System and method for automatically limiting unwanted and/or unsolicited communication through verification
First Claim
Patent Images
1. A method for controlling distribution of unsolicited communications by processing incoming messages, comprising:
- receiving into a system an incoming message from a sender to a recipient;
determining the identity of the message sender;
blocking the message if the message sender identity appears on at least one blocked sender list and ceasing processing once the message has been blocked;
delivering the message if the message sender identity appears on at least one validated sender list and ceasing processing once the message has been delivered;
placing any non-blocked and non-delivered messages in an undelivered message queue;
sending a letter of introduction to the sender which requires a positive response;
adding the sender to a validated sender list associated with the recipient, delivering the message to the recipient, and ceasing processing once the message has been delivered, if the sender responds positively to the letter of introduction; and
adding the sender to a blocked sender list associated with the recipient and blocking the message if the sender does not respond positively to the letter of introduction.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for controlling unwanted and unsolicited communications, including E-mail, through verification. The invention preferably generates a letter of introduction or other such communication to a sender, which includes instructions facilitating validation of the sender'"'"'s identity. A preferred embodiment of the invention, directed toward controlling unsolicited commercial E-mail (UCE), commonly known as “spam,” is described herein.
-
Citations
31 Claims
-
1. A method for controlling distribution of unsolicited communications by processing incoming messages, comprising:
-
receiving into a system an incoming message from a sender to a recipient;
determining the identity of the message sender;
blocking the message if the message sender identity appears on at least one blocked sender list and ceasing processing once the message has been blocked;
delivering the message if the message sender identity appears on at least one validated sender list and ceasing processing once the message has been delivered;
placing any non-blocked and non-delivered messages in an undelivered message queue;
sending a letter of introduction to the sender which requires a positive response;
adding the sender to a validated sender list associated with the recipient, delivering the message to the recipient, and ceasing processing once the message has been delivered, if the sender responds positively to the letter of introduction; and
adding the sender to a blocked sender list associated with the recipient and blocking the message if the sender does not respond positively to the letter of introduction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A system for controlling unsolicited communications, comprising:
-
at least one processor;
at least one data storage device;
at least one network card, wherein each network card facilitates communications through at least one network port;
an operating system;
at least one blocked sender list stored on the at least one data storage device;
at least one verified sender list stored on the at least one data storage device;
computer software running within the operating system capable of issuing a letter of introduction in response to a message from a sender not appearing on the at least one blocked sender list and not appearing on the at least one verified sender list; and
,at least one unverified message folder for storing messages from senders to whom letters of introduction have been issued. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification