GB2460859A - E-mail system - Google Patents
E-mail system Download PDFInfo
- Publication number
- GB2460859A GB2460859A GB0810759A GB0810759A GB2460859A GB 2460859 A GB2460859 A GB 2460859A GB 0810759 A GB0810759 A GB 0810759A GB 0810759 A GB0810759 A GB 0810759A GB 2460859 A GB2460859 A GB 2460859A
- Authority
- GB
- United Kingdom
- Prior art keywords
- letter
- recipient
- sender
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/07—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
- H04L51/18—Commands or executable codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
-
- H04L12/585—
-
- H04L12/5885—
-
- H04L29/06605—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/214—Monitoring or handling of messages using selective forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/234—Monitoring or handling of messages for tracking messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/48—Message addressing, e.g. address format or anonymous messages, aliases
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
A quick and simple way to improve the security of sensitive emails while putting minimum burden on the sender or receiver of the email, by limiting the email to only one recipient, and preventing the recipient from sending out multiple copies as well, ensuring that only a single copy of the e-mail exists at any one time. This means that the e-mail will behave more like a virtual letter.
Description
Solution: The Virtual Letter When sending an email the user is offered the VL as well as To and CC.
Please see separate illustration.
The virtual letter has the following features: 1. VL can only contain one recipient 2. VL can not accept a group 3. Selecting VL excludes all other send options 4. Once sent it is immediately deleted from the senders computer 5. The receiver can only forward it to one recipient 6. Once forwarded it is deleted from the forwarders computer 7. It cannot be printed 8. It cannot be saved as anything other than a virtual letter 9. The current holder of a VL can delete it at any time at which point it ceases to exist 10. The VL has a log of all the email address that it has been sent to A variant is that the VL is visible in the senders out box and can be recalled up until it arrives in the inbox of the receiver, at which point it is deleted from the senders out box.
The log file can be used for auditing purposes. S...
Result * Just like a real letter, only one copy of it will ever exist.
* Just like a real letter, it can only ever be photo copied (in this case by use of the Print Screen function) but each time it is done it will degrade.
. * Due to the difficulties in forwarding the information, people are less likely to accidently reveal somebody's secrets by careless forwarding to multiple recipients, something which to them is trivial but to the sender could be embarrassing.
* Nlo matter who sends it to whom and how many times it is sent, it will only ever exist on one computer at any one time.
* If the holding computer is destroyed or loses the VL, the then the VL is lost forever-just as if a real letter had been burned.
* The owner of the VL is free to pass it on to any one they wish to -Just like a real letter, but in passing it on they lose access.
This system brings back some of the confidence that we had when we wrote love letters and put them in the post box, without taking away all of the freedoms and advantages of normal email as the user has a simple choice to make when selecting how to send the email and all of the existing options are still available and remain unchanged. * ** * * * * ** * S S... S. * * .*. *..
S * SS * . . * ..
S
S
Claims (3)
- Claims: 1. A method of reducing the risk of sensitive emails propagating exponentially over the internet.
- 2. A method to give the sender of an email a similar emotional experience to posting a letter.
- 3. A method to enable simply the entire history of locations a particular type of email has been sent to in its lifetime.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0810759A GB2460859A (en) | 2008-06-12 | 2008-06-12 | E-mail system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0810759A GB2460859A (en) | 2008-06-12 | 2008-06-12 | E-mail system |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0810759D0 GB0810759D0 (en) | 2008-07-23 |
GB2460859A true GB2460859A (en) | 2009-12-16 |
Family
ID=39672162
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0810759A Withdrawn GB2460859A (en) | 2008-06-12 | 2008-06-12 | E-mail system |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2460859A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000059165A1 (en) * | 1999-03-31 | 2000-10-05 | Atabok Inc. | A method and apparatus for preventing unauthorized copying and distributing of electronic messages transmitted over a network |
WO2001050291A1 (en) * | 1999-12-30 | 2001-07-12 | Leonard Jon N | System and method for electronic mail message processing |
US20030131060A1 (en) * | 2002-01-09 | 2003-07-10 | Bellsouth Intellectual Property Corporation | Method, system, and apparatus for providing self-destructing electronic mail messages |
US20060167709A1 (en) * | 2005-01-21 | 2006-07-27 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Managing a limited-use electronic mail account |
US20060174111A1 (en) * | 2004-09-08 | 2006-08-03 | Burns Paul E | Method and system for electronic communication risk management |
-
2008
- 2008-06-12 GB GB0810759A patent/GB2460859A/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000059165A1 (en) * | 1999-03-31 | 2000-10-05 | Atabok Inc. | A method and apparatus for preventing unauthorized copying and distributing of electronic messages transmitted over a network |
WO2001050291A1 (en) * | 1999-12-30 | 2001-07-12 | Leonard Jon N | System and method for electronic mail message processing |
US20030131060A1 (en) * | 2002-01-09 | 2003-07-10 | Bellsouth Intellectual Property Corporation | Method, system, and apparatus for providing self-destructing electronic mail messages |
US20060174111A1 (en) * | 2004-09-08 | 2006-08-03 | Burns Paul E | Method and system for electronic communication risk management |
US20060167709A1 (en) * | 2005-01-21 | 2006-07-27 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Managing a limited-use electronic mail account |
Also Published As
Publication number | Publication date |
---|---|
GB0810759D0 (en) | 2008-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101965023B1 (en) | Time-managed electronic mail messages | |
US20080104177A1 (en) | Method to facilitate sender notification of out-of-office status of e-mail addressee | |
JP4157890B2 (en) | E-mail delivery system and e-mail delivery program | |
US20060277264A1 (en) | Method, system, apparatus, and software product for filtering out spam more efficiently | |
DK1733532T3 (en) | Filters and methods for filtering electronic messages | |
US20070073816A1 (en) | Method and system for providing increased information and improved user controls for electronic mail return receipts | |
US20080155026A1 (en) | System and Method for Sharing Continuous Email Activity with Recipients Using Continuity Service | |
WO2008008811A3 (en) | Method and system of auto message deletion using expiration | |
US8285799B2 (en) | Quota-based archiving | |
US9559999B1 (en) | Method and system for processing large scale emails and limiting resource consumption and interruption therefrom | |
JP2002319975A5 (en) | ||
GB2551934A (en) | Commercial email management system | |
JP6230063B2 (en) | Message distribution server and message transmission device | |
US20130151630A1 (en) | System and method for managing incoming and outgoing email messages | |
GB2460859A (en) | E-mail system | |
US9106601B2 (en) | Selective delivery of content via electronic mail | |
US20180048602A1 (en) | Electronic mail delivery system having a spool function | |
CN108243093A (en) | A kind of mail mass-sends management system | |
Zetter | Yahoo issues takedown notice for spying price list | |
KR20040022516A (en) | Spam mail filtering system and method thereof | |
JP6462085B2 (en) | Message distribution server and message transmission device | |
Allen et al. | TAPAs: How to Reduce Spam (not the Lunch Meat!). | |
Mkhitaryan | Mechanisms for Administrating Tasks and Editing Data Bases in Hybrid email/SMS Info-Communicational Systems | |
WO2006089266A3 (en) | System and method for e-mail storage | |
Lindsay | The Subject |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |