Validating inbound messages
First Claim
Patent Images
1. A method for interpreting messages, comprising:
- receiving an inbound message, wherein the inbound message includes a plurality of fields, a first of said fields including a unique message identifier, said message identifier further incorporating a latent cryptographic identifier as part of the message identifier, said latent cryptographic identifier being generated by a recognized message system for inclusion in outbound messages and including at least one optimization hint; and
characterizing the inbound message by analyzing the latent cryptographic identifier in the inbound message.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for verifying messages. The method may include the steps of receiving an inbound message and characterizing the inbound message by analyzing a latent cryptographic identifier in the inbound message. The identifier is generated by a recognized message system, which may be the receiving system itself, for an outbound message. Characterizing may involve detecting if the latent cryptographic identifier is present and determining if the cryptographic identifier is valid. The step of determining can be performed using symmetric or asymmetric methods of verifying the authenticity of the message.
16 Citations
50 Claims
-
1. A method for interpreting messages, comprising:
-
receiving an inbound message, wherein the inbound message includes a plurality of fields, a first of said fields including a unique message identifier, said message identifier further incorporating a latent cryptographic identifier as part of the message identifier, said latent cryptographic identifier being generated by a recognized message system for inclusion in outbound messages and including at least one optimization hint; and characterizing the inbound message by analyzing the latent cryptographic identifier in the inbound message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method for validating an inbound email in a messaging system, comprising:
-
extracting a cryptographic identifier generated from a known originating system from the inbound email; checking at least one optimization hint in the identifier to determine whether a more detailed determination of the cryptographic identifier is required; and
if a detailed determination is required,comparing a portion of the cryptographic identifier against a number of known valid MAC values to determine whether the message originated with the known originating system, and if so, generating a positive comparison, and processing the email based on the positive comparison including bypassing at least a portion of a spam filter. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A messaging system, including:
-
an identifier generator providing a cryptographic identifier for each message handled by the message transfer agent, wherein each message includes a plurality of fields, including a standard identification field encoded with a unique message identifier, said cryptographic identifier being incorporated as part of the message identifier, each cryptographic identifier generated including at least one optimization hint; and an identifier characterizer interpreting the content of the standard identification field in inbound messages to the messaging system. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 50)
-
-
46. A method for validating email, comprising:
-
generating an latent cryptographic identifier in each outbound message output by a messaging system , the identifier including at least one optimization hint and an encrypted unique identifier; and upon receipt of any inbound message by the messaging system; determining whether the latent cryptographic identifier in the inbound message is present; examining the optimization hint and extracting the encrypted identifier from the cryptographic identifier; and comparing the encrypted identifier against a number of known valid encrypted identifier to determine whether the inbound message originated with the messaging system. - View Dependent Claims (47, 48, 49)
-
Specification