1. Field of the Invention
The invention relates to a system for managing messages and message attachments to limited capacity devices, and in particular to limited capacity wireless telephones.
2. Description of the Related Art
As wireless technologies proliferate, the number and types of devices which utilize such technologies grows at an ever-increasing rate. Although personal computers increasingly use wireless networks, devices which connect to wireless networks are more commonly ones with much more limited processing and memory capacity. Such limited capacity processing devices include PDAs, handheld computers, and mobile telephones. Though limited in power, users nevertheless demand an increasing number of features from such devices. Even wireless telephones have become more powerful with the inclusion of such features as address books, calendars and games. Many now include microprocessors, operating systems and memory which developers to provide limited applications for the phones.
Wireless phones have long been able to read messages via a Wireless Access Protocol (WAP) browser. In this type of system, the user on a wireless telephone connects via the wireless network to a server which enables the phone to read WAP enabled content. Most providers enable a user to access an email message account via the WAP browser, and/or provide short message service (SMS) messages directly to the user's phone. While useful, business users require access to their main email account, and the ability to respond from that account. For example, while an employee of Microsoft will have an address of employee@microsoft.com, the wireless phone message may not be available to connect to Microsoft's mail server to allow the user to access his business message at microsoft.com.
Other devices, which have been combined with wireless phones, such as Research In Motion's Blackberry device, provide a user with enhanced message capabilities and attachment handling. These devices are specifically configured to provide contact and message applications over a wireless network. In general, message received at a user's client computer or message server is forwarded via an agent on the server to the user's Blackberry device. Some provision for handling attachments is provided in a proprietary binary format. See. “Attachment Service”, (http://www.blackberry.com/products/pdfs/WPE-00024-001-attachment service.pdf) Research in Motion White Paper, Research In Motion Limited, Copyright 2003.
The Blackberry solution is only available on certain types of wireless networks. The variety of different types of wireless phones makes the Research In Motion solution somewhat limited.
SMS allows users to receive abbreviated text messaging directly on the phone. Messages can actually be stored on the phone, but the storage available is limited to a very small amount of memory. In addition, no provision for handling attachments in SMS is available.
With the numerous different types of wireless phones and other communications devices available, a system which will enable a user to accurately manage their own business message account would be highly advantageous if accessible through a wireless phone.
The invention, roughly described comprises a system for managing email or other messaging and attachments to messages which are forwarded to devices having limited processing and memory capacity. In one embodiment, the system is designed for use with a synchronization system such as that described in U.S. Pat. No. 6,694,336 wherein the synchronization system accesses the user's message via any number of methods. In an alternative embodiment, the system of the present invention works in conjunction with a mail server directly. Through the system, a user can specify which messages are sent to the device during a sync (or other message access mechanism) and reduce or eliminate certain content. The user can also manipulate messages by, for example, retrieving, forwarding or faxing any eliminated or truncated content upon request. The user's point of connection is preserved by the present invention during message operations such as replying, forwarding and composing messages. In a further aspect, the Read/Unread status of a particular message is propagated to all devices in a user's personal information space. Messages delivered by the system have the message body reformatted if required to allow the message to be displayed on target device. In addition, large messages and attachments can be streamed to locally attached devices.
In one aspect, the invention is a method for management of messaging for devices having a limited processing capacity. The method includes the steps of: receiving a user configuration categorizing messages for the user by elements of the message; accessing the user message datastore upon receipt of at least one new message for the user to a user data store; comparing said at least one new message to a set of user specific rules; rendering a message summary including at least one link accessible by the processing device, the link enabling action with respect to the message when selected by the user; and outputting the message summary to a user device.
In a further aspect, the invention comprises a system including a user preferences dataset, including user device information and the user rule set. The system further includes a filtering engine including a rule set for providing messages to a user; and a user message datastore access engine, retrieving messages from a user's messaging service and providing the message to the filtering engine. A rendering engine is provided which is responsive to the filtering engine, the rendering engine converting messages into a limited capacity device readable format based on the user device information, and rendering a summary message indicating the state of messages received since a triggering event. A session manager retrieves messages from a message datastore, provides the messages to the filtering engine, and outputs messages to a user device.
In yet another aspect, the invention is a method of managing messages for limited capacity processing devices. The method includes the steps of: receiving a new message designated for a user; accessing a user configuration including a device configuration profile and at least one message handling rule; comparing the message to said at least one message handling rule; and outputting a summary message to the limited capacity device indicating a status of said at least one new message received, the summary message including at least one link enabling an action with respect to the message.
The present invention can be accomplished using hardware, software, or a combination of both hardware and software. The software used for the present invention is stored on one or more processor readable storage media including hard disk drives, CD-ROMs, DVDs, optical disks, floppy disks, tape drives, RAM, ROM or other suitable storage devices. In alternative embodiments, some or all of the software can be replaced by dedicated hardware including custom integrated circuits, gate arrays, FPGAs, PLDs, and special purpose computers.
These and other objects and advantages of the present invention will appear more clearly from the following description in which the preferred embodiment of the invention has been set forth in conjunction with the drawings.
The invention will be described with respect to the particular embodiments thereof. Other objects, features, and advantages of the invention will become apparent with reference to the specification and drawings in which:
The invention comprises a system for managing email, or other messaging, and attachments to messages which are forwarded to devices having limited processing and memory capacity. The message management system processes attachments and messages in accordance with a set of user settings defined for the system. The message management system of the present invention provides a number of unique features to a user of a limited capacity processing device. In one embodiment, the system is designed for use with a synchronization system such as that described U.S. Pat. No. 6,694,336 wherein the synchronization system accesses the user's message via any number of methods. In an alternative embodiment, the system of the present invention works in conjunction with a mail server directly and no separate sync system is required.
Using the system, a user can specify which messages are sent to the device during message delivery to the device, either through an agent operating on the device which renders email on the device, or during a sync via a sync agent (or other message access mechanism). This allows the user to reduce or eliminate certain content, optimizing use of the device's limited storage and processing capacity. The user can also manipulate messages by, for example, retrieving, forwarding or faxing any eliminated or truncated content upon request. The user's point of connection is preserved by the present invention during message operations such as replying, forwarding and composing messages. In a further aspect, the Read/Unread status of a particular message is propagated to all devices in a user's personal information space. Messages delivered by the system have the message body reformatted if required to allow the message to be displayed on target device. In addition, large messages and attachments can be streamed to locally attached devices.
In further embodiments, rule based manipulation of messages and interaction events automates the user's interactive experience using the limited processing device. Messages may be summarized, filtered, downloaded or otherwise manipulated (or passed through to the device) in a manner specified by the user.
As used herein, “personal information space” is a data store of information customized by, and on behalf of the user which contains both public data the user puts into their personal space, private events in the space, and other data objects such as text files or data files which belong to the user and which are manipulated by the user. The personal information space is defined by the content which is specific to and controlled by an individual user, generally entered by or under the control of the individual user, and which includes “public” events and data, those generally known to others, and “private” events and data which are not intended to be shared with others. It should be recognized that each of the aforementioned criteria is not exclusive or required, but defines characteristics of the term “personal information space” as that term is used herein. In this context, such information includes electronic files such as databases, text files, word processing files, and other application specific files, as well as contact information in personal information managers, PDAs and wireless phones. The personal information space may be contained on one or more physical devices, such as personal computers, wireless phones, personal digital assistants, and other limited capacity processing devices.
In order to implement the system of the present invention, a user configuration is created. The configuration contains the user's preferences on how the user wishes to handle messages, the type of limited capacity device the user has, the type of message system in use, whether the user uses a synchronization system and the like.
Initially, a user must provide this configuration information to the system. In one embodiment, the system may be provided as a service by a system administrator and the user begins using the system by signing-up for system service.
The user's account can also be preconfigured, for example by the system administrator or the mobile carrier or on the phone by the manufacturer.
In step 104, the user makes the decision as to whether or not the user wishes to set their own configuration or use a default configuration. In addition to the user's operational preferences and requirements, the user can set rules and preferences on how messages directed to the user are handled. A default configuration may provide a number of standard filters for spam messages or for large attachments, for example. If the user chooses to set his own configuration, then at step 106 the user proceeds through a configuration process. This may include specifying up specific rules, answering questions and assigning preferences for the system to use in evaluating how to handle large messages and message attachments, messages from a particular user or group of users, and filtering characteristics such as subject or message keywords. If the user decides not to use a specific user configuration, then at step 108 a default configuration for the user is assigned. In a further embodiment, no user interaction is required during the setup phase.
Portions of the process of step 106 may be implemented by providing the user with a set of interface screens on a computer during the set-up process.
Shown in
The lower half of
As explained below, there are numerous ways the system gains access to a user's email. The system can be configured to access messages immediately upon receipt, or upon some other triggering event, such as a sync process being implemented. In either case, rule 270 would only provide a notification once access to the messages has been accomplished by the system.
In a further aspect, the intelligence features of co-pending patent application Ser. No. 10/704,433 entitled “Personal Information Space Management System and Method”, assigned to the assignee of the present application, the contents of which are specifically incorporated herein by reference, are utilized. This application describes a method for intelligently filtering messages and personal information in a communication system. Features of the system described therein may be incorporated and combined with those of the system of the present invention to provide a more complete user experience.
In the system of application Ser. No. 10/704,433, the user is provided with a number of options to process messages according to a user or system defined rating system using information culled from the messages or the user's personal information space, may be used to catalog messages into containers such as “Urgent”, “Normal”, “Meeting Requests” and “other”. Additional embodiments of the system implement this and other features in conjunction with the message delivery features described above.
In one embodiment of the present invention, email received by a user is broken into a series of collections such as “Urgent”, “Standard (Normal)”, “Meeting Requests” and “other”. The collections are governed by user configurable options. The user may add additional collections as required, or allow the system to provide default collections. System provided default rules allow the user to immediately use the system with the default collections. For example, a default spam email rule may define that spam email is prohibited from being transmitted to the user's client device.
In one example, default settings for a person to be classified in a “normal” collection are that the sender belongs to one's home domain, the sender is found in the user's address book, a copied recipient is in the user's address book, the sender is found in the user's sent items folder, or the message is marked as urgent. The “urgent” rule defaults may promote items to Urgent when, for example, an item in the “normal” collection is market or flagged urgent, when the sender is in a user defined list of VIP senders, or when a member of a VIP list is copied as a recipient.
Returning to
In step 118, messages meeting the configuration profile may be forwarded to a viewing device. Alternatively, a summary of the messages may be forwarded to the user device, enabling the user to call additional functions to manage messages in accordance with the teachings herein.
In each of the embodiments described below, the system of the present invention scans the user's datastore for new messages or, alternatively, receives notification that new message has arrived through some source. When new message is detected, the server initiates a system session with the user's limited capacity processing device. Generally, the first step of this process is to gather the new message. This may require decrypting change logs in the case of a system using the synchronization system of U.S. Pat. No. 6,694,336 or may simply involve enumerating the message form an email server. A list of message data is retrieved, including: the sender of message, the recipients of message, the size of message, the number, size, and type of message attachments; the subject of message and the message body content.
Once the complete set data for the new message has been determined, the system stores this information in a cache and passes control to a filtering engine. This engine uses the user's configuration preferences or rule set to determine which message to send to the user's limited capacity processing device. If none of the messages is eligible for processing, the process stops. If a message passes the filter, the process begins the delivery stage of the procedure.
Also shown in
In the system shown in
The process and functions of the various components of
Initially, a message enters the system for processing at step 710. As noted above, the message may be a new message received by a user. Messages may be detected by determining a message has entered the user's mail server directly and/or by performing a sync process in accordance with U.S. Pat. No. 6,694,336. The sync initiating event may be an automated or manually initiated sync triggering event. In this embodiment, the system utilizes a synchronization system such as that described in U.S. Pat. No. 6,694,336. Operation in the steps of
When a message is detected at step 710, user preferences are retrieved at step 715 from the user preferences database 620. The preferences are configured in the user preferences database 610 via the preferences configuration UI 605. User preferences may include a mail or sync system access password and a digital identifier, such as a private PGP key or digital certificate used to decrypt encrypted email. An initial user preference may be a filter which determines when a user is notified of an email receipt. For example, a user may choose to be notified of all emails as soon as they arrive, or only on timed intervals. If the system passes this initial preferences notification determination, the method proceeds at step 720. At step 720, the new message is accessed and stored. Access to the new message may require decrypting the message and storing it in a user cache during step 720. In a sync system, it may require decrypting and manipulating change logs as described in U.S. Pat. No. 6,694,336. The sync session cache 650 stores the message for this particular step. Alternatively, where direct access to an email server is utilized, step 720 may simply require providing the user's access password to the email server to retrieve the mail for processing as described below. PGP and/or digital certificate decryption of the message itself may be provided at this step.
At step 725, the mail is filtered in accordance with the user filter preferences stored in the preferences database 610 as established by the user as described above. At step 730, if one or more messages passes the filter, the following steps in the diagram shown in
In the following steps, based on the message content that passed the filter, the system formats a new email or a “new mail notification” message to be sent to the device. This message is generated using the device-specific configured renderer (for example, a WAP renderer, or in the case of a device with a system client, a system specific renderer). The message content depends on the user's configuration and includes information such the number and types of messages (VIP, Standard, Other). In the case of the WAP renderer, the message may include links for each message category—in the URL of the link (hidden from the user) are parameters that identify the sync session. In the case of a system enabled client, the communications protocol may contain this information. Additionally, the specific capabilities of the user's device are considered when rendering the page. These capabilities are maintained in a database; the user's account includes a link to one of these fields (or, alternately, a custom set of capabilities)
To complete these tasks, at step 735, a new user session is created by the system engine 740. The user session is a persistent container for all actions with the user during a particular time period. Each session is assigned a session ID which, in one embodiment, is built into communications with the user and messages stored in the system cache. At step 740, the proper renderer for the message and/or attachment to the message is created. If the message is to be provided for a WAP phone, the system or renderer creates a WAP renderer. The type of renderer required for the particular device 400 will be stored in the device capabilities database 670. For example, if the device is a WAP phone, it will be necessary for system engine 440 to know that the device includes a WAP phone. Alternative configurations can provide message and attachments to the limited processing device 400 using a binary format which can be decrypted by the system phone agent 420. Any number of different protocols and communication schemes may be utilized in accordance with the present invention. Next, returning to
At step 760, rendered message is provided to a user. The message provided at step 760 may take a number of forms. It may be the message itself, or may be a summary message indicating the status of all messages processed by the system. The renderer, using the user's preferences for number of bytes to preview and other settings, composes the message and the server transmits it to the device.
An example of an entire message is shown in
Alternatively, the system of the present invention may provide summaries of the messages, or an alert screen.
Returning to the method of
At step 770, the system engine determines the session by using the sessionID and renders a response to the command instruction to the renderer at step 775. The renderer will return a response at step 780 and the rendered response will be returned to the limited capacity processing device at step 785. This will continue in accordance with the actions of the user and for any number of messages at step 710 and link selections at step 765 until a time out when the user session is terminated at step 790. A session clean-up process may be used to free any resources required by the user session at this step.
A user may click on a linked portion of the message preview such as the name of the sender to retrive a particular message. Using the same system described above, the request returns to the server and is handled by the renderer utilizing state information maintained by the Sync Session Manager. The details of how the message is rendered, such as whether or not attachments are included (or some threshold for attachment size, etc) whether or not to embed pictures, etc, are controlled by the user's preferences.
User names 925, 935 may be implemented as linds and returned to the system as commands at step 765, as a user navigates about screen 820 in accordance with the particular functions of phone 810. When a user selects a particular message or name such as name 925, a full message contains shown in
As noted above,
In the system of the present invention shown in
As shown in
The present invention leverages a user's network connected limited processing device to provide meaningful access to the user's message.
Sending message whether by forwarding, replying, or creating is supported in a manner as to allow the point of connection of the sender to be preserved. In this case, the term “point of connection” refers to the user's relational identity to the communication medium. For example, email may be created and sent as though a user is using their work email connection, while they are in fact using their phone connection via the system of the present invention.
Point of connection preservation can be accomplished in a number of ways. The message application on the client device can simply store outbound message in its outbox and let the sync process utilized in U.S. Pat. No. 6,694,336 to sync that message to the outbox of the usual message sending device, such as the PC. The message will then be sent in the normal manner sent by that PC using its connection to the message transmission device. Alternatively, the message application may directly send the message. In this second alternative, account (identity) information is provisioned by providing all information necessary for the sending device to provide point of connection identity along with the messages. For example, this information may be provided directly in the device or sent in a link in a browser in the device. The message application can then correctly construct message header information before sending the message. One of average skill would readily understand how to substitute message origination information in standard protocols such as POP3 or IMAP. For example, IMAP configuration allows the From line in the message to be replaced with a user specified message account. This allows users having a limited processing device using a third-party message account to use their regular business messaging and appear as though originating from their business account. This rendered message is sent via the Internet using the IMAP server. Since the user is using an IMAP client device, the user will always be up to date with respect to the user's configuration in the user's default account. Yet another alternative is to configure the user's IMAP information to access an IMAP server operated by a substitute IMAP server. This intermediary server can provide the point of connection information configured by the user when sending messages, and retrieve messages from the user's main server at intervals configured by the user.
As noted above, links provided to the user in the message allow for a further feature of the system which involves advanced attachment handling. In one aspect, one of the links shown in
As noted above, one method of manipulating an attachment is to modify the message body to include a link to a URL. This URL can perform actions directly or point to a webpage that provides options for performing actions on the attachments. The advantage to this approach is that the message application on the device does not have to be modified. A second approach is to replace the original attachment with a special attachment. This proxy attachment is small and contains information about the original attachment. The system agent on the device includes code allowing it to understand what to do with this proxy attachment, including providing a menu of choices similar to the list above when the attachment is selected. The advantage to this approach is that the user interface on the client would clearly indicate the presence of an attachment and could readily display information about the attachment.
Attachments may also be sent with forwarded messages. In one embodiment, the Sync server can reconstruct the original message (with the attachment) and then modify it by adding the forwarded message address and body. This is performed be done prior to syncing it back to the source message application.
In a further aspect, applications on the device can request information from the system engine. This will be used to support the retrieval of attachments that were stripped during the sync. Additionally requests can be made to retrieve the next portion of a truncated body. The device agent 420, system engine 440, and the user's message application work together to maintain state information so that successive ‘chunks’ of the body can be retrieved. The message client will present this to the user and at its choosing either incorporate the chunks into the stored message or dispose of the chunks after the user has viewed them.
Yet another aspect of the system includes content streaming through device. A device agent 420 on the device will allow the user to request complete delivery of a message or attachment and stream it to a compatible device such as a laptop, printer, personal digital assistant or other device. Even content too large to be stored in the device could be streamed through the device to an external device. The device agent 420 will on user request ask the server to transfer specific raw unconverted content (such as a Microsoft Word document) in manageable pieces to the device. The device will in turn forward those pieces from the connection transport used to connect to the system (such as a wireless network) onto a locally connected device (via, for example, a local connection transport). Local connections may include bluetooth, IRDA, or cable attached devices. During the transfer the device agent 420 will not store the content. It will simply act as a connection agent for the content.
In a further aspect, the read/unread status of the message can be propagated to all devices in the personal information space. Using the IMAP embodiment, the IMAP server maintains this status. Other types of mail servers will likewise track the read/unread status of a message and propagate it to other clients connected to such servers. In the embodiment of the invention using the system engine 440, the sync system of U.S. Pat. No. 6,694,336 can maintain this status across all platforms.
In additional embodiments of the present invention, further functionality is provided to a user. In one embodiment, the system incorporates a voice call box which provides the ability for the user to review email by having it read to the user over a telephone voice connection. Various implementations of this feature are provided.
A unique feature of the present invention is the ability for users to review mail using the collections. This allows the user to rapidly process unread items from collections, and focus on reading a fast response. This “zooming” process allows user to scroll through long messages with the phone's joystick or rocker and with a selection of a soft key designated for this process (for example, a “zoom” button), the user is moved to the next unread time in the collection until the collection is exhausted. This feature can be used whether reviewing messages using voice or text means.
An additional feature of the invention allows user to provide a response to an email using a voice clip, text or to listen to an email read by a text to speech message system. In addition, attachments can be listed at the bottom of an email body and when selected, the attachment may be rendered by converting the item to a bitmap on the network server and directing the phone browser to a URL to read the bitmap, the attachment may be forwarded via email, the bitmap may be sent to a fax or may be retrieved into the phone.
In this embodiment of the invention, the system is configured to deal with more than just messaging data. In this embodiment of the invention, there are two distinct types of data: new messages (email) addressed to the user (which may include appointment requests sent via email), and “interaction” events. Email is processed through the user's rules and, if qualified, is stored in the system email storage system shown in various embodiments in
Interaction events are, for example, the entry of a contact into the user's PIM software or devices, an IM conversation, an Email sent by the user, a phone conversation, an appointment entry, an SMS sent by the user, or an allowed or blocked sender's list. In this embodiment, interaction events are analyzed to determine which people are involved in the event by using identifying information contained within the interaction event. Such information can include the meeting attendee email addresses, or the phone number from the call log, and the like.
The system may further include two types of servers—a system “consumer” server 1424 and a system “corporate” server 1425. Each server 1424, 1425 is hosted by a wireless telephone carrier, a private entity or by the System Administrator. The system servers provide account administration, filter and rule processing and alerts, push and pull functions to the device and from the server, contact and calendar sync, reporting and billing, SMS alerts and email distribution. In an embodiment wherein a corporate server is hosted by a carrier or System Administrator, the corporate server may communicate with secure email servers of a corporate entity using a virtual private network or other secure connection.
As shown in
The corporate server is designed to communicate with the device client 410 via an extended version of the SyncML protocol, and with an Exchange 1435 or Lotus Notes 1436 mail server via a connection secured by SSL or a VPN connection. It should be recognized that the designations “consumer” and “corporate” are for convenience only, and the basic functionality of each system server is equivalent. In each case, only the source of the data and the hosting location are changed.
In accordance with the system aspects described above, data enters the system via the agents 410 attached to the system server engine 400.
For each event, whether it be an interactive event or an email message, each person referenced in the event is looked up in the persona database. If the person exists, a record of the interaction event is added to the persona record (an example of which is shown in
During initial installation and configuration, the system may retrieve all the past interaction available from each of the attached devices. For example, the system retrieves the call logs from the user's mobile phone, and details of sent email from the mail server. The system may retrieve other information from the data stores 1404-1414 or the data sources 1432-1436. When mated with the synchronization system in U.S. Pat. No. 6,694,336, the system engine may retrieve a wealth of information such as contact entries, preexisting calendar appointments, assigned tasks, and the like from that system's data packages.
Various elements of the the server architecture are shown in
The data source assessors (DSA) 1504 provide a standardized interface to data sources (such as an Exchange, POP3, or IMAP server, a mobile device, an IM client, or the sync system of U.S. Pat. No. 6,694,336 via extended XML). The DSAs provide a bidirectional interface capable of relaying commands from the system server to the data source 1432-1436 and notifications from the data sources 1432-1436 to the system server). There are three distinct data source interfaces: 1) an interaction notification interface 2) persona promotion control 3) mail data handling. A particular DSA may implement one or more of them, as appropriate for its data source.
The raw data acquisition manager 1506 is a module responsible for orchestrating the retrieval of data from the users' data sources. The persona engine 1508 is a system component responsible for parsing interaction notifications to create and maintain a database tracking user's interactions (sent email, appointments, etc) with the personas found in the users' personal information space. Records generated by the engine are stored in the persona database 1552, and take a format generally represented in
The voice enabled call box 1532 is a system component responsible for interacting with the user via spoken text. This system provides functions such as, for example, listening to an email or responding to an email with a voice clip. Session renders 1512 are protocol-specific modules that attach clients to the server. A SyncML+ renderer, WAP and HTML renders may be enabled. The administrator console 1534 and communications service request (CSR) console 1534 are management facilities provided to monitor and administer the system. The network-based UI 1538 is a user interface which may be provided to allow an administrator or users manage the user's account and email preferences via a browser. The QOS enforcement manager 1540 is a module that balances load by staging account data updates and data source access.
The interaction notification interface occurs through the system notification agents 1560 and mail access agents 1565. These agents provide notification of events to the system, which are consumed by the persona database 1551. Each data source, through its DSA's event notification interface, reports on the interactions occurring at that data source. Each of the interaction types the system understands is represented by a corresponding data type in the system which serves as the unit of abstraction for a particular interaction event. This layering allows a mapping between the proprietarily-formatted information contained in a particular data source and: a universalized version of that data which is understandable by the system. One such universalized version of the data is described in U.S. Pat. No. 6,269,361, although other universalized formats may be used in accordance with the present invention.
In one alternative, mail database 1553 is a newly downloaded mail and mobile mail database. This database contains the objects downloaded retrieved from the data source accessors during the data acquisition manager's acquisition session. These objects have not been processed by the filtering system. Once the persona engine has examined them, qualifying email is moved to a mobile mail database.
In yet another alternative, as noted above, an “all mail database” and a mobile mail database are provided. In this embodiment, once an email is determined to be mobile per the user's rules by the persona engine, it is added to a mobile mail DB. The architecture is neutral as to the location and nature of this database and any “newly downloaded mail DB”. In each case, the database may be separate databases, or may simply be a list of promotable mail IDs referencing records in a single physical database. The mail database manager includes a clean-up process which is responsible for cleaning up the user's storage as a result of mail items passing out of the “mobile” range, or downloaded data expiring (such as attachments whose timer has expired or who have been sent to the mobile device). In these cases, the mail database manager generates a “delete” operation for the content in question and queues it to the attached mobile device(s).
The system further includes an automated persona promotion control routine. The promotion control routine is responsible for communicating to the data source a request to promote or demote of a particular contact to or from the user's mobile devices, based on the user's pattern of interactions with his known personas. Typically this interface is implemented as an XML client talking to the sync servers XML gateway. In one embodiment, the final determination of the contact's status is determined by the sync server of U.S. Pat. No. 6,694,336; the system server simply relays requests as a result of its world-view. In an alternate embodiment, the system server directly controls the promotion and demotion of contacts.
The server also includes a mail content handling interface which is responsible for providing universalized access to and control of a particular mail store. Since certain email such as sent email is in fact an interaction record, there is some functional crossover between sent email notifications and mail handling in general. The DSA simply treats the “sent email” folder as a source of data for the event notification, separate from processing incoming mail. The responsibilities of this interface are varied, and include: retrieving mail headers within a certain range, retrieving mail fields and mail attachments, sending mail, updating the origin mail server with new state information (such as read flags, or a new entry in the Sent Items folder), and retrieving new state information from the origin mail server (such a read status).
Additionally, since meeting requests arrive as specially formatted email, DSAs that implement this interface also contain modules to parse the meeting requests into the appropriate universalized meeting request records. Likewise, the DSA's translation module can also translate universalized meeting request decisions into the proper response emails (or server calls), as appropriate.
Shown in
When, for example, the server 1425 determines that a persona should be promoted, it communicates this via the systemXML interface 1610 to the sync server 1650. It is important to note that the system server 1425 and the sync server act synergistically to create the desired user experience. The sync server is well suited to syncing reasonably sized data (such as contacts, calendar events, notes, and tasks), whereas the system, server is designed to handle the unique requirements of email storage and processing. The sync server maintains responsibility for the normal data synchronization requirements (including promoting/demoting contacts at the request of the system server, and syncing changes made on the phone and/or PIM).
Another source of interaction information is the XML agent 1610. The XML agent 1610 translates sync events received from a sync server 1650 via XML into notifications for the system of the present invention. Note that the XML agent may use SyncML to communicate with the elements of the system or may use modified versions of SyncML to incorporate any of the features noted herein. New contact entries, calendar events, or assigned tasks are detected and can be reflected in the persona database in the manner described above, but the data interface in this case may include the sync server 1650. Additionally, the user's contact folder hierarchy can be determined and presented to the user later, for example when they wish to save a message to a particular folder.
The data acquisition manager is responsible for pulling new data into the system via the DSAs. The data acquisition manager, as a result of a trigger (such as a schedule or callback) (at step 1710), loads a user's account data (step 1712) and begins iterating through the configured DSAs (step 1728) to retrieve new interaction event data and new incoming email. The data acquisition manager first asks each DSA for any new interaction information, (step 1722) which the data acquisition manager transfers to the persona engine. Next, the data acquisition manager queries each DSA with a Mail handling interface and retrieves info (headers) regarding any new mail, which it passes to the mail database manager (step 1730). After retrieving all the new headers and logging out of the DSA, the data acquisition manager notifies the system that new mail has arrived to be scanned (step 1738). It is also possible to asynchronously submit interaction info to the reporting the info will notify the data acquisition manager via the data acquisition manager's standard listener.
A system promotion engine is provided to accomplish the filtering features of the present invention. The system promotion engine is responsible for answering promotion queries posed concerning particular emails and personas.
When the data acquisition manager has completed its new data scanning session and publishes its notification that new mail has arrived, a system promotion engine begins executing a scan of the new mail. The persona engine retrieves the user's configured promotion rules from the user account and passes the mail to a rule evaluation engine to determine if a message is promotable, and if so, which collections the message belongs in. Before adding the promotable mail to a live mail database, the persona engine retrieves the appropriate data for each message of each collection from the source data source accessor.
In one example, suppose ten (10) new messages arrive on the user's email server. The data acquisition manager, upon schedule or notification, wakes up and queries each data source accessor for new interaction information and then for new message headers. Once it has downloaded all the headers, the data acquisition manager adds them to the mail database manager and notifies the system that new mail has arrived. The persona engine iterates through the new mail and runs each message header through the configured rules. Suppose five of the mails are classified to the “Normal” collection. The persona engine checks the user's prefetch rules for the “Normal” collection and sees that the user wants to prefetch the body content up to 5K. The persona engine, via the Exchange data source accessor, downloads the first 5K of each message and adds it to the mail record for the message it has created in a live mail database. Suppose one of the remaining items is a VIP email, and the user's options say to retrieve the attachments, up to 1 MB. Accordingly, the persona engine retrieves the attachment and adds it to the mail record for the message it has created in the live mail database. The remaining four messages qualify for the “Other/Bulk” collection. The user's rules say not to send any of these to the phone, so no fetching of their content is done and they are not added to the live mail database.
Contacts can be promoted and demoted automatically. Contact promotion scanning is done at an interval or in response to new interaction events. The user's settings may call for any sender or cc'd recipient of VIP mail to be automatically promoted, for example.
Another feature of the present invention is a mail database manager. The mail database manager is responsible for managing mail retrieval and server-side storage. The mail database manager receives email event objects pertaining to newly downloaded email from the data acquisition manager. These objects are stored in the mail database 1552. Later, the mail database manager can retrieve the message using the message id and source data source accessor information contained in the header object. In accordance with the present invention, mail may be stored temporarily in the system server in various configurations of databases.
In yet another unique aspect of the system of the present invention, no “current version” or “device latest version” information is maintained by this system. Due to the nature of email itself, the “mobile mail” list is in constant flux—old, read, or deleted emails are removed and new emails arrive. There is no need to maintain a long list of historical change transactions; the system need only maintain a list of notifications to be sent to the client the next time the two are connected. Using an “assured delivery” queue model, the client and server can communicate asynchronously with guaranteed delivery of notifications. An alternative embodiment may maintain version information in a manner similar to that specified in U.S. Pat. No. 6,694,336.
A further unique aspect of the present invention is the ability to fetch uncached data for an email. In this embodiment, the mail database manager handles requests for missing data in an email. By utilizing the email id of the message in question, the mail database manager may retrieve the needed data from the origin data server. For example, the system may be configured to not download certain message attachments or bodies. When the user requests the download of a missing field, the request is relayed to the mail database manager will retrieve the requested info from the appropriate mail server. The mail database manager will queue the responses and provide notification of the fulfilled requests to the system engine via system engine notification mechanisms. The system engine's behavior is then determined by the user's configuration.
In certain actions, reprocessing all email is required. Certain user actions may require the wholesale reprocessing of all the user's in-range mail headers. For example, adding a category or changing the blacklist require enumerating each message again with the new rules. This action can be performed by the mail database manager
As shown in
It's possible to have a group of interactions that cannot be attributed to any existing persona (for example, you may not have a person's instant messenger “buddy” name in your contact record for them in your personal information contact manager). In that case, a persona containing the key fields reported by the datasource accessor (e.g., buddy name, or email address, names, and phone numbers in your PIN) is created. At some later time, if the system is able to match these two personas (if the user adds the buddy name to the contact record, for example), the personas are merged and the subordinate persona is deleted. Subsequent interactions will be attributed to the persona, since it now contains the new fields. In an alternative embodiment, a reference may be attached to the event to all personas, for example, to the sender and receiver. Still further, one may maintain a long list of such interactions, but select it on an interval, or simply maintain an aggregate of the information, rather than the information itself (e.g., 3 phone calls from persona X in the last <interval>).
As noted above, the system server may provide voice interaction features. The system server integrates with a VoiceXML driven telephony server in order to fulfill the natural language “voice features” of the system. There are two primary scenarios involving the callbox: 1) User selects “Listen to email” option on the system client; and 2) User selects “New voice clip” option on the system client (or chooses to forward an email plus a voice clip to someone). This option assumes the message ordering info described in the initialization has been completed. The system simply converts the target message into natural language over the voice channel. The user may respond with voice and/or listen to more emails. An alternative embodiment allows the user to record voice clips on their mobile device using the internal microphone and storage. The voice clip is then transmitted to the server for transmission with the email.
TAPI (Telephony Application Program Interface) is a standard program interface that lets you and your computer “talk” over telephones or video phones to people or phone-connected resources elsewhere in the world. TAPI capabilities of the phones may vary wildly. A number of alternative embodiments exist in order to implement the voice callbox component of the system server. Currently, most phones cannot support both a persistent data and voice connection. Hence, the system of the present invention must be able to function when a data connection with the client is dropped. In one embodiment, the client software initiates a new phone call. In one alternative, where both a voice and data connection may be maintained, the client software continue to execute during the call and the client maintain a data connection with the server while the voice connection is active. Alternatively the client continues to execute with only the voice connection. In a further embodiment, the client can generate DTMF tones to communicate with the callbox on the server. In a further embodiment, where supported by the client, the phone programmatically hang-up. If no data connection is available, DTMF can be used instead to relay the data to the server via the callbox. If no DTMF is available and no data connection is available, the required data can be sent to the server before the call is initiated. In certain embodiments, the client application regains control automatically; in others, the user must restart the application. Yet another embodiment solution involves the server calling the phone back to initiate the session.
When the user initiates a callbox session, the client communicates some details to the system server. This can be done via DTMF or a data connection. Aside from authentication, the info transmitted is related to the message in question and the messages that follow it in “zoom order.” This allows the callbox to implement a voice driven “next message” feature that processes the same message the “next message” feature on the phone would. An example of the info which may be transmitted is: the current message id, the current collection id, the current collection sort order and the current message sort order. In one embodiment, the IDs of each of the messages remaining on the phone are send down to the phone in the order they are read. In one embodiment, a “main menu” is provided where users can choose to compose another or listen to email, etc. Regardless, details concerning what was done must be sent to the client so it may adjust its read/unread information.
In a further embodiment, users are provided with the opportunity to respond to emails using a voice message. This option sends an email containing a voice clip. This may be a new email or a forward or reply to an existing one. The client communicates, for example, authentication info, a “forward” command, the referenced message info, the recipient info, the user interacts with the server and completes the request. If the user listens to any email in the session, the post-session update discussed above applies.
Post processing of emails may occur after the user reviews using the voice box system of the present invention. Whenever a user listens to an email, the system must produce a read notification just as if the user had read the email on the client. That way, the user won't “reread” all the email he just listened to when he returns to using the System client. To accomplish this, the read message ids are queued and sent to the System client after the voice session is completed.
Further features of the system of the present invention provide advantages to the user of a mobile client device. Communication of data to mobile devices generally runs into two major problems: intermittent connectivity and low bandwidth. Intermittent connectivity problems arise because users travel outside of range, get on planes, the subway, etc. The system of the present invention can be adapted to use a protocol which provides for asynchronous transmission of information. Typical mobile device bandwidth is limited and latency is high. The protocol should avoid transmitting unnecessary information. Another desirable aspect is that the user be able to use the most of the system when off the network—send emails, mark messages or attachments for download, reply or forward mail, etc.
In order to counteract these problems, the system of the present invention caches requests for service and transmits them en-masse when a connection is available. While the connection is available, new notifications are downloaded, as are results from previous requests the server processed while the phone was offline. Some requests, such as operations involving the callbox and the realtime global search require synchronous connections.
Both server and client maintain a queue of requests to be sent to each other. A client's queue typically contains the results of things that the user did while not connected. This queue may contain, for example, a request for an attachment, a reply/forward or composition of email generated off network, a notification of message read, a notification of setting change, or a request for an email body. The server's queue may include two sets of events: responses to previous client requests and notifications generated by the system, such as: a notification of new mobile mail, a notification of new meeting requests, a notification of message read, or a notification of setting change.
The system engine employs both an SMS and standard network socket listener for each protocol renderer. The communication model is an asynchrounous “store and forward” approach to populating data and handling client requests. Ideally, given an always-on connection, the request/response will be very fast.
The behavior upon data connection initiation by the client is that the client connects and authenticates, the client sends any immediate requests (callbox, global search) and receives server response, the client sends any queued requests to the server, each with sequential requested, the client sends an “queue empty” event, the server acknowledges the highest requestID it received, the server sends each message in its queue, the server sends “queue empty” event, the client acknowledges the highest responseID it received and the client disconnects.
When the ID acknowledge is received by the transmitting party, it may dispose of its queue object as appropriate. Note that it is not required to send the queue acknowledge message only upon receipt of the “queue empty” event. In fact, it is desirable to periodically acknowledge the other side in case of loss of connectivity (to reduce the number of items resent by the other side upon restoration of connectivity). Using this acknowledge scheme, if the connection is dropped, any records sent but not acknowledged will remain in the outbound queue and the sender will resend them the next time it connects. This means that the receiver likely sometimes receive the same queue entry twice. Each receiver can handle this simply by remembering ID of the last queue entry it got from the sender. If it receives one it has already seen, it can ignore it (but it may still acknowledge it).
Objects in the queue may be reordered according to type. For example, synchronous responses, or persona or collection status and settings notifications, if any, may always be delivered before new mail notifications.
In as further unique aspect, synchronous requests are handled differently. Synchronous requests, when added to the queue, trigger a data connection if one does not exists. If no data connection is available, the enqueue request fails with the appropriate error. This results in the creation of a ClientSessionMasterThread if one does not already exist. The CSMT scans the unsent queue and sends any synchronous requests before sending the others. The server likewise sends any responses to sync requests before sending normal asynchronous responses. This allows the implementation of a “cancel download” message.
Client processes requiring services may add requests to the outbound queue at any time. Asynchronous events will simply be added (and may be reordered depending on priority) and a QueueMgrResponse indicating successful (or failed) queuing will be returned to the caller immediately. If a synchronous event is added to the queue, however, the response returned contains a requestToken object. The caller may use the static waitForCompletedRequest member to block until the response has been received.
In one aspect, service request queues are maintained on the various system server enhancements. When the client (such as agent 420) lacks information in its cache to complete a request, it queues the request for that info. Subsequent requests are likewise added to the queue. When a connection trigger (which is user-configurable) is reached, the queued requests are sent to the system server. The system server un-queues the requests and generates its responses. The system server communicates them either during the same communication session or at a later date, when its own communications trigger is tripped or the client reconnects. Once the client receives a response, it removes the source request entry from its pending queue. Once the system server has successfully replied to a client's request, the response is removed from the server's queue to deliver. At any time, the system server may queue additional notifications for the client, and the client may queue additional requests for the system server. When a connection is established, the queues are transmitted.
Aggressive pre-fetching of data from the system server may be used. When the server has new mobile email, it may, depending on the user's configuration, push the email notification (including body content, if appropriate) to the client via SMS. Or, the system server may simply queue the notifications for the client and deliver them when the client next connects. Further, the system server could SMS the client to notify it to “phone home.” The common theme is that the behavior is flexible to support both an asynchrounous model (such as queuing up attachments to download while on an airplane) or a connected model. The server can acknowledge which devices have received which notifications via the latest email version info table. Each client device reports the latest email version it has received notification of during every request to the server in order to keep the server up to date.
The foregoing detailed description of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. The described embodiments were chosen in order to best explain the principles of the invention and its practical application to thereby enable others skilled in the art to best utilize the invention in various embodiments and with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims appended hereto.
This application claims the benefit of U.S. Provisional Application No. 60/489,163, “Smart Mail Filtering and Synchronization,” filed on Jul. 21, 2003; and U.S. Provisional Application No. 60/565,199, “Device Message Management System,” filed on Apr. 23, 2004; both of which are incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
4887212 | Zamora et al. | Dec 1989 | A |
5111398 | Nunberg et al. | May 1992 | A |
5115466 | Presttun | May 1992 | A |
5130993 | Gutman et al. | Jul 1992 | A |
5146221 | Whiting et al. | Sep 1992 | A |
5204902 | Reeds et al. | Apr 1993 | A |
5329619 | Page et al. | Jul 1994 | A |
5392390 | Crozier | Feb 1995 | A |
5418854 | Kaufman et al. | May 1995 | A |
5418908 | Keller et al. | May 1995 | A |
5425079 | Noda et al. | Jun 1995 | A |
5483352 | Fukuyama | Jan 1996 | A |
5485161 | Vaughn | Jan 1996 | A |
5509070 | Schull | Apr 1996 | A |
5519433 | Lappington et al. | May 1996 | A |
5519606 | Frid-Nielsen et al. | May 1996 | A |
5543789 | Behr et al. | Aug 1996 | A |
5544061 | Morimoto et al. | Aug 1996 | A |
5561446 | Montlick | Oct 1996 | A |
5574906 | Morris | Nov 1996 | A |
5579489 | Dornier et al. | Nov 1996 | A |
5588009 | Will | Dec 1996 | A |
5592470 | Rudrapatna et al. | Jan 1997 | A |
5623406 | Ichbiah | Apr 1997 | A |
5623661 | Hon | Apr 1997 | A |
5628005 | Hurvig | May 1997 | A |
5630081 | Rybicki et al. | May 1997 | A |
5638508 | Kanai et al. | Jun 1997 | A |
5640577 | Scharmer | Jun 1997 | A |
5644709 | Austin | Jul 1997 | A |
5647002 | Brunson | Jul 1997 | A |
5649195 | Scott et al. | Jul 1997 | A |
5650800 | Benson | Jul 1997 | A |
5657372 | Ahlberg | Aug 1997 | A |
5666397 | Lamons et al. | Sep 1997 | A |
5666553 | Crozier | Sep 1997 | A |
5682524 | Freund et al. | Oct 1997 | A |
5684990 | Boothby | Nov 1997 | A |
5694596 | Campbell | Dec 1997 | A |
5699255 | Ellis et al. | Dec 1997 | A |
5701423 | Crozier | Dec 1997 | A |
5706509 | Man-Hak Tso | Jan 1998 | A |
5710922 | Alley et al. | Jan 1998 | A |
5727202 | Kucala | Mar 1998 | A |
5727950 | Cook et al. | Mar 1998 | A |
5729735 | Meyering | Mar 1998 | A |
5729739 | Cantin et al. | Mar 1998 | A |
5729743 | Squibb | Mar 1998 | A |
5742792 | Yanai et al. | Apr 1998 | A |
5745750 | Porcaro | Apr 1998 | A |
5745906 | Squibb | Apr 1998 | A |
5757920 | Misra et al. | May 1998 | A |
5758150 | Bell et al. | May 1998 | A |
5758354 | Huang et al. | May 1998 | A |
5758355 | Buchanan | May 1998 | A |
5764899 | Eggleston et al. | Jun 1998 | A |
5768480 | Crawford, Jr. et al. | Jun 1998 | A |
5768597 | Simm | Jun 1998 | A |
5771354 | Crawford | Jun 1998 | A |
5778346 | Frid-Nielsen et al. | Jul 1998 | A |
5778361 | Nanjo et al. | Jul 1998 | A |
5778367 | Wesinger et al. | Jul 1998 | A |
5778388 | Kawamura et al. | Jul 1998 | A |
5781901 | Kuzma | Jul 1998 | A |
5787247 | Norin et al. | Jul 1998 | A |
5787262 | Shakib et al. | Jul 1998 | A |
5794228 | French et al. | Aug 1998 | A |
5804803 | Cragun et al. | Sep 1998 | A |
5809497 | Freund et al. | Sep 1998 | A |
5812773 | Norin | Sep 1998 | A |
5812793 | Shakib et al. | Sep 1998 | A |
5818437 | Grover et al. | Oct 1998 | A |
5826245 | Sandberg-Diment | Oct 1998 | A |
5828376 | Solimene et al. | Oct 1998 | A |
5832489 | Kucala | Nov 1998 | A |
5832518 | Mastors | Nov 1998 | A |
5832519 | Bowen et al. | Nov 1998 | A |
5832520 | Miller | Nov 1998 | A |
5845283 | Williams et al. | Dec 1998 | A |
5859973 | Carpenter | Jan 1999 | A |
5864864 | Lerner | Jan 1999 | A |
5875296 | Shi et al. | Feb 1999 | A |
5884323 | Hawkins et al. | Mar 1999 | A |
5884325 | Bauer et al. | Mar 1999 | A |
5893119 | Squibb | Apr 1999 | A |
5896321 | Miller | Apr 1999 | A |
5897640 | Veghte et al. | Apr 1999 | A |
5897642 | Capossela et al. | Apr 1999 | A |
5903723 | Beck et al. | May 1999 | A |
5907793 | Reams | May 1999 | A |
5909568 | Nason | Jun 1999 | A |
5923756 | Shambroom | Jul 1999 | A |
5923848 | Goodhand et al. | Jul 1999 | A |
5926816 | Bauer et al. | Jul 1999 | A |
5933653 | Ofek | Aug 1999 | A |
5933778 | Buhrmann et al. | Aug 1999 | A |
5933816 | Zeanah et al. | Aug 1999 | A |
5935262 | Barrett et al. | Aug 1999 | A |
5937405 | Campbell | Aug 1999 | A |
5941944 | Messerly | Aug 1999 | A |
5943676 | Boothby | Aug 1999 | A |
5944787 | Zoken | Aug 1999 | A |
5946615 | Holmes et al. | Aug 1999 | A |
5948066 | Whalen et al. | Sep 1999 | A |
5950193 | Kulkarni | Sep 1999 | A |
5951636 | Zerber | Sep 1999 | A |
5961572 | Craport et al. | Oct 1999 | A |
5961590 | Mendez et al. | Oct 1999 | A |
5966717 | Sass | Oct 1999 | A |
5968131 | Mendez et al. | Oct 1999 | A |
5970149 | Johnson | Oct 1999 | A |
5970490 | Morgenstern | Oct 1999 | A |
5971277 | Cragun et al. | Oct 1999 | A |
5974238 | Chase, Jr. | Oct 1999 | A |
5974563 | Beeler, Jr. | Oct 1999 | A |
5987381 | Oshizawa | Nov 1999 | A |
5987609 | Hasebe | Nov 1999 | A |
5995118 | Masuda | Nov 1999 | A |
6000000 | Hawkins et al. | Dec 1999 | A |
6006215 | Retallick | Dec 1999 | A |
6006274 | Hawkins et al. | Dec 1999 | A |
6009462 | Birrell et al. | Dec 1999 | A |
6012063 | Bodnar | Jan 2000 | A |
6012088 | Li et al. | Jan 2000 | A |
6014695 | Yamashita et al. | Jan 2000 | A |
6016394 | Walker | Jan 2000 | A |
6016478 | Zhang et al. | Jan 2000 | A |
6023620 | Harisson | Feb 2000 | A |
6023708 | Mendez et al. | Feb 2000 | A |
6023723 | McCormick et al. | Feb 2000 | A |
6026414 | Anglin | Feb 2000 | A |
6034621 | Kaufman | Mar 2000 | A |
6038665 | Bolt et al. | Mar 2000 | A |
6044381 | Boothby et al. | Mar 2000 | A |
6049776 | Donnelly et al. | Apr 2000 | A |
6052735 | Ulrich et al. | Apr 2000 | A |
6058399 | Morag et al. | May 2000 | A |
6061790 | Bodnar | May 2000 | A |
6061796 | Chen et al. | May 2000 | A |
6063134 | Peters et al. | May 2000 | A |
6064880 | Alanara | May 2000 | A |
6065018 | Beier et al. | May 2000 | A |
6067582 | Smith et al. | May 2000 | A |
6073133 | Chrabaszcz | Jun 2000 | A |
6076109 | Kikinis | Jun 2000 | A |
6078960 | Ballard | Jun 2000 | A |
6081900 | Subramaniam et al. | Jun 2000 | A |
6094618 | Harada | Jul 2000 | A |
6101480 | Conmy et al. | Aug 2000 | A |
6108330 | Bhatia et al. | Aug 2000 | A |
6108703 | Leighton et al. | Aug 2000 | A |
6112024 | Almond et al. | Aug 2000 | A |
6115797 | Kanda et al. | Sep 2000 | A |
6131096 | Ng et al. | Oct 2000 | A |
6131116 | Riggins et al. | Oct 2000 | A |
6141011 | Bodnar et al. | Oct 2000 | A |
6141621 | Piwowarski et al. | Oct 2000 | A |
6141659 | Barker et al. | Oct 2000 | A |
6141664 | Boothby | Oct 2000 | A |
6145088 | Stevens | Nov 2000 | A |
6148260 | Musk et al. | Nov 2000 | A |
6151606 | Mendez | Nov 2000 | A |
6157630 | Adler et al. | Dec 2000 | A |
6163773 | Kishi | Dec 2000 | A |
6163779 | Mantha et al. | Dec 2000 | A |
6163844 | Duncan et al. | Dec 2000 | A |
6167120 | Kikinis | Dec 2000 | A |
6173310 | Yost et al. | Jan 2001 | B1 |
6173311 | Hassett et al. | Jan 2001 | B1 |
6182117 | Christie et al. | Jan 2001 | B1 |
6182141 | Blum et al. | Jan 2001 | B1 |
6185598 | Farber et al. | Feb 2001 | B1 |
6189030 | Kirsch et al. | Feb 2001 | B1 |
6189096 | Haverty | Feb 2001 | B1 |
6195695 | Cheston et al. | Feb 2001 | B1 |
6195794 | Buxton | Feb 2001 | B1 |
6202085 | Benson et al. | Mar 2001 | B1 |
6205448 | Kruglikov et al. | Mar 2001 | B1 |
6209034 | Gladwin et al. | Mar 2001 | B1 |
6212529 | Boothby et al. | Apr 2001 | B1 |
6212556 | Arunachalam | Apr 2001 | B1 |
6216131 | Liu et al. | Apr 2001 | B1 |
6219680 | Bernardo et al. | Apr 2001 | B1 |
6219694 | Lazaridis et al. | Apr 2001 | B1 |
6223187 | Boothby et al. | Apr 2001 | B1 |
6226650 | Mahajan et al. | May 2001 | B1 |
6233565 | Lewis et al. | May 2001 | B1 |
6233589 | Balcha et al. | May 2001 | B1 |
6243760 | Armbruster et al. | Jun 2001 | B1 |
6246889 | Boltz | Jun 2001 | B1 |
6247048 | Greer et al. | Jun 2001 | B1 |
6247135 | Feague | Jun 2001 | B1 |
6249690 | Mashiko | Jun 2001 | B1 |
6252547 | Perry et al. | Jun 2001 | B1 |
6255989 | Munson et al. | Jul 2001 | B1 |
6256750 | Takeda | Jul 2001 | B1 |
6260124 | Crockett et al. | Jul 2001 | B1 |
6272545 | Flanagin et al. | Aug 2001 | B1 |
6275831 | Bodnar et al. | Aug 2001 | B1 |
6278941 | Yokoyama | Aug 2001 | B1 |
6282435 | Wagner et al. | Aug 2001 | B1 |
6282698 | Baker et al. | Aug 2001 | B1 |
6285889 | Nykanen et al. | Sep 2001 | B1 |
6286029 | Delph | Sep 2001 | B1 |
6286053 | Van Peursem et al. | Sep 2001 | B1 |
6286085 | Jouenne et al. | Sep 2001 | B1 |
6289212 | Stein et al. | Sep 2001 | B1 |
6292743 | Pu et al. | Sep 2001 | B1 |
6292905 | Wallach et al. | Sep 2001 | B1 |
6295502 | Hancock et al. | Sep 2001 | B1 |
6295541 | Bodnar et al. | Sep 2001 | B1 |
6304881 | Halim et al. | Oct 2001 | B1 |
6317755 | Rakers et al. | Nov 2001 | B1 |
6321236 | Zollinger et al. | Nov 2001 | B1 |
6324467 | Machii et al. | Nov 2001 | B1 |
6324526 | D'Agostino | Nov 2001 | B1 |
6324544 | Alam et al. | Nov 2001 | B1 |
6327533 | Chou | Dec 2001 | B1 |
6329680 | Yoshida et al. | Dec 2001 | B1 |
6330568 | Boothby et al. | Dec 2001 | B1 |
6332158 | Risley et al. | Dec 2001 | B1 |
6333973 | Smith et al. | Dec 2001 | B1 |
6338096 | Ukelson | Jan 2002 | B1 |
6339710 | Suzuki | Jan 2002 | B1 |
6341316 | Kloba et al. | Jan 2002 | B1 |
6345308 | Abe | Feb 2002 | B1 |
6349336 | Sit et al. | Feb 2002 | B1 |
6353448 | Scarborough et al. | Mar 2002 | B1 |
6356910 | Zellweger | Mar 2002 | B1 |
6356961 | Oprescu-Surcobe | Mar 2002 | B1 |
6360252 | Rudy et al. | Mar 2002 | B1 |
6360330 | Mutalik et al. | Mar 2002 | B1 |
6363249 | Nordeman et al. | Mar 2002 | B1 |
6363412 | Niwa et al. | Mar 2002 | B1 |
6374250 | Ajtai et al. | Apr 2002 | B2 |
6381700 | Yoshida | Apr 2002 | B1 |
6389462 | Cohen et al. | May 2002 | B1 |
6396482 | Griffin et al. | May 2002 | B1 |
6397307 | Ohran | May 2002 | B2 |
6397351 | Miller et al. | May 2002 | B1 |
6401104 | LaRue et al. | Jun 2002 | B1 |
6405218 | Boothby | Jun 2002 | B1 |
6418309 | Moon et al. | Jul 2002 | B1 |
6430289 | Liffick | Aug 2002 | B1 |
6434621 | Pezzillo et al. | Aug 2002 | B1 |
6434627 | Millet et al. | Aug 2002 | B1 |
6437818 | Ludwig et al. | Aug 2002 | B1 |
6449622 | LaRue et al. | Sep 2002 | B1 |
6453392 | Flynn, Jr. | Sep 2002 | B1 |
6457062 | Pivowar et al. | Sep 2002 | B1 |
6460036 | Herz | Oct 2002 | B1 |
6462644 | Howell et al. | Oct 2002 | B1 |
6463464 | Lazaridis et al. | Oct 2002 | B1 |
6466967 | Landsman et al. | Oct 2002 | B2 |
6473621 | Heie | Oct 2002 | B1 |
6480896 | Brown et al. | Nov 2002 | B1 |
6484143 | Swildens et al. | Nov 2002 | B1 |
6487560 | LaRue et al. | Nov 2002 | B1 |
6490655 | Kershaw | Dec 2002 | B1 |
6496944 | Hsiao et al. | Dec 2002 | B1 |
6499108 | Johnson | Dec 2002 | B1 |
6505216 | Schutzman et al. | Jan 2003 | B1 |
6507891 | Challenger et al. | Jan 2003 | B1 |
6516314 | Birkler et al. | Feb 2003 | B1 |
6516327 | Zondervan et al. | Feb 2003 | B1 |
6519452 | Agostino et al. | Feb 2003 | B1 |
6523063 | Hanson | Feb 2003 | B1 |
6523079 | Kikinis et al. | Feb 2003 | B2 |
6532588 | Porter | Mar 2003 | B1 |
6535743 | Kennedy et al. | Mar 2003 | B1 |
6535949 | Parker | Mar 2003 | B1 |
6539494 | Abramson et al. | Mar 2003 | B1 |
6542933 | Durst, Jr. et al. | Apr 2003 | B1 |
6546425 | Hanson et al. | Apr 2003 | B1 |
6549933 | Barrett et al. | Apr 2003 | B1 |
6549937 | Auerbach et al. | Apr 2003 | B1 |
6553375 | Huang et al. | Apr 2003 | B1 |
6553410 | Kikinis | Apr 2003 | B2 |
6553413 | Leighton et al. | Apr 2003 | B1 |
6564336 | Majkowski | May 2003 | B1 |
6567850 | Freishtat et al. | May 2003 | B1 |
6567857 | Gupta et al. | May 2003 | B1 |
6581065 | Rodkin et al. | Jun 2003 | B1 |
6584454 | Hummel et al. | Jun 2003 | B1 |
6589290 | Maxwell et al. | Jul 2003 | B1 |
6591266 | Li et al. | Jul 2003 | B1 |
6591306 | Redlich | Jul 2003 | B1 |
6591362 | Li | Jul 2003 | B1 |
6597700 | Golikeri et al. | Jul 2003 | B2 |
6601071 | Bowker et al. | Jul 2003 | B1 |
6601143 | Lamparter | Jul 2003 | B1 |
6609005 | Chern | Aug 2003 | B1 |
6628194 | Hellebust et al. | Sep 2003 | B1 |
6636894 | Short et al. | Oct 2003 | B1 |
6640302 | Subramaniam et al. | Oct 2003 | B1 |
6643707 | Booth | Nov 2003 | B1 |
6647399 | Zaremba | Nov 2003 | B2 |
6654746 | Wong et al. | Nov 2003 | B1 |
6662212 | Chandhok et al. | Dec 2003 | B1 |
6665721 | Hind et al. | Dec 2003 | B1 |
6668254 | Matson et al. | Dec 2003 | B2 |
6671724 | Pandya et al. | Dec 2003 | B1 |
6671757 | Multer et al. | Dec 2003 | B1 |
6684088 | Halahmi | Jan 2004 | B1 |
6684206 | Chen et al. | Jan 2004 | B2 |
6684302 | Kershaw | Jan 2004 | B2 |
6694335 | Hopmann et al. | Feb 2004 | B1 |
6694336 | Multer et al. | Feb 2004 | B1 |
6701316 | Li et al. | Mar 2004 | B1 |
6704849 | Steegmans | Mar 2004 | B2 |
6714987 | Amin et al. | Mar 2004 | B1 |
6718336 | Saffer et al. | Apr 2004 | B1 |
6718348 | Novak et al. | Apr 2004 | B1 |
6718390 | Still et al. | Apr 2004 | B1 |
6725239 | Sherman et al. | Apr 2004 | B2 |
6728530 | Heinonen et al. | Apr 2004 | B1 |
6732101 | Cook | May 2004 | B1 |
6732264 | Sun et al. | May 2004 | B1 |
6738789 | Multer et al. | May 2004 | B2 |
6741851 | Lee et al. | May 2004 | B1 |
6745040 | Zimmerman | Jun 2004 | B2 |
6757696 | Multer et al. | Jun 2004 | B2 |
6757698 | McBride et al. | Jun 2004 | B2 |
6757712 | Bastian et al. | Jun 2004 | B1 |
6781575 | Hawkins et al. | Aug 2004 | B1 |
6795848 | Border et al. | Sep 2004 | B1 |
6799214 | Li | Sep 2004 | B1 |
6804690 | Dysert et al. | Oct 2004 | B1 |
6804783 | Wesinger, Jr. et al. | Oct 2004 | B1 |
6810411 | Coughlin et al. | Oct 2004 | B1 |
6812961 | Parulski et al. | Nov 2004 | B1 |
6813487 | Trommelen | Nov 2004 | B1 |
6816481 | Adams et al. | Nov 2004 | B1 |
6829654 | Jungck | Dec 2004 | B1 |
6836657 | Ji et al. | Dec 2004 | B2 |
6836765 | Sussman | Dec 2004 | B1 |
6839022 | Benco et al. | Jan 2005 | B1 |
6839568 | Suzuki | Jan 2005 | B2 |
6842695 | Tu et al. | Jan 2005 | B1 |
6850944 | MacCall et al. | Feb 2005 | B1 |
6868451 | Peacock | Mar 2005 | B1 |
6870921 | Elsey et al. | Mar 2005 | B1 |
6886013 | Beranek | Apr 2005 | B1 |
6892225 | Tu et al. | May 2005 | B1 |
6892245 | Crump et al. | May 2005 | B1 |
6904449 | Quinones | Jun 2005 | B1 |
6904460 | Raciborski et al. | Jun 2005 | B1 |
6920488 | Le Pennec et al. | Jul 2005 | B1 |
6925476 | Multer | Aug 2005 | B1 |
6925477 | Champagne et al. | Aug 2005 | B1 |
6934767 | Jellinek | Aug 2005 | B1 |
6944651 | Onyon et al. | Sep 2005 | B2 |
6944676 | Armbruster et al. | Sep 2005 | B1 |
6954660 | Aoyama | Oct 2005 | B2 |
6954783 | Bodwell et al. | Oct 2005 | B1 |
6959331 | Traversat et al. | Oct 2005 | B1 |
6963914 | Breitbart et al. | Nov 2005 | B1 |
6973299 | Apfel | Dec 2005 | B2 |
6990534 | Mikhailov et al. | Jan 2006 | B2 |
6996617 | Aiken, Jr. et al. | Feb 2006 | B1 |
6996631 | Aiken, Jr. et al. | Feb 2006 | B1 |
7003555 | Jungck | Feb 2006 | B1 |
7003668 | Berson et al. | Feb 2006 | B2 |
7007041 | Multer et al. | Feb 2006 | B2 |
7010578 | Lewin et al. | Mar 2006 | B1 |
7016964 | Still et al. | Mar 2006 | B1 |
7023868 | Rabenko et al. | Apr 2006 | B2 |
7024491 | Hanmann et al. | Apr 2006 | B1 |
7030730 | Zondervan | Apr 2006 | B1 |
7035878 | Multer et al. | Apr 2006 | B1 |
7039656 | Tsai et al. | May 2006 | B1 |
7051275 | Gupta et al. | May 2006 | B2 |
7054594 | Bloch et al. | May 2006 | B2 |
7054952 | Schwerdtfeger et al. | May 2006 | B1 |
7082476 | Cohen et al. | Jul 2006 | B1 |
7085817 | Tock et al. | Aug 2006 | B1 |
7096418 | Singhal et al. | Aug 2006 | B1 |
7099915 | Tenereillo et al. | Aug 2006 | B1 |
7103794 | Malcolm et al. | Sep 2006 | B2 |
7107043 | Aoyama | Sep 2006 | B2 |
7110954 | Yung et al. | Sep 2006 | B2 |
7116681 | Hovell et al. | Oct 2006 | B1 |
7146161 | Chou | Dec 2006 | B2 |
7158805 | Park et al. | Jan 2007 | B1 |
7159036 | Hinchliffe et al. | Jan 2007 | B2 |
7162494 | Arellano | Jan 2007 | B2 |
7167728 | Wagner et al. | Jan 2007 | B1 |
7181628 | Sato et al. | Feb 2007 | B2 |
7197574 | Ishiyama | Mar 2007 | B1 |
7233791 | Gilbert et al. | Jun 2007 | B2 |
7237027 | Raccah et al. | Jun 2007 | B1 |
7249175 | Donaldson | Jul 2007 | B1 |
7269433 | Vargas et al. | Sep 2007 | B2 |
7284051 | Okano et al. | Oct 2007 | B1 |
7289964 | Bowman-Amuah | Oct 2007 | B1 |
7293074 | Jellinek et al. | Nov 2007 | B1 |
7308651 | Kling et al. | Dec 2007 | B2 |
7315826 | Guheen et al. | Jan 2008 | B1 |
7317907 | Linkert et al. | Jan 2008 | B2 |
7328341 | Eun et al. | Feb 2008 | B1 |
7343568 | Jiang et al. | Mar 2008 | B2 |
7349719 | Buniatyan | Mar 2008 | B2 |
7356559 | Jacobs et al. | Apr 2008 | B1 |
7363233 | Levine | Apr 2008 | B1 |
7383061 | Hawkins | Jun 2008 | B1 |
7392034 | Westman et al. | Jun 2008 | B2 |
7415486 | Multer et al. | Aug 2008 | B2 |
7440746 | Swan | Oct 2008 | B1 |
7447743 | Jordan, Jr. | Nov 2008 | B1 |
7454500 | Hsu et al. | Nov 2008 | B1 |
7499888 | Tu et al. | Mar 2009 | B1 |
7505762 | Onyon et al. | Mar 2009 | B2 |
7519702 | Allan | Apr 2009 | B1 |
7539697 | Akella et al. | May 2009 | B1 |
7587398 | Fredricksen et al. | Sep 2009 | B1 |
7596609 | Refuah et al. | Sep 2009 | B1 |
7663652 | Reese | Feb 2010 | B1 |
7707150 | Sundararajan et al. | Apr 2010 | B2 |
7853664 | Wang et al. | Dec 2010 | B1 |
8010095 | Natsuno et al. | Aug 2011 | B2 |
8073954 | Tu et al. | Dec 2011 | B1 |
8224308 | Gavrylyako et al. | Jul 2012 | B1 |
20010005849 | Boothby et al. | Jun 2001 | A1 |
20010014893 | Boothby | Aug 2001 | A1 |
20010028363 | Nomoto et al. | Oct 2001 | A1 |
20010034737 | Cane et al. | Oct 2001 | A1 |
20010044805 | Multer et al. | Nov 2001 | A1 |
20010047393 | Arner et al. | Nov 2001 | A1 |
20010047471 | Johnson | Nov 2001 | A1 |
20010051920 | Joao et al. | Dec 2001 | A1 |
20010056473 | Arneson et al. | Dec 2001 | A1 |
20020007303 | Brokler et al. | Jan 2002 | A1 |
20020010868 | Nakashima et al. | Jan 2002 | A1 |
20020016818 | Kirani et al. | Feb 2002 | A1 |
20020016912 | Johnson | Feb 2002 | A1 |
20020023136 | Silver et al. | Feb 2002 | A1 |
20020032751 | Bharadwaj | Mar 2002 | A1 |
20020040369 | Multer et al. | Apr 2002 | A1 |
20020049852 | Lee et al. | Apr 2002 | A1 |
20020055909 | Fung et al. | May 2002 | A1 |
20020056011 | Nardone et al. | May 2002 | A1 |
20020059116 | Bulatovic et al. | May 2002 | A1 |
20020062365 | Nishikawa et al. | May 2002 | A1 |
20020067816 | Bushnell | Jun 2002 | A1 |
20020069178 | Hoffman | Jun 2002 | A1 |
20020072350 | Fukuzato | Jun 2002 | A1 |
20020073212 | Sokol et al. | Jun 2002 | A1 |
20020078075 | Colson et al. | Jun 2002 | A1 |
20020082995 | Christie | Jun 2002 | A1 |
20020083325 | Mediratta et al. | Jun 2002 | A1 |
20020087588 | McBride et al. | Jul 2002 | A1 |
20020091785 | Ohlenbusch et al. | Jul 2002 | A1 |
20020116444 | Chaudhri et al. | Aug 2002 | A1 |
20020118192 | Couckuyt et al. | Aug 2002 | A1 |
20020120600 | Schiavone et al. | Aug 2002 | A1 |
20020128908 | Levin et al. | Sep 2002 | A1 |
20020138582 | Chandra et al. | Sep 2002 | A1 |
20020138765 | Fishman et al. | Sep 2002 | A1 |
20020152278 | Pontenzone et al. | Oct 2002 | A1 |
20020162011 | Tanaka et al. | Oct 2002 | A1 |
20020168964 | Kraft | Nov 2002 | A1 |
20020168975 | Gresham et al. | Nov 2002 | A1 |
20020194196 | Weinberg et al. | Dec 2002 | A1 |
20030021274 | Siikaniemi et al. | Jan 2003 | A1 |
20030028451 | Ananian | Feb 2003 | A1 |
20030028554 | Koskimies et al. | Feb 2003 | A1 |
20030028603 | Aktas et al. | Feb 2003 | A1 |
20030028647 | Grosu | Feb 2003 | A1 |
20030037020 | Novak et al. | Feb 2003 | A1 |
20030043195 | Kling et al. | Mar 2003 | A1 |
20030046433 | Luzzatti et al. | Mar 2003 | A1 |
20030061163 | Durfield | Mar 2003 | A1 |
20030065934 | Angelo et al. | Apr 2003 | A1 |
20030069874 | Hertzog et al. | Apr 2003 | A1 |
20030084121 | De Boor et al. | May 2003 | A1 |
20030093797 | Bazzaz | May 2003 | A1 |
20030110280 | Hinchliffe et al. | Jun 2003 | A1 |
20030115240 | Cho | Jun 2003 | A1 |
20030134625 | Choi | Jul 2003 | A1 |
20030135463 | Brown et al. | Jul 2003 | A1 |
20030139172 | Lampela et al. | Jul 2003 | A1 |
20030158960 | Engberg | Aug 2003 | A1 |
20030163483 | Zingher et al. | Aug 2003 | A1 |
20030172236 | Iyengar et al. | Sep 2003 | A1 |
20030200234 | Koppich et al. | Oct 2003 | A1 |
20030204568 | Bhargava et al. | Oct 2003 | A1 |
20030208546 | Desalvo et al. | Nov 2003 | A1 |
20030217181 | Kiiskinen | Nov 2003 | A1 |
20030224760 | Day | Dec 2003 | A1 |
20030229723 | Kangas et al. | Dec 2003 | A1 |
20030229898 | Babu et al. | Dec 2003 | A1 |
20030233383 | Koskimies | Dec 2003 | A1 |
20030233418 | Goldman | Dec 2003 | A1 |
20030236933 | Shigeta et al. | Dec 2003 | A1 |
20040003390 | Canter et al. | Jan 2004 | A1 |
20040054746 | Shibata | Mar 2004 | A1 |
20040058673 | Irlam et al. | Mar 2004 | A1 |
20040093317 | Swan | May 2004 | A1 |
20040093342 | Arbo et al. | May 2004 | A1 |
20040093385 | Yamagata | May 2004 | A1 |
20040110497 | Little | Jun 2004 | A1 |
20040111465 | Chuang et al. | Jun 2004 | A1 |
20040120477 | Nguyen et al. | Jun 2004 | A1 |
20040128324 | Sheynman et al. | Jul 2004 | A1 |
20040132428 | Mulligan | Jul 2004 | A1 |
20040142711 | Mahonen et al. | Jul 2004 | A1 |
20040148408 | Nadarajah | Jul 2004 | A1 |
20040162830 | Shirwadkar et al. | Aug 2004 | A1 |
20040192260 | Sugimoto et al. | Sep 2004 | A1 |
20040192282 | Vasudevan | Sep 2004 | A1 |
20040193953 | Callahan et al. | Sep 2004 | A1 |
20040204120 | Jiles | Oct 2004 | A1 |
20040224665 | Kokubo | Nov 2004 | A1 |
20040235523 | Schrire et al. | Nov 2004 | A1 |
20040267390 | Ben-Yaacov et al. | Dec 2004 | A1 |
20040267676 | Feng et al. | Dec 2004 | A1 |
20040267944 | Britt | Dec 2004 | A1 |
20050021571 | East | Jan 2005 | A1 |
20050032527 | Sheha et al. | Feb 2005 | A1 |
20050038863 | Onyon et al. | Feb 2005 | A1 |
20050044404 | Bhansali et al. | Feb 2005 | A1 |
20050050117 | Seo et al. | Mar 2005 | A1 |
20050054354 | Roman et al. | Mar 2005 | A1 |
20050060392 | Goring et al. | Mar 2005 | A1 |
20050064859 | Kotzin et al. | Mar 2005 | A1 |
20050081152 | Commarford | Apr 2005 | A1 |
20050086296 | Chi et al. | Apr 2005 | A1 |
20050086318 | Aubault | Apr 2005 | A1 |
20050090253 | Kim et al. | Apr 2005 | A1 |
20050096975 | Moshe | May 2005 | A1 |
20050099963 | Multer et al. | May 2005 | A1 |
20050100150 | Dhara et al. | May 2005 | A1 |
20050102257 | Onyon et al. | May 2005 | A1 |
20050102328 | Ring et al. | May 2005 | A1 |
20050114470 | Bal | May 2005 | A1 |
20050131990 | Jewell | Jun 2005 | A1 |
20050144200 | Hesselink et al. | Jun 2005 | A1 |
20050144251 | Slate | Jun 2005 | A1 |
20050157858 | Rajagopalan | Jul 2005 | A1 |
20050191998 | Onyon et al. | Sep 2005 | A1 |
20050203971 | Koskimies et al. | Sep 2005 | A1 |
20050203992 | Tanaka et al. | Sep 2005 | A1 |
20050204001 | Stein et al. | Sep 2005 | A1 |
20050210101 | Janik | Sep 2005 | A1 |
20050227674 | Kopra et al. | Oct 2005 | A1 |
20050233800 | Jones | Oct 2005 | A1 |
20050240494 | Cue et al. | Oct 2005 | A1 |
20050246325 | Pettinati | Nov 2005 | A1 |
20050273632 | Kawakami | Dec 2005 | A1 |
20050283741 | Balabanovic et al. | Dec 2005 | A1 |
20060021059 | Brown et al. | Jan 2006 | A1 |
20060035647 | Eisner et al. | Feb 2006 | A1 |
20060052091 | Onyon et al. | Mar 2006 | A1 |
20060095397 | Torres et al. | May 2006 | A1 |
20060129627 | Phillips et al. | Jun 2006 | A1 |
20060148477 | Reilly | Jul 2006 | A1 |
20060190626 | Bhogal et al. | Aug 2006 | A1 |
20060195474 | Cadiz et al. | Aug 2006 | A1 |
20060199599 | Gupta et al. | Sep 2006 | A1 |
20060212482 | Celik | Sep 2006 | A1 |
20060233335 | Pfleging et al. | Oct 2006 | A1 |
20060268842 | Takahashi et al. | Nov 2006 | A1 |
20060277160 | Singh et al. | Dec 2006 | A1 |
20060288112 | Soelberg et al. | Dec 2006 | A1 |
20070005504 | Chen et al. | Jan 2007 | A1 |
20070022469 | Cooper et al. | Jan 2007 | A1 |
20070043739 | Takai et al. | Feb 2007 | A1 |
20070047533 | Criddle et al. | Mar 2007 | A1 |
20070050734 | Busey | Mar 2007 | A1 |
20070053335 | Onyon et al. | Mar 2007 | A1 |
20070056043 | Onyon et al. | Mar 2007 | A1 |
20070061331 | Ramer et al. | Mar 2007 | A1 |
20070082668 | Silver et al. | Apr 2007 | A1 |
20070094042 | Ramer et al. | Apr 2007 | A1 |
20070127597 | Ammer et al. | Jun 2007 | A1 |
20070190983 | Goldfarb et al. | Aug 2007 | A1 |
20070214149 | Bodin et al. | Sep 2007 | A1 |
20070220419 | Stibel et al. | Sep 2007 | A1 |
20070226272 | Huang et al. | Sep 2007 | A1 |
20070226783 | Mimlitsch | Sep 2007 | A1 |
20080005080 | Xiques et al. | Jan 2008 | A1 |
20080009268 | Ramer et al. | Jan 2008 | A1 |
20080022220 | Cheah | Jan 2008 | A1 |
20080027826 | Popick et al. | Jan 2008 | A1 |
20080039020 | Eskin | Feb 2008 | A1 |
20080051071 | Vishwanathan et al. | Feb 2008 | A1 |
20080051117 | Khare et al. | Feb 2008 | A1 |
20080064378 | Kahan et al. | Mar 2008 | A1 |
20080082421 | Onyon et al. | Apr 2008 | A1 |
20080089299 | Lindsley et al. | Apr 2008 | A1 |
20080104442 | Diao et al. | May 2008 | A1 |
20080120199 | Pirnack et al. | May 2008 | A1 |
20080127289 | Julia et al. | May 2008 | A1 |
20080201362 | Multer et al. | Aug 2008 | A1 |
20080208617 | Onyon et al. | Aug 2008 | A1 |
20080214163 | Onyon et al. | Sep 2008 | A1 |
20080214167 | Natsuno et al. | Sep 2008 | A1 |
20080268823 | Shalev et al. | Oct 2008 | A1 |
20080270805 | Kean | Oct 2008 | A1 |
20090037828 | Waite et al. | Feb 2009 | A1 |
20090055464 | Multer et al. | Feb 2009 | A1 |
20090106110 | Stannard et al. | Apr 2009 | A1 |
20090138546 | Cruzada | May 2009 | A1 |
20090327305 | Roberts et al. | Dec 2009 | A1 |
20100057777 | Williamson | Mar 2010 | A1 |
20100205448 | Tarhan et al. | Aug 2010 | A1 |
20100251230 | O'Farrell et al. | Sep 2010 | A1 |
20110107203 | Nash et al. | May 2011 | A1 |
20110269424 | Multer et al. | Nov 2011 | A1 |
20120151346 | McClements, IV | Jun 2012 | A1 |
Number | Date | Country |
---|---|---|
1202662 | Dec 1998 | CN |
1455522 | Nov 2003 | CN |
1313697 | Feb 2005 | CN |
2003-122958 | Jul 2006 | CN |
0801487 | Oct 1997 | EP |
0836131 | Apr 1998 | EP |
0836301 | Apr 1998 | EP |
0924917 | Jun 1999 | EP |
0930593 | Jul 1999 | EP |
1024441 | Feb 2000 | EP |
0986225 | Mar 2000 | EP |
1139608 | Oct 2001 | EP |
1180890 | Feb 2002 | EP |
1263244 | Apr 2002 | EP |
2366050 | Jun 2001 | GB |
7303146 | Nov 1995 | JP |
10191453 | Jul 1998 | JP |
11242620 | Sep 1999 | JP |
11242677 | Sep 1999 | JP |
2000232680 | Aug 2000 | JP |
2000316053 | Nov 2000 | JP |
2002142254 | May 2002 | JP |
2002185575 | Jun 2002 | JP |
2002247144 | Aug 2002 | JP |
2002314689 | Oct 2002 | JP |
2003259011 | Sep 2003 | JP |
WO 9704391 | Feb 1997 | WO |
WO 9739564 | Oct 1997 | WO |
WO 9741520 | Nov 1997 | WO |
WO 9803005 | Jan 1998 | WO |
WO 9821648 | May 1998 | WO |
WO 9829994 | Jul 1998 | WO |
WO 9854662 | Dec 1998 | WO |
WO 9856159 | Dec 1998 | WO |
WO 9905813 | Feb 1999 | WO |
WO 9906900 | Feb 1999 | WO |
WO 9936870 | Jul 1999 | WO |
WO 9940514 | Aug 1999 | WO |
WO 9945451 | Sep 1999 | WO |
WO 9945484 | Sep 1999 | WO |
WO 9946701 | Sep 1999 | WO |
WO 9950761 | Oct 1999 | WO |
WO 9965256 | Dec 1999 | WO |
WO 0011832 | Mar 2000 | WO |
WO 0016222 | Mar 2000 | WO |
WO 0029998 | May 2000 | WO |
0133874 | May 2001 | WO |
WO 0171539 | Sep 2001 | WO |
WO 0180535 | Sep 2001 | WO |
0217140 | Feb 2002 | WO |
2003-083716 | Oct 2003 | WO |
WO 2005112586 | Dec 2005 | WO |
Entry |
---|
Finnigan, Anne, “The Safe Way to Shop Online,” Sep. 1998, p. 162, Good Housekeeping, v. 227 No. 3. |
Chase, Larry, “Taking Transactions Online,” Oct. 1998, pp. 124-132, Target Marketing, v.21 No. 10. |
Gong, Li, “Increasing Availability and Security of an Authentication Service,” Jun. 1993, pp. 657-662, IEEE Journal on Selected Areas in Communications, v. 11 No. 5. |
DeMaio, Harry B., “My MIPS Are Sealed,” Sep./Oct. 1993, pp. 46-51, Chief Information Officer Journal, v. 5 issue 7. |
Anonymous: “Download filter for MMS”, Research Disclosure, Mason Publications, Hampshire, GB, vol. 457, No. 28, May 1, 2002, XP007130322, ISSN: 0374-4353. |
Intellisync Email Accelerator, A detailed guide to functionality-Product functionality paper, Mar. 2004, pp. 1-18. |
Lee et al, “Monitoring Data Archives for Grid Environments,” Jul. 2002, 10 pgs. |
Batista et al. “Mining Web Access Logs of an On-line Newspaper” Jul. 2002, 8 pgs. http://ectrl.itc.it/rpec/. |
Internet Mail Consortium: :vCard Overview, Oct. 13, 1998, 3 pages, Retrieved from the Internet: www.imc.org/pdi/vcardoverview. |
Internet Mail Consortium: :vCard The Electronic Business Card, Jan. 1, 1997, 5 pages, Retrieved from the Internet: www.imc.org/pdi/vcardwhite.html. |
Jennings, J. “SyncML DM: A SyncML Protocol for Device Management,”slide presentation, downloaded from www.openalliance.org/tech/affiliates/syncml/syncmldm—28jan02—James—jennings.pdf, Jan. 28, 2002, 23 pgs. |
Toroi, T. “The SyncML Road Ahead- Application Development and Device Management,” slide presentation, downloaded from www.openalliance.org/tech/affiliates/syncml/syncmldm—30jan02—teemu—Toroi.pdf, Jan. 30, 2002. |
Sheha, M.A.et al. “Specification and Drawings of U.U. U.S. Appl. No. 60/493,704,” filed Aug. 8, 2003. |
FusionOne “FusionOne Unveils Integrated Carrier Product Suite to Deliver Mobility Solutions to Individuals and the Enterprise,” Press Release, Mar. 18, 2002, 3 pgs. |
FusionOne “FusionOne Unveils Mighty Phone™ Wireless Service,” Press Release,Nov. 18, 2002, 3 pgs. |
Business Wire, “SyncML Announces 18 New Compliant Products, SyncML DM Engineering Event Held; 99 Devices No Certified SyncML Compliant,” Press Release, Sep. 25, 2002. |
Reed, Benjamin C., et al.,“Authenticating Network-Attached Storage,” IEEE, Jan.-Feb. 2000, pp. 49-57. |
Gaskin, J.E.:Messaging-Instant Enterprise- Once a Novelty item, IM is Becoming a More Serious Tool for Business Users, Internet Week, No. 810, Apr. 24, 2000, p. 55. |
Business Wire, “FusionOne Partners with WhitePages.com to Deliver Automatic Synchronization for Online Subscriber,” press release, Oct. 11, 2000. |
Pabla, C.“SyncML Intensive,” downloaded from www-128.ibm.com/developerworks/wireless/library/we-syncml2, Apr. 1, 2002. |
Malone, et al., Semi-Structured Messages are Surprisingly Useful for Computer-Supported Coordination, Proceedings of the Conference on Computer-Supported Cooperative Work, Austin, Texas, Dec. 3-5, 1986, pp. 1-26. |
Patel et al., “The Multimedia Fax-MIME Gateway,” 8440 IEEE MultiMedia No. 4, Jan. 1994, 7 pgs. |
Lamb et al.,“LAN-Based Office for the Enterprise, A Case Study,” Advantis Company, White Plains, NY 10605, Jan. 1994 IEEE, pp. 440-447. |
Starfish, “TrueSync Data Synchronization,” Software, http://www.starfishsoftware.com/solutions/data.html, Jan. 2003. |
Rou et al., “Online File Storage System,” 2002 Student Conference on Research and Development Proceedings, Shah Alam, Malaysia, Nov. 7, 2002, IEEE, pp. 83-86. |
Agarwal et al., “On the Scalability of Data Synchronization Protocols for PDAs and Mobile Devices,” Jul. 2002, IEEE Network, pp. 22-28. |
Todorut, Cosmin, Primary Examiner, Examining Division, Office Action for European Patent Application No. 04 778 799.9-2416 mailed Jan. 21, 2010, 7pgs. |
Non-final Office Action dated Sep. 13, 2011, U.S. Appl. No. 12/319,087, filed Dec. 30, 2008, Richard Onyon. |
Office Action mailed Jul. 23, 2013, U.S. Appl. No. 12/319,087, filed Dec. 30, 2008, Richard Onyon et al. |
Number | Date | Country | |
---|---|---|---|
20050038863 A1 | Feb 2005 | US |
Number | Date | Country | |
---|---|---|---|
60489163 | Jul 2003 | US | |
60565199 | Apr 2004 | US |