Method and system for filtering unauthorized electronic mail messages
First Claim
1. A method in a computer system for filtering unauthorized received messages, each received message having a sender, the computer system having a default location for storing received messages the method comprising:
- for each of a plurality of messages, determining whether the sender of the message is designated as being either authorized or unauthorized;
storing the message in the default location only of the sender of the message is determined to be authorized;
indicating that the message is from an unauthorized sender by forwarding the message to another user; and
sending a forwarded message back from the other user to the recipient when the message should be viewed by the recipient even though the sender is not authorized.
4 Assignments
0 Petitions
Accused Products
Abstract
A computer system and method for filtering unauthorized electronic mail messages that are sent by senders to a user. The system includes a list of the identifications of the senders who are authorized to send an electronic mail message to the user. When an electronic mail message is received, the system determines whether the sender of the electronic mail message is authorized by determining whether the identification of sender in the electronic mail message is in the list of the identifications of the senders who are authorized. When the sender of the electronic mail message is determined to be authorized, the system stores the electronic mail message in an Inbox folder. When the sender of the electronic mail message is determined to be not authorized, the system stores the electronic mail message in a Junk Mail folder. In this way, the electronic ail messages are automatically stored in the appropriate folder based on whether the sender is authorized so that the user can view the Inbox folder containing the electronic mail messages sent by authorized senders separately from the Junk Mail folder containing the electronic mail messages sent by unauthorized senders.
-
Citations
9 Claims
-
1. A method in a computer system for filtering unauthorized received messages, each received message having a sender, the computer system having a default location for storing received messages the method comprising:
-
for each of a plurality of messages, determining whether the sender of the message is designated as being either authorized or unauthorized;
storing the message in the default location only of the sender of the message is determined to be authorized;
indicating that the message is from an unauthorized sender by forwarding the message to another user; and
sending a forwarded message back from the other user to the recipient when the message should be viewed by the recipient even though the sender is not authorized. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method in a computer system for filtering unauthorized received messages each of which has a sender, the computer system including a personal list of authorized senders that is personalized to a recipient the method comprising:
-
automatically generating a list of senders authorized to send messages, the list being shared by multiple recipients of messages; and
for each of a plurality of received messages, determining whether the sender of the message is designated as being authorized by determining whether the sender is in the generated list of authorized senders and determining whether the sender of the message is designated as being unauthorized by determining that the sender is not in either list. - View Dependent Claims (7, 8, 9)
-
Specification