Apparatus and method for precluding e-mail distribution

a technology for e-mail and apparatus, applied in the direction of instruments, data switching networks, unauthorized memory use protection, etc., can solve the problems of message overload, slow and expensive direct solicitation by telemarketing, and almost instantaneous receipt of error notifications

Inactive Publication Date: 2005-01-06
QUINSTREET
View PDF25 Cites 78 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When an e-mail message cannot be delivered, an error notification is also received almost instantaneously.
Direct solicitations by telemarketing is slow and expensive.
Unfortunately, the advantages of commercial message transmission by e-mail have caused such messages to overload networks that deliver them.
Perhaps unfortunately for Hormel, the word “spam” is now also being widely used to refer to unsolicited commercial e-mail messages sent to recipients who have not indicated a willingness to receive such unsolicited email messages from the send

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apparatus and method for precluding e-mail distribution
  • Apparatus and method for precluding e-mail distribution
  • Apparatus and method for precluding e-mail distribution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] A hash function is any mathematical algorithm that converts a variable-length string of letters and / or numbers into a fixed-length output string of letters and / or numbers. The output of a hash function is known as a “hash value” or “hash code.” Among other things, hash functions are used to create digital signatures of strings of characters.

[0012] As is well known, an e-mail address has at least three parts: a name or other designation of an addressee followed by a domain name and a domain. The name and domain name are usually separated by the “@” symbol.

[0013] E-mail addresses in general take the form of: [0014]@.

[0015] Where is an message recipient identifier.

[0016] Examples of e-mail addresses (all of which are fictitious) include: [0017] john.smith@xyz.com [0018] fred_morgan@abc.gov [0019] s.person@internetserviceprovider.com

[0020] A hash coder is considered to be a device or software-implementation of a hash function. A hash coder processes variable-length input str...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

E-mail addresses are converted by a hashing function into hash codes. An e-mail mass mailer that can have millions of addresses hash codes all addresses to which a message might be sent to form a first list. An entity that wishes to exclude delivery of a message to various e-mail addresses, hash codes such addresses to form a second list. Hash codes in the first list that are also in the second list are purged from the first list to yield a third list of hash codes, each of which represents an e-mail address to which a message may be sent.

Description

FIELD OF THE INVENTION [0001] This invention is directed to a method and apparatus for managing e-mail message transmission. More specifically, the present invention is directed to a method and apparatus by which proprietary e-mail addresses can be distributed to third party e-mail address filtration service providers. BACKGROUND OF THE INVENTION [0002] Electronic mail, which is also known as “e-mail,” is the transmission of messages over communication networks, such as the Internet. E-mail messages can take the form of notes that are entered into a computer using a keyboard. They can also take the form of attachments to messages. [0003] It is well known that e-mail has many advantages over other forms of communication. E-mail is much less expensive than mail service provided by the U.S. Postal Service (U.S.P.S.). Unlike the U.S.P.S. mail delivery, e-mail is delivered almost instantaneously. When an e-mail message cannot be delivered, an error notification is also received almost in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06FG06F11/30G06F12/14H04L9/00H04L9/32H04L12/58
CPCH04L51/28H04L51/12H04L51/212H04L51/48
Inventor SYIEK, BRONWYNBHANAP, NINAGOWDA, RAKESHGUNTHA, RAMESH
Owner QUINSTREET
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products