System for policing junk e-mail messages
First Claim
1. A memory device having instructions stored thereon that, in response to execution by a processing device, cause the processing device to perform operations comprising:
- receiving an e-mail communication addressed to a recipient, wherein the e-mail communication is sent from an e-mail source;
comparing an identity of the e-mail source to a list of sources associated with sending unwanted e-mail communications;
identifying a previous request initiated by the recipient to remove the recipient from a distribution list of the e-mail source, wherein the previous request was transmitted to the e-mail source in response to receiving a first unwanted e-mail communication from the e-mail source; and
detecting the e-mail communication as a second unwanted e-mail communication associated with the e-mail source based, at least in part, on the identification of the previous request to remove the recipient from the distribution list.
5 Assignments
0 Petitions
Accused Products
Abstract
A system for policing an unsolicited e-mail communication. The system has a plurality of clients, each coupled together using a wide area network of computers, such as the Internet or an interne. Each of the clients is adapted to send an indication of an unsolicited e-mail message through an e-mail device for a display. The system also has a policing server coupled to each of the plurality of clients through the wide area network of computers. The policing server is adapted to receive the indication from at least one of the clients. The e-mail device comprises a SPAM icon on the display. The SPAM icon is adapted to send the indication from the client to the policing server.
27 Citations
20 Claims
-
1. A memory device having instructions stored thereon that, in response to execution by a processing device, cause the processing device to perform operations comprising:
-
receiving an e-mail communication addressed to a recipient, wherein the e-mail communication is sent from an e-mail source; comparing an identity of the e-mail source to a list of sources associated with sending unwanted e-mail communications; identifying a previous request initiated by the recipient to remove the recipient from a distribution list of the e-mail source, wherein the previous request was transmitted to the e-mail source in response to receiving a first unwanted e-mail communication from the e-mail source; and detecting the e-mail communication as a second unwanted e-mail communication associated with the e-mail source based, at least in part, on the identification of the previous request to remove the recipient from the distribution list. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
receiving, with a processing device, an e-mail communication addressed to a recipient, wherein the e-mail communication is associated with an e-mail source; comparing, with the processing device, an identity of the e-mail source to a list of sources associated with unwanted e-mail communications; identifying, with the processing device, a previous request initiated by the recipient to remove the recipient from a distribution list of the e-mail source, wherein the previous request was transmitted to the e-mail source in response to receiving a first unwanted e-mail communication from the e-mail source; and detecting, with the processing device, the e-mail communication as a second unwanted e-mail communication associated with the e-mail source based, at least in part, on the identification of the previous request to remove the recipient from the distribution list. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A system, comprising:
-
a database configured to store a plurality of requests associated with a receipt of unwanted e-mail communications; and a processing device configured to; identify a first request initiated by one or more recipients, and transmitted to an e-mail source to remove the one or more recipients from a distribution list of the e-mail source, wherein the first request is associated with a first unwanted e-mail communication from the e-mail source; store the first request in the database, wherein the first request identifies the e-mail source as being associated with the first unwanted e-mail communication; identify a second request initiated by one or more recipients, and transmitted to the e-mail source to remove the one or more recipients from the distribution list of the e-mail source, wherein the second request is associated with a second unwanted e-mail communication from the e-mail source; store the second request in the database, wherein the second request identifies the e-mail source as being associated with the second unwanted e-mail communication; determine a number of violations associated with the e-mail source; and report that the e-mail source is in violation of sending the unwanted e-mail communications in response to determining that the number of violations exceeds a threshold number. - View Dependent Claims (17, 18, 19, 20)
-
Specification