System and method for pushing information from a host system to a mobile data communication device
First Claim
1. A method of replicating data items in real time between a host system and a mobile device, comprising the steps of:
- establishing a set of data items in both the host system and the mobile device to be replicated over a wireless network;
configuring one or more replication events at the host system, wherein the one or more replication events include an internal event that is generated by the host system;
detecting the occurrence of the one or more replication events;
in response to the occurrence of the one or more replication events, continuously replicating changes in the set of data items between the host system and the mobile device by immediately transmitting, in real-time, replication information between the host system and the mobile device via the wireless network, wherein the set of data items in the host system and mobile device is a set of email messages, and the replication information includes copies of the email messages;
receiving the copies of email messages at the mobile device;
generating reply messages at the mobile device to be sent to a plurality of message senders and transmitting the reply messages to the host system;
receiving the reply messages at the host system and configuring address information of the reply messages such that the reply messages use a first address associated with the host system as the originating address, wherein messages generated at either the host system or the mobile device share the first address; and
transmitting the reply messages from the host system to the plurality of message senders;
wherein the host system is an office computer system.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for pushing information from a host system to a mobile data communication device upon sensing a triggering event is disclosed. A redirector program operating at the host system enables a user to continuously redirect certain user-selected data items from the host system to the user'"'"'s mobile data communication device upon detecting that one or more user-defined triggering events has occurred. The redirector program operates in connection with event generating applications and repackaging systems at the host system to configure and detect a particular user-defined event, and then to repackage the user-selected data items in an electronic wrapper prior to pushing the data items to the mobile device.
504 Citations
75 Claims
-
1. A method of replicating data items in real time between a host system and a mobile device, comprising the steps of:
-
establishing a set of data items in both the host system and the mobile device to be replicated over a wireless network;
configuring one or more replication events at the host system, wherein the one or more replication events include an internal event that is generated by the host system;
detecting the occurrence of the one or more replication events;
in response to the occurrence of the one or more replication events, continuously replicating changes in the set of data items between the host system and the mobile device by immediately transmitting, in real-time, replication information between the host system and the mobile device via the wireless network, wherein the set of data items in the host system and mobile device is a set of email messages, and the replication information includes copies of the email messages;
receiving the copies of email messages at the mobile device;
generating reply messages at the mobile device to be sent to a plurality of message senders and transmitting the reply messages to the host system;
receiving the reply messages at the host system and configuring address information of the reply messages such that the reply messages use a first address associated with the host system as the originating address, wherein messages generated at either the host system or the mobile device share the first address; and
transmitting the reply messages from the host system to the plurality of message senders;
wherein the host system is an office computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
establishing a bi-directional secure link between the host system and the mobile device over the wireless network prior to transmitting replication information between the host system and the mobile device.
-
-
4. The method of claim 3, wherein the step of establishing a bi-directional link further comprises the step of:
providing an encryption module at the host system for encrypting the replication information prior to transmission, and a corresponding decryption module at the mobile device for decryption the replication information, wherein the replication information remains encrypted until at the mobile device.
-
5. The method of claim 4, wherein the step of establishing a bi-directional link further comprises the steps of:
-
providing a packaging module at the host system for packaging the replication information into electronic envelopes addressed using an electronic address of the mobile device associated with the wireless network; and
providing an unpackaging module at the mobile device for extracting the replication information from the electronic envelopes.
-
-
6. The method of claim 5, wherein the step of establishing a bi-directional link further comprises the steps of:
-
providing a data compression module at the host system for compressing the replication information prior to replication; and
providing a data decompression module at the mobile device for decompressing the compressed replication information, wherein the replication information remains encrypted and compressed until received at the mobile device.
-
-
7. The method of claim 6, further comprising the step of:
storing configuration information regarding the mobile device at the host system.
-
8. The method of claim 7, wherein the configuration information stored at the host system includes:
-
the network address of the mobile device; and
an indication of the types of attachments that the mobile device can receive and process.
-
-
9. The method of claim 8, wherein the configuration information further includes:
an indication of the type of mobile device.
-
10. The method of claim 7, further comprising the steps of:
-
for each data item to be replicated, the host system determining whether the data item includes an attachment, and if so, then determining the type of attachment;
accessing the stored configuration information at the host system to determine whether the mobile device can receive and process attachments of the determined type; and
if so, then transmitting replication information regarding the attachments to the mobile device, and if not, then transmitting replication information regarding the attachments to a device that is capable of processing the attachment.
-
-
11. The method of claim 10, wherein the type of attachment is a sound file.
-
12. The method of claim 1, wherein the one or more replication events include networked events generated by a device coupled to the host system via a computer network.
-
13. The method of claim 12, wherein the networked events include messages to begin replication from computer systems other than the mobile device, which are connected to the host system via a wired network.
-
14. The method of claim 1, wherein the internal event is a calendar alarm.
-
15. The method of claim 1, wherein the internal event is a screen saver activation.
-
16. The method of claim 1, wherein the internal event is a keyboard timeout signal.
-
17. The method of claim 1, wherein the mobile device is a pager.
-
18. The method of claim 1, wherein the mobile device is a device equipped to receive both voice and non-voice data messages.
