The Prior Art Database and Publishing service will be updated on Sunday, February 25th, from 1-3pm ET. You may experience brief service interruptions during that time.
Browse Prior Art Database

Identifying Unintended Recipients Based on a Hierarchical Organisation

IP.com Disclosure Number: IPCOM000247072D
Publication Date: 2016-Aug-02
Document File: 2 page(s) / 22K

Publishing Venue

The IP.com Prior Art Database


The system herein assists in preventing the accidental sending of emails or instant messages to the wrong person. This is common within a large organisation where there are often a number of people with the same name.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 61% of the total text.

Page 01 of 2

Identifying Unintended Recipients Based on a Hierarchical Organisation

Disclosed is a system which ascertains the likelihood of an email or chat being sent to the wrong person, based on the organisational closeness of the sender to the recipient and to other people with similar names.

    The system determines a possibly incorrect recipient, based on organisational proximity. The precise definition of organisational proximity can vary, as per the description below.

    This system has the advantage (compared to other solutions) of not needing any history or prior knowledge of the user's emails. It can work with any number of recipients, and only requires access to a directory server to determine organisational proximity.

    The system uses the idea of organisational proximity. This could be defined in a number of ways, based on the hierarchical organisation. For example:
(1) Consider all people with the same 2nd line manager to be organisationally close.
(2) Consider all people with the same 3rd line manager to be organisationally close.
(3) Apply an advanced rule for the user, such as explicitly defining two separate 2nd line areas to both be organisationally close.

    The system then gets invoked when one of the following two trigger activities occurs.

(1) An email message is sent.

(2) An instant messaging chat session is requested.

    When invoked, the system will then perform the following check against each recipient of the email, or target of the chat session.

- Look up that...