Implementation of private messaging
First Claim
Patent Images
1. A computer implemented method of transmitting an electronic message from a first party to a second party who remain anonymous to each other during the transmission, comprising the steps of:
- (a) transmitting the message from the first party to a service, the message including proxy addresses for the first and second parties;
(b) encrypting the address of the first party and a second party;
(c) including the encrypted address of the first and the second party in a header of the message in addition to the proxy addresses;
(d) decrypting the encrypted address of the second party by the service;
(e) forwarding the message to the second party with the first party address encrypted; and
(k) sending metadata in the message header between the first and second parties, the metadata includes an indication of whether one or more of a subgroup of less than all recipients have blocked messages from the first party, and whether the second party is in the subgroup that have blocked messages from the first party.
2 Assignments
0 Petitions
Accused Products
Abstract
A method is disclosed for sending messages such as emails where the sender and receiver in the exchange remain anonymous to each other. The method uses a service, which may for example be an Internet service provider, which acts as an intermediary between a first party and second party to a message. All exchanges between the first and second parties pass through the service, which masks all true identities while ensuring that the message is routed to the proper recipient(s).
-
Citations
16 Claims
-
1. A computer implemented method of transmitting an electronic message from a first party to a second party who remain anonymous to each other during the transmission, comprising the steps of:
-
(a) transmitting the message from the first party to a service, the message including proxy addresses for the first and second parties; (b) encrypting the address of the first party and a second party; (c) including the encrypted address of the first and the second party in a header of the message in addition to the proxy addresses; (d) decrypting the encrypted address of the second party by the service; (e) forwarding the message to the second party with the first party address encrypted; and (k) sending metadata in the message header between the first and second parties, the metadata includes an indication of whether one or more of a subgroup of less than all recipients have blocked messages from the first party, and whether the second party is in the subgroup that have blocked messages from the first party. - View Dependent Claims (2, 3, 4)
-
-
5. A computer implemented method of transmitting an electronic message from a first party to a second party who remain anonymous to each other during the transmission, comprising the steps of:
-
(a) transmitting the message from the first party to a service; (b) changing the message address of the first party to a proxy address of the service; (c) including the proxy message address of the first party in a header of the message; (d) determining whether the second party has placed a block on receiving messages from the first party; and (e) forwarding the message to the second party with first party identified only by the proxy address for the first party if it is determined in said step (d) that the second party has not blocked emails from the first party. - View Dependent Claims (6, 7, 8, 9, 10, 11)
-
-
12. A computer implemented method of transmitting an electronic message from a first party to a second party who remain anonymous to each other during the transmission, comprising the steps of:
-
(a) receiving, by a first party to a service, a message sent by a second party to the service, the first party being one of a plurality of recipients of the message sent by the second party; (b) responding by the first party to the message from the second party to the service; (c) obscuring a true address of the first and second parties; (d) forwarding the message to the second party with first and second parties'"'"' true identities obscured; and (e) implementing a restriction stored in the service, the restriction including an indication of whether a subgroup of the plurality of recipients have blocked messages from the first party and the restriction including an indication of whether the second party is in the subgroup that have blocked the content of the message from being sent. - View Dependent Claims (13, 14, 15, 16)
-
Specification