Mechanism for generating a composite email

ABSTRACT

A mechanism is disclosed for generating a composite email for an email conversation. The composite email includes content automatically extracted from a plurality of the emails in the email conversation, and may be generated in response to a user accessing just one of the emails in the email conversation. A mechanism is also disclosed for discovering and recovering lost emails in an email conversation. A mechanism is further disclosed for automatically moving emails from one container to another after an email has been read. These and other advantageous email generating, manipulation, and organization mechanisms are disclosed herein.

PRIORITY CLAIM

This application claims the benefit of U.S. Provisional Application Ser.No. 60/878,237, entitled “SYSTEM AND METHOD FOR AN EMAIL MANAGEMENTSYSTEM THAT REDUCES THE CLUTTER OF REPETITION OF EMAILS IN FOLDERS ASWELL AS IN EMAIL CONTENT, PROVIDES FEATURES THAT FACILITATECOLLABORATION BY EMAIL COMMUNICATION, AND PROVIDES FOR WAYS TO USE EMAILCONTENT IN MEANINGFUL WAYS”, filed on Jan. 3, 2007, by Rajkumar R.Madnani. The entire contents of the above-referenced application arehereby incorporated by reference.

BACKGROUND

Electronic mail (hereinafter “email”) has become one of the most widelyused communication tools in the world. Most people use email systems attheir workplace and at home, and with the increasing number of emailssent and received, the shortcomings of existing email systems arebecoming clear.

One drawback to existing email systems is that managing emails, newincoming and new outgoing, and their subsequent replies and forwards, isincreasingly difficult with the growing volumes of emails, and moreoften than not leads to cluttered inbox, sent, and deleted folders. Theinbox folder often becomes cluttered because emails, new incoming emailsas well as previously read emails, are stored in the inbox folder untila user manually moves the emails out of it. Emails get cluttered in thesent folder because new emails sent out by the user are stored in thesent folder, and replies and forwards sent by the user to others arealso stored in the sent folder.

Over time, the clutter keeps increasing, and it is quite common forusers to have hundreds of emails sitting in the inbox, sent mail, andother named folders. It takes considerable effort to move and keepmoving the emails into other named folders, to keep the clutter fromgrowing. As the emails are moved into named folders, the named foldersthemselves get cluttered with repetitive emails. The user is afraid todelete any email (in inbox, sent or named folders) for fear of losingsomething important, and because of time constraints is unlikely to siftthrough these emails in order to reduce their redundancy.

While each email does contain some new data in the form of the latestemail message, it likely contains a repetition of earlier emails as anappendix, which may be in the form of “quoted” text continuing after thenew message or in the form of a separate file attached to the email.When the number of participants in an email increases, the potential forclutter increases very rapidly and in direct proportion to the increasein number of participants. Some users may spend the time and effort tomove emails on a particular subject, or grouping, into specific namedfolders, reducing the amount of clutter in the inbox, sent and deletedfolders, but many or even most do not.

Another drawback to current email management approaches is thatidentifying, extracting and using data residing in emails can getextremely cumbersome because the data may be resident in conceivablytwenty, thirty, forty or more than a hundred emails on a particularsubject. These emails may also reside in different folders, such as theinbox, sent and other named folders, and possibly in the deleted foldertoo. It can become impenetrable, if the need for data tucked away invarious emails arises after several days when one's memory may not be assharp, or if data is contained in emails with several subject headings.Information on a particular topic cannot be easily collated from variousemails, and printing the various emails for a hard copy reference is avoluminous job with diminishing utility as the number of emails grows.

In general, current approaches provide two ways to meaningfully use thedata contained in multiple emails. One way is to highlight the requiredtext, a few words or several lines at a time, in an email that is openon the user's screen, and copy it into another document (word processingor email or other), and then to repeat this process over several emails.Another way is to create an exported output of the email into a file,instead of paper, and then use the output of the resulting file inanother document which may be a word processing document, or an email orsome other document, and then to repeat this process over severalemails.

Many email management systems provide search facilities to identify theemails that may contain specified words or phrases. The search resultidentifies the emails that satisfy the specified search criteria. Butonce the emails have been identified, either by manually going throughseveral emails, or by the quicker search routines, the problem ofextracting the data and using it from the several identified emailsremains. The problem can be partially addressed by going into eachemail, one at a time, and using one of the two ways described above,highlighting or using an export function to create an output file, toextract and use the data. As the number of emails increases, so does theeffort. These limitations, combined with the clutter of large numbers ofemails, make it extremely difficult to use the data from the emails in ameaningful manner.

Another drawback to current approaches is that data is repeated over andover in replies and forwards, both sent and received, using valuabledisk space. Additionally, particularly at the corporate or enterpriselevel, backups and historical records maintenance become more cumbersomeand costly. The extent of data repetitiveness in emails, and redundancydue to multiplicity of mostly identical emails, can be quite a seriousproblem in terms of how much storage space is used for periodic backupsas a security measure and for archiving, tasks which may be statutoryrequirements for many companies. If multiple copies of emails areeliminated or avoided in backups, it may be possible to reduce themanpower and memory requirements of email backups and archiving.

Another drawback to current approaches is that as users keep sending andreceiving emails, the subject of the emails evolves, but emails are sentusing the same subject heading. Sometimes a subject heading may bechanged to reflect a new evolved status of the old subject, but thecontent of old as well as new subjects may continue under the newsubject heading. In essence, the current system of emails allows asubject heading, but does not allow any organized way of enforcing thatsubject heading (i.e. limiting the discussion to that subject heading).

Current email management approaches have no organized way to managesubject headings as they evolve or change into subheadings. In one case,the subject heading does not change, but the content of emails may be onrevised but related subjects (evolution of the original subject), thusmaking data collection and analysis from emails even more difficult thanalready described. In another case, the subject heading changes toreflect an evolution from the original subject, but some email users maycontinue to send text based on the old subject but use the new subjectheadings, thus once again making it difficult to delete or organize theemails.

Another drawback to current approaches occurs when the subject itselfdoes not evolve, but there is simply a natural passage of time. Currentapproaches do not permit a systematic way to continue emails on an oldsubject after a period of absence of emails on the subject. If a userreceives an email on an old subject after a long break, the potentialfor the email containing one or more of the following is rather high:the sender may fail to append older emails exchanged on that topic (i.e.a new email instead of a reply/forward to an older email on thesubject), or fail to write the same subject in the subject line, orworse, send an appendix of other irrelevant emails while sending theemail on the subject. Currently, the user has to review the clutter ofemails in various folders to obtain a history of that subject. Thismakes it very difficult for the user to ascertain the context behind thenew message. Thus, the new message may be difficult to understand.

The approaches described in this section are approaches that could bepursued, but not necessarily approaches that have been previouslyconceived or pursued. Therefore, unless otherwise indicated, it shouldnot be assumed that any of the approaches described in this sectionqualify as prior art merely by virtue of their inclusion in thissection.

SUMMARY

In accordance with one embodiment of the present invention, there isprovided a mechanism for generating a composite email. As used herein,the term “composite email” refers to a set of information that includescontent automatically extracted from a plurality of individual emails.With this mechanism, it is possible for a user to view content frommultiple emails without having to manually open and extract content fromeach of those emails.

In one embodiment, when an initial email pertaining to a particulartopic or subject is sent to start an email conversation, a uniqueidentifier is associated with that email. All subsequent emails in thatemail conversation (e.g. responses to the initial email, response toresponses to the initial email, etc.) will also carry that uniqueidentifier. Thus, the unique identifier associates the various emailswith each other so that they can be treated as being part of the overallemail conversation.

In one embodiment, when any email in an email conversation is accessedby a user, the mechanism extracts the unique identifier from that email.The mechanism also extracts content from that email. Based at leastpartially upon the unique identifier, the mechanism accesses an emailconversation data structure that is associated with the emailconversation. This email conversation data structure containsinformation indicating which emails are part of the email conversation.The mechanism selectively accesses one or more of the emails that areindicated by the email conversation data structure as being part of theemail conversation, and extracts content from those one or more accessedemails. The mechanism then automatically generates or composes acomposite email. The mechanism includes in this composite email thecontent extracted from the email that is being accessed by the user andthe content extracted from the one or more accessed emails. Thiscomposite email may then be displayed to the user. By performing theprocessing discussed above, the mechanism enables the user to easilyview the contents from several or all of the emails in the emailconversation without having to manually search for each email, manuallyopen each email, and manually extract information from each email. Thus,viewing the contents of multiple emails in an email conversation is madequite simple. In one embodiment, none of the emails in the emailconversation contain repeated text that is copied from previous emailsin the email conversation (e.g. if an email is a reply to a previousemail, it does not contain a copy of the text in the previous email;rather, the reply includes just the new text entered by the sender ofthe reply); thus, none of the emails in the email conversation containredundant content. Because of this, the content that is extracted fromthe various emails and included in the composite email is inherentlynon-redundant.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention is illustrated by way of example, and not by wayof limitation, in the figures of the accompanying drawings and in whichlike reference numerals refer to similar elements and in which:

FIGS. 1A and 1B show sample systems in which one embodiment of thepresent invention may be implemented.

FIG. 2 shows a sample user interface that is provided by one embodimentof the present invention to enable a user to create an initial email ofan email conversation.

FIG. 3 shows a sample user interface provided by one embodiment of thepresent invention in which a composite email may be displayed.

FIG. 4 shows a sample email conversation data structure that is used, inaccordance with one embodiment of the present invention, to maintaininformation indicating which emails are part of an email conversation.

FIG. 5 shows a sample display of containers that a user may see when auser accesses his/her email account, wherein the containers may be usedto store various emails in the email account.

FIG. 6 how reminders associated with emails may be presented to a userin accordance with one embodiment of the present invention.

FIG. 7 is a block diagram of a general purpose computer system in whichone embodiment of the present invention may be implemented.

DETAILED DESCRIPTION OF EMBODIMENT(S)

In the following description, for the purposes of explanation, numerousspecific details are set forth in order to provide a thoroughunderstanding of the present invention. It will be apparent, however,that the present invention may be practiced without these specificdetails. In other instances, well-known structures and devices are shownin block diagram form in order to avoid unnecessarily obscuring thepresent invention.

Overview

One embodiment of the present invention enables email to be used toemulate a conversation or meeting. To start the conversation or meeting(hereinafter, just conversation for the sake of brevity), a user sendsan initial email to a set of participants. This initial email sets fortha particular topic for discussion. Thereafter, the participants mayprovide input on the topic by sending response emails, with eachresponse email containing a set of new content. Current email systemsare capable of providing what has been described thus far. What they aremissing, however, is the ability to relate the various emails in such away that they resemble a coherent conversation. Currently, email systemstreat each email as a separate entity, indicating by a “RE” or a “FWD”preceding the subject that the email is a reply or a forwarded email,and there is no way to automatically relate one email to another. Thus,in order to see all of the response to the initial email, a user has tofind each of the response emails, and open each to view the contentcontained therein. In many instances, there is redundant information inthe response (e.g. a reply may have the content from previous repliesappended to it); thus, the user has to further sift through the responseto find the new content.

To make the overall exchange of information more resemble aconversation, an embodiment of the present invention introduces theconcept of a “composite email”. As used herein, the term composite emailrefers to a set of information that includes content automaticallyextracted from a plurality of individual emails. In the context of anemail conversation, a composite email would include content extractedfrom multiple emails in the email conversation. Thus, a composite emailmay be analogized to a transcript of the email conversation. With such atranscript, it is easy for a user to see what has transpired thus far inthe conversation. In one embodiment, a composite email is automaticallygenerated whenever any one of the emails in an email conversation isaccessed by a user.

In one embodiment, to make it possible for all of the emails pertainingto an email conversation to be related to one another, a uniqueidentifier is associated with all of the emails. Specifically, in oneembodiment, when an initial email is sent by a user (this email is theone that sets forth the particular topic to be discussed in the emailconversation, and this user is referred to as the administrator of theemail conversation), a unique identifier is generated and associatedwith the initial email. This unique identifier may be viewed as aconversation identifier for identifying the email conversation that isbeing started. All subsequent emails in the email conversation (e.g.responses to the initial email, responses to the responses to theinitial email, etc.) will also carry that unique identifier.Effectively, the unique identifier relates all of the various emails sothat they can be associated with each other. In a sense, the uniqueidentifier ties the various emails together so that they can be treatedas being part of the same email conversation.

In one embodiment, the unique identifier comprises a code generated fromthe administrator's user identification, such as his/her email address,a date and time code, and a sequential counter. The sequential countermay be a counter that keeps track of the number of initial emails thathave been sent by this administrator. For example, if the administratorhas started six email conversations, and hence, has sent six initialemails, then the sequential counter for the administrator would be six.This means that the next initial email sent by the administrator wouldhave a sequential counter value of seven. In addition, the uniqueidentifier may further comprise a special designation (e.g. UID) toindicate that it is a unique identifier. This is just one way ofgenerating the unique identifier. Many other methodologies may be used.For purposes of the present invention, the unique identifier may begenerated using any desired methodology and any type of information. Solong as the identifier is unique, it may be used as the uniqueidentifier for an email conversation.

In one embodiment, when any email in an email conversation is accessedby a user, the unique identifier for the email conversation is extractedfrom that email, and content contained in that email is also extracted.Based at least partially upon the unique identifier, an emailconversation data structure that is associated with the emailconversation is accessed. This email conversation data structurecontains information indicating which emails are part of the emailconversation. One or more of the emails that are indicated by the emailconversation data structure as being part of the email conversation areaccessed, and the contents of those one or more accessed emails areextracted. A composite email is then automatically generated orcomposed. Included in this composite email are the contents extractedfrom the email that is being accessed by the user and the contentsextracted from the one or more accessed emails. This composite email maythen be displayed to the user. By presenting the composite email to theuser, it is possible for the user to view, in a single display, thecontents from several or all of the emails in the email conversationwithout having to manually search for each email, manually open eachemail, and manually extract information from each email. In oneembodiment, none of the emails in the email conversation containrepeated text that is copied from previous emails in the emailconversation (e.g. if an email is a reply to a previous email, it doesnot contain a copy of the text in the previous email; rather, the replyincludes just the new text entered by the sender of the reply); thus,none of the emails in the email conversation contain redundant content.Because of this, the content that is extracted from the various emailsand included in the composite email is inherently non-redundant.

In addition to being used to generate a composite email, the uniqueidentifier may also be used to organize the emails into containers,thereby making emails easier to find. The unique identifier may also beused to enable other advantageous functionalities to be realized. Theseand other functionalities will be described in detail in later sections.

A mechanism for realizing the functionalities described herein may takeon various forms. In one embodiment, the mechanism takes the form of anenhanced email program (EEP) that is executed on one or more clientcomputers in an overall email system. An example of such a system isshown in FIG. 1A, wherein the system comprises a plurality of clientcomputers 102 coupled to an email server 108 via a network 106. One ormore of the client computers 102 has an EEP 104 executing thereon. Inthis embodiment, the EEP 104 on each client computer 102 would implementthe functionalities described herein. The email server 108 would simplyact as the conduit for transporting emails from one client computer 102to another. In the system of FIG. 1A, the EEP's 104 would send emailsthat conform to standard email protocols; thus, even though they havecomposite email capability, the EEP's 104 can interact with any emailserver 108 that implements standard email protocols.

In an alternative embodiment, such as that shown in FIG. 1B, themechanism may take the form of an EEP 114 that is executed on a server118. The server 118 may, for example, be a web application server andthe EEP 114 may be a web application hosted on that server 118 that iscapable of servicing requests from a plurality of client computers 102.To interact with the server 118, each client computer 102 may execute aprogram such as a browser 110. In this embodiment, the EEP 114 wouldimplement most of the functionalities described herein. The clientcomputers 102 would mainly be responsible for providing a user interface(UI) to users to enable the users to send commands to the EEP 114, andto enable the users to view the content (e.g. the composite email)generated by the EEP 114.

As a variation of the embodiment shown in FIG. 1B, some of thefunctionalities described herein might not be implemented by the EEP 114but rather by code executed on the client computers 102. For example,the server 118 may download one or more applets to the client computers102, and those applets, when executed on the client computers 102, mayimplement some of the functionalities described herein. Alternatively,the browser 110 may have one or more plugins that, when executed, mayimplement some of the functionalities described herein.

As a further alternative, each client computer 102 may have a clientprogram (not shown) resident thereon that is designed to interact withthe EEP 114 to implement the functionalities described herein (aclient-server architecture). The EEP 114 may implement some of thefunctionalities while the resident program may implement the otherfunctionalities.

Overall, the functionalities described herein may be fully implementedby an EEP 104 executing on a client computer 102, fully implemented byan EEP 114 executing on a server 118, or fully implemented by acombination of an EEP 114 executing on a server and code executing on aclient computer, (where each (server and client) implements a subset ofthe functionalities). All such implementations are within the scope ofthe present invention.

In the following discussions, the implementation shown in FIG. 1A willbe assumed (where the functionalities described herein are implementedby the EEP 104 executed on a client computer 102). However, it should benoted that this is done for simplicity and illustrative purposes only.The invention is not so limited. Given the teachings providedhereinafter, one of ordinary skill in the art can implement theinvention in any/all of the arrangements described above with referenceto FIGS. 1A and 1B.

Composite Email Description

A composite email may be thought of as a conglomeration of a pluralityof individual emails. It is dynamically generated or composed when anyone of the emails in an email conversation is accessed/opened. Whengenerated, the composite email includes content/informationautomatically extracted from one or more of the individual emails in theemail conversation. In one embodiment, a composite email is made up of aplurality of parts. These parts include a header portion, one or moretext portions, a recipient list portion, a subject subheading portion,and an attachments portion.

The header portion is the part of a composite email that containsgeneral information about the email conversation. In one embodiment, theheader portion includes information indicating which participant startedthe email conversation and hence, is the administrator of the emailconversation. This information may include, for example, an emailaddress for the administrator, a user ID, etc. The header portion mayalso include a date and time at which the email conversation was started(e.g. date and time when an initial email for the email conversation wassent). The header portion may further include a subject for the emailconversation. This subject sets forth the overall topic to be discussedin the email conversation. In one embodiment, once set, the informationin the header portion cannot be changed.

The text portion is the part of a composite email that contains the textfrom a particular individual email. If an email conversation comprises aplurality of individual emails, then a composite email may have multipletext portions. For example, if an email conversation includes fiveindividual emails, then the composite email for that email conversationmay have five text portions, with each text portion showing the textfrom a corresponding one of the five individual emails.

The recipient list portion is the part of a composite email that setsforth the participants that are participating in the email conversation.In addition to listing the identifiers (e.g. email addresses) for theparticipants, the recipient list portion, in one embodiment, may alsoinclude other information, such as the authorities that have been givento each participant. For example, some participants may be granted theauthority to send replies while others are only given the authority toview emails in the email conversation, some participants may be giventhe authority to add/amend subject subheadings, some participants may begranted the authority to be a co-administrator to enable those personsto perform some administrative tasks with regard to the emailconversation, etc. In one embodiment, the administrator of an emailconversation (i.e. the participant who sends out the initial email thatstarts the email conversation) is the person who sets these authorities.The recipient list and the authorities specified therein may be changedby the administrator and perhaps a co-administrator at a later time.Thus, the recipient list may evolve and change as the email conversationprogresses.

The subject subheading (hereinafter, subheading for simplicity) portionis the part of a composite email that sets forth zero or moresubheadings for an email conversation. As used herein, the termsubheading refers to a sub topic under the general overall subject ortopic of an email conversation. For example, if the general subject ofthe email conversation is “annual sales conference”, then a subheadingmay be “examine and compare city, hotel costs”, and another subheadingmay be “prepare conference agenda”. A subheading allows the discussionof the email conversation to be focused. An email conversation, as itprogresses, may have multiple subheadings. As one subheading is fullydiscussed, another subheading may be added. For example, using the abovesubheadings, once a city and hotel have been selected, the emailconversation can proceed to preparing a conference agenda. In oneembodiment, multiple subheadings (e.g. all of the subheadings that haveever been added to the email conversation) may be included in acomposite email. A subheading is optional, and can be added by aparticipant having the proper authority.

The attachments portion is the part of a composite email that sets forththe files that are attached to the email conversation. An emailconversation may have zero or more attachments, and additionalattachments may be added as the email conversation progresses.

In one embodiment, each of these parts of a composite email has theunique identifier of the email conversation associated therewith. Thisenables the various parts to be associated with the email conversation.This is noteworthy because, in one embodiment, each of these parts istreated separately, and is sent as a separate email. To illustrate thispoint, reference will be made to the following example.

Suppose that a participant starts an email conversation by preparing aninitial email. Suppose that the participant (who is the administratorfor this email conversation) includes in this initial email: (1) headerinformation for the email conversation; (2) a text message; (3) arecipient list setting forth the participants for the emailconversation; (4) a subheading specifying a first subtopic to bediscussed; and (5) an attachment that includes one file. This initialemail would also include a unique identifier. In one embodiment, whenthis initial email is sent out to the participants, it is actually sentout as five separate emails, with one email containing the headerinformation, another email containing the text message, another emailcontaining the recipient list, another email containing the firstsubheading, and another email containing the attachment. Each of theseemails would have the unique identifier associated therewith. When oneof the participants receives this initial email, that participant wouldactually receive five separate emails. When that participant opens anyone of the five emails, all five of the emails are opened, and acomposite email is generated. This composite email would include aheader portion containing the header information for the emailconversation, a text portion containing the text message from theadministrator, a recipient list portion containing the recipient list, asubheading portion containing the subheading, and an attachments portioncontaining the attached file (or some information pertaining to theattached file). Thus, the composite email comprises informationextracted from each of these individual emails.

In one embodiment, when a participant replies to an email in the emailconversation, one or more emails may be sent, depending on what wasadded/changed by that participant. For example, suppose that aparticipant does not make any changes to the recipient list, does notadd a subheading, and does not add any attachments, but rather simplytypes in a new text message. In such a case, only one text emailcontaining the new text message would be sent to the other participantsin the email conversation (this text email would have the uniqueidentifier associated therewith). Since none of the other parts wereupdated, there is no need to send any other emails. When anotherparticipant (e.g. the administrator) opens this new text email, acomposite email is generated. This composite email would include all ofthe information in the initial email (e.g. header information for theemail conversation, administrator's text message, recipient list,subheading, and attachment). In addition, it would include an additionaltext portion, which would contain the text of the new email.

Suppose now that a participant adds another subheading to the emailconversation (assuming that that participant has the authority to do so)and a new attachment. In such a case, another subheading email andanother attachment email would be sent out to the participants of theemail conversation (both of these emails would have the uniqueidentifier associated therewith). When another participant (e.g. theadministrator) opens either of these emails, a composite email isgenerated. This composite email would include all of the informationsent thus far (e.g. header information for the email conversation,administrator's text message, new text message, recipient list,subheading, and attachment). In addition, it would include an additionalsubheading, which would contain the text of the new subheading, and thenew attachment. In one embodiment, a composite email includes all of thesubheadings and all of the attachments that have been added to an emailconversation thus far.

Suppose further that a participant (e.g. the administrator) alters therecipient list to add a participant, remove a participant, change theauthorities given to one or more participants, etc. In such a case,another recipient list email would be sent out (this email would havethe unique identifier associated therewith). When another participantopens this new recipient list email, a composite email is generated.This composite email would include most of the information sent thus far(e.g. header information for the email conversation, administrator'stext message, new text message, two subheadings, and two attachments).However, instead of the initial recipient list, the composite emailwould include the new recipient list. In one embodiment, only the mostrecent recipient list is included in a composite email.

As described above, in one embodiment, each of the parts of a compositeemail is handled separately, and each is augmented/updated via separateemails (exception: in one embodiment, the header portion cannot beaugmented or updated). Each of these emails carries the uniqueidentifier of the email conversation to enable them to be associatedwith the email conversation. In one embodiment, in addition to carryingthe unique identifier, each email (other than the header email) alsocarries a sub-identifier. The sub-identifier contains information thatcan be used to uniquely identify each individual email, to distinguishthe different types of emails (text, recipient list, subheading,attachment), as well as to provide other useful information.

In one embodiment, a text sub-identifier is included with each textemail. In one embodiment, a text sub-identifier comprises an emailidentifier (e.g. an email address or user ID) for the participant whocreated and sent that text email, a date and time code, and a sequentialcounter. In the context of this sub-identifier, the sequential counterindicates how many text emails have been sent by this participant inthis email conversation. Thus, if this participant has created and senttwo text emails in this email conversation, then the sequential countervalue for the first text email would be one, and the sequential countervalue for the second text email would be two. The next text email sentby this participant would have a sequential counter value of three. Inone embodiment, this sequential counter is maintained separately foreach participant. Thus, if another participant has created and sent twotext emails in this email conversation, then the sequential countervalue for the first text email sent by that participant would be one,and the sequential counter value for the second text email would be two.The above discussion sets forth just one possible method for generatinga text sub-identifier. Other methods may be used if so desired. All suchmethods are within the scope of the present invention.

In one embodiment, a recipient list sub-identifier is included with eachrecipient list email. In one embodiment, a recipient list sub-identifiercomprises a text string (e.g. “recipientlist”) indicating that thesub-identifier is a recipient list sub-identifier. The sub-identifiermay further include an email identifier (e.g. an email address or userID) for the participant (presumably the administrator or aco-administrator) who created/updated the recipient list that iscontained in the recipient list email. The sub-identifier may furtherinclude a date and time code and a sequential counter. In the context ofthis sub-identifier, the sequential counter indicates how many recipientlist emails have been sent by this participant in this emailconversation. Thus, if this participant has created and sent tworecipient list emails in this email conversation, then the sequentialcounter value for the first recipient list email would be one, and thesequential counter value for the second recipient list email would betwo. In one embodiment, this sequential counter is maintained separatelyfor each participant. Thus, if another participant has created and senttwo recipient list emails in this email conversation, then thesequential counter value for the first recipient list email sent by thatparticipant would be one, and the sequential counter value for thesecond recipient list email would be two. The above discussion setsforth just one possible method for generating a recipient listsub-identifier. Other methods may be used if so desired. All suchmethods are within the scope of the present invention.

In one embodiment, a subheading sub-identifier is included with eachsubheading email. In one embodiment, a subheading sub-identifiercomprises a text string (e.g. “subheading”) indicating that thesub-identifier is a subheading sub-identifier. The sub-identifier mayfurther include an email identifier (e.g. an email address or user ID)for the participant who is adding/updating the subheading that iscontained in the subheading email. The sub-identifier may furtherinclude a date and time code and a sequential counter. In the context ofthis sub-identifier, the sequential counter indicates how manysubheading emails have been sent by this participant in this emailconversation. Thus, if this participant has created and sent twosubheading emails in this email conversation, then the sequentialcounter value for the first subheading email would be one, and thesequential counter value for the second subheading email would be two.In one embodiment, this sequential counter is maintained separately foreach participant. Thus, if another participant has created and sent twosubheading emails in this email conversation, then the sequentialcounter value for the first subheading email sent by that participantwould be one, and the sequential counter value for the second subheadingemail would be two. The above discussion sets forth just one possiblemethod for generating a subheading sub-identifier. Other methods may beused if so desired. All such methods are within the scope of the presentinvention.

In one embodiment, an attachment sub-identifier is included with eachattachment email. In one embodiment, an attachment sub-identifiercomprises a text string (e.g. “attachment”) indicating that thesub-identifier is an attachment sub-identifier. The sub-identifier mayfurther include an email identifier (e.g. an email address or user ID)for the participant who is adding the attachment that is contained inthe attachment email. The sub-identifier may further include a date andtime code and a sequential counter. In the context of thissub-identifier, the sequential counter indicates how many attachmentemails have been sent by this participant in this email conversation.Thus, if this participant has created and sent two attachment emails inthis email conversation, then the sequential counter value for the firstattachment email would be one, and the sequential counter value for thesecond attachment email would be two. In one embodiment, this sequentialcounter is maintained separately for each participant. Thus, if anotherparticipant has created and sent two attachment emails in this emailconversation, then the sequential counter value for the first attachmentemail sent by that participant would be one, and the sequential countervalue for the second attachment email would be two. The above discussionsets forth just one possible method for generating an attachmentsub-identifier. Other methods may be used if so desired. All suchmethods are within the scope of the present invention.

As will be described in greater detail in a later section, thesequential counter values in the various sub-identifiers may be used todetermine whether one or more emails in an email conversation have beenlost. For example, if the text sub-identifiers for several text emailssent by the same participant indicate that only text emails havingsequence numbers one and three were received, then it is known that thetext email sent by that participant having the sequence number two waslost. As will be described in greater detail in a later section, once anemail is discovered to have been lost, it can be resent. Thus, lostemails in an email conversation can be recovered.

In the embodiment described above, each sub-identifier includes anindication of an email type (for example, the subheading sub-identifiercomprises the text string “subheading”, the recipient listsub-identifier comprises the text string “recipientlist”, etc.). Theabsence of any text string in the text sub-identifier implies that it isa text type of email. The sub-identifier also includes a sequentialcounter value that indicates how many emails of that type have been sentby this participant in this email conversation. These two sets ofinformation are useful in an embodiment where there are different typesof emails, as in the embodiment described above. In another embodiment,there may be only one type of email that is exchanged in an emailconversation (e.g. the different parts of a composite email may not beseparated out into separate emails but rather may be consolidated in asingle email). In an embodiment where there is only one type of email,the sub-identifier need not include an indication of email type.Instead, the sub-identifier for an email may comprise just an emailidentifier (e.g. an email address or user ID) for the participant whosent the email, a date and time code, and a sequential counter. In thisembodiment, the sequential counter would indicate how many emails havebeen sent by this participant in this email conversation (the sequentialcounter would no longer reflect how many emails of a particular typehave been sent by this participant in this email conversation). This andother embodiments are within the scope of the present invention.

Administrator and Participant Authority

The participant who creates the initial email in an email conversationis the administrator of that email conversation. As an administrator,this person has certain default powers related to the emailconversation, examples being:

1. Ability to generate and modify the subject subheadings;

2. Ability to change any of the authorities or restrictions set for aparticipant;

3. Ability to add or remove a participant;

4. Ability to re-send an email, or part of it, using the automaticre-send function (described more fully herein as an automated sidemail), or re-send an attachment to a participant who may not havereceived it or may have difficulty opening an attachment;5. Ability to partially archive the email conversation for allparticipants, described more fully herein;6. Ability to set limits on data entry; for example, setting limits onthe entry of text or on parameters of the text (such as number of words,characters or lines) permitted in certain areas such as the subjectsubheading portion and the text message area;7. Ability to create fields within which recipients may enter data andsend the fields out as replies, which can then be used to create adatabase for data processing and reporting;8. Ability to receive data back from every participant, recording thedate and time the email was opened, and the date and time the email wasreplied. The data may also indicate other status items, such as: emailnot opened and email not replied to. This returned information can beused to prepare a set of status reports, including when the recipientsopened their emails and when they sent replies out. These status reportscan be viewed in a display on screen, printed, emailed, and exported asan output file in a format used by other software, and are describedmore fully herein.9. Ability to allow or disallow the sending of an attachment;10. Ability to allow or disallow private side mails, described morefully herein, to be sent to any participant. According to an embodiment,automated side mails used for replacing individual emails, subheadings,or attachments not received by a recipient are always permitted;11. Ability to restrict the reply function to permit replies only toselected users, such as the administrator and certain co-administrators.

In general, the purpose of establishing an administrator with designatedpowers over a particular email conversation mimics the duties, tasks,responsibilities and powers of a person chairing a meeting. In ameeting, it is the chairperson's responsibility to allow a free flow ofideas and views in an orderly manner, keeping to the agenda and subjecton hand, and preventing chaos. Thus, the administrator of an emailconversation sets an agenda, provides a focus to the discussion bymodifying the subheading being discussed, prevents others fromparticipating if their participation is uncalled for, and harnesses theexchange of views and attachments so that the purpose and agenda areachieved. This allows the administrator to provide a general directionand focus to the exchange of emails. The administrator may share some ofthe administrator functions and responsibilities with any of therecipients by designating them as co-administrators.

In general, the administrator of an email conversation may grant orrestrict any authority to any of the participants of the emailconversation. In one embodiment, however, certain administrator powersmay not be delegated. For example, only the administrator may be able tonominate or designate a participant as a co-administrator, who in turnwould not be allowed to nominate another co-administrator or removehimself from being a co-administrator. As another example, while aco-administrator is permitted to partially archive an emailconversation, only an administrator can close an email conversation byfully archiving it, as described more fully herein.

Sample User Interface for Creating an Initial Email

FIG. 2 is a block diagram that illustrates a sample user interfaceprovided by an EEP 104 (FIG. 1A) for enabling an administrator to createan initial email to start an email conversation. FIG. 2 shows fiveunpopulated panes 202-210. Pane 202 is provided to accommodate headerinformation for the initial email and the email conversation overall. Inthe pane 202 illustrated in FIG. 2, the “FROM” field 212 contains theadministrator's email identification (e.g. email address), which in oneembodiment is generated and entered automatically. Pane 202 alsocomprises a “MAIN SUBJECT” field 214 in which the administrator mayspecify an overall main topic of discussion for the email conversation.Pane 202 may further comprise a “DATE & TIME SENT” field 216 reflectingthe date and time the initial email is sent out. This information may beentered automatically at the time the initial email is sent.

Pane 204 is provided to enable the administrator to optionally enter asubject subheading for the email conversation. When a subheading isentered, it generally indicates a sub topic to be discussed by the emailparticipants and provides a focus to the emails. In an example, a mainsubject for a group of friends planning a vacation may be: “Our Summer07 Vacation,” and subheadings may be more focused, as in: “Get DatesConfirmed,” “Where to Go,” and “Making Resort Bookings.” After thevacation, example subheadings may be: “Sharing Pictures,” “Ideas forNext Year,” and so on. All the email participants get to exchange theirviews on the subheading that is current, providing a focus to theemails, thus, making collaboration and decision making an easierprocess.

Pane 206 is provided to enable the administrator to enter a recipientlist for the email conversation. This list sets forth theparticipants/recipients who will be participating in the emailconversation. Identifiers in the “TO:”, “CC:”, and “BCC:” sections maybe entered by the administrator. For this purpose, the administrator mayhave access to address books or similar features. Lists comprisingseveral identifiers may also be used. For each identifier entered in therecipient list, the administrator may assign zero or more authorities.Some of the available authorities include but are certainly not limitedto: ability to act as a co-administrator, ability to establish/sendsubheadings, attachments, text emails, etc., ability to send side mails(side mails will be described in a later section), ability to update therecipient list, etc. The administrator may do so, for example, by usinga module that becomes available as soon as the recipient's name or emailidentification is entered or selected. This may be in the form of apop-up GUI element or similar display element. The administrator mayselect from predetermined choices for one or more recipients, such asmaking a recipient a co-administrator, apply a preconfigured defaultsetting to a recipient, or use a previously-applied setting for arecipient. If the administrator selects a recipient as aco-administrator, the administrator may select certain authorities foreach co-administrator.

In one embodiment, default configurations may be stored and applied foreach recipient in a particular list, such as each recipient in the “To:”list, each recipient in the “CC:” list, each recipient in the “BCC:”list, along with any other participant-designated list that may beavailable. The administrator may override one or more of the settingsfor any of the recipients. In one embodiment, if the administrator savescertain settings for a particular recipient, then any time the samerecipient appears in the administrator's recipient list for a futureemail conversation, the participant is offered the choice of acceptingthe previously saved settings. For example, the administrator may haveto send emails to the president of his company on a frequent basis. Thepresident may be listed in the “To:” listing or simply “CC'ed:” onemails. The administrator always wants the president to have fullco-administrator privileges for all emails, so this configuration isstored and associated with the company president's identification codeor email address so that all future email conversations on which thecompany president is a recipient will designate the company president asa co-administrator without the administrator having to perform thedesignation manually each time. The administrator may accept previouslysaved settings, or make changes to them if desired, with the option ofmaking the changes applicable to the participant thereafter, or makingthe changes applicable only for the email being formulated. If theadministrator does not wish to use default authority settings, he mayspecify custom authorities for each participant. Overall, theadministrator has great freedom in determining what authorities to giveto each participant.

Pane 208 is provided to enable the administrator to enter a textmessage. This text message will be the one that is sent to all of theparticipants of the email conversation to start the conversation.Finally, pane 210 is provided to allow the administrator to add one ormore file attachments to the initial email.

Using the user interface shown in FIG. 2, the administrator can createand define an initial email. When the initial email is completed, theadministrator sends it out by selecting a send command (notillustrated). As noted previously, in one embodiment, when the initialemail is sent to the participants of the email conversation, a pluralityof separate emails are sent. These separate emails may include a headeremail, a text email, a recipient list email, a subheading email, and anattachment email (note: if no subheading is specified by theadministrator, then no subheading email will be sent; likewise, if noattachments are included, then no attachment email will be sent). All ofthese emails will carry a unique identifier that identifies the emailconversation (this unique identifier may be generated by the EEP 104 inthe manner previously described). They also will carry a correspondingsub-identifier (e.g. a text email will carry a text sub-identifier, arecipient list email will carry a recipient list sub-identifier, asubheading email will carry a subheading sub-identifier, and anattachment email will carry an attachment sub-identifier). Thesesub-identifiers may be generated by the EEP 104 in the manner previouslydescribed. When these emails are received by a participant who is in anenvironment with composite email (EEP 104) capability, and when one ofthe emails is opened, all of the emails having the unique identifier areopened, information is extracted therefrom, and a composite email isgenerated. The composite email will show all of the information (e.g.header information for the email conversation, text, recipient list,subheading (if any), and attachment(s) (if any)) set forth in theinitial email.

Sample Composite Email Display

FIG. 3 shows a sample user interface provided by an EEP 104 in which acomposite email may be displayed. In this example, the composite emailis generated by extracting content from a plurality of individual emailsthat are part of an ongoing and fairly mature email conversation. Thecomposite email is generated when any one of the individual emails inthe email conversation is opened.

In FIG. 3, the header pane 302 contains the header information for theemail conversation, which may include the email address of theadministrator of the email conversation, the main subject for discussionas specified by the administrator, and the date and time the initialemail was sent. In this example, the administrator is Rhonda.

The example subject subheading pane 304 illustrated in FIG. 3 containsthree subheadings. This means that three subheading emails have beensent thus far in this email conversation. On November 1, Rhonda theadministrator submitted a subheading entitled “Examine & Compare: City,Hotel, Costs (Chris to Finalize by Nov. 15).” On November 15, Rhondasubmitted a second subheading entitled “Prepare Conference Agenda, andSpouse Activities (Mary, tentative by 11/30).” On November 29, aparticipant named Mary submitted a subheading entitled “ReviewPreliminary Agenda, and Prelim Spouse Activity List (See Attach 2).” Thesubheadings in the subheading pane 304 may have been edited by aparticipant with sufficient authority; for example, the parenthetical atthe end of the November 15 subheading (“Mary, tentative by 11/30”) mayhave been added after emails were exchanged, between November 1 andNovember 15, wherein Mary tentatively agreed to take the describedaction by November 30. By adding new subheadings and editing subheadingsin this manner, the email conversation may be focused and summarized.

The example recipient pane 306 illustrated in FIG. 3 contains threegroups of recipients: “To:,” “CC:,” and “BCC:.” This pane 306 shows thecurrent participants in the email conversation, including any changesthat have been made to the recipient list. In one embodiment, only themost current recipient list is shown in a composite email.

The example text message pane 308 illustrated in FIG. 3 comprisesnumerous text portions showing text extracted from various text emailsin the email conversation. In the text message pane 308, the text emailsare displayed one after the other. This makes it quite easy for aparticipant to see what has transpired thus far in the emailconversation.

Finally, the example attachments pane 310 shows the attachments thathave been attached to the email conversation. The attachments includeall of the attachments that have been attached to the email conversationup until this point. In this example, there are three attachments, eachsent at a different time. Thus, it appears that three attachment emailshave been sent thus far in this email conversation. In one embodiment,an attachment may not be overwritten by a subsequent attachment. Oneapproach to facilitating this is to require that all attachments havedifferent filenames. These filenames may be displayed or hidden. In thecase of hiding the attachment names, a description may be provided bythe participant that originally attaches the file. In the exampleillustrated in FIG. 3, the first and second attachments are differentversions of the same file. This is demonstrated by the descriptive textaccompanying the attachment. There are two “File 1: Location Info”attachments, but the first designates it as “Prepared 11/15” while thesecond designates it as “Revised 11/16.”

When a participant is viewing a composite email, the participant can (ifgiven the proper authorities) perform a number of operations to furtherthe email conversation. For example, the text message pane 306 has auser entry section that allows the participant to type in the text of anew text email. The participant can use this section to add new text torespond to a previous text email, or to add new content to the emailconversation. Similarly, the subheading pane 304 has a user entrysection that allows a new subheading to be entered. Using this section,a participant can add a new sub topic for discussion within the contextof the overall subject of the email conversation. Also, the recipientlist pane 206 has a user entry section under each of the “TO:”, “CC:”,and “BCC:” lists. The participant can use these sections to addparticipants to the email conversation. The participant may also removeparticipants from the email conversation, or change the authoritiesgiven to one or more of the participants in the recipient list.Furthermore, the attachments pane 210 provides controls (not shown) forenabling the participant to manage attachments. With these controls, theparticipant can add one or more attachments to the email conversation.

After the participant performs one or more of the above operations, theparticipant can invoke the send function of the EEP 104. When the sendfunction is invoked, one or more emails will be sent out to all of theparticipants of the email conversation (in one embodiment, the defaultis to send each email to all of the participants in the emailconversation; the exception is a side mail, which is sent to onlyselected participants; side mails will be discussed in a later section).The number of emails that are sent will depend on what was added by theparticipant. For example, if the participant added a subheading and aset of text, then two emails will be sent. One email (a subheadingemail) will contain the new subheading, and the other email (a textemail) will contain the new text. If, on the other hand, the participantchanged the recipient list, added a new subheading, added a new set oftext, and added a new attachment, then four emails will be sent out.Each email that is sent will carry the unique identifier of the emailconversation. In addition, in one embodiment, each email will also carrya sub-identifier. Specifically, a text email will carry a textsub-identifier, a recipient list email will carry a recipient listsub-identifier, a subheading email will carry a subheadingsub-identifier, and an attachment email will carry an attachmentsub-identifier. These sub-identifiers may be generated by the EEP 104 inthe manner described previously. Each email will also contain some newcontent. For example, the text email will contain the new text enteredby the participant. Likewise, the subheading email will contain the newsubheading added by the participant. In one embodiment, the contentcontained in these emails is non redundant. That is, they contain onlythe new content added by the participant and do not include content fromprevious emails.

As noted previously, a participant is allowed to perform certainoperations only if that participant has been given the properauthorities. In one embodiment, to determine the authorities that havebeen given to a particular participant, the EEP 104 accesses the mostrecent recipient email in the mail conversation, and extracts theauthority information therefrom. Depending on the authorities that havebeen given to a particular participant, the EEP 104 may adjust one ormore user interface components when displaying a composite email. Forexample, suppose that the EEP 104 is displaying a composite email to aparticular participant. Suppose further that, after checking theauthority information in the most recent recipient list email, the EEP104 discovers that this participant has authority to send emails andattachments, but does not have authority to add subheadings or to changethe recipient list. In response to this finding, the EEP may gray outthe user entry sections of the subheading pane 304 and the recipientlist pane 306 (to indicate that these sections cannot be used). The EEP104 may also disable some controls to not allow the participant toperform operations for which the participant does not have authority. Inthis and other ways, the EEP 104 is able to enforce the authorityrestrictions imposed by the administrator (and perhaps,co-administrator(s)) of an email conversation.

Email Conversation Data Structure

In one embodiment, an EEP 104 maintains an email conversation datastructure for each email conversation. This data structure enables theindividual emails in an email conversation to be easily identified, andenables a composite email for the email conversation to be easily andefficiently generated. In one embodiment, a separate email conversationdata structure is maintained for each participant in an emailconversation. For example, suppose that a first participant is usingclient computer 102(1) (FIG. 1A) to participate in an email conversation(put another way, the first participant has an email account that ismanaged using the EEP 104 on client computer 102(1)). Suppose furtherthat a second participant is using client computer 102(n) to participatein the same email conversation (i.e. the second participant has an emailaccount that is managed using the EEP 104 on client computer 102(n)). Insuch a case, the EEP 104 on client computer 102(1) maintains an emailconversation data structure for the email conversation for the firstparticipant, while the EEP 104 on client computer 102(n) maintains aseparate email conversation data structure for the same emailconversation for the second participant. In large part, the two emailconversation data structures will contain the same data since theypertain to the same email conversation. However, each data structure cancontain a significant amount of information that is specific to theparticipant for which that data structure is maintained.

FIG. 4 shows a sample email conversation data structure in accordancewith one embodiment of the present invention. The data structure of FIG.4 corresponds to the email conversation for which a composite email isshown in FIG. 3. It will be assumed for the sake of example that thisemail conversation data structure is maintained by an EEP 104 for theparticipant named Mary. In the following discussion, a hierarchical datastructure will be described. However, it should be noted that this isdone for illustrative purposes only. The email conversation datastructure need not be hierarchical in structure. Rather, it may be aflat file, a table, a spreadsheet, a relational database, or any othertype of data structure. Further, the data structure may be a single datastructure or it may be multiple data structures. All possibleimplementations are within the scope of the present invention. So longas a data structure can be used to store the information needed tomanage the individual emails in an email conversation, it can be used asthe email conversation data structure.

As shown in FIG. 4, the email conversation data structure comprises oris associated with a unique identifier 402. This is the uniqueidentifier that is associated with the overall email conversation. Allof the individual emails in the email conversation carry this uniqueidentifier. In one embodiment, the header information for the emailconversation is stored in entry 402 in association with the uniqueidentifier. This header information may include the information shown inpane 302 of the composite email of FIG. 3, such as the emailconversation's administrator's ID information (e.g. email address, userID, etc.), the date and time the email conversation was started, and themain subject for discussion in the email conversation.

Under the unique identifier are four categories: text emails 402,subheadings 424, attachments 432, and recipient lists 440. Thesecategories correspond to the four panes 308, 304, 310, and 306 of thecomposite email of FIG. 3, respectively. Under each category is storedinformation pertaining to the emails that relate to that category. Forexample, under the text emails category 404, there is stored informationpertaining to the text emails that have been received for this emailconversation. In pane 308 of FIG. 3, nine text emails are shown.Information pertaining to each of these nine text emails is stored underthe text emails category 404 of the data structure. As shown in FIG. 4,the text sub-identifier for each text email is stored. Specifically,according to the information in the text email pane 308, Rhonda has senttwo text emails, one on November 1 and another on November 15. The textsub-identifiers for these two text emails are stored in entries 406 and408 of FIG. 4, respectively, (recall from previous discussion that eachtext email in an email conversation carries a text-sub-identifier aswell as the unique identifier; for the sake of simplicity, only thedates, and not the dates and times, are shown in these sub-identifiers).Similarly, as shown in pane 308 of the composite email, Chris has senttwo text emails, one on November 10 and another on November 12. The textsub-identifiers for these two text emails are stored in entries 410 and412 of the email conversation data structure. Further examination ofpane 308 and the email conversation data structure will reveal that,under the text emails category 404, the email conversation datastructure contains the text sub-identifiers for all of the text emailsshown in pane 308 (note: for the sake of brevity, pane 308 does not showtext emails sent between November 1 and November 10, and betweenNovember 16 and November 29; information pertaining to these text emailsis not shown in the email conversation data structure; for the sake ofexample, it will be assumed that none of the missing text emails weresent by Rhonda, Chris, President Bob, Controller, Patrick, or Mary;thus, the sequence numbers shown for these participants in the textsub-identifiers in FIG. 4 are correct).

Under the subheadings category 424, there is stored the subheadingsub-identifiers for all of the subheading emails that have been sentthus far in the email conversation. From the subheading pane 304 of FIG.3, it can be seen that three subheadings (and hence, three subheadingemails) have been sent thus far. Rhonda sent one on November 1, Rhondasent another on November 15, and Mary sent one on November 29. Thesubheading sub-identifiers for these subheading emails are stored inentries 426, 428, and 430, respectively, of the email conversation datastructure under the subheadings category 424.

Under the attachments category 432, there is stored the attachmentsub-identifiers for all of the attachment emails that have been sentthus far in the email conversation. From the attachments pane 310 ofFIG. 3, it can be seen that three attachments (and hence, threeattachment emails) have been sent thus far. One was sent by Rhonda onNovember 15, another one was sent by Rhonda on November 16, and anotherone was sent by Mary on November 29. The attachment sub-identifiers forthese attachment emails are stored in entries 434, 436, and 438,respectively, of the email conversation data structure under theattachments category 424.

Finally, under the recipient lists category 440, there is stored therecipient list sub-identifiers for all of the recipient list emails thathave been sent thus far in the email conversation. In the currentexample, only one recipient list email has been sent (by Rhonda, theadministrator, on November 1). Thus, only one recipient listsub-identifier is stored under the recipient lists category 440.

In addition to storing the sub-identifiers for the various emails, theemail conversation data structure may also store other sets ofinformation. For example, the date and time at which each email wasopened by the participant (Mary, in the current example) may be stored.In addition, other types of information, which may be used, for example,to control the display of the emails, to manage the sending andreceiving of side mails, etc., may also be stored in the emailconversation data structure. Some examples of these other types ofinformation will be described in later sections. Overall, the emailconversation data structure may be used to store any information thatmay be useful for managing an email conversation.

Sample Use of Email Conversation Data Structure

To illustrate how an email conversation data structure may be maintainedand used by an EEP 104 to generate a composite email, reference will nowbe made to an example, which is a continuation of the above example.Suppose that Mary uses an EEP 104 to log in to her email account.Suppose further that since the last time Mary opened an email in theemail conversation shown in FIGS. 3 and 4, two more emails relating tothe email conversation have arrived. One of the new emails is asubheading email that was sent by Rhonda (the subheading sub-identifierfor this subheading email would be: Subheading; Rhonda; dts (where dtsstands for data/time sent); seq #3)), and the other new email is a textemail that was sent by Patrick (the text sub-identifier for this textemail would be: Patrick; dts; seq #2). It will be assumed that neitherof these new emails has been opened yet by Mary (put another way,neither of these new emails have been previously accessed by Mary).

Suppose now that Mary invokes the EEP 104 to open/access the new textemail from Patrick. When the EEP 104 opens this email, it checks to seeif the email has a unique identifier associated therewith. If not, thenthe email is just a regular email and there is no need to generate acomposite email. If, however, the text email does have a uniqueidentifier associate therewith, thereby indicating that it is part of anemail conversation, then the EEP 104 will proceed to generate acomposite email. In the current example, the email does have a uniqueidentifier associated therewith; thus, the EEP 104 will proceed togenerate a composite email.

In one embodiment, the EEP 104 does so by initially extracting theunique identifier from the email. The EEP 104 also extracts from theemail any sub-identifiers that are included therein. In the currentexample, the email is a text email, which carries a text sub-identifier.Thus, the EEP 104 will extract both the unique identifier and the textsub-identifier from the text email. Using the unique identifier, the EEP104 accesses the email conversation data structure shown in FIG. 4.Thereafter, the EEP 104 updates the data structure by storing the textsub-identifier for the new text email into the data structure under thetext emails category 404 (this new text sub-identifier is not shown inFIG. 4). The date and time at which the text email was opened may alsobe stored. The email conversation data structure is thus updated withinformation pertaining to Patrick's new text email.

In one embodiment, the EEP 104 thereafter determines whether there areother unopened emails in Mary's email account that are part of the sameemail conversation. If so, then the EEP 104 will open those emails andextract information from them as well. To do so, the EEP 104, in oneembodiment, inspects each currently unopened email (for example, in anInbox folder), and checks to see if that email carries the uniqueidentifier. In the current example, there is one more unopened email(the one from Rhonda) that carries the unique identifier. Thus, in thecurrent example, the EEP 104 opens/accesses that email, and extracts theunique identifier therefrom. The EEP 104 also extracts from the emailany sub-identifiers that are included therein. In the current example,the email is a subheading email, which carries a subheadingsub-identifier. Thus, the EEP 104 will extract both the uniqueidentifier and the subheading sub-identifier from the subheading email.Using the unique identifier, the EEP 104 again accesses the emailconversation data structure shown in FIG. 4. Thereafter, the EEP 104updates the data structure by storing the subheading sub-identifier forthe new subheading email into the data structure under the subheadingscategory 404 (this new subheading sub-identifier is not shown in FIG.4). The date and time at which the subheading email was opened may alsobe stored. The email conversation data structure is thus updated withinformation pertaining to Rhonda's new subheading email. Assuming thatthere are no more unopened emails relating to this email conversation,the EEP 104 is done with updating the email conversation data structure.In one embodiment, the email conversation data structure is accessed andupdated (if necessary) in the manner described above whenever any emailin the email conversation is opened. This is true regardless of whetherthe email being opened is an email that has not yet been opened or is anemail that had previously been opened.

After the email conversation data structure is accessed and updated (ifnecessary), it is used by the EEP 104 to generate a composite email forthe email conversation. In one embodiment, the EEP 104 generates acomposite email by accessing the header information stored in the uniqueidentifier entry 402 of the email conversation data structure. Usingthis header information, the EEP 104 populates the header pane 302 ofFIG. 3.

The EEP 104 further proceeds to access each of the text emailsreferenced by the text sub-identifiers stored under the text emailscategory 404. From each text email, the EEP 104 extracts the texttherefrom. Then, the EEP 104 uses the extracted text from each of thetext emails to populate the text pane 308 of FIG. 3 (in the currentexample, the text pane 308 would further include text from the new textemail sent by Patrick). In one embodiment, the text from the new textemail may be shown in a different manner (e.g. highlighted, differentcolor, different font, etc.) than the text for the previously openedemails. That way, the participant can easily see which text email isnew. In the example shown in FIG. 3, the text emails are arrangedchronologically in ascending order. If so desired, the text emails maybe arranged according to some other order (e.g. descending order) orsorted by some other criteria (e.g. by sender, etc.).

The EEP 104 implements a similar procedure for subheadings andattachments. Specifically, in one embodiment, the EEP 104 accesses eachof the subheading emails referenced by the subheading sub-identifiersstored under the subheadings category 424. From each subheading email,the EEP 104 extracts the subheading therefrom. Then, the EEP 104 usesthe extracted subheadings to populate the subheading pane 304 of FIG. 3(in the current example, the subheading pane 304 would further includethe subheading from the new subheading email sent by Rhonda). In oneembodiment, the text from the new subheading email may be shown in adifferent manner (e.g. highlighted, different color, different font,etc.) than the text for the previously opened subheading emails. Thatway, the participant can easily see which subheading is new.

Similarly, the EEP 104 accesses each of the attachment emails referencedby the attachment sub-identifiers stored under the attachments category432. From each attachment email, the EEP 104 extracts the attachment (ora set of information describing the attachment and its location)therefrom. Then, the EEP 104 uses the extracted information to populatethe attachment pane 310 of FIG. 3.

In one embodiment, the recipient list emails are processed slightlydifferently. Rather than accessing all of the recipient list emailsreferenced by the recipient list sub-identifiers stored under therecipient list category 440, the EEP 104, in one embodiment, accessesonly the recipient list email with the latest sent date. It is assumedthat this email overrides all previous recipient list emails. After themost recently sent recipient list email is accessed, the EEP 104extracts the recipient list and authority information therefrom, anduses all or some of that information to populate the recipient list pane306 of FIG. 3. In the manner described, the EEP 104 is able to generatethe composite email using the email conversation data structure. Afterthe composite email is generated, it may be displayed to a participantvia a composite email user interface, such as that shown in FIG. 3. Inthe current example, the composite email is displayed to the participantnamed Mary.

In one embodiment, as part of the process of generating the compositeemail user interface, the EEP 104 determines the authorities that havebeen given to the participant for which the user interface is beinggenerated. The EEP 104 may make this determination by accessing the mostrecently sent recipient list email, and extracting the authorityinformation therefrom for the participant. Based upon these authorities,the EEP 104 may adjust the user interface accordingly. For example, ifthe participant does not have authority to add subheadings, then theuser interface may be generated such that the user entry portion of thesubheading pane 304 is grayed out, thereby indicating that that fieldcannot be used. Similarly, if the participant does not have authority toperform certain operations, then certain controls of the user interfacemay be deactivated to prevent the participant from performing thoseoperations. Furthermore, if a participant has authority to perform anoperation, then when the participant places the mouse pointer over acertain area of the display, a certain user interface component (e.g. abubble or a + sign) may appear, whereas if the participant did not haveauthority to perform the operation, the user interface component wouldnot appear. By adjusting the user interface in this and other ways, theEEP 104 can enforce the authorities/restrictions imposed by theadministrator (or perhaps co-administrator(s)) of the email conversationto ensure that the participant is not allowed to perform any operationfor which the participant has not be granted authority.

Adjusting the user interface is just one of the possible ways ofenforcing the authorities/restrictions imposed by the administrator (orperhaps co-administrator(s)) of the email conversation. As analternative, the user interface may be left the same for allparticipants. However, at the time the participant attempts to performan operation, the EEP 104 may check (e.g. by accessing the most recentrecipient list email in the email conversation) to see if theparticipant has been granted authority to perform that operation. Ifnot, then the EEP 104 may disallow that operation. For purposes of thepresent invention, these and other methodologies may be used to enforcethe authorities/restrictions imposed by the administrator (or perhapsco-administrator(s)) of the email conversation.

In the above example, the email conversation data structure is updatedat the time a previously unaccessed email in the email conversation isfirst accessed. In one embodiment, the email conversation data structuremay also be updated at other times. For example, when a participantsends out an email in the email conversation, the email conversationdata structure for that participant may be updated to includeinformation pertaining to that email that was just sent. Also, whenevera participant makes any changes to any of the attributes (displaysettings, markups, etc described in later sections) of a compositeemail, the email conversation data structure for that participant may beupdated to indicate the changes. Thus, the email conversation datastructure may be updated at various times to keep its contents current.

Manipulating a Composite Email Display

When a participant is viewing a composite email display, the participantmay customize/manipulate the display in many different ways. Thefollowing discussion sets forth some (but not all) examples of how thedisplay may be customized/manipulated. For example, the participant mayspecify that all text in the display should be in a certain font of acertain size. The participant may also specify that certain displayelements should be shown in certain colors. These and other displaypreferences may be specified. These preferences may be saved so thatthey are applied every time the composite email is generated. Suchglobal preferences may be saved in the email conversation data structure(FIG. 4) at, for example, the unique identifier level 402. That way, thenext time the EEP 104 uses the email conversation data structure togenerate the composite email, it will see the display preferences, andknow that they should be applied generally to the entire display.

The display preferences may also be specified at more granular levels.For example, the participant may specify that only recently sent textemails, such as those sent within the last thirty days, should bedisplayed in the text emails pane 308. This preference may be saved inthe email conversation data structure, for example, in association withthe text emails category 404. That way, the next time the EEP 104 usesthe email conversation data structure to generate the composite email,it will know to apply the date filter to all of the text emails underthe text emails category 404 to cause the text emails pane 308 to showonly recently sent text emails.

The participant may also specify that only text emails pertaining to acertain subheading should be displayed in the text emails pane 308. Forexample, the participant may select the November 1 subheading to causeonly those text emails sent between November 1, the date the subheadingwas created, and November 15, the date the next subheading was created,to be displayed. This preference, which may take the form of a daterange (e.g. November 1 to November 15) may be saved in the emailconversation data structure, for example, in association with the textemails category 404. That way, the next time the EEP 104 uses the emailconversation data structure to generate the composite email, it willknow to include only those text emails that were sent within thespecified date range in the text emails pane 308.

The participant may further specify at an even lower granularity levelthat text emails sent by certain participants, and even specific textemails, should not be displayed within the text emails pane 308. Thispreference may be saved in the email conversation data structure, forexample, in association with each of the entries corresponding to thetext emails that are to not be displayed. For example, if theparticipant specifies that all text emails sent by Controller should notbe displayed, then additional information may be stored in entries 416and 418 of the email conversation data structure to indicate that thosetext emails should not be displayed. If the participant specifies thatonly the text email associated with entry 418 should not be displayed,then additional information may be stored in just entry 418 to indicatethat that particular text email should not be displayed. That way, thenext time the EEP 104 uses the email conversation data structure togenerate the composite email, it will know to exclude specific textemails from the text emails pane 308 (in place of the text emails, theEEP 104 may display the text “{Email Not Shown}”).

A participant may also “mark” certain portions of one or more individualemails. For example, the text in a subheading (for example, thesubheading sent by Rhonda on Nov. 15) may be marked. Similarly, the textin a text email (for example, the text email sent by Patrick on November13) may be marked. A participant may select words, phrases and/or linesof the individual email that are to be marked. This may be accomplishedby selecting the desired portion, for example with a mouse cursor. Oncethe text and lines of the email are identified, the participant candecide how to operate upon the identified text and lines. GUI elementssuch as buttons may be displayed at points in the composite emaildisplay, such as the top and bottom of the composite email display, andalso above and below each individual email in the composite emaildisplay, that when selected cause an operation to be performed on markedportions of the email.

One operation that may be applied to a marked portion of an email isthat a participant can print the marked portion. Another operation thatmay be applied to a marked portion of an email is to remove the markedportion from display. A portion of an email in the composite emaildisplay may be marked and removed from display in response to aparticipant command. Once removed from display, the text is replaced byphrases such as {words removed} or {lines removed}. The text removal maybe undone. For example, the participant can move the mouse over to thewords shown in place of the removed text, and undo the removal byissuing an appropriate command. This process brings back into displaythe previously removed text.

Another operation that may be performed on a marked portion of an emailis to remove from display everything else in that email except for themarked portion. For example, the participant may desire to remove alarge amount of lines and text from display, and identifying them may bea more time consuming task than the opposite of identifying what theparticipant wants to retain in the display. In response to thisoperation, the text and lines identified are retained, and everythingelse in the email is removed from display. The text or lines thusremoved from display are replaced by phrases such as {words removed} or{lines removed}. The text removal may be undone. For example, theparticipant can move the mouse over to the words shown in place of theremoved text, and undo the removal by issuing an appropriate command.This process brings back into display the previously removed text. Inone embodiment, the participant can, by moving the mouse to any wordwithin the parentheses { }, see the words or lines removed from display.The “remove all else from display” command may operate to apply thecommand to one individual email, or to several individual emails in thecomposite email display. As mentioned above, only the individual emailswhich have text or lines identified (in the reverse manner as described)are affected by this command, other individual emails that are part ofthe composite email display are not affected.

Another operation that may be performed on a marked portion of an emailis to highlight the marked portion; for example, in color. Theparticipant may choose different highlighted colors for differentpurposes. In one example of choosing colors, a participant may highlightin yellow to identify notable text, in pink for text he mildly disagreeswith, in red for text he strongly disagrees with, in green for text heis in agreement with, and finally in blue for irrelevant text. Theparticipant may then choose to display, print, or extract only one ormore of the highlighted color in the display. The participant may changethe color of the highlighted text, or undo a part or all of anyhighlighted text. In one embodiment, the participant specifies a colorfor highlighting new, unread emails upon opening an email conversationin which the new, unread emails are displayed. That color is one thatwould be reserved for highlighting the new, unread emails, and thereforewould be unavailable for other highlighting.

Another operation that may be performed on a marked portion of an emailis to underline the marked text, similar to the color highlightingoptions described above. The participant may choose to underline textand has the option of selecting the color for underlining. In oneembodiment, the only color not available to the participant is the colorof the individual email text (usually black), to differentiate theindividual email author's underlining (same color as his text, usuallyblack) from the participant's selective color underlining. In everyother way, color underlining works just as color highlighting does, asdescribed above.

Another operation that may be performed on a marked portion of acomposite email display is to strike out the selected text. In the“remove from display” option described above, the participant cannot seethe text unless the command is temporarily or permanently undone. Inusing the option to strikeout, a line is drawn across the middle of thetext, but the text is displayed so the participant is aware of the textthat is marked by the strikeout. The participant can choose to display,print or extract this text with the strikeout line across the text ornot.

Another operation that may be performed on a marked portion of acomposite email display is to insert one or more reminders that arelinked to the marked text. As will be described in a later section,these reminders may be gathered and displayed to a participant to remindthe participant to perform one or more tasks or to follow up on one ormore emails. In one embodiment, to link a reminder to a set of markedtext, the participant invokes a user interface component (e.g. a button)to instruct the EEP 104 to add a reminder to the marked text. Inresponse to the invocation of this component, the EEP 104, in oneembodiment, provides several user interface components. One interfacecomponent may be a drop down menu of options that were previouslycreated by the participant. For example, an active board member may haveregular meetings that he attends or regular tasks that he performs (e.g.meet with chairman, meet with president, review sales report, etc.).Rather than hand-enter these items every time, the participant may putthese items into the drop down menu. That way, the participant cansimply select the desired meeting or task from the drop down menu thenext time he/she wants to add a reminder. Another interface componentthat the EEP 104 may provide is a free format text field. This fieldallows the participant to enter custom text for the reminder. Inaddition, the EEP 104 provides a field for entering a date and/or timeto be associated with the reminder. The information in this field allowsthe EEP 104 to know when the reminder should be shown to theparticipant. In the above discussion, the reminder is linked to themarked text of an email. As an alternative, the reminder may simply belinked to an email itself and not to any particular marked portion ofthe email. The processing of reminders will be elaborated upon in alater section.

Another operation that may be performed on a marked portion of acomposite email display is to insert a comment that is then associatedwith the marked portion. In response to inserting a comment, theselected text display automatically adjusts to make space between linesof selected text so that this space can accommodate the participant'scomments. For example, the participant may have selected lines 4 and 5of an individual email, and then chosen to insert a comment for themarked portion. The display provides for a line of text to be entered bythe participant between lines 3 and 4 and another one between lines 4and 5. In one embodiment, the result would be a line of participant'scomments above line 4, followed by original email text on line 4,followed by a line of participant comments above line 5, followed byoriginal line 5. Thus, if the participant selects text from only oneline, the display adjusts to provide for comments in a line above; andsimilarly, if the participant has selected several lines of text, thespace is created above each line of selected text.

The participant may choose specific colors for his comments, and maychoose a specific font for his comments from a predetermined selectionof fonts. The selection may be such that the font is distinctive, suchas a handwriting or bold type of font, so that the participant'scomments when displayed, printed or emailed are clearly distinguishable.The participant is provided options to add another line or lines ofparticipant comments wherever needed. The participant can choose toremove the comments from display whenever the participant wishes to notsee them, and choose to export, print or make extracts of comments inreports.

While one embodiment makes space between lines for the participant toenter comments, another option makes space in the margin (left, orright, or both, specified by the participant) by realigning the left andright margins of the text. The comments are displayed whenever theparticipant accesses the email, and these comments are once againavailable for the participant to select and print, export, display ornot display, or include in extracts. The participant has an additionaloption to set the size of the margin by increasing or decreasing theindent on the text.

Another operation that may be performed on a marked portion of acomposite email display is to provide editorial comments and notations.According to an embodiment, in response to selecting this operation,several steps are initiated simultaneously. First, the participant isprompted to highlight or underscore the selection, as described above.Next, the operations described above which insert comments and margincommands are executed, resulting in the display adjusting for spacebetween the selected text lines for the participant to enter comments,and adjusting for space in both margins for the participant to entermargin comments. Next, a GUI element, for example consisting of a menuof standard editorial notations, is displayed to the participant so theparticipant can point and select, and then drag and drop these notationsbetween lines, in the margins, and/or above or below the identifiedemail text. Some notations may be inserted between words of the emailcontent or between characters within a word of the email content. Theparticipant can use multiple markings; for example, the participant canhighlight as well as make a margin comment, or underscore as well asinsert comments between lines, or strikeout as well as make margincomments.

The participant can make the markings discussed above temporary (i.e.valid for only this viewing of the composite email; the next time thecomposite email is generated, the markings will not appear) or theparticipant can make them permanent (i.e. they will appear in all futuregenerations of the composite email until changed). In one embodiment, tomake the markings permanent, the EEP 104 stores the markings in theemail conversation data structure. For example, suppose that theparticipant has made some markings to the text email sent by Patrick onNovember 13 (pane 308 of FIG. 3). To make these markings permanent, theEEP 104 may save the markings in the email conversation data structure(FIG. 4) in entry 420 so that they are associated with the textsub-identifier for Patrick's email. In one embodiment, markings aresaved as one or more sets of commands and/or data. Whatever form ittakes, the information that is stored in entry 420 contains sufficientinformation that the EEP 102 can reproduce the markings at a later timewhen the composite email is once again generated and the email fromPatrick is once again displayed in the composite email. The same may bedone for reminders. Thus, if the participant also linked a reminder toall or a portion of the text email sent by Patrick on November 13, theninformation pertaining to the reminder may also be stored in the emailconversation data structure (FIG. 4) in entry 420. This enables thereminder to be associated with the text sub-identifier for Patrick'semail, which in turn enables the reminder to be linked to Patrick'semail.

In one embodiment, any characteristic of an email that is part of thecomposite email display may be identified and the display modified basedon those characteristics. For example, a sender could be acharacteristic, as could a date and/or time an email was sent orreceived. Once the particular characteristic(s) desired to be displayedare chosen, for example by an interface element, then the individualmessages meeting or otherwise conforming to the chosen criteria may beselectively displayed. This display may be customized by a participant;for example, individual emails in a composite email display that weresent by a chosen recipient on a chosen day may be displayed alone, ormay be highlighted or in a different color, or according to any numberof visual approaches.

Side Mails

In one embodiment, every email (e.g. header email, text email, recipientlist email, subheading email, attachment email) that is sent as part ofan email conversation is, by default, sent to all of the participants inthe email conversation. That way, everyone in an email conversation isgenerally able to “hear” everything that everyone else is “saying”. Anexception to this default is a side mail. A side mail is an email thatis sent to only a subset of the participants of the email conversation,and only those participants will be able to view it. A side mail may beanalogized to several participants whispering during a meeting. Althoughtheir side conversation is still a part of the overall conversation,they are the only ones privy to it. In one embodiment, there are threetypes of side mails: text side mail, markup side mail, and automatedside mail. Each type will be described below.

Text Side Mail

In one embodiment, a text side mail is used to comment on or to furtherdiscuss a particular text email with just a subset of the participantsof an email conversation. Because a text side mail discusses aparticular text email, it is associated with that text email. Forexample, suppose that Mary wishes to further discuss with Rhonda andController the text email sent by Rhonda on November 15 (see pane 308 ofFIG. 3). To do so, Mary may send a text side mail to just Rhonda andController. This text side mail will be associated with Rhonda's textemail sent on November 15.

In one embodiment, to prepare a text side mail, a participant selectsthe text email that the participant wishes to discuss. In the aboveexample, Mary would select the text email sent by Rhonda on November 15.Mary would then activate a control to prepare a text side mail for thistext email. In one embodiment, this causes some user interface component(e.g. a text entry box) to appear, which would enable Mary to enter thetext of the text side mail. As part of the text side mail preparationprocess, Mary has to specify the participants that will be participatingin the side conversation that will be conducted using the text sidemail. In the current example, the participants are Mary, Rhonda, andController.

When Mary instructs the EEP 104 to send the text side mail, the EEP 104composes the text side mail, and sends it to the proper recipients. Inone embodiment, in composing the text side mail, the EEP 104 includesthe following information in the text side mail: (1) the uniqueidentifier for the email conversation (even though the text side mail ispart of a side conversation, it is still part of the overall emailconversation); (2) the text sub-identifier for the text email with whichthe text side mail is associated (in the current example, this would bethe text sub-identifier associated with the email sent by Rhonda onNovember 15, which would be: Rhonda; November 15; seq #2); (3) the textof the text side mail; (4) the list of participants for the text sidemail (Mary, Rhonda, and Controller in the current example); and (5) aside mail sub-identifier for the text side mail. In one embodiment, theside mail sub-identifier is generated by the EEP 104, and comprises sometext (e.g. “sidemail”) indicating that the email is a text side mail, anemail identifier (e.g. an email address or user ID) for the participantwho created and sent the text side email (Mary in the current example),a date and time code, and a sequential counter. In the context of thissub-identifier, the sequential counter indicates how many text sidemails have been sent by this participant in this email conversation withregard to this particular text email. This is just one possible methodfor generating a side mail sub-identifier. Other methods may be used ifso desired. All such methods are within the scope of the presentinvention. After the text side mail is composed, it is sent by the EEP104 to the proper recipients (Rhonda and Controller in the currentexample).

In one embodiment, after the text side mail is sent, the EEP 104 updatesthe email conversation data structure maintained for Mary to includeinformation pertaining to the text side mail. This may be done, forexample, by storing a sub entry under entry 408 (FIG. 4). This sub entrywould contain the side mail sub-identifier associated with the text sidemail. In the current example, the sub-identifier would be: sidemail,Mary, dts; seq #1 (this is not shown in FIG. 4). By storing theinformation pertaining to the text side mail in this manner, it is clearthat the text side mail is associated with the text email sent by Rhondaon November 15.

When one of the recipients of the text side mail (e.g. Controller) opensthe text side mail, the EEP 104 used by that recipient will update theemail conversation data structure maintained for that recipient, andgenerate a composite email for the email conversation. Specifically, inone embodiment, the EEP 104 extracts the unique identifier, the textsub-identifier, and the side mail sub-identifier from the text sidemail. Using the unique identifier, the EEP 104 accesses the emailconversation data structure of FIG. 4. Based on the side mailsub-identifier, the EEP 104 determines that this is a text side mail.From the text sub-identifier, the EEP 104 ascertains that this side mailis associated with the text email sent by Rhonda on November 15. Givenall of this information, the EEP 104 knows how to update the emailconversation data structure for that recipient. This updating may bedone in a manner similar to that described above in connection withMary. For example, the EEP 104 may store a sub entry under the entry inthe email conversation data structure that corresponds to the text emailsent by Rhonda on November 15. This sub entry would contain the sidemail sub-identifier: sidemail; Mary; dts; seq #1. This information willindicate that there is a side mail associated with the text email sentby Rhonda on November 15.

After the email conversation data structure of the recipient is updated,the EEP 104 used by the recipient proceeds to use the data structure togenerate the composite email for the email conversation. The compositeemail may be generated in the manner previously described. When the EEP104 arrives at the newly created sub entry in the email conversationdata structure for the text side mail, it knows from the side mailsub-identifier that the email is a text side mail. The EEP 104 alsoknows that the side mail is associated with the text email sent onNovember 15 by Rhonda. Thus, the EEP 104 will extract the text from thetext side mail, and place that text in pane 308 (FIG. 3) underneath thetext for the text email sent by Rhonda on November 15. The text for theside mail may be displayed in a different fashion (e.g. indented, in adifferent font, in a different color, etc.) to indicate that it is aside mail. In this manner, the EEP 104 is able to recognize the email asa side mail, and is able to put it in the correct location in thecomposite email display.

One or more replies may be sent in response to a text side mail. In oneembodiment, each reply will be sent to only the participants of the sidemail, and each reply will carry the unique identifier, the textsub-identifier, and the side mail sub-identifier discussed above. Theseidentifiers will allow the EEP 104 opening the replies to associate thereplies with the proper side mail, the proper text email, and the properemail conversation. When a reply to a side mail is opened, the EEP 104will process it in the same manner as that described above. In oneembodiment, a text side mail and all of its replies will be displayedunderneath the text of the text email with which the text side mail isassociated. This is so regardless of when the side mail and replies weresent relative to other text emails. For example, even if a reply to theabove side mail were sent on December 1, it would still be displayedunderneath the text for the text email sent by Rhonda on November 15(see FIG. 3) but above the text for the text email sent by Mary onNovember 29. This is so despite the fact that the reply was sent onDecember 1, which is after November 29, the date on which the text emailby Mary was sent. Displaying the side mails in this way enables all ofthe side mails pertaining to a particular text email to be showntogether. This allows the side mails to be presented in a more intuitivefashion. In the manner described, participants can use text side mailsto carry on a private conversation within the context of an overallemail conversation.

Markup Side Mail

As discussed previously, when a participant is viewing a composite emaildisplay, the participant may mark one or more portions of one or more ofthe emails (e.g. text email, subheading email, etc.) shown in thecomposite email display. Various operations may be performed on themarked portions. As discussed above, these operations may includehighlighting, underlining, adding comments, adding reminders, etc. Inone embodiment, the participant is allowed to share these markings withone or more other participants by sending a markup side mail. The markupside mail will include sufficient information pertaining to the markingsthat the EEP 104 on the recipient's end will be able to reproduce themarkings so that the markings are shown in the recipient's compositeemail display for the affected email.

In one embodiment, to prepare a markup side mail, a participant selectsan email that has been marked up (this email will be referred to as themarked up email). The participant then activates a user interfacecontrol to indicate to the EEP 104 that the participant wishes to send amarkup side mail for this marked up email. The activation of the controlmay cause a user interface component (e.g. a drop down list) to appear,which would allow the participant to specify the recipient(s) of themarkup side mail. After the recipient(s) are specified, the participantinstructs the EEP 104 to send the markup side mail.

In response to the send command, the EEP 104 composes the markup sidemail. In one embodiment, the EEP 104 does so by collecting markupinformation for the marked up email. In one embodiment, this markupinformation specifies all of the markings that have been made to themarked up email, and may take the form of various commands and/or data.The markup information may have already been stored in the emailconversation data structure (as described above). After the markupinformation is collected, the EEP 104 proceeds to compose the markupside mail. In one embodiment, the EEP 104 includes the followinginformation in the markup side mail: (1) the unique identifier for theemail conversation; (2) the sub-identifier for the marked up email (thisidentifies the email to which the markings are to be applied); (3) thecollected markup information; (4) the list of recipients for the markupside mail; and (5) a markup side mail sub-identifier for the markup sidemail. In one embodiment, the markup side mail sub-identifier isgenerated by the EEP 104, and comprises some text (e.g. “markup”)indicating that the email is a markup side mail, an email identifier(e.g. an email address or user ID) for the participant who created andsent the markup side email, a date and time code, and a sequentialcounter. In the context of this sub-identifier, the sequential counterindicates how many markup side mails have been sent by this participantin this email conversation with regard to this particular marked upemail. This is just one possible method for generating a markup sidemail sub-identifier. Other methods may be used if so desired. All suchmethods are within the scope of the present invention. After the markupside mail is composed, it is sent to the specified participants. Oncethe markup side mail is sent, the EEP 104 may record in the sendingparticipant's email conversation data structure that a markup side mailassociated with the marked up email was sent, and the EEP 104 maydisplay a user interface component next to the marked up email in thecomposite email display to show that a markup side mail was sent forthat email.

When one of the recipients opens the markup side mail, the EEP 104 usedby that recipient will update the email conversation data structure forthat recipient, and generate a composite email for the emailconversation. Specifically, in one embodiment, the EEP 104 extracts theunique identifier, the sub-identifier for the marked up email, and themarkup side mail sub-identifier from the markup side mail. Using theunique identifier, the EEP 104 accesses the email conversation datastructure. Based on the markup side mail sub-identifier, the EEP 104determines that this is a markup side mail. From the sub-identifier ofthe marked up email, the EEP 104 determines which specific email isaffected by the markings. Given all of this information, the EEP 104knows how to update the email conversation data structure. For example,the EEP 104 may store a sub entry under the entry containing thesub-identifier for the marked up email. This sub entry would contain themarkup side mail sub-identifier, and may further contain the markupinformation. The sub entry indicates that there is a markup side mailassociated with the marked up email, and the markup informationspecifies what markings have been made to the marked up email.

After the email conversation data structure is updated, the EEP 104proceeds to use the data structure to generate the composite email forthe email conversation. The composite email may be generated in themanner previously described. When the EEP 104 arrives at the newlycreated sub entry in the email conversation data structure for themarkup side mail, it knows from the markup side mail sub-identifier thatthe email is a markup side mail. The EEP 104 also knows that the markupside mail is associated with the marked up email. In one embodiment, theEEP 104 does not automatically apply the markings in the markup sidemail to the marked up email in the composite email display. Rather, anotation is shown next to the marked up email to indicate that a markupside mail has been received. If the recipient activates a user interfacecontrol to instruct the EEP 104 to apply the markings from the markupside mail, then the EEP 104 will apply the markings to the marked upemail. Once that is done, the recipient will see the markings that weremade by the sender of the markup side email. In one embodiment, a markupside mail cannot be replied to, but a recipient can forward it to one ormore other participants.

Automated Side Mail

During the course of an email conversation, one or more emails may belost (e.g. due to network issues, server issues, program malfunctions,etc.). This may cause one or more participants to miss out onpotentially important information. To prevent this from happening, oneembodiment of the present invention checks for missing emails in theemail conversation. If any emails (header, text, recipient list,subheading, or attachment) in the email conversation are discovered tobe missing, then a recovery process is implemented to recover the lostemails. In one embodiment, the recovery process is implemented usingautomated side mails. To illustrate how the discovery and recoveryprocess may be carried out in accordance with one embodiment of thepresent invention, reference will be made to an example, which is acontinuation of the example shown in FIGS. 3 and 4.

Suppose that the participant named Mary receives a third text email fromthe participant named Chris. This text email would carry the uniqueidentifier for the email conversation. It would also carry the textsub-identifier: Chris; dts; seq #3 (the seq #3 indicates that this isthe third text email sent by Chris for this email conversation). Supposenow that Mary invokes the EEP 104 to open the new text email from Chris.As described previously, when the EEP 104 opens a new email in the emailconversation, it updates the email conversation data structure (FIG. 4).In one embodiment, the EEP 104 does so by initially extracting theunique identifier from the new text email. The EEP 104 also extracts thetext sub-identifier from the new text email. Using the uniqueidentifier, the EEP 104 accesses the email conversation data structure.Thereafter, the EEP 104 updates the email conversation data structure bystoring the text sub-identifier for the new text email into the datastructure under the text emails category 404 (this new textsub-identifier is not shown in FIG. 4). The date and time at which thenew text email was opened may also be stored. The email conversationdata structure is thus updated with information pertaining to Chris' newtext email.

In one embodiment, at the time the EEP 104 updates the emailconversation data structure with information pertaining to a new email,it checks to see if the email conversation is missing informationpertaining to an immediately preceding email. As used herein, the term“immediately preceding email” refers to an email that is of the sametype as the new email, that is sent by the same participant as the newemail, and that has a seq # that immediately precedes the seq # of thenew email. In the current example, the new email is a text email sent byChris having a seq #3 in its text sub-identifier; thus, the immediatelypreceding email is the text email that was previously sent by Chrishaving the seq #2 in its text sub-identifier. In one embodiment, the EEP104 checks for a missing immediately preceding email by looking for asub-identifier in the email conversation data structure that has theproper criteria. In the current example, the EEP 104 would look for atext sub-identifier showing Chris as the sender and having a seq #2. Ifno such text sub-identifier is found in the email conversation datastructure, then it means that Chris' immediately preceding text emailwas lost.

In one embodiment, the EEP 104 checks only for the immediately precedingemail each time the email conversation data structure is updated. Itdoes not look for all missing emails of the same type sent by the sameparticipant. However, it should be noted that, if so desired, the EEP104 could check for all missing emails of the same type sent by the sameparticipant. In the above example, the EEP 104 could check the emailconversation date structure for all previous text emails sent by Chris(these would be Chris's text emails with seq #'s less than three). Infact, the EEP 104 could, if so desired, check for all missing emails ofall types sent by all participants each time the email conversation datastructure is updated. This may be done using the seq #'s in thesub-identifiers in the manner disclosed above. These and otherimplementations are within the scope of the present invention.

Suppose now for the sake of example that Mary never received the secondtext email sent by Chris. Thus, the email conversation data structuremaintained for Mary will not contain the text sub-identifier: Chris;November 12; seq #2 (i.e. entry 412 does not exist in Mary's emailconversation data structure). When the EEP 104 discovers (in the mannerdescribed above) that this text email is missing, it implements an emailrecovery process. In one embodiment, it does so by preparing and sendingan automated side mail (the EEP 104 may prepare the automated side mailwithout input from Mary, or it may ask Mary whether she wishes to sendthe automated side mail).

Initially, in preparing the automated side mail, the EEP 104 determineswho to send the automated side mail to. In one embodiment, the automatedside mail may be sent to the administrator of the email conversationand/or to someone designated by the administrator as being the person toreceive automated side mails. The EEP 104 determines the properrecipient for the automated side mail by accessing the most recentrecipient list email for the email conversation and extracting theauthority information therefrom. For the sake of example, it will beassumed that the automated side mail should be sent to theadministrator. In the current example, the administrator is Rhonda;thus, the automated side mail is addressed to Rhonda.

After the proper recipient is determined, the EEP 104 composes theautomated side mail. In one embodiment, the EEP 104 includes thefollowing information in the automated side mail: (1) the uniqueidentifier for the email conversation; (2) the recipient list for theautomated side mail (Rhonda in the current example); (3) informationidentifying the email that is missing (in the current example, the EEP104 would specify that it is missing a text email sent by Chris having aseq #2); and (4) an automated side mail sub-identifier. In oneembodiment, the automated side mail sub-identifier is generated by theEEP 104, and comprises some text (e.g. “auto”) indicating that the emailis an automated side mail, an email identifier (e.g. an email address oruser ID) for the participant (Mary in the current example) on whosebehalf the automated side mail was created and sent, a date and timecode, and a sequential counter. In the context of this sub-identifier,the sequential counter indicates how many automated side mails have beensent on behalf of this participant in this email conversation. This isjust one possible method for generating an automated side mailsub-identifier. Other methods may be used if so desired. All suchmethods are within the scope of the present invention. After theautomated side mail is composed, it is sent to the specifiedparticipant(s). Once the automated side mail is sent, the EEP 104 mayrecord in the email conversation data structure that an automated sidemail was sent requesting the text email sent by Chris having seq #2. TheEEP 104 may also display a message to Mary indicating that the automatedside mail was sent.

At some point, Rhonda, the administrator of the email conversation,receives the automated side mail. When Rhonda invokes an EEP 104 to openthe automated side mail, the EEP 104 processes the automated side mailas follows (as an alternative, the EEP 104 may process the automatedside mail without Rhonda even opening the automated side mail).Initially, the EEP 104 extracts from the automated side mail the uniqueidentifier, the automated side mail sub-identifier, and the informationidentifying the email that is missing. Using the unique identifier, theEEP 104 accesses the email conversation data structure maintained forRhonda, the administrator. Based on the automated side mailsub-identifier, the EEP 104 determines that this is an automated sidemail sent by Mary requesting that a missing email be re-sent. From theinformation identifying the email that is missing, the EEP 104ascertains that the email that should be re-sent is the text email sentby Chris having a seq #2. Given all of this information, the EEP 104knows how to update the email conversation data structure. For example,the EEP 104 may add some information to the entry that contains the textsub-identifier for Chris' second text message. This information mayindicate that Mary has requested that this text email be re-sent to her,and may include the automated side mail sub-identifier.

After the EEP 104 updates Rhonda's email conversation data structure, itmay prepare a response to the automated side mail (the EEP 104 mayautomatically prepare this response without input from Rhonda, or it mayask Rhonda whether she wishes to re-send the requested text email). Inthe response, the EEP 104, in one embodiment, includes: (1) the uniqueidentifier of the email conversation; (2) the automated side mailsub-identifier; (3) a recipient list (Mary in the current example); and(4) the text email requested by the automated side mail (the second textemail sent by Chris in the current example). After the response isprepared, it is sent back to the sender of the automated side mail(Mary). The email conversation data structure maintained for Rhonda maythen be updated to indicate that a response to the automated side mailwas sent.

At some point, Mary receives the response to the automated side mail.When Mary invokes an EEP 104 to open the response, the EEP 104 proceedsto update the email conversation data structure maintained for Mary. Inone embodiment, the EEP 104 extracts from the response the uniqueidentifier, the automated side mail sub-identifier, and the second textemail sent by Chris. Using the unique identifier, the EEP 104 accessesthe email conversation data structure maintained for Mary. Based on theautomated side mail sub-identifier, the EEP 104 determines that this isa response to the automated side mail that was sent previously. From theinformation previously stored in the email conversation data structurefor this automated side mail, the EEP 104 determines that the automatedside mail requested the second text email from Chris. Thus, the EEP 104knows that the email extracted from the response is the second textemail from Chris. In one embodiment, the extracted email comprises theoriginal text email's text sub-identifier (Chris; November 12; seq #2 inthe current example). Using this text sub-identifier, the EEP 104updates the email conversation data structure. In one embodiment, theEEP 104 further stores information in the email conversation datastructure to indicate that a response to the automated side mail hasbeen received and processed. The response is thus fully processed, andthe email conversation data structure is updated.

In one embodiment, when the EEP 104 updates the email conversation datastructure with the text sub-identifier of Chris' second text email, itdetermines whether the immediately preceding email to that email isaccounted for in the email conversation data structure. This immediatelypreceding email would be the text email sent by Chris having a seq #1.If this immediately preceding email is not accounted for in the emailconversation data structure, then the process described above may berepeated to recover that email. By repeatedly applying this discoveryand recovery process, it is possible to recover multiple lost emails inthe email conversation.

In the manner described, the EEP 104 is able to discover and recoverlost emails. In the above example, a text email was recovered. Othertypes of emails (header, recipient list, subheading, attachment) may berecovered in a similar same manner.

In the case where the administrator is the person who is missing anemail, the administrator may send a side mail to the participant whocreated and sent the missing email, and ask that participant to resendthe email to the administrator as a side mail.

Email Management and Organization

In one embodiment, an EEP 104 may be used to receive, view, and organizeall types of emails. This includes emails that are part of an emailconversation (hereinafter referred to as conversation emails), andregular emails. If an email carries a unique identifier for an emailconversation, then it is treated as a conversation email. If an emaildoes not carry a unique identifier for an email conversation, then it istreated as a regular email. Used in this context, a regular email refersto: (1) an email originating from a user of any existing email systemthat does not have email conversation capability; or (2) an emailoriginating from a user of an email system that has email conversationcapability but the user has chosen not to send the email as aconversation email. In one embodiment, both conversation emails andregular emails may be organized and managed with a central display thatprovides for containers within which emails may be stored.

FIG. 5 is a block diagram that illustrates an embodiment of an emailmanagement approach. In FIG. 5, visual representations of containerswithin which emails may be stored are displayed. According to anembodiment, a container is a logical construct with which items such asemails may be associated, and by being so associated, be “stored within”the container. An example of a container is a folder. While thecontainers illustrated in FIG. 5 are hereinafter referred to as“folders,” it should be understood that this is merely an example and isnot to be considered as a limitation of any embodiment of the invention.Other types of containers may be used if so desired.

FIG. 5 shows an example display that a user may see when a user accesseshis/her email account. The folders illustrated in FIG. 5 are displayedto the user for the purpose of organizing and managing conversationemails and regular emails. In one embodiment, four high level foldersare provided: Inbox 501, Bulk Mail 524, Conversation Email 506, andRegular Email 527. These folders may have any desired number ofsubfolders within them.

When a new email arrives, it is sorted into one of two main folders:Inbox 501 and Bulk Mail 524. Bulk mail generally refers to mass marketedemails commonly known as “junk mail” or “spam.” An email is classifiedas bulk mail if it meets certain user-specified criteria. These criteriamay include, for example, certain email addresses, certain domain names,certain words in the subject header or the body of the email, etc. If anincoming email meets the bulk mail criteria set forth by the user, thenit is automatically moved into the Bulk Mail folder 524. In oneembodiment, the Bulk Mail folder 524 is divided into two sub folders:Notable 525 and All Other 526. The Notable folder 525 is used to storebulk mail that the user may find interesting. The All Other folder 526is used to store all other bulk mail. With regard to the Notable folder525, this folder may be used to store bulk email that the user may wantto review at a later time. For example, a user may want to occasionallyreview shopping information or offers from certain vendors. The userdoes not want these emails to clutter the Inbox 501, but at the sametime, the user may not want to automatically delete them. By causingthem to be stored in the Notable folder 525, the user is able to preventthe clutter to the Inbox while keeping the option of reviewing theemails at a later time. In one embodiment, the user may specifysub-criteria under the bulk mail criteria. If a bulk mail satisfies boththe bulk mail criteria and the sub-criteria, then it is moved into theNotable folder 525. Otherwise, it is moved into the All Other folder526.

In one embodiment, each of these folders 525, 526 has a user interfacecomponent shown as “[Empty]” next to it. If the user activates this userinterface component (for example, by clicking on it), then the EEP 104will delete all of the emails in the corresponding folder. This makes itsimple for the user to dispose of unwanted mail.

If the incoming email is not classified as bulk mail, as describedabove, then the incoming email is automatically moved into the Inbox 501where it falls into one of two subfolders, represented in FIG. 5 byConversation Email 503 and Regular Email 504. If the incoming emailcarries a unique identifier and hence, is part of an email conversation,then the incoming email is stored in the Conversation Email subfolder503. If the incoming email originated from an email management systemthat does not offer email conversation capability, or for whateverreason, the email does not carry a unique identifier, then the email isautomatically stored in the Regular Email subfolder 504. TheConversation Email subfolder 503 may store conversation emailspertaining to multiple email conversations. For example, one set ofemails in the Conversation Email subfolder 503 may pertain to a firstemail conversation while another set of emails may pertain to a secondemail conversation.

A user can view a listing of all of the emails in the Inbox 501 byclicking on Inbox 501. Unread emails as well as read emails contained inboth the subfolders Conversation Email 503 and Regular Email 504 aredisplayed, listed chronologically under the subfolder Conversation Email503 and listed chronologically under the subfolder Regular Email 504. Ifa user has read some emails and left them in the Inbox 501 withoutdeleting them or moving them out, those read emails are displayed alongwith the unread emails. Read and unread emails may be madedistinguishable by highlighting, bolding, using different colors, etc.In one embodiment, a display of emails may include a listing of emailsproviding some or all of the following data in a tabular format: datethe email is sent and received, sender's name and email address, subjectof the email, and other such data available with an email.

To view just the conversation emails in the Inbox 501, a user can clickon the Conversation Email subfolder 503. This will cause a listing ofboth unread emails and previously read emails in the Conversation Emailsubfolder 503 to be displayed. Similarly, to view just the regularemails in the Inbox 501, a user can click on the Regular Email subfolder504. This will cause a listing of both unread emails and previously reademails in the Regular Email subfolder 504 to be displayed.

A graphical user interface (GUI) element (n) 502 may be displayed nextto any folder or subfolder. The number represented by the n within theparenthesis indicates the number of unread emails in that folder. Forexample, if Inbox 501 contains seventy emails but only ten are unread,then the (n) 502 displayed next to Inbox 501 will be shown as (10) toindicate that there are ten unread emails in Inbox 501. Similarly, ifthe Conversation Email subfolder 503 contains fifty emails but only fiveare unread, then the (n) 502 displayed next to the Conversation Emailsubfolder 503 will be shown as (5) to indicate that there are fiveunread emails in the Conversation Email subfolder 503.

In one embodiment, a GUI element 502 may be activated, for example byclicking on the number within the parenthesis. When a GUI element 502 isactivated, the EEP 104 will: (1) access the folder that is associatedwith the particular GUI element 502 that has been activated; (2)determine which emails contained within that folder are unread; and (3)display information pertaining to only those unread emails to the user.For example, by selecting the display element (n) 502 next to the Inbox501, a user can cause only the unread emails in the Inbox folder 501 tobe displayed. This is in contrast to selecting the Inbox 501 itself,which would cause all of the emails in that folder, both read andunread, to be displayed. By activating a display element such as (n) 502alongside a folder, a user can view only the unread emails in thatfolder without being distracted/hampered by the previously read emailsin that folder.

In addition to the Inbox 501 and the Bulk Mail 524 folders, there isalso provided an overall Conversation Email folder 506 and a RegularEmail folder 527. These folders may contain any number of subfolders,and are intended to be used to store emails that have been moved out ofthe Inbox 501. The Conversation Email folder 506 (and its subfolders) isintended to store conversation emails that have been moved out of theConversation Email subfolder 503 of the Inbox 501, and the Regular Emailfolder 527 (and its subfolders) is intended to store regular emails thathave been moved out of the Regular Email subfolder 504 of the Inbox 501.With these two folders, conversation emails may be kept separately fromregular emails. As shown in FIG. 5, these folders may comprise wellknown subfolders, such as Deleted subfolders 515, 531 for holdingdeleted emails, Draft subfolders 513, 530 for storing draft emails, aSent subfolder 529 for storing previously sent emails, etc. They mayalso comprise folders (e.g. 509-512, 533-536) that are custom createdand named by the user. The Conversation Email folder 506 may alsocomprise one or more folders (e.g. 518-523) used for archiving purposes.The use of these folders will be elaborated upon in a later section.

In one embodiment, when a user is viewing a listing of emails, the usermay cause one or more reminders to be associated with an email (a reademail or an unread email). In one embodiment, a user may associate areminder with an email by selecting an email and then activating a userinterface component to instruct the EEP 104 to associate a reminder withthe selected email. In response to the invocation of this component, theEEP 104, in one embodiment, provides several user interface components.One interface component may be a drop down menu of options that werepreviously created by the user. For example, an active board member mayhave regular meetings that he attends or regular tasks that he performs(e.g. meet with chairman, meet with president, review sales report,etc.). Rather than hand-enter these items every time, the user may putthese items into the drop down menu. That way, the user can simplyselect the desired meeting or task from the drop down menu the next timehe/she wants to add a reminder. Another interface component that the EEP104 may provide is a free format text field. This field allows the userto enter custom text for the reminder. In addition, the EEP 104 providesa field for entering a date and/or time to be associated with thereminder. The information in this field allows the EEP 104 to know whenthe reminder should be shown to the user. The processing of reminderswill be elaborated upon in a later section.

Automatic Email Movement

As noted previously, one of the problems encountered in current emailsystems is that the inbox often gets cluttered with large numbers ofemails. To reduce this clutter, a user can manually move emails out ofthe inbox into other folders (note: the EEP 104 does allow a user tomanually move an email from one folder to another). However, thisrequires significant effort on the user's part. As a result, users oftendo not do it, and inboxes remain cluttered. To prevent the Inbox 501from becoming cluttered, the EEP 104, in one embodiment, automaticallymoves emails out of the inbox into other folders once the emails havebeen read (this automatic email movement is optional and can beactivated or deactivated by the user). The EEP 104 may move an emailinto a general folder, or into a particular folder specified by a user.Either way, the email is automatically moved out of the Inbox 501 intoanother folder without requiring any effort on the user's part. Byautomatically moving emails in this way, the EEP 104 keeps the Inbox 501relatively clutter free.

In one embodiment, this automatic email movement feature may be appliedto both regular emails and conversation emails. With regard to regularemails in the Regular Email subfolder 504 of the Inbox 501, they may beopened and read by a user in the usual manner. When the user closes theemail after reading it, the EEP 104, in one embodiment, determineswhether the automatic email movement feature has been activated. If ithas not, then the email is just left in the Regular Email subfolder 504of the Inbox 501. If the automatic email movement feature has beenactivated, then the EEP 104 proceeds to determine (e.g. via a userprompt) whether the user wishes to have the email moved to a specificfolder. At that point, the user can navigate through the folderstructure shown in FIG. 5 and select an existing folder under theRegular Email folder 527. Alternatively, the user can create a newfolder under the Regular Email folder 527 and instruct the EEP 104 tomove the email into that folder. As a further alternative, the user caninstruct the EEP 104 to create a new folder under the Regular Emailfolder 527 and to move the email into that folder. If the user specifiesa specific folder into which the email is to be moved, then the EEP 104moves the email out of the Inbox 501 into that specific folder. If theuser does not specify a specific folder, then the EEP 104 moves theemail into a default folder (e.g. the Current subfolder 528 under theRegular Email folder 527). In either case, provided the automatic emailmovement feature has been activated, the regular email is moved out ofthe Inbox 501 into another folder without requiring the user to manuallydo so.

With regard to conversation emails, the EEP 104 may also apply theautomatic email movement feature. However, the processing ofconversation emails is carried out slightly differently. To illustratehow a conversation email may be automatically moved in accordance withone embodiment of the present invention, reference will be made to thefollowing example, which is a continuation of the example usedpreviously. Suppose that the participant named Mary is accessing heremail account using an EEP 104. Suppose further that in the ConversationEmail subfolder 503 of Mary's Inbox 501, there are two new emailspertaining to the email conversation shown in FIGS. 3 and 4 (theseemails may be text, recipient list, subheading, or attachment emails).Suppose now that Mary instructs the EEP 104 to open one of the newemails. In response, the EEP 104 operates in the manner describedpreviously. Specifically, in one embodiment, the EEP 104 opens theselected new email and updates the email conversation data structurewith information pertaining to this new email (e.g. the new email'ssub-identifier, date and time the email was opened, etc.). In addition,the EEP 104 opens the other new email pertaining to the emailconversation and further updates the email conversation data structurewith information pertaining to that new email (e.g. that new email'ssub-identifier, date and time the email was opened, etc.). After theemail conversation data structure is updated, the EEP 104 proceeds togenerate the composite email for the email conversation. This compositeemail will include content extracted from the new emails, as well ascontent extracted from other emails that are already part of this emailconversation. After generating the composite email, the EEP 104 displaysit to Mary.

In one embodiment, the information extracted from the new emails may beshown in a different manner (e.g. highlighted, bolded, different color,etc.) than the information extracted from previous emails. Thisindicates to Mary that this is previously unread content. Each of thesets of information extracted from the new emails may also have a userinterface component (e.g. a radio button or a check box) displayed nextto it. This user interface component allows Mary to acknowledge readingeach new email. Additionally, or as an alternative, the composite emaildisplay may provide a user interface component (e.g. a button) thatallows Mary to acknowledge that all new emails have been read (that way,Mary does not have to acknowledge reading each individual email). Theseand other user interface components may be provided to enable Mary toacknowledge reading the new emails. In one embodiment, a distinction ismade between a conversation email being “opened” and a conversationemail being “read”. A conversation email is considered to have beenopened once the EEP 104 has opened that email and has updated the emailconversation data structure with information pertaining to that email(as noted previously, a date and time opened may be stored in the emailconversation data structure). A conversation email is considered to havebeen read only after a participant has acknowledged reading that email.Thus, an email (or more specifically, the content extracted from thatemail) may be shown to a participant in a composite email displayseveral times and still be considered unread. Until the participantacknowledges reading that email, it is not deemed to be read. In oneembodiment, the EEP 104 will not automatically move a conversation emailout of the Inbox 501 into another folder until that conversation emailhas been acknowledged as having been read.

When viewing the composite email display, Mary may perform any number ofoperations. These operations may include, for example, acknowledgingreading zero, one, or both of the new emails. If Mary acknowledgesreading a new email, then the information in the email conversation datastructure pertaining to that new email is updated to indicate that thatnew email has now been read. Also, Mary may invoke a user interfacecomponent to activate or deactivate the automatic email movementfeature. In addition, Mary may invoke a user interface component tospecify a particular folder into which all emails pertaining to thisemail conversation are to be moved. For example, Mary may create a newfolder under the Conversation Email folder 506 named “Annual SalesConference-2007” and instruct the EEP 104 to move all of theconversation emails that have been read for this email conversation intothat folder. If such a folder is specified, then the email conversationdata structure is updated to include a reference to that folder. Marymay perform these and other operations. At some point, Mary will befinished viewing the composite email, and will close the compositeemail.

When the composite email is closed (thereby causing all of theindividual conversation emails to be closed), the EEP 104 performs anumber of tasks. In one embodiment, these tasks include the following.Upon the closing of the composite email, the EEP 104 determines whetherthe automatic email movement feature has been activated. If not, thenthe EEP 104 simply leaves the emails pertaining to this emailconversation in their current folder(s) (presumably, the ConversationEmail subfolder 503 of the Inbox 501). However, if the automatic emailmovement feature has been activated, then the EEP 104 accesses the emailconversation data structure for this email conversation, and determineswhether a particular folder has been specified in that data structure asbeing the folder into which all emails for this email conversation areto be moved. If a folder is specified in the email conversation datastructure, then that folder will be used. If a folder is not specifiedin the email conversation data structure, then the EEP 104 may ask Mary(e.g. through a user prompt) to specify a folder into which all emailsfor this email conversation are to be moved. At that point, Mary cannavigate through the folder structure shown in FIG. 5 and select anexisting folder under the Conversation Email folder 506. Alternatively,Mary can create a new folder under the Conversation Email folder 506 andinstruct the EEP 104 to move the emails pertaining to this emailconversation into that folder. As a further alternative, Mary caninstruct the EEP 104 to create a new folder under the Conversation Emailfolder 506 and move the emails pertaining to this email conversationinto that folder. If Mary specifies a particular folder, then thatfolder will be used (and the email conversation data structure will beupdated to include a reference to that folder). If Mary does not specifya particular folder, then the EEP 104 will use a default folder. Forexample, the General subfolder 507 under the Conversation Email folder506 may be used as the default folder for all conversation emails inwhich the participant (Mary in the current example) is named as aprimary recipient or a sender. The CC subfolder 508 may be used as thedefault folder for all conversation emails in which the participant isnamed as a CC or BCC recipient.

In addition to determining the proper folder into which the conversationemails are to be moved, the EEP 104 also determines which emails in theemail conversation should be moved. In one embodiment, the EEP 104 usesthe email conversation data structure to make this determination.Specifically, the EEP 104 inspects the email conversation data structureto determine which of the emails referenced in the data structure havebeen read (as noted above, once an email is acknowledged as having beenread, its information in the email conversation data structure isupdated to indicate that it has been read). For each email in the emailconversation that has been read, the EEP 104 automatically moves thatemail into the proper folder. If the email is already in the properfolder, then no movement is needed. The EEP 104 repeats this processuntil all read emails in the email conversation have been automaticallymoved to the proper folder. Thus, by the end of this process, allconversation emails pertaining to this email conversation that have beenread will be stored in the proper folder. The next time a conversationemail pertaining to this email conversation is opened, read, and closed,it will also be automatically moved from the Inbox 501 into the properfolder. Thus, without requiring any effort on the part of theparticipant (other than specifying the proper folder once for an emailconversation), read emails in an email conversation are automaticallymoved into a certain folder. This automatic email movement feature, whenactivated, can serve to significantly reduce the amount of clutter in anemail inbox.

In the examples given above, emails are described as being moved out ofthe Inbox 501 into another folder. It should be noted that this was forillustrative purposes only. The automatic email movement feature neednot be applied only to emails in the Inbox 501. Rather, if so desired,it can be used to automatically move emails from any folder or foldersinto any other folder or folders. All possible applications are withinthe scope of the present invention.

Archiving of Conversation Emails

As discussed previously, an email conversation may comprise manyindividual emails, all associated with a unique identifier which is usedto collect all the related content together in a single composite email.Over time, as the number of individual emails increases, archivingemails in an email conversation is a method of reducing this growingnumber of emails from being actively processed, resulting in fasterprocessing and more efficient use of computing power and memory. In oneembodiment, after an email in an email conversation is archived, it isno longer processed when a composite email for that email conversationis generated; thus, its content is no longer displayed in the compositeemail display.

In one embodiment, conversation emails may be archived in two ways:partial archive and full archive. A partial archive is applied to asubset of the individual emails comprising an email conversation and maybe executed by a participant or by the administrator, while a fullarchive may be executed only by the administrator and archives allindividual emails comprising an email conversation.

A partial archive may be initiated by any participant for his set ofemails by opening an email in the email conversation, thereby causing acomposite email to be generated, and activating a particular command. Inone embodiment, the participant may specify particular criteria, whichmay, for example, include a date. These criteria determine which of theemails in the email conversation are to be archived. For example, if adate is specified, then all emails in the email conversation that weresent prior to that date should be archived. As an alternative, or inaddition to, a user may select individual emails for partial archiving.In response to the partial archive command, the EEP 104 archives allindividual emails in the email conversation that satisfy the specifiedcriteria (or that have been selected to be archived). These emails aremoved to a specified archive folder (for example, one of the archivesubfolders 518-523 in FIG. 5). In addition, the email conversation datastructure is updated to indicate that these emails are now archived.That way, the next time the EEP 104 uses the email conversation datastructure to generate a composite email, it will not extract contentfrom these archived emails.

A partial archive may also be initiated by the administrator of theemail conversation, making the partial archive effective for allparticipants in the email conversation including himself. In oneembodiment, to do so, the administrator invokes an EEP 104 to open oneof the emails in the email conversation, which will cause a compositeemail for the email conversation to be generated. While viewing thecomposite email, the administrator may invoke a set of administratorcommands to implement a partial archive. As part of this process, theadministrator may specify certain criteria, such as a date, which willbe used to determine which emails in the email conversation should bearchived. As an alternative, or in addition to, the administrator mayselect individual emails in the composite email display for partialarchiving. After the criteria are specified and/or individual emails areselected, the administrator instructs the EEP 104 to send out a “PartialArchive Notice” email to all of the participants of the emailconversation. In one embodiment, this email contains the specifiedcriteria and/or information indicating which individual emails have beenselected for partial archiving, and all other information needed toimplement the partial archiving (for example, the email may include oneor more archiving instructions). It also carries the unique identifierfor the email conversation.

When the “Partial Archive Notice” email is received and opened by aparticipant, it will be processed like other emails in the emailconversation. Specifically, opening the email will cause an EEP 104 usedby the participant to generate a composite email for the emailconversation. That EEP 104 will recognize the email as a “PartialArchive Notice” email. In one embodiment, the partial archiving iscarried out when the participant closes the composite email. In responseto the participant closing the composite email, the EEP 104 proceeds toarchive all of the individual emails in the email conversation thatsatisfy the criteria specified in the “Partial Archive Notice” email orthat correspond to the individual emails specified in the “PartialArchive Notice” email. This archiving may be carried in the same manneras that described above in connection with participant-initiated partialarchiving. Specifically, the emails to be archived are moved to aspecified archive folder (for example, one of the archive subfolders518-523 in FIG. 5). In addition, the email conversation data structureis updated to indicate that these emails are now archived. That way, thenext time the EEP 104 uses the email conversation data structure togenerate a composite email, it will not extract content from thesearchived emails. Once that is done, partial archiving is complete. Noadditional effort is required from the participant.

In one embodiment, the administrator's “Partial Archive Notice” emailoverrides any previously established partial archives by theparticipants. This operates to “undo” a participant's partial archive,and then execute the administrator's specified partial archive. Theadministrator's “Partial Archive Notice” partially archives the emailconversation for the administrator also, in the same way it partiallyarchives the email conversation for the other participants. Once theadministrator issues a “Partial Archive Notice” to all of theparticipants in the email conversation, all participants then have anidentical view of the same email conversation, because the sameindividual emails in the email conversation have been archived for allparticipants, regardless of what the participant may have partiallyarchived previously.

In one embodiment, a participant may reset the dates for partiallyarchiving the individual emails, and completely undo any other partialarchive. By executing his own partial archive command, the participant'spartial archive will be in effect until overridden by the next partialarchive initiated by the administrator, or the user himself.

In normal displays, searches, and reports associated with an emailconversation, when the participant accesses an email conversation, thepartially archived emails resident in the archive folder are notaccessed unless the participant so instructs. In one embodiment, when anemail conversation is opened for display, the participant may specifypartially archived individual emails to be included in the compositeemail display. For example, the participant may request partiallyarchived emails to be displayed: (1) up to a participant specified date,or (2) within a range of dates, or (3) no date limits, to include allindividual emails. The specification by the participant may be madeeffective whenever the email is opened, or made effective for thatparticular display only. Similarly, when executing a report or a searchwithin emails, the participant is provided an option to include one,some or all partially archived emails and the report or the results ofthe search reflect both active individual emails and partially archivedindividual emails.

In one embodiment, only an administrator can fully archive an emailconversation. The email conversation, identified by the uniqueidentifier, is fully archived when the administrator decides to “closeout” the email conversation. When an email conversation is fullyarchived, all the individual emails associated with the uniqueidentifier are moved into an archive folder. As part of fully archivingan email conversation, the authorities of all the participants aremodified so that no participant will any longer be able to respond tothe email conversation or receive any emails pertaining to the emailconversation; in effect, the email conversation is permanently closed.

In one embodiment, the administrator may fully archive an emailconversation by creating and sending a “Full Archive Notice” email toone or more of the participants of the email conversation. If theadministrator sends out the notice to one or more, but not all, of theparticipants of the email conversation, then the participants thatreceive the email will, in effect, be closed out of any further activityin the email conversation. They will not be able to send any replies tothe email conversation and they will not be able to receive any emailspertaining to the email conversation. If the “Full Archive Notice” emailis sent to all of the participants of the email conversation, then theemail conversation will be fully closed and no participant will be ableto send or receive any further emails in the email conversation.

In one embodiment, when the “Full Archive Notice” email is received andopened by a participant, it will be processed like other emails in theemail conversation. Specifically, opening the email will cause an EEP104 used by the participant to generate a composite email for the emailconversation. That EEP 104 will recognize the email as a “Full ArchiveNotice” email. In one embodiment, the full archiving is carried out whenthe participant closes the composite email. In response to theparticipant closing the composite email, the EEP 104 proceeds to archiveall of the individual emails in the email conversation. This may entail,for example, moving all of the emails in the email conversation to aspecified archive folder (for example, one of the archive subfolders518-523 in FIG. 5). In addition, the EEP 104 changes all of theauthorities of all of the participants to indicate that none of theparticipants can any longer send or receive email pertaining to thisemail conversation. By doing so, the EEP 104 effectively closes out theemail conversation for that participant. When all of the participants inthe email conversation have opened the “Full Archive Notice” email, theoverall email conversation will be fully closed. This is true even forthe administrator. After an email conversation is fully archived, eventhe administrator will no longer be able to send or receive emailspertaining to that email conversation.

In one embodiment, the administrator may schedule the full archiving bydesignating, in the “Full Archive Notice” email, a specific time atwhich the full archiving is to take place. This allows time for theemail conversation participants to exchange some last minute emails ifthey so desire. For example, the administrator could, in the “FullArchive Notice” email, specify that the full archiving will take placeat a certain time in the future. Before that exact time, everyparticipant has an opportunity to participate in the email conversationand continue all email activities in accordance with the authorizationgiven to them. At the time specified by the administrator, without anyintervention or effort by a participant or the administrator, the fullarchiving will be implemented for the email conversation.

According to an embodiment, an email conversation may be deleted onlyafter it has been fully archived, as described above. Once an emailconversation is fully archived, it can be selected from an archivefolder and deleted. In one embodiment, the deleted email moves to theDeleted subfolder 515, and if deleted again from this folder, the emailis removed from any further access.

Labels

In many situations, an email user may receive a large number of newemails at one time. For example, if a user has been away on vacation anddid not have access to email during the vacation, the user may return toan inbox with a large number of new emails. With the high volume ofemails, the user may have difficulty finding the important emails thatrequire immediate attention. For example, the user may have an importantemail from the president of the company but that email may be buried inthe middle of the rest of the emails. Because of this, the user may notsee or respond to the email in a timely fashion.

To help the user sift through a large number of emails and pick out theones that he is interested in, one embodiment of the present inventionintroduces the notion of a “label”. A label may be thought of as asorting mechanism. Each label has a set of one or more filteringcriteria associated therewith, and each label may be used as a bin or abucket to store references to emails that meet the specified filteringcriteria. Examples of filtering criteria include but are not limited to:email address of sender, domain name of sender's email address, keywords in subject field or body of email, date email was sent, whether anattachment was attached to the email, etc.

In one embodiment, a label is different from a folder. A folder is acontainer within which one or more emails are stored. For example, theInbox 501 (FIG. 5) is a folder and one or more emails are stored withinthe Inbox folder 501. In contrast, a label is not used to store anemail. Rather, a label stores a reference to an email. The email remainsin the folder (e.g. the Inbox 501) in which it is stored. The label juststores a reference to that email in that particular folder.

To illustrate how labels may be used in accordance with one embodimentof the present invention, reference will be made to the example shown inFIG. 5. In the following example, for the sake of simplicity, only a fewlabels are shown. It should be noted, however, that the presentinvention may accommodate any number of labels. As shown in FIG. 5, aset of labels is specified within a labels portion 505 of a display (thelabels portion 505 is named “IMPORTANT NEW EMAILS” in the currentexample). These labels include a President label, a Company Email label,and a Family label. As noted above, each label has a set of filteringcriteria associated therewith. In this example, the filtering criterionfor the President label may be the email address of the president of thecompany (this will cause emails sent by the president of the company tobe captured by the label). The filtering criterion for the Company Emaillabel may be the domain name of the company (this will cause emails sentby people having the company's domain name in their email address to becaptured by the label; this label will basically capture allintra-company emails). The filtering criteria for the Family label maybe the email addresses of the user's family members (this will causeemails sent by family members to be captured by the label). In thecurrent example, the labels are applied to the Inbox 501; thus, thefiltering criteria of the labels will be applied to the emails (bothread and unread, and both conversation and regular) that are stored inthe Inbox 501.

To illustrate how the labels may be populated with information,reference will be made to the following example which, in oneembodiment, would be implemented by an EEP 104. As emails are receivedby the EEP 104, if they are not classified as bulk mail, they are storedin the Inbox folder 501. Suppose now that the Inbox 501 contains anemail from the president of the company. This email satisfies thefiltering criterion of the President label; thus, a reference to thisemail will be stored in association with the President label. This emailalso satisfies the filtering criterion of the Company Email label(assuming the president sent the email using his work email address).Thus, a reference to this email will also be stored in association withthe Company Email label (note: the email references stored in variouslabels need not be mutually exclusive; put another way, multiple labelsmay store the same reference to the same email in the same folder).

Suppose that the Inbox 501 also contains an email from a co-worker. Thisemail satisfies the filtering criterion of the Company Email label(assuming the co-worker sent the email using his work email address).Thus, a reference to this email will be stored in association with theCompany Email label. Suppose further that the Inbox 501 further containsan email from the user's spouse. This email satisfies the filteringcriteria of the Family label. Thus, a reference to this email will bestored in association with the Family label. Finally, suppose that theInbox 501 further contains an email sent by a friend who is not thepresident of the company or a co-worker. This email would not satisfythe filtering criteria for any of the labels. Thus, a reference to thisemail would not be stored in association with any of the labels. As thisexample shows, the labels separate the emails in the Inbox 501 intodefined groups. From these groups, the user will be able to easilyselect the emails in which he is interested.

When the user activates one of the labels, (e.g. by clicking on the nameof the label), information pertaining to all of the emails in the Inbox501 that satisfy the filtering criteria for that label will bedisplayed. This may include both read and unread emails. Thus, if theuser clicks on the President label, information pertaining to all of theemails in the Inbox 501 that were sent by the president of the companywould be displayed. When information pertaining to an email isdisplayed, the user may instruct the EEP 104 to open that email. At thatpoint, the EEP 104 would access the email in the Inbox 501 and open it.If the email is a regular email, it is opened in the usual manner. Ifthe email is a conversation email, then some special processing may needto be performed. This will be elaborated upon in a later section.

A GUI element (n) may be displayed next to each label, as shown. Thenumber represented by the n within the parenthesis indicates the numberof unread emails associated with that label. For example, if thePresident label stores references to ten emails in the Inbox 501 butonly five of those emails are unread, then the (n) displayed next to thePresident label would be shown as (5). In one embodiment, a GUI element(n) may be activated, for example by clicking on the number within theparenthesis. When a GUI element (n) is activated, the EEP 104 will: (1)determine which emails are referenced by the label that is associatedwith the particular GUI element (n) that has been activated; (2)determine which of those emails are unread; and (3) display informationpertaining to only those unread emails to the user. For example, byselecting the display element (n) next to the President label, a usercan cause only the unread emails in the Inbox folder 501 that are fromthe president of the company to be displayed. By activating a GUIelement (n) alongside a label, a user can view only the unread emailsreferenced by that label without being distracted/hampered by thepreviously read emails that are also referenced by that label.

As noted above, when a conversation email is opened via a label, somespecial processing may need to be performed. To illustrate thisprocessing, reference will be made to the following example. Supposethat the Conversation Email subfolder 503 of the Inbox 501 currentlycontains four new conversation emails pertaining to a certain emailconversation. One of these emails is from the president of the company,and the other three are from various other participants. Given thisscenario, the President label will comprise a reference to the new emailfrom the president of the company.

Suppose now that the user activates the GUI element (n) next to thePresident label. This will cause information pertaining to the new emailsent by the president of the company to be displayed. Suppose furtherthat the user instructs the EEP 104 to open that new email. As describedpreviously, opening an email in an email conversation usually causes allof the emails in the email conversation to be opened. This would includeboth previously opened emails and previously unopened emails. Thus,under normal circumstances, opening the new email from the presidentwould also cause the other three new emails to be opened. However, inthis case, the new email from the president is being opened from thePresident label. That being the case, the user may not want to see allnew emails in the email conversation but rather only new emails from thepresident. Put another way, the user may want to see only the new emailsin the email conversation that meet the specified criteria for thelabel.

To determine the user's wishes, the EEP 104, in one embodiment, asks theuser whether the user wants to view all new emails in the emailconversation or just new emails that meet the specified criteria for thelabel. If the user indicates that he wishes to see all new emails in theemails conversation, then the EEP 104 will operate in the mannerpreviously described. Specifically, the EEP 104 will open all of theemails in the email conversation (including the new email from thepresident, the other three new emails, and previously opened emails) andgenerate a composite email for the email conversation. On the otherhand, if the user indicates that he wishes to view only new emails inthe email conversation that meet the specified criteria for the label,then the EEP 104 will open only those new emails, along with previouslyopened emails in the email conversation, and use the informationextracted therefrom to generate the composite email. In the currentexample, this would mean that the EEP 104 would open only the new emailsent by the president (and not the other three emails sent by the otherparticipants), along with previously opened emails in the emailconversation, and generate a composite email for the email conversationfrom the information extracted therefrom. By excluding the other newemails from the composite email, the EEP 104 allows the user to focus onjust the new emails that meet the specified criteria for the label, andprevents the user from being distracted by the other new emails in theemail conversation.

In the manner described above, emails may be classified using labels,and may be accessed through labels.

Sequential Emails and Attachments

Often, there are situations where proposals, drafts, reviews, paperforms or applications are checked sequentially by one staff person, thenanother and then another, and finally by a ranked person who makes afinal decision. For example, an application for employment may requirethe submission of various papers, certificates, and so on. One staffperson checks the application for completeness, including signature, ofall required materials. The next person may attach a credit reportobtained by use of the applicant's social security number, anotherperson calls previous employers for references, and so on. Eachsubsequent step requires some effort, and the effort may be wasted ifthe previous step is not completed and approved. Hence, because ofdependence of each step on the previous step, the steps are completedsequentially.

In one embodiment, a sequential attachment approach allows for asequential work flow, as described above. Using an EEP 104, anadministrator prepares an initial email to create an email conversation,and while attaching one or more files, the administrator defines the oneor more attached files as a sequential attachment. The administratorthen specifies (a) a list of recipients that are to review theattachment in sequence, and (b) the recipients' sequence of review. Forexample, a person in the personnel department of a company may create anemail conversation that includes an attached employment application as aPDF file attachment. It could be in the form of a PDF form completed bythe applicant from any remote location, or a paper form that thepersonnel department scans and converts into a PDF file. The entireapplicant's information is included in the attachment and a header formto be completed by three staff persons with their comments is also addedas a first page to the attachment. The administrator (creator) of theemail conversation attaches the PDF file, specifies the attachment andemail conversation as sequential, and lists the three recipients by whomthe form must be reviewed and in what order, and sends the email. Whenthe email is sent, the EEP 104 used by the administrator determines thatthe email conversation is sequential, determines who the firstdesignated recipient should be, and sends the initial email to just thatrecipient (recall that the initial email is actually sent as a pluralityof emails (e.g. text email, recipient list email, and attachment email).

When the first recipient, using an EEP 104, opens one of the emails, theEEP 104 generates a composite email in the manner described previouslyand displays the composite email to the recipient. The recipient checksthe attachment for completeness and signature, writes comments in thetext area of the composite email display and/or in the first page of thePDF file, which may be an attachment or a link to a file on thecorporate website, approves it and simply sends it out as a reply. Whenthe reply is sent, the EEP 104 used by the recipient determines that thecurrent email conversation is sequential, determines who the nextrecipient should be, and sends the reply to that recipient. In oneembodiment, the reply is also sent to the administrator, who canautomatically have the progress of the sequential email conversationmonitored.

When the second recipient, using an EEP 104, opens the reply, the EEP104 generates a composite email in the manner described previously anddisplays the composite email to the second recipient. That recipientperforms his designated task and makes his entry in the form, and sendsout another reply. When this reply is sent, the EEP 104 used by thesecond recipient determines that the current email conversation issequential, determines who the next recipient should be, and sends thereply to that recipient. Again, the reply is also sent to theadministrator. At each step, the recipients may make their finalassessments known in the text area of the composite email display,noting any exceptions, or delays, or additional useful comments. Eachsubsequent recipient of the email conversation may determine from thisinformation whether the previous person has approved the application sofar, and the recipient may either proceed with his assigned function, orsend the email conversation back to the administrator for action, forexample in the form of a text side mail with a question or comment inthe text area. When the problem is resolved, the administrator can senda reply to the text side mail asking for the review to continue. Thus,exceptions can be dealt with, approvals and comments can be made, andthe administrator can stop or re-start the email sequence at any time,without losing the entries in the PDF attachment, and without losing thehistory of comments in the email conversation.

In a final step, when all three recipients have recorded and emailedtheir approvals, the administrator may enter another recipient on thelist, for example, a department head who will make the decision to hire,and then send out the completed employment application for a finaldecision.

In another example, an applicant may send a form or request, and aseries of procedural steps performed by more than one person arerequired to process the form or request, such as: employmentapplications, insurance applications and insurance claims, school orcollege admission applications, applications for opening bank accounts,applications to government regulatory agencies for permits, licenses,approvals, and so on. In other examples, documents may need to bereviewed in sequence, such as the following: a legal contract may bereviewed by several junior lawyers before final preparation by a seniorlawyer and approval by a firm's partner; a student's thesis may bereviewed by peers and junior professors before a final review by adepartment head; and finally, an agenda for a forthcoming meeting may bereviewed by several members of a committee before a final decision madeby the committee chairperson.

In one embodiment, a sequential flow of email conversation replieswithout any attachment may be designated. Each recipient in the emailconversation, starting with the first, sends a reply which automaticallygoes to the next person on the list as well as to the administrator, andthe next person receiving the reply sends a reply that goes to the nextperson on the list as well as to the administrator; a reply to anotherrecipient would not be permitted. An administrator may resend the emailto anyone else, whether on the recipient list or not, and then have thatrecipient follow a defined sequence.

In one embodiment, a sequence may comprise a list of recipients in aprescribed order or groups of recipients where the prescribed order maybe, for example, any one recipient in the first group followed by anyone recipient in the second group followed by any one recipient in thethird group, and so on. A group may be any number of recipients. Optionsmay be defined that also allow an administrator to specify a sequencefor the email flow by defining any one recipient in a group followed byall recipients in the next group in a pre-determined order, or by alwayshaving the email sent back to the administrator where the administratormay then determine which recipient should get any particular email forthe next part of the sequence. These and otherenhancements/modifications are within the scope of the presentinvention.

Reminders

As described previously, one or more reminders may be associated with anemail. A reminder may be associated with an email by opening an emailand associating a reminder with a certain portion of the email. Areminder may also be associated with the overall email itself, with orwithout opening the email. For each reminder, a user may optionallyspecify a reminder date and optionally provide some reminder text (theuser has to provide at least one of these). The reminder date is used toalert the user of past reminders, current reminders, and upcomingreminders. The reminder text provides some additional context for thereminder (this is in addition to the email with which the reminder isassociated). Some examples of text reminders with dates are: “Reply withrevised attachment file—by Jan. 15, 2006”, “Send these photographs toJeremy—by Jan. 16, 2006”, “Send agenda for Project Meeting—Jan. 22,2006”; other examples of text reminders without dates are: “Send mycomments on the draft to all in project team”, “Make appointment withPurchase Manager of XYZ Company and inform John”, and “Call Jane to setup lunch soon”. The reminders described herein can be linked to acalendar of appointments and notes that are not part of the EEP 104. Auser can plan his work by combining tasks such as meetings,appointments, and so on from a calendar with the tasks and otherreminders (examples given in this section) that arise out of emailcorrespondence, and by using various reports and displays (by heading,by current day, by next day, by week, etc) to see the calendar plusemail reminders together. All the tasks, activities, etc. from thecalendar as well as reminders from emails can be linked from the EEP104, so the user can plan comprehensive work agendas for himself.

FIG. 6 shows how reminders may be presented by an EEP 104 to a user inaccordance with one embodiment of the present invention. FIG. 6 is amore detailed drawing of the box labeled 517 in FIG. 5. In FIG. 6, thetitle “MY REMINDERS” 601 is a user defined title for the reminderssection of the display. A user has options to name this section inaccordance with the user's own choice of words. Some other examples fortitles are: “Important Reminders”, “Email Reminders”, “My PriorityList”, and “My Deadlines”. The title and the features (described below)available under this title may be applied to any of the folders shown inFIG. 5.

The reminders section 517 comprises a plurality of headings 602, whichact as column headings, and a plurality of rows 606. Each rowcorresponds to a particular folder. For example, one row may correspondto the General Subfolder 507 of FIG. 5, while another row may correspondto the Deleted subfolder 515. Each heading 602 has a date oriented ruleassociated therewith. Depending on the date associated with a reminder,and the folder in which the email associated with that reminder isstored, the reminder will be slotted under one of the headings in one ofthe rows.

There are several possible ways that the user may want to organize hisreminders: by date, by day of week, and other useful ways to state dayssuch as: today, tomorrow, this week, next week, and so on. The user cancreate any number of headings 602, naming them in a meaningful mannerand associating a mathematical operation with each heading to operate onthe date specified in the reminders. For example, heading1 may belabeled “Today” and may have a mathematical operation associatedtherewith that captures emails with reminders that have a reminder datethat falls on the current date. Heading 2 may be labeled “Tomorrow” andmay have a mathematical operation associated therewith that capturesemails with reminders that have a reminder date that falls on thecurrent date plus one day. The user has great freedom in naming theheadings 602 and associating mathematical operations with the headings.

The symbol [#] 603 shows the number of emails that have reminders in thefolder corresponding to a particular row, and matching the mathematicalformula under the user-defined heading. For example, if a particularfolder has one email that has a reminder, and that reminder has a datethat falls under heading1, then the [#] shown for the row thatcorresponds to that folder in the heading1 column will be [1]. Thedisplay of [#] 603 will be a number 1 or greater than 1. If the userclicks on a particular [#], then only the emails that have remindersfrom the associated folder will be displayed along with the reminderassociated with the email; other emails of the folder will not bedisplayed. If the user clicks on (n) 604 associated with any heading602, then all the emails with reminders from all the folders under thatheading are displayed—in effect, all the emails in all the [#]'s underthat heading are displayed; other emails from the folders are notdisplayed. The display shows emails in ascending or descending order ofdate received as specified by the user. If the user has made thereminder without a date, the user will need to create one heading wherethe date operation is not used. The first three examples in the tablethat will be discussed below show headings where the date is notspecified in the reminder.

As noted above, when a user clicks on a particular [#] 603, all theemails having reminders in the associated folder and matching the datebased rule of the heading are displayed; along with each emaildisplayed, the entire reminder is displayed (multiple reminders in casea user has made more than one reminder), with the reminder text and thereminder date. The display indicates if the reminder was made afteropening the email, and if so, the user can, by clicking on thisindicator, go directly to the point of the email where the user made thereminder. An option is provided to see the other reminders in thisfolder—across all headings. Finally, the user is provided an option toopen the conversation email. If the user opens the email, the reminderis also conveniently displayed in a bubble for the entire time the userkeeps the email open. Thus, the user can, in the same display, view theconversation email, the position in the email where the reminder wasmade, and the reminder itself.

Adjacent to the title “MY REMINDERS” 601 is a GUI element (n) 604. ThisGUI element (n) 604 can be clicked upon to display all the emails thathave reminders, across all folders and grouped logically by heading.Thus, clicking (n) 604 alongside the title 601 displays all the emailswith reminders across all folders, grouped by heading. Clicking on (n)604 associated with a particular heading 602 gives a display of allreminders in emails across all folders, but pertaining to thatparticular heading only and no other heading. Finally, clicking on (#)under a heading displays reminders of emails for only the folderassociated with (#) as shown across, and only for that heading, and noother folder and no other heading.

The user has several options to name the headings, and associate a datebased rule with the heading. The user is provided with an option toinclude a day or date or both in the heading display. For example, aheading of “Today” could be followed by “Mon 1/15” or “Jan 15”, and“Tomorrow” followed by “1/16” or “Tues Jan 16”, and so on. Severalexamples of defining headings and the mathematical rules used toidentify the date used in the note are listed below in the tables. Inthe reminder, the user enters the date associated with the reminder(time is an additional option), whereas the heading contains the rulefor using the entered date. Shown below are several examples of usingthe entered date in various headings.

User Defined Heading Date Based Rule to be Applied (1) Important, WorkNo date operand Important, Personal No date operand My To Do List Nodate operand Do ASAP No date operand Today Current date Tomorrow CurrentDate + 1 Day After Tomorrow Current Date + 2 Next Day Current Date + 3Today or Tomorrow Current Date or (Current Date + 1) Next Day CurrentDate + 4 Next Day Current Date + 5 Next 3 Days (Current Date + 1) or(Current Date + 2) or (Current Date + 3) Next 5 Days Same as above forDates +1 to +5 Next 6-10 Days Same as above for Dates +6 to +10 Next11-15 Days Same as above for Dates +11 to +15 Next 16-30 Days Same asabove for Dates +16 to +30 Past Due 1 Day Current Date − 1 Past Due 2Days Current Date − 2 Past Due 3 Days Current Date − 3 Past Due 4 DaysCurrent Date − 4 Past Due 5 Days Current Date − 5 Past Due > 2 DaysEarlier than Current Date − 2 Past Due > 3 Days Earlier than CurrentDate − 3 Past Due > 4 Days Earlier than Current Date − 4 Past Due > 5Days Earlier than Current Date − 5

In the above examples under, Today is defined as Current Date, andchanges dynamically the next day, and every day thereafter.

Another way the user can name the headings and define rules is by usingdays of the week, as shown below. In this example, the user sets up twoweeks: current week and next week; and on every Monday (or otheruser-defined day of the week), the current and next week are redefined,with the previous next week moving into the current week category, and anew set of seven days forming next week.

(2) Monday Monday in Current Week Tuesday Tuesday in Current WeekWednesday Wednesday in Current Week Thursday Thursday in Current WeekFriday Friday in Current Week This Weekend Saturday or Sunday in CurrentWeek Next Monday Monday in Next Week Next Tuesday Tuesday in Next WeekNext Wednesday First Wednesday in Next Week Next Thursday Thursday inNext Week Next Friday Friday in Next Week Next Weekend Saturday orSunday in Next Week

The number of headings 602 available for the user to define is limitedonly by the user's display size (monitor screen size, font size, and soon). In addition, the user can define some headings from (1) above andsome from (2) above, depending on the user's own particular needs. Inall cases, the user has options to add the day and date in the displayof headings, if the user so wishes.

As mentioned above, the reminder has a date field associated with it.This date field can be used in any mathematical operation. Some of theuseful rules are shown above. As shown in the figures seen together(FIG. 5+FIG. 6), the [#] used to indicate the number of emails withreminders is displayed for emails in Drafts folders 513 because the usermay wish to add a reminder to the draft email contained in the Draftfolder. Reminders may also be displayed for deleted emails in theDeleted folder 515—to remind the user that a valid reminder exists in adeleted email. If the user creates a reminder for an email, the remindermoves with the email, as the email may be moved by the user from onefolder to another.

Hardware Overview

FIG. 7 is a block diagram that illustrates a computer system 700 uponwhich an embodiment of the invention may be implemented. Computer system700 includes a bus 702 or other communication mechanism forcommunicating information, and a processor 704 coupled with bus 702 forprocessing information. Computer system 700 also includes a main memory706, such as a random access memory (RAM) or other dynamic storagedevice, coupled to bus 702 for storing information and instructions tobe executed by processor 704. Main memory 706 also may be used forstoring temporary variables or other intermediate information duringexecution of instructions to be executed by processor 704. Computersystem 700 further includes a read only memory (ROM) 708 or other staticstorage device coupled to bus 702 for storing static information andinstructions for processor 704. A storage device 710, such as a magneticdisk or optical disk, is provided and coupled to bus 702 for storinginformation and instructions.

Computer system 700 may be coupled via bus 702 to a display 712, such asa cathode ray tube (CRT), for displaying information to a computer user.An input device 714, including alphanumeric and other keys, is coupledto bus 702 for communicating information and command selections toprocessor 704. Another type of user input device is cursor control 716,such as a mouse, a trackball, or cursor direction keys for communicatingdirection information and command selections to processor 704 and forcontrolling cursor movement on display 712. This input device typicallyhas two degrees of freedom in two axes, a first axis (e.g., x) and asecond axis (e.g., y), that allows the device to specify positions in aplane.

The invention is related to the use of computer system 700 forimplementing the techniques described herein. According to oneembodiment of the invention, those techniques are performed by computersystem 700 in response to processor 704 executing one or more sequencesof one or more instructions contained in main memory 706. Suchinstructions may be read into main memory 706 from anothermachine-readable medium, such as storage device 710. Execution of thesequences of instructions contained in main memory 706 causes processor704 to perform the process steps described herein. In alternativeembodiments, hard-wired circuitry may be used in place of or incombination with software instructions to implement the invention. Thus,embodiments of the invention are not limited to any specific combinationof hardware circuitry and software.

The term “machine-readable medium” as used herein refers to any mediumthat participates in providing data that causes a machine to operationin a specific fashion. In one embodiment implemented using computersystem 700, various machine-readable media are involved, for example, inproviding instructions to processor 704 for execution. Such a medium maytake many forms, including but not limited to, non-volatile media,volatile media, and transmission media. Non-volatile media includes, forexample, optical or magnetic disks, such as storage device 710. Volatilemedia includes dynamic memory, such as main memory 706. Transmissionmedia includes coaxial cables, copper wire and fiber optics, includingthe wires that comprise bus 702. Transmission media can also take theform of acoustic or light waves, such as those generated duringradio-wave and infra-red data communications. All such media must betangible to enable the instructions carried by the media to be detectedby a physical mechanism that reads the instructions into a machine.

Common forms of machine-readable media include, for example, a floppydisk, a flexible disk, hard disk, magnetic tape, or any other magneticmedium, a CD-ROM, any other optical medium, punchcards, papertape, anyother physical medium with patterns of holes, a RAM, a PROM, and EPROM,a FLASH-EPROM, any other memory chip or cartridge, a carrier wave asdescribed hereinafter, or any other medium from which a computer canread.

Various forms of machine-readable media may be involved in carrying oneor more sequences of one or more instructions to processor 704 forexecution. For example, the instructions may initially be carried on amagnetic disk of a remote computer. The remote computer can load theinstructions into its dynamic memory and send the instructions over atelephone line using a modem. A modem local to computer system 700 canreceive the data on the telephone line and use an infra-red transmitterto convert the data to an infra-red signal. An infra-red detector canreceive the data carried in the infra-red signal and appropriatecircuitry can place the data on bus 702. Bus 702 carries the data tomain memory 706, from which processor 704 retrieves and executes theinstructions. The instructions received by main memory 706 mayoptionally be stored on storage device 710 either before or afterexecution by processor 704.

Computer system 700 also includes a communication interface 718 coupledto bus 702. Communication interface 718 provides a two-way datacommunication coupling to a network link 720 that is connected to alocal network 722. For example, communication interface 718 may be anintegrated services digital network (ISDN) card or a modem to provide adata communication connection to a corresponding type of telephone line.As another example, communication interface 718 may be a local areanetwork (LAN) card to provide a data communication connection to acompatible LAN. Wireless links may also be implemented. In any suchimplementation, communication interface 718 sends and receiveselectrical, electromagnetic or optical signals that carry digital datastreams representing various types of information.

Network link 720 typically provides data communication through one ormore networks to other data devices. For example, network link 720 mayprovide a connection through local network 722 to a host computer 724 orto data equipment operated by an Internet Service Provider (ISP) 726.ISP 726 in turn provides data communication services through the worldwide packet data communication network now commonly referred to as the“Internet” 728. Local network 722 and Internet 728 both use electrical,electromagnetic or optical signals that carry digital data streams. Thesignals through the various networks and the signals on network link 720and through communication interface 718, which carry the digital data toand from computer system 700, are exemplary forms of carrier wavestransporting the information.

Computer system 700 can send messages and receive data, includingprogram code, through the network(s), network link 720 and communicationinterface 718. In the Internet example, a server 730 might transmit arequested code for an application program through Internet 728, ISP 726,local network 722 and communication interface 718.

The received code may be executed by processor 704 as it is received,and/or stored in storage device 710, or other non-volatile storage forlater execution. In this manner, computer system 700 may obtainapplication code in the form of a carrier wave.

In the foregoing specification, embodiments of the invention have beendescribed with reference to numerous specific details that may vary fromimplementation to implementation. Thus, the sole and exclusive indicatorof what is the invention, and is intended by the applicants to be theinvention, is the set of claims that issue from this application, in thespecific form in which such claims issue, including any subsequentcorrection. Any definitions expressly set forth herein for termscontained in such claims shall govern the meaning of such terms as usedin the claims. Hence, no limitation, element, property, feature,advantage or attribute that is not expressly recited in a claim shouldlimit the scope of such claim in any way. The specification and drawingsare, accordingly, to be regarded in an illustrative rather than arestrictive sense.

1. A machine implemented method, comprising: receiving user input from auser; in response to the user input, accessing a particular electronicmail message (email) that is part of an email conversation, wherein theemail conversation spans across a plurality of separate emails, and allemails that are part of the email conversation have a unique identifierassociated therewith; extracting the unique identifier from theparticular email; accessing, based at least partially upon the uniqueidentifier, an email conversation data structure that is associated withthe email conversation, the email conversation data structure containinginformation indicating which emails are part of the email conversation;accessing at least a subset of the emails that are indicated by theemail conversation data structure as being part of the emailconversation; automatically generating a composite email which includescontent from the particular email and the subset of emails; extracting,from the particular email or one of the emails in the subset of emails,authorization information indicating what the user can and/or cannot dowith respect to the email conversation; and enforcing any restrictionsindicated by the authorization information to ensure that the user isnot allowed to perform any operation with respect to the emailconversation for which the user has not been authorized; wherein themethod is performed by one or more computing devices.
 2. The method ofclaim 1, wherein the particular email is an email that has not beenpreviously accessed, and wherein the method further comprises: updatingthe email conversation data structure to indicate that the particularemail is part of the email conversation.
 3. The method of claim 2,wherein the particular email has a sub-identifier associated therewithwhich uniquely identifies the particular email within the emailconversation, and wherein updating the email conversation data structurecomprises: updating the email conversation data structure withinformation obtained from the sub-identifier.
 4. The method of claim 3,wherein the information obtained from the sub-identifier comprises: (a)an indication of which participant in the email conversation sent theparticular email; and (b) a sequence indicator indicating an order inwhich the particular email was sent by that participant relative toother emails sent by that participant in the email conversation.
 5. Anon-signal machine readable storage medium having stored thereoninstructions, which when executed by one or more processors, cause theone or more processors to perform the method of claim
 4. 6. The methodof claim 3, wherein the information obtained from the sub-identifiercomprises: (a) an indication of an email type for the particular email;(b) an indication of which participant in the email conversation sentthe particular email; and (c) a sequence indicator indicating an orderin which the particular email was sent by that participant relative toother emails of the same email type sent by that participant in theemail conversation.
 7. The method of claim 1, further comprising:determining whether any previously unaccessed emails have the uniqueidentifier associated therewith; and in response to a determination thatone or more previously unaccessed emails have the unique identifierassociated therewith, updating the email conversation data structure toindicate that the one or more previously unaccessed emails are part ofthe email conversation.
 8. The method of claim 7, wherein each of theone or more previously unaccessed emails has a sub-identifier associatedtherewith which uniquely identifies that email within the emailconversation, and wherein updating the email conversation data structurecomprises: updating the email conversation data structure withinformation obtained from the sub-identifier of each of the one or morepreviously unaccessed emails.
 9. The method of claim 8, wherein theinformation obtained from the sub-identifier of each of the one or morepreviously unaccessed emails comprises: (a) an indication of whichparticipant in the email conversation sent that previously unaccessedemail; and (b) a sequence indicator indicating an order in which thatpreviously unaccessed email was sent by that participant relative toother emails sent by that participant in the email conversation.
 10. Anon-signal machine readable storage medium having stored thereoninstructions, which when executed by one or more processors, cause theone or more processors to perform the method of claim
 9. 11. The methodof claim 8, wherein the information obtained from the sub-identifier ofeach of the one or more previously unaccessed emails comprises: (a) anindication of an email type for that previously unaccessed email; (b) anindication of which participant in the email conversation sent thatpreviously unaccessed email; and (c) a sequence indicator indicating anorder in which that previously unaccessed email was sent by thatparticipant relative to other emails of the same email type sent by thatparticipant in the email conversation.
 12. The method of claim 1,wherein the email conversation data structure comprises a set ofinformation for each email that is part of the email conversation, andwherein the set of information for each email comprises: (a) anindication of which participant in the email conversation sent thatemail; and (b) a sequence indicator indicating an order in which thatemail was sent by that participant relative to other emails sent by thatparticipant in the email conversation.
 13. A non-signal machine readablestorage medium having stored thereon instructions, which when executedby one or more processors, cause the one or more processors to performthe method of claim
 12. 14. The method of claim 1, wherein the emailconversation data structure comprises a set of information for eachemail that is part of the email conversation, and wherein the set ofinformation for each email comprises: (a) an indication of an email typefor that email; (b) an indication of which participant in the emailconversation sent that email; and (c) a sequence indicator indicating anorder in which that email was sent by that participant relative to otheremails of the same email type sent by that participant in the emailconversation.
 15. The method of claim 1, wherein the email conversationdata structure comprises a set of information for each email that ispart of the email conversation, and wherein the set of information foreach email comprises information indicating whether that email should beaccessed and content extracted therefrom the next time the compositeemail is generated.
 16. A non-signal machine readable storage mediumhaving stored thereon instructions, which when executed by one or moreprocessors, cause the one or more processors to perform the method ofclaim
 15. 17. The method of claim 1, wherein enforcing comprises:receiving an indication that the user wishes to perform a particularoperation with respect to the email conversation; determining, based atleast partially upon the authorization information, whether the user isauthorized to perform the particular operation; and in response to adetermination that the user is not authorized to perform the particularoperation, disallowing performance of the particular operation.
 18. Anon-signal machine readable storage medium having stored thereoninstructions, which when executed by one or more processors, cause theone or more processors to perform the method of claim
 17. 19. The methodof claim 1, wherein enforcing comprises: determining, based at leastpartially upon the authorization information, one or more operationsthat the user is not authorized to perform with respect to the emailconversation; and deactivating one or more user interface components toprevent the user from performing the one or more operations.
 20. Anon-signal machine readable storage medium having stored thereoninstructions, which when executed by one or more processors, cause theone or more processors to perform the method of claim
 19. 21. The methodof claim 1, wherein the authorization information is extracted from arecipient list email that specifies a list of participants participatingin the email conversation, and wherein the list of participants isextracted from the recipient list email and included in a recipient listportion of the composite email.
 22. The method of claim 21, wherein theemail conversation comprises a text email containing a text message, andwherein the text message is extracted from the text email and includedin a text portion of the composite email.
 23. The method of claim 22,wherein the email conversation comprises a subheading email containing asub topic to be discussed in the email conversation, and wherein the subtopic is extracted from the subheading email and included in asubheading portion of the composite email.
 24. The method of claim 23,wherein the email conversation comprises a header email containingheader information for the email conversation, wherein the headerinformation comprises an overall topic to be discussed in the emailconversation, and wherein the header information is extracted from theheader email and included in a header portion of the composite email.25. The method of claim 24, wherein the header information furthercomprises information indicating which participant in the emailconversation initiated the email conversation, and informationindicating when the email conversation was initiated.
 26. The method ofclaim 22, wherein the email conversation comprises an attachment emailcomprising attachment information, wherein the attachment informationcomprises one or more attached files to be associated with the emailconversation and information describing the one or more attached files,and wherein at least the information describing the one or more attachedfiles is extracted from the fourth attachment email and included in anattachments portion of the composite email.
 27. The method of claim 24,wherein the sub topic contained in the subheading email is a sub topicunder the overall topic contained in the header email.
 28. The method ofclaim 1, wherein a first email and a second email are part of the emailconversation, wherein the first email is a first recipient list emailthat specifies a first list of participants participating in the emailconversation, wherein the second email is a second recipient list emailthat specifies a revised list of participants participating in the emailconversation, wherein the revised list of participants is extracted fromthe second email, and wherein only the revised list of participants, andnot the first list of participants, is included in a recipient listportion of the composite email.
 29. The method of claim 1, wherein theemail conversation data structure indicates that a certain email is partof the email conversation, wherein the email conversation data structurecontains indication information indicating whether the certain emailshould be accessed when generating the composite email, and whereinaccessing at least a subset of the emails that are indicated by theemail conversation data structure as being part of the emailconversation comprises: determining, based upon the indicationinformation in the email conversation data structure, whether thecertain email should be accessed when generating the composite email; inresponse to a determination that the certain email should not beaccessed, foregoing accessing of the certain email; and in response to adetermination that the certain email should be accessed, accessing thecertain email so that the certain email is included as one of the subsetof emails.
 30. A non-signal machine readable storage medium havingstored thereon instructions, which when executed by one or moreprocessors, cause the one or more processors to perform the method ofclaim
 29. 31. The method of claim 1, wherein the email conversation datastructure contains one or more selection criteria which can be used todetermine which emails in the email conversation should be accessed whengenerating a composite email, and wherein accessing at least a subset ofthe emails that are indicated by the email conversation data structureas being part of the email conversation comprises: applying the one ormore selection criteria to the emails in the email conversation todetermine which emails in the email conversation should be accessed whengenerating the composite email for the email conversation.
 32. Anon-signal machine readable storage medium having stored thereoninstructions, which when executed by one or more processors, cause theone or more processors to perform the method of claim
 31. 33. The methodof claim 1, wherein the email conversation data structure contains userinterface information indicating one or more user preferences fordisplaying content included in the composite email, and whereinautomatically generating the composite email comprises: applying the oneor more user preferences in the user interface information to thecontent from the particular email and subset of emails to give rise to acustomized display for the composite email.
 34. The method of claim 1,wherein the email conversation data structure indicates that a certainemail is part of the email conversation, and wherein the method furthercomprises: receiving further user input indicating that the user doesnot wish to see content from the certain email in the composite email;and in response to the further user input, storing a set of indicationinformation in the email conversation data structure to indicate thatthe certain email should not be accessed in the future, the indicationinformation causing the content from the certain email to not beincluded in the composite email when the composite email is generated inthe future.
 35. A non-signal machine readable storage medium havingstored thereon instructions, which when executed by one or moreprocessors, cause the one or more processors to perform the method ofclaim
 34. 36. The method of claim 1, further comprising: receiving a setof one or more selection criteria from the user, the set of selectioncriteria indicating which emails in the email conversation the userwishes to see in the composite email; and storing the set of selectioncriteria in the email conversation data structure, wherein the set ofselection criteria will be used in the future when generating thecomposite email to cause only those emails in the email conversationthat satisfy the set of selection criteria to be accessed and contentextracted therefrom.
 37. A non-signal machine readable storage mediumhaving stored thereon instructions, which when executed by one or moreprocessors, cause the one or more processors to perform the method ofclaim
 36. 38. The method of claim 1, further comprising: receiving a setof one or more user interface preferences from the user indicating howthe user wishes content in the composite email to be displayed; andstoring the set of user interface preferences in the email conversation,wherein the user interface preferences will be applied to the contentincluded in the composite email when the composite email is generated inthe future.
 39. The method of claim 1, wherein the authorizationinformation is extracted from a recipient list email that specifies allparticipants in the email conversation and what each participant canand/or cannot do with respect to the email conversation, and wherein therecipient list email can be sent only by an initiator of the emailconversation or by a participant who has been granted authority by theinitiator of the email conversation to send recipient list emails. 40.The method of claim 1, wherein a set of participants are participatingin the email conversation, and wherein the method further comprises:receiving an indication that the user wishes to send a new email in theemail conversation; composing the new email, wherein the new email hasthe unique identifier associated therewith; sending the new email to theset of participants; and updating the email conversation data structurewith information pertaining to the new email, thereby causing the emailconversation data structure to indicate that the new email is part ofthe email conversation.
 41. The method of claim 40, wherein composingthe new email comprises: generating a sub-identifier for the new email,the sub-identifier comprising an indication that the user originated thenew email and a sequence indicator, wherein the sequence indicatorindicates an order in which the new email was sent by the user relativeto other emails sent by the user in the email conversation; andincluding the sub-identifier in the new email.
 42. The method of claim41, wherein updating the email conversation data structure comprises:storing information obtained from the sub-identifier, including theindication that the user originated the new email and the sequenceindicator, into the email conversation data structure.
 43. A non-signalmachine readable storage medium having stored thereon instructions,which when executed by one or more processors, cause the one or moreprocessors to perform the method of claim
 42. 44. The method of claim40, wherein composing the new email comprises: generating asub-identifier for the new email, the sub-identifier comprising anindication that the user originated the new email, an email type for thenew email, and a sequence indicator, wherein the sequence indicatorindicates an order in which the new email was sent by the user relativeto other emails of the same email type sent by the user in the emailconversation; and including the sub-identifier in the new email.
 45. Themethod of claim 44, wherein updating the email conversation datastructure comprises: storing information obtained from thesub-identifier, including the indication that the user originated thenew email, the email type for the new email, and the sequence indicator,into the email conversation data structure.
 46. The method of claim 1,wherein the particular email or one of the emails in the subset ofemails is a markup side mail which includes a set of markup informationand an indication that the markup side mail is associated with a certainemail that is part of the email conversation, wherein the certain emailmay be the particular email or one of the emails in the subset ofemails, and wherein generating the composite email comprises: applyingthe markup information in the markup side mail to the content from thecertain email to show one or more markups made to the certain email by aparticipant that sent the markup side mail.
 47. A non-signal machinereadable storage medium having stored thereon instructions, which whenexecuted by one or more processors, cause the one or more processors toperform the method of claim
 46. 48. The method of claim 1, furthercomprising: receiving an indication that the user wishes to access apartial archive email that is part of the email conversation, thepartial archive email comprising archiving information indicating whichemails in the email conversation should be archived; accessing thepartial archive email; processing the archiving information to determinea set of emails to be archived; and updating the email conversation datastructure to indicate that the set of emails to be archived should notbe accessed in the future when the composite email for the emailconversation is generated, thereby causing the composite email to nolonger include content from the set of emails to be archived.
 49. Themethod of claim 48, further comprising: moving the set of emails to bearchived to an archive container.
 50. A non-signal machine readablestorage medium having stored thereon instructions, which when executedby one or more processors, cause the one or more processors to performthe method of claim
 48. 51. The method of claim 1, wherein a set ofparticipants are participating in the email conversation, and whereinthe method further comprises: receiving an indication that the userwishes to access a full archive email that is part of the emailconversation, the full archive email indicating that the emailconversation should be closed; accessing the full archive email; andrevoking all authorities granted to all of the participants in the emailconversation to prevent all participants from sending or receiving anyfurther emails in the email conversation, thereby closing the emailconversation.
 52. The method of claim 51, further comprising: moving allemails in the email conversation to an archive container.
 53. Anon-signal machine readable storage medium having stored thereoninstructions, which when executed by one or more processors, cause theone or more processors to perform the method of claim
 51. 54. Anon-signal machine readable storage medium having stored thereoninstructions, which when executed by one or more processors, cause theone or more processors to perform the method of claim
 1. 55. A machineimplemented method, comprising: receiving input from a user to start anew email conversation, the input comprising a recipient list whichspecifies the participants who will be participating in the new emailconversation, and authorization information indicating what eachparticipant can and/or cannot do with respect to the new emailconversation; generating a unique identifier for the new emailconversation; composing a recipient list email, wherein composingcomprises: including, in the recipient email, the unique identifier, therecipient list, and the authorization information indicating what eachparticipant can and/or cannot do with respect to the new emailconversation; generating a recipient list sub-identifier for therecipient list email which uniquely identifies the recipient list emailwithin the new email conversation, the recipient list sub-identifiercomprising: (a) indication information indicating that it was the userwho sent the recipient list email; and (b) a sequence indicatorindicating an order in which the recipient list email was sent by theuser relative to other emails sent by the user in the new emailconversation; and including the recipient list sub-identifier in therecipient list email; sending the recipient list email to theparticipants of the new email conversation; and updating a new emailconversation data structure with information pertaining to the recipientlist email including the indication information and the sequenceindicator from the recipient list sub-identifier, wherein the new emailconversation data structure is associated with the unique identifier andhence, the new email conversation, and wherein the new emailconversation data structure stores information pertaining to all emailsthat are part of the new email conversation; wherein the method isperformed by one or more computing devices.
 56. The method of claim 55,wherein the unique identifier comprises information indicating that itwas the user who started the new email conversation and a sequenceindicator indicating how many email conversations have been started bythe user.
 57. The method of claim 55, wherein the input from the userfurther comprises an initial text message, and wherein the methodfurther comprises: composing a text email, wherein the text emailcomprises the unique identifier and the initial text message; sendingthe text email to the participants of the new email conversation;updating the new email conversation data structure with informationpertaining to the text email.
 58. The method of claim 57, whereincomposing the text email comprises: generating a text sub-identifier forthe text email which uniquely identifies the text email within the newemail conversation, the text sub-identifier comprising: (a) indicationinformation indicating that it was the user who sent the text email; and(b) a sequence indicator indicating an order in which the text email wassent by the user relative to other emails sent by the user in the newemail conversation; and including the text sub-identifier in the textemail; and wherein updating the new email conversation data structurewith information pertaining to the text email comprises: storing atleast the indication information and the sequence indicator from thetext sub-identifier in the new email conversation data structure.
 59. Anon-signal machine readable storage medium having stored thereoninstructions, which when executed by one or more processors, cause theone or more processors to perform the method of claim
 58. 60. The methodof claim 57, wherein composing the text email comprises: generating atext sub-identifier for the text email which uniquely identifies thetext email within the new email conversation, the text sub-identifiercomprising: (a) an email type for the text email; (b) indicationinformation indicating that it was the user who sent the text email; and(c) a sequence indicator indicating an order in which the text email wassent by the user relative to other emails of the same email type sent bythe user in the new email conversation; and including the textsub-identifier in the text email; and wherein updating the new emailconversation data structure with information pertaining to the textemail comprises: storing at least the email type, the indicationinformation, and the sequence indicator from the text sub-identifier inthe new email conversation data structure.
 61. The method of claim 57,wherein the input from the user further comprises an overall topic ofdiscussion for the new email conversation and a subheading under theoverall topic, and wherein the method further comprises: composing asubheading email, wherein the subheading email comprises the uniqueidentifier and the subheading under the overall topic; sending thesubheading email to the participants of the new email conversation; andupdating the new email conversation data structure with informationpertaining to the subheading email.
 62. The method of claim 61, whereincomposing the subheading email comprises: generating a subheadingsub-identifier for the subheading email which uniquely identifies thesubheading email within the new email conversation, the subheadingsub-identifier comprising: (a) indication information indicating that itwas the user who sent the subheading email; and (b) a sequence indicatorindicating an order in which the subheading email was sent by the userrelative to other emails sent by the user in the new email conversation;and including the subheading sub-identifier in the subheading email; andwherein updating the new email conversation data structure withinformation pertaining to the subheading email comprises: storing atleast the indication information and the sequence indicator from thesubheading sub-identifier in the new email conversation data structure.63. The method of claim 61, wherein composing the subheading emailcomprises: generating a subheading sub-identifier for the subheadingemail which uniquely identifies the subheading email within the newemail conversation, the subheading sub-identifier comprising: (a) anemail type for the subheading email; (b) indication informationindicating that it was the user who sent the subheading email; and (c) asequence indicator indicating an order in which the subheading email wassent by the user relative to other emails of the same email type sent bythe user in the new email conversation; and including the subheadingsub-identifier in the subheading email; and wherein updating the newemail conversation data structure with information pertaining to thesubheading email comprises: storing at least the email type, theindication information, and the sequence indicator from the subheadingsub-identifier in the new email conversation data structure.
 64. Anon-signal machine readable storage medium having stored thereoninstructions, which when executed by one or more processors, cause theone or more processors to perform the method of claim
 61. 65. The methodof claim 57, wherein the input from the user further comprisesinformation pertaining to one or more attachments to be attached to thenew email conversation, and wherein the method further comprises:composing an attachment email, wherein the attachment email comprisesthe unique identifier, the information pertaining to the one or moreattachments, and the one or more attachments themselves; sending theattachment email to the participants of the new email conversation; andupdating the new email conversation data structure with informationpertaining to the attachment email.
 66. The method of claim 65, whereincomposing the attachment email comprises: generating an attachmentsub-identifier for the attachment email which uniquely identifies theattachment email within the new email conversation, the attachmentsub-identifier comprising: (a) indication information indicating that itwas the user who sent the attachment email; and (b) a sequence indicatorindicating an order in which the attachment email was sent by the userrelative to other emails sent by the user in the new email conversation;and including the attachment sub-identifier in the attachment email; andwherein updating the new email conversation data structure withinformation pertaining to the attachment email comprises: storing atleast the indication information and the sequence indicator from theattachment sub-identifier in the new email conversation data structure.67. The method of claim 65, wherein composing the attachment emailcomprises: generating an attachment sub-identifier for the attachmentemail which uniquely identifies the attachment email within the newemail conversation, the attachment sub-identifier comprising: (a) anemail type for the attachment email; (b) indication informationindicating that it was the user who sent the attachment email; and (c) asequence indicator indicating an order in which the attachment email wassent by the user relative to other emails of the same email type sent bythe user in the new email conversation; and including the attachmentsub-identifier in the attachment email; and wherein updating the newemail conversation data structure with information pertaining to theattachment email comprises: storing at least the email type, theindication information, and the sequence indicator from the attachmentsub-identifier in the new email conversation data structure.
 68. Anon-signal machine readable storage medium having stored thereoninstructions, which when executed by one or more processors, cause theone or more processors to perform the method of claim
 65. 69. The methodof claim 55, wherein the recipient list sub-identifier for the recipientlist email further comprises an email type for the recipient list email,and wherein the email type for the recipient list email is stored in thenew email conversation data structure as part of updating the new emailconversation data structure with information pertaining to the recipientlist email.
 70. A non-signal machine readable storage medium havingstored thereon instructions, which when executed by one or moreprocessors, cause the one or more processors to perform the method ofclaim 55.