System and method for controlling access to an electronic message recipient
First Claim
Patent Images
1. A method for selectively allowing or denying communication access to a recipient user coupled to an electronic communication network by other users coupled to the electronic communications network, said recipient user having an associated recipient identifier, comprising the steps of:
- A. generating by a security module, a plurality of distinct proxy identifiers associated with said recipient user, each of said proxy identifiers having at least three associated security states,a first of said states being indicative of allowing any other user coupled to said electronic communication network communication access to said recipient user,a second of said states being indicative of denying any other user coupled to said electronic communication network communication access to said recipient user, anda third of said states being conditionally indicative of allowing at least one but fewer than all other users coupled to said electronic communication network communication access to said recipient user if predetermined criteria are met and denying access to said recipient user otherwise;
B. receiving by a receiver, an inbound message from a sender user coupled to said electronic communication network including a sender identifier and said recipient identifier, said sender identifier being associated with the sender user of said inbound message, and said recipient identifier being one of said proxy identifiers, and transferring said inbound message to a queue storageC. processing by the security module, said transferred inbound message to determine a security status associated therewith pursuant to security settings alterable by said recipient user and using said sender identifier and said recipient identifier; and
D. pursuant to said determination, controlling by the queue storage communication access for said transferred inbound message to said recipient user by;
i. allowing communication access for said transferred inbound message to said recipient user when said security status corresponds to said first state;
ii. denying communication access for said transferred-inbound message to said recipient user when said security status corresponds to said second state;
iii. allowing communication access for said transferred inbound message to said recipient user when said security status corresponds to said third state and meets one or more of said predetermined criteria at least partially related to said security status of said one of said proxy identifiers, and denying communication access for said transferred inbound message to said recipient user otherwise.
7 Assignments
0 Petitions
Accused Products
Abstract
A system for, and method of, generating a plurality of proxy identities to a given originator identity as a means of providing controlled access to the originator identity in electronic communications media such as e-mail and instant messaging.
32 Citations
94 Claims
-
1. A method for selectively allowing or denying communication access to a recipient user coupled to an electronic communication network by other users coupled to the electronic communications network, said recipient user having an associated recipient identifier, comprising the steps of:
-
A. generating by a security module, a plurality of distinct proxy identifiers associated with said recipient user, each of said proxy identifiers having at least three associated security states, a first of said states being indicative of allowing any other user coupled to said electronic communication network communication access to said recipient user, a second of said states being indicative of denying any other user coupled to said electronic communication network communication access to said recipient user, and a third of said states being conditionally indicative of allowing at least one but fewer than all other users coupled to said electronic communication network communication access to said recipient user if predetermined criteria are met and denying access to said recipient user otherwise; B. receiving by a receiver, an inbound message from a sender user coupled to said electronic communication network including a sender identifier and said recipient identifier, said sender identifier being associated with the sender user of said inbound message, and said recipient identifier being one of said proxy identifiers, and transferring said inbound message to a queue storage C. processing by the security module, said transferred inbound message to determine a security status associated therewith pursuant to security settings alterable by said recipient user and using said sender identifier and said recipient identifier; and D. pursuant to said determination, controlling by the queue storage communication access for said transferred inbound message to said recipient user by; i. allowing communication access for said transferred inbound message to said recipient user when said security status corresponds to said first state; ii. denying communication access for said transferred-inbound message to said recipient user when said security status corresponds to said second state; iii. allowing communication access for said transferred inbound message to said recipient user when said security status corresponds to said third state and meets one or more of said predetermined criteria at least partially related to said security status of said one of said proxy identifiers, and denying communication access for said transferred inbound message to said recipient user otherwise. - View Dependent Claims (2, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
3. A system for selectively allowing or denying communication access to a recipient user coupled to an electronic communication network by other users coupled to the electronic communications network, said recipient user having an associated recipient identifier, comprising:
-
A. a generator for generating a plurality of distinct proxy identifiers associated with said recipient user, each of said proxy identifiers having at least three associated security states, a first of said states being indicative of allowing any other user coupled to said electronic communication network communication access to said recipient user, a second of said states being indicative of denying any other user coupled to said electronic communication network communication access to said recipient user, and a third of said states being conditionally indicative of allowing at least one but fewer than all other users coupled to said electronic communication network communication access to said recipient user if predetermined criteria are met and denying access to said recipient user otherwise; B. a message transferor for receiving an inbound message from a sender user coupled to said electronic communication network including a sender identifier and said recipient identifier, said sender identifier being associated with the sender user of said inbound message, and said receiver identifier being one of said proxy identifiers, and transferring said inbound message to a queue location; C. a processor for processing said transferred inbound message to determine a security status associated with said transferred inbound message pursuant to security settings alterable by said recipient user, and using said sender identifier and said recipient identifier, and D. pursuant to said determination, a gate for controlling communication access for said transferred inbound message to said recipient user by; i. allowing communication access for said transferred inbound message to said recipient user when said security status corresponds to said first state; ii. denying communication access for said transferred inbound message to said recipient user when said security status corresponds to said second state; iii. allowing communication access for said transferred inbound message to said recipient user when said security status corresponds to said third state and meets one or more of said predetermined criteria at least partially related to said security states of said one of said proxy identifiers, and denying communication access for said transferred message to said recipient user otherwise. - View Dependent Claims (4, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66)
-
-
30. A method for selectively allowing or denying communication access to a recipient user coupled to an electronic communication network by other users coupled to the electronic communications network, comprising the steps of:
-
receiving by a receiver, an inbound message over the electronic communications network from a sender user, wherein the inbound message includes a sender identifier associated with a sender user and recipient identifier associated with the recipient user; and determining by a security module, pursuant to security settings alterable by said recipient user, and using said sender identifier and said recipient identifier, one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the recipient user, a second security state is indicative of denying delivery of the inbound message to the recipient user, a third security state is indicative of conditionally allowing delivery of the message to the recipient user, each of the at least three security states are associated with the sender identifier and the recipient identifier included in the inbound message. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
67. A system for selectively allowing or denying communication access to a recipient user coupled to an electronic communication network by other users coupled to the electronic communications network, comprising:
-
a receiver configured to receive an inbound message over the electronic communications network from a sender user and transfer said inbound message to a queue storage, wherein the inbound message includes an identifier of the sender user and an identifier of the recipient user; and a processor configured to determine pursuant to security settings alterable by said recipient user, and using said sender identifier and said recipient identifier, one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to the recipient user, a second security state is indicative of denying delivery of the inbound message to the recipient user, a third security state is indicative of conditionally allowing delivery of the message to the recipient user, each of the at least three security states being associated with the sender identifier and the recipient identifier included in the inbound message. - View Dependent Claims (68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80)
-
-
81. A computer program product residing on a computer readable medium having a plurality of instructions stored thereon which, when executed by a processor, cause that processor to:
- receive an inbound message to a recipient user over a electronic communications network from a sender user, wherein the inbound message includes an identifier of the sender user and an identifier of a recipient user;
transfer said inbound message to a queue storage; and
determine pursuant to security settings alterable by said recipient user, and using said sender identifier and said recipient identifier, one of at least three security states associated with the inbound message, wherein a first security state is indicative of allowing delivery of the inbound message to a recipient user, a second security state is indicative of denying delivery of the inbound message to the recipient user, a third security state is indicative of conditionally allowing delivery of the message to the recipient user, each of the at least three security states being are associated with the sender identifier and the recipient identifier included in the inbound message, wherein the computer readable medium not being a transitory signal. - View Dependent Claims (82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94)
- receive an inbound message to a recipient user over a electronic communications network from a sender user, wherein the inbound message includes an identifier of the sender user and an identifier of a recipient user;
Specification