METHOD AND SYSTEM FOR FILTERING UNAUTHORIZED ELECTRONIC MAIL MESSAGES
First Claim
1. A computer system having a default location for storing received electronic mail messages each of which includes a respective identification of a sender of the electronic mail message, the computer system comprising:
- a storage device retaining a record of the identifications of the senders who are authorized to send an electronic mail message to the user; and
a processing system operable to compare the identification of a sender of each electronic mail message with the record of the identifications retained in the storage device to determine that the sender of the electronic mail message is authorized responsive to a comparison match and to determine that the sender of the electronic mail message is unauthorized in the absence of a comparison match, the processing system being operable to cause the electronic mail message to be stored in the default location only if the sender of the electronic mail message is determined to be authorized, the processing system being operable to forward the received electronic mail message to an other user if the sender of the electronic mail message is determined to be unauthorized, the processing system further being operable to allow the user to receive the electronic mail message responsive to the other user providing an indication that the electronic mail message should be viewed by the user even though the electronic mail message was sent by an unauthorized sender.
0 Assignments
0 Petitions
Accused Products
Abstract
A computer system and method for filtering unauthorized electronic mail messages that are sent by senders to a user. The system includes a list of the identifications of the senders who are authorized to send an electronic mail message to the user. When an electronic mail message is received, the system determines whether the sender of the electronic mail message is authorized by determining whether the identification of sender in the electronic mail message is in the list of the identifications of the senders who are authorized. When the sender of the electronic mail message is determined to be authorized, the system stores the electronic mail message in an Inbox folder. When the sender of the electronic mail message is determined to be not authorized, the system stores the electronic mail message in a Junk Mail folder. In this way, the electronic mail messages are automatically stored in the appropriate folder based on whether the sender is authorized so that the user can view the Inbox folder containing the electronic mail messages sent by authorized senders separately from the Junk Mail folder containing the electronic mail messages sent by unauthorized senders.
-
Citations
7 Claims
-
1. A computer system having a default location for storing received electronic mail messages each of which includes a respective identification of a sender of the electronic mail message, the computer system comprising:
-
a storage device retaining a record of the identifications of the senders who are authorized to send an electronic mail message to the user; and a processing system operable to compare the identification of a sender of each electronic mail message with the record of the identifications retained in the storage device to determine that the sender of the electronic mail message is authorized responsive to a comparison match and to determine that the sender of the electronic mail message is unauthorized in the absence of a comparison match, the processing system being operable to cause the electronic mail message to be stored in the default location only if the sender of the electronic mail message is determined to be authorized, the processing system being operable to forward the received electronic mail message to an other user if the sender of the electronic mail message is determined to be unauthorized, the processing system further being operable to allow the user to receive the electronic mail message responsive to the other user providing an indication that the electronic mail message should be viewed by the user even though the electronic mail message was sent by an unauthorized sender. - View Dependent Claims (2, 3, 4)
-
-
5. A computer system receiving electronic mail messages each of which has a sender, the computer system including a personal list of authorized senders that is personalized to a recipient, the computer system comprising:
-
a system for filtering unauthorized received electronic mail messages, the system including a list generator for automatically generating a list of senders authorized to send electronic mail messages, the list being shared by multiple recipients of electronic mail messages; and a processor operable for each of a plurality of received electronic mail messages to determine whether the sender of the electronic mail message is designated as being authorized by determining whether the sender is in the generated list of authorized senders and determining whether the sender of the electronic mail message is designated as being unauthorized by determining that the sender is not in either list. - View Dependent Claims (6, 7)
-
Specification