Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for blocking unwanted communications

a technology of unwanted communications and blocking methods, applied in the field of unwanted communications blocking methods and systems, can solve the problems of annoying electronic communications that are not suitable for people, and are often ignored by people receiving junk e-mail messages

Active Publication Date: 2009-11-17
CARTMELL BRIAN R +1
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result of these advantages, there is also an important disadvantage of electronic communications: junk mail, spam, and other types of unwanted electronic communications.
It is not uncommon for a person to receive many such unwanted and unsolicited e-mail messages a day.
People receiving such junk e-mail messages typically find them annoying.
Junk e-mail messages may also cause a person's inbox to become full and may make it difficult to locate and identify non-junk e-mail messages.
A disadvantage of these techniques for combating junk e-mail is that the recipients are responsible for specifying who is a junk sender and a non-junk sender.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for blocking unwanted communications
  • Method and system for blocking unwanted communications
  • Method and system for blocking unwanted communications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018]A method and system for authorizing communications sent from a sender to a recipient is provided. In one embodiment, the authorization system receives a communication (e.g., e-mail message or voice mail message) sent from a sender to a recipient. The authorization system determines whether that sender is authorized to send communications to that recipient. The authorization system may make this determination based on a list of senders who are authorized to send to that recipient. When the authorization system determines that sender is authorized, the authorization system provides the communication to the recipient. If the authorization system determines that the sender is, however, not authorized, then the authorization system sends an authorization communication to the sender. The authorization communication requests authorization information from the sender. In one embodiment, the request may be for authorization information that is difficult for a computer system to automat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for authorizing communications sent from a sender to a recipient. The authorization system receives a communication sent from a sender to a recipient. The authorization system determines whether that sender is authorized to send communications to that recipient. If the authorization system determines that the sender is not authorized, then the authorization system sends an authorization communication to the sender. The authorization communication requests authorization information from the sender. When the authorization system receives the authorization information, it determines whether the information is correct. If correct, then the authorization system indicates that the sender is authorized and forwards the communication to the recipient. When a subsequent communication sent from the sender to the recipient is received, the authorization system may automatically determine that the sender is authorized and forward the communication to the recipient without re-contacting the sender.

Description

BACKGROUND[0001]Electronic communications such as e-mail are being increasingly used for both business and personal uses. Electronic communications has many advantages over non-electronic communications such as postal mail. These advantages include low cost, rapid delivery, ease of storage, and so on. As a result of these advantages, there is also an important disadvantage of electronic communications: junk mail, spam, and other types of unwanted electronic communications. Because of its low cost and speed, many organizations use electronic communications to advertise. For example, a mortgage company may purchase a list of e-mail addresses and send an e-mail message containing an advertisement for the mortgage company to each e-mail address. It is not uncommon for a person to receive many such unwanted and unsolicited e-mail messages a day. People receiving such junk e-mail messages typically find them annoying. Junk e-mail messages may also cause a person's inbox to become full and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30H04L12/58H04L29/06
CPCH04L63/0254H04L63/083H04L51/212
Inventor CARTMELL, BRIAN R.ELLIOTT, CAMERON S.
Owner CARTMELL BRIAN R