Method and apparatus for an adapted digital signature

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Having particular address related cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S028000, C380S264000, C713S153000, C713S155000, C713S176000, C713S190000, C713S152000

Reexamination Certificate

active

06615348

ABSTRACT:

FIELD OF THE INVENTION
This invention is related to the field of electronic messaging systems, and more particularly to a method and apparatus for creating an electronic userid.
BACKGROUND OF THE INVENTION
Junk e-mail or unsolicited bulk e-mail (“UBE”), referred to hereafter as “spam”, has become a significant problem. Users of electronic messaging applications are barraged with spam on a daily basis by spammers (those who create and send spam). Spammers usually advertise sham wares, services, pyramid schemes, and, even worse, they send electronic viruses.
Spam has grown in popularity for a number of reasons. Primarily, it is a low cost and fast medium through which messages can be delivered. Further, the ease with which a spammer can harvest e-mail addresses, for example, from joke lists, newsgroups, web pages and cookies, provides a steadily expanding audience to which spam can be directed.
Filters have been proposed and a few developed that attempt to reduce or eliminate spam from a user's mail host and/or e-mail client.
One type of spam filter is a sender filter. The sender filter rejects all messages from an untrusted source, such as by way of an authorized or an unauthorized sender list. Inbound e-mail messages are simply rejected based upon the source of the message (e.g., the “from:” address of a message header). A major problem with the sender filter is that the sender's identity is frequently spoofed as either a random sender (which bypasses the unauthorized sender list) or as a sender unlikely to be rejected (which bypasses the authorized sender list.)
Another example of a spam filter is a context filter. A context filter examines a message body or a message subject header and removes messages based upon key words or phrases a spammer is likely to include in the message (e.g., “get rich”, “work from home”, “call now ”, “porn”, “xxx”, etc.) A problem with context filters is that linguistic rules must be set up for a particular user in a particular environment. Moreover, language or context alone is inherently imprecise. Thus, context type filters generally suffer from an over-inclusiveness problem—meaning they filter more messages than they should because legitimate messages occasionally match the linguistic rules of the context filter.
Still another approach is the use of traditional encryption/decryption technology. Traditional encryption/decryption technology includes the use of shared encryption/decryption algorithms or keys (e.g., asymmetric or symmetric encryption). For example, in an asymmetric encryption/decryption system, a sender encrypts a message body using the intended recipient's public key. The recipient receives the encrypted message and decrypts it using her private key. A problem with this technique is that special equipment is required by both the sender and receiver—such as proprietary software or hardware. In a symmetric encryption solution, a secret key is shared between the sender and recipient. A problem here is that the shared key can easily be compromised. Moreover, encryption/decryption solutions can be computationally expensive and difficult to manage as compared to the low value of most e-mail messages. Some encryption/decryption solutions even require multiple handshaking and/or a real-time connection between the sender and receiver.
There is a need for a secure and trusted technique for identifying and filtering unauthorized electronic messages.
SUMMARY OF THE INVENTION
A method and apparatus for an adapted digital signature is provided. According to an aspect of the present invention, the adapted digital signature is generated using a digital signature engine and an adaptation algorithm.
According to one embodiment, a method for creating an adapted digital signature comprises: retrieving an originator key, the originator key corresponding to a local userid; running a digital signature engine to create a digital signature, the digital signature based on at least the originator key and remote user information; retrieving a word from a word list, the word indexed to at least a portion of the digital signature; and returning at least the word as the adapted digital signature.
According to another embodiment, a method for verifying an adapted digital signature comprises: retrieving an originator key based on a first portion of address information; generating an adapted digital signature based on the originator key and a second portion of the address information; comparing a third portion of the address information to the adapted digital signature; and accepting the electronic message if the third portion of the address information and the adapted digital signature match.
According to another embodiment, an electronic message system comprises: an authenticated message server configured to remove inbound electronic messages if an authenticated electronic userid cannot be verified; and a mail host coupled to the authenticated message server; and wherein the authenticated message server is configured to remove inbound electronic messages by performing the acts of: generating an adapted digital signature; comparing a portion of an inbound electronic message to the adapted digital signature; and rejecting the inbound electronic message if the portion of the inbound electronic message and the adapted digital signature do not match.


