[go: up one dir, main page]

WO2006051434A1 - A method and system for preventing reception of unwanted electronic messages, such as spam-mails - Google Patents

A method and system for preventing reception of unwanted electronic messages, such as spam-mails Download PDF

Info

Publication number
WO2006051434A1
WO2006051434A1 PCT/IB2005/053376 IB2005053376W WO2006051434A1 WO 2006051434 A1 WO2006051434 A1 WO 2006051434A1 IB 2005053376 W IB2005053376 W IB 2005053376W WO 2006051434 A1 WO2006051434 A1 WO 2006051434A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
mail
address
challenge
entity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/IB2005/053376
Other languages
French (fr)
Inventor
Frits Lyneborg
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to JP2007540754A priority Critical patent/JP2008520022A/en
Publication of WO2006051434A1 publication Critical patent/WO2006051434A1/en
Anticipated expiration legal-status Critical
Priority to NO20072706A priority patent/NO20072706L/en
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking

Definitions

  • the present invention relates generally to the field of electronic communication networks and methods for communication in these networks, more specifically to communication by e-mail in such networks and specifically to methods and corresponding systems for preventing reception of unwanted e-mails, commonly known as SPAM.
  • US 6,266,692 B1 discloses a method for blocking unwanted e-mail using a header-based password, according to which method all senders wanting to communicate with a recipient by e-mail must be pre- approved before they can actually send an e-mail to the recipient
  • each sender is assigned an individual pass code provided by the recipient, which passed must be entered in a specified field in the header of the e-mail each time an e-maii is sent to the recipient.
  • E-mails not provided with the pass code may be held in memory at the communication network provided until the recipient unsolicitunc reception of these,. Alternatively the network provider finally deletes them.
  • An e-mail initially provided with a wrong pass code is at any rate deleted.
  • the document describes in detail how it is estimated whether an incoming e-mail is to be regarded as unwanted, which estimation requires the calculation of the probability P that an incoming mail is sent from an undesired source. The calculated probability is subsequently compared with a threshold value, which thus in a sense determines the importance of avoiding reception of unwanted e-mails. No special pass codes or other identifiers are required by the sender in this method and system.
  • This document is referring to the member as a person, organisation, company, or other entity who is corresponding by e-mail with the user.
  • SPAM refers primarily - although not exclusively - to unsolicited e-mails sent to a user for instance to promote products or services or simply to cause user annoyance, etc. It furthermore refers to inappropriate or unwanted promotional or commercial postings to discussion groups, bulletin boards or newsletters that are causing unwanted e-mail received by the user. Thus for instance all unwanted e-mail originating from a mechanically based distribution fall within the definition of SPAM in the present context.
  • the present specification uses the term SPAM as a common denominator for all unwanted electronic communication messages, etc., the reception of which a user would want to be able to avoid in a manner basically controlled by the user himself.
  • SPAMMERS Spammers are referred to as anybody (or any means, organisation, etc.) who has knowledge of the user's e-mail-address or other access information needed to obtain access to the user's electronic communication means, and either passes this address on to others, or by themselves create SPAM towards the user.
  • spammming is referred to as providing a user with unwanted e-mail or other electronic messages either originating from the said person, means or organisations themselves or routed from somewhere else via the said person, means or organisation,
  • the system is a collection of technologies, collaborating in a circle, understood as a kind of barrier surrounding the user and protecting him against the reception of SPAM.
  • the necessary electronic system is widely based on existing technologies/elements, such as the necessary servers, databases, browsers, electronic data transmission means, etc., most of which have more functionality and are more complex than the system itself.
  • the above-mentioned circle is the means created when technologies are put to work together (co-operate) with certain settings, and controlled by certain custom-made computer code.
  • This circle is the concrete part of the system.
  • the functionality of the custom-made computer code and the settings of the technologies are to be seen as the "glue” that holds the circle in place.. Using other e-mai!ing technologies would require other lines of custom-designed code, but the circle can be transferred to environments not described here.
  • the user's experience of using a system that is set up in the circle is the RESULT of the system.
  • the circle may be regarded as a closed boundary surrounding the user of the system and thereby preventing the user from receiving unwanted electronic communication items such as e-mails etc.
  • MAIL ADDRESS MAIL CHANNEL
  • an object of the present invention to provide a method and corresponding system by means of which the reception of unsolicited e-mails or other electronic communication items, such as messages sent for instance, but not exclusively to promote products or services or simply to cause user annoyance can be avoided.
  • the inventive method and system furthermore avoids reception of inappropriate or unwanted promotional or commercial postings to discussion groups and bulletin boards or newsletters that are causing unwanted e-mail or other electronic messages received by the user. As a specific consequence, reception of all unwanted e-mail that could for instance originate from a mechanically-based distribution is avoided.
  • the above object is attained by a method employing a technology where each member is assigned a unique maii-address/access address
  • the unique mail-address according to the invention could thus for instance be of the form
  • Said address or "name" of the member channel could be chosen such that it will be easy to remember for the particular member.
  • the member himself defines his own address.
  • said address could be of the form [member name][number]@[name of service providerj.com, where member name could for instance be the first name of the member.
  • Such an individual mail address is referred to as "a channel” or "mail-channel”.
  • the channel is used as "to-address” (the recipient) when a member is contacting the system, and as “from-address” (the sender) when the user is writing from the system.
  • the member will not have knowledge of the system's many other addresses, but uses/requires only one mail-address, i.e. his own assigned member channel, for instance ([member-channel]@[user name], [domain]) or ([member-channel].[user name]@[domain] when writing to the user.
  • the above objects are furthermore attained by a system for preventing a user's reception of unwanted electronic communication items such as messages from an external entity, where the system comprises:
  • a challenge/response means such as a database or other electronic processing/storage means for sending a challenge such as a question to said external entity
  • the various means comprised by the system may be provided as a part of a centrally located server for instance at a service provider providing the services attained by the method and system according to the invention or alternatively at the user himself (for instance if the user is a larger company, organisation, etc.). It is, however, understood that various parts of the system may also be provided at different physical localities if this is regarded as advantageous.
  • An important consequence of using the method and system according to the invention is that when the user becomes aware of the reception of SPAM mails or other un-solicitated mail pieces or messages received at his e-mail address or other access address to his electronic communication system, it becomes possible for the user to determine exactly who originally was given the user's e- maii or other address and hence to detect at least a member through which the un-solicitated mail piece/message has passed,
  • Figure 1 shows a "Create new user" picture presented on the display screen of a new user of the method and system according to an embodiment of the invention during a "subscription session” carried out when a new user desires to subscribe to the services provided by the method and system according to the invention;
  • Figure 2 shows a Set-Up page comprising fields for user definition of questions and corresponding answers used in a challenge/response procedure according to the invention presented on the display screen of a new user of the method and system according to an embodiment of the invention during the "subscription session";
  • Figure 3 shows the Set-Up page of figure 2 further describing the challenge/response procedure according to the invention;
  • Figure 4 shows the Set-Up page of figure 2 further describing details of the challenge/response procedure according to the invention
  • Figure 5 shows the Set-Up page of figure 2 further describing details of the challenge/response procedure according to the invention
  • Figure 6 shows the Set-Up page of figure 2 further describing details of the challenge/response procedure according to the invention
  • Figure 7 shows review information provided to the user during the "subscription session" of the method and system according to the invention comprising the new e- mail address given to the user;
  • Figure 8 shows further review information provided to the user during the "subscription session"
  • Figure 9 shows the first page received by a new potential member (sender) the first time he sends an e-mail to a user of the method and system according to the invention including a direction to a web site upon which the challenge/response procedure of the invention is accessed;
  • Figure 10 shows the question presented to the potential new member during the challenge/response procedure according to the invention
  • Figure 1 1 shows the effect of providing a correct answer in the challenge/response procedure of figure 10, i.e. the clearing of the e-mail for delivery to the user of the method and system of the invention and the provision of a member-channel to the new member;
  • Figure 12 shows an opening page according to an alternative embodiment of the invention which will be provided to a member and comprising an alternative challenge/response procedure according to the invention
  • Figure 13 shows a schematic representation of the effect of the method and system according to the invention as experienced by a user with an e-mail address: you@mrspamstopper.com.
  • each member seeking access to the user via e-mail is assigned a unique mail-address (member-channel) to the user, rather than the user having one common mail-address that all senders are writing to ⁇ [user name]@[dornain]).
  • the unique mail-address according to the invention could thus for instance be of the form (notation): ([member- channel] ⁇ [user name]. [domain]) or [member-channe!].[user name]@[domain].
  • the specific form of the mail address is not in itself important, but rather that each member according to the invention is assigned a unique member channel to the user and that this member channel is specified in the e-mail address itself.
  • the following detailed description comprises a subscription session, where a new user wants to subscribe to/become a user of the services offered by the method and system according to the present invention, with the prime objective to prevent the reception of unwanted e-mails at the user.
  • the various steps performed by a potential new user during the subscription session are described with reference to figures 1 through 11.
  • the function of the method and system according to the invention as experienced by somebody (a potential new member) trying to communicate with a user subscribing to the method and system according to the invention for the first time will be described with reference to figures 12 through 15..
  • the experiences of a user subscribing to the method and system according to the invention will be described in detail with reference to figure 16.
  • Subscription session fa user wants to subscribe to the services provided by the method/system according to the invention, in summary termed "Mr.Spamstopper"
  • Access to Mr.Spamstopper can be attained for instance via an appropriate home page on the Internet (in this example on http://flue4.com) or via a corresponding e- mail connection.
  • the potential user of the service is on his display screen presented with the picture "Create new user" generally referred to by reference numeral 10 in figure 1 comprising three fields for required information: the user name, field 3, which is the e-mail address of the new user on which address Mr.Spamstopper can contact the user, and two fields 4, 5 containing a user-defined password.
  • the user may also indicate his full name in field 6 and a backup e-mail address, field 7. The contents of the above fields may be deleted with the clear icon 8. Subsequently pressing the continue icon 9, the user is presented with the Mr.Spamstopper set-up picture shown in figure 2.
  • a key feature is the provision by the user of a question (a question which is used in a so-called challenge/response procedure) which Mr Spamstopper will ask anybody, probably a person but possibly also another entity, for instance an automatic entity, a PC program or other computer- based device intentionally creating SPAM against the user, the first time this person or entity writes to the user via e-mail (cf.
  • the user in the present step of the subscription session has to provide Mr.Spamstopper with this question, which said person or other entity will later on have to answer the first time he addresses the user on the address defined in field 3 above.
  • the user himself can choose the wanted level of SPAM-protection as described further in figures 6, 7 and 8.
  • the user may thus choose different levels of spam-protection as required, by choosing between different types of questions and correct answers in the challenge/response procedure. Typical examples of such questions can be obtained by clicking on the field "see examples of questions", field 11.
  • a user may even maintain a completely open e-mail address and have other addresses protected by the method and system according to the invention.
  • a company may choose to keep its main e-mail address as shown on the company's home page open for free reception of e-mails, whereas the e-mail addresses of individual persons in the company could be protected against reception of unwanted e-mails by means of the method and system according to the invention, e.g. by becoming individual subscribers to "MrSpamstopper".
  • a sender of an e-mail to one of these individual users may after sending the e-mail receive an e-mail comprising the company's logo followed by the text: "Thank you for your e-mail to XXX/Company. For security reasons wee ask you to please fili out the empty field indicated below, before we can receive your e-mail:"
  • the protection level offered by the method and system according to the invention can be defined by the user. This is exemplified with reference to figures 3, 4, 5 and 6.
  • the display picture generally referred to by 19 contains review information comprising the user's new e-mail address (the address that will be protected against reception of unwanted e-mails by the method and system according to the invention). This address is indicated in field 20. Clicking on the Create icon 21 will thereafter effect the creation of the desired subscription to the services provided by the method and system according to the invention..
  • FIG 9 there is shown a response from the Mr. Spamstopper to somebody (a new e-maii sender) who for the first time attempts to send an e-mail to the user: MrX@flue4.com (the recipient).
  • the new e-mail sender sends an e-mail on the subject: "Re Test (flue4)" to the user (recipient): MrX@flue4.com.
  • the new e-mail sender receives the message shown in figure 9: "We have received a mail from you for MrX@flue4.com which must be verified before it can be delivered to the recipient".
  • the question (as originally defined by the user as described above): "What colour is the sky?" is presented in field 26 and the sender indicated an answer he believes to be the correct one in field 27: "Blue”, He then clicks on the icon 28 ("send the answer"). Provided the answer were correct, the screen picture 26 shown in figure 11 will then be received by the sender, in this case indicating that "the mail has been cleared", 69,
  • the method/system i.e.
  • McSpamstopper chooses the particular member-channel to be applied by the sender for subsequent correspondence with the user, Le.. "qopa.mrx@flue4.com”, as indicated by 70 in figure 11. At this stage of the procedure, the present e-mail is furthermore delivered by "MrSpamstopper" to the user (recipient).
  • the sender may, however, himself define the name of his member channel, which may be advantageous in order for the sender to be able to remember the name of his member channel.
  • the opening page As an alternative to the screen pictures shown in figures 9 to 11 , the opening page
  • the question in the challenge/response procedure relates to a picture 34 presented to the sender on the opening page, 71 , shown in figure 12, in this case depicting a brown horse.
  • the response of the sender is in the shown embodiment aided by the provision of a list 35 of alternatives accessible on the opening page, for instance "A brown horse, a black cow, a white dog, etc.”..
  • the button 36 is pressed and the procedure proceeds in principle as outlined under the description of the invention in figures 9 to 11 above.
  • the challenge/response procedure could furthermore alternatively rely on non- pictorial access information.
  • the display of a picture of a brown horse in figure 12 could be replaced by the emission of a chosen sound signal, which would be well known to an average human being, for instance a female singing a song, the corresponding question being what is this sound and the (possibly assisted) answer: "this is a female singing a song",.
  • Attach File field with browser 31 This provides an opportunity for the sender of the initial mail to attach a file or files to the posting in the user's forum.
  • Send a copy of the mail above to mv own mail- address Sends a copy of the mail to the mail address provided by the contacting part.
  • mr testerson@frits.flue4.com is created on the mail server as a new mail address.
  • Frits The mail address that you can use to write to Frits in the future is this: mr testerson(3?frits,flue4.com. This is your personal and confidential mail-address to write to Frits. Anybody else who wishes to contact Frits can do this through frits@frits.flue4.com. Thank you. End of Automatically generated by fiue4.com Spam Free Robot
  • Mr_Testerson is created as a new member of the forum that Frits logs on to, in order to read and write mail
  • FIG 13 there is shown a schematic representation of the effect of the method and system according to the invention as experienced by a user with an e- mail address: you@mrspamstopper.com.
  • the central region 59 schematically indicates a user
  • the circular region 58 surrounding 1 indicates the functions of the method and system according to the invention ("MrSpamstopper"), i.e. the "circle” as initially defined, this region comprising the necessary hardware and software for implementing the various functions of the method and system of the invention, symbolically represented by the box 38 in figure 13,
  • the external region 57 indicates "the rest of the world" comprising any sender wanting to communicate by e-mail with the user.
  • a sender sends an e-mail to the user you@mrspamstopper.com, whereupon he is presented with a challenge response 39 as described above. Provided the sender gives a correct answer, an individual mail channel is created at 41, thus effectively preventing the reception of unwanted mails from the sender.
  • To provide the user's address for instance to a newsletter, subscribing to some services, etc. or creating a profile on the Internet can be effected using a browser plug-in to insert the address (channel) on the page as indicated by reference numeral 43 upon which a channel is created at 44 after which a database on the Internet will have a channel through which they can write to the user, as long as the user accepts this.
  • the user may send an e-mail in the usual manner to an external receiver through the method and system of the invention. If the receiver already has a channel, 49, the receiver receives ordinary e-mai) from the user to receiver's address, with channel-address as sender of mail, 51. If the receiver does not already have a channel, a channel is created 50.
  • the receiver may forward your mail, 52 to someone else to respond (auto reply), after which someone else replies to your e-mail, 53.
  • auto reply On entering the service provided by the method and system of the invention, the channel is recognized, 54 and the mail is let through, 55 and the resulting incoming answer on mail from others 56 is experienced by the user just as always.
  • a receiver may however also give the channel away to spammers (the channel that the receiver knows being the only information the receiver can give away) or alternatively the receiver starts sending you mails that you do not want.
  • the channel is recognized, 61 by the method and system of the invention, but in this case you can actually see, 63, 64 who gave your address (the channel) to spammers, whereupon you can click on the Mr.Spamstopper icon for instance indicated by ref. no. 72 in figure 2 (ret no. 65 in fig., 13) with the effect that the channel and mail are deleted, 66.
  • the user of the MrSpamstopper service largely has the same experience of e-mail communication with the surrounding world as always but with the additional possibility to stop spam and other unwanted mail items and the possibility to detect from where such mail items came.
  • the "universal access” could also have the form of a code written for instance in the auxiliary data coming with a mail, which data are not seen by the user. This would mean that if the mail contained this coded information (for instance only 6 characters in the header of the e-mail), the mail would pass directly through without challenge response. This code could furthermore be changed centrally or according to set-ups chosen by the user. Thus for instance a postal authority of a country could offer spamfree e-mail, where only those having accounts could distribute commercials, by for instance selling such "universal keys” to providers of commercials. Furthermore the "universal keys" could be re-set after use..
  • a user could have more questions or more answers, for instance "what does your enquiry concern?" and the mail would not only receive a challenge response but would also be routed to the appropriate place in the company
  • a challenge/response means such as a database or other electronic processing/storage means for sending a challenge such as a question to said external entity
  • an electronic communication item such as an e-mail
  • an electronic communication item will be passed on the user's inbox upon acceptance of the response from the external entity, for instance a person sending an e-mail to the user, by said determining means,
  • inbox should be interpreted in a broad sense, other appropriate reception/display means may of course be present at the user.
  • Sending an e-mail to the blind-sender address ([user name]@[user name].[domain]) does not create notification to the user, but generates an automated response e- mail by the system to the contacting part.
  • the automated response e-mail received when writing to a blind-sender address holds information on how to get to the user's contact-page (http://[user name].[domain])
  • the automated response-e-mail itself is in HTML-format and contains the functionality of the user's contact-page (http://[user name]. [domain]), and thus minimising the hassle for the contacting part. Entering the user's contact-page (http://[user name], [domain]) leads to activation of the functionality of that page.
  • Example 2 Someone writes to a mail-address that is terminated / cut by the user
  • this e-mail address has functionality like the blind sender mail-address ⁇ [user name]@juser name].[domain] ⁇
  • Example 3
  • the user wants to expose or link to contact-information on web pages / business cards (how to contact me), etc.
  • the user can choose to expose or link to the "blind-sender address" [user name]@[user name].[domain]
  • the user wants to write a new mail to someone who is already a member / has a channel into the user's circle
  • the user logs on to the bulletin board.
  • the user creates a new topic in the bulletin board in the desired part of the forum (where the thread should start and continue)
  • the user chooses which member(s) of the forum is receiver(s) of the message.
  • the system sends an e-mail to the member's e-mail-address, with the post in the forum as e-mail content.
  • the user wants to write a mail to someone who is not a member / does not have a channel in the user's circle
  • the user logs on to the bulletin board.
  • the user creates a new topic in the bulletin board in the desired part of the forum (where the thread should start and continue).
  • the user enters e-mail address(es) of the receiver(s), and optionally provides further information for the channel / member that is to be created..
  • the system automatically creates a new member of the forum based on the user's input.
  • the user wants to give out a mail-address to a mechanical part such as a newsletter, or for membership purpose, etc.
  • the user logs on to the bulletin board, or uses other restricted ways to gain access to the functionality of the system..
  • the user enters at least a name for the channel, e.g. "newsletter”.
  • the user can add wore information to the channel, describing its purpose, notes, images, etc.
  • the system generates a new member in the bulletin board.
  • the name of the member is the name provided by the user.
  • the system creates a new mail address [entered name]@[user name].[domain].
  • the system provides the user with the mail-address to be given to the mechanical part.
  • Example 7 User and member write multiple mails with the same subject / in the same thread.
  • the system When the system receives a new e-mail, the subject-line is automatically analysed before the e-mail is automatically posted in the forum. The system looks at the last part of the subject-line and matches this to existing forum topics. In effect this means that if a post exists in the forum with the title "Our holyday.", and a new mail is received with the subject fine being "Re: Our holyday..”, the non-matching part is stripped and the mail entered as a new post in the topic "Our holyday.,”
  • a member (or a new generated mail-channel) that writes a new topic can be assigned by default to enter a category in the forum - Like "Private”, “Work”, “Family”, etc..
  • Example 8 The user receives unwanted e-mail / spam.
  • each post in the forum is next to member-information of the posting part, in addition to this, the system has an extra button to delete unwanted e-mail, and delete the channel..
  • the result is that next to every received mail is the possibility of terminating the channel.
  • the user can no longer be contacted through this e-maii address, thus effectively ending the spammer's activity towards this user.
  • the user can see who originally created the troubled e-mail address, or to whom it was originally given, as this is incorporated in the channel.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Quality & Reliability (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Operations Research (AREA)
  • Data Mining & Analysis (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a method and system for preventing reception of unwanted electronic messages such as e-mails sent from an external entity, for instance a person to a user, according to which method each of said entities is initially given a unique address or member channel to the user for communication with the user. This unique address is only given to the external entity after a successful response given by the external entity during an initial challenge/response procedure. The unique address forms a part of the mail address itself, thus obviating the need of a specific password being given each time the external entity wants to communicate with the user. The user himself will experience the method and system according to the invention as extremely transparent, thus giving the user a normal mail reception experience and still providing the user with a very high degree of protection against reception of unwanted electronic messages.

Description

A METHOD AND SYSTEM FOR PREVENTING RECEPTION OF UNWANTED ELECTRONIC MESSAGES. SUCH AS SPAM-MAILS
TECHNICAL FIELD
The present invention relates generally to the field of electronic communication networks and methods for communication in these networks, more specifically to communication by e-mail in such networks and specifically to methods and corresponding systems for preventing reception of unwanted e-mails, commonly known as SPAM.
BACKGROUND OF THE INVENTION
A number of methods and systems for preventing the reception of unwanted e-mai!s (SPAM) are known in the art. Thus US 6,266,692 B1 discloses a method for blocking unwanted e-mail using a header-based password, according to which method all senders wanting to communicate with a recipient by e-mail must be pre- approved before they can actually send an e-mail to the recipient Thus each sender is assigned an individual pass code provided by the recipient, which passed must be entered in a specified field in the header of the e-mail each time an e-maii is sent to the recipient. E-mails not provided with the pass code may be held in memory at the communication network provided until the recipient unsolicitunc reception of these,. Alternatively the network provider finally deletes them. An e-mail initially provided with a wrong pass code is at any rate deleted.
An alternative method and system is described in US 2004/0181462 Al relating to an electronic communication service which can prevent reception of SPAM and furthermore compile and update a SPAM database for screening SPAM. The system comprises a filtration step, which is invoked before an electronic message is sent from the service to a recipient, whereby unsolicited e-mails are removed. This removal is accomplished by comparing an incoming e-mail with a database of known unwanted e-mails and senders, and in case of a positive comparison result, portions of the e-mail are added to the database and marked as unwanted. The document describes in detail how it is estimated whether an incoming e-mail is to be regarded as unwanted, which estimation requires the calculation of the probability P that an incoming mail is sent from an undesired source. The calculated probability is subsequently compared with a threshold value, which thus in a sense determines the importance of avoiding reception of unwanted e-mails. No special pass codes or other identifiers are required by the sender in this method and system.
SUMMARY OF THE INVENTION
DEFINITIONS
In the following a number of terms used in the present specification are defined.
USER/MEMBER
This document is referring to the user as the person, organisation, company, etc. or any other entity who is using the communication method or system according to the invention to communicate by e-mail with one or more external entities (persons, organisations, etc.). In order to utilise the method and system of the invention, the user must in practice subscribe to the services offered by the method and system, the necessary hardware and/or software of the system being for instance present at a network provider or other organisation or company or alternatively at the user himself as it will be described in more detail in subsequent paragraphs.
This document is referring to the member as a person, organisation, company, or other entity who is corresponding by e-mail with the user.
SPAM
Throughout the present specification the word SPAM refers primarily - although not exclusively - to unsolicited e-mails sent to a user for instance to promote products or services or simply to cause user annoyance, etc. It furthermore refers to inappropriate or unwanted promotional or commercial postings to discussion groups, bulletin boards or newsletters that are causing unwanted e-mail received by the user. Thus for instance all unwanted e-mail originating from a mechanically based distribution fall within the definition of SPAM in the present context.
In a more general sense, the present specification uses the term SPAM as a common denominator for all unwanted electronic communication messages, etc., the reception of which a user would want to be able to avoid in a manner basically controlled by the user himself.
SPAMMERS Spammers are referred to as anybody (or any means, organisation, etc.) who has knowledge of the user's e-mail-address or other access information needed to obtain access to the user's electronic communication means, and either passes this address on to others, or by themselves create SPAM towards the user. Similarly "spamming" is referred to as providing a user with unwanted e-mail or other electronic messages either originating from the said person, means or organisations themselves or routed from somewhere else via the said person, means or organisation,
SYSTEM
The system is a collection of technologies, collaborating in a circle, understood as a kind of barrier surrounding the user and protecting him against the reception of SPAM.
The necessary electronic system is widely based on existing technologies/elements, such as the necessary servers, databases, browsers, electronic data transmission means, etc., most of which have more functionality and are more complex than the system itself.
CIRCLE
The above-mentioned circle is the means created when technologies are put to work together (co-operate) with certain settings, and controlled by certain custom-made computer code. This circle is the concrete part of the system. The functionality of the custom-made computer code and the settings of the technologies are to be seen as the "glue" that holds the circle in place.. Using other e-mai!ing technologies would require other lines of custom-designed code, but the circle can be transferred to environments not described here.
The user's experience of using a system that is set up in the circle is the RESULT of the system.
Conceptually the circle may be regarded as a closed boundary surrounding the user of the system and thereby preventing the user from receiving unwanted electronic communication items such as e-mails etc.
MAIL-CHANNELS
What is widely known as a MAIL ADDRESS or MAIL CHANNEL can be described by the notation [user name]@[domain].
DISCLOSURE OF THE INVENTION
On the background set forth initially, it is an object of the present invention to provide a method and corresponding system by means of which the reception of unsolicited e-mails or other electronic communication items, such as messages sent for instance, but not exclusively to promote products or services or simply to cause user annoyance can be avoided. The inventive method and system furthermore avoids reception of inappropriate or unwanted promotional or commercial postings to discussion groups and bulletin boards or newsletters that are causing unwanted e-mail or other electronic messages received by the user. As a specific consequence, reception of all unwanted e-mail that could for instance originate from a mechanically-based distribution is avoided.
It is a further object of the present invention to provide a method and system that puts the user in control of the rejection of unwanted e-mads or other electronic messages without the user experiencing the presence of the system during normal reception of said e-mails or messages, i.e. during normal use the method and system is experienced as "transparent" by the user.
According to the invention, the above object is attained by a method employing a technology where each member is assigned a unique maii-address/access address
(a so-called member-channel) to the user rather than the user having one common mail-address that all senders are writing to ([user name]@[dαmain]). The unique mail-address according to the invention could thus for instance be of the form
(notation): ([member-channel]@[user name]. [domain]) or [member-channel]. [user name]@[domain]. The specific form of the mail address is not in itself important but rather that each member according to the invention is assigned a unique member channel to the user and that this member channel is specified in the address itself.
Said address or "name" of the member channel could be chosen such that it will be easy to remember for the particular member. Thus according to a specific embodiment of the invention, the member himself defines his own address.
For instance said address could be of the form [member name][number]@[name of service providerj.com, where member name could for instance be the first name of the member.
Such an individual mail address is referred to as "a channel" or "mail-channel".
The channel is used as "to-address" (the recipient) when a member is contacting the system, and as "from-address" (the sender) when the user is writing from the system.
The user will thus not have to consider which channel to use, only whom to write to.
The member will not have knowledge of the system's many other addresses, but uses/requires only one mail-address, i.e. his own assigned member channel, for instance ([member-channel]@[user name], [domain]) or ([member-channel].[user name]@[domain] when writing to the user. The above objects are furthermore attained by a system for preventing a user's reception of unwanted electronic communication items such as messages from an external entity, where the system comprises:
(a) a server or other electronic processing/storage means for receiving incoming electronic communication items from said external entity;
(b) an inbox for receiving said user's received electronic communication items;
(c) a challenge/response means such as a database or other electronic processing/storage means for sending a challenge such as a question to said external entity;
(d) a means for receiving a response to said challenge from said external entity;
(e) determining means for determining whether an acceptable response has been received during said challenge/response procedure; whereby said electronic communication item will be passed on to said inbox upon acceptance of said response by said determining means.
The various means comprised by the system may be provided as a part of a centrally located server for instance at a service provider providing the services attained by the method and system according to the invention or alternatively at the user himself (for instance if the user is a larger company, organisation, etc.). It is, however, understood that various parts of the system may also be provided at different physical localities if this is regarded as advantageous.
THE PURPOSE AND ADVANTAGES OF THE CIRCLE:
A number of important advantages are attained by the use of the method and system according to the invention:
• To let the user correspond seamlessly by e-mail with existing e-mail and web- technologies.
• To let the user use and automatically assign individual mail-addresses for each member, without the user having to do anything but communicate by e-mail. • To give the user a thread-based mail handling, thus providing overview of dialogs.
• An important consequence of using the method and system according to the invention is that when the user becomes aware of the reception of SPAM mails or other un-solicitated mail pieces or messages received at his e-mail address or other access address to his electronic communication system, it becomes possible for the user to determine exactly who originally was given the user's e- maii or other address and hence to detect at least a member through which the un-solicitated mail piece/message has passed,
• In the case of SPAM, to let the user effectively stop the spamming part from spamming the affected address again.
• To let the user freely display contact information/the user's e-mail-address on web pages, and on printed media, without this opening the possibility of mechanical misuse of this contact-information.
BRIEF DESCRIPTION OF THE DRAWINGS
The method and system according to the invention together with the various effects and advantages attained hereby will be more fully understood with reference to the following detailed description in conjunction with the attached drawing, where
Figure 1 shows a "Create new user" picture presented on the display screen of a new user of the method and system according to an embodiment of the invention during a "subscription session" carried out when a new user desires to subscribe to the services provided by the method and system according to the invention;
Figure 2 shows a Set-Up page comprising fields for user definition of questions and corresponding answers used in a challenge/response procedure according to the invention presented on the display screen of a new user of the method and system according to an embodiment of the invention during the "subscription session"; Figure 3 shows the Set-Up page of figure 2 further describing the challenge/response procedure according to the invention;
Figure 4 shows the Set-Up page of figure 2 further describing details of the challenge/response procedure according to the invention;
Figure 5 shows the Set-Up page of figure 2 further describing details of the challenge/response procedure according to the invention;
Figure 6 shows the Set-Up page of figure 2 further describing details of the challenge/response procedure according to the invention;
Figure 7 shows review information provided to the user during the "subscription session" of the method and system according to the invention comprising the new e- mail address given to the user;
Figure 8 shows further review information provided to the user during the "subscription session";
Figure 9 shows the first page received by a new potential member (sender) the first time he sends an e-mail to a user of the method and system according to the invention including a direction to a web site upon which the challenge/response procedure of the invention is accessed;
Figure 10 shows the question presented to the potential new member during the challenge/response procedure according to the invention;
Figure 1 1 shows the effect of providing a correct answer in the challenge/response procedure of figure 10, i.e. the clearing of the e-mail for delivery to the user of the method and system of the invention and the provision of a member-channel to the new member;
Figure 12 shows an opening page according to an alternative embodiment of the invention which will be provided to a member and comprising an alternative challenge/response procedure according to the invention; and Figure 13 shows a schematic representation of the effect of the method and system according to the invention as experienced by a user with an e-mail address: you@mrspamstopper.com.
DETAILED DESCRIPTION QF THE INVENTION
In the following, a detailed description of various embodiments of the method and system according to the invention is given but it is understood that other embodiments of the basic inventive idea as outlined in the disclosure of the invention will also be possible without deviating from the scope of the invention as defined by the appended claims.
As described above according to the basic inventive concept, each member seeking access to the user via e-mail is assigned a unique mail-address (member-channel) to the user, rather than the user having one common mail-address that all senders are writing to {[user name]@[dornain]). The unique mail-address according to the invention could thus for instance be of the form (notation): ([member- channel] ©[user name]. [domain]) or [member-channe!].[user name]@[domain]. The specific form of the mail address is not in itself important, but rather that each member according to the invention is assigned a unique member channel to the user and that this member channel is specified in the e-mail address itself.
The following detailed description comprises a subscription session, where a new user wants to subscribe to/become a user of the services offered by the method and system according to the present invention, with the prime objective to prevent the reception of unwanted e-mails at the user. The various steps performed by a potential new user during the subscription session are described with reference to figures 1 through 11. After the description of the subscription session, the function of the method and system according to the invention as experienced by somebody (a potential new member) trying to communicate with a user subscribing to the method and system according to the invention for the first time will be described with reference to figures 12 through 15.. The experiences of a user subscribing to the method and system according to the invention will be described in detail with reference to figure 16. Finaily, the system according to the invention will be described in fairly general terms with reference to figures 17 and 18. Throughout the following detailed description, the specific embodiments described herein will be referred to collectively as "Mr.Spamstopper". The functionalities provided by the method and system according to the invention can in practice be implemented using many different hard- and software implementations, which would all fall within the scope of the invention as defined by the appended claims.
1. Subscription session fa user wants to subscribe to the services provided by the method/system according to the invention, in summary termed "Mr.Spamstopper"
In the following, it is understood that the various graphical information presented is only to be regarded as examples of the lay-out of such information, and that these presentations may vary according to the specific implementation of the method and system according to the invention
Access to Mr.Spamstopper can be attained for instance via an appropriate home page on the Internet (in this example on http://flue4.com) or via a corresponding e- mail connection. On opening this home page or establishing this connection, the potential user of the service is on his display screen presented with the picture "Create new user" generally referred to by reference numeral 10 in figure 1 comprising three fields for required information: the user name, field 3, which is the e-mail address of the new user on which address Mr.Spamstopper can contact the user, and two fields 4, 5 containing a user-defined password. Optionally the user may also indicate his full name in field 6 and a backup e-mail address, field 7. The contents of the above fields may be deleted with the clear icon 8. Subsequently pressing the continue icon 9, the user is presented with the Mr.Spamstopper set-up picture shown in figure 2.
With reference to figure 2, the user is hereafter presented with a short description of the function of Mr.Spamstopper, A key feature is the provision by the user of a question (a question which is used in a so-called challenge/response procedure) which Mr Spamstopper will ask anybody, probably a person but possibly also another entity, for instance an automatic entity, a PC program or other computer- based device intentionally creating SPAM against the user, the first time this person or entity writes to the user via e-mail (cf. the following description of a communication via e-mail with a user subscribing to Mr.Spamstopper.) The user in the present step of the subscription session has to provide Mr.Spamstopper with this question, which said person or other entity will later on have to answer the first time he addresses the user on the address defined in field 3 above. By providing the question and the corresponding correct answer, the user himself can choose the wanted level of SPAM-protection as described further in figures 6, 7 and 8. According to the method and system according to the invention, the user may thus choose different levels of spam-protection as required, by choosing between different types of questions and correct answers in the challenge/response procedure. Typical examples of such questions can be obtained by clicking on the field "see examples of questions", field 11. A user may even maintain a completely open e-mail address and have other addresses protected by the method and system according to the invention.
As an example, a company may choose to keep its main e-mail address as shown on the company's home page open for free reception of e-mails, whereas the e-mail addresses of individual persons in the company could be protected against reception of unwanted e-mails by means of the method and system according to the invention, e.g. by becoming individual subscribers to "MrSpamstopper".
According to a specific scenario, a sender of an e-mail to one of these individual users may after sending the e-mail receive an e-mail comprising the company's logo followed by the text: "Thank you for your e-mail to XXX/Company. For security reasons wee ask you to please fili out the empty field indicated below, before we can receive your e-mail:"
Please write the name of our company in the empty field [ ].
Subsequently the indicated user "XXX" will receive the above e-mail and the sender would for instance receive an e-mail comprising:
"XXX has now received your e-mail. A response can normally be expected within 1 to 3 working days from the reception. You may also contact us per telephone on 12 34 56 78. In the future you may contact XXX directly on the following mail address: rstef.XXX@company,com. Yours sincerely XXX/cornpany"
Reverting to figure 2, said user-defined question is entered in field 12 and the corresponding correct answer, as defined by the user, is entered in field 12.
As mentioned above, the protection level offered by the method and system according to the invention can be defined by the user. This is exemplified with reference to figures 3, 4, 5 and 6.
Thus clicking on the protection level #1 (Stop spammers, but let everybody else through), the examples shown in figure 4, reference numeral 16, will be displayed on the screen. A question could thus read: "What is the third word in this sentence?" and the corresponding correct answer would be: "the" Another question could be: "What colour is the sky" and the corresponding correct answer would be: "blue".
Similarly clicking on protection level #2 (Let only those who know you write you), the examples of questions/answers shown in figure 5 would be shown on the display screen, i.e. "What is my brothers name?" and "John", and "What colour is my house?" and "Red", respectively.
Finally as shown in figure 6 clicking on protection level #3 (Let only those invited write you), the examples of questions/answers shown in figure 6 would be shown on the display screen, i.e. "What is the secret code?" and "Monkeybusiness", and "Tell me the password" and "Strawberry", respectively.
After the definition of the question and correct answer as described above, the user clicks on the continue icon 14 and the display shown in figure 7 appears.
As shown in figure 7, the display picture generally referred to by 19 contains review information comprising the user's new e-mail address (the address that will be protected against reception of unwanted e-mails by the method and system according to the invention). This address is indicated in field 20. Clicking on the Create icon 21 will thereafter effect the creation of the desired subscription to the services provided by the method and system according to the invention..
Finally, some additional information about the effect/use of the inventive method and system is provided to the user as shown in figure 8,
2. The function of the method and system ("Mr-Sparostopper") as experienced by somebody (a person or other entity) the first time he attempts to send an e-mail to the user who subscribes to "Mr.Spamstopper"
With reference to figure 9 there is shown a response from the Mr. Spamstopper to somebody (a new e-maii sender) who for the first time attempts to send an e-mail to the user: MrX@flue4.com (the recipient). In figure 9 the new e-mail sender sends an e-mail on the subject: "Re Test (flue4)" to the user (recipient): MrX@flue4.com.. As a result the new e-mail sender receives the message shown in figure 9: "We have received a mail from you for MrX@flue4.com which must be verified before it can be delivered to the recipient". As shown the new e-mail sender is directed to the web site: Mhttp://www.flue4.com/cha!lenge/?id=262, reference numeral 24 and calling this web site the sender subsequently receives the picture 25 shown in figure 10. The question (as originally defined by the user as described above): "What colour is the sky?" is presented in field 26 and the sender indicated an answer he believes to be the correct one in field 27: "Blue", He then clicks on the icon 28 ("send the answer"). Provided the answer were correct, the screen picture 26 shown in figure 11 will then be received by the sender, in this case indicating that "the mail has been cleared", 69, According to this embodiment of the method and system of the invention, the method/system (i.e. "MrSpamstopper") chooses the particular member-channel to be applied by the sender for subsequent correspondence with the user, Le.. "qopa.mrx@flue4.com", as indicated by 70 in figure 11. At this stage of the procedure, the present e-mail is furthermore delivered by "MrSpamstopper" to the user (recipient).
According to an alternative embodiment of the method and system according to the invention, the sender may, however, himself define the name of his member channel, which may be advantageous in order for the sender to be able to remember the name of his member channel. As an alternative to the screen pictures shown in figures 9 to 11 , the opening page
71 shown in figure 12 could according to the present invention be implemented. In many respects the same information is passed between the sender and "MrSpamstαpper" using the interface means shown in figure 12 as in the procedure carried out as described above in relation to figures 9 to 1 1. However, an alternative challenge/response procedure according to the invention is exemplified with reference to figure 12. It is understood, however, that this - or any other relevant challenge/response procedure for that matter - could equally well have been implemented using the procedure described in figures 9 to 11..
As shown in figure 12 the question in the challenge/response procedure according to this embodiment of the invention relates to a picture 34 presented to the sender on the opening page, 71 , shown in figure 12, in this case depicting a brown horse. The response of the sender is in the shown embodiment aided by the provision of a list 35 of alternatives accessible on the opening page, for instance "A brown horse, a black cow, a white dog, etc.".. After choosing what the sender believes to be the correct answer, the button 36 is pressed and the procedure proceeds in principle as outlined under the description of the invention in figures 9 to 11 above.
The challenge/response procedure could furthermore alternatively rely on non- pictorial access information. Thus for instance the display of a picture of a brown horse in figure 12 could be replaced by the emission of a chosen sound signal, which would be well known to an average human being, for instance a female singing a song, the corresponding question being what is this sound and the (possibly assisted) answer: "this is a female singing a song",.
The other items on the contact page shown in figure 12 apart from the challenge/response related item and the effect of their use are described in the following:
Official welcome text:
An area where the service-provider of the system can write standard instructions, "What is this?", etc. Personal welcome text:
This is an area where the end-user can insert personal information like "Hi and welcome, you write me by filling out below.." Perhaps also comprising a company logo, link to homepage and personal image.
Subject field, 29
This will create the subject-field (topic) in the e-mail that will be sent to the user's forum,
Message field, 30
This will create the message-field in the e-mail that will be sent as a post in the user's forum.
Attach File field with browser, 31 This provides an opportunity for the sender of the initial mail to attach a file or files to the posting in the user's forum.
Your Name field. 32
Mandatory field: The name or avatar-name of the sender
Your Mail-address field 33
Mandatory field: The senders mail address.
Send a copy of the mail above to mv own mail- address: Sends a copy of the mail to the mail address provided by the contacting part.
In the present example, when pressing "OK - Send mail to Frits" the following happens:
mr testerson@frits.flue4.com is created on the mail server as a new mail address.
Because Mr Testerson marked "Send copy to me..." a mail with the filled out content is sent to testerson@democompanv.com. The from-address of this is mr testerson(a>frits.flue4.com - and Mr Testerson can reply to this and get in touch with Frits (the user).
This initial contact is the only time Mr Testerson has to contact Frits through frits.flue4,com (unless Frits chooses to terminate / cut the created channel, in which case Mr Testerson would be directed to engage the page again, and enter e new name for this new channel).
Perhaps in the top of this initial mail the following is added:
Automatically generated by flue4.com Spam Free Robot
Dear Mr Testerson. You have written to Frits who is using flue4,.com patented
Spam-free mail-system.
Below is a copy of the mail you sent to Frits.
The mail address that you can use to write to Frits in the future is this: mr testerson(3?frits,flue4.com. This is your personal and confidential mail-address to write to Frits. Anybody else who wishes to contact Frits can do this through frits@frits.flue4.com. Thank you. End of Automatically generated by fiue4.com Spam Free Robot
Mr_Testerson is created as a new member of the forum that Frits logs on to, in order to read and write mail
3. The functions of the method and system according to the invention ("Mr.Spamstopper") as experienced by a user
Referring to figure 13 there is shown a schematic representation of the effect of the method and system according to the invention as experienced by a user with an e- mail address: you@mrspamstopper.com. In the figure, the central region 59 schematically indicates a user, the circular region 58 surrounding 1 indicates the functions of the method and system according to the invention ("MrSpamstopper"), i.e. the "circle" as initially defined, this region comprising the necessary hardware and software for implementing the various functions of the method and system of the invention, symbolically represented by the box 38 in figure 13, The external region 57 indicates "the rest of the world" comprising any sender wanting to communicate by e-mail with the user. Referring to reference number 37, a sender sends an e-mail to the user you@mrspamstopper.com, whereupon he is presented with a challenge response 39 as described above. Provided the sender gives a correct answer, an individual mail channel is created at 41, thus effectively preventing the reception of unwanted mails from the sender.
To provide the user's address for instance to a newsletter, subscribing to some services, etc. or creating a profile on the Internet can be effected using a browser plug-in to insert the address (channel) on the page as indicated by reference numeral 43 upon which a channel is created at 44 after which a database on the Internet will have a channel through which they can write to the user, as long as the user accepts this.
Referring to reference numeral 48, the user may send an e-mail in the usual manner to an external receiver through the method and system of the invention. If the receiver already has a channel, 49, the receiver receives ordinary e-mai) from the user to receiver's address, with channel-address as sender of mail, 51. If the receiver does not already have a channel, a channel is created 50.
The receiver may forward your mail, 52 to someone else to respond (auto reply), after which someone else replies to your e-mail, 53. On entering the service provided by the method and system of the invention, the channel is recognized, 54 and the mail is let through, 55 and the resulting incoming answer on mail from others 56 is experienced by the user just as always.
As indicated by reference numeral 60, a receiver may however also give the channel away to spammers (the channel that the receiver knows being the only information the receiver can give away) or alternatively the receiver starts sending you mails that you do not want. Also in this case the channel is recognized, 61 by the method and system of the invention, but in this case you can actually see, 63, 64 who gave your address (the channel) to spammers, whereupon you can click on the Mr.Spamstopper icon for instance indicated by ref. no. 72 in figure 2 (ret no. 65 in fig., 13) with the effect that the channel and mail are deleted, 66. After this, nobody can use this address again, 67 as it no longer exists, and consequently nobody can provide you with spam mails, and newsletters are unsubscribed, etc. If someone tries to write to the deleted channel, 68 he is again presented with the challenge/response procedure of the invention and on providing a correct answer a new channel is created and he may send e-mails to you again as described above..
In summary, the user of the MrSpamstopper service largely has the same experience of e-mail communication with the surrounding world as always but with the additional possibility to stop spam and other unwanted mail items and the possibility to detect from where such mail items came.
Finally, an extended embodiment of the method and system according to the invention is mentioned, according to which embodiment a user or larger system (such as a company or an institution) could open more gates to the surrounding world through the method and system of the invention ("MrSpamstopper"). Consider the following scenario: A company wishes to offer spamprotected e-mail to its employees, but also wishes to allow the unimpeded reception of unsolicited mail through a "back entrance" for a certa'm period of time. The user can thus himself define his question to be used in a challenge/response procedure according to the invention, but a "universal access key" could also be provided, giving access to everybody. This key could be controlled and changed centrally as often as required, without this altering anything but the "keyhole".
The "universal access" could also have the form of a code written for instance in the auxiliary data coming with a mail, which data are not seen by the user. This would mean that if the mail contained this coded information (for instance only 6 characters in the header of the e-mail), the mail would pass directly through without challenge response. This code could furthermore be changed centrally or according to set-ups chosen by the user. Thus for instance a postal authority of a country could offer spamfree e-mail, where only those having accounts could distribute commercials, by for instance selling such "universal keys" to providers of commercials. Furthermore the "universal keys" could be re-set after use..
Furthermore, according to still another embodiment of the method and system according to the invention, a user could have more questions or more answers, for instance "what does your enquiry concern?" and the mail would not only receive a challenge response but would also be routed to the appropriate place in the company
Basically a system for preventing a user's reception of unwanted electronic communication items such as messages from an external entity can be implemented using the following technical features/functional biocks, but it is understood that various of these features/blocks may be implemented by other means and still be within the scope of the invention as defined by the appended claims:
(a) a server or other electronic processing/storage means for receiving incoming electronic communication items from said external entity;
(b) an inbox for receiving said user's received electronic communication items;
(c) a challenge/response means such as a database or other electronic processing/storage means for sending a challenge such as a question to said external entity;
(d) a means for receiving a response to said challenge from said external entity;
(e) determining means for determining whether an acceptable response has been received during said challenge/response procedure.
By application of this system an electronic communication item, such as an e-mail, will be passed on the user's inbox upon acceptance of the response from the external entity, for instance a person sending an e-mail to the user, by said determining means,
It is noted that the term "inbox" should be interpreted in a broad sense, other appropriate reception/display means may of course be present at the user.
Some further examples of the use and/or consequences of using the method and system of the invention
Example 1:
Someone wants to send a mail to the user, and is only having the blind-sender address, or the sub-domain as contact-information
Sending an e-mail to the blind-sender address ([user name]@[user name].[domain]) does not create notification to the user, but generates an automated response e- mail by the system to the contacting part. The automated response e-mail received when writing to a blind-sender address holds information on how to get to the user's contact-page (http://[user name].[domain])
Alternatively, the automated response-e-mail itself is in HTML-format and contains the functionality of the user's contact-page (http://[user name]. [domain]), and thus minimising the hassle for the contacting part. Entering the user's contact-page (http://[user name], [domain]) leads to activation of the functionality of that page.
Example 2: Someone writes to a mail-address that is terminated / cut by the user
When a channel is terminated / cut by the user, this e-mail address has functionality like the blind sender mail-address {[user name]@juser name].[domain]} Example 3:
The user wants to expose or link to contact-information on web pages / business cards (how to contact me), etc. The user can choose to expose or link to the "blind-sender address" [user name]@[user name].[domain]
The user can choose to expose or link to the http:// -address [user name],[domain] Example 4:
The user wants to write a new mail to someone who is already a member / has a channel into the user's circle The user logs on to the bulletin board.
The user creates a new topic in the bulletin board in the desired part of the forum (where the thread should start and continue) When writing a new topic in the forum, the user chooses which member(s) of the forum is receiver(s) of the message.
The system sends an e-mail to the member's e-mail-address, with the post in the forum as e-mail content.
Example 5:
The user wants to write a mail to someone who is not a member / does not have a channel in the user's circle
The user logs on to the bulletin board. The user creates a new topic in the bulletin board in the desired part of the forum (where the thread should start and continue). Alternatively to entering member(s) of the forum as the receiver(s), the user enters e-mail address(es) of the receiver(s), and optionally provides further information for the channel / member that is to be created..
The system automatically creates a new member of the forum based on the user's input.
The system sends an e-mail to the new member's e-maii-address, with the post in the forum as e-mail content.. Example 6:
The user wants to give out a mail-address to a mechanical part such as a newsletter, or for membership purpose, etc. The user logs on to the bulletin board, or uses other restricted ways to gain access to the functionality of the system..
The user enters at least a name for the channel, e.g. "newsletter". The user can add wore information to the channel, describing its purpose, notes, images, etc.
Based on the user's input:
The system generates a new member in the bulletin board. The name of the member is the name provided by the user.
Further details provided by the user describe the member further. The system creates a new mail address [entered name]@[user name].[domain]. The system provides the user with the mail-address to be given to the mechanical part.
Example 7: User and member write multiple mails with the same subject / in the same thread.
When the system receives a new e-mail, the subject-line is automatically analysed before the e-mail is automatically posted in the forum. The system looks at the last part of the subject-line and matches this to existing forum topics. In effect this means that if a post exists in the forum with the title "Our holyday....", and a new mail is received with the subject fine being "Re: Our holyday..", the non-matching part is stripped and the mail entered as a new post in the topic "Our holyday.,"
The result for the user is that every topic is threaded in the forum. Other such "stripping" technologies can be put in use in order to provide the user with a well functioning forum-experience.
A member (or a new generated mail-channel) that writes a new topic can be assigned by default to enter a category in the forum - Like "Private", "Work", "Family", etc..
Example 8: The user receives unwanted e-mail / spam.
In the given example of using a system similar to phpBB, each post in the forum is next to member-information of the posting part, in addition to this, the system has an extra button to delete unwanted e-mail, and delete the channel.. The result is that next to every received mail is the possibility of terminating the channel.
Clicking this button "blinds" the mail-address that the sending part was using, deletes the member in the forum, and deletes the unwanted post/e-mail
The user can no longer be contacted through this e-maii address, thus effectively ending the spammer's activity towards this user.
The user can see who originally created the troubled e-mail address, or to whom it was originally given, as this is incorporated in the channel.
Example 9:
A mechanical attempt is done to "hack" way into the user's circle. On the user's contact-page, multiple wrong guessing within a shorter period of time (often referred to as "brute force attack") from one source (IP-address) leads to an automated mechanical blocking of the part engaging,.

Claims

1. A method for preventing reception of unwanted electronic communication items such as messages from an external entity, such as a person or a machine at a user, according to which each of said entities is initially given a unique address or member channel to the user for communication with the user
2. A method according to claim 1 , where said items are e-mails.
3. A method according to claim 2, where said address is an e-mail address.
3. A method according to claim 1, where said unique mail address or member channel to the user is specified in the e-mail address itself.
4. A method according to claim 3, where said unique mail address or member channel is of the form [member-channel]@[user name]. [domain] or [member- channelj.[user name]@[domain] or [member-channel]@[user address].
5. A method according to any of the preceding claims 2 to 4, where said unique mail address or member channel is only assigned to said external entity after a satisfactory reply by said external entity to a requirement defined by the user.
6. A method according to claim 5, where said user-defined requirement is a challenge/response procedure.
1. A method according to any of the preceding claims, where said unique address is defined by the user.
8. A method according to any of the preceding claims 1 to 6, where said unique address is defined by said external entity.
9. A method according to claim 5 or 6, where said user-defined requirement or challenge response comprises several user-defined protection levels for protection against reception of said unwanted electronic communication items.
10. A method according to claim 6 or 9, where said challenge/response procedure consists of a question presented to said external entity the first time this entity attempts to send said electronic communication item to the user.
11. A method according to claim 6 or 9, where said challenge/response procedure comprises a picture or other graphical information presented to said entity the first time this entity attempts to contact the user by e-mail.
12. A method according to claim 6 or 9, where said challenge/response procedure comprises an audio signal presented to said entity the first time this entity attempts to contact the user by e-mail.,
13. A method according to claim 6 or 9, where said challenge/response procedure comprises a code presented to said entity the first time this entity attempts to contact the user by e-mail,
14. A system for preventing a users reception of unwanted electronic communication items such as messages from an external entity, the system comprising: (f) a server or other electronic processing/storage means for receiving incoming electronic communication items from said external entity; (g) an inbox for receiving said users received electronic communication items; (h) a challenge/response means such as a database or other electronic processing/storage means for sending a challenge such as a question to said external entity;
(i) a means for receiving a response to said challenge from said external entity; (j) determining means for determining whether an acceptable response has been received during said challenge/response procedure; whereby said electronic communication item will be passed on to said inbox upon acceptance of said response by said determining means.
PCT/IB2005/053376 2004-11-15 2005-10-14 A method and system for preventing reception of unwanted electronic messages, such as spam-mails Ceased WO2006051434A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2007540754A JP2008520022A (en) 2004-11-15 2005-10-14 Method and system for preventing the reception of unwanted electronic messages such as spam mail
NO20072706A NO20072706L (en) 2004-11-15 2007-05-24 Method and System to Prevent Receiving Unwanted Electronic Messages Said as Spam Email

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US62795604P 2004-11-15 2004-11-15
US60/627,956 2004-11-15

Publications (1)

Publication Number Publication Date
WO2006051434A1 true WO2006051434A1 (en) 2006-05-18

Family

ID=35355961

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2005/053376 Ceased WO2006051434A1 (en) 2004-11-15 2005-10-14 A method and system for preventing reception of unwanted electronic messages, such as spam-mails

Country Status (4)

Country Link
JP (1) JP2008520022A (en)
CN (1) CN101095154A (en)
NO (1) NO20072706L (en)
WO (1) WO2006051434A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2463532A (en) * 2008-09-23 2010-03-24 Euros Evans Email filtering based upon security information embedded in mail or provided through web based challenge response system
JP2010529563A (en) * 2007-06-08 2010-08-26 マイクロソフト コーポレーション Reducing unsolicited instant messages with communication thread tracking
CN103686640A (en) * 2013-12-23 2014-03-26 中国移动通信集团宁夏有限公司 A short message center system and operation method supporting delivery after verification
WO2015025325A1 (en) * 2013-08-20 2015-02-26 Longsand Limited Private tokens in electronic messages
US9497149B2 (en) 2012-02-03 2016-11-15 Richard Kramer System and method for reducing unsolicited E-mails

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001004787A2 (en) * 1999-07-13 2001-01-18 Alladvantage.Com, Inc. Method and system for classifying users of an electronic network
US20030163540A1 (en) * 2002-02-27 2003-08-28 Brian Dorricott Filtering e-mail messages
US20030167311A1 (en) * 1998-12-09 2003-09-04 Kirsch Steven T. Method and system for selectively blocking delivery of electronic mail
US20030220978A1 (en) * 2002-05-24 2003-11-27 Rhodes Michael J. System and method for message sender validation
EP1376427A2 (en) * 2002-06-26 2004-01-02 Microsoft Corporation SPAM detector with challenges
US20040148358A1 (en) * 2003-01-28 2004-07-29 Singh Tarvinder P. Indirect disposable email addressing

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030167311A1 (en) * 1998-12-09 2003-09-04 Kirsch Steven T. Method and system for selectively blocking delivery of electronic mail
WO2001004787A2 (en) * 1999-07-13 2001-01-18 Alladvantage.Com, Inc. Method and system for classifying users of an electronic network
US20030163540A1 (en) * 2002-02-27 2003-08-28 Brian Dorricott Filtering e-mail messages
US20030220978A1 (en) * 2002-05-24 2003-11-27 Rhodes Michael J. System and method for message sender validation
EP1376427A2 (en) * 2002-06-26 2004-01-02 Microsoft Corporation SPAM detector with challenges
US20040148358A1 (en) * 2003-01-28 2004-07-29 Singh Tarvinder P. Indirect disposable email addressing

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010529563A (en) * 2007-06-08 2010-08-26 マイクロソフト コーポレーション Reducing unsolicited instant messages with communication thread tracking
GB2463532A (en) * 2008-09-23 2010-03-24 Euros Evans Email filtering based upon security information embedded in mail or provided through web based challenge response system
US9497149B2 (en) 2012-02-03 2016-11-15 Richard Kramer System and method for reducing unsolicited E-mails
US10038660B2 (en) 2012-02-03 2018-07-31 Richard Kramer System and method for reducing unsolicited e-mails
WO2015025325A1 (en) * 2013-08-20 2015-02-26 Longsand Limited Private tokens in electronic messages
US10243900B2 (en) 2013-08-20 2019-03-26 Longsand Limited Using private tokens in electronic messages associated with a subscription-based messaging service
CN103686640A (en) * 2013-12-23 2014-03-26 中国移动通信集团宁夏有限公司 A short message center system and operation method supporting delivery after verification

Also Published As

Publication number Publication date
JP2008520022A (en) 2008-06-12
CN101095154A (en) 2007-12-26
NO20072706L (en) 2007-06-14

Similar Documents

Publication Publication Date Title
US8990312B2 (en) Active e-mail filter with challenge-response
US7512662B2 (en) System and method for user registry management of messages
US6779022B1 (en) Server that obtains information from multiple sources, filters using client identities, and dispatches to both hardwired and wireless clients
US10313297B2 (en) E-mail integrated instant messaging
US10185479B2 (en) Declassifying of suspicious messages
US7516182B2 (en) Practical techniques for reducing unsolicited electronic messages by identifying sender's addresses
JP4887365B2 (en) Electronic message system and method with reduced traceability
USRE42702E1 (en) Method and system for filtering electronic messages
US7421498B2 (en) Method and system for URL based filtering of electronic communications and web pages
US6167435A (en) Double opt-in™ method and system for verifying subscriptions to information distribution services
US20070204043A1 (en) Method, system and apparatus for rejecting unauthorized or SPAM e-mail messages.
US8321512B2 (en) Method and software product for identifying unsolicited emails
US20120005289A1 (en) Methods, Systems, And Computer Program Products For Managing Electronic Subscriptions
WO2004013796A1 (en) Practical techniques for reducing unsolicited electronic messages by identifying sender’s addresses
US7620691B1 (en) Filtering electronic messages while permitting delivery of solicited electronics messages
CA2454579A1 (en) Web-based communications addressing system and method
WO2002001823A2 (en) E-mail integrated instant messaging
WO2006051434A1 (en) A method and system for preventing reception of unwanted electronic messages, such as spam-mails
CN1777153A (en) Method for blochout of immediate message not requested,device and system thereof
KR100480879B1 (en) Method for treating spam mail using sender's mail domain and inserted url and system thereof
WO2001004787A2 (en) Method and system for classifying users of an electronic network
JP5362916B2 (en) Message distribution system
Rose Electronic Mail
GB2415062A (en) Junk mail filter for emails based on subject field text

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2007540754

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 200580045606.6

Country of ref document: CN

122 Ep: pct application non-entry in european phase

Ref document number: 05790708

Country of ref document: EP

Kind code of ref document: A1