Managing unwanted/unsolicited e-mail protection using sender identity
First Claim
Patent Images
1. A method for managing unwanted, unsolicited e-mail, the method comprising the steps of:
- receiving components of an e-mail from a sender directed to a recipient, wherein the components comprise any one of a client IP address, an envelope, one or more headers or a body, the sender having a sender identity;
verifying the sender identity based on the components received;
when the sender identity is verified, performing a first SPAM management process on the e-mail; and
when the verifying step fails to verify the sender identity, performing a second SPAM management process on the e-mail.
1 Assignment
0 Petitions
Accused Products
Abstract
A multi-test management of unwanted, unsolicited e-mail for potential SPAM wherein components of an e-mail from a sender directed to a recipient comprising any one of an envelope, one or more headers or a body, the sender having a sender identity are used to verify the sender identity. When the sender identity is verified, a first SPAM management process is performed on the e-mail. When, however, the verifying step fails to verify the sender identity a second SPAM management process is performed on the e-mail.
121 Citations
30 Claims
-
1. A method for managing unwanted, unsolicited e-mail, the method comprising the steps of:
-
receiving components of an e-mail from a sender directed to a recipient, wherein the components comprise any one of a client IP address, an envelope, one or more headers or a body, the sender having a sender identity;
verifying the sender identity based on the components received;
when the sender identity is verified, performing a first SPAM management process on the e-mail; and
when the verifying step fails to verify the sender identity, performing a second SPAM management process on the e-mail. - View Dependent Claims (2, 3, 4, 7, 8, 9, 10)
-
-
11. A computer program product for managing unwanted, unsolicited e-mail, the computer program product comprising:
-
a storage medium readable by a processing circuit and storing instructions for execution by a processing circuit for performing a method comprising the steps of;
receiving components of an e-mail from a sender directed to a recipient, wherein the components comprise any one of a client IP address, an envelope, one or more headers or a body, the sender having a sender identity;
verifying the sender identity based on the components received;
when the sender identity is verified, performing a first SPAM management process on the e-mail; and
when the verifying step fails to verify the sender identity, performing a second SPAM management process on the e-mail. - View Dependent Claims (12, 13, 14, 17, 18, 19, 20)
-
-
21. A system for managing unwanted, unsolicited e-mail, the system comprising:
-
a network;
a first computer system in communication with the network wherein the computer system includes instructions to execute a method comprising;
receiving components of an e-mail from a sender directed to a recipient, wherein the components comprise any one of a client IP address, an envelope, one or more headers or a body, the sender having a sender identity;
verifying the sender identity based on the components received;
when the sender identity is verified, performing a first SPAM management process on the e-mail; and
when the verifying step fails to verify the sender identity, performing a second SPAM management process on the e-mail. - View Dependent Claims (22, 23, 24, 27, 28, 29, 30)
-
Specification