REFERENCES:
patent: 4281215 (1981-07-01), Atalla
patent: 4309569 (1982-01-01), Merkle
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4713780 (1987-12-01), Schultz et al.
patent: 4881264 (1989-11-01), Merkle
patent: 4934846 (1990-06-01), Gilham
patent: 4977595 (1990-12-01), Ohta et al.
patent: 5093918 (1992-03-01), Heyen et al.
patent: 5142577 (1992-08-01), Pastor
patent: 5204961 (1993-04-01), Barlow
patent: 5224164 (1993-06-01), Elsner
patent: 5231668 (1993-07-01), Kravitz
patent: 5307412 (1994-04-01), Vobach
patent: 5319710 (1994-06-01), Atalla et al.
patent: 5349649 (1994-09-01), Iijima
patent: 5351293 (1994-09-01), Michener et al.
patent: 5367573 (1994-11-01), Quimby
patent: 5371796 (1994-12-01), Avarne
patent: 5377354 (1994-12-01), Scannell et al.
patent: 5432852 (1995-07-01), Leighton et al.
patent: 5434918 (1995-07-01), Kung et al.
patent: 5473691 (1995-12-01), Menezes et al.
patent: 5479514 (1995-12-01), Klonowski
patent: 5493692 (1996-02-01), Theimer et al.
patent: 5537475 (1996-07-01), Micali
patent: 5539826 (1996-07-01), Dwork et al.
patent: 5542046 (1996-07-01), Carlson et al.
patent: 5592553 (1997-01-01), Guski et al.
patent: 5604803 (1997-02-01), Aziz
patent: 5606668 (1997-02-01), Shwed
patent: 5619648 (1997-04-01), Canale et al.
patent: 5638446 (1997-06-01), Rubin
patent: 5732137 (1998-03-01), Aziz
patent: 5740361 (1998-04-01), Brown
patent: 5751813 (1998-05-01), Dorenbos
patent: 5754659 (1998-05-01), Sprunk et al.
patent: 5764772 (1998-06-01), Kaufman et al.
patent: 5787178 (1998-07-01), Schwenk
patent: 5826022 (1998-10-01), Nielsen
patent: 5850446 (1998-12-01), Berger et al.
patent: 5852665 (1998-12-01), Gressel et al.
patent: 5857022 (1999-01-01), Sudia
patent: 5867578 (1999-02-01), Brickell et al.
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 5943426 (1999-08-01), Frith et al.
patent: 5958051 (1999-09-01), Renaud et al.
patent: 6356935 (2002-03-01), Gibbs
patent: WO 97/46962 (1997-12-01), None
patent: WO 97/49251 (1997-12-01), None
patent: WO 98/00787 (1998-01-01), None
patent: WO 98/18249 (1998-04-01), None
patent: WO 98/37680 (1998-08-01), None
patent: WO 98/51064 (1998-11-01), None
patent: WO 98/51116 (1998-11-01), None
patent: WO 99/04344 (1999-01-01), None
A. Arensburger, et al., To Take Arms Against a Sea of Email, Communication of the ACM, Mar. 1995, vol. 38, No. 3, pp. 108-109.
T. Bass, et al., A Simple Framework for Filtering Queued SMTP Mail (Cyberwar Countermeasures), MILCOM 97 Proceedings, Nov. 5, 1997, vol. 3, pp. 1140-1144.
M. Wagner, Cyber Junk, Computerworld, Aug. 26, 1996, vol. 30, No. 35, p. 28.
B. Cole-Gomolski, Message Managers Aim to Control Junk E-mail, Computerworld, May 5, 1997, vol. 31, No. 18.
G. Faulkner, A New and Nasty Way to Flood Networks wi

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for an adapted digital signature does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for an adapted digital signature, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for an adapted digital signature will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3097572

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.