Browse Prior Art Database

PIN Secured Email and IM for Spam Elimination

IP.com Disclosure Number: IPCOM000130533D
Original Publication Date: 2005-Oct-25
Included in the Prior Art Database: 2005-Oct-25
Document File: 1 page(s) / 23K

Publishing Venue

IBM

Abstract

Blocks others from sending email or IM's to you without your authorization. Email or IM's can not be sent to an email /IM address without a necessary PIN code. The sender must have a valid PIN code that will authenticate with the receiving email/IM address.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 71% of the total text.

Page 1 of 1

PIN Secured Email and IM for Spam Elimination

1. A user chooses a PIN code (or codes) for their email/IM address.
2. The user gives out the PIN code with their email address to individuals that are acceptable correspondents (friends/family/etc)
3. The mail/IM server, stores the PIN code with the email/IM address and handles the authentication.
4. When an outside originator wants to send an individual an email/IM, they enter the user's email/IM address, followed by the PIN code.
5. The mail/IM server receives the email/IM along with PIN code and verifies that the email/IM address and PIN code are authenticated.
6. If the PIN code/email/IM address combination is invalid, the email/IM is either returned or denied/dumped.
7. If the PIN code/email/IM address combination is valid, the email/IM is processed and sent to the email/IM address.
8. With the use of multiple PIN codes/single email/IM address combinations, a user will know if someone has given out the PIN code fraudulently.
9. A single PIN could be given out to trusted family and friends, but a different PIN code could be given to merchants. If a user gives a unique PIN code to Merchant A, but Merchant B sends an email to the user with the same PIN code, the user knows one of two things, either Merchant A sold the PIN code or there was a compromise of the Mail server or other infiltration.
10. Management of PIN codes is handled on the client side, much like an address book.

Flows:

A: user1@address1.com PIN: 1234
B: user...