Method to provide an enhancement to an email server's functionality by utilizing "sticky" bbc email addresses on all subsequent responses to a given email message in a clandestine way.
Publication Date: 2010-Aug-25
The IP.com Prior Art Database
Disclosed is a method for allowing bbc-ed recipients of an email to receive all subsequent responses to the original email privately.
Method to provide an enhancement to an email server 's functionality by utilizing "sticky" bbc email addresses on all subsequent responses to a given email message in a clandestine way.
Currently, sending an email message with the bcc filed populated does not result in bcc recipients receiving all consequent responses to the original email. The method described here offers a convenience when the entire chain of email responses needs to be automatically and confidentially forwarded to selected email recipients, without other recipients receiving the responses. This feature would not apply to responses to an email message which was forwarded by any of the original recipients.
Require the email server to attach to each email, a base64 encoded block of encrypted text containing the list of "sticky" bcc recipients.
The bcc field would be encrypted and decrypted using server's certificate.
Because of the encryption block being of constant size,there would have to be a limit to the total number of characters taken up by all email addresses in the bcc field. The email server system should guarantee a known maximum number of bcc email addresses that may be provided.
Implement the bcc-tracking logic on the SMTP server.
Method 2 would not impose any limits on he number of bcc-ed email addresses. Carrying the sbcc addresses in actual email messages as described in method 1 could be still useful if various
participating vendors' servers understand how to interpret such contents. This could be an option
in case direct server to server querying of the sticky bcc addresses is not possible. It could also make the feature more easily adoptable by different email server vendors.
The method requires the email system to be able to define and execute the following logic:
Implement the bcc tracking logic on the server or within a special block (attachment) of the
email message itself - for example using XML. (See method 1 vs. method 2 above)
When any recipient responds to the email with bcc field populated with new addresses, the
new bcc email addresses are appended to the already provided list of bcc addresses and from this point on all subsequent response emails will be received by all bcc-ed recipients.
If any bcc-ed recipient of the original...