33 wherein people associated with the user are people known to the user.
- 54. The method of claim 53 wherein using the list comprises using the list to filter a display of e-mail such that e-mails from people on the list are shown on the display and e-mails from people not on the list are absent from the display.
- 55. The method of claim 53 wherein using the list comprises using the list to filter a display of e-mail such that e-mails from people not on the list are shown on the display and e-mails from people on the list are absent from the display.
- 56. The method of claim 33 wherein using the list comprises using the list to restrict which instant messaging interfaces display an online presence of the user to those instant messaging interfaces associated with people on the list.
- 57. The method of claim 33 wherein using the list comprises using the list as a white list operating in conjunction with parental controls to filter communications from people not on the list when the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
- 58. The method of claim 57 wherein filtering communications comprises blocking the communications from people not on the list when the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
- 59. The method of claim 57 wherein filtering communications comprises placing communications from people not on the list in a spam folder the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
- 60. The method of claim 59 wherein the spam folder is locked from the teen or child account user.
- 61. The method of claim 57 wherein the communications are e-mails.
- 62. The method of claim 33 wherein inferring that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person other than the user comprises inferring that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person who is listed in a contact list of the user.
- 63. The method of claim 33 wherein inferring that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person other than the user comprises inferring that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person who is listed in a buddy list of the user.
- 64. The method of claim 33 wherein inferring that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person other than the user comprises inferring that a person is associated with the user based, at least in part, on the inclusion of the person in a contact list of a person who the user has added to a buddy list of the user.
- 65. A method comprising:
maintaining a list of people associated with a user; inferring that a person is associated with the user based, at least in part, on the characteristics of one or more contact lists associated with other users, wherein the contact lists associated with the other users include communication identifiers selected by the other users; adding the inferred person to the list of people associated with the user; and using the list to control aspects of communications between the user and others based on whether the others are included on the list.
- 66. The method of claim 65 wherein the person is included in a contact list of the user.
- 67. The method of claim 66 wherein the contact list of the user is a buddy list.
- 68. The method of claim 65 wherein the communications comprise e-mail communications, the method further comprising inferring that a person is associated with the user based, at least in part, on positive user actions related to e-mail communications from the person.
- 69. The method of claim 68 wherein the positive actions include sending an e-mail to the person.
- 70. The method of claim 68 wherein the positive actions include replying to, forwarding, saving, or printing an e-mail received from the person.
- 71. The method of claim 68 wherein the positive actions include moving an e-mail from a first folder to a second folder.
- 72. The method of claim 71 wherein the first folder is an inbox folder and the second folder is a folder other than a delete folder or a spam folder.
- 73. The method of claim 68 wherein the positive action includes maintaining an e-mail from the person in an open state for a predetermined period of time.
- 74. The method of claim 65 further comprising inferring that a person is associated with the user based, at least in part, on detecting a communication between the user and the person.
- 75. The method of claim 74 wherein the communication is an instant messaging communication.
- 76. The method of claim 65 wherein inferring that a person is associated with the user includes detecting user actions that mitigate against factors that otherwise are used to infer a person is associated with the user.
- 77. The method of claim 76 wherein the user actions comprise the user taking steps to report a communication from the person as spam.
- 78. The method of claim 76 wherein the user actions comprise the user taking steps to add a person to a blacklist.
- 79. The method of claim 76 wherein the user actions comprise the user taking steps to move a communication from the person to at least one of a spam folder or a delete folder.
- 80. The method of claim 65 wherein people associated with the user are people not distrusted by the user.
- 81. The method of claim 80 wherein using the list comprises using the list as a white list such that communications received from people on the list are exempt from spam filtering.
- 82. The method of claim 65 wherein using the list comprises using the list to restrict received communications to those communications from people on the list.
- 83. The method of claim 82 wherein the communications are e-mails.
- 84. The method of claim 82 wherein the communications are instant messages.
- 85. The method of claim 65 wherein people associated with the user are people known to the user.
- 86. The method of claim 85 wherein using the list comprises using the list to filter a display of e-mail such that e-mails from people on the list are shown on the display and e-mails from people not on the list are absent from the display.
- 87. The method of claim 85 wherein using the list comprises using the list to filter a display of e-mail such that e-mails from people not on the list are shown on the display and e-mails from people on the list are absent from the display.
- 88. The method of claim 65 wherein using the list comprises using the list to restrict which instant messaging interfaces display an online presence of the user to those instant messaging interfaces associated with people on the list.
