Method for automatically handling undesired electronic mail in communication networks at the recipient end

ABSTRACT

The invention relates to a method for automatically rejecting/avoiding undesired e-mails in mailboxes at the recipient end, according to which the address of the sender of the e-mail is compared with a recipient-specific list of authorized senders and is saved in the mailbox only if said address matches that of an authorized sender. A second, optional mailbox (junk mailbox, JMB) which is also accessible at the recipient end is provided for receiving all unauthorized messages. Optionally, automatic functions such as cyclical deletion, virus scanning, separation of stations and/or executable software, sender analysis, sending of stop requests and/or warnings, etc., can be configured in the system.

BACKGROUND OF THE INVENTION

1. Field of the Invention

This invention pertains to a process to automatically handle undesiredelectronic mail in communication networks.

2. Background

Large portions of the population use electronic mail today forcommercial or private purposes, or both. In this regard, the so-called“e-mail” process using standardized TCP/IP-based internet protocol (IETFRFC 791) is most popular.

The basic procedure is shown in FIG. 1. A sender, for example a personalcomputer (PC) 1.1, sends an e-mail 1.2 via the public internet 1.3,containing a target address of a recipient 1.7. The internet assigns theemail to one of the internet service provider's (ISP) 1.4 e-mail servers1.5 based on agreed-upon protocols and name conventions. This serveradministers the recipient addresses. The e-mail server 1.5 places themessage into the recipient's mailbox 1.6, from which the recipient 1.7can retrieve it.

The recipient address can be a so-called “alias” address containingplain language identification, followed by the internet service provideraddress (ISP address) and the country identification, such as:

-   -   Heinz.Mustermann@recipient-ISP.de.

The mail protocol also contains a sender's address, which is constructedin the same sense, such as:

-   -   Schrott-Versandt@sender-ISP.de.

Unfortunately, misuse of electronic mail is very common. Dubious sendersannoy large sections of the population with undesired e-mails, which inpractice are often of a pornographic, radical and/or advertising nature.

The purpose of this is to attract money through the back door fromunsuspecting customers. Often, viruses also find their way into PCs thisway. This type of undesired mail delivery is often called “junk mail” ininternet parlance.

SUMMARY OF THE INVENTION

A purpose of this invention is to propose a method to automaticallyhandle undesired electronic mail in communication networks from thereceiving end in order to stop the undesired annoyance of the recipientby junk mail.

According to an embodiment of the invention, the sender addressaccompanying an incoming e-mail is automatically compared to anelectronically accessed list of authorized sender addresses assigned tothe receiver, the comparison being performed before the e-mail is storedin a mailbox of the recipient. The only e-mails transferred to thereceiver's mailbox are those that had clearly been sent by authorizedsenders.

In a preferred embodiment of the invention, two logically and/orphysically separate mailboxes are provided, wherein the e-mail serversends to the second JMB mailbox all incoming e-mails that indeed havethe subscriber's correct recipient address but are not contained in thesender list on the receiving side, thus making them available forfurther processing by the internet service provider, administrativeauthorities, or by the recipient, or any combination of processors.

Preferably, the e-mails can be put through an automatic handling oranalysis process, or both, which can be configured by the recipient orby the ISP, or both, in the e-mail server, in a comparison device and/orat least one of the mailboxes, the process initiated and configuredeither on a case-by-case basis or permanently. In particular, allprograms that execute automatically that were sent as attachments to thee-mails can be separated in the JMB.

On the other hand, the e-mail can be analyzed to see if there is serial,incremental user identification occurring, which would enable inferencesto be drawn concerning automatic attempts at breaking into the e-mailsystem. This additional analysis makes it possible to very easilyidentify malicious individuals who automatically try all possible codes.

According to a further development of the invention, discontinuationrequests or cease and desist demands can be generated automatically anddelivered to the senders of undesired e-mails.

Furthermore, virus checks can be carried out, for example at anestablished time of day or each time a message arrives, and the contentsof the JMB can be cyclically deleted at specific time intervals.

BRIEF DESCRIPTION OF THE DRAWING

The purposes, advantages, and features of the invention will be morereadily perceived from the following detailed description, when read inconjunction with the accompanying drawing, wherein:

FIG. 1 is a schematic representation of an e-mail delivery system viathe internet; and

FIG. 2 is a representation of an e-mail delivery system in accordancewith the method of the invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

With the general e-mail delivery method according to FIG. 1 as astarting point, FIG. 2 shows the method according to the invention. Thesender address of the e-mail 2.1 arriving at the ISP 1.4 isautomatically verified in an analysis device 2.2 of the e-mail server1.5. The sender addresses authorized specifically for the recipient arestored in a database 2.3 in the form of a sender list. E-mails withsender addresses that are contained in list 2.3 are consideredlegitimate and are delivered to mailbox MB 2.4 of recipient 2.6.

All other e-mails with correct recipient addresses but with unauthorizedsender addresses are either thrown out or are delivered to a secondmailbox (Junk Mail Box JMB) 2.5. The recipient can inspect the contentsof JMB 2.5 as necessary.

In this way, recipient 2.6 is not bothered by undesired senders who doin fact know his correct e-mail address but are not authorized by therecipient. By introducing the optional JMB 2.5, the subscriber can stillinspect all mails if he wishes.

Furthermore, there are automatic configuration options in the senderanalysis and/or in at least one of the mailboxes 2.4, 2.5 that can beset up by the subscriber or by the ISP, or by both. The generation andadministration of the sender list is the responsibility of therespective subscriber, that is, the owner of the MB. Optionally, he canautomatically transfer mail sender information in the messages to the MBby selecting the respective mail message and “clicking” afunction/command provided for this purpose. This alleviates having tomanually enter the sender information.

Incoming mails in JMB 2.5 can be checked for viruses or for illegal orimmoral content. Attachments, for example, executable programs thatcould contain viruses, can be deleted and/or inferences can be drawnabout the sender based on the recipient address fields anddiscontinuation requests or cease and desist demands can beautomatically delivered.

1-8. (canceled)
 9. A method to automatically handle undesired electronicmail (e-mail) in communication networks at the receiver, the methodcomprising: automatically comparing the sender address accompanying anincoming e-mail to an electronically accessed list of authorized senderaddresses assigned to the receiver; then storing the e-mail in a mailboxMB of the recipient, wherein the only e-mails transferred to thereceiver's mailbox are those that had clearly been sent by authorizedsenders; and performing an analysis to see if there is serial,incremental user identification occurring so that conclusions can bedrawn concerning automatic attempts at breaking into the e-mail system.10. The method according to claim 9, wherein there are two logically orphysically, or both, separate mailboxes, said mailbox MB and a junkmailbox JMB, wherein the e-mail server sends to the JMB mailbox allincoming e-mails that indeed have the subscriber's correct recipientaddress but are not contained in the sender list on the receiving side,thus making them available for further processing selectively by theinternet service provider, the administrative authorities, and by therecipient.
 11. The method according to claim 9, wherein the incominge-mails are selectively put through an automatic handling and analysisprocess, which can be selectively configured by the recipient and by theISP, selectively in the e-mail server, in a comparison device, and in atleast one of the mailboxes, said process initiated and configured eitheron a case-by-case basis or permanently.
 12. The method according toclaim 10, wherein the incoming e-mails are selectively put through anautomatic handling andanalysis process, which can be selectivelyconfigured by the recipient andr by the ISP, selectively in the e-mailserver, in a comparison device, and in at least one of the mailboxes,said process initiated and configured either on a case-by-case basis orpermanently.
 13. The method according to claim 9, wherein all executableprograms sent as attachments to e-mails are automatically separated inthe JMB.
 14. The method according to claim 10, wherein all executableprograms sent as attachments to e-mails are automatically separated inthe JMB.
 15. The method according to claim 11, wherein all executableprograms sent as attachments to e-mails are automatically separated inthe JMB.
 16. The method according to claim 12, wherein all executableprograms sent as attachments to e-mails are automatically separated inthe JMB.
 17. The method according to claim 9, wherein if an undesirede-mail is received, discontinuation requests, or cease and desistdemands, can be generated automatically and delivered to the sender. 18.The method according to claim 10, wherein if an undesired e-mail isreceived, discontinuation requests, or cease and desist demands, can begenerated automatically and delivered to the sender.
 19. The methodaccording to claim 11, wherein if an undesired e-mail is received,discontinuation requests, or cease and desist demands, can be generatedautomatically and delivered to the sender.
 20. The method according toclaim 12, wherein if an undesired e-mail is received, discontinuationrequests, or cease and desist demands, can be generated automaticallyand delivered to the sender.
 21. The method according to claim 9,wherein virus checks of the e-mail can be carried out selectively at anestablished time of day or each time a message arrives.
 22. The methodaccording to claim 10, wherein virus checks of the e-mail can be carriedout selectively at an established time of day or each time a messagearrives.
 23. The method according to claim 11, wherein virus checks ofthe e-mail can be carried out selectively at an established time of dayor each time a message arrives.
 24. The method according to claim 12,wherein virus checks of the e-mail can be carried out selectively at anestablished time of day or each time a message arrives
 25. The methodaccording to claim 10, wherein the contents of the JMB can be cyclicallydeleted at specific time intervals.
 26. The method according to claim11, wherein the contents of the JMB can be cyclically deleted atspecific time intervals.
 27. The method according to claim 12, whereinthe contents of the JMB can be cyclically deleted at specific timeintervals.
 28. The method according to claim 13, wherein the contents ofthe JMB can be cyclically deleted at specific time intervals.