Control and management of electronic messaging via authentication and evaluation of credentials
First Claim
Patent Images
1. A computer-implemented method for controlling a first message from a sender, the first message having an external intended recipient, comprising:
- generating, at a processor associated with a first referee, a numerical desirability rating associated with at least part of a credential including a digital signature, wherein the numerical desirability rating measures a level of desirability with receiving a message;
receiving, at the processor associated with the first referee, the at least part of the credential from the external intended recipient, wherein the at least part of the credential is associated with the first message that was sent to the external intended recipient;
determining, at the processor associated with the first referee, if the first message is spam by evaluating the at least part of the credential based at least in part on the numerical desirability rating; and
performing an action with respect to the first message based upon a result of the evaluation.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for controlling a message from a sender. A referee can evaluate a credential associated with a message to determine it'"'"'s desirability to the intended recipient, and take an action based upon the results of the determination. A sender that includes a trusted component can send a credential with the message, and the message can be controlled without a referee.
-
Citations
22 Claims
-
1. A computer-implemented method for controlling a first message from a sender, the first message having an external intended recipient, comprising:
-
generating, at a processor associated with a first referee, a numerical desirability rating associated with at least part of a credential including a digital signature, wherein the numerical desirability rating measures a level of desirability with receiving a message; receiving, at the processor associated with the first referee, the at least part of the credential from the external intended recipient, wherein the at least part of the credential is associated with the first message that was sent to the external intended recipient; determining, at the processor associated with the first referee, if the first message is spam by evaluating the at least part of the credential based at least in part on the numerical desirability rating; and performing an action with respect to the first message based upon a result of the evaluation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer-implemented method for controlling a first message from a sender, the method comprising:
-
transmitting, from a processor associated with a referee, a limited-use token to the sender, wherein the limited-use token establishes that the sender is in good standing; receiving, at the processor associated with the referee, at least part of a credential including a digital signature from an external intended recipient, wherein the at least part of the credential is associated with the first message that was sent to the external intended recipient; determining, at the processor associated with the referee, if the first message is spam by evaluating the at least part of the credential, based at least in part on receiving the limited-use token with the at least part of the credential; and performing an action with respect to the first message based upon a result of the evaluation. - View Dependent Claims (22)
-
Specification