- 89. The method of claim 65 wherein using the list comprises using the list as a white list operating in conjunction with parental controls to filter communications from people not on the list when the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
- 90. The method of claim 89 wherein filtering communications comprises blocking the communications from people not on the list when the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
- 91. The method of claim 89 wherein filtering communications comprises placing communications from people not on the list in a spam folder the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
- 92. The method of claim 91 wherein the spam folder is locked from the teen or child account user.
- 93. The method of claim 89 wherein the communications are e-mails.
- 94. The method of claim 65 wherein inferring that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person other than the user comprises inferring that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person who is listed in a contact list of the user.
- 95. The method of claim 65 wherein inferring that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person other than the user comprises inferring that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person who is listed in a buddy list of the user.
- 96. The method of claim 65 wherein inferring that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person other than the user comprises inferring that a person is associated with the user based, at least in part, on the inclusion of the person in a contact list of a person who the user has added to a buddy list of the user.
- 97. A computer usable medium have a computer program embodied thereon, wherein the computer program comprises instructions for causing a computer to perform the following operations:
maintain a list of people associated with a user; infer that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a second person, wherein the second person is not the user; add the inferred person to the list of people associated with the user; and use the list to control aspects of communications between the user and others based on whether the others are included on the list.
- 98. The medium of claim 97 wherein the person is included in a contact list of the user.
- 99. The medium of claim 98 wherein the contact list of the user is a buddy list.
- 100. The medium of claim 97 wherein the communications comprise e-mail communications, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on positive user actions related to e-mail communications from the person.
- 101. The medium of claim 100 wherein the positive actions include sending an e-mail to the person.
- 102. The medium of claim 100 wherein the positive actions include replying to, forwarding, saving, or printing an e-mail received from the person.
- 103. The medium of claim 100 wherein the positive actions include moving an e-mail from a first folder to a second folder.
- 104. The medium of claim 103 wherein the first folder is an inbox folder and the second folder is a folder other than a delete folder or a spam folder.
- 105. The medium of claim 100 wherein the positive action includes maintaining an e-mail from the person in an open state for a predetermined period of time.
- 106. The medium of claim 97 wherein the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on detecting a communication between the user and the person.
- 107. The medium of claim 106 wherein the communication is an instant messaging communication.
- 108. The medium of claim 97 wherein, to infer that a person is associated with the user, the computer program further comprises instructions for causing a computer to detect user actions that mitigate against factors that otherwise are used to infer a person is associated with the user.
- 109. The medium of claim 108 wherein the user actions comprise the user taking steps to report a communication from the person as spam.
- 110. The medium of claim 108 wherein the user actions comprise the user taking steps to add a person to a blacklist.
- 111. The medium of claim 108 wherein the user actions comprise the user taking steps to move a communication from the person to at least one of a spam folder or a delete folder.
- 112. The medium of claim 97 wherein people associated with the user are people not distrusted by the user.
- 113. The medium of claim 112 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list as a white list such that communications received from people on the list are exempt from spam filtering.
- 114. The medium of claim 97 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to restrict received communications to those communications from people on the list.
- 115. The medium of claim 114 wherein the communications are e-mails.
- 116. The medium of claim 114 wherein the communications are instant messages.
- 117. The medium of claim 1 wherein people associated with the user are people known to the user.
- 118. The medium of claim 117 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to filter a display of e-mail such that e-mails from people on the list are shown on the display and e-mails from people not on the list are absent from the display.
- 119. The medium of claim 117 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to filter a display of e-mail such that e-mails from people not on the list are shown on the display and e-mails from people on the list are absent from the display.
- 120. The medium of claim 97 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to restrict which instant messaging interfaces display an online presence of the user to those instant messaging interfaces associated with people on the list.
- 121. The medium of claim 97 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list as a white list operating in conjunction with parental controls to filter communications from people not on the list when the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
- 122. The medium of claim 121 wherein to filter communications, the computer program further comprises instructions for causing a computer to block the communications from people not on the list when the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
- 123. The medium of claim 121 wherein to filter communications, the computer program further comprises instructions for causing a computer to placing communications from people not on the list in a spam folder the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
- 124. The medium of claim 123 wherein the spam folder is locked from the teen or child account user.
- 125. The medium of claim 121 wherein the communications are e-mails.
- 126. The medium of claim 97 wherein, to infer that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person other than the user, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person who is listed in a contact list of the user.
- 127. The medium of claim 97 wherein, to infer that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person other than the user, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person who is listed in a buddy list of the user.
- 128. The medium of claim 97 wherein, to infer that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person other than the user, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on the inclusion of the person in a contact list of a person who the user has added to a buddy list of the user.
- 129. A computer usable medium have a computer program embodied thereon, wherein the computer program comprises instructions for causing a computer to perform the following operations:
maintaining a list of people associated with a user; inferring that a person is associated with the user based, at least in part, on a membership of the first person in a contact list that is associated with another person, wherein the contact list is not configured for direct access by the user; adding the inferred person to the list of people associated with the user; and using the list to control aspects of communications between the user and others based on whether the others are included on the list.
- 130. The medium of claim 129 wherein the person is included in a contact list of the user.
- 131. The medium of claim 130 wherein the contact list of the user is a buddy list.
- 132. The medium of claim 129 wherein the communications comprise e-mail communications, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on positive user actions related to e-mail communications from the person.
- 133. The medium of claim 132 wherein the positive actions include sending an e-mail to the person.
- 134. The medium of claim 132 wherein the positive actions include replying to, forwarding, saving, or printing an e-mail received from the person.
- 135. The medium of claim 132 wherein the positive actions include moving an e-mail from a first folder to a second folder.
- 136. The medium of claim 135 wherein the first folder is an inbox folder and the second folder is a folder other than a delete folder or a spam folder.
- 137. The medium of claim 132 wherein the positive action includes maintaining an e-mail from the person in an open state for a predetermined period of time.
- 138. The medium of claim 130 wherein the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on detecting a communication between the user and the person.
- 139. The medium of claim 138 wherein the communication is an instant messaging communication.
- 140. The medium of claim 129 wherein, to infer that a person is associated with the user, the computer program further comprises instructions for causing a computer to detect user actions that mitigate against factors that otherwise are used to infer a person is associated with the user.
- 141. The medium of claim 140 wherein the user actions comprise the user taking steps to report a communication from the person as spam.
- 142. The medium of claim 140 wherein the user actions comprise the user taking steps to add a person to a blacklist.
- 143. The medium of claim 140 wherein the user actions comprise the user taking steps to move a communication from the person to at least one of a spam folder or a delete folder.
- 144. The medium of claim 129 wherein people associated with the user are people not distrusted by the user.
- 145. The medium of claim 144 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list as a white list such that communications received from people on the list are exempt from spam filtering.
- 146. The medium of claim 129 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to restrict received communications to those communications from people on the list.
- 147. The medium of claim 146 wherein the communications are e-mails.
- 148. The medium of claim 146 wherein the communications are instant messages.
- 149. The medium of claim 129 wherein people associated with the user are people known to the user.
- 150. The medium of claim 149 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to filter a display of e-mail such that e-mails from people on the list are shown on the display and e-mails from people not on the list are absent from the display.
- 151. The medium of claim 149 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to filter a display of e-mail such that e-mails from people not on the list are shown on the display and e-mails from people on the list are absent from the display.
- 152. The medium of claim 129 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to restrict which instant messaging interfaces display an online presence of the user to those instant messaging interfaces associated with people on the list.
- 153. The medium of claim 129 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list as a white list operating in conjunction with parental controls to filter communications from people not on the list when the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
- 154. The medium of claim 153 wherein to filter communications, the computer program further comprises instructions for causing a computer to block the communications from people not on the list when the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
- 155. The medium of claim 153 wherein to filter communications, the computer program further comprises instructions for causing a computer to placing communications from people not on the list in a spam folder the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
- 156. The medium of claim 155 wherein the spam folder is locked from the teen or child account user.
- 157. The medium of claim 153 wherein the communications are e-mails.
- 158. The medium of claim 129 wherein, to infer that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person other than the user, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person who is listed in a contact list of the user.
- 159. The medium of claim 129 wherein, to infer that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person other than the user, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person who is listed in a buddy list of the user.
- 160. The medium of claim 129 wherein, to infer that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person other than the user, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on the inclusion of the person in a contact list of a person who the user has added to a buddy list of the user.
- 161. A computer usable medium have a computer program embodied thereon, wherein the computer program comprises instructions for causing a computer to perform the following operations:
maintaining a list of people associated with a user; inferring that a person is associated with the user based, at least in part, on the characteristics of one or more contact lists associated with other users, wherein the contact lists associated with the other users include communication identifiers selected by the other users; adding the inferred person to the list of people associated with the user; and using the list to control aspects of communications between the user and others based on whether the others are included on the list.
- 162. The medium of claim 161 wherein the person is included in a contact list of the user.
- 163. The medium of claim 162 wherein the contact list of the user is a buddy list.
- 164. The medium of claim 161 wherein the communications comprise e-mail communications, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on positive user actions related to e-mail communications from the person.
- 165. The medium of claim 164 wherein the positive actions include sending an e-mail to the person.
- 166. The medium of claim 164 wherein the positive actions include replying to, forwarding, saving, or printing an e-mail received from the person.
- 167. The medium of claim 164 wherein the positive actions include moving an e-mail from a first folder to a second folder.
- 168. The medium of claim 167 wherein the first folder is an inbox folder and the second folder is a folder other than a delete folder or a spam folder.
- 169. The medium of claim 164 wherein the positive action includes maintaining an e-mail from the person in an open state for a predetermined period of time.
- 170. The medium of claim 161 wherein the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on detecting a communication between the user and the person.
- 171. The medium of claim 170 wherein the communication is an instant messaging communication.
- 172. The medium of claim 161 wherein, to infer that a person is associated with the user, the computer program further comprises instructions for causing a computer to detect user actions that mitigate against factors that otherwise are used to infer a person is associated with the user.
- 173. The medium of claim 172 wherein the user actions comprise the user taking steps to report a communication from the person as spam.
- 174. The medium of claim 172 wherein the user actions comprise the user taking steps to add a person to a blacklist.
- 175. The medium of claim 172 wherein the user actions comprise the user taking steps to move a communication from the person to at least one of a spam folder or a delete folder.
- 176. The medium of claim 161 wherein people associated with the user are people not distrusted by the user.
- 177. The medium of claim 176 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list as a white list such that communications received from people on the list are exempt from spam filtering.
- 178. The medium of claim 161 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to restrict received communications to those communications from people on the list.
- 179. The medium of claim 178 wherein the communications are e-mails.
- 180. The medium of claim 178 wherein the communications are instant messages.
- 181. The medium of claim 161 wherein people associated with the user are people known to the user.
- 182. The medium of claim 181 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to filter a display of e-mail such that e-mails from people on the list are shown on the display and e-mails from people not on the list are absent from the display.
- 183. The medium of claim 181 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to filter a display of e-mail such that e-mails from people not on the list are shown on the display and e-mails from people on the list are absent from the display.
- 184. The medium of claim 161 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list to restrict which instant messaging interfaces display an online presence of the user to those instant messaging interfaces associated with people on the list.
- 185. The medium of claim 161 wherein, to use the list, the computer program further comprises instructions for causing a computer to use the list as a white list operating in conjunction with parental controls to filter communications from people not on the list when the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
- 186. The medium of claim 185 wherein to filter communications, the computer program further comprises instructions for causing a computer to block the communications from people not on the list when the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
- 187. The medium of claim 185 wherein to filter communications, the computer program further comprises instructions for causing a computer to placing communications from people not on the list in a spam folder the communications include indicia that the content of the communication is inappropriate for a teen or child account user.
- 188. The medium of claim 187 wherein the spam folder is locked from the teen or child account user.
- 189. The medium of claim 185 wherein the communications are e-mails.
- 190. The medium of claim 161 wherein, to infer that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person other than the user, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person who is listed in a contact list of the user.
- 191. The medium of claim 161 wherein, to infer that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person other than the user, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person who is listed in a buddy list of the user.
- 192. The medium of claim 161 wherein, to infer that a person is associated with the user based, at least in part, on inclusion of the person in a contact list of a person other than the user, the computer program further comprises instructions for causing a computer to infer that a person is associated with the user based, at least in part, on the inclusion of the person in a contact list of a person who the user has added to a buddy list of the user.
CLAIM OF PRIORITY
[0001] This application claims priority under 35 USC §119(e) to U.S. Provisional Patent Application Serial No. 60/457,320, filed on Mar. 26, 2003, and U.S. Provisional Patent Application Serial No. 60/488,376, filed on Jul. 21, 2003, both of which are hereby incorporated by reference.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60457320 |
Mar 2003 |
US |
|
60488376 |
Jul 2003 |
US |