Method and system for encrypting data delivered over a network

ABSTRACT

Systems and methods are provided for delivering e-mail, typically with time relevant content, to users, whose e-mail addresses are encrypted. Specifically, the e-mails are administered by a host or home server that is transparent to the e-mail addresses of the computers and e-mail clients, that electronic communications are being sent to and received from.

RELATED APPLICATIONS

This application is a continuation application of commonly owned U.S.patent application Ser. No. 11/449,135, entitled: METHOD AND SYSTEM FORENCRYPTING DATA DELIVERED OVER A NETWORK, filed on Jun. 8, 2006, nowU.S. Pat. No. ______, which is related to commonly owned U.S.Provisional Patent Application Ser. No. 60/725,784, entitled: METHOD ANDSYSTEM FOR ENCRYPTING DATA DELIVERED OVER A NETWORK, filed on Oct. 12,2005. U.S. patent application Ser. No. 11/449,135 and U.S. ProvisionalPatent Application Ser. No. 60/725,784 are both incorporated byreference herein.

TECHNICAL FIELD

The present invention relates to encrypting data delivered over anetwork. In particular, the present invention is directed to encryptingdata while allowing users to dynamically submit and retrieve data from ahome or host server, or components associated therewith. The datatypically includes electronic mail, commonly known as e-mail, as sentover a network, such as the Internet, with its content generated whenthe recipient opens the requisite electronic mail.

BACKGROUND

Businesses and consumers are increasingly turning to the Internet tocommunicate, survey, and transact business among themselves and witheach other. The size, volume and complexity of these communications andtransactions has been steadily increasing as the Internet has become,over the years, an increasingly accepted medium for use by businessesand consumers. In particular, the Internet facilitates various types ofelectronic communications between computers linked thereto, andspecifically, the users associated therewith.

Electronic communications have dramatically changed the ways in whichpeople communicate. Electronic mail, commonly referred to as e-mail, isa widely used form of electronic communication. E-mail is the exchangeof computer-stored messages by telecommunication, over a network, suchas the Internet. E-mail accounts for the largest percentage of totaltraffic on the Internet. E-mail usage is expected to increaseexponentially in the next few years as increasing numbers of people haveaccess to computers, and therefore, the World Wide Web (WWW).

E-mail communications are desirable, as they are current, usually inreal time, and are non-intrusive. Conversely, a telephone call isintrusive, as it must be attended to at the moment it is received, andmay interfere with the recipient's activities. The e-mail recipient mayopen the e-mail when desired, and may delete the e-mail without readingit.

E-mail distribution to individuals and organizations is quick andeconomical. Senders create recipient lists, that may include thousandsof recipients. Recipient e-mail addresses can be added and deleted fromthe lists as desired. The e-mail is composed once and sent to multitudesof recipients, all of whom receive the e-mail instantaneously. Thee-mail can be duplicated and sent to recipients from another recipientlist, typically in the matter of minutes.

Identity theft and related fraud have also grown with the seemingubiquity of the Internet as a convenient communications medium. A U.S.Federal Trade Commission study, focusing only on identity theft,estimates that nearly 10 million adult citizens were victims of identitytheft in the U.S. in 2003, resulting in business losses of over $47billion and consumer losses of about $5 billion. Synovate, Federal TradeCommission: Identity Theft Survey Report at Page 7, Table 2 (September2003). In general and aside from the specific issue of identity theft,businesses increasingly prefer to protect their customer data or areregulated by law, depending on the industry, in how they may sharepersonally identifiable information from their customers with thirdparties.

Businesses have sought to address the preference or obligation to secureconfidentiality of their customer data, in whole or in part, through avariety of methods. For example, people and businesses regularly use oneor more of the following security measures to try protecting electronicdata they consider sensitive. Password protection may be used to permitaccess to or retrieval of sensitive data. Data may be destroyedperiodically, or it may be centralized at a location secured bothphysically and electronically. These technologies tend to trade-offeffectiveness for utility. That is, the tendency is that the moreeffective a protection regime is, the greater the transaction costs ofaccessing the data and the less the data tends to be utilized. Theeasier it is to access data, for example through weak encryption orstandardized and infrequently changed password access, the more the datamay be utilized but the greater the risk of its theft or misuse.

In addition, traditional encryption technology applied to a databasegenerally works with a single decryption key, which is reasonable in atwo party relationship where one party hosts the database and encryptsthe data (and perhaps utilizes it), while the other party deposits andretrieves the data for utilization. However, such technology tends to beineffective in securing a database to which multiple parties deposit andretrieve encrypted data. Since there is only one decryption key to theentire database, the multiple parties will each have access to all thecontents of the database, not just the data which they store in thedatabase. To work around this shortcoming, it is possible to set updifferent databases for each customer. This solution, however, is morecostly and inefficient than having a single database with multipledecryption keys, each one of which is unique to each customer withaccess to the database.

SUMMARY

The present invention overcomes the drawbacks of contemporary systemsand methods, as it provides systems and methods for delivering e-mail,typically with time relevant content, to users, whose e-mail addressesare encrypted. Specifically, the e-mails are administered by a host orhome server that is transparent to the e-mail addresses of the computersand e-mail clients, that electronic communications are being sent to andreceived from. Accordingly, the host or home server processes requestsand delivers content to e-mails in a transparent manner, as the actualaddress of the recipient is not known to the host or home server.Similarly, the address of the e-mail associated with the browser,redirected to a target web site, once a link in the e-mail has beenactivated, remains unknown to the host or home server, that facilitatesthe redirection to this target web site.

An embodiment of the invention is directed to a method for providingcontent into electronic communications. The method includes, receivingencrypted data corresponding to an address of a recipient, and providingan electronic communication, that has the encrypted data and acommunication identifier corresponding to the encrypted data. Theencrypted data is decrypted to obtain the address of the machineassociated with the recipient and sent to the machine, whose address hasbeen decrypted. The machine is associated with the communicationidentifier of the electronic communication. When at least one indicatorthat the electronic communication has been opened by the machineassociated with the communication identifier is received, content isprovided to the opened electronic communication. The electroniccommunication is, for example, electronic mail (e-mail).

Another embodiment is directed to a method for providing content intoelectronic communications. The method includes, receiving encryptedaddress data corresponding to a recipient, and creating an electroniccommunication, for example, an electronic mail (e-mail) including theencrypted address data. The electronic communication including theencrypted address data is then sent for decryption, for sending theelectronic communication to the address of the recipient. An indicatorthat the electronic communication was opened is received and aconnection or “pipe” between the machine associated with the openedelectronic communication and a content obtaining device is opened.Content is provided to the opened electronic communication through theconnection.

Another embodiment is directed to a system for providing content toelectronic communications, for example, electronic mail (e-mail). Thesystem includes a device with a first component for receiving encryptedaddress data corresponding to a recipient (user) linked to the network(e.g., the Internet), and providing the encrypted address data to anelectronic communication. There is a second component for creatingelectronic communications including the encrypted address data, and forsending the electronic communication including the encrypted addressdata, for decryption, for sending the electronic communication to theaddress of the recipient. A third component obtains content for openedelectronic communications, and, a fourth component for receives anindicator that the electronic communication was opened, and subsequentlyopens a connection or “pipe” between the machine associated with theopened e-mail and the third component, such that content is obtained forthe opened electronic communication through the connection. The systemalso includes an encryption application, and a decryption application,for the encryption application, typically located on or associated withservers, that are linked, via the network, to the device.

