US20080196094A1 - Method and system for restricting access to an electronic message system - Google Patents

Method and system for restricting access to an electronic message system Download PDF

Info

Publication number
US20080196094A1
US20080196094A1 US11/983,816 US98381607A US2008196094A1 US 20080196094 A1 US20080196094 A1 US 20080196094A1 US 98381607 A US98381607 A US 98381607A US 2008196094 A1 US2008196094 A1 US 2008196094A1
Authority
US
United States
Prior art keywords
electronic message
server system
electronic
server
user device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/983,816
Inventor
Dirk Leonard Benschop
Henderik Reinout Benschop
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DLB Finance and consultancy BV
HITD Information Tech BV
Original Assignee
DLB Finance and consultancy BV
HITD Information Tech BV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DLB Finance and consultancy BV, HITD Information Tech BV filed Critical DLB Finance and consultancy BV
Assigned to DLB FINANCE & CONSULTANCY B.V. reassignment DLB FINANCE & CONSULTANCY B.V. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BENSCHOP, DIRK LEONARD, BENSCHOP, HENDERIK REINOUT
Assigned to DLB FINANCE & CONSULTANCY B.V., HITD INFORMATION TECHNOLOGY B.V. reassignment DLB FINANCE & CONSULTANCY B.V. CORRECTIVE ASSIGNMENT TO CORRECT THE ADD ADDITIONAL ASSIGNEE PREVIOUSLY RECORDED ON REEL 020474 FRAME 0342. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT OF ASSIGNOR'S INTEREST. Assignors: BENSCHOP, DIRK LEONARD, BENSCHOP, HENDERIK REINOUT
Publication of US20080196094A1 publication Critical patent/US20080196094A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2201/00Electronic components, circuits, software, systems or apparatus used in telephone systems
    • H04M2201/18Comparators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/20Aspects of automatic or semi-automatic exchanges related to features of supplementary services
    • H04M2203/2005Temporarily overriding a service configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • H04M3/382Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service

Definitions

  • aspects of the invention relates to a method and system for restricting access to an electronic message system. More specifically, aspects relate to a method and system for restricting access to an electronic message system, the system comprising a server system capable of transmitting an electronic message from a first user device to one or more second user devices.
  • E-mail spam may generally be defined as unsolicited and/or undesired e-mail messages received by an e-mail recipient.
  • e-mail spam filters can be installed both on the side of the server and on the side of the client devices to detect and delete e-mail spam messages without troubling the user.
  • these filters analyse e-mail messages and match the analysis results against e-mail spam rules in order to recognize e-mail spam.
  • e-mail spam rules are designed on the basis of known typical characteristics of e-mail spam messages, such as the number of addressees in the e-mail header or the occurrence of certain words in the e-mail body.
  • e-mail spam filters are installed, the filters analyze each individual e-mail message in order to detect e-mail spam messages. As a consequence, message transfer is delayed and resources are wasted.
  • a method for restricting access to an electronic message system comprises a server system capable of transmitting an electronic message from a first user device to one or more second user devices.
  • the method involves receiving an electronic message from the first user device and providing the electronic message or a portion thereof to one or more of the second user devices.
  • a portion of an electronic message may e.g. comprise one or more fields of the electronic message or a new portion assembled on the basis of fields or characteristics of the electronic message.
  • Spam notification signals may be received for the electronic message or the portion thereof from one or more of the second user devices.
  • the method involves restricting access to the server system for the (user of the) first user device in response to receiving said one or more spam notification signals.
  • the applicant also proposes a computer program and a carrier (e.g. computer readable media) containing such a computer program, wherein the computer program contains software code portions or instructions capable of, when installed in and executed by an electronic device, performing the method described in the previous paragraph.
  • a carrier e.g. computer readable media
  • a server system is proposed that is capable of transmitting an electronic message from a first user device to one or more second user devices.
  • the server system comprises an electronic message receiver arranged for receiving an electronic message from the first user device and an electronic message provider arranged for providing the electronic message or a portion thereof to one or more of the second user devices.
  • a spam notification signal receiver is provided for receiving one or more spam notification signals relating to the electronic message or the portion thereof from one or more of the second user devices.
  • the server system contains an access restrictor adapted to restrict access to the server system for (a user of) the first user device in response to receiving said one or more spam notification signals.
  • access to the server system may be restricted for a user device and/or the user of the user device, the latter option making use of e.g. identification data of the user.
  • server system does not necessarily refer to a client-server system.
  • aspects of the invention may also be applicable in peer-to-peer networks, such as e.g. used for bittorrent applications, wherein a server or server functionality may be considered to be part of one or more user devices of the peer-to-peer network.
  • the spam notification signal may then e.g. be broadcast over the peer-to-peer network from one user device to others.
  • the method and system may be embodied as a web application.
  • the number of spam notification signals required to restrict access to the server system may be set.
  • the number of spam notification signals may be set to 50, 25, 10, 5 or even 1 before server system access is prohibited.
  • the applicant has realized that the employment of prior art e-mail spam filters is dissatisfactory.
  • the rule set used for recognizing e-mail spam messages is always outdated, despite the regular updates of the rule set provided by the spam filter developers.
  • the applicant proposes to use (in one embodiment solely use) spam notification signals from users to detect electronic spam messages and, upon receipt of such a spam notification signal, to restrict access to server system for the sender of the electronic spam message.
  • the server system thus allows that addressees of an electronic message themselves determine what electronic messages are spam messages and that the addressees are subsequently able to restrict the access (rights) of the sender of that message to the server system.
  • the sender may thus be excluded from further use of the server system.
  • the spam notification signal is an order to the server system to restrict access to the server system. In case of multiple spam notification signals, each signal can be regarded as a partial order.
  • Spam filters using spam recognition rule sets, spam parameters and criteria may be absent in the server system, at least for those electronic messages for which a spam notification signal has been received.
  • claims 2 and 24 provide the possibility of the server system sending a warning signal to the sender of the electronic message for which a spam notification signal was received. This allows for providing the sender with information concerning the consequences of further offences. The consequence of restricting access to the server system can be obtained by the embodiments of claims 3 and 25 .
  • claims 4 and 26 provide for various mitigation mechanisms to mitigate the restriction of the access rights to the server system.
  • the applicant proposes to restrict access to the server system for senders of the electronic message for which the at least one spam notification signal was received in dependence of a communication history between said sender and one or more addressees from which a spam notification signal was received.
  • access restriction to the server system may be performed immediately if the sender is unknown to a recipient (e.g. if the sender and recipient have not exchanged electronic messages previously) and the recipient issues a spam notification signal.
  • the sender and recipient know each other, access to the server system is not restricted immediately in response to a spam notification signal issued from the user device of a known recipient (but possibly only after spam notification signals have been received for different electronic messages).
  • claims 5 , 6 , 27 and 28 provide the advantage of establishing a subscriber-only system for electronic message distribution. Since the subscribers are known, e-mail spammers and other abusers of the system can be identified and excluded from participation of subscribers to the system. Moreover, this embodiment allows identification of users of the server system to exclude users from the system.
  • Secure communication may be realized by one or more known techniques, such as encrypting data or providing secure network connections.
  • the embodiments of claims 8 and 30 allow addressees to inform the system of possible electronic spam.
  • the perception of human beings of an electronic message is the best guarantee of spam recognition.
  • the spam notification signal received by the system may initiate operations by the system on the electronic message (and possible other previous or future electronic messages).
  • the number of spam notification signals required to restrict access to the electronic message may be set. For example, the number of spam notification signals may be set to 50, 25, 10, 5 or even 1 before access to the electronic message is prohibited.
  • the embodiments of claims 9 and 31 provide the advantage of limited use of resources.
  • only small portions e.g. less than 200 bytes or 100 bytes characterizing the original electronic message are made available to the addressees.
  • These portions may e.g. include a sender identification, a subject of the electronic message, a date of the electronic message and/or a retrieval key containing information where and/or how to retrieve the complete electronic message.
  • the portions of the electronic message may either be pushed to the servers of the server system or be queried from a particular server of the server system, if needed.
  • resource consuming processing and network capacity requirements are reduced considerably.
  • Electronic resources are also saved by the embodiments of claims 10 - 13 and claims 32 - 35 .
  • claims 14 and 36 allow for not troubling each user of a user device with the electronic spam message and/or the transmitted portion thereof for which he was an addressee.
  • claims 15 - 17 and 37 - 39 provide the advantage of enabling users to restrict access to other previous and/or future electronic messages from the same source on the basis of a sender identification of an electronic message for which a spam notification signal was received. Provisions can be made to mitigate the severity of such a measure for the sender on the basis of various parameters, such as the number of offences of the sender.
  • the applicant proposes to restrict access to other electronic messages for addressees of the electronic message for which the at least one spam notification signal was received in dependence of a communication history between said sender and said one or more addressees from which a spam notification signal was received.
  • access restriction to other electronic messages may be performed immediately if the sender is unknown to the recipient (e.g. if the sender and recipient have not exchanged electronic messages previously). However, if the sender and recipient know each other, access to other electronic messages is not restricted at once (but possibly only after spam notification signals have been received for different electronic messages).
  • server system may employ spam filters in addition to the functionality described in the present application.
  • server system as defined above operates independently from the operation of these possible spam filters as defined in claims 18 and 40 .
  • the embodiments of claims 19 and 41 allow for the approval for exchange of electronic messages in advance.
  • the approval module may be combined by a mandatory address book that the users should use for indicating addressees of an electronic message.
  • claims 20 and 43 allow for a very effective and simple system for reducing unsolicited electronic mail distribution.
  • the server system would not comprise an e-mail server.
  • E-mail servers typically only store electronic messages and forward the messages upon request.
  • the embodiment of claim 42 proposes to use programmable databases.
  • Programmable databases allow to program predetermined responses in dependence on the type of request received.
  • the users are allowed to perform an operation (requests) on a database, wherein the response of the database is e.g. the restriction of access for other addressees of the electronic message, the restriction of access to other electronic messages of the same source and/or the exclusion of the sender from the system.
  • the response of the database is e.g. the restriction of access for other addressees of the electronic message, the restriction of access to other electronic messages of the same source and/or the exclusion of the sender from the system.
  • such a programmable database allows for monitoring relations between several parameters.
  • the applicant also proposes a user device comprising software code portions and a computer program comprising these software code portions for engaging in one or more steps of the above described method and/or to communicate with the above-described server system.
  • the applicant also proposes a communication system for exchanging electronic message comprising a server system and the first and second user devices.
  • FIG. 1 shows a schematic example of a communication system for exchanging electronic messages
  • FIG. 2 shows a schematic example of a server system
  • FIG. 3 shows a flow chart depicting steps of a method for reducing the proliferation of electronic messages for the communication system of FIG. 1 ;
  • FIG. 4 illustrates another example of a communication system for exchanging electronic messages
  • FIG. 5 shows a flow chart depicting steps of a method for reducing the proliferation of electronic messages for the communication system of FIG. 4 .
  • FIG. 6 shows an exemplary model for a database of a server of a server system according to an embodiment of the invention.
  • FIGS. 1 and 2 show a server system 1 according to an embodiment of the invention.
  • the server system 1 is connected to a first user device I and second user devices IIA and IIB via network connections 2 .
  • the network connections 2 may involve multiple networks, both wired and wireless, and the connection of the user devices I, IIA and IIB is not necessarily direct to the server system 1 .
  • the first and second user devices I, IIA and IIB are arranged for sending and receiving electronic messages, such as e-mail messages, and may be personal computers, mobile communication devices etc.
  • the server system 1 comprises a processor 10 , a memory 11 and a network adapter 12 for communicating with the first and second user devices I, IIA and IIB. It should be appreciated that the server system 1 is normally capable of connecting to more than the three user devices shown in FIG. 1 .
  • server system 1 The specific functions of the server system 1 are schematically illustrated in FIG. 2 and will now be described in further detail. It should be appreciated that the functions may be largely implemented as software code portions of one or more computer programs executed by the processor 10 .
  • the server system 1 is arranged to receive an electronic message from the first user device I.
  • the server system 1 comprises an electronic message receiver 13 arranged for receiving an electronic message or a portion thereof and an electronic message provider 14 arranged for providing said electronic message or said portion thereof to the second user device IIA.
  • the server system 1 also contains a spam notification receiver 15 arranged for receiving a spam notification signal from the second user device IIA related to the electronic message or the portion thereof.
  • the server system 1 comprises an access restrictor 16 arranged for restricting access to the server system 1 for the (user of the) first user device I in response to receiving one or more spam notification signals.
  • the access restrictor 16 is adapted to restrict access to the server system 1 for a sender of the electronic message for which said spam notification signal was received, i.e. the sender using the first user device I. Restriction of the access may involve excluding the user of the first user device I from further sending of electronic messages via the server system 1 .
  • the server system 1 may comprise an assessor module 17 arranged to restrict access to the server system in dependence on e.g. the number of spam notification signals received for electronic messages of the sender and/or the number of times access has been restricted for electronic messages of the sender.
  • a communication history between a sender and the recipient from which a spam notification signal was received may be taken into account. For example, if the users of the first user device I and the second user device IIA have not been engaged in electronic message exchange before (i.e. the users don't ‘know’ each other), the receiving of the spam notification signal may immediately result in preventing access to the server system 1 for the sender. However, if the user of the first user device I and the second user device IIA have been involved in electronic message exchange in the past (i.e. the users ‘know’ each other), consequences of the spam notification signal may be less severe for the user of the first user device I. Another example of users ‘knowing’ each other may be that each of the users have indicated prior to exchange of electronic message that they will accept electronic messages from each other.
  • the server system 1 comprises a warning message transmitter 18 adapted for sending a warning message to a sender of the electronic message for which said spam notification signal was received from the second user device IIA.
  • the server system 1 has a register 19 storing a unique login code comprising a user name and a user specific password required for accessing the server system 1 for each user of the user devices I, IIA and IIB.
  • the server system 1 contains an encryptor 20 for encrypting part or all communications between the server system 1 and the first and second user devices I, IIA and IIB. It is noted that alternatively, or in addition thereto, the network connections 2 may be secured. Secure communication prevents or reduces the possibility of sniffing identities of (the users of) the first and second user devices I, IIA and IIB.
  • the server system 1 may be arranged to make a copy of the electronic message for both second user device IIA and IIB. However, it may also be that the server system 1 only stores a single copy of the electronic message received from the first user device I.
  • the server system 1 also contains a further access restrictor 21 for restricting access to the electronic message for the (user of) the second user device IIB solely in response to receiving a spam notification signal from the second user device IIA.
  • the server system 1 has an electronic message deleter 22 for deleting the electronic message and the copies and/or portions thereof, if any, in response to the spam notification signal from the second user device IIA.
  • the server system 1 has a sender identification storage 23 arranged for storing a sender identification of a sender of the electronic message for which the spam notification signal receiver 15 received a spam notification signal, i.e. the identification of the user of the first user device I.
  • the further access restrictor 21 may e.g. use the sender identification to restrict access to these further electronic messages for the second user device IIB automatically, i.e. without requiring a further spam notification signal for these further electronic messages.
  • access restrictions may apply also for the (user of the) second user device IIA.
  • the further access restrictor 21 may be arranged such that e.g. access is restricted for the (user of the) second user device IIB for a particular time period or to a part of the other electronic messages. However, the further access restrictor 21 may also prevent downloading of the electronic message to said second user device or prevent display of the electronic message on the second user device II.
  • a communication history between a sender and the recipient from which a spam notification signal was received may be taken into account. For example, if the users of the first user device I and the second user device IIA have not been engaged in electronic message exchange before (i.e. the users don't ‘know’ each other), the receiving of the spam notification signal may immediately result in preventing other addressees (such as the user of the user device IIB) from downloading or displaying other past and future electronic messages. However, if the user of the first user device I and the second user device IIA have been involved in electronic message exchange in the past (i.e. the users ‘know’ each other), consequences of the spam notification signal may be less severe. Another example of users ‘knowing’ each other may be that each of the users have indicated prior to exchange of electronic message that they will accept electronic messages from each other.
  • the server system 1 may contain a counter 24 adapted for counting the number of spam notification signals received for electronic messages of a particular sender and/or for counting the number of times access has been restricted for electronic messages of said sender.
  • the server system 1 may contain a spam filter using a spam rule set, spam parameters and spam criteria for detecting, and possibly restrict access to, electronic spam messages.
  • the server system 1 is capable of restricting access to the server system 1 for the (user of the) first device I independent from the operation of the spam filter, i.e. solely on the basis of one or more spam notification signals.
  • the server system 1 contains an approval module 25 adapted to allow exchange of electronic messages between a sender, e.g. the user of the first user device I, and an addressee, e.g. the user of the second user device IIA, only if both the sender and the addressee have signaled approval for said exchange to the access module 25 in advance.
  • the computer program running on the user devices I and III for sending and receiving electronic messages may e.g. comprise a mandatory address book under the control of the access module 25 . Only by using this address book, a sender may address addressees of the electronic message. Entries in the address book can be made only in response to mutual approval of users to exchange electronic messages.
  • FIG. 3 illustrates a flow chart containing a few steps of the operation of the server system 1 according to an embodiment of the invention.
  • a first step 30 the electronic message receiver 13 of the server system 1 receives an electronic message from the first user device I over a secure network connection 2 directed to, amongst others, the users of second user devices IIA and IIB.
  • the electronic message provider 14 of the server system 1 provides the electronic message to the second user device IIA in step 31 .
  • the first reader e.g. the user of the second user device IIA
  • accepts the electronic message as a desired message a spam notification signal will not be received by the server system 1 in relation to that electronic message. Consequently, the access for the user of the first user device user I to the server system 1 will not be restricted, indicated in step 32 .
  • the user of the second user device IIA qualifies the contents of the electronic message as spam, he may transmit a spam notification signal relating to the electronic spam message to the server system 1 .
  • the user of the second user device IIA may e.g. send a spam notification signal by activating a dedicated button on a user interface of the first user device I.
  • the spam notification signal is detected by the spam notification signal receiver 15 of the server system 1 .
  • the access restrictor 16 restricts access to the server system 1 for the user of the first user device I having sent the electronic message for which the spam notification signal was received, indicated as step 33 .
  • Restriction of the access to the server system 1 may involve exempting the user of the first user device I from further sending of electronic messages via the server system 1 .
  • the assessor module 17 may restrict access to the server system 1 in dependence on e.g. the number of spam notification signals received for electronic messages of the sender and/or the number of times access has been restricted for electronic messages of the sender.
  • access restriction to the server system may be only performed after a certain number of spam notification signals from a recipient, using counter 24 .
  • the spam notification signal may also trigger other actions of the server system 1 .
  • the e-mail deleter 22 of the server system 1 may e.g. delete the electronic spam message for which the spam notification signal was received (step 34 ), thereby restricting access to this e-mail for the user of the second user device IIB (step 35 ) using further access restrictor 21 .
  • Access may also be restricted to other previous or future electronic messages from the sender of the electronic message for which a spam notification signal was received.
  • the user of the first user device I distributing the electronic spam message is known to the server system 1 , e.g. by having stored in register 19 a unique login code comprising a user name and a user specific password required for accessing the server system 1 .
  • the sender identification storage has stored the identity of the sender of the electronic spam message. If another electronic message is sent (not necessarily an electronic spam message) or has been sent previously, it is determined that for this sender a previous spam notification signal has already been received. Access to these other messages of the sender may therefore be denied as well. Consequently, neither of the second user devices IIA and IIB will have access to these other electronic messages (step 36 ).
  • access restriction may be mitigated by allowing the further access restrictor 21 to restrict access for the (user of the) second user device IIB for a particular time period and/or to only a part of the further electronic messages.
  • the assessor module 17 may be used for this purpose. In particular, if the sender and recipient have exchanged electronic messages before, access restriction to other electronic messages may be only performed after a certain number of spam notification signals from a recipient, using counter 24 .
  • the server system 1 comprises a single server. However, the server system 1 may also comprise several servers 1 A, 1 B, 1 C in communicative connection with each other as illustrated in FIG. 4 . That is, the servers 1 A, 1 B and 1 C together form a server system 1 .
  • the connections 40 connecting the servers 1 A, 1 B and 1 C constitute an inner ring.
  • the first and second user devices I, IIA and IIB may connect to different servers 1 A, 1 B and 1 C of this inner ring, as shown in FIG. 4 , either directly or via further servers (not shown).
  • Each of the first and second user devices I, IIA and IIB may also access the servers 1 A and 1 B; 1 B and 1 C and 1 A and 1 C, respectively without using the inner ring formed by the connections 40 .
  • this outer ring, formed by connections 41 is only drawn for the second user device IIA.
  • Communication may be secured in both the inner ring and the outer ring. This may be done by encrypting communication over the inner ring and outer ring and/or by making use of secure connections.
  • Each server 1 A, 1 B, 1 C of the server system 1 may contain the same functional modules 13 - 25 as described with reference to FIG. 2 . However, the functional modules may also be distributed over the various servers 1 A, 1 B and 1 C.
  • the user of the first user device I sends an electronic spam message to the server system 1 with the users of user devices IIA and IIB as addressees.
  • the electronic message receiver 13 of server 1 C receives the electronic spam message, possibly divided in fields, and stores the message/fields in the memory 11 in step 50 in a manner further described with reference to FIG. 6 .
  • individual parts (fields) of the electronic message are stored separately in fields of a database model.
  • the electronic message provider 14 of the third server 1 C assembles an electronic message portion with characteristics of the original electronic message.
  • a portion of an electronic message may e.g. comprise one or more fields of the electronic message or a new portion assembled on the basis of characteristics of the electronic message.
  • the portion of the electronic message contains a sender-field, a subject-field, a retrieval key for retrieving the complete electronic message and possibly a date.
  • the data size of the portion of the electronic message may be less than 200 bytes.
  • a portion provider of the electronic message provider 14 transmits the portion of the electronic message to the first server 1 A and the second server 1 B using the inner ring of the server system 1 .
  • the first server 1 A may query the portion of the electronic message from the third server 1 C upon receiving the request from the second user device IIA to open the mailbox.
  • the first server 1 A provides the portion of the electronic message to the first user device I in step 52 .
  • the electronic message itself may be retrieved in step 53 by the second user device IIA from the third server 1 C over the connections 41 forming the outer ring by selecting the portion of the electronic message provided from the first server 1 A.
  • the sender of the electronic message continues to have access to the server system 1 , since a spam notification signal will not be issued from the second user device IIA (step 54 ).
  • the user of the second user device IIA qualifies the contents of the electronic message as spam, he may transmit a spam notification signal relating to the electronic spam message to the server system 1 .
  • the user of the second user device IIA may e.g. send a spam notification signal by activating a dedicated button on a user interface of the first user device I.
  • the spam notification signal is detected by the spam notification signal receiver 15 of the server 1 C.
  • the access restrictor 16 of the server 1 C restricts access to the server system 1 for the user of the first user device I (step 56 ). As previously described, this consequence can be mitigated, e.g. by taking account of the communication history between the sender and the recipient that issued the spam notification signal using the assessor module 24 .
  • a warning message may be sent to the first user device I.
  • the spam notification signal may trigger further actions by the server system 1 .
  • the user of the second user device IIB may be prohibited to display or download the electronic message or the portion thereof (step 56 ). This may be achieved by deleting the electronic message from the first server 1 C and the portions (if any) of the electronic message at servers 1 A and 1 B.
  • the e-mail deleter 19 of the server 1 C may e.g. delete the portion of the electronic spam message at the second server 1 B, such that the user of the second device IIB has no access to the electronic spam message at the third server 1 C.
  • the e-mail deleter 19 may delete the electronic spam message itself from the memory 11 of the third server 1 C as well as the portion of the electronic message from the first server 1 A. The deletion of the (portion(s) of) the electronic message is instructed over the inner ring of FIG. 4 .
  • the user of the first user device I distributing the electronic spam message may be known to the server system 1 , e.g. by having stored in register 19 of the third server 1 C a unique login code comprising a user address and a user specific password required for accessing the server system 1 .
  • the sender identification storage 23 has stored the identity of the sender of the electronic spam message. If an other (previous or future) electronic message is sent or has been sent (not necessarily an electronic spam message), it is determined that for this sender a spam notification signal has already been received. Access to these further messages of the sender may therefore be denied for the users of both second user devices IIA and IIB (step 57 ).
  • the register 21 may be shared by multiple servers 1 A, 1 B and 1 C, as well as the sender identification storage 23 for senders of other electronic spam messages.
  • the server system 1 stores only a single copy of the electronic message (at server 1 C) independent of the number of addressees.
  • the addressees are notified of the electronic message by means of portions characterizing the electronic message of small size. This saves a large amount of resources.
  • the server system 1 may provide multiple copies of the electronic message if such an approach proves to be more effective. The number of copies of the electronic message is less than the number of addressees of said electronic message.
  • the servers 1 A, 1 B and 1 C of the server system 1 are preferably not conventional e-mail servers. Such e-mail servers store e-mail messages, duplicate the e-mail messages to the number of addressees and provide the e-mail messages upon request for a particular one of those messages. The functionality of these mail servers is rather limited.
  • Incoming electronic messages are analyzed as or received in predetermined parts, which are stored in fields of the database(s).
  • the header of a conventional e-mail is stored in separate fields, some of which are depicted in the data model of FIG. 6 .
  • the methods as described above may be performed in a subscriber-only system, wherein the details of subscribers/participants are known and wherein the subscribers have agreed to comply to particular general conditions.
  • the members of the system have a place in the data model of FIG. 6 .
  • the use of databases for the servers 1 A, 1 B and 1 C allows monitoring relations between different fields, as shown in FIG. 6 .
  • the recipient status and recipient status date are updated. If a single spam notification signal is sufficient for restricting access to the electronic message for other recipients and to restrict access to the server system 1 for a sender, this status will propagate to the message status and the member status, respectively. By adding a messages status date and a member status data to the data model, flexibility is obtained.
  • Fields of the box “messages” may be part of the portion of the electronic message that is pushed or queried in the server system. Examples include the message owner/sender, the message subject and the message sent date.
  • the message id relates to the retrieval key for retrieving the complete electronic message.
  • the box “contacts” may be eliminated in the database model and a link can be established directly from the box “members” to the box “recipients”.
  • the server system 1 may contain an approval module 25 . It is noted that the operation of the approval module, possibly in combination with a mandatory address book for addressing addressees of an electronic message, may be applied independently of the method described above, in particular with respect to the spam notification signal. As such, the server system 1 may be so configured for all the participants that any and all information addressed to them as participants cannot reach them and that, prior to the first communication within the system between two participants A and B, the two participants A and B will first have to go through an arrangement/approval protocol.

Abstract

A method and system for restricting access to an electronic message system is disclosed. The electronic message system comprises a server system capable of transmitting an electronic message from a first user device to one or more second user devices. The method involves receiving an electronic message from the first user device and providing the electronic message or a portion thereof to one or more of the second user devices. Spam notification signals may be received for the electronic message or the portion thereof from one or more of the second user devices. The method involves restricting access to the server system for the (user of the) first user device in response to receiving said one or more spam notification signals.

Description

    CROSS-REFERENCE TO RELATED APPLICATION
  • The present application is a continuation-in-part of and claims priority of International patent application Serial No. PCT/NL2007/000224, filed Sep. 11, 2007, and published in English the content of which is hereby incorporated by reference in its entirety.
  • BACKGROUND
  • The discussion below is merely provided for general background information and is not intended to be used as an aid in determining the scope of the claimed subject matter. Aspects of the invention relates to a method and system for restricting access to an electronic message system. More specifically, aspects relate to a method and system for restricting access to an electronic message system, the system comprising a server system capable of transmitting an electronic message from a first user device to one or more second user devices.
  • E-mail spam may generally be defined as unsolicited and/or undesired e-mail messages received by an e-mail recipient.
  • The amount of e-mail spam messages has dramatically increased over the last decade. The reason for that may be found in the huge number of addressees that can be reached with an e-mail at negligible costs. This combination of factors together with the obligatory delivery of e-mail has made e-mail or, more generally, electronic messaging an attractive communication medium for advertisement of a variety of products and services. Collections of e-mail addresses of people all over the world can be bought from numerous parties at very low cost. E-mail spam messages now account for more than 90% of all e-mail messages transmitted over the internet. As a consequence, mailboxes of users of the e-mail system are full with electronic spam messages and e-mail spam filters have become a necessity. Moreover, electronic resources are wasted to a serious extent.
  • The increase of the amount of e-mail spam messages has triggered others to provide e-mail spam filters. These filters can be installed both on the side of the server and on the side of the client devices to detect and delete e-mail spam messages without troubling the user. Typically, these filters analyse e-mail messages and match the analysis results against e-mail spam rules in order to recognize e-mail spam. These e-mail spam rules are designed on the basis of known typical characteristics of e-mail spam messages, such as the number of addressees in the e-mail header or the occurrence of certain words in the e-mail body.
  • However, new forms of spam will not always be recognized and intercepted by these filters, since the e-mail spam rules are not able to recognize these new forms of spam since these spam rules for the new form of e-mail spam message could not yet have been implemented in the spam filter. As a consequence, a continuous race exists between e-mail spammers and spam filter providers, the latter by definition lagging behind the former. On the other hand, solicited and desired e-mail messages are sometimes filtered from the e-mail box of a recipient, because the e-mail message is qualified as spam as dictated by the e-mail spam rule set of the spam filter.
  • Furthermore, if e-mail spam filters are installed, the filters analyze each individual e-mail message in order to detect e-mail spam messages. As a consequence, message transfer is delayed and resources are wasted.
  • It will be apparent that there is a need in the art for an improved or different method and system for reducing the proliferation of electronic messages, in particular e-mail spam messages.
  • SUMMARY
  • This Summary and Abstract are provided to introduce some concepts in a simplified form that are further described below in the Detailed Description. This Summary and Abstract are not intended to identify key features or essential features of the claimed subject matter, nor are they intended to be used as an aid in determining the scope of the claimed subject matter. In addition, the description herein provided and the claimed subject matter should not be interpreted as being directed to addressing any of the short-comings discussed in the Background.
  • A method for restricting access to an electronic message system is proposed. The electronic message system comprises a server system capable of transmitting an electronic message from a first user device to one or more second user devices. The method involves receiving an electronic message from the first user device and providing the electronic message or a portion thereof to one or more of the second user devices. A portion of an electronic message may e.g. comprise one or more fields of the electronic message or a new portion assembled on the basis of fields or characteristics of the electronic message. Spam notification signals may be received for the electronic message or the portion thereof from one or more of the second user devices. The method involves restricting access to the server system for the (user of the) first user device in response to receiving said one or more spam notification signals.
  • The applicant also proposes a computer program and a carrier (e.g. computer readable media) containing such a computer program, wherein the computer program contains software code portions or instructions capable of, when installed in and executed by an electronic device, performing the method described in the previous paragraph.
  • Also, a server system is proposed that is capable of transmitting an electronic message from a first user device to one or more second user devices. The server system comprises an electronic message receiver arranged for receiving an electronic message from the first user device and an electronic message provider arranged for providing the electronic message or a portion thereof to one or more of the second user devices. A spam notification signal receiver is provided for receiving one or more spam notification signals relating to the electronic message or the portion thereof from one or more of the second user devices. The server system contains an access restrictor adapted to restrict access to the server system for (a user of) the first user device in response to receiving said one or more spam notification signals.
  • It should be noted that access to the server system may be restricted for a user device and/or the user of the user device, the latter option making use of e.g. identification data of the user.
  • It should also be appreciated that the server system does not necessarily refer to a client-server system. Aspects of the invention may also be applicable in peer-to-peer networks, such as e.g. used for bittorrent applications, wherein a server or server functionality may be considered to be part of one or more user devices of the peer-to-peer network. The spam notification signal may then e.g. be broadcast over the peer-to-peer network from one user device to others.
  • The method and system may be embodied as a web application.
  • The number of spam notification signals required to restrict access to the server system may be set. For example, the number of spam notification signals may be set to 50, 25, 10, 5 or even 1 before server system access is prohibited.
  • The applicant has realized that the employment of prior art e-mail spam filters is dissatisfactory. The rule set used for recognizing e-mail spam messages is always outdated, despite the regular updates of the rule set provided by the spam filter developers. Ultimately, only human beings will be able to recognize e-mail spam messages. The applicant, therefore, proposes to use (in one embodiment solely use) spam notification signals from users to detect electronic spam messages and, upon receipt of such a spam notification signal, to restrict access to server system for the sender of the electronic spam message. The server system thus allows that addressees of an electronic message themselves determine what electronic messages are spam messages and that the addressees are subsequently able to restrict the access (rights) of the sender of that message to the server system. The sender may thus be excluded from further use of the server system. In other words, the spam notification signal is an order to the server system to restrict access to the server system. In case of multiple spam notification signals, each signal can be regarded as a partial order.
  • Spam filters using spam recognition rule sets, spam parameters and criteria may be absent in the server system, at least for those electronic messages for which a spam notification signal has been received.
  • The embodiments of claims 2 and 24 provide the possibility of the server system sending a warning signal to the sender of the electronic message for which a spam notification signal was received. This allows for providing the sender with information concerning the consequences of further offences. The consequence of restricting access to the server system can be obtained by the embodiments of claims 3 and 25.
  • The embodiments of claims 4 and 26 provide for various mitigation mechanisms to mitigate the restriction of the access rights to the server system. In particular, the applicant proposes to restrict access to the server system for senders of the electronic message for which the at least one spam notification signal was received in dependence of a communication history between said sender and one or more addressees from which a spam notification signal was received. As an example, access restriction to the server system may be performed immediately if the sender is unknown to a recipient (e.g. if the sender and recipient have not exchanged electronic messages previously) and the recipient issues a spam notification signal. However, if the sender and recipient know each other, access to the server system is not restricted immediately in response to a spam notification signal issued from the user device of a known recipient (but possibly only after spam notification signals have been received for different electronic messages).
  • The embodiments of claims 5, 6, 27 and 28 provide the advantage of establishing a subscriber-only system for electronic message distribution. Since the subscribers are known, e-mail spammers and other abusers of the system can be identified and excluded from participation of subscribers to the system. Moreover, this embodiment allows identification of users of the server system to exclude users from the system.
  • The embodiments of claims 7 and 29 prevent the possibility of sniffing the identity of participants to the system and to subsequently participate in the server system under a false identity. Secure communication may be realized by one or more known techniques, such as encrypting data or providing secure network connections.
  • The embodiments of claims 8 and 30 allow addressees to inform the system of possible electronic spam. The perception of human beings of an electronic message is the best guarantee of spam recognition. The spam notification signal received by the system may initiate operations by the system on the electronic message (and possible other previous or future electronic messages). The number of spam notification signals required to restrict access to the electronic message may be set. For example, the number of spam notification signals may be set to 50, 25, 10, 5 or even 1 before access to the electronic message is prohibited. Reference is made to a co-pending international patent application of the applicant (“Method and system for reducing the proliferation of electronic messages”) filed on the same date as the present application, the contents of the international application being incorporated in the present application by reference in its entirety.
  • The embodiments of claims 9 and 31 provide the advantage of limited use of resources. In these embodiments, only small portions (e.g. less than 200 bytes or 100 bytes) characterizing the original electronic message are made available to the addressees. These portions may e.g. include a sender identification, a subject of the electronic message, a date of the electronic message and/or a retrieval key containing information where and/or how to retrieve the complete electronic message. The portions of the electronic message may either be pushed to the servers of the server system or be queried from a particular server of the server system, if needed. Thus, resource consuming processing and network capacity requirements are reduced considerably. Electronic resources are also saved by the embodiments of claims 10-13 and claims 32-35. Reference is made to a co-pending international patent application of the applicant (“method and system for transmitting an electronic message”) filed on the same date as the present application, the contents of the international application being incorporated in the present application by reference in its entirety.
  • The embodiments of claims 14 and 36 allow for not troubling each user of a user device with the electronic spam message and/or the transmitted portion thereof for which he was an addressee.
  • The embodiments of claims 15-17 and 37-39 provide the advantage of enabling users to restrict access to other previous and/or future electronic messages from the same source on the basis of a sender identification of an electronic message for which a spam notification signal was received. Provisions can be made to mitigate the severity of such a measure for the sender on the basis of various parameters, such as the number of offences of the sender. In particular, the applicant proposes to restrict access to other electronic messages for addressees of the electronic message for which the at least one spam notification signal was received in dependence of a communication history between said sender and said one or more addressees from which a spam notification signal was received. As an example, access restriction to other electronic messages may be performed immediately if the sender is unknown to the recipient (e.g. if the sender and recipient have not exchanged electronic messages previously). However, if the sender and recipient know each other, access to other electronic messages is not restricted at once (but possibly only after spam notification signals have been received for different electronic messages).
  • Of course, the server system may employ spam filters in addition to the functionality described in the present application. However, the server system as defined above operates independently from the operation of these possible spam filters as defined in claims 18 and 40.
  • The embodiments of claims 19 and 41 allow for the approval for exchange of electronic messages in advance. The approval module may be combined by a mandatory address book that the users should use for indicating addressees of an electronic message.
  • The embodiments of claims 20 and 43 allow for a very effective and simple system for reducing unsolicited electronic mail distribution.
  • In an embodiment of the invention, the server system would not comprise an e-mail server. E-mail servers typically only store electronic messages and forward the messages upon request. The embodiment of claim 42 proposes to use programmable databases. Programmable databases allow to program predetermined responses in dependence on the type of request received. For spam notification, the users are allowed to perform an operation (requests) on a database, wherein the response of the database is e.g. the restriction of access for other addressees of the electronic message, the restriction of access to other electronic messages of the same source and/or the exclusion of the sender from the system. Moreover, such a programmable database allows for monitoring relations between several parameters.
  • The applicant also proposes a user device comprising software code portions and a computer program comprising these software code portions for engaging in one or more steps of the above described method and/or to communicate with the above-described server system.
  • The applicant also proposes a communication system for exchanging electronic message comprising a server system and the first and second user devices.
  • It should be noted that the above-embodiments, or aspects thereof, may be combined or isolated.
  • Hereinafter, embodiments of the invention will be described in further detail. It should be appreciated, however, that these embodiments may not be construed as limiting the scope of protection for the present invention.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • In the drawings:
  • FIG. 1 shows a schematic example of a communication system for exchanging electronic messages;
  • FIG. 2 shows a schematic example of a server system;
  • FIG. 3 shows a flow chart depicting steps of a method for reducing the proliferation of electronic messages for the communication system of FIG. 1;
  • FIG. 4 illustrates another example of a communication system for exchanging electronic messages;
  • FIG. 5 shows a flow chart depicting steps of a method for reducing the proliferation of electronic messages for the communication system of FIG. 4, and
  • FIG. 6 shows an exemplary model for a database of a server of a server system according to an embodiment of the invention.
  • DETAILED DESCRIPTION OF THE ILLUSTRATIVE EMBODIMENT
  • FIGS. 1 and 2 show a server system 1 according to an embodiment of the invention. The server system 1 is connected to a first user device I and second user devices IIA and IIB via network connections 2. The network connections 2 may involve multiple networks, both wired and wireless, and the connection of the user devices I, IIA and IIB is not necessarily direct to the server system 1.
  • The first and second user devices I, IIA and IIB are arranged for sending and receiving electronic messages, such as e-mail messages, and may be personal computers, mobile communication devices etc.
  • The server system 1 comprises a processor 10, a memory 11 and a network adapter 12 for communicating with the first and second user devices I, IIA and IIB. It should be appreciated that the server system 1 is normally capable of connecting to more than the three user devices shown in FIG. 1.
  • The specific functions of the server system 1 are schematically illustrated in FIG. 2 and will now be described in further detail. It should be appreciated that the functions may be largely implemented as software code portions of one or more computer programs executed by the processor 10.
  • The server system 1 is arranged to receive an electronic message from the first user device I.
  • The server system 1 comprises an electronic message receiver 13 arranged for receiving an electronic message or a portion thereof and an electronic message provider 14 arranged for providing said electronic message or said portion thereof to the second user device IIA. The server system 1 also contains a spam notification receiver 15 arranged for receiving a spam notification signal from the second user device IIA related to the electronic message or the portion thereof. Also, the server system 1 comprises an access restrictor 16 arranged for restricting access to the server system 1 for the (user of the) first user device I in response to receiving one or more spam notification signals.
  • The access restrictor 16 is adapted to restrict access to the server system 1 for a sender of the electronic message for which said spam notification signal was received, i.e. the sender using the first user device I. Restriction of the access may involve excluding the user of the first user device I from further sending of electronic messages via the server system 1. However, the server system 1 may comprise an assessor module 17 arranged to restrict access to the server system in dependence on e.g. the number of spam notification signals received for electronic messages of the sender and/or the number of times access has been restricted for electronic messages of the sender.
  • In particular, a communication history between a sender and the recipient from which a spam notification signal was received may be taken into account. For example, if the users of the first user device I and the second user device IIA have not been engaged in electronic message exchange before (i.e. the users don't ‘know’ each other), the receiving of the spam notification signal may immediately result in preventing access to the server system 1 for the sender. However, if the user of the first user device I and the second user device IIA have been involved in electronic message exchange in the past (i.e. the users ‘know’ each other), consequences of the spam notification signal may be less severe for the user of the first user device I. Another example of users ‘knowing’ each other may be that each of the users have indicated prior to exchange of electronic message that they will accept electronic messages from each other.
  • The server system 1 comprises a warning message transmitter 18 adapted for sending a warning message to a sender of the electronic message for which said spam notification signal was received from the second user device IIA.
  • The server system 1 has a register 19 storing a unique login code comprising a user name and a user specific password required for accessing the server system 1 for each user of the user devices I, IIA and IIB.
  • Communication over the network connections 2 is secured. To that end, the server system 1 contains an encryptor 20 for encrypting part or all communications between the server system 1 and the first and second user devices I, IIA and IIB. It is noted that alternatively, or in addition thereto, the network connections 2 may be secured. Secure communication prevents or reduces the possibility of sniffing identities of (the users of) the first and second user devices I, IIA and IIB.
  • The server system 1 may be arranged to make a copy of the electronic message for both second user device IIA and IIB. However, it may also be that the server system 1 only stores a single copy of the electronic message received from the first user device I.
  • The server system 1 also contains a further access restrictor 21 for restricting access to the electronic message for the (user of) the second user device IIB solely in response to receiving a spam notification signal from the second user device IIA. To that end, the server system 1 has an electronic message deleter 22 for deleting the electronic message and the copies and/or portions thereof, if any, in response to the spam notification signal from the second user device IIA.
  • Furthermore, the server system 1 has a sender identification storage 23 arranged for storing a sender identification of a sender of the electronic message for which the spam notification signal receiver 15 received a spam notification signal, i.e. the identification of the user of the first user device I. If other electronic messages are received or have been received in the past from this user, the further access restrictor 21 may e.g. use the sender identification to restrict access to these further electronic messages for the second user device IIB automatically, i.e. without requiring a further spam notification signal for these further electronic messages. Of course, access restrictions may apply also for the (user of the) second user device IIA.
  • The further access restrictor 21, possibly under the control of the assessor module 17, may be arranged such that e.g. access is restricted for the (user of the) second user device IIB for a particular time period or to a part of the other electronic messages. However, the further access restrictor 21 may also prevent downloading of the electronic message to said second user device or prevent display of the electronic message on the second user device II.
  • In particular, a communication history between a sender and the recipient from which a spam notification signal was received may be taken into account. For example, if the users of the first user device I and the second user device IIA have not been engaged in electronic message exchange before (i.e. the users don't ‘know’ each other), the receiving of the spam notification signal may immediately result in preventing other addressees (such as the user of the user device IIB) from downloading or displaying other past and future electronic messages. However, if the user of the first user device I and the second user device IIA have been involved in electronic message exchange in the past (i.e. the users ‘know’ each other), consequences of the spam notification signal may be less severe. Another example of users ‘knowing’ each other may be that each of the users have indicated prior to exchange of electronic message that they will accept electronic messages from each other.
  • The server system 1 may contain a counter 24 adapted for counting the number of spam notification signals received for electronic messages of a particular sender and/or for counting the number of times access has been restricted for electronic messages of said sender.
  • It should be noted that the server system 1 may contain a spam filter using a spam rule set, spam parameters and spam criteria for detecting, and possibly restrict access to, electronic spam messages. The server system 1, however, is capable of restricting access to the server system 1 for the (user of the) first device I independent from the operation of the spam filter, i.e. solely on the basis of one or more spam notification signals.
  • Finally, the server system 1 contains an approval module 25 adapted to allow exchange of electronic messages between a sender, e.g. the user of the first user device I, and an addressee, e.g. the user of the second user device IIA, only if both the sender and the addressee have signaled approval for said exchange to the access module 25 in advance. The computer program running on the user devices I and III for sending and receiving electronic messages may e.g. comprise a mandatory address book under the control of the access module 25. Only by using this address book, a sender may address addressees of the electronic message. Entries in the address book can be made only in response to mutual approval of users to exchange electronic messages.
  • FIG. 3 illustrates a flow chart containing a few steps of the operation of the server system 1 according to an embodiment of the invention.
  • In a first step 30, the electronic message receiver 13 of the server system 1 receives an electronic message from the first user device I over a secure network connection 2 directed to, amongst others, the users of second user devices IIA and IIB. The electronic message provider 14 of the server system 1 provides the electronic message to the second user device IIA in step 31.
  • If the first reader, e.g. the user of the second user device IIA, accepts the electronic message as a desired message, a spam notification signal will not be received by the server system 1 in relation to that electronic message. Consequently, the access for the user of the first user device user I to the server system 1 will not be restricted, indicated in step 32.
  • If the user of the second user device IIA qualifies the contents of the electronic message as spam, he may transmit a spam notification signal relating to the electronic spam message to the server system 1. The user of the second user device IIA may e.g. send a spam notification signal by activating a dedicated button on a user interface of the first user device I. The spam notification signal is detected by the spam notification signal receiver 15 of the server system 1. In response to receiving the spam notification response signal, the access restrictor 16 restricts access to the server system 1 for the user of the first user device I having sent the electronic message for which the spam notification signal was received, indicated as step 33.
  • Restriction of the access to the server system 1 may involve exempting the user of the first user device I from further sending of electronic messages via the server system 1. As such a measure may be harsh on the user of the first user device I, the assessor module 17 may restrict access to the server system 1 in dependence on e.g. the number of spam notification signals received for electronic messages of the sender and/or the number of times access has been restricted for electronic messages of the sender. In particular, if the sender and recipient have exchanged electronic messages before, access restriction to the server system may be only performed after a certain number of spam notification signals from a recipient, using counter 24.
  • Apart from denying access to the server system 1 for the sender of electronic message, the spam notification signal may also trigger other actions of the server system 1. The e-mail deleter 22 of the server system 1 may e.g. delete the electronic spam message for which the spam notification signal was received (step 34), thereby restricting access to this e-mail for the user of the second user device IIB (step 35) using further access restrictor 21.
  • Access may also be restricted to other previous or future electronic messages from the sender of the electronic message for which a spam notification signal was received. The user of the first user device I distributing the electronic spam message is known to the server system 1, e.g. by having stored in register 19 a unique login code comprising a user name and a user specific password required for accessing the server system 1. Using these data, the sender identification storage has stored the identity of the sender of the electronic spam message. If another electronic message is sent (not necessarily an electronic spam message) or has been sent previously, it is determined that for this sender a previous spam notification signal has already been received. Access to these other messages of the sender may therefore be denied as well. Consequently, neither of the second user devices IIA and IIB will have access to these other electronic messages (step 36).
  • Again, as such a measure may be rather harsh on the sender of the previous electronic spam message, access restriction may be mitigated by allowing the further access restrictor 21 to restrict access for the (user of the) second user device IIB for a particular time period and/or to only a part of the further electronic messages. The assessor module 17 may be used for this purpose. In particular, if the sender and recipient have exchanged electronic messages before, access restriction to other electronic messages may be only performed after a certain number of spam notification signals from a recipient, using counter 24.
  • It should be appreciated that, while in the above example a single spam notification signal was sufficient to exclude other addressees from receiving (other) electronic messages and to exclude a sender from participation in the server system 1, another number of spam notification signals may be set before such consequences will apply.
  • In the system of FIG. 1, the server system 1 comprises a single server. However, the server system 1 may also comprise several servers 1A, 1B, 1C in communicative connection with each other as illustrated in FIG. 4. That is, the servers 1A, 1B and 1C together form a server system 1. The connections 40 connecting the servers 1A, 1B and 1C constitute an inner ring. The first and second user devices I, IIA and IIB may connect to different servers 1A, 1B and 1C of this inner ring, as shown in FIG. 4, either directly or via further servers (not shown). Each of the first and second user devices I, IIA and IIB may also access the servers 1A and 1B; 1B and 1C and 1A and 1C, respectively without using the inner ring formed by the connections 40. In FIG. 4, this outer ring, formed by connections 41, is only drawn for the second user device IIA.
  • Communication may be secured in both the inner ring and the outer ring. This may be done by encrypting communication over the inner ring and outer ring and/or by making use of secure connections.
  • Each server 1A, 1B, 1C of the server system 1 may contain the same functional modules 13-25 as described with reference to FIG. 2. However, the functional modules may also be distributed over the various servers 1A, 1B and 1C.
  • An embodiment of the operation of the system in accordance with FIG. 4 will now be described with reference to FIG. 5.
  • The user of the first user device I sends an electronic spam message to the server system 1 with the users of user devices IIA and IIB as addressees.
  • The electronic message receiver 13 of server 1C receives the electronic spam message, possibly divided in fields, and stores the message/fields in the memory 11 in step 50 in a manner further described with reference to FIG. 6. Briefly, instead of storing the electronic message in a conventional e-mail server, individual parts (fields) of the electronic message are stored separately in fields of a database model.
  • In step 51, the electronic message provider 14 of the third server 1C assembles an electronic message portion with characteristics of the original electronic message. A portion of an electronic message may e.g. comprise one or more fields of the electronic message or a new portion assembled on the basis of characteristics of the electronic message. As an example, the portion of the electronic message contains a sender-field, a subject-field, a retrieval key for retrieving the complete electronic message and possibly a date. The data size of the portion of the electronic message may be less than 200 bytes. A portion provider of the electronic message provider 14 transmits the portion of the electronic message to the first server 1A and the second server 1B using the inner ring of the server system 1. Instead of pushing the portion of the electronic message from the third server 1C to the first and second servers 1A, 1B, the first server 1A may query the portion of the electronic message from the third server 1C upon receiving the request from the second user device IIA to open the mailbox. Reference is made to the international patent application (“Method and system for transmitting an electronic message”) from the same applicant and filed on the same date as the present application, the contents of the international application be incorporated in the present application by reference in its entirety. This latter alternative provides the advantage that even the small portions of the electronic message are only transferred if necessary. The complete electronic message is stored only at server 1C.
  • Again, it is assumed that the user of the second user device IIA first opens his mailbox. By doing so, the first server 1A provides the portion of the electronic message to the first user device I in step 52. The electronic message itself may be retrieved in step 53 by the second user device IIA from the third server 1C over the connections 41 forming the outer ring by selecting the portion of the electronic message provided from the first server 1A.
  • If the user of the second user device IIA does not qualify the electronic message as spam, the sender of the electronic message continues to have access to the server system 1, since a spam notification signal will not be issued from the second user device IIA (step 54).
  • If the user of the second user device IIA qualifies the contents of the electronic message as spam, he may transmit a spam notification signal relating to the electronic spam message to the server system 1. The user of the second user device IIA may e.g. send a spam notification signal by activating a dedicated button on a user interface of the first user device I. The spam notification signal is detected by the spam notification signal receiver 15 of the server 1C. In response to receiving the spam notification signal, the access restrictor 16 of the server 1C restricts access to the server system 1 for the user of the first user device I (step 56). As previously described, this consequence can be mitigated, e.g. by taking account of the communication history between the sender and the recipient that issued the spam notification signal using the assessor module 24. A warning message may be sent to the first user device I.
  • Again, the spam notification signal may trigger further actions by the server system 1. The user of the second user device IIB may be prohibited to display or download the electronic message or the portion thereof (step 56). This may be achieved by deleting the electronic message from the first server 1C and the portions (if any) of the electronic message at servers 1A and 1B. In particular, the e-mail deleter 19 of the server 1C may e.g. delete the portion of the electronic spam message at the second server 1B, such that the user of the second device IIB has no access to the electronic spam message at the third server 1C. Moreover, the e-mail deleter 19 may delete the electronic spam message itself from the memory 11 of the third server 1C as well as the portion of the electronic message from the first server 1A. The deletion of the (portion(s) of) the electronic message is instructed over the inner ring of FIG. 4.
  • As for the embodiment of FIGS. 1 and 3, the user of the first user device I distributing the electronic spam message may be known to the server system 1, e.g. by having stored in register 19 of the third server 1C a unique login code comprising a user address and a user specific password required for accessing the server system 1. Using these data, the sender identification storage 23 has stored the identity of the sender of the electronic spam message. If an other (previous or future) electronic message is sent or has been sent (not necessarily an electronic spam message), it is determined that for this sender a spam notification signal has already been received. Access to these further messages of the sender may therefore be denied for the users of both second user devices IIA and IIB (step 57). Consequently, neither of the second user devices IIA and IIB will have access to these other electronic messages. As such a measure may be rather harsh on the sender of the previous electronic spam message, consequences may be mitigated by allowing the further access restrictor 21 at the third server 1C to restrict access for the (user of the) second user devices IIA and IIB for a particular time period and/or to only a part of the further electronic messages. In particular, a communication history for the sender may be used for determining the consequences.
  • It should be appreciated that the register 21 may be shared by multiple servers 1A, 1B and 1C, as well as the sender identification storage 23 for senders of other electronic spam messages.
  • As mentioned above, the server system 1 stores only a single copy of the electronic message (at server 1C) independent of the number of addressees. The addressees are notified of the electronic message by means of portions characterizing the electronic message of small size. This saves a large amount of resources. However, the server system 1 may provide multiple copies of the electronic message if such an approach proves to be more effective. The number of copies of the electronic message is less than the number of addressees of said electronic message.
  • Again, it should be appreciated that, while in the above example a single spam notification signal was sufficient to exclude other addressees from receiving (other) electronic messages and to exclude a sender from participation in the system, another number of spam notification signals may be set before such consequences will apply.
  • The servers 1A, 1B and 1C of the server system 1 are preferably not conventional e-mail servers. Such e-mail servers store e-mail messages, duplicate the e-mail messages to the number of addressees and provide the e-mail messages upon request for a particular one of those messages. The functionality of these mail servers is rather limited.
  • The applicant proposes to use one or more databases, such as Oracle® databases, for which the response can be programmed in dependence of e.g. the request made to the database. Incoming electronic messages are analyzed as or received in predetermined parts, which are stored in fields of the database(s). As an example, the header of a conventional e-mail is stored in separate fields, some of which are depicted in the data model of FIG. 6.
  • The methods as described above may be performed in a subscriber-only system, wherein the details of subscribers/participants are known and wherein the subscribers have agreed to comply to particular general conditions. The members of the system have a place in the data model of FIG. 6.
  • The use of databases for the servers 1A, 1B and 1C allows monitoring relations between different fields, as shown in FIG. 6.
  • The functionality as described above can be obtained using the database model of FIG. 6.
  • As an example, if a user issues a spam notification signal, the recipient status and recipient status date are updated. If a single spam notification signal is sufficient for restricting access to the electronic message for other recipients and to restrict access to the server system 1 for a sender, this status will propagate to the message status and the member status, respectively. By adding a messages status date and a member status data to the data model, flexibility is obtained.
  • Fields of the box “messages” may be part of the portion of the electronic message that is pushed or queried in the server system. Examples include the message owner/sender, the message subject and the message sent date. The message id relates to the retrieval key for retrieving the complete electronic message.
  • It should be noted that when a mandatory address book for addressing addressees of the electronic message is not used, the box “contacts” may be eliminated in the database model and a link can be established directly from the box “members” to the box “recipients”.
  • The server system 1 may contain an approval module 25. It is noted that the operation of the approval module, possibly in combination with a mandatory address book for addressing addressees of an electronic message, may be applied independently of the method described above, in particular with respect to the spam notification signal. As such, the server system 1 may be so configured for all the participants that any and all information addressed to them as participants cannot reach them and that, prior to the first communication within the system between two participants A and B, the two participants A and B will first have to go through an arrangement/approval protocol.
  • Although the subject matter has been described in language directed to specific environments, structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not limited to the environments, specific features or acts described above as has been held by the courts. Rather, the environments, specific features and acts described above are disclosed as example forms of implementing the claims.

