Managing unwanted/unsolicited e-mail protection using sender identity

作者: Mathew Nelson , Matthew Roy

DOI:

关键词:

摘要: A multi-test management of unwanted, unsolicited e-mail for potential SPAM wherein components an from a sender directed to recipient comprising any one envelope, or more headers body, the having identity are used verify identity. When is verified, first process performed on e-mail. When, however, verifying step fails second

参考文章(34)
Huzefa Karachiwala, Cristian Alzati, Graham P. Churchley, Andrew D. Farlie, Terence R. Sheehy, Richard J. Walker, William D. Price, File sharing system for serving content from a computer ,(2001)
Upendra Chaudhari, Ran Zilca, Ganesh Ramaswamy, Jiri Navratil, Jason Pelecanos, Method and apparatus for determining the identity of a user by narrowing down from user groups ,(2004)
Reginald Adkins, Authorized email control system ,(2002)
Craig Sprosts, Daniel Quinlan, Robert Brahms, Techniques for determining the reputation of a message sender ,(2004)
Ronald C. Mullin, Scott A. Vanstone, Ivan M. Onyszchuk, Computational method and apparatus for finite field multiplication ,(1986)
James Stephen Larson, Nikolai Paul Christenson, Scott Ernest Lystig Fritchie, Electronic mail system with methodology providing distributed message store ,(2000)