System for eliminating unauthorized electronic mail
First Claim
1. A system, comprising:
- one or more hardware processors and one or more computer memories together providing;
(a) an email client for allowing receipt of email sent on a network addressed to a primary email address;
(b) an email-receiving server for connection between the network and the email client for receiving email addressed to the primary email address;
(c) an unauthorized-email rejection component having an authorized senders list (ASL) module to maintain email addresses authorized to send email to the primary email address, wherein the unauthorized-email rejection component is for operation with the email-receiving server for intercepting and rejecting any email addressed to the primary email address received from an email address not on the authorized senders list; and
(d) an email proxy pre-processing module that allows designation of a proxy email address that is associated with the primary email address but distinct from the primary email address to receive email from email addresses not on the authorized senders list,wherein, upon receiving incoming email addressed to the proxy email address from an email address not on the authorized senders list, the unauthorized-email rejection component accepts the email and adds the email address from which the incoming email was received to the authorized senders list,wherein said email proxy pre-processing module includes a control parameter to limit usage of the proxy address and terminate acceptance of email sent to the proxy address from email addresses not on the authorized senders list and prevent addition to the authorized senders list, whereby said unauthorized-email rejection component thereafter rejects email from a different unknown email addresses and prevents the different unknown email address from being added to the authorized senders list.
7 Assignments
0 Petitions
Accused Products
Abstract
A system for eliminating unauthorized email sent to a user on a network analyzes the sender address of incoming email and determines whether it is to be rejected by returning a standard “no such user” error code or accepted depending upon executing processing rules and analyzing managed lists of authorized senders. This provides an advantage over existing anti-spam filtering systems by intercepting unauthorized email before it reaches an existing email server or client. The system rejects all email unless authorized by using a standard “no such user” error code, and by redirecting the unauthorized email back to the sender or to a sender evaluation site. An ASL module captures authorized sender addresses from the user'"'"'s outgoing email and other sources in order to update “authorized senders” lists. The system may employ a WBM procedure that notifies senders of rejected email to go to a separate website and register as valid senders after passing an interaction test that precludes automatic registration by a mechanical program. A destination proxy email address procedure allows subscribers to use temporary proxy addresses for receiving email expected from unknown sources and instantiates senders as authorized upon receiving the expected email to the proxy addresses. The unauthorized-email rejection component can be readily configured as a hardware or software appliance used in tandem with a conventional email server, email gateway, or firewall to an intranet, or as a software extension to an existing firewall system.
-
Citations
29 Claims
-
1. A system, comprising:
-
one or more hardware processors and one or more computer memories together providing; (a) an email client for allowing receipt of email sent on a network addressed to a primary email address; (b) an email-receiving server for connection between the network and the email client for receiving email addressed to the primary email address; (c) an unauthorized-email rejection component having an authorized senders list (ASL) module to maintain email addresses authorized to send email to the primary email address, wherein the unauthorized-email rejection component is for operation with the email-receiving server for intercepting and rejecting any email addressed to the primary email address received from an email address not on the authorized senders list; and (d) an email proxy pre-processing module that allows designation of a proxy email address that is associated with the primary email address but distinct from the primary email address to receive email from email addresses not on the authorized senders list, wherein, upon receiving incoming email addressed to the proxy email address from an email address not on the authorized senders list, the unauthorized-email rejection component accepts the email and adds the email address from which the incoming email was received to the authorized senders list, wherein said email proxy pre-processing module includes a control parameter to limit usage of the proxy address and terminate acceptance of email sent to the proxy address from email addresses not on the authorized senders list and prevent addition to the authorized senders list, whereby said unauthorized-email rejection component thereafter rejects email from a different unknown email addresses and prevents the different unknown email address from being added to the authorized senders list. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method, comprising:
-
(a) receiving incoming email addressed to a primary email address; (b) maintaining an authorized senders list (ASL list) of external email addresses authorized to send email to the user; (c) processing a sender email address on incoming email by comparing it to the ASL list; (d) unconditionally rejecting the receipt of incoming email before the email can be accepted for delivery if the results of processing the ASL list returns with a result of “
unauthorized sender”
;(e) enabling designation of a proxy email address that is associated with the primary email address but distinct from the primary email address to receive email from email addresses not on the authorized senders list, and upon receiving incoming email addressed to the proxy email address of the user from an email address not on the authorized senders list, accepting the email and adding the email address from which the incoming email was received to the authorized senders list; and (f) further enabling presetting of a control parameter for limiting usage of the proxy address and terminating acceptance of email sent to the proxy address from email addresses not on the authorized senders list and preventing addition to the authorized senders list, and thereafter not accepting email from a different unknown email address nor adding the different unknown email address to the authorized senders list. - View Dependent Claims (14, 15, 16, 17)
-
-
18. An unauthorized-email rejection system, comprising:
one or more hardware processors and one or more computer memories together providing, (a) an unauthorized-email rejection component having an authorized senders list (ASL) module to maintain email addresses authorized to send email to a primary email address, wherein the unauthorized-email rejection component is operable with the email-receiving server to intercept and reject any email addressed to the primary email address received from an email address not on the authorized senders list; and (b) an email proxy pre-processing module that allows designation of a proxy email address that is associated with the primary email address but distinct from the primary email address to receive email from email addresses not on the authorized senders list, and upon receiving incoming email addressed to the proxy email address from an email address not on the authorized senders list, the unauthorized-email rejection component to accept the email and to add the email address from which the primary email was received to the authorized senders list, wherein said email proxy pre-processing module includes a control for enabling pre-setting of a control parameter for limiting usage of the proxy address and terminating acceptance of email sent to the proxy address from email addresses not on the authorized senders list and to not allow addition to the authorized senders list, said unauthorized-email rejection component thereafter to not accept email from a different email addresses not on the authorized senders list and to not add the different email address to the authorized senders list. - View Dependent Claims (19, 20, 21)
-
22. A physical computer-readable storage medium having instructions stored thereon, the instructions comprising:
-
(a) instructions to receive incoming messages addressed to a primary address; (b) instructions to maintain an authorized senders list (ASL list) of sender addresses authorized to send messages to the user; (c) instructions to process a sender address on an incoming message by comparing it to the ASL list; (d) instructions to unconditionally reject the receipt of the incoming message before the message can be accepted for delivery if the results of processing the ASL list returns with a result of “
unauthorized sender”
;(e) instructions to enable designation of a proxy address that is associated with the primary address but distinct from the primary address to receive messages from sender addresses not on the authorized senders list, and upon receiving incoming messages addressed to the proxy address of the user from a sender address not on the authorized senders list, accepting the message and adding the sender address from which the incoming message was received to the authorized senders list; and (f) instructions to further enable presetting of a control parameter for limiting usage of the proxy address and terminating acceptance of messages sent to the proxy address from sender addresses not on the authorized senders list and preventing addition to the authorized senders list, and thereafter not accepting messages from a different unknown sender address nor adding the different unknown sender address to the authorized senders list. - View Dependent Claims (23, 24, 25)
-
-
26. A system comprising:
-
(a) means for receiving incoming messages addressed to a primary address of a user; (b) means for maintaining an authorized senders list (ASL list) of sender addresses authorized to send messages to the user; (c) means for processing a sender address on an incoming message by comparing it to the ASL list; (d) means for unconditionally rejecting the receipt of the incoming message before the message can be accepted for delivery if the results of processing the ASL list returns with a result of “
unauthorized sender”
;(e) means for enabling designation of a proxy address that is associated with the primary address but distinct from the primary address to receive messages from sender addresses not on the authorized senders list, and upon receiving an incoming message addressed to the proxy address of the user from a sender address not on the authorized senders list, accepting the message and adding the sender address from which the incoming message was received to the authorized senders list; and (f) means for further enabling presetting of a control parameter for limiting usage of the proxy address and terminating acceptance of messages sent to the proxy address from sender addresses not on the authorized senders list and preventing addition to the authorized senders list, and thereafter not accepting messages from a different unknown sender address nor adding the different unknown sender address to the authorized senders list. - View Dependent Claims (27, 28, 29)
-
Specification