Information security – Access control or authentication – Network
Reexamination Certificate
2006-05-02
2006-05-02
Jung, David (Department: 2134)
Information security
Access control or authentication
Network
C726S005000, C726S003000
Reexamination Certificate
active
07039949
ABSTRACT:
A method and system for authorizing communications sent from a sender to a recipient. The authorization system receives a communication sent from a sender to a recipient. The authorization system determines whether that sender is authorized to send communications to that recipient. If the authorization system determines that the sender is not authorized, then the authorization system sends an authorization communication to the sender. The authorization communication requests authorization information from the sender. When the authorization system receives the authorization information, it determines whether the information is correct. If correct, then the authorization system indicates that the sender is authorized and forwards the communication to the recipient. When a subsequent communication sent from the sender to the recipient is received, the authorization system may automatically determine that the sender is authorized and forward the communication to the recipient without re-contacting the sender.
REFERENCES:
patent: 5604792 (1997-02-01), Solomon et al.
patent: 6199102 (2001-03-01), Cobb
patent: 6691156 (2004-02-01), Drummond et al.
patent: 6868498 (2005-03-01), Katsikas
Sorkin, D., “Technical and Legal Approaches to Unsolicited Electronic Email,” 35 U.S.F. L. Rev. 325, Apr. 2001, pp. 325-330 and 347-354.
Habraken, “Lesson 9, Creating Email,” Teach Yourself Microsoft Outlook 98 in 10 minutes, Sams Publishing, Apr. 1998, pp. 1-5.
Wikipedia, “Letter,” Encyclopedia, available at http://en.wikipedia.org/wiki/Letter, p. 1.
Angwin, J., “Postal Service to deliver the e-mail,” The Wall Street Journal Online, Jul. 30, 2000, pp. 1-7.
Automatic access controls in the Defense Message System (DMS); Dzierzawski, D.; Military Communications Conference Proceedings, 1999. MILCOM 1999. IEEE vol. 2, Oct. 31-Nov. 3, 1999 Page(s):1262-1266 vol. 2.
Establishing a secure multicast group for remote software delivery; Lin Han et al.; Enabling Technologies: Infrastructure for Collaborative Enterprises, Proceedings. IEEE 8th International Workshops on Jun. 16-18, 1999 Page(s):194-195.
Authorization in the digital library: secure access to services across enterprise boundaries; Ching et al.; Research and Technology Advances in Digital Libraries, Proceedings of the Third Forum on May 13-15, 1996 Page(s) 110-119.
Cartmell Brian Ross
Elliott Cameron Scott
Jung David
Newman & Newman Attorneys at Law, LLP
LandOfFree
Method and system for blocking unwanted communications does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for blocking unwanted communications, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for blocking unwanted communications will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3620748