×

Reducing unwanted and unsolicited electronic messages by exchanging electronic message transmission policies and solving and verifying solutions to computational puzzles

  • US 7,552,176 B2
  • Filed: 10/10/2003
  • Issued: 06/23/2009
  • Est. Priority Date: 03/12/2003
  • Status: Active Grant
First Claim
Patent Images

1. In a sending domain that is network connectable to one or more receiving domains, the sending domain including a sending messaging server configured to send electronic messages to the receiving domains, a method for indicating to a receiving side domain that the sending messaging server expended computational resources to solve a predetermined computational puzzle before sending an electronic message to the receiving side domain, the method comprising:

  • an act of the sending messaging server receiving electronic message data that is to be contained in an electronic message sent from the sending messaging server to the receiving side domain;

    an act of the sending messaging server generating puzzle input from one or more components of the electronic message, the one or more components selected from a group consisting of;

    a message body, a message attachment, and a message header, and wherein the act of generating puzzle input includes one or more of;

    extracting portions of at least one of the one or more components, hashing portions of at least one of the one or more components, and concatenating portions of at least one of the one or more components;

    an act of the sending messaging server identifying an answer document by applying a hashing algorithm to different answer documents until the hashing algorithm produces an answer hash value that is a solution to the predetermined computational puzzle,wherein the answer hash value is calculated by;

    combining one of the different answer documents and the puzzle input; and

    hashing the combination of the one of the different answer documents and the puzzle input using the hashing algorithm, wherein the hashing algorithm alters a standard application of SHA-1 sub functions; and

    an act of sending the electronic message from the sending messaging server to the receiving side domain, wherein the electronic message includes the identified answer document and the electronic message data enabling verification by the receiving side domain that the sending messaging server expended computational resources without further communication with the sending messaging server.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×