Methods and apparatus for controlling the transmission and receipt of email messages
DCFirst Claim
1. The method for identifying unwanted email messages comprising, in combination, the steps of:
- at an email transmitting location,forming metadata containing a unique identification of the sender of a given email message and an indication of the number of different recipients to whom an equivalent of said given email message is addressed, said metadata further manifesting a legally binding promise by said sender that the transmission of said given email message conforms to one or more rules of good conduct which prohibit the transmission of unwanted and unsolicited email, andencrypting said given email message and said metadata using a private key value known only to the sender to form a digital signature that is transmitted alone with said given message to said receiving location, andat a receiving location,decrypting said digital signature to validate said message and metadata using a public key value provided by said sender, andpresenting said given email message to its intended recipient in a manner that distinguishes said given email from other email messages based on said metadata.
2 Assignments
Litigations
0 Petitions
Accused Products
Abstract
Methods and apparatus for identifying unwanted email messages by transmitting metadata with an outbound email message that indicates the total number of email messages sent by that sender in a predetermined time period, or alternatively indicates the total number of email messages which are equivalent to the outgoing message that have been sent. In addition the metadata may include an identification of the sender and a “pledge” made byte sender. A pledge may take the form of a binding commitment from the sender that the information contained in the metadata is accurate, and/or that the sender promises to abide by predetermined good conduct rules designed to limit unwanted email. The outgoing message may be further signed by the sender with a digital signature that provides means for verifying the content of the message and the pledge as well as the identity of the sender.
81 Citations
13 Claims
-
1. The method for identifying unwanted email messages comprising, in combination, the steps of:
-
at an email transmitting location, forming metadata containing a unique identification of the sender of a given email message and an indication of the number of different recipients to whom an equivalent of said given email message is addressed, said metadata further manifesting a legally binding promise by said sender that the transmission of said given email message conforms to one or more rules of good conduct which prohibit the transmission of unwanted and unsolicited email, and encrypting said given email message and said metadata using a private key value known only to the sender to form a digital signature that is transmitted alone with said given message to said receiving location, and at a receiving location, decrypting said digital signature to validate said message and metadata using a public key value provided by said sender, and presenting said given email message to its intended recipient in a manner that distinguishes said given email from other email messages based on said metadata. - View Dependent Claims (2, 3)
-
-
4. The method for distinguishing a given email message from unwanted and unsolicited email messages comprising, in combination, the steps performed by or on behalf of the sender of said given mail message comprising:
-
processing the content of said given email message to form an encrypted digital signature which authenticates the content of said given email message and the identity of the sender of said email message and further manifests a legally binding promise by said sender that said given email message email conforms to one or more rules of good conduct which prohibit the transmission of said unwanted and unsolicited email messages, said step of processing the content of said given message to form an encrypted digital signature comprising, in combination, the substeps of; obtaining a digital certificate from a certification authority to obtain a private key and a public key, said certification authority publishing said digital certificate which may thereafter be accessed by a recipient to obtain said public key, processing said content of said given email message employing a hash function to form condensed digest of said content; and encrypting said digest using said private key to form said digital signature whereby said recipient may decrypt said digital signature using said public key as verified by said digital certificate to authenticate said message, to confirm the identity of said sender and to verify the existence of said legally binding promise, and transmitting said email message and said digital signature to said recipient. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13)
-
Specification