Technology enhanced communication authorization system
First Claim
Patent Images
1. A method of authorizing communications, comprising:
- receiving a communication from a sender;
detecting if the communication contains a valid authorization code;
maintaining the communication in an unauthorized communication inbox of a receiver if the authorization code is not detected;
notifying the sender if a valid authorization code is not detected with instructions on obtaining a valid authorization code; and
allowing the sender to obtain a valid authorization code to place the communication in an authorized inbox of the receiver.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of authorizing communications includes receiving a communication from a sender, determining if the communication contains a valid authorization code, notifying the sender if a valid authorization code is not detected with instructions on obtaining a valid authorization code and providing the sender with a service for obtaining a valid authorization code in order to resend the communication with the valid authorization code. The method of authorizing communications also includes forwarding the communication to a recipient if a valid authorization code is detected and holding the communication in an unauthorized box if a valid authorization code is not detected.
-
Citations
81 Claims
-
1. A method of authorizing communications, comprising:
- receiving a communication from a sender;
detecting if the communication contains a valid authorization code;
maintaining the communication in an unauthorized communication inbox of a receiver if the authorization code is not detected;
notifying the sender if a valid authorization code is not detected with instructions on obtaining a valid authorization code; and
allowing the sender to obtain a valid authorization code to place the communication in an authorized inbox of the receiver. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
- receiving a communication from a sender;
-
31. A method of preventing email from reaching an inbox of a receiver, comprising:
-
providing codes to be embedded in an email;
verifying usage of valid codes in each received email message;
limiting access to email messages received without a valid code; and
notifying senders of email messages that have not included a valid code. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. A method of filling a purchase order, comprising:
-
receiving an order from a purchaser via email;
determining whether the order is authorized;
sending a notice via email to the purchaser, the notice containing a valid authorization code and a form for paying for a product to be purchased; and
receiving the order form from the purchaser. - View Dependent Claims (46, 47, 48, 49)
-
-
50. A method of limiting email from reaching a receiver, comprising:
-
receiving an email message from a sender;
checking for an authorization code accompanying the email;
forwarding the email to a receiver'"'"'s inbox if a valid authorization code is found;
sending a notice to the sender if a valid authorization code is not found, the notice providing instructions on obtaining a valid authorization code; and
allowing the sender to obtain a valid authorization code by following the instructions in the notice. - View Dependent Claims (51, 52, 53, 54, 55, 56, 57, 58, 59)
-
-
60. A method of using codes received by an email system through an email communication, comprising:
-
obtaining a code;
inserting the code into an email communication;
sending the email communication to a recipient; and
using the code to begin a process external to the email system. - View Dependent Claims (61, 62, 63, 64, 65, 66)
-
-
67. A method of distributing email, comprising:
-
providing at least one code to be embedded in an email address;
verifying usage of said at least one code in a received email message; and
distributing the email message according to the at least one code embedded in the email address. - View Dependent Claims (68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78)
-
-
79. A method of copying data into a list, comprising;
-
inserting a list of data into an email;
inserting a code into the email;
sending the email to a list manager; and
using the code to instruct the list manager to extract the list of addresses and insert into a destination list. - View Dependent Claims (80, 81)
-
Specification