Method and system for reducing the proliferation of electronic messages
First Claim
Patent Images
1. A method of reducing the proliferation of electronic messages in a server system comprising one or more servers for distributing said electronic messages, the method comprising:
- providing at least one electronic message or a portion thereof;
receiving at least one spam notification signal related to said electronic message or said portion thereof, andrestricting access to said electronic message solely in response to receiving said at least one spam notification signal.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system for reducing the proliferation of electronic messages is disclosed. An electronic message or a portion thereof is transmitted by the server system. A spam notification signal may be received related to the electronic message or the portion thereof. Access to said electronic message is restricted solely in response to receiving the spam notification signal.
-
Citations
63 Claims
-
1. A method of reducing the proliferation of electronic messages in a server system comprising one or more servers for distributing said electronic messages, the method comprising:
-
providing at least one electronic message or a portion thereof; receiving at least one spam notification signal related to said electronic message or said portion thereof, and restricting access to said electronic message solely in response to receiving said at least one spam notification signal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 41, 42)
-
-
22. A server system comprising one or more servers adapted for reducing the proliferation of electronic messages, wherein said server system comprises:
-
an electronic message receiver arranged for receiving an electronic message or a portion thereof; an electronic message provider arranged for providing said electronic message or said portion thereof; a spam notification receiver arranged for receiving at least one spam notification signal related to said electronic message or said portion thereof; and an access restrictor arranged for restricting access to said electronic message solely in response to receiving said at least one spam notification signal. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 43)
-
-
44. An information exchange system, comprising a network of at least one server provided with a memory and a number of participants'"'"' stations, for example personal computers (pc'"'"'s), or (mobile) telephones or pda'"'"'s, which server is arranged for communication with participants'"'"' stations and which participants'"'"' stations are suitable for exchanging information, for example messages, with each other,
wherein in connection with authentication and authorisation, each prospective participant of the information exchange system must have provided the administrator of the information exchange system with at least: -
a) proof of his identity; b) his declaration of agreement to the administrator'"'"'s General Terms and Conditions; after verification of which said prospective participant is registered in the server as a registered participant; a unique “
log-in code”
is composed for every registered participant and stored in the memory, which log-in code consists of a participant address, for example a name, a user ID or a “
box number”
, and at least one participant-specific password, which can function as an authorisation code, for example in the form of an alphabetical and/or numerical code;communication takes place via secured network connections, for example on the basis of encryption, or via network connections that are essentially at least equal thereto; each participant must send the aforesaid log-in code to the server upon logging in on the server, after which the server looks up said log-in code in the respective memory, and after having found it, grants the participant access if the log-in code as found and the log-in code received from the participant are fully identical; the server stores all the information the participant has sent to the server in its memory once, wherein the server grants rights to the addressor and the addressee(s) to consult the server for said stored information, wherein one or more characteristics of said information, for example the subject and/or the sender, can be shown in an information survey, for example an “
in box”
or “
out box”
of the authorised participant(s), which information survey is available to the authorised participant(s) after they have logged in to the server, wherein an authorised participant can select from his information survey which addressed information he wishes to download from the server'"'"'s memory;if a participant B downloads information from a participant A via the system, the server enables him to register the downloaded information as unwanted in the server, wherein the server, in the case that said information is registered as unwanted, can limit the authorised participant(s)'"'"' right to download this information and other information from participant A as well as participant A'"'"'s right to address, so that only authorised and traceable participants can exchange information via secured connections and via the server without a limitation of their accessibility being previously configured in the system, wherein the participants themselves determine what is unwanted information, thus playing an active part in preventing the spreading thereof. - View Dependent Claims (45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63)
-
Specification