Method and system for displaying similar email messages based on message contents

Information

  • Patent Grant
  • 10708353
  • Patent Number
    10,708,353
  • Date Filed
    Monday, May 7, 2018
    6 years ago
  • Date Issued
    Tuesday, July 7, 2020
    4 years ago
Abstract
A method and system for identifying changes to a data set, such as data within a mailbox, and performing actions based on the identified changes is discussed. In some examples, the system receives an indication of a change to a mailbox, creates a change journal entry for the change, and identifies data to be copied via the change journal entry. In some examples, the system leverages the change journal to associate messages with changes to a mailbox.
Description
BACKGROUND

Processes that typically copy, backup, or duplicate data, such as Microsoft Exchange data (email messages, mail settings, and so on), are often laborious, time-intensive processes. The typical backup process connects to each user's mailbox and compares the entire contents (i.e., every message) of the mailbox with a previous backup copy of that mailbox. Often, the backup process will access every message in the mailbox to determine if anything has changed since a previous copy process occurred. Then, the backup process can perform a copy or backup operation, only after identifying the changes from the entire mailbox.


Additionally, typical email systems present changes to a user by only updating the user's mailbox with the change (such as by displaying a newly received email message at the top of a list of emails). However, certain emails may be related or similar to other previous messages, and although email systems can sort emails via simple header information (by user, date received, or alphabetically by subject), there are many instances where it may be advantageous to a user to employ an email system that provides other benefits.


There is a need for a system that overcomes the above problems, as well as providing additional benefits.


SUMMARY

Described herein are a system, method and computer-readable storage medium storing instructions for controlling a computer system to perform a method of transferring an email message to a secondary copy of a data store associated with a mailbox. The method includes accessing an event sync file associated with a mailbox, wherein the event sync the includes indications of changes made to electronic mail messages within the mailbox, and creating a change journal to include entries associated with the changes made to the electronic mail messages within the mailbox. The method further includes identifying the changes made to the electronic mail messages within the mailbox from information within the change journal entries, and transferring the changes to the electronic mail messages within the mailbox to a secondary copy of data associated with the mailbox.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a block diagram illustrating a data storage system for creating a secondary copy of data files having individual discrete data objects, such as emails in a Microsoft Exchange mailbox.



FIG. 2 is a flow diagram illustrating a routine for copying Microsoft Exchange data.



FIG. 3 is a table illustrating a data structure containing log entries of changes to a mailbox.



FIG. 4A is a flow diagram illustrating a routine for updating an index of content.



FIG. 4B is a flow diagram illustrating a routine for updating an index of data classification information.



FIG. 5 is a flow diagram illustrating a routine for updating a mailbox based on a change to the mailbox.



FIG. 6 illustrates a mailbox presenting a list of messages to a user based on content of a received message.



FIG. 7A illustrates a display screen on a mobile device.



FIG. 7B illustrates the display screen of FIG. 7A modified based on a change to a mailbox.





DETAILED DESCRIPTION
Overview

A method and system for identifying, copying, and leveraging changes to a data set, such as a data set on a Microsoft Exchange or other mail server, is disclosed. The system receives an alert or other signal from a mail server indicating a change to a data set at the mail server, stores an indication of the event in a log or other data structure, queries the log for information related to the event, and performs (or, initiates) a data storage operation based on results of the query.


For example, when an email message is deleted by a user in Microsoft Outlook, a supporting Exchange Server updates a synchronization file (such as an Event Sync file) to indicate that an event (such as an SMTP event), the deletion, has occurred within the user's mailbox. The system accesses the synchronization file, identifies the event, and stores information about the event (such as path information related to the location of the event and the type of event) into a log file, or change journal. Later, a data storage component accesses the change journal, queries the change journal to identify changes that have occurred during, a certain time period (such as since the last data storage operation), and uses the results of the query to determine changes to the mailbox, and copies or performs a backup of the changes. A change to a mailbox may be a received message, a moved message (such as from one folder to another), a deleted message, and so on.


In some examples, the system updates an index of content based on and after identifying changes to a mailbox via a change journal. A content indexing system may update an index associated with a mailbox or other data store by accessing the change journal to identify changes to the mailbox and indexing content related to those changes.


In some examples, the system updates an index of data classification based on and after identifying changes to a mailbox via a change journal. A data classification system may update an index associated with a mailbox or other data store by accessing the change journal to identify changes to the mailbox, and classifying data related to those changes.


In some examples, an email system may update, present, or modify the contents of a mailbox based on identifying changes to the mailbox. The email system may extract the content or classification of data within a changed email message, associate other messages similarly classified or containing similar content, and modify the mailbox to present the associated messages along with the changed message to a user. The system may synchronize a mailbox on a mobile device based on a change to the mailbox. In some cases, the system may modify the presentation of a mailbox to a user based on a change to the mailbox. The system may perform one or more actions based on a change to the mailbox.


The system will now be described with respect to various embodiments. The following description provides specific details for a thorough understanding of, and enabling description for, these embodiments of the system. However, one skilled in the art will understand that the system may be practiced without these details. In other instances, well-known structures and functions have not been shown or described in detail to avoid unnecessarily obscuring the description of the embodiments of the system.


The terminology used in the description presented below is intended to be interpreted in its broadest reasonable manner, even though it is being used in conjunction with a detailed description of certain specific embodiments of the system. Certain terms may even be emphasized below; however, any terminology intended to be interpreted in any restricted manner will be overtly and specifically defined as such in this Detailed Description section.


Suitable System

The system may create a secondary copy of a data set, such as a storage group containing one or more mailboxes, as part of an existing backup schedule performed by an organization. For example, an organization may perform weekly backups that contain a complete copy of the organization's email data. The system may create secondary copies using various data storage operations, such as snapshots, continuous data replication, and so on. Secondary copies may include backup copies, auxiliary copies, archive copies, and so on.


Referring to FIG. 1, a block diagram illustrating a data management system 100 for creating a secondary copy of Microsoft Exchange data is shown. FIG. 1 and the following discussion provide a brief, general description of a suitable computing environment in which the system can be implemented. Although not required, aspects of the system are described in the general context of computer-executable instructions, such as routines executed by a general-purpose computer, e.g., a server computer, wireless device or personal computer. Those skilled in the relevant art will appreciate that the system can be practiced with other communications, data processing, or computer system configurations, including: Internet appliances, network PCs, mini-computers, mainframe computers, and the like. Indeed, the terms “computer,” “host,” and “host computer” are generally used interchangeably herein, and refer to any of the above devices and systems, as well as any data processor.


Aspects of the system can be embodied in a special purpose computer or data processor that is specifically programmed, configured, or constructed to perform one or more of the computer-executable instructions explained in detail herein. Aspects of the system can also be practiced in distributed computing environments where tasks or modules are performed by remote processing devices, which are linked through a communications network, such as a Local Area Network (LAN), Wide Area Network (WAN), Storage Area Network (SAN), Fibre Channel, or the Internet. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.


Aspects of the system may be stored or distributed on computer-readable media, including magnetically or optically readable computer discs, hard-wired or preprogrammed chips (e.g., EEPROM semiconductor chips), nanotechnology memory, biological memory, or other data storage media. Indeed, computer implemented instructions, data structures, screen displays, and other data under aspects of the system may be distributed over the Internet or over other networks (including wireless networks), on a propagated signal on a propagation medium (e.g., an electromagnetic wave(s), a sound wave, etc.) over a period of time, or they may be provided on any analog or digital network (packet switched, circuit switched, or other scheme). Those skilled in the relevant art will recognize that portions of the system reside on a server computer, while corresponding portions reside on a client computer, and thus, while certain hardware platforms are described herein, aspects of the system are equally applicable to nodes on a network.


The data management system 100 includes a data storage system 110 in communication with a mailbox group 140 that contains one or more mailboxes 150, such as a user1 mailbox 151, a user2 mailbox 152, and a userN mailbox 153. For example, the mailbox group may be a Microsoft Exchange group that manages various user mailboxes 150. The data storage system 110 and the mailbox group 140 may communicate over wired or wireless connections, such as via a storage network.


The data storage system 110 may include a log component 111, such as a component that stores a change journal, a copy component 112 that initiates or facilitates the performance of data storage operations, and other components 113, such as components that communicate with a data classification system 120, a content indexing component 130, and/or other components under management by the system.


The copy component 112 may transfer data to other components (not shown) of the data storage system 100 that transfer data to secondary storage media, such as magnetic tape, optical disks, solid-state media, and so on. The data storage system may contain some or all of the following components, depending on the needs of the system. For example, the data storage system 100 may contain a storage manager, one or more clients, one or more media agents, and one or more storage devices. The storage manager controls the media agents, which are responsible for transferring data to storage devices. The storage manager includes a jobs agent, a management agent, a database, and/or an interface module. The storage manager communicates with client(s). One or more clients may access or receive data to be stored by the system from a database via a data agent. For example, the clients may access data from one or more of the mailboxes 150 upon receiving instructions from the copy component 112. The system uses media agents, which contain databases, to transfer and store data into storage devices. The client databases may contain data files and other information, while media agent databases may contain indices and other data structures that assist and implement the storage of data into secondary storage devices, for example.


The data storage system may include software and/or hardware components and modules used in data storage operations. The components may be storage resources that function to copy data during storage operations. The components may perform other storage operations (or storage management operations) other that operations used in data stores. For example, some resources may create, store, retrieve, and/or migrate primary or secondary data copies. Additionally, some resources may create indices and other tables relied upon by the data storage system and other data recovery systems. The secondary copies may include snapshot copies and associated indices, but may also include other backup copies such as HSM copies, archive copies, and so on. The resources may also perform storage management functions that may communicate information to higher level components, such as global management resources within a federated data storage system. Further details regarding suitable data storage systems may be found in commonly-assigned U.S. patent application Ser. No. 11/982,324, filed on Oct. 31, 2007, entitled SYSTEMS AND METHODS OF HIERARCHICAL STORAGE MANAGEMENT, SUCH AS GLOBAL MANAGEMENT OF STORAGE OPERATIONS, which is incorporated by reference it its entirety.


In some examples, the system performs storage operations based on storage policies, as mentioned above. For example, a storage policy includes a set of preferences or other criteria to be considered during storage operations. The storage policy may determine or define a storage location and/or set of preferences about how the system transfers data to the location and what processes the system performs on the data before, during, or after the data transfer. In some cases, a storage policy may define a logical location in which to transfer, store or copy data from a source to a destination data store, such as storage media. Storage policies may be stored in the storage manager, or may be stored in other resources, such as a global manager, a media agent, and so on.


The log component 111 may access and/or communicate with components associated with a mail server, such as an event sync component, in order to identify changes in a data set. The log component 111 may create, update, modify, and/or store one or more logs of content, such as change journals. A change journal stores a journal entry whenever data is changed within a computer system. The change journal generally contains a step-by-step, sequential, or ordered log of what data changed and how the data changed that can be processed at a later time to recreate the current state of the data.


In some examples, the log component 111 stores a journal entry upon identifying a change within storage group 140. For example, the log component may access the event sync the of an Exchange server and store journal entries for all events identified in the event sync file.


Additionally, the log component 111 (or a separate component), may create an associated log or other data structure to parse the data within the change journal. For example, the log component 111 may create a SQL-based file to later query the SQL-based file when required, such as when a backup of a mailbox is to be performed.


Backing Up a Mailbox Based on Changes to the Mailbox

As discussed herein, there is a standard mechanism in Microsoft Exchange, called an event sync mechanism, that sends a signal whenever there is a change in a mail server or storage group, such as a mail being sent, deleted, moved, or received. As discussed herein, aspects of the data storage system leverage the event sync mechanism (and other similar mechanisms) in order to quickly and efficiently copy and/or backup a storage group, such as a collection of mailboxes.


Referring to FIG. 2, a flow diagram illustrating a routine 200 for copying Microsoft Exchange data is shown. In step 210, the system receives a signal from a sync mechanism associated with a mail server, such as the event sync mechanism associated with an Exchange server. The signal indicates an event has occurred within a storage group, such as within the user1 mailbox 151. The event may be a message has been received at the mailbox, a message has been moved within the mailbox, a message has been deleted from the mailbox, and so on. The system may include a component, such as log component 111, located between a mail server, such as storage group 140, and a sync mechanism for the mail server, in order to receive signals intended for the sync mechanism. Alternatively, the log component 111 may access a sync mechanism to extract events, such as events that have occurred in a certain time period.


In step 220, the system writes the signal indicating the event to a log file, such as a change journal stored within the log component 111. For example, the system creates a journal entry for every event indicated by the sync mechanism. The journal entry may include path information for the event (such as an identification of the mailbox, a date and time of the event, and so on) and event information (such as the type of event). Further details regarding a log file are discussed with respect to FIG. 3.


Referring to FIG. 3, a table illustrating a data structure 300 containing log entries of changes to a mailbox is shown. The data structure 300 includes journal entries for changes within a mailbox for a given period of time. The entries may include path information 310 for the change and flag information 320 that indicates the type of change. For example, the entry 330 indicates a change corresponding to the used mailbox 151 receiving a message. Of course, the data structure may include other information not shown in the Figure.


In step 230, the system queries the log file to extract information. In some cases, the system may transfer the log file information to a local table, such as a SQL database, and query the SQL database to extract information. For example, the system may query the SQL database to determine what changes have occurred from a first time to a second, later time.


In step 240, the system receives results of the query, such as an identification of all changes that occurred within the mailbox between a first time and a second time. For each change, the system may indicate a path to the change, and a type of the change, as shown in data structure 300.


In step 250, the system performs a data storage operation associated with the identified changes within the mailbox. For example, the system may transmit the extracted path information 310 and corresponding type information 320 of a received message (an identified change) to the copy component 112, which may then instruct other data storage components to create or update a secondary copy that includes the contents of the received message, as discussed herein.


Indexing the Content of Changes to a Mailbox

In some examples, the system updates an index of content associated with a data store, such as a mailbox, based on identifying changes to the mailbox as described herein. Once the system identifies changes to a mailbox, the system may then index the content of the messages, and then update an index associated with the mailbox.


In some cases, the content indexing system 130 may update a content index according to an indexing policy. An indexing policy is a data structure that stores information about the parameters of an indexing operation. For example, an organization may copy changes to a mail server on a daily basis, and may create an indexing policy that specifies that the index is updated on a daily basis, even if backup operations are not performed daily.


The content indexed by the content indexing system 130 may be some or all content associated with an email message. Some example content to be indexed includes sender information, recipient information, subject information, message type (such as a sent or received message), text within the body of the message, attachment information (such as name or size of the attachment, or content within the attachment), and other metadata associated within the message.


Referring to FIG. 4A, a flow diagram illustrating a routine 400 for updating an index of content for a mailbox is shown. In step 410, a context indexing system 130 identifies a message to be indexed within a log file that stores changes to a mailbox. For example, the content indexing system 130 may access a change journal 300 and identify entries containing path and type information for changes to a mailbox.


In step 420, the content indexing system accesses the messages identified by the path and type information, and indexes the content of the messages. For example, the content indexing system extracts data associated with the sender, recipient, and subject line for all received messages within the change journal. Further details regarding the indexing of content may be found in U.S. patent application Ser. No. 11/694,869, filed on Mar. 30, 2007, entitled “METHOD AND SYSTEM FOR OFFLINE INDEXING OF CONTENT AND CLASSIFYING STORED DATA,” which is incorporated by reference in its entirety.


In step 430, the content indexing system updates the index to include the indexed content. For example, the content indexing system creates entries to an index associated with the mailbox for all received messages, modifies entries to the index for all moved messages, and deletes entries to the index for all deleted messages. Thus, the content indexing system 130 may leverage the change journal to update an index associated with a mailbox. The content index may then facilitate content specific presentations of mail messages to users, to be discussed herein.


Classifying the Data Within Changes to a Mailbox

In some examples, the system updates an index for a data store to include a classification of data associated with changes to a mailbox. The index may describe certain pertinent aspects of the mailbox that allow a user or system process to consult the index to obtain information regarding the mailbox. For example, the data classification system 120 may traverse messages identified by the change journal and obtain certain characteristics and other attributes of data within the mailbox. Such an index may be a collection of metadata and/or other information regarding the mailbox, and may be referred to herein as a “metabase.” Generally, metadata refers to data or information about data, and may include, for example, data relating to storage operations or storage management, such as data locations, storage management components associated with data, storage devices used in performing storage operations, index data, data application type, or other data.


With this arrangement, if it is desired to obtain information regarding the mailbox or characteristics of messages within the mailbox, a system administrator or system process may simply consult the metabase for such information rather than iteratively access and analyze each data item in the network. This may significantly reduce the amount of time required to obtain message information by substantially eliminating the need to obtain information from the source message. Such a data classification system may associate previously stored messages with newly received or modified messages in a mailbox via the data classification index. For example, the index may associate messages based on various classifications, such as message owners (individuals or groups), content of the messages, resources used to create the messages, aging information, and so on.


Referring to FIG. 4B, a flow diagram illustrating a routine 450 for updating an index of data classification information is shown. In step 460, a data classification system 120 identifies a message that includes data to be classified within a log file that stores changes to a mailbox. For example, the data classification system 120 may access a change journal 300 and identify entries containing path and type information for changes to a mailbox.


In step 470, the data classification system accesses the messages identified by the path and type information, and classifies data within the messages. For example, the data classification system may traverse the identified messages to obtain certain information regarding the messages such as any available metadata. Such metadata may include information about messages or characteristics associated with data within the messages such as the data owner (e.g., the client or user that generates the data or other data manager), the last modified time (e.g., the time of the most recent modification), the data size (e.g., number of bytes of data), information about the data content (e.g., the application that generated the data, the user that generated the data, etc.), to/from information (e.g., an email sender, recipient or individual or group on an email distribution list), creation date (e.g., the date on which the data was created), file type (e.g., format or application type), last accessed time (e.g., the time the data was most recently accessed or viewed), application type (e.g., the application which generated the data), location/network (e.g., a current, past or future location of the data and network pathways to/from the data), frequency of change (e.g., a period in which the data is modified), business unit (e.g., a group or department that generates, manages or is otherwise associated with the data), and aging information (e.g., a schedule, which may include a time period, in which the data is migrated to secondary or long term storage), and so on. Further details regarding the indexing of content may be found in U.S. patent application Ser. No. 11/564,119, filed on Nov. 28, 2006, entitled SYSTEMS AND METHODS FOR CLASSIFYING AND TRANSFERRING INFORMATION IN A STORAGE NETWORK, which is incorporated by reference in its entirety.


In step 480, the data classification system updates the index to include the classification information, such as the information described above. Thus, the data classification system 120 may leverage the change journal to update an index associated with a mailbox. The data classification index may then facilitate content specific presentations of mail messages to users, to be discussed herein.


Presenting a Mailbox Based on Changes to the Mailbox

In some examples, the system facilitates the presentation of messages within a mailbox based on the content of a change to the mailbox. For example, the system may present messages along with a received message that contain content similar to the content within the received message.


Referring to FIG. 5, a flow diagram illustrating a routine 500 for updating a mailbox based on a change to the mailbox. In step 510, the system receives an indication of a change to a mailbox via a sync mechanism, such as event sync. The system may identify a message corresponding to the change, such as a newly received message within the mailbox.


In step 520, the system identifies content within the change to the mailbox. The system may look to a content index or classification index (or may first index or classify the message) to determine content associated with the message. For example, the system may identify information within the subject line of a message.


In step 530, the system associates other messages within the mailbox with the change to the mailbox. For example, the system may look to an index of content, identify the other messages within the mailbox that contain a subject line similar to the subject line for a newly received message, and associate the other messages to the newly received message. Further details regarding the association of messages will be described below.


In step 540, the system updates the presentation of the mailbox based on the associated messages. For example, the system may present the associated messages along with the newly received message, may provide a link or other indication that identifies the associated messages, may sort an inbox or other folder within the mailbox to order messages based on the content of the new message or the associated messages, and so on.


For example, FIG. 6 illustrates a mailbox 600 presenting a list of messages to a user based on the content of a received message. The mailbox 600 presents messages to a user via certain message identification information, such as information associated with a name of a sender 610, information associated with a subject of the message 620, information associated with a date/time received 630, and so on. The mailbox may include a number of folders 640, including an inbox 645 presented in the Figure. The inbox contains a number of messages 650, such as a newly received message 652 from “Mom” entitled “flight to Europe,” and a number of messages associated based on content with message 652. For example, message 654 includes the subject “Europe flight,” and message 656 includes the subject “re: your flight.” The inbox may also include message 657 from “dad” regarding “Europe flight”. The inbox may include unassociated messages, such as message 658.


In this example, the system presents the newly received message 652 along with messages determined to be associated with the newly received message, based on the content of the newly received message. The system leverages the event sync system and change journal discussed herein to determine that the mailbox has received a new message and to index the content of the new message without requiring access to all the messages within the mailbox. The system can then associate messages with the newly received message via the index of content and present these messages along with the newly received message.


Thus, unlike typical systems that can only sort messages based on a limited number of fields, the system described herein is capable of providing a user with numerous advantages when a change to a mailbox occurs. In the above example, the system provides a user with previous messages that may relate to a newly received message, providing contextual and historical information for the newly received message. Even though the associated messages have different subject lines, they have similar content within the subject lines (or within other fields of the messages), and the system, via a content index, can associate the messages based on the similar content. This enables the system to display messages to a user that may be similar in content but are otherwise unassociated (that is, they are not part of an email string, they do not contain the exact same subject line, and so on) when a new message is received at the mailbox.


In some examples, the system may display an indication that there are messages associated with a newly received message. For example, after creating a change journal for changes to a mailbox, the system may display an indicator 670 proximate to a newly received message 652, indicating to a user that other messages stored within the mailbox include similar content. This can be helpful when a user receives a message related to a subject long after any previous correspondence was received for that subject. The user may wish to quickly determine the importance of the message, but may not wish to view all the associated messages. The indicator 670 may link to or expand the view to include the associated messages.


In some cases, a user may access a mailbox via a mobile device that presents messages pushed to the mobile device via an enterprise server. Due to the limited display space on mobile devices, the user may wish to only receive and/or view certain messages on his/her mobile device, or may wish to retrieve certain messages that are stored within the user's mailbox, but have been deleted from the user's mobile device.



FIG. 7A illustrates a display screen 700 on a mobile device that presents one or more messages 710 to a user. An email program presents a newly received message, such as message 710 from “Jack Jones” entitled “Re: Your Car.” The user, away from his work computer, may wish to view on his mobile device other messages related to his car that he received in a certain time period. The system may present a selection toolbar 720 that presents options such as to sync 721 the device to include other messages associated with the received message, may ask for a certain time period of received messages 721724, and so on. Upon receiving a selection from the user, the system may retrieve any associated messages that satisfy the user's request, and present them to the user, shown as display 730 in FIG. 7B.



FIG. 7B illustrates the display screen of FIG. 7A modified based on a change to a mailbox. In the example above, the user received a new message about his car, and caused the system to sync the device to receive any associated messages. The system transfers a number of different messages and displays them as view 730. They are associated with the new message via content index or classification index described herein. Thus, the system facilitates the user to retrieve messages quickly and efficiently to his mobile device when a new message is received at the mobile device.


Other example processes facilitated by the system may include the following:


Upon deletion of an email message from a user's mobile device, the system identifies the change to the mailbox and identifies other email messages associated with the deleted email message, and deletes the associated messages. In some cases, the system may request authorization from the user before deleting the messages.


When a user moves a message to a different folder (such as a folder for a specific project), the system identifies the change to the mailbox and identifies other email messages associated with the moved email messages, and moves the other email messages to the folder.


Upon receiving a new message, the system may display all messages associated with the new message, and may create a new folder for the group of messages when requested by a user. These messages may be from different folders (inbox, sent messages, deleted messages, other folders). The system may facilitate building a historical context for a received message, and then storing the messages (or additional copies of the messages or portions of the messages) within a specific folder. This may enable a user to build a quick history of a certain subject when a new email message is received in order to provide the user with information that may assist the user in responding to the message, among other benefits.


In addition, the system may generate reports based on information extracted from the change journal. For example, the system may generate reports for a given time period of changes, the content within the changes and so on. The reports may identify changes associated with messages having similar data classifications, changes associated with messages having similar content, and so on. Components within the system may leverage information with the reports to update or modify storage operations, periodically or dynamically.


CONCLUSION

From the foregoing, it will be appreciated that specific embodiments of the system have been described herein for purposes of illustration, but that various modifications may be made without deviating from the spirit and scope of the system. Accordingly, the system is not limited except as by the appended claims.


Unless the context clearly requires otherwise, throughout the description and the claims, the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense, as opposed to an exclusive or exhaustive sense; that is to say, in the sense of “including, but not limited to.” The word “coupled”, as generally used herein, refers to two or more elements that may be either directly connected, or connected by way of one or more intermediate elements. Additionally, the words “herein,” “above,” “below,” and words of similar import, when used in this application, shall refer to this application as a whole and not to any particular portions of this application. Where the context permits, words hi the above Detailed Description using the singular or plural number may also include the plural or singular number respectively. The word “or” in reference to a list of two or more items, that word covers all of the following interpretations of the word: any of the items in the list, all of the items in the list, and any combination of the items in the list.


The above detailed description of embodiments of the system is not intended to be exhaustive or to limit the system to the precise form disclosed above. While specific embodiments of, and examples for, the system are described above for illustrative purposes, various equivalent modifications are possible within the scope of the system, as those skilled hi the relevant art will recognize. For example, while processes or blocks are presented hi a given order, alternative embodiments may perform routines having steps, or employ systems having blocks, in a different order, and some processes or blocks may be deleted, moved, added, subdivided, combined, and/or modified. Each of these processes or blocks may be implemented in a variety of different ways. Also, while processes or blocks are at times shown as being performed in series, these processes or blocks may instead be performed in parallel, or may be performed at different times.


The teachings of the system provided herein can be applied to other systems, not necessarily the system described above. The elements and acts of the various embodiments described above can be combined to provide further embodiments.


These and other changes can be made to the system in light of the above Detailed Description. While the above description details certain embodiments of the system and describes the best mode contemplated, no matter how detailed the above appears in text, the system can be practiced in many ways. Details of the system may vary considerably in implementation details, while still being encompassed by the system disclosed herein. As noted above, particular terminology used when describing certain features or aspects of the system should not be taken to imply that the terminology is being redefined herein to be restricted to any specific characteristics, features, or aspects of the system with which that terminology is associated. In general, the terms used in the following claims should not be construed to limit the system to the specific embodiments disclosed in the specification, unless the above Detailed Description section explicitly defines such terms. Accordingly, the actual scope of the system encompasses not only the disclosed embodiments, but also all equivalent ways of practicing or implementing the system under the claims.


While certain aspects of the system are presented below in certain claim forms, the inventors contemplate the various aspects of the system in any number of claim forms. For example, while only one aspect of the system is recited as embodied in a computer-readable medium, other aspects may likewise be embodied in a computer-readable medium. Accordingly, the inventors reserve the right to add additional claims after filing the application to pursue such additional claim forms for other aspects of the system.

Claims
  • 1. A non-transitory computer-readable medium storing instructions which, when executed by a computing system cause the computing system to perform a method for displaying email messages to a user, the method comprising: accessing a message received at a mailbox, wherein the mailbox is hosted by a mail server;extracting content associated with the received message;identifying other messages contained in the mailbox having content similar to the extracted content; andtransmitting the identified other messages from the mailbox to a mail application of a mobile device associated with the mailbox, wherein the mail application locally stores on the mobile device fewer than all messages stored in the mailbox on the mail server, andwherein the mobile device is remotely located from the mail server hosting the mailbox.
  • 2. The computer-readable medium of claim 1, further comprising: presenting the accessed message along with the identified other messages via a display of the mobile device.
  • 3. The computer-readable medium of claim 1, further comprising: generating a mailbox folder that contains the accessed message and the identified other messages.
  • 4. The computer-readable medium of claim 1, wherein identifying other messages contained in the mailbox having content similar to the extracted content includes accessing an index of content, wherein the index includes content contained by messages received at the mailbox and associated with the user.
  • 5. The computer-readable medium of claim 1, further comprising: presenting at least one identified other message directly above or below the accessed message in a presented list of messages, wherein the at least one identified other message resides in a folder of the mailbox different from a folder of the mailbox that includes the received message.
  • 6. The computer-readable medium of claim 1, wherein identifying other messages contained in the mailbox having content similar to the extracted content includes identifying at least one message having a subject line different than a subject line of the received message.
  • 7. The computer-readable medium of claim 1, wherein identifying other messages contained in the mailbox having content similar to the extracted content includes identifying at least one message that is not part of an email thread that includes the received message.
  • 8. The computer-readable medium of claim 1, wherein identifying other messages contained in the mailbox having content similar to the extracted content includes identifying at least one message having content within a body of the message that matches the extracted content.
  • 9. A method for displaying email messages to a user, the method comprising: accessing a message received at a mailbox, wherein the mailbox is hosted by a mail server;extracting content associated with a received message;identifying other messages contained in the mailbox having content similar to the extracted content, wherein at least one of the identified other messages is not part of a thread of email messages that includes the received message;transmitting the identified other messages from the mailbox to a mail application of a computing device associated with the mailbox, wherein the mail application locally stores on the computing device fewer than all messages stored in the mailbox, andwherein the computing device is remotely located from a mail server hosting the mailbox; andpresenting the received message along with information associated with the identified other messages to a user.
  • 10. The method of claim 9, wherein presenting the received message includes presenting at least one identified other message directly above or below the received message in a presented list of messages, wherein the at least one identified other message resides in a folder of the mailbox different from a folder of the mailbox that receives the received message.
  • 11. The method of claim 9, wherein presenting the received message includes presenting an indication that other messages contain content similar to the content of the received message.
  • 12. The method of claim 9, wherein the other messages are stored in secondary storage and the received message is stored in primary storage.
  • 13. The method of claim 9, wherein identifying other messages contained in the mailbox having content similar to the extracted content includes identifying at least one message having content within a body of the message that matches the extracted content.
  • 14. A system for performing a data storage operation for data stored on a mail server, the system comprising: an identification component that identifies one or more changes within a data store associated with a mailbox;a data transfer component configured to: access messages stored within the data store that are associated with the one or more identified changes, andcopy the accessed messages to a secondary copy of the data store; anda mailbox component configured to: extract content from a message,identify other messages in the secondary copy of the data store are similar to the extracted content,transmit the other messages to a mail application on a computing device associated with the mailbox, wherein the computing device is remotely located from the mailbox, andpresent the other messages using the mail application.
  • 15. The system of claim 14, further comprising: a log component that generates one or more log entries,wherein each of the one or more log entries is associated with the one or more changes to the data store; anda content indexing component that:accesses the one or more log entries; andcreates an index of content associated with the messages stored within the data store and associated with the one or more identified changes.
  • 16. The system of claim 14, wherein the one or more changes within the data store include movement of at least one electronic mail message from one folder to another folder within the mailbox.
  • 17. The system of claim 14, wherein the one or more changes within the data store include deletion of at least one electronic mail message from a folder within the mailbox.
  • 18. The system of claim 14, wherein the one or more changes within the data store include reception of at least one electronic mail message at an inbox folder within the mailbox.
  • 19. The system of claim 15, wherein the content associated with the messages includes sender information, recipient information, subject information, message type, text within the body of the messages, or attachment information.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 15/360,036, filed on Nov. 23, 2016, entitled METHOD AND SYSTEM FOR DISPLAYING SIMILAR EMAIL MESSAGES BASED ON MESSAGE CONTENTS, now U.S. Pat. No. 9,967,338, which is a continuation of U.S. patent application Ser. No. 13/759,283, filed on Feb. 5, 2013, entitled METHOD AND SYSTEM FOR DISPLAYING SIMILAR EMAIL MESSAGES BASED ON MESSAGE CONTENTS, now, U.S. Pat. No. 9,509,652, which is a divisional of U.S. patent application Ser. No. 12/548,953, filed on Aug. 27, 2009, entitled METHOD AND SYSTEM FOR LEVERAGING IDENTIFIED CHANGES TO A MAIL SERVER, now U.S. Pat. No. 8,370,442, which claims priority to U.S. Provisional Patent Application No. 61/093,148, filed on Aug. 29, 2008, entitled METHOD AND SYSTEM FOR LEVERAGING IDENTIFIED CHANGES TO A MAIL SERVER, each of which are incorporated by reference in their entireties. This application is related to U.S. patent application Ser. No. 11/694,869, filed on Mar. 30, 2007 (now U.S. Pat. No. 7,882,077), entitled METHOD AND SYSTEM FOR OFFLINE INDEXING OF CONTENT AND CLASSIFYING STORED DATA, and U.S. patent application Ser. No. 11/564,119, filed on Nov. 28, 2006 (now U.S. Pat. No. 7,668,884), entitled SYSTEMS AND METHODS FOR CLASSIFYING AND TRANSFERRING INFORMATION IN A STORAGE NETWORK, each of which is hereby incorporated by reference.

US Referenced Citations (342)
Number Name Date Kind
4686620 Ng Aug 1987 A
4995035 Cole et al. Feb 1991 A
5005122 Griffin et al. Apr 1991 A
5093912 Dong et al. Mar 1992 A
5133065 Cheffetz et al. Jul 1992 A
5193154 Kitajima et al. Mar 1993 A
5212772 Masters May 1993 A
5226157 Nakano et al. Jul 1993 A
5239647 Anglin et al. Aug 1993 A
5241668 Eastridge et al. Aug 1993 A
5241670 Eastridge et al. Aug 1993 A
5276860 Fortier et al. Jan 1994 A
5276867 Kenley et al. Jan 1994 A
5287500 Stoppani, Jr. Feb 1994 A
5321816 Rogan et al. Jun 1994 A
5333315 Saether et al. Jul 1994 A
5347653 Flynn et al. Sep 1994 A
5410700 Fecteau et al. Apr 1995 A
5448724 Hayashi et al. Sep 1995 A
5491810 Allen Feb 1996 A
5495607 Pisello et al. Feb 1996 A
5504873 Martin et al. Apr 1996 A
5519865 Kondo May 1996 A
5544345 Carpenter et al. Aug 1996 A
5544347 Yanai et al. Aug 1996 A
5559957 Balk Sep 1996 A
5590318 Zbikowski et al. Dec 1996 A
5619644 Crockett et al. Apr 1997 A
5623679 Rivette et al. Apr 1997 A
5638509 Dunphy et al. Jun 1997 A
5673381 Huai et al. Sep 1997 A
5699361 Ding et al. Dec 1997 A
5729743 Squibb Mar 1998 A
5737747 Vishlitzky Apr 1998 A
5751997 Kullick et al. May 1998 A
5758359 Saxon May 1998 A
5761677 Senator et al. Jun 1998 A
5764972 Crouse et al. Jun 1998 A
5778395 Whiting et al. Jul 1998 A
5812398 Nielsen Sep 1998 A
5813009 Johnson et al. Sep 1998 A
5813017 Morris Sep 1998 A
5829046 Tzelnic Oct 1998 A
5832510 Ito Nov 1998 A
5875478 Blumenau Feb 1999 A
5887134 Ebrahim Mar 1999 A
5892917 Myerson Apr 1999 A
5901327 Ofek May 1999 A
5907621 Bachman May 1999 A
5918232 Pouschine et al. Jun 1999 A
5924102 Perks Jul 1999 A
5950205 Aviani, Jr. Sep 1999 A
5953721 Doi Sep 1999 A
5974563 Beeler, Jr. Oct 1999 A
6006225 Bowman Dec 1999 A
6021415 Cannon et al. Feb 2000 A
6023710 Steiner Feb 2000 A
6026414 Anglin Feb 2000 A
6052735 Ulrich et al. Apr 2000 A
6061692 Thomas May 2000 A
6076148 Kedem et al. Jun 2000 A
6088697 Crockett Jul 2000 A
6092062 Lohman et al. Jul 2000 A
6094416 Ying Jul 2000 A
6112221 Bender Aug 2000 A
6131095 Low et al. Oct 2000 A
6131190 Sidwell Oct 2000 A
6148412 Cannon et al. Nov 2000 A
6154787 Urevig et al. Nov 2000 A
6154852 Amundson Nov 2000 A
6161111 Mutalik et al. Dec 2000 A
6167402 Yeager Dec 2000 A
6175829 Li Jan 2001 B1
6189001 McGovern Feb 2001 B1
6212512 Barney et al. Apr 2001 B1
6260069 Anglin Jul 2001 B1
6269431 Dunham Jul 2001 B1
6275953 Vahalia et al. Aug 2001 B1
6301592 Aoyama et al. Oct 2001 B1
6324581 Xu et al. Nov 2001 B1
6328766 Long Dec 2001 B1
6330570 Crighton et al. Dec 2001 B1
6330642 Carteau Dec 2001 B1
6343324 Hubis et al. Jan 2002 B1
RE37601 Eastridge et al. Mar 2002 E
6356801 Goodman et al. Mar 2002 B1
6374336 Peters Apr 2002 B1
6389432 Pothapragada et al. May 2002 B1
6418478 Ignatius Jul 2002 B1
6421683 Lamburt Jul 2002 B1
6421711 Blumenau et al. Jul 2002 B1
6421779 Kuroda Jul 2002 B1
6430575 Dourish Aug 2002 B1
6438586 Hass Aug 2002 B1
6487561 Ofek et al. Nov 2002 B1
6487644 Huebsch Nov 2002 B1
6499026 Rivette et al. Dec 2002 B1
6507852 Dempsey Jan 2003 B1
6516314 Birkler Feb 2003 B1
6519679 Devireddy et al. Feb 2003 B2
6538669 Lagueux, Jr. et al. Mar 2003 B1
6542909 Tamer Apr 2003 B1
6542972 Ignatius Apr 2003 B2
6549957 Hanson Apr 2003 B1
6564228 O'Connor May 2003 B1
6581143 Gagne Jun 2003 B2
6625623 Midgley Sep 2003 B1
6647396 Parnell Nov 2003 B2
6658436 Oshinsky Dec 2003 B2
6658526 Nguyen et al. Dec 2003 B2
6732124 Koseki May 2004 B1
6760721 Chasen et al. Jul 2004 B1
6763351 Subramaniam Jul 2004 B1
6772164 Reinhardt Aug 2004 B2
6775790 Reuter Aug 2004 B2
6785864 Te et al. Aug 2004 B1
6829635 Townshend Dec 2004 B1
6834329 Sasaki et al. Dec 2004 B2
6836779 Poulin Dec 2004 B2
6847984 Midgley Jan 2005 B1
6857053 Bolik Feb 2005 B2
6871163 Hiller Mar 2005 B2
6886020 Zahavl Apr 2005 B1
6947935 Horvitz Sep 2005 B1
6983322 Tripp Jan 2006 B1
6996616 Leighton Feb 2006 B1
7003519 Biettron Feb 2006 B1
7035880 Crescenti Apr 2006 B1
7047236 Conroy May 2006 B2
7085787 Beier Aug 2006 B2
7103740 Colgrove Sep 2006 B1
7130860 Pachet Oct 2006 B2
7130970 Devassy Oct 2006 B2
7146566 Hohensee Dec 2006 B1
7149750 Chadwick Dec 2006 B2
7165082 DeVos Jan 2007 B1
7167895 Connelly Jan 2007 B1
7171619 Bianco Jan 2007 B1
7181444 Porter Feb 2007 B2
7194454 Hansen Mar 2007 B2
7197502 Feinsmith Mar 2007 B2
7200726 Gole Apr 2007 B1
7240100 Wein Jul 2007 B1
7246207 Kottomtharayil Jul 2007 B2
7246211 Beloussov Jul 2007 B1
7266546 Son Sep 2007 B2
7269612 Devarakonda Sep 2007 B2
7272606 Borthakur Sep 2007 B2
7328366 Michelman Feb 2008 B2
7330997 Odom Feb 2008 B1
7343365 Farnham Mar 2008 B2
7343394 Morreale et al. Mar 2008 B2
7346623 Prahlad Mar 2008 B2
7346676 Swildens Mar 2008 B1
7356657 Mikami Apr 2008 B2
7356660 Matsunami Apr 2008 B2
7359917 Winter Apr 2008 B2
7366859 Per et al. Apr 2008 B2
7386663 Cousins Jun 2008 B2
7395282 Crescenti Jul 2008 B1
7430587 Malone Sep 2008 B2
7433301 Akahane Oct 2008 B2
7440966 Adkins Oct 2008 B2
7440984 Augenstein Oct 2008 B2
7454569 Kavuri Nov 2008 B2
7496589 Jain Feb 2009 B1
7500150 Sharma Mar 2009 B2
7509316 Greenblatt Mar 2009 B2
7512601 Cucerzan Mar 2009 B2
7512814 Chen Mar 2009 B2
7529748 Wen May 2009 B2
7532340 Koppich May 2009 B2
7533103 Brendle May 2009 B2
7533181 Dawson May 2009 B2
7533230 Glover et al. May 2009 B2
7583861 Hanna Sep 2009 B2
7584227 Gokhale Sep 2009 B2
7590997 Diaz Perez Sep 2009 B2
7613728 Png Nov 2009 B2
7613752 Prahlad Nov 2009 B2
7617541 Plotkin Nov 2009 B2
7620710 Kottomtharayil Nov 2009 B2
7624443 Kramer Nov 2009 B2
7627598 Burke Dec 2009 B1
7627617 Kavuri Dec 2009 B2
7631151 Prahlad Dec 2009 B2
7634478 Yang Dec 2009 B2
7657550 Prahlad Feb 2010 B2
7660800 Prahlad Feb 2010 B2
7660807 Prahlad Feb 2010 B2
7668798 Scanlon Feb 2010 B2
7668884 Prahlad Feb 2010 B2
7672962 Arrouye Mar 2010 B2
7693856 Arrouye Apr 2010 B2
7707178 Prahlad Apr 2010 B2
7711700 Prahlad May 2010 B2
7716171 Kryger May 2010 B2
7716191 Blumenau May 2010 B2
7720801 Chen May 2010 B2
7725605 Palmeri May 2010 B2
7725671 Prahlad May 2010 B2
7734593 Prahlad Jun 2010 B2
7734669 Kottomtharayil Jun 2010 B2
7734715 Hyakutake Jun 2010 B2
7747579 Prahlad Jun 2010 B2
7756837 Williams Jul 2010 B2
7761567 Haverkos Jul 2010 B2
7801864 Prahlad Sep 2010 B2
7809687 Cisler Oct 2010 B2
7818215 King Oct 2010 B2
7822749 Prahlad Oct 2010 B2
7831553 Prahlad Nov 2010 B2
7831622 Prahlad Nov 2010 B2
7831795 Prahlad Nov 2010 B2
7840537 Gokhale Nov 2010 B2
7840619 Horn Nov 2010 B2
7841011 Manson et al. Nov 2010 B2
7849059 Prahlad Dec 2010 B2
7882077 Gokhale Feb 2011 B2
7882098 Prahlad Feb 2011 B2
7890467 Watanabe Feb 2011 B2
7890469 Maionchi Feb 2011 B1
7925856 Greene Apr 2011 B1
7933920 Kojima Apr 2011 B2
7937365 Prahlad May 2011 B2
7937393 Prahlad May 2011 B2
7962709 Agrawal Jun 2011 B2
7966495 Ackerman Jun 2011 B2
8010769 Prahlad Aug 2011 B2
8028026 Jain Sep 2011 B2
8037031 Gokhale Oct 2011 B2
8041677 Sumner et al. Oct 2011 B2
8051045 Vogler Nov 2011 B2
8051095 Prahlad Nov 2011 B2
8055650 Scanlon Nov 2011 B2
8055745 Atluri Nov 2011 B2
8086569 Jasrasaria Dec 2011 B2
8108429 Sim-Tang Jan 2012 B2
8117196 Jones et al. Feb 2012 B2
8140630 Jones et al. Mar 2012 B2
8140786 Bunte Mar 2012 B2
8141152 Hwang Mar 2012 B1
8170995 Prahlad May 2012 B2
8190571 Sen May 2012 B2
8219524 Gokhale Jul 2012 B2
8229904 Claudatos Jul 2012 B2
8229954 Kottomtharayil et al. Jul 2012 B2
8234249 Prahlad et al. Jul 2012 B2
8271548 Prahlad Sep 2012 B2
8285964 Prahlad et al. Oct 2012 B2
8339232 Lotfi et al. Dec 2012 B2
8612714 Prahlad Jan 2013 B2
8370442 Ahn Feb 2013 B2
8401996 Muller Mar 2013 B2
8442983 Pawar May 2013 B2
8484257 Borthakur et al. Jul 2013 B2
8495102 Fulton Jul 2013 B2
8578120 Attarde Nov 2013 B2
8595633 Celik Nov 2013 B2
8615523 Prahlad Dec 2013 B2
8645349 Roark et al. Feb 2014 B2
8655914 Prahlad Feb 2014 B2
8719264 Varadharajan May 2014 B2
8738663 Gonzalez May 2014 B2
8832406 Prahlad et al. Sep 2014 B2
8880735 Tosey Nov 2014 B2
9215194 Shaffer Dec 2015 B2
9509652 Ahn et al. Nov 2016 B2
9636529 Prahlad et al. May 2017 B1
9699129 Nelken Jul 2017 B1
9967338 Ahn May 2018 B2
20010047365 Yonaitis Nov 2001 A1
20020049626 Mathias Apr 2002 A1
20020069324 Gerasimov Jun 2002 A1
20020087550 Carlyle Jul 2002 A1
20020118974 Ikeda Aug 2002 A1
20020147734 Shoup et al. Oct 2002 A1
20020161753 Inaba Oct 2002 A1
20030018807 Larsson Jan 2003 A1
20030046313 Leung Mar 2003 A1
20030055828 Koch Mar 2003 A1
20030101183 Kabra et al. May 2003 A1
20030130993 Mendelevitch Jul 2003 A1
20030149739 Adams et al. Aug 2003 A1
20030182583 Turco Sep 2003 A1
20040015514 Melton Jan 2004 A1
20040254919 Giuseppini Dec 2004 A1
20040260678 Verbowski Dec 2004 A1
20050010588 Zalewski Jan 2005 A1
20050033845 Perepa et al. Feb 2005 A1
20050050075 Okamoto Mar 2005 A1
20050055352 White Mar 2005 A1
20050086231 Moore Apr 2005 A1
20050166082 Williams et al. Jul 2005 A1
20050187937 Kawabe Aug 2005 A1
20050188248 O'Brien Aug 2005 A1
20050216453 Sasaki Sep 2005 A1
20050221802 Hosono Oct 2005 A1
20050228794 Navas Oct 2005 A1
20060015524 Gardiner et al. Jan 2006 A1
20060047714 Anderson Mar 2006 A1
20060101285 Chen et al. May 2006 A1
20060173870 Erdmenger Aug 2006 A1
20060224846 Amarendran Oct 2006 A1
20060230164 Schlimmer Oct 2006 A1
20060248055 Haslam et al. Nov 2006 A1
20060259468 Brooks Nov 2006 A1
20060259527 Devarakonda Nov 2006 A1
20060277154 Lunt et al. Dec 2006 A1
20070033191 Hornkvist Feb 2007 A1
20070043715 Kaushik Feb 2007 A1
20070043956 ElFar Feb 2007 A1
20070067304 Ives Mar 2007 A1
20070143559 Yagawa Jun 2007 A1
20070174273 Jones et al. Jul 2007 A1
20070185926 Prahlad Aug 2007 A1
20070203938 Prahlad Aug 2007 A1
20070206205 Suzuki Sep 2007 A1
20070208780 Anglin Sep 2007 A1
20070282680 Davis et al. Dec 2007 A1
20070282953 Jain Dec 2007 A1
20080059495 Kiessig Mar 2008 A1
20080071727 Nair Mar 2008 A1
20080077594 Ota Mar 2008 A1
20080183662 Reed Jul 2008 A1
20080228771 Prahlad Sep 2008 A1
20090106375 Carmel et al. Apr 2009 A1
20090172333 Marcu et al. Jul 2009 A1
20090228464 Jones et al. Sep 2009 A1
20090287665 Prahlad Nov 2009 A1
20090319534 Gokhale Dec 2009 A1
20100082672 Kottomtharayil Apr 2010 A1
20100179941 Agrawal Jul 2010 A1
20100205150 Prahlad Aug 2010 A1
20110010352 Jockisch Jan 2011 A1
20110178986 Prahlad Jul 2011 A1
20120215745 Prahlad Aug 2012 A1
20130110790 Matsumoto et al. May 2013 A1
20130246485 Pawar Sep 2013 A1
20140229444 Varadharajan et al. Aug 2014 A1
20140379815 Cudak Dec 2014 A1
20160034506 Prahlad Feb 2016 A1
Foreign Referenced Citations (21)
Number Date Country
0259912 Mar 1988 EP
0405926 Jan 1991 EP
0467546 Jan 1992 EP
0774715 May 1997 EP
0809184 Nov 1997 EP
0899662 Mar 1999 EP
0981090 Feb 2000 EP
1174795 Jan 2002 EP
WO9412944 Jun 1994 WO
WO9513580 May 1995 WO
WO9912098 Mar 1999 WO
WO9914692 Mar 1999 WO
WO0106368 Jan 2001 WO
WO0193537 Dec 2001 WO
WO3060774 Jul 2003 WO
WO2004010375 Jun 2004 WO
WO2004063863 Mar 2005 WO
WO2005055093 Jun 2005 WO
WO2007062254 May 2007 WO
WO2007062429 May 2007 WO
WO2008049023 Apr 2008 WO
Non-Patent Literature Citations (40)
Entry
“Text Figures”, retrieved from http://www.microsoft.com/msj/1198.ntfs/ntfstextfigs.htm on Nov. 10, 2005, 7 pages.
“Titus Labs—Announces Document Classification for Microsoft Word” Nov. 3, 2005 (Nov. 3, 2005), XP55034835, available at http://web.archive.org/web/20051126093136/http://www.titus-labs.com/about/DocClassRelease.html, 1 page.
Armstead et al., “Implementation of a Campwide Distributed Mass Storage Service: The Dream vs. Reality,” IEEE, Sep. 11-14, 1995, pp. 190-199.
Arneson, “Mass Storage Archiving in Network Environments,” Digest of Papers, Ninth IEEE Symposium on Mass Storage Systems, Oct. 31, 1988-Nov. 3, 1988, pp. 45-50, Monterey, CA.
Arneson, David A., “Development of Omniserver,” Control Data Corporation, Tenth IEEE Symposium on Mass Storage Systems, May 1990, ‘Crisis in Mass Storage’ Digest of Papers, pp. 88-93, Monterey, CA.
Bhagwan, R. et al. “Total Recall: System Support for Automated Availability Management,” Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation, vol. 1, Mar. 3, 2004, XP055057350, Berkeley, CA, 14 pages.
Bowman et al. “Harvest: A Scalable, Customizable Discovery and Access System,” Department of Computer Science, University of Colorado—Boulder, Revised Mar. 1995, 29 pages.
Cabrera et al., “ADSM: A Multi-Platform, Scalable, Backup and Archive Mass Storage System,” Digest of Papers, Compcon '95, Proceedings of the 40th IEEE Computer Society International Conference, Mar. 5, 1995-Mar. 9, 1995, pp. 420-427, San Francisco, CA.
Eitel, “Backup and Storage Management in Distributed Heterogeneous Environments,” IEEE, Jun. 12-16, 1994, pp. 124-126.
EMC Corporation, “Today's Choices for Business Continuity,” 2004, 12 pages.
Extended European Search Report for European Application No. 06846386.8, dated Dec. 30, 2008, 6 pages.
Extended European Search Report for European Application No. 07844364.5, dated Apr. 19, 2011, 9 pages.
Extended European Search Report for European Application No. 07855337.7, dated Dec. 9, 2010, 6 pages.
Extended European Search Report for European Application No. EP11003795, dated Nov. 21, 2012, 20 pages.
Farley, M., “Storage Network Fundamentals,, Network Backup: The Foundation of Storage Management, Data Management,” Storage Networking Fundamentals: an Introduction to Storage Devices, Subsystems, Applications, Management, and Filing [File] Systems, Cisco Press, Jan. 1, 2005, 9 pages.
Further Examiner's Report for Canadian Application No. 2,837,984, dated Feb. 29, 2016, 10 pages.
Further Examiner's Report for Canadian Application No. 2,837,984, dated Feb. 27, 2017, 2 pages.
Further Examiner's Report for Canadian Application No. 2,837,984, dated Sep. 12, 2017, 4 pages.
Gait, J., “The Optical File Cabinet: A Random-Access File System for Write-Once Optical Disks,” IEEE Computer, vol. 21, No. 6, pp. 11-22 (Jun. 1988).
Harrison, CDIA Training & Test Preparation Guide 2000, Specialized Solutions, 3 pages.
International Search Report and Written Opinion for International Application No. PCT/US07/81681, dated Oct. 20, 2008, 11 pages.
International Search Report and Written Opinion for International Application No. PCT/US07/81681, dated Nov. 13, 2009, 8 pages.
International Search Report and Written Opinion for International Application No. PCT/US10/62069, dated Mar. 7, 2011, 7 pages.
Jander, M., “Launching Storage-Area Net,” Data Communications, US, McGraw Hill, NY, vol. 27, No. 4 (Mar. 21, 1998), pp. 64-72.
Jeffrey Cooperstein and Jeffrey Richter, “Keeping an Eye on Your NTFS Drives, Part II: Building a Change Journal Application,” Microsoft Systems Journal, Oct. 1999, 14 pages.
Jeffrey Cooperstein and Jeffrey Richter, “Keeping an Eye on Your NTFS Drives: the Windows 2000 Change Journal Explained,” Microsoft Systems Journal, Sep. 1999, 17 pages.
Jeffrey Richter and Luis Felipe Cabrera, “A File System for the 21st Century: Previewing the Windows NT 5.0 File System,” and attached text figures, Microsoft Systems Journal, Nov. 1998, 24 pages.
Karl Langdon and John Merryman, “Data Classification: Getting Started,” Storage Magazine, Jul. 2005, 3 pages.
Manber et al., “WebGlimpse—Combining Browsing and Searching,” 1997 Usenix Technical Conference, Jan. 1997, 12 pages.
Microsoft Developer Network, “GetFileAttributes,” online library article, [accessed on Nov. 10, 2005], 3 pages.
Microsoft Developer Network, [GetFileAttributesEx,] online library article, [accessed on Nov. 10, 2005], 2 pages.
Microsoft Developer Network, “Win32_File_Attribute_Data,” online library article, [accessed on Nov. 10, 2005], 3 pages.
O'Neill, B., “New Tools to Classify Data,” Storage Magazine, Aug. 2005, 4 pages.
Partial International Search Results, dated May 25, 2007, International Application No. PCT/US2006/045556, 2 pages.
Quick Reference Guide for West and East [date unknown, but verified as of Sep. 13, 2007], Search and Information Resource Administration, 2 pages.
Rosenblum et al., “The Design and Implementation of a Log-Structured File System,” Operating Systems Review SIGOPS, vol. 25, No. 5, New York, US, pp. 1-15 (May 1991).
Supplementary European Search Report for European Application No. EP07844364, dated Apr. 19, 2011, 9 pages.
Titus Labs Inc.: Titus LABS Document Classification V1.1 for Microsoft Word—Document Policy Enforcement, available at: <http://web.archive.org/web/20060104112621/www.titus-labs.com/includes/PDF/DocClassDataSheet.pdf>, Nov. 3, 2005, 2 pages.
User's Manual for the Examiners Automated Search Tool (EAST) Jul. 22, 1999, Version 1.0, 179 pages.
U.S. Appl. No. 15/976,770 for Jalil, filed May 10, 2018.
Related Publications (1)
Number Date Country
20180255136 A1 Sep 2018 US
Provisional Applications (1)
Number Date Country
61093148 Aug 2008 US
Divisions (1)
Number Date Country
Parent 12548953 Aug 2009 US
Child 13759283 US
Continuations (2)
Number Date Country
Parent 15360036 Nov 2016 US
Child 15973430 US
Parent 13759283 Feb 2013 US
Child 15360036 US