Proxy email method and system
First Claim
1. A proxy email computer installation including:
- (a) a database in computer memory associating a customer'"'"'s identification, a customer'"'"'s actual email address and a customer'"'"'s proxy email address;
(b) an email server having an ability to receive a first email message at the customer'"'"'s proxy email address;
(c) computer executable code on a computer usable storage medium or media providing;
(i) first programming to retrieve a customer'"'"'s actual email address from the database upon receipt of the first email message to the customer'"'"'s proxy email address;
(ii) second programming to forward a second email message to the customer'"'"'s actual email address, wherein the second email message is formed from the first email message; and
(d) a connection to a communication link forwarding the second email message to the customer'"'"'s actual email addresses.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method of proxy (60) domain name registration permits a would-be domain name registrant anonymity. A registrar (24) affords customers (20) the opportunity to use the proxy registration. If the customer seeking registration of a domain name requests, the registrar obtains contact information needed for registration from a proxy entity established for this purpose. The registrar completes the registration of the domain name with the appropriate registry (22) (i.e. “.com, .net” etc.). The contact information published in WHOIS (27) is that of proxy entity. Contractually the customer is afforded control over the domain name. Emails intended for the customer are received by the proxy entity who may filter them if the customer requests. Emails sent by the customer are sent to the proxy entity who in turn send them to the indicated addressee.
-
Citations
14 Claims
-
1. A proxy email computer installation including:
-
(a) a database in computer memory associating a customer'"'"'s identification, a customer'"'"'s actual email address and a customer'"'"'s proxy email address; (b) an email server having an ability to receive a first email message at the customer'"'"'s proxy email address; (c) computer executable code on a computer usable storage medium or media providing; (i) first programming to retrieve a customer'"'"'s actual email address from the database upon receipt of the first email message to the customer'"'"'s proxy email address; (ii) second programming to forward a second email message to the customer'"'"'s actual email address, wherein the second email message is formed from the first email message; and (d) a connection to a communication link forwarding the second email message to the customer'"'"'s actual email addresses. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A proxy email computer installation including:
-
(a) a database in computer memory storing customer information in association with a proxy email address, wherein the customer information includes a customer'"'"'s actual email address; (b) an email server to receive an email intended for a customer at the proxy email address; (c) computer executable code on a computer-usable storage medium or media providing; (i) first programming to detect the email received at the email server intended for the customer; (ii) second programming for retrieving the customer'"'"'s actual email address from the database upon receipt of the email; (iii) third programming to forward the email to the customer'"'"'s actual email address; and (d) a connection to a communication link for forwarding the email to the customer'"'"'s actual email address. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer program for proxy email address management comprising in computer-executable code on a computer usable storage medium or media:
-
(a) first programming establishing a database for storing customer information in association with a proxy email address, wherein the customer information includes a customer'"'"'s actual email address; (b) second programming to identify a first email intended for a customer addressed to the proxy email address; (c) third programming to retrieve the customer'"'"'s actual email address; (d) fourth programming to copy content of the first email to a second email; and (e) fifth programming operative to send the second email to the customer'"'"'s actual email address. - View Dependent Claims (12, 13, 14)
-
Specification