Method and system for selectively blocking delivery of bulk electronic mail
First Claim
1. A method of operating a computer for the purpose of validating e-mail messages to enable blocking of unwanted ones of said e-mail messages, said method comprising the steps of:
- preparing, in response to the receipt of a predetermined e-mail message, a data key encoding information reflective of some aspect of said predetermined e-mail message;
issuing a challenge e-mail message including said data key;
detecting whether a response e-mail message, responsive to said challenge e-mail message, is received and whether said response e-mail message includes a response key encoding predetermined information reflective of a predetermined aspect of said challenge e-mail message;
recording, in response to receipt of said response key, a source address in a verified source address list; and
accepting receipt of said predetermined e-mail message on condition that the source address is recorded in said verified source address list and alternatively on condition that said predetermined e-mail message includes said response key.
2 Assignments
0 Petitions
Accused Products
Abstract
The origin address of an e-mail message is validated to enable blocking of e-mail from spam e-mail sources, by preparing, in response to the receipt of a predetermined e-mail message from an unverified source address, a data key encoding information reflective of the predetermined e-mail message. This message, including the data key, is then issued to the unverified source address. The computer system then operates to detect whether a response e-mail message, responsive to the challenge e-mail message, is received and whether the response e-mail message includes a response key encoding predetermined information reflective of a predetermined aspect of the challenge e-mail message. The unverified source address may be recorded in a verified source address list. Thus, when an e-mail message is received, the computer may operate to accept receipt of a predetermined e-mail message on condition that the source address of the predetermined e-mail message is recorded in the verified source address list and alternatively on condition that the predetermined e-mail message includes the response key.
-
Citations
6 Claims
-
1. A method of operating a computer for the purpose of validating e-mail messages to enable blocking of unwanted ones of said e-mail messages, said method comprising the steps of:
-
preparing, in response to the receipt of a predetermined e-mail message, a data key encoding information reflective of some aspect of said predetermined e-mail message; issuing a challenge e-mail message including said data key; detecting whether a response e-mail message, responsive to said challenge e-mail message, is received and whether said response e-mail message includes a response key encoding predetermined information reflective of a predetermined aspect of said challenge e-mail message; recording, in response to receipt of said response key, a source address in a verified source address list; and accepting receipt of said predetermined e-mail message on condition that the source address is recorded in said verified source address list and alternatively on condition that said predetermined e-mail message includes said response key. - View Dependent Claims (2)
-
-
3. A method of filtering a stream of e-mail messages directed to the e-mail address of a client connected to the Internet whereby the client permits receipt of acceptable ones of the e-mail messages and rejects receipt of unacceptable ones of the e-mail messages, comprising the steps of:
-
processing the stream of e-mail messages to accept recognized ones of the e-mail messages that are acceptable; processing the stream of e-mail messages to reject recognized ones of the e-mail messages that are unacceptable; and processing the stream of e-mail messages to challenge unrecognized ones of the e-mail messages including the steps of; preparing, in response to the receipt of an unrecognized one of the e-mail messages, a data key encoding information correlated to said unrecognized one of the e-mail messages; issuing a challenge e-mail message including said data key; and accepting said unrecognized email message upon receiving a response e-mail message responsive to said challenge e-mail message and including a response key derived from said data key. - View Dependent Claims (4, 5, 6)
-
Specification