×

Practical techniques for reducing unsolicited electronic messages by identifying sender's addresses

  • US 7,516,182 B2
  • Filed: 06/18/2002
  • Issued: 04/07/2009
  • Est. Priority Date: 06/18/2002
  • Status: Active Grant
First Claim
Patent Images

1. In a network system for managing electronic messages for users, the network system having multiple computers that receive incoming electronic messages, a method for managing a data structure that is used to filter incoming electronic messages, comprising the acts of:

  • at a first client computer, receiving an incoming electronic message that includes a sender'"'"'s address and is addressed to a first user of the first client computer of the network system;

    using an electronic messaging management application having a filtering module and a categorization module, the electronic messaging management application located at the first client computer, categorizing the sender'"'"'s address as being authorized for sending electronic messages to the first user of the first client computer, unauthorized for sending electronic messages to the first user of the first client computer, or unconfirmed as to whether the sender'"'"'s address is authorized or unauthorized for sending electronic messages to the first user of the first client computer; and

    propagating a categorization of the sender'"'"'s address specific to the first user of the first client computer to a second client computer of the network system, such that the sender'"'"'s address is also categorized as being authorized, unauthorized, or unconfirmed with respect to the second client computer, wherein electronic messages directed to a second user of the second client computer are delivered to the second user based on the propagated categorization of the sender'"'"'s address, wherein propagating the categorization of the sender'"'"'s address from the first client computer to the second client computer occurs in response to a request from an electronic messaging management application located at the second client computer.

View all claims
  • 11 Assignments
Timeline View
Assignment View
    ×
    ×