CA2450488A1 - System and method for eliminating unsolicited e-mail - Google Patents

System and method for eliminating unsolicited e-mail Download PDF

Info

Publication number
CA2450488A1
CA2450488A1 CA002450488A CA2450488A CA2450488A1 CA 2450488 A1 CA2450488 A1 CA 2450488A1 CA 002450488 A CA002450488 A CA 002450488A CA 2450488 A CA2450488 A CA 2450488A CA 2450488 A1 CA2450488 A1 CA 2450488A1
Authority
CA
Canada
Prior art keywords
correspondents
correspondence
message
mail
unsolicited
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002450488A
Other languages
French (fr)
Other versions
CA2450488C (en
Inventor
Christopher Liam Ivey
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CA002450488A priority Critical patent/CA2450488C/en
Publication of CA2450488A1 publication Critical patent/CA2450488A1/en
Application granted granted Critical
Publication of CA2450488C publication Critical patent/CA2450488C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention is a system and method for eliminating unsolicited e-mail. The invention employs the simple approach of limiting correspondence to known correspondents through a system of authentication, while allowing persons who are not authenticated correspondents to petition correspondence by means of an extremely restrictive message format that is useless for marketing purposes. The system uses a Header Parser [102] to sort all incoming electronic mail into solicited and unsolicited messages without parsing the message body. It allows unauthenticated correspondents to solicit correspondence by means of a specially tagged message format called a Request Correspondence Message, and makes use of a Format Inspector [103] to ensure that all such solicitations meet strict format requirements which make it impraticable to use such messages for the purposes of marketing or solicitation. Authenticated Correspondents are managed for each user with an Authentication Key Database [106]. The integrity of the system is maintained by means of a transactional exchange of authentication keys, which are transformed with each exchange to prevent keys from being intercepted and reused. This method allows users to maintain absolutely unique key signatures, which can be attached to message headers and sent in, clear without fear of interception or spoofing. This safeguard makes it impossible to share, sell, or compromise users' correspondent lists, and makes this approach to eliminating unsolicited e-mail unique from any similar method that employs correspondent lists.
CA002450488A 2003-11-13 2003-11-13 System and method for eliminating unsolicited e-mail Expired - Fee Related CA2450488C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA002450488A CA2450488C (en) 2003-11-13 2003-11-13 System and method for eliminating unsolicited e-mail

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA002450488A CA2450488C (en) 2003-11-13 2003-11-13 System and method for eliminating unsolicited e-mail

Publications (2)

Publication Number Publication Date
CA2450488A1 true CA2450488A1 (en) 2005-05-13
CA2450488C CA2450488C (en) 2009-08-04

Family

ID=34558397

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002450488A Expired - Fee Related CA2450488C (en) 2003-11-13 2003-11-13 System and method for eliminating unsolicited e-mail

Country Status (1)

Country Link
CA (1) CA2450488C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2423679A (en) * 2004-11-22 2006-08-30 Murata Machinery Ltd E-mail server with encryption / decryption and signing / verification capability

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2423679A (en) * 2004-11-22 2006-08-30 Murata Machinery Ltd E-mail server with encryption / decryption and signing / verification capability

Also Published As

Publication number Publication date
CA2450488C (en) 2009-08-04

Similar Documents

Publication Publication Date Title
US6615348B1 (en) Method and apparatus for an adapted digital signature
EP1611495B1 (en) Method for controlling and managing electronic messages
US8756289B1 (en) Message authentication using signatures
DE602005000121T2 (en) Method and apparatus for reducing e-mail spam and spreading viruses in a communication network by authenticating the origin of e-mail messages
WO2005089343A3 (en) Method and system for authenticating a message sender using domain keys
WO2004107137A3 (en) Method and code for authenticating electronic messages
WO2004063871A3 (en) System and method for secure electronic communication in a partially keyless environment
US20050188020A1 (en) E-mail certification service
WO2001091403A3 (en) Secured electronic mail system and method
CN104994008B (en) A kind of anti-phishing system and method for Email
DE602005001613D1 (en) SET UP A SECURE CONTEXT FOR TRANSMITTING MESSAGES BETWEEN COMPUTER SYSTEMS
US20090177673A1 (en) Method for predelivery verification of an intended recipient of an electronic message and dynamic generation of message content upon verification
US20070233610A1 (en) An improved institutional electronic messaging system
WO2004006073A3 (en) Storage and authentication of data transactions
US7644274B1 (en) Methods of protecting against spam electronic mail
WO2009011807A1 (en) Sender authentication for difficult to classify email
CN105471845B (en) Prevent the communication means and system of man-in-the-middle attack
US20050210272A1 (en) Method and apparatus for regulating unsolicited electronic mail
CN102710624A (en) Customizable network identity authentication method based on SM2 algorithm
Abd Razak et al. Identification of spam email based on information from email header
Kapadia A case (study) for usability in secure email communication
Chowdhury Comparison of e-voting schemes: Estonian and Norwegian solutions
CA2450488A1 (en) System and method for eliminating unsolicited e-mail
JP2009505485A (en) System and method for preventing unsolicited electronic message delivery by key generation and comparison
Cook et al. Phishwish: a simple and stateless phishing filter

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20141113