E-mail system and method having certified opt-in capabilities
First Claim
1. A method of processing an email generated by an emailer and intended for a recipient, said emailer maintaining an opt-in email list, the method comprising:
- receiving said email, said email including an information portion and an authentication portion, said authentication portion being generated from said information portion using a first key associated with said recipient and said opt-in email list in a manner that causes said authentication portion to be securely cryptographically linked to said information portion;
obtaining a certificate generated by a trusted third party, said certificate being generated by said trusted third party in response to said recipient opting-in to said opt-in email list, said certificate including a certificate key associated with said recipient and said opt-in email list;
determining whether said certificate can be verified;
determining whether said authentication portion can be verified using said certificate key; and
providing said email to said recipient if said certificate and said authentication portion are successfully verified.
1 Assignment
0 Petitions
Accused Products
Abstract
An opt-in email system in which a recipient that has opted in to an email list can recognize and trust that an email has actually come from a desired sender. When a recipient desires to opt-in to an e-mail list, the recipient is sent to a trusted third party certification service that generates a certificate associated with a key pair. A key is maintained at the sender'"'"'s location by a secure cryptographic device that can verify the certificate and create a signature, using a key of the key pair, for messages intended for the recipient. When a message intended for the recipient is received from the sender, the signature will be verified based on the status of the certificate and the corresponding key of the key pair. If the signature does not verify, it indicates that the recipient has not opted-in to receive emails from this sender.
44 Citations
28 Claims
-
1. A method of processing an email generated by an emailer and intended for a recipient, said emailer maintaining an opt-in email list, the method comprising:
-
receiving said email, said email including an information portion and an authentication portion, said authentication portion being generated from said information portion using a first key associated with said recipient and said opt-in email list in a manner that causes said authentication portion to be securely cryptographically linked to said information portion; obtaining a certificate generated by a trusted third party, said certificate being generated by said trusted third party in response to said recipient opting-in to said opt-in email list, said certificate including a certificate key associated with said recipient and said opt-in email list; determining whether said certificate can be verified; determining whether said authentication portion can be verified using said certificate key; and providing said email to said recipient if said certificate and said authentication portion are successfully verified. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of adding a recipient to an opt-in email list maintained by an emailer and generating an email intended for said recipient, the method comprising:
-
receiving a request from said recipient to be added to said opt-in email list; directing said recipient to a trusted third party, wherein said trusted third party generates a certificate in response thereto, said certificate including a certificate key associated with said recipient and said opt-in email list; generating said email, said email including an information portion and an authentication portion, said authentication portion being generated by a secure cryptographic device from said information portion using a first key associated with said recipient and said opt-in email list in a manner that causes said authentication portion to be securely cryptographically linked to said information portion, said first key being stored by said secure cryptographic device; and sending said email to said recipient; wherein said certificate is provided by said trusted third party to at least one of an email service provider of said recipient and an email application of said recipient, and wherein said email is provided to said recipient by either of said email service provider and said email application of said recipient only if said either of said email service provider and said email application is able to successfully verify said certificate and successfully verify said authentication portion using said certificate key. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of adding a recipient to an opt-in email list maintained by an emailer and generating an email intended for said recipient, the method comprising:
-
receiving a request from said recipient to be added to said opt-in email list; directing said recipient to a trusted third party, wherein said trusted third party generates a certificate in response thereto, said certificate including a certificate key associated with said recipient and said opt-in email list; obtaining said certificate and determining whether said certificate can be verified; generating said email if said certificate can be verified, said email including an information portion and an authentication portion, said authentication portion being generated by a secure cryptographic device from said information portion using a first key associated with said recipient and said opt-in email list in a manner that causes said authentication portion to be securely cryptographically linked to said information portion, said first key being stored by said secure cryptographic device; and sending said email to said recipient; wherein said email is provided to said recipient by either of an email service provider of said recipient or an email application of said recipient only if said either of said email service provider and said email application is able to successfully verify said authentication portion using said certificate key. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification