AU2003203794A1 - A method and system for authorising electronic mail - Google Patents
A method and system for authorising electronic mail Download PDFInfo
- Publication number
- AU2003203794A1 AU2003203794A1 AU2003203794A AU2003203794A AU2003203794A1 AU 2003203794 A1 AU2003203794 A1 AU 2003203794A1 AU 2003203794 A AU2003203794 A AU 2003203794A AU 2003203794 A AU2003203794 A AU 2003203794A AU 2003203794 A1 AU2003203794 A1 AU 2003203794A1
- Authority
- AU
- Australia
- Prior art keywords
- recipient
- sender
- verification
- electronic mail
- unauthorised
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Description
P/00/011 Regulation 3.2
AUSTRALIA
Patents Act 1990
ORIGINAL
COMPLETE SPECIFICATION STANDARD PATENT Invention Title: A METHOD AND SYSTEM FOR AUTHORISING ELECTRONIC MAIL Applicant: ROBERT BARKLEY PICKUP The following statement is a full description of this invention, including the best method of performing it known to me: 1A A METHOD AND SYSTEM FOR AUTHORISING ELECTRONIC MAIL Field of the Invention The invention broadly relates to a method of and system for authorising electronic mail. The invention particularly but not exclusively relates to a method of authorising electronic mail that utilises a recipient's list of authorised senders.
Background to the Invention Spam is defined as unsolicited email, often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals, or newsgroups. It is often referred to simply as "junk" email. The prevalence of "Spamming" (the sending of Spam) over the Internet has increased dramatically in recent years. The problem has reached epidemic proportions with some users receiving hundreds of emails per month or even per week.
In order to combat Spamming, various Spam management systems have been devised. A simple system that operates on a "blacklisting" approach is catered for by a variety of email clients such as MicrosoftTM Outlook. When a Spam or junk email is received, the process of blacklisting allows recipients to build up their blacklist by adding the addresses or characteristics of unwanted emails.
The blacklist, contained either at the mail server or in the client end software, is provided to crosscheck incoming messages against a list of addresses on the blacklist. Where an address listed on the blacklist is identified then the email having that address is sent to the user's trash or deleted items folder. These blacklists are only reactive in nature; it is necessary to nominate the unwanted address before it can be blocked. Those who are sending Spam (known as "Spamnmers") typically avoid this type of blacklisting system by devising clever techniques to mask or modify their Spam to give the appearance that it originates from a different (forged) address.
2 Another system that has been used to avoid Spam utilises what is known as a "real time" blackhole list which operates on the pretext that Spam originates from the same mail relay. The "real time" blackhole list is a list of known offenders and their mail relays. Unfortunately, the system is still ineffective in preventing or minimising the majority of Spam. One problem with this system is that it still relies on someone recognising and reporting the Spamming mail relay before the Spam is delivered. Hence, not all offending mail relays can be identified. There is also a fundamental problem in that the assumption that all mail from that particular mail relay is Spam may be incorrect. Where this occurs, it may prevent an authentic sender from sending their email through the relay.
I have found that systems for filtering Spam based on the type of explicit deny methods as detailed above have a number of fundamental problems and disadvantages.
It is an object of the present invention to provide a method and system for authorising electronic mail that overcomes or alleviates one or more of the problems present in the prior art.
This discussion of the background to the invention herein is included to explain the context of the invention. This is not to be taken as an admission that any of the material referred to was published, known or part of the common general knowledge as at the priority date of any of the claims.
Summary of the Invention In one aspect, the present invention relates to authorising electronic mail sent by an unauthorised sender to a recipient, the method including the steps of: identifying and intercepting an unauthorised electronic mail before delivery to the recipient, the unauthorised electronic mail being identified through a comparison of details of the sender with details contained on a list of authorised senders; and automatically requesting that the sender of the unauthorised electronic mail provide verification before delivery of the electronic mail to the recipient; 3 wherein upon receipt of the verification, the sender is added to the list of authorised senders and the electronic mail is forwarded to the recipient.
It is particularly preferable that the verification occurs by the sender providing pre-determined information about the recipient. For example, the recipients name. This provides a safeguard as the message will only be delivered where the sender can show that they have further details, in addition to the email address, of the person who will be receiving the electronic message.
Preferably, the details will be selected such that they will not be readily available to those sending unsolicited emails.
Preferably, the unauthorised electronic mail is intercepted at a mail server associated with the recipient.
The request for verification may be sent to the sender in any suitable manner.
In one particularly preferred form, the request for verification is sent to the apparent email address of the sender via email. The request for verification can be in any suitable form. One particularly suitable form is a request provided in non-machine readable form.
Verification can be provided in any suitable manner. In one form of the invention, the sender provides verification by replying with another message.
This assists in alleviating the problem where Spam email is sent from a phantom address. In this instance, there will be no reply from the phantom address and hence verification will not occur. In another form of the invention the sender provides verification by providing information about the recipient.
This information can be, for example, the recipient's name. Another alternative level of verification can be provided where the sender is required to provide verification by providing one or more of: a password; a PGP key; and a predetermined token.
Where unauthorised mail is intercepted, the unauthorised electronic mail can be queued for a pre-determined period and deleted if verification is not provided within the period.
In a still further form of the invention, there are a plurality of recipients, and each recipient has a list of authorised senders. In an alternative form to this, a plurality of recipients share the same list of authorised senders.
In another alternative or additional form of the invention, the unauthorised electronic mail is intercepted before entering into a network associated with the recipient. This is advantageous in that it prevents the corresponding reduction in bandwidth caused by unwanted electronic mail passing through the network.
In another alternative or additional form of the invention, the invention includes the further steps of: identifying a request for verification sent to the recipient; and forwarding the request for verification message to the recipient without generating a request for verification from the recipient.
This identification of the request for verification (to recipient) may be done in any suitable manner. Ideally, it will need to be done so that spamn does not disguise itself as a request for verification. This can be achieved by identifying formatting rules which apply to requests for verification. Alternatively or additionally, the request for verification sent to the recipient can be forwarded only if received within a predetermined time of the recipient sending a message to the sender. This will allow the recipient to "match" requests for verification with emails that they have previously sent.
The present invention may also utilise a request for verification where that request includes non-machine readable code to make it difficult for automated verification of the message.
In a second aspect of the present invention, there is provided a method of updating a whitelist containing details of a recipient's authorised senders, the method including the steps of: identifying an unauthorised electronic mail, the unauthorised electronic mail being addressed to the recipient and originating from a sender whose details are not included on the whitelist; forwarding a request for verification to the sender; and receiving verification from the sender and including the sender's details on the whitelist.
In a third aspect of the present invention, there is provided a method of continuously updating a list of authorised senders to filter unwanted electronic mail, the method including the steps of: intercepting, at an intermediate destination, an electronic mail addressed to a recipient where details of the sender are not contained on the list of authorised senders; automatically requesting that the sender provide a verification to confirm their identity; and receiving verification from the sender and adding the sender to the list of authorised senders and delivering the electronic mail to the recipient.
Preferably, the intermediate destination is a mail server associated with the recipient. In another form of the invention, the intermediate destination is located outside a network associated with the recipient. In one further form of the invention, the request for verification is an electronic mail sent to an address of the sender from the intermediate destination.
The sender may provide verification in any suitable manner. In another form of the invention, the sender provides verification by replying to the mail from the intermediate destination. Verification may also be provided by information about the recipient. This information may, for example, be the recipient's name.
A higher level of security (and verification requirements) can be provided by requiring that the sender provide verification by providing one or more of: a password; a PGP key; and a pre-determined token.
Where an unauthorised electronic mail is intercepted, it may be dealt with in any suitable manner. In one form of the invention, the unauthorised electronic mail 6 is queued for a pre-determined period and deleted if verification is not provided within the period.
In another form of the invention, there are a plurality of recipients and each recipient has a list of authorised senders. In an alternative form of the invention, a plurality of recipients share the same list of authorised senders.
In a fourth aspect, the present invention relates to a system for authorising electronic mail sent by an unauthorised sender to a recipient, the system including: a whitelist containing a list of authorised senders; identification means for identifying unauthorised electronic mail sent to the recipient, the unauthorised electronic mail being identified by reference to the whitelist; interception means for intercepting unauthorised email before receipt by the recipient; and verification means operating, upon detection of an unauthorised email, to send a request for verification to the sender of an unauthorised email; wherein upon receipt of the verification from the sender, the whitelist is modified to include the sender's details and the electronic mail is forwarded to the recipient.
Preferably, the interception means operates to intercept unauthorised electronic mail before it enters into a network associated with the recipient.
In a fifth aspect, the present invention relates to a mail server for determining authorisation of electronic mail sent by an unauthorised sender to a recipient, the server including a whitelist; identification means for identifying unauthorised electronic mail sent to the recipient by reference to the whitelist; and verification means operating, upon detection of an unauthorised electronic mail, to send a request for verification to the sender of an unauthorised electronic mail; 7 wherein upon receipt of verification from the sender, the whitelist is modified to include the sender's details and the electronic mail is forwarded to the recipient.
Preferably, the mail server is located outside of a network associated with the recipient Brief Description of the Drawings The invention will hereinafter be described in greater detail by reference to the attached drawings, which illustrate example forms of the invention. It is to be understood that the particularity of the drawings does not supersede the generality of the preceding description of the invention. In the drawings Figure 1 is a flow chart illustrating the process of intercepting an inbound electronic message.
Figure 2 is a flow chart illustrating the process of sending an outbound electronic message.
Detailed Description The present invention relates to an advantageous method and system for the prevention of junk electronic mail or Spam. The invention focuses on the use of a whitelist, a list of authorised senders, to minimise or alleviate unsolicited electronic mail. A whitelist facilitates filtering by containing a list of known or allowed senders from which electronic messages may be accepted.
To maintain the spontaneous nature of email, the inventor has proposed a method and system where an automatic process maintains the whitelist whereby only suitably authorised senders are validated and added to the whitelist.
One embodiment of the invention involves a mail server associated with the recipient sending a verifying message to a sender where the mail server has 8 identified that sender as not being on the whitelist. This verifying message is a request that the sender provide verification before the email can be delivered to the recipient's inbox. Where the sender has been verified then the sender's address is added to the whitelist thereby avoiding the need for any verification where further electronic mail is sent from the sender to the recipient.
Verification may be done in any suitable manner. The present invention envisages a number of different types of verification mechanisms to take into account different levels of security for different recipients.
In one embodiment, the verification process occurs by the mail server associated with the recipient forwarding a message to the sender. The sender may then simply reply to that verifying message to achieve verification and inclusion into the recipient's whitelist. This level of verification is particularly suitable where the email address appearing on the Spam is not the address from where the Spam actually originated. In this instance there will be no reply to the verification request and the email will be queued at the server for a predetermined time before being discarded.
Another suitable method of verification involves a process whereby the sender is required to provide specific details on the person to whom they wish to send the email, for example, their full name. For even higher level of Spam protection, the verification can be effected by requiring that the sender provide authorisation in the form of a password, PGP fingerprint or a unique token. In another level of Spam protection, the request for verification can contain an image of non-machine readable text in order to make automated responses from those sending Spam difficult.
Operation of the invention can be explained by reference to the following nonlimiting examples.
Example 1 Transfer of email between a sender and recipient.
9 A sender sends an electronic mail (email) to a recipient in the standard manner.
The mail server associated with the recipient queues the email. The mail server cross-checks the address of the sender with a whitelist associated with the recipient and fails to identify the sender. The mail sever then sends an email to the sender requesting that they supply some form of verification. Upon receipt of the verification at the mail server, the sender is added to the recipient's whitelist and the queued message is forwarded to the recipient's mail spool.
When further emails are sent by the sender to the recipient, the whitelist will be checked and the senders address identified. Consequently, the sender's email will be forwarded to the recipient's mail spool.
Example 2 Unsucessful transfer of email, forged email "From:" address.
Where a Spammer sends an email to the recipient, the mail sever intercepts that email and checks whether the sender's name is on the whitelist. The server then sends a verifying message to the forged email address. In this case, the Spammer will never respond because the address has been forged.
The email will therefore wait at the mail server for a pre-determined period (without being sent to the recipient) before being deleted. A similar result will occur if the sender's address is not forged but simply consists of an unmanned "drop box". Where a Spammer develops a mechanism to reply to the verification message (at a great cost to the Spammer), the invention can be implemented with a higher level of verification security.
A flowchart illustrating the steps according to one particular embodiment of the present invention is shown in Figure 1. The email is received at a mail server associated with the recipient. The server then compares the address of the sender with a system wide blacklist, that is a list of senders that have been blacklisted from sending mail to any one of the recipient who receive mail through the particular server. The address of the sender is then compared to a system wide whitelist. Where the sender's address is contained on that list then it is delivered directly to the recipient. The sender's address is then compared to a blacklist compiled by the sender. If it appears on this list then it is forwarded to a message deletion queue. Finally, the address of the sender is compared to a whitelist of the recipient, if it is contained on this list then it is forwarded to the recipient. If the sender's address is not on this list then a verification message is sent to the sender and when (and if) verification is received then the sender is added to the recipient's whitelist and the sender's email is forwarded to the recipient.
In another embodiment of the invention, the email is received at a mail server associated with the recipient. The server compares the address of the sender with a whitelist. If the senders address is on the whitelist then the mail is forwarded onto the recipient. To automatically update the whitelist, the recipient can utilise the automatic updating mechanism of the present invention. This operates by sending an email message to the sender requesting that the sender provide verification signalling that they are authorised to send an email to the recipient. Where verification is received, the sender is added to the recipient's whitelist and further emails from the sender can be delivered to the recipient without the requirement for a verification step.
Where both the sender and the recipient are utilising the present invention, the verification must be allowed to pass through to the sender without causing another verification message in the opposing direction. This may be accomplished in a variety of ways. For example, verification messages can be identified by strict formatting rules (to prevent Spam electronic mail masquerading as a verification message). Another method of receiving a verification message can occur where the sender expects a verification message shortly after a local electronic mail has been sent out of the sender's system. A flowchart illustrating the sending of an outbound verification message according to one particular embodiment of the present invention is shown in Figure 2. In the flowchart shown in this figure, the sender's electronic mail whitelist is specifically set up to ensure that it can receive verification messages from recipients utilising the present invention.
The present invention can be utilised in a manner whereby unwanted email is prevented, by the whitelist, from entering the network. This can be 11 accomplished by using a global whitelist that effectively identifies unauthorised electronic mail before it is forwarded to the recipient. This overcomes the disadvantage with many current electronic mail systems where the email enters the network and is stored in the junk mail folder. Where this occurs, there is a corresponding increase in bandwidth and storage costs. This can be avoided by utilising a whitelist which operates on a global scale effectively intercepting and seeking authorisation from unauthorised senders before entry of the electronic message into the network.
In one embodiment of the invention, delaying all messages from local queuing until after successful verification can potentially save bandwidth and disk space resources. This can be achieved by replying with an error code 4xx in SMTP negotiation at the primary Mail Exchanger after determining sender and recipient, but without accepting the entire message.
A particular advantage of the present invention is that it maintains the ability of a sender to send and electronic mail message from any previously unknown person to any other person on the Internet (subject to verification). The invention is also beneficial in that implementation can be immediate without requiring global adoption of the system.
It is to be understood that various alterations, additions and/or modifications may be made to the parts previously described without departing from the ambit of the invention.
Claims (34)
1. A method of authorising electronic mail sent by a sender to a recipient, the method including the steps of: identifying and intercepting an unauthorised electronic mail before delivery to the recipient, the unauthorised electronic mail being identified through a comparison of details of the sender with details contained on a list of authorised senders; and automatically requesting that the sender of the unauthorised electronic mail provide verification before delivery of the electronic mail to the recipient; wherein upon receipt of the verification, the sender is added to the list of authorised senders and the electronic mail is forwarded to the recipient.
2. A method according to claim 1, wherein the unauthorised electronic mail is intercepted at a mail server associated with the recipient.
3. A method according to claim 1 or claim 2, wherein the request for verification is an electronic message sent to an address of the sender.
4. A method according to claim 3, wherein the electronic message includes non-machine readable code.
A method according to claim 3, wherein the sender provides verification by replying with another electronic mail.
6. A method according to any one of the preceding claims, wherein the sender provides verification by providing information about the recipient.
7. A method according to claim 6, wherein the information is the recipient's name.
8. A method according to any one of claims 1 to 5, wherein the sender provides verification by providing one or more of: a password; a PGP key; and a pre-determined token.
9. A method according to any one of the preceding claims, wherein unauthorised electronic mail is queued for a pre-determined period and deleted if verification is not provided within the period.
A method according to any one of the preceding claims, wherein there are a plurality of recipients and each recipient has a list of authorised senders.
11. A method according to any one of claims 1 to 8, wherein there are a plurality of recipients who share the same list of authorised senders.
12. A method according to any one of the preceding claims, further including the step of: identifying a request for verification sent to the recipient; and forwarding the request for verification message to the recipient without generating a request for verification.
13. A method according to claim 12, wherein the request for verification is identified by formatting rules.
14. A method according to claim 12 or claim 13, wherein the request for verification sent to the recipient is only forwarded if received within a pre- determined time of the recipient sending a message to the sender.
A method of updating a whitelist containing details of a recipient's authorised senders, the method including the steps of: identifying an unauthorised electronic mail, the unauthorised electronic mail being addressed to the recipient and originating from a sender whose details are not included on the whitelist; and forwarding a request for verification to the sender; and receiving verification from the sender and including the sender's details on the whitelist.
16. A method of continuously updating a list of authorised senders, the method including the steps of: intercepting, at an intermediate destination, an electronic message addressed to a recipient where details of the sender are not contained on the list of authorised senders; automatically requesting that the sender provide a verification to confirm their identity; and receiving verification from the sender and adding the sender to the list of authorised senders and delivering the email to the recipient.
17. A method according to claim 16, wherein the intermediate destination is a mail server associated with the recipient.
18. A method according to claim 16 or 17, wherein the request for verification is an electronic message sent to an address of the sender from the intermediate destination.
19. A method according to claim 18, wherein the sender provides verification by replying to the message from the intermediate destination.
A method according to any one of claims 15 to 19, wherein the sender provides verification by providing information about the recipient.
21. A method according to claim 20, wherein the information is the recipient's name.
22. A method according to any one of claims 15 to 21, wherein the sender provides verification by providing one or more of: a password; a PGP key; and a pre-determined token.
23. A method according to any one of claims 15 to 22, wherein the electronic message is queued for a pre-determined period and deleted if verification is not provided within the period.
24. A method according to any one of claims 15 to 23, wherein there are a plurality of recipients, and each recipient has a list of authorised senders.
A method according to claim 18, wherein the electronic message includes non-machine readable code.
26. A method according to any one of claims 15 to 23, wherein a plurality of recipients share the same list of authorised senders.
27. A system for authorising electronic mail sent by an unauthorised sender to a recipient, the system including: a whitelist containing a list of authorised senders; identification means for identifying unauthorised electronic mail sent to the recipient, the unauthorised electronic mail being identified by reference to the whitelist; interception means for intercepting unauthorised electronic mail before receipt by the recipient; and verification means operating, upon detection of an unauthorised email, to send a request for verification to the sender of an unauthorised electronic mail; wherein upon receipt of the verification from the sender, the whitelist is modified to include the sender's details and the electronic mail is forwarded to the recipient.
28. A mail server for determining authorisation of electronic mail sent by an unauthorised sender to a recipient, the server including: a whitelist; identification means for identifying unauthorised electronic mail sent to the recipient by reference to the whitelist; and 16 verification means operating, upon detection of an unauthorised electronic mail, to send a request for verification to the sender of an unauthorised mail; wherein upon receipt of verification from the sender, the whitelist is modified to include the sender's details and the electronic mail is forwarded to the recipient.
29. A method according to any one of claims 1 to 14, wherein the unauthorised electronic mail is intercepted before entering into a network associated with the recipient.
A method according to claim 16, wherein the intermediate destination is located outside a network associated with the recipient.
31. A system according to claim 27, wherein the interception means operates to intercept unauthorised electronic mail before it enters into a network associated with the recipient.
32. A mail server according to claim 28, wherein the mail server is located outside of a network associated with the recipient.
