System and method for controlling and organizing Email

ABSTRACT

An Email control system and method is used in a computer data communications network, which includes a client computer and an Email server, in which the client computer contains an Email client having a physical Email address. The system includes a Client Control Program, which resides on the client computer, and an Alias Email Server, which communicates with the client over the data communications network. The method includes the steps of entering the physical Email address into the Client Control Program, together with client identification information. The Alias Email Server then generates an alias Email address, which is communicated back to the user, and additionally is stored in the Alias Email Server. The client then may make the Alias Email Address available to vendors or other correspondent wishing to communicate with the client. When the correspondent directs an Email to the client at the Alias Email Address, the Email is intercepted by the Alias Email Server, and is either forwarded to the client, filtered, or blocked. The Client Control Program allows for the client to control forwarding, filtering, or blocking, based on the Alias Email Address used by the correspondent, who never is given the physical Email address. The system also provides the client with a log of all transactions, including the time and date of the transactions, Alias Email Address used in the transaction, other identification information input by the client when the Alias Email Address was created.

BACKGROUND

[0001] 1. Field of the Invention

[0002] This invention relates to a system and method for controllingunwanted Email and organizing Email in general.

[0003] 2. Description of Prior Art

[0004] Email is now a universal means of communication, augmenting, andsometimes replacing other traditional forms of communication, includingpostal service, FAX, and voice communications. The ease of composing andthe speed of transmitting Email, and the presence of the Internet inalmost every corner of the world has promoted its use, which promises tobecome almost omnipresent.

[0005] The ease of use and speed of transmission has created problems,however, which include the transmission of unwanted messages, so-called“Spam”, the equivalent of junk mail in postal service jargon. And unlikepostal service junk mail, the transmission of Spam is virtually free forthe senders, as most Internet Service Providers provide unlimited usagefor modest fees.

[0006] Many Email systems provide means to filter and block unwantedmessages. As an example, consider the system used by hotmail.com®,Microsoft's Website-based Email system, which can be accessed athttp://www.hotmail.com.

[0007] In hotmail.com's blocking system, typical incoming Email can bedirected to the user's Inbox if and only if:

[0008] (a) The Email address appears on the “To:” or “Cc:” line.

[0009] (b) The sender's address appears in the user's Hotmail AddressBook.

[0010] (c) It is from a user in the hotmail.com or msn.com domain.

[0011] (d) It is a Hotmail WebCourier or Special Offers Subscription,Hotmail Member Letter, or is from Microsoft, MSN, or a MicrosoftPassport partner site.

[0012] These blocking and filtering features are typical attempts toreject unwanted Email, or “Spam”, but they have a number of drawbacks:For instance, many of these prior art systems blocking features do notallow Email communications which may be wanted by the recipient,although the recipient did not foresee communications from the sender.In addition, the unwanted sender of Email may continually change hisEmail address, so that the recipient cannot block Spam from a particularsender simply by blocking a single address. And finally, the Emailrecipient is constantly in danger of revealing his Email address to newpotential Spammers by sending Email messages to new recipients.

[0013] The present invention overcomes these problems by the simpleexpedient of never revealing his true Email address, but rather by usinga series of alias addresses which are first intercepted by an AliasEmail server before being forwarded to the recipient, and by providingmeans for the recipient to identify the circumstances under which thealias Email address was issued, and to whom it was issued.. When aparticular alias Email address becomes the target of excessive Spam, theuser can abandon that alias Email address, and create a new one.

[0014] In addition to controlling Spam, the current invention alsoprovides a useful means for organizing Email messages in general. Theinvention provides a means to identify Email message as to a number ofimportant parameters not provided by normal Email systems.

SUMMARY OF THE INVENTION

[0015] It is a general object of the current invention to provide asystem and method to block unwanted Email form a user's Email clientprogram. It is a further object of the invention to provide the userwith an unlimited number of alias Email addresses which can be used ordiscarded as they become available to Spammers.

[0016] In accordance with one aspect of the current invention, acomputer data communications network, including a client computer, anEmail client, and an Email server provides the system for the method,which allows a user having a physical address, to control unwantedEmail. The steps of the method include creating an alias Email server,entering the physical Email address into a Client Control Program by theuser, and entering identification information into the Client ControlProgram by the user. Next comes the generating an alias Email address bythe alias Email server, followed by the receiving an alias Email addressby the Client Control Program, and the sending by the Email clientprogram an Email message using the alias Email address to a recipient.Finally, the method provides for the receiving a message by the Emailclient program forwarded by the alias Email server, so that therecipient is unaware of the physical Email address.

[0017] In accordance with a second aspect of the invention, the methodincludes a displaying of a log of a multiplicity of transactions to theuser by the client control program, the log further including the timeand date of each transaction, the alias Email address of eachtransaction, and the identification information of the transaction.

[0018] According to a third aspect of the invention, the generating ofthe alias Email address further includes substantially random charactergenerating.

[0019] According to a fourth aspect of the invention, the system furtherincludes the entering one or more additional physical Email addressesinto the client control program, and receiving an additional alias Emailaddress corresponding to each additional physical Email address.

[0020] According to a fifth aspect of the invention, the method includesentering a request by the client control program for one or moreadditional alias addresses corresponding to each physical address, andreceiving by the client control program an additional alias Emailaddress corresponding to each such request.

[0021] According to a sixth aspect of the invention, the method furtherincludes the entering a request by the client control program to suspendforwarding by the alias Email server to the Email client program of allEmail addressed to a particular alias Email address.

[0022] According to a seventh aspect of the invention, the methodfurther includes the entering a request by the client control program topermanently discontinue receipt by the Email client program of all Emailaddressed to a particular alias Email address.

[0023] According to an eighth aspect of the invention, the methodfurther includes the generating by the client control program of analias Email address containing a user name.

[0024] According to a final aspect of the invention, the method furtherincludes the filtering the Email at the Alias Email Server.

DESCRIPTION OF DRAWINGS

[0025] These, and further features of the invention, may be betterunderstood with reference to the accompanying specification and drawingsdepicting the preferred embodiment, in which:

[0026]FIG. 1 depicts a block diagram of a popular prior art Emailsystem.

[0027]FIG. 2 depicts a block diagram of the current invention.

[0028]FIG. 3 depicts the startup screen of the Client Control Program ofthe current invention.

[0029]FIG. 4 depicts a setup screen of the Client Control Program of thecurrent invention

[0030]FIG. 5 depicts a screen delivering an Alias Email address to theuser of the current invention.

[0031]FIG. 6 depicts an Email message forwarded to the user by the AliasEmail Server.

[0032]FIG. 7 depicts the log produced by the Client Control Program ofthe current invention.

[0033]FIG. 8 depicts the screen of the Client Control Program used tofilter or block unwanted Email messages.

[0034]FIG. 9 depicts an input screen produced by an alternativeembodiment of the Client Control Program of the current invention

DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0035] The preferred embodiments are understood by first considering theprior art, as shown in FIG. 1. This figure begins with an Email client,a program which sends and receives Email. Clients include programs suchas Eudora®, and Microsoft's Outlook Express®. Referring to this figure,the sender of the Email, using the Email client 2 sends and receivesEmail 1 using communication link 8, which connects the client to theInternet Service Provider 1 (ISP) 4. This ISP may include such majorcompanies as America On Line® (AOL), or the Microsoft Network (MSN®).The ISP then communicates with the Email server 6, using communicationlink 10, via communication link 10. The communications links arebi-directional, with Emails being received and transmitted through theEmail server. In turn, the Email server 6 is connected with other ISPsvia other communications links.

[0036] The Email server 6 next transmits the Email to the recipient 12,who uses client software 12 to receive the Email. This communication 18,is usually done through the same or another ISP, shown as ISP 2 (14) inFIG. 1. The communication as shown in FIG. 1 is all bi-directional, sothat the recipient, using receiver Email client 12, may send Email backto the sender client 2, in exactly the same manner as described abovewhen the communication is from sender to receiver.

[0037] The Email address of the sender is included in the Emailcommunication, so that the Email recipient may use the sender's Emailaddress for any purpose desired. The recipient may sell the sender'sEmail address to third parties who collect Email addresses for thepurposes of sending advertisements, or other communications to thesender, which the sender has not solicited. Such unsolicited Emailmessages are commonly known as “Spam”.

[0038] The current invention avoids this problem by not revealing theEmail sender's true Email address, but by instead utilizing an aliasaddress which directs Email responses to an alias server, which may ormay not retransmit the response Email to the original sender.

[0039] Referring now to FIG. 2, the current invention utilizes an AliasEmail server 100 as an intermediary between the Email client 20 and theEmail server 140. The client first communicates with the Alias Emailserver, which assigns the client with a new, unique alias Email address.This alias Email address is then used by the client when communicatingwith an Email recipient requesting an Email address from the client.

[0040] It should be noted that this system operates only underconditions that the sender's Email address is transmitted to therecipient by non-Email means. The sender may give his Email address to arecipient by letter, FAX, telephone, or by including it in a formcontained within a WEB site requesting the sender's Email address. Thus,the communication shown in FIG. 2 is unidirectional only as between theAlias Email Server and the receiver Email client. That is, the receiverEmail client 12, may communicate Email messages to the Alias EmailServer 100 by this method, but not vice-versa. The Alias Email serverwill only send messages to clients registered to use the serviceprovided by the Alias-Email Server.

GENERATING THE ALIAS EMAIL ADDRESS

[0041] The invention is implemented with the use of a client controlprogram called “SpamMotel.exe”, which resides on the client's computer.When this program is started, it first displays the screen shown in FIG.3.

[0042] Referring now to this figure, the client first enters an newaccount by clicking on SETUP button 228, which then displays the DIALOGwindow shown in FIG. 4. Referring now to FIG. 3, the user enters a username, which may be anything the client desires, into box 220, and anactual (physical) Email address already in use in EMAIL ADDRESS box 202.The user must retype his Email address again in box 204, as an errorreduction technique. The user may then make up a password, and type itinto box 206, and repeat the same password in box 208. The user maycheck off a box to save the password, providing different levels ofsecurity for each account. The user then clicks on the CREATE NEWACCOUNT button 222, and is then returned to the original screen, asshown in FIG. 3.

[0043] Referring again to FIG. 3, the information just entered isdisplayed. The pulldown list 320 shows the user name just created.However, the user may create a number of different profiles, havingdifferent user names, corresponding to a number of different physicalEmail addresses used. The corresponding physical Email address is shownin box 322, and the password in box 324, although each character of thepassword is represented by an “x” in this screen. However, the user maychange the password in box 324.

[0044] A message may be included to identify all Email associated withthis user name by typing into box 326. In the example shown in FIG. 4,the message “For computer components only” will appear on all Emailforwarded from the alias server associated with this user name. Inaddition, one of four TYPES 334 is selected. These TYPES include FWD,SPAM, URGENT, and a custom type which will display a message which theuser enters in box 332. This TYPE message will appear as the SUBJECT ofany Email forwarded by the Alias Email server.

[0045] The final step in the generation of a new alias Email address isdone by clicking on the CREATE NEW ADDRESS button 340, which producesthe screen shown in FIG. 5, in which a new window 400 appears.

[0046] Whenever the CREATE NEW ADDRESS button is depressed in the windowshown in FIG. 3, the Client Control Program sends the informationentered so far into the Client Control Program to the Alias Emailserver, which then enters this information into an alias user record inits master data file, and then generates a pseudo-random string of 10characters, followed by “@spammotel.com”, which constitutes the aliasEmail address corresponding to the user name 320, as shown in FIG. 3.This alias Email address is then entered into the alias user record inthe datafile, which also contains the remainder of the user informationcorresponding to this user name.

[0047] It is generally recommended that the user create a new addresswhenever a new Website request for an Email address is made, so that theuser can distinguish between responses from different vendors. Thus,additional alias Email addresses can be generated corresponding to thesame user name, with or without different text features and TYPEselections. Thus, the database may contain more than one alias userrecord corresponding to the same user name. However, no two alias userrecords may contain the same alias Email address.

[0048] After a new address is created, the address is stored on theclient system clipboard, so that it may be simply pasted into theappropriate box in any Web site form request from a correspondentrequesting the Email address. In any event, the alias Email address iscommunicated to a recipient wanting to use an Email address tocommunicated with the sender.

RECEIVING EMAIL HAVING THE ALIAS EMAIL ADDRESS

[0049] Assuming that the recipient (or any other Email client having thealias Email address) now sends an Email message to the user at theaddress just created by the Client Control Program, the Email message isreceived by the Alias Email Server, and modified by incorporatingvarious information previously entered in the Client Control Programinto the Email message. This modified message is then forwarded by theAlias Email Server to the sender's Email client 2. FIG. 6. depicts anexample of such a forwarded Email message.

[0050] Referring now to FIG. 6, the actual message 18 sent by therecipient appears at the bottom on the screen. The screen contains otherinformation concerning this message, however. First of all, the AliasEmail address 410 appears next to the “To:” heading, indicating that themessage was addressed to this Alias Email address by the recipient.Next, the “Subject” 412 of the message is the “custom” TYPE informationentered by the user in box 332 as seen in FIG. 3. This subject, “netshopping” in the present example, is followed by a colon (:), afterwhich the subject information entered by the recipient, follows, in thecase, the text “your orde”.

[0051] Then a block of information 420 appears, indicating that thismessage was forwarded by the Client Control Program, and including thetime and date of the message, as well as the time and date that theAlias Email address was created. The total number of messages forwardedand received 414 is shown. Finally, the “note”, or “message” textpreviously entered by the user to identify this Alias Email address,shown as reference number 326 in FIG. 3, appears, to remind the userfurther about this particular Alias Email address.

[0052] This message text may be indefinite in length, unlike the“subject” text transmitted by normal Email, which is severely limited inlength. The message text in the current invention is not sent within theEmail header block, as in normal Email, but is incorporated into thebody of the Email when transmitted back to the user. Thus, this messagemay be quite extensive, and must be sufficient in length to adequatelydescribe the nature of the circumstances of the creation of the alias inquestion. It is typically used to remind the user why this particularAlias Email address was created and how it is used.

USING THE “REPLY” FUNCTION

[0053] The invention allows for the user to reply to Emails, while stillkeeping his or her physical Email address from the sender.

[0054] This is done by taking the recipient's original Email, as itfirst comes through the Alias Email server, and recording therecipient's Email address in the Alias Email server. If the user hasused the ‘reply-to’ function based on current Email protocols, then that‘reply-to’ address is the one that is recorded.

[0055] A special return code is then inserted in the ‘reply-to’ portionof the sender's Email ‘header’ information, overwriting any otherinformation in that area of the header.

[0056] SpainMotel's current return code is of the formABCD123ER-spammotel.com (8 characters of mixed letters and numbers)

[0057] Thus, when the user clicks on the reply button of his Emailclient program, it is the new return code that is automatically placedin the ‘to’ header for purposes of replying. (This is handled this wayby all current Email programs, based on current Email protocols andformats.)

[0058] With the new return code in place, when the user clicks on ‘send’in his Email client program, the reply is sent to the Alias Email serverinstead of going directly back to the recipient. Next, the Alias Emailserver strips all information which could identify the user's physicalEmail address, and the user's Alias Email address originally given tothe recipient used as the new ‘replied-from’ address. Thus the privacyof the user's real Email address is preserved.

[0059] The Alias Email server takes the further step of removing boththe subject-line prefix that the user first set (the Fwd:, Spain:,Urgent:, or Custom:).

[0060] The Alias Email server also takes the further step of removingthe information portion (memo, dates and times, etc.) from the body ofthe ‘replied-to’ Email, before sending it back to the recipient.Communication may thus go “back and forth” a number of times whilepreserving the “alias” form of user's email address.

USING THE LOG INFORMATION

[0061] The current invention allows the user to review the history ofthe various alias Email addresses created, and the messages receivedaddressed to those alias Email addresses. A log is maintained on theAlias Email server of this history.

[0062] The log file is accessed either by clicking on the VIEW LOGbutton 342, as shown in the screen of FIG. 3, or by accessing the AliasEmail Server WEB site at www.spammotel.com. In either case, the screenshown in FIG. 7 is displayed.

[0063] Referring now to FIG. 7, the history is displayed as a series ofevents, or transactions, each associated with a particular alias Emailaddress. Referring to the even shown in block 430, the date of the eventis displayed, in this case Nov. 29, 2000, and the time, in this case9:09 AM. The number of messages received by the Alias Email server isshown, as well as the number of such messages forwarded to the sender'sphysical Email address. Because the sender may chose to block or filtermessages, the number received and the number forwarded need not be thesame.

[0064] Still referring to block 430, the contents of the TYPE parameter,shown as reference number 334 in FIG. 3, and the message, shown asreference number 326 in FIG. 3, is also displayed. And finally, theAlias Email address prefix is displayed.

[0065] The user may decide to block or suspend the forwarding ofmessages from the alias Email server by means of a check box 434,together with an action button, either the suspend button 440, or theresume button 436, which undoes the action of the suspend button. Theuser may also decide to filter message associated with a particularalias Email address by clicking the FILTER button 442, which thendisplays the screen shown in FIG. 8.

[0066] Referring now to FIG. 8, the user of a particular alias Emailaddress 470 may set up filters to either allow only those Email messagescontaining certain character combinations in the Email FROM header, orto reject those Email messages containing certain character combinationsin the Email FROM header.

[0067] To use this feature, one of the check boxes 464, 468 must bechecked, and the user enters the text string to be either accepted orrejected in the corresponding text box 460, 462. It should be noted thatthe Log Display, previously described, also allows the user to reject orsuspend all mail addressed to a particular alias Email address in itsentirety.

[0068] In order to make the log function more useful and convenient, asort feature is incorporated into the log. Referring again to FIG. 7, apull-down list 441 is available to allow the user to select a basis forsorting. These include sorts according to the date of creation of theevent or transaction, the date received by the user, the status of thetransaction (i.e. whether reception is currently suspended, or resumed),and the total transactions received so far.

[0069] In addition to the sort feature in the log file, provisions arealso included to allow the user to search the log file for a text stringcontained within the message or notes field, or within the subject lineprefix line, as shown in FIG. 6 as reference number 412.

ALTERNATIVE EMBODIMENT—ALIAS EMAIL SERVER INCORPORATED INTO EMAIL SERVER

[0070] A number of WEB-based Email sites exist, including Hotmail® andYahoo! Mail.® In these sites, the user's Email account is accessed bylogging onto the appropriate Internet Site, http://www.hotmail.com inthe case of Hotmail, and http://mail.yahoo.com, in the case of Yahoo!Mail. The functions of the Email server, in this case, exists on thehost's Internet Site, and no Email client program is required for theuser to send and receive Email.

[0071] When using such a system, it is not necessary to have a separateAlias Email Server, as all the functions of the Alias Email Server maybe incorporated into the host's WebSite. The Alias Email Server mayindeed be a separate program or process operating within the EmailServer, or the functions may be otherwise incorporated into the EmailServer.

[0072] In addition, the forwarding of the Email destined for the userand addressed to the user's alias Email address is performed by thecombined Email Server/Alias Email Server. Nevertheless, for suchcombined systems, the terms “Alias Email Server”, and “forwarding” ofthe Email will be used, referring in this case to the functions, ratherthan to specific software modules or systems.

[0073] The nature of this alternative embodiment does not require astand-alone client program, as previously mentioned. Control by the usermay be implemented by means of a browser plug-in, or a proxy setting inthe browser itself. However the functionality of the system, as seen bythe user, will remain the same as if there were a client programresident on the client computer.

[0074] In addition, an Email client program may also be used when at aWEB site requesting an Email address, and when it would be inconvenientfor the user to return to the WEB-based Email program to generate anAlias Email address.

[0075] This alternative embodiment also provides alternative methods fordisplaying the “notes” messages, and other information used to identifythe alias email address, including time and date of creation, and otherstatistical data shown in the log file display of FIG. 7. Thesealternative display methods include pop-up windows, linked to otherscreens which are displayed when the user clicks on the link. Segmentedscreens, or screens containing separated windows, may also display thisinformation. The information may also be downloaded as a separate file.

SECOND ALTERNATIVE EMBODIMENT—DASHMAIL

[0076] The preferred embodiment of the current invention generates arandom, or pseudo-random string of characters, which are used with theAlias Email server suffix, spammotel.com. The resultant alias Emailaddress is therefore not immediately recognizable by the user, who mayuse the message FROM header to identify the source of the message, orthe message text associated with a custom TYPE 334, as shown in FIG. 3.

[0077] Referring now to FIG. 9, an alternative embodiment contains, aprovision to allow the user to incorporate his own name into the aliasEmail address. The screen shown in FIG. 8 is produced in place of thatof FIG. 4 when a new alias Email address is requested by the user.

[0078] This embodiment allows the user to issue an Alias Email address,and transmit it to the recipient, without the need to access a computeror similar device at the time of issuance. Under such circumstances, theuser will enter the Alias Email address, and other information, into theClient Control Program at a later time.

[0079] As shown in FIG. 8, the alias Email address is composed of threeparts: a prefix, which may either be created by the user by typing itinto box 480; or, as an alternative, the user may request apseudo-random character string, as in the preferred embodiment. Thesecond part of the alias Email address is a “dash” (-) character,followed by the user name as entered into the Client Control Program aspart of the system setup. And the third part of the name, following the“@” sign, is the Alias Email Server address.

[0080] Thus, in the example previously used for user joedoe, the aliasEmail address might be “amazon-joedoe@dashmail.com, in the case wherethe user wished to identify an alias Email address to be used incommunicating with Amazon.com®. the well-known e-Commerce company.

[0081] It is important to note that incoming e-mails are checked againstthe database to determine whether there are existing entries (memos,etc.) for that Dashmail address. If no entry exists, the Email isflagged with an indicator in the subject line. This allows the user tospot the missing entry, and also allows for such e-mails to be divertedto a separate folder for review.

[0082] This is a key element of the dashmail embodiment. Without thisfunctionality, anyone could send an Email to the user and “get through”.Its incorporation provides means for blocking unwanted responses.

[0083] The default setting is to let everything through, that is, to beforwarded to the user. This is because the user may forget to make anentry or has not yet had time to make an entry before receiving e-mailsto a given address.

[0084] The suggested protocols for the flags in the subject line are:

[0085] (a) Fwd: Emails with entries. This may be changed by user to acustom prefix.

[0086] (b) fwd: Emails using the root name only, when the “from” addresshas been placed in a “friends and family” list.

[0087] (c) x-Fwd: Emails without entries, but with a prefix. Usuallythese are Emails for which the user will add an entry.

[0088] (d) xfwd: Emails using the root name only, not found in “friendsand family” list.

[0089] The user may choose to block all e-mails containing either of the“x” flags.

[0090] The Dashmail alternative embodiment may use or accept alternateforms of address with the same basic function. These would most likelybe the dash, the dot, and the underscore. And may also use the followingform:

[0091] prefix@username.programname.com

[0092] instead of:

[0093] prefix-username@programname.com

[0094] For users having access to their own domains, the form:

[0095] prefix@username.com

[0096] may also be use.

[0097] While the invention has been described with reference to specificembodiments, it will be apparent that improvements and modifications maybe made within the purview of the invention without departing from thescope of the invention defined in the appended claims.

I claim:
 1. In a computer data communications network comprising aclient computer, an Email client program, and an Email server, a methodfor a user having a physical address, to control and organize Email,comprising the steps of: (a) creating an alias Email server; (b)entering the physical Email address into a Client Control Program by theuser; (c) entering identification information into the Client ControlProgram by the user; (d) generating an alias Email address by the aliasEmail server; (e) receiving an alias Email address by the Client ControlProgram; (f) sending the alias Email address to a recipient; (g)receiving by the alias Email server of a message from by recipient; and(h) forwarding the message to the Email client program, together withthe identification information; so that the recipient is unaware of thephysical Email address.
 2. In a computer data communications network,comprising a client computer, means for the user to send and receiveEmail, and an Email server, a method for a user, having a physicaladdress, to control and organize Email, comprising the steps of: (a)incorporating an alias Email server into the Email server; (b) enteringthe physical Email address into a Client Control Program by the user;(c) entering identification information into the Client Control Programby the user; (d) generating an alias Email address by the alias Emailserver; (e) receiving an alias Email address by the Client ControlProgram; (f) sending the alias Email address to a recipient; and (g)forwarding the message to the Email client program, together with theidentification information; so that the recipient is unaware of thephysical Email address.
 3. The method of claims 1 or 2, furthercomprising: (a) selecting by the user of the Reply function of the Emailclient program; (b) inputting of a reply message by the user; (c)transmitting of the user's reply message to the Alias Email server: (d)stripping the user's reply message of all information which couldidentify the user's physical email address; and (e) forwarding thestripped reply message to the recipient.
 4. The method of claims 3,further comprising a displaying of a log of a multiplicity oftransactions to the user by the client control program, the log furthercomprising: (a) the time and date of each transaction; (b) the aliasEmail address of each transaction; and (c) the identificationinformation of the transaction, and further comprising sorting the logaccording to a plurality of sort standards, the standards furthercomprising date of creation, date of reception, status, and numberreceived.
 5. The method of claim 4, wherein the identificationinformation further comprises a block of message text transmitted withinthe body of the Email message forwarded to the user by the alias Emailserver.
 6. The method of claim 5, wherein the generating of the aliasEmail address further comprises substantially random charactergenerating.
 7. The method of claim 6, further comprising entering one ormore additional physical Email addresses into the client controlprogram, and receiving an additional alias Email address correspondingto each additional physical Email address.
 8. The method of claim 7,further comprising entering a request by the client control program forone or more additional alias addresses corresponding to each physicaladdress, and receiving by the client control program an additional aliasEmail address corresponding to each such request.
 9. The method of claim8, further comprising entering a request by the client control programto suspend forwarding by the alias Email server to the Email clientprogram of all Email addressed to a particular alias Email address. 10.The method of claim 9, further comprising entering a request by theclient control program to permanently discontinue receipt by the Emailclient program of all Email addressed to a particular alias Emailaddress.
 11. The method of claim 10, further comprising generating bythe client control program of an alias Email address containing a username, and filtering the Email at the Alias Email Server.
 12. The methodof claim 11, further comprising generating by the client control programof an alias Email address containing a user name, and filtering theEmail at the Alias Email Server.
 13. A system for a user having aphysical address to control and organize Email in computer datacommunications network, comprising: (a) an alias Email server; (b) aClient Control Program (c) means for entering the physical Email addressinto the client control program; (d) means for entering identificationinformation into the Client Control Program; (e) means for generating analias Email address by the alias Email server; (f) means for receivingan alias Email address by the Client Control Program; (g) means forsending by the Email client program an Email message to a recipientusing the alias Email address; (h) means for receiving a message by theEmail client program forwarded by the alias Email server; so that therecipient is unaware of the physical Email address.
 14. A system for auser having a physical address to control and organize Email in computerdata communications network which, comprising: a) an alias Email serverincorporated into an Email server; b) means for entering the physicalEmail address user; c) means for entering identification information bythe user; d) means for generating an alias Email address by the aliasEmail server; e) means for receiving an alias Email address by user; f)means for sending the alias Email address to a recipient; and g) meansfor forwarding the message to the Email client program, together withthe identification information so that the recipient is unaware of thephysical Email address.
 15. The system of claims 13 or)4, furthercomprising: (a) means for selecting by the user of the Reply function ofthe Email client program; (b) means for inputting of a reply message bythe user; (c) means for transmitting of the user's reply message to theAlias Email server: (d) means for stripping the user's reply message ofall information which could identify the user's physical email address;and (e) means for forwarding the stripped reply message to therecipient.
 16. The system of claim 15, further comprising means fordisplaying of a log of a multiplicity of transactions to the user by theclient control program, the log further comprising: (a) the time anddate of each transaction; (b) the alias Email address of eachtransaction; and (c) the identification information of the transaction.And means for sorting the log according to a plurality of sortstandards, the standards further comprising date of creation, date ofreception, status, and number received.
 17. The system of claim 16,wherein the means for generating of the alias Email address furthercomprises a substantially random character generator.
 18. The system ofclaim 17, further comprising means for entering one or more additionalphysical Email addresses into the client control program, and means forreceiving an additional alias Email address corresponding to eachadditional physical Email address.
 19. The system of claim 18, furthercomprising means for entering a request by the client control programfor one or more additional alias addresses corresponding to eachphysical address, and means for receiving by the client control programan additional alias Email address corresponding to each such request.20. The system of claim 19, further comprising mean for entering arequest by the client control program to suspend forwarding by the aliasEmail server to the Email client program of all Email addressed to aparticular alias Email address.
 21. The system of claim 20, furthercomprising means for entering a request by the client control program topermanently discontinue receipt by the Email client program of all Emailaddressed to a particular alias Email address.
 22. The system of claim21, further comprising means for generating by the client controlprogram of an alias Email address containing a user name, and furthercomprising means for filtering the Email at the Alias Email Server. 23.The system of claim 22, further comprising means for generating by theclient control program of an alias Email address containing a user name,and further comprising means for filtering the Email at the Alias EmailServer.