Managing an electronic mail in a communication network

ABSTRACT

A method, a system and a computer program product for managing an electronic mail in a communication network is disclosed. A plurality of recursive parameters in a command list of a communication protocol associated with the electronic mail is provided. At least one of the recursive parameters is a DATA parameter specifying information of the electronic mail. The command list is partitioned into a plurality of command sub-lists using the plurality of recursive parameters. At least one property corresponding to each of the command sub-lists is preserved. An interface for selecting each of the command sub-lists is provided and at least one of the command sub-lists is selected. At least one property corresponding to each of the command sub-lists is identified.

BACKGROUND OF THE INVENTION

Simple Mail Transfer Protocol (SMTP) is an Internet standard forelectronic mail (hereinafter referred to as e-mail) transmission acrossInternet Protocol (IP) networks. While electronic mail servers and othermail transfer agents use SMTP to send and receive mail messages,user-level client mail applications typically use SMTP for sendingmessages to a mail server. Client applications may use the Post OfficeProtocol (POP) or the Internet Message Access Protocol (IMAP) to accesstheir mail box accounts on a mail server.

SMTP is a relatively simple, text-based protocol, in which a mail sendercommunicates with a mail receiver by issuing simple command strings andsupplying necessary data over a reliable ordered data stream channel,typically a Transmission Control Protocol (TCP) connection. An SMTPsession includes a series of commands or a list of commands initiated bythe SMTP client and responses from an SMTP server through which the SMTPsession is opened. In the SMTP session, operating parameters are alsoexchanged, recipients are specified, and possibly verified, and amessage is transmitted before the session is closed. The originatinghost of a message is either an end-user's e-mail client also known asmail user agent (MUA), or a relay server's mail transfer agent (MTA).

SMTP was designed as an electronic mail transport and delivery protocol,and as such it is used between SMTP systems that are operational on acontinuous basis. POP and IMAP are preferred protocols when a user'spersonal computer is only intermittently powered up, or Internetconnectivity is only transient and hosts cannot receive messages duringoff-line periods.

Current SMTP protocol allows for one parameter “DATA” used in a commandlist irrespective of whether it is an initial e-mail or aforwarded/reply-with-history e-mail. So, when a user sends a forwardede-mail along with the user's own e-mail and/or does areply-with-history, the entire content including the user's own text issent as a single message.

BRIEF SUMMARY OF THE INVENTION

Aspects of the invention are directed to a method, a system, and acomputer program product for managing an electronic mail in acommunication network.

According to one aspect of the invention, a method for managing anelectronic mail in a communication network is disclosed. The methodincludes providing a plurality of recursive parameters in a command listof a communication protocol associated with the electronic mail, whereinat least one of the recursive parameters is a DATA parameter specifyinginformation of the electronic mail and partitioning the command listinto a plurality of command sub-lists using the plurality of recursiveparameters. The communication protocol is at least one of a Simple MailTransfer Protocol, Post Office Protocol or Internet Message AccessProtocol. The method further includes preserving at least one property(e.g., cipher) corresponding to each of the command sub-lists. The atleast one property is selected from a set including an encryption key, adigital signature, a return receipt, a priority, a confidentiality and amood stamp corresponding to each of the command sub-lists. The methodfurther includes providing an interface for selecting each of thecommand sub-lists, selecting at least one of the command sub-lists, andidentifying the at least one property corresponding to each of thecommand sub-lists

BRIEF DESCRIPTION THE DRAWINGS

Embodiments of the present invention are described in detail below, byway of example only, with reference to the following schematic drawings,where:

FIG. 1 shows a high-level conventional schematic of an electronic mailnetwork.

FIG. 2A schematically illustrates a conventional SMTP command listcorresponding to the electronic mail network of FIG. 1.

FIG. 2B schematically illustrates a conventional user interfacecorresponding to the SMTP command list shown in FIG. 2A.

FIG. 3A schematically illustrates an SMTP command list corresponding tothe electronic mail network of FIG. 1, according to an exemplaryembodiment of the invention.

FIG. 3B schematically illustrates a user interface corresponding to theSMTP command list of FIG. 3A, according to an exemplary embodiment ofthe invention.

FIG. 4 shows a process for managing an electronic mail in acommunication network, according to an embodiment of the invention.

FIG. 5 shows a detailed schematic of a computer system used for managingan electronic mail in a communication network, as shown in FIG. 4.

DETAILED DESCRIPTION OF THE INVENTION

Aspects of the invention describe, in various exemplary embodiments, asystem, a method and a computer program product for managing anelectronic mail in a communication network.

FIG. 1 shows a high-level conventional schematic of an electronic mailnetwork 100. FIG. 1 depicts a sender 102 (henceforth referred to as“arr”) with an e-mail address address ‘arr@gamma1.com’. Arr 102 has sentan e-mail to a recipient 104 (henceforth referred to as “user1”) with ane-mail address ‘user1@theta.com’. User1, in turn has forwarded thee-mail with possibly some additional message, to a recipient 106(henceforth referred to as “Smith”) with an e-mail address‘Smith@Alpha.ARPA’. Smith 106 wishes to send the e-mail with possiblysome addition, to three recipients: a recipient 108 (henceforth referredto as “Jones”) with an e-mail address ‘Jones@Beta.ARPA’, a recipient 110(henceforth referred to as “Green”) with an e-mail address‘Green@Beta.ARPA’ and a recipient 112 (henceforth referred to as“Brown”) with e-mail address ‘Brown@Beta.ARPA’. Recipients 106, 108, 110and 112 are configured to communicate via a communication network 114.

FIG. 2A illustrates a schematic of a conventional SMTP command list 202corresponding to an electronic mail in communication network 100 ofFIG. 1. Elements 204, 206, 208, and 210 are parts of command list 202.The elements 204 through 210 are created and shown in a manner for easyillustration, and as such are not in that format in the SMTP commandlist. Further, for illustration purposes here (not part of the SMTPprotocol), the commands in command list 202 are prefixed for theReceiver (R:) and the Sender (S:). Various elements 204 through 210, incommand list 202 depict various aspects of the conventional SMTP commandlist.

Some useful parameters or commands are listed next, for betterunderstanding of elements of command list 202. ‘MAIL FROM:<source emailaddress>’ is the start of an e-mail message. The source e-mail addressis what will appear in the “From:” field of the message. ‘RCPTTO:<destination e-mail address>’ identifies the recipient of the e-mailmessage. This command can be repeated multiple times for a given messagein order to deliver a single message to multiple recipients. The e-mailaddresses or their equivalents will appear in the “To:” field of themessage. A DATA parameter, also referred to as a DATA command, signifiesthat a stream of data, i.e. the e-mail message body, will follow.

Element 204 which is a part of command list 202 depicts the recipientsand the sender of an e-mail. The sender notifies the receiver of theoriginating e-mail address of the e-mail message in a ‘MAIL FROM’command. Command list 202 depicts that the e-mail message is being sentby Smith 106 of FIG. 1, to three mailboxes on the same SMTP server: oneeach for each recipient Jones 108, Green 110 and Brown 112 all ofFIG. 1. The corresponding SMTP command is ‘RCPT TO’. Each successfulreception and execution of a command is acknowledged by each of thee-recipients with a result code and response message (e.g., R:250 OK).

Element 206 is another component of command list 202, which depicts thatthe transmission of the body of the e-mail message initiated with a DATAcommand. Element 208 is the entire text message that Smith 106 issending to various recipients and may include the e-mail that Smithreceived from user1 104 and also from arr 102. Element 210 depicts thatthe e-mail message is terminated with a (<CRLF>.<CRLF>) with just asingle full stop (period) between the two <CRLF>. Between the first DATAcommand of element 206 and the <CRLF>.<CRLF> of element 210, thecomplete contents of the e-mail reside. So until the <CRLF>.<CRLF>command is received, the system will not perceive the intermediary ‘RCPTTO’ and ‘MAIL FROM’ commands as separate e-mails. They are essentiallyforwarded contents, in bulk.

FIG. 2B illustrates a schematic of a conventional user interface 222, asfound in the prior art, corresponding to conventional SMTP command list202 of FIG. 2A. User interface 222 depicts three elements, viz. anelement 224, an element 226 and an element 228. Element 224 depicts thelist of recipients of the e-mail message to be sent by sender Smith 106of FIG. 1. Element 224, therefore, enlists “To: Jones; Green; Brown”,corresponding to three ‘RCPT TO’ commands of element 204 of FIG. 2A.These recipients correspond to Jones 108, Green 110 and Brown 112, allthree of FIG. 1. Element 226 depicts ‘Subject: ABC’. Subject line ABC226 is text entered by Smith 106. Element 228 depicts the entire textentered by Smith 106, and if Smith forwards the e-mail received fromuser1 104, then element 228 also includes the entire e-mail trail fromarr 102 to user1 and from user1 to Smith. If Smith 106 intends toselectively forward the e-mail trail, conventionally, Smith would needto manually edit the entire e-mail trail.

If Smith 106 forwards the e-mail received from user1 104, then element228 also includes the entire e-mail trail from arr 102 to user1 and fromuser 1 to Smith. In conventional mode, for Smith 106, it may not bepossible to verify if e-mail from arr 102 to user1 104 was digitallysigned or not. A property, such as, ‘digital signature’ may not beverifiable in conventional mode of e-mail forwarding. Similarly, otherproperties, such as, for example, “encryption” may not be easily appliedand preserved for each of arr 102 and user1 104.

FIG. 3A illustrates a schematic of an SMTP command list 302 according toan exemplary embodiment of the invention. Elements 304, 306, 308, 310,312 and 314 are partitions of command list 302, termed hereinafter as‘command sub-lists’ of the command list, according to an embodiment ofthe invention. All of the command sub-lists will be individuallydescribed. Command list 302 is partitioned into these command sub-lists,304, 306, 308, 310, 312, and 314, using recursive parameters of thecommand list. A plurality of recursive parameters are provided, and inan exemplary mode, one of the recursive parameters is a DATA parameter.In conventional mode, there may be other parameters that are included inthe plurality of recursive parameters, such as, for example, ‘RCPT TO’,however conventionally there is a single DATA parameter. Parameter ‘RCPTTO’ 307 is depicted as an exemplary recursive parameter. Introduction ofa plurality of DATA parameters, depicted as 309, facilitates bettermanaging of an electronic mail and is further described in detail below.RCPT TO 307 is a recursive parameter and is part of command sub-list304, command sub-list 310, and command sub-list 312. DATA parameter 309is a recursive parameter according to an embodiment of the invention andis part of command sub-lists 306, 310, and 312. For illustrationpurposes (not part of SMTP protocol), the commands in command list 302are prefixed for the Receiver (R:) and the Sender (S:). Various elementsin command list 302 depict various aspects of the conventional SMTPcommand list.

Command sub-list 304 identifies the recipients and the sender of theelectronic mail. The sender notifies the recipient of the originatinge-mail address of the message in a ‘MAIL FROM’ command. Command list 302depicts that the e-mail message is being sent by sender Smith 106 tothree mailboxes on the same SMTP server: one each for each recipientJones 108, Green 110 and Brown 112. The corresponding SMTP command is‘RCPT TO’. Each successful reception and execution of a command isacknowledged by each of the receivers with a result code and responsemessage (e.g., R:250 OK). Command sub-list 306 is another component ofcommand list 302, which depicts that the transmission of the body of thee-mail message is initiated with a DATA command and later is transmittedverbatim line by line. Command sub-lists 304 and 306 are similar toelements 204 and 206 of FIG. 2A.

Command sub-list 308 is a text message that sender Smith 106 is sendingto various recipients. Smith 106 intends to also include the e-mail thatSmith received from user1 104 and also from an 102. Just as before incommand list 202 of FIG. 2A, the complete contents of the e-mail residebetween the first DATA parameter of command sub-list 306 and the<CRLF>.<CRLF> of command sub-list 314. The system now will, unlike incommand list 202 of FIG. 2A, be able to identify multiple separatee-mails due to the intermediary ‘RCPT TO’ and ‘MAIL FROM’ commands inconjunction with the plurality of introduced DATA parameters, until the<CRLF>.<CRLF> command is received. What was part of the entire contentof element 208 of FIG. 2A, now can be split using second DATA parameterin command sub-list 310 and third DATA parameter in command sub-list312. By identifying the presence of MAIL FROM (user1 104) and RCPT TO(Smith 106) in command sub-list 310, the second DATA parameter enablesidentification of e-mail sent by user1 to Smith. Command sub-list 310also identifies text added by user1 104 to Smith 106. While user1 104has sent an e-mail to Smith 106, it is a forwarded e-mail from an 102.

Command sub-list 312 depicts the third instance of a DATA parameteralong with MAIL FROM (an 102) and RCPT TO (user1 104) parameters. Whatwas part of the entire content of element 208 (see FIG. 2A), now can befurther split using the third DATA parameter in command sub-list 312.Identifying the presence of MAIL FROM (an 102) and RCPT TO (user1 104)in command sub-list 312, the third DATA parameter enables identificationof mail sent by an to user1. Command sub-list 312 also identifies textadded by an 102 to user1 104.

Command sub-list 314 depicts that the e-mail message is terminated witha (<CRLF>.<CRLF>) with just a single full stop (period) between the two<CRLF>.

FIG. 3B illustrates a schematic of a user interface 322, according to anexemplary embodiment of the invention, corresponding to the SMTP commandlist 302 of FIG. 3A. User interface 322 depicts three elements 324, 326,328. Element 324 depicts the list of recipients of the e-mail message tobe sent by sender Smith 106. Element 324, therefore, enlists “Jones;Green; and Brown”, corresponding to three ‘RCPT TO’ commands of commandsub-list 304 of FIG. 3A. These recipients correspond to Jones 108, Green110 and Brown 112. Element 326 depicts ‘Subject: ABC’. Subject line ABC326 is text entered by Smith 106.

