System and method for controlling access to an electronic message recipient
First Claim
Patent Images
1. A method for selectively allowing or denying access to a user coupled to an electronic communications network, said user having an associated recipient identifier, comprising the steps of:
- A. generating a plurality of proxy identifiers associated with said user, each of said proxy identifiers having at least three associated security states, a first of said states being indicative of allowing any party coupled to said network access to said user, a second of said states being indicative of denying any party coupled to said network access to said user, and a third of said states being conditionally indicative of allowing at least one but fewer than all parties coupled to said network access to said user if predetermined criteria are met and denying access to said user otherwise;
B. in response to an inbound message from said network including a sender identifier and said recipient identifier, said sender identifier being associated with a sender of said inbound message, transfer said inbound message to a location associated with one of said proxy identifiers;
C. processing said transferred inbound message to evaluate a security status associated therewith, said security status being related to said sender identifier and said recipient identifier; and
D. allowing access for said transferred message to said user when said security status meets one or more predetermined criteria at least partially related to said security status of said one proxy identifier, and denying access for said transferred message to said user otherwise.
7 Assignments
0 Petitions
Accused Products
Abstract
A system for, and method of, generating a plurality of proxy identities to a given originator identity as a means of providing controlled access to the originator identity in electronic communications media such as e-mail and instant messaging.
40 Citations
95 Claims
-
1. A method for selectively allowing or denying access to a user coupled to an electronic communications network, said user having an associated recipient identifier, comprising the steps of:
-
A. generating a plurality of proxy identifiers associated with said user, each of said proxy identifiers having at least three associated security states, a first of said states being indicative of allowing any party coupled to said network access to said user, a second of said states being indicative of denying any party coupled to said network access to said user, and a third of said states being conditionally indicative of allowing at least one but fewer than all parties coupled to said network access to said user if predetermined criteria are met and denying access to said user otherwise;
B. in response to an inbound message from said network including a sender identifier and said recipient identifier, said sender identifier being associated with a sender of said inbound message, transfer said inbound message to a location associated with one of said proxy identifiers;
C. processing said transferred inbound message to evaluate a security status associated therewith, said security status being related to said sender identifier and said recipient identifier; and
D. allowing access for said transferred message to said user when said security status meets one or more predetermined criteria at least partially related to said security status of said one proxy identifier, and denying access for said transferred message to said user otherwise. - View Dependent Claims (2, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 29, 30)
-
-
3. A system for selectively allowing or denying access to a user coupled to an electronic communications network, said user having an associated recipient identifier, comprising:
-
A. a generator for generating a plurality of proxy identifiers associated with said user, each of said proxy identifiers having at least three associated security states, a first of said states being indicative of allowing any party coupled to said network access to said user, a second of said states being indicative of denying any party coupled to said network access to said user, and a third of said states being conditionally indicative of allowing at least one but fewer than all parties coupled to said network access to said user if predetermined criteria are met and denying access to said user otherwise;
B. a message transferor responsive to an inbound message from said network including a sender identifier and said recipient identifier, said sender identifier being associated with a sender of said inbound message, to transfer said inbound message to a location associated with one of said proxy identifiers;
C. a processor for evaluating a security status associated with said transferred inbound message, said security status being related to said sender identifier and said recipient identifier, and D. a gate for allowing access for said transferred message to said user when said security status meets one or more predetermined criteria at least partially related to said security states of said one proxy identifier, and denying access for said transferred message to said user otherwise. - View Dependent Claims (4, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67)
-
-
31. A method for selectively allowing or denying access to a user coupled to an electronic communications network, comprising the steps of:
-
receiving an inbound message over the electronic communications network from a sender, wherein the inbound message includes an identifier associated with a sender and an identifier associated with a recipient; and
determining one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
68. A system for selectively allowing or denying access to a user coupled to an electronic communications network, comprising:
-
a receiver configured to receive an inbound message over the electronic communications network from a sender, wherein the inbound message includes an identifier of the sender and an identifier of the recipient; and
a processor configured to determine one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message. - View Dependent Claims (69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81)
-
-
82. A computer program product residing on a computer readable medium having a plurality of instructions stored thereon which, when executed by a processor, cause that processor to:
-
receive an inbound message over a electronic communications network from a sender, wherein the inbound message includes an identifier of the sender and an identifier of a recipient; and
determine one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to a user, a second security state is indicative of denying delivery of the inbound message to the user, a third security state is indicative of conditionally allowing delivery of the message to the user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message. - View Dependent Claims (83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95)
-
Specification