Example of validating communication

Messages identified as sent from spammers may be prevented from reaching a user or being viewed by a user.

In another example, e-mail servers or electronic devices may be configured to screen the subject line header or body text of incoming messages for keywords indicating the e-mail message was sent by a spammer.

Some of these systems and methods relate to "filtering" or "blocking" of e-mail.

In one example, an ISP may configure an e-mail server, or an individual may configure an electronic device for receiving electronic messages, to screen incoming messages for those originating from electronic addresses of known spammers.

[0006] Figure 1 illustrates an example system 100 for validating electronic communications; [0007] Figure 2 illustrates an example implementation of a system 200 for validating electronic communications; [0008] Figure 3 illustrates another example implementation of a system 300 for validating electronic communications; [0009] Figure 4 illustrates another example implementation of a system 400 for validating electronic communications; [0010] Figure 5 illustrates an example of process steps within a registration network 500 when being queried by a validation logic of a system for validating electronic communications; [0011] Figure 6 illustrates an example method 600 for validating electronic communications; [0012] Figure 7 illustrates an example method 700 for preparing a registration network; and [0013] Figure 8 illustrates an example computer 800 that contains a retrieval logic 825 and validation logic 830.

DETAILED DESCRIPTION [0014] The following includes definitions of selected terms used throughout the disclosure.

It will be appreciated that the Figures are not drawn to scale and that selected components within any Figure may be illustrated in enlarged or reduced form without comment to improve clarity and understanding of particular concepts being discussed.

Any shading used in the Figures is to improve clarity of elements or components for discussion.Other messages may not be permitted to reach the user.Many of the existing systems and methods for filtering and/or blocking spam e-mail messages may be ineffective, for a variety of reasons.Spam may be used to advertise products, broadcast political or social commentary, and the like.The individuals, organizations or other entities sending spam may be called "spammers." Spammers may send millions of e-mail messages within short periods of time (e.g., hours).Example systems, software, methods, computer-readable media and so on associated with validating electronic communications are provided.

Tags: , ,