-
19. The method of claim 1, wherein the host system includes a preferred list for limiting the replicating step to transmitting replication information only for those data items that are associated with a sender on the preferred list.
-
20. The method of claim 19, wherein a user can add and subtract senders from the preferred list.
-
21. The method of claim 19, wherein the user can add and subtract senders from the preferred list by configuring the host system.
-
22. The method of claim 19, wherein the user can add and subtract senders from the preferred list by transmitting a command message from the mobile device to the host system.
-
23. The method of claim 19, wherein the preferred list is activated and deactivated at the host system.
-
24. The method of claim 19, wherein the preferred list is activated and deactivated by a command message transmitted from the mobile device to the host system.
-
25. A method of replicating data items in real time between a host system and a mobile device, comprising the steps of:
-
establishing a set of data items in both the host system and the mobile device to be replicated over a wireless network;
configuring one or more replication events at the host system, wherein the one or more replication events include an internal event that is generated by the host system;
storing configuration information regarding the mobile device at the host system;
detecting the occurrence of the one or more replication events;
in response to the occurrence of the one or more replication events, continuously replicating changes in the set of data items between the host system and the mobile device by immediately transmitting, in real-time, replication information between the host system and the mobile device via the wireless network, for each date item to be replicated, the host system determining whether the data item includes an attachment, and if so, then determining the type of attachment;
accessing the stored configuration information at the host system to determine whether the mobile device can receive and process attachments of the determined type; and
if so, then transmitting replication information regarding the attachments to the mobile device, and if not, then transmitting replication information regarding the attachments to a device that is capable of processing the attachment;
wherein the host system is an office computer system. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48)
establishing a bi-directional secure link between the host system and the mobile device over the wireless network prior to transmitting replication information between the host system and the mobile device.
-
-
28. The method of claim 27, wherein the step of establishing a bi-directional link further comprises the step of:
providing an encryption module at the host system for encrypting the replication information prior to transmission, and a corresponding decryption module at the mobile device for decryption the replication information, wherein the replication information remains encrypted until at the mobile device.
-
29. The method of claim 28, wherein the step of establishing a bi-directional link further comprises the steps of:
-
providing a packaging module at the host system for packaging the replication information into electronic envelopes addressed using an electronic address of the mobile device associated with the wireless network; and
providing an unpackaging module at the mobile device for extracting the replication information from the electronic envelopes.
-
-
30. The method of claim 29, wherein the step of establishing a bi-directional link further comprises the steps of:
-
providing a data compression module at the host system for compressing the replication information prior to replication; and
providing a data decompression module at the mobile device for decompressing the compressed replication information, wherein the replication information remains encrypted and compressed until received at the mobile device.
-
-
31. The method of claim 30, further comprising the step of:
storing configuration information regarding the mobile device at the host system.
-
32. The method of claim 31, wherein the configuration information stored at the host system includes:
-
the network address of the mobile device; and
an indication of the types of attachments that the mobile device can receive and process.
-
-
33. The method of claim 32, wherein the configuration information further includes:
an indication of the type of mobile device.
-
34. The method of claim 25, wherein the set of data items in the host system and mobile device is a set of email messages, and the replication information includes copies of the email messages, the method further comprising the steps of:
-
receiving the copies of email messages at the mobile device;
generating reply messages at the mobile device to be sent to a plurality of message senders and transmitting the reply messages to the host system;
receiving the reply messages at the host system and configuring address information of the reply messages such that the reply messages use a first address associated with the host system as the originating address, wherein messages generated at either the host system or the mobile device share the first address; and
transmitting the reply messages from the host system to the plurality of message senders.
-
-
35. The method of claim 25, wherein the one or more replication events include networked events generated by a device coupled to the host system via a computer network.
-
36. The method of claim 35, wherein the networked events include messages to begin replication from computer systems other than the mobile device, which are connected to the host system via a wired network.
-
37. The method of claim 25, wherein the internal event is a calendar alarm.
-
38. The method of claim 25, wherein the internal event is a screen saver activation.
-
39. The method of claim 25, wherein the internal event is a keyboard timeout signal.
-
40. The method of claim 25, wherein the mobile device is a pager.
-
41. The method of claim 25, wherein the mobile device is a device equipped to receive both voice and non-voice data messages.
-
42. The method of claim 25, wherein the host system includes a preferred list for limiting the replicating step to transmitting replication information only for those data items that are associated with a sender on the preferred list.
-
43. The method of claim 42, wherein a user can add and subtract senders from the preferred list.
-
44. The method of claim 43, wherein the user can add and subtract senders from the preferred list by configuring the host system.
-
45. The method of claim 43, wherein the user can add and subtract senders from the preferred list by transmitting a command message from the mobile device to the host system.
-
46. The method of claim 42, wherein the preferred list is activated and deactivated at the host system.
-
47. The method of claim 42, wherein the preferred list is activated and deactivated by a command message transmitted from the mobile device to the host system.
-
48. The method of claim 25, wherein the type of attachment is a sound file.
-
49. A method of replicating data items in real time between an office computer system and a mobile communications device, comprising the steps of:
-
establishing a set of data items in both the office computer system and the mobile communications device to be replicated over an Internet communications network coupled to a wireless communications network operable with the mobile communications device;
configuring one or more replication events at the office computer system;
detecting the occurrence of the one or more replication events;
in response to the occurrence of the one or more replication events, replicating changes in the set of data items between the office computer system and the mobile communications device by immediately transmitting, in real-time, replication information between the office computer system and the mobile communications device via the wireless network, wherein the data items in the office computer system and the mobile communications device include a set of calendar messages, and the replication information includes copies of the calendar messages;
receiving the copies of the calendar messages at the mobile communications device;
generating reply calendar messages at the mobile communications device to be sent to a plurality of calendar message senders and transmitting the reply calendar messages to the office computer system;
receiving the reply calendar messages at the office computer system;
storing the reply calendar messages at the office computer system;
wherein address information of the reply calendar messages includes a first address associated with the office computer system and the mobile communications device, the first address indicating that the reply calendar messages originated from a mailbox account address; and
transmitting the reply calendar messages from the office computer system to the plurality of calendar message senders. - View Dependent Claims (50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75)
establishing a bi-directional secure link between the office computer system and the mobile communications device over the wireless network prior to transmitting replication information between the office computer system and the mobile communications device.
-
-
52. The method of claim 51, further comprising the steps of:
-
generating an encryption key for the mobile communications device; and
storing the encryption key at the office computer system.
-
-
53. The method of claim 52, wherein the step of establishing a bi-directional link further comprises the steps of:
-
providing a packaging module at the office computer system for packaging the replication information into electronic envelopes addressed using an electronic address of the mobile communications device associated with the wireless network; and
providing an unpackaging module at the mobile communications device for extracting the replication information from the electronic envelopes.
-
-
54. The method of claim 53, wherein the step of establishing a bi-directional link further comprises the steps of:
-
providing a data compression module at the office computer system for compressing the replication information prior to replication; and
providing a data decompression module at the mobile communications device for decompressing the compressed replication information, wherein the replication information remains encrypted and compressed until received at the mobile communications device.
-
-
55. The method of claim 54, further comprising the step of:
storing configuration information regarding the mobile communications device at the office computer system.
-
56. The method of claim 55, wherein the configuration information stored at the office computer system includes:
-
the network address of the mobile communications device; and
an indication of the types of attachments that the mobile communications device can receive and process.
-
-
57. The method of claim 56 wherein the configuration information further includes:
an indication of the type of mobile communications device.
-
58. The method of claim 55, further comprising the steps of:
-
for each data item to be replicated, the office computer system determining whether the data item includes an attachment, and if so, then determining the type of attachment;
accessing the stored configuration information at the office computer system to determine whether the mobile communications device can receive and process attachments of the determined type; and
if so, then transmitting replication information regarding the attachments to the mobile communications device.
-
-
59. The method of claim 49, wherein the type of attachment is a sound file.
-
60. The method of claim 51, wherein the step of establishing a bi-directional link further comprises the step of:
providing an encryption module at the office computer system for encrypting the replication information prior to transmission, and a corresponding decryption module at the mobile communications device for decryption the replication information, wherein the replication information remains encrypted until at the mobile communications device.
-
61. The method of claim 49, wherein the one or more replication events include networked events generated by a device coupled to the office computer system via a computer network.
-
62. The method of claim 49, wherein the one or more replication events include an internal event generated by the office computer system.
-
63. The method of claim 62, wherein the internal event is a calendar alarm.
-
64. The method of claim 62, wherein the internal event is a screen saver activation.
-
65. The method of claim 62, wherein the internal event is a keyboard timeout signal.
-
66. The method of claim 49, wherein the mobile communications device is a pager.
-
67. The method of claim 49, wherein the mobile communications device is a device equipped to receive both voice and non-voice data messages.
-
68. The method of claim 49, wherein the office computer system includes a preferred list for limiting the replicating step to transmitting replication information only for those data items that are associated with a sender on the preferred list.
-
69. The method of claim 68, wherein a user can add and subtract senders from the preferred list.
-
70. The method of claim 69, wherein the user can add and subtract senders from the preferred list by configuring the office computer system.
-
71. The method of claim 69, wherein the user can add and subtract senders from the preferred list by transmitting a command message from the mobile communications device to the office computer system.
-
72. The method of claim 68, wherein the preferred list is activated and deactivated at the office computer system.
-
73. The method of claim 68, wherein the preferred list is activated and deactivated by a command message transmitted from the mobile communications device to the office computer system.
-
74. The method of claim 49, wherein the step of replicating changes in the set of data items between the office computer system and the mobile communications device is continuous.
-
75. The method of claim 49, wherein the mobile communications device is a mobile phone with data messaging capabilities.
Specification