System, method and article of manufacture for preventing the proliferation of unwanted electronic messages

ABSTRACT

A system, method, and article of manufacture are provided for affording an application program with an electronic message to help preclude unwanted electronic messages from being sent on a network. First, at least one application program is initialized after an electronic message is selected by a user. Such application program is received with the electronic message on a network. After initialization, the application program is executed. The execution of the application program includes displaying text included with the electronic message, depicting indicia, and communicating an identifier of the electronic message on the network upon the selection of the indicia by the user for precluding unwanted electronic messages from being sent on the network.

RELATED APPLICATIONS

The present application relates to applications entitled “ElectronicMessage Payload for Interfacing with Text Contained in the Message”,“Method and Article of Manufacture for a Sub-Browser Application ProgramStored in an Electronic Message”, “Method and Article of Manufacture forDelaying Advertisement Execution in a Geometric Electronic MediaDistribution Framework”, “Textual Hyperlink Capable of Inputting Text asa Parameter while Executing an Associated Link”, and “Method andApparatus for the Production, Delivery, and Receipt of Enhanced E-Mail”which were filed concurrently herewith and are incorporated herein intheir entirety.

FIELD OF THE INVENTION

The present invention relates to e-Conmerce and more particularly topreventing unwanted electronic messages, or “spam”, from beingproliferated on a network.

BACKGROUND OF THE INVENTION

Computer technology is continuously advancing, providing newer computersystems with continuously improved performance. One result of thisimproved performance is an increased use of computer systems byindividuals in a wide variety of business, academic and personalapplications. In some instances, these computer systems are linkedtogether by a network or modems so that the systems can communicate witheach other via electronic mail.

Electronic mail, or “e-mail”, has become a popular way for people tocommunicate using networks of various types such as the Internet. Usinge-mail, a person can send messages and other information as attachmentselectronically to other e-mail users. Such attachments normally includepictures, sound recordings, formatted documents, etc. that are indigital form, and which are executable independent of the opening andreading of the message included with the e-mail.

The recent explosion in the popularity of the Internet has providedtremendous potential for marketing goods and services. However, for mostsmall to mid-sized companies, advertising their wares and servicesthrough a web-site on the Internet has not proven to be very effective.One of the difficulties with advertising on the Internet is directingconsumers to visit a particular web-site. The overabundance of web-sitelocations has created an information overload for many consumers.

E-mail is one possible solution for advertisers. Despite its allure,however, promotional e-mail is still frowned upon, and at present itscontent is generally limited to unformatted text without graphics whichis often not personalized. Accordingly, promotional e-mail is oftendisregarded, and in almost all cases, is not propagated by therecipients themselves.

At the present, such promotional e-mail, or “spam”, has become such anannoyance to many users of e-mail that “lists” have formed. Such listsare often generated by users reporting unwanted e-mail to a central sitewhich, in turn, uses filtering techniques or the like to prevent theproliferation of the unwanted email. While such “lists” are effectiveonce the unwanted e-mail is disclosed, a problem often arises inreporting the unwanted e-mail.

Users are often very busy, and excuse unwanted e-mail rather thatreporting the same due to the multiple user actions required forreporting. Namely, a user must often copy the domain name, exit ane-mail browser, initiate a network browser, locate the appropriate“list” site, and manually enter the domain name and any other requiredinformation. These tedious steps often serve as a deterrence to takeaction upon receiving an unwanted electronic message.

SUMMARY OF THE INVENTION

A system, method, and article of manufacture are provided for affordingan application program with an electronic message to help precludeunwanted electronic messages from being sent on a network. First, atleast one application program is initialized after an electronic messageis selected by a user. Such application program is received with theelectronic message on a network. After initialization, the applicationprogram is executed. The execution of the application program includesdisplaying text included with the electronic message, depicting indicia,and communicating an identifier of the electronic message on the networkupon the selection of the indicia by the user for precluding unwantedelectronic messages from being sent on the network.

In one aspect of the present invention, the identifier is generated by aserver that sends the electronic message on the network to the user. Asan option, the identifier may be stored in the application program to besent upon the selection of the indicia.

In another aspect of the present invention, an amount of the identifiersthat were sent by a plurality of users who received the electronicmessage may be tracked. Upon a predetermined amount of the identifiersbeing tracked, unwanted electronic messages may be prevented from beingsent on the network.

As an option, the transmission of the unwanted electronic messages maybe precluded by preventing the transmission of any subsequent electronicmessages from a source of the original unwanted electronic message.Further, content of the electronic message may be received, thusallowing the prevention of transmission of any subsequent electronicmessages having content substantially similar to the received content.

These and other advantages of the present invention will become apparentto those skilled in the art upon a reading of the following descriptionsof the invention and a study of the several figures of the drawing.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing aspects are better understood from the following detaileddescription of one embodiment of the invention with reference to thedrawings, in which:

FIG. 1 is an illustration of the geometric manner in which an electronicmessage may be distributed over a network in accordance with the priorart;

FIG. 2 is a graph depicting the geometric nature illustrated in FIG. 1;

FIG. 3 is a schematic diagram of one exemplary hardware implementationof the present invention;

FIG. 4 is a flowchart illustrating the execution of the firstapplication program of one embodiment of the present invention;

FIG. 5 is an illustration of a graphical user interface of the presentinvention that is displayed upon the execution of the first applicationprogram, and which is used to display the text of the first electronicmessage and any functionality associated therewith;

FIG. 6 illustrates one example of the functionality displayed uponexecution of the first application program in accordance with oneembodiment of the present invention;

FIG. 7 illustrates the execution of the second application program ofthe present invention, or in an alternate embodiment, interaction with asite on the network which is initiated upon the selection of one of the“FORWARD”, “REPLY”, or “NEW” icons displayed in the graphical userinterface of FIG. 5;

FIG. 8 is an illustration of a graphical user interface initiated afterselection of one of the “FORWARD”, “REPLY”, or “NEW” icons in accordancewith one embodiment of the present invention;

FIG. 9 is a flowchart illustrating the continued operation of thepresent invention upon the selection of the “SEND” or other similar iconon the graphical user interface of FIG. 8;

FIG. 10 is a flowchart illustrating the operations associated with thefetch e-mail operation of FIG. 9;

FIG. 11 is a flowchart illustrating the operations associated with theformat and send message operation of FIG. 9;

FIG. 12 is a graphical user interface similar to that of FIG. 5 with theexception of an additional “unwanted electronic message” icon; and

FIG. 13 is a flowchart illustrating a server-based process initiatedupon the selection of the additional “unwanted electronic message” iconof FIG. 12.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

FIGS. 1 and 2 illustrate the geometric manner in which an electronicmessage may be distributed over a network in accordance with the priorart. FIGS. 3-13 illustrate a system for providing an application programadapted to be incorporated as a “payload” of an electronic message. Suchapplication program is automatically initialized after the electronicmessage is selected by a user. After initialization, the applicationprogram is executed. The execution of the application program includesvarious features.

For example, such execution may include displaying text included withthe first electronic message, displaying indicia, allowing entry oftext, and sending the entered text and the application program over anetwork in a second electronic message to a second user upon selectionof the indicia. In one embodiment, a code segment may be executed whichincludes as a parameter at least a portion of the text included with theelectronic message, thus incorporating the text with any type offunctionality, i.e. graphic, etc. Still yet, other features may beincluded such as an advertisement that is displayed only after theelectronic message is forwarded a predetermined number of instances.Also, the text included with the electronic message may constitute ahyperlink which, when selected, links to a site and enters the text as aparameter upon such linking.

As will become apparent, the personal text of the electronic message mayinduce the user to open the mail while the functionality may serve as aninducement to send the electronic message to another user. This in turnmay be used to incur visits to a particular site on the network. In thealternative, it may serve to afford widespread exposure ofadvertisements or any other feature that supports e-Commerce.

FIG. 3 illustrates an exemplary hardware configuration in accordancewith one embodiment having a central processing unit 310, such as amicroprocessor, and a number of other units interconnected via a systembus 312. The hardware configuration shown in FIG. 3 includes RandomAccess Memory (RAM) 314, Read Only Memory (ROM) 916, an I/O adapter 318for connecting peripheral devices such as disk storage units 320 to thebus 312, a user interface adapter 322 for connecting a keyboard 324, amouse 326, a speaker 328, a microphone 332, and/or other user interfacedevices such as a touch screen (not shown) to the bus 312, communicationadapter 334 for connecting the hardware configuration to a communicationnetwork 335 (e.g., a wide area network) and a display adapter 336 forconnecting the bus 312 to a display device 338.

The hardware configuration typically has resident thereon an operatingsystem such as the Microsoft Windows NT or Windows/98/2000 OperatingSystem (OS), the IBM OS/2 operating system, the MAC OS, or UNIXoperating system. Those skilled in the art will appreciate that thepresent invention may also be implemented on platforms and operatingsystems other than those mentioned.

FIG. 4 is a flowchart illustrating the execution of the firstapplication program associated with the first electronic message that issent to a first user. The first electronic message may be received overany network such as a wide area network. In one embodiment, such widearea network may include the Internet and the first electronic messagemay be transmitted using a protocol such as TCP/IP and/or IPX. The firstelectronic message includes a first application program incorporatedtherein by any desired technique, along with a message, i.e. graphic,textual, audible, etc., generated by a previous user. In one embodiment,at least a portion of the first application program includes a JAVAAPPLET. In the alternative, such first application program may includecode segments written in any desired object-oriented computerprogramming or markup language.

As shown in operation of FIG. 4, the first application program of thefirst electronic message is automatically initialized upon beingselected, or “opened”, by a user on an electronic mail browser, i.e.NETSCAPE COMMUNICATOR, MICROSOFT OUTLOOK, etc. Such selection mayinclude “clicking” on an identifier of the first electronic message, orany other technique enabled by the electronic mail browser. Upon suchuser action, the first electronic message is initialized immediately inan automated manner. To accomplish this, the first application programmay depart from an “attachment” in the traditional sense, and beincluded in the first electronic message itself. Further, the electronicmail browser must be capable of automatically recognizing and executingthe computer or markup language employed by the application program, acommon capability among electronic mail browsers.

Initialization of the first application program may include determiningvarious variables and other parameters required to execute theapplication program, or any other “pre-execution” duties. For example,one of such parameters may comprise the body of text included with thefirst electronic message.

In one embodiment, hypertext markup language may be included with thefirst electronic message to contain the parameters and call anotherportion of the first application program such as a JAVA APPLET locatedat another site on the network. It should be noted, however, that thehypertext markup language itself or any other computer or markuplanguage included with first electronic message may constitute acomponent or an entirety of the first application program. In otherwords, any desired portion(including no portion) of the firstapplication program may be positioned at a separate location on thenetwork.

Following is an example of hypertext markup language for containing theparameters and calling another portion of the first application program.In the present embodiment, a portion of the first application program iscalled using a URL on the network.

<HTML> <HEAD> <TITLE>Practice Applets</TITLE> </HEAD> <BODY> <APPLETCODEBASE=“http://www.esprinkles.com” CODE=“HelloAgainWorld.class”ARCHIVE=“eyejar.jar” WIDTH=1000 HEIGHT=1000 ALIGN=left> <PARAM NAME=infoVALUE=“ . . . body of text . . . ”> <PARAM NAME=keystring VALUE=“I”></APPLET> </BODY> </HTML>

In operation 402 of FIG. 4, execution of the first application programhas commenced and a layout manager is instantiated and installed. Layoutmanagers are well known to those of ordinary skill in the art, andfunction to define the graphical framework during execution. Specificsregarding the graphical framework will be set forth in greater detail inthe description of FIG. 5.

