Challenge response systems
First Claim
1. Non-transitory computer storage media having a challenge-response system embodied thereon including computer-executable instructions that, when executed, perform a method for mitigating dissemination of spam, the system comprising:
- a sending component that sends messages for a sender, wherein each message including verification information, at least a portion of which is unique to each message and is used for verification;
a challenge receiving component at the sender that receives challenges; and
a verification component that verifies for the sender that each received challenge is associated with a message that the sender sent in part by examining the received challenge for matching verification information, wherein the verification component moves challenges including matching verification information to an inbox of the sender and the verification component moves challenges not including matching verification information to a spam folder.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are systems and methods that facilitate securing communication channels used in a challenge-response system to mitigate spammer intrusion or deception. The systems and methods make use of unique IDs that can be added to outbound messages originating from a sender, a recipient, and a third-party server. The IDs can be correlated according to the relevant parties. Thus, for example, a sender can add a signed ID to an outgoing message. A challenge sent back to the sender for that particular message can echo the same ID or a new ID derived from the original ID to allow a sender to verify that the challenge corresponds to an actual message. The IDs can include cookies as well to facilitate correlation of messages and to facilitate the retrieval of messages once a sender is determined to be legitimate.
-
Citations
36 Claims
-
1. Non-transitory computer storage media having a challenge-response system embodied thereon including computer-executable instructions that, when executed, perform a method for mitigating dissemination of spam, the system comprising:
-
a sending component that sends messages for a sender, wherein each message including verification information, at least a portion of which is unique to each message and is used for verification; a challenge receiving component at the sender that receives challenges; and a verification component that verifies for the sender that each received challenge is associated with a message that the sender sent in part by examining the received challenge for matching verification information, wherein the verification component moves challenges including matching verification information to an inbox of the sender and the verification component moves challenges not including matching verification information to a spam folder. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. Non-transitory computer storage media having a challenge-response system embodied thereon including computer-executable instructions that, when executed, perform a method for facilitating spam prevention, the system comprising:
-
a challenge generation component that sends at least one challenge to a message sender before the sender'"'"'s message is opened by the recipient; and a validation component for the message sender that verifies that the at least one challenge is in response to a message sent from the sender based upon unique tracking information sent with each message sent from the sender and stored for each message sent by the sender, the validation component examining each of the at least one challenge for matching tracking information, wherein the verification component moves challenges including matching tracking information to an inbox of the sender and automatically responds with a correct response to the challenge, and the verification component moves challenges not including matching tracking information to a spam folder. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer-implemented method that facilitates a secure challenge-response round trip comprising:
-
sending, utilizing a first computing process, at least one message to at least one recipient, the message comprising information, at least a portion of which includes verification information unique to the message; receiving, utilizing a second computing process, a challenge for sender response; and verifying, utilizing a third computing process, that the challenge is in response to a message sent by the sender by examining the challenge for matching verification information, wherein the challenge is moved to an inbox of the sender when the challenge includes matching verification information and the challenge is moved to a spam folder when the challenge does not include matching verification information; wherein the first, second, and third computing processes are executed by one or more computing devices. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32)
-
-
33. Non-transitory computer storage media having a challenge-response system embodied thereon including computer-executable instructions that, when executed, perform a method for facilitating a secure challenge-response round trip, the system comprising:
-
means for sending at least one message to at least one recipient, the message comprising information, at least a portion of which includes verification information unique to the message; means for receiving a challenge for sender response, wherein the verification information unique to the at least one message is received with the challenge; and means for verifying that the challenge is in response to a message sent by the sender by examining the challenge for matching verification information, wherein the challenge is moved to an inbox of the sender when the challenge includes matching verification information and the challenge is moved to a spam folder when the challenge does not include matching verification information. - View Dependent Claims (34, 35, 36)
-
Specification