Methods and systems for achieving and verification of electronic communications
A method and system for archiving and/or verifying electronic communications. The method and system provide verification of an email sent by a sender to a recipient, comprising receiving a copy of an email as an addressee; indexing the email according to at least one of sender, recipient, date, or subject matter; and storing an exact copy of the email as received. The method and system also provide for secure electronic communication between a sender and at least one recipient, comprising receiving from the sender view a secure internet connection a message and the email address of at least one intended recipient of the message; sending an email message to the at least one intended recipient of the message that a message is waiting; transmitting the message to the at least one intended recipient via a secure internet connection established by the at least one intended recipient; and sending an email message to the sender that the at least one recipient has been sent the message. The method and system also provide for transmitting a facsimile for a sender to a recipient, the comprising: receiving an electronic facsimile message from the sender together with the facsimile number of the recipient; storing a copy of the electronic facsimile message; transmitting the facsimile message to the facsimile number of the recipient.
This application is a continuation of U.S. patent application Ser. No. 09/948,055, filed Sep. 5, 2001, entitled “Method And System For Achieving And Verification Of Electronic Communications”, which claims priority of U.S. Provisional Application Ser. No. 60/229,998, filed Sep. 5, 2000.
FIELD OF THE INVENTIONThis invention relates to electronic communications such as emails and facsimiles, and in particular to methods of archiving and verifying electronic communications.
BACKGROUND OF THE INVENTIONElectronic communications such as emails and facsimiles are continuing to replace pure paper-based methods of communications. A problem with electronic communications versus their paper-based counterparts is that some electronic communications can be altered, sometimes without detection, and thus it is difficult to verify what was sent, when it was sent, or when it was received. With respect to email, it can be difficult for an email sender to prove that an email was actually sent, when it was sent, or what the contents were, or whether it was received. Likewise with respect to facsimiles, it can be difficult for a facsimile sender to prove that that a facsimile was actually sent, when it was sent, or what the contents were, or whether it was received.
SUMMARY OF THE INVENTIONThis invention relates to archiving and/or verifying electronic communications. According to a first aspect of the invention relating to sending verifiable email messages, the invention comprises addressing the email to a third party verification provider, either as an addressee or as a cc, who will index the message according to at least one of sender, date, recipient, and subject, and store an exact copy of the e-mail message. Similarly, the invention also relates to providing email verification of an email sent by a sender to a recipient, comprising receiving a copy of an email as an addressee; indexing the email according to at least one of sender, recipient, date, or subject matter; and storing an exact copy of the email as received.
According to a second aspect of the invention relating to secure electronic communication, the invention comprises transmitting to a third party via a secure internet connection a message and the email address of at least one intended recipient of the message, who will send an email message to the intended recipient indicating that a message is waiting for the intended recipient via a secure internet connection, transmit the message to the intended recipient who establishes a secure internet connection with the third party, and sends an email to the sender when the message has been transmitted to an intended recipient. Similarly, the invention relates to providing secure electronic communication between a sender and at least one recipient, comprising receiving from the sender view a secure internet connection a message and the email address of at least one intended recipient of the message; sending an email message to the at least one intended recipient of the message that a message is waiting; transmitting the message to the at least one intended recipient via a secure internet connection established by the at least one intended recipient; and sending an email message to the sender that the at least one recipient has been sent the message.
According to an alternative embodiment of the second aspect of this invention relating to transmitting a message including at least two options to a recipient and receiving the recipient's selection, the invention comprises transmitting a message including at least two options to a third party that communicates the message to the recipient, receives the recipient's selection, and transmits the recipient's selection back to the sender. Similarly the invention also relates to providing for transmission of a message including at least two options to a recipient and transmitting the recipient's selection to the sender, comprising receiving from the sender via a secure connection, the message, including at least two options, and the email address of at least one intended recipient of the message; sending an email message to the at least one intended recipient of the message that a message is waiting; transmitting the message to the at least one intended recipient via a secure internet connection established by the at least one intended recipient, together with instructions to the recipient about how to make the selection; receiving the selection from the intended recipient; sending an email message to the sender that the at least one recipient has made a selection; communicating the recipient's selection to the sender via a secure internet connection established by the sender.
According to a third aspect of this invention relating to transmitting a verifiable facsimile message to at least one intended recipient, the invention comprises sending the facsimile together with the facsimile number of the at least one intended recipient to a third party who will store an copy of the facsimile as received and transmit the facsimile to the intended recipient. The invention also relates to a method of transmitting a facsimile for a sender to a recipient, the method comprising: receiving an electronic facsimile message from the sender together with the facsimile number of the recipient; storing a copy of the electronic facsimile message; transmitting the facsimile message to the facsimile number of the recipient.
These and other features and advantages will be in part apparent and in part pointed out hereinafter.
BRIEF DESCRIPTION OF THE DRAWINGS
Corresponding reference numerals indicate corresponding parts throughout the several views of the drawings.
DETAILED DESCRIPTION OF THE INVENTIONAccording to a first aspect, this invention relates to a system and a method for senders to backup and archive email to a third party server without the need for conventional backup software, thereby providing proof of on-line communications. The system and method are preferably implemented by a third party archiving and verification provider using an Application Service Provider (“ASP”) model that allows a sender to use the system and method regardless of his or her location on the Internet. An example of the structure of tables in a SQL database for implementing the system and method of this invention is shown in Appendix A, attached hereto, and incorporated herein by reference. In the preferred embodiment, no special software is required, and an email sender can use the system without changing his or her standard email process.
Referring to
At 24, the email message is received by the third party archiving and verification provider. At 26, a Message Transfer Agent (MTA), for example Sendmail, available from Sendmail, Emoryville, Calif., passes the email to a filter that generates an id based upon the time and date of receipt. The MTA is running on the system server. The email's id is preferably a 24 character identification code in the format yyyymmddhhmmssnnnnnnnnnn where yyyymmdd is an eight-character representation of the date of receipt, hhmmss is a six-character representation of the time of receipt, and nnnnnnnnnn is a unique ten-digit integer. At 28, the email message is written out to a queue directory based upon the id assigned to the email. At 30, a record is inserted into a queue table in the system's database, which cues a cataloging daemon to begin processing the message. At 32 the MTA returns to processing incoming mail requests.
The third party verification provider's system includes at least one, and preferably more than one, cataloging daemons that monitor the queue table in the system database. The cataloging daemons also run on the system server. The number of cataloging daemons depends upon the CPU and the 10. Each cataloging daemon is assigned an id that corresponds to the queue table and the queue directories. The queue table has 2 fields: a queue number and a queue message ID. The queue directory is structured as: /gp/gpc1/outgoing, /gp/gpc1/incoming, /gp/gpc0/outgoing, and /gp/gpc0/incoming, and depending on the number of queues desired, the gpc(number) directory would be correspondingly increased. The same applies for an outgoing queue; a single process is in charge of it as well. When a cataloging daemon encounters an entry in its queue, it begins processing.
At 34, the header of the email message is read, based on RFC-822 internet mail standards, (which standards are incorporated herein by references as if fully set forth). At 36, each email address in the “To:” and “CC:” lines of the email message's header are temporarily stored in an array, which may be a simple character pointer array. The “From:” line of the email message's header is temporarily stored separately. At 38, the cataloging daemon performs a lookup in an alias table of each email address to determine if that email address is a system account with the third party archiving and verification provider. If an email address is an account on the system, the cataloging daemon extracts the system's id for that account. At 40, if the address is valid, the email message's “Received:” header is verified with the MTA table. The MTA table is an extra security feature that stores and allows comparison with the mail relay authorized to deliver the email message to the account. This is an optional feature, that is preferably turned off by default for most accounts. The MTA table has 2 fields, user ID and the sender's MTA's host name. This ensures that the email message was sent from the proper internet mail relay, i.e. an email address that, according to the user's account profile, is authorized to send email to the account. At 42, if the internet mail relay is correct or if it is non-existent the cataloging daemon checks the email message's “From:” header against the address table to verify that the address is allowed to send to the system account. “Non-existent” means that no record is found in the MTA table for that user. This means that the user did not wish to restrict email coming in based on their outgoing mail server. If the user does have an entry and that entry does not match the value in the MTA table, the message is rejected and an error email is placed in the queue for delivery to the user who sent the email. At 44, if the operations at 38, 40 and 42 are successful, the email message is passed to a catalogue routine, which is part of the cataloging daemon. If there is an error, appropriate error routines are called.
At 46, the email message's “To:”, “From:”, and “Subject:” lines and the message's size are stored in the system's message table, with the email message referred to by its assigned message id. The message table has the following fields: a) message id; b) user id; c) folder id ( for later use in grouping messages); d) “To:” line; e) “From:” line; f) “Subject:” line; g) “Date:” line; h) “Time:” line; i) “Size:” line; j) expiration date; and k) has the message been paid for.
At 48, the archive matrix is used to determine the price of the email. The matrix, an example of which is shown in
At 54, a system process pipe is opened by a call from the outgoing daemon for writing to the MTA. At 56, each message is opened up and written to the MTA process, causing the MTA to send the mail out.
The email message remains stored with the third party archiving and verification provider for a time determined by the sender's user profile, which was established at the time the sender opened its account, as from time to time amended. Alternatively, the user could be allowed to select the time for storage at the time the message is sent. The user can also extend the time for storage later, as described below. The third party verification provider preferably provides the sender with access to the stored email messages via a web browser, allowing the sender to manage the stored messages, deleting unneeded messages, extending the storage time for messages, and requesting verified copies of messages.
An example of a web page for providing account information for setting up an account via the Internet with a third party verification provider operating in accordance with the principles of this invention is shown in
An example of a web page for logging onto a third party verification provider's website is shown in
An example of a “Find a Message—Simple Search” page that would be reached through the “Find A Stored Email” link on the page shown in
As shown in
According to a second aspect of this invention, a system and method is provided for allowing closed and secure communications on the internet. A problem with conventional email messages is that they may be stored on unsecure servers. According to this second aspect of this invention, messages are never sent over normal SMTP channels, and are instead created and read using SSL technology, and the documents remain on the system's servers.
The system and method of the present invention provide a secure method for Internet users to communicate registered emails on the Internet without using conventional email clients such as Microsoft's Outlook Express or Netscape's Network Navigator. Instead, messages are created and read inside a web browser such as Microsoft's Internet Explorer, or Netscape's Navigator. Further, unlike conventional email, the system and method of this invention allow the sender to know if and when a message has been read. The system and method allow the sender to see the state of any message, i.e., the user can see that the message has been delivered and read by the recipient, in contrast to conventional email where a user sends a message and is only notified when and if the recipient replies. According to an alternate aspect of the invention, the system and method also allows the sender to receive an electronic or telephone reply to a needed request.
On the
When the sender clicks the confirm button on the
According to a third aspect of this invention, a system and method is provided to allow a user to preset choices for a recipient, and allow the recipient to make a selection by web browser or by telephone.
EXAMPLEA project manager tells a client that changes need to be made to a customer's project and that the cost of those changes will be $1000. The project manager can send a confidential message describing the change, and creating selections, such as “A—Yes, make the changes”, “B—No, do not make the changes”, “C—Yes, but only if they can be done by 3:00 tomorrow afternoon”, and “D—Please call me”. The client will receive a normal email message that a message is waiting for delivery at the system's website. The user is able to check the status of the message and view the selection. A time and date stamp can be applied to show when the message was received, and when the selection was made.
In an alternate embodiment, the recipient can make the selection via telephone. The message would include a telephone number, which is preferably a toll free number. Upon calling the telephone number the recipient inputs an id number uniquely identifying the message the recipient is replying to, and is given instructions how to make the selection using the telephone keypad. The recipient's telephone number and selection are stored, and made available to the original user, for example via a website.
According to a fourth aspect of this invention, a system and method is provided that allows users to create a third party archive of their fax documents. Users can deliver faxes using their current workflow process simply by dialing into the system fax server and then entering the outgoing fax phone number. The system and method then allow the user to view faxed documents via an internet browser.
As shown in
At 212, the third party archiving and verification system verifies that the PIN number entered by the user is correct, by looking it up in a PIN table. At 214, if the PIN number is correct, the system finds the user id associated with the PIN number, and associates the user id with the fax document. At 216 the fax data is written to the system in two formats, a summary file and a data file. The summary file lists information relative to the fax received, such as the system user id, the number of pages, the time of transfer, and the user's PIN number. A data file is preferably a .pdf file, but the could be one or more pages of fax data stored as an image. At 218, the facsimile is sent to the fax number entered by the user. At 220, upon successful transmission of the fax, the system optionally sends a notification back to the fax machine that sent the original fax. Alternatively, or in addition, the system could send a notification only upon failure of transmission. Further, instead of sending a notification through the user's fax machine, or in addition to sending a notification through the user's fax machine, the system can send a email notification either of successful transmission and/or failure of transmission.
At 220, a fax daemon monitors the systems fax queue. At 222, when the fax daemon finds a summary file, the fax daemon reads in the summary file and inserts the information from the summary file into the systems fax database. The data files are then moved to the user's fax directory.
An alternative implementation is shown in
As shown in
Claims
1. A method of sending a verifiable email message, the method comprising:
- addressing the email message, either as an addressee or a copy, to a third party that will index the email message according to at least one of sender, date, recipient, and subject;
- storing an exact copy of the e-mail message for at least a period of time specified by the sender for the purpose of archiving the sender's email message;
- sending an acknowledgement of the receipt of the email message from the third party to the sender; and
- sending an acknowledgement to at least one addressee notifying the addressee that the email message is waiting for the intended recipient at the third party's Internet website.
2. The method according to claim 1 wherein upon request, the third party makes a printed copy of the stored e-mail message, and provides a written verification that it is an exact copy of the email message as received from the recipient.
3. The method according to claim 1 wherein a credit card or debit card of the sender is debited for services.
4. The method according to claim 1 wherein the sender is charged based upon the size of the email and the duration of storage.
5. The method according to claim 4 wherein the sender is advised of charges via email and can settle an account via the internet.
6. The method according to claim 1 wherein the sender is sent a statement of charges incurred.
7. A method of secure electronic communication comprising:
- transmitting to a third party via a secure Internet connection an email message and the email address of at least one intended recipient of the email message;
- storing an exact copy of the email message in the third party's database for a time period specified by the sender;
- sending an email notification from the third party to the intended recipient indicating that an email message is waiting for the intended recipient via an Internet website of the third party;
- entering recipient's log on information and a password to permit the recipient to establish a secure Internet connection with the third party's website;
- delivering the email message from the third party's database to the intended recipient via the secure Internet connection with the third party's website; and
- sending an email notification to the sender when the email message has been transmitted to the intended recipient.
8. The method according to claim 7 wherein the secure Internet connection between the sender and the third party is an SSL connection.
9. The method according to claim 7 wherein the secure Internet connection between the at least one intended recipient and the third party is SSL connection.
10. The method according to claim 7 wherein the email message to the at least one intended recipient includes instructions on how to establish a secure Internet connection to receive the message.
11. The method according to claim 7 wherein the email message includes at least a URL to establish the secure Internet connection.
12. The method according to claim 7 wherein the intended recipient enters log on information of a valid username, and password, to logon to the third party's website, and clicks on an inbox to initiate delivery of the message waiting for the intended recipient.
13. The method according to claim 12 further comprising alerting the sender that the copy of the email message that was stored for a time period specified by the sender is about to be deleted if the sender does not extend the time period.
14. The method according to claim 13 wherein the time period for storing the copy of the message is extended for the sender upon agreement to pay an extension fee.
15. A method of facilitating secure electronic communication between a sender and at least one recipient, comprising:
- receiving from the sender via a secure internet connection an email message and the email address of at least one intended recipient of the email message;
- storing an exact copy of the email message for at least a period of time specified by the sender;
- sending an email notification to the at least one intended recipient of the email message that the email message is waiting for the intended recipient to retrieve the email message via a secure internet website of the third party;
- establishing a secure internet connection with the intended recipient upon completion of log in by the intended recipient onto the third party's website;
- transmitting the email message to the at least one intended recipient via a secure internet connection established by the at least one intended recipient; and
- sending an email notification to the sender that the at least one recipient has been sent the email message.
16. The method according to claim 15 wherein the email notification to the at least one intended recipient includes instructions on how to establish a secure internet connection to receive the message.
17. The method according to claim 16 wherein the email notification includes at least a URL to establish the secure internet connection with the third party's website.
18. The method according to claim 17 wherein the email notification includes a password for the intended recipient to use to establish the secure internet connection with the third party's website.
19. The method according to claim 18 wherein the intended recipient enters log on information of a valid username and a password to establish a secure internet connection with the third party's website.
20. The method according to claim 19 wherein the intended recipient clicks on an inbox to initiate delivery of the email message waiting for the intended recipient.
Type: Application
Filed: Dec 15, 2005
Publication Date: May 4, 2006
Inventor: George Sykes (Granite City, IL)
Application Number: 11/304,927
International Classification: G06F 15/16 (20060101);