Claims (46)

1. A method for restricting access to an electronic message system, the system comprising a server system capable of transmitting an electronic message from a first user device to one or more second user devices, the method comprising:
receiving an electronic message from said first user device;
providing said electronic message or a portion thereof to one or more of said second user devices;
receiving one or more spam notification signals relating to said electronic message or said portion thereof from said one or more second user devices; and
restricting access to said server system for said first user device or a user thereof in response to receiving said one or more spam notification signals.
2. The method according to claim 1, wherein said restricting access to said server system comprises providing a warning message to said first user device or a user of said first user device.
3. The method according to claim 1, wherein said restricting access to said server system comprises preventing said first user device or said user thereof from sending further electronic messages via the server system.
4. The method according to claim 1, wherein said restricting access to said server system is dependent on at least one of the following:
the number of spam notification signals received for electronic messages of the sender of said electronic message;
the number of times access has been restricted for electronic messages of said sender; and
a communication history between said sender and the one or more addressees of said electronic message from which said spam notification signal was received.
5. The method according to claim 1, wherein users of said first and one or more second user devices are centrally registered.
6. The method according to claim 5, wherein each of said users is provided with a unique login code comprising a user name and a user-specific password for accessing the server system.
7. The method according to claim 1, further comprising receiving and transmitting said electronic message and possibly said spam notification signal in a secured manner.
8. The method according to claim 1, further comprising restricting access to said electronic message or said portion thereof for one or more of said second user devices in response to receiving one or more of said spam notification signals.
9. The method according to claim 1 in a server system comprising at least a first server and a second server, further comprising:
receiving said electronic message at said first server;
storing said electronic message at said first server
transmitting a portion of said electronic message to said second server;
receiving said portion of said electronic message at said second server;
providing said portion of said electronic message from said second server to at least one second user device;
providing said electronic message from said first server to said at least one second user device in response to selecting said portion of said electronic message.
10. The method according to claim 9, further comprising receiving said spam notification signal at said first server.
11. The method according to claim 9, further comprising providing multiple copies of said electronic message, wherein the number of copies of said electronic message is less than the number of addressees of said electronic message.
12. The method according to claim 9, further comprising storing said electronic message only once at said first server.
13. The method according to claim 9, further comprising deleting the electronic message at the first server and/or the portion of the electronic message at the second server in response to said spam notification signal.
14. The method according to claim 9, wherein said restricting said access for said at least one second user device by said server system comprises at least one of the following:
preventing downloading of said electronic message or said portion thereof to said second user device;
preventing display of said electronic message or said portion thereof on said second user device.
15. The method according to claim 9, further comprising:
receiving said electronic message
receiving a spam notification signal from at least one of said second user devices for said electronic message;
storing a sender identification of a sender of said electronic message for which said spam notification signal was received;
receiving or having received one or more other electronic messages from said sender;
restricting access to at least one of said other electronic messages for at least one of said second user devices using said sender identification.
16. The method according to claim 15, wherein said restricting access to said other electronic messages includes at least one of f:
restricting access to said other electronic messages for a particular time period;
restricting access to a part of said other electronic messages; and
restricting access to said other electronic messages for addressees of said other electronic messages in dependence of a communication history between said sender and said one or more addressees.
17. The method according to claim 16, wherein said time period or said part is determined by at least one of the following:
the number of spam notification signals received for electronic messages of a particular sender;
the number of times access has been restricted for electronic messages of said sender.
18. The method according to claim 16, wherein said method is performed independently from the operation of a spam filter using a spam rule set to detect electronic spam messages received by said system.
19. The method according to claim 16, wherein said server system comprises an approval module allowing exchange of electronic messages between a sender and a recipient only if both the sender and the recipient have signaled approval for said exchange to said access module in advance.
20. The method according to claim 16, wherein access to said server system is restricted in response to receiving only a single spam notification signal.
21. A computer program comprising software code portions adapted for, when installed in and executed by an electronic system, performing the method according to claim 1.
22. A carrier containing the computer program of claim 21.
23. A server system capable of transmitting an electronic message from a first user device to one or more second user devices, the server system comprising:
an electronic message receiver arranged for receiving an electronic message from said first user device;
an electronic message provider arranged for providing said electronic message or a portion thereof to one or more of said second user devices;
a spam notification signal receiver arranged for receiving one or more spam notification signals relating to said electronic message or said portion thereof from said one or more second user devices; and
an access restrictor adapted to restrict access to said server system for said first user device or a user thereof in response to receiving said one or more spam notification signals.
24. The server system according to claim 23, wherein said access restrictor comprises a warning message transmitter adapted to provide a warning message to said first user device or a user of said first user device.
25. The server system according to claim 23, wherein said access restrictor is adapted for preventing said first user device or said user thereof from sending further electronic messages via the server system.
26. The server system according to claim 23, wherein said server system comprises an assessor module, wherein said assessor module is arranged to control said access restrictor such that restricting access to said server system is dependent on at least one of the following:
the number of spam notification signals received for electronic messages of the sender of said electronic message;
the number of times access has been restricted for electronic messages of said sender; and
a communication history between said sender and the one or more addressees of said electronic message from which said spam notification signal was received.
27. The server system according to claim 23, wherein said server system comprises a central register arranged for registering users of said first and one or more second user devices.
28. The server system according to claim 27, wherein said register comprises at least a unique login code comprising a user name and a user-specific password for accessing the server system for users of said first and second user devices.
29. The server system according to claim 27, wherein said server system comprises means for securing communication with said first and one or more of said second user devices.
30. The server system according to claim 27, wherein said server system comprises a further access restrictor adapted for restricting access to said electronic message or said portion thereof for one or more of said second user devices in response to receiving one or more of said spam notification signals.
31. The server system according to claim 27, wherein said server system comprises at least a first server and a second server, wherein said first server comprises:
an electronic message receiver for receiving said electronic message;
storage means for storing said electronic message;
an electronic message provider adapted for providing a portion of said electronic message on the basis of said received electronic message;
a transmitter for transmitting said portion of said electronic message to said second server, and
a transmitter for transmitting said electronic message to said at least one second user device in response to receiving a request for said electronic message from said second user device;
and said second server comprises:
an electronic message receiver arranged for receiving said portion of said electronic message from said transmitter of said first server;
means for providing said at least one second user device with said portion of said electronic message.
32. The server system according to claim 31, wherein said first server further comprises said spam notification signal receiver.
33. The server system according to claim 31, wherein said server system is arranged for providing multiple copies of said electronic message, wherein the number of copies of said electronic message is less than the number of addressees of said electronic message.
34. The server system according to claim 31, wherein the system is arranged such that only the storage means of the first server stores said electronic message.
35. The server system according to claim 31, wherein the server system comprises an electronic message deleter and an electronic message portion deleter arranged for deleting the electronic message at the first server and the electronic message portion at the second server in response to said spam notification signal.
36. The server system according to claim 31, wherein said further access restrictor is arranged to prevent at least one of the following:
downloading of said electronic message or said portion thereof to said second user device;
display of said electronic message or said portion thereof on said second user device.
37. The server system according to claim 31, wherein said system further comprises a sender identification storage arranged for storing a sender identification of a sender of said electronic message for which said spam notification signal receiver received a spam notification signal, wherein said electronic message receiver is arranged to receive or have received other electronic messages and wherein a further access restrictor is adapted for restricting access to at least one of said other electronic messages for at least one or said second user devices using said sender identification.
38. The server system according to claim 37, wherein said server system comprises an assessor module, wherein said assessor module is arranged to control said further access restrictor such that restricting access to said other electronic message is dependent on at least one of the following:
restricting access to said other electronic messages for a particular time period;
restricting access to a part of said other electronic messages.
restricting access to said other electronic messages for addressees of said other electronic messages in dependence of a communication history between said sender and said one or more addressees.
39. The server system according to claim 34, wherein said server system further comprises at least one of:
a counter adapted for counting the number of spam notification signals received for electronic messages of a particular sender, and
a counter adapted for counting the number of times access has been restricted for electronic messages of said sender.
40. The server system according to claim 34, wherein said server system is adapted to operate independently from a spam filter using a spam rule set for detecting electronic spam messages.
41. The server system according to claim 34, further comprising an approval module adapted to allow exchange of electronic messages between a sender and a recipient only if both the sender and the recipient have signaled approval for said exchange to said access module in advance.
42. The server system according to claim 34, wherein one or more of said servers comprise a programmable database.
43. The server system according to claim 34, wherein said access restrictor is adapted to restrict access to said server system for said first user device or a user thereof in response to receiving a single spam notification signal.
44. A user device comprising software code portions adapted to engage in the method according to claim 1 and/or to communication with the server system according claim 23
45. A computer program for the user device of claim 41 comprising software code portions adapted for, when installed on and executed by a processor of the user device, to perform the method of claim 1 and or to communicate with the server system of claim 23.
46. A communication system for exchanging electronic messages comprising a server system according to one or more of the claim 23 and at least the first user device and a second user device.
US11/983,816 2007-02-08 2007-11-09 Method and system for restricting access to an electronic message system Abandoned US20080196094A1 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
NL1033356 2007-02-08
NL1033356 2007-02-08
NLPCT/NL2007/000224 2007-09-11
NL1034361 2007-09-11
NL1034361 2007-09-11

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
NLPCT/NL2007/000224 Continuation-In-Part 2007-02-08 2007-09-11

Publications (1)

Publication Number Publication Date
US20080196094A1 true US20080196094A1 (en) 2008-08-14

Family

ID=39592973

Family Applications (7)

Application Number Title Priority Date Filing Date
US11/983,809 Abandoned US20080196093A1 (en) 2007-02-08 2007-11-09 Method and system for reducing the proliferation of electronic messages
US11/983,816 Abandoned US20080196094A1 (en) 2007-02-08 2007-11-09 Method and system for restricting access to an electronic message system
US11/983,802 Abandoned US20080192918A1 (en) 2007-02-08 2007-11-09 Method and system for establishing a telephone connection
US11/983,783 Abandoned US20080194234A1 (en) 2007-02-08 2007-11-09 System and method of establishing a telephone connection
US11/983,798 Abandoned US20080195713A1 (en) 2007-02-08 2007-11-09 Method and system for transmitting an electronic message
US11/983,799 Active 2030-05-28 US8443424B2 (en) 2007-02-08 2007-11-09 Method and system for reducing the proliferation of electronic messages
US11/956,656 Abandoned US20080195515A1 (en) 2007-02-08 2007-12-14 Combined payment and communication service method and system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/983,809 Abandoned US20080196093A1 (en) 2007-02-08 2007-11-09 Method and system for reducing the proliferation of electronic messages

Family Applications After (5)

Application Number Title Priority Date Filing Date
US11/983,802 Abandoned US20080192918A1 (en) 2007-02-08 2007-11-09 Method and system for establishing a telephone connection
US11/983,783 Abandoned US20080194234A1 (en) 2007-02-08 2007-11-09 System and method of establishing a telephone connection
US11/983,798 Abandoned US20080195713A1 (en) 2007-02-08 2007-11-09 Method and system for transmitting an electronic message
US11/983,799 Active 2030-05-28 US8443424B2 (en) 2007-02-08 2007-11-09 Method and system for reducing the proliferation of electronic messages
US11/956,656 Abandoned US20080195515A1 (en) 2007-02-08 2007-12-14 Combined payment and communication service method and system

Country Status (3)

Country Link
US (7) US20080196093A1 (en)
EP (1) EP1956541A1 (en)
AR (7) AR064057A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080194234A1 (en) * 2007-02-08 2008-08-14 Dlb Finance & Consultancy B.V. System and method of establishing a telephone connection
US20090158403A1 (en) * 2007-12-14 2009-06-18 Dirk Leonard Benschop Method and system for permitting or denying service
US20090178117A1 (en) * 2008-01-03 2009-07-09 Dlb Finance & Consultancy B.V. System and method of retrieving a service contact identifier
US20090187666A1 (en) * 2008-01-17 2009-07-23 Dlb Finance & Consultancy B.V. Method and system for controlling a computer application program
US20090249481A1 (en) * 2008-03-31 2009-10-01 Men Long Botnet spam detection and filtration on the source machine
US20140074824A1 (en) * 2008-12-19 2014-03-13 Sean Rad Matching Process System And Method
US20140279031A1 (en) * 2013-03-14 2014-09-18 Randy Mersky Mobile in-store loyalty advertising and marketing system and method
USD780775S1 (en) 2016-08-30 2017-03-07 Tinder, Inc. Display screen or portion thereof with a graphical user interface of an electronic device
USD781311S1 (en) 2016-08-30 2017-03-14 Tinder, Inc. Display screen or portion thereof with a graphical user interface
USD781882S1 (en) 2016-08-30 2017-03-21 Tinder, Inc. Display screen or portion thereof with a graphical user interface of an electronic device
US20170206545A1 (en) * 2016-01-20 2017-07-20 Zipstorm Inc. Recipient centric messaging system and protocols to implement it over data networks
USD852809S1 (en) 2016-08-30 2019-07-02 Match Group, Llc Display screen or portion thereof with a graphical user interface of an electronic device
USD854025S1 (en) 2016-08-30 2019-07-16 Match Group, Llc Display screen or portion thereof with a graphical user interface of an electronic device
US10977722B2 (en) 2018-08-20 2021-04-13 IM Pro Makeup NY LP System, method and user interfaces and data structures in a cross-platform facility for providing content generation tools and consumer experience
US11455991B2 (en) * 2019-07-18 2022-09-27 Capital One Services, Llc Voice-assistant activated virtual card replacement

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7398550B2 (en) * 2003-06-18 2008-07-08 Microsoft Corporation Enhanced shared secret provisioning protocol
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
US9704177B2 (en) 2008-12-23 2017-07-11 International Business Machines Corporation Identifying spam avatars in a virtual universe (VU) based upon turing tests
US9697535B2 (en) 2008-12-23 2017-07-04 International Business Machines Corporation System and method in a virtual universe for identifying spam avatars based upon avatar multimedia characteristics
US20100185739A1 (en) * 2009-01-16 2010-07-22 Gary Stephen Shuster Differentiated spam filtering for multiplexed message receiving devices
US8311938B2 (en) * 2009-02-24 2012-11-13 Doxo, Inc. Provider relationship management system that facilitates interaction between an individual and organizations
US8537219B2 (en) 2009-03-19 2013-09-17 International Business Machines Corporation Identifying spatial locations of events within video image data
US8553778B2 (en) 2009-03-19 2013-10-08 International Business Machines Corporation Coding scheme for identifying spatial locations of events within video image data
US8656476B2 (en) * 2009-05-28 2014-02-18 International Business Machines Corporation Providing notification of spam avatars
US8832204B1 (en) * 2009-09-24 2014-09-09 Sprint Communication Company L.P. Text message spam solutions
CN101859426B (en) * 2010-02-02 2013-04-10 深圳市国民电子商务有限公司 Electronic ticket service system and realizing method thereof
US20110276640A1 (en) * 2010-03-01 2011-11-10 Mary Jesse Automated communications system
US9294308B2 (en) * 2011-03-10 2016-03-22 Mimecast North America Inc. Enhancing communication
US9253176B2 (en) * 2012-04-27 2016-02-02 Intralinks, Inc. Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment
US9251360B2 (en) 2012-04-27 2016-02-02 Intralinks, Inc. Computerized method and system for managing secure mobile device content viewing in a networked secure collaborative exchange environment
AU2013251304B2 (en) 2012-04-27 2018-12-20 Intralinks, Inc. Computerized method and system for managing networked secure collaborative exchange
US9553860B2 (en) 2012-04-27 2017-01-24 Intralinks, Inc. Email effectivity facility in a networked secure collaborative exchange environment
US9514327B2 (en) 2013-11-14 2016-12-06 Intralinks, Inc. Litigation support in cloud-hosted file sharing and collaboration
US9613190B2 (en) 2014-04-23 2017-04-04 Intralinks, Inc. Systems and methods of secure data exchange
CN104506743B (en) * 2014-12-17 2017-11-03 百度在线网络技术(北京)有限公司 A kind of method and device of dynamic interception phone
US10033702B2 (en) 2015-08-05 2018-07-24 Intralinks, Inc. Systems and methods of secure data exchange
US10505871B1 (en) * 2017-11-30 2019-12-10 Sandeep Jain Future messaging maximizing contextual relevancy and minimizing information overload based distractions
US11037114B2 (en) 2018-03-22 2021-06-15 Diebold Nixdorf, Incorporated System and method for financial transactions

Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5475819A (en) * 1990-10-02 1995-12-12 Digital Equipment Corporation Distributed configuration profile for computing system
US20020095488A1 (en) * 2000-11-13 2002-07-18 Leonard Primak System and method for discovering, advertising, and finding networked services using dynamic directory
US6453327B1 (en) * 1996-06-10 2002-09-17 Sun Microsystems, Inc. Method and apparatus for identifying and discarding junk electronic mail
US20020156728A1 (en) * 2000-08-18 2002-10-24 Rainer Jaschhof Method and arrangement for the transmission of an electronic sum of money from a credit reserve by wap
US20020174194A1 (en) * 2001-05-18 2002-11-21 Eoin Mooney Providing access to a plurality of message accounts from a single web-based interface
US20030018721A1 (en) * 2001-06-29 2003-01-23 Virad Gupta Unified messaging with separate media component storage
US20030023873A1 (en) * 2001-03-16 2003-01-30 Yuval Ben-Itzhak Application-layer security method and system
US20030026396A1 (en) * 2001-08-02 2003-02-06 Alcatel Method of executing transactions of electronic money amounts between subscriber terminals of a communication network, and communication network, transaction server and program module for it
US20030112948A1 (en) * 2001-12-19 2003-06-19 Wendell Brown System and method for establishing a connection between parties based on their availability
US20030154165A1 (en) * 2000-08-18 2003-08-14 Michael Horn Method and arrangement for the transmission of an electronic sum of money from a credit reserve
US20030204719A1 (en) * 2001-03-16 2003-10-30 Kavado, Inc. Application layer security method and system
US20030233318A1 (en) * 2001-11-26 2003-12-18 King Douglas W. Systems and methods for fund transfers
US20040176072A1 (en) * 2003-01-31 2004-09-09 Gellens Randall C. Simplified handling of, blocking of, and credit for undesired messaging
US20040205135A1 (en) * 2003-03-25 2004-10-14 Hallam-Baker Phillip Martin Control and management of electronic messaging
US20050021649A1 (en) * 2003-06-20 2005-01-27 Goodman Joshua T. Prevention of outgoing spam
US20050111648A1 (en) * 2003-11-26 2005-05-26 Roome William D. Multi-stage telephone number dialing system and method for providing limited access to a telephone subscriber
US20050249214A1 (en) * 2004-05-07 2005-11-10 Tao Peng System and process for managing network traffic
US20050273857A1 (en) * 2004-06-07 2005-12-08 Check Point Software Technologies, Inc. System and Methodology for Intrusion Detection and Prevention
US20060020692A1 (en) * 2004-07-21 2006-01-26 Microsoft Corporation System and method for locating web services
US20060168024A1 (en) * 2004-12-13 2006-07-27 Microsoft Corporation Sender reputations for spam prevention
US20060239190A1 (en) * 2005-04-25 2006-10-26 Matsushita Electric Industrial Co., Ltd. Policy-based device/service discovery and dissemination of device profile and capability information for P2P networking
US20080194234A1 (en) * 2007-02-08 2008-08-14 Dlb Finance & Consultancy B.V. System and method of establishing a telephone connection
US20090158403A1 (en) * 2007-12-14 2009-06-18 Dirk Leonard Benschop Method and system for permitting or denying service
US20090178117A1 (en) * 2008-01-03 2009-07-09 Dlb Finance & Consultancy B.V. System and method of retrieving a service contact identifier

Family Cites Families (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5870473A (en) 1995-12-14 1999-02-09 Cybercash, Inc. Electronic transfer system and method
FI109505B (en) 1997-03-24 2002-08-15 Fd Finanssidata Oy Use of banking services in a digital cellular radio system
US6205482B1 (en) * 1998-02-19 2001-03-20 Ameritech Corporation System and method for executing a request from a client application
JPH11313105A (en) * 1998-04-24 1999-11-09 Canon Inc Server, client, server control method, client control method, client-server system and storage medium
US6457060B1 (en) * 1998-04-30 2002-09-24 Openwave Systems Inc. Method and apparatus for flexibly linking to remotely located content on a network server through use of aliases
US6298383B1 (en) * 1999-01-04 2001-10-02 Cisco Technology, Inc. Integration of authentication authorization and accounting service and proxy service
CA2357016A1 (en) 1999-01-14 2000-07-20 Tumbleweed Communications Corp. Web-based delivery of secure e-mail messages
US6889325B1 (en) 1999-04-28 2005-05-03 Unicate Bv Transaction method and system for data networks, like internet
US6615231B1 (en) * 1999-12-15 2003-09-02 Microsoft Corporation System and method for directing requests to specific processing
US20010026609A1 (en) 1999-12-30 2001-10-04 Lee Weinstein Method and apparatus facilitating the placing, receiving, and billing of telephone calls
AU2001249239A1 (en) 2000-03-17 2001-10-03 America Online, Inc. Shared groups rostering system
EP1273142B1 (en) * 2000-04-10 2008-02-27 Honeywell International, Inc. In-flight e-mail system
US6952769B1 (en) * 2000-04-17 2005-10-04 International Business Machines Corporation Protocols for anonymous electronic communication and double-blind transactions
US7155001B2 (en) * 2001-10-24 2006-12-26 Sbc Properties, L.P. System and method for restricting and monitoring telephone calls
GB2378781B (en) * 2001-08-16 2005-06-01 Sun Microsystems Inc Message brokering
JP3693951B2 (en) 2001-11-26 2005-09-14 日本電気株式会社 E-mail system and spam mail prevention method
KR20040074118A (en) 2002-01-17 2004-08-21 김태준 An Internet Mail Method and System based on Sender Mailbox
US6944663B2 (en) 2002-03-06 2005-09-13 Sun Microsystems, Inc. Method and apparatus for using client puzzles to protect against denial-of-service attacks
JP2003348162A (en) 2002-05-24 2003-12-05 Nec Corp Spam mail prevention method and spam mail prevention system
US20040019651A1 (en) * 2002-07-29 2004-01-29 Andaker Kristian L. M. Categorizing electronic messages based on collaborative feedback
US7305430B2 (en) * 2002-08-01 2007-12-04 International Business Machines Corporation Reducing data storage requirements on mail servers
AU2003282030A1 (en) 2002-10-16 2004-05-04 Mobile Cohesion Limited A service access gateway
NL1022704C2 (en) 2003-02-17 2004-08-19 Digipay Nederland N V Banking method using central transaction server, has accounts on server linked with separate identifying telephone numbers
WO2004075086A1 (en) 2003-02-18 2004-09-02 Wang Soo Ryu Method for providing finance service using phone number and account balance
FR2851834A1 (en) 2003-02-28 2004-09-03 France Telecom Appointment booking system uses client stations linked by network to server offering limited access for patients to make reservations
US6990187B2 (en) * 2003-04-25 2006-01-24 Lucent Technologies Inc. Methods for blocking repeated occurrences of nuisance calls
US20050081051A1 (en) * 2003-10-09 2005-04-14 International Business Machines Corporation Mitigating self-propagating e-mail viruses
US7344787B2 (en) * 2003-10-29 2008-03-18 General Motors Corporation Two-stage compression for air supply of a fuel cell system
EP1700279A1 (en) * 2003-12-18 2006-09-13 Veritas Mobile Solutions Pte. Ltd. System and method for facilitating payment via a communications network using value accredited to a customer of the communications network
US7500108B2 (en) * 2004-03-01 2009-03-03 Microsoft Corporation Metered execution of code
MY143168A (en) 2004-06-22 2011-03-31 Paysetter Pte Ltd System and method for transferring credit between subscribers of differing telecommunications carriers
US7894588B2 (en) 2004-12-21 2011-02-22 Aol Inc. Telephone call handling list for multiple users
US20060187901A1 (en) 2005-02-23 2006-08-24 Lucent Technologies Inc. Concurrent dual-state proxy server, method of providing a proxy and SIP network employing the same
US8266295B2 (en) * 2005-02-24 2012-09-11 Emc Corporation System and method for detecting and mitigating DNS spoofing trojans
US20060224681A1 (en) * 2005-03-29 2006-10-05 Wurster Charles S Mobile communications device e-mail message delivery
US20060253597A1 (en) * 2005-05-05 2006-11-09 Mujica Technologies Inc. E-mail system
US7870204B2 (en) * 2005-07-01 2011-01-11 0733660 B.C. Ltd. Electronic mail system with aggregation and integrated display of related messages
US8335723B2 (en) * 2005-08-09 2012-12-18 Walker Digital, Llc Apparatus, systems and methods for facilitating commerce
US9455844B2 (en) * 2005-09-30 2016-09-27 Qualcomm Incorporated Distributed processing system and method
JP4789569B2 (en) 2005-10-05 2011-10-12 キヤノン株式会社 Wireless communication device
US20070106734A1 (en) * 2005-11-10 2007-05-10 Motorola, Inc. Incentive driven subscriber assisted spam reduction
US20070180039A1 (en) * 2006-02-01 2007-08-02 David Sutidze Anonymous disposable email addressing system and method of use thereo
US8151116B2 (en) * 2006-06-09 2012-04-03 Brigham Young University Multi-channel user authentication apparatus system and method
US20080107101A1 (en) * 2006-11-02 2008-05-08 Mitac Technology Corp. Multi-dialing-number VOIP phone call connection method
US9148431B2 (en) * 2006-12-12 2015-09-29 Qualcomm Incorporated Systems and methods for caller identification customization and remote management of communication devices
CN101652984A (en) 2007-02-08 2010-02-17 Dlb金融咨询有限责任公司 Be used to set up the method and system that phone connects
US20070124226A1 (en) 2007-02-08 2007-05-31 Global Personals, Llc Method for Verifying Data in a Dating Service, Dating-Service Database including Verified Member Data, and Method for Prioritizing Search Results Including Verified Data, and Methods for Verifying Data
MX2010001492A (en) * 2007-08-07 2010-11-09 Ticketmaster L L C Systems and methods for providing resources allocation in a networked environment.
US8463921B2 (en) * 2008-01-17 2013-06-11 Scipioo Holding B.V. Method and system for controlling a computer application program

