WO2007101149A2 - Method for providing e-mail spam rejection employing user controlled and service provider controlled access lists - Google Patents

Method for providing e-mail spam rejection employing user controlled and service provider controlled access lists Download PDF

Info

Publication number
WO2007101149A2
WO2007101149A2 PCT/US2007/062798 US2007062798W WO2007101149A2 WO 2007101149 A2 WO2007101149 A2 WO 2007101149A2 US 2007062798 W US2007062798 W US 2007062798W WO 2007101149 A2 WO2007101149 A2 WO 2007101149A2
Authority
WO
WIPO (PCT)
Prior art keywords
user
list
sender
message
honorable
Prior art date
Application number
PCT/US2007/062798
Other languages
French (fr)
Other versions
WO2007101149A3 (en
Inventor
Weishi Feng
Original Assignee
Weishi Feng
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/678,271 external-priority patent/US20080177846A1/en
Priority claimed from US11/678,280 external-priority patent/US20070203947A1/en
Application filed by Weishi Feng filed Critical Weishi Feng
Publication of WO2007101149A2 publication Critical patent/WO2007101149A2/en
Publication of WO2007101149A3 publication Critical patent/WO2007101149A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking

Definitions

  • This invention relates generally to a method for providing e-mail spam rejection and, more particularly, to a method for providing e-mail spam rejection that includes identifying user controlled access lists that allow the user to determine which e-mails will be passed to the user and which e-mails will be rejected, and service provider controlled access lists that allow the service provider to determine which e-mails may be passed to the user.
  • E-mail is a popular mechanism for allowing e-mail users to communicate with each other over the Internet.
  • a user will have an "address book” or “contact list” provided by the e-mail software that allows the user to store contact information of other users, both personal and business, from which the user can easily select an addressee to send an e-mail message.
  • e-mail allows various people and entities, some less than honorable, to send messages to users in an attempt to sell various products and services. This type of e-mail message is generally referred to in the industry as "spam.”
  • spam This type of e-mail message
  • various nefarious entities use e-mail to spread computer viruses to disrupt the flow of information and data. These nefarious entities can gain access to the e-mail of honorable users in many ways, including through legitimate e-mail transmissions.
  • Internet e-mail service providers generally use some type of spam filtering that attempts to prevent unwanted e-mails from being delivered to a user.
  • spam filtering techniques are known in the art, most of which have limited success.
  • a method for providing e-mail spam rejection includes identifying user controlled access lists that allow the user to determine which e-mail messages will be passed to the user and which e-mail messages will be rejected, and service provider controlled access lists that allow the service provider to determine which e-mails may be passed to the user.
  • the user controlled access lists include a contact list established by the user that identifies contacts whose e-mail messages will be sent directly to the user, and a reject list established by the user that identifies senders whose e-mail messages will be rejected and not sent to the user.
  • the service provider controlled access lists include an honorable business list whose e-mail messages will be sent to the user, only if the user enables the list, and an honorable user list whose e-mail messages will be sent to the user, only if the user enables the list. Other e-mail senders not on any of the lists will have to go through an authorization process to have their e-mail messages delivered to the user.
  • Figures 1(a) - 1(c) are a representation of contact lists for three users
  • Figure 2 is a flow chart diagram showing a method for determining what e-mail messages will be sent to a user and what e-mails will be rejected depending on whether the sender is identified on user controlled and service provider controlled access lists, according to an embodiment of the present invention.
  • Figure 3 is a flow chart diagram showing a method for performing an authorization process to determine whether to send an e-mail message to a user if the sender does not appear on any of the lists in the method shown in figure 2.
  • An internet service provider is a company or organization who owns and operates hardware and software systems that provide e-mail and other internet services, such as instant messaging, electronic message boards, etc., for users who subscribe to the service. A user subscribes with the service provider to create an account so that the user can log into and use the services.
  • an algorithm is provided by the Internet service provider that allows the user to establish a user contact list that includes personal distance information that identifies how close an entity or person, as represented by a certain entry in the contact list, is to the user.
  • the personal distance information could be specified by any suitable manner, such as by numerical ordering or by a particular classification, such as family member, friend, business associate, etc.
  • the personal distance information can be specified by the user or can be determined by the system software if the user enables that feature.
  • selective networks can be established between and among internet users.
  • the user can build one or more "friend circles" in his/her contact list, where each friend circle is a group of friends.
  • Each friend circle is a group of friends.
  • One person can be put into multiple friend circles.
  • the contact information for a particular person can be stored as a reference, where what actually is stored in the contact list is a pointer that points to the data storage area where the actual contact information is stored.
  • his/her contact information such as phone numbers or addresses
  • all of the other users in the friend circle will have their contact list automatically updated if the users enable the feature.
  • the algorithm may provide a friend talk service, where the user can post a message on an electronic message board to a certain designation of contacts in his/her contact list, such as the friend circle.
  • a user may want a certain group of contacts to view a certain website, review a certain publication, or get other information over the Internet.
  • the user will post a message on the electronic message board that directs the selected contacts to a particular website, who will get an alert message when they "log in" to their account.
  • the user can classify the message according to who he/she wants to see it from his/her contact list.
  • an on-line social network can be provided where the users that are part of the network have a mutual trust in that they specifically know the persons who will view the messages.
  • the user can further specify whether the message will be visible to friend's friends, that is, whether the message will be available to those people designated as friends in the receiving user's contact list.
  • the user can also specify whether the message will be visible to friend's friend's friends, or even visible to the public.
  • the algorithm may allow a user to make a recommendation of a product, article, piece of news, etc., and the user can specify whether the recommendation is visible to any of the groups identified above.
  • FIG. 1(a) - 1(c) An example of the above-described personal distance information contact list is shown in figures 1(a) - 1(c), where figure 1(a) is a contact list for user_A, figure 1 (b) is a contact list for user_B, and figure 1(c) is a contact list for user_C.
  • the personal distance information classification has two levels, the letter F identifies a friend and the letter B identifies a business associate. In this example, a friend is closer in personal distance to the user than a business associate.
  • User_A has a contact list that classifies user_B and user_C as friends, and user_D as a business associate.
  • User_B has a contact list that classifies user_A, userJ ⁇ and user_F as friends.
  • User_C has a contact list that classifies user_A and user_G as friends, and user_H as a business associate.
  • user_A posts a message on the message board, or makes a recommendation, and specifies the message is for friends only, then only user_B and user_C can see the message and join a discussion, such as a chat room, concerning the message with each other. If user_A posts a message on the message board, or makes a recommendation, and specifies the message is for friend's friends, then all of user_B, user_C, user_E and user_G will be able to receive the message. If user_A posts a message on the message board, or makes a recommendation, and specifies the message is for the public, then all of the users can see the message and join a discussion concerning the message.
  • an algorithm is provided by the e-mail service provider that provides spam rejection based on user controlled access lists and service provider controlled access lists.
  • the user controlled access lists include a contact list that contains contact information of the user's family, friends, business associates, and other people or entities that are permitted to send e- mail to the user based on account information. E-mail messages from people and entities on the contact list are passed directly to the user by the service provider algorithm.
  • the contact list can include full email addresses, partial email addresses or domain names. For example, the user may want to receive all email messages from xyz.com. Also, the user may want to accept all email messages from a certain domain, such as .edu.
  • the user controlled access lists also include a reject list that is loaded by the user.
  • the service provider will reject and discard messages from people or organizations on the reject list, and not pass them to the user.
  • the service provider controlled access lists include an honorable business list, where honorable businesses and organizations can register with the service provider so that their messages to the users that subscribe to the service can be passed to the users.
  • Honorable businesses are those businesses that may have legitimate business with a user.
  • the honorable businesses or organizations may have to pay the service provider for the delivery of their messages to the users. If a business or person on the honorable business list sends spam e-mail messages to the users, the service provider can remove the business or person from the honorable business list so that spam messages from the business will not be passed to the users in the future.
  • the user can choose to enable or disable the honorable business list feature.
  • the service provider also assigns an honorable user status to each user that has an account with the service provider who does not send spam e- mail messages. As described herein, those users that have been assigned the honorable user status are said to be on an honorable user list.
  • Each user who subscribes to the service provider can choose to accept messages from honorable users who are not on the user's contact list by enabling the honorable user feature. For example, suppose user_A is an honorable user, and user_A wishes to send an e- mail message to user_B. If user_B chooses to accept e-mail messages from honorable users by enabling the honorable user feature, then the message is passed to user_B even if user_A is not on user_B's contact list. However, if user_B chooses to disable the honorable user feature, the e-mail message from user_A will need to be authorized by the user before being delivered to the user, as will be discussed in further detail below.
  • the algorithm includes an authorization process for allowing an e-mail message to be sent to a user if the sender is not on the user's contact list, the user's reject list, the honorable business list or the honorable user list.
  • the authorization process can be used to authorize a message to a user from a sender that is on the honorable business list or on the honorable user list if the user has the honorable business and/or honorable user feature disabled.
  • FIG. 2 is a flow chart diagram 10 showing a method for determining whether to pass an e-mail message by a service provider to a user based on the discussion above.
  • the service provider algorithm determines whether the sender of the message is on the user contact list at decision diamond 12, and if so, the algorithm sends the message to the user at box 14. If the sender of the message is not on the user contact list at the decision diamond 12, then the algorithm determines whether the sender is on the user reject list at decision diamond 16. If the sender is on the user's reject list at the decision diamond 16, then the algorithm discards the message at box 18.
  • the algorithm determines whether the sender is an external sender, i.e., does not have an account with the e-mail service provider, at decision diamond 20. If the sender is an external sender at the decision diamond 20, then the algorithm determines whether the sender is on the honorable business list at the decision diamond 22. If the sender is on the honorable business list at the decision diamond 22, and the user for who the message was intended has enabled the feature to allow messages from honorable businesses at decision diamond 24, then the algorithm sends the message to the user at the box 14.
  • the algorithm holds the message and performs an authorization process to determine if the message will be sent to the user or discarded at box 26. If the sender is not on the honorable business list at the decision diamond 22, then the algorithm holds the message and performs the authorization process to determine if the message will be sent to the user or discarded at the box 26.
  • the algorithm determines whether the sender is on the honorable user list at decision diamond 28. If the user is on the honorable user list, and the user has enabled the honorable user feature at decision diamond 30, then the algorithm sends the message to the user at the box 14. If the sender is on the honorable user list at the decision diamond 28, but the user has disabled the honorable user feature at the decision diamond 30, then the algorithm holds the message and performs the authorization process to determine if the message will be sent to the user or discarded at the box 26. If the sender is not on the honorable user list at the decision diamond 28, then the algorithm holds the message and performs the authorization process to determine if the message will be sent to the user or discarded at the box 26.
  • FIG. 3 is a flow chart diagram 40 showing one suitable operation for the authorization process at the box 26.
  • Other authorization processes and additional steps can also be used within the scope of the present invention.
  • the algorithm While the algorithm is holding the message, the algorithm will send a new e-mail message to the sender stating that authorization is required before the original message is sent to the user at box 42.
  • the message can contain an internet link that leads the sender to a webpage to provide verifiable information, for example, the sender's name, how the sender found the user's e-mail address, etc.
  • the algorithm can also ask the sender to perform a task that is easy for human beings, but difficult for computers, such as reading distorted English letters and numbers.
  • the algorithm will then wait for the information from the sender and will receive the information at box 44.
  • the algorithm will then send a message to the user indicating that there has been an attempt to send a message to the user together with the sender's information at box 46.
  • the user will approve or deny the message at box 48, and the algorithm will send the message or discard the message appropriately at box 50.
  • the user can add the sender information to his/her contact list or reject list at box 52.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A method for providing e-mail spam rejection that includes identifying user controlled access lists that allow the user to determine which e-mail messages will be passed to the user and which e-mail messages will be rejected, and service provider controlled access lists that allow the service provider to determine which e-mails may be passed to the user. In one embodiment, the user controlled access lists include a contact list established by the user that identifies contacts whose e-mail messages will be sent directly to the user, and a rejection list established by the user that identifies entities whose e-mail messages will be rejected and not sent to the user. The service provider controlled access lists include an honorable business list and an honorable user list.

Description

METHOD FOR PROVIDING E-MAIL SPAM REJECTION EMPLOYING USER CONTROLLED AND SERVICE PROVIDER CONTROLLED ACCESS LISTS
BACKGROUND OF THE INVENTION
1. Field of the Invention
[0001] This invention relates generally to a method for providing e-mail spam rejection and, more particularly, to a method for providing e-mail spam rejection that includes identifying user controlled access lists that allow the user to determine which e-mails will be passed to the user and which e-mails will be rejected, and service provider controlled access lists that allow the service provider to determine which e-mails may be passed to the user.
2. Discussion of The Related Art
[0002] E-mail is a popular mechanism for allowing e-mail users to communicate with each other over the Internet. Typically, a user will have an "address book" or "contact list" provided by the e-mail software that allows the user to store contact information of other users, both personal and business, from which the user can easily select an addressee to send an e-mail message. However, e-mail allows various people and entities, some less than honorable, to send messages to users in an attempt to sell various products and services. This type of e-mail message is generally referred to in the industry as "spam." Further, various nefarious entities use e-mail to spread computer viruses to disrupt the flow of information and data. These nefarious entities can gain access to the e-mail of honorable users in many ways, including through legitimate e-mail transmissions.
[0003] Internet e-mail service providers generally use some type of spam filtering that attempts to prevent unwanted e-mails from being delivered to a user. Various types of spam filtering techniques are known in the art, most of which have limited success.
SUMMARY OF THE INVENTION
[0004] In accordance with the teachings of the present invention, a method for providing e-mail spam rejection is disclosed that includes identifying user controlled access lists that allow the user to determine which e-mail messages will be passed to the user and which e-mail messages will be rejected, and service provider controlled access lists that allow the service provider to determine which e-mails may be passed to the user. In one embodiment, the user controlled access lists include a contact list established by the user that identifies contacts whose e-mail messages will be sent directly to the user, and a reject list established by the user that identifies senders whose e-mail messages will be rejected and not sent to the user. The service provider controlled access lists include an honorable business list whose e-mail messages will be sent to the user, only if the user enables the list, and an honorable user list whose e-mail messages will be sent to the user, only if the user enables the list. Other e-mail senders not on any of the lists will have to go through an authorization process to have their e-mail messages delivered to the user.
[0005] Additional features of the present invention will become apparent from the following description and appended claims, taken in conjunction with the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
[0006] Figures 1(a) - 1(c) are a representation of contact lists for three users;
[0007] Figure 2 is a flow chart diagram showing a method for determining what e-mail messages will be sent to a user and what e-mails will be rejected depending on whether the sender is identified on user controlled and service provider controlled access lists, according to an embodiment of the present invention; and
[0008] Figure 3 is a flow chart diagram showing a method for performing an authorization process to determine whether to send an e-mail message to a user if the sender does not appear on any of the lists in the method shown in figure 2.
DETAILED DESCRIPTION OF THE EMBODIMENTS
[0009] The following discussion of the embodiments of the invention directed to a method for determining whether e-mail messages will be sent to a user or rejected using user controlled access lists and service provider controlled access lists is merely exemplary in nature, and is in no way intended to limit the invention or its application or uses. [0010] An internet service provider is a company or organization who owns and operates hardware and software systems that provide e-mail and other internet services, such as instant messaging, electronic message boards, etc., for users who subscribe to the service. A user subscribes with the service provider to create an account so that the user can log into and use the services.
[0011] According to one embodiment of the invention, an algorithm is provided by the Internet service provider that allows the user to establish a user contact list that includes personal distance information that identifies how close an entity or person, as represented by a certain entry in the contact list, is to the user. The personal distance information could be specified by any suitable manner, such as by numerical ordering or by a particular classification, such as family member, friend, business associate, etc. The personal distance information can be specified by the user or can be determined by the system software if the user enables that feature. Thus, selective networks can be established between and among internet users.
[0012] For example, the user can build one or more "friend circles" in his/her contact list, where each friend circle is a group of friends. One person can be put into multiple friend circles. The contact information for a particular person can be stored as a reference, where what actually is stored in the contact list is a pointer that points to the data storage area where the actual contact information is stored. In this manner, if a user updates his/her contact information, such as phone numbers or addresses, all of the other users in the friend circle will have their contact list automatically updated if the users enable the feature.
[0013] According to one aspect of this embodiment, the algorithm may provide a friend talk service, where the user can post a message on an electronic message board to a certain designation of contacts in his/her contact list, such as the friend circle. For example, a user may want a certain group of contacts to view a certain website, review a certain publication, or get other information over the Internet. The user will post a message on the electronic message board that directs the selected contacts to a particular website, who will get an alert message when they "log in" to their account. Particularly, the user can classify the message according to who he/she wants to see it from his/her contact list. Based on this process, an on-line social network can be provided where the users that are part of the network have a mutual trust in that they specifically know the persons who will view the messages.
[0014] The user can further specify whether the message will be visible to friend's friends, that is, whether the message will be available to those people designated as friends in the receiving user's contact list. The user can also specify whether the message will be visible to friend's friend's friends, or even visible to the public.
[0015] According to another aspect of this embodiment of the invention, the algorithm may allow a user to make a recommendation of a product, article, piece of news, etc., and the user can specify whether the recommendation is visible to any of the groups identified above.
[0016] An example of the above-described personal distance information contact list is shown in figures 1(a) - 1(c), where figure 1(a) is a contact list for user_A, figure 1 (b) is a contact list for user_B, and figure 1(c) is a contact list for user_C. Suppose, for example, the personal distance information classification has two levels, the letter F identifies a friend and the letter B identifies a business associate. In this example, a friend is closer in personal distance to the user than a business associate. User_A has a contact list that classifies user_B and user_C as friends, and user_D as a business associate. User_B has a contact list that classifies user_A, userJΞ and user_F as friends. User_C has a contact list that classifies user_A and user_G as friends, and user_H as a business associate.
[0017] If user_A posts a message on the message board, or makes a recommendation, and specifies the message is for friends only, then only user_B and user_C can see the message and join a discussion, such as a chat room, concerning the message with each other. If user_A posts a message on the message board, or makes a recommendation, and specifies the message is for friend's friends, then all of user_B, user_C, user_E and user_G will be able to receive the message. If user_A posts a message on the message board, or makes a recommendation, and specifies the message is for the public, then all of the users can see the message and join a discussion concerning the message.
[0018] According to another embodiment of the invention, an algorithm is provided by the e-mail service provider that provides spam rejection based on user controlled access lists and service provider controlled access lists. The user controlled access lists include a contact list that contains contact information of the user's family, friends, business associates, and other people or entities that are permitted to send e- mail to the user based on account information. E-mail messages from people and entities on the contact list are passed directly to the user by the service provider algorithm. The contact list can include full email addresses, partial email addresses or domain names. For example, the user may want to receive all email messages from xyz.com. Also, the user may want to accept all email messages from a certain domain, such as .edu.
[0019] The user controlled access lists also include a reject list that is loaded by the user. The service provider will reject and discard messages from people or organizations on the reject list, and not pass them to the user.
[0020] Other people or entities may send e-mail messages to the user who may not be on the user's contact list or reject list. The service provider controlled access lists include an honorable business list, where honorable businesses and organizations can register with the service provider so that their messages to the users that subscribe to the service can be passed to the users. Honorable businesses are those businesses that may have legitimate business with a user. The honorable businesses or organizations may have to pay the service provider for the delivery of their messages to the users. If a business or person on the honorable business list sends spam e-mail messages to the users, the service provider can remove the business or person from the honorable business list so that spam messages from the business will not be passed to the users in the future. The user can choose to enable or disable the honorable business list feature. If a user disables the honorable business list feature, messages from a business or person who is not on the user's contact or reject list, but is on the honorable business list, will need to be authorized by the user before being delivered to the user, as will be discussed in further detail below.
[0021] The service provider also assigns an honorable user status to each user that has an account with the service provider who does not send spam e- mail messages. As described herein, those users that have been assigned the honorable user status are said to be on an honorable user list. Each user who subscribes to the service provider can choose to accept messages from honorable users who are not on the user's contact list by enabling the honorable user feature. For example, suppose user_A is an honorable user, and user_A wishes to send an e- mail message to user_B. If user_B chooses to accept e-mail messages from honorable users by enabling the honorable user feature, then the message is passed to user_B even if user_A is not on user_B's contact list. However, if user_B chooses to disable the honorable user feature, the e-mail message from user_A will need to be authorized by the user before being delivered to the user, as will be discussed in further detail below.
[0022] According to the invention, the algorithm includes an authorization process for allowing an e-mail message to be sent to a user if the sender is not on the user's contact list, the user's reject list, the honorable business list or the honorable user list. Further, the authorization process can be used to authorize a message to a user from a sender that is on the honorable business list or on the honorable user list if the user has the honorable business and/or honorable user feature disabled. A detailed discussion of one example of a suitable authorization process is discussed below.
[0023] Figure 2 is a flow chart diagram 10 showing a method for determining whether to pass an e-mail message by a service provider to a user based on the discussion above. The service provider algorithm determines whether the sender of the message is on the user contact list at decision diamond 12, and if so, the algorithm sends the message to the user at box 14. If the sender of the message is not on the user contact list at the decision diamond 12, then the algorithm determines whether the sender is on the user reject list at decision diamond 16. If the sender is on the user's reject list at the decision diamond 16, then the algorithm discards the message at box 18.
[0024] If the sender is not on the user's reject list at the decision diamond 16, the algorithm determines whether the sender is an external sender, i.e., does not have an account with the e-mail service provider, at decision diamond 20. If the sender is an external sender at the decision diamond 20, then the algorithm determines whether the sender is on the honorable business list at the decision diamond 22. If the sender is on the honorable business list at the decision diamond 22, and the user for who the message was intended has enabled the feature to allow messages from honorable businesses at decision diamond 24, then the algorithm sends the message to the user at the box 14. If the sender is on the honorable business list, but the user has disabled the honorable business list feature, then the algorithm holds the message and performs an authorization process to determine if the message will be sent to the user or discarded at box 26. If the sender is not on the honorable business list at the decision diamond 22, then the algorithm holds the message and performs the authorization process to determine if the message will be sent to the user or discarded at the box 26.
[0025] If the sender is an internal sender at the decision diamond 20, i.e., has an account with the service provider, then the algorithm determines whether the sender is on the honorable user list at decision diamond 28. If the user is on the honorable user list, and the user has enabled the honorable user feature at decision diamond 30, then the algorithm sends the message to the user at the box 14. If the sender is on the honorable user list at the decision diamond 28, but the user has disabled the honorable user feature at the decision diamond 30, then the algorithm holds the message and performs the authorization process to determine if the message will be sent to the user or discarded at the box 26. If the sender is not on the honorable user list at the decision diamond 28, then the algorithm holds the message and performs the authorization process to determine if the message will be sent to the user or discarded at the box 26.
[0026] Figure 3 is a flow chart diagram 40 showing one suitable operation for the authorization process at the box 26. Other authorization processes and additional steps can also be used within the scope of the present invention. While the algorithm is holding the message, the algorithm will send a new e-mail message to the sender stating that authorization is required before the original message is sent to the user at box 42. The message can contain an internet link that leads the sender to a webpage to provide verifiable information, for example, the sender's name, how the sender found the user's e-mail address, etc. The algorithm can also ask the sender to perform a task that is easy for human beings, but difficult for computers, such as reading distorted English letters and numbers. The algorithm will then wait for the information from the sender and will receive the information at box 44. The algorithm will then send a message to the user indicating that there has been an attempt to send a message to the user together with the sender's information at box 46. The user will approve or deny the message at box 48, and the algorithm will send the message or discard the message appropriately at box 50. The user can add the sender information to his/her contact list or reject list at box 52.
[0027] The foregoing discloses and describes merely exemplary embodiments of the present invention. One skilled in the art will readily recognize from such discussion and from the accompanying drawings and claims, that various changes, modifications and variations can be made therein without departing from the spirit and scope of the present invention as defined by the following claims.

Claims

CLAIMS What is Claimed is:
1. A method for passing or rejecting e-mail messages, said method comprising: identifying a user controlled contact list; identifying a user controlled reject list; identifying a service provider controlled honorable business list; identifying a service provider controlled honorable user list identified as users having an honorable status; passing messages from a sender to a user if the sender is on the user contact list; rejecting messages intended to be sent to the user if the sender is on the user's reject list; selectively passing messages from a sender to the user if the sender is on the honorable business list; and selectively passing messages from a sender to the user if the sender is on the honorable user list.
2. The method according to claim 1 wherein selectively passing messages to the user if the sender is on the honorable business list includes determining whether the user has the honorable business list activated, and if so, sending the message to the user, and if not, holding the message and performing an authorization process to determine whether the user wants to receive the message.
3. The method according to claim 1 wherein selectively passing messages to the user if the sender is on the honorable user list includes determining whether the user has the honorable user list activated, and if so, sending the message to the user, and if not, holding the message and performing an authorization process to see if the user wants to receive the message.
4. The method according to claim 1 wherein the honorable business list is populated with businesses that do not send spam e-mail messages.
5. The method according to claim 1 wherein the honorable user list includes users that have accounts with the service provider and do not send spam e- mail messages.
6. The method according to claim 1 further comprising performing an authorization process for some e-mail messages to determine whether an e-mail message from a sender will be sent to the user.
7. The method according to claim 6 wherein the authorization process includes sending a return message to the sender requesting sender information, sending a message to the user with the sender information, approving or rejecting the message by the user, and sending the message or discarding the message depending on the user's decision.
8. The method according to claim 6 wherein performing the authorization process includes asking the sender to perform a task that is easy for human beings, but difficult for computers.
9. The method according to claim 6 wherein performing the authorization process includes performing the authorization process if the sender is on the honorable business list, but the user does not have the honorable business list feature activated, the sender is on the honorable user list, but the user does not have the honorable user list activated, or the sender is not on any of the contact list, the reject list, the honorable business list or the honorable user list.
10. A method for passing or rejecting e-mail messages, said method comprising: identifying a user controlled contact list; identifying a user controlled reject list; passing messages from a sender to a user if the sender is on the user contact list; rejecting messages intended to be sent to the user if the sender is on the user's reject list; and performing an authorization process for determining whether an e-mail message from a sender will be sent to the user if the sender is not on the contact list or the reject list.
11. The method according to claim 10 wherein the authorization process includes sending a return message to the sender requesting sender information, sending a message to the user with the sender information, approving or rejecting the message by the user, and sending the message or discarding the message depending on the user's decision.
12. The method according to claim 11 wherein performing the authorization process includes asking the sender to perform a task that is easy for human beings, but difficult for computers.
13. The method according to claim 11 wherein performing the authorization process includes asking the sender to go to an internet link to provider sender information.
14. The method according to claim 11 wherein the user controlled contact list can include full email addresses, partial email addresses and/or domain names.
15. A method for passing or rejecting e-mail messages, said method comprising: identifying a service provider controlled honorable business list; identifying a service provider controlled honorable user list; selectively passing messages from a sender to the user if the sender is on the honorable business list; and selectively passing messages from a sender to the user if the sender is on the honorable user list.
16. The method according to claim 15 wherein selectively passing messages to the user if the sender is on the honorable business list includes determining whether the user has the honorable business list activated, and if so, sending the message to the user, and if not, holding the message and performing an authorization process to determine whether the user wants to receive the message.
17. The method according to claim 15 wherein selectively passing messages to the user if the sender is on the honorable user list includes determining whether the user has the honorable user list activated, and if so, sending the message to the user, and if not, holding the message and performing an authorization process to see if the user wants to receive the message.
18. The method according to claim 15 further comprising performing an authorization process for some e-mail messages to determine whether an e-mail message from a sender will be sent to the user.
19. The method according to claim 18 wherein the authorization process includes sending a return message to the sender requesting sender information, sending a message to the user with the sender information, approving or rejecting the message by the user, and sending the message or discarding the message depending on the user's decision.
20. The method according to claim 18 wherein performing the authorization process includes performing the authorization process if the sender is on the honorable business list, but the user does not have the honorable business list feature activated, or the sender is on the honorable user list, but the user does not have the honorable user list activated.
21. A method for passing or rejecting e-mail messages, said method comprising: providing user controlled access lists that determine whether an e-mail message from a sender to a user will be sent to the user; and providing service provider controlled access lists that determine whether an e-mail message from a sender to a user will be sent to the user.
22. A method for classifying contacts for Internet users, said method comprising: providing a contact list for each user that has an account with a service provider where the contact list includes an e-mail address for each contact; providing a personal distance classification for contacts in the contact list that identifies personal distance information between the user and the contacts in the contact list; and using the personal distance information to allow the user to selectively communicate with the contacts in the contact list over the Internet using the classification.
23. The method according to claim 22 wherein providing a personal distance classification includes classifying the contacts in the contact list as family members, friends or business associates.
24. The method according to claim 22 wherein providing a personal distance classification includes providing classifications that identify a plurality of friend circles for a single user.
25. The method according to claim 22 wherein communicating with contacts in the contact list includes designating in the communication accessibility to the communication to a certain classification of contacts and a certain classification in the contact list of the contacts.
26. The method according to claim 25 wherein the classification is friends and friend's friends.
27. The method according to claim 22 wherein the communication includes posting a message on an electronic message board, and designating which classification of contacts can have access to the message.
28. The method according to claim 22 wherein the communication includes e-mail messages.
29. The method according to claim 22 wherein the contact information for a contact in the contact list includes using a pointer that points to a data storage area where the contact information is stored.
30. The method according to claim 29 wherein a user of the service provider can update contact information in the contact list of other users based on the classification.
31. A method for providing a classification of contacts for Internet users, said method comprising: providing a contact list for each user that has an account with a service provider; providing a personal distance classification for contacts in the contact list that identifies personal distance information between the user and the contacts in the contact list, wherein the personal distance classification includes classifying the contacts in the contact list as family members, friends or business associates, and wherein providing a personal distance classification includes providing classifications that identify a plurality of friend circles for a single user; and using the personal distance classification to allow the user to selectively communicate with the contacts in the contact list over the Internet.
32. The method according to claim 31 wherein communicating with contacts in the contact list includes designating in the communication accessibility to the communication to a certain classification of contacts and a certain classification in the contact list of the contacts.
33. The method according to claim 32 wherein the classification is friends and friend's friends.
34. The method according to claim 31 wherein the communication includes posting a message on an electronic message board, and designating which classification of contacts can have access to the message.
35. The method according to claim 31 wherein the communication includes e-mail messages.
36. The method according to claim 31 wherein the contact information for a contact in the contact list includes using a pointer that points to a data storage area where the contact information is stored.
37. The method according to claim 36 wherein a user of the service provider can update contact information in the contact list of other users based on the classification.
38. A method for providing Internet services including user personal distance information, said method comprising: providing a contact list for each user that has an account with a service provider; and assigning a personal distance classification for contacts in the contact list that identifies personal distance information between the user and the contacts in the contact list.
39. The method according to claim 38 wherein assigning a personal distance classification includes classifying the contacts in the contact list as family members, friends or business associates.
40. The method according to claim 38 wherein assigning a personal distance classification includes providing classifications that identify a plurality of friend circles for a single user.
PCT/US2007/062798 2006-02-27 2007-02-26 Method for providing e-mail spam rejection employing user controlled and service provider controlled access lists WO2007101149A2 (en)

Applications Claiming Priority (8)

Application Number Priority Date Filing Date Title
US77689406P 2006-02-27 2006-02-27
US60/776,894 2006-02-27
US88099807P 2007-01-19 2007-01-19
US60/880,998 2007-01-19
US11/678,280 2007-02-23
US11/678,271 US20080177846A1 (en) 2007-01-19 2007-02-23 Method for Providing E-Mail Spam Rejection Employing User Controlled and Service Provider Controlled Access Lists
US11/678,280 US20070203947A1 (en) 2006-02-27 2007-02-23 Method for Providing Internet Service Employing User Personal Distance Information
US11/678,271 2007-02-23

Publications (2)

Publication Number Publication Date
WO2007101149A2 true WO2007101149A2 (en) 2007-09-07
WO2007101149A3 WO2007101149A3 (en) 2008-11-06

Family

ID=38459774

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/062798 WO2007101149A2 (en) 2006-02-27 2007-02-26 Method for providing e-mail spam rejection employing user controlled and service provider controlled access lists

Country Status (1)

Country Link
WO (1) WO2007101149A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011060448A1 (en) * 2009-11-16 2011-05-19 Qualcomm Incorporated Methods and apparatus for determining costs associated with sending communications
US8526911B2 (en) 2009-11-16 2013-09-03 Qualcomm Incorporated Methods and apparatus for determining costs associated with sending communications
US20140040384A1 (en) * 2012-07-31 2014-02-06 Yakov Faitelson Email distribution list membership governance method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6691156B1 (en) * 2000-03-10 2004-02-10 International Business Machines Corporation Method for restricting delivery of unsolicited E-mail
US20040108208A1 (en) * 2001-08-03 2004-06-10 Kazuhiro Iida Separation apparatus and process for fabricating separation apparatus
US20040186895A1 (en) * 2003-03-21 2004-09-23 Ellis Robert A. System and method for managing electronic messages
US20050081059A1 (en) * 1997-07-24 2005-04-14 Bandini Jean-Christophe Denis Method and system for e-mail filtering
US20060031333A1 (en) * 2004-08-04 2006-02-09 O'neill Patrick J Method to populate white list

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050081059A1 (en) * 1997-07-24 2005-04-14 Bandini Jean-Christophe Denis Method and system for e-mail filtering
US6691156B1 (en) * 2000-03-10 2004-02-10 International Business Machines Corporation Method for restricting delivery of unsolicited E-mail
US20040108208A1 (en) * 2001-08-03 2004-06-10 Kazuhiro Iida Separation apparatus and process for fabricating separation apparatus
US20040186895A1 (en) * 2003-03-21 2004-09-23 Ellis Robert A. System and method for managing electronic messages
US20060031333A1 (en) * 2004-08-04 2006-02-09 O'neill Patrick J Method to populate white list

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011060448A1 (en) * 2009-11-16 2011-05-19 Qualcomm Incorporated Methods and apparatus for determining costs associated with sending communications
US8526911B2 (en) 2009-11-16 2013-09-03 Qualcomm Incorporated Methods and apparatus for determining costs associated with sending communications
US20140040384A1 (en) * 2012-07-31 2014-02-06 Yakov Faitelson Email distribution list membership governance method and system
US11151515B2 (en) * 2012-07-31 2021-10-19 Varonis Systems, Inc. Email distribution list membership governance method and system

Also Published As

Publication number Publication date
WO2007101149A3 (en) 2008-11-06

Similar Documents

Publication Publication Date Title
US7853989B2 (en) System for eliminating unauthorized electronic mail
US6868498B1 (en) System for eliminating unauthorized electronic mail
US7949764B2 (en) Method, system, and storage medium for validating users of communications services and messages transmitted
US7822977B2 (en) System for eliminating unauthorized electronic mail
US8185638B2 (en) Degrees of separation for handling communications
JP3717829B2 (en) Junk mail repelling system
US7831834B2 (en) Associating a postmark with a message to indicate trust
US20040064734A1 (en) Electronic message system
US20100017488A1 (en) Message Classification Using Allowed Items
US20060036701A1 (en) Messaging system having message filtering and access control
US7620691B1 (en) Filtering electronic messages while permitting delivery of solicited electronics messages
US10284504B2 (en) Address couplet communication filtering
US20040186895A1 (en) System and method for managing electronic messages
WO2009116054A2 (en) Method and system for organizing electronic mails
US20030233577A1 (en) Electronic mail system, method and apparatus
US20080177846A1 (en) Method for Providing E-Mail Spam Rejection Employing User Controlled and Service Provider Controlled Access Lists
WO2007101149A2 (en) Method for providing e-mail spam rejection employing user controlled and service provider controlled access lists
US20070203947A1 (en) Method for Providing Internet Service Employing User Personal Distance Information
US20090024735A1 (en) Method and system of controlling communications delivery to a user
JP2003196216A (en) Electronic mail address processing system
Hassan et al. Towards eradication of SPAM: A study on intelligent adaptive SPAM filters
KR20030036479A (en) Method, Program, Media, and Device to register authenticated membership for getting various service, transmit authenticated mail for supporting envarenment to call a spam sender to account
AU2003205033A1 (en) Electronic message system
JP2002351796A (en) System and method for substituting electronic mail safety management and mail server

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07757476

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 07757476

Country of ref document: EP

Kind code of ref document: A2