Home FAQ's About Compare Versions Purchase Our Process Licensing Contact Us Helpful Links Legal Privacy About Us Zone Map LOG-IN
 

 


E-Mail Guardian
(email-guardian.com)
Guarding Your E-mail in Ways You Control™*


  On this page you will learn how unwanted e-mail can be stopped. Period!

While we are developing this product it is available for licensing only.

A Short History of Product Development

       For some of us most the fun is in the journey, meaning a new and wonderful product without a history is like celebrating a holiday without telling its tale.

We confess that attempting to solve the e-mail spam problem was never on our mind until about the middle of 2003 when viruses began to spread through many e-mail folders, the news of the ever increasing problems seemed to cry of hopelessness, and we began to experience serious amounts of junk e-mail ourselves. The solution we thought would soon be about - surely there must be a practical solution. Finally, frustrated by not seeing a solution based on what we believed to be the right concept we were determined to find it ourselves, and once committed to the task, it took only a few weeks to develop it. Then we argued about it for several weeks - it just couldn't be this simple, we thought.

As a way to convince ourselves that the solution was truly a good one we began to develop webpages to explain it and compare it to other methods. This was relatively easy to do although time consuming as we were also developing the websites for Budget-Master.com and Safety-Zones®, but the diversion to another product from time to time was fun. (The journey.) Each day the arguments made more sense while Internet news, research and personal experience showed a world of e-mail out of control. Finally, last December 2003, we sent the material to the patent attorney. Along the way we gave it a name befitting its intended future responsibilities.

During the spring of 2004 we hired an e-mail expert to review the concept. He said that he believed the concept to be unique and would work, but questioned its value to those who manage several hundred e-mails a day simply because he thought that the password register would be too time consuming to set up and manage. Since our goal has always been to help the average consumer who manages far fewer e-mails we were not deterred. But we did take his advise and made the password register simpler and easier to use and created useful tools to use it. With these changes, and feedback from our patent attorney that we were not in conflict with the ZoEmail patent, our resolve was strengthened.

Most forms of guarding e-mail and blocking spam try to determine if the e-mail has legitimate content and is therefore probably not spam; this is a very difficult thing to do. It's also very expensive because many skilled people need to be involved in creating methods to screen many words and constantly update the software, in some ways like screening for viruses. And most of these methods don't convert to other languages very well. By contrast, our method of blocking unwanted e-mail uses just one simple password controlled by the e-mail recipient. It's very easy to use, and it converts for use in other languages with ease. (Sorry to put so many e-mail spam-blocking software engineers and programmers out of work.)


Basic (free) Solution

       If you don't want to use a spam blocking program and prefer to look through all your e-mails to find the good one's, try this*: Ask the people who send you e-mail to put a word in the subject line known only to them and you. Simple. Easy. And it works. When you see the word you can believe with some confidence that the e-mail is legitimate. This simple screening method was created a long time ago. But it doesn't block spam or protect you from viruses or spyware entering your Inbox; it just provides a way that's quicker and easier to find the e-mail you want. When you get tired of using this method, because it takes up too much of your time and it still subjects you to too many possibilities of accidentally receiving e-mails with viruses or spyware, use E-Mail Guardian™ because we improved on this method, and help you to block spam from entering your Inbox automatically. There's no magic here. It's just a very effective screening method with practical options on how to use it.

*We are just discussing controlling spam. For full protection you still need to install a firewall and virus protection software.


The E-Mail Guardian™ Solution

You send an e-mail to Alice
with her password = #>
#>   Internet   >>> (spam) >>>
E-Mail Guardian
#>   Alice
 You   <#
E-Mail Guardian
<<< (spam) <<<   Internet   <#
<# = Alice sends an e-mail
to you with your password

Exhibit A

When we said simple .... We meant simple .... And very effective!

       The Password Register controls the use of passwords. Once the Password Register is setup, the receiver's password is sent automatically in e-mail messages to those who are listed. Or it may be included manually in a location we provide or manually in the subject line of an e-mail message. The password is sent and received in the e-mail header (which is not normally seen by anyone) or in the subject line in some situations (which is not normally seen by anyone except the sender and receiver), to prove permission to be accepted. All other e-mails are blocked.

The Password Register also allows you to create as many passwords or personal ID's as you want. This means that you can create different ID's for different reasons. For example, to logically limit the need to manage too many passwords we show you how you can have different ID's for different classes of e-mails - family, friends, business associates, etc.

Process

  E-mail Input  
 E-Mail Guardian 
 Scan for Password & Accept or Reject 
 E-Mail Guardian 

User Screen and Related Controls

1
Family
Friends
Colleagues
Alice
'B Team'
eBay
Job Search
 Trash 
2
.
1
.
.
1
.
1
18
3
gat836
4Tra72
9tch50
39Gm6
Sa3510
endofauction@ebay.com
L7hpe4
.

