DETECTING AND MITIGATING UNSOLICITED EMAIL ABUSE
First Claim
1. A method, comprising the steps of:
- a) accepting from an administrator of an account associated with a business ID, via an interface displayed on a client communicatively coupled to a network and one or more software components in a software combination executed on one or more servers communicatively coupled to a network, a selection of one or more contacts from a list of contacts opted in by the administrator to receive an email distribution, the one or more contacts stored in a data storage communicatively coupled to the network;
b) receiving from the administrator a message content and a schedule for the email distribution;
c) delivering the message content to each contact in the list of contacts, via an email address associated with each contact;
d) determining, for each contact in the list of contacts, whether the contact has read the message content and reported the email distribution as an unsolicited email message;
e) if a plurality of contacts in the list of contacts reported an unsolicited email message, determining whether a plurality of reported unsolicited email for the email distribution exceeds one or more spam limit rules;
f) if the plurality of reported unsolicited email for the email distribution exceeds the one or more spam limit rules;
i) placing a hold on the email distribution by an abuse department; and
ii) displaying an alert referring the administrator to the abuse department for review of the account; and
g) if the plurality of unsolicited email for the email distribution does not exceed the one or more spam limit rules, continuing the email distribution until either the email distribution concludes or the plurality of unsolicited email exceeds the one or more spam limit rules.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods of the present invention provide for detecting and mitigating abuse of unsolicited email or “spam.” An administrator may select one or more contacts from a list of contacts to opt in to receive an email distribution. An abuse detection software may then determine for each contact in the contact list whether the contact has read the email distribution and reported the email distribution as an unsolicited email message. If so, an abuse department may place a hold on the email distribution (possibly using abuse mitigation software) and display an alert referring the administrator to the abuse department for review of the account. Otherwise, the email distribution may continue to completion.
-
Citations
36 Claims
-
1. A method, comprising the steps of:
-
a) accepting from an administrator of an account associated with a business ID, via an interface displayed on a client communicatively coupled to a network and one or more software components in a software combination executed on one or more servers communicatively coupled to a network, a selection of one or more contacts from a list of contacts opted in by the administrator to receive an email distribution, the one or more contacts stored in a data storage communicatively coupled to the network; b) receiving from the administrator a message content and a schedule for the email distribution; c) delivering the message content to each contact in the list of contacts, via an email address associated with each contact; d) determining, for each contact in the list of contacts, whether the contact has read the message content and reported the email distribution as an unsolicited email message; e) if a plurality of contacts in the list of contacts reported an unsolicited email message, determining whether a plurality of reported unsolicited email for the email distribution exceeds one or more spam limit rules; f) if the plurality of reported unsolicited email for the email distribution exceeds the one or more spam limit rules; i) placing a hold on the email distribution by an abuse department; and ii) displaying an alert referring the administrator to the abuse department for review of the account; and g) if the plurality of unsolicited email for the email distribution does not exceed the one or more spam limit rules, continuing the email distribution until either the email distribution concludes or the plurality of unsolicited email exceeds the one or more spam limit rules. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system comprising one or more software components in a software combination executed on one or more servers communicatively coupled to a network, the software combination comprising:
-
a) an opt-in software component configured to accept, from an administrator of an account associated with a business ID, a selection of one or more contacts from a list of contacts opted in by the administrator to receive an email distribution; b) a message delivery software component configured to; i) receive from the administrator a message content and a schedule for the email distribution; and ii) deliver the message content to each contact in the list of contacts, via an email address associated with each contact; c) an abuse detection software component configured to; i) determine, for each contact in the list of contacts, whether the contact has read the message content and reported the email distribution as an unsolicited email message; ii) determine if a plurality of reported unsolicited email for the email distribution exceeds the one or more spam limit rules; d) an abuse mitigation software component configured to, if the plurality of reported unsolicited email for the email distribution exceeds the one or more spam limit rules; i) place a hold on the email distribution by an abuse department; and ii) display an alert referring the administrator to the abuse department for review of the account. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification