Automatic screening, analysis and processing of e-mails

SKIMSON® is a text mining software specialized in automatic event recognition from unstructured texts, e.g. e-mails or online forms. The software automatically extracts key facts and identifies spam content. In particular, it geocodes and disambiguates information on location, extracts information on time, and determines the event’s subject. All results are visualized and editable via the SKIMSON® user interface. If desired, the color coding of results in the text facilitates quality assurance. All extracted information can easily be persisted in the provided back-end. The data is exclusively processed on the client-side, therefore, the user is always in possession and control of the data.


Via analyzing texts (e.g. e-mails), the software can easily distinguish between important and unimportant information (e.g. spam). SKIMSON automatically identifies all useful text information and creates categories for location, time and objective facts. Locations are marked on a digital map and key facts are highlighted in different colors.

Advantages of SKIMSON

»  Semantic analysis of e-mails according to customer demands
»  Content review and detection of non relevant content (e.g. spam)
»  Automatic extraction and categorization of important key facts
»  Structured storage of facts in data bases for quick research
»  Separate, encoded protection of personal data (according to DSGVO)

How does it work?

By importing the e-mail inbox the user starts the process. SKIMSON® performs a semantic analysis and the user checks the result. SKIMSON automatically identifies any key messages and filters them in different categories (e.g. where, when, what). E-mail content that makes no sense is recognized.

The user can easily correct and complete the system's results with virtual markers. The user is the expert and trains SKIMSON® how to improve results.

All results that SKIMSON has found are stored in structured data bases for any further research work. Personal data according to the General Data Protection Regulation (DSGVO) can be encoded and secured separately.