Thereafter, in operation 404, a particular key string parameter isretrieved in addition to the entire body of text. The key stringparameter may include a particular string of text that is included inthe body of text. In one embodiment, the word “I” may be retrieved asthe key string parameter. In still other embodiments, any other letter,expression, word, phrase, pattern, format, etc. may be used as a keystring parameter.

Next, each word and/or phrase of the body of text is retrieved inoperation 405, and compared with the key string parameter to determinewhether there is a match in decision 406. To accomplish this, a parsersuch as ANTLR may be employed to identify the designated letter,expression, word, phrase, pattern, format, etc. If it is determined thata match does not exist, a convention label is instantiated for simplydisplaying the current word and/or phrase in operation 408. On the otherhand, if it is determined that a match does indeed exist, afunctionality is instantiated which incorporates the key stringparameter in operation 410. It is then determined in decision 412whether all of the words and/or phrases of the body of text have beencompared. If not, the process operations 405-410 are repeated.

FIG. 5 is an illustration of a graphical user interface of the presentinvention that is displayed upon the execution of the first applicationprogram, and which is used to display the text of the first electronicmessage and any functionality associated therewith. As shown, a frame500 of the network browser encompasses a text box 502. Such text boxincludes the body of text 504. Further, a plurality of first indicia 506is displayed in or around the text box. In one embodiment, the firstindicia may include a “FORWARD”, “REPLY”, and/or a “NEW” icon.

FIG. 6 illustrates one example of the functionality displayed uponexecution of the first application program. In such embodiment, the keystring parameter is “I”, and an eyeball 600 is graphically depicted inplace of the key string parameter within the textbox 502. During use,the movement of the eyeball 600 may be adapted to coincide with themovement of a mouse cursor 602. This may be accomplished using a “mouselistener” which may interface with the first application program. Mouselisteners track a current position of mouse cursors. It should be notedthat in various alternate embodiments, any type of user input may beused to change various aspects, i.e. graphic, textual, layout, color,sound, etc. of the first electronic message.

Programs that execute the foregoing eyeball graphic feature are commonlyknown to those of ordinary skill. Such programs commonly use atan2 inorder to compute the angle between the eyeball and the mouse cursor. Anexample of a code segment that executes the mouse listener feature, andthat calls the eyeball graphic feature is as follows:

import java.applet.*; import java.awt.*; import java.lang.*; importjava.util.*; import java.awt.event.*; import java.net.*; public classHelloAgainWorld extends Applet { Image backBuffer; Graphics backG;String s = “null”; public void init() { //this.setLayout(null);this.setLayout(new FlowLayout(FlowLayout.LEFT)); s=getParameter(“info”); StringTokenizer parser = new StringTokenizer(s);try { while(parser.hasMoreTokens()) { String a = parser.nextToken(); if(a.equals(“I”)) { Eyeball2 eye = new Eyeball2(this); eye.setSize(30,30); add(eye); Clicker click = new Clicker(this);eye.addMouseListener(click); } else { Label helloLabel = new Label();helloLabel.setText(a); helloLabel.setForeground(new Color(170, 27,140)); add(helloLabel); } } } catch (NoSuchElementException e) { } }public void paint(Graphics g) { maintain(); super.paint(backG);g.drawImage(backBuffer, 0, 0, null); } public void update(Graphics g) {maintain(); super.update(backG); g.drawImage(backBuffer, 0, 0, null); }void maintain() { // Maintain the back buffer and the graphics contextthat is directed towards the back buffer. { int w = getBounds().width;int h = getBounds().height; // If there is no buffer or it is the wrongwidth, or it is the wrong height, then adjust the back buffer. if (backBuffer == null || backBuffer.getWidth(null) != w ||backBuffer.getHeight(null) != h ) { // Adjust the back buffer.backBuffer = createImage( w, h ); // If we have a backBuffer, then makea graphics context that is directed towards the back buffer. if(backBuffer != null) { // Dispose of any previous graphics context thatmay have pointed to a previous back buffer. if ( backG != null ) {backG.dispose(); } // Now create the graphics context that is directedto the back buffer. backG = backBuffer.getGraphics(); } } } } } classClicker implements MouseListener { Applet a; URL url; Clicker(Applet _a){ a = _a; } public void mouseClicked(MouseEvent evt) { } public voidmousePressed(MouseEvent evt) { } public void mouseReleased(MouseEventevt) { AppletContext ac = a.getAppletContext(); try { url = newURL(“http://207.82.252.253/cgi- bin/linkrd? lang=&hmaction=http%3a%2f%2fwww%2eneostar%2ecom”); } catch(MalformedURLException e) { System.out.println(“I was a malformed url”);} ac.showDocument(url); } public void mouseEntered(MouseEvent evt) { }public void mouseExited(MouseEvent evt) { } }

It should be noted that any type of functionality may be incorporatedduring the execution of the first application program. For example,advertisements may be displayed, etc.

FIG. 7 illustrates the execution of the second application program ofthe present invention which is initiated upon the selection of one ofthe first indicia 506, i.e. the “FORWARD”, “REPLY”, and/or “NEW” icon,displayed in the graphical user interface of FIG. 5. It should be notedthat, in a “server-based” embodiment, selection of one of the firstindicia 506 may initiate a link to a site on the network, thus allowinginteraction with the site to afford functionality similar to thatafforded by the second application program. To accomplish this, eachbutton may be generated using HTML and have a unique URL associatedtherewith. As an option, a user may simply access the site on thenetwork to send an electronic message without having to first receive amessage.

In particular, it will be assumed in the present description that the“NEW” icon has been selected. It should be noted, however, that giventhe present description it would be well within the ability of one ofordinary skill to implement the “FORWARD” and “REPLY” functions. Withrespect to the “REPLY” icon, there may be a need for a mechanism oftransferring the body of text from the first application program to thesecond application program. This may be accomplished by a “cookie” orsimilar metadata-type information.

As shown in FIG. 7, a second application program is initialized upon theselection of the first indicia 506 in operation 700. It should be notedthat, in one embodiment, the second application program may be acomponent of the first application program thus rendering a singleapplication program. In one embodiment, the first application programincludes an un-signed application program and the second applicationprogram includes a signed application program. Still yet, in theserver-based embodiment, interaction with the site on the network iseffected in lieu of the initialization of the second applicationprogram.

Similar to the first application program, initialization of the secondapplication program may include determining various variables, and otherparameters required to execute the application program. Next, inoperation 702, text fields are installed for allowing entry of text bythe first user.

FIG. 8 is an illustration of a graphical user interface associated withthe continued operation of the present invention after the selection ofone of the first indicia 506 of FIG. 5. As shown, a plurality of textfields 801 are displayed within the frame 500 of the network browser.Included are a destination text box 800 for allowing the insertion of anelectronic mail address of a desired destination, a subject text box 802for allowing entry of a subject of a message, a body text box 804 forallowing entry of a body of text or message, and a key word text box 806which is adapted for allowing entry of the key string parameter. Alsoincluded is second indicia 808 which may take the form of a “SEND” iconor the like.

FIG. 9 is a flowchart illustrating the continued operation of thepresent invention upon the selection of the second indicia 808, i.e.“SEND”, on the graphical user interface of FIG. 8. As shown, inoperation 900, the text is first retrieved from the text fields 801 ofthe graphical user interface of FIG. 8. Next, in operation 902, the textis verified to ensure that each of the necessary text fields are filledand valid. For example, the text boxes 800 and 804 may be required.

If it is determined by decision 903 that the verification of operation902 fails, a complaint is issued in operation 904. Such complaint maytake the form of a pop-up window or the like, and may describe thenature of any defects. On the other hand, if the verification ofoperation 902 succeeds and all of the necessary fields are filled,information associated with an electronic mail server of the first useris retrieved in operation 905. This may be accomplished by accessing ahard drive of a computer of the first user which is running the networkbrowser and electronic mail browser. The purpose of obtaining thisinformation is to identify a server from which the information in thetext fields 801 may be sent in the form of a second message. In thealternative, a single designated server may be automatically identifiedby the second application program, thus obviating the need to access thehard drive of the computer of the first user.

Upon identifying a server from which the second message is to be sent,the second electronic message may be formatted and sent to a second userin operation 906. Upon being sent, another verification may be executedin decision 908 in order to ensure that the second electronic messagewas sent in a satisfactory manner. If successful transmittal of themessage is not verified, a complaint may be issued in a manner similarto that discussed hereinabove with respect to operation 904.

If, on the other hand, successful transmittal of the message is verifiedin decision 908, the second application program may optionally link thefirst user to a site on the network in operation 910. Such site may beidentified by the second application program. This feature may thus beused to increase a number of visits, or “hits”, on a particular sitewhich in itself may warrant substantial consideration.

FIG. 10 is a flowchart illustrating the operations associated with thefetch e-mail operation 905 of FIG. 9. As mentioned earlier, this may beaccomplished by accessing a hard drive of a computer of the first userwhich is running the network browser and electronic mail browser. Beforethis may be effected, in operation 1000, the browser(s) that iscurrently in use may be detected after which the appropriate informationmay be accessed in operation 1002. As an option, permission to retrievesuch information may be gained from the first user prior to any actionbeing taken.

FIG. 11 is a flowchart illustrating the operations associated with theformat and send message operation 906 of FIG. 9. The format refers tothe hypertext mark-up language of which an example was provided earlier.In order to generate such format, a string is first created in operation1100. Thereafter, a preamble is appended to the string in operation1102. Thereafter, the body of text and key string parameters areappended in operations 1104 and 1106 after which a postscript isappended in operation 1108. An example of each of the foregoing appendedelements are outlined as follows using the example set forth earlier:

Preamble <HTML> <HEAD> <TITLE>Practice Applets</TITLE> </HEAD> <BODY><APPLET CODEBASE=“http://www.esprinkles.com” (*1^(st) app. program*)CODE=“HelloAgainWorld.class” ARCHIVE=“eyejar.jar”WIDTH=1000 HEIGHT=1000ALIGN=left> Parameter <PARAM NAME=info Value=“ . . . body of text . . .”> Parameter < PARAM NAME=keystring VALUE=“I”> Note: multiple keystrings and adaptive keys may be used to identify the letter,expression, word, phrase, format, etc. Postscript </APPLET> </BODY></HTML>

With continuing reference to FIG. 11, a message object is then createdin operation 1110; Thereafter, the string and appendages, or messagedata, is attached to the object in operation 1112 using the JAVA mailAPI. Using the information collected about the server, a connection isthen effected with the desired host mail server (SMTP or the like) inoperation 1114 after which the message object and data are sent inoperation 1116. In the case of multiple electronic mail destinations,this operation may be repeated as many times as required. An errorstatus is then retrieved in operation 1118 to enable the decision 908 ofFIG. 9. Next, the server is disconnected in operation 1120 and the errorstatus is returned in operation 1122. It should be noted that submissionof the data may be accomplished in any form submit-type process.

One example of functionality that may be implemented by the firstapplication program was shown in FIG. 6. It should be noted, however,that any type of functionality may be employed by running a code segmentincluding as a parameter at least a portion of the text included withthe electronic message.

In various embodiments, the functionality may include the incorporationof an image, video, a specific graphic feature, or any other type ofobject for that matter. For example, any type of theme such as rabbits,earthquakes, time, popular icons and trademarks may be employed duringthe display of the text associated with the electronic message. As anoption, such graphics may in some way interact with the text of theelectronic message.

For example, where the theme is earthquakes, the text may be shown toshutter or the like. Or, where the theme is rabbits, the rabbits may beshown hopping from word to word. Still yet another example includesdressing or undressing an icon in various attire or providing any othertype of feedback based on user input. Further, where the theme is time,a format of a time, i.e. “7:00”, may be detected in order to replace thesame with an analog clock graphic which corresponds with the detectedtime.

