Methods and systems for capturing and managing instant messages

ABSTRACT

Managing instant messages may include receiving instant messages created by or on behalf of one or more message sources for delivery to an intended recipient. From among the received instant messages, qualifying instant messages may be identified that satisfy a capture rule, and two or more of the qualifying instant messages may be captured. The intended recipient may be informed of the captured instant messages unobtrusively, and also may be enabled to manage the captured instant messages.

CLAIM OF PRIORITY

This application claims priority to and is a continuation of U.S. patentapplication Ser. No. 10/825,617, filed Apr. 16, 2004, and titled“Managing Instant Messages,” which claims priority under 35 USC §119(e)to U.S. Provisional Application Ser. No. 60/531,988, filed on Dec. 24,2003, and titled “Managing Instant Messages,” and U.S. ProvisionalApplication Ser. No. 60/500,369, filed Sep. 5, 2003, and titled “IMCatcher,” the entire contents of each application is hereby incorporatedby reference.

TECHNICAL FIELD

This disclosure generally relates to managing instant messages.

BACKGROUND

Instant messages are conversational in nature. To maintain theirconversational character, instant messages typically are communicated inreal time to a user based on an indication that the user presently isonline. Nevertheless, the conversational nature of instant messaging maysubject a user who is visible online to undesired real-time advances orinterruptions from other online entities. For example, a user who entersan online chat room may be subjected in real-time to instant messagesfrom other individuals, known or unknown to the user, as well as fromcommercial entities, some of whom may purvey undesirable spam. Havingentered an instant messaging conversation with a friend, the user mayfind the conversation overwhelmed in a cacophony of competing instantmessaging voices, each demanding the user's immediate attention.Although the user may use a knock-knock (e.g., a pop-up window thatprovide the user the option to accept or reject an individual instantmessage based, for example, on an identification of the sender) toscreen instant messages from entities not on a contact list of the user,a knock-knock, like the instant message that it represents, is obtrusiveand steals the focus of the user from other tasks or conversations thatare at hand.

SUMMARY

In one general aspect, managing instant messages may include receivinginstant messages created by or on behalf of one or more message sourcesfor delivery to an intended recipient. From among the received instantmessages, qualifying instant messages are identified that satisfy acapture rule, and two or more of the qualifying instant messages arecaptured. The intended recipient is informed of the captured instantmessages unobtrusively and the intended recipient is enabled to managethe captured instant messages.

Implementations may include one or more of the following features. Forexample, identifying qualifying instant messages that satisfy a capturerule may include identifying received instant messages for which amessage source does not correspond to a contact of the intendedrecipient. A received instant message also may be identified as aqualified instant message based on a degree of separation between theintended recipient and the message source. Unsolicited marketingmessages may be identified as qualified instant messages based, forexample, on a heuristic and/or a Bayesian method. When the intendedrecipient is away or prefers not to be disturbed, for example, allreceived instant messages may be identified as qualified instantmessages.

The intended recipient may be informed unobtrusively of captured instantmessages without stealing focus from another interface for each instantmessage that is captured. The intended recipient also may be informedwhen at least one instant message is captured using an unobtrusiveaudible or visible cue.

Enabling management of the captured instant messages may includeenabling the intended recipient to respond to at least one of thecaptured instant messages and/or to access information related to amessage source associated with the captured instant messages. Theintended recipient may be enabled to delete, ignore or block a capturedinstant message and/or a source of a captured instant message. Further,subsequent instant messages related to a previously deleted, ignored orblocked message or message source, in turn, may be deleted, ignored orblocked without being presented to the intended recipient. In sum, thecapture rule may be modified (e.g., automatically or by the intendedrecipient) based on instant messages previously qualified or captured,for example, to capture or to pass-through subsequent instant messagesfrom the source of a previously captured instant message.

The captured instant messages may be organized and/or presented to theintended recipient according to a plurality of predetermined categories.The predetermined categories may include, for example, categories forknown, unknown, trusted and/or un-trusted messages or messages sources.The organization and presentation of the captured instant messaged maybe configured by the intended recipient and/or automatically by acomputer.

These general and specific aspects may be implemented using a method, asystem, or a computer program, or any combination of systems, methods,and computer programs.

Other features will be apparent from the description, the drawings, andthe claims.

DESCRIPTION OF DRAWINGS

FIGS. 1-6 illustrate graphical user interfaces (GUIs) that may be usedto manage instant messages directed to a user based on the user's onlinepresence.

FIG. 7 is a schematic diagram of a communication system capable ofmanaging instant messages directed to a user based on the user's onlinepresence.

