EMAIL SPAM ELIMINATION USING PER-CONTACT ADDRESS
First Claim
1. A system and method for managing undesired email or SPAM, the method comprising of:
- a) a mail server running on a computer system connected to a computer network.b) a user interface that allows users to create a plurality of authorized addresses and assign each of them to a plurality of contacts.c) a data store that stores authorized email addresses, their respective assignees and message idsd) The mail server in turn comprising of a plurality of processes that include an SMTP server process and a filtering processe) The method of sending emails comprising of;
Placing the recipient'"'"'s authorized address in the ‘
From’ and
optionally the ‘
Reply-To’
SMTP headerSending the email via the SMTP process.f) The method of accepting emails comprising of;
accepting emails sent to authorized addresses sent by their respective assigneesaccepting emails that are continuing conversations of such emails.accepting optionally requests by email for new authorized addressesrejecting any other emails.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system to transparently generate or manually allocate an authorized email address per contact and accept email sent to the authorized email address from the contact. If an authorized email address is leaked, it will be detected quickly, revoked and the assignee of the authorized email will be notified. When one of the user'"'"'s contacts has sent an email to multiple recipients including the user, replies to the present conversation are allowed from other recipients. The user can generate a few open addresses that can receive email from any address. This allows the user to post email addresses on print or electronic publications and websites to allow readers to send email. This address could be revoked after a certain point in time or expire after an allocated lifetime.
30 Citations
31 Claims
-
1. A system and method for managing undesired email or SPAM, the method comprising of:
-
a) a mail server running on a computer system connected to a computer network. b) a user interface that allows users to create a plurality of authorized addresses and assign each of them to a plurality of contacts. c) a data store that stores authorized email addresses, their respective assignees and message ids d) The mail server in turn comprising of a plurality of processes that include an SMTP server process and a filtering process e) The method of sending emails comprising of; Placing the recipient'"'"'s authorized address in the ‘
From’ and
optionally the ‘
Reply-To’
SMTP headerSending the email via the SMTP process. f) The method of accepting emails comprising of; accepting emails sent to authorized addresses sent by their respective assignees accepting emails that are continuing conversations of such emails. accepting optionally requests by email for new authorized addresses rejecting any other emails. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification