Electrical computers and digital processing systems: multicomput – Computer conferencing – Demand based messaging
Reexamination Certificate
2005-03-15
2005-03-15
Harvey, Jack D. (Department: 2142)
Electrical computers and digital processing systems: multicomput
Computer conferencing
Demand based messaging
C709S207000, C709S203000, C707S793000, C707S793000, C707S793000
Reexamination Certificate
active
06868436
ABSTRACT:
A computer system and method for filtering unauthorized electronic mail messages that are sent by senders to a user. The system includes a list of the identifications of the senders who are authorized to send an electronic mail message to the user. When an electronic mail message is received, the system determines whether the sender of the electronic mail message is authorized by determining whether the identification of sender in the electronic mail message is in the list of the identifications of the senders who are authorized. When the sender of the electronic mail message is determined to be authorized, the system stores the electronic mail message in an Inbox folder. When the sender of the electronic mail message is determined to be not authorized, the system stores the electronic mail message in a Junk Mail folder. In this way, the electronic mail messages are automatically stored in the appropriate folder based on whether the sender is authorized so that the user can view the Inbox folder containing the electronic mail messages sent by authorized senders separately from the Junk Mail folder containing the electronic mail messages sent by unauthorized senders.
REFERENCES:
patent: 5283856 (1994-02-01), Gross et al.
patent: 5931905 (1999-08-01), Hashimoto et al.
patent: 6023723 (2000-02-01), McCormick et al.
patent: 6092101 (2000-07-01), Birrell et al.
“Specifying filter criteria” Nov. 4, 1995.*
http://mercea.net/exmh/html/exmh-users/1996-02/ms00023.html.*
http://www.math.uiuc.edut/consult/user_system/procfilt.html.*
Barrett, Randy, “ISPs Team Up to Cut Off Spam,” May 13, 1997,Inter@active Week, http://www5.zdnet.com/zdnn/content/inwk0028.html, pp. 1-4.
Quarterman, John S.,The Internet Connection: System Connectivity and Configuration, 1994, Texas Internet Consulting, U.S.A., Chapter 7.
Seminerio, Maria, “Spam Wars Head to Congress,” May 22, 1997,ZDNN, http://www5.zdnet.com/zdnn/content/zdnn/0522/zdnn0009.html, pp. 1-2.
Microsoft Corporation, “Excerpts from On-line documentation of Microsoft Exchange,” Version 5.0.1458.47, 1986-1997, 11 pp.
Collora et al.,Special Edition—Using Microsoft Exchange Server, Que Corporation, Indianapolis, IN, 1996, pp. 693-703.
Maes, P., “Agents that Reduce Work and Information Overload”, Jul., 1994, pp. 31-40.
Dorsey & Whitney LLP
Harvey Jack D.
Le Hieu
Micro)n Technology, Inc.
LandOfFree
Method and system for filtering unauthorized electronic mail... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for filtering unauthorized electronic mail..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for filtering unauthorized electronic mail... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3458425