Patent Citations (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5475819A (en) * 1990-10-02 1995-12-12 Digital Equipment Corporation Distributed configuration profile for computing system
US6453327B1 (en) * 1996-06-10 2002-09-17 Sun Microsystems, Inc. Method and apparatus for identifying and discarding junk electronic mail
US20030154165A1 (en) * 2000-08-18 2003-08-14 Michael Horn Method and arrangement for the transmission of an electronic sum of money from a credit reserve
US20020156728A1 (en) * 2000-08-18 2002-10-24 Rainer Jaschhof Method and arrangement for the transmission of an electronic sum of money from a credit reserve by wap
US20020095488A1 (en) * 2000-11-13 2002-07-18 Leonard Primak System and method for discovering, advertising, and finding networked services using dynamic directory
US20030023873A1 (en) * 2001-03-16 2003-01-30 Yuval Ben-Itzhak Application-layer security method and system
US20030204719A1 (en) * 2001-03-16 2003-10-30 Kavado, Inc. Application layer security method and system
US20020174194A1 (en) * 2001-05-18 2002-11-21 Eoin Mooney Providing access to a plurality of message accounts from a single web-based interface
US20030018721A1 (en) * 2001-06-29 2003-01-23 Virad Gupta Unified messaging with separate media component storage
US20030026396A1 (en) * 2001-08-02 2003-02-06 Alcatel Method of executing transactions of electronic money amounts between subscriber terminals of a communication network, and communication network, transaction server and program module for it
US20030233318A1 (en) * 2001-11-26 2003-12-18 King Douglas W. Systems and methods for fund transfers
US20030112948A1 (en) * 2001-12-19 2003-06-19 Wendell Brown System and method for establishing a connection between parties based on their availability
US20040176072A1 (en) * 2003-01-31 2004-09-09 Gellens Randall C. Simplified handling of, blocking of, and credit for undesired messaging
US20040205135A1 (en) * 2003-03-25 2004-10-14 Hallam-Baker Phillip Martin Control and management of electronic messaging
US20050021649A1 (en) * 2003-06-20 2005-01-27 Goodman Joshua T. Prevention of outgoing spam
US7711779B2 (en) * 2003-06-20 2010-05-04 Microsoft Corporation Prevention of outgoing spam
US20050111648A1 (en) * 2003-11-26 2005-05-26 Roome William D. Multi-stage telephone number dialing system and method for providing limited access to a telephone subscriber
US20050249214A1 (en) * 2004-05-07 2005-11-10 Tao Peng System and process for managing network traffic
US20050273857A1 (en) * 2004-06-07 2005-12-08 Check Point Software Technologies, Inc. System and Methodology for Intrusion Detection and Prevention
US20060020692A1 (en) * 2004-07-21 2006-01-26 Microsoft Corporation System and method for locating web services
US20060168024A1 (en) * 2004-12-13 2006-07-27 Microsoft Corporation Sender reputations for spam prevention
US20060239190A1 (en) * 2005-04-25 2006-10-26 Matsushita Electric Industrial Co., Ltd. Policy-based device/service discovery and dissemination of device profile and capability information for P2P networking
US20080194234A1 (en) * 2007-02-08 2008-08-14 Dlb Finance & Consultancy B.V. System and method of establishing a telephone connection
US20080196092A1 (en) * 2007-02-08 2008-08-14 Dlb Finance & Consultancy B.V. Method and system for reducing the proliferation of electronic messages
US20080196093A1 (en) * 2007-02-08 2008-08-14 Dlb Finance & Consultancy B.V. Method and system for reducing the proliferation of electronic messages
US20080195713A1 (en) * 2007-02-08 2008-08-14 Dlb Finance & Consultancy B.V. Method and system for transmitting an electronic message
US20080195515A1 (en) * 2007-02-08 2008-08-14 Dlb Finance & Consultancy B.V. Combined payment and communication service method and system
US20080192918A1 (en) * 2007-02-08 2008-08-14 Dlb Finance & Consultancy B.V. Method and system for establishing a telephone connection
US20090158403A1 (en) * 2007-12-14 2009-06-18 Dirk Leonard Benschop Method and system for permitting or denying service
US20090178117A1 (en) * 2008-01-03 2009-07-09 Dlb Finance & Consultancy B.V. System and method of retrieving a service contact identifier

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080196093A1 (en) * 2007-02-08 2008-08-14 Dlb Finance & Consultancy B.V. Method and system for reducing the proliferation of electronic messages
US20080192918A1 (en) * 2007-02-08 2008-08-14 Dlb Finance & Consultancy B.V. Method and system for establishing a telephone connection
US20080195713A1 (en) * 2007-02-08 2008-08-14 Dlb Finance & Consultancy B.V. Method and system for transmitting an electronic message
US20080196092A1 (en) * 2007-02-08 2008-08-14 Dlb Finance & Consultancy B.V. Method and system for reducing the proliferation of electronic messages
US20080194234A1 (en) * 2007-02-08 2008-08-14 Dlb Finance & Consultancy B.V. System and method of establishing a telephone connection
US8443424B2 (en) 2007-02-08 2013-05-14 Scipioo Holding B.V. Method and system for reducing the proliferation of electronic messages
US20090158403A1 (en) * 2007-12-14 2009-06-18 Dirk Leonard Benschop Method and system for permitting or denying service
US10203854B2 (en) * 2007-12-19 2019-02-12 Match Group, Llc Matching process system and method
US11733841B2 (en) 2007-12-19 2023-08-22 Match Group, Llc Matching process system and method
US11513666B2 (en) 2007-12-19 2022-11-29 Match Group, Llc Matching process system and method
US20090178117A1 (en) * 2008-01-03 2009-07-09 Dlb Finance & Consultancy B.V. System and method of retrieving a service contact identifier
US8239921B2 (en) 2008-01-03 2012-08-07 Dlb Finance & Consultancy B.V. System and method of retrieving a service contact identifier
US20090187666A1 (en) * 2008-01-17 2009-07-23 Dlb Finance & Consultancy B.V. Method and system for controlling a computer application program
US8463921B2 (en) 2008-01-17 2013-06-11 Scipioo Holding B.V. Method and system for controlling a computer application program
US20090249481A1 (en) * 2008-03-31 2009-10-01 Men Long Botnet spam detection and filtration on the source machine
US8752169B2 (en) * 2008-03-31 2014-06-10 Intel Corporation Botnet spam detection and filtration on the source machine
US20140074824A1 (en) * 2008-12-19 2014-03-13 Sean Rad Matching Process System And Method
US9733811B2 (en) * 2008-12-19 2017-08-15 Tinder, Inc. Matching process system and method
US20140279031A1 (en) * 2013-03-14 2014-09-18 Randy Mersky Mobile in-store loyalty advertising and marketing system and method
US20170206545A1 (en) * 2016-01-20 2017-07-20 Zipstorm Inc. Recipient centric messaging system and protocols to implement it over data networks
US9911134B2 (en) * 2016-01-20 2018-03-06 Zipstorm, Inc. Recipient centric messaging system and protocols to implement it over data networks
USD781882S1 (en) 2016-08-30 2017-03-21 Tinder, Inc. Display screen or portion thereof with a graphical user interface of an electronic device
USD852809S1 (en) 2016-08-30 2019-07-02 Match Group, Llc Display screen or portion thereof with a graphical user interface of an electronic device
USD854025S1 (en) 2016-08-30 2019-07-16 Match Group, Llc Display screen or portion thereof with a graphical user interface of an electronic device
USD781311S1 (en) 2016-08-30 2017-03-14 Tinder, Inc. Display screen or portion thereof with a graphical user interface
USD780775S1 (en) 2016-08-30 2017-03-07 Tinder, Inc. Display screen or portion thereof with a graphical user interface of an electronic device
US10977722B2 (en) 2018-08-20 2021-04-13 IM Pro Makeup NY LP System, method and user interfaces and data structures in a cross-platform facility for providing content generation tools and consumer experience
US11455991B2 (en) * 2019-07-18 2022-09-27 Capital One Services, Llc Voice-assistant activated virtual card replacement
US11769507B2 (en) 2019-07-18 2023-09-26 Capital One Services, Llc Voice-assistant activated virtual card replacement

Also Published As

Publication number Publication date
US8443424B2 (en) 2013-05-14
US20080192918A1 (en) 2008-08-14
AR064054A1 (en) 2009-03-11
AR064580A1 (en) 2009-04-08
EP1956541A1 (en) 2008-08-13
AR064058A1 (en) 2009-03-11
US20080194234A1 (en) 2008-08-14
US20080196092A1 (en) 2008-08-14
AR064053A1 (en) 2009-03-11
US20080195713A1 (en) 2008-08-14
US20080196093A1 (en) 2008-08-14
AR064056A1 (en) 2009-03-11
AR064055A1 (en) 2009-03-11
AR064057A1 (en) 2009-03-11
US20080195515A1 (en) 2008-08-14

Similar Documents

Publication Publication Date Title
US8443424B2 (en) Method and system for reducing the proliferation of electronic messages
EP1956775A1 (en) Method and system for restricting access to an electronic message system
US6779022B1 (en) Server that obtains information from multiple sources, filters using client identities, and dispatches to both hardwired and wireless clients
US8243636B2 (en) Messaging system and service
US8788657B2 (en) Communication monitoring system and method enabling designating a peer
US9460299B2 (en) System and method for monitoring and reporting peer communications
US9479638B2 (en) Methods and systems for dispatching messages to mobile devices
US7802304B2 (en) Method and system of providing an integrated reputation service
US8964956B2 (en) System and method for integrated compliance and contact management
AU2016215226A1 (en) Social engineering simulation workflow appliance
JP2012511842A (en) Electronic messaging integration engine
KR20110058828A (en) A communication device
US20090178117A1 (en) System and method of retrieving a service contact identifier
US20080268883A1 (en) Spam short message blocking system using a call back short message and a method thereof
US20040266413A1 (en) Defending against unwanted communications by striking back against the beneficiaries of the unwanted communications
JPH10275119A (en) Electronic mail system
KR100392067B1 (en) Method and system for transmiting instant messages by relaying them among distributed servers
CN107483323B (en) Instant messaging method and system
EP2227892B1 (en) System and method of retrieving a service contact identifier
CN110134859A (en) A kind of PIM method and system

Legal Events

Date Code Title Description
AS Assignment

Owner name: DLB FINANCE & CONSULTANCY B.V., NETHERLANDS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BENSCHOP, DIRK LEONARD;BENSCHOP, HENDERIK REINOUT;REEL/FRAME:020474/0342

Effective date: 20080201

AS Assignment

Owner name: DLB FINANCE & CONSULTANCY B.V., NETHERLANDS

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ADD ADDITIONAL ASSIGNEE PREVIOUSLY RECORDED ON REEL 020474 FRAME 0342. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT OF ASSIGNOR'S INTEREST;ASSIGNORS:BENSCHOP, DIRK LEONARD;BENSCHOP, HENDERIK REINOUT;REEL/FRAME:020520/0716

Effective date: 20080201

Owner name: HITD INFORMATION TECHNOLOGY B.V., NETHERLANDS

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ADD ADDITIONAL ASSIGNEE PREVIOUSLY RECORDED ON REEL 020474 FRAME 0342. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT OF ASSIGNOR'S INTEREST;ASSIGNORS:BENSCHOP, DIRK LEONARD;BENSCHOP, HENDERIK REINOUT;REEL/FRAME:020520/0716

Effective date: 20080201

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION