System and method for controlling access to an electronic message recipient
First Claim
1. A method for selectively allowing or denying access to a user coupled to an electronic communications network, comprising:
- receiving an inbound message over the electronic communications network from a sender, wherein the inbound message includes an identifier associated with a sender and an identifier associated with a recipient;
determining if the identifier associated with the recipient was previously generated by the user and is absent from a plurality of proxy identifiers associated with the recipient; and
determining one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message.
7 Assignments
0 Petitions
Accused Products
Abstract
A system and method for selectively allowing or denying access to a user coupled to an electronic communications network includes a receiver that receives an inbound message over the electronic communications network from a sender. The inbound message includes an identifier that is associated with a sender and an identifier that is associated with a recipient. The system also includes a processor that determines if the identifier associated with the recipient was previously generated by the user and is absent from a plurality of proxy identifiers associated with the recipient. The processor is further determines one of at least three security states associated with the inbound message. A first security state is indicative of allowing delivery of the inbound message to the user. A second security state is indicative of denying delivery of the inbound message to the user. A third security state is indicative of conditionally allowing delivery of the message to the user. Each of the three security states are associated with the sender identifier and the recipient identifier included in the inbound message.
28 Citations
60 Claims
-
1. A method for selectively allowing or denying access to a user coupled to an electronic communications network, comprising:
-
receiving an inbound message over the electronic communications network from a sender, wherein the inbound message includes an identifier associated with a sender and an identifier associated with a recipient;
determining if the identifier associated with the recipient was previously generated by the user and is absent from a plurality of proxy identifiers associated with the recipient; and
determining one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message. - View Dependent Claims (2, 3, 4, 17)
-
-
5. A method for selectively allowing or denying access to a user coupled to an electronic communications network, comprising:
-
receiving an inbound message over the electronic communications network from a sender, wherein the inbound message includes an identifier associated with a sender and an identifier associated with a recipient;
determining one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message; and
if delivery is allowed, adding a footer to the inbound message, wherein the footer is configured to serve as an interface for the user. - View Dependent Claims (6, 7, 8, 9, 10)
-
-
11. A method for selectively allowing or denying access to a user coupled to an electronic communications network, comprising:
-
receiving an inbound message over the electronic communications network from a sender, wherein the inbound message includes an identifier associated with a sender and an identifier associated with a recipient;
determining one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message;
determining if the inbound message is exempt from the security states; and
if exempt, delivering the inbound message based on the security exemption. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
18. A method for selectively allowing or denying access to a user coupled to an electronic communications network, comprising:
-
receiving an inbound message over the electronic communications network from a sender, wherein the inbound message includes an identifier associated with a sender and an identifier associated with a recipient; and
determining one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message, wherein determining the security state includes determining when a previous message was received that included the identifier associated with the sender and the identifier associated with the recipient. - View Dependent Claims (19)
-
-
20. A method for selectively allowing or denying access to a user coupled to an electronic communications network, comprising:
-
receiving an inbound message over the electronic communications network from a sender, wherein the inbound message includes an identifier associated with a sender and an identifier associated with a recipient;
determining one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message; and
determining if the security state associated with the inbound message has been escalated. - View Dependent Claims (21, 22, 23, 24, 25)
-
-
26. A system for selectively allowing or denying access to a user coupled to an electronic communications network, comprising:
-
a receiver configured to receive an inbound message over the electronic communications network from a sender, wherein the inbound message includes an identifier associated with a sender and an identifier associated with a recipient; and
a processor configured to determine if the identifier associated with the recipient was previously generated by the user and is absent from a plurality of proxy identifiers associated with the recipient, wherein the processor is further configured to determine one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message. - View Dependent Claims (27, 28, 29)
-
-
30. A system for selectively allowing or denying access to a user coupled to an electronic communications network, comprising:
-
a receiver configured to receive an inbound message over the electronic communications network from a sender, wherein the inbound message includes an identifier associated with a sender and an identifier associated with a recipient; and
a processor configured to determine one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message, wherein if delivery is allowed, the processor is further configured to add a footer to the inbound message, wherein the footer is configured to serve as an interface for the user. - View Dependent Claims (31, 32, 33, 34, 35)
-
-
36. A system for selectively allowing or denying access to a user coupled to an electronic communications network, comprising:
-
a receiver configured to receive an inbound message over the electronic communications network from a sender, wherein the inbound message includes an identifier associated with a sender and an identifier associated with a recipient; and
a processor configured to determine one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message, wherein if the processor is further configured to determine if the inbound message is exempt from the security states and deliver the inbound message based on the security exemption. - View Dependent Claims (37, 38, 39, 40, 41, 42)
-
-
43. A system for selectively allowing or denying access to a user coupled to an electronic communications network, comprising:
-
a receiver configured to receive an inbound message over the electronic communications network from a sender, wherein the inbound message includes an identifier associated with a sender and an identifier associated with a recipient; and
a processor configured to determine one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message, wherein determining the security state includes determining when a previous message was received that included the identifier associated with the sender and the identifier associated with the recipient. - View Dependent Claims (44)
-
-
45. A system for selectively allowing or denying access to a user coupled to an electronic communications network, comprising:
-
a receiver configured to receive an inbound message over the electronic communications network from a sender, wherein the inbound message includes an identifier associated with a sender and an identifier associated with a recipient; and
a processor configured to determine one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message, wherein the processor is further configured to determine if the security state associated with the inbound message has been escalated. - View Dependent Claims (46, 47, 48, 49, 50)
-
-
51. A computer program product residing on a computer readable medium having a plurality of instructions stored thereon which, when executed by a processor, cause that processor to:
-
receive an inbound message over the electronic communications network from a sender, wherein the inbound message includes an identifier associated with a sender and an identifier associated with a recipient;
determine if the identifier associated with the recipient was previously generated by the user and is absent from a plurality of proxy identifiers associated with the recipient; and
determine one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message. - View Dependent Claims (52)
-
-
53. A computer program product residing on a computer readable medium having a plurality of instructions stored thereon which, when executed by a processor, cause that processor to:
-
receive an inbound message over the electronic communications network from a sender, wherein the inbound message includes an identifier associated with a sender and an identifier associated with a recipient;
determine one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message; and
if delivery is allowed, add a footer to the inbound message, wherein the footer is configured to serve as an interface for the user. - View Dependent Claims (54)
-
-
55. A computer program product residing on a computer readable medium having a plurality of instructions stored thereon which, when executed by a processor, cause that processor to:
-
receive an inbound message over the electronic communications network from a sender, wherein the inbound message includes an identifier associated with a sender and an identifier associated with a recipient;
determine one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message;
determine if the inbound message is exempt from the security states; and
deliver the inbound message based on the security exemption. - View Dependent Claims (56)
-
-
57. A computer program product residing on a computer readable medium having a plurality of instructions stored thereon which, when executed by a processor, cause that processor to:
-
receive an inbound message over the electronic communications network from a sender, wherein the inbound message includes an identifier associated with a sender and an identifier associated with a recipient; and
determine one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message, wherein determining the security state includes determining when a previous message was received that included the identifier associated with the sender and the identifier associated with the recipient. - View Dependent Claims (58)
-
-
59. A computer program product residing on a computer readable medium having a plurality of instructions stored thereon which, when executed by a processor, cause that processor to:
-
receive an inbound message over the electronic communications network from a sender, wherein the inbound message includes an identifier associated with a sender and an identifier associated with a recipient;
determine one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message; and
determine if the security state associated with the inbound message has been escalated. - View Dependent Claims (60)
-
Specification