Element 328 depicts text element 308 a corresponding to text entered bySmith 106 in command sub-list 308 of FIG. 3A. Element 328 furtherdepicts elements 308 b (Smith_Prop1) and 308 c (Smith_Prop2) whichcorrespond to properties of command sub-list 308. Elements 330, 331 and332 are user interface elements, corresponding to command sub-list 308.Similarly, text element 310 a corresponds to text entered by user1 104in command sub-list 310 of FIG. 3A. Element 328 further depicts elements310 b (user1_Prop1) and 310 c (user1_Prop2) which correspond toproperties of command sub-list 310. Elements 340, 341 and 342 are userinterface elements, corresponding to command sub-list 310. Similarlyfurther, text element 312 a corresponds to text entered by an 102 incommand sub-list 312 of FIG. 3A. Element 328 further depicts elements312 b (arr_Prop1) and 312 c (arr_Prop2) that correspond to properties ofcommand sub-list 312. Elements 350, 351 and 352 are user interfaceelements, corresponding to command sub-list 312.

Property “Prop1” corresponding to elements 308 b, or 310 b or 312 b maybe, for example, a digital signature. Property “Prop2” corresponding toelements 308 c, or 310 c or 312 c may be, for example, an encryption.There are several other properties possible, such as, for example, areturn receipt, a priority, a confidentiality or a mood stamp. Elements330, 331, 332, 340, 341, 342, 350, 351, 352 are exemplary graphical userinterfaces (GUI). In an exemplary mode, GUI may be a checkbox, a radiobutton or a dropdown list. In the exemplary mode, elements 330, 340 and350 are radio button GUIs. In the exemplary mode, elements 331, 332,341, 342, 351 and 352 are checkbox GUIs.

If Smith 106 wishes to forward the e-mail received from user1 104, thenradio button GUI element 340 should be checked by Smith 106. If Smith106 intends to include digital signature property 310 b of user1 104,then checkbox GUI element 341 should be checked by Smith. If Smith 106intends to not include encryption property 310 c of user1 104, thencheckbox GUI element 342 should be left unchecked. Similarly, if text ofthe e-mail message from arr 102 to user1 104 is to be omitted, radiobutton GUI 350 should be left unchecked. If Smith 106 intends to senddigital signature and encryption to all the recipients for the e-mailfrom Smith 106, both the checkbox GUI elements 331 and 332 need to bechecked by Smith 106. This helps eliminate the need to manually edit anye-mail trail and enables preservation and inclusion of text and othere-mail properties related information, as needed. If encryption or/anddigital signature is/are forwarded in an e-mail sent by Smith 106, therecipients may be able to verify these properties. For instance, in thecase of the digital signature, the recipients may use the initialsender's public key.

FIG. 4 shows a flow chart illustrating a general process 400 formanaging an electronic mail in a communication network, according to anembodiment of the invention. By way of example, a user, such as Smith106 may have received a forwarded e-mail from user1 104, which in turnhas received and included an e-mail from arr 102. Smith 106 intends toforward the received e-mail with additional text to three recipients,Jones 108, Green 110 and Brown 112. Jones 108, Green 110 and Brown 112are communicatively coupled with Smith 106 in a communication networksimilar to communication network 114 of FIG. 1. Step 402 depictsproviding a plurality of recursive parameters in a command list 302 ofFIG. 3A of a communication protocol associated with the electronic mail,wherein at least one of the recursive parameters is a DATA parameter 309(FIG. 3A) specifying information of the electronic mail. Thecommunication protocol is at least one of SMTP, POPx or IMAP. There maybe other recursive parameters, such as, for example, “RCPT TO” 307 ofFIG. 3A. Step 404 depicts partitioning command list 302 into a pluralityof command sub-lists, such as, for example, 304, using the plurality ofrecursive parameters, such as, for example, DATA parameter 309.

Step 406 depicts preserving at least one property corresponding to eachof the e-mail command sub-lists. Two exemplary properties for commandsub-list corresponding to 310 of FIG. 3A are depicted as user1_Prop1 310b and user1_Prop2 310 c of FIG. 3B. In an exemplary mode, user1_Prop1310 b may be a digital signature of user1 104 and user1_Prop2310 c maybe encryption for e-mail content of user1. The property can be a ciphercorresponding to each of the command sub-lists. The property may be oneof, but not limited to, an encryption key, a digital signature, a returnreceipt, a priority, a confidentiality and a mood stamp corresponding toeach of the command sub-lists. Step 408 depicts providing an interfacefor selecting each of the command sub-lists. The interface in anexemplary mode can be a GUI. The GUI, in turn, may be one of, but notlimited to, a checkbox, a radio button, and a dropdown list. In anexemplary mode, GUI element radio button 340 of FIG. 3B is used toselect command sub-list 310 corresponding to the e-mail of user1 104.Step 410 depicts selecting at least one of the command sub-lists, andstep 412 shows identifying the at least one property corresponding toeach of the e-mail command sub-lists. In an exemplary mode, anencryption property 312 c of FIG. 3A, corresponding to command sub-list312 for the e-mail from an 102, can be identified using a checkbox 352of FIG. 3B corresponding to a GUI.

FIG. 5 is a block diagram of an exemplary computer system 500 that canbe used for implementing various embodiments of the present invention.In some embodiments, the computer system 500 can be used for managing anelectronic mail in a communication network, as shown in FIG. 3A and FIG.3B. In some other embodiments, the computer system 500 can be used toimplement the process for managing an electronic mail in a communicationnetwork, as shown in FIG. 4.

Computer system 500 includes a processor 504. It should be understoodalthough FIG. 5 illustrates a single processor, one skilled in the artwould appreciate that more than one processor can be included as needed.Processor 504 is connected to a communication infrastructure 502 (forexample, a communications bus, cross-over bar, or network) wherecommunication infrastructure 502 is configured to facilitatecommunication between various elements of the exemplary computer system500. Various software embodiments are described in terms of thisexemplary computer system. After reading this description, it willbecome apparent to a person of ordinary skill in the relevant art(s) howto implement the invention using other computer systems and/or computerarchitectures.

Exemplary computer system 500 can include a display interface 508configured to forward graphics, text, and other data from communicationinfrastructure 502 (or from a frame buffer not shown) for display on adisplay unit 510. Computer system 500 also includes a main memory 506,which can be random access memory (RAM), and may also include asecondary memory 512. Secondary memory 512 may include, for example, ahard disk drive 514 and/or a removable storage drive 516, representing afloppy disk drive, a magnetic tape drive, an optical disk drive, etc.Removable storage drive 516 reads from and/or writes to a removablestorage unit 518 in a manner well known to those having ordinary skillin the art. Removable storage unit 518, represents, for example, afloppy disk, magnetic tape, optical disk, etc. which is read by andwritten to by removable storage drive 516. As will be appreciated,removable storage unit 518 includes a computer usable storage mediumhaving stored therein computer software and/or data.

In exemplary embodiments, secondary memory 512 may include other similarmeans for allowing computer programs or other instructions to be loadedinto the computer system. Such means may include, for example, aremovable storage unit 522 and an interface 520. Examples of such mayinclude a program cartridge and cartridge interface (such as that foundin video game devices), a removable memory chip (such as an EPROM, orPROM) and associated socket, and other removable storage units 522 andinterfaces 520 which allow software and data to be transferred from theremovable storage unit to computer system 500.

Computer system 500 may also include a communications interface 524.Communications interface 524 allows software and data to be transferredbetween the computer system and external devices. Examples ofcommunications interface 524 may include a modem, a network interface(such as an Ethernet card), a communications port, a PCMCIA slot andcard, etc. Furthermore, aspects of the present invention may take theform of a computer program product embodied in one or more computerreadable medium(s) having computer readable program code embodiedthereon.

Any combination of one or more computer readable medium(s) may beutilized. The computer readable medium may be a computer readable signalmedium or a computer readable storage medium. A computer readablestorage medium may be, for example, but not limited to, an electronic,magnetic, optical, electromagnetic, infrared, or semiconductor system,apparatus, or device, or any suitable combination of the foregoing. Morespecific examples (a non-exhaustive list) of the computer readablestorage medium would include the following: an electrical connectionhaving one or more wires, a portable computer diskette, a hard disk, arandom access memory (RAM), a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM or Flash memory), an optical fiber,a portable compact disc read-only memory (CD-ROM), an optical storagedevice, a magnetic storage device, or any suitable combination of theforegoing. In the context of this document, a computer readable storagemedium may be any tangible medium that can contain, or store a programfor use by or in connection with an instruction execution system,apparatus, or device.

A computer readable signal medium may include a propagated data signalwith computer readable program code embodied therein, for example, inbaseband or as part of a carrier wave. Such a propagated signal may takeany of a variety of forms, including, but not limited to,electro-magnetic, optical, or any suitable combination thereof. Thesepropagated signals are provided to communications interface 524 via acommunications path (that is, channel) 526. A computer readable signalmedium may be any computer readable medium that is not a computerreadable storage medium and that can communicate, propagate, ortransport a program for use by or in connection with an instructionexecution system, apparatus, or device.

Program code embodied on a computer readable medium may be transmittedusing any appropriate medium, including but not limited to wireless,wireline, optical fiber cable, RF, etc., or any suitable combination ofthe foregoing. Computer program code for carrying out operations foraspects of the present invention may be written in any combination ofone or more programming languages, including an object orientedprogramming language such as Java, Smalltalk, C++ or the like andconventional procedural programming languages, such as the “C”programming language or similar programming languages. The program codemay execute entirely on the user's computer, partly on the user'scomputer, as a stand-alone software package, partly on the user'scomputer and partly on a remote computer or entirely on the remotecomputer or server. In the latter scenario, the remote computer may beconnected to the user's computer through any type of network, includinga local area network (LAN) or a wide area network (WAN), or theconnection may be made to an external computer (for example, through theInternet using an Internet Service Provider).

Advantages of various embodiments of the invention include selectiveforwarding of e-mails, without necessity of manual modifications.Advantages of various embodiments of the invention include preservingmultiple properties associated with e-mails, such as, for example,digital signature and encryption.

The described techniques may be implemented as a method, apparatus orarticle of manufacture involving software, firmware, micro-code,hardware such as logic, memory and/or any combination thereof. The term“article of manufacture” as used herein refers to code or logic andmemory implemented in a medium, where such medium may include hardwarelogic and memory [e.g., an integrated circuit chip, Programmable GateArray (PGA), Application Specific Integrated Circuit (ASIC), etc.] or acomputer readable medium, such as magnetic storage medium (e.g., harddisk drives, floppy disks, tape, etc.), optical storage (CD-ROMs,optical disks, etc.), volatile and non-volatile memory devices [e.g.,Electrically Erasable Programmable Read Only Memory (EEPROM), Read OnlyMemory (ROM), Programmable Read Only Memory (PROM), Random Access Memory(RAM), Dynamic Random Access Memory (DRAM), Static Random Access Memory(SRAM), flash, firmware, programmable logic, etc.]. Code in the computerreadable medium is accessed and executed by a processor. The medium inwhich the code or logic is encoded may also include transmission signalspropagating through space or a transmission media, such as an opticalfiber, copper wire, etc. The transmission signal in which the code orlogic is encoded may further include a wireless signal, satellitetransmission, radio waves, infrared signals, Bluetooth, the internetetc. The transmission signal in which the code or logic is encoded iscapable of being transmitted by a transmitting station and received by areceiving station, where the code or logic encoded in the transmissionsignal may be decoded and stored in hardware or a computer readablemedium at the receiving and transmitting stations or devices.Additionally, the “article of manufacture” may include a combination ofhardware and software components in which the code is embodied,processed, and executed. Of course, those skilled in the art willrecognize that many modifications may be made without departing from thescope of embodiments, and that the article of manufacture may includeany information bearing medium. For example, the article of manufactureincludes a storage medium having stored therein instructions that whenexecuted by a machine results in operations being performed.

Certain embodiments can take the form of an entirely hardwareembodiment, an entirely software embodiment or an embodiment containingboth hardware and software elements. In a preferred embodiment, theinvention is implemented in software, which includes but is not limitedto firmware, resident software, microcode, etc.

Furthermore, certain embodiments can take the form of a computer programproduct accessible from a computer usable or computer readable mediumproviding program code for use by or in connection with a computer orany instruction execution system. For the purposes of this description,a computer usable or computer readable medium can be any apparatus thatcan contain, store, communicate, propagate, or transport the program foruse by or in connection with the instruction execution system,apparatus, or device. The medium can be an electronic, magnetic,optical, electromagnetic, infrared, or semiconductor system (orapparatus or device) or a propagation medium. Examples of acomputer-readable medium include a semiconductor or solid state memory,magnetic tape, a removable computer diskette, a random access memory(RAM), a read-only memory (ROM), a rigid magnetic disk and an opticaldisk. Current examples of optical disks include compact disk-read onlymemory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.

The terms “certain embodiments”, “an embodiment”, “embodiment”,“embodiments”, “the embodiment”, “the embodiments”, “one or moreembodiments”, “some embodiments”, and “one embodiment” mean one or more(but not all) embodiments unless expressly specified otherwise. Theterms “including”, “comprising”, “having” and variations thereof mean“including but not limited to”, unless expressly specified otherwise.The enumerated listing of items does not imply that any or all of theitems are mutually exclusive, unless expressly specified otherwise. Theterms “a”, “an” and “the” mean “one or more”, unless expressly specifiedotherwise.

Elements that are in communication with each other need not be incontinuous communication with each other, unless expressly specifiedotherwise. In addition, elements that are in communication with eachother may communicate directly or indirectly through one or moreintermediaries. Additionally, a description of an embodiment withseveral components in communication with each other does not imply thatall such components are required. On the contrary a variety of optionalcomponents are described to illustrate the wide variety of possibleembodiments.

Further, although process steps, method steps or the like may bedescribed in a sequential order, such processes, methods and algorithmsmay be configured to work in alternate orders. In other words, anysequence or order of steps that may be described does not necessarilyindicate a requirement that the steps be performed in that order. Thesteps of processes described herein may be performed in any orderpractical. Further, some steps may be performed simultaneously, inparallel, or concurrently. Further, some or all steps may be performedin run-time mode.

When a single element or article is described herein, it will beapparent that more than one element/article (whether or not theycooperate) may be used in place of a single element/article. Similarly,where more than one element or article is described herein (whether ornot they cooperate), it will be apparent that a single element/articlemay be used in place of the more than one element or article. Thefunctionality and/or the features of an element may be alternativelyembodied by one or more other elements which are not explicitlydescribed as having such functionality/features. Thus, other embodimentsneed not include the element itself.

Computer program means or computer program in the present context meanany expression, in any language, code or notation, of a set ofinstructions intended to cause a system having an information processingcapability to perform a particular function either directly or aftereither or both of the following a) conversion to another language, codeor notation; b) reproduction in a different material form.

Although exemplary embodiments of the present invention have beendescribed in detail, it should be understood that various changes,substitutions and alternations could be made thereto without departingfrom spirit and scope of the inventions as defined by the appendedclaims. Variations described for exemplary embodiments of the presentinvention can be realized in any combination desirable for eachparticular application. Thus particular limitations, and/or embodimentenhancements described herein, which may have particular advantages to aparticular application, need not be used for all applications. Also, notall limitations need be implemented in methods, systems, and/orapparatuses including one or more concepts described with relation toexemplary embodiments of the present invention.

What is claimed is:
 1. A method for managing an electronic mail in acommunication network, the method comprising: providing a plurality ofrecursive parameters in a command list of a communication protocolassociated with the electronic mail, wherein at least one of therecursive parameters is a DATA parameter specifying information of theelectronic mail; partitioning, by a processor of a computer system, thecommand list into a plurality of command sub-lists using the pluralityof recursive parameters; preserving at least one property correspondingto each of the command sub-list, wherein the at least one propertycorresponding to each of the command sub-lists is selected from thegroup consisting of a cipher, an encryption key, a digital signature, areturn receipt, a priority, a confidentiality, a mood stamp, andcombinations thereof; providing a graphical user interface for selectingeach of the command sub-lists; receiving a selection of at least one ofthe command sub-lists via the graphical user interface; and identifyingthe at least one property corresponding to each of the selected commandsub-lists.
 2. The method of claim 1, wherein the communication protocolis selected from the group consisting of Simple Mail Transfer Protocol,Post Office Protocol, and Internet Message Access Protocol.
 3. Themethod of claim 1, wherein the electronic mail is from a current senderto a receiver, and wherein each command sub-list consists of at leastone text string, each text string being either (i) a sender-originatedtext string of a communication from the current sender to the receiverand prefixed by a sender symbol denoting that the sender-originated textstring originated from the sender or (ii) a receiver-originated textstring of a communication from the receiver to the current sender andprefixed by a receiver symbol denoting that the receiver-originated textstring originated from the receiver.
 4. The method of claim 3, whereineach recursive parameter is unique, and wherein each recursive parameterappears in at least one sender-originated text string in at least twocommand sub-lists of the plurality of command sub-lists.
 5. The methodof claim 1, wherein the plurality of command sub-lists comprise aplurality of message sub-lists which include messages from the currentsender to the receiver via the electronic mail, wherein the plurality ofmessage sub-lists comprises a body message sub-list and a firstpreceding message sub-list, wherein the body message sub-list comprisesa body of an electronic mail message in the electronic mail, wherein thefirst preceding message sub-list comprises a first preceding messagefrom a first preceding sender to the current sender, and wherein thebody of the electronic mail message and the first preceding message areincluded in the messages from the current sender to the receiver via theelectronic mail.
 6. The method of claim 5, wherein the plurality ofmessage sub-lists further comprises a second preceding message sub-list,wherein the second preceding message sub-list comprises a secondpreceding message from a second preceding sender to the first precedingsender, and wherein the second preceding message is included in themessages from the current sender to the receiver via the electronicmail.
 7. A computer program product, comprising a computer readablehardware storage device having computer readable program code storedtherein, said program code containing instructions configured to beexecuted by a processor of a computer system to implement a method formanaging an electronic mail in a communication network, the methodcomprising: said processor providing a plurality of recursive parametersin a command list of a communication protocol associated with theelectronic mail, wherein at least one of the recursive parameters is aDATA parameter specifying information of the electronic mail; saidprocessor partitioning the command list into a plurality of commandsub-lists using the plurality of recursive parameters; said processorpreserving at least one property corresponding to each of the commandsub-list, wherein the at least one property corresponding to each of thecommand sub-lists is selected from the group consisting of a cipher, anencryption key, a digital signature, a return receipt, a priority, aconfidentiality, a mood stamp, and combinations thereof; said processorproviding a graphical user interface for selecting each of the commandsub-lists; said processor receiving a selection of at least one of thecommand sub-lists via the graphical user interface; and said processoridentifying the at least one property corresponding to each of theselected command sub-lists.
 8. The computer program product of claim 7,wherein the electronic mail is from a current sender to a receiver, andwherein each command sub-list consists of at least one text string, eachtext string being either (i) a sender-originated text string of acommunication from the current sender to the receiver and prefixed by asender symbol denoting that the sender-originated text string originatedfrom the sender or (ii) a receiver-originated text string of acommunication from the receiver to the current sender and prefixed by areceiver symbol denoting that the receiver-originated text stringoriginated from the receiver.
 9. The computer program product of claim8, wherein each recursive parameter is unique, and wherein eachrecursive parameter appears in at least one sender-originated textstring in at least two command sub-lists of the plurality of commandsub-lists.
 10. The computer program product of claim 7, wherein theplurality of command sub-lists comprise a plurality of message sub-listswhich include messages from the current sender to the receiver via theelectronic mail, wherein the plurality of message sub-lists comprises abody message sub-list and a first preceding message sub-list, whereinthe body message sub-list comprises a body of an electronic mail messagein the electronic mail, wherein the first preceding message sub-listcomprises a first preceding message from a first preceding sender to thecurrent sender, and wherein the body of the electronic mail message andthe first preceding message are included in the messages from thecurrent sender to the receiver via the electronic mail.
 11. The computerprogram product of claim 10, wherein the plurality of message sub-listsfurther comprises a second preceding message sub-list, wherein thesecond preceding message sub-list comprises a second preceding messagefrom a second preceding sender to the first preceding sender, andwherein the second preceding message is included in the messages fromthe current sender to the receiver via the electronic mail.
 12. Acomputer system comprising a processor, a memory coupled to theprocessor, and a computer readable storage device coupled to theprocessor, said storage device containing program code configured to beexecuted by the processor via the memory to implement a method formanaging an electronic mail in a communication network, the methodcomprising: said processor providing a plurality of recursive parametersin a command list of a communication protocol associated with theelectronic mail, wherein at least one of the recursive parameters is aDATA parameter specifying information of the electronic mail; saidprocessor partitioning the command list into a plurality of commandsub-lists using the plurality of recursive parameters; said processorpreserving at least one property corresponding to each of the commandsub-list, wherein the at least one property corresponding to each of thecommand sub-lists is selected from the group consisting of a cipher, anencryption key, a digital signature, a return receipt, a priority, aconfidentiality, a mood stamp, and combinations thereof; said processorproviding a graphical user interface for selecting each of the commandsub-lists; said processor receiving a selection of at least one of thecommand sub-lists via the graphical user interface; and said processoridentifying the at least one property corresponding to each of theselected command sub-lists.
 13. The computer system of claim 12, whereinthe electronic mail is from a current sender to a receiver, and whereineach command sub-list consists of at least one text string, each textstring being either (i) a sender-originated text string of acommunication from the current sender to the receiver and prefixed by asender symbol denoting that the sender-originated text string originatedfrom the sender or (ii) a receiver-originated text string of acommunication from the receiver to the current sender and prefixed by areceiver symbol denoting that the receiver-originated text stringoriginated from the receiver.
 14. The computer system of claim 13,wherein each recursive parameter is unique, and wherein each recursiveparameter appears in at least one sender-originated text string in atleast two command sub-lists of the plurality of command sub-lists. 15.The computer system of claim 12, wherein the plurality of commandsub-lists comprise a plurality of message sub-lists which includemessages from the current sender to the receiver via the electronicmail, wherein the plurality of message sub-lists comprises a bodymessage sub-list and a first preceding message sub-list, wherein thebody message sub-list comprises a body of an electronic mail message inthe electronic mail, wherein the first preceding message sub-listcomprises a first preceding message from a first preceding sender to thecurrent sender, and wherein the body of the electronic mail message andthe first preceding message are included in the messages from thecurrent sender to the receiver via the electronic mail.
 16. The computersystem of claim 15, wherein the plurality of message sub-lists furthercomprises a second preceding message sub-list, wherein the secondpreceding message sub-list comprises a second preceding message from asecond preceding sender to the first preceding sender, and wherein thesecond preceding message is included in the messages from the currentsender to the receiver via the electronic mail.