System for eliminating unauthorized electronic mail
First Claim
1. A system for eliminating unauthorized email sent to a user on a network comprising:
- (a) an email client for allowing the user to receive email sent on the network addressed to a unique email address of the user, (b) an email-receiving server connected between the network and the email client for receiving email addressed to the unique email address of the user, (c) an unauthorized-email rejection component having an authorized senders list (ASL) module which maintains email addresses of senders authorized to send email to the user, wherein the unauthorized-email rejection component is operable with the email-receiving server for intercepting and rejecting any unauthorized email addressed to the email address of the user.
7 Assignments
0 Petitions
Accused Products
Abstract
A system for eliminating unauthorized email sent to a user on a network analyzes the sender address of incoming email and determines whether it is to be rejected by returning a standard “no such user” error code or accepted depending upon executing processing rules and analyzing managed lists of authorized senders. This provides an advantage over existing anti-spam filtering systems by intercepting unauthorized email before it reaches an existing email server or client. The system rejects all email unless authorized by using a standard “no such user” error code, and by redirecting the unauthorized email back to the sender or to a sender evaluation site. An ASL module captures authorized sender addresses from the user'"'"'s outgoing email and other sources in order to update “authorized senders” lists. The system may employ a WBM procedure that notifies senders of rejected email to go to a separate website and register as valid senders after passing an interaction test that precludes automatic registration by a mechanical program. A destination proxy email address procedure allows subscribers to use temporary proxy addresses for receiving email expected from unknown sources and instantiates senders as authorized upon receiving the expected email to the proxy addresses. The unauthorized-email rejection component can be readily configured as a hardware or software appliance used in tandem with a conventional email server, email gateway, or firewall to an intranet, or as a software extension to an existing firewall system.
-
Citations
35 Claims
-
1. A system for eliminating unauthorized email sent to a user on a network comprising:
-
(a) an email client for allowing the user to receive email sent on the network addressed to a unique email address of the user, (b) an email-receiving server connected between the network and the email client for receiving email addressed to the unique email address of the user, (c) an unauthorized-email rejection component having an authorized senders list (ASL) module which maintains email addresses of senders authorized to send email to the user, wherein the unauthorized-email rejection component is operable with the email-receiving server for intercepting and rejecting any unauthorized email addressed to the email address of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method for eliminating unauthorized email sent to a user on a network comprising the steps of:
-
(a) receiving incoming email addressed to the unique email address of the user, (b) maintaining an authorized senders list (ASL list) of email addresses of external users authorized to send email to the user, (c) processing the sender'"'"'s email address on incoming email by comparing it to the ASL list, and (d) rejecting the receipt of incoming email before the email can be accepted for delivery to the user if the results of processing the ASL list returns with a result of “
unauthorized sender”
by returning an industry standard “
no such user”
error code.
-
-
19. A method for eliminating unauthorized email sent to a user on a network comprising the steps of:
-
(a) receiving incoming email addressed to the unique email address of the user, (b) maintaining an authorized senders list (ASL list) of email addresses of external users authorized to send email to the user, (c) processing the sender'"'"'s email address on incoming email by comparing it to the ASL list, and (d) rejecting the receipt of incoming email before the email can be accepted for delivery to the user if the results of processing the ASL list returns with a result of “
unauthorized sender”
, sending a message inviting the sender of the rejected email to confirm that the sender is an authorized sender of email to the intended recipient by passing an interaction procedure to show that the sender is not a mechanical program attempting to automatically validate the sender, and thereupon adding the validated sender'"'"'s email address to the ASL list.
-
-
20. A method for eliminating unauthorized email sent to a user on a network comprising the steps of:
-
(a) receiving incoming email addressed to the unique email address of the user, (b) maintaining an authorized senders list (ASL list) of email addresses of external users authorized to send email to the user, (c) processing the sender'"'"'s email address on incoming email by comparing it to the ASL list, (d) rejecting the receipt of incoming email before the email can be accepted for delivery to the user if the results of processing the ASL list returns with a result of “
unauthorized sender”
, and(e) allowing a user to designate a destination proxy email address for use by a sender in instances where the email address of an authorized sender is not yet known, wherein if the destination proxy email address is recognized on incoming email, the incoming email is accepted and sent to the user.
-
-
21. A method for eliminating unauthorized email sent to a user on a network comprising the steps of:
-
(a) receiving incoming email addressed to the unique email address of the user, (b) maintaining an authorized senders list (ASL list) of email addresses of external users authorized to send email to the user, (c) processing the sender'"'"'s email address on incoming email by comparing it to the ASL list, and (d) rejecting the receipt of incoming email before the email can be accepted for delivery to the user if the results of processing the ASL list returns with a result of “
unauthorized sender”
,wherein the ASL module includes an ASL list manager for analyzing email header information including FROM and TO addresses of email sent by users to dynamically update the ASL list of authorized senders.
-
-
22. A method for eliminating unauthorized email sent to a user on a network comprising the steps of:
-
(a) receiving incoming email addressed to the unique email address of the user, (b) maintaining an authorized senders list (ASL list) of email addresses of external users authorized to send email to the user, (c) processing the sender'"'"'s email address on incoming email by comparing it to the ASL list, and (d) rejecting the receipt of incoming email if the results of processing the sender'"'"'s email address with the ASL list returns with a result of “
unauthorized sender”
, wherein the rejection of the incoming email is performed in a physical or logical operation before the email can be accepted for delivery to the user.
-
-
23. An unauthorized-email rejection component for use with an email-receiving server for receiving email sent to a user on a network comprising an authorized senders list (ASL) module which maintains an ASL list of email addresses of senders authorized to send email to the user, wherein said unauthorized-email rejection component intercepts and rejects any incoming email addressed to the email address of the user if the processing results of the ASL list returns with an “
- unauthorized sender”
result, wherein the unauthorized-email rejection component is a hardware or software appliance positioned for operation in the flow of incoming email physically or logically upstream from the email-receiving server to prevent any unauthorized email from reaching the email-receiving server.
- unauthorized sender”
-
24. An unauthorized-email rejection component for use with an email-receiving server for receiving email sent to a user on a network comprising an authorized senders list (ASL) module which maintains an ASL list of email addresses of senders authorized to send email to the user, wherein said unauthorized-email rejection component intercepts and rejects any incoming email addressed to the email address of the user if the processing results of the ASL list returns with an “
- unauthorized sender”
result, wherein the ASL module includes an ASL list manager for analyzing email header information including FROM and TO addresses of email sent by users to dynamically update the ASL lists of authorized senders.
- unauthorized sender”
-
25. An unauthorized-email rejection component for use with an email-receiving server for receiving email sent to a user on a network comprising an authorized senders list (ASL) module which maintains an ASL list of email addresses of senders authorized to send email to the user, wherein said unauthorized-email rejection component intercepts and rejects any incoming email addressed to the email address of the user if the processing results of the ASL list returns with an “
- unauthorized sender”
result, and further including a proxy address module for allowing a user to designate a destination proxy email address for use by a sender in instances where the email address of an authorized sender is not yet known, and if the destination proxy email address is used on incoming email, for accepting the incoming email and sending it to the user. - View Dependent Claims (26, 27)
- unauthorized sender”
-
28. An unauthorized-email rejection component for use with an email-receiving server for receiving email sent to a user on a network comprising an authorized senders list (ASL) module which maintains an ASL list of email addresses of senders authorized to send email to the user, wherein said unauthorized-email rejection component intercepts and rejects any incoming email addressed to the email address of the user if the processing results of the ASL list returns with an “
- unauthorized sender”
result, and further including a redirector module for sending a message inviting the sender of the rejected email to confirm that the sender is an authorized sender of email to the intended recipient by passing an interaction procedure to show that the sender is not a mechanical program attempting to automatically validate the sender, whereupon the validated sender'"'"'s email address can be added to the ASL list.
- unauthorized sender”
-
29. An unauthorized-email rejection component for use with an email-receiving server for receiving email sent to a user on a network comprising an authorized senders list (ASL) module which maintains an ASL list of email addresses of senders authorized to send email to the user, wherein said unauthorized-email rejection component intercepts and rejects any incoming email addressed to the email address of the user if the processing results of the ASL list returns with an “
- unauthorized sender”
result and returns an industry standard “
no such user”
error code before the email can be accepted for delivery to the user.
- unauthorized sender”
-
30. A system for eliminating unauthorized email sent to a user on a network comprising:
-
(a) an email client for allowing the user to receive email sent on the network addressed to a unique email address of the user, (b) an email-receiving server connected between the network and the email client for receiving email addressed to the unique email address of the user, (c) an unauthorized-email rejection component having an authorized senders list (ASL) module which maintains email addresses of senders authorized to send email to the user, wherein the unauthorized-email rejection component is operable with the email-receiving server for intercepting and rejecting any unauthorized email addressed to the email address of the user, wherein the unauthorized-email rejection component is positioned for operation in the flow of incoming email physically or logically upstream before the email-receiving server such that unauthorized email is intercepted and prevented from reaching the email-receiving server.
