AU2004201160B2 - Method and system for blocking unwanted e-mail - Google Patents

Method and system for blocking unwanted e-mail Download PDF

Info

Publication number
AU2004201160B2
AU2004201160B2 AU2004201160A AU2004201160A AU2004201160B2 AU 2004201160 B2 AU2004201160 B2 AU 2004201160B2 AU 2004201160 A AU2004201160 A AU 2004201160A AU 2004201160 A AU2004201160 A AU 2004201160A AU 2004201160 B2 AU2004201160 B2 AU 2004201160B2
Authority
AU
Australia
Prior art keywords
mail
sender
user
authorized
addressee
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2004201160A
Other versions
AU2004201160A1 (en
Inventor
Benjamin Victor Siddons Corby
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEW MILLENIUM SOLUTIONS Pty Ltd
Original Assignee
NEW MILLENIUM SOLUTIONS Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEW MILLENIUM SOLUTIONS Pty Ltd filed Critical NEW MILLENIUM SOLUTIONS Pty Ltd
Priority to AU2004201160A priority Critical patent/AU2004201160B2/en
Publication of AU2004201160A1 publication Critical patent/AU2004201160A1/en
Application granted granted Critical
Publication of AU2004201160B2 publication Critical patent/AU2004201160B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Description

METHOD AND SYSTEM FOR BLOCKING UNWANTED E-MAIL The present invention relates to electronic mail and, in particular, to a method and system for reducing SPAM or unsolicited or junk e-mail sent indiscriminately to multiple mailing s lists, individuals or news groups. BACKGROUND TO THE INVENTION SPAM has become a major problem as it is generally computer generated and these 10 computers are capable of generating millions of unwanted e-mails a day. As a person's e-mail address can become known through simple use such as sending personal or business c-mails across the internet, accessing internet sites and obtaining products which require e-mail information, etc. The more commonly known a person's e-mail address, the more likely that they will receive unwanted or SPAM e-mail. It is not uncommon for 15 persons to receive up to 100 to 200 SPAM e-mails a day which results in time wasted determining which are wanted e-mails as opposed to SPAM, and then deleting the SPAM from their systems. It is estimated that 90 - 95% of the corporate server system is dedicated to managing SPAM which is a significant and unwanted overhead task. 20 A known method of managing SPAM is to filter the received e-mail based on its contents and to reject that e-mail that includes unacceptable words, eg viagra, however, a consequence is that sometimes wanted e-mail can be blocked and not received. Another method is to store the e-mail and challenge the sender, only forwarding the e-mail if the sender successfully responds to the challenge, however a consequence of this method is 25 that a significant amount of e-mail is stored and never forwarded since most unsolicited e mail is SPAM. OBJECT OF THE INVENTION so It is an object of the present invention to provide a method and system of blocking unwanted e-mail and the like which substantially overcomes or ameliorates the above \rvr\ldocsptentsiconmp\13153.doc 2 mentioned disadvantages. At the very least, the object of the invention is to provide an alternative to known systems. DISCLOSURE OF THE INVENTION 5 According to one aspect of the present invention there is disclosed a method blocking unwanted e-mail, SPAM or the like, said method including the steps of providing a system for determining an e-mail source address and comparing said e-mail source address with a stored list of known addresses, wherein if e-mail is from a known source, 10 allowing the e-mail to proceed to addressee and if the e-mail is from a known undesirable source, preventing the mail from proceeding to the addressee, and if e-mail is from an unknown source, responding to the sender's mail server in such a way that a personal sender is aware of an action to be taken to be authorized to send e-mail to the addressee and the sender's server cannot determine that the receiving address exists and if the sender 15 correctly takes the steps to be authorized, allowing the e-mail to proceed to the addressee and not storing the original e-mail for this purpose. Preferably, the step of responding to the sender requesting an action that includes the step of requesting identification of an identifiable item in the e-mail. In the preferred form, 20 this step of returning the mail to the sender requesting a reply includes the step of including an identifiable item in the mail to the sender and requesting the sender to identify the item, whereby if the item is identified correctly, the mail is allowed to proceed to the addressee. 25 In another preferred form, this step of returning the mail to the sender requesting a reply includes the step of including a link to a web page which contains an identifiable item in the returned mail to the sender and requesting the sender to identify the item, whereby if the item is identified correctly, the mail is allowed to proceed to the addressee. 3o Preferably, the identifiable item can be a picture or some special text or the like whereby the picture or special text or the like cannot be identified by a computer but requires a personal response of identification. \\servereWowpatntscomp\13153.doc 3 In a preferred form, before the mail is allowed to proceed to the addressee, the system provides details of the sender to the addressee who has the option of receiving or blocking the mail. In a preferred form, this step can occur prior to returning the mail to sender o requesting a reply. Preferably, the addressee has the option of authorizing senders who are added to the stored list of known addresses. In a preferred form, receivers of outgoing mail are added to the stored list of known addresses, ie they are authorized to send mail to the addressee. 10 Preferably the method includes the steps of providing a stored list of addresses from which all mail is to be blocked. Preferably, the system interrogates the incoming mail header and thereby prevents 15 contents of mail from unknown or blocked source even being received by the server. Preferably the system replies to sender that mail is blocked in such a way that only a human will recognise the action required to be authorized. Preferably, the method includes the steps of blocking mail servers and IP addresses. 20 In a preferred form the method includes the step of an administrator or user of identifying users, mail servers and IP addresses as being allowed to send mail. In another preferred form, the method includes the step of providing a reporting facility 25 which enables users of the system to inspect the actions of the system. BRIEF DESCRIPTION OF THE DRAWINGS The present invention will be now be described with reference to the accompanying so drawing by which: \\serveddocs\puibnbsecompI3153.doc 4 Fig. 1 is a schematic block diagram of a mail management system of a preferred embodiment BEST MODE OF CARRYING OUT THE INVENTION 5 A system 10 of a preferred embodiment of mail management is shown in Fig. 1. A mail management system 11 is seen connected to the intemet 12 by a firewall 13. The mail management system 11 is installed on a server machine behind the firewall 13 on a SMTP gateway 14. The gateway 14 includes a SMTP receiver and e-mail boxes 15 and a SMTP 10 transmitter 16. The SMTP receiver and e-mail boxes 15 portion of the gateway 14 is connected to the e-mail users 17. The SMTP servers can be any software on any platform and the user's e-mail client can be any software on any platform. The mail management system 11 allows each e-mail user to manage their own mail 15 management in the prefered embodiment even though a central administrator can override the individual user's management if desired. Configuration of the system 11 is such that a list of stored addresses, whether specific (eg fred@mail.com) or group addresses (eg mail.com) or TCP/IP address or any combination 20 of the three, are used by the system 11 to block unwanted mail. This filtering of addresses preferably works on a hierarchical basis whereby if the group address (mail.com) is blocked, but a specific address (fred@maiLcom) within the group is not blocked, only the specific address in the group domain (mail.com) will be allowed. 25 The system 10 works in a away such that all mail is received at the server and if allowed will pass through to the user. If the mail is not identified by the list of allowable addresses, it is rejected and if the address is on the list of blocked addresses, the mail is also blocked. 30 The rejection of the mail occurs before the content of the mail is sent to the server and as such is not received. A SMTP reply is sent to the sender of the e-mail indicating that they must be authorized to send mail to the addressee. And contains instructions of how to be userverieocsipatnt.Waimp\13153.doc 5 authorized. The sender can apply to be authorized to send e-mails by sending a mail to a specific authorizing address. This address is preferably dynamic and changes for each blocked e-mail. The instructions can also include an identifiable item in the returned mail to the sender and request the sender to identify the item, whereby if the item is identified 5 correctly, the mail is allowed to proceed to the addressee. The identifiable item can be a picture or some special text or the like whereby the picture or special text or the like cannot be identified by a computer but requires a personal response of identification. In another embodiment, the returned mail contains a link to a web page which contains the identifiable item. 10 Following the receipt of an application for authorisation, the system II forwards a message to the user stating that there is a request for e-mail authorisation. The user can approve the sender responding to the e-mail or configure the system 11 to automatically authorise anyone who requests authorisation. This option is based on the assumption that 15 computer generated SPAM mail will not have the ability to request authorisation. Once a sender has been authorised, their address is included in the authorised list. An address which has been authorised can be unauthorised or blocked at a later date. The system includes the ability for the user to add a sender's partial address to a waiting 20 list such that any incoming mail that includes that part will be sent to the user as the sender asking to be authorized. The system further includes the ability for the user to indicate that a mail is expected from an unknown source such that any incoming mail will be sent to the user as the sender 2s asking to be authorized and the system will respond immediately to all unknown sources that the mail system is temporarily unavailable, such that the sender will try again at a later time. The system further includes the ability for the system to be aware that the sender will try so again and to continue to respond to the sender such that the sender will keep trying until the user has determined whether or not the sender will be authorized. \\serveAeWocspatentacomp\13153.doc 6 The system 10 also allows for an address to be authorised if the user sends mail to that address without the need for user intervention. The advantages of the systems of the preferred embodiments of the present invention s ensures that all SPAM is blocked from being received. A further advantage is that the SPAM mail server cannot be aware that the mail has been rejected, but in most instances, the personal sender will understand what they must do to be authorised. If the system is installed on a network of an organisation, this benefit frees up network capacity, reduces data costs and the number of mails that must be scanned by virus protection systems. 10 There is also a reduced amount of wasted time in handling unwanted SPAM in any way, eg no inspection, no filtering, no content checking etc. As the system is installed on an organisation's SMTP gateway, and not a a desktop computer, it is easy to implement and administer both centrally and by users. 15 The system also ensures that only personally sent e-mails can be received as machine sent e-mails are blocked. Throughout the specification and claims, the word "comprise" and its derivatives are 20 intended to have an inclusive rather than exclusive meaning unless the context requires otherwise. The foregoing describes only some embodiments of the present invention, and modifications obvious to those skilled in the art can be made thereto without departing 25 from the scope of the present invention. hservereWcspatentscomp\1 3153.doc

Claims (5)

1. A method blocking unwanted e-mail, SPAM or the like, said method including the steps of providing a system for determining an e-mail source address and comparing 5 said e-mail source address with a stored list of known addresses, wherein if mail is from a known source, allowing the mail to proceed to addressee, and if mail is from a known undesirable source, preventing the mail from proceeding to the addressee, and further including the step that if mail is from an unknown source, responding to the sender's mail server in such a way that a personal sender is aware of an action to 10 be taken to be authorized to send e-mail to the addressee and the sender's server cannot determine that the receiving address exists and if the sender correctly takes the steps to be authorized, allowing the e-mail to proceed to the addressee and not storing the original e-mail for this purpose; wherein the method includes the ability for the user to temporarily suspend blocking and receive all mail. 15
2. The method according to claim 1, wherein the method includes the ability for the user to add a sender's partial address to a waiting list such that any incoming mail that includes that part will be sent to the user as the sender asking to be authorized. 20
3. The method according to either claim I or 2, wherein the method includes the ability for the user to indicate that a mail is expected from an unknown source such that any incoming mail will be sent to the user as the sender asking to be authorized and the system will respond immediately to all unknown sources that the mail system is temporarily unavailable, such that the sender will try again at a later time. 25
4. The method according to claim 3, wherein the method includes the ability for the system to be aware that the sender will try again and to continue to respond to the sender such that the sender will keep trying until the user has determined whether or not the sender will be authorized. \\server\e\docs\patents\complete\1 3153 a.doc 8 DATED this TWENTY-SECOND day of MARCH 2004 NEW MILLENNIUM SOLUTIONS PTY LTD
5 Patent Attorneys for the Applicant CHRYSILIOU LAW \\server\e\docs\patents\complete\1 3153 a.doc
AU2004201160A 2003-09-04 2004-03-22 Method and system for blocking unwanted e-mail Ceased AU2004201160B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2004201160A AU2004201160B2 (en) 2003-09-04 2004-03-22 Method and system for blocking unwanted e-mail

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
AU2003244552 2003-09-04
AU2003244552A AU2003244552B1 (en) 2003-09-04 2003-09-04 Method and system for blocking unwanted e-mail
AU2004201160A AU2004201160B2 (en) 2003-09-04 2004-03-22 Method and system for blocking unwanted e-mail

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
AU2003244552A Division AU2003244552B1 (en) 2003-09-04 2003-09-04 Method and system for blocking unwanted e-mail

Publications (2)

Publication Number Publication Date
AU2004201160A1 AU2004201160A1 (en) 2004-05-13
AU2004201160B2 true AU2004201160B2 (en) 2009-12-17

Family

ID=34230034

Family Applications (2)

Application Number Title Priority Date Filing Date
AU2003244552A Ceased AU2003244552B1 (en) 2003-09-04 2003-09-04 Method and system for blocking unwanted e-mail
AU2004201160A Ceased AU2004201160B2 (en) 2003-09-04 2004-03-22 Method and system for blocking unwanted e-mail

Family Applications Before (1)

Application Number Title Priority Date Filing Date
AU2003244552A Ceased AU2003244552B1 (en) 2003-09-04 2003-09-04 Method and system for blocking unwanted e-mail

Country Status (1)

Country Link
AU (2) AU2003244552B1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999010817A1 (en) * 1997-08-26 1999-03-04 Christopher Alan Cobb A method and system for filtering electronic messages
US5956491A (en) * 1996-04-01 1999-09-21 Marks; Daniel L. Group communications multiplexing system
US6112227A (en) * 1998-08-06 2000-08-29 Heiner; Jeffrey Nelson Filter-in method for reducing junk e-mail
US6546416B1 (en) * 1998-12-09 2003-04-08 Infoseek Corporation Method and system for selectively blocking delivery of bulk electronic mail
WO2003044617A2 (en) * 2001-10-03 2003-05-30 Reginald Adkins Authorized email control system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5956491A (en) * 1996-04-01 1999-09-21 Marks; Daniel L. Group communications multiplexing system
WO1999010817A1 (en) * 1997-08-26 1999-03-04 Christopher Alan Cobb A method and system for filtering electronic messages
US6112227A (en) * 1998-08-06 2000-08-29 Heiner; Jeffrey Nelson Filter-in method for reducing junk e-mail
US6546416B1 (en) * 1998-12-09 2003-04-08 Infoseek Corporation Method and system for selectively blocking delivery of bulk electronic mail
WO2003044617A2 (en) * 2001-10-03 2003-05-30 Reginald Adkins Authorized email control system

Also Published As

Publication number Publication date
AU2003244552B1 (en) 2004-04-29
AU2004201160A1 (en) 2004-05-13

Similar Documents

Publication Publication Date Title
US7197539B1 (en) Automated disablement of disposable e-mail addresses based on user actions
US7962558B2 (en) Program product and system for performing multiple hierarchical tests to verify identity of sender of an e-mail message and assigning the highest confidence value
EP1242921B1 (en) Distributed content identification system
US7546349B1 (en) Automatic generation of disposable e-mail addresses
US20060004896A1 (en) Managing unwanted/unsolicited e-mail protection using sender identity
US8874662B2 (en) Method and apparatus for controlling unsolicited messages in a messaging network using an authoritative domain name server
US7483951B2 (en) Method and system for selectively blocking delivery of electronic mail
US6691156B1 (en) Method for restricting delivery of unsolicited E-mail
AU2003215276B2 (en) E-mail management services
US20030149726A1 (en) Automating the reduction of unsolicited email in real time
US20030212791A1 (en) Method and system for authorising electronic mail
US20060036701A1 (en) Messaging system having message filtering and access control
US20080082658A1 (en) Spam control systems and methods
US20120158877A1 (en) E-mail authentication
US20070180031A1 (en) Email Opt-out Enforcement
US20090307320A1 (en) Electronic mail processing unit including silverlist filtering
US8590002B1 (en) System, method and computer program product for maintaining a confidentiality of data on a network
US20060265459A1 (en) Systems and methods for managing the transmission of synchronous electronic messages
US20040243847A1 (en) Method for rejecting SPAM email and for authenticating source addresses in email servers
US7383306B2 (en) System and method for selectively increasing message transaction costs
US20080270544A1 (en) Greylisting optimizations for electronic mail filtering
US20200287908A1 (en) System and method for protecting against e-mail-based cyberattacks
US10257164B2 (en) Classifying e-mail connections for policy enforcement
US20060195537A1 (en) Systems and methods for managing directory harvest attacks via electronic messages
AU2004201160B2 (en) Method and system for blocking unwanted e-mail

Legal Events

Date Code Title Description
FGA Letters patent sealed or granted (standard patent)
MK14 Patent ceased section 143(a) (annual fees not paid) or expired