The example methods, systems, and/or apparatus described herein may be used to deliver electronic mail (“e-mail”) using payments. The example methods, systems, and/or apparatus may be implemented by Internet service providers (ISP's) (e.g., telephone companies, cable companies, satellite communication companies, wireless mobile communication companies, utility companies, telecommunication companies, dedicated Internet providers, etc.) to protect themselves and/or subscribers against spam e-mail. Spam e-mail is often used for mass deliveries of unsolicited, unwanted, and nuisance e-mails. Spam e-mail can also be used to commit fraud and/or identity theft, and/or to deliver harmful viruses. For example, in “phishing” scams, unscrupulous individuals and/or entities may use spam e-mail to lure unsuspecting recipients to provide personal, financial, highly sensitive, etc. information such as, for example, bank account information, social security information, personal identification information, etc.
Spam e-mail is not only an annoyance to e-mail recipients, but it can be detrimental to communication networks by using up network bandwidth and/or data storage space. Some known methods of controlling span e-mail use optional postage payments in combination with permissions lists or white lists (i.e., a list having names and/or e-mail addresses of senders from which a recipient will accept e-mails) to allow or block delivery of e-mails to intended recipients. For example, in a known system, if an e-mail server receives an e-mail addressed to a particular user, the e-mail server may determine whether the e-mail is accompanied with the optional postage payment, and if so, deliver the e-mail to the intended recipient. However, if the received e-mail is not accompanied with the optional postage payment, the e-mail server checks the permissions list of the intended recipient. If the recipient's permissions list has the e-mail address of the e-mail's sender, then the e-mail server forwards the e-mail to the intended recipient.
The drawback of the above-described known systems is that those systems encourage e-mail spammers to randomly generate or acquire more and more recipient e-mail addresses and to send out more and more e-mail messages. In this manner, even if the e-mail spammers do not attach any postage payments, the more e-mail messages the spammers send the greater the likelihood that a substantial percentage of those e-mails will be delivered to intended recipients because at least some of the randomly generated or acquired recipient e-mail addresses will be on recipient permissions lists. Additionally, to acquire valid recipient e-mail addresses, the above-described methods encourage spammers to infiltrate e-mail address books or contacts lists stored on user computers and/or network servers and to send out e-mail worms that will propagate e-mails using e-mail addresses found in other people's e-mail address books and contacts lists. Also, spammers may use techniques to breach recipient permissions lists to acquire valid e-mail addresses that will enable delivery of spam e-mail.
Unlike known systems, the example methods, systems, and apparatus described herein deliver e-mail messages to recipients only if senders of the e-mail messages post a required postage payment for delivery of the e-mail messages. That is, if a sender does not provide the required postage payment to a deposit account of the intended recipient, an e-mail server will not deliver the e-mail message to the intended recipient regardless of whether the sender's e-mail address or other identification appears on a permissions list of the intended recipient.
An example method involves receiving an e-mail message via a server and determining via the server whether the e-mail message includes information indicative that a sending entity (e.g., an e-mail sender) has posted an e-mail delivery payment (e.g., a monetary value) to enable delivery of the e-mail message. If the e-mail message includes the information indicating that the sending entity has posted the e-mail delivery payment, then the server polls a funds account (e.g., a bank account, an Internet payment system account, PayPal®, etc.) of an intended recipient of the e-mail message to determine whether the e-mail delivery payment has been deposited in the funds account. If the e-mail delivery payment has not been deposited in the funds account, the server does not send the e-mail message to a mailbox of the intended recipient regardless of whether the sending entity is on a permissions list of the intended recipient. Because e-mails are not forwarded to intended recipients unless an e-mail delivery payment has been deposited, spammers will be discouraged from sending mass e-mails without payments because none will be delivered.
In an example implementation, when the server determines that an e-mail delivery payment has been deposited into a funds account of an intended recipient, the server forwards the corresponding e-mail to the mailbox of the intended recipient. In some example implementations, a rule may be implemented to require the server to verify that the deposited payment is available for withdrawal (e.g., the e-mail delivery payment is not subject to insufficient funds or fraudulent activity on behalf of the e-mail sender such as stolen credit card activity) before forwarding the e-mail to the intended recipient. Verifying that the deposited payment is available for withdrawal by the intended recipient ensures that the recipient can obtain the funds associated with the e-mail delivery payment and use the funds for purposes other than sending e-mail messages (e.g., purposes other than to provide e-mail delivery payments). For example, the payment may be withdrawn as cash currency by the recipient to spend on whatever the recipient desires.
In addition, the server may verify that the deposit is sufficient by determining whether the amount of the e-mail delivery payment is equal to or greater than a threshold monetary value associated with sending the message to the intended recipient. That is, recipients may set a minimum e-mail delivery payment amount (e.g., a threshold monetary value) that they require a sender to post to enable delivery of e-mail messages. In some example implementations, recipients may set different threshold values for known e-mail sender (e.g., family, friends, financial institutions, utility companies, etc.) and for unknown e-mail senders (e.g., companies with whom a recipient has no ongoing relationship, marketing companies, spammers, etc.). Also, after receipt of an e-mail for which a payment has been provided, the recipient may refund some or all of the payment to the sender. Accordingly, friends and family can often be assured that the recipient will refund all of the payment, while businesses, telemarketers, etc. may assume the risk that the recipient will not refund any of the payment even if the recipient does read the e-mail.
Turning to
The e-mail server 102 is configured to determine whether the e-mail 108a includes information indicating that the sender 104 has posted an e-mail delivery payment to the recipient account 112. The e-mail server 102 is also configured to verify or confirm that the payment has actually been deposited in the recipient account 112 and/or is available for withdrawal by the recipient 106. If the e-mail server 102 verifies that the e-mail delivery payment has been deposited in the recipient account and/or is available for withdrawal by the recipient 106, the e-mail server 102 will indicate that the e-mail 108a is a verified e-mail 108b (e.g., a validated e-mail) and will forward the verified e-mail 108b to a mailbox of the recipient 106 so that the recipient 106 can retrieve the verified e-mail 108b.
On the other hand, if the e-mail server 102 determines that the e-mail delivery payment has not been deposited in the recipient account 112 or that an e-mail delivery payment deposited in the recipient account 112 is not sufficient, the e-mail server 102 will not forward the e-mail 108a to the mailbox of the recipient 106. Instead, the e-mail server 102 of the illustrated example will generate a payment request message 116 and forward the payment request message 116 (shown in detail in
To store the e-mail 108a while the example apparatus 300 determines whether an e-mail delivery payment has been deposited into the recipient account 112, the example apparatus 300 is provided with an example incoming e-mail intermediate storage structure 302. In the illustrated example, the example incoming e-mail intermediate storage structure 302 receives the e-mail 108a from the sender 104 that is addressed to the intended recipient 106. For example, the example incoming e-mail intermediate storage structure 302 may receive the e-mail 108a from an e-mail account of the sender 104 and store the e-mail 108a until the example apparatus 300 determines whether a corresponding e-mail delivery payment has been deposited into the recipient account 112.
In an alternative example implementation, the incoming e-mail intermediate storage structure 302 may be omitted from the example apparatus 300. In this case, the e-mail 108a may be received by the recipient mailbox 312 and the recipient mailbox 312 may make the e-mail 108a invisible, unviewable, and/or inaccessible to the recipient 104 until the example apparatus 300 determines whether a corresponding e-mail delivery payment has been deposited into the recipient account 112. Alternatively or additionally, the recipient mailbox 312 may categorize, file, or otherwise store the e-mail 108a in an unverified or unvalidated e-mail folder (e.g., a junk e-mail folder, a spam e-mail folder, a bulk e-mail folder, a pending e-mail folder, etc.) until the example apparatus 300 determines whether the e-mail delivery payment has been deposited into the recipient account 112.
To determine whether the e-mail 108a contains information indicating that the sender 104 has posted an e-mail delivery payment to the recipient account 112, the example apparatus is provided with an e-mail analyzer 304. The e-mail analyzer 304 is communicatively coupled to the incoming e-mail intermediate storage structure 302 and is configured to obtain and/or analyze information from the e-mail 108a. For example, the e-mail analyzer 304 may extract and/or analyze information indicating whether the sender 104 has posted an e-mail delivery payment to the recipient account 112 to enable delivery of the e-mail 108a. Also, the e-mail analyzer 304 may obtain e-mail properties from the e-mail 108a such as, for example, recipient identification information (e.g., name, username, etc.), a recipient e-mail address, sender identification information, a sender e-mail address, etc.
In the illustrated example, the e-mail analyzer 304 is also configured to access a user preferences database 306. For example, the e-mail analyzer 304 may retrieve threshold e-mail delivery payment values indicated by the recipient 106 from the user preferences database 306. In the illustrated example, the recipient 106 may assign different minimum threshold e-mail delivery payment amounts for different senders and store the threshold values in the user preferences 306 for subsequent use by the example apparatus 300 to verify (e.g., validate) e-mails and/or to block e-mail spam or unwanted e-mails. In some instances, the recipient 106 may assign a relatively low payment amount required by family and friends and a relatively high payment amount for e-mails from unknown addressees (e.g., marketing or spam e-mails). The e-mail analyzer 304 may also obtain recipient account information (e.g., an account number of the recipient account 112) from the user preferences database 306 based on the recipient identification information or recipient e-mail obtained from the e-mail 108a. Also, the e-mail analyzer 304 may retrieve wait time values (e.g., minutes, hours, days, weeks, etc.) from the user preferences database 306 indicating the amount of time to wait for the sender 104 to provide the e-mail delivery payment before discarding or deleting the e-mail 108a. The wait time value may be configurable by the recipient 104 and/or may be set to a default or standard time value.
To determine whether the e-mail delivery payment has actually been deposited into the recipient account 112, the example apparatus 300 is provided with a payment verifier 308. The payment verifier 308 is communicatively coupled to the e-mail analyzer 304 and is configured to receive information from the e-mail analyzer 304 indicating whether e-mails (e.g., the e-mail 108a) contains information indicating that the sender 104 has posted an e-mail delivery payment to the recipient account 112. In response to receiving information from the e-mail analyzer 304 indicating that the sender 104 has posted an e-mail delivery payment to the recipient account 112, the payment verifier 308 is configured to retrieve recipient account information from the e-mail analyzer 306 and/or from the user preferences database 306 and access the recipient account 112 to determine whether the payment indicated in the e-mail 108a has actually been deposited in the recipient account 112. The payment verifier 308 may also determine whether the deposited payment funds are available for withdrawal by the recipient 106 (e.g., the e-mail delivery payment is not subject to insufficient funds or fraudulent activity on behalf of the e-mail sender). This ensures that the recipient 104 will not be tricked (e.g., conned) into receiving e-mails associated with payments that were paid using fraudulent means (e.g., stolen credit cards, sender accounts having insufficient funds, etc.) for which the financial institution managing the recipient account 112 may place a hold on the funds.
In alternative example implementations, the payment verifier 308 may be configured to determine whether e-mail delivery payments have been deposited into the recipient account 112, but not whether the payment is available for withdrawal by the recipient 106. For example, this may be a recipient-selectable feature that the recipient 106 may select based on the level of scrutiny desired for incoming e-mails.
To generate payment request messages (e.g., the example payment request message 116 of
To store verified e-mails (e.g., the verified e-mail 108b of
In an alternative example implementation, if the intermediate storage 302 is omitted from the example apparatus 300 (e.g., the recipient mailbox 312 stores the e-mail 108a until the example apparatus 300 determines whether a corresponding e-mail delivery payment has been deposited into the recipient account 112), the recipient mailbox 312 may indicate that the e-mail 108a is verified or validated (e.g., converts the e-mail 108a into the verified e-mail 108b) and make the verified e-mail 108b visible, viewable, and/or otherwise accessible to the recipient 104. Additionally or alternatively, the recipient mailbox 312 may transfer the verified e-mail 108b from an unverified or unvalidated e-mail folder (e.g., a junk e-mail folder, a spam e-mail folder, a bulk e-mail folder, a pending e-mail folder, etc.) to an inbox e-mail folder indicating that a corresponding e-mail delivery payment has been provided for the verified e-mail 108b.
In some example implementations, the incoming e-mail intermediate storage structure 302 and/or the recipient mailbox 312 may be configured to verify or validate the e-mail 108a using a digital signature, an encryption technique, or some other fraud protection technique to ensure that the sender 104 (e.g., a spammer) cannot fraudulently modify the e-mail 108a to enable delivery of the e-mail 108a without providing the required e-mail delivery payment.
To refund some or all of the e-mail delivery payment to the sender 104, the example apparatus 300 is provided with a refunder 314. When the recipient 106 retrieves the verified e-mail 108b from the recipient mailbox 312, the recipient 106 may elect to refund all or at least a portion of the e-mail delivery payment to the sender 104. In particular, the recipient 106 may select a refund option via an e-mail terminal (e.g., one of the e-mail terminals 152, 154, 156, 158, or 160 of
To deliver the e-mail 108a to a plurality of recipients listed in a “To:” field and a “Cc:” field of the e-mail 108a, the sender 104 must provide a plurality of e-mail delivery payments, each of which corresponds to a respective intended recipient. That is, the sender 104 must deposit an e-mail delivery payment in the funds account of each the listed recipients. In this manner, the example apparatus 300 or a plurality of apparatus substantially similar or identical to the example apparatus 300 can verify or confirm that the sender 104 has posted the e-mail delivery payments and that the e-mail delivery payments have actually been deposited in the recipient accounts and/or are available for withdrawal by the intended recipients. If the sender 108a has provided the e-mail delivery payment to only some of the listed recipients, then the example apparatus 300 may deliver the verified e-mail 108b only to those recipients for which the payment was provided. Each of the recipients that receive the verified e-mail 108b can then elect whether to refund the e-mail delivery payment deposited into their respective account back to the sender 104. In some cases, only some of the recipients may elect to refund the e-mail delivery payment to the sender 104.
Flowcharts representative of example machine readable instructions for implementing the example apparatus 300 of
As shown in
The e-mail analyzer 304 of the illustrated example then retrieves the intended recipient identification information (block 406) and the sender identification information (block 408) from the e-mail 108a stored in the incoming e-mail intermediate storage structure 302. The e-mail analyzer 304 then retrieves the amount of required payment for delivery of the e-mail 108a (block 410). For example, the e-mail analyzer 304 may use the recipient and sender information to retrieve a minimum threshold payment amount from the user preferences database 306 (
The e-mail analyzer 108a then retrieves the account number of the intended recipient 106 (block 412) that can be used to verify deposit of the e-mail delivery payment in the recipient account 112 (
If the deposit amount is sufficient (block 418), then the payment verifier 308 determines whether the funds from the deposit transaction are available for withdrawal (block 420) by the recipient 106. For example, the payment verifier 308 may query the recipient account 112 and/or the managing financial institution to determine if any holds have been put on the hinds (e.g., due to fraudulent transaction, insufficient sender funds, etc.) or if for any other reason the recipient 106 would be prevented from withdrawing the funds corresponding to the e-mail delivery payment. In some example implementations, determining that the funds from the deposit transaction are available for withdrawal (block 420) ensures that the recipient 106 can obtain the funds associated with the e-mail delivery payment and use the funds for purposes other than sending e-mail messages. For example, the funds may be withdrawn as cash currency that the recipient 106 may spend as desired. Alternatively, the account may be a credit card account, a debit card account, a credit union account, etc.
If the funds from the deposit transaction are not available for withdrawal (block 420) or if the payment verifier 308 determines that a deposit transaction corresponding to the received e-mail 108a does not exist (block 416) or if the payment verifier 308 determines that the deposit amount of the deposit transaction is not sufficient (block 418), then the payment status notification generator 310 generates the example payment request message 116 (
If the payment verifier 308 has not yet received a funds availability notice from the recipient account 112 (block 424), then the payment verifier 308 determines if the wait time has expired (block 426). If the wait time has not expired (block 426), then control returns to block 424. However, if the payment verifier 308 has received a funds availability notice from the recipient account 112 (block 424), then the payment verifier 308 determines if the funds are sufficient (block 428) in a manner similar to that described above in connection with block 418.
If the payment verifier 308 determines that the funds are not sufficient (block 428) or if the payment verifier 308 determines that the wait time has expired (block 426), then the incoming e-mail intermediate storage structure 302 discards (e.g., deletes) the e-mail 108a (block 430). In an example implementation in which the incoming e-mail intermediate storage structure 302 is omitted from the example apparatus 300, (e.g., the recipient mailbox 312 stores the e-mail 108a until the example apparatus 300 determines whether a corresponding e-mail delivery payment has been deposited into the recipient account 112), at block 430 the recipient mailbox 312 may discard (e.g., delete) the e-mail 108a. In some example implementations, the incoming e-mail intermediate storage structure 302 (or the recipient mailbox 312) may return the e-mail 108a to the sender 104.
If, instead, the payment verifier 308 determines that the funds are sufficient (block 428) or if at block 420 the payment verifier 308 determines that the funds from the deposit transaction are available for withdrawal, then the incoming e-mail intermediate storage structure 302 indicates that the e-mail 108a is verified (block 432) (e.g., converts the e-mail 108a into the verified e-mail 108b) by, for example, writing to a “verified” parameter in the e-mail 108a. In some example implementations, the incoming e-mail intermediate storage structure 302 may be configured to verify or validate the e-mail 108a using a digital signature, an encryption technique, or some other fraud protection technique to ensure that the sender 104 (e.g., a spammer) cannot fraudulently modify the e-mail 108a to enable delivery of the e-mail 108a without providing the required e-mail delivery payment.
The incoming e-mail intermediate storage structure 302 then forwards the verified e-mail 108b to the recipient mailbox 312 (block 434) for storage so that the recipient 106 may subsequently retrieve the verified e-mail 108b. In an alternative example implementation in which the intermediate storage 302 is omitted from the example apparatus 300 (e.g., the recipient mailbox 312 stores the e-mail 108a until the example apparatus 300 determines whether a corresponding e-mail delivery payment has been deposited into the recipient account 112), at block 432 the recipient mailbox 312 may indicate that the e-mail 108a is verified or validated (e.g., converts the e-mail 108a into the verified e-mail 108b) and at block 434 the recipient mailbox 312 may make the verified e-mail 108b visible, viewable, and/or otherwise accessible to the recipient 104. Additionally or alternatively, at block 434 the recipient mailbox 312 may transfer the verified e-mail 108b from an unverified or unvalidated e-mail folder (e.g., a junk e-mail folder, a spam e-mail folder, a bulk e-mail folder, a pending e-mail folder, etc.) to an inbox e-mail folder or main e-mail folder.
At blocks 432 and 434, the incoming e-mail intermediate storage structure 302 verifies and forwards the verified e-mail 108b to the recipient mailbox 312 (and/or the recipient mailbox 312 verifies and makes accessible the verified e-mail 108b) without requiring a check or an analysis of a permissions list of the recipient 106. Therefore, provided the required payment is made, the incoming e-mail intermediate storage structure 302 verifies and forwards the verified e-mail 108b to the recipient mailbox 312 regardless of whether the permissions list of the recipient 106 contains an e-mail address or other information identifying the sender 104. The process is then ended. Of course, the process may be repeated for any other received e-mails.
The example flowchart depicted in
Otherwise, if the e-mail terminal determines that the recipient 106 has elected not to refund the e-mail delivery payment (block 506), the e-mail delivery payment is not refunded (block 510) to the sender account 110. After block 508 or block 510, the process of
The processor 612 of
The system memory 624 may include any desired type of volatile and/or non-volatile memory such as, for example, static random access memory (SRAM), dynamic random access memory (DRAM), flash memory, read-only memory (ROM), etc. The mass storage memory 625 may include any desired type of mass storage device including hard disk drives, optical drives, tape storage devices, etc.
The I/O controller 622 performs functions that enable the processor 612 to communicate with peripheral input/output (I/O) devices 626 and 628 and a network interface 630 via an I/O bus 632. The I/O devices 626 and 628 may be any desired type of I/O device such as, for example, a keyboard, a video display or monitor, a mouse, etc. The network interface 630 may be, for example, an Ethernet device, an asynchronous transfer mode (ATM) device, an 802.11 device, a digital subscriber line (DSL) modem, a cable modem, a cellular modem, etc. that enables the processor system 610 to communicate with another processor system.
While the memory controller 620 and the I/O controller 622 are depicted in
Of course, persons of ordinary skill in the art will recognize that the order, size, and proportions of the memory illustrated in the example systems may vary. Additionally, although this patent discloses example systems including, among other components, software or firmware executed on hardware, it will be noted that such systems are merely illustrative and should not be considered as limiting. For example, it is contemplated that any or all of these hardware and software components could be embodied exclusively in hardware, exclusively in software, exclusively in firmware or in some combination of hardware, firmware and/or software. Accordingly, persons of ordinary skill in the art will readily appreciate that the above-described examples are not the only way to implement such systems.
At least some of the above described example methods and/or apparatus are implemented by one or more software and/or firmware programs running on a computer processor. However, dedicated hardware implementations including, but not limited to, an ASIC, programmable logic arrays and other hardware devices can likewise be constructed to implement some or all of the example methods and/or apparatus described herein, either in whole or in part. Furthermore, alternative software implementations including, but not limited to, distributed processing or component/object distributed processing, parallel processing, or virtual machine processing can also be constructed to implement the example methods and/or apparatus described herein.
It should also be noted that the example software and/or firmware implementations described herein are optionally stored on a tangible storage medium, such as: a magnetic medium (e.g., a disk or tape); a magneto-optical or optical medium such as a disk; or a solid state medium such as a memory card or other package that houses one or more read-only (non-volatile) memories, random access memories, or other re-writable (volatile) memories; or a signal containing computer instructions. A digital file attachment to e-mail or other self-contained information archive or set of archives is considered a distribution medium equivalent to a tangible storage medium. Accordingly, the example software and/or firmware described herein can be stored on a tangible storage medium or distribution medium such as those described above or equivalents and successor media.
To the extent the above specification describes example components and functions with reference to particular devices, standards and/or protocols, it is understood that the teachings of the invention are not limited to such devices, standards and/or protocols. Such devices are periodically superseded by faster or more efficient systems having the same general purpose. Accordingly, replacement devices, standards and/or protocols having the same general functions are equivalents which are intended to be included within the scope of the accompanying claims.
Although certain methods, apparatus, systems, and articles of manufacture have been described herein, the scope of coverage of this patent is not limited thereto. To the contrary, this patent covers all methods, apparatus, systems, and articles of manufacture fairly falling within the scope of the appended claims either literally or under the doctrine of equivalents.