Managing electronic messages
First Claim
1. In a computer system that monitors electronic messages that are sent from senders to recipients, a method of determining whether an electronic message has been sent from an authorized sender, comprising:
- receiving an electronic message that includes information identifying a sender of the electronic message; and
transmitting to the sender a sequence of at least two challenge messages that operate to determine whether the sender is designated as being authorized to send electronic messages to the recipient, the sender being designated as being authorized only if the sender provides appropriate responses to the sequence of at least two challenge messages, wherein a first challenge message and a second challenge message of the sequence are separated by a period of time determined by the computer system.
15 Assignments
0 Petitions
Accused Products
Abstract
A recipient computer system may receive one or more electronic messages. The recipient computer system may send one, two, or more challenge messages to the sender of the electronic messages in determining whether to deliver the electronic message. The recipient computer system may accept or reject an electronic message based on the response, or lack of response, to the challenge messages. The recipient computer system may send two or more challenge messages at intervals. A sender computer system may record activity of the sender computer system for a recipient computer system to use in determining whether to deliver an electronic message. A sender computer system may provide a summary of that activity with an electronic message. A sender computer system may provide an authorization key for a recipient computer system to use in determining whether to deliver an electronic message. The authorization key may be generated by a third party.
-
Citations
15 Claims
-
1. In a computer system that monitors electronic messages that are sent from senders to recipients, a method of determining whether an electronic message has been sent from an authorized sender, comprising:
-
receiving an electronic message that includes information identifying a sender of the electronic message; and
transmitting to the sender a sequence of at least two challenge messages that operate to determine whether the sender is designated as being authorized to send electronic messages to the recipient, the sender being designated as being authorized only if the sender provides appropriate responses to the sequence of at least two challenge messages, wherein a first challenge message and a second challenge message of the sequence are separated by a period of time determined by the computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. In a computer system that monitors electronic messages that are sent from senders to recipients, a method of determining whether an electronic message has been sent from an authorized sender, comprising:
-
receiving an electronic message that includes information indicating the manner in which an electronic message was created;
determining the manner in which the electronic message should be processed according to an analysis of the information indicating the manner in which an electronic message was created; and
processing the electronic message according to the analysis;
wherein the information indicating the manner in which the electronic message was created indicates one or more of the following;
an amount of keyboard activity used in creating the electronic message and an amount of mouse activity used in creating the electronic message. - View Dependent Claims (10, 11, 12, 13, 15)
-
-
14. In a computer system that monitors electronic messages that are sent from senders to recipients, a method of determining whether an electronic message has been sent from an authorized sender, comprising:
-
receiving an electronic message that includes information indicating a third-party authorization;
determining the manner in which the electronic message should be processed according to an analysis of the information indicating the third-party authorization; and
processing the electronic message according to the analysis.
-
Specification