33. A method of authorising electronic mail sent by a sender to a recipient, the method including the steps of: identifying and intercepting an unauthorised electronic mail before delivery to the recipient, the unauthorised electronic mail being identified through a comparison of details of the sender with details contained on a list of authorised senders; and automatically requesting that the sender of the unauthorised electronic mail provide verification in the form of pre-determined information about the recipient before delivery of the electronic mail to the recipient; wherein upon receipt of the verification, the sender is added to the list of authorised senders and the electronic mail is forwarded to the recipient. 17
34. A method according to claim 33, wherein the pre-determined information about the recipient is personal information pertaining to the recipient. A method according to claim 34, wherein the person information is the recipient's name. DATED: 22 April 2003 PHILLIPS ORMONDE FITZPATRICK Attorneys For: ROBERT PICKUP
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2003203794A AU2003203794A1 (en) | 2002-04-23 | 2003-04-22 | A method and system for authorising electronic mail |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AUPS1932A AUPS193202A0 (en) | 2002-04-23 | 2002-04-23 | A method and system for authorising electronic mail |
AUPS1932 | 2002-04-23 | ||
AU2003203794A AU2003203794A1 (en) | 2002-04-23 | 2003-04-22 | A method and system for authorising electronic mail |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2003203794A1 true AU2003203794A1 (en) | 2003-11-13 |
Family
ID=34105099
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2003203794A Abandoned AU2003203794A1 (en) | 2002-04-23 | 2003-04-22 | A method and system for authorising electronic mail |
Country Status (1)
Country | Link |
---|---|
AU (1) | AU2003203794A1 (en) |
-
2003
- 2003-04-22 AU AU2003203794A patent/AU2003203794A1/en not_active Abandoned
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20030212791A1 (en) | Method and system for authorising electronic mail | |
US8073912B2 (en) | Sender authentication for difficult to classify email | |
US8219630B2 (en) | System and method for detecting and filtering unsolicited and undesired electronic messages | |
US8347095B2 (en) | System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison | |
US7529802B2 (en) | Method for performing multiple hierarchically tests to verify identity of sender of an email message and assigning the highest confidence value | |
US20060004896A1 (en) | Managing unwanted/unsolicited e-mail protection using sender identity | |
EP1733532B1 (en) | A filter and a method of filtering electronic messages | |
US20030167311A1 (en) | Method and system for selectively blocking delivery of electronic mail | |
US20040024823A1 (en) | Email authentication system | |
US20040221016A1 (en) | Method and apparatus for preventing transmission of unwanted email | |
US20050204012A1 (en) | Preventing acceptance of undesired electronic messages (spam) | |
US20080172468A1 (en) | Virtual email method for preventing delivery of unsolicited and undesired electronic messages | |
JP2012185858A (en) | Method of confirming intended recipient of electronic message before delivery, and method of dynamically generating message contents during confirmation | |
US20230007011A1 (en) | Method and system for managing impersonated, forged/tampered email | |
US20040243847A1 (en) | Method for rejecting SPAM email and for authenticating source addresses in email servers | |
AU2009299539A1 (en) | Electronic communication control | |
WO2008134942A1 (en) | Spam detection system based on the method of delayed-verification on the purported responsible address of a message | |
EP1922631B1 (en) | System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison | |
AU2003203794A1 (en) | A method and system for authorising electronic mail | |
KR20040022516A (en) | Spam mail filtering system and method thereof | |
US11916873B1 (en) | Computerized system for inserting management information into electronic communication systems | |
EP1922630A1 (en) | System and method for detecting and filtering unsolicited and undesired electronic messages | |
NL2002796C2 (en) | Verifying authorized transmission of electronic messages over a network. | |
CN101273344A (en) | System and method for detecting and filtering non-requested and needless electronic information | |
Riyadh | Towards security and balance in email through correspondence negotiation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PC1 | Assignment before grant (sect. 113) |
Owner name: TRUSTED DELIVERY PTY LTD Free format text: FORMER APPLICANT(S): ROBERT BARKLEY PICKUP |
|
MK4 | Application lapsed section 142(2)(d) - no continuation fee paid for the application |