FIG. 8 is a flow diagram of a process implementable by the communicationsystem of FIG. 7.

FIG. 9 is a schematic diagram of an instant messaging system thatmanages instant messages directed to a user based on the user's onlinepresence.

FIG. 10 illustrates a relationship between a user and an instant messagesource having two degrees of separation.

FIG. 11 is a flow diagram illustrating an exemplary processimplementable by the system of FIG. 9.

Like reference symbols in the various drawings indicate like elements.

DETAILED DESCRIPTION

Instant messaging is powerful in its ability to interject itself intothe recipient's online experience in order to initiate or further areal-time online conversation. The capabilities of instant messaging mayenhance collaboration, networking, and the social value of users' onlineexperiences. Nonetheless, absent the ability to manage receipt ofinstant messages, a user may find the potential benefits of instantmessaging lost in an unrequited babble of insignificant or objectionableinstant message voices.

FIG. 1 illustrates a graphical user interface 100 (capture interface)that may be used to manage instant messages received by a user based onthe user's online presence (e.g., the user's presence within a chat roomor other online forum, and/or the user's present connection to theinternet, using, for example, an internet service provider). Usingbutton 105 (the “Away Message” button), the user has indicated to thecapture interface 100 that the user presently is unavailable to receiveinstant messages. The capture interface 100, therefore, captures andorganizes all of the instant messages 110 directed to the user while theuser is away, and thereby provides the user with an effective andefficient way to handle the instant messages 110 upon returning.

The capture interface 100 is displayed initially when a first instantmessage is captured. When displayed initially, the capture interface 100may pop to the front of all open windows or otherwise steal focus toalert the user of its activation. The capture interface 100 typically,however, will not steal focus upon receiving subsequent instantmessages. To minimize distraction to the user, instant messages capturedto the capture interface 100 do not generate a knock-knock when they arereceived and do not steal focus from other tasks or demandindividualized attention of the user. Consequently, instant messagescaptured by the capture interface 100 may be deemed less intrusive bythe user than instant messages presented to the user immediately or byusing a knock-knock. The capture interface 100 may indicate the captureof additional instant messages using a subtle visible or audible cue,such as, for example, by playing a sound or by flashing an icon.

To assist the user in handling the instant messages 110, the instantmessages 110 are categorized according to whether the message sender isknown 115 or unknown 120 to the user. Furthermore, the instant messageswithin each category may be organized according to their time of receipt(as shown), or according to some other metric, such as, for example, ametric of anticipated importance or relevance. For each instant message110 captured and categorized, the user is informed of an identity of thesender (e.g., a screen name) and the time at which the instant messagewas captured. Based on the information presented, the capture interface100 enables the user to select a desired instant message, for example,instant message 117 from DJ Emma Pea Three.

Once an instant message is selected, the user may use a single click ofa button to accept and open the instant message (using the “Open IM”button 125), to obtain more information regarding the message sender(using the “Buddy Info” button 130), to block all further instantmessages from the sender of the instant message (using the “Block”button 135) or to ignore further instant messages from the sender of theinstant message for the duration of the user's present online session(using the “Ignore” button 140). The user also may determine to ignorefuture instant message from all of the captured instant message sendersfor the duration of the user's online session (using the “Ignore All”button 145). The user may perform screening functions for a selectedinstant message without generating feedback or otherwise informing thesender of the user's attention to the instant message. Captured instantmessages not handled expressly by the user, for example, may be deletedor ignored at the end of the user's online session or when the usercloses the capture interface.

Referring to FIG. 2, the “Open IM” button 125 of the capture interfacecauses the selected instant message 117 to be presented to the user in aseparate message interface 200. The message interface 200 includes afirst pane 205 used to display the selected instant message 117 and asecond pane 210 by which the user may compose and send an instantmessage reply. The message interface 200 includes tabs 215 to organizemore than one active instant messaging conversation. The messageinterface 200 also may include controls (e.g., buttons 220) to accessrelevant instant messaging functionality, typically using only a singleclick.

FIG. 3 illustrates a buddy info interface 300 invoked by activating the“Buddy Info” button 130 of the capture interface 100. The buddy infointerface 300 provides additional information 305 regarding the sender,DJ Emma Pea Three, of instant message 117. For example, the buddy infointerface 300 indicates that DJ Emma Pea Thee presently is online in theTown Square Friends Chat room. The buddy info interface also indicateshobbies and interests 310 of DJ Emma Pea Three as well as interests 315that DJ Emma Pea Three shares with the user. Button 320 provides accessto additional information regarding DJ Emma Pea Three, such as, forexample, a phone number, an address, an email address, an age, a gender,family information, educational information, career information, and/oran expertise. Buttons 325 are provided to enable the user to access withone click basic instant messaging options related to DJ Emma Pea Three,such as, for example, to send or block instant messages to or from DJEmma Pea Three or to add DJ Emma Pea Three to a contact list of theuser. The user may use the information provided by the buddy infointerface 300 to judge, for example, whether an unknown sender is aperson (for whom additional information likely is available) or asoftware bot (for which additional information likely is not available).

FIGS. 4A through 4C illustrate interfaces 400, 430 and 460 that areused, respectively, to confirm that the user desires to execute thescreening function of the “Block” button 135, the “Ignore” button 140,or the “Ignore All” button 145 of the capture interface 100.

FIG. 5 illustrates the capture interface 100 in which the user isindicated to be present rather than away. The interface 100 isconfigured to capture only instant messages of unknown senders 120 whenthe user is present and to allow known senders to approach and interactfreely with the user. Nevertheless, referring now to configurationinterface 600 of FIG. 6, the user may use configuration settings 605 toconfigure the capture interface 100 to capture all instant messages,whether from known or unknown senders or whether the user is present oraway. Additional configurations also may be provided, for example, tocapture instant messages only of particular senders or to captureinstant messages only at particular times or during particular contexts(e.g., when the user is engaged actively in a different instant messageexchange that it would be perceived as rude to interrupt).

FIG. 7 shows a generalized system 700 for communicating instant messagesto a user 705. System 700 includes an instant messaging system 710 thatmanages instant messages provided to the user 705 in real time by aninstant message source 750 based on an online presence 707 of the user.Instant messaging system 710 may be implemented, for example, as aclient system, as a host system, or as some combination of these orother systems. The instant messaging system 710 includes a captureengine 715, a rule engine 720, and a capture interface 725. The instantmessaging system 710 may include or be included in a general-purpose ora special-purpose computer (e.g., a personal computer, a PDA, a mobiletelephone, or a device specifically programmed to perform certaintasks), a database, a local area network, and/or a wide area network.The instant messaging system 710 may include any appropriatearchitecture or combination of architectures, such as for example, aclient architecture and/or a host architecture.

The capture engine 715 is configured to capture one or more instantmessages directed to the user 705 by the instant message source 750based on interaction with the rule engine 720. The rule engine 720compares incoming instant messages to a capture rule, and informs thecapture engine 715 if the capture rule is satisfied. If the instantmessage satisfies the capture rule, the capture engine 715 captures theinstant message to manage the instant message for the user 705. Thecapture interface 725 informs the user 705 of the captured instantmessages in an organized fashion and without disrupting the user's otheronline activities. The capture interface 725 also enables the user 705to respond to or to otherwise manage the captured instant messages.

The capture engine 715 captures the instant messages based on input fromthe rule engine 720 that the instant message satisfies a capture rule.The capture engine 715 may include a database to hold captured instantmessages and may communicate information descriptive of the capturedinstant messages to the capture interface 725. The informationdescriptive of the captured instant messages may include, for example,an identifier of the message source, a time stamp of the instantmessage, a portion or summary of the instant message contents, and/or apointer to the instant messages. In addition, or in the alternative, thecapture engine 715 may tag or otherwise identify the instant messages ascaptured and may provide the captured instant message to the captureinterface 725 for handling, storage and/or management.

The rule engine 720 enables the system or an administrator of the systemto generate a capture rule. Alternatively, or in addition, the ruleengine 720 may enable the user 705 or a supervisor of an online accountof the user 705 to define one or more aspects of the capture rule. Thecapture rule may describe, in whole or in part, one or more conditionsto be satisfied for an instant message to be captured. For example, thecapture rule may base capture upon an identify of the message source750, an attribute of the message, a preference or context (e.g., theuser is away) of the user 705, or some combination of these or otherfactors. In any event, the rule engine 720 analyzes incoming instantmessage for satisfaction of the capture rule.

The capture interface 725 may be used to manage the instant messagesdirected to the user 705 while the user 705 is online. The captureinterface 725 itself may receive and store the instant message or mayreference and access instant messages captured and stored by anotherservice, system or device (e.g., the capture engine 715). In any event,the capture interface 725 enables the user 705, for example, toorganize, treat, respond to, block, or ignore the captured instantmessages. The capture interface 725 also may enable the user 705 tomodify the capture rule of the rule engine 720. For example, the captureinterface 725 may enable the user to modify the capture rule directly,or may modify the capture rule automatically based upon treatment by theuser 705 of one or more captured instant messages. Generally, thecapture interface 725 may function similarly to capture interface 100described with respect to FIGS. 1-6.

The instant message source 750 typically may include any source of aninstant message. The instant message source 750 may employ one or moreprotocols to transfer information internally or to communicate theinstant message to the user 705.

Both the instant messaging system 710 and the message source 750 furthermay include various mechanisms for delivering data. The variousmechanisms may include, for example, any applications, protocols,devices, or networks used to facilitate communication of electronicdata. Both the instant messaging system 710 and the message source 750also may include or be included in a general-purpose or aspecial-purpose computer, a local area network, and/or a wide areanetwork. The response to and execution of instructions received by theinstant messaging system 710, the message source 750, or any of theircomponents (collectively the system services), may be controlled by, forexample, a program, a piece of code, an instruction, a device, acomputer system, or a combination thereof, for independently orcollectively instructing the system services to interact and operate asdescribed herein.

FIG. 8 illustrates a flow diagram of a process 800 implementable by, forexample, the system 700 of FIG. 7 to manage instant messages directed tothe user 705. The instant message source 750 communicates instantmessages directed to the user 705 to the instant messaging system 710(step 805). The capture engine 715 uses the rule engine 720 to determinewhether the instant messages satisfy a capture rule (step 810). If aninstant message fails to satisfy the capture rule, that instant messageis not captured and, instead, is passed through to the user (step 815).Otherwise, when an instant message satisfies the capture rule, thecapture engine 715 captures the instant message (step 820). To informthe user 705 of the captured instant messages, the capture engine 715communicates the captured instant messages and/or information indicativeof those messages to the capture interface 710 (step 825). The captureinterface 725 enables the user 705 to handle the captured instantmessages individually or as groups, and otherwise to respond to or tomanage the instant messages as desired (step 825).

Referring to FIG. 9, a generalized communication system 900 communicatesinstant messages generated by one or more instant message sources 950 toa user 905 having an online presence 907. The online presence 907 mayinclude, for example, activity of the user 905 in browsing the internet,participating in an active instant messaging session, using an internetenabled television or game console, using a networked radio, orparticipating in a chat room discussion. The online presence 907 alsomay include an online presence of the user 905 at a particular device.Exemplary components of the communication system 900 are described ingreater detail below.

The communication system 900 includes one or more message sources 950.The message sources 950 typically include different individuals,services, or other sources of instant messages, such as, for example,friends or family of the user 905, persons not known by the user 905,commercial entities, and/or one or more software bots that automaticallydirect messages to the user 905. The instant messages may include, forexample, a personal message, a promotional advertisement, an accountbalance, a portfolio status, a credit status, an online status,information that an order and/or a service is complete, or a messageregarding confirmation, cancellation, and/or rescheduling of anappointment. Other examples include, but are not limited to, a weatherforecast and/or adverse weather conditions of a particular geographicregion; an online status of another user; or entertainment programmingand/or ticket information. As a practical matter, the message sources950 may provide many instant message to the user 905 that areunsolicited and/or undesired.

The message sources 950 may employ one or more protocols (i.e.,standards, formats, conventions, rules, and structures) to transferinformation internally or to communicate instant messages to the user.Protocols employed by the message sources 950 may include, for example,the Internet protocol (IP), the transfer connection protocol (TCP), thehypertext transfer protocol (HTTP), the file transfer protocol (FTP),the user datagram protocol (UDP), the layer two tunneling protocol(L2TP), the simple mail transfer protocol (SMTP), the short messageservice (SMS), the enhanced message service (EMS), and/or the multimediamessage service (MMS).

The communication system 900 includes an instant messaging system 910that manages instant messages provided to the user 905 by the instantmessage sources 950 based on the online presence 907 of the user. Theinstant messaging system 910 includes a capture engine 915, a ruleengine 920 having a rule store 922, a capture interface 925, and amessage interface 930 (the system components). The instant messagingsystem 910 may include or be included in a general-purpose or aspecial-purpose computer (e.g., a personal computer, a PDA, a mobiletelephone, or a device specifically programmed to perform certaintasks), a database, a local area network, and/or a wide area network.The instant messaging system 910 may include any appropriatearchitecture or combination of architectures, such as for example, aclient architecture and/or a host architecture.

The instant messaging system 910 typically allows direct or indirectcommunication between the various system components, the user 905 andthe instant message sources 950, irrespective of physical or logicalseparation. The instant message system 910 may include, for example,various mechanisms for communicating data, such as, for example, theshort message service (SMS), the enhanced message service (EMS), themultimedia message service (MMS), the wireless application protocol(WAP), the transport connection protocol (TCP), the Internet protocol(IP), the World Wide Web, one or more local area networks, and/or one ormore wide area networks. The instant messaging system 910 also mayinclude analog or digital wired and wireless telephone networks, suchas, for example, public switched telephone networks (PSTN), integratedservices digital networks (ISDN), various types of digital subscriberlines (xDSL), advance mobile telephone service (AMPS), global system formobile communications (GSM), general packet radio service (GPRS), codedivision multiple access (CDMA), radio, cable, satellite, and/or otherdelivery mechanisms for carrying data. The communications of the instantmessage system 910 may employ secured and/or unsecured communicationsystems.

Components of the instant messaging system 910 are described in greaterdetail below.

The capture engine 915 corresponds generally to the capture engine 715of FIG. 7. Capture engine 915 is configured to capture an instantmessage based on an indication by the rule engine 920 that a capturerule is satisfied. If the capture rule is not satisfied, then thecapture engine 915 is configured to pass the instant message through tothe message interface 930 for immediate display to the user 905. Thecapture engine 915 may or may not store the instant messages that arecaptured. For example, in one implementation, the capture engine 915stores the captured instant messages and forwards information indicativeof the instant messages to the capture interface. In anotherimplementation, the capture engine 915 merely forwards to the captureinterface 925 those instant messages identified for capture and thecapture interface provides or obtains any required storage.

The rule engine 920 is configured to compare the instant messages to acapture rule of the rule store 922 and/or to analyze the instant messagein view of the capture rule. The rule engine 920 may perform, forexample, Bayesian or heuristic analysis of the instant messages based onthe capture rule. The rule engine 920 is configured to inform thecapture engine 915 when an instant message satisfies the capture rule.

Generally, the capture rule may define, in whole or in part, one or moreconditions to be satisfied by the source, content, and/or timing of aninstant message before capture of the instant message. The capture rulemay be generated by the system or by an administrator of the system. Thecapture rule also may be based on preferences of the user, whetherprovided by the user or determined automatically by the system in viewof user behavior. In short, the capture rule may enable the user 905flexibly to manage which instant messages are received directly, whichinstant messages are blocked completely, and which instant message arecaptured to be screened by the user 905.

The capture rule may include a white list defining approved instantmessage sources 950 (e.g., family, friends, or co-workers) and/or ablack list defining objectionable instant message sources 950 (e.g.,known purveyors of offensive spam) that are to be blocked. The whitelist and/or black list may be based on input of a rating authority or bya community of raters. Although the white list or the black list may beprovided initially as a default, the user may be enabled to modify orreplace either the white list or the black list to better fit the user'spreferences.

Message source categories (e.g., individual, business, orbusiness:gambling) also may be used to control communication withinstant message sources 950 that include an associated category label.For example, a message source 950 may be identified as an online casinoby an associated category label of “business:gambling” and may berestricted based on that label. Generally, to communicate an instantmessage to the user 905, a message source may be required to providemeaningful and trustworthy information by which the message source maybe identified and/or classified.

The capture rule also may control capture, filtering, or ranking of aninstant message based on a degree of separation between the user 905 andthe message source 950 under a rationale, for example, that the user ismore inclined to receive an instant message from a friend of a friendthan from an individual not connected to the user. More specifically,the degree of separation between the user 905 and the message source 950describes a number of intermediary relationships needed to link the userand the message source. Typically, user contact lists (e.g., addressbook, buddy list, and/or white list) are evaluated to determine thenumber of degrees (or relationships) needed to link two users.

Referring briefly to FIG. 10, for example, the user 905 may link to theinstant message source 950 through two degrees of separation based oncontact lists of the user, “The Olive Boy,” and of “Lucky Eddie.” Morespecifically, the user has a contact list 1005 that lists “The OliveBoy.” The contact list 1010 of “The Olive Boy,” in turn, lists “LuckyEddie,” whose contact list 1015 lists the instant message source 950—andestablishes the connection between the user 905 and the message source950. Here, the user 905 is linked to the message source 950 by twodegrees of separation (the relationship between “The Olive Boy” and“Lucky Eddie” providing the first degree, and the relationship between“Lucky Eddie” and the instant messaging source 950 providing the seconddegree). Stated differently, the user 905 is related to “Lucky Eddy” byone degree of separation (i.e., their common relationship to “The OliveBoy”), and “The Olive Boy” is separated from the instant message service950 by one degree of separation (i.e., their common relationship to“Lucky Eddie”). Similarly, the user 905 and “The Olive Boy,” “The OliveBoy” and “Lucky Eddie,” and “Lucky Eddie” and the instant message source950 each respectively are separated by zero degrees of separation.

In short, the capture rule may control capturing, filtering, or rankingof an instant message based on: (1) whether the user 905 and themessages source 950 are discernibly linked; and (2) if they are linked,the number of degrees of separation (e.g., relationships orintermediaries) needed to complete the link.

Referring back to FIG. 9, the capture rule also may include other ruleinformation, such as, for example, key words and/or parameters usefulfor analyzing natural language. The capture rule may enable the ruleengine 920 to restrict instant messages based upon textual analysis oftheir content. More specifically, the capture rule may enable the rulesengine 920 to analyze the language of an instant message to determinewhether the instant message includes offensive language or subjectmatter, or whether the language used is indicative of an unsolicitedspam message. The user may be enabled to select or modify theinformation or algorithms used to screen the online content based on thetextual analysis. For example, the capture rule may include user defineddictionaries of terms that may cause an instant message to be deliveredimmediately, blocked, or passed through when included in the instantmessage.

The capture rule may enable the user to specify times during whichinstant messages may or may not be received. For example, the user mayrestrict receipt of instant messages between the hours of 8:30 am and 5pm during the work week, but may allow instant messages to be receivedwith less restriction during the evenings and on the weekends while theuser is not at work. More specifically, the user may use the capturerule to specify that, during working hours, instant messages ofco-workers or clients are to be received, spam messages are to beblocked, and messages from friends or family are to be captured. On theother hand, when not at work, instant messages from co-workers andclients may be captured while messages from friends and family arereceived immediately.

Additional rule information also may be included, such as, for example,logging or reporting rules. The logging or reporting rules, for example,may indicate provision of a message log 940 to record all of the instantmessages directed to the user 905 whether in the present or a pastonline session. The message log 940 may record whether the instantmessage was captured and what, if any, activity the user took withrespect to the instant message.

The rule store 922 generally receives, stores and administers ruleinformation used to supervise instant messaging by the instant messagingsystem 910. The rule store 922 may include one or more databases thatmay reside at any appropriate location (e.g., local location, remotelocation, or third party location), and also may reside on anyappropriate storage medium, such as, for example, a magnetic disc array,or an optical disk array. These databases may be included in a singlephysical or logical structure, or they may be physically or logicallydistinct. The rule store 922 generally includes a data structure thatenables the rule information and/or other information to be organizedand accessed quickly and efficiently. For example, the rule store 922may organize rule information using fields, records, or files. The rulestore 922 may include database management systems that organize databased on relational, network, flat, or hierarchical architectures. Therule store 922 also may include a hypertext database to link dataobjects such as text, images, or video to other data objects. The rulestore 922 may store the rule information locally, remotely, or in adistributed fashion. In any event, the rule store 922 organizes the ruleinformation for effective access and use by the rule engine 920.

Capture interface 925 may function similarly to capture interface 100described with respect to FIGS. 1-6. The capture interface 925 receivescaptured instant messages or information indicative of those messagesfrom the capture engine 915 for display to the user 905. The captureinterface, alone or in conjunction with other services, may performsorting, prioritizing, or other types of organizational processing onthe captured instant messages to enable the user 905 to manage theinstant messages. For example, the capture interface 925 may prioritizecaptured instant messages based on a predicted relevance or likelihoodof interest. The predicted relevance or likelihood of interest may berelated to the subject matter and/or source of an instant message. Forexample, the capture interface 925 may give a higher priority to aninstant message from an individual not known to the user but who isindicated to share a common interest than is given to an instant messagefrom a software bot that presents a marketing invitation havingobjectionable content.

The capture interface 925 also may enable the user 905 to modify thecapture rule of the rule engine 920. For example, the capture interface925 may enable the user to modify the capture rule directly, or maymodify the capture rule automatically based upon treatment by the user905 of one or more captured instant messages. The capture interface 925may display to the user 905 a source of an instant message, a timestamp, a count of the number of instant messages sent and/or received, asummary of instant message content, and/or the captured instant messagesthemselves. The capture interface 925 may enable the user to approve,block or ignore one or more instant messages or instant message sources.Generally, the capture interface 925 enables the user 905 to organize,respond to, block, ignore, or otherwise manage instant messages in amanner similar to that which was described with respect to theinterfaces of FIGS. 1-6.

The capture interface 925 may include or operate in conjunction with oneor more of the fixed or mobile communication devices 935, whether wiredor wireless. The fixed or mobile communication devices 935 may includeany device, system, and/or piece of code that relies on another serviceto perform an operation. For example, the communication devices 935 mayinclude a device such as a television 935 a, a pen-enabled computer 935b, a personal digital assistant (PDA) or mobile telephone 935 c, anotebook computer 935 d, and/or a desktop computer 935 e. Thecommunication devices 935 also or alternatively may include, forexample, a Web browser, an instant messaging (IM) client, asynchronization client (e.g., a calendar synchronization client or atask list synchronization client), a short message service (SMS) client,a business productivity application (e.g., a word processing program ora spreadsheet program), and/or an operating system or operating systemkernel residing on a device. The communication devices 935 may bearranged to operate within or in concert with one or more other systems,such as, for example, the Internet, the World Wide Web, a WAN (wide areanetwork), a LAN (local area network), analog or digital wired andwireless telephone networks (e.g., PSTN, ISDN, or xDSL), radio,television, cable, satellite, and/or any other delivery mechanism forcarrying data. In any event, the capture interface 925 enables the user905, for example, to organize, treat, respond to, block, or ignore thecaptured instant messages.

One or more other services may be included in the components ofcommunication system 900 and/or these components (hereinafter the systemservices) may be included as part of one or more other services. Forexample, the system services may include or be included in ageneral-purpose or a special-purpose computer (e.g., a personalcomputer, a PDA, or a device specifically programmed to perform certaintasks), a database, a local area network, and/or a wide area network. Inany event, the response to and execution of instructions received by anyor all of the system services may be controlled by, for example, aprogram, a piece of code, an instruction, a device, a computer system,or a combination thereof, for independently or collectively instructingthe services to interact and operate as described herein.

FIG. 11 illustrates a flow diagram of a process 1100 implementable by,for example, the system 900 of FIG. 9 to manage instant messagesdirected to the user 905. An instant message initially is received froma message source 950 by the capture engine 915 (step 1105). The ruleengine 920 is used to determine whether the instant message satisfies acapture rule (step 1110). If a capture rule is not satisfied (step1115), the instant message is communicated to the user 905 using themessage interface to grab the user's immediate attention (step 1120).The system then waits for receipt of the next instant message directedto the user 905 (step 1105).

If a capture rule is satisfied (step 1115), the instant message iscaptured by the capture engine 915 (step 1125). The capture interface925 may be configured to be activated automatically when a first instantmessage is captured during an online session. In addition, or in thealternative, the capture interface 925 may be configured to be activatesbased on an input or a request of the user 905. If the capture interface925 is not activated already (step 1130), then the instant messagingsystem 910 activates the capture interface 925 (step 1135). In anyevent, once the capture interface is activated (step 1135) or isdetermined already to be active (step 1130), the instant message and/orinformation indicative of the instant message is communicated to thecapture interface 925 to inform the user 905 of the instant message andto enable the user to manage the instant message and any other instantmessages that have been captured (step 1140). The system then waits forreceipt of the next instant message directed to the user 905 (step1105).

Other implementations are within the scope of the following claims.

What is claimed is:
 1. A system comprising: at least one processingdevice; a storage device storing instructions, which when executed bythe at least one processing device, cause the at least one processingdevice to implement: an input interface configured to receive electronicmessages created by or on behalf of one or more message sources fordelivery to an intended recipient; a screening component configured toidentify, from among the received electronic messages, qualifyingelectronic messages that satisfy a capture rule, and capture, ascaptured electronic messages, a plurality of the qualifying electronicmessages; and an output interface configured to inform the intendedrecipient of the captured electronic messages and to enable the intendedrecipient: to organize the captured electronic messages according to aplurality of predetermined categories and manage the captured electronicmessages; to access information related to a message source associatedwith at least one of the captured electronic messages; and to indicatethat future electronic messages from the message source are not to becaptured.
 2. The system of claim 1, wherein the output interface furtherenables the intended recipient to indicate that future electronicmessages from the message source are to be blocked.
 3. The system ofclaim 2, further comprising instructions that cause the processingdevice to implement: a blocking component that captures and deletes thefuture electronic messages without presenting the future electronicmessages to the intended recipient.
 4. The system of claim 1, whereinthe output interface further enables the intended recipient to modifythe capture rule based on at least one of the captured electronicmessages.
 5. The system of claim 1, wherein the output interface isconfigured to inform the intended recipient of the captured electronicmessages according to the plurality of predetermined categories.
 6. Thesystem of claim 1, wherein the predetermined categories comprise acategory for captured electronic messages received from message sourcesknown to the intended recipient.
 7. The system of claim 1, wherein thepredetermined categories comprise a category for captured electronicmessages received from message sources not known to the intendedrecipient.
 8. The system of claim 1, wherein the predeterminedcategories comprise a category for captured electronic messages receivedfrom message sources trusted by the intended recipient.
 9. The system ofclaim 1, wherein the predetermined categories comprise a category forcaptured electronic messages received from message sources not trustedby the intended recipient.
 10. The system of claim 1, wherein thescreening component indicates that an electronic message qualifies forcapture if the message source of the electronic message does notcorrespond to a contact on a contact list of the intended recipient. 11.The system of claim 1, wherein the output interface further enables theintended recipient to delete at least one of the captured electronicmessages.
 12. The system of claim 1, wherein the output interfacefurther enables the intended recipient to ignore or block at least oneof the captured electronic messages.
 13. The system of claim 1, whereinthe output interface is configured to generate an unobtrusive audible orvisible cue when at least one of the qualifying electronic messages iscaptured.
 14. A tangible computer readable storage medium storing acomputer program, the computer program comprising: a receiving codesegment that causes a processor to receive electronic messages createdby or on behalf of one or more message sources for delivery to a user; ascreening code segment that causes a processor to identify, from amongelectronic messages intended for the user, qualifying electronicmessages that satisfy a capture rule, and to capture, as capturedelectronic messages, a plurality of the qualifying electronic messages;and an interface code segment that causes a processor to inform the userof the captured electronic messages and to enable the user to manage thecaptured electronic messages, the interface code segment comprising: aquery code segment that causes a processor to access information relatedto a message source of a captured electronic message; a managing codesegment that causes a processor to enable the user to delete, ignore orblock at least one of the captured electronic messages; and anorganization code segment that causes a processor to organize thecaptured electronic messages according to a plurality of predeterminedcategories.
 15. The computer readable storage medium of claim 14,wherein the predetermined categories include comprise a category forcaptured electronic messages of message sources trusted by the user. 16.The computer readable storage medium of claim 14, wherein thepredetermined categories include comprise a category for capturedelectronic messages of message sources not trusted by the user.
 17. Thecomputer readable storage medium of claim 14, further comprising alearning code segment that causes a processor to modify the capture rulebased on at least one of the captured electronic messages.
 18. Thecomputer readable storage medium of claim 17, wherein the learning codesegment further causes a processor to modify the capture rule based on asource of at least one of the captured electronic messages.
 19. Thecomputer readable storage medium of claim 14, further comprising acontacts code segment that causes a processor to access a contact listof the user, wherein the capture rule comprises a contacts parameterrequiring capture if at least one source of the electronic message doesnot correspond to a contact of the contact list.
 20. The computerreadable storage medium of claim 14, wherein the interface code segmentfurther comprises an alert code segment that causes a processor togenerate an unobtrusive audible or visible cue when at least one of thequalifying electronic messages is captured.
 21. A computer-implementedmethod comprising: receiving electronic messages created by or on behalfof one or more message sources for delivery to a user; identifying, fromamong the received electronic messages, qualifying electronic messagesthat satisfy a capture rule; capturing a plurality of the qualifyingelectronic messages; informing the user of the captured electronicmessages; enabling the user to organize the captured electronic messagesaccording to a plurality of predetermined categories; and enabling theuser to manage the captured electronic messages includes messages,comprising: enabling the user to access information related to a messagesource of one of the captured electronic messages.
 22. The method ofclaim 21, wherein enabling the user to manage the captured electronicmessages further comprises enabling the user to modify the capture rulebased on at least one of the captured electronic messages.
 23. Themethod of claim 21, wherein enabling the user to manage the capturedelectronic messages further comprises enabling the user to modify thecapture rule based on a source of at least one of the capturedelectronic messages.
 24. The method of claim 21, wherein identifyingqualifying electronic messages that satisfy the capture rule comprisesidentifying, as qualifying electronic messages, electronic messages inwhich at least one message source does not correspond to a designatedcontact of the user.
 25. The method of claim 21, wherein enabling theuser to manage the captured electronic messages further comprisesenabling the user to delete, ignore or block at least one of thecaptured electronic messages.