Browse Prior Art Database

An Anti-Spam Method by Virtual Tokens

IP.com Disclosure Number: IPCOM000129965D
Original Publication Date: 2005-Oct-07
Included in the Prior Art Database: 2005-Oct-07
Document File: 5 page(s) / 26K

Publishing Venue

IBM

Abstract

Disclosed is a system that realizes anti-spam e-mailing from Internet advertisers, for consumers by using virtual tokens (VTs) representing rights to send advertizing e-mails to the advertizers. The systems uses a trusted 3rd party who is responsible for issuing VTs and keeping private pseudonymous e-mail boxes to receive advertizing e-mails, putting up advertizing (bulletin) boards for consumers to choose advertizers to request e-mails, and protecting consumers' personal data from any advertizers to directly misuses the data and send e-mails.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 24% of the total text.

Page 1 of 5

An Anti-Spam Method by Virtual Tokens

Disclosed is a system that realizes anti-spam e-mailing from Internet advertisers, for consumers by using virtual tokens (VTs) representing rights to send advertizing e-mails to the advertizers. The systems uses a trusted 3rd party who is responsible for issuing VTs and keeping private pseudonymous e-mail boxes to receive advertizing e-mails, putting up advertizing (bulletin) boards for consumers to choose advertizers to request e-mails, and protecting consumers' personal data from any advertizers to directly misuses the data and send e-mails.

1. Spam e-mail problems

Almost everybody suffers from Spam-Mails.

   Once starting to get flooded, unable to find non Spams in the mail box. o

   The only way to get out of it is changing the e-mail address, which sometimes o gives us a hard work of letting other people know the new address and asking for replacing the old one.

   The problem is both for usual PC e-mailing and for mobile phone e-mailing. o
It's a social problem.

   More than 40% of all e-mailing volume is by Spams, which eats a significant o bandwidth of the IT infrastructure and the network.

   Many Spam-mails invite people to unethical or troublesome commercial sites, o sometimes to criminal activities.

   Almost all of the e-mail carriers spend millions/billions of dollars to carry o

Spam-mails.

Regulations don't always help.

   Many countries prohibit carriers to screen out by e-mail contents for the o freedom of communication. (Anti-censorship)

   Personal self-determination privacy principle o

   Very few effective tools/technologies of making evidences of crime o

   Out-of-jurisdiction problem; Everybody has got out of US and the things are o getting worse.

2. Solution Approaches in Market

Authentication of senders and domains

   Using port 587 instead of port 25, for sender authentication o

   SPF, digital signatures, etc. for domain authentication o

   Only controls impersonated mails, doesn't work for registered e-mailers. o
Mailing volume control

   Limitations on intervals or total volume for a day/month for an e-mailer o

   Prohibits sending mails to nonexistent addresses o

   A solution only for carriers o

Reputation systems

   Blacklists or whitelists o

   Too many, hard to update, just preferences o
Refusal of e-mails from specific addresses

   People ask carriers to stop e-mails from a specific sender. o

   Spammers often change addresses. o

   Once flooded with many senders, a tedious work for ordinary people o
Mail filters

   Filter e-mails by title, format, contents, etc. o

   Use a lot of knowledge systems, but not always win o

   Never solve the Spam mail volume problem. The volume will be even increased o if everybody starts using some tools, as long as 100% filtering is not achieved. News aggregation

   A pull type solution o

   Subscription to News Blog aggregators using RSS readers o

   A new way of advertising o

1

Page 2 of 5

   Never solves the problems of current SMTP system, which will last almost o forever.

3. Our Approach and its Scheme

Perso...