Exhibit B

Here is a diagram to help you to understand the primary user controls of the process using passwords that relate to the examples in the password register shown below.

In this display we show what your e-mail screen might look like above or below the traditional e-mail display information.

Row 1 shows the category names that you created.

Row 2 shows how the guardian software sorted the e-mails when they arrived - it tells you who the e-mails are from. In this display there are 21 e-mails: one from friends, one from someone on your 'B Team', one from a job search, and 18 that were trashed because they didn't have passwords.

Row 3 shows the passwords you are using and sharing with people in the categories you created. In the unlikely event that you need to change a password you would just do it here and inform the person(s) you wish to inform in your password register by a simple method that we provide or by whatever method you prefer. You have the ability to create as many or as few categories (gateways or guardians) as you wish.

The eBay e-mail address is shown just to reinforce that you can show vendor e-mail addresses as ID's to limit the possibility of the password ending up being shared with affiliates. (This is the password exception rule that confirms the use of the vendor's digital certificate, explained after showing the Password Register - Row G below.)

Small Business Users

Small business users will also find E-Mail Guardian™ useful. Let's see how an attorney might set up his or her e-mail screener.

Process

  E-mail Input  
 E-Mail Guardian 
 Scan for Password & Accept or Reject 
 E-Mail Guardian 

User Screen and Related Controls

1
 Allen10 
Bates13
Collins9
Decker16
 Estes4 
 Olsen2 
Inquiries
 Trash 
2
.
1
.
.
1
1
2
18
3
 10Allen9 
 13Bates8 
 9Collins7 
 16Decker6 
 4Estes5 
 2Olsen1 
 hope2003 
.

Exhibit C

In this display we show what the e-mail screen might look like above (or below) the traditional e-mail display information.

Row 1 shows the client categories the attorney created.

Row 2 shows how the e-mails in his Inbox were sorted when they arrived - it tells him who the e-mails are from. In this display there are 23 e-mails: one from Bates, one from a Estes, and one from Olsen, 2 inquiries, and 18 that were trashed because they didn't have passwords.

Row 3 shows the passwords he is using and sharing with people in the categories he created. If there is a need to change a password he would just do it here and inform the person(s) he wishes to inform, excluding all others. He has the ability to create as many client categories (gateways or guardians) that he wishes to have.

Solving the Web-listed E-mail Address Problem

       Of particular concern is spam coming in through the web-listed e-mail address or Inquiries box, so we will explain how this is handled: When the attorney posts an e-mail address or link on his Website he is opening it to spammers and information crawlers, so a password is used here too. It is a password a special program enters. But the password is of no use to spammers because we change the password automatically at regular intervals so the spammers or information crawlers will not have time to collect and distribute the correct password for use later. If they create programs to sell or use their lists quicker we provide a way to just shorten the time to change the password. A small business version of E-Mail Guardian™ has the ability to change the password at any chosen interval, from about 24 hours to one minute, because it does not need to be remembered for any particular reason or for any needed length of time - it's just for allowing first contact while guarding against the intrusion of spam later.

E-Mail Guardian™ Password Register

(The heart of the process. The 'family jewels'. The engine. The simple thingamajig that makes it work!)

.
Incoming
E-Mail Guardian Password Register
Outgoing
A
My Passwords
Name
E-mail address
Their Passwords
.
.
Family
.
.
B
gat836
Jean
jean27@provider.com
gat836
C
gat836
Mom
Alice56@provider.com
gat836
.
.
Friends
.
.
D
4Tra72
George
georges16@provider.net
M9ae85
E 4Tra72 Kelly . ko2ko10
F
4Tra72
Sarah
happiness43@provider.com
47Gd73
.
.
No Password
.
.
G
endofauction@ebay.com
eBay
support@ebay.com
.

Exhibit D

       Exhibit D shows how you keep track of individual assignments of passwords for both incoming and outgoing E-Mail Guardian™ e-mails. Once entered you do not need to change them unless someone used a password that shouldn't have one. Should this unlikely event happen a password can be changed by way of the master display shown above in Exhibit B, and the selected list of recipients would be sent an e-mail notifying them. In addition, for those that use E-Mail Guardian™ at both ends of the e-mail process, the program is optionally configured to update your new password in the receiver's register automatically, if the receiver so chooses.

A note about creating e-mail passwords. We are showing e-mail passwords that have several letters and numbers, but the truth is that you probably don't need to use long e-mail passwords because passwords are not easy for people to figure out, if they even try (for e-mail). With the English alphabet as a reference, with 26 lowercase and 26 uppercase letters and our numbering system, an alphanumeric password of just 4 characters has (26+26+10)4 = 14,776,336 combinations. So feel free to use short passwords for e-mail as long as they are not words and not easy to guess. For all other forms of security you should continue to use as long a password as is recommended or permitted because thieves may try to use automatic programs to try to get beyond them.

To make the management of passwords even easier, within a group, everyone could also agree to use the same password. In other words, everyone in a family or team or study group or classroom or relatively closed group of any size could just decide to use the same password both ways when communicating with each other, making passwords for some groups very simple to manage. If this were agreed-to for the family above, they would all perhaps use 'gat836' in both My Password and Their Password locations.

Row E. To make a point, Kelly's e-mail message can still be received, even though she is moving and you don't have her new e-mail address, because all she needs to do is to put your password in the subject line to be recognized by E-Mail Guardian™. This is because you don't need her e-mail address to receive her e-mail; she just needs to know yours. And she can still receive your e-mail without a password at another computer if she gives you its e-mail address. Or she could continue to receive spam-free e-mail at a temporary location on a computer with E-Mail Guardian™ if you just enter her temporary e-mail address and use her password in the location provided or in the subject line.

We Create then Solve a Problem

       Under normal circumstances E-Mail Guardian™ does not provide any way that uninvited businesses may enter your e-mail Inbox. If we were to provide a way it would quickly become known to spammers and the method would be compromised, so we do not provide such entry. Each member of the business community is therefore required to 'sell' its reason to have an e-mail password to reach you. We see no problem with this simple logic because E-Mail Guardian™, like the door, was invented to permit privacy and allow entry by invitation only.

With E-Mail Guardian™ in place we create a problem that turns out to be a blessing - we block e-mails from vendors who send us order confirmations by e-mail and don't use this ID system. This is a blessing because we probably wouldn't want them to participate in this method anyway just to prevent the possibility of the password being shared with their 'affiliates', which would permit uninvited e-mail until we changed the ID or stopped using the vendor and deleted the ID. But we have a simple solution, described next.

Row G. The solution to this problem is shown in Row G and also covers the limited situation when others don't have or use a password to be accepted: Since we are not putting any restriction on what the password or identifier (ID) is, in these special cases we simply use the sender's e-mail address as a personal ID in a special password location for this purpose. When we do this, the software recognizes that we are using an e-mail address as a password and instead of a password it requires validation of who the sender is by confirming the sender's unique digital certificate, after the first e-mail from the sender that establishes receipt of the certificate.

Protecting You from Phishing (as in fishing for valuable information from you)

       "The Anti-Phishing Working Group (APWG) is an industry association focused on eliminating the identity theft and fraud that result from the growing problem of phishing and email spoofing. The organization provides a forum to discuss phishing issues, define the scope of the phishing problem in terms of hard and soft costs, and share information and best practices for eliminating the problem. Where appropriate, the APWG will also look to share this information with law enforcement." Their website is antiphishing.org.

On their website they explain phishing attacks as "'spoofed' e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account user names and passwords, social security numbers, etc. By hijacking the trusted brands of well-known banks, online retailers and credit card companies, phishers are able to convince up to 5% of recipients to respond to them."

As reported frequently, companies do not make these kinds of requests, but they rarely explain why, so consumers still have doubts and fall for these tricks. So we will explain. They don't make these kinds of requests because they don't need to. They don't need to because transactions are always completed before you leave their websites, and all companies make regular backups of all their information. But some people never get the message, don't believe this to be true, are easily misled or never understand, because it's hard for them to believe the difference between manual systems with errors made by people and who sometimes lose information and computer systems that don't make mistakes. They just don't believe or understand how fast, accurate and thorough, computer systems are, but it's very true - computers are great machines that don't make mistakes!

The point we want to make is that you should not respond to any e-mail that makes this kind of request, and by using E-Mail Guardian™ the possibility of you being 'phished' is almost zero because every company that you receive e-mail from needs your permission because you need to give each sender a password to enter 'your personal space'.

But, what if? Okay! With E-Mail Guardian™ we offer you the opportunity to take the safety process one step further, if you wish, and you also use Safety-Zones® (see identity theft protection below). Users of Safety-Zones® may request (by a simple click within E-Mail Guardian™) that each provider company that is requesting information from you (in an e-mail directly or at a website it is asking you to visit) to 'direct' a simple password to come to you in a separate e-mail as proof of a valid request that you had previously imbedded into the Safety-Zones® identification system (and that you control right on your computer). The provider company would never see this password itself but only have the ability to direct it to you, as proof that the company is real and honest, if it's an authorized Safety-Zones® provider company.

Getting Started & E-Mail Rejection Notices

       E-Mail Guardian™ is perfect for most people. But if you manage a large number of e-mail addresses we help to make the transition to E-Mail Guardian™ easy by providing you a simple to use selection and transfer routine that copies multiple e-mail addresses to the password record-keeping register.

Getting started and having concerns about notifying everyone about your use of E-Mail Guardian™ is legitimate until you discover how easy it is to use. Our approach is, don't worry, it will all fall into place. To setup the password register you would: a) add e-mail addresses to the register the way you want to group them and then assign passwords to each group or person; b) send everyone a short message asking them to use your password from now on (either in the box we provide or in the subject line). It's that simple. We make sending these messages easy by providing you the ability to send everyone in the group an e-mail with the password. If you don't know someone's e-mail address yet and he or she needs to be told verbally that's fine too. It's just that simple.

Okay. Now what? You wait to see what will happen. Surprise! Everyone seems to be using your password. Wow! It works! Well, almost. If someone listed in your password register forgets because s/he is not yet using E-Mail Guardian™ and an e-mail message is rejected because it did not contain a password we will have the program send the sender a rejection notice that says, 'Sorry. Your e-mail was rejected because it did not contain a password.' We do this because the e-mail could also be a spoof. We do not send an e-mail rejection message to any other sender because most e-mails that are rejected will be spam and will therefore not be received by the sender and will be returned as undeliverable, then blocked without a password creating more return notices, endlessly.

When others realize how good E-Mail Guardian™ is or can be they will use it too, and when they send you their passwords you would just enter them in the register. In fact, when others begin to send you e-mail requesting that you use their passwords the E-Mail Guardian™ Password Register is the only practical place to store them. Spam is probably here to stay. With E-Mail Guardian™ you are in control. But you have choices. This is our simple and very effective solution. If everyone used it the only place that spam would have to go is directly to the trash.

Extending Your Life (!)

       If using E-Mail Guardian™ seems like it would be too much work because until now the people in the world of computers have done everything for you. Our response is that this is no accident; it's done this way on purpose so that the people in the world of computers can remain in control of what you see. If you want to be in control you need to install your own door yourself! E-Mail Guardian™ will probably be the best $30 you every spent because it will put you in control of spam! And from this: a) your computer should last longer for reasons we haven't figured out yet but we will; b) you should derive great pleasure from being in control and getting rid of this pest - a 'twofa'; c) your pleasure should produce good endorphins (good proteins in your brain); d) and your good endorphins should help to extend your life!! Imagine! We are providing a $30 product that might increase your life span!

What should I do with my Address Book?

       Because of the susceptibility of conventional e-mail address books to hijacking by hidden self-loading programs we do not recommend that you continue to store e-mail addresses there, and with E-Mail Guardian™ you do not need to. So, except for supporting services like ZoEmail, which needs to screen e-mails with its own passwords for viruses because of the address book problem, your address book should be used for more conventional purpose like postal addresses, telephone numbers, birthdays, etc.

Our Solution Creates a Final Problem that we Solve

       A final problem that we create with E-Mail Guardian™ is a psychological one, much like that of being the victim of a crime that has suddenly been released and is now unsure of what to do because you have been harassed by spam for so long that it has in some ways become a part of your life. So the problem we create for you could be one of silence and disconnect because your e-mail Inbox will no longer chime with the presence of daily junk mail that you need to sort through and discard. To help solve this problem we will invoke our own sense of pleasure by providing you a second chime, this one applied to the transfer to your trash so you can take pleasure in listening to spam automatically pass through E-Mail Guardian™ on its way to oblivion. Bon voyage! And to ease whatever withdrawal problems you may have from this lack of unwanted 'communication' we will provide you an on-off switch so you can reexperience junk e-mail whenever you want until you can readjust to a normal life. This will also help to prove to you that E-Mail Guardian™ really works.

Product Limitations

       We are sorry, as currently configured E-Mail Guardian™ is not compatible with e-mail services that use a custom or proprietary e-mail system, free or paid, because there is no separate program, like Outlook or Outlook Express, that we can work with, because the entire service itself is the program and we don't have access to the software we need to interface with. We, however, will try to work with these providers so that they can integrate E-Mail Guardian™ into their systems.


Simple to understand, quick to setup and easy to use. A user-friendly process with few restrictions. E-Mail Guardian™ proves that good solutions can also be simple ones.

 

 

 

 
 
Home FAQ's About Compare Versions Purchase Our Process Licensing Contact Us Helpful Links Legal Privacy About Us Zone Map LOG-IN
  E-mail Guardian™ does not generate popups or popunders, host advertising or originate email.   |   *The best we can provide them™  
. E-mail Guardian™ is Patent Pending . Copyright © 2004-2007 RSMC   All Rights Reserved .
The mission of RSMC is to improve the quality of life, to encourage new ways of thinking, and to promote positive change in education, business and society