System, method and program product for authenticating an e-mail and/or attachment
First Claim
1. A method for authenticating an e-mail, the method comprising the steps of:
- a first mail server receiving a request from a user requesting to register a visual signature image with the first mail server, and in response, the first mail server furnishing a first identifier to the user;
subsequently, the first mail server receiving (i) a request from the user requesting the first mail server to send an e-mail with the visual signature image and (ii) the e-mail and first identifier from the user, and in response, the first mail server validating the first identifier, and sending the e-mail with a second identifier to a second mail server, wherein the second identifier identifies an addressee of the e-mail;
the first mail server receiving from the second mail server a request to send the visual signature image embedded with the second identifier; and
the first mail server embedding the second identifier in the visual signature image and sending the visual signature image with the embedded second identifier to the second mail server.
2 Assignments
0 Petitions
Accused Products
Abstract
A system, method and program product for authenticating an e-mail. A user requests to register a visual signature image with a sending mail server, and in response, the sending mail server furnishes a first identifier to the user. Subsequently, the user requests the sending mail server to send an e-mail with the visual signature image and supplies the e-mail and first identifier to the sending mail server. In response, the sending mail server validates the first identifier, and sends the e-mail with a second identifier to a receiving mail server. In response, the receiving mail server validates the second identifier. The second identifier identifies an addressee of the e-mail, and the receiving mail server validates the second identifier by comparing the addressee identified by the acceptance identifier to an addressee within the e-mail. The sending mail server embeds the second identifier in the visual signature image and sends the visual signature image with the embedded second identifier to the receiving mail server. The invention also resides in the image representing an originator of an e-mail and/or an attachment to the e-mail; the image is included in the e-mail, an icon for the attachment or the attachment. The image includes an identity of an originator and an identity of a recipient intended by the originator. The e-mail with the added image is sent to the intended recipient. The image and identities of the originator and recipient authenticate the e-mail and/or the attachment.
23 Citations
31 Claims
-
1. A method for authenticating an e-mail, the method comprising the steps of:
-
a first mail server receiving a request from a user requesting to register a visual signature image with the first mail server, and in response, the first mail server furnishing a first identifier to the user; subsequently, the first mail server receiving (i) a request from the user requesting the first mail server to send an e-mail with the visual signature image and (ii) the e-mail and first identifier from the user, and in response, the first mail server validating the first identifier, and sending the e-mail with a second identifier to a second mail server, wherein the second identifier identifies an addressee of the e-mail; the first mail server receiving from the second mail server a request to send the visual signature image embedded with the second identifier; and the first mail server embedding the second identifier in the visual signature image and sending the visual signature image with the embedded second identifier to the second mail server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer program product for authenticating an e-mail, the computer program product comprising:
-
a computer-readable tangible storage device; first program instructions for execution with a first mail server and responsive to a user request to register a visual signature image with the first mail server, to furnish a first identifier to the user; second program instructions for execution within the first mailer server and responsive to a user request to send an e-mail with the visual signature image, the request including the first identifier, to validate the first identifier, and if valid, send the e-mail with a second identifier to a second mail server, wherein the second identifier identifies an addressee of the e-mail; third program instructions for execution within the second mail server to validate the second identifier; fourth program instructions for execution within the first mail server to receive from the second mail server a request to send the visual signature image embedded with the second identifier; and fifth program instructions for execution within the first mail server to embed the second identifier in the visual signature image and send the visual signature image with the embedded second identifier to the second mail server; and
whereinthe first, second, third, fourth and fifth program instructions are recorded on the computer-readable tangible storage device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer system for authenticating an e-mail, the computer system comprising:
-
a CPU, a computer readable memory and a computer-readable tangible storage device; first instructions, responsive to a user request to register a visual signature image with a first mail server, to furnish a first identifier to the user; second instructions, responsive to a user request to send an e-mail with the visual signature image, the request including the first identifier, to validate the first identifier and send the e-mail with a second identifier to a second mail server, wherein the second identifier identifies an addressee of the e-mail; third instructions to validate the second identifier; fourth instructions to receive from the second mail server a request to send the visual signature image embedded with the second identifier; and fifth instructions to embed the second identifier in the visual signature image and send the visual signature image with the embedded second identifier to the second mail server; and
whereinthe first, second, third, fourth and fifth instructions are stored on the computer-readable tangible storage device for execution by the CPU via the computer readable memory. - View Dependent Claims (24)
-
-
25. A computer system for authenticating an e-mail, the computer system comprising:
-
a first mail server that receives a request from a user requesting to register a visual signature image with the first mail server, and in response, the first mail server embeds a first identifier in the visual signature image and furnishes a signature identifier to the user; the first mail server subsequently receives a send request from the user requesting the first mail server to send an e-mail with the visual signature image and receives the e-mail and signature identifier from the user, and in response, the first mail server validates the signature identifier, and sends the e-mail with an acceptance identifier and a first mail server identifier to a second mail server, and in response, the second mail server validates the acceptance identifier and sends the acceptance identifier to the first mail server, and in response, the first mail server embeds the acceptance identifier in the visual signature image with the embedded first identifier and sends the visual signature image with the embedded acceptance identifier and first identifier, to the second mail server. - View Dependent Claims (26, 27, 28, 29, 30, 31)
-
Specification