WO2006002931A1 - A method and a system for blocking unwanted unsolicited information - Google Patents

A method and a system for blocking unwanted unsolicited information Download PDF

Info

Publication number
WO2006002931A1
WO2006002931A1 PCT/EP2005/007075 EP2005007075W WO2006002931A1 WO 2006002931 A1 WO2006002931 A1 WO 2006002931A1 EP 2005007075 W EP2005007075 W EP 2005007075W WO 2006002931 A1 WO2006002931 A1 WO 2006002931A1
Authority
WO
WIPO (PCT)
Prior art keywords
abuse
information
profile
mark
report
Prior art date
Application number
PCT/EP2005/007075
Other languages
French (fr)
Inventor
Franklin Selgert
Original Assignee
Koninklijke Kpn N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Kpn N.V. filed Critical Koninklijke Kpn N.V.
Priority to EP05763193A priority Critical patent/EP1763784A1/en
Publication of WO2006002931A1 publication Critical patent/WO2006002931A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Definitions

  • the invention relates to a method and a system for blocking information sent via a data network to a device.
  • Blocking of spam is becoming a high priority.
  • most blocking is achieved by screening the information for specific words, blacklisting (disallowing) of sending parties, whitelisting (allowing) of sending parties and/or virus filtering.
  • blacklisting allows
  • whitelisting allowing
  • virus filtering In practice a lot of unwanted unsolicited information still gets delivered though.
  • a method and system for filtering spam is described in US2003/0009698 "spam avenger". This method and system is applicable to email and is based on whitelisting / blacklisting of sending parties. Whenever a message is first received from an unapproved sender, a confirmation request email is sent to the sender's email address requesting the sender to confirm its existence and identity. Spammers typically don't receive, and can't handle reply emails. Therefore, until the unapproved sender replies to the confirmation request email, electronic messages received by the unapproved sender are treated as spam.
  • a system and method facilitating detection of unsolicited e-mail message (s) with challenges is described in EP1376427 "spam detector with challenges".
  • This system and method includes an e-mail component and a challenge component.
  • the system can receive e-mail message (s) and associated probabilities that the e-mail message (s) are spam. Based, at least part, upon the associated probability, the system can send a challenge to a sender of an e-mail message.
  • the challenge can be embedded code, computational challenge, human challenge and/or micro payment request.
  • the challenge component can modify the associated probability and/or delete the e-mail message.
  • a method for enforceably reducing spam is described in WO03/105008 "enforceable spam identification and reduction system, and method thereof" .
  • This method checks an email message for a specific mark and if the specific mark is present, tags this email message as non-spam.
  • the tagged email is displayed to a user of a local computer.
  • the specific mark may be displayed with the tagged email.
  • the mark is part of an enforceable anti-spam email header field comprising a field name and a field body.
  • the field body comprises the mark, which is used for identification or indication of ownership.
  • the mark is legally reserved for the exclusive use of the owner of the mark. If the user identifies the tagged email as spam, the tagged email is sent to a remote enforcement computer.
  • a method and system for selecting and removing spam from a stream of mail received by mail service or mail client is described in WO01/53965 "e-mail spam filter".
  • spam is attracted by creating a series of e-mail addresses held by a spam attractor site connected to the internet SMTP mail network, that are used to engage in high risk activities known to attract spam. All spam received would be funneled and subject to the same processing, regardless to which of the e-mail addresses it was actually sent to. All mails received at these e-mail addresses must be spam, as the addresses are not provided to any other mail source.
  • the mail is received, and the fingerprint is calculated for each message.
  • the central fingerprint database contains a relational table and one row for each unique item of spam detected.
  • a spam filter is associated with each mail gateway and when an e-mail is received, the mail gateway calculates a mail signature using the fingerprint algorithm, the signature is looked up in the local database, and if found, the mail is discarded.
  • IML 1 S can also be put into the metadata for content that individuals and services post onto the Net in order to authenticate that content as "not spam” . Every IML starts with a certain number of "points" on it, just like a driver's license. Individual email client applications (whether Webmail or desktop mail clients) can then simply screen each incoming message for a valid IML certificate.
  • Messages with valid IML 1 S are accepted and the sender's may also be automatically whitelisted; incoming messages without valid IML's can be blocked or go into a "suspect e- mail folder" and can get a bounced message informing the sender that their IML was missing or invalid. If you get a message from someone that you feel is "spam” you can simply mail it to the IML registry to report abuse. If a certain number of "spam” citations are filed against any IML holder per unit of time, the holder gets a "traffic violation citation", in other words a ticket. The "cost" of the ticket depends on how far over the "spam limit" they are.
  • the ticket deducts points from their IML certificate, based on the cost, as well as from the IML certificate for their ISP. Lost points can be regained with good behavior (every IML earns back 1 point per month) , or from community service (to the IML Registry perhaps) , or by paying a fine to the IML Registry.
  • the IML Registry can dynamically re ⁇ issue new IMLs to ISPs and their users based on their current status. So for example, if a user gets a ticket they get a new IML that replaces their previous one and which encodes the new number of points remaining on their license.
  • each IML holder's current license points can be encoded in their IML (cryptographically)
  • spam filters and recipient apps can not only check for valid IMLs on incoming mail, but if they wish they can even prioritize or screen messages by the number of points on the IMLs of the senders and their ISPs. Those who have very few points may be considered to be "on probation" or
  • I will want to use an ISP that has a sterling IML, because I don't want my own reputation tarnished.
  • ISP I will want to be careful about not routing spam because if I route spam for my members then it harms my reputation, which means messages from my service may not be accepted by others, and that may cause my members to go elsewhere, therefore as an ISP my policy may be that I only allow members with IMLs that have a certain number of points: if one of my member's IML goes below a certain number of points I may kick them out of my service.
  • the central IML Registry can charge a modest fee to applicants to get an IML and renew it every year, and this can support the cost of running the Registry as a non ⁇ profit.
  • the IML Registry can open up an API that lets other applications query it by inputting an IML certificate to it in order to get the current status of that license (e.g. whether or not it is valid and the number of points remaining on it) .
  • this entire infrastructure could be decentralized such that every ISP could run their own sub-Registry.
  • the central Registry would issue and maintain IMLs for ISPs, and then ISPs would issue and maintain the IMLs for their members. This is similar to the global DNS infrastructure.
  • a method for identifying the original sender of an email message is known from "Caller ID for E-Mail" by Microsoft.
  • the Caller ID for E-Mail method aims to eliminate domain spoofing and increase the effectiveness of spam filters by verifying what domain a message came from — much like how caller ID for telephones shows the phone number of the person calling.
  • the method involves three steps to authenticate a sender: (1) e-mail senders, large or small, publish the Internet protocol (IP) addresses of their outbound e-mail servers in the Domain Name System (DNS) ; (2) recipient e-mail systems examine each message to determine the purported responsible domain (i.e., the Internet domain that purports to have sent the message) ; (3) recipient e-mail systems query the DNS for the list of outbound e-mail server IP addresses of the purported responsible domain. They then check whether the IP address from which the message was received is on that list. If no match is found, the message has most likely been spoofed and will be rejected. All solutions mentioned above have in common that they are used for blocking unwanted unsolicited email messages only. Furthermore all solutions use the criteria that an email message is either spam or not spam, a mere binary rating.
  • IP Internet protocol
  • DNS Domain Name System
  • Kijkwijzer http://www.kijkwijzer.nl
  • Kijkwijzer gives an age recommendation - All Ages, Age 6, Age 12 and Age 16 - and pictograms indicating which aspects of the content have led to the production being not recommended for particular age groups.
  • the aspects distinguished are violence, fear, sex, discrimination, drug and/or alcohol abuse, and coarse language.
  • the Kijkwijzer pictograms appear in advertisements, newspaper program listings, listings magazines, cinema listings and the packaging of video cassettes and DVDs. They also appear on screen at the beginning of a TV program, video or movie. Productions are rated by having a questionnaire filled in after which coders (people) determine, based on the filled in questionnaire, which classification a production should be given.
  • the prior art fails to provide a solution for blocking and reporting unwanted unsolicited information of any kind using multiple rating. Furthermore the prior art fails to provide a solution for blocking information for which no delivery fee is paid.
  • the present invention provides a solution for blocking information for which no delivery fee is paid. Furthermore the present invention provides a solution for blocking and reporting unwanted unsolicited information of any kind using multiple rating.
  • a method for blocking information sent via a data network to a device comprises a mark.
  • the mark can comprise charging information, e.g. in the form of a binary word, or any other digital identification, indicating that a delivery fee is paid or indicating an amount of money that is paid for delivery of the information.
  • the charging information can include an identifier of an origin network and/or an identifier of a payment handler.
  • the mark can also comprise an identification of a sending party and a content class identification.
  • the method can comprise the steps of checking the charging information and blocking the delivery of the information to the device if the charging information is invalid.
  • the method can further comprise the steps of checking the mark using a profile of a user of the device, creating an abuse-report and sending the abuse- report.
  • the method can further comprise the step of verifying the identification of the sending party through a server of a certified licensee organization. This advantageously makes it possible to only allow licensed parties to send information.
  • the profile can comprise characteristics of the user of the device. This advantageously makes it possible to block the information if from the characteristics of the user it is derived that the mark is not allowed.
  • the profile can comprise information about an applicable law. This advantageously makes it possible to block the information if from the applicable law it is derived that the mark is not allowed.
  • the profile can comprise personal settings. This advantageously makes it possible to block the information if from the personal settings, which are set by the user of the device, it is derived that the mark is not allowed.
  • the profile can be stored within the device or within the data network.
  • the checking, creating and sending can be performed within the device. This makes it possible for the device to be in control.
  • the steps of checking, creating and sending can be performed within the data network. This makes it possible for the data network to be in control.
  • the step of checking can be performed within the data network and the steps of creating and sending can performed within the device. This makes it possible for the data network to be in control of the checking and the device to be in control of the abuse-re
  • the method can comprise the step of displaying an anti-abuse-button on a display of the device or enabling an anti-abuse menu item in a software running in the device. This advantageously makes it possible for the user of the device to quickly have an abuse-report created.
  • the abuse-report can comprise an abuse-ranking and the method can comprise the step of calculating the abuse- ranking using the content class identification and the profile of the user. This advantageously enables to rank the level of abuse.
  • a system for blocking information sent via a data network to a device comprises a mark.
  • the mark can comprise charging information, e.g. in the form of a binary word, or any other digital identification, indicating that a delivery fee is paid or indicating an amount of money that is paid for delivery of the information.
  • the charging information can include an identifier of an origin network and/or an identifier of a payment handler.
  • the mark can also comprise an identification of a sending party and a content class identification.
  • the system can comprise means for checking the mark using a profile of a user of the device, means for creating an abuse-report and means for sending the abuse-report.
  • the system can further comprise means for verifying the identification of the sending party through a server of a certified licensee organization. This advantageously makes it possible to only allow licensed parties to send information.
  • the profile can comprise characteristics of the user of the device. This advantageously makes it possible to only allow licensed parties to send information.
  • the profile can comprise information about an applicable law. This advantageously makes it possible to block the information if from the applicable law it is derived that the mark is not allowed.
  • the profile can comprise personal settings. This advantageously makes it possible to block the information if from the personal settings, which are set by the user of the device, it is derived that the mark is not allowed.
  • the profile can be stored within the device or within the data network.
  • the system can comprise means for displaying an anti- abuse-button on a display of the device or means for enabling an anti-abuse menu item in a software running in the device. This advantageously makes it possible for the user of the device to quickly have an abuse-report created.
  • the abuse-report can comprise an abuse-ranking and the system can further comprise means for calculating the abuse-ranking using the content class identification and the profile of the user. This advantageously enables to rank the level of abuse.
  • Fig.l shows a schematic view of the method of an exemplary embodiment
  • Fig.2 shows a time sequence diagram of an exemplary embodiment
  • Fig.3 shows a time sequence diagram of an exemplary embodiment
  • Fig.4 shows a time sequence diagram of an exemplary embodiment
  • Fig.5 shows a system of an exemplary embodiment
  • Fig.6 shows a system of an exemplary embodiment
  • Fig.7 shows a representation of an exemplary embodiment. Detailed description
  • a schematic view of a method according to an exemplary embodiment of the invention is shown.
  • the method is used for blocking information sent via a data network to a device.
  • the information comprises a mark, the mark comprising an identification of a sending party and a content class identification.
  • the mark is checked (1) , the identification of the sending party is verified (11) and an abuse-ranking is calculated (12) .
  • an anti-abuse- button is displayed on a display of the device (21) or an anti-abuse menu item in a software running in the device is enabled (22) .
  • An abuse-report is created (2) and sent (3) to the proper authority.
  • a time sequence diagram of an exemplary embodiment is shown.
  • the device (100) performs the step of checking (1) the mark using the profile of the user of the device (100) .
  • the identification of the sending party is verified (11) through a server (300) of a certified licensee organization.
  • the device (100) creates (2) the abuse-report and sends (3) the abuse-report to the proper authority (900) .
  • fig.3 a time sequence diagram of another exemplary embodiment is shown.
  • the data network (200) performs the step of checking (1) the mark using the profile of the user of the device (100) .
  • the identification of the sending party is verified (11) through the server (300) of a certified licensee organization.
  • the data network (200) creates (2) the abuse-report and sends (3) the abuse-report to the proper authority (900) .
  • FIG.4 a time sequence diagram of another exemplary embodiment is shown.
  • the data network (200) performs the step of checking (1) the mark using the profile of the user of the device (100) .
  • the identification of the sending party is verified (11) through the server (300) of a certified licensee organization.
  • the device (100) creates (2) the abuse-report and sends (3) the abuse-report to the proper authority (900) .
  • the device (100) is linked to the data network (200) .
  • the server (300) of the certified licensee organization is also linked to the data network (200), as is the server (900) of the proper authority that receives the abuse-report. It is possible that the server (300) of the certified licensee organization is the same as the server (900) of the proper authority that receives the abuse-report.
  • the profile (101) can be stored within the device (100) .
  • the profile (201) can be stored within the data network (200) .
  • a means (1000) for checking the mark using the profile of the user of the device is linked to a means (1001) for verifying the identity of the sending party through the server (300) of the certified licensee organization.
  • the server (300) of the certified licensee organization is linked to the means (1001) for verifying.
  • the means (1000) for checking is linked to the profile (101) that is stored within the device or to the profile (201) that is stored within the data network.
  • the means (1000) for checking is linked to a means (2000) for creating the abuse-report.
  • the means (2000) for creating the abuse-report is linked to a means (1002) for calculating the abuse-ranking.
  • the means (1002) for calculating the abuse-ranking is linked to the profile (101,201) .
  • the means (2000) for creating the abuse- report is optionally linked to a means (2001) for displaying the anti-abuse button on the display of the device, or to a means (2002) for enabling the anti-abuse menu item in the software running in the device.
  • the means (2000) for creating the abuse-report is linked to a means (3000) for sending the abuse-report to the proper authority (900) .
  • Information (a) sent via a data network (200) to a device (100) comprises a mark (b) .
  • the mark (b) comprises charging information (c) .
  • the delivery of the information (a) to the device (100) can be blocked if the charging information (c) is invalid.
  • the next example explains the invention for unwanted unsolicited information sent to a mobile device connected to a mobile data network.
  • a mobile device can e.g. be a mobile phone comprising a WAP or HTML-flavored browser, which is connected to a GPRS or UMTS mobile network.
  • the invention is not limited to such devices. It is also possible to use the invention when unwanted unsolicited information is sent to a computer (pc, notebook, tablet pc, etcetera) connected to the Internet via a fixed line (pstn, isdn, adsl, leased line, Ian, etcetera) or via a wireless line (gsm, gprs, umts, wlan, etcetera) .
  • the invention is applicable for blocking unwanted unsolicited information sent to any other device capable of sending and receiving information via a data network.
  • Unwanted unsolicited information exists in a variety of forms. Examples are sms messages, mms messages, push messages and email messages. In fact any unsolicited information that can be sent to a device connected to a data network is potentially unwanted and can be blocked by the invention.
  • the content of the information can be advertisement, games, e-mail, SMS, MMS, films, pictures, text, programs, and etcetera.
  • the invention can be explained as follows.
  • Information is only allowed to be displayed on a mobile phone when marked.
  • the mark identifies the identity of the sending party and the type of information.
  • This mark is checked against the profile of the user.
  • This profile can comprise characteristics of the user (e.g. adult or minor), applicable law (e.g. law of the United Stated of America disallowing spam or Dutch law with other specific rules) , and/or personal settings like the current mood of the user (e.g. tired so not wanting to receive advertisement, hungry so particularly interested in information about food, in love so interested in romantic information, etcetera) .
  • the profile can be stored within the mobile phone or within the network (e.g. in a server of the Internet Service Provider, a portal, an access gateway, email server, etcetera) . If the profile is stored within the mobile phone, then the information can be checked within the phone prior to displaying the information. If the profile is stored within the network the information can be checked before sending the information to the mobile phone.
  • the receiving device can have an anti-abuse button, which will - after pressing the button - trigger the sending of an abuse-report to the proper authority based on the received information. It is also possible that the user selects a send-abuse-report option in a menu residing in the software of the device and in this way triggering the sending of an abuse-report. Yet another possibility is that the receiving device automatically sends an abuse-report. In case of checking within the network an abuse-report can be generated automatically there.
  • the identity of the sending party can be obtained from the received information or through a certified licensee organization.
  • the received information includes the MSISDN or IMSI identity of the sending party.
  • Information received via the HTTP protocol includes in the HTTP header the IP address of the sending party.
  • the MAC address indicating the network interface card can be used in the HTTP header as well.
  • E-mail messages often include the email-address of the sending party. If the email-address of the sending party is spoofed, then the IP address of the sending party can be included in the information by using e.g. the described "caller ID for e-mail" solution.
  • a certified licensee organization can be used to provide licenses to content providers. Especially in mobile environments where content providers offer content through portals, content providers can be allowed to send content only when a license is acquired from the licensee organization. It is also possible though that content providers on the Internet are required to acquire a license. Information received from a licensed content provider should include a license identifier from which the identity of the sending party can be obtained at the licensee organization.
  • a universal set of content classes is defined. These content classes contain an indication of the nature of the information, comparable with methodologies used on television where symbols can indicate the nature of the television program (e.g. violence, fear, sex, discrimination, drug and/or alcohol abuse or coarse language) .
  • the content classes are used to indicate the type of information.
  • the content classes can e.g. be binary coded using 3 bit encoding. This gives the possibility to have eight content classes defined. If more content classes are required then n bit encoding can be used, where n is any integer value fulfilling the requirements. It is also possible -to indicate the classes by using natural wordings. E.g. to indicate that information contains violent language the literal indication "violence" can be used in the mark. Any other representation of content classes can be used, as long as the content class can be derived from the mark.
  • the mark When the mark is checked against the profile of the user, different rules can apply. If e.g. the profile indicates that the user is a minor and the mark identifies the type of information as being of nature "sex" then the information can be blocked. If the law of a country forbids sending information of a specific nature, e.g. "sex", then based on the profile indicating the applicable law the information can be blocked for all users.
  • the abuse-report comprises an abuse-ranking.
  • This abuse-ranking indicates the significance of the abuse and is calculated from the type of content and the profile of the user.
  • the ranking can e.g. be on a scale of 5 where "1" denotes a low significance i.e. not so abusive and "5" denotes a high significance i.e. very abusive.
  • Other scales or ranking indications are also possible, as long the significance of the abuse can be derived.
  • the significance of the abuse will be high when the user is a minor and the mark identifies the type of content as being of nature "sex".
  • the profile of the user allows receiving content of nature "sex” but the user still uses the abuse- button, then the significance of the abuse will be lower for the sending party was allowed to send the information.
  • abuse-ranking enables the proper authority to takes measures more precisely. Especially in case the sending party has a license obtained from a certified licensee organization, the abuse-report containing an abuse-ranking can be compared with the license to verify whether or not there really is a case of abuse.
  • the invention is also applicable to personal generated information, e.g. messages send from a computer or mobile phone to another computer or mobile phone. Each mobile device can generate a mark comprising the identity of the sending party and an indication of the type of information. Prior to sending the information the user can be asked to choose from a predefined list of content classes the applicable content class for the information. It is possible that the user only gets a limited choice, e.g.
  • the invention can be used to exchange charging information and pay for email delivery.
  • the mark can act as a stamp like a postal stamp. This special marker is a form a prepaid message. If the charging information is invalid, e.g. it indicates that no money or not enough money is paid to deliver the email, the delivery of the email can be blocked.
  • the mark used as a stamp can contain information like origin network, payment handler, etc. The usage of the mark to exchange charging information allows solutions like stamp purchasing for sending messaged to another network e.g. a mobile network. Another application could be the possibility for a sender on network "A" to include a return envelope stamp to allow receiver on network "B" to reply without charge.
  • the invention also works when Digital Rights Management (DRM) is used.
  • DRM Digital Rights Management
  • the content is encoded and hard to screen with conventional methods, but the invention can be applied without loss of effectiveness.

Abstract

A method and a system for blocking information sent via a data network to a device. The information can be blocked because no delivery fee is paid. It can also be unwanted unsolicited information, also known as spam. The information comprises a mark, which comprises an identification of payment and/or a sending party and/or a content class identification. The invention makes it possible to check the mark using a profile of a user of the device, to create an abuse-report and to send the abuse-report

Description

Title
A method and system for blocking unwanted unsolicited information
Field of the invention
The invention relates to a method and a system for blocking information sent via a data network to a device.
Background of the invention There is an increasing amount of digital information being send unsolicited to computers connected to the Internet or to mobile handsets connected to mobile data networks. In the future unsolicited information can be send to even more types of devices connected to whatever data network. The digital information often consists of advertisement, but is also misused for spreading viruses, or other malicious content. Unwanted unsolicited information is often referred to as "spam".
Blocking of spam is becoming a high priority. Currently most blocking is achieved by screening the information for specific words, blacklisting (disallowing) of sending parties, whitelisting (allowing) of sending parties and/or virus filtering. In practice a lot of unwanted unsolicited information still gets delivered though.
A method and system for filtering spam is described in US2003/0009698 "spam avenger". This method and system is applicable to email and is based on whitelisting / blacklisting of sending parties. Whenever a message is first received from an unapproved sender, a confirmation request email is sent to the sender's email address requesting the sender to confirm its existence and identity. Spammers typically don't receive, and can't handle reply emails. Therefore, until the unapproved sender replies to the confirmation request email, electronic messages received by the unapproved sender are treated as spam.
A system and method facilitating detection of unsolicited e-mail message (s) with challenges is described in EP1376427 "spam detector with challenges". This system and method includes an e-mail component and a challenge component. The system can receive e-mail message (s) and associated probabilities that the e-mail message (s) are spam. Based, at least part, upon the associated probability, the system can send a challenge to a sender of an e-mail message. The challenge can be embedded code, computational challenge, human challenge and/or micro payment request. Based, at least pin part, upon a response to the challenge (or lack of response) , the challenge component can modify the associated probability and/or delete the e-mail message.
A method for enforceably reducing spam is described in WO03/105008 "enforceable spam identification and reduction system, and method thereof" . This method checks an email message for a specific mark and if the specific mark is present, tags this email message as non-spam. The tagged email is displayed to a user of a local computer. The specific mark may be displayed with the tagged email. The mark is part of an enforceable anti-spam email header field comprising a field name and a field body. The field body comprises the mark, which is used for identification or indication of ownership. The mark is legally reserved for the exclusive use of the owner of the mark. If the user identifies the tagged email as spam, the tagged email is sent to a remote enforcement computer.
A method and system for selecting and removing spam from a stream of mail received by mail service or mail client is described in WO01/53965 "e-mail spam filter". Here spam is attracted by creating a series of e-mail addresses held by a spam attractor site connected to the internet SMTP mail network, that are used to engage in high risk activities known to attract spam. All spam received would be funneled and subject to the same processing, regardless to which of the e-mail addresses it was actually sent to. All mails received at these e-mail addresses must be spam, as the addresses are not provided to any other mail source. The mail is received, and the fingerprint is calculated for each message. The central fingerprint database contains a relational table and one row for each unique item of spam detected. A spam filter is associated with each mail gateway and when an e-mail is received, the mail gateway calculates a mail signature using the fingerprint algorithm, the signature is looked up in the local database, and if found, the mail is discarded.
An Internet member's license system is known from an article of Nova Spivack, which can be found on the website "http://novaspivack.typepad.com" on page
"/nova_spivacks_weblog/2004/01/a_new_solution_.html" . The IML system is described as follows. A central IML registry that runs as a non-profit would issue IML certificates. Getting an IML is similar to getting a driver's license from the Registry of Motor Vehicles: Email service providers may apply for these certificates and once they get them, they may then issue sub-certificates off of their identities to their members. Email service providers (such as ISPs, enterprises, etc.) automatically append IMLs onto the end of every outgoing message they route (as ASCII text or a MIME attachment) that authenticate the identity of the service provider as well as the sender of the message.
Alternatively individuals can apply for IMLs directly from the IML Registry and/or they can just add their IMLs into their sig files if their email providers are not IML- compliant yet. IML1S can also be put into the metadata for content that individuals and services post onto the Net in order to authenticate that content as "not spam" . Every IML starts with a certain number of "points" on it, just like a driver's license. Individual email client applications (whether Webmail or desktop mail clients) can then simply screen each incoming message for a valid IML certificate.
Messages with valid IML1S are accepted and the sender's may also be automatically whitelisted; incoming messages without valid IML's can be blocked or go into a "suspect e- mail folder" and can get a bounced message informing the sender that their IML was missing or invalid. If you get a message from someone that you feel is "spam" you can simply mail it to the IML registry to report abuse. If a certain number of "spam" citations are filed against any IML holder per unit of time, the holder gets a "traffic violation citation", in other words a ticket. The "cost" of the ticket depends on how far over the "spam limit" they are. The ticket deducts points from their IML certificate, based on the cost, as well as from the IML certificate for their ISP. Lost points can be regained with good behavior (every IML earns back 1 point per month) , or from community service (to the IML Registry perhaps) , or by paying a fine to the IML Registry. The IML Registry can dynamically re¬ issue new IMLs to ISPs and their users based on their current status. So for example, if a user gets a ticket they get a new IML that replaces their previous one and which encodes the new number of points remaining on their license. Because each IML holder's current license points can be encoded in their IML (cryptographically) , spam filters and recipient apps can not only check for valid IMLs on incoming mail, but if they wish they can even prioritize or screen messages by the number of points on the IMLs of the senders and their ISPs. Those who have very few points may be considered to be "on probation" or
"likely to be spam". If any party loses all their points they may still send email, but their IML certificate will reflect that they have no points on their license. Thus IML-compliant spam filters can simply screen them out or treat them as suspect senders. The reputation of email providers is linked to the reputations of their members, and vice-versa. This helps to reinforce good behavior at both levels of the community (ISPs and their users, mutually; a nice cybernetic feedback loop) . Thus if an email provider allows misuse they could lose points on their provider-IML, which in turn is then inherited down to the member-IMLs of all their members (because their members' IMLs are sub-certificates of their certificate) . So as an email sender, I will want to use an ISP that has a sterling IML, because I don't want my own reputation tarnished. Similarly as an ISP I will want to be careful about not routing spam because if I route spam for my members then it harms my reputation, which means messages from my service may not be accepted by others, and that may cause my members to go elsewhere, therefore as an ISP my policy may be that I only allow members with IMLs that have a certain number of points: if one of my member's IML goes below a certain number of points I may kick them out of my service. The central IML Registry can charge a modest fee to applicants to get an IML and renew it every year, and this can support the cost of running the Registry as a non¬ profit. Furthermore, the IML Registry can open up an API that lets other applications query it by inputting an IML certificate to it in order to get the current status of that license (e.g. whether or not it is valid and the number of points remaining on it) . Ultimately this entire infrastructure could be decentralized such that every ISP could run their own sub-Registry. Thus the central Registry would issue and maintain IMLs for ISPs, and then ISPs would issue and maintain the IMLs for their members. This is similar to the global DNS infrastructure.
A method for identifying the original sender of an email message is known from "Caller ID for E-Mail" by Microsoft. The Caller ID for E-Mail method aims to eliminate domain spoofing and increase the effectiveness of spam filters by verifying what domain a message came from — much like how caller ID for telephones shows the phone number of the person calling. The method involves three steps to authenticate a sender: (1) e-mail senders, large or small, publish the Internet protocol (IP) addresses of their outbound e-mail servers in the Domain Name System (DNS) ; (2) recipient e-mail systems examine each message to determine the purported responsible domain (i.e., the Internet domain that purports to have sent the message) ; (3) recipient e-mail systems query the DNS for the list of outbound e-mail server IP addresses of the purported responsible domain. They then check whether the IP address from which the message was received is on that list. If no match is found, the message has most likely been spoofed and will be rejected. All solutions mentioned above have in common that they are used for blocking unwanted unsolicited email messages only. Furthermore all solutions use the criteria that an email message is either spam or not spam, a mere binary rating.
A multiple rating method is known from "Kijkwijzer" (http://www.kijkwijzer.nl), which is used in The Netherlands for rating television programs, cinema films and video. With Kijkwijzer, parents and educators can see at a single glance whether a television program, cinema film or video may be harmful to children. Kijkwijzer gives an age recommendation - All Ages, Age 6, Age 12 and Age 16 - and pictograms indicating which aspects of the content have led to the production being not recommended for particular age groups. The aspects distinguished are violence, fear, sex, discrimination, drug and/or alcohol abuse, and coarse language. The Kijkwijzer pictograms appear in advertisements, newspaper program listings, listings magazines, cinema listings and the packaging of video cassettes and DVDs. They also appear on screen at the beginning of a TV program, video or movie. Productions are rated by having a questionnaire filled in after which coders (people) determine, based on the filled in questionnaire, which classification a production should be given.
The usage of a multiple rating method as described above is limited to information that can be analyzed by people prior to showing.
Problem definition
The prior art fails to provide a solution for blocking and reporting unwanted unsolicited information of any kind using multiple rating. Furthermore the prior art fails to provide a solution for blocking information for which no delivery fee is paid.
Aim of the invention
It is the aim of the invention to provide a method for blocking information for which no delivery fee is paid. Furthermore it is an aim of the invention to provide a method and a system for blocking unwanted unsolicited information of any kind using multiple rating. Furthermore it is an aim of the invention to be able to report that a party sends unwanted unsolicited information.
Summary of the invention The present invention provides a solution for blocking information for which no delivery fee is paid. Furthermore the present invention provides a solution for blocking and reporting unwanted unsolicited information of any kind using multiple rating.
According to an aspect of the invention a method for blocking information sent via a data network to a device is provided. The information comprises a mark. The mark can comprise charging information, e.g. in the form of a binary word, or any other digital identification, indicating that a delivery fee is paid or indicating an amount of money that is paid for delivery of the information. The charging information can include an identifier of an origin network and/or an identifier of a payment handler. The mark can also comprise an identification of a sending party and a content class identification. The method can comprise the steps of checking the charging information and blocking the delivery of the information to the device if the charging information is invalid. The method can further comprise the steps of checking the mark using a profile of a user of the device, creating an abuse-report and sending the abuse- report. The method can further comprise the step of verifying the identification of the sending party through a server of a certified licensee organization. This advantageously makes it possible to only allow licensed parties to send information.
The profile can comprise characteristics of the user of the device. This advantageously makes it possible to block the information if from the characteristics of the user it is derived that the mark is not allowed. The profile can comprise information about an applicable law. This advantageously makes it possible to block the information if from the applicable law it is derived that the mark is not allowed. The profile can comprise personal settings. This advantageously makes it possible to block the information if from the personal settings, which are set by the user of the device, it is derived that the mark is not allowed. The profile can be stored within the device or within the data network. The checking, creating and sending can be performed within the device. This makes it possible for the device to be in control. The steps of checking, creating and sending can be performed within the data network. This makes it possible for the data network to be in control. The step of checking can be performed within the data network and the steps of creating and sending can performed within the device. This makes it possible for the data network to be in control of the checking and the device to be in control of the abuse-report handling.
The method can comprise the step of displaying an anti-abuse-button on a display of the device or enabling an anti-abuse menu item in a software running in the device. This advantageously makes it possible for the user of the device to quickly have an abuse-report created.
The abuse-report can comprise an abuse-ranking and the method can comprise the step of calculating the abuse- ranking using the content class identification and the profile of the user. This advantageously enables to rank the level of abuse.
According to another aspect of the invention a system for blocking information sent via a data network to a device is provided. The information comprises a mark. The mark can comprise charging information, e.g. in the form of a binary word, or any other digital identification, indicating that a delivery fee is paid or indicating an amount of money that is paid for delivery of the information. The charging information can include an identifier of an origin network and/or an identifier of a payment handler. The mark can also comprise an identification of a sending party and a content class identification. The system can comprise means for checking the mark using a profile of a user of the device, means for creating an abuse-report and means for sending the abuse-report. The system can further comprise means for verifying the identification of the sending party through a server of a certified licensee organization. This advantageously makes it possible to only allow licensed parties to send information.
The profile can comprise characteristics of the user of the device. This advantageously makes it possible to only allow licensed parties to send information. The profile can comprise information about an applicable law. This advantageously makes it possible to block the information if from the applicable law it is derived that the mark is not allowed. The profile can comprise personal settings. This advantageously makes it possible to block the information if from the personal settings, which are set by the user of the device, it is derived that the mark is not allowed. The profile can be stored within the device or within the data network.
The system can comprise means for displaying an anti- abuse-button on a display of the device or means for enabling an anti-abuse menu item in a software running in the device. This advantageously makes it possible for the user of the device to quickly have an abuse-report created. The abuse-report can comprise an abuse-ranking and the system can further comprise means for calculating the abuse-ranking using the content class identification and the profile of the user. This advantageously enables to rank the level of abuse.
Brief description of the drawings
The invention will be explained in greater detail by reference to exemplary embodiments shown in the drawings, in which:
Fig.l shows a schematic view of the method of an exemplary embodiment;
Fig.2 shows a time sequence diagram of an exemplary embodiment; Fig.3 shows a time sequence diagram of an exemplary embodiment;
Fig.4 shows a time sequence diagram of an exemplary embodiment;
Fig.5 shows a system of an exemplary embodiment; Fig.6 shows a system of an exemplary embodiment;
Fig.7 shows a representation of an exemplary embodiment. Detailed description
For the purpose of teaching of the invention, preferred embodiments of the method and system of the invention are described in the sequel. It will be apparent to the person skilled in the art that other alternative and equivalent embodiments of the invention can be conceived and reduced to practice without departing from the true spirit of the invention, the scope of the invention being only limited by the claims as finally granted.
In fig.l a schematic view of a method according to an exemplary embodiment of the invention is shown. The method is used for blocking information sent via a data network to a device. The information comprises a mark, the mark comprising an identification of a sending party and a content class identification. The mark is checked (1) , the identification of the sending party is verified (11) and an abuse-ranking is calculated (12) . Optionally an anti-abuse- button is displayed on a display of the device (21) or an anti-abuse menu item in a software running in the device is enabled (22) . An abuse-report is created (2) and sent (3) to the proper authority.
In fig.2 a time sequence diagram of an exemplary embodiment is shown. The device (100) performs the step of checking (1) the mark using the profile of the user of the device (100) . Next the identification of the sending party is verified (11) through a server (300) of a certified licensee organization. The device (100) creates (2) the abuse-report and sends (3) the abuse-report to the proper authority (900) . In fig.3 a time sequence diagram of another exemplary embodiment is shown. The data network (200) performs the step of checking (1) the mark using the profile of the user of the device (100) . Next the identification of the sending party is verified (11) through the server (300) of a certified licensee organization. The data network (200) creates (2) the abuse-report and sends (3) the abuse-report to the proper authority (900) .
In fig.4 a time sequence diagram of another exemplary embodiment is shown. The data network (200) performs the step of checking (1) the mark using the profile of the user of the device (100) . Next the identification of the sending party is verified (11) through the server (300) of a certified licensee organization. The device (100) creates (2) the abuse-report and sends (3) the abuse-report to the proper authority (900) .
In fig.5 a system of an exemplary embodiment is shown. The device (100) is linked to the data network (200) . The server (300) of the certified licensee organization is also linked to the data network (200), as is the server (900) of the proper authority that receives the abuse-report. It is possible that the server (300) of the certified licensee organization is the same as the server (900) of the proper authority that receives the abuse-report. The profile (101) can be stored within the device (100) . Alternatively the profile (201) can be stored within the data network (200) .
In fig.6 a system of another exemplary embodiment is shown. A means (1000) for checking the mark using the profile of the user of the device is linked to a means (1001) for verifying the identity of the sending party through the server (300) of the certified licensee organization. The server (300) of the certified licensee organization is linked to the means (1001) for verifying. The means (1000) for checking is linked to the profile (101) that is stored within the device or to the profile (201) that is stored within the data network. The means (1000) for checking is linked to a means (2000) for creating the abuse-report. The means (2000) for creating the abuse-report is linked to a means (1002) for calculating the abuse-ranking. The means (1002) for calculating the abuse-ranking is linked to the profile (101,201) . The means (2000) for creating the abuse- report is optionally linked to a means (2001) for displaying the anti-abuse button on the display of the device, or to a means (2002) for enabling the anti-abuse menu item in the software running in the device. The means (2000) for creating the abuse-report is linked to a means (3000) for sending the abuse-report to the proper authority (900) .
In fig.7 a representation of another exemplary embodiment is shown. Information (a) sent via a data network (200) to a device (100) comprises a mark (b) . The mark (b) comprises charging information (c) . By checking the charging information (c) , the delivery of the information (a) to the device (100) can be blocked if the charging information (c) is invalid.
The next example explains the invention for unwanted unsolicited information sent to a mobile device connected to a mobile data network. Such a mobile device can e.g. be a mobile phone comprising a WAP or HTML-flavored browser, which is connected to a GPRS or UMTS mobile network. The invention is not limited to such devices. It is also possible to use the invention when unwanted unsolicited information is sent to a computer (pc, notebook, tablet pc, etcetera) connected to the Internet via a fixed line (pstn, isdn, adsl, leased line, Ian, etcetera) or via a wireless line (gsm, gprs, umts, wlan, etcetera) . Furthermore the invention is applicable for blocking unwanted unsolicited information sent to any other device capable of sending and receiving information via a data network.
Unwanted unsolicited information exists in a variety of forms. Examples are sms messages, mms messages, push messages and email messages. In fact any unsolicited information that can be sent to a device connected to a data network is potentially unwanted and can be blocked by the invention. The content of the information can be advertisement, games, e-mail, SMS, MMS, films, pictures, text, programs, and etcetera.
The invention can be explained as follows. Information is only allowed to be displayed on a mobile phone when marked. The mark identifies the identity of the sending party and the type of information. This mark is checked against the profile of the user. This profile can comprise characteristics of the user (e.g. adult or minor), applicable law (e.g. law of the United Stated of America disallowing spam or Dutch law with other specific rules) , and/or personal settings like the current mood of the user (e.g. tired so not wanting to receive advertisement, hungry so particularly interested in information about food, in love so interested in romantic information, etcetera) . The profile can be stored within the mobile phone or within the network (e.g. in a server of the Internet Service Provider, a portal, an access gateway, email server, etcetera) . If the profile is stored within the mobile phone, then the information can be checked within the phone prior to displaying the information. If the profile is stored within the network the information can be checked before sending the information to the mobile phone.
When information is wrongly marked (possibly abusively) or illegally send, it can be made easy for the user to report this to the proper authority that can take legal actions against the sending party. E.g. the receiving device can have an anti-abuse button, which will - after pressing the button - trigger the sending of an abuse-report to the proper authority based on the received information. It is also possible that the user selects a send-abuse-report option in a menu residing in the software of the device and in this way triggering the sending of an abuse-report. Yet another possibility is that the receiving device automatically sends an abuse-report. In case of checking within the network an abuse-report can be generated automatically there.
The identity of the sending party can be obtained from the received information or through a certified licensee organization. In SMS messages and MMS messages e.g. the received information includes the MSISDN or IMSI identity of the sending party. Information received via the HTTP protocol includes in the HTTP header the IP address of the sending party. The MAC address indicating the network interface card can be used in the HTTP header as well. E-mail messages often include the email-address of the sending party. If the email-address of the sending party is spoofed, then the IP address of the sending party can be included in the information by using e.g. the described "caller ID for e-mail" solution.
A certified licensee organization can be used to provide licenses to content providers. Especially in mobile environments where content providers offer content through portals, content providers can be allowed to send content only when a license is acquired from the licensee organization. It is also possible though that content providers on the Internet are required to acquire a license. Information received from a licensed content provider should include a license identifier from which the identity of the sending party can be obtained at the licensee organization.
It is possible that the identity of the sending party is encrypted. Where the mark is checked it should be possible to decrypt the identity.
A universal set of content classes is defined. These content classes contain an indication of the nature of the information, comparable with methodologies used on television where symbols can indicate the nature of the television program (e.g. violence, fear, sex, discrimination, drug and/or alcohol abuse or coarse language) . The content classes are used to indicate the type of information. The content classes can e.g. be binary coded using 3 bit encoding. This gives the possibility to have eight content classes defined. If more content classes are required then n bit encoding can be used, where n is any integer value fulfilling the requirements. It is also possible -to indicate the classes by using natural wordings. E.g. to indicate that information contains violent language the literal indication "violence" can be used in the mark. Any other representation of content classes can be used, as long as the content class can be derived from the mark.
When the mark is checked against the profile of the user, different rules can apply. If e.g. the profile indicates that the user is a minor and the mark identifies the type of information as being of nature "sex" then the information can be blocked. If the law of a country forbids sending information of a specific nature, e.g. "sex", then based on the profile indicating the applicable law the information can be blocked for all users.
Preferably the abuse-report comprises an abuse-ranking. This abuse-ranking indicates the significance of the abuse and is calculated from the type of content and the profile of the user. The ranking can e.g. be on a scale of 5 where "1" denotes a low significance i.e. not so abusive and "5" denotes a high significance i.e. very abusive. Other scales or ranking indications are also possible, as long the significance of the abuse can be derived.
Taking the example from above, the significance of the abuse will be high when the user is a minor and the mark identifies the type of content as being of nature "sex". On the other hand, if the profile of the user allows receiving content of nature "sex" but the user still uses the abuse- button, then the significance of the abuse will be lower for the sending party was allowed to send the information.
Using abuse-ranking enables the proper authority to takes measures more precisely. Especially in case the sending party has a license obtained from a certified licensee organization, the abuse-report containing an abuse-ranking can be compared with the license to verify whether or not there really is a case of abuse. The invention is also applicable to personal generated information, e.g. messages send from a computer or mobile phone to another computer or mobile phone. Each mobile device can generate a mark comprising the identity of the sending party and an indication of the type of information. Prior to sending the information the user can be asked to choose from a predefined list of content classes the applicable content class for the information. It is possible that the user only gets a limited choice, e.g.
"offensive" or "non-offensive". The mark will be send along with the information.
The invention can be used to exchange charging information and pay for email delivery. E.g. if the sender is on a different network, the mark can act as a stamp like a postal stamp. This special marker is a form a prepaid message. If the charging information is invalid, e.g. it indicates that no money or not enough money is paid to deliver the email, the delivery of the email can be blocked. In another example the mark used as a stamp can contain information like origin network, payment handler, etc. The usage of the mark to exchange charging information allows solutions like stamp purchasing for sending messaged to another network e.g. a mobile network. Another application could be the possibility for a sender on network "A" to include a return envelope stamp to allow receiver on network "B" to reply without charge.
The invention also works when Digital Rights Management (DRM) is used. Typically with DRM the content is encoded and hard to screen with conventional methods, but the invention can be applied without loss of effectiveness.

Claims

Claims
1. Method for blocking information (a) sent via a data network (200) to a device (100), the information (a) comprising a mark (b) , the mark (b) comprising charging information (c) , the method comprising the steps of checking the charging information (c) ; blocking the delivery of the information (a) to the device (100) if the charging information (c) is invalid.
2. Method according to claim 1 in which the charging information includes an identifier of an origin network.
3. Method according to claims 1-2 in which the charging information includes an identifier of a payment handler.
4. Method according to any of the claims 1-3, the mark further comprising an identification of a sending party and a content class identification, the method further comprising the steps of checking (1) the mark using a profile (101,201) of a user of the device (100) ; creating (2) an abuse-report; sending (3) the abuse-report.
5. Method according to claim 4, the method further comprising the step of verifying (11) the identification of the sending party through a server (300) of a certified licensee organization.
6 . Method according to claims 4 -5 in which the prof i le ( 101 , 201 ) comprises characteristics of the user of the device ( 100 ) .
7. Method according to claims 4-6 in which the profile (101,201) comprises information about an applicable law.
8. Method according to claims 4-7 in which the profile (101,201) comprises pers-onal settings.
9. Method according to claims 4-8 in which the profile (101) is stored within the device (100) .
10. Method according to claims 4-9 in which the profile (201) is stored within the data network (200) .
11. Method according to claims 9-10 in which the steps of checking (1), creating (2) and sending (3) are performed within the device (100) .
12. Method according to claim 10 in which the steps of checking (1), creating (2) and sending (3) are performed within the data network (200) .
13. Method according to claim 10 in which the step of checking (1) is performed within the data network (200) and the steps of creating (2) and sending (3) are performed within the device (100) .
14. Method according to claim 11, the method further comprising the step of displaying (21) an anti-abuse-button on a display of the device (100) .
15. Method according to claim 11, the method further comprising the step of enabling (22) an anti-abuse menu item in a software running in the device (1) .
16. Method according, to claims 4-15 in which the abuse- report comprises an abu.se-ranking, the method further
' comprising the step of calculating (12) the abuse-ranking ' using the content class identification and the profile (101,201) of the user.
17. System for blocking information (a) sent via a' data network (200) to a device (100), the information (a) comprising a. mark (b) ,. the mark (b) comprising charging information (c) , the system comprising means for checking the charging information (c) ; means for blocking the delivery of the information (a) to the device (100) if the charging information (c) is invalid.
18. System according .to- claim 17 in which the charging information includes an identifier of an origin network.
19. System according to claims 17-18 in which the charging information includes an identifier of a.payment handler.
20. System according to any of the claims 17-19, the mark further comprising an identification of a sending party and a content class- identification, the system further comprising \ '• means (1000) for checking the mark using a profile (101/.201) of a user of the device (100); means -'(200O). for creating an abuse-report; means (-3000) 'for sending the abuse-report.'.
21. System, according to claim 20, the system further comprising. means (1001) for verifying ' the identification of the sending party through a server (300) of a certified licensee organization.
22. System according to claims 20-21 in which the profile (101,201) comprises characteristics of the user of the device (100) .
23. System according to claims 20-22 in which the profile (101,201) comprises information about an applicable law.
24. System according to claims 20-23 in which the profile (101,201) comprises personal settings.
25. System according to claims 20-24 in which the profile (101) is stored within the device (100) .
26. System according to claims 20-25 in which the profile (201) is stored within the data network (200) .
27. System according to claims 25-26, the system further comprising means (2001) for displaying an anti-abuse-button on a display of the device (100) .
28. System according to claims 25-26, the system further comprising means (2002) for enabling an anti-abuse menu item in a software running in the device (100) .
29. System according to-claims 20-28 in which the abuse- report comprises an abuse-ranking, the system further comprising means (1002) for calculating the abuse-ranking using the content class identification and the profile (101,201) of the user. 1/7
Figure imgf000026_0001
Fig.l 2/7
100 200 300 900
Figure imgf000027_0001
Fig.2 3/7
100 200 300 900
Figure imgf000028_0001
Fig.3 4/7
100 200 300 900
Figure imgf000029_0001
Fig.4 5/7
Figure imgf000030_0001
Fig.5 6/7
Figure imgf000031_0001
Fig.6 7/7
Figure imgf000032_0001
Fig.7
PCT/EP2005/007075 2004-06-30 2005-06-30 A method and a system for blocking unwanted unsolicited information WO2006002931A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP05763193A EP1763784A1 (en) 2004-06-30 2005-06-30 A method and a system for blocking unwanted unsolicited information

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US58422204P 2004-06-30 2004-06-30
US60/584,222 2004-06-30

Publications (1)

Publication Number Publication Date
WO2006002931A1 true WO2006002931A1 (en) 2006-01-12

Family

ID=34978612

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2005/007075 WO2006002931A1 (en) 2004-06-30 2005-06-30 A method and a system for blocking unwanted unsolicited information

Country Status (2)

Country Link
EP (1) EP1763784A1 (en)
WO (1) WO2006002931A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102006029444B3 (en) * 2006-06-21 2007-12-13 Nokia Siemens Networks Gmbh & Co.Kg Communication system operating and data e.g. text data, transmitting method, involves determining whether communication subscriber produces acceptance signal, with which subscriber accepts transmission of personal information
US9877823B2 (en) 2007-03-28 2018-01-30 Revision Optics, Inc. Corneal implant retaining devices and methods of use
US11570186B2 (en) * 2019-12-12 2023-01-31 Intel Corporation Security reporting via message tagging

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5771289A (en) * 1995-06-06 1998-06-23 Intel Corporation Method and apparatus for transmitting electronic data using attached electronic credits to pay for the transmission
DE19832433A1 (en) * 1997-08-01 1999-02-04 Mitel Corp Communication system with specifying user profile data
US5999967A (en) * 1997-08-17 1999-12-07 Sundsted; Todd Electronic mail filtering by electronic stamp
US20020120600A1 (en) * 2001-02-26 2002-08-29 Schiavone Vincent J. System and method for rule-based processing of electronic mail messages
WO2003054764A1 (en) * 2001-12-13 2003-07-03 Youn-Sook Lee System and method for preventing spam mail
US20030229672A1 (en) * 2002-06-05 2003-12-11 Kohn Daniel Mark Enforceable spam identification and reduction system, and method thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5771289A (en) * 1995-06-06 1998-06-23 Intel Corporation Method and apparatus for transmitting electronic data using attached electronic credits to pay for the transmission
DE19832433A1 (en) * 1997-08-01 1999-02-04 Mitel Corp Communication system with specifying user profile data
US5999967A (en) * 1997-08-17 1999-12-07 Sundsted; Todd Electronic mail filtering by electronic stamp
US20020120600A1 (en) * 2001-02-26 2002-08-29 Schiavone Vincent J. System and method for rule-based processing of electronic mail messages
WO2003054764A1 (en) * 2001-12-13 2003-07-03 Youn-Sook Lee System and method for preventing spam mail
US20030229672A1 (en) * 2002-06-05 2003-12-11 Kohn Daniel Mark Enforceable spam identification and reduction system, and method thereof

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
UNKNOWN: "Network Abuse and Security", 27 May 2004 (2004-05-27), pages 1 - 3, XP002346852, Retrieved from the Internet <URL:http://help.expedient.net/security/> [retrieved on 20050927] *
UNKNOWN: "Technology NEWS from WORLD", 10 February 2004 (2004-02-10), pages 1 - 22, XP002346851, Retrieved from the Internet <URL:http://technology.wm-loto.com/?m=200402&paged=6> [retrieved on 20050927] *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102006029444B3 (en) * 2006-06-21 2007-12-13 Nokia Siemens Networks Gmbh & Co.Kg Communication system operating and data e.g. text data, transmitting method, involves determining whether communication subscriber produces acceptance signal, with which subscriber accepts transmission of personal information
US9877823B2 (en) 2007-03-28 2018-01-30 Revision Optics, Inc. Corneal implant retaining devices and methods of use
US11570186B2 (en) * 2019-12-12 2023-01-31 Intel Corporation Security reporting via message tagging

Also Published As

Publication number Publication date
EP1763784A1 (en) 2007-03-21

Similar Documents

Publication Publication Date Title
US7085745B2 (en) Method and apparatus for identifying, managing, and controlling communications
US7925707B2 (en) Declassifying of suspicious messages
US20070204043A1 (en) Method, system and apparatus for rejecting unauthorized or SPAM e-mail messages.
US20040093414A1 (en) System for prevention of undesirable Internet content
US20060206713A1 (en) Associating a postmark with a message to indicate trust
US20050097321A1 (en) System and method for a subscription model trusted email database for use in antispam
WO2005086437A1 (en) A method and system for blocking unwanted unsolicited information
US20120296988A1 (en) Email spam elimination using per-contact address
US20050210272A1 (en) Method and apparatus for regulating unsolicited electronic mail
KR20050002320A (en) E-mail managing system and method thereof
RU2716736C2 (en) Method of certifying electronic message containing accepted electronic signature by communication operator
US20070043813A1 (en) Method and system for delivering electronic messages using a trusted delivery system
Gburzynski et al. Fighting the spam wars: A remailer approach with restrictive aliasing
WO2006002931A1 (en) A method and a system for blocking unwanted unsolicited information
KR100369282B1 (en) An E-mail service system with anti-spam mail using virtual E-mail addresses and method therefor
US20040249897A1 (en) Method, system and apparatus for rejecting unauthorized or SPAM e-mail messages
US20080177846A1 (en) Method for Providing E-Mail Spam Rejection Employing User Controlled and Service Provider Controlled Access Lists
Schryen Anti-spam legislation: An analysis of laws and their effectiveness
US20060234675A1 (en) Method and apparatus for authentication scheme and for network access using an electronic frank
AU2004216700B2 (en) Method and apparatus for identifying, managing, and controlling communications
Buerck et al. Ethical dimensions of spam
GB2463532A (en) Email filtering based upon security information embedded in mail or provided through web based challenge response system
JP5362916B2 (en) Message distribution system
WO2007071888A1 (en) Message authentication
AU2004276844A1 (en) Method and system for delivering electronic messages using a trusted delivery system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

DPEN Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2005763193

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

WWP Wipo information: published in national office

Ref document number: 2005763193

Country of ref document: EP