System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison
First Claim
1. A method comprising:
- sending to an intended recipient a first electronic message containing information identifying a purported originator of the first electronic message, and further containing a first data string generated by application of an algorithm to a portion of said first electronic message;
receiving a second electronic message that includes a request to confirm that said first electronic message was authorized by the purported originator identified in the first electronic message, said second electronic message including said first data string and said portion of said first electronic message;
generating a second data string, different from said first data string, by application of an algorithm to said portion of said first electronic message;
comparing said first data string to said second data string; and
upon determining that said first data string matches said data string, responding to said second electronic message, affirming said purported originator of said first electronic message did not use a false originating address;
wherein the algorithm applied to the portion of the first electronic message is selected from a plurality of algorithms based on a time associated with the first electronic message.
3 Assignments
0 Petitions
Accused Products
Abstract
A sending device prepares a key for each electronic message sent by the device by applying an algorithm to specified data in the message and then incorporates the key in the message. A receiving device, upon receipt of an electronic message, locates the incorporated key and the data from which a sending device practicing the invention would have prepared it. The receiving device communicates a confirmation request to the purported sending device which contains the key and the data for its preparation. The sending device receives the confirmation messages and prepares a comparison key by applying the algorithm to the data in the confirmation request. The sending device replies to the confirmation request confirming that the sending device sent the message if the comparison key matches the key in the confirmation request and otherwise responds with a denial.
-
Citations
49 Claims
-
1. A method comprising:
-
sending to an intended recipient a first electronic message containing information identifying a purported originator of the first electronic message, and further containing a first data string generated by application of an algorithm to a portion of said first electronic message; receiving a second electronic message that includes a request to confirm that said first electronic message was authorized by the purported originator identified in the first electronic message, said second electronic message including said first data string and said portion of said first electronic message; generating a second data string, different from said first data string, by application of an algorithm to said portion of said first electronic message; comparing said first data string to said second data string; and upon determining that said first data string matches said data string, responding to said second electronic message, affirming said purported originator of said first electronic message did not use a false originating address; wherein the algorithm applied to the portion of the first electronic message is selected from a plurality of algorithms based on a time associated with the first electronic message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method comprising:
-
receiving a first electronic message that includes a request to confirm that a second electronic message sent to an intended recipient was sent on behalf of an originator identified in the second electronic message, the first electronic message including a first data string purportedly generated by application of an algorithm to a portion of said second electronic message and further including said portion of said second electronic message; generating a second data string, different from said first data string, by application of an algorithm to said portion of said second electronic message included in said first electronic message; comparing said first data string to said second data string; and upon determining that said first data string does not match said second data string, responding to said first electronic message, denying said second electronic message was sent on behalf of the originator identified in the second electronic message due to the originator using a false originating address; wherein the algorithm applied to the portion of the first electronic message is selected from a plurality of algorithms based on a time associated with the first electronic message. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method comprising:
-
receiving a first electronic message that includes a request to confirm that a second electronic message sent to an intended recipient was sent on behalf of an originator identified in the second electronic message, the first electronic message including a first data string generated by application of an algorithm to a portion of said second electronic message and further including said portion of said second electronic message; generating a second data string, different from said first data string, by application of an algorithm to said portion of said second electronic message included in said first electronic message; comparing said first data string to said second data string; and upon determining that said first data string matches said data string, responding to said first electronic message, affirming said originator identified in the second electronic message did not send said second electronic message from a false originating address; wherein the algorithm applied to the portion of the first electronic message is selected from a plurality of algorithms based on a time associated with the first electronic message. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A method comprising
receiving from a sending device a first electronic message authorized by an originator and directed to an intended recipient, said electronic message containing an identifier associated with the originator and further containing a first data string generated by application of an algorithm to a portion of said first electronic message; -
sending to a confirmation device a second electronic message that includes a request to confirm that said first electronic message was authorized by the originator associated with the identifier, said second electronic message including said first data string and said portion of said electronic message; receiving from the confirmation device a response to said second electronic message affirming said originator of said first electronic message did not use a false originating address; allowing said first electronic message to be further processed according to rules for processing of confirmed electronic messages directed to the intended recipient; receiving from the sending device a third electronic message authorized by the originator, said third electronic message containing the identifier and further containing a second data string generated by application of an algorithm to a portion of said third electronic message; and sending to the confirmation device a fourth electronic message that includes a request to confirm that said originator of said third electronic message did not use a false originating address, said fourth electronic message including said second data string and said portion of said third electronic message; wherein the algorithm applied to the portion of the first electronic message is a first algorithm; and the algorithm applied to the portion of the third electronic message is a second algorithm different from the first algorithm. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 49)
-
Specification