System and method for detecting and filtering unsolicited and undesired electronic messages
First Claim
1. A method comprising:
- generating, from at least a portion of a first electronic message for an intendedrecipient, first identification data that uniquely identifies said first electronic message;
associating said first identification data with said first electronic message;
storing said first identification data;
sending to said intended recipient said first electronic message with said first identification data;
receiving on behalf of said intended recipient a first confirmation request including said first identification data and requesting confirmation that said first electronic message was authorized by said originator;
comparing said first identification data received in said first confirmation request to said first stored identification data;
upon determining that said first identification data received in said first confirmation request matches said first stored identification data, responding to said first confirmation request, affirming said first electronic message was authorized by said originator;
generating, from at least a portion of a subsequent electronic message for said intended recipient, subsequent identification data that uniquely identifies said subsequent electronic message and distinguishes said subsequent electronic message from other electronic message authorized by said originator for said intended recipient;
associating said subsequent identification data with said subsequent electronic message;
storing said subsequent identification data;
sending to said intended recipient said subsequent electronic message with said subsequent identification data;
receiving on behalf of said intended recipient a subsequent confirmation request including said subsequent identification data and requesting confirmation that said subsequent, electronic message was authorized by said originator;
comparing said subsequent identification data received in said subsequent confirmation request to said subsequent stored identification data; and
upon determining that said subsequent identification data received in said subsequent confirmation request matches said stored subsequent identification data, responding to said subsequent confirmation request, affirming said subsequent electronic message was authorized by said originator.
3 Assignments
0 Petitions
Accused Products
Abstract
A sending device locates and stores identifying information for each electronic message sent by the device. A receiving device, upon receipt of an electronic message, locates identifying information for the electronic message and the purported sending device of the message. The receiving device communicates a confirmation request to the purported sending device which contains identifying information for the message. The sending device receives confirmation messages and replies to such messages confirming that the message was sent if identifying information in the confirmation request corresponds to identifying information stored by the sending device and denying that the message was sent if the identifying information in the confirmation request does not correspond to stored data.
76 Citations
56 Claims
-
1. A method comprising:
-
generating, from at least a portion of a first electronic message for an intended recipient, first identification data that uniquely identifies said first electronic message; associating said first identification data with said first electronic message; storing said first identification data; sending to said intended recipient said first electronic message with said first identification data; receiving on behalf of said intended recipient a first confirmation request including said first identification data and requesting confirmation that said first electronic message was authorized by said originator; comparing said first identification data received in said first confirmation request to said first stored identification data; upon determining that said first identification data received in said first confirmation request matches said first stored identification data, responding to said first confirmation request, affirming said first electronic message was authorized by said originator; generating, from at least a portion of a subsequent electronic message for said intended recipient, subsequent identification data that uniquely identifies said subsequent electronic message and distinguishes said subsequent electronic message from other electronic message authorized by said originator for said intended recipient; associating said subsequent identification data with said subsequent electronic message; storing said subsequent identification data; sending to said intended recipient said subsequent electronic message with said subsequent identification data; receiving on behalf of said intended recipient a subsequent confirmation request including said subsequent identification data and requesting confirmation that said subsequent, electronic message was authorized by said originator; comparing said subsequent identification data received in said subsequent confirmation request to said subsequent stored identification data; and upon determining that said subsequent identification data received in said subsequent confirmation request matches said stored subsequent identification data, responding to said subsequent confirmation request, affirming said subsequent electronic message was authorized by said originator. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 53)
-
-
17. A system comprising:
a computer comprising a sending module operable to; send to an intended recipient at least a first and a subsequent electronic message authorized by an originator and first and subsequent identification data uniquely identifying said first and subsequent electronic messages, the first and subsequent identification data distinguishing said first and subsequent electronic messages from other electronic messages authorized by the originator, said first and subsequent identification data being stored for subsequent access, said first and subsequent identification data being generated from at least a portion of the first and subsequent electronic messages; receive on behalf of the intended recipient first and subsequent confirmation requests including said first and subsequent identification data and requesting confirmation that said first and subsequent electronic messages were authorized by the originator; compare said first and subsequent identification data received in said first and subsequent confirmation requests to said stored first and subsequent identification data; and upon determining that said first and subsequent identification data received in said first and subsequent confirmation requests match said first and subsequent stored identification data, respond to said first and second confirmation requests, affirming said first and subsequent electronic messages were authorized by the originator. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
31. A method comprising:
-
receiving a first confirmation request to confirm that first electronic message sent to an intended recipient was authorized by an originator identified in the first electronic message, the first confirmation request including first identification data purposing to uniquely identify the first electronic message, the first identification data having been generated from at least a portion of the first electronic message; searching a data store, separate from said first;
electronic message, for said first identification data;upon determining that said data store does not contain said first identification data, responding to said confirmation request, denying the first electronic message was authorized by the originator; receiving a subsequent confirmation request to confirm that a subsequent electronic message sent to an intended recipient was authorized by the originator identified in the subsequent electronic message, the subsequent confirmation request including subsequent identification data purporting to uniquely identify the subsequent electronic message, the subsequent identification data distinguishing said subsequent electronic message from other electronic messages authorized by the originator, the subsequent identification data having been generated from at least a portion of the subsequent electronic message; searching a data store, separate from said subsequent electronic message, for said subsequent identification data; and upon determining that said data store does not contain said subsequent identification data, responding to said subsequent confirmation request, denying the subsequent electronic message was authorized by the originator. - View Dependent Claims (32, 33, 34, 35, 36, 37, 54)
-
-
38. A method comprising:
-
receiving a first confirmation request to confirm that a first electronic message sent to an intended recipient was authorized by an originator identified in the first electronic message, the first confirmation request including first identification data purporting to uniquely identify the first electronic message, the first identification data having been generated from at least a portion of the first electronic message; searching a data store, independent of said first electronic message, for said first identification data; upon determining that said data store contains said first identification data, responding to said first confirmation request, affirming the first electronic message was authorized by the originator; receiving a subsequent confirmation request to confirm that a subsequent electronic message sent to an intended recipient was authorized by the originator identified in the subsequent electronic message, the subsequent confirmation request including subsequent identification data purporting to uniquely identify the subsequent electronic message, the, subsequent identification data distinguishing said subsequent electronic message from other electronic messages authorized by the originator, the subsequent identification data having been generated from at least a portion of the subsequent electronic message; searching a data store, independent of said subsequent electronic message, for said subsequent identification data; and upon determining that said data store contains said subsequent identification data, responding to said subsequent confirmation request, affirming the subsequent electronic message was authorized by the originator. - View Dependent Claims (39, 40, 41, 42, 43, 44, 55)
-
-
45. A method comprising:
-
receiving from a sending device a first electronic message authorized by an originator, said first electronic message containing first information identifying the originator, the first identifying information having been generated from at least a portion of the first electronic message; sending to a confirmation device a first confirmation request requesting confirmation that said first electronic message was authorized by the originator; searching a data store, independent of said first electronic message, for said first identification information; upon determining that said data store contains said first identification information responding to said first confirmation request, affirming the first electronic message was authorized by the originator; receiving a response to said first confirmation request affirming said first electronic message was authorized by the originator; allowing said first electronic message to be further processed according to rules for processing of confirmed electronic messages directed to the intended recipient; receiving from the sending device a second electronic message different from said first electronic message authorized by the originator, said second electronic message containing second information identifying the originator, the second identifying information having been generated from at least a portion of the second electronic message and distinguishing said second electronic message from other electronic messages authorized by the originator; sending to the confirmation device a second confirmation request requesting confirmation that said second electronic message was authorized by the originator; searching a data store, independent of said second electronic message, for said second identification information; upon determining that said data store contains said second identification information responding to said second confirmation request, affirming the second electronic message was authorized by the originator; receiving a response to said second confirmation request affirming said second electronic message was authorized by the originator; and allowing said second electronic message to be further processed according to rules for processing of confirmed electronic messages directed to the intended recipient. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 56)
-
Specification