METHOD AND SYSTEM FOR FILTERING UNAUTHORIZED ELECTRONIC MAIL MESSAGES
0 Assignments
0 Petitions
Accused Products
Abstract
A computer system and method for filtering unauthorized electronic mail messages that are sent by senders to a user. In one embodiment, the system includes a list of the identifications of the senders who are authorized to send an electronic mail message to the user. When an electronic mail message is received, the system determines whether the identification of sender in the electronic mail message is in the list of the identifications of the senders who are authorized. When the sender of the electronic mail message is determined to be authorized, the system stores the electronic mail message in a designated folder. When the sender of the electronic mail message is determined to be not authorized, the system stores the electronic mail message in a folder other than the designated folder.
-
Citations
30 Claims
-
1-7. -7. (canceled)
-
8. Computer apparatus having a default location for storing received electronic mail messages each of which includes a respective identification of a sender of the electronic mail message, the computer apparatus comprising:
-
a storage device retaining a record of the identifications of the senders who are authorized to send an electronic mail message to the user; and a processing apparatus operable to; compare the identification of a sender of each electronic mail message with the record of the identifications retained in the storage device to determine whether the sender of the electronic mail message is authorized or unauthorized; cause the electronic mail message to be stored in the default location only if the sender of the electronic mail message is determined to be authorized; and cause the user to receive the electronic mail message responsive to another user providing an indication that the electronic mail message should be viewed by the user even though the electronic mail message was sent by an unauthorized sender. - View Dependent Claims (9, 10, 11)
-
-
12. A method for receiving electronic mail messages in a manner that is personalized to a recipient, the method comprising:
-
generating a list of senders authorized to send electronic mail messages; sharing the list of authorized senders with a plurality of recipients of electronic mail messages; determining whether the sender of an electronic mail message is authorized by determining whether the sender is in the generated list of authorized senders; and determining whether the sender of the electronic mail message is designated as being unauthorized by determining that the sender is not in the shared list; wherein electronic mail messages from senders that are designated as unauthorized are stored in a first location, and messages from senders that are designated as authorized are stored in a different location than said first location. - View Dependent Claims (13, 14)
-
-
15. A method for receiving electronic mail messages in a manner that is personalized to a recipient, the method comprising:
-
evaluating a first electronic message sent from a sender and addressed to a user by determining whether an identity of the sender is on a first list of pre-approved sender identities shared between a plurality of users; and making the first electronic message available to be selectively viewed by the user from a first directory location when the identity of the sender is on the first list, the first directory location comprising a primary directory location from which electronic messages received by the user and not determined to be junk are to be selected for initial viewing by the user; and making the first electronic message available to be selectively viewed by the user from a second directory location separate from the first directory location when it is determined that the identity of the sender is not on the first list, the second directory location comprising a directory location from which electronic messages received by the user and determined to be junk are to be selected for initial viewing by the user. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification