System for policing junk e-mail messages
First Claim
1. A computer implemented method performed by a computer system including a processor and a memory programmed to perform the method comprising:
- receiving, by the computer system, an indication that a sender that had previously initiated transmission of a first unwanted electronic communication to a first recipient has subsequently initiated transmission of a second unwanted electronic communication to the first recipient, despite a request initiated by the first recipient, after the first unwanted electronic communication was received by the first recipient, that the sender refrain from initiating further unwanted electronic communications to the first recipient, under direction of the processor;
updating, by the computer system, an unwanted electronic communication list in the memory to include reference to the second unwanted electronic communication under direction of the processor in response to the indication;
receiving, by the computer system, the second unwanted electronic communication destined to a second recipient, under direction of the processor;
determining, by the computer system, that the second unwanted electronic communication should be inhibited, under direction the processor, in response to the unwanted electronic communication list and in response to the second unwanted electronic communication; and
inhibiting sending, by the computer system, the second unwanted electronic communication to the second recipient when it is determined that the second unwanted electronic communication should be inhibited, under direction of the processor.
5 Assignments
0 Petitions
Accused Products
Abstract
A system for policying an unsolicited e-mail communication. The system has a plurality of clients, each coupled together using a wide area network of computers, such as the Internet or an internet. Each of the clients is adapted to send an indication of an unsolicited e-mail message through an e-mail device for a display. The system also has a policying server coupled to each of the plurality of clients through the wide area network of computers. The policying server is adapted to receive the indication from at least one of the clients. The e-mail device comprises an SPAM icon on the display. The SPAM icon is adapted to send the indication from the client to the policying server.
16 Citations
20 Claims
-
1. A computer implemented method performed by a computer system including a processor and a memory programmed to perform the method comprising:
-
receiving, by the computer system, an indication that a sender that had previously initiated transmission of a first unwanted electronic communication to a first recipient has subsequently initiated transmission of a second unwanted electronic communication to the first recipient, despite a request initiated by the first recipient, after the first unwanted electronic communication was received by the first recipient, that the sender refrain from initiating further unwanted electronic communications to the first recipient, under direction of the processor; updating, by the computer system, an unwanted electronic communication list in the memory to include reference to the second unwanted electronic communication under direction of the processor in response to the indication; receiving, by the computer system, the second unwanted electronic communication destined to a second recipient, under direction of the processor; determining, by the computer system, that the second unwanted electronic communication should be inhibited, under direction the processor, in response to the unwanted electronic communication list and in response to the second unwanted electronic communication; and inhibiting sending, by the computer system, the second unwanted electronic communication to the second recipient when it is determined that the second unwanted electronic communication should be inhibited, under direction of the processor. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer system comprising:
-
a memory configured to store an unwanted electronic communication list; and a processor coupled to the memory, wherein the processor is configured to receive indication that a sender that had previously initiated transmission of a first unwanted electronic communication to a first recipient has subsequently initiated transmission of a second unwanted electronic communication to the first recipient, despite a request initiated by the first recipient, after the first unwanted electronic communication was received by the first recipient, that the sender refrain from initiating further unwanted electronic communications to the first recipient, wherein the processor is configured to update the unwanted electronic communication list to include reference to the second unwanted electronic communication in response to the indication, wherein the processor is configured to receive the second unwanted electronic communication destined to a second recipient, wherein the processor is configured to determine that the second unwanted electronic communication should be inhibited in response to the unwanted electronic communication list that was updated and in response to the second unwanted electronic communication, and wherein the processor is configured to inhibit sending the second unwanted electronic communication to the second recipient when it is determined that the second unwanted electronic communication should be inhibited; and wherein the memory is also configured to store the unwanted electronic communication list that is updated. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product comprising a computer system including a processor, wherein the computer system executes computer code resident on a tangible media, the computer program product comprising:
-
code configured to direct the processor to receive indication that a sender who had previously initiated transmission of a first unwanted electronic communication to a first recipient has subsequently initiated transmission of a second unwanted electronic communication to the first recipient, despite a request initiated by the first recipient that the sender refrain from initiating further unwanted electronic communications to the first recipient, after the first unwanted electronic communication was received by the first recipient; code configured to direct the processor to update an unwanted electronic communication list to include reference to the second unwanted electronic communication in response to the indication; code configured to direct the processor to receive the second unwanted electronic communication destined to a second recipient; code configured to direct the processor to determine that the second unwanted electronic communication should be inhibited in response to the unwanted electronic communication list that was updated and in response to the second unwanted electronic communication; and code configured to direct the processor to inhibit sending the second unwanted electronic communication to the second recipient when it is determined that the second unwanted electronic communication should be inhibited. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification