$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and device for removing junk e-mail messages 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/00
출원번호 US-0116691 (1998-07-15)
발명자 / 주소
  • Stephen Y. Pang
대리인 / 주소
    Townsend&Townsend&Crew LLP
인용정보 피인용 횟수 : 146  인용 특허 : 11

초록

A novel method for replying to unsolicited e-mail communication such as SPAM or the like. The method includes a variety of steps such as displaying an remove icon on a display, and receiving a selection of the remove icon from a user in response to the unsolicited e-mail communication. The method al

대표청구항

1. A method for automatically replying to and removing an unsolicited e-mail communication from a plurality of unsolicited e-mail communications comprises:displaying a graphical remove icon button on a display, the graphical remove icon button being a portion of a graphical user interface coupled to

이 특허에 인용된 특허 (11)

  1. Tanaka Noriyuki,JPX ; Takahara Keiko,JPX ; Yumoto Kazuma,JPX ; Iwami Naoko,JPX ; Hoshi Tohru,JPX ; Koyama Toshiaki,JPX ; Matsui Susumu,JPX, Communication system using electronic mail.
  2. Lee Eugene H. ; Adler Michael ; Dalton Lisa A. ; Wright David A., Directory with options for access to and display of email addresses.
  3. Frantz Robert H., E-mail system and interface for equipment monitoring and control.
  4. Sundsted Todd, Electronic mail filtering by electronic stamp.
  5. Crawford Christopher M., Internet online backup system provides remote storage for customers using IDs and passwords which were interactively est.
  6. Canale Leonard M. (Tinton Falls NJ) Kautz Henry A. (Summit NJ) Milewski Allen E. (Red Bank NJ) Selman Bart (Summit NJ), Message filtering techniques.
  7. Nielsen Jakob, Method and apparatus for managing subscriptions to distribution lists.
  8. Christie David ; Winner Jeffrey, Method and apparatus for workgroup information replication.
  9. Lee Duncan Wayne,CAX ; Ledsome Mark, Method and system for synchronizing computer mail user directories.
  10. Weidenfeller Thomas,DEX ; Schumacher Torsten,DEX, Method for managing contents of a hierarchical data model.
  11. Paul Sunil, System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing.

이 특허를 인용한 특허 (146)

  1. Dukhon, Marina; Harris, Jensen M.; Satterfield, Jesse Clay; Law, Elaine Y.; Mandic, Mirko; Guntaur, Paula, Accessing an out-space user interface for a document editor program.
  2. Kritt, Barry A.; Mazzeo, Thomas S.; Shepard, II, Rodney E., Active removal of e-mail recipient from replies and subsequent threads.
  3. Satterfield, Jesse Clay; Leukart, Richard Hank; Van Tilburg, Martijn E.; Harris, Jensen M.; Avery, William A.; Wiedemann, Bruce D., Adaptive multi-line view user interface.
  4. Hartmann, Al, Adaptive threshold based spam classification.
  5. Syiek, Bronwyn; Bhanap, Nina; Gowda, Rakesh; Guntha, Ramesh, Apparatus and method for precluding e-mail distribution.
  6. Cooley,Shaun, Automated disablement of disposable e-mail addresses based on user actions.
  7. Anderson, W. Kyle; Bonhaus, Daryl, Automated identification and clean-up of malicious computer code.
  8. Affronti, Michael; Brauninger, Andrew; McCann, Robert Emmett; Edelen, James; Pereira, Jorge, Automatic conversation techniques.
  9. Cooley, Shaun, Automatic generation of disposable e-mail addresses.
  10. Harris, Scott C., Automatic mail rejection feature.
  11. Satish, Sourabh, Automatic spim detection.
  12. Kennedy, Mark; Renert, Charles, Blocking replication of e-mail worms.
  13. Chasin, C. Scott, Bounce management in a trusted communication network.
  14. Nachenberg, Carey; McCorkendale, Bruce, Circumstantial blocking of incoming network traffic containing code.
  15. Rajan, Vadakkedathu Thomas; Crawford, Jason L.; Wegman, Mark N., Classification of electronic mail into multiple directories based upon their spam-like properties.
  16. Dean, Erin Elizabeth; Harris, Jensen M.; Butcher, Aaron Michael; Satterfield, Jesse Clay, Command user interface for displaying multiple sections of software functionality controls.
  17. Dean, Erin Elizabeth; Harris, Jensen M.; Butcher, Aaron Michael; Satterfield, Jesse Clay, Command user interface for displaying multiple sections of software functionality controls.
  18. Harris, Jensen M.; Butcher, Aaron M.; Morton, David A.; Satterfield, Jesse Clay; Denney, Justin, Command user interface for displaying selectable software functionality controls.
  19. Dukhon, Marina; Gordner, Jonathan Ian; Satterfield, Jesse Clay; Singh, Navjot; Trevino, Maria Fernandez; Alberts, Amy E.; Guntaur, Paula, Communication between a document editor in-space user interface and a document editor out-space user interface.
  20. Stanciu, Constantin; Halstead, Patrick H.; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  21. Stanciu, Constantin; Halstead, Patrick; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  22. Stanciu, Constantin; Halstead, Patrick; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  23. Szor,Peter, Countering infections to communications modules.
  24. Szor,Peter; Nachenberg,Carey, Countering malicious code infections to computer files that have been infected more than once.
  25. Satish, Sourabh, Countering spam through address comparison.
  26. Bell, Joshua S.; Roberts, Scott M.; Jin, Jun; Teutsch, Brian C.; Mollicone, Laurent, Designer-created aspect for an electronic form template.
  27. Fortini, Christian; Paoli, Jean D.; Mollicone, Laurent; Mohan, Bulusu Krishna; Catorcini, Alessandro, Designing electronic forms.
  28. Sallam,Ahmed, Detecting computer worms as they arrive at local computers through open network shares.
  29. Sobel, William E; McCorkendale, Bruce, Detecting spam e-mail with backup e-mail server traps.
  30. Hodgson, Garren G., Detection and prevention of e-mail malware attacks.
  31. Wilhelm, Jeffrey; Nachenberg, Carey, Detection of e-mail threat acceleration.
  32. Sobel,William, Detection of malicious computer code.
  33. O'Connor, Brian G.; Deobhakta, Kalpita S.; Ifrim, Silviu, Digital signatures for network forms.
  34. Szor,Peter, Dynamic detection of computer worms.
  35. Millard, John, Efficient file scanning using input-output hints.
  36. Kissel,Timo S., Efficient scanning of stream based data.
  37. Miyazawa,Yoshinori, Electric mail system.
  38. Larcheveque, Jean-Marie H.; Narendran, Arungundram; Sikchi, Prakash; Levenkov, Alexei; Ardeleanu, Adriana; Shur, Andrey; Catorcini, Alessandro; Selim, Nora S.; Bath, Kamaljit S., Electronic form user interfaces.
  39. Miyazawa, Yoshinori, Electronic mail system.
  40. Rivers-Moore, Jonathan E.; Moldovanu, Petru M.; Singh, Balbir, Enabling electronic documents for limited-capability computing devices.
  41. Rivers-Moore, Jonathan E.; Moldovanu, Petru M; Singh, Balbir, Enabling electronic documents for limited-capability computing devices.
  42. Satish, Sourabh; Hernacki, Brian, Endpoint management using trust rating data.
  43. Sobel,William E; Vogel,Greg; McCorkendale,Bruce, Enforcement of compliance with network security policies.
  44. Stott, Nathaniel W.; Kelkar, Amol S; O'Connor, Brian G.; Rosenberg, Lee B; Catorcini, Alessandro; Narendran, Arungundram C.; Sikchi, Prakash, Executing applications at appropriate trust levels.
  45. Hartwell, Aaron; Pell, Mike, Expanded search and find user interface.
  46. Hartwell, Aaron; Pell, Mike, Expanded search and find user interface.
  47. Reardon, David C, Financial transaction system with integrated electronic messaging, control of marketing data, and user defined charges for receiving messages.
  48. Reardon, David C., Financial transaction system with integrated electronic messaging, control of marketing data, and user defined charges for receiving messages.
  49. Reardon, David C., Financial transaction system with integrated electronic messaging, control of marketing data, and user defined charges for receiving messages.
  50. Radtke, Roland; Satterfield, Jesse Clay; Harris, Jensen M.; Peters, Mark A.; Menon, Deepak; Ligameri, Mark R., Floating command object.
  51. Lin, Wei, Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers.
  52. Lin,Wei, Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers.
  53. Chi,Darren, Generic detection and elimination of marco viruses.
  54. Spiegel,Mark; McCorkendale,Bruce; Sobel,William, Heuristic detection and termination of fast spreading network worm attacks.
  55. Nachenberg,Carey, Heuristic detection of computer viruses.
  56. Szor,Peter, Heuristic detection of malicious computer code by page tracking.
  57. Zhao, Jason Xiaobo; Guinn, Julie Ann; Hill, Ryan Charles; Pearson, Mark, Hierarchically-organized control galleries.
  58. Zhao, Jason Xiaobo; Guinn, Julie Ann; Hill, Ryan Charles; Pearson, Mark, Hierarchically-organized control galleries.
  59. Kitakado, Jun; Kawakami, Masamichi; Sawai, Tetsuji, Image transmission apparatus.
  60. Paoli, Jean D.; Mollicone, Laurent; Friend, Ned B.; Kotler, Matthew J.; Lawrence, Thomas R.; Lai, Shuk-Yan; Hendel, Sharma K.; Whitmarsh, Jason, Incrementally designing electronic forms and hierarchical schemas.
  61. Hasegawa,Masakazu, Junk mail rejection system.
  62. Stevens, Gilman R., Location based access to financial information systems and methods.
  63. Stevens, Gilman R., Location based access to financial information systems and methods.
  64. Stevens, Gilman R., Location based authorization of financial card transactions systems and methods.
  65. Stevens, Gilman R., Location based authorization of financial card transactions systems and methods.
  66. Stevens, Gilman R., Location based rules architecture systems and methods.
  67. Stevens,Gilman R., Location information for avoiding unwanted communications systems and methods.
  68. Mikitani, Hiroshi; Honjo, Shinnosuke; Hatanou, Tomomi, Lottery system utilizing electronic mail.
  69. Khalsa, Gurujiwan, Malicious e-mail attack inversion filter.
  70. Chasin, C. Scott, Marking electronic messages to indicate human origination.
  71. Chasin, C. Scott, Marking electronic messages to indicate human origination.
  72. Haverkos, Todd David, Method and apparatus for scoring unsolicited e-mail.
  73. Haverkos, Todd David, Method and apparatus for scoring unsolicited e-mail.
  74. Jagger,Luke David; Rothwell,Anton Christian; Dennis,William R., Method and system for identifying unsolicited mail utilizing checksums.
  75. Fiedotin, Richard Alan; Tangney, Jeffrey Alan; Lee, Thomas Ho, Method and system for providing current industry specific data to physicians.
  76. Fiedotin,Richard Alan; Tangney,Jeffrey Alan; Lee,Thomas Ho, Method and system for providing current industry specific data to physicians.
  77. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Licata, John A.; Sanchez, Lawrence M., Methods and systems for delivering software via a network.
  78. Sikchi, Prakash; Aggarwal, Ranjan; O'Connor, Brian G.; Airapetyan, David, Methods and systems for server side form processing.
  79. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Licata, John A.; Sanchez, Lawrence M., Methods, systems, architectures and data structures for delivering software via a network.
  80. Garg, Anupam; Patterson, Eric W., Modifying and formatting a chart using pictorially provided chart elements.
  81. Lin,Feng Hui, Multi-stage email interception method.
  82. Taboada, Roberto C.; Fernandes, Bertille N.; Jones, Brian M.; Yap, Joe K., Navigating messages within a thread.
  83. Fotta, Keith A.; Boudrieau, Richard P.; Ziemba, Jr., Robert E.; D'Amours, Norman M., Network calling privacy with recording.
  84. Fotta, Keith A.; Boudrieau, Richard P.; Ziemba, Jr., Robert E.; D'Amours, Norman M., Network calling privacy with recording.
  85. Murray, Michael C.; Erickson, Paul R.; Fisher, Oliver G.; Raman, Suryanarayanan V., Network-based software extensions.
  86. Millard,John; Spiegel,Mark, Opening computer files quickly and safely over a network.
  87. Nachenberg, Carey; Weinstein, Alex, Pattern matching using embedded functions.
  88. McCorkendale, Bruce; Sobel, William E., Presentation of network source and executable characteristics.
  89. Szor,Peter, Preventing e-mail propagation of malicious computer code.
  90. Sobel, William E.; Kennedy, Mark, Preventing unauthorized loading of late binding code into a process.
  91. Castelli, Eric L., Privacy control system for electronic communication.
  92. Castelli, Eric L., Privacy control system for electronic communication.
  93. Kissel,Timo S., Proactive protection against e-mail worms and spam.
  94. Croicu, Alexandru; Bath, Kamaljit S.; Shur, Andrey; Essey, Edward G.; Stott, Nathaniel W.; Perlow, Jonathan D.; Cupala, Shiraz J.; O'Connor, Brian G., Promoting data from structured data files.
  95. Millard,John, Protecting a computer coupled to a network from malicious code infections.
  96. Mirzad, Nima; Begun, Andrew Paul; Palmer, Michael B.; Mollicone, Laurent, Query to an electronic form.
  97. Toomey, Christopher, Restricting the volume of outbound electronic messages originated by a single entity.
  98. Garcia-Martin, Miguel A.; Haruna, Adamu, Retrieval of offline instant messages.
  99. Bregman, Mark; Sobel, William E., Security threat reporting in light of local security tools.
  100. Hill, Brian; Bjordahl, Hans, Side-by-side shared calendars.
  101. Hill, Brian; Bjordahl, Hans, Side-by-side shared calendars.
  102. Nachenberg,Carey, Signature driven cache extension for stream based scanning.
  103. Borenstein, Nathaniel Solomon; Maresh, Mark Edmund, Single touch e-mail management.
  104. Ruthfield, Scott L.; Wolf, Richard J.; Hopcroft, Michael J.; Erickson, Paul R.; Nakajima, Satoshi, Single window navigation methods and systems.
  105. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Stopping and remediating outbound messaging abuse.
  106. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Stopping and remediating outbound messaging abuse.
  107. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Stopping and remediating outbound messaging abuse.
  108. Nachenberg,Carey S.; Guy,Elias E., Stream scanning through network proxy servers.
  109. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Subscriber reputation filtering method for analyzing subscriber activity and detecting account misuse.
  110. Cooley, Shaun P., Suppressing spam using a machine learning based spam filter.
  111. McCann, Robert Emmett; Affronti, Michael Anthony; Brauninger, Andrew Russell; Pereira, Jorge; Edelen, IV, James J., Synchronized conversation-centric message list and message reading pane.
  112. Ferguson, Tabitha K.; Linkert, Barry; Vander Veen, Raymond P.; Castell, William D.; Lazaridis, Mihal; Mousseau, Gary P., System and method for bundling information.
  113. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections.
  114. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  115. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  116. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  117. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  118. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  119. Jain, Anuj, System and method for controlling inclusion of email content.
  120. Sallam,Ahmed, System and method for correlating network traffic and corresponding file input/output traffic.
  121. Fotta, Keith A.; Boudrieau, Richard P., System and method for integrated compliance and contact management.
  122. Zdepski, Joel, System and method for one touch e-mail reply.
  123. Lazaridis, Mihal; Mousseau, Gary P., System and method for pushing information from a host system to a mobile communication device.
  124. Mousseau, Gary P; Ferguson, Tabitha; Linkert, Barry; Vander Veen, Raymond; Castell, William D.; Lazaridis, Mihal, System and method for pushing information from a host system to a mobile data communication device.
  125. Larcheveque, Jean-Marie H.; Narendran, Arungudnram; Sikchi, Prakash; Levenkov, Alexei; Ardeleanu, Adriana; Shur, Andrey; Catorcini, Alessandro; Selim, Nora S.; Bath, Kamaljit S., System and method for real-time validation of structured data files.
  126. Reardon, David C.; Henson, Timothy L., System and method for two-way transfer of funds and electronic content between summa account users with gathering of behavioral metrics and management of multiple currencies and escrow accounts.
  127. Lazaridis, Mihal; Mousseau, Gary P., System and method for using trigger events and a redirector flag to redirect messages.
  128. Pang, Stephen Y. F., System for policing junk e-mail messages.
  129. Sobel,William E, System utilizing updated spam signatures for performing secondary signature-based analysis of a held e-mail to improve spam email detection.
  130. Kim, Jane T; Sommer, Peter D.; Wang, Simin; Eason, Natalie M; Cupala, Shiraz J., Systems and methods for interacting with a computer through handwriting to a screen.
  131. Nachenberg,Carey S.; Sobel,William E., Temporal access control for computer virus prevention.
  132. Barrett, Joseph G.; Muehl, Mark J.; Palino, Todd M., Throttling electronic communications from one or more senders.
  133. Sikchi, Prakash; Veselov, Evgeny N.; Mooney, Stephen J., Translation file.
  134. Sikchi, Prakash; Veselov, Evgeny N.; Mooney, Stephen J., Translation file.
  135. Chasin, C. Scott; Lin, Wei, Trusted communication network.
  136. Chasin, C. Scott; Lin, Wei, Trusted communication network.
  137. Sobel,William E; McCorkendale,Bruce, Use of geo-location data for spam detection.
  138. Himberger, Andrew M.; Gauthier, Tracey M.; Butcher, Aaron M.; Harris, Jensen M.; Satterfield, Jesse Clay, User interface for displaying a gallery of formatting options applicable to a selected object.
  139. Satterfield, Jesse Clay; Butcher, Aaron M.; Morton, David A.; Harris, Jensen M.; Denney, Justin, User interface for displaying selectable software functionality controls that are relevant to a selected object.
  140. Satterfield, Jesse Clay; Butcher, Aaron M.; Morton, David A.; Harris, Jensen M.; Denney, Justin, User interface for displaying selectable software functionality controls that are relevant to a selected object.
  141. Satterfield, Jesse Clay; Butcher, Aaron M.; Morton, David A.; Harris, Jensen M.; Denney, Justin, User interface for displaying selectable software functionality controls that are relevant to a selected object.
  142. Leukart, Richard H.; Frankel, Glenn L.; Jensen, Stephen D.; Savastano, Hernan; Williams, Cheryl L., User interface for providing task management and calendar information.
  143. Isenberg,Henri J., Using a benevolent worm to assess and correct computer security vulnerabilities.
  144. Sallam, Ahmed, Using behavior blocking mobility tokens to facilitate distributed worm detection.
  145. Sallam,Ahmed, Using mobility tokens to observe malicious mobile code.
  146. Sobel,William E.; McCorkendale,Bruce, Verification of desired end-state using a virtual machine environment.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로