(12) United States Patent (10) Patent No.: US 7,194,515 B2 Kirsch (45) Date of Patent: *Mar
Total Page:16
File Type:pdf, Size:1020Kb
US0071945.15B2 (12) United States Patent (10) Patent No.: US 7,194,515 B2 Kirsch (45) Date of Patent: *Mar. 20, 2007 (54) METHOD AND SYSTEM FOR SELECTIVELY (56) References Cited BLOCKING DELIVERY OF BULK U.S. PATENT DOCUMENTS ELECTRONIC MAIL 5,815,665 A * 9/1998 Teper et al. ................ 709,229 (75) 6,195,698 B1* 2/2001 Lillibridge et al. ......... 709/225 Inventor: Steven T. Kirsch, Los Altos, CA (US) 6,199,102 B1* 3/2001 Cobb ......................... TO9,206 (73) Assignee: Google Inc., Mountainview, CA (US) * cited by examiner (*) Notice: Subject to any disclaimer, the term of this Primary Examiner Viet D. Vu patent is extended or adjusted under 35 (74) Attorney, Agent, or Firm—Fenwick & West LLP. U.S.C. 154(b) by 588 days. (57) ABSTRACT This patent is Subject to a terminal dis The origin address of an e-mail message is validated to claimer. enable blocking of e-mail from spam e-mail sources, by preparing, in response to the receipt of a predetermined (21) Appl. No.: 10/407,586 e-mail message from an unverified source address, a data key encoding information reflective of the predetermined (22) Filed: Apr. 3, 2003 e-mail message. This message, including the data key, is then issued to the unverified source address. The computer (65) Prior Publication Data system then operates to detect whether a response e-mail US 2003/O1673 11 A1 Sep. 4, 2003 message, responsive to the challenge e-mail message, is received and whether the response e-mail message includes Related U.S. Application Data a response key encoding predetermined information reflec tive of a predetermined aspect of the challenge e-mail (63) Continuation of application No. 09/208,330, filed on message. The unverified source address may be recorded in Dec. 9, 1998, now Pat. No. 6,546,416. a verified source address list. Thus, when an e-mail message is received, the computer may operate to accept receipt of a (51) Int. Cl. predetermined e-mail message on condition that the source G06F 3/00 (2006.01) address of the predetermined e-mail message is recorded in (52) U.S. Cl. ...................... 709/206: 709/225; 709/229; the verified source address list and alternatively on condition 709/237 that the predetermined e-mail message includes the response (58) Field of Classification Search ................ 709/206, key. 709/217, 219, 225, 227, 237,250, 229; 713/201 See application file for complete search history. 6 Claims, 4 Drawing Sheets OUT-BOUND MESSAGE AO IN-BOUND MESSAGE 42 H *EP v. CHALLENGE / 28 4s LIST Y. n.S.1 (e) 44 A6 --~26I (e) REJECT S U.S. Patent Mar. 20, 2007 Sheet 1 of 4 US 7,194,515 B2 F.G. 1 1O OUT-BOUND MESSAGE N-BOUND MESSAGE 42 28 v CHALLENGE/& 48 SL (e)- 46 E-26 U.S. Patent Mar. 20, 2007 Sheet 2 of 4 US 7,194,515 B2 NSERT INTO NBOUND EMP-QUEU FG. 3 64 USER RECEIVE DENTFY SENDER -N-1 6 ACCEPT TRANSFERO PROMPT TO LISTED N-QUEUE UPDATE LISTS UPDATE CHALLENGE U.S. Patent Mar. 20, 2007 Sheet 3 of 4 US 7,194,515 B2 NBOUND INSERT ENTO FG. 4 TEMP-QUEUE 102 ROBOT RECEIVE 100 --/ SWITCH ACCOUNT TRANSFERTO N-QUEUE 116 UPDATE REMOVE FROM CHALLENGE PROMP TO TEMP-QUEUE v LIST UPDATE LISTS 1O 8 'N - - - - 110 118 PREPARE MESSAGE 122 34 USER SEND PREPARE SIGNATURE OUT BOUND 120 ur 13 O 136 F.G. 5 ADDRECIPIENT TO ACCEPT LIST 128 U.S. Patent Mar. 20, 2007 Sheet 4 of 4 US 7,194,515 B2 EXAMINE CHAENGEJST ENTRIES 146 REMOVE FROM TEMP-QUEUE 48 US 7,194,515 B2 1. 2 METHOD AND SYSTEM FOR SELECTIVELY nated Received, are added to the message as the message BLOCKING DELIVERY OF BULK passes through the mailer sub-systems of ISPs and other ELECTRONIC MAIL computer systems as necessary to reach a destination domain user. These Received lines are nominally beyond the BACKGROUND OF THE INVENTION 5 control of individual bulk e-mailers. The definition and use of these header fields is specified in Request for Comments 1. Field of the Invention (RFCs)/Standards (STDs) documents 821/10, 822/11, and The present Invention is generally related to systems and 974/14, among others, which are publicly available from methods of managing communications by electronic mail multiple sources on the Internet. and, in particular, to a method and system for detecting and 10 Bulk e-mailers use anonymous mailers and re-mailers to blocking the receipt of unsolicited commercial electronic obscure the required e-mail header lines of their UCE by mail. specifying non-existent e-mail systems and accounts. Modi 2. Description of the Related Art fied mailers can be used to completely remove header lines With the expansion of the Internet as a medium for the or to substitute addresses of known valid Internet e-mail transport of electronic mail (e-mail), an advertising practice 15 accounts that are not actually associated with the bulk of sending unsolicited commercial e-mail (UCE or "spam) e-mailer. has developed as an annoyance to other uses and users of the These techniques are generally sufficient to prevent the Internet. Indeed, the volume of UCE received by an e-mail UCE recipients from being able to identify and complain to recipient may regularly be a Substantial percentage of all the postmaster of the relevant ISP about the activities of a e-mail received. 2O bulk e-mailer. While the Received lines provide traceable Bulk e-mailers, as the sources of UCE are commonly information, the complexity of filtering through this infor referred to, utilize the resources of the Internet itself, includ mation is usually beyond the level of effort that most UCE ing specifically, the Usenet news network, Web based dis recipients will undertake. Even for those that do, the number cussion groups, Web based indices of users and organiza of public complaints actually received by the ISP is signifi tions, and other public or pseudo-public information sources 25 cantly reduced, often allowing the bulk e-mailer to remain in to gather e-mail addresses. E-mail address lists are also operation, if only for a longer period of time before being available for purchase from various organizations who at forced to find a new ISP to use for their activities. least purport to provide targeted lists. The quality of targeted A variety of techniques have been developed in the recent lists, however, tends to degrade rather quickly over time due past to deal with the growing amount of UCE being received to the fluid nature of the Internet and the changing interests 30 by Internet e-mail users. These techniques primarily include of Internet users. Consequently, there is an obvious interest e-mail client systems Supporting manual e-mail accept and by the bulk e-mailers to oversubscribe their mailing lists reject lists, automated context analysis, use of public shared with any and all e-mail addresses that are possibly relevant lists of known spam sources, and direct challenge systems. targets for the content of any particular UCE. None are completely effective and all impose an additional There is also little commercial constraint limiting the 35 degree of operating complexity on the e-mail client user to lowering of the relevancy threshold used by bulk e-mailers Varying degrees. due to the beneficial cost structure that most bulk e-mailers The typical e-mail accept and reject list approach, as used enjoy. The only actual cost to the bulk e-mailer for sending in the ProntoMail(R) e-mail client, provides for lists of e-mail additional UCE is, at most, the incremental cost of acquiring addresses that are used as gate filters against incoming additional e-mail addresses and the incremental connection 40 e-mail. E-mail with addresses on the accept list are passed, cost required to send a UCE message. Many higher band while messages with addresses on the reject list are dis width Internet connections are structured for continuous carded; the reject list is a blocking filter. By default, e-mail availability at a fixed fee. Bulk e-mailers with these types of addresses not on either list are presented to the user to connections therefore effectively incur no additional cost for determine which list to add the address to. As a result, the sending UCE to as many e-mail addresses they have 45 user sees all of the UCE that originates from any address that acquired. is new to the user's e-mail client. Since the bulk e-mailers Fortunately, there is at least one significant non-economic, to hide or frequently change their return e-mail addresses, or at least not directly economic, cost-of-business faced by almost all of the UCE is seen by the e-mail client user. bulk e-mailers. Internet access for all users is channeled Automated context analysis, such as implemented by through Internet Service Providers (ISPs) at some level. As 50 DeadLetter R, a Eudora.R. plug-in, relies on key word usage predominantly service oriented organizations, these ISPs are and various patterns of advertisement pitches to discern usually responsive to complaints from the general Internet UCE from other e-mail. Suspected UCE is automatically public concerning excessive UCE being sent from any discarded or, more typically, directed to an alternate e-mail domain serviced by a particular ISP or from a subscriber ISP in-box of the client. Since the analysis is not and as a site served by a higher level ISP.