Another embodiment is directed to a computer-usable storage mediumhaving a computer program embodied thereon. The storage medium causes asuitably programmed system to provide content to electroniccommunications, for example, electronic mails (e-mails), by performingthe following steps, when such program is executed on the system. Thesteps include, receiving encrypted address data corresponding to arecipient, and creating an electronic communication including theencrypted address data. This is followed by sending the electroniccommunication including the encrypted address data, for decryption, forsending the electronic communication to the address of the recipient.The step of receiving an indicator that the electronic communication wasopened, is followed by the step of opening a connection between themachine associated with the opened electronic communication and acontent obtaining device. In the next step, content is provided to theopened electronic communication through the connection. In an additionalstep, the connection between the machine and the content obtainingdevice is closed, when the body of the opened electronic communicationhas been built. The step of step of providing content to the electroniccommunication includes obtaining listings based on at least one keyword, and providing redirect uniform locators (URLs) to target web sitesassociated with each listing, when the redirect uniform resource locator(URL) is activated.

BRIEF DESCRIPTION OF THE DRAWINGS

Attention is now directed to the drawings, where like reference numeralsor characters indicate corresponding or like components. In thedrawings:

FIG. 1 is a diagram of an exemplary system on which an embodiment of theinvention is performed;

FIGS. 2A and 2B are a flow diagram of a process for generating thecontent for an e-mail in accordance with an embodiment of the invention;

FIG. 3A is a diagram detailing flow of an e-mail from its creationthrough its being opened by the intended user;

FIG. 3B is a schematic diagram of an e-mail created in accordance withan embodiment of the invention;

FIG. 3C is a screen shot showing e-mail communications in the mailbox ofa recipient;

FIG. 4 is a screen shot of an exemplary template in accordance with anembodiment of the invention;

FIG. 5 is a flow diagram of the request processing sub process of FIG.2;

FIG. 6 is a diagram of a key cache in accordance with an embodiment ofthe invention;

FIG. 7 is a diagram of a listing cache in accordance with an embodimentof the invention;

FIG. 8 is a diagram of a click cache in accordance with an embodiment ofthe invention;

FIG. 9 is a screen shot of the text of e-mails received in accordancewith the present invention;

FIG. 10 is a flow diagram of a process for directing an e-mail recipientto an intended or target web site upon responding to an e-mail inaccordance with an embodiment of the invention;

FIG. 11 is a screen shot showing an error or time out; and,

FIG. 12 is a screen shot showing a web page of a target web siteaccessed from a redirect uniform resource locator in accordance with anembodiment of the invention.

DETAILED DESCRIPTION OF THE DRAWINGS

The present invention is related to systems and methods for deliveringelectronic communications, typically electronic mail, commonly known ase-mail, typically with time relevant content, to users, whose e-mailaddresses are encrypted. Specifically, the e-mails are administered by ahost or home server that is transparent to the e-mail addresses of thecomputers and e-mail clients that electronic communications are beingsent to and received from. As a result of this transparency, the actualidentities, i.e., e-mail addresses, of the users associated with therequisite e-mail clients are neither known nor stored by the home orhost server. The processes associated with delivering the content to thee-mail and ultimately, redirecting the browser of the user to a targetweb site, once a link in the e-mail has been activated, are, forexample, performed in real time, while a connection or pipe is openbetween the e-mail client and the home or host server.

The systems, methods, hardware and software associated with creating,delivering and providing content to the e-mails, and directing thebrowser of the user to the targeted web site associated with therequisite e-mails, as detailed below, is disclosed in commonly ownedU.S. patent application Ser. No. 10/915,975, entitled: Method And SystemFor Dynamically Generating Electronic Communications (U.S. PatentApplication Publication Ser. No. 2005/0038861 A1), this patentapplication and Patent Application Publication, are incorporated byreference herein. U.S. patent application Ser. No. 10/915,975, entitled:Method And System For Dynamically Generating Electronic Communicationsand U.S. Patent Application Publication No. 2005/0038861 A1, are usedinterchangeably herein.

Throughout this document, textual and graphical references are made toactual and fictional trademarks and Internet addresses (Uniform ResourceLocators, also known as URLs). Also, throughout this document, numeroustextual and graphical references are made to actual and fictionaltrademarks. These trademarks and Internet addresses are for explanationpurposes only, and any association with any party or other entity iscoincidental, unintentional and unrelated thereto. All trademarks andInternet Addresses are the property of their respective owners, and arereferenced only for explanation purposes herein.

FIG. 1 shows the present invention in an exemplary operation. Thepresent invention employs a system 20, formed of various servers andserver components, that are linked to a network, such as a wide areanetwork (WAN), that may be, for example, the Internet 24.

There are, for example, at least three kinds of servers that form thesystem 20. These servers typically include a Home Server (HS) 30, one ormore content servers (CS) 34 a-34 n (by “n” it is meant member, element,component, etc., the last in a series, sequence, or the like, here, forexample, of content servers (CS), but this definition of “n” and “nth”is applicable throughout this document), and an imaging server (IS) 38.There are also publisher servers (P1-Pn) 40 a-40 n, associated withencryption applications or encryption keys (ENC) 40 a′-40 n′ andmessaging servers (P1MS-PnMS) 42 a-42 n, corresponding to each publisher(P), typically of a publisher network (shown by the broken line box 43).Each messaging server (P1MS-PnMS) 42 a-42 n is associated with adecryption application or decryption key (DEC) 42 a′-42 n′.

These servers 30, 34 a-34 n, 38, 40 a-40 n, and 42 a-42 n, are linked tothe Internet 24, so as to be in communication with each other. Theservers 30, 34 a-34 n, 38, 40 a-40 n, and 42 a-42 n, include multiplecomponents for performing the requisite functions as detailed below, andthe components may be based in hardware, software, or combinationsthereof. The servers 30, 34 a-34 n, 38, 40 a-40 n, and 42 a-42 n, mayalso have internal storage media and/or be associated with externalstorage media.

The servers 30, 34 a-34 n, 38, 40 a-40 n, and 42 a-42 n of the system 20are linked (either directly or indirectly) to an endless number of otherservers and the like, via the Internet 24. Other servers, exemplary fordescribing the operation of the system 20, include a domain server 46for the domain (for example, the domain “xyz.com”) of the user 47 (forexample, whose e-mail address is user1@xyz.com), linked to the computer48 of the user. The computer 48 typically includes a monitor 49 a, onwhich images are viewed, and a pointing and activating device or mouse49 b. Still other servers may include third party servers (TPS) 50 a-50n, controlled by content providers and the like. These third partyservers (TPS) 50 a-50 n, typically host targeted web sites (composed ofweb pages and other similar files), and may also be associated with thepublishers of the publisher network 43.

While various servers have been listed, this is exemplary only, as thepresent invention can be performed on an endless numbers of servers andassociated components, that are in some way linked to a network, such asthe Internet 24. Additionally, all of the aforementioned servers includecomponents for accommodating various server functions, in hardware,software, or combinations thereof, and typically include storage media,either therein or associated therewith. Also in this document, theaforementioned servers, storage media, components can be linked to eachother or to a network, such as the Internet 24, either directly orindirectly.

The home server (HS) 30 is of an architecture that includes components,modules and the like, for handling electronic mail, to perform anelectronic mail (e-mail) server functionality, including e-mailapplications. The architecture also includes components, modules and thelike, for providing numerous additional server functions and operations,for example, comparison and matching functions, policy and/or rulesprocessing, various search and other operational engines. The HomeServer (HS) 30 includes various processors, including microprocessors,for performing the aforementioned server functions and operations andstorage media, either internal or associated therewith, such as caches53 a-53 n. While these caches 53 a-53 n are shown, this is forexplanation purposes, as the Home Server (HS) 30 may be associated withadditional caches, databases, as well as numerous other additionalstorage media, both internal and external thereto.

The home server (HS) 30 receives requests from e-mail clients, forexample, America Online® (AOL®), Outlook®, Eudora®, Hotmail®, MSN®,Yahoo® Mail®, or other web-based clients, and composes and sends e-mailsto intended recipients over the network. In this document, the client isan application that runs on a computer, workstation or the like, andrelies on a server to perform some operations, such as sending andreceiving e-mail. Also, for explanation purposes, the Home Server (HS)30 may have a uniform resource locator (URL) of, for example,www.homeserver.com.

For example, the intended recipient or user 47 has a computer 48 (suchas a multimedia personal computer with a Pentium® Central ProcessingUnit (CPU), that employs a Windows® operating system), that uses ane-mail client. The computer 48 may also be referred to as a machine, andmay also be a work-station or other computer-type device. The computer48 is linked to the Internet 24, for example, typically through itsdomain server 46. This Home Server (HS) 30 typically employs a searchengine, or links to one (in another server or the like via the Internet24), in order to direct the received request to the most suitablecontent server (CS) 34 a-34 n. While a single Home Server (HS) 30 isshown, the Home Server (HS) 30 may be formed of multiple servers and/orcomponents, and may also be formed from still other servers with e-mailfunctionalities.

Content Servers (CS) 34 a-34 n (one or more) are also linked to theInternet 24. The content servers (CS) 34 a-34 n provide content,typically in text form, for the imaging server (IS) 38, typicallythrough the Home Server (HS) 30, and typically, in response to a requestfrom the Home Server (HS) 30, as detailed below. These content servers(CS) 34 a-34 n may be, for example, Pay-Per-Click (PPC) servers ofvarious content providers, such as internal providers, or externalproviders, for example, Overture Services, Inc. or Findwhat, Inc.

At least one imaging server (IS) 38 is linked to the Internet 24. Theimaging server (IS) 38 functions to convert text (data in text format)from the content servers (CS) 34 a-34 n, as received through the HomeServer (HS) 30, to an image (data in an image format). After conversioninto an image, the image is typically sent back to the Home Server (HS)30, to be placed into an e-mail opened by user the 47 (recipient orintended recipient), as detailed below. Alternately, the imaging server(IS) 38 may send the image directly to the e-mail client associated withthe user 47, over the Internet 24. For exemplary purposes, the imagingserver may have a URL of www.imageserver.com.

The publisher servers (P1-Pn) 40 a-40 n, typically include databases,that typically include lists 54 a, 54 b. The lists, for example, listAAA 54 a and List BBB 54 b, typically include e-mail addresses of users,potential recipients of the various informational or advertisingcampaigns being administered by the home server (HS) 30. The encryptionapplication 40 a′-40 n′ associated with each publisher server 40 a-40 n,may be a single or double encryption application. For example, asuitable one-way encryption application is MD5 Hash,http://www.ietf.org/rfc/rfc1321.txt, and described in, R. Rivest, TheMD5 Message-Digest Algorithm, Network Working Group, Request forComments: 1321, April 1992 (RFC 1321), this document incorporated byreference herein. For example, a suitable two way encryption applicationis Blowfish, as listed at http://www.schneier.com/blowfish.html, and,for example, as described in, “Blowfish (cipher), from Wikipedia, TheFree Encyclopedia, 2006 (4 pages), this document incorporated byreference herein. Each publisher server (P1-Pn) 40 a-40 n includes acorresponding publisher messaging server (P1MS to PnMS) 42 a-42 n. Eachpublisher messaging server P1MS-PnMS 42 a-42 n, has an associateddecryption application or key (DEC) 42 a′-42 n′. The decryption keys 42a′-42 n′ are typically specific to and correspond to the encryptionapplications or keys (ENC) 40 a′-40 n′ for each publisher severcombination, for example, P1 40 a to P1MS 42 a, through to Pn 40 n toPnMS 42 n.

Turning also to FIGS. 2A and 2B, collectively referred to hereinafter asFIG. 2, an exemplary implementation of a process in accordance with anembodiment of the present invention will now be described. FIG. 2 is aflow diagram of the process (method). Various aspects of the process ofFIG. 2 are illustrated in FIGS. 3A-3C, to which reference is also made.

The process of FIG. 2 may be the first phase of a larger process. Forexample, the first phase may involve rendering an e-mail to an e-mailclient, while the second phase, shown in FIG. 10 and detailed below, isdependent on the first phase. The second phase directs the user to atarget web site, via a link, that is activated once the user has clickedhis mouse 49 b on the dynamically rendered image or a portion thereof,of the opened e-mail, that is paired with the link.

The computer 48 associated with the user 47 includes an e-mail client(detailed above), installed thereon, that provides the user with aunique access and the ability to utilize one or more e-mail addresses.For example, the user 47 has an e-mail address, user1@xyz.com, throughwhich he receives his e-mail from the domain server 46, that hosts thedomain xyz.com, of which the user 47 is a member. The computer 48 alsoincludes a web browser, browsing software, application, or the like, toaccess web sites or web pages from various servers and the like, on theInternet 24. Some exemplary web browsers/web browsing software include,Internet Explorer®, from Microsoft, Redmond, Wash., and Netscape®Navigator®.

Initially, and also making reference to FIG. 1, at block 102, apublisher server, for example, server 40 a, associated with a firstpublisher (P1), is signaled to begin an informational or advertisingcampaign. The publisher server 40 a (for example the server of a firstpublisher P1) includes a database, that includes lists of e-mailaddresses of users (recipients). For example, the list (List AAA) 54 aincludes the e-mail address of the example user or recipient,user1@xyz.com. Each e-mail address is in the form of data, that isencrypted, by the encryption application 40 a′ into encrypted listings1004 (by any of the encryption applications detailed above). This isshown by arrow 1002 (e-mail address, user1@xyz.com, from the List AAA 54a is encrypted) and arrow 1002 a (the encrypted e-mail address is sentor positioned in the publisher server P1 for sending), of FIG. 3A. Theencrypted listings 1004 are then sent to and received by the home server(HS) 30, at block 104, as shown by the arrow 1006 (FIG. 3A).

The home server (HS) 30 compiles data, corresponding to each encryptedlisting received, at block 106. The data compiled is for conversion toe-mail 1008 (FIG. 3B) and images in the e-mail. In compiling the data,for each encrypted listing 1004, e-mail data 1010 is added to eachencrypted listing 1002 for items including, a template code (i.e.,X27X), the number of requests (one or more), an identifier for thepublisher messaging server for decryption (i.e., P1yyy), and the actualrequests. The requests typically include, an e-mail identifier (e-mailID, e, or EID), one or more keywords (KW), a mailing identifier (mailingID or MID), position data (POS), corresponding to the number ofdynamically generated links to be rendered to the template, once it hasbeen built out, a max number (N) representing the number of requests andcorresponding positions to be filled with links to targeted web site inthe template and e-mail body. There is also a data strings area 1012 fordata strings, corresponding to each request of the number of requests.The encrypted listing 1004, e-mail data 1010, and data strings area1012, form this initial e-mail 1008.

The data strings themselves are shown in the e-mail 1008 of FIG. 3B. Thedata strings are typically paired strings, each pair of the pairedstrings corresponds to a request, of the total number of requests forthe specific e-mail. One string of the paired strings is a click URL, asindicated by the language “A HREF”. This first string becomes anactivatable link in the body of the e-mail, once the content is placedinto the e-mail. The second string of the paired strings “IMG SRC”,designating a source for the image to be rendered to the template (thebody of the e-mail), for the requisite position in the template ore-mail body and click URL.

For example, the first string in the first pair, corresponding to thefirst request is: <“A HREF=http://homeserver.com/e=10123&KW=NEWCARS&MID=4567&POS=1&N=2″>

In this first string, there is URL to direct the browser of the user whohas activated or clicked on the link with the click URL to the homeserver (HS) 30, “e” is the e-mail ID (EID) (i.e., 10123), “KW” is thekeyword or keywords (i.e., NEW CARS), “MID” is the mailing ID, forexample, the batch which the e-mail is from (i.e., 4567), POS is theposition date, the position in the template and ultimately the body ofthe e-mail where the click URL will be located, to serve as theunderlying link, detailed below, and N is the max number, for example,“2”, as there are two requests corresponding to two positions for links,i.e., click URLs.

The second string of the first pair is for obtaining the imageassociated with the position in the template and ultimately the body ofthe e-mail. This string is expressed as: <“IMGSRC=http://imageserver.com/CID=2111&KW=NEW CARS″>

In this second string, there is a URL for the imaging server (IS) 38(i.e., www.imageserver.com), to enable the requisite image for therequisite campaign, illustrated by CID or campaign identifier (i.e.,2111), to be pulled and imported into the template. “KW” is the keywordor keywords, used to assist in pulling the requisite image.

As there is a second request, there is a second pair of strings, forexample, <“A HREF=http://homeserver.com/e=10123&KW=NEWCARS&MID=4567&POS=2&N=2”><“IMGSRC=http://imageserver.com/CID=2111&KW=NEW CARS”>

This second pair of strings for the second request is typicallyidentical to the first pair of strings, except that in the first stringof the pair, the position data (POS) is “2”, to represent the secondposition in the template, where this click URL will be located.

At block 108, the home server (HS) 30 sends or pushes the e-mail 1008(formed of the encrypted listing 1004, e-mail data 1010, and datastrings, in the data strings area 1012) to the requisite publisher'smessaging server 42 a-42 n (arrow 1014) (P1MS to PnMS). The requisitepublisher's messaging server is located from the code for thepublisher's messaging server, added to the encrypted e-mail listing, atblock 106, as detailed above. For example, as the server 40 a ofpublisher P1 sent the encrypted e-mail address, the home server (HS) 30assigned the encrypted data and the e-mail data with a code (forexample, P1yyy) for Publisher P1's messaging server P1MS 42 a.Accordingly, the encrypted e-mail listing and e-mail data are sent toPublisher P1's messaging server 42 a (P1MS).

By applying a decryption key, at the requisite publisher's messagingserver, for example, key 42 a′ for publisher P1's messaging server 42 a,the encrypted e-mail listing is decrypted, at block 110, as per thearrow 115 a. The decrypting includes decrypting the encrypted e-maillisting to an e-mail address in plain text (for example, the encryptedcode y47p23z is decrypted back to user1@xyz.com).

The process moves to block 112. Here, the now modified e-mail 1008 a(having e-mail data 1010 and data strings area 1012), with theencryption code (i.e., y47p23z) removed and the Publisher Server Code(i.e., P1yyy) either removed or deactivated, is sent or positioned inthe publisher messaging server P1MS 42 a for sending, as per the arrow1015 b. The publisher messaging server P1MS 42 a sends the modifiede-mail 1008 onward, to the e-mail client of the intended recipient(user1@xyz.com), as per the arrow 1016. This modified e-mail 1008 a, forexplanation purposes, is now also referred to as the “sent e-mail,” asit is being sent to the e-mail client associated with the computer 48 ofthe intended recipient or user 47.

The sent e-mail may be, for example, in Hypertext Markup Language(HTML), and may include one or more Hypertext Transport Protocol (HTTP)source requests. These HTTP source requests typically reference the HomeServer (HS) 30.

The sent e-mail includes a program that provides the body of the e-mailwhen the e-mail is opened. The program provides a template (FIG. 4),that forms the basic structure or framework for the image(s) of the sentand opened e-mail, and, zero or more HTTP Source requests for zero ormore static images. The sent e-mail may also include HTML constructs andtext, such as plain text, HTML headers, list constructs and the like.The sent e-mail, as received by the e-mail client, typically appears onthe screen (monitor) 49 a of the user's computer 48 as a line of text 60(shown as shaded for emphasis only) identifying the sender, subject andother information, as shown in FIG. 3C.

The sent e-mail typically includes one or more requests. The totalnumber of request(s) is represented by “N”. A single request typicallycorresponds to a single image to be rendered (into the template of thee-mail image) when the e-mail is opened by the user 47 (as detailedbelow).

Each of the one or more requests in the e-mail may include data (or dataelements) such as: a) an e-mail identifier (EID); b) at least onekeyword, or data corresponding to at least one keyword; c) mailingidentifier (MID); d) position data; and, e) a max number, correspondingto the maximum number of images (represented in this document by “N”)that will be dynamically generated and rendered for this particulare-mail.

Each of the one or more requests in a sent e-mail typically includes allfive of these data elements. However, if there is only a single requestin a sent e-mail, position data is typically not included, because thereis only one position for the dynamically generated text in the request(and the max number is 1, N=1).

The e-mail identifier (EID), may be, for example, a code of numbers,letters, symbols, or combinations thereof, for the recipient of the sente-mail, or any other data that guarantees uniqueness for the particularsent e-mail (and its corresponding returned request(s)). An e-mailidentifier is attached to each encrypted listing and the subsequently“sent e-mail”. The keyword is a word or group of words, such as aphrase, or other suitable identifier for one or more data object(s).

The mailing identifier (MID) is a sequence of characters indicative ofthe batch (or informational or advertising campaign) from which theparticular e-mail was sent. For example, a mailing identifier may be asequence of numbers, letters, symbols, or combinations thereof.

The position data is data indicative of the location in the templatewhere the image corresponding to that particular request is to berendered (placed or located). The max number is typically equal to N, aseach request typically results in a single image being dynamicallygenerated.

When e-mail (the sent e-mail) is downloaded by the e-mail client of theuser 47, and it is opened or activated (typically by a mouse click 62 onthe text line 60, of FIG. 3C), the e-mail client opens a connection or“pipe” to the Home Server (HS) 30. The e-mail client associated with theuser 47 pulls data from the Home Server (HS) 30, and may pull dataasynchronously. The data pulled from the Home Server (HS) 30 includesdata required to display the resultant dynamically generated text (inthe form of images), for example, a template 150, as shown in FIG. 4,and the single or multiple requests.

At block 114, the recipient (user 47) opens this e-mail, typically byclicking the mouse 49 b (of the computer 48), as shown by the arrow 62,anywhere along the line 60, that represents the sent e-mail, as receivedin the user's mail box, as shown in FIG. 3C. An indicator for theopening is received at the home server (HS) 30. This indicator may be,for example, a web bug. The web bug is part of the e-mail data 1010assembled in the home server (HS) 30 and is coded to route to the homeserver (HS) 30 upon opening of the e-mail, to open the connection orpipe. As used in this document, a web bug is a lag request, that isplaced into an e-mail to monitor user behavior, for example, the openingof the requisite e-mail. This opening, for purposes of explanationherein, occurs at a time indicated as t₁.

A connection or “pipe” is now opened (when the e-mail is opened, forexample, by the “click” of arrow 62), typically by the home server (HS)30, between the home server (HS) 30 and the computer 48 of the user 47(including the e-mail client), at block 116. This connection enablespulling of data from the Home Server (HS) 30 by the e-mail clientassociated with the computer 48 of the user 47. The data pulling istypically continuous, and typically in real time, as long as requestsare being processed, as described below.

The e-mail data 1010 and the data strings (in the data string area1012), form a communication (COMM) 1018, that is sent to the home server(HS) 30 at block 118 (as per the arrow 1020). From e-mail data 1010 ofthe communication 1018, the template, corresponding to the requisitetemplate code of the communication 1018, is pulled from a database in orassociated with the home server (HS) 30. The requisite template is sentthrough the connection or “pipe” to the user's e-mail client andcomputer 48, where it is built out.

Turning to FIG. 4, an exemplary template 150, that forms part of thebody of the opened e-mail, is built out in three sections 151, 161 and162. A first section S1 151 is designed to receive a static image,having content that is fixed prior to the time the e-mail was sent. Theimage for the section S1 151 is typically pulled from the Home Server(HS) 30 along with the template 150, when the e-mail is opened, asdetailed above.

Sections D1 161 and D2 162, for example, are designed to receive thedynamically generated images, that are generated and assembled when andonly if the e-mail is opened. Section D1 161, for example, is the firstposition for the dynamically generated images, and as such, receives theimage from the first listing of the listing text (described below),resulting from the first request being processed; this first request,for example, has position data (POS=1) corresponding to this firstposition. Similarly, Section D2 162, for example, is the second positionfor the dynamically generated images, and as such, receives the imagefrom the second listing of the listing text (described below), resultingfrom the second request being processed; this second request, forexample, has position data (POS=2) corresponding to this secondposition.

With the connection (pipe) now open, the e-mail client sends one or morerequests from the sent e-mail (that has now been opened), to the HomeServer (HS) 30, at block 120. Each of these one or more requests sentfrom the e-mail client to the Home Server (HS) 30 is referred to as a“sent back” request. Each “sent back” request includes portions of, andtypically all of the data (or data elements) from the correspondingrequests in the sent e-mail. For example, each sent back request istypically formed of data (data elements) including: a) an e-mailidentifier (EID); b) at least one keyword, or other suitable identifierfor at least one data object typically within a server, such as one ofthe content servers (CS) 34 a-34 n; c) a mailing identifier; d) positiondata; and, e) a max number.

The Home Server (HS) 30 processes each request, one at a time, at block122. The processing of all of the requests, is typically performed inreal time, for example, when the connection or pipe between the e-mailclient of the requisite user and the home server (HS) 30 is open.

This sub process of processing the request is described in detail below,with respect to FIG. 5. The result of each processed request includesobtaining text from a content server (CS) 34 a-34 n or cache (or othersimilar storage medium) 53 a-53 n, that may be associated with the HomeServer (HS) 30, and returning it to the Home Server (HS) 30. The HomeServer (HS) 30 sends this data (e.g., binary data in text form) to theimaging server (IS) 38, that generates an image(s) corresponding to thereceived data (text data). This generated image is returned to thee-mail client of the user, through the Home Server (HS) 30. Theaforementioned data transfers may occur over previously opened and/orexisting connections or pipes in the Internet 24 (network).

In the case of an HTTP request, the generated image is sent back to thee-mail client associated with the user 47, through the open connectionor pipe. Alternately, for non-HTTP requests, the Home Server (HS) 30could generate one or more new open connections or pipes, that aredifferent than the previously existing connections or pipes over whichthe request was sent to the Home Server (HS) 30. It is over these newconnection(s) or pipe(s) that the image, from the imaging server (IS) 38may be transferred from the Home Server (HS) 30 to the e-mail clientassociated with the user 47, over the Internet 24.

The process moves to block 124, where it is then determined, typicallyin the Home Server (HS) 30, if there are more requests to be processed.If there are not any more requests to be processed, the connection or“pipe” is closed between the computer of the user, for example computer48, and the home server (HS) 30, at block 126. The process ends at block128.

If there are more requests to be processed, the process returns to block120. The next request of the total number or “N” requests is sent, andthe process continues from block 120, as described above. The processwill repeat until all N requests have been processed, and once all Nrequests have been processed, the process ends at block 128.

Attention is now directed to FIG. 5, that shows a flow diagram of block122 of FIG. 2, detailing the processing of requests. In this process,requests are processed one at a time, on a “first in” basis.

Initially, the Home Server (HS) 30, upon receiving the request, at block202, checks the received request to determine if it is the first requestfrom the e-mail client of the user 47.

At block 204, a determination if the request is the first request ismade. This determination includes extracting the e-mail identifier (EID)from the request (the “sent back” request) that the e-mail client hasreturned to the Home Server (HS) 30. The e-mail identifier, plus thekeyword, or a variant of it, and the mailing identifier are grouped(combined) to define a key at the Home Server (HS) 30, in accordancewith the policy or rules of the Home Server (HS) 30. The key is queriedagainst all other keys in a cache, for example, the cache 53 a, known asa key cache, shown in FIG. 6, associated with the Home Server (HS) 30,for a match. Matching keys may be of identical or similar keys, inaccordance with predetermined rules and/or policies programmed into thecomponent(s) of the Home Server (HS) 30.

If a matching key is not found in the key cache 53 a, this is the firstrequest, and the process moves to block 210. The key cache 53 a is emptyof this particular key. Accordingly, the e-mail identifier plus thekeyword and the mailing identifier becomes a key and is stored in thecache 53 a, as shown, for example, in FIG. 6. All of the requests from aparticular e-mail (“sent e-mail”) have the same key. Alternately, if amatching key is found, the process moves to block 220.

As shown in FIG. 6, keys, indicated by KEY 1 to KEY 4 are unique to eachopened e-mail for each particular recipient (user), as identified by thecorresponding e-mail identifier (i.e., 10123, 10791, 12828, 17401) inaccordance with the time each e-mail was opened. For, example, the sameuser may open two different e-mails, but will have an e-mail identifier(ID) of 10123 and 12828 for each respective opened e-mails. This user,based on the e-mail identifiers, will receive the content correspondingto each specific e-mail, based on the keywords (i.e., NEW CARS andMORTGAGE, respectively). Similarly, in FIG. 6, the user having thee-mail identifier 10791 may receive different content than the user withthe e-mail ID 10123, even though their requests were based on the samekeyword “NEW CARS”, and they received their e-mail in the same batch, asindicated by the same mailing identifier.

Also, the number of requests “N” is stored in a request cache, alongwith a key. A request cache may be, for example, the cache 53 b.

Turning to block 210, the request being processed is the first request.The keyword in the request is isolated. The keyword is typically in theform of alphanumeric data, and may be an actual keyword, or a keywordgroup identifier. The keyword is translated into data, recognizable andusable by the requisite content servers (CS) 34 a-34 n.

The process now moves to block 212, where the keyword (datacorresponding to the keyword) is read, and in accordance with thereading, it is passed to a designated content server (CS) 34 a-34 n,over the Internet 24. The passing to the specific content server istypically in accordance with one or more rules, preprogrammed into theHome Server (HS) 30 or by a policy processor associated with the HomeServer (HS) 30. The policies and/or rules are typically time-sensitive,to be applicable in real-time. For example, the keyword may be such,that once read, the preprogrammed rules will be applied. The keyworddata will be passed to a specific content server, such as content server(CS) 34 a, over Internet 24.

The content servers (CS) 34 a-34 n may include prearranged listings.Alternately, for example, one or more of the content servers (CS) 34a-34 n may be for Pay Per Click (PPC) advertising content. In PPCadvertising, the content server creates a listing text, with listingsbeing prioritized, based on the amount an advertiser will pay for a userwho clicks their mouse on the advertiser's link in order to direct theuser's browser to the advertiser's designated (targeted) web site (orweb page).

Alternately, the keyword can be passed to a content server (CS) 34 a-34n that performs a search engine function and generates a listing text,typically of N listings. N corresponds to the number of requests in thesent e-mail.

The content server (CS) 34 a-34 n, for example, content server (CS) 34a, that received the passed keyword (keyword data), is queried foracceptance of the keyword (keyword data), and returns a listing text tothe Home Server (HS) 30. This listing text is read into the Home Server(HS) 30, at block 214. Data exchanges, between the Home Server (HS) 30and the content server (CS) 34 a (representative of all content servers(CS) 34 a-34 n), are typically accomplished via Extensible MarkupLanguage (XML).

The listing text, that is returned to the Home Server (HS) 30 from thecontent server (CS) 34 a, is assigned a particular key, corresponding tothe new key created in the key cache 53 a (as a result of a matching keynot being found), and includes the top “N” results, in the form of Nlistings. N is the total number of requests in the originally sente-mail, as detailed above. Each listing of the listing text typicallyincludes a title or headline for the content (e.g., the advertisement)to be returned to the e-mail client of the user 47, in accordance withthe corresponding e-mail ID, at least one target uniform resourcelocator (URL) for one or more servers, such as third party servers (TPS)50 a-50 n, and data for the body of the content to be returned. The datafor the body of the content to be returned includes data in text formand position data, indicating the location for the data in text form inthe template. The aforementioned portions of the listing text can beparsed, in accordance with the process being performed thereon.

The listing text is then stored in a cache, for example, the listingcache 53 c, at block 216. The key assigned to the listing text, upon itsbeing stored in the listing cache 53 c, is linked to its correspondingkey, typically in another cache, such as the key cache 53 a.

FIG. 7 shows an exemplary listing cache 53 c, where a listing text 250is stored therein. The listing text 250 includes a key, for example, KEY1, formed of the e-mail identifier (EID), for example, 10123, thekeyword, for example, NEW CARS, and, the mailing identifier (MID), forexample, 4567, as shown in FIG. 6 and detailed above, and two (N=2)listings 252 a-252 b. Within each listing 252 a-252 b is, for example, atitle for a web site associated with the listing (for example, inlisting 252 a, the title is FORD), a URL for the web site associatedwith the listing (for example, in listing 252 a, the URL iswww.ford.com), position data indicating the location in the templatewhere the image with the link to the web site associated with thelisting (for example, in listing 252 a, the position data is, POS=1),and data for the body of the content to be returned is referenced as “ADDESCRIPTION”. The AD DESCRIPTION is the text to be sent to the imagingserver (IS) 38 with the TITLE, to be converted into the requisite image,for placement into the template of the opened e-mail at the requisiteposition. The listings 252 a and 252 b are typically placed into thelisting text in an order of priority, here, for example, top to bottomor 252 a, followed by 252 b. Additionally, by storing the listing textin the cache 53 c with a unique key, a specific user will receivelistings intended for him at the time he opened the e-mail.

Accordingly, processing of the first request will result in the deliveryof the first listing 252 a in the form of an image, to the template ofthe opened e-mail at a position determined by the position data in thefirst request (for example, at a first position as the position data isPOS=1). Similarly, processing of the second request will result in thedelivery of the second listing 252 b in the form of an image, to thetemplate of the opened e-mail at a position determined by the positiondata in the second request (for example, at a second position as theposition data is POS=2). Processing of the requests until the last orNth request, here, for example, the Nth request is the second request,where N=2, results in delivery of the nth listing 252 n (i.e., 252 b) tothe Nth position in the template (i.e., the second position) of theopened e-mail, in accordance with the position data, POS=N (i.e., POS=2)(as detailed below).

Portions of the listing text are also stored in another cache, forexample, a click cache 53 d, at block 217. FIG. 8 shows an exemplaryclick cache 53 d, where a listing text 250′, corresponding to thelisting text 250 of the listing cache 53 c, is stored in the click cache53 d. The listing text 250′ includes a key, identical to thecorresponding key in the key cache 53 a, as well as listings 252 a′-252b′. Each listing 252 a′-252 b′ corresponds to the listings 252 a-252 bof the listing text 250. Within each listing 252 a′-252 b′ is, forexample, a title for a web site associated with the listing (forexample, FORD in the listing 252 a′), a Redirect URL for the target website associated with the listing (for example, www.ford.com, in thelisting 252 a′), and Position Data indicating the location for theresultant image produced from the listing in the template. For example,position data in the listing 252 a′ is represented as POS=1. Similarly,position data in the listing 252 b′ is represented as POS=2 (forexample, with the redirect URL for the target web sitewww.chevrolet.com).

From block 216, the process moves to block 230, where the listingcorresponding to the request number, and accordingly, the position data,is passed from the listing cache 53 c of the Home Server (HS) 30 to theimaging server (IS) 38, over the Internet 24.

The imaging server (IS) 38 receives the listing in a text format andconverts it into an image (or images). The image (or images) are sent tothe e-mail client, corresponding to the requisite e-mail identifier(EID), via the Home Server (HS) 30, at block 232. The image(s) for thelisting are rendered to the template in the position corresponding tothe position data for the listing. The rendered image is typicallypaired with one or more links within the template, and, for example, atleast one link within each image. The links are planted in the templatein such a way that makes the image, or a portion thereof, clickable(activatable by a mouse click). The link overlies the click URL for therequisite request number and its corresponding position in the body ofthe e-mail, as the link was placed into the template. Accordingly, thelink includes the underlying click URL for the Home Server (HS) 30 in astring, for example, that was created by the home server (HS) 30 orcomponents associated therewith, prior to the decryption process, atblock 106 (FIG. 2) above. The string, for example, includes, an e-mailidentifier (EID), keyword (KW), mailing identifier (MID) and positiondata (POS). The string typically also includes, for example, the maxnumber (N). These components for the string are detailed above.Accordingly, an example string may be as follows:<“http://homeserver.com/e-mailidentifier&keyword&mailingidentifier&positiondata&maxnumbee>

The process then moves to block 120 and block 122 of FIG. 2, to processthe subsequent requests.

Turning back to block 204, if the received request is not the firstrequest sent from the e-mail client, the process moves to block 220. Therequest is identified as a subsequent request, as the e-mail identifierand keyword from the subsequent sent back request define a key, thatwill match with a key in the key cache 53 a. The now matched key in thekey cache 53 a, is then used to identify the corresponding listing inthe listing cache 53 c, and pull (retrieve) the requisite listing textcorresponding to the particular request.

The process moves to block 222, where it is then determined if thisrequest, from which the listing text was pulled from the listing cache53 c, is the last request of the total number of requests. This isaccomplished by the following sub process.

Initially, in the e-mail sent to the e-mail client (the “sent e-mail”),the number of requests (N) in the e-mail, in particular the positiondata of the e-mail, has been stored in a cache, for example, the requestcache 53 b. The position data is associated with a key for each sente-mail, as stored in the request cache 53 b. The number of requestsneeding to be serviced for each sent e-mail corresponds to the number oflistings returned from the requisite content server (CS) 34 a-34 n, forexample the content server (CS) 34 a. For the first request serviced, areference counter in the Home Server (HS) 30 has been decremented by one(for example, N−1). For each subsequent request that is serviced, thereference counter is again decremented by one. Decrementing continues,until the reference counter reaches zero (for example, N=0), when thelast request has been processed.

Accordingly, in block 222, if the request is not the last request, thereference counter has a value of greater than zero (for example, N>0).The process moves to block 230.

In block 230, the next listing of the listing text (in text form)corresponding to the specific request, is pulled from the listing cache53 c, and is passed from the Home Server (HS) 30 to the imaging server(IS) 38. The process then moves to block 232, as detailed above.

However, if at block 222, the request is the last request, the referencecounter has been decremented to have a value of zero (N=0). The processmoves to block 224. The listing text in the listing cache 53 c ismodified.

Modification typically occurs after the last request of the total numberof requests (from block 124 of FIG. 2) has been received and processed.Modification of the listing cache 53 c of listings therein typicallyinvolves deleting the listing text from the listing cache 53 c.

This subprocess is typically timed, such that once the final listingfrom the listing cache 53 c for this last request has been passed to theimaging server (IS) 38, from the Home Server (HS) 30, at block 230, thelisting text is modified in the listing cache 53 c. The modificationtypically includes deleting the listing text from the listing cache 53 cin a time period, for example, once the connection or pipe between thee-mail client and the home server (HS) 30 closes, as the body of thee-mail is now complete (with the template having been filled), or in apredetermined time period. This predetermined time period is typically adefault, and is approximately three hours from the time the firstrequest of the total number of requests or N requests was processed.

With the process now at block 230, the final listing from the listingtext is pulled from the listing cache 53 c, in response to this lastrequest, and is passed to the imaging server (IS) 38, as detailed above.Once the listing (in text form) has been passed to the imaging server(IS) 38, the process moves to block 232, and back to block 124 (FIG. 2),as detailed above. Since the last request (for example, the Nth request)has been processed, in FIG. 2, the process moves to block 126 (where theconnection or “pipe” between the e-mail client and the home server (HS)30 is closed), where the entire content for the e-mail has now beenrendered to the e-mail client of the user 47, for placement into thenow-opened e-mail.

Attention is now directed to FIG. 9, that shows a screen shot of anexemplary e-mail 280, created in accordance with the description above,after it has been opened (at time t₁, as detailed above). This e-mail280 is used the example template 150 of FIG. 4, for its body. The e-mail280 was formed from the listing text returned from the requisite contentserver (CS) 34 a-34 n and stored in the listing 53 c and click 53 dcaches. The images 281 for the section S1 151 of the template 150, arefrom the imaging server (IS) 38, and are, for example, of anadvertisement.

The image 281 is a static image, of a fixed or preprogrammed content,formed prior to the e-mail being sent. The images 284, 285 (in e-mail280) for sections D1 161 and D2 162 of the template 150, were assembledwhen the e-mail was opened (in accordance with the processes detailedherein). These images 284, 285, include portions 284 a, 285 a, thatcover links for the user to click on, and are indicated as such, forexample, “Click now”. (The portions 284 a, 285 a are hereafter referredto as links). These underlying links, are the click URLs for thecorresponding positions, of the data strings, detailed above, and shownin FIG. 3B, placed into the e-mail by the home server (HS) 30, at block106 (FIG. 2), above.

When these underlying links (the click URL's) are activated, typicallyby a mouse 49 b click or other pointing device activation (for example,at a time t₂ subsequent to time t₁), the browser of the user 47 isprovided with a redirect URL, directing the browser to a target web site(or web page). This web site (or web page) is from the listing thatresulted in the image that supported the clicked link.

In operation, activating the link 284 a, for example, by a mouse click(indicated by the arrow 287), directs the user's browser to the HomeServer (HS) 30. From the data in the string, a click cache 53 d may beaccessed. By accessing the click cache 53 d, the browser receives aredirect URL for a web site (or web page) (that is targeted). Once theredirect URL is active, the connection or pipe between the e-mail clientand the home server (HS) 30 closes, and opens a connection or betweenthe e-mail client and the server or the like, hosting the target website (for example, third party servers 50 a-50 n), corresponding to theredirect URL.

FIG. 10 shows a flow diagram of a process or method in accordance withanother embodiment of the invention. This process may be a second phaseof the larger process, where the user 47 (browsing applicationassociated with the user 47) reaches the web site (or web page) (targetweb site or target web page) of provider of the time-relevant text(content).

Initially, the user 47, now having received the rendered images in thetemplate for the now-opened e-mail, will “click” (indicated by the arrow287) on an image 284, 285, or portion thereof, that supports a link,such as the links 284 a, 285 a of FIG. 9, to which reference is now alsomade. Each link, as discussed above, is associated with a string, thatincludes the requisite click URL. This click URL functions to initiallydirect the browsing application associated with the requisite user(e-mail recipient) to the home server (HS) 30. As stated previously, theclick URL is, for example, a string, that includes a URL for the homeserver, an e-mail identifier (EID), keyword (KW), mailing identifier(MID) and position data (POS), and typically also includes the maxnumber (N).

At block 302, the Home Server (HS) 30 receives data including an e-mailidentifier, keyword, mailing identifier and position data (for the imagelocation), (and typically a max number), typically in theabove-described activated click URL, as a result of links 284 a, 285 a,of the text 284, 285, being clicked (indicated by the arrow 287) by theuser 47 (activating their mouse 51, as shown in FIG. 1, at the desiredlink 284 a, 285 a). The click typically reopens a connection or pipebetween the e-mail client of the user (e-mail recipient) and the homeserver (HS) 30. The Home Server (HS) 30 then creates a key from, forexample, the e-mail identifier, the keyword, and the mailing identifier,and locates the matching key in the key cache 53 a. With the matchingkey located, the corresponding key in the click cache 53 d is located.The click cache 53 d is queried for position data matching the positiondata of the string (of the link), in order to obtain a redirect URL forthe particular position data, at block 304. It is then determined if theredirect URL is in the click cache, at block 306.

The redirect URL is a URL for the web site corresponding to the clickedtext portion on the rendered e-mail, as programmed into the listed textin the click cache 53 d. This URL is typically for a target web site orweb page (content) on (or hosted by), for example, a third party server(TPS) 50 a-50 n.

If the redirect URL is not in the click cache 53 d, the user 47 is sentan error page, at block 308. This error page appears on the monitor 49 aof the user 47 as, for example, the screen shot shown in FIG. 11.

However, if the redirect URL is in the click cache 53 d (with thematching position data), the Home Server (HS) 30 sends the web browserof the user 47 the redirect URL at block 310. The user's web browserreceives this redirect URL, and automatically accesses the web page(typically, a target web page) corresponding to the redirect URL.

For example, the redirect URL (from KEY 1, position data POS=1 in theexample click cache 53 d of FIG. 8) may be “www.ford.com.” In this case,the user's web browser would be directed to www.ford.com, whereby theweb page, obtained at the address www.ford.com, shown in FIG. 12, wouldappear on the monitor 49 a of the user. The server that hosts the siteassociated with www.ford.com may be any one or more of the third partyservers (TPS) 50 a-50 n.

The click cache 53 d is typically designed to expire once the connectionor pipe between the e-mail client and the home server (HS) 30 closed(upon activation of the redirect URL). Typically, as a default, theclick cache expires in a predetermined time period, for example, a timeperiod that is less than the limit redirect timeouts (described forblock 224 above). This time may be, for example, approximately twohours.

The above-described processes including portions thereof can beperformed by software, hardware and combinations thereof. Theseprocesses and portions thereof can be performed by computers,computer-type devices, workstations, processors, micro-processors, otherelectronic searching tools and memory and other storage-type devicesassociated therewith. The processes and portions thereof can also beembodied in programmable storage devices, for example, compact discs(CDs) or other discs including magnetic, optical, etc., readable by amachine or the like, or other computer usable storage media, includingmagnetic, optical, or semiconductor storage.

The processes (methods) and systems, including components thereof,herein have been described with exemplary reference to specific hardwareand software. The processes (methods) have been described as exemplary,whereby specific steps and their order can be omitted and/or changed bypersons of ordinary skill in the art to reduce these embodiments topractice without undue experimentation. The processes (methods) andsystems have been described in a manner sufficient to enable persons ofordinary skill in the art to readily adapt other hardware and softwareas may be needed to reduce any of the embodiments to practice withoutundue experimentation and using conventional techniques.

While preferred embodiments of the present invention have beendescribed, so as to enable one of skill in the art to practice thepresent invention, the preceding description is intended to be exemplaryonly. It should not be used to limit the scope of the invention, whichshould be determined by reference to the following claims.

1. A computer-implemented method for providing time-relevant contentinto electronic communications over a network comprising: receiving, bya first computer system linked to the network, over the network,encrypted address data corresponding to a recipient for an electroniccommunication, the encrypted address data from a second computer systemlinked to the network: creating, by the first computer system, anelectronic communication including the encrypted address data and arequest for obtaining content, the request for obtaining contentconfigured to be automatically transmitted from a terminal of therecipient of the electronic communication, over the network, when theelectronic communication is opened, the terminal linked to the network;sending, by the first computer system, the electronic communicationincluding the encrypted address data, for decryption to a decryptingcomputer device linked to the network and associated with the secondcomputer system, over the network; receiving, by the first computersystem, the request for obtaining content, that was automaticallytransmitted over the network, from the terminal of the recipient, whenthe electronic communication was opened; and responding, by the firstcomputer system, to the received request for obtaining content, that wasautomatically transmitted from the terminal of the recipient when theelectronic communication was opened, including, assembling the contentcorresponding to the received request for obtaining content, to beprovided to the opened electronic communication.
 2. Thecomputer-implemented method of claim 1, additionally comprising: thefirst computer system providing the content to the opened electroniccommunication.
 3. The method of claim 2, wherein the assembling thecontent includes obtaining listings based on at least one key word, andproviding redirect uniform locators to target web sites associated witheach listing, each redirect uniform locator operable when the redirectuniform resource locator is activated.
 4. The method of claim 2, whereinthe first computer system providing the content to the opened electroniccommunication includes: opening a connection to a client associated withthe recipient of the electronic communication, the client for sendingand receiving electronic communications; and, sending the content to theopened electronic communication through the connection.
 5. The method ofclaim 4, additionally comprising: closing the connection when thecontent has been provided to the opened electronic communication.
 6. Themethod of claim 5, wherein the client includes an e-mail client.
 7. Themethod of claim 2, wherein the electronic communication includes a datastring activatable by activating a link in the opened electroniccommunication, to open a connection between the terminal of therecipient and the first computer system, the data string including datafor activating redirect uniform resource locators to direct the browsingapplication of the terminal of the recipient, when the recipient hasactivated the link, to one of the target web sites.
 8. The method ofclaim 7, wherein the data string includes a click uniform resourcelocator, provided in the electronic communication, the click uniformresource locator including the address for the location of the redirectuniform resource locator, an electronic mail identifier, and a mailingidentifier.
 9. The method of claim 2, wherein the electroniccommunication includes electronic mail.
 10. The method of claim 2,wherein the content is assembled and provided in real time, when theelectronic communication is opened.
 11. The method of claim 2, whereinthe encrypted address data is encrypted with a one-way encryptionapplication.
 12. The method of claim 2, wherein the encrypted addressdata is encrypted with a two-way encryption application.
 13. The methodof claim 3, wherein the assembling the content includes obtaining textfrom the listings and converting the text into images for placement intothe opened electronic communication.
 14. The method of claim 1, whereinthe network includes the Internet.
 15. A system for providingtime-relevant content into electronic communications over a networkcomprising: at least one first computer device for linking to thenetwork, configured for: receiving over the network, encrypted addressdata corresponding to a recipient for an electronic communication, theencrypted address data from a second computer system linked to thenetwork: creating an electronic communication including the encryptedaddress data and a request for obtaining content, the request forobtaining content configured to be automatically transmitted from aterminal of the recipient of the electronic communication, over thenetwork, when the electronic communication is opened, the terminallinked to the network; sending the electronic communication includingthe encrypted address data, for decryption to a decrypting computerdevice linked to the network and associated with the second computersystem, over the network; receiving the request for obtaining content,that was automatically transmitted over the network, from the terminalof the recipient, when the electronic communication was opened; andresponding to the received request for obtaining content, that wasautomatically transmitted from the terminal of the recipient when theelectronic communication was opened, including, assembling the contentcorresponding to the received request for obtaining content, to beprovided to the opened electronic communication.
 16. The system of claim15, wherein the at least one first computer device is additionallyconfigured for providing the content to the opened electroniccommunication.
 17. The system of claim 16, wherein the at least onecomputer device is further configured for assembling the contentincluding: obtaining listings based on at least one key word, andproviding redirect uniform locators to target web sites associated witheach listing, each redirect uniform locator operable when the redirectuniform resource locator is activated.
 18. The system of claim 17,additionally comprising, at least one second computer device linked tothe network and configured for obtaining text from the listings andconverting the text into images for placement into the opened electroniccommunication.
 19. A system for providing time-relevant content intoelectronic communications over a network comprising: a storage mediumfor storing computer components; and a processor for executing thecomputer components comprising: a first component configured forreceiving over the network, encrypted address data corresponding to arecipient for an electronic communication, the encrypted address datafrom a second computer system linked to the network: a second componentconfigured for creating an electronic communication including theencrypted address data and a request for obtaining content, the requestfor obtaining content configured to be automatically transmitted from aterminal of the recipient of the electronic communication, over thenetwork, when the electronic communication is opened, the terminallinked to the network; a third component configured for sending theelectronic communication including the encrypted address data, fordecryption to a decrypting computer device linked to the network andassociated with the second computer system, over the network; a fourthcomponent configured for receiving the request for obtaining content,that was automatically transmitted over the network, from the terminalof the recipient, when the electronic communication was opened; and afifth component configured for responding to the received request forobtaining content, that was automatically transmitted from the terminalof the recipient when the electronic communication was opened,including, assembling the content corresponding to the received requestfor obtaining content, to be provided to the opened electroniccommunication.
 20. The system of claim 19, additionally comprising: asixth component configured for providing the content to the openedelectronic communication.
 21. The system of claim 20, wherein the fifthcomponent is further configured for assembling the content by obtaininglistings based on at least one key word, and providing redirect uniformlocators to target web sites associated with each listing, each redirectuniform locator operable when the redirect uniform resource locator isactivated.
 22. The system of claim 21, additionally comprising: aseventh component configured for obtaining text from the listings andconverting the text into images for placement into the opened electroniccommunication.
 23. A computer system for providing time-relevant contentinto electronic communications over a network comprising: at least onefirst computer device linked to the network, the at least one computerdevice comprising: means for receiving, encrypted address datacorresponding to a recipient for an electronic communication, from thenetwork, the encrypted address data from a second computer system linkedto the network: means for creating an electronic communication includingthe encrypted address data and a request for obtaining content, therequest for obtaining content configured to be automatically transmittedfrom a terminal of the recipient of the electronic communication, overthe network, when the electronic communication is opened, the terminallinked to the network; means for sending the electronic communicationincluding the encrypted address data, for decryption to a decryptingcomputer device linked to the network and associated with the secondcomputer system, over the network; means for receiving the request forobtaining content, that was automatically transmitted over the network,from the terminal of the recipient, when the electronic communicationwas opened; and means for responding to the received request forobtaining content, that was automatically transmitted from the terminalof the recipient when the electronic communication was opened,including, assembling the content corresponding to the received requestfor obtaining content, to be provided to the opened electroniccommunication.
 24. The computer system of claim 23, additionallycomprising: means for providing the content to the opened electroniccommunication.
 25. The computer system of claim 24, additionallycomprising: at least one second computer device linked to the network,the at least one second computer device including means for convertingcontent obtained as text into images for being provided to the openedelectronic communication.