-
-
31. A system for eliminating unauthorized email sent to a user on a network comprising:
-
(a) an email client for allowing the user to receive email sent on the network addressed to a unique email address of the user, (b) an email-receiving server connected between the network and the email client for receiving email addressed to the unique email address of the user, (c) an unauthorized-email rejection component having an authorized senders list (ASL) module which maintains email addresses of senders authorized to send email to the user, wherein the unauthorized-email rejection component is operable with the email-receiving server for intercepting and rejecting any unauthorized email addressed to the email address of the user, wherein the unauthorized-email rejection component is positioned for operation in the flow of incoming email physically or logically upstream before the email-receiving server such that unauthorized email is intercepted and prevented from reaching the email-receiving server, and wherein, upon the ASL module determining that incoming email has a sender address that is not that of an authorized sender, said unauthorized-email rejection component rejects the incoming email with an industry standard “
no such user”
error message.
-
-
32. A system for eliminating unauthorized email sent to a user on a network comprising:
-
(a) an email client for allowing the user to receive email sent on the network addressed to a unique email address of the user, (b) an email-receiving server connected between the network and the email client for receiving email addressed to the unique email address of the user, (c) an unauthorized-email rejection component having an authorized senders list (ASL) module which maintains email addresses of senders authorized to send email to the user, wherein the unauthorized-email rejection component is operable with the email-receiving server for intercepting and rejecting any unauthorized email addressed to the email address of the user, wherein the unauthorized-email rejection component is positioned for operation in the flow of incoming email physically or logically upstream before the email-receiving server such that unauthorized email is intercepted and prevented from reaching the email-receiving server, and wherein the ASL module includes an ASL list manager for analyzing email header information including FROM and TO addresses of email sent by users to dynamically update the ASL list of authorized senders.
-
-
33. A system for eliminating unauthorized email sent to a user on a network comprising:
-
(a) an email client for allowing the user to receive email sent on the network addressed to a unique email address of the user, (b) an email-receiving server connected between the network and the email client for receiving email addressed to the unique email address of the user, (c) an unauthorized-email rejection component having an authorized senders list (ASL) module which maintains email addresses of senders authorized to send email to the user, wherein the unauthorized-email rejection component is operable with the email-receiving server for intercepting and rejecting any unauthorized email addressed to the email address of the user, wherein the unauthorized-email rejection component is positioned for operation in the flow of incoming email physically or logically upstream before the email-receiving server such that unauthorized email is intercepted and prevented from reaching the email-receiving server, and wherein said unauthorized-email rejection component includes a redirector module for sending a message inviting the sender of the rejected email to confirm that the sender is an authorized sender of email to the intended recipient by passing an interaction procedure to show that the sender is not a mechanical program attempting to automatically validate the sender.
-
-
34. A system for eliminating unauthorized email sent to a user on a network comprising:
-
(a) an email client for allowing the user to receive email sent on the network addressed to a unique email address of the user, (b) an email-receiving server connected between the network and the email client for receiving email addressed to the unique email address of the user, (c) an unauthorized-email rejection component having an authorized senders list (ASL) module which maintains email addresses of senders authorized to send email to the user, wherein the unauthorized-email rejection component is operable with the email-receiving server for intercepting and rejecting any unauthorized email addressed to the email address of the user, wherein said system includes a proxy address module for allowing a user to designate a destination proxy email address for use by a sender in instances where the email address of an authorized sender is not yet known, and if the destination proxy email address is used on incoming email, said unauthorized-email rejection component accepts the incoming email and sends it to the user.
-
-
35. A system for eliminating unauthorized email sent to a user on a network comprising:
-
(a) an email client for allowing the user to receive email sent on the network addressed to a unique email address of the user, (b) an email-receiving server connected between the network and the email client for receiving email addressed to the unique email address of the user, (c) an unauthorized-email rejection component having an authorized senders list (ASL) module which maintains email addresses of senders authorized to send email to the user, wherein the unauthorized-email rejection component is operable with the email-receiving server for intercepting and rejecting any unauthorized email addressed to the email address of the user, wherein said unauthorized-email rejection component includes a redirector module for sending a message inviting the sender of the rejected email to confirm that the sender is an authorized sender of email to the intended recipient by passing an interaction procedure to show that the sender is not a mechanical program attempting to automatically validate the sender, wherein the interaction procedure includes a display of a graphic image of a word or object, and a request to the sender to enter a text word in response to the graphic image, whereby the system can confirm that the interaction procedure is not being performed by a mechanical program, and thereupon add the validated sender'"'"'s email address to the ASL list.
-
Specification