Junk electronic mail detector and eliminator
First Claim
Patent Images
1. A computer program product, comprising:
- a computer storage medium and a computer program code mechanism embedded in the computer storage medium for causing a computer to process electronic mail messages, the computer program code mechanism comprising;
a first computer code device configured to receive an incoming electronic mail message;
a second computer code device configured to determine a candidate machine and a candidate user id of a purported sender of the incoming electronic mail message;
a third computer code device configured to send a verification request to the candidate user id at the candidate machine;
a fourth computer code device configured to receive a verification response to the verification request; and
a fifth computer code device configured to block delivery of the incoming electronic mail message based on the verification response when the response indicates that the candidate machine does not exist.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for parsing and analyzing incoming electronic mail messages to determine a confidence factor indicative of whether or not the messages are junk e-mail. The method and system utilize message services which attempt to contact the purported sender in order to verify that the identified host computer actually exists and accepts outgoing mail services for the specified user. The routing history is also examined to ensure that identified intermediate sites are also valid. Likewise, seed addresses can alert an e-mail provider to potential mass mailings by reporting when mail is received for ghost or non-existent accounts.
-
Citations
20 Claims
-
1. A computer program product, comprising:
-
a computer storage medium and a computer program code mechanism embedded in the computer storage medium for causing a computer to process electronic mail messages, the computer program code mechanism comprising;
a first computer code device configured to receive an incoming electronic mail message;
a second computer code device configured to determine a candidate machine and a candidate user id of a purported sender of the incoming electronic mail message;
a third computer code device configured to send a verification request to the candidate user id at the candidate machine;
a fourth computer code device configured to receive a verification response to the verification request; and
a fifth computer code device configured to block delivery of the incoming electronic mail message based on the verification response when the response indicates that the candidate machine does not exist. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
a sixth computer code device configured to send an authentication message to an authenticator to determine if the incoming electronic mail message purportedly from the candidate user id and candidate machine should be blocked;
a seventh computer code device configured to receive an authentication response from the authenticator indicating whether the incoming electronic mail message should be blocked; and
an eighth computer code device configured to block delivery of the incoming electronic mail message based on the authentication response.
-
-
3. The computer program product as claimed in claim 2, wherein the fifth and eighth computer code devices comprise a ninth computer code device configured to use a weighted metric to block delivery of the incoming electronic mail message based on the authentication response and based on the verification response when the verification response indicates that the candidate machine does not exist or the candidate user id is invalid.
-
4. The computer program product as claimed in claim 2, wherein:
-
the second computer code device comprises a ninth computer code device configured to parse a unique identification code from the incoming electronic mail message; and
the sixth computer code device comprises a tenth computer code device configured to send the unique identification code, the candidate machine, and the candidate user id to the authenticator.
-
-
5. The computer program product as claimed in claim 1, wherein the second computer code device comprises a sixth computer code device configured to parse a “
- From;
”
field into the candidate machine and the candidate user id.
- From;
-
6. The computer program product as claimed in claim 1, wherein the second computer code device comprises a sixth computer code device configured to parse a “
- Reply-To;
”
field into the candidate machine and the candidate user id.
- Reply-To;
-
7. The computer program product as claimed in claim 1, wherein the fifth computer code device comprises a sixth computer code device configured to block delivery of the incoming electronic mail message based on filtering rules and based on the verification response when the verification response indicates that the candidate machine does not exist or the candidate user id is invalid.
-
8. The computer program product as claimed in claim 1, further comprising:
a sixth computer code device configured to remove the incoming electronic mail message from a user'"'"'s mail box after delivery when the incoming electronic mail message subsequently is identified as a junk electronic mail message.
-
9. A computer-implemented method of utilizing a computer memory to perform the steps of:
-
receiving an incoming electronic mail message;
determining a candidate machine and a candidate user id of a purported sender of the incoming electronic mail message;
sending a verification request to the candidate user id at the candidate machine;
receiving a verification response to the verification request; and
blocking delivery of the incoming electronic mail message based on the verification response when the verification response indicates that the candidate machine does not exist. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
sending an authentication message to an authenticator to determine if the incoming electronic mail message purportedly from the candidate user id and candidate machine should be blocked;
receiving an authentication response from the authenticator indicating whether the incoming electronic mail message should be blocked; and
blocking delivery of the incoming electronic mail message based on the authentication response.
-
-
11. The computer-implemented method as claimed in claim 10, wherein the steps of blocking comprise a combined sub-step of using a weighted metric to block delivery of the incoming electronic mail message based on the authentication response and based on the verification response when the verification response indicates that the candidate machine does not exist or the candidate user id is invalid.
-
12. The computer-implemented method as claimed in claim 10, wherein:
-
the step of determining comprises the sub-step of parsing a unique identification code from the incoming electronic mail message; and
the step of sending the verification request comprises sending the unique identification code, the candidate machine, and the candidate user id to the authenticator.
-
-
13. The computer-implemented method as claimed in claim 9, wherein the step of determining comprises the sub-step of parsing a “
- From;
”
field into the candidate machine and the candidate user id.
- From;
-
14. The computer-implemented method as claimed in claim 9, wherein the step of determining comprises the sub-step of parsing a “
- Reply-To;
”
field into the candidate machine and the candidate user id.
- Reply-To;
-
15. The computer-implemented method as claimed in claim 9, wherein the step of blocking comprises the sub-step of blocking delivery of the incoming electronic mail message based on filtering rules and based on the verification response when the verification response indicates that the candidate machine does not exist or the candidate user id is invalid.
-
16. The computer-implemented method as claimed in claim 9, further comprising:
removing the incoming electronic mail message from a user'"'"'s mail box after delivery when the incoming electronic mail message subsequently is identified as a junk electronic mail message.
-
17. A computer program product, comprising:
-
a computer storage medium and a computer program code mechanism embedded in the computer storage medium for causing a computer to process electronic mail messages, the computer program code mechanism comprising;
a first computer code device configured to receive an incoming electronic mail message;
a second computer code device configured to determine a candidate machine and a candidate user id of a purported sender of the incoming electronic mail message;
a third computer code device configured to send a verification request to the candidate user id at the candidate machine;
a fourth computer code device configured to receive a verification response to the verification request; and
a fifth computer code device configured to block delivery of the incoming electronic mail message based on the verification response when the response indicates that the candidate user id is invalid.
-
-
18. A computer-implemented method of utilizing a computer memory to perform the steps of:
-
receiving an incoming electronic mail message;
determining a candidate machine and a candidate user id of a purported sender of the incoming electronic mail message;
sending a verification request to the candidate user id at the candidate machine;
receiving a verification response to the verification request; and
blocking delivery of the incoming electronic mail message based on the verification response when the verification response indicates that the candidate user id is invalid.
-
-
19. A system for blocking undesired e-mails, the system comprising:
-
means for receiving an incoming electronic mail message;
means for determining a candidate machine and a candidate user id of a purported sender of the incoming electronic mail message;
means for sending a verification request to the candidate user id at the candidate machine;
means for receiving a verification response to the verification request; and
means for blocking delivery of the incoming electronic mail message based on the verification response when the verification response indicates that the candidate user id is invalid.
-
-
20. A system for blocking undesired e-mails, the system comprising:
-
means for receiving an incoming electronic mail message;
means for determining a candidate machine and a candidate user id of a purported sender of the incoming electronic mail message;
means for sending a verification request to the candidate user id at the candidate machine;
means for receiving a verification response to the verification request; and
means for blocking delivery of the incoming electronic mail message based on the verification response when the verification response indicates that the candidate machine does not exist.
-
Specification