摘要 |
<p>A method and apparatus to protect a master do-not-email list from being compromised. A set of one or more false email addresses that each point to an email account that is not used for any email is created for a client and is unique to the client. An encryption scheme is applied to the set of false email addresses. The encrypted false email addresses for the client are recorded on the master do-not-email list, which also includes multiple encrypted real email addresses that each correspond to a real email address that point to an email account that is used for real email and does not wish to be contacted. A client do-not-email list is seeded for the client with the encrypted real email addresses and the encrypted false email addresses. The email accounts corresponding to the set of false email addresses are monitored for received email messages, where email messages received at one of the set of email accounts is an indication that the client should be investigated to determine potential liability.</p> |