System and method for eliminating unsolicited junk or spam electronic mail
First Claim
1. A system for eliminating unsolicited electronic mail comprising:
- a. at least one computer, including memory, storage, input and output components;
b. means for connecting said at least one computer to an electronic mail server;
c. at least one database comprising unacceptable addresses;
d. at least one address book database comprising known approved addresses;
e. at least one override identifier code; and
f. operational software.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method are described for eliminating unsolicited electronic mail, comprising a computer systems, a database of account identifiers and passwords, a database of blocked mail list addresses, an address book database containing known approved addresses, an override identifier code, and a program means for connecting to a mail server, retrieving messages, testing originating address for a match with addresses in a database of blocked mail addresses, testing originating address for a match with addresses in a database of acceptable addresses, testing message subject line for presence of an override identifier code or specific acceptable subject line word, updating blocked mail list with new rejected addresses, updating address book with new acceptable addresses from messages having override identifier code, deleting messages from senders on blocked list, and sending remainder of messages to a holding folder for aging and potential review and reading if desired by the user.
-
Citations
25 Claims
-
1. A system for eliminating unsolicited electronic mail comprising:
-
a. at least one computer, including memory, storage, input and output components;
b. means for connecting said at least one computer to an electronic mail server;
c. at least one database comprising unacceptable addresses;
d. at least one address book database comprising known approved addresses;
e. at least one override identifier code; and
f. operational software. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for eliminating unsolicited electronic mail comprising the steps of:
-
a. providing an override identifier code;
b. receiving electronic mail messages, said electronic mail messages comprising an originating address, a subject line and a body;
c. testing said subject line of said electronic mail messages to determine the presence of said override identifier code; and
d. permitting said electronic mail messages having said override identifier code present to be reviewed by an electronic mail recipient. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A method for eliminating unsolicited electronic mail comprising the steps of:
-
a. providing a database of acceptable addresses and a database of acceptable subject line codes;
b. providing a database of unacceptable addresses;
c. providing a database of accounts with passwords;
d. providing an override identifier code for insertion into a message subject line;
e. connecting to a mail server;
f. retrieving electronic mail messages from said mail server, said electronic mail messages comprising an originating address, a subject line and a body;
g. comparing said originating address for a match with addresses in said database of unacceptable addresses;
h. deleting messages having an originating address matching an address in said database of unacceptable addresses;
i. comparing said originating address for a match with addresses in said database of acceptable addresses;
j. forwarding to an inbox, messages having an originating address matching an address in said database of acceptable addresses;
k. testing the subject line of remaining messages to determine the presence of said override identifier code or said database of acceptable subject line codes;
l. sending an autoresponse message containing said override identifier code in the message body to all addresses for said remaining messages lacking said identifier code in their subject line;
m. sending to a holding folder said remaining messages lacking said identifier code in their subject line;
n. testing the age of electronic mail in said holding folder;
o. adding overage source message addresses to the database of unacceptable addresses; and
p. deleting overage messages, whereby unsolicited messages are automatically removed from the need for observation and review by the addressee. - View Dependent Claims (21)
-
-
22. An electronic mail handling system for eliminating unsolicited electronic mail comprising:
-
a. computer means for processing data, including central processing unit, operating system, memory, storage, and input/output devices;
b. connecting means for connecting computer means to a mail server;
c. electronic mail client;
d. database of acceptable addresses and a database of acceptable subject line codes;
e. database of unacceptable addresses;
f. override identifier code;
g. software program means for transforming electronic mail messages, comprising i. first means for retrieving a database of acceptable addresses from said email client;
ii. second means for retrieving a database of unacceptable addresses;
iii. third means for retrieving a database of accounts with passwords;
iv. fourth means for retrieving an override identifier code for insertion into a message subject line;
v. fifth means for retrieving electronic mail messages from said mail server, said electronic mail messages further comprising an originating address, a subject line and a message;
vi. sixth means for comparing said originating address for a match with addresses in said database of unacceptable addresses;
vii. seventh means for deleting messages having an originating address matching an address in said database of unacceptable addresses;
viii. eighth means for comparing said originating address for a match with addresses in said database of acceptable addresses;
ix. ninth means for forwarding to an inbox, messages having an originating address matching an address in said database of acceptable addresses;
x. tenth means for testing the subject line of remaining messages to determine the presence of said override identifier code;
xi. eleventh means for sending an autoresponse message containing said override identifier code in the message body to all addresses for messages lacking said identifier code in their subject line;
xii. twelfth means for sending to a holding folder messages lacking said identifier code in their subject line;
xiii. thirteenth means for testing the age of electronic mail in said folder;
xiv. fourteenth means for adding overage message addresses to the database of unacceptable addresses; and
xv. fifteenth means for deleting overage messages, whereby unsolicited messages are automatically removed from the need for observation and review by the addressee. - View Dependent Claims (23)
-
-
24. A method of accepting unsolicited electronic mail messages comprising the steps of:
-
a) providing an electronic mail client program having an inbox and an operating program having an address book of acceptable addresses;
b) sending an autoreply message to a sender of said unsolicited electronic mail original message, wherein said autoreply message comprises instructions to sender, and a hyperlink to a web page, wherein said instructions;
i. direct sender to click on said hyperlink, ii. direct sender to view said web page directed thereby, wherein said web page contains said unsolicited message sender'"'"'s electronic mail address pre-entered thereon, iii. direct sender to enter alphanumeric or punctuation characters viewed in an image on said web page, and vi. direct sender to submit said entered characters as a response;
c) permitting an electronic mail recipient to accept or reject said submitted response, wherein if said response is accepted, said unsolicited electronic message sender'"'"'s pre-entered electronic mail address is entered into said address book of acceptable addresses; and
d) sending said unsolicited electronic mail sender'"'"'s original message to said electronic mail recipient'"'"'s inbox. - View Dependent Claims (25)
-
Specification