Systems and Methods for Automatically Updating Electronic Mail Access Lists
First Claim
1. A method for permitting a sender to provide electronic mail (email) to a recipient, said method comprising:
- providing a recipient email address to the sender;
requesting of the recipient that the sender be allowed to send email to the recipient;
determining whether the request is acceptable based on at least one of;
1) a sender identity verification method;
2) user input; and
3) third party information;
adding the sender to an email access list if the request is acceptable; and
wherein the email access is used to determine whether or not email from the sender is permitted to reach the recipient.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for permitting a sender to provide electronic mail (email) to a recipient, said method comprising providing a recipient email address to the sender; requesting of the recipient that the sender be allowed to send email to the recipient; determining whether the request is acceptable based on at least one of: 1) a sender identity verification method; 2) user input; and 3) third party information; adding the sender to an email access list if the request is acceptable; and wherein the email access is used to determine whether or not email from the sender is permitted to reach the recipient.
115 Citations
63 Claims
-
1. A method for permitting a sender to provide electronic mail (email) to a recipient, said method comprising:
-
providing a recipient email address to the sender;
requesting of the recipient that the sender be allowed to send email to the recipient;
determining whether the request is acceptable based on at least one of;
1) a sender identity verification method;
2) user input; and
3) third party information;
adding the sender to an email access list if the request is acceptable; and
wherein the email access is used to determine whether or not email from the sender is permitted to reach the recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for permitting a sender to provide electronic mail (email) to a recipient, said method comprising:
-
providing a recipient email address to the sender;
providing a petition to the recipient, wherein the petition includes a sender identity verification method;
determining whether the petition is acceptable based on at least one of;
1) the sender identity verification method;
2) user input; and
3) third party information; and
adding the sender to an email access list if the petition is acceptable; and
wherein the email access list is used to determine whether or not email from the sender is permitted to reach the recipient. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for adding a sender to an electronic mail (email) access list for a recipient, said method comprising:
-
providing a recipient identifier to the sender;
providing a petition to the recipient;
determining whether to add the sender to the access list based on at least one of;
1) user input;
2) the petition; and
3) third party information; and
adding the sender to the access list if it was so determined. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method for accepting a communication from a sender, comprising:
-
determining if the communication includes an acceptable method to verify that an electronic mail (email) message is from the sender;
determining if the sender is already on an email access list;
determining whether to place the sender on the access list based on at least one of;
1) user input;
2) a sender identity verification method included in the communication; and
3) third party information; and
adding the sender to the access list if it was so determined. - View Dependent Claims (30, 31, 32, 33, 34, 35)
-
-
36. A system comprising:
-
means for providing a recipient email address to the sender;
means for requesting of the recipient that the sender be allowed to send email to the recipient;
means for determining whether the request is acceptable based on at least one of;
1) a sender identity verification method;
2) user input; and
3) third party information; and
means for adding the sender to an email access list if the request is acceptable; and
wherein the email access is used to determine whether or not email from the sender is permitted to reach the recipient.
-
-
37. A system for adding a sender to an electronic mail (email) access list for a recipient, said system comprising:
-
the recipient including;
a petition processor to accept a petition and maintain an access list based on the petition;
a browser to accept the petition from the sender and automatically provide the petition to the petition processor; and
wherein the access list determines if the sender is permitted to provide email to the recipient;
the sender including;
a server; and
a petition generator coupled to the server, the petition generator to produce a petition. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. A system for adding a sender to an electronic mail (email) access list for a mail provider wherein the mail provider is accessed by a recipient, said system comprising:
-
the recipient including;
a browser to accept a petition from the sender;
the mail provider including;
a petition processor to accept the petition and maintain an access list based on the petition; and
wherein the access list determines if the sender is permitted to provide email to the recipient;
the sender including;
a server; and
a petition generator, wherein the petition generator can produce a petition. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56)
-
-
57. A memory for storing data for access by an application program being executed on a computing device, comprising:
-
an email recipient identifier stored in the memory;
an email sender identifier stored in the memory;
an email sender identification method stored in the memory; and
wherein the sender identification method can be used to verify that email is from the sender. - View Dependent Claims (58, 59, 60)
-
-
61. A machine readable medium having instructions stored thereon that when executed by a processor cause a system to:
-
provide a recipient electronic mail (email) address to the sender;
request of the recipient that the sender be allowed to send email to the recipient;
determine whether the request is acceptable based on at least one of;
1) a sender identity verification method;
2) user input; and
3) third party information; and
add the sender to an email access list if the request is acceptable; and
wherein the email access is used to determine whether or not email from the sender is permitted to reach the recipient.
-
-
62. A computer data signal embodied in a transmission medium, comprising:
-
a code segment including instructions to provide a recipient electronic mail (email) address to a sender;
a code segment including instructions to provide a petition to the recipient, wherein the petition includes a sender identification method, wherein the identification method can be used by the recipient to verify that an email message is from the sender;
a code segment including instructions to determine if the petition is acceptable based on at least one of;
1) sender credentials;
2) user input; and
3) third party information;
a code segment including instructions to add the sender to an email access list if the petition is acceptable; and
wherein the email access is used to determine whether or not email from the sender is permitted to reach the recipient.
-
-
63. A method for generating a request that can be used to determine if a sender should be added to a recipient email access list:
-
including at least one sender identification method in the request, wherein the identification method is at least one of;
1) an email header “
From”
address;
2) a password;
3) an Internet Protocol (IP) address; and
4) a digital signature.including a sender name in the request;
including a recipient name in the request;
providing the request to a processing that will make a determination of whether the sender should be added to the email access list.
-
Specification