Secure safe sender lists are described. In an implementation, a method includes examining a message received from a sender via a network to determine which identifying mechanisms are available for verifying an identity of the sender. When one or more available identifying mechanisms are deemed sufficient to verify the identity, a description of the identity and a description of the one or more said available identifying mechanisms are added to a safe senders list.

 
Web www.patentalert.com

< Arrangement for generating extreme ultraviolet radiation from a plasma generated by an energy beam with high conversion efficiency and minimum contamination

> Enhanced wellbore electrical cables

> System and process for manufacturing custom electronics by combining traditional electronics with printable electronics

~ 00548