摘要:
A method, system, apparatus, and computer program product are presented for providing a user with the ability to limit the receipt of unwanted email messages. An encoded email identifier is generated by combining the user's local mailbox identifier along with encoded email acceptance parameter values that represent email acceptance criteria. The encoded email identifier is then used as the local-part portion of an email address in place of the user's local mailbox identifier. After receiving an incoming email message in which the encoded email identifier is a portion of the destination address of the incoming email message, an email server delivers the email message in accordance with the local mailbox identifier that is embedded in the encoded email identifier in response to a determination that one or more characteristics of the email message satisfy one or more email acceptance criteria that are encoded within the encoded email identifier.
摘要:
A method, system, apparatus, and computer program product are presented for providing a user with the ability to limit the receipt of unwanted email messages. An encoded email identifier is generated by combining the user's local mailbox identifier along with encoded email acceptance parameter values that represent email acceptance criteria. The encoded email identifier is then used as the local-part portion of an email address in place of the user's local mailbox identifier. After receiving an incoming email message in which the encoded email identifier is a portion of the destination address of the incoming email message, an email server delivers the email message in accordance with the local mailbox identifier that is embedded in the encoded email identifier in response to a determination that one or more characteristics of the email message satisfy one or more email acceptance criteria that are encoded within the encoded email identifier.
摘要:
Provides a process which identifies the language or genre of a stored or transmitted document. The process uses a plurality of Word Frequency Tables (WFTs) respectively associated with languages/genre of interest. Each WFT contains a relatively few of the most common words of one of the languages of interest. Each word code in a WFT has an associated normalized frequency of occurrence value (NFO); use of NFOs increases the language/genre detection ability of the process. A plurality of respective accumulators are associated with the plurality of WFTs. All accumulators are set to zero before identification processing starts. The language/genre identification process receives a sequence of words from an inputted document, and compares each received word to all of the words in all WFTs. Whenever a received word is found in any WFT, the process adds the word's associated NFO to a current total in the associated accumulator. In this manner, totals in all accumulators build up into language discriminating values after a number of words are read from the document. Processing stops when either the end of the document is reached or when a predetermined number of words are received; and then the language/genre associated with the accumulator containing the largest total is the identified language.
摘要:
A mechanism for an automated system to allow a user of the system to demonstrate his legitimacy by demonstration of secret knowledge. The mechanism is resistant to compromise by observation of its use. An array of symbols is presented to the user and the user is required to manipulate several symbols at once until assigned key symbols are manipulated into predetermined states. Doing so effectively prevents an observer from determining which symbols are the ones of interest. For example, pushing a button might cause several symbols in the array to exchange their positions. The user continues to do this, having, perhaps, to use several different buttons, until a certain subset of the symbols appears in certain locations within the array. (In this example, the arrangement of this subset of symbols is the user's password or PIN.) In this process many symbols in the array, in addition to the user's specific symbols, would also have been moved, making it virtually impossible for an observer to identify which symbols and array-positions are pertinent to the user's password or PIN.