System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison
First Claim
1. A method executable at least by a sending module comprising:
- receiving, at the sending module, a first electronic message that includes a request to confirm that a second electronic message sent to an intended recipient was sent on behalf of an originator identified in the second electronic message, the first electronic message including a first data string purportedly generated by application of an algorithm to a portion of the second electronic message and further including the portion of the second electronic message;
generating, at the sending module, a second data string, different from the first data string, by application of an algorithm to the portion of the second electronic message included in the first electronic message;
comparing, at the sending module, the first data string to the second data string; and
upon determining that the first data string does not match the second data string, responding to the first electronic message, denying the second electronic message was sent on behalf of the originator identified in the second electronic message due to the originator using a false originating address,wherein the algorithm applied to the portion of the second electronic message is selected from a plurality of algorithms based on one of time associated with the second electronic message or data in the portion of the second electronic message, andwherein the algorithm applied to the portion of the second electronic message is modifiable by changing at least one of a parameter, scheme, or component associated therewith.
3 Assignments
0 Petitions
Accused Products
Abstract
A sending device prepares a key for each electronic message sent by the device by applying an algorithm to specified data in the message and then incorporates the key in the message. A receiving device, upon receipt of an electronic message, locates the incorporated key and the data from which a sending device practicing the invention would have prepared it. The receiving device communicates a confirmation request to the purported sending device which contains the key and the data for its preparation. The sending device receives the confirmation messages and prepares a comparison key by applying the algorithm to the data in the confirmation request. The sending device replies to the confirmation request confirming that the sending device sent the message if the comparison key matches the key in the confirmation request and otherwise responds with a denial.
-
Citations
32 Claims
-
1. A method executable at least by a sending module comprising:
-
receiving, at the sending module, a first electronic message that includes a request to confirm that a second electronic message sent to an intended recipient was sent on behalf of an originator identified in the second electronic message, the first electronic message including a first data string purportedly generated by application of an algorithm to a portion of the second electronic message and further including the portion of the second electronic message; generating, at the sending module, a second data string, different from the first data string, by application of an algorithm to the portion of the second electronic message included in the first electronic message; comparing, at the sending module, the first data string to the second data string; and upon determining that the first data string does not match the second data string, responding to the first electronic message, denying the second electronic message was sent on behalf of the originator identified in the second electronic message due to the originator using a false originating address, wherein the algorithm applied to the portion of the second electronic message is selected from a plurality of algorithms based on one of time associated with the second electronic message or data in the portion of the second electronic message, and wherein the algorithm applied to the portion of the second electronic message is modifiable by changing at least one of a parameter, scheme, or component associated therewith. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method executable at least by a sending module comprising:
-
receiving, at the sending module, a first electronic message that includes a request to confirm that a second electronic message sent to an intended recipient was sent on behalf of an originator identified in the second electronic message, the first electronic message including a first data string generated by application of an algorithm to a portion of the second electronic message and further including the portion of the second electronic message; generating a second data string, different from the first data string, by application of an algorithm to the portion of the second electronic message included in the first electronic message; comparing the first data string to the second data string; and upon determining that the first data string matches the second data string, responding to the first electronic message, affirming the originator did not use a false originating address, wherein the algorithm applied to the portion of the second electronic message is selected from a plurality of algorithms based on one of time associated with the second electronic message or data in the portion of the second electronic message, and wherein the algorithm applied to the portion of the second electronic message is modifiable by changing at least one of a parameter, scheme, or component associated therewith. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method executable at least by a sending device, a receiving device, and a confirmation device comprising:
-
at the receiving device, receiving from the sending device a first electronic message authorized by an originator and directed to an intended recipient, the first electronic message containing an identifier associated with the originator and further containing a first data string generated by application of a first algorithm to a portion of the first electronic message; sending to the confirmation device a second electronic message that includes a request to confirm that the first electronic message was authorized by the originator associated with the identifier, the second electronic message including the first data string and the portion of the first electronic message; receiving from the confirmation device a response to the second electronic message affirming the first electronic message was authorized by the originator associated with the identifier; allowing the first electronic message to be further processed according to rules for processing of confirmed electronic messages directed to the intended recipient; receiving from the sending device a third electronic message authorized by the originator, the third electronic message containing the identifier and further containing a second data string generated by application of a second algorithm to a portion of the third electronic message; and sending to the confirmation device a fourth electronic message that includes a request to confirm that the third electronic message was authorized by the originator associated with the identifier, the fourth electronic message including the second data string and the portion of the third electronic message, wherein the first algorithm applied to the portion of the first electronic message or the second algorithm applied to the third electronic message is selected from a plurality of algorithms based on one of time associated with the first electronic message or the third electronic message or data in the portion of the first electronic message or the third electronic message, and wherein the first algorithm applied to the portion of the first electronic message or the second algorithm applied to the third electronic message is modifiable by changing at least one of a parameter, scheme, or component associated therewith. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. A method executable at least by a sending device, a receiving device, and a confirmation device comprising:
-
at the receiving device, receiving from the sending device a first electronic message authorized by an originator and directed to an intended recipient, the first electronic message containing an identifier associated with the originator and further containing a first data string generated by application of a first algorithm to a portion of the first electronic message; sending to the confirmation device a second electronic message that includes a request to confirm that the first electronic message was authorized by the originator associated with the identifier, the second electronic message including the first data string and the portion of the first electronic message; receiving from the confirmation device a response to the second electronic message affirming the first electronic message was authorized by the originator associated with the identifier; allowing the first electronic message to be further processed according to rules for processing of confirmed electronic messages directed to the intended recipient; receiving from the sending device a third electronic message authorized by the originator, the third electronic message containing the identifier and further containing a second data string generated by application of a second algorithm to a portion of the third electronic message; and sending to the confirmation device a fourth electronic message that includes a request to confirm that the third electronic message was authorized by the originator associated with the identifier, the fourth electronic message including the second data string and the portion of the third electronic message, wherein the first algorithm applied to the portion of the first electronic message differs from the second algorithm applied to the portion of the third electronic message. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32)
-
Specification