AU2003244552B1 - Method and system for blocking unwanted e-mail - Google Patents
Method and system for blocking unwanted e-mail Download PDFInfo
- Publication number
- AU2003244552B1 AU2003244552B1 AU2003244552A AU2003244552A AU2003244552B1 AU 2003244552 B1 AU2003244552 B1 AU 2003244552B1 AU 2003244552 A AU2003244552 A AU 2003244552A AU 2003244552 A AU2003244552 A AU 2003244552A AU 2003244552 B1 AU2003244552 B1 AU 2003244552B1
- Authority
- AU
- Australia
- Prior art keywords
- sender
- addressee
- server
- addresses
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Landscapes
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Description
METHOD AND SYSTEM FOR BLOCKING UNWANTED E-MAIL The present invention relates to electronic mail and, in particular, to a method and system for reducing SPAM or unsolicited or junk e-mail sent indiscriminately to multiple mailing lists, individuals or news groups.
BACKGROUND TO THE INVENTION SPAM has become a major problem as it is generally computer generated and these computers are capable of generating millions of unwanted e-mails a day. As a person's e-mail address can become known through simple use such as sending personal or business e-mails across the internet, accessing internet sites and obtaining products which require e-mail information, etc. The more commonly known a person's e-mail address, the more likely that they will receive unwanted or SPAM e-mail. It is not uncommon for persons to receive up to 100 to 200 SPAM e-mails a day which results in time wasted determining which are wanted e-mails as opposed to SPAM, and then deleting the SPAM from their systems. It is estimated that 90 95% of the corporate server system is dedicated to managing SPAM which is a significant and unwanted overhead task.
A known method of managing SPAM is to filter the received e-mail based on its contents and to reject that e-mail that includes unacceptable words, eg viagra, however, a consequence is that sometimes wanted e-mail can be blocked and not received. Another method is to store the e-mail and challenge the sender, only forwarding the e-mail if the sender successfully responds to the challenge, however a consequence of this method is that a significant amount of e-mail is stored and never forwarded since most unsolicited email is SPAM.
OBJECT OF THE INVENTION It is an object of the present invention to provide a method and system of blocking unwanted e-mail and the like which substantially overcomes or ameliorates the above \\server\e\docs\patents\comp\12706amend.doc mentioned disadvantages. At the very least, the object of the invention is to provide an alternative to known systems.
DISCLOSURE OF THE INVENTION According to one aspect of the present invention there is disclosed a method blocking unwanted e-mail, SPAM or the like, said method including the steps of providing a system for determining an e-mail source address and comparing said e-mail source address with a stored list of known addresses, wherein if e-mail is from a known source, allowing the e-mail to proceed to addressee and if the e-mail is from a known undesirable source, preventing the mail from proceeding to the addressee, and if e-mail is from an unknown source, responding to the sender's mail server in such a way that a personal sender is aware of an action to be taken to be authorized to send e-mail to the addressee and the sender's server cannot determine that the receiving address exists and if the sender correctly takes the steps to be authorized, allowing the e-mail to proceed to the addressee and not storing the original e-mail for this purpose.
Preferably, the step of responding to the sender requesting an action that includes the step of requesting identification of an identifiable item in the e-mail. In the preferred form, this step of returning the mail to the sender requesting a reply includes the step of including an identifiable item in the mail to the sender and requesting the sender to identify the item, whereby if the item is identified correctly, the mail is allowed to proceed to the addressee.
In another preferred form, this step of returning the mail to the sender requesting a reply includes the step of including a link to a web page which contains an identifiable item in the returned mail to the sender and requesting the sender to identify the item, whereby if the item is identified correctly, the mail is allowed to proceed to the addressee.
Preferably, the identifiable item can be a picture or some special text or the like whereby the picture or special text or the like cannot be identified by a computer but requires a personal response of identification.
\\server\e\docs\patents\comp\l27O6amend.doc In a preferred form, before the mail is allowed to proceed to the addressee, the system provides details of the sender to the addressee who has the option of receiving or blocking the mail. In a preferred form, this step can occur prior to returning the mail to sender requesting a reply.
Preferably, the addressee has the option of authorizing senders who are added to the stored list of known addresses. In a preferred form, receivers of outgoing mail are added to the stored list of known addresses, ie they are authorized to send mail to the addressee.
Preferably the method includes the steps of providing a stored list of addresses from which all mail is to be blocked.
Preferably, the system interrogates the incoming mail header and thereby prevents contents of mail from unknown or blocked source even being received by the server.
Preferably the system replies to sender that mail is blocked in such a way that only a human will recognise the action required to be authorized.
Preferably, the method includes the steps of blocking mail servers and IP addresses.
In a preferred form the method includes the step of an administrator or user of identifying users, mail servers and IP addresses as being allowed to send mail.
In another preferred form, the method includes the step of providing a reporting facility which enables users of the system to inspect the actions of the system.
BRIEF DESCRIPTION OF THE DRAWINGS The present invention will be now be described with reference to the accompanying drawing by which: \\server\e\docs\patents\comp\1 2706amend.doc Fig. 1 is a schematic block diagram of a mail management system of a preferred embodiment.
BEST MODE OF CARRYING OUT THE INVENTION A system 10 of a preferred embodiment of mail management is shown in Fig. 1. A mail management system 11 is seen connected to the internet 12 by a firewall 13. The mail management system 11 is installed on a server machine behind the firewall 13 on a SMTP gateway 14. The gateway 14 includes a SMTP receiver and e-mail boxes 15 and a SMTP transmitter 16. The SMTP receiver and e-mail boxes 15 portion of the gateway 14 is connected to the e-mail users 17. The SMTP servers can be any software on any platform and the user's e-mail client can be any software on any platform.
The mail management system 11 allows each e-mail user to manage their own mail management in the preferred embodiment even though a central administrator can override the individual user's management if desired.
Configuration of the system 11 is such that a list of stored addresses, whether specific (eg [email protected]) or group addresses (eg mail.com) or TCP/IP address or any combination of the three, are used by the system 11 to block unwanted mail. This filtering of addresses preferably works on a hierarchical basis whereby if the group address (mail.com) is blocked, but a specific address ([email protected]) within the group is not blocked, only the specific address in the group domain (mail.com) will be allowed.
The system 10 works in a away such that all mail is received at the server and if allowed will pass through to the user. If the mail is not identified by the list of allowable addresses, it is rejected and if the address is on the list of blocked addresses, the mail is also blocked.
The rejection of the mail occurs before the content of the mail is sent to the server and as such is not received. A SMTP reply is sent to the sender of the e-mail indicating that they must be authorized to send mail to the addressee. And contains instructions of how to be \server\e\docs\patents\comp\12706amend.doc authorized. The sender can apply to be authorized to send e-mails by sending a mail to a specific authorizing address. This address is preferably dynamic and changes for each blocked e-mail. The instructions can also include an identifiable item in the returned mail to the sender and request the sender to identify the item, whereby if the item is identified correctly, the mail is allowed to proceed to the addressee. The identifiable item can be a picture or some special text or the like whereby the picture or special text or the like cannot be identified by a computer but requires a personal response of identification. In another embodiment, the returned mail contains a link to a web page which contains the identifiable item.
Following the receipt of an application for authorisation, the system 11 forwards a message to the user stating that there is a request for e-mail authorisation. The user can approve the sender responding to the e-mail or configure the system 11 to automatically authorise anyone who requests authorisation. This option is based on the assumption that computer generated SPAM mail will not have the ability to request authorisation. Once a sender has been authorised, their address is included in the authorised list. An address which has been authorised can be unauthorised or blocked at a later date.
The system 10 also allows for an address to be authorised if the user sends mail to that address without the need for user intervention.
The advantages of the systems of the preferred embodiments of the present invention ensures that all SPAM is blocked from being received. A further advantage is that the SPAM mail server cannot be aware that the mail has been rejected, but in most instances, the personal sender will understand what they must do to be authorised. If the system is installed on a network of an organisation, this benefit frees up network capacity, reduces data costs and the number of mails that must be scanned by virus protection systems.
There is also a reduced amount of wasted time in handling unwanted SPAM in any way, eg no inspection, no filtering, no content checking etc.
As the system is installed on an organisation's SMTP gateway, and not a a desktop computer, it is easy to implement and administer both centrally and by users.
\\server\e\docs\patents\comp\12706amend.doc The system also ensures that only personally sent e-mails can be received as machine sent e-mails are blocked.
Throughout the specification and claims, the word "comprise" and its derivatives are intended to have an inclusive rather than exclusive meaning unless the context requires otherwise.
The foregoing describes only some embodiments of the present invention, and modifications obvious to those skilled in the art can be made thereto without departing from the scope of the present invention.
\\server\e\docs\patents\comp\12706amend.doc
Claims (13)
1. A method blocking unwanted e-mail, SPAM or the like, said method including the steps of providing a system for determining an e-mail source address and comparing said e-mail source address with a stored list of known addresses, wherein if mail is from a known source, allowing the mail to proceed to addressee, and if mail is from a known undesirable source, preventing the mail from proceeding to the addressee, and further including the step that if mail is from an unknown source, responding to the sender's mail server in such a way that a personal sender sender is aware of an action to be taken to be authorized to send e-mail to the addressee and the sender's server cannot determine that the receiving address exists and if the sender correctly takes the steps to be authorized, allowing the e-mail to proceed to the addressee and not storing the original e-mail for this purpose.
2. The method according to claim 1, wherein the step of responding to the sender requesting an action that includes the step of requesting identification of an identifiable item associated with the mail whereby if the item is identified correctly, further mail from the sender is allowed to proceed to the addressee.
3. The method according to claim 2, wherein the identifiable item is included in the mail to the sender and the sender is requested to identify the item.
4. The method according to claim 2, wherein the identifiable item associated with the returned mail includes the step of including a link to a web page in the mail, the web page containing an identifiable item, to the sender and requests the sender to identify the item. The method according to any one of claims 2, 3 or 4, wherein the identifiable item can be a picture or some special text or the like whereby the picture or special text or the like cannot be identified by a computer but requires a personal response of identification. \\server\e\docs\patents\comp\1l2706amend.doc
6. The method according to any one of the preceding claims, wherein before the mail is allowed to proceed to the addressee, the system provides details of the sender to the addressee who has the option of receiving or blocking mail.
7. The method according to claim 6, wherein addressee has the option to receive or block the mail prior to responding to the sender.
8. The method according to claim 7, wherein the addressee has the option of authorizing senders who are added to the stored list of known addresses.
9. The method according to claim 8, wherein receivers of outgoing mail are added to the stored list of known addresses. The method according to any one of the preceding claims, wherein the method includes the steps of providing a stored list of addresses from which all mail is to be blocked.
11. The method according to any one of the preceding claims, wherein the system interrogates the incoming mail header and thereby prevents contents of mail from unknown or blocked source being received by server.
12. The method according to claim 11, wherein the system replies to sender that mail is blocked in such a way that the sender is unaware that the mail was ever received.
13. The method according to any one of the preceding claims, wherein the method includes the steps of blocking mail servers and IP addresses.
14. The method according to any one of the preceding claims, wherein the method includes the step of an administrator or user of identifying users, mail servers and IP addresses as being allowed to send mail. \\server\e\docs\patents\comp\12706amend.doc The method according to any one of the preceding claims, wherein the method includes the step of providing a reporting facility which enables users of the system to inspect the actions of the system.
16. A method blocking unwanted e-mail, SPAM or the like, said method being substantially as described with reference to the accompanying drawing. DATED this TWENTY-NINTH day of JANUARY 2004 NEW MILLENNIUM SOLUTIONS PTY LTD Patent Attorneys for the Applicant CHRYSILIOU LAW \\server\e\docs\patents\comp\12706amend.doc
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2003244552A AU2003244552B1 (en) | 2003-09-04 | 2003-09-04 | Method and system for blocking unwanted e-mail |
AU2004201160A AU2004201160B2 (en) | 2003-09-04 | 2004-03-22 | Method and system for blocking unwanted e-mail |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2003244552A AU2003244552B1 (en) | 2003-09-04 | 2003-09-04 | Method and system for blocking unwanted e-mail |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2004201160A Division AU2004201160B2 (en) | 2003-09-04 | 2004-03-22 | Method and system for blocking unwanted e-mail |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2003244552B1 true AU2003244552B1 (en) | 2004-04-29 |
Family
ID=34230034
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2003244552A Ceased AU2003244552B1 (en) | 2003-09-04 | 2003-09-04 | Method and system for blocking unwanted e-mail |
AU2004201160A Ceased AU2004201160B2 (en) | 2003-09-04 | 2004-03-22 | Method and system for blocking unwanted e-mail |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2004201160A Ceased AU2004201160B2 (en) | 2003-09-04 | 2004-03-22 | Method and system for blocking unwanted e-mail |
Country Status (1)
Country | Link |
---|---|
AU (2) | AU2003244552B1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999010817A1 (en) * | 1997-08-26 | 1999-03-04 | Christopher Alan Cobb | A method and system for filtering electronic messages |
US5956491A (en) * | 1996-04-01 | 1999-09-21 | Marks; Daniel L. | Group communications multiplexing system |
US6112227A (en) * | 1998-08-06 | 2000-08-29 | Heiner; Jeffrey Nelson | Filter-in method for reducing junk e-mail |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6546416B1 (en) * | 1998-12-09 | 2003-04-08 | Infoseek Corporation | Method and system for selectively blocking delivery of bulk electronic mail |
WO2003044617A2 (en) * | 2001-10-03 | 2003-05-30 | Reginald Adkins | Authorized email control system |
-
2003
- 2003-09-04 AU AU2003244552A patent/AU2003244552B1/en not_active Ceased
-
2004
- 2004-03-22 AU AU2004201160A patent/AU2004201160B2/en not_active Ceased
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5956491A (en) * | 1996-04-01 | 1999-09-21 | Marks; Daniel L. | Group communications multiplexing system |
WO1999010817A1 (en) * | 1997-08-26 | 1999-03-04 | Christopher Alan Cobb | A method and system for filtering electronic messages |
US6112227A (en) * | 1998-08-06 | 2000-08-29 | Heiner; Jeffrey Nelson | Filter-in method for reducing junk e-mail |
Also Published As
Publication number | Publication date |
---|---|
AU2004201160B2 (en) | 2009-12-17 |
AU2004201160A1 (en) | 2004-05-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7197539B1 (en) | Automated disablement of disposable e-mail addresses based on user actions | |
US6460050B1 (en) | Distributed content identification system | |
US7529802B2 (en) | Method for performing multiple hierarchically tests to verify identity of sender of an email message and assigning the highest confidence value | |
US8126971B2 (en) | E-mail authentication | |
US8874662B2 (en) | Method and apparatus for controlling unsolicited messages in a messaging network using an authoritative domain name server | |
US20060004896A1 (en) | Managing unwanted/unsolicited e-mail protection using sender identity | |
US7546349B1 (en) | Automatic generation of disposable e-mail addresses | |
US20030149726A1 (en) | Automating the reduction of unsolicited email in real time | |
US20030212791A1 (en) | Method and system for authorising electronic mail | |
US20070180031A1 (en) | Email Opt-out Enforcement | |
US20060036701A1 (en) | Messaging system having message filtering and access control | |
US20080082658A1 (en) | Spam control systems and methods | |
US10284597B2 (en) | E-mail authentication | |
US20080177843A1 (en) | Inferring email action based on user input | |
US20050223076A1 (en) | Cooperative spam control | |
US8590002B1 (en) | System, method and computer program product for maintaining a confidentiality of data on a network | |
US20040243847A1 (en) | Method for rejecting SPAM email and for authenticating source addresses in email servers | |
US20200287908A1 (en) | System and method for protecting against e-mail-based cyberattacks | |
US20060235930A1 (en) | Method to counter junk e-mail by limiting validity of e-mail addresses | |
AU2004201160B2 (en) | Method and system for blocking unwanted e-mail | |
Moore | Recommendations for automatic responses to electronic mail | |
US9361602B1 (en) | Temporary electronic mail addresses | |
US20070192420A1 (en) | Method, apparatus and system for a keyed email framework | |
JP3770855B2 (en) | Mail server management system with spam mail transmission stop function | |
Neumann et al. | Spam, spam, spam! |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGA | Letters patent sealed or granted (standard patent) | ||
MK14 | Patent ceased section 143(a) (annual fees not paid) or expired |