Apparatus and method for an authenticated electronic userid
First Claim
1. A method for verifying an authenticated electronic userid comprising:
- receiving an electronic message from a remote user;
extracting an originator identifier, a first adapted digital signature, and at least a portion of a remote userid from said electronic message;
retrieving an originator key based on said originator identifier, said originator key not being shared with said remote user;
generating a second adapted digital signature after receiving said electronic message, said second adapted digital signature based on at least said portion of said remote userid and said originator key;
comparing said first adapted digital signature to said second adapted digital signature;
accepting said electronic message from said remote user if said first adapted digital signature and said second adapted digital signature match; and
rejecting said electronic message from said remote user if said first adapted digital signature and said second adapted digital signature do not match.
6 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for an authenticated electronic userid is provided. According to one embodiment, an adapted digital signature is generated for an outbound message from a local user that authorizes a remote user to reply to the message. The adapted digital signature becomes part of an authenticated electronic userid and, when a reply from the remote user is made, the reply message includes the authenticated electronic userid. A one-way hash function is employed to generate the adapted digital signature. According to one embodiment, if an inbound message to a local user from a remote user does not have an authenticated electronic userid, in particular the adapted digital signature, then the inbound message is rejected. An advantage of the method and apparatus described herein is that unsolicited bulk electronic messages and other non-authorized communications to a local user of an electronic message system are reduced.
189 Citations
31 Claims
-
1. A method for verifying an authenticated electronic userid comprising:
-
receiving an electronic message from a remote user;
extracting an originator identifier, a first adapted digital signature, and at least a portion of a remote userid from said electronic message;
retrieving an originator key based on said originator identifier, said originator key not being shared with said remote user;
generating a second adapted digital signature after receiving said electronic message, said second adapted digital signature based on at least said portion of said remote userid and said originator key;
comparing said first adapted digital signature to said second adapted digital signature;
accepting said electronic message from said remote user if said first adapted digital signature and said second adapted digital signature match; and
rejecting said electronic message from said remote user if said first adapted digital signature and said second adapted digital signature do not match. - View Dependent Claims (2, 3, 4)
hashing said originator key and said portion of said remote userid with one or more other identifiers to form a digital signature; and
converting said digital signature from a first digital format into a second digital format, said digital signature in said second digital format being said second adapted digital signature.
-
-
3. The method of claim 1, wherein said act of generating said second adapted digital signature comprises:
-
performing an encryption function using said originator key and said portion of said remote userid with one or more other identifiers to form a digital signature; and
converting said digital signature from a first digital format into a second digital format, said digital signature in said second digital format being said second adapted digital signature.
-
-
4. The method of claim 2, further comprising:
-
comparing said originator identifier to a list of local users; and
rejecting said electronic message is if said originator identifier is not found in said list of local users.
-
-
5. A method for creating an authenticated electronic userid comprising:
-
receiving a request for said authenticated electronic userid;
retrieving an originator key, said originator key corresponding to a local userid;
hashing said originator key, said local userid, and at least a portion of a remote userid to form a digital signature;
converting said digital signature from a first digital format into a second digital format, said digital signature in said second digital format being an adapted digital signature;
concatenating said adapted digital signature with at least an originator identifier; and
returning a result of said act of concatenating as said authenticated electronic userid.
-
-
6. An electronic message system comprising:
-
a computer configured to run an electronic message server application;
a router coupled to said computer, said router configured to forward a first electronic message from a local user, said first electronic message comprising a first authenticated electronic userid, and said router further configured to receive a second electronic message from a remote user, said second electronic message comprising a second authenticated electronic userid; and
a computer program stored in a memory device coupled to said computer, said computer program configured to cause said computer to generate said first authenticated electronic userid for said first electronic message, said first electronic userid having an adapted digital signature and an originator identifier, and said computer program further configured to cause said computer to reject said second electronic message if said computer cannot re-generate said adapted digital signature from an originator identifier, a non-shared originator key, and at least a portion of a remote userid, which is contained in envelope information associated with said second electronic message and match said re-generated adapted digital signature with a portion of said second authenticated electronic userid. - View Dependent Claims (7, 8)
hashing said originator key, at least a portion of said remote userid, and an originator identifier to form a digital signature; and
converting said digital signature from a first digital format into a second digital format, said digital signature in said second digital format being said adapted digital signature.
-
-
8. The electronic message system of claim 7, wherein said computer program is further configured to:
-
extract said originator identifier from said envelope information associated with said second electronic message;
compare said originator identifier to a list of local users; and
reject said second electronic message if said originator identifier does not match a local userid in said list of local users.
-
-
9. An authenticated message server configured to create and verify an authenticated electronic userid,
wherein creating said authenticated electronic userid comprises: -
receiving a request for said authenticated electronic userid;
retrieving an originator key, said originator key corresponding to a local userid;
generating a first adapted digital signature, said first adapted digital signature based on said originator key and at least a portion of a remote userid;
concatenating said first adapted digital signature with at least an originator identifier; and
returning a result of said step of concatenating as said authenticated electronic userid; and
wherein verifying said authenticated electronic userid comprises;
receiving an electronic message from a remote user, said electronic message comprising said authenticated electronic userid;
extracting said originator identifier, said first adapted digital signature, and at least said portion of said remote userid from said authenticated electronic userid;
retrieving said originator key based on said originator identifier;
generating a second adapted digital signature, said second adapted digital signature based on at least originator key and at least said portion of said remote userid;
comparing said first adapted digital signature to said second adapted digital signature;
accepting said electronic message from said remote user if said first adapted digital signature and said second adapted digital signature match; and
rejecting said electronic message from said remote user if said first adapted digital signature and said second adapted digital signature do not match. - View Dependent Claims (10, 11, 12, 13, 14)
hashing said originator key, said portion of said remote userid, and one or more other identifiers to form a digital signature; and
converting said digital signature from a first digital format into a second digital format, said digital signature in said second digital format being said adapted digital signature.
-
-
11. The authenticated message server of claim 9, wherein said acts of generating said first adapted digital signature and said second adapted digital signature comprise:
-
performing an encryption function using said originator key, said portion of said remote userid, and one or more other identifiers to form a digital signature; and
converting said digital signature from a first digital format into a second digital format, said digital signature in said second digital format being said adapted digital signature.
-
-
12. The authenticated message server of claim 10, wherein said one or more other identifiers include local user information.
-
13. The authenticated message server of claim 11, wherein said one or more other identifiers include local user information.
-
14. The authenticated message server of claim 9, wherein said act of verifying said authenticated electronic userid further comprises:
-
extracting said originator identifier from said envelope information associated with said electronic message;
comparing said originator identifier to a list of local users; and
rejecting said electronic message if said originator identifier does not match a particular local userid in said list of local users.
-
-
15. A method for filtering junk electronic mail, comprising:
-
receiving an electronic message from a remote user;
generating an adapted digital signature based on an originator identifier and remote user information from said electronic message and an originator key, said act of generating comprising;
hashing a local userid associated with said originator identifier, said remote user information, and said originator key to form a digital signature;
transforming said digital signature from a first digital format to a second digital format; and
returning said digital signature in said second digital format as said adapted digital signature;
comparing said adapted digital signature to a portion of said electronic message;
accepting said electronic message if said adapted digital signature and said portion of said electronic message match; and
rejecting said electronic message if said adapted digital signature and said portion of said electronic message do not match. - View Dependent Claims (16, 17)
hashing said local userid, said remote user information, and said originator key to form a first digital signature;
transforming said first digital signature from said first digital format to said second digital format; and
returning said first digital signature in said second digital format as said portion of said electronic message.
-
-
18. A computer-readable medium having stored therein one or more sequences of instructions for causing at least one processor to perform a method for verifying an authenticated electronic userid, the method comprising:
-
receiving an eletronic message from a remote user;
extracting an originator identifier, a first adapted digital signature, and at least a portion of a remote userid from said electronic message;
retrieving an originator key based on said originator identifier, said originator key not being shared with said remote user;
generating a second adapted digital signature after receiving said electronic message, said second adapted digital signature based on at least said portion of said remote userid and said originator key;
comparing said first adapted digital signature to said second adapted digital signature;
accepting said electronic message from said remote user if said first adapted digital signature and said second adapted digital signature match; and
rejecting said eletronic message from said remote user if said first adapted digital signature and said second adapted digital signature do not match. - View Dependent Claims (19, 20, 21)
hashing said originator key and said portion of said remote userid with one or more other identifiers to form a digital signature; and
converting said digital signature from a first digital format into a second digital format, said digital signature in said second digital format being said second adapted digital signature.
-
-
20. The computer-readable medium of claim 18, wherein said act of generating said second adapted digital signature comprises:
-
performing an encryption function using said originator key and said portion of said remote userid with one or more other identifiers to form a digital signature; and
converting said digital signature from a first digital format into a second digital format, said digital signature in said second digital format being said second adapted digital signature.
-
-
21. The computer-readable medium of claim 19, further comprising:
-
comparing said originator identifier to a list of local users; and
rejecting said electronic message is if said originator identifier is not found in said list of local users.
-
-
22. A computer-readable medium having store therein one or more sequences of instructions for causing at least one processor to perform a method for creating an authenticated electronic userid, the method comprising:
-
receiving a request for said authenticated eletronic userid;
retrieving an originator key, said originator key corresponding to a local userid;
hashing said originator key, said local userid, and at least a portion of a remote userid to form a digital signature;
converting said digital signature from a first digital format into a second digital format, said digital signature in said second digital format being an adapted digital signature;
concatenating said adapted digital signature with at least an originator identifier; and
returning a result of said act of concatenating as said authenticated electronic userid.
-
-
23. A computer-readable medium having stored therein one or more sequences of instructions for causing an authenticated message server to create and verify an authenticated electronic userid,
wherein creating said authenticated electronic userid comprises computer-implemented instructions for: -
receiving a request for said authenticated electronic userid;
retrieving an originator key, said originator key corresponding to a local userid;
generating a first adapted digital signature, said first adapted digital signature based on said originator key and at least a portion of a remote userid;
concatenating said first adapted digital singature with at least an originator identifier; and
returning a result of said step of concatenating as said authenticated electronic userid; and
wherein verifying said authenticated electronic userid comprises computer-implemented instructions for;
receiving an eletronic message from a remote user, said eletronic message comprising said authenticated eletronic userid;
extracting said originator identifier, said first adapted digital signature, and least said portion of said remote userid from said authenticated eletronic userid;
retrieving said originator key based on said originator identifier;
generating a second adapted digital signature, said second adapted digital signature based on at least originator key and at least said portion of said remote userid;
comparing said first adapted digital signature to said second adapted digital signature;
accepting said electronic message from said remote user if said first adapted digital signature match; and
rejecting said eletronic message from said remote user if said first adapted digital signature and said second adapted digital signature do not match. - View Dependent Claims (24, 25, 26, 27, 28)
hashing said originator key, said portion of said remote userid, and one or more other identifiers to form a digital signature; and
converting said digital signature from a first digital format into a second digital format, said digital signature in said second digital format being said adapted digital signature.
-
-
25. The computer-readable medium of claim 23, wherein said acts of generating said first adapted digital signature and said second adapted digital signature comprise:
-
performing an encryption function using said originator key, said portion of said remote userid, and one or more other identifiers to form a digital signature; and
converting said digital signature from a first digital format into a second digital format, said digital signature in said second digital format being said adapted digital signature.
-
-
26. The computer-readable medium of claim 24, wherein said one or more other identifiers include local user information.
-
27. The computer-readable medium of claim 25, wherein said one or more other identifiers include local user information.
-
28. The computer-readable medium of claim 23, wherein said act of verifying said authenticated eletronic userid further comprises:
-
extracting said originator identifier from said envelope information associated with said electronic message;
comparing said originator identifier to a list of local users; and
rejecting said electronic message if said originator identifier does not match a particular local userid in said list of local users.
-
-
29. A computer-readable medium having store therein one or more sequences of instructions for causing at least one processor to perform a method for filtering junk eletronic mail, the method comprising:
-
receiving an eletronic message from a remote user;
generating an adapted digital signature based on an originator identifier and remote suer information from said eletronic message and an originator key, said act of generating comprising;
hashing a local userid associated with said originator identifier, said remote user information, and said originator key to form a digital signature;
transforming said digital signature from a first digital format to a second digital format; and
returning said digital signature in said second digital format as said adapted digital signature;
comparing said adapted digital signature to a portion of said eletronic message;
accepting said eletronic message if said adapted digital signature and said portion of said electronic message match; and
rejecting said eletronic message if said adapated digital signature and said portion of said electronic message do not match. - View Dependent Claims (30, 31)
hashing said local userid, said remote user information, and said originator key to form a first digital signature;
transforming said first digital signature from said first digital format to said second digital format; and
returning said first digital signature in said second digital format as said portion of said electronic message.
-
Specification