SYSTEM FOR POLICING JUNK E-MAIL MESSAGES
First Claim
1. A method for a computer system comprisesreceiving a first unsolicited commercial electronic mail message initiated by an e-mail sender;
- sending a request not to receive any future unsolicited commercial electronic mail messages initiated by the e-mail sender at an electronic mail address where the unsolicited commercial electronic mail message was received;
receiving a second unsolicited commercial electronic mail message;
automatically determining whether the e-mail sender is in violation of the request, in response to the second unsolicited commercial electronic mail message; and
when the e-mail sender is in violation of the request, reporting the violation of the request.
5 Assignments
0 Petitions
Accused Products
Abstract
A system for policying an unsolicited e-mail communication. The system has a plurality of clients, each coupled together using a wide area network of computers, such as the Internet or an internet. Each of the clients is adapted to send an indication of an unsolicited e-mail message through an e-mail device for a display. The system also has a policying server coupled to each of the plurality of clients through the wide area network of computers. The policying server is adapted to receive the indication from at least one of the clients. The e-mail device comprises an SPAM icon on the display. The SPAM icon is adapted to send the indication from the client to the policying server.
31 Citations
44 Claims
-
1. A method for a computer system comprises
receiving a first unsolicited commercial electronic mail message initiated by an e-mail sender; -
sending a request not to receive any future unsolicited commercial electronic mail messages initiated by the e-mail sender at an electronic mail address where the unsolicited commercial electronic mail message was received; receiving a second unsolicited commercial electronic mail message; automatically determining whether the e-mail sender is in violation of the request, in response to the second unsolicited commercial electronic mail message; and when the e-mail sender is in violation of the request, reporting the violation of the request. - View Dependent Claims (2, 3, 4, 5, 6, 8, 9, 10)
-
-
12. A method for a computer system comprises
receiving reports of unwanted e-mail request violations by e-mail senders from users at user e-mail addresses, wherein each unwanted e-mail request violation includes an indication of a first unsolicited commercial e-mail message initiated by an e-mail sender, an indication of a request to the e-mail sender not to initiate any future unsolicited commercial e-mail messages to a user e-mail address, and an indication of a second unsolicited commercial e-mail message initiated by an e-mail sender in violation of the request; -
determining whether a number of reports of unwanted e-mail request violations by a specific e-mail sender exceeds a threshold number; and when the number of reports of unwanted e-mail request violations exceeds the threshold number, reporting the unwanted e-mail request violations. - View Dependent Claims (7, 11, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer system comprises:
-
a processor configured to execute code; and a memory coupled to the processor, wherein the memory includes; code that directs the processor to provide a first junk e-mail message initiated by an e-mail sender to a user at a user e-mail address; code that directs the processor to receive a remove request from the user regarding the first junk e-mail message; code that directs the processor to send a request to the e-mail sender not to initiate any future junk e-mail messages to the user e-mail address, code that directs the processor to store the request in the memory; code that directs the processor to determine receipt of a second junk e-mail message initiated by the e-mail sender to the user e-mail address; code that directs the processor to generate a report of a violation of the request in response a determination of receipt of the second junk e-mail message. - View Dependent Claims (24, 25, 26, 29, 30, 31, 32, 33)
-
-
27. The computer system 26
wherein the third party server provides e-mail filtering-out services, and wherein the third party server returns updated e-mail filters in response to the report of the violation.
-
28. The computer system 27 wherein the memory further comprises
code that directs the processor to filter-out subsequent junk e-mail messages from the e-mail sender, in response to the updated e-mail filters.
-
34. A computer program product for a computer system including a processor and a display comprises:
-
code that directs the processor to initiate sending a request to an e-mail sender of a first unsolicited commercial e-mail message to not send any future unsolicited commercial e-mail message to a user e-mail address where the first unsolicited commercial e-mail message was addressed in response to a user input; code that directs the processor to maintain a log of the first unsolicited commercial e-mail message and the request; code that directs the processor to generate a report when a second unsolicited commercial e-mail message to the user e-mail address is from the e-mail sender; and code that directs the processor to output the report; wherein the codes reside on a tangible media. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
Specification