CA2450488A1 - System and method for eliminating unsolicited e-mail - Google Patents
System and method for eliminating unsolicited e-mail Download PDFInfo
- Publication number
- CA2450488A1 CA2450488A1 CA002450488A CA2450488A CA2450488A1 CA 2450488 A1 CA2450488 A1 CA 2450488A1 CA 002450488 A CA002450488 A CA 002450488A CA 2450488 A CA2450488 A CA 2450488A CA 2450488 A1 CA2450488 A1 CA 2450488A1
- Authority
- CA
- Canada
- Prior art keywords
- correspondents
- correspondence
- message
- unsolicited
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention is a system and method for eliminating unsolicited e-mail. The invention employs the simple approach of limiting correspondence to known correspondents through a system of authentication, while allowing persons who are not authenticated correspondents to petition correspondence by means of an extremely restrictive message format that is useless for marketing purposes. The system uses a Header Parser [102] to sort all incoming electronic mail into solicited and unsolicited messages without parsing the message body. It allows unauthenticated correspondents to solicit correspondence by means of a specially tagged message format called a Request Correspondence Message, and makes use of a Format Inspector [103] to ensure that all such solicitations meet strict format requirements which make it impraticable to use such messages for the purposes of marketing or solicitation. Authenticated Correspondents are managed for each user with an Authentication Key Database [106]. The integrity of the system is maintained by means of a transactional exchange of authentication keys, which are transformed with each exchange to prevent keys from being intercepted and reused. This method allows users to maintain absolutely unique key signatures, which can be attached to message headers and sent in, clear without fear of interception or spoofing. This safeguard makes it impossible to share, sell, or compromise users' correspondent lists, and makes this approach to eliminating unsolicited e-mail unique from any similar method that employs correspondent lists.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002450488A CA2450488C (en) | 2003-11-13 | 2003-11-13 | System and method for eliminating unsolicited e-mail |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002450488A CA2450488C (en) | 2003-11-13 | 2003-11-13 | System and method for eliminating unsolicited e-mail |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2450488A1 true CA2450488A1 (en) | 2005-05-13 |
CA2450488C CA2450488C (en) | 2009-08-04 |
Family
ID=34558397
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002450488A Expired - Fee Related CA2450488C (en) | 2003-11-13 | 2003-11-13 | System and method for eliminating unsolicited e-mail |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA2450488C (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2423679A (en) * | 2004-11-22 | 2006-08-30 | Murata Machinery Ltd | E-mail server with encryption / decryption and signing / verification capability |
-
2003
- 2003-11-13 CA CA002450488A patent/CA2450488C/en not_active Expired - Fee Related
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2423679A (en) * | 2004-11-22 | 2006-08-30 | Murata Machinery Ltd | E-mail server with encryption / decryption and signing / verification capability |
Also Published As
Publication number | Publication date |
---|---|
CA2450488C (en) | 2009-08-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6615348B1 (en) | Method and apparatus for an adapted digital signature | |
EP1611495B1 (en) | Method for controlling and managing electronic messages | |
US8756289B1 (en) | Message authentication using signatures | |
DE602005000121T2 (en) | Method and apparatus for reducing e-mail spam and spreading viruses in a communication network by authenticating the origin of e-mail messages | |
WO2005089343A3 (en) | Method and system for authenticating a message sender using domain keys | |
WO2004107137A3 (en) | Method and code for authenticating electronic messages | |
WO2004063871A3 (en) | System and method for secure electronic communication in a partially keyless environment | |
US20050188020A1 (en) | E-mail certification service | |
WO2001091403A3 (en) | Secured electronic mail system and method | |
CN104994008B (en) | A kind of anti-phishing system and method for Email | |
DE602005001613D1 (en) | SET UP A SECURE CONTEXT FOR TRANSMITTING MESSAGES BETWEEN COMPUTER SYSTEMS | |
US20090177673A1 (en) | Method for predelivery verification of an intended recipient of an electronic message and dynamic generation of message content upon verification | |
US20070233610A1 (en) | An improved institutional electronic messaging system | |
WO2004006073A3 (en) | Storage and authentication of data transactions | |
US7644274B1 (en) | Methods of protecting against spam electronic mail | |
WO2009011807A1 (en) | Sender authentication for difficult to classify email | |
CN105471845B (en) | Prevent the communication means and system of man-in-the-middle attack | |
US20050210272A1 (en) | Method and apparatus for regulating unsolicited electronic mail | |
CN102710624A (en) | Customizable network identity authentication method based on SM2 algorithm | |
Abd Razak et al. | Identification of spam email based on information from email header | |
Kapadia | A case (study) for usability in secure email communication | |
Chowdhury | Comparison of e-voting schemes: Estonian and Norwegian solutions | |
CA2450488A1 (en) | System and method for eliminating unsolicited e-mail | |
JP2009505485A (en) | System and method for preventing unsolicited electronic message delivery by key generation and comparison | |
Cook et al. | Phishwish: a simple and stateless phishing filter |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20141113 |