At least some embodiments disclosed herein relate to receiving or making observations of a person in general, and more particularly, but not limited to, using such observations to determine whether certain data corresponds to the person.
Data mining involves discovering new patterns from large data sets and may involve use of artificial intelligence, statistics and database systems. A typical goal of data mining is to extract knowledge from a large data set. In data mining, large quantities of data typically are automatically analyzed to extract, for example, patterns such as groups of data or dependencies among data.
Systems and methods to receive or make observations of a person (e.g., a message recipient) that are used to determine whether data (e.g., newly-received data extracted from a message from a sender to the recipient) corresponds to the person are described herein. Some embodiments are summarized in this section.
In one embodiment, a method implemented in a data processing system includes: receiving or making a plurality of observations for a person (e.g., data extracted from e-mails sent to the person); storing the observations in a repository (e.g., a database on a server); and determining whether data in a first observation of the observations corresponds to the person, wherein the determining is based on the plurality of observations.
In one embodiment, the person is associated with an address (e.g., an e-mail address or mobile device phone number), and each of the plurality of observations is a message from the person to a respective recipient of a plurality of recipients. The method further includes storing profile data for each of the plurality of recipients as a plurality of person profiles (e.g., in a different database and/or on a different server, with a unique person profile for each of the recipients), and the determining includes calculating a confidence based on the observations stored in the repository. In one example, the method further includes determining whether the confidence is equal to or greater than a threshold value.
In another embodiment, a method includes: receiving or making a plurality of observations for a sender, the sender having an address; storing the observations in a repository; and determining whether data in a first observation of the observations corresponds to the address of the sender, wherein the determining is based on the plurality of observations.
In one embodiment, the first observation is a first message, the address is an e-mail address, and the data is a phone number. The method further includes extracting the data from the first message, and the determining includes analyzing a distribution pattern of the plurality of observations.
In one embodiment, a privacy policy is implemented in a system to limit use of repository data regarding various persons (e.g., data obtained from sent messages). The system is configured to provide services as described in more detail below while protecting the privacy of the users or other persons (e.g., in accordance with an enrollment agreement and/or user consent). In one example, the above methods include applying a privacy policy to the repository such that a user of a mobile device may only receive a confidence related to data of a sender having previously sent one or more messages to the user.
The present disclosure is illustrative of inventive features to enable a person skilled in the art to make and use the techniques. Various features, as described herein, should be used in compliance with all current and future rules, laws and regulations related to privacy, security, permission, consent, authorization, and others.
The disclosure includes methods and apparatuses which perform the above methods, including data processing systems which perform these methods, and computer readable media containing instructions which when executed on data processing systems cause the systems to perform these methods.
Other features will be apparent from the accompanying drawings and from the detailed description which follows.
The embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings in which like references indicate similar elements.
The following description and drawings are illustrative and are not to be construed as limiting. Numerous specific details are described to provide a thorough understanding. However, in certain instances, well known or conventional details are not described in order to avoid obscuring the description. References to one or an embodiment in the present disclosure are not necessarily references to the same embodiment; and, such references mean at least one.
Reference in this specification to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the disclosure. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Moreover, various features are described which may be exhibited by some embodiments and not by others. Similarly, various requirements are described which may be requirements for some embodiments but not other embodiments.
References made to “Xobni”, “Xobni One”, and “Elcaro” herein are merely exemplary of specific embodiments and are not intended to limit the scope of the disclosure. For instance, Xobni is presented in some cases as an example of a provider of services that uses the exemplary Elcaro server and Xobni One computing systems/platforms.
At least one embodiment of the disclosure provides a method including: receiving or making, via a first computing device, observations of a person; storing the observations in a repository; and determining whether data in a first observation corresponds to the person, wherein the determining is based on the plurality of observations. For example, observations may be based on data received from another computing device such as data extracted from messages from a sender. In another example, observations may be based on data obtained from a mobile device of the person (i.e., the data can be obtained by making a local observation on the mobile device and does not need to be received from a different computing device such as a server or other user mobile device).
In one embodiment, the method further includes receiving, from a second computing device, a query requesting at least one confidence for ranking a list of data items to be presented on a display (e.g., a screen of a mobile phone) for one of the plurality of recipients. Some examples for computing or calculating the confidence are provided below.
In one example, these recipients are users of the Xobni address book and person profiling services (see, e.g., personal contacts service and software at www.xobni.com, which website information is incorporated by reference herein). In one embodiment, a result from the determining is used to select or rank information from a person profile for presentation to a user of a computing device. In another embodiment, the method further includes using a result from the determining for caller identification (e.g., using the result to rank or prioritize information to be presented to the user of the mobile phone when a caller has been identified). In one embodiment, the person profile is a profile for a caller of a phone call to the user.
In another embodiment, a method includes: receiving or making observations for a sender having an address; storing the observations in a repository; and determining based on the plurality of observations whether data in a first observation corresponds to the address of the sender.
In one embodiment, each of the plurality of observations is a message addressed to a different recipient, and the address is an e-mail address. In one embodiment, the method further includes, prior to the determining whether the data corresponds to the address, determining whether the data was previously sent to a user of a mobile device.
In one embodiment, the method further includes providing a result from the determining only if the sender is in a social network of a user. In one embodiment, the method further includes accessing, over a network, a social network server to determine the social network of the user.
In one embodiment, the method further includes computing a confidence that the data corresponds to the address. The data may be selected from the group consisting of a phone number, a street address, and a company name. As an example, the plurality of observations may be a number of messages from the sender (e.g., at least ten, 100, or 500 messages).
In one embodiment, each of the plurality of observations is an e-mail, a text message, or a phone call. In one embodiment, the repository is a database implemented on at least one server.
In one embodiment, a computing apparatus includes at least one processor and memory storing instructions configured to instruct the at least one processor to perform any of the above methods. In one embodiment, a non-transitory computer-storage medium stores instructions configured to instruct a computing apparatus to perform any of the above methods.
In one embodiment, user data is combined from across a large user base (e.g., person profile data from Xobni service users), to come up with more accurate information about the population as a whole (e.g., the entire Xobni user population and/or the population of persons sending messages to Xobni users). For example, the data may be analyzed to determine which persons are associated with phone numbers in the data (e.g., phone numbers extracted from messages sent to Xobni users are determined or correlated as being the home or mobile phone number of particular senders of the messages).
The communications server may store respective person profiles for many users (e.g., of the Xobni service mentioned above) such as recipients of e-mails or other messages from senders (e.g. a sender of an e-mail using a user terminal). The communications server receives or makes observations for a person, and sends these observations to a repository (e.g. via communication network 121). In one example, this repository is implemented as a database running on at least one server connected to communication network 121 (illustrated here and discussed herein merely for exemplary purposes as the “Elcaro server”, which is operated for example by the illustrative Xobni service provider). Other computing devices/systems may be used that provide the same or similar functions as illustrated herein for the Elcaro server.
Queries or questions may be submitted from the communications server to the Elcaro server, which may provide results or answers back to the communications server. These queries or questions may be associated with providing an information display or other actions or services for one of many users associated with the communications server (e.g., providing ranked results in a display on a mobile device of a Xobni user).
The online social network site 123 may be connected to a data storage facility to store user provided content, such as multimedia content, preference data, etc. In
Although
For example, it is desired to extract the mobile phone number for Rick and update his personal profile with this number. Parsing is used to identify portions of the e-mail body that are believed to be a phone number. As illustrated here, two phone numbers have been extracted. However, only one of these two numbers correctly corresponds to Rick as being his personal cell phone number. As described below, a query is made to the repository to determine which of these two numbers should be selected as correctly corresponding to the person profile for Rick.
In one example, the bodies of e-mails are parsed for phone numbers following a set of rules which take into account different countries and formats. The parser can tell if a sequence of numbers is a phone number, but not if it belongs to the sender. At this stage, it is a “raw observation”.
In one example of a confidence algorithm, a statistical analysis is performed across every unique e-mail address that assigns a confidence value to each unique phone number observed from the address. For example, there may be more than 0.5 billion observations in the repository database. A person may have one or many valid phone numbers. An algorithm determines how many extracted numbers actually belong to the person despite the large variation and quantity of observations made across the system.
For example, consider the case where a user John has been e-mailed numerous phone numbers over the past few years by many different senders. The e-mail addresses of the senders having sent the e-mails to the user John are applied as a filter against all of the data in the repository. So, the user only gets access to results from the repository for those phone numbers that are associated with these prior e-mail addresses. The user does not get access to new phone numbers not previously known to the user. In other words, the global database repository of everyone's phone number and how each phone number is correlated to an e-mail address or person is filtered based on privacy controls for each individual user.
The displayed profile lists phone numbers that are presented to the user in a ranked order. Confidence scores generated (e.g., by the Elcaro server storing the repository) are used to rank the phone numbers, and the numbers are displayed to the user in this ranked order. When the list of highest confidence phone numbers (e.g., numbers above the predefined threshold discussed above) is displayed, a signal strength indicator may be provided to indicate the confidence value associated with each phone number. As illustrated here, the signal strength indicator may be a horizontal bar graph indicating the magnitude of the confidence.
In one embodiment, note that if a user himself or herself directly enters a phone number into a contact database or a person profile, then it is assumed (e.g., by the Elcaro server and the person profile server) that the user wants this number associated with the profile of that particular person. So, any confidence score is ignored, and the phone number is treated as being associated that person.
Now, further details are discussed below for various additional non-limiting, exemplary embodiments. In one embodiment, a process may determine whether a phone number and an e-mail address belong to the same person by crowd sourcing communication data as discussed above. More specifically, one can compute the confidence that a phone number found in the body of an e-mail belongs to the sender of the e-mail. By setting a specific cutoff value for the “confidence”, one can confirm ownership of the phone number with greater accuracy, if there is sufficient data.
In one example, users of an address/contact service may agree to allow servers to access their e-mail corpus. Since their e-mail corpus includes received e-mails, a system can gather phone number observations from persons who are not a registered user. However, privacy constraints only permit access to this inferred (outsider) phone number data if and only if the person is in the user's network (which may be defined in various conventional ways, such as being a second-order social network). For inbound messages, when friends of a person A join the Xobni service, the friends will have immediate access to correct phone information, without having to wait for person A to join the Xobni service, or respond to a request for person A to provide up-to-date phone numbers.
In one example, data for many persons is globalized. Cleaning up phone numbers for the persons can be done using the method described above. When large numbers of phone numbers are extracted from many e-mails, a system may associate too many phone numbers with a particular person/contact. Persons usually only have one or two primary phone numbers that they use. The approach above permits displaying the most significant phone numbers. A process determines whether a phone number and an e-mail address belong to the same person. This can be done by scanning the entire repository of all phone numbers that have ever been observed through the system (e.g., via messages or other observations).
A number is computed that is called a “confidence”. When a phone number and an e-mail are paired as an observation, a query is made as to determine the confidence that the phone number belongs to the sender. A threshold is defined, and if the confidence is above that threshold, it is assumed that the phone number is associated with the person, and every number below that threshold is assumed not to be associated.
Regarding inbound e-mails from non-Xobni users, the Xobni service stores a large number of e-mails from some outside users that are sent to multiple existing Xobni service users. The more samples the system has, the greater the confidence that it can be determined that a phone number is that particular outside user's phone number. For example, if the system sees three or four samples, the system starts to consider that the phone number is associated with that person. Having greater than, for example, fifty samples is an example of greater confidence.
In one embodiment, the neighboring words in an e-mail may be used to determine the phone number type, but are not used to determine the correlation with the e-mail address or the person. As a first step, the parser looks at things like whether a number is an international number or a domestic number. If so, the parser will extract it. After identifying a number, the parser may look at a few words to the left or right to find words like “home” or “fax” in order to identify the type of number. A person may have his or her main number in the signature block of an e-mail, but occasionally the person may put his or her mobile number in the body of an e-mail. The system is able to identify that mobile number from the body of the e-mail. However, for example, the number of a favorite restaurant of a person may also be put into an e-mail. The system is able to avoid associating that restaurant number with the sender.
The method above may be applied to any type of messaging, including, for example, text messaging. This may also include Facebook or similar messages. Data to be identified or confirmed with a confidence may include, for example, a birth date, an address, or other personal or business data such as employer. These might be considered to be attributes of the sender. These attributes are determined based on a large number of communications by that person.
Regarding a distribution of observations for a particular sender, there is a pattern to the distribution that may be analyzed by an algorithm.
Some persons might have four phone numbers, while other persons have only one number. The algorithm draws out the distribution, and cuts it at the appropriate point (this is described in greater detail below). For example, it might be determined that a first user has two numbers, and another user only has a single number (such as a Skype number). It can't be assumed that every person has two phone numbers. Instead, the number of phone numbers will vary for each user. The approach herein can use e-mails from all users in the repository and apply the algorithm to just one person to make a decision. In one embodiment, each message from a sender is treated the same (i.e., as an observation). Each of these observations is summed up as described below. The computed confidence is based on the shape of the distribution. Typically, the distribution has a long tail.
One application of the approach above is that a system could take an iPhone or other address book, and without adding or subtracting any further data, the system could rank the phone numbers or other data in the address book, and clean up the data to indicate which phone number or other data item is currently the best number, and which number or data item may no longer be correct. Thus, accuracy of this address or other data can be increased.
Other applications of computing confidence as discussed herein may include mapping of e-mail addresses to social network IDs. For example, it may be determined that a certain e-mail address belongs to a particular person on Facebook or another social network site.
Another application includes identification of known entities (e.g., a company such as Amazon.com). When a person receives an e-mail from Amazon.com, the e-mail may be from a sender having a name repeated for numerous customers, but sent from the same Amazon.com domain. The system may look at several e-mails, and determine that it is Amazon.com that is sending e-mails to lots of customers (the e-mails look alike in structure). So, a determination is made that the sender is a business entity, and not a human person.
Another application is to build a global social graph (for the system to understand who knows whom, for example similarly to the understanding that the Facebook system has based on collected/stored data). For example, a person may have about 10 or 20 unique phone numbers. If a “person” has a very large number, for example 100,000, of unique phone numbers, then the system assumes this is merely an Internet bot.
A specific algorithm in one embodiment for confidence scoring phone numbers is now discussed. Worker jobs run continuously on Xobni system clusters that fetch historical e-mails from Xobni users in batches. The bodies of the e-mails are not stored, but instead scanned once and discarded. More specifically, in one embodiment, the Elcaro server uses programs running on computers physically located at an external facility. There are two different jobs:
1) gathering observations from e-mails and placing them into the repository; and
2) running statistics on the observations in the repository, as described in more detail below. These processes run in parallel (i.e., they are always both running simultaneously and do not interfere with each other).
During a scan, a set of regular expressions and specific parsing rules are run on each e-mail to identify and extract phone numbers. Each such extraction is referred to as an “observation”. This process is not designed to be perfect, and instead generally errs on the side of false positives (i.e., assuming it's a phone number if there is uncertainty).
Once an observation has been made, it is stored in the repository (e.g., a MySQL database). The database keeps track of all the unique e-mail addresses it has seen, all the unique phone numbers it has seen, and all unique observations. An observation must be unique along three fields (email_address, phone_number, email_timestamp), which prevents double counting, in case the same e-mail is re-scanned in the future.
After the observation has been inserted into the database, the source e-mail address is marked as “dirty”, which has the meaning that the entire set of unique phone number confidences for this e-mail address is out-of-date and must be re-computed. This is done because one observation will affect the confidence scores of all other phone numbers observed from this source e-mail address.
In one embodiment, a separate process (running in parallel to the observation importer) cleans up dirty e-mail addresses as now described. For each e-mail address, the following steps are performed:
1) Scale all observations with a decay function, making older ones less important. For example, the decay function may have a half-life of 26 weeks (i.e., the observation is 50% as important if 26 weeks old, 25% as important if 52 weeks old, etc.).
2) Insert artificial noise to prevent degenerate statistical cases and smooth out the results. For every real observation at time t, a fake observation at time t is added. Also, the count of all real observations is increased by one. This ensures that the standard deviation is always computable.
3) Sum all the decayed values for each unique phone number (real and fake). Each phone number for this e-mail address now has a “decayed score”.
4) Determine the mean and standard deviation of the decayed scores.
5) For each phone number, compute the distance of its decayed score from the mean decayed score in standard deviations (s).
6) Apply a squashing function to s, so the range is restricted to [−1, 1]. This is the “confidence” that the phone number belongs to the e-mail address. The squashing function used is the Logistic Squashing function (http://en.wikipedia.org/wiki/Logistic_function) f(x)=1/(1+e{circumflex over ( )}−x) which scales to the range [0, 1]. This is then re-scaled to [−1.0, 1.0] for use in this embodiment.
7) Flag any phone numbers with a confidence greater than a certain cutoff value (e.g., empirically determined to be 0.38) to be “significant”, meaning the Elcaro server/system believes with high confidence that the phone number belongs to the sender of the e-mail.
All confidences are then updated into a separate database table, which is the “master record” of confidences. This table is indexed for fast-read by Xobni service APIs, so client applications can ask the Elcaro server/system for the confidence of an (email_address, phone_number) pair, then use this information to either remove the number (in the case of a low confidence), or for ranking a set of phone numbers or other data.
To protect privacy, the client application may only ask the Elcaro server/system about phone numbers that it is already aware of. If user X has sent user Y an e-mail with phone number P in it, then user Y may ask the Elcaro server/system what is: confidence (X,P)? This protects user X's privacy, while simultaneously giving user Y the benefit of the global knowledge contained in the confidence score.
The “fake” observations discussed above are necessary to handle degenerate statistical cases. The confidence score assumes there is a distribution of phone numbers with a long tail: a few numbers with a lot of observations, then lots of observations of different (incorrect) phone numbers (see, e.g.,
The assumption holds true in practice most of the time, but the system must handle cases when the assumption breaks down. A simple example is as follows: one has observed the same phone number eight times and that is all of the observations. Most likely, this number belongs to the sender, but without any other phone numbers to compare it to (no distribution), one can't compute the standard deviation, and thus neither the confidence. This is also true if one has seen several different numbers exactly the same number of times (e.g., WORK, CELL, HOME phone numbers in eight e-mails). Here again, the standard deviation is zero, and the confidence unexpectedly cannot be computed. For example, see
If the system does the following steps:
Then the system is guaranteed that:
In addition, the real data point is scaled based on the decay function (e.g., older is less important), so the fake data point must also be scaled with the same decay function so as not to introduce a bias to the long tail. It should be noted that if the fake data points were not scaled the same way as the real data points, then the distribution would be biased towards fake data. For example, a real data phone number observed 26 weeks ago would be scaled by 0.5. A fake data point is then added to create the long tail, but this data point must also be scaled by 0.5. If it were not scaled (e.g., if it were just kept at the default 1.0), then this would be equivalent to adding two fake data points. Essentially, both real and fake data points are scaled the same way for the sake of consistency.
In
The inter-connect 202 interconnects the microprocessor(s) 203 and the memory 208 together and also interconnects them to a display controller and display device 207 and to peripheral devices such as input/output (I/O) devices 205 through an input/output controller(s) 206. Typical I/O devices include mice, keyboards, modems, network interfaces, printers, scanners, video cameras and other devices which are well known in the art.
The inter-connect 202 may include one or more buses connected to one another through various bridges, controllers and/or adapters. In one embodiment the I/O controller 206 includes a USB (Universal Serial Bus) adapter for controlling USB peripherals, and/or an IEEE-1394 bus adapter for controlling IEEE-1394 peripherals.
The memory 208 may include ROM (Read Only Memory), and volatile RAM (Random Access Memory) and non-volatile memory, such as hard drive, flash memory, etc.
Volatile RAM is typically implemented as dynamic RAM (DRAM) which requires power continually in order to refresh or maintain the data in the memory. Non-volatile memory is typically a magnetic hard drive, a magnetic optical drive, or an optical drive (e.g., a DVD RAM), or other type of memory system which maintains data even after power is removed from the system. The non-volatile memory may also be a random access memory.
The non-volatile memory can be a local device coupled directly to the rest of the components in the data processing system. A non-volatile memory that is remote from the system, such as a network storage device coupled to the data processing system through a network interface such as a modem or Ethernet interface, can also be used.
In one embodiment, a data processing system as illustrated in
In one embodiment, a data processing system as illustrated in
In some embodiments, one or more servers of the system can be replaced with the service of a peer to peer network of a plurality of data processing systems, or a network of distributed computing systems. The peer to peer network, or a distributed computing system, can be collectively viewed as a server data processing system.
Embodiments of the disclosure can be implemented via the microprocessor(s) 203 and/or the memory 208. For example, the functionalities described can be partially implemented via hardware logic in the microprocessor(s) 203 and partially using the instructions stored in the memory 208. Some embodiments are implemented using the microprocessor(s) 203 without additional instructions stored in the memory 208. Some embodiments are implemented using the instructions stored in the memory 208 for execution by one or more general purpose microprocessor(s) 203. Thus, the disclosure is not limited to a specific configuration of hardware and/or software.
In
In one embodiment, the user input device 231 is configured to generate user data content. The user input device 231 may include a text input device, a still image camera, a video camera, and/or a sound recorder, etc. In one embodiment, the user input device 231 and the position identification unit 225 are configured to automatically tag user data content created by the user input device 231 with the navigation information identified by the position identification unit 225.
In this description, various functions and operations may be described as being performed by or caused by software code to simplify description. However, those skilled in the art will recognize what is meant by such expressions is that the functions result from execution of the code by a processor, such as a microprocessor. Alternatively, or in combination, the functions and operations can be implemented using special purpose circuitry, with or without software instructions, such as using an Application-Specific Integrated Circuit (ASIC) or a Field-Programmable Gate Array (FPGA). Embodiments can be implemented using hardwired circuitry without software instructions, or in combination with software instructions. Thus, the techniques are limited neither to any specific combination of hardware circuitry and software, nor to any particular source for the instructions executed by the data processing system.
While some embodiments can be implemented in fully functioning computers and computer systems, various embodiments are capable of being distributed as a computing product in a variety of forms and are capable of being applied regardless of the particular type of machine or computer-readable media used to actually effect the distribution.
At least some aspects disclosed can be embodied, at least in part, in software. That is, the techniques may be carried out in a computer system or other data processing system in response to its processor, such as a microprocessor, executing sequences of instructions contained in a memory, such as ROM, volatile RAM, non-volatile memory, cache or a remote storage device.
Routines executed to implement the embodiments may be implemented as part of an operating system, middleware, service delivery platform, SDK (Software Development Kit) component, web services, or other specific application, component, program, object, module or sequence of instructions referred to as “computer programs.” Invocation interfaces to these routines can be exposed to a software development community as an API (Application Programming Interface). The computer programs typically comprise one or more instructions set at various times in various memory and storage devices in a computer, and that, when read and executed by one or more processors in a computer, cause the computer to perform operations necessary to execute elements involving the various aspects.
A machine readable medium can be used to store software and data which when executed by a data processing system causes the system to perform various methods. The executable software and data may be stored in various places including for example ROM, volatile RAM, non-volatile memory and/or cache. Portions of this software and/or data may be stored in any one of these storage devices. Further, the data and instructions can be obtained from centralized servers or peer to peer networks. Different portions of the data and instructions can be obtained from different centralized servers and/or peer to peer networks at different times and in different communication sessions or in a same communication session. The data and instructions can be obtained in entirety prior to the execution of the applications. Alternatively, portions of the data and instructions can be obtained dynamically, just in time, when needed for execution. Thus, it is not required that the data and instructions be on a machine readable medium in entirety at a particular instance of time.
Examples of computer-readable media include but are not limited to recordable and non-recordable type media such as volatile and non-volatile memory devices, read only memory (ROM), random access memory (RAM), flash memory devices, floppy and other removable disks, magnetic disk storage media, optical storage media (e.g., Compact Disk Read-Only Memory (CD ROMS), Digital Versatile Disks (DVDs), etc.), among others. The computer-readable media may store the instructions.
The instructions may also be embodied in digital and analog communication links for electrical, optical, acoustical or other forms of propagated signals, such as carrier waves, infrared signals, digital signals, etc. However, propagated signals, such as carrier waves, infrared signals, digital signals, etc. are not tangible machine readable medium and are not configured to store instructions.
In general, a tangible machine readable medium includes any mechanism that provides (e.g., stores) information in a form accessible by a machine (e.g., a computer, network device, personal digital assistant, manufacturing tool, any device with a set of one or more processors, etc.).
In various embodiments, hardwired circuitry may be used in combination with software instructions to implement the techniques. Thus, the techniques are neither limited to any specific combination of hardware circuitry and software nor to any particular source for the instructions executed by the data processing system.
Although some of the drawings illustrate a number of operations in a particular order, operations which are not order dependent may be reordered and other operations may be combined or broken out. While some reordering or other groupings are specifically mentioned, others will be apparent to those of ordinary skill in the art and so do not present an exhaustive list of alternatives. Moreover, it should be recognized that the stages could be implemented in hardware, firmware, software or any combination thereof.
In the foregoing specification, the disclosure has been described with reference to specific exemplary embodiments thereof. It will be evident that various modifications may be made thereto without departing from the broader spirit and scope as set forth in the following claims. The specification and drawings are, accordingly, to be regarded in an illustrative sense rather than a restrictive sense.
The present application claims priority to U.S. Provisional Application Ser. No. 61/616,486, filed Mar. 28, 2012, entitled “Using Observations of a Person to Determine if Data Corresponds to the Person,” by Monaco et al., the entire contents of which application is incorporated by reference as if fully set forth herein. The present application is related to U.S. patent application Ser. No. 12/180,502, filed Jul. 25, 2008, entitled “Method and System for Display of Information in a Communication System Gathered from External Sources” and published as U.S. Pat. App. Pub. No. 2009-0031232; U.S. patent application Ser. No. 12/180,489, filed Jul. 25, 2008, entitled “Display of Profile Information Based on Implicit Actions” and published as U.S. Pat. App. Pub. No. 2009-0030940; U.S. patent application Ser. No. 12/180,483, filed Jul. 25, 2008, entitled “Display of Attachment Based Information within a Messaging System” and published as U.S. Pat. App. Pub. No. 2009-0030872; U.S. patent application Ser. No. 12/180,498, filed Jul. 25, 2008, entitled “Display of Information in Electronic Communications” and published as U.S. Pat. App. Pub. No. 2009-0030933; U.S. patent application Ser. No. 12/180,469, filed Jul. 25, 2008, entitled “Display of Communication System Usage Statistics” and published as U.S. Pat. App. Pub. No. 2009-0031244; U.S. patent application Ser. No. 12/180,453, filed Jul. 25, 2008, entitled “Method and System for Collecting and Presenting Historical Communication Data for a Mobile Device” and published as U.S. Pat. App. Pub. No. 2009-0029674; the disclosures of which applications are hereby incorporated herein by reference in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
5396647 | Thompson et al. | Mar 1995 | A |
5610915 | Elliott et al. | Mar 1997 | A |
5966714 | Huang et al. | Oct 1999 | A |
6020884 | MacNaughton et al. | Feb 2000 | A |
6285999 | Page | Sep 2001 | B1 |
6385644 | Devine et al. | May 2002 | B1 |
6484196 | Maurille | Nov 2002 | B1 |
6510453 | Apfei et al. | Jan 2003 | B1 |
6560620 | Ching | May 2003 | B1 |
6594654 | Salam et al. | Jul 2003 | B1 |
6721748 | Knight et al. | Apr 2004 | B1 |
6816850 | Culliss | Nov 2004 | B2 |
6832245 | Isaacs et al. | Dec 2004 | B1 |
6931419 | Lindquist | Aug 2005 | B1 |
6952805 | Tafoya et al. | Oct 2005 | B1 |
6996777 | Hiipakka | Feb 2006 | B2 |
7003724 | Newman | Feb 2006 | B2 |
7058892 | MacNaughton et al. | Jun 2006 | B1 |
7076533 | Knox et al. | Jul 2006 | B1 |
7085745 | Klug | Aug 2006 | B2 |
7103806 | Horvitz | Sep 2006 | B1 |
7181518 | Matsumoto et al. | Feb 2007 | B1 |
7185065 | Holtzman et al. | Feb 2007 | B1 |
7246045 | Rappaport et al. | Jul 2007 | B1 |
7328242 | McCarthy et al. | Feb 2008 | B1 |
7333976 | Auerbach | Feb 2008 | B1 |
7359894 | Liebman et al. | Apr 2008 | B1 |
7383307 | Kirkland et al. | Jun 2008 | B2 |
7444323 | Martinez et al. | Oct 2008 | B2 |
7475109 | Fletcher et al. | Jan 2009 | B1 |
7475113 | Stolze | Jan 2009 | B2 |
7512788 | Choi et al. | Mar 2009 | B2 |
7512814 | Chen et al. | Mar 2009 | B2 |
7536384 | Venkataraman et al. | May 2009 | B2 |
7539676 | Aravamudan | May 2009 | B2 |
7580363 | Sorvari et al. | Aug 2009 | B2 |
7593995 | He et al. | Sep 2009 | B1 |
7620407 | Donald et al. | Nov 2009 | B1 |
7624103 | Wiegering et al. | Nov 2009 | B2 |
7627598 | Burke | Dec 2009 | B1 |
7634463 | Katragadda et al. | Dec 2009 | B1 |
7639157 | Whitley et al. | Dec 2009 | B1 |
7653695 | Flury et al. | Jan 2010 | B2 |
7692653 | Petro et al. | Apr 2010 | B1 |
7702730 | Spataro et al. | Apr 2010 | B2 |
7707249 | Spataro et al. | Apr 2010 | B2 |
7707509 | Naono et al. | Apr 2010 | B2 |
7716140 | Nielsen et al. | May 2010 | B1 |
7720916 | Fisher et al. | May 2010 | B2 |
7725492 | Sittig | May 2010 | B2 |
7743051 | Kashyap et al. | Jun 2010 | B1 |
7752081 | Calabria | Jul 2010 | B2 |
7756895 | Emigh | Jul 2010 | B1 |
7756935 | Gaucas | Jul 2010 | B2 |
7761436 | Norton et al. | Jul 2010 | B2 |
7788260 | Lunt | Aug 2010 | B2 |
7805492 | Thatcher et al. | Sep 2010 | B1 |
7818396 | Dolin et al. | Oct 2010 | B2 |
7827208 | Bosworth | Nov 2010 | B2 |
7827265 | Cheever et al. | Nov 2010 | B2 |
7831692 | French et al. | Nov 2010 | B2 |
7836045 | Schachter | Nov 2010 | B2 |
7836134 | Pantalone | Nov 2010 | B2 |
7849141 | Bellegarda et al. | Dec 2010 | B1 |
7849142 | Clegg et al. | Dec 2010 | B2 |
7853602 | Gorti et al. | Dec 2010 | B2 |
7853881 | Aly Assal et al. | Dec 2010 | B1 |
7870197 | Lewis et al. | Jan 2011 | B2 |
7899806 | Aravamudan | Mar 2011 | B2 |
7899871 | Kumar et al. | Mar 2011 | B1 |
7908647 | Polis et al. | Mar 2011 | B1 |
7949627 | Aravamudan | May 2011 | B2 |
7970832 | Perry et al. | Jun 2011 | B2 |
7979569 | Eisner et al. | Jul 2011 | B2 |
7991764 | Rathod | Aug 2011 | B2 |
7996456 | Gross | Aug 2011 | B2 |
8005806 | Rupp et al. | Aug 2011 | B2 |
8032598 | He et al. | Oct 2011 | B1 |
8055715 | Bensky et al. | Nov 2011 | B2 |
8073928 | Dolin et al. | Dec 2011 | B2 |
8086676 | Palahnuk et al. | Dec 2011 | B2 |
8112437 | Katragadda et al. | Feb 2012 | B1 |
8140566 | Boerries et al. | Mar 2012 | B2 |
8161122 | Sood et al. | Apr 2012 | B2 |
8200808 | Ishida | Jun 2012 | B2 |
8204897 | Djabarov et al. | Jun 2012 | B1 |
8284783 | Maufer et al. | Oct 2012 | B1 |
8291019 | Rochelle et al. | Oct 2012 | B1 |
8296179 | Rennison | Oct 2012 | B1 |
8316315 | Portnoy et al. | Nov 2012 | B2 |
8392409 | Kashyap et al. | Mar 2013 | B1 |
8392836 | Bau et al. | Mar 2013 | B1 |
8423545 | Cart et al. | Apr 2013 | B2 |
8443441 | Stolfo et al. | May 2013 | B2 |
8452745 | Ramakrishna | May 2013 | B2 |
8463872 | Pounds et al. | Jun 2013 | B2 |
8468168 | Brezina et al. | Jun 2013 | B2 |
8495045 | Wolf et al. | Jul 2013 | B2 |
8510389 | Gurajada et al. | Aug 2013 | B1 |
8522257 | Rupp et al. | Aug 2013 | B2 |
8549412 | Breztria et al. | Oct 2013 | B2 |
8566306 | Jones | Oct 2013 | B2 |
8600343 | Brezina et al. | Dec 2013 | B2 |
8620935 | Rubin et al. | Dec 2013 | B2 |
8661002 | Smith et al. | Feb 2014 | B2 |
8745060 | Brezina et al. | Jun 2014 | B2 |
8793625 | Rhee et al. | Jul 2014 | B2 |
8818995 | Guha | Aug 2014 | B1 |
9009065 | Reis et al. | Apr 2015 | B2 |
9020938 | Cort et al. | Apr 2015 | B2 |
9058366 | Brezina et al. | Jun 2015 | B2 |
9069825 | Chang | Jun 2015 | B1 |
9195969 | Bau et al. | Nov 2015 | B2 |
9235848 | Gourley et al. | Jan 2016 | B1 |
9275118 | Brezina et al. | Mar 2016 | B2 |
9298783 | Brezina et al. | Mar 2016 | B2 |
9591086 | Brezina et al. | Mar 2017 | B2 |
9596308 | Brezina et al. | Mar 2017 | B2 |
9699258 | Brezina et al. | Jul 2017 | B2 |
9716764 | Brezina et al. | Jul 2017 | B2 |
9842144 | Cort et al. | Dec 2017 | B2 |
9842145 | Cort et al. | Dec 2017 | B2 |
9954963 | Brezina et al. | Apr 2018 | B2 |
10013672 | Seeger et al. | Jul 2018 | B2 |
10069924 | Brezina et al. | Sep 2018 | B2 |
20010037407 | Dragulev et al. | Nov 2001 | A1 |
20010049628 | Icho | Dec 2001 | A1 |
20020016818 | Kirani et al. | Feb 2002 | A1 |
20020024536 | Kahan et al. | Feb 2002 | A1 |
20020049751 | Chen et al. | Apr 2002 | A1 |
20020054587 | Baker et al. | May 2002 | A1 |
20020059402 | Belanger | May 2002 | A1 |
20020059418 | Bird et al. | May 2002 | A1 |
20020059425 | Belfiore et al. | May 2002 | A1 |
20020073011 | Brattain et al. | Jun 2002 | A1 |
20020073058 | Kremer et al. | Jun 2002 | A1 |
20020076004 | Brockenbrough et al. | Jun 2002 | A1 |
20020087647 | Quine et al. | Jul 2002 | A1 |
20020091777 | Schwartz | Jul 2002 | A1 |
20020103873 | Ramanathan et al. | Aug 2002 | A1 |
20020103879 | Mondragon | Aug 2002 | A1 |
20020107991 | Maguire et al. | Aug 2002 | A1 |
20020112014 | Bennett | Aug 2002 | A1 |
20020116396 | Somers et al. | Aug 2002 | A1 |
20020143871 | Meyer et al. | Oct 2002 | A1 |
20020152216 | Bouthors | Oct 2002 | A1 |
20020194502 | Sheth et al. | Dec 2002 | A1 |
20030028525 | Santos et al. | Feb 2003 | A1 |
20030037116 | Nolan et al. | Feb 2003 | A1 |
20030046311 | Baidya et al. | Mar 2003 | A1 |
20030114956 | Cullen et al. | Jun 2003 | A1 |
20030120608 | Pereyra | Jun 2003 | A1 |
20030142125 | Salmimaa et al. | Jul 2003 | A1 |
20030167324 | Farnham et al. | Sep 2003 | A1 |
20030195937 | Kircher, Jr. et al. | Oct 2003 | A1 |
20030204439 | Cullen | Oct 2003 | A1 |
20030220978 | Rhodes | Nov 2003 | A1 |
20030220989 | Tsuji et al. | Nov 2003 | A1 |
20030233419 | Beringer | Dec 2003 | A1 |
20040002903 | Stolfo et al. | Jan 2004 | A1 |
20040015554 | Wilson | Jan 2004 | A1 |
20040034537 | Gengarella et al. | Feb 2004 | A1 |
20040039630 | Begole et al. | Feb 2004 | A1 |
20040056901 | March et al. | Mar 2004 | A1 |
20040068545 | Daniell et al. | Apr 2004 | A1 |
20040073616 | Fellenstein et al. | Apr 2004 | A1 |
20040078443 | Malik | Apr 2004 | A1 |
20040078444 | Malik | Apr 2004 | A1 |
20040078445 | Malik | Apr 2004 | A1 |
20040100497 | Quillen et al. | May 2004 | A1 |
20040128355 | Chao et al. | Jul 2004 | A1 |
20040128356 | Bernstein et al. | Jul 2004 | A1 |
20040133465 | Koge et al. | Jul 2004 | A1 |
20040153504 | Hutchinson et al. | Aug 2004 | A1 |
20040162878 | Lewis et al. | Aug 2004 | A1 |
20040174964 | Koch | Sep 2004 | A1 |
20040177048 | Klug | Sep 2004 | A1 |
20040186851 | Jhingan et al. | Sep 2004 | A1 |
20040202117 | Wilson et al. | Oct 2004 | A1 |
20040205002 | Layton | Oct 2004 | A1 |
20040215726 | Arning et al. | Oct 2004 | A1 |
20040260756 | Forstall et al. | Dec 2004 | A1 |
20040268229 | Paoli et al. | Dec 2004 | A1 |
20050015626 | Chasin | Jan 2005 | A1 |
20050027779 | Schinner | Feb 2005 | A1 |
20050038687 | Galdes | Feb 2005 | A1 |
20050055639 | Fogg | Mar 2005 | A1 |
20050060638 | Mathew et al. | Mar 2005 | A1 |
20050076090 | Thuerk | Apr 2005 | A1 |
20050080868 | Malik | Apr 2005 | A1 |
20050091203 | Liu et al. | Apr 2005 | A1 |
20050091272 | Smith et al. | Apr 2005 | A1 |
20050091314 | Blagsvedt et al. | Apr 2005 | A1 |
20050091319 | Kirsch | Apr 2005 | A1 |
20050102361 | Winjum et al. | May 2005 | A1 |
20050108273 | Brebner | May 2005 | A1 |
20050131888 | Tafoya et al. | Jun 2005 | A1 |
20050138070 | Huberman et al. | Jun 2005 | A1 |
20050138631 | Bellotti et al. | Jun 2005 | A1 |
20050149620 | Kirkland et al. | Jul 2005 | A1 |
20050159970 | Buyukkokten et al. | Jul 2005 | A1 |
20050164704 | Winsor | Jul 2005 | A1 |
20050165584 | Boody et al. | Jul 2005 | A1 |
20050165893 | Feinberg et al. | Jul 2005 | A1 |
20050188028 | Brown, Jr. et al. | Aug 2005 | A1 |
20050198159 | Kirsch | Sep 2005 | A1 |
20050198299 | Beck et al. | Sep 2005 | A1 |
20050198305 | Pezaris et al. | Sep 2005 | A1 |
20050204009 | Hazarika et al. | Sep 2005 | A1 |
20050213511 | Reece et al. | Sep 2005 | A1 |
20050216300 | Appelman et al. | Sep 2005 | A1 |
20050222890 | Cheng et al. | Oct 2005 | A1 |
20050228881 | Reasor et al. | Oct 2005 | A1 |
20050228899 | Wendkos et al. | Oct 2005 | A1 |
20050235224 | Arend et al. | Oct 2005 | A1 |
20050278317 | Gross et al. | Dec 2005 | A1 |
20060004713 | Korte et al. | Jan 2006 | A1 |
20060004892 | Lunt | Jan 2006 | A1 |
20060004914 | Kelly et al. | Jan 2006 | A1 |
20060015533 | Wolf et al. | Jan 2006 | A1 |
20060015561 | Murphy et al. | Jan 2006 | A1 |
20060020398 | Vernon et al. | Jan 2006 | A1 |
20060031340 | Mathew et al. | Feb 2006 | A1 |
20060031775 | Sattler et al. | Feb 2006 | A1 |
20060047747 | Erickson et al. | Mar 2006 | A1 |
20060053199 | Pricken et al. | Mar 2006 | A1 |
20060056015 | Nishiyama | Mar 2006 | A1 |
20060059151 | Martinez et al. | Mar 2006 | A1 |
20060059238 | Slater et al. | Mar 2006 | A1 |
20060064434 | Gilbert et al. | Mar 2006 | A1 |
20060065733 | Lee et al. | Mar 2006 | A1 |
20060075046 | Yozell-Epstein et al. | Apr 2006 | A1 |
20060083357 | Howell et al. | Apr 2006 | A1 |
20060083358 | Fong et al. | Apr 2006 | A1 |
20060085752 | Beadle et al. | Apr 2006 | A1 |
20060095502 | Lewis et al. | May 2006 | A1 |
20060101285 | Chen et al. | May 2006 | A1 |
20060101350 | Scott | May 2006 | A1 |
20060123357 | Okamura | Jun 2006 | A1 |
20060136494 | Oh | Jun 2006 | A1 |
20060168073 | Kogan et al. | Jul 2006 | A1 |
20060173824 | Bensky et al. | Aug 2006 | A1 |
20060173961 | Turski et al. | Aug 2006 | A1 |
20060179415 | Cadiz et al. | Aug 2006 | A1 |
20060195361 | Rosenberg | Aug 2006 | A1 |
20060195474 | Cadiz et al. | Aug 2006 | A1 |
20060195785 | Portnoy et al. | Aug 2006 | A1 |
20060217116 | Cassell et al. | Sep 2006 | A1 |
20060224675 | Fox et al. | Oct 2006 | A1 |
20060242536 | Gogerty | Oct 2006 | A1 |
20060242609 | Potter et al. | Oct 2006 | A1 |
20060248151 | Belakovskiy et al. | Nov 2006 | A1 |
20060256008 | Rosenberg | Nov 2006 | A1 |
20060271630 | Bensky et al. | Nov 2006 | A1 |
20060281447 | Lewis et al. | Dec 2006 | A1 |
20060282303 | Hale et al. | Dec 2006 | A1 |
20070005702 | Tokuda et al. | Jan 2007 | A1 |
20070005715 | LeVasseur et al. | Jan 2007 | A1 |
20070005750 | Lunt et al. | Jan 2007 | A1 |
20070011367 | Scott et al. | Jan 2007 | A1 |
20070016647 | Gupta et al. | Jan 2007 | A1 |
20070022447 | Arseneau et al. | Jan 2007 | A1 |
20070060328 | Zeike et al. | Mar 2007 | A1 |
20070061300 | Ramer et al. | Mar 2007 | A1 |
20070067289 | Novak | Mar 2007 | A1 |
20070071187 | Apreutesei et al. | Mar 2007 | A1 |
20070083651 | Ishida | Apr 2007 | A1 |
20070088687 | Bromm et al. | Apr 2007 | A1 |
20070106780 | Farnham et al. | May 2007 | A1 |
20070112761 | Xu et al. | May 2007 | A1 |
20070115991 | Ramani et al. | May 2007 | A1 |
20070118533 | Ramer et al. | May 2007 | A1 |
20070123222 | Cox et al. | May 2007 | A1 |
20070124432 | Holtzman et al. | May 2007 | A1 |
20070129977 | Forney | Jun 2007 | A1 |
20070130527 | Kim | Jun 2007 | A1 |
20070135110 | Athale et al. | Jun 2007 | A1 |
20070143414 | Daigle | Jun 2007 | A1 |
20070156732 | Surendran et al. | Jul 2007 | A1 |
20070174432 | Rhee et al. | Jul 2007 | A1 |
20070177717 | Owens et al. | Aug 2007 | A1 |
20070185844 | Schachter | Aug 2007 | A1 |
20070185865 | Budzik et al. | Aug 2007 | A1 |
20070192490 | Minhas | Aug 2007 | A1 |
20070203991 | Fisher et al. | Aug 2007 | A1 |
20070208802 | Barman et al. | Sep 2007 | A1 |
20070214141 | Sittig | Sep 2007 | A1 |
20070218900 | Abhyanker | Sep 2007 | A1 |
20070244681 | Wan Kyu Cha et al. | Oct 2007 | A1 |
20070255794 | Coutts | Nov 2007 | A1 |
20070271527 | Paas et al. | Nov 2007 | A1 |
20070273517 | Govind | Nov 2007 | A1 |
20070282956 | Staats | Dec 2007 | A1 |
20070288514 | Reitter et al. | Dec 2007 | A1 |
20070288578 | Pantalone | Dec 2007 | A1 |
20070294281 | Ward et al. | Dec 2007 | A1 |
20070294428 | Guy et al. | Dec 2007 | A1 |
20080005247 | Khoo | Jan 2008 | A9 |
20080005249 | Hart | Jan 2008 | A1 |
20080031241 | Toebes et al. | Feb 2008 | A1 |
20080037721 | Yao et al. | Feb 2008 | A1 |
20080040370 | Bosworth | Feb 2008 | A1 |
20080040474 | Zuckerberg | Feb 2008 | A1 |
20080040475 | Bosworth | Feb 2008 | A1 |
20080055263 | Lemay et al. | Mar 2008 | A1 |
20080056269 | Madhani et al. | Mar 2008 | A1 |
20080065701 | Lindstrom et al. | Mar 2008 | A1 |
20080071872 | Gross | Mar 2008 | A1 |
20080077614 | Roy | Mar 2008 | A1 |
20080104052 | Ryan et al. | May 2008 | A1 |
20080113674 | Baig | May 2008 | A1 |
20080114758 | Rupp et al. | May 2008 | A1 |
20080119201 | Kolber et al. | May 2008 | A1 |
20080120411 | Eberle | May 2008 | A1 |
20080122796 | Jobs et al. | May 2008 | A1 |
20080133540 | Hubbard et al. | Jun 2008 | A1 |
20080147639 | Hartman et al. | Jun 2008 | A1 |
20080147810 | Kumar et al. | Jun 2008 | A1 |
20080162347 | Wagner | Jul 2008 | A1 |
20080162649 | Lee et al. | Jul 2008 | A1 |
20080162651 | Madnani | Jul 2008 | A1 |
20080163164 | Chowdhary et al. | Jul 2008 | A1 |
20080170158 | Jung et al. | Jul 2008 | A1 |
20080172362 | Shacham et al. | Jul 2008 | A1 |
20080172464 | Thattai et al. | Jul 2008 | A1 |
20080183832 | Kirkland et al. | Jul 2008 | A1 |
20080216092 | Serlet | Sep 2008 | A1 |
20080220752 | Forstall et al. | Sep 2008 | A1 |
20080222279 | Cioffi et al. | Sep 2008 | A1 |
20080222546 | Mudd et al. | Sep 2008 | A1 |
20080235353 | Cheever et al. | Sep 2008 | A1 |
20080242277 | Chen et al. | Oct 2008 | A1 |
20080268882 | Moloney | Oct 2008 | A1 |
20080270939 | Mueller | Oct 2008 | A1 |
20080275748 | John | Nov 2008 | A1 |
20080290987 | Li | Nov 2008 | A1 |
20080293403 | Quon et al. | Nov 2008 | A1 |
20080301166 | Sugiyama et al. | Dec 2008 | A1 |
20080301175 | Applebaum et al. | Dec 2008 | A1 |
20080301245 | Estrada et al. | Dec 2008 | A1 |
20080307066 | Amidon et al. | Dec 2008 | A1 |
20080316925 | Dolin et al. | Dec 2008 | A1 |
20090005076 | Forstall | Jan 2009 | A1 |
20090010353 | She et al. | Jan 2009 | A1 |
20090029674 | Brezina et al. | Jan 2009 | A1 |
20090030872 | Brezina et al. | Jan 2009 | A1 |
20090030919 | Brezina et al. | Jan 2009 | A1 |
20090030933 | Brezina et al. | Jan 2009 | A1 |
20090030940 | Brezina et al. | Jan 2009 | A1 |
20090031232 | Brezina et al. | Jan 2009 | A1 |
20090031244 | Brezina et al. | Jan 2009 | A1 |
20090031245 | Brezina et al. | Jan 2009 | A1 |
20090037541 | Wilson | Feb 2009 | A1 |
20090048994 | Applebaum et al. | Feb 2009 | A1 |
20090054091 | van Wijk et al. | Feb 2009 | A1 |
20090063130 | Moore | Mar 2009 | A1 |
20090070412 | D'Angelo | Mar 2009 | A1 |
20090077026 | Yanagihara | Mar 2009 | A1 |
20090106415 | Brezina et al. | Apr 2009 | A1 |
20090106676 | Brezina et al. | Apr 2009 | A1 |
20090106695 | Perry | Apr 2009 | A1 |
20090111495 | Sjolin et al. | Apr 2009 | A1 |
20090119678 | Shih et al. | May 2009 | A1 |
20090150251 | Zhitomirsky | Jun 2009 | A1 |
20090156170 | Rossano et al. | Jun 2009 | A1 |
20090157717 | Palahnuk et al. | Jun 2009 | A1 |
20090171930 | Vaughan et al. | Jul 2009 | A1 |
20090174680 | Anzures et al. | Jul 2009 | A1 |
20090177754 | Brezina et al. | Jul 2009 | A1 |
20090182788 | Chung et al. | Jul 2009 | A1 |
20090191899 | Wilson et al. | Jul 2009 | A1 |
20090198688 | Venkataraman et al. | Aug 2009 | A1 |
20090213088 | Hardy et al. | Aug 2009 | A1 |
20090228555 | Joviak et al. | Sep 2009 | A1 |
20090234815 | Boerries et al. | Sep 2009 | A1 |
20090249198 | Davis et al. | Oct 2009 | A1 |
20090271370 | Jagadish et al. | Oct 2009 | A1 |
20090300546 | Kwok et al. | Dec 2009 | A1 |
20090306981 | Cromack et al. | Dec 2009 | A1 |
20090313573 | Paek et al. | Dec 2009 | A1 |
20090319329 | Aggarwal et al. | Dec 2009 | A1 |
20100009332 | Yaskin et al. | Jan 2010 | A1 |
20100030715 | Eustice et al. | Feb 2010 | A1 |
20100049534 | Whitnah | Feb 2010 | A1 |
20100057859 | Shen et al. | Mar 2010 | A1 |
20100062753 | Wen et al. | Mar 2010 | A1 |
20100077041 | Cowan et al. | Mar 2010 | A1 |
20100082693 | Hugg et al. | Apr 2010 | A1 |
20100094869 | Ebanks | Apr 2010 | A1 |
20100131447 | Creutz et al. | May 2010 | A1 |
20100153832 | Markus et al. | Jun 2010 | A1 |
20100161729 | Leblanc et al. | Jun 2010 | A1 |
20100164957 | Lindsay | Jul 2010 | A1 |
20100169327 | Lindsay | Jul 2010 | A1 |
20100174784 | Levey et al. | Jul 2010 | A1 |
20100185610 | Lunt | Jul 2010 | A1 |
20100191844 | He et al. | Jul 2010 | A1 |
20100216509 | Riemer et al. | Aug 2010 | A1 |
20100228560 | Balasaygun et al. | Sep 2010 | A1 |
20100229096 | Maiocco et al. | Sep 2010 | A1 |
20100229223 | Shepard | Sep 2010 | A1 |
20100235375 | Sidhu et al. | Sep 2010 | A1 |
20100241579 | Bassett et al. | Sep 2010 | A1 |
20100241639 | Kifer et al. | Sep 2010 | A1 |
20100250682 | Goldberg et al. | Sep 2010 | A1 |
20100275128 | Ward et al. | Oct 2010 | A1 |
20100281535 | Perry et al. | Nov 2010 | A1 |
20100306185 | Smith | Dec 2010 | A1 |
20100330972 | Angiolillo | Dec 2010 | A1 |
20110010423 | Thatcher et al. | Jan 2011 | A1 |
20110035451 | Smith et al. | Feb 2011 | A1 |
20110040726 | Crosbie et al. | Feb 2011 | A1 |
20110066615 | Pradhan et al. | Mar 2011 | A1 |
20110087747 | Hirst | Apr 2011 | A1 |
20110087969 | Hein et al. | Apr 2011 | A1 |
20110098846 | Yeung et al. | Apr 2011 | A1 |
20110145192 | Quintela et al. | Jun 2011 | A1 |
20110145219 | Cierniak et al. | Jun 2011 | A1 |
20110173547 | Lewis et al. | Jul 2011 | A1 |
20110191337 | Cort et al. | Aug 2011 | A1 |
20110191340 | Cort et al. | Aug 2011 | A1 |
20110191717 | Cort et al. | Aug 2011 | A1 |
20110196802 | Ellis et al. | Aug 2011 | A1 |
20110202532 | Nakazawa et al. | Aug 2011 | A1 |
20110225173 | Gulhane et al. | Sep 2011 | A1 |
20110225293 | Rathod | Sep 2011 | A1 |
20110276396 | Rathod | Nov 2011 | A1 |
20110282905 | Polis et al. | Nov 2011 | A1 |
20110291933 | Holzer | Dec 2011 | A1 |
20110298701 | Holzer | Dec 2011 | A1 |
20120011204 | Morin et al. | Jan 2012 | A1 |
20120017158 | Maguire et al. | Jan 2012 | A1 |
20120036254 | Onuma | Feb 2012 | A1 |
20120054681 | Cort et al. | Mar 2012 | A1 |
20120078883 | Melby | Mar 2012 | A1 |
20120150979 | Monaco | Jun 2012 | A1 |
20120232955 | Riazzi | Sep 2012 | A1 |
20120246065 | Yarvis et al. | Sep 2012 | A1 |
20120259834 | Broder et al. | Oct 2012 | A1 |
20130006634 | Grokop et al. | Jan 2013 | A1 |
20130014021 | Bau et al. | Jan 2013 | A1 |
20130080915 | Lewis et al. | Mar 2013 | A1 |
20130091288 | Shalunov et al. | Apr 2013 | A1 |
20140087687 | Brezina et al. | Mar 2014 | A1 |
20140095433 | Cort et al. | Apr 2014 | A1 |
20140100861 | Ledet | Apr 2014 | A1 |
20140115086 | Chebiyyam | Apr 2014 | A1 |
20140129569 | Seeger, III et al. | May 2014 | A1 |
20140207761 | Brezina et al. | Jul 2014 | A1 |
20140214981 | Mallet et al. | Jul 2014 | A1 |
20140280094 | Brandstetter | Sep 2014 | A1 |
20140280097 | Lee et al. | Sep 2014 | A1 |
20140287786 | Bayraktar et al. | Sep 2014 | A1 |
20160070787 | Brezina et al. | Mar 2016 | A1 |
20160182661 | Brezina et al. | Jun 2016 | A1 |
20170187663 | Brezina et al. | Jun 2017 | A1 |
20170302749 | Brezina et al. | Oct 2017 | A1 |
20170324821 | Brezina et al. | Nov 2017 | A1 |
20180095970 | Cort et al. | Apr 2018 | A1 |
20180234513 | Brezina et al. | Aug 2018 | A1 |
20180276615 | Seeger, III et al. | Sep 2018 | A1 |
20180359325 | Brezina et al. | Dec 2018 | A1 |
Number | Date | Country |
---|---|---|
0944002 | Sep 1999 | EP |
2003006116 | Oct 2003 | JP |
2007249307 | Sep 2007 | JP |
1020040031113 | Apr 2004 | KR |
20060056015 | May 2006 | KR |
1020090068819 | Jun 2009 | KR |
20090112257 | Oct 2009 | KR |
1020090115239 | Nov 2009 | KR |
1020020060386 | Aug 2012 | KR |
2003098515 | Nov 2003 | WO |
2007037875 | Apr 2007 | WO |
2007143232 | Dec 2007 | WO |
2012082886 | Jun 2012 | WO |
2012082929 | Jun 2012 | WO |
Entry |
---|
Bernstein, Michael S. et al., “Enhancing Directed Content Sharing on the Web,” Proceedings of the 28th International Conference on Human Factors in Computing Systems, Atlanta, GA, Apr. 10-15, 2010, pp, 971-980. |
Carvalho, Vitor R. et al., “Ranking Users for Intelligent Message Addressing,” Proceedings of the 30th European Conference on Information Retrieval, Glasgow, Engand, Mar. 30-Apr. 3, 2008, pp. 321-333. |
Elsayed, Tamer et al., “Personal Name Resolution in Email: A Heuristic Approach,” University of Maryland Technical Report No. TR-LAMP-150, Mar. 17. 2008. |
International Patent Application PCT/US10/34782, International Search Report and Written Opinion, dated Dec. 22, 2010. |
International Patent Application PCT/US10/35405, International Search Report and Written Opinion, dated Jan. 3, 2011. |
International Patent Application PCT/US12/043523, International Search Report and Written Opinion, dated Nov. 28, 2012. |
Microsoft Corporation, “About AutoCoroplete Name Suggesting,” Microsoft Outlook 2003 help forum, located at http://office.microsoft.com/en-us/outlook/HP063786471033.aspx, 2003. |
Android-Tips.com, “Android Tips & Tricks: How to Import Contacts into Android Phone,” located at http://android-tips.com/how-to-import-contacts-into-android/, Nov. 17, 2008 (document provided includes third-party comments submitted under the USPTO PeerToPatent program). |
Culotta, Aron et al., “Extracting Social Networks and Contact Information from Email and the Web,” Proceedings pf the First Conference on Email and Anti-Spam (CEAS), Mountain View, CA, Jul. 30-31, 2004 (document provided includes third-party comments submitted under the USPTO PeerToPatent program). |
European Patent Application No. 11849271.9, Extended Search Report, dated Apr. 3, 2014. |
European Patent Application No. 12801970.0, Extended Search Report, dated Oct. 23, 2014. |
European Patent Application 12801998.1, Extended Search Report, dated Feb. 10, 2015. |
Extended European Search Report, EP 10 78 3783, dated Mar. 24, 2014. |
Fitzpatrick, Brad, “AddressBooker,” Github Social Coding, located at http://addressbooker.appspot.com/, Nov. 28, 2008 (document provided includes third-party comments submitted under the USPTO PeerToPatent program). |
Google Inc. “OpenSocial Tutorial,” located at http://code.google.com/apis/opensocial/articles/tutorial/tutorial-0.8.html, Aug. 2008. |
Google Inc., “Automatic Updating of Contacts,” Gmail help forum, located at http://74.125.4.16/support/forum/p/gmail/thread?tid=03f7b692150d9242&hl=en, Apr. 27, 2009 (document provided includes third-party comments submitted under the USPTO PeerToPatent program). |
Hillebrand, Tim, “Plaxo: The Smart Auto Update Address Book,” Smart Phone Mag, located at http://www.smartphonemag.com/cms/blogs/9/plaxo_the_smart_auto_update_address_book, Nov. 6, 2006 (document provided includes third-party comments submitted under the USPTO PeerToPatent program). |
International Patent Application PCT/US10/52081, International Search Report and Written Opinion, dated May 20, 2011. |
International Patent Application PCT/US10/56560, International Search Report and Written Opinion, dated Jun. 21, 2011. |
International Patent Application PCT/US11/64958, International Search Report and Written Opinion, dated Jul. 31, 2012. |
International Patent Application PCT/US2011/064892, International Search Report and Written Opinion, dated Aug. 22, 2012. |
International Patent Application PCT/US2012/043507, International Search Report and Written Opinion, dated Jan. 3, 2013. |
Oberhaus, Kristin, “Look for Cues: Targeting Without Personally Identifiable Information,” W3i, LLC blog entry located at http://blog.w3i.com/2009/09/03/looking-for-cues-targeting-without-personally-identifiable-information/, Sep. 3, 2009. |
OpenSocial Foundation, “Social Application Tutorial (v0.9),” located at http://wiki.opensocial.org/index.php? title=Social_Application_Tutorial, accessed Oct. 8, 2010. |
PCWorld Communications, Inc., “Your Contacts Are Forever: Self-Updating Address Book,” located at http://www.pcworld.com/article/48192/your_contacts_are_forever_selfupdating_address_book.html, May 1, 2001 (document provided includes third-party comments submitted under the USPTO PeerToPatent program). |
U.S. Appl. No. 61/407,018, filed Oct. 27, 2010. |
W3i, LLC, “Advertiser Feedback System (AFS),” company product description. Sep. 22, 2009. |
Wikimedia Foundation, Inc., “Machine Learning,” Wikipedia encyclopedia entry located at http://en.wikipedia.org/wiki/Machine_learning, Jan. 30, 2011. |
International Patent Application PCT/US10/34782, Written Opinion, dated Dec. 22, 2010. |
Number | Date | Country | |
---|---|---|---|
20130262477 A1 | Oct 2013 | US |
Number | Date | Country | |
---|---|---|---|
61616486 | Mar 2012 | US |