Systems and methods for automatically updating electronic mail access lists
First Claim
Patent Images
1. A computer implemented method for modifying a list of permitted senders used by electronic mail (email) access control devices, said method comprising:
- under control of a recipient;
initiating a subscription event by transmitting a recipient identifier to the sender;
under control of the sender;
receiving the recipient identifier as part of the subscription event;
transmitting sender information along with a petition provider identifier to the recipient;
under control of the recipient;
transmitting the sender information to a petition provider identified by the petition provider identifier, wherein the petition provider creates a petition on behalf of the sender as a result of having obtained the sender information from the recipient, the petition comprising a request to modify the email access list of the recipient;
receiving, by way of a web browser on the recipient, the petition from the petition provider, said petition being stored in a computer readable storage medium, wherein the petition is transmitted via hypertext transfer protocol (HTTP) as part of an interaction with a web page;
determining whether the petition received from the petition provider is acceptable based on at least one of;
1) a sender identity verification method;
2) user input; and
3) third party information; and
modifying said access list of permitted senders of the recipient such that the sender is added to the list of permitted senders if the petition is determined to be acceptable, wherein as a result of a successful petition, the sender will be allowed to bypass all email filters of the recipient.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for accepting a recipient identifier, wherein the recipient identifier can be used to identify an electronic mail (email) recipient; generating a petition based on the recipient identifier and at least one petition rule, wherein the at least one petition rule includes at least one of: 1) a sender identification method; and 2) a recipient; and wherein the petition can be used by a email provider to allow a recipient to receive email from a sender.
-
Citations
61 Claims
-
1. A computer implemented method for modifying a list of permitted senders used by electronic mail (email) access control devices, said method comprising:
-
under control of a recipient; initiating a subscription event by transmitting a recipient identifier to the sender; under control of the sender; receiving the recipient identifier as part of the subscription event; transmitting sender information along with a petition provider identifier to the recipient; under control of the recipient; transmitting the sender information to a petition provider identified by the petition provider identifier, wherein the petition provider creates a petition on behalf of the sender as a result of having obtained the sender information from the recipient, the petition comprising a request to modify the email access list of the recipient; receiving, by way of a web browser on the recipient, the petition from the petition provider, said petition being stored in a computer readable storage medium, wherein the petition is transmitted via hypertext transfer protocol (HTTP) as part of an interaction with a web page; determining whether the petition received from the petition provider is acceptable based on at least one of;
1) a sender identity verification method;
2) user input; and
3) third party information; andmodifying said access list of permitted senders of the recipient such that the sender is added to the list of permitted senders if the petition is determined to be acceptable, wherein as a result of a successful petition, the sender will be allowed to bypass all email filters of the recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 54, 55, 59, 60)
-
-
19. A computer implemented method for modifying a list of permitted senders used by electronic mail (email) access control devices, said method comprising:
-
under control of a sender; accepting a recipient identifier from a recipient; creating a petition as a result of having received the recipient identifier from the recipient, the petition comprising a request for updating the recipient'"'"'s email access control list, wherein the petition is created by evaluating at least one rule that determines the format of the petition based on the recipient identifier, said petition being stored in a computer readable medium; providing the petition to a recipient, the recipient having an access list of permitted senders associated therewith; under control of the recipient; accepting the petition by way of a web browser on the recipient, wherein the petition is transmitted as part of an interaction with a web page and prior to transmission of email messages between the sender and the recipient; determining whether the petition is acceptable based on at least one of;
1) a sender identity verification method;
2) user input; and
3) third party information; andmodifying said access list of permitted senders of the recipient such that the sender is added to said list of permitted senders if the petition is determined to be acceptable, wherein as a result of a successful petition, the sender will be allowed to bypass all email filters of the recipient. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A computer implemented method for modifying a list of permitted senders used by electronic mail (email) access control devices, said method comprising:
-
initiating a subscription event during which a recipient provides a recipient email address to the sender; receiving a petition to the recipient as a result of the subscription event, the petition comprising a request from the sender to update the recipient'"'"'s email access control list, wherein the petition is transmitted as part of a web browser-based interaction with a web page, prior to transmission of emails between the sender and the recipient and wherein the petition includes a sender identity verification method; determining, by the recipient, whether the petition is acceptable based on authorization credentials and at least one of;
1) the sender identity verification method;
2) user input; and
3) third party information;modifying an email access list of permitted senders at the recipient by adding the sender to said email access list if the petition and the authorization credentials are acceptable, wherein as a result of a successful petition, the sender will be allowed to bypass all email filters of the recipient. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43)
-
-
44. A system for modifying a list of permitted senders used by electronic mail (email) access control devices, said method comprising:
-
a sender component that accepts a recipient identifier during a subscription event initiated by a recipient and generates sender information, wherein the sender information is used to generate a petition, the petition comprising a request from the sender to update the recipient'"'"'s email access control list; a petition provider component that generates a petition on behalf of the sender as a result of having obtained the sender information from the recipient, wherein the petition is generated based on the sender information and at least one rule, said petition being stored in a computer readable medium; and a recipient that receives the petition from the petition provider component by way of a web browser on the recipient, determines whether the petition is acceptable and modifies the email access list of permitted senders, wherein the petition is transmitted as part of a web browser-based interaction with a web page, prior to transmission of emails between the sender and the recipient; and wherein the petition includes a sender identity verification method which is used to verify identity of the sender, and wherein as a result of a successful petition, the sender will be allowed to bypass all email filters of the recipient. - View Dependent Claims (45, 46, 47, 48, 49, 50, 51, 52, 53)
-
-
56. A computer readable storage medium having instructions stored thereon, which instructions when executed by one or more processors, cause a system to:
-
under control of a recipient; initiate a subscription event by transmitting a recipient identifier to the sender; under control of the sender; receive the recipient identifier as part of the subscription event; transmit sender information along with a petition provider identifier to the recipient; under control of the recipient; transmit the sender information to a petition provider identified by the petition provider identifier, wherein the petition provider creates a petition on behalf of the sender as a result of having obtained the sender information from the recipient, the petition comprising a request to modify the email access list of the recipient; receive, by way of a web browser on the recipient, the petition from the petition provider, said petition being stored in a computer readable storage medium, wherein the petition is transmitted via hypertext transfer protocol (HTTP) as part of an interaction with a web page; determine whether the petition received from the petition provider is acceptable based on at least one of;
1) a sender identity verification method;
2) user input; and
3) third party information; andmodify said access list of permitted senders of the recipient such that the sender is added to the list of permitted senders if the petition is determined to be acceptable, wherein as a result of a successful petition, the sender will be allowed to bypass all email filters of the recipient. - View Dependent Claims (57, 58)
-
-
61. A computer implemented method for modifying a list of permitted senders used by electronic mail (email) access control devices, said method comprising:
-
receiving a recipient identifier by a sender during a subscription event initiated by a recipient, whereby said recipient identifies itself to the sender; and transmitting sender information and a petition provider identifier to the recipient as a result of the subscription event; wherein the recipient provides the sender information to a petition provider identified by the petition provider identifier; wherein the petition provider creates a petition on behalf of the sender as a result of having obtained the sender information from the recipient, the petition comprising a request to modify the email access control list of the recipient; wherein the recipient receives the petition from the petition provider by way of a web browser interaction, evaluates the petition, and adds the sender to the list of permitted senders of the recipient if the petition is acceptable, the list of permitted senders being stored on a computer readable storage medium; and wherein as a result of a successful petition, the sender will be allowed to bypass all email filters of the recipient; and receiving a result of the petition from the recipient to the sender.
-
Specification