As an option, the selection of the graphic or icon may initiate a linkto a predetermine site on the network. Still yet, the applicationprogram may be adapted to allow the object to be substituted with any ofthe strings of the text while it is being shown. This may beaccomplished with a select and “drag” feature.

In another embodiment, the execution of the first application programmay include linking a string of the text of the first electronic messagewith a site on the network. In other words, such string constitutes ahyperlink. In such embodiment, the execution of the first applicationprogram may further include automatically inputting the string as aparameter to the site on the network upon selection of the hyperlink forvarious purposes. In the case where the site is a search engine, thestring may be automatically entered as a search term in the searchengine upon the selection of the hyperlink, thus prompting immediatereaction by the search engine. One example of an implementation of thisconcept is as follows:

http://www.search₁₃engine.com/?MT=keystring&SM=MC&DV=0&LG=any&DC=10&DE=2&₁₃v=2

In still another embodiment, the functionality associated with theelectronic messages provides an inducement for sending them toadditional users. With this exposure, the present invention may be usedto propagate advertisements over the network. First, the electronicmessage is provided with the application program attached thereto whichis capable of displaying an advertisement. As the message iscommunicated over the network, each instance of such communication isdetected.

As such, the number of the instances that the electronic message iscommunicated over the network may be traced. The advertisement is thendisplayed after a predetermined number of the instances greater than onehas been tracked. By employing this technique, the users will not bethwarted from forwarding the electronic message until after apredetermined geometric propagation has already taken place. It shouldbe noted that the foregoing tracking ability may also be used to base adetermination of compensation from the advertiser.

As an option, the predetermined number may be based on a Fibonaccisequence for optimized perpetuance of the electronic message. Further,the predetermined number may be based on a generation of the electronicmessage. As an option, the advertisement may be displayed byautomatically linking to a site on the network.

FIG. 12 is a graphical user interface similar to that of FIG. 5 with theexception of an additional “unwanted electronic message” icon 1200, orindicia, that is displayed upon execution of the first applicationprogram. Upon selection of such indicia, a server-based process isinitiated to help preclude unwanted electronic messages, or “spam”, frombeing sent on a network.

To facilitate this, each message that is received by the user isassigned a unique identifier by the server by way of a common gatewayinterface (CGI) or the like. In one embodiment, such identifier mayinclude a domain name. In yet another embodiment, the identifier may bea number that is randomly generated, but large enough to ensureuniqueness. This number may be stored in the first application as aparameter, or incorporated into the HTML associated with generating the“unwanted electronic message” icon 1200.

Upon selection of the “unwanted electronic message” icon 1200, theidentifier of the electronic message is communicated on the network to adesignated server. For reasons that will soon become apparent, contentof the electronic message may optionally also be sent.

FIG. 13 is a flowchart illustrating a server-based process initiatedupon the selection of the additional “unwanted electronic message” iconof FIG. 12 and the receipt of the identifier and content by the server.As shown, the identifier and content of the unwanted message arereceived in operation 1300. Thereafter, the unique number is looked-upin operation 1302 in order to retrieve associated information on thesource of the unwanted electronic message in operation 1304. In the casewhere the identifier is a number, such number may be used to ascertainthe domain name of the message which may be stored with the identifierat the time of transmission. A counter associated with the domain nameor the electronic message itself is then incremented in operation 1305.

Thereafter, in decision 1306, a number of identifiers identifying thesame unwanted message or messages from the same source(domain name) istracked for the purpose of determining whether a tolerance has beenexceeded. In other words, it is determined whether such occurrences haveexceeded a predetermined level. If not, the identifiers are continuouslytracked.

If, however, the tolerance has been exceeded, the unwanted electronicmessage is reported in operation 1308 for preventing proliferation ofthe electronic message, similar messages, and/or messages from a similarsource. In addition to reporting the message, the server itself may eventake active measures to filter or eliminate the electronic message,similar messages, and/or messages from a similar source.

As an option, the content of the electronic message may also be reportedin operation 1310 to the list, thus allowing the prevention oftransmission of any subsequent electronic messages having contentsubstantially similar to the received content. It should be noted that“lists” are commonly known as a means of preventing the proliferation ofalready identified unwanted electronic messages. Still yet anotheroption may include sending the user a notice that the report has beenreceived.

While this invention has been described in terms of several preferredembodiments, it is contemplated that alternatives, modifications,permutations, and equivalents thereof will become apparent to thoseskilled in the art upon a reading of the specification and study of thedrawings. It is therefore intended that the true spirit and scope of thepresent include all such alternatives, modifications, permutations, andequivalents.

What is claimed is:
 1. A method for providing an application programwith an electronic message to preclude unwanted electronic messages frombeing sent on a network, comprising: initializing at least oneapplication program after an electronic message is selected by a user,wherein the application program is received with the electronic messageon a network; and executing the application program after theinitialization thereof, the execution of the application programincluding: displaying text included with the electronic message,depicting indicia, communicating an identifier of the electronic messageon the network upon the selection of the indicia by the user forprecluding unwanted electronic messages from being sent on the network;tracking an amount of the identifiers that were sent by a plurality ofusers who received the electronic message; and precluding unwantedelectronic messages from being sent on the network upon a predeterminedamount of the identifiers being tracked.
 2. The method as set forth inclaim 1, wherein the application program is executed on a networkbrowser.
 3. The method as set forth in claim 1, wherein the electronicmessage is selected on an electronic mail browser.
 4. The method as setforth in claim 1, wherein the identifier is generated by a server thatsends the electronic message on the network to the user.
 5. The methodas set forth in claim 4, wherein the identifier is stored in theapplication program.
 6. The method as set forth in claim 1, and furthercomprising tracking an amount of the identifiers that were sent by aplurality of users who received the electronic message and precludingunwanted electronic messages from being sent on the network upon apredetermined amount of the identifiers being tracked.
 7. The method asset forth in claim 1, wherein the sending of the unwanted electronicmessages is precluded by preventing the transmission of any subsequentelectronic messages from a source of the electronic message.
 8. Themethod as set forth in claim 1, and further comprising receiving contentof the electronic message, wherein the sending of the unwantedelectronic messages is precluded by preventing the transmission of anysubsequent electronic messages having content substantially similar tothe received content.
 9. A computer program embodied on a computerreadable medium for providing an application program with an electronicmessage to preclude unwanted electronic messages from being sent on anetwork, comprising: a code segment for initializing at least oneapplication program after an electronic message is selected by a user,wherein the application program is received with the electronic messageon a network; and a code segment for executing the application programafter the initialization thereof, the execution of the applicationprogram including: displaying text included with the electronic message,depicting indicia, communicating an identifier of the electronic messageon the network upon the selection of the indicia by the user forprecluding unwanted electronic messages from being sent on the network;a code segment for tracking an amount of the identifiers that were sentby a plurality of users who received the electronic message; and a codesegment for precluding unwanted electronic messages from being sent onthe network upon a predetermined amount of the identifiers beingtracked.
 10. The computer program as set forth in claim 9, wherein theapplication program is executed on a network browser.
 11. The computerprogram as set forth in claim 9, wherein the electronic message isselected on an electronic mail browser.
 12. The computer program as setforth in claim 9, wherein the identifier is generated by a server thatsends the electronic message on the network to the user.
 13. Thecomputer program as set forth in claim 12, wherein the identifier isstored in the application program.
 14. The computer program as set forthin claim 9, and further comprising a code segment for tracking an amountof the identifiers that were sent by a plurality of users who receivedthe electronic message.
 15. The computer program as set forth in claim9, wherein the sending of the unwanted electronic messages is precludedby preventing the transmission of any subsequent electronic messagesfrom a source of the electronic message.
 16. The computer program as setforth in claim 9, and further comprising a code segment for receivingcontent of the electronic message, wherein the sending of the unwantedelectronic messages is precluded by preventing the transmission of anysubsequent electronic messages having content substantially similar tothe received content.