Spam filtering system and method
First Claim
Patent Images
1. A spam filter method, comprising:
- (a) maintaining at least one automated database of permitted email addresses, and non-permitted email addresses;
(b) automatically communicating between an automated spam filter processor and an automated email server, over a computer communication network, wherein email messages are received by the email server and email messages on the email server are available for retrieval by user email clients;
(c) selectively automatically downloading email messages from the automated email server to the automated spam filter processor over the computer communication network using a retrieve mail protocol;
(d) storing the automatically downloaded email messages from the email server, not corresponding to entries in the database of permitted email addresses in a memory associated with the automated spam filter processor;
(e) removing email messages not corresponding to entries in the database of permitted email addresses from the automated email server, wherein email messages corresponding to entries in the database of permitted email addresses are maintained on the automated email server;
(f) automatically sending a challenge email message, by the automated spam filter processor, in response to a stored email message automatically downloaded from the email server from email addresses which are not non-permitted email addresses, to the non-permitted email address;
(g) monitoring the automated email server, by the automated spam filter processor, for receipt of an appropriate response email message to the challenge email message, and if an appropriate response email message to the challenge email message is received, adding the respective email address associated with the appropriate response email message to the automated database of permitted email addresses;
(h) automatically restoring removed email messages from email addresses which become permitted, from the memory, by the automated spam filter processor, to the automated email server over the computer communication network using a send mail protocol; and
(i) analyzing email messages downloaded by the automated spam filter from the automated email server to determine presence of a system email message, distinct from any appropriate response email message, containing a valid authorization code, and if the email message is determined to contain a valid authorization code, extracting and executing a command sequence communicated in the system email message, the communicated command sequence including recognized commands adapted to at least one of;
disable at least a portion of the automated spam filter processor, and add at least one email address to the database of permitted email addresses independent of receipt of any appropriate response email message to the challenge email message.
1 Assignment
0 Petitions
Accused Products
Abstract
A spam filter system and method, for maintaining at least one database of permitted email addresses; automatically communicating with an email server, and selectively downloading and storing email not corresponding to entries in the database; automatically sending a challenge message in response to messages from non-permitted email addresses; if an appropriate response is received to the challenge message, adding the non-permitted email address to the database of permitted email addresses; and automatically restoring downloaded email messages from email addresses which become permitted.
320 Citations
20 Claims
-
1. A spam filter method, comprising:
-
(a) maintaining at least one automated database of permitted email addresses, and non-permitted email addresses; (b) automatically communicating between an automated spam filter processor and an automated email server, over a computer communication network, wherein email messages are received by the email server and email messages on the email server are available for retrieval by user email clients; (c) selectively automatically downloading email messages from the automated email server to the automated spam filter processor over the computer communication network using a retrieve mail protocol; (d) storing the automatically downloaded email messages from the email server, not corresponding to entries in the database of permitted email addresses in a memory associated with the automated spam filter processor; (e) removing email messages not corresponding to entries in the database of permitted email addresses from the automated email server, wherein email messages corresponding to entries in the database of permitted email addresses are maintained on the automated email server; (f) automatically sending a challenge email message, by the automated spam filter processor, in response to a stored email message automatically downloaded from the email server from email addresses which are not non-permitted email addresses, to the non-permitted email address; (g) monitoring the automated email server, by the automated spam filter processor, for receipt of an appropriate response email message to the challenge email message, and if an appropriate response email message to the challenge email message is received, adding the respective email address associated with the appropriate response email message to the automated database of permitted email addresses; (h) automatically restoring removed email messages from email addresses which become permitted, from the memory, by the automated spam filter processor, to the automated email server over the computer communication network using a send mail protocol; and (i) analyzing email messages downloaded by the automated spam filter from the automated email server to determine presence of a system email message, distinct from any appropriate response email message, containing a valid authorization code, and if the email message is determined to contain a valid authorization code, extracting and executing a command sequence communicated in the system email message, the communicated command sequence including recognized commands adapted to at least one of;
disable at least a portion of the automated spam filter processor, and add at least one email address to the database of permitted email addresses independent of receipt of any appropriate response email message to the challenge email message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A spam filter, comprising:
-
(a) at least one database of permitted email addresses and non-permitted email addresses; (b) a hardware computer network communications port configured to communicate with an email server; (c) a database of spam email messages; (d) a hardware processor, configured to; (i) automatically communicate with the email server, selectively download email messages by communicating through the computer network communications port using a retrieve mail protocol, store retrieved email messages not associated with a permitted email address to the database of spam email messages, and remove email messages not associated with a permitted email address from the email server; (ii) automatically send a challenge email message to a source email address of an email message stored in the database of spam email messages not associated with a non-permitted email address; (iii) automatically monitor the email server for receipt of a response email message to the challenge email message; (iv) if an appropriate response email message is received to the challenge email message, automatically add the source email address associated with the email message which provoked the challenge email message to the database of permitted email addresses; (v) automatically restore a respective email message from the database of spam email messages to the email server if an associated source email address is added to the database of permitted email addresses, by communicating through the computer network communications port with the email server using a send mail protocol; (vi) automatically analyze email messages received by the email server, distinct from any response email message, for presence of an authorization code and a command for at least one of;
adding an email address to the database of permitted email addresses independent of any response email message, and disabling at least a portion of the functions of the spam filter, communicated within a respective system command email message, and upon successful verification of the authorization code, to extract and execute the communicated command. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A computer readable non-transitory storage medium, storing instructions for controlling a programmable device to implement a spam filter method, comprising:
-
(a) maintaining at least one database of permitted email addresses and non-permitted email addresses by a spam filter; (b) automatically downloading a respective email message from an email server through a computer communications network using a retrieve mail protocol by the spam filter, the automated email server being available for user email clients, storing retrieved email messages not corresponding to entries in the database, and removing email messages from the email server not corresponding to entries in the database; (c) automatically sending a challenge message by the spam filter, within a respective email message, in response to an email message stored in the database from an email address which is not a permitted email address; (d) monitoring the automated email server by the spam filter for receipt of an appropriate response in an email message, and if an appropriate response is received to the challenge message, adding the respective email address of a sender of the respective email message for which an appropriate response is received to the database of permitted email addresses; (e) automatically restoring removed email messages from email addresses added to the database of permitted email addresses by the spam filter, through the computer communications network. using a send mail protocol, to the email server, wherein the removed email messages are unavailable from the email server for the user email clients using the retrieve mail protocol, and the restored email messages are available from the email server for the user email clients using the retrieve mail protocol; (f) automatically analyzing email messages downloaded from the email server distinct from any email messages containing an appropriate response, by the spam filter, to determine whether they contain an authorization code and a command communicated within a respective email message for execution by the spam filter, and upon verification of the authorization code, extracting and controlling an execution of the communicated command by the spam filter to least one of add an email address to the database of permitted email addresses independent of any appropriate response, and disable at least a portion of the functions of the spam filter. - View Dependent Claims (20)
-
Specification