Means and method for controlling the distribution of unsolicited electronic communications
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, devices, and systems for controlling distribution of unsolicited electronic communications such as bulk email or internet telephony telemarketing calls. A first Public Key (56) of a trusted accrediting body (10) is stored in a storage device (50) of a receiver (1), the trusted accrediting body (10) being trusted by the receiver (1). A sender (40) is issued a second Public Key (79) which chains back to the first Public Key (56). The sender (40) sends an unsolicited communication (62, 64), accompanied by a digital signature corresponding to the second Public Key (79). The receiver (1) verifies the digital signature accompanying a received communication by referring to the first Public Key (56) via the second Public Key (79), and if the digital signature is verified, establishes that the unsolicited communication is not unwelcome.
18 Citations
107 Claims
-
1-87. -87. (canceled)
-
88. A method for controlling distribution of unsolicited electronic communications, the method comprising:
-
storing in a storage device of a receiver a first Public Key of a trusted accrediting body, the trusted accrediting body being trusted by the receiver; issuing to a sender a second Public Key, the second Public Key chaining back to the first Public Key; the sender sending an unsolicited communication having an accompanying digital signature corresponding to the second Public Key; and upon the receiver verifying the received digital signature by reference to the first Public Key via the second Public Key, establishing that the unsolicited communication is not unwelcome. - View Dependent Claims (89, 90, 91, 92, 93, 94, 95, 96)
-
- 97. A method of accrediting a sender in order to control distribution of unsolicited electronic communications, the method comprising issuing to the sender a second Public Key, wherein a trusted accrediting body is trusted by a receiver, and wherein the second Public Key chains back to a first Public Key of the trusted accrediting body stored by a storage device of the receiver.
-
99. A method of controlling receipt of an unsolicited electronic communication by a receiver, the method comprising:
-
retrieving from a storage device of the receiver a first Public Key of a trusted accrediting body, the trusted accrediting body being trusted by the receiver; verifying by reference to the first Public Key a digital signature accompanying the unsolicited electronic communication, and if verified establishing that the unsolicited electronic communication is not unwelcome. - View Dependent Claims (100, 101, 102, 103, 104, 105, 106)
-
-
107. A computer program for controlling receipt of an unsolicited electronic communication by a receiver, the computer program comprising:
-
code for retrieving from a storage device of the receiver a first Public Key of a trusted accrediting body, the trusted accrediting body being trusted by the receiver; code for verifying a digital signature accompanying the unsolicited electronic communication by reference to the first Public Key, and if verified, for establishing that the unsolicited electronic communication is not unwelcome.
-
Specification