SPAM RESISTANT E-MAIL SYSTEM
First Claim
Patent Images
1. A spam resistant e-mail system comprising:
- at least one e-mail managing computer connected to the Internet to communicate with users on user computers via an authenticated communication protocol;
the e-mail managing computer and user computers executing stored programs to;
establish authenticated communications between the users and the e-mail managing computer;
allow each given user to form an initial trusted human chain listing other member users;
produce an augmented trusted human chain for the given user by recursively adding other users linked to member users by trusted human chains of the member users;
communicate e-mail messages between the given user and one or more specified users in the given user'"'"'s augmented trusted human chain.
0 Assignments
0 Petitions
Accused Products
Abstract
A spam resistant e-mail system employs communication via authenticated communication channels while providing a mechanism for rapidly growing a list of authenticated individuals and managing that list on a personal and collaborative basis to prevent spammers from joining the network.
29 Citations
22 Claims
-
1. A spam resistant e-mail system comprising:
-
at least one e-mail managing computer connected to the Internet to communicate with users on user computers via an authenticated communication protocol; the e-mail managing computer and user computers executing stored programs to; establish authenticated communications between the users and the e-mail managing computer; allow each given user to form an initial trusted human chain listing other member users; produce an augmented trusted human chain for the given user by recursively adding other users linked to member users by trusted human chains of the member users; communicate e-mail messages between the given user and one or more specified users in the given user'"'"'s augmented trusted human chain. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of providing a spam resistant e-mail system using at least one e-mail managing computer connected to the Internet to communicate with users on user computers via an authenticated communication protocol, the method comprising the steps of:
-
establishing authenticated communications between the users and the e-mail managing computer; allowing each given user to form an initial trusted human chain listing other member users; producing an augmented trusted human chain for the given user by recursively adding other users linked to member users by trusted human chains of the member users; communicating e-mail messages between the given user and one or more specified users in the given user'"'"'s augmented trusted human chain. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification