1. Field of the Invention
The present invention is directed to the field of data communications in a wireless network. More specifically, the invention relates to a system and method for communicating information to a mobile communication device (“mobile device”) within a wireless data network (such as an IP based wireless data network) and also for replicating information between a host system (or a host system with an associated messaging server) and the mobile device via the wireless data network.
2. Description of the Related Art
Wireless data networks are known in this field. Early wireless data networks include the Mobitex network and the Datatac network. These early networks provided limited data capacity and also required to have fixed addresses for each mobile device. Such a fixed address is also known as a “static” network address. Recently, however, new types of wireless data networks have emerged having much greater data bandwidth. These new data networks, such as the GPRS network, may utilize the Internet Protocol (IP) for routing data to a mobile device. The inherent addressing limitations of the IP protocol (and other similar packet protocols) typically limit the use of have static addressing in these types of data networks, thus leading to a dynamic addressing scheme. In this type of addressing scheme, a pool of available network addresses is dynamically assigned to a much greater pool of user devices depending on which devices are accessing the network at a given instant.
As described in more detail in the co-pending, and co-owned application S/N, a wireless data network can be coupled to one or more redirector applications for enabling real-time mirroring (or redirection) of user data items from a user's office computer (or corporate server) to the user's mobile device. In such a redirector application, user data items, such as e-mail messages, calendar events, etc., are received at the user's office computer, which then redirects (or mirrors) the data items to the user's mobile device via the wireless data network. It would be advantageous to extend this redirection system to operate with newer wireless data networks such as the General Packet Radio Service (“GPRS”) network, or other networks that may utilize a packet protocol, such as IP, in which the wireless data network dynamically assigns network addresses on an as-needed basis.
A system and method for redirecting data to one or more mobile data communication devices via a wireless packet data network is provided in which the network dynamically assigns network addresses to the mobile data communication devices on an as-needed basis. A redirector program preferably operating at a host system continuously redirects data to the wireless packet data network, as the data is received (or altered) at the host system. Two methods are provided for communicating the redirected data from the wireless network to the mobile device. In a first method, the mobile device is configured to periodically contact a store-and-forward server (or gateway) operating in conjunction with the wireless network, which, when contacted, transmits the data to the mobile device. In a second method, the wireless network transmits a connection request command to the mobile device via a parallel voice network, or via a control channel on the data network, or via some other type of low-bandwidth data channel. The mobile device then contacts the wireless data network and requests a network address so that the store-and-forward server can send the data to the mobile device. In this second embodiment the presence of a ‘push bearer’ channel is preferred. A push bearer network is defined as a network that can provide an address for the wireless device that is statically defined and always reachable. The push bearer network can have low capacity and very limited bandwidth, as is the case with the Short Message Service (SMS) messaging, used on many wireless networks.
The redirector program enables a user to redirect (or mirror) certain user-selected data items (or parts of data items) from the host system to the user's mobile data communication device upon detecting that one or more user-defined triggering events has occurred. Also operating at the host system are various sub-systems that can be configured to create triggering events, such as a screen saver sub-system or a keyboard sub-system, as well as sub-systems for repackaging the user's data items for transparent delivery to the mobile device, such as a TCP/IP sub-system or one or more E-Mail sub-systems. Other sub-systems for creating triggering events and repackaging the user's data items could also be present at the host system.
Using the redirector program, the user can select certain data items for redirection, such as E-mail messages, calendar events, meeting notifications, address entries, journal entries, personal reminders, etc. Having selected the data items for redirection, the user can then configure one or more event triggers, which are sensed by the redirector program to initiate redirection of the user's data items. These user-defined triggers (or event triggers) may include external events, internal events and networked events. Examples of external events include: receiving a message from the user's mobile data communication device to begin redirection; receiving a similar message from some external computer; sensing that the user is no longer in the vicinity of the host system; or any other event that is external to the host system. Internal events could be a calendar alarm, screen saver activation, keyboard timeout, programmable timer, or any other user-defined event that is internal to the host system. Networked events are user-defined messages that are transmitted to the host system from another computer coupled to the host system via a network to initiate redirection.
In addition to the functionality noted above, the redirector program provides a set of software-implemented control functions for determining the type of mobile data communication device and its address (if a static address is used), for programming a preferred list of message types that are to be redirected, and for determining whether the mobile device can receive and process certain types of message attachments, such as word processor or voice attachments.
The determination of whether a particular mobile device can receive and process attachments is initially configured by the user of that mobile device at the host system. This configuration can be altered on a global or per message basis by transmitting a command message from the mobile device to the host system. If the redirector is configured so that the mobile device cannot receive and process word processor or voice attachments, then the redirector program routes these attachments to an external machine that is compatible with the particular attachment, such as an attached printer or networked fax machine or telephone. Other types of attachments could be redirected to other types of external machines in a similar fashion, depending upon the capabilities of the mobile device. For example, if a user is traveling and receives a message with an attachment that the user's mobile device can process or display, the user may, from a mobile communications device, send a command message to the host system indicating that that attachment should be sent to a fax machine at a hotel where the user will be spending the evening. This enables the user to receive important E-mail attachments as long as the host system is provided with sufficient information about the destination where the attachment is to be forwarded.
Once an event has triggered redirection of the user data items, the host system repackages these items in a manner that is transparent to the mobile data communication device, so that the data at the mobile device appears similar to the same data at the user's host system. The preferred repackaging method includes wrapping the user data items in an E-mail envelope that corresponds to the address of the mobile data communication device, although, alternatively, other repackaging methods could be used with the present invention, such as special-purpose TCP/IP wrapping techniques, or other methods of wrapping the user selected data items. The repackaging method preferably results in a shared E-mail address for the user's host system and the user's mobile device. To a recipient of an E-mail generated at either the host or the mobile device, it appears as though the E-mail was generated at the host system. The repackaging method also provides encryption/decryption and compression/decompression.
In an alternative system and method, the redirector program executes at a network server, and the server is programmed to detect numerous redirection event triggers over a local area network (“LAN”) from multiple user desktop systems coupled to the server via the LAN. The server can receive internal event triggers from each of the user desktops via the LAN, and can also receive external event triggers, such as messages from the users' mobile data communication devices. In response to receiving one of these triggers, the server redirects the user's data items to the proper mobile data communication device. The user data items and addressing information for a particular mobile device can be stored at the server or at the user's desktop system. Using this alternative configuration, one redirector program can serve a plurality of users. This alternative configuration could also include an Internet or Intranet-based redirector program that could be accessible through a secure webpage or other user interface.
In another alternative configuration of the present invention, a redirector program operates at both the host system and at the user's mobile data communication device. In this configuration, the user's mobile device operates similarly to the host system, described below, and is configured in a similar fashion to redirect certain user-selected data items from the mobile device to the user's host system (or some other computer) upon detecting an event trigger at the mobile device. This configuration provides two-way redirection of information from the host to the mobile device and from the mobile device to the host.
The present invention can be used with many types of mobile data communication devices, including two-way pagers, cellular telephones having data messaging capabilities, PDAs, laptops, palmtops, or any other type of wireless communicator. These wireless communicators may be dual-mode devices that operate on both voice and data networks, such as a communicator capable of sending and receiving voice signals over a voice network like GSM, and also capable of sending and receiving data signals over a data network like GPRS. Or, the wireless communicator may be a single-mode device that operates on just a data network (like GPRS), or it may be a multimode device capable of operating on some other combination of voice and data networks.
a and 13b are sequence diagrams illustrating actions taken at the mobile, DHCP and store and forward gateway after a connection request command is made to the mobile.
Referring now to the drawings,
In
In the example of
The preferred mobile data communication device 24 is a hand-held two-way wireless paging computer, a wirelessly enabled palm-top computer, a mobile telephone with data messaging capabilities, or a wirelessly enabled laptop computer, but could, alternatively be other types of mobile data communication devices capable of sending and receiving messages via a network connection 22. Although it is preferable for the system to operate in a two-way communications mode, certain aspects of the invention could be beneficially used in a “one and one-half” or acknowledgment paging environment, or even with a one-way paging system. The mobile data communication device 24 includes software program instructions that work in conjunction with the redirector program 12 to enable the seamless, transparent redirection of user-selected data items.
One example of a dual-mode device is shown in
Where the device 24 is enabled for two-way communications, the device will incorporate a communication subsystem 1911, including a receiver 1912, a transmitter 1914, and associated components such as one or more, preferably embedded or internal, antenna elements 1916 and 1918, local oscillators (LOs) 1913, and a processing module such as a digital signal processor (DSP) 1920. As will be apparent to those skilled in the field of communications, the particular design of the communication subsystem 1911 will be dependent upon the communication network in which the device is intended to operate. For example, a device 24 destined for a North American market may include a communication subsystem 1911 designed to operate within the Mobitex™ mobile communication system or the DataTAC™ mobile communication system, whereas a device 24 intended for use in Europe may incorporate a General Packet Radio Service (GPRS) communication subsystem 1911.
Network access requirements will also vary depending upon the type of network 1919. For example, in the Mobitex and DataTAC networks, mobile devices 24 are registered on the network using a unique personal identification number or PIN associated with each device. In GPRS networks, however, network access is associated with a subscriber or user of a device 24. A GPRS device therefore requires a subscriber identity module (not shown), commonly referred to as a SIM card, in order to operate on a GPRS network. Without a SIM card, a GPRS device will not be fully functional. Local or non-network communication functions (if any) may be operable, but the device 24 will be unable to carry out any functions involving communications over the network 1919. When required network registration or activation procedures have been completed, a device 24 may send and receive communication signals over the network 1919. Signals received by the antenna 1916 through a communication network 1919 are input to the receiver 1912, which may perform such common receiver functions as signal amplification, frequency down conversion, filtering, channel selection and the like, and in the example system shown in
The DSP 1920 not only processes communication signals, but also provides for receiver and transmitter control. For example, the gains applied to communication signals in the receiver 1912 and transmitter 1914 may be adaptively controlled through automatic gain control algorithms implemented in the DSP 1920.
The device 24 preferably includes a microprocessor 1938, which controls the overall operation of the device. Communication functions, including at least data and voice communications, are performed through the communication subsystem 1911. The microprocessor 1938 also interacts with other device subsystems, such as the display 1922, flash memory 1924, random access memory (RAM) 1926, auxiliary input/output (I/O) subsystems 1928, serial port 1930, keyboard 1932, speaker 1934, microphone 1936, a short-range communications subsystem 1940 and any other device subsystems generally designated as 1942.
Some of the subsystems shown in
Operating system software used by the microprocessor 1938 is preferably stored in a persistent store, such as flash memory 1924, which may alternately be a read only memory (ROM) or similar storage element. Those skilled in the art will appreciate that the operating system, specific device applications, or parts thereof, may be temporarily loaded into a volatile store, such as RAM 1926. It is contemplated that received communication signals may also be stored to RAM 1926.
The microprocessor 1938, in addition to its operating system functions, preferably enables execution of software applications on the device. A predetermined set of applications that control basic device operations, including at least data and voice communication applications, for example, may be installed on the device 24 during manufacture. A preferred application that may be loaded onto the device may be a personal information manager (PM) application having the ability to organize and manage data items relating to the device user such as, but not limited to, e-mail, calendar events, voice mails, appointments, and task items. Naturally, one or more memory stores would be available on the device to facilitate storage of PIM data items on the device. Such PIM application would preferably have the ability to send and receive data items, via the wireless network. In a preferred embodiment, the PIM data items are seamlessly integrated, synchronized and updated, via the wireless network, with the device user's corresponding data items stored or associated with a host computer system. Further applications may also be loaded onto the device 24 through the network 1919, an auxiliary I/O subsystem 1928, serial port 1930, short-range communications subsystem 1940 or any other suitable subsystem 1942, and installed by a user in the RAM 1926 or preferably a non-volatile store for execution by the microprocessor 1938. Such flexibility in application installation increases the functionality of the device and may provide enhanced on-device functions, communication-related functions, or both. For example, secure communication applications may enable electronic commerce functions and other such financial transactions to be performed using the device 24.
In a data communication mode, a received signal, such as a text message or web page download, will be processed by the communication subsystem 1911 and input to the microprocessor 1938, which will preferably further process the received signal for output to the display 1922, or alternatively to an auxiliary I/O device 1928. A user of device 24 may also compose data items, such as email messages, for example, using the keyboard 1932, which is preferably a complete alphanumeric keyboard or telephone-type keypad, in conjunction with the display 1922 and possibly an auxiliary I/O device 1928. Such composed items may then be transmitted over a communication network through the communication subsystem 1911.
For voice communications, overall operation of the device 24 is substantially similar, except that received signals would preferably be output to a speaker 1934 and signals for transmission would be generated by a microphone 1936. Alternative voice or audio I/O subsystems, such as a voice message recording subsystem, may also be implemented on the device 24. Although voice or audio signal output is preferably accomplished primarily through the speaker 1934, the display 1922 may also be used to provide an indication of the identity of a calling party, the duration of a voice call, or other voice call related information for example.
The serial port 1930 in
A short-range communications subsystem 1940 is a further optional component, which may provide for communication between the device 1924 and different systems or devices, which need not necessarily be similar devices. For example, the subsystem 1940 may include an infrared device and associated circuits and components or a Bluetooth™ communication module to provide for communication with similarly-enabled systems and devices.
In an alternative embodiment of the present invention, the mobile device 24 also includes a redirector program. In this embodiment, user selected data items can be replicated from the host to the mobile device and vice versa. The configuration and operation of the mobile device 24 having a redirector program is similar to that described herein with respect to
A user of the present invention can configure the redirector program 12 to push certain user-selected data items to the user's mobile device 24 when the redirector 12 detects that a particular user-defined event trigger (or trigger point) has taken place. User-selected data items preferably include E-mail messages, calendar events, meeting notifications, address entries, journal entries, personal alerts, alarms, warnings, stock quotes, news bulletins, corporate data (from an Intranet or from behind the corporate firewall), etc., but could, alternatively, include any other type of message that is transmitted to the host system 10, or that the host system 10 acquires through the use of intelligent agents, such as data that is received after the host system 10 initiates a search of a database or a website or a bulletin board. In some instances, only a portion of the data item is transmitted to the mobile device 24 in order to minimize the amount of data transmitted via the wireless network 22. In these instances, the mobile device 24 can optionally send a command message to the host system to receive more or all of the data item if the user desires to receive it.
Among the user-defined event triggers that can be detected by the redirector program 12 are in the preferred embodiment external events, internal events and networked events. External events preferably include: (1) receiving a command message (such as message C) from the user's mobile data communication device to begin redirection, or to execute some other command at the host, such as a command to enable the preferred list mode, or to add or subtract a particular sender from the preferred list; (2) receiving a similar message from some external computer; and (3) sensing that the user is no longer in the vicinity of the host system; although, alternatively, an external event can be any other detectable occurrence that is external to the host system. Internal events could be a calendar alarm, screen saver activation, keyboard timeout, programmable timer, or any other user-defined event that is internal to the host system. Networked events are user-defined messages that are transmitted to the host system from another computer coupled to the host system via a network to initiate redirection. These are just some of the events that could be used with the present invention to initiate replication of the user-selected data items from the host system 10 to the mobile device 24.
Assuming that the redirector program 12 is activated, and has been configured by the user (either through the sensing of an internal, network or external event) to replicate certain user data items (including messages of type A or C) to the mobile device 24, when the message A is received at the host system 10, the redirector program 12 detects its presence and prepares the message for redirection to the mobile device 24. In preparing the message for redirection, the redirector program 12 could compress the original message A, could compress the message header, or could encrypt the entire message A to create a secure link to the mobile device 24.
Also exchanged between the mobile device and the redirector 12 is a personal identification number (PIN) of the user's mobile device 24 such that the redirector 12 associates the mailbox of the user with a PIN. The PIN value could be selected by the manfacturer of the mobile device 24 and programmed into the mobile device 24. Alternatively, this PIN could be a network identifier such as MSISDN, or another value associated with the Subscriber Identity Module (SIM) such as the IMSI. This PIN will be processed by the store-and-forward gateway as it maps the PIN of the mobile device 24 to the currently assigned IP address. Other values that could be saved by the redirector program 12 could include: the type of device, and whether the device 24 can accept certain types of attachments, such as word processing or voice attachments. If the user's type of mobile device cannot accept these types of attachments, then the redirector 12 can be programmed to route the attachments to a fax or voice number where the user is located using an attached fax or voice machine 30.
The redirector may also be programmed with a preferred list mode that is configured by the user either at the host system 10, or remotely from the user's mobile data communication device by transmitting a command message C. The preferred list contains a list of senders (other users) whose messages are to be redirected or a list of message characteristics that determine whether a message is to be redirected. If activated, the preferred list mode causes the redirector program 12 to operate like a filter, only redirecting certain user data items based on whether the data item was sent from a sender on the preferred list or has certain message characteristics that if present will trigger or suppress redirection of the message. In the example of
After the redirector has determined that a particular message should be redirected, and it has prepared the message for redirection, the software 12 then sends the message A to a secondary memory store located in the mobile device 24, using whatever means are necessary. In the preferred embodiment this method is to send the message A back over the LAN 14, WAN 18, and through the store-and-forward gateway 20 to the mobile data communication device 24. In doing so, the redirector preferably repackages message A as an E-mail with an outer envelope B that contains the addressing information of the mobile device 24, although alternative repackaging techniques and protocols could be used, such as a TCP/IP repackaging and delivery method (most commonly used in the alternative server configuration shown in
In the case where message C is representative of an external message from a computer on the Internet 18 to the host system 10, and the host 10 has been configured to redirect messages of type C, then in a similar manner to message A, message C would be repackaged with an outer envelope B and transmitted to the user's mobile device 24. In the case where message C is representative of a command message from the user's mobile device 24 to the host system 10, the command message C is not redirected, but is acted upon by the host system 10.
If the redirected user data item is an E-mail message, as described above, the user at the mobile device 24 sees the original subject, sender's address, destination address and carbon copy. When the user replies to this message, or when the user authors a new message, the software operating at the mobile device 24 adds a similar outer envelope to the reply message (or the new message) to cause the message to be routed first to the user's host system 10, which then removes the outer envelope and redirects the message to the final destination, such as back to computer 26. In the preferred embodiment, this results in the outgoing redirected message from the user's host system 10 being sent using the E-mail address of the host mailbox, rather than the address of the mobile device, so that it appears to the recipient of the message that the message originated from the user's desktop system 10 rather than the mobile data communication device. Any replies to the redirected message will then be sent to the desktop system 10, which if it is still in redirector mode, will repackage the reply and resend it to the user's mobile data device, as described above.
In this alternative configuration, server 11 preferably maintains a user profile for each user's desktop system 10, 26, 28, including information such as whether a particular user can have data items redirected, which types of message and information to redirect, what events will trigger redirection, the PIN of the users' mobile data communication device 24, the type of mobile device, and the user's preferred list, if any. The event triggers are preferably detected at the user's desktop system 10, 26, 28 and can be any of the external, internal or network events listed above. The desktop systems 10, 26, 28 preferably detect these events and then transmit a message to the server computer 11 via LAN 14 to initiate redirection. Although the user data items are preferably stored at the server computer 11 in this embodiment, they could, alternatively, be stored at each user's desktop system 10, 26, 28, which would then transmit them to the server computer 11 after an event has triggered redirection.
As shown in
As described above with reference to
Turning now to
The desktop system 10 is connected to LAN 14, and can send and receive data, messages, signals, event triggers, etc., to and from other systems connected to the LAN 14 and to external networks 18, 22, such as the Internet or a wireless data network, which are also coupled to the LAN 14. In addition to the standard hardware, operating system, and application programs associated with a typical microcomputer or workstation, the desktop system 10 includes the redirector program 12, a TCP/IP sub-system 42, an E-mail sub-system 44, a primary data storage device 40, a screen saver sub-system 48, and a keyboard sub-system 46. The TCP/IP and E-mail subsystems 42, 44 are examples of repackaging systems that can be used to achieve the transparency of the present invention, and the screen saver and keyboard sub-systems 46, 48 are examples of event generating systems that can be configured to generate event messages or signals that trigger redirection of the user selected data items.
The method steps carried out by the redirector program 12 are described in more detail in
The E-Mail sub-system 44 is the preferred link to repackaging the user-selected data items for transmission to the mobile data communication device 24, and preferably uses industry standard mail protocols, such as SMTP, POP, IMAP, MIME and RFC-822, to name but a few. The E-Mail sub-system 44 can receive messages A from external computers on the LAN 14, or can receive messages C from some external network such as the Internet 18 or a wireless data communication network 22, and stores these messages in the primary data store 40. Assuming that the redirector 12 has been triggered to redirect messages of this type, the redirector detects the presence of any new messages and instructs the E-Mail system 44 to repackage the message by placing an outer wrapper B about the original message A (or C), and by providing the addressing information, i.e. PIN value of the mobile data communication device 24 on the outer wrapper B. As noted above, this outer wrapper B is removed by the mobile device 24, and the original message A (or C) is then recovered, thus making the mobile device 24 appear to be the desktop system 10.
In addition, the E-Mail sub-system 44 receives messages back from the mobile device 24 having an outer wrapper with the addressing information of the desktop system 10, and strips this information away so that the message can be routed to the proper sender of the original message A (or C). The E-Mail sub-that it has a current valid IP address for the particular mobile device 100. It can run an inactivity timer that matches the wireless network's 145 inactivity timer for tearing down tunnels, and clear the IP address for that mobile when the timer expires. Otherwise, it can implement an address assignment server 335 and monitor when IP addresses are revoked and assigned to mobiles. Following the two described IP tracking methods, the gateway 140 determines if it does have a valid IP address. If a valid address does exist, then the gateway 140 will attempt to bypass steps 2-5 in
If the validity of the mobile device's 100 IP address is in question, or if there is no mapping of the particular mobile (i.e., there has never been a packet sent to the device, or if the DHCP has indicated that the IP address was revoked), then the gateway 140 performs the additional steps 2-5.
In step 2, the gateway 140 sends a connection request command over the voice network control channel to the mobile device's 100 voice address, in this case shown as an SMS phone number 410. In some networks, like GPRS, it is also possible to send the connection request command over an SMS channel (or some other control channel) of the data network. In this case, the SMS phone number is also used but it does not interfere with the voice component of the device. This connection request command could be implemented in many ways. In one embodiment, the connection request command could be a PING command. For single-mode devices that only communicate over the wireless packet network 145, the connection request command could be sent over a low-bandwidth control channel of the packet network 145.
There are two responses to step 2. At this point, in addition to
Alternatively, the mobile device 100 could be configured to periodically execute step 3 in order to acquire an IP address, without first receiving the connection request command in step 2. In this situation, step 2 could be omitted. This automatic sending of the IP address at a configured interval is seen as less efficient, however, as the user may have to wait for several minutes for information that is waiting to be delivered to their mobile device 100. Normally, the configured interval will be loaded into the mobile device as part of its initial configuration, although it could be updated over-the-air using a secure device updating protocol.
When step 4 is complete, the store-and-forward gateway 140 will be provided with enough information to map a mobile device 100 to an IP address. This mapping, shown as step 5, is a necessary step for building, addressing and sending an IP packet to the mobile device 100. The initial versions of most IP based wireless networks 145, like the GPRS network, do not allow a gateway 140 to initiate a data link (PDP context) to the mobile device 100. One of the main reasons for this limitation is because most networks continue to focus on IPv4 (Internet Protocol version 4), which is the original IP definition used within the Internet. This has resulted in a very limited address space and the inability to assign each mobile device 100 with a fixed IP address. Therefore, wireless network operators have allocated only a small number of ‘real IP addresses’ and use a dynamic address assignment as a preferred strategy. Mobile devices 100 must therefore have an alternate permanent identifier, and servers must maintain a dynamic link between that permanent identifier of the mobile devicde and the temporary IP address of the mobile device.
After the association of mobile device 100 to IP address is completed, step 6 can be performed. In this final step, the store-and-forward gateway 140 sends an IP Packet (either TCP or UDP packet) via the network tunnel to the same mobile device 100 that established the tunnel 325. With the current IP address available to the gateway 140, each data packet can be addressed correctly and sent to the device 100 until the inactivity or out-of-coverage timer expires and the entire IP address reacquiring sequence is performed again.
If there is no IP address for the particular mobile in the database 525A, or if the address has expired, then the gateway 140 determines whether the mobile supports a control channel, such as a connection over a parallel voice network, or a low bandwidth (i.e. supporting only very small data messages) control channel on the data network. If a command channel is not supported, then the gateway 140 must wait for a spontaneous address request message from the mobile device 100 in step 535. If the network does support command messages, however, then the gateway 140 determines if it has implemented a DHCP server in step 540. If the gateway has implemented a DHCP server, then a flag is set to indicate this support within the command message in step 550. In this instance, the command message is a connection request command. Then, in step 545, the connection request command is sent to the mobile, with or without the DHCP supported flag set. A timer is also set to indicate that data is pending for this mobile, and a timer is set to catch any situations where the response is missed 555.
At this point, the gateway 140 is waiting for a message from the mobile device 100, or from the DHCP server 335. As shown in
If the packet is not a normal data packet, however, then the gateway 140 determines, in step 625, if it is a response control packet from the mobile device, such as a PING response control packet 640 to the connection request command sent in
The second type of events that can affect the mapping database 525A are internal timer events. The gateway 140 includes several timers that are set and reset for tracking mobile device 100 states. When one of these timers expires at step 650 it must be checked. Another method to perform this would be to keep an expiry time within the table entry for this device, shown in several parts within
The third type of event that can effect the mobile IP address mapping database 525A is external DHCP requests (step 670). The first check on these events is to see if a DHCP IP de-register is being requested at step 672. If it is, then a flag is set to indicate that the mapping entry for this mobile should be cleared at step 680. If it is not this type of DHCP request, then the gateway 140 determines if it is a DHCP IP register request at step 674. If it is, then a flag is set to indicate that the IP address should be set for this mobile at step 682. If the DHCP request is neither of these two, however, then it is passed to the normal DHCP processing logic at step 676. If the mobile's IP address mapping must be modified, then the IP address mapping database 525A is updated at step 684. This will either cause the mapping to be cleared (step 680) or to be set (step 682), which in turn will cause a database event notification to occur. Once this update is complete the normal DHCP processing is completed with the requests 684.
If the packet is a connection request command as determined at step 715, then a flag is set at step 730 to indicate that the gateway 140 is able to support connection requests on the current wireless network 145 and/or 150. At step 735, an additional check of the packet is performed to see if the gateway 140 also supports DHCP. If so, then a flag is set 740 to indicate that after the tunnel confirmation packet is received, there is no need to forward the new IP address to the gateway 140, as it automatically receives this information when the tunnel is created.
Whether or not the gateway 140 supports DHCP, a tunnel request (or address request) is made by the mobile device 100 to request a new tunnel and a new IP address at step 745. If the packet received is a tunnel confirmation message at step 720, then the flow diagram proceeds to
In
When the mobile device 100 first starts it is necessary to run a poll timer just in case the gateway 140 is unable to send connection request packets. Whenever the poll timer expires 742, the software in the mobile determines if a long or a short timer is running 750. The long timer is used as a fail-safe mechanism to ensure the gateway 140 never gets confused about the state of the device. The long timer is used primarily when connection requests are supported. The long timer could be hours or days long and when it expires causes a tunnel check operation to be executed 755. If a short poll timer is running, the mobile determines if a connection request has ever been received by checking the connection request flag 760. If a connection request was received, then the flag is turned on, which will cause the poll timer to be lengthened to the long timeout value. Otherwise, the mobile will perform a tunnel checking operation, which would involve sending an IP packet to itself or to the gateway, on what should be a valid tunnel 755. The IP based wireless network 145 will return an error if the device 100 does not have a valid tunnel established with the gateway 140. If the tunnel 765 is invalid or not present, the mobile device 100 performs a tunnel request operation 745 to the network to acquire a new tunnel and a new IP address. If the tunnel is valid, then the current IP address is saved and immediately sent to the gateway 140 via a connection response message.
Having described in detail the preferred embodiments of the present invention, including the preferred methods of operation, it is to be understood that this operation could be carried out with different elements and steps. This preferred embodiment is presented only by way of example and is not meant to limit the scope of the present invention, which is defined by the following claims.
This application claims priority from U.S. Provisional Application Ser. Nos. 60/268,824, filed on Feb. 14, 2001, Ser. No. 60/237,616, filed on Oct. 3, 2000, and Ser. No. 60/233,501, filed on Sep. 19, 2000. This application also claims priority from, and is a continuation-in-part of, U.S. patent application Ser. No. 09/528,495, filed on Mar. 17, 2000 which is a continuation of Ser. No. 09/087,623, filed on May 29, 1998, now U.S. Pat. No. 6,219,694. The complete disclosure of each of these provisional and utility applications, and the issued patent, including drawings and claims, is hereby incorporated into this application by reference.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/US01/26907 | 8/29/2001 | WO | 00 | 3/19/2003 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO02/25890 | 3/28/2002 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
4106060 | Chapman, Jr. | Aug 1978 | A |
4164714 | Swanson | Aug 1979 | A |
4417349 | Hills et al. | Nov 1983 | A |
4438433 | Smoot et al. | Mar 1984 | A |
4558454 | Hills et al. | Dec 1985 | A |
4644351 | Zabarsky et al. | Feb 1987 | A |
4695880 | Johnson et al. | Sep 1987 | A |
4697281 | O'Sullivan | Sep 1987 | A |
4713780 | Schultz et al. | Dec 1987 | A |
4768087 | Taub et al. | Aug 1988 | A |
4829554 | Barnes et al. | May 1989 | A |
4837798 | Cohen et al. | Jun 1989 | A |
4837800 | Freeburg et al. | Jun 1989 | A |
4845658 | Gifford | Jul 1989 | A |
4856047 | Saunders | Aug 1989 | A |
4928096 | Leonardo et al. | May 1990 | A |
4951044 | Nelson et al. | Aug 1990 | A |
4972457 | O'Sullivan | Nov 1990 | A |
4980907 | Raith et al. | Dec 1990 | A |
5008926 | Misholi | Apr 1991 | A |
5036518 | Tseung | Jul 1991 | A |
5043721 | May | Aug 1991 | A |
5058431 | Karwacki | Oct 1991 | A |
5068916 | Harrison et al. | Nov 1991 | A |
5086502 | Malcolm | Feb 1992 | A |
5109384 | Tseung | Apr 1992 | A |
5125021 | Lebowitz | Jun 1992 | A |
5127041 | O'Sullivan | Jun 1992 | A |
5128981 | Tsukamoto et al. | Jul 1992 | A |
5136291 | Teague | Aug 1992 | A |
5157660 | Kuwahara et al. | Oct 1992 | A |
5159592 | Perkins | Oct 1992 | A |
5177680 | Tsukino et al. | Jan 1993 | A |
5181200 | Harrison | Jan 1993 | A |
5210785 | Sato et al. | May 1993 | A |
5265033 | Vajk et al. | Nov 1993 | A |
5283887 | Zachery | Feb 1994 | A |
5293250 | Okumura et al. | Mar 1994 | A |
5299255 | Iwaki et al. | Mar 1994 | A |
5307059 | Connary et al. | Apr 1994 | A |
5313582 | Hendel et al. | May 1994 | A |
5315635 | Kane et al. | May 1994 | A |
5325362 | Aziz | Jun 1994 | A |
5333152 | Wilber | Jul 1994 | A |
5333266 | Boaz et al. | Jul 1994 | A |
5370566 | Mitchell, Jr. et al. | Dec 1994 | A |
5392390 | Crozier | Feb 1995 | A |
5406557 | Baudoin | Apr 1995 | A |
5410543 | Seitz et al. | Apr 1995 | A |
5416473 | Dulaney, III et al. | May 1995 | A |
5416842 | Aziz | May 1995 | A |
5436960 | Campana, Jr. et al. | Jul 1995 | A |
5438611 | Campana, Jr. et al. | Aug 1995 | A |
5452356 | Albert | Sep 1995 | A |
5457680 | Kamm et al. | Oct 1995 | A |
5479472 | Campana, Jr. et al. | Dec 1995 | A |
5487100 | Kane | Jan 1996 | A |
5490139 | Baker et al. | Feb 1996 | A |
5493692 | Theimer et al. | Feb 1996 | A |
5495484 | Self et al. | Feb 1996 | A |
5519706 | Bantz et al. | May 1996 | A |
5524171 | de Boisriou | Jun 1996 | A |
5533026 | Ahmadi et al. | Jul 1996 | A |
5539810 | Kennedy et al. | Jul 1996 | A |
5548789 | Nakanura | Aug 1996 | A |
5557659 | Hyde-Thomson | Sep 1996 | A |
5559800 | Mousseau et al. | Sep 1996 | A |
5572528 | Shuen | Nov 1996 | A |
5579472 | Keyworth, II et al. | Nov 1996 | A |
5588009 | Will | Dec 1996 | A |
5598536 | Slaughter, III et al. | Jan 1997 | A |
5603054 | Theimer et al. | Feb 1997 | A |
5604491 | Coonley et al. | Feb 1997 | A |
5604788 | Tett | Feb 1997 | A |
5613108 | Morikawa | Mar 1997 | A |
5617058 | Adrian et al. | Apr 1997 | A |
5625670 | Campana, Jr. et al. | Apr 1997 | A |
5627829 | Gleeson et al. | May 1997 | A |
5630060 | Tang et al. | May 1997 | A |
5631946 | Campana, Jr. et al. | May 1997 | A |
5633810 | Mandal et al. | May 1997 | A |
5638450 | Robson | Jun 1997 | A |
5647002 | Brunson | Jul 1997 | A |
5649286 | Frerking | Jul 1997 | A |
5655219 | Jusa et al. | Aug 1997 | A |
5666530 | Clark et al. | Sep 1997 | A |
5666553 | Crozier | Sep 1997 | A |
5673031 | Meier | Sep 1997 | A |
5673322 | Pepe et al. | Sep 1997 | A |
5701423 | Crozier | Dec 1997 | A |
5705995 | Laflin et al. | Jan 1998 | A |
5706211 | Beletic et al. | Jan 1998 | A |
5708655 | Toth et al. | Jan 1998 | A |
5727202 | Kucala | Mar 1998 | A |
5729735 | Meyering | Mar 1998 | A |
5729826 | Gavrilovich | Mar 1998 | A |
5737328 | Norman et al. | Apr 1998 | A |
5737531 | Ehley | Apr 1998 | A |
5742905 | Pepe et al. | Apr 1998 | A |
5745689 | Yeager et al. | Apr 1998 | A |
5751960 | Matsunaga | May 1998 | A |
5751971 | Dobbins et al. | May 1998 | A |
5754954 | Cannon et al. | May 1998 | A |
5757901 | Hiroshige | May 1998 | A |
5758088 | Bezaire et al. | May 1998 | A |
5758150 | Bell et al. | May 1998 | A |
5761416 | Mandal et al. | Jun 1998 | A |
5764639 | Staples et al. | Jun 1998 | A |
5764899 | Eggleston et al. | Jun 1998 | A |
5765170 | Morikawa | Jun 1998 | A |
5771353 | Eggleston et al. | Jun 1998 | A |
5781614 | Brunson | Jul 1998 | A |
5781901 | Kuzma | Jul 1998 | A |
5790548 | Sistanizadeh et al. | Aug 1998 | A |
5790790 | Smith et al. | Aug 1998 | A |
5790974 | Tognazzini | Aug 1998 | A |
5796727 | Harrison et al. | Aug 1998 | A |
5796806 | Birckbichler | Aug 1998 | A |
5809415 | Rossman | Sep 1998 | A |
5812671 | Ross, Jr. | Sep 1998 | A |
5812773 | Norin | Sep 1998 | A |
5812819 | Rodwin et al. | Sep 1998 | A |
5813007 | Nielsen | Sep 1998 | A |
5813016 | Sumimoto | Sep 1998 | A |
5815081 | Motohashi | Sep 1998 | A |
5819172 | Campana, Jr. et al. | Oct 1998 | A |
5819284 | Farber et al. | Oct 1998 | A |
5822434 | Caronni et al. | Oct 1998 | A |
5822526 | Waskiewicz | Oct 1998 | A |
5826062 | Fake, Jr. et al. | Oct 1998 | A |
5838252 | Kikinis | Nov 1998 | A |
5838926 | Yamagishi | Nov 1998 | A |
5844969 | Goldman et al. | Dec 1998 | A |
5845204 | Chapman et al. | Dec 1998 | A |
5850219 | Kumomura | Dec 1998 | A |
5850444 | Rune | Dec 1998 | A |
5862321 | Lamming et al. | Jan 1999 | A |
5862325 | Reed et al. | Jan 1999 | A |
5867660 | Schmidt et al. | Feb 1999 | A |
5878434 | Draper et al. | Mar 1999 | A |
5881235 | Mills | Mar 1999 | A |
5889474 | LaDue | Mar 1999 | A |
5889845 | Staples et al. | Mar 1999 | A |
5890051 | Schlang et al. | Mar 1999 | A |
5903723 | Beck et al. | May 1999 | A |
5905777 | Foladare et al. | May 1999 | A |
5917629 | Hortensius et al. | Jun 1999 | A |
5922049 | Radia et al. | Jul 1999 | A |
5923848 | Goodhand et al. | Jul 1999 | A |
5928329 | Clark et al. | Jul 1999 | A |
5937161 | Mulligan et al. | Aug 1999 | A |
5941954 | Kalajan | Aug 1999 | A |
5941956 | Shirakihara et al. | Aug 1999 | A |
5943426 | Frith et al. | Aug 1999 | A |
5948066 | Whalen et al. | Sep 1999 | A |
5951636 | Zerber | Sep 1999 | A |
5953322 | Kimball | Sep 1999 | A |
5956681 | Yamakita | Sep 1999 | A |
5958006 | Eggleston et al. | Sep 1999 | A |
5960406 | Rasansky et al. | Sep 1999 | A |
5961590 | Mendez et al. | Oct 1999 | A |
5964833 | Kikinis | Oct 1999 | A |
5966663 | Gleason | Oct 1999 | A |
5968126 | Ekstrom et al. | Oct 1999 | A |
5968131 | Mendez et al. | Oct 1999 | A |
5969636 | Parvulescu et al. | Oct 1999 | A |
5973612 | Deo et al. | Oct 1999 | A |
5974180 | Schwendeman | Oct 1999 | A |
5974238 | Chase, Jr. | Oct 1999 | A |
5974300 | LaPorta et al. | Oct 1999 | A |
5978689 | Tuoriniemi et al. | Nov 1999 | A |
5978837 | Foladare et al. | Nov 1999 | A |
5983073 | Ditzik | Nov 1999 | A |
5987508 | Agraharam et al. | Nov 1999 | A |
5991308 | Fuhrmann et al. | Nov 1999 | A |
5995597 | Woltz et al. | Nov 1999 | A |
6000000 | Hawkins et al. | Dec 1999 | A |
6002769 | McGough | Dec 1999 | A |
6006274 | Hawkins et al. | Dec 1999 | A |
6009173 | Sumner | Dec 1999 | A |
6014429 | Laporta et al. | Jan 2000 | A |
6018659 | Ayyagari et al. | Jan 2000 | A |
6018762 | Brunson et al. | Jan 2000 | A |
6021119 | Derks et al. | Feb 2000 | A |
6023000 | Fritz-Langhals et al. | Feb 2000 | A |
6023700 | Owens et al. | Feb 2000 | A |
6023708 | Mendez et al. | Feb 2000 | A |
6034621 | Kaufman | Mar 2000 | A |
6035104 | Zahariev | Mar 2000 | A |
6038439 | Rune | Mar 2000 | A |
6044205 | Reed et al. | Mar 2000 | A |
6052442 | Cooper et al. | Apr 2000 | A |
6052563 | Macko | Apr 2000 | A |
6052735 | Ulrich et al. | Apr 2000 | A |
6058431 | Srisuresh et al. | May 2000 | A |
6067561 | Dillon | May 2000 | A |
6072862 | Srinivasan | Jun 2000 | A |
6073137 | Brown et al. | Jun 2000 | A |
6073165 | Narasimhan et al. | Jun 2000 | A |
6073178 | Wong et al. | Jun 2000 | A |
6078826 | Croft et al. | Jun 2000 | A |
6081900 | Subramaniam et al. | Jun 2000 | A |
6084969 | Wright et al. | Jul 2000 | A |
6085192 | Mendez et al. | Jul 2000 | A |
6085231 | Agraharam et al. | Jul 2000 | A |
6085232 | Kikinis | Jul 2000 | A |
6091951 | Sturniolo et al. | Jul 2000 | A |
6092114 | Shaffer et al. | Jul 2000 | A |
6092191 | Shimbo et al. | Jul 2000 | A |
6097733 | Basu et al. | Aug 2000 | A |
6101531 | Eggleston et al. | Aug 2000 | A |
6107876 | O'Brien | Aug 2000 | A |
6112244 | Moore et al. | Aug 2000 | A |
6115394 | Balachandran et al. | Sep 2000 | A |
6115472 | Shimizu et al. | Sep 2000 | A |
6115736 | Devarakonda et al. | Sep 2000 | A |
6119167 | Boyle et al. | Sep 2000 | A |
6125281 | Wells et al. | Sep 2000 | A |
6125369 | Wu et al. | Sep 2000 | A |
6128739 | Fleming, III | Oct 2000 | A |
6130892 | Short et al. | Oct 2000 | A |
6131096 | Ng et al. | Oct 2000 | A |
6131116 | Riggins et al. | Oct 2000 | A |
6134432 | Holmes et al. | Oct 2000 | A |
6138146 | Moon et al. | Oct 2000 | A |
6141690 | Weiman | Oct 2000 | A |
6144671 | Perinpanathan et al. | Nov 2000 | A |
6144997 | Lamming et al. | Nov 2000 | A |
6151606 | Mendez | Nov 2000 | A |
6151674 | Takatani | Nov 2000 | A |
6154839 | Arrow et al. | Nov 2000 | A |
6157318 | Minata | Dec 2000 | A |
6157630 | Adler et al. | Dec 2000 | A |
6157950 | Krishnan | Dec 2000 | A |
6160804 | Ahmed et al. | Dec 2000 | A |
6161139 | Win et al. | Dec 2000 | A |
6163274 | Lindgren | Dec 2000 | A |
6167379 | Dean et al. | Dec 2000 | A |
6170057 | Inoue et al. | Jan 2001 | B1 |
6178331 | Holmes et al. | Jan 2001 | B1 |
6185603 | Henderson et al. | Feb 2001 | B1 |
6192518 | Neal | Feb 2001 | B1 |
6195705 | Leung | Feb 2001 | B1 |
6202085 | Benson et al. | Mar 2001 | B1 |
6203192 | Fortman | Mar 2001 | B1 |
6205448 | Kruglikov et al. | Mar 2001 | B1 |
6208996 | Ben-Shachar et al. | Mar 2001 | B1 |
6219346 | Maxemchuk | Apr 2001 | B1 |
6219694 | Lazaridis et al. | Apr 2001 | B1 |
6219715 | Ohno et al. | Apr 2001 | B1 |
6233341 | Riggins | May 2001 | B1 |
6236656 | Westerberg et al. | May 2001 | B1 |
6240088 | Gayton et al. | May 2001 | B1 |
6240464 | Fijolek et al. | May 2001 | B1 |
6249820 | Dobbins et al. | Jun 2001 | B1 |
6256300 | Ahmed et al. | Jul 2001 | B1 |
6256666 | Singhal | Jul 2001 | B1 |
6260148 | Aggarwal et al. | Jul 2001 | B1 |
6272545 | Flanagin et al. | Aug 2001 | B1 |
6275848 | Arnold | Aug 2001 | B1 |
6275850 | Beyda et al. | Aug 2001 | B1 |
6282575 | Lin et al. | Aug 2001 | B1 |
6289212 | Stein et al. | Sep 2001 | B1 |
6292657 | Laursen et al. | Sep 2001 | B1 |
6292668 | Alanara et al. | Sep 2001 | B1 |
6311282 | Nelson et al. | Oct 2001 | B1 |
6314108 | Ramasubramani et al. | Nov 2001 | B1 |
6314519 | Davis et al. | Nov 2001 | B1 |
6317592 | Campana et al. | Nov 2001 | B1 |
6324544 | Alam et al. | Nov 2001 | B1 |
6324587 | Trenbeath et al. | Nov 2001 | B1 |
6330244 | Swartz et al. | Dec 2001 | B1 |
6333973 | Smith et al. | Dec 2001 | B1 |
6356956 | Deo et al. | Mar 2002 | B1 |
6359570 | Adcox et al. | Mar 2002 | B1 |
6360272 | Lincke et al. | Mar 2002 | B1 |
6370566 | Discolo et al. | Apr 2002 | B2 |
6381650 | Peacock | Apr 2002 | B1 |
6389455 | Fuisz | May 2002 | B1 |
6389457 | Lazaridis et al. | May 2002 | B2 |
6400958 | Isomursu et al. | Jun 2002 | B1 |
6401113 | Lazaridis et al. | Jun 2002 | B2 |
6418129 | Fingerhut | Jul 2002 | B1 |
6438585 | Mousseau et al. | Aug 2002 | B2 |
6449287 | Leuca et al. | Sep 2002 | B1 |
6463463 | Godfrey et al. | Oct 2002 | B1 |
6463464 | Lazaridis et al. | Oct 2002 | B1 |
6469998 | Burgaleta Salinas et al. | Oct 2002 | B1 |
6470358 | Beyda et al. | Oct 2002 | B1 |
6487560 | LaRue et al. | Nov 2002 | B1 |
6493749 | Paxhia et al. | Dec 2002 | B2 |
6505214 | Sherman et al. | Jan 2003 | B1 |
6549776 | Joong | Apr 2003 | B1 |
6571289 | Montenegro | May 2003 | B1 |
6580787 | Akhteruzzaman et al. | Jun 2003 | B1 |
6584095 | Jacobi et al. | Jun 2003 | B1 |
6594484 | Hitchings, Jr. | Jul 2003 | B1 |
6603758 | Schmuelling et al. | Aug 2003 | B1 |
6611358 | Narayanaswamy | Aug 2003 | B1 |
6633761 | Singhal et al. | Oct 2003 | B1 |
6658235 | Tolmunen et al. | Dec 2003 | B1 |
6683871 | Lee et al. | Jan 2004 | B1 |
6684248 | Janacek et al. | Jan 2004 | B1 |
6701378 | Gilhuly et al. | Mar 2004 | B1 |
6704295 | Tari et al. | Mar 2004 | B1 |
6714987 | Amin et al. | Mar 2004 | B1 |
6760775 | Anerousis et al. | Jul 2004 | B1 |
6765920 | Tari et al. | Jul 2004 | B1 |
6768743 | Borella et al. | Jul 2004 | B1 |
6785724 | Drainville et al. | Aug 2004 | B1 |
6822955 | Brothers et al. | Nov 2004 | B1 |
6826173 | Kung et al. | Nov 2004 | B1 |
6842462 | Ramjee et al. | Jan 2005 | B1 |
6845096 | Hori et al. | Jan 2005 | B1 |
7260638 | Crosbie | Aug 2007 | B2 |
7324492 | Leung et al. | Jan 2008 | B2 |
20010001268 | Menon et al. | May 2001 | A1 |
20010001552 | Vong et al. | May 2001 | A1 |
20010015977 | Johansson | Aug 2001 | A1 |
20010029531 | Ohta | Oct 2001 | A1 |
20010032254 | Hawkins | Oct 2001 | A1 |
20010040693 | Saito et al. | Nov 2001 | A1 |
20010042093 | Shirai et al. | Nov 2001 | A1 |
20010042097 | Lapine | Nov 2001 | A1 |
20010045885 | Tett | Nov 2001 | A1 |
20010054072 | Discolo et al. | Dec 2001 | A1 |
20020010758 | Chan | Jan 2002 | A1 |
20020013854 | Eggleston et al. | Jan 2002 | A1 |
20020046287 | La Porta et al. | Apr 2002 | A1 |
20020059380 | Biliris et al. | May 2002 | A1 |
20020098840 | Hanson et al. | Jul 2002 | A1 |
20020137512 | Jahn | Sep 2002 | A1 |
20030097361 | Huang et al. | May 2003 | A1 |
20040015607 | Bender et al. | Jan 2004 | A1 |
20050159142 | Giniger et al. | Jul 2005 | A1 |
20080045267 | Hind et al. | Feb 2008 | A1 |
20080261632 | Hind et al. | Oct 2008 | A1 |
Number | Date | Country |
---|---|---|
7843498 | Feb 1999 | AU |
19961345 | Dec 1999 | DE |
19961345 | Jun 2001 | DE |
0001552 | May 1979 | EP |
0617373 | Sep 1994 | EP |
0736989 | Oct 1996 | EP |
0772327 | May 1997 | EP |
0777394 | Jun 1997 | EP |
0788287 | Aug 1997 | EP |
0793387 | Sep 1997 | EP |
851 703 | Jan 1998 | EP |
0825788 | Feb 1998 | EP |
0838774 | Apr 1998 | EP |
0838934 | Apr 1998 | EP |
917317 | May 1999 | EP |
0918417 | May 1999 | EP |
0930766 | Jul 1999 | EP |
0986225 | Mar 2000 | EP |
1 011 286 | Jun 2000 | EP |
1 022 917 | Jul 2000 | EP |
1 096 725 | May 2001 | EP |
1319294 | Oct 2009 | EP |
2146483 | Jan 2010 | EP |
9305155 | Jan 1997 | JP |
9214556 | Aug 1997 | JP |
11289346 | Oct 1999 | JP |
9003613 | Apr 1990 | WO |
9211699 | Jul 1992 | WO |
9619064 | Jun 1996 | WO |
WO 9703341 | Jan 1997 | WO |
9726709 | Jul 1997 | WO |
9727717 | Jul 1997 | WO |
WO 9728518 | Aug 1997 | WO |
9732251 | Sep 1997 | WO |
9733421 | Sep 1997 | WO |
9741654 | Nov 1997 | WO |
9744942 | Nov 1997 | WO |
WO 9749251 | Dec 1997 | WO |
9800787 | Jan 1998 | WO |
WO 9807897 | Jan 1998 | WO |
9821911 | May 1998 | WO |
9823108 | May 1998 | WO |
9826344 | Jun 1998 | WO |
9848560 | Oct 1998 | WO |
9901999 | Jan 1999 | WO |
9905620 | Feb 1999 | WO |
9905813 | Feb 1999 | WO |
9906900 | Feb 1999 | WO |
9912365 | Mar 1999 | WO |
9917505 | Apr 1999 | WO |
9919988 | Apr 1999 | WO |
9936870 | Jul 1999 | WO |
9945484 | Sep 1999 | WO |
9945684 | Sep 1999 | WO |
9948312 | Sep 1999 | WO |
9950974 | Oct 1999 | WO |
9961966 | Dec 1999 | WO |
9966692 | Dec 1999 | WO |
9963709 | Dec 1999 | WO |
0011567 | Mar 2000 | WO |
0011832 | Mar 2000 | WO |
0020994 | Apr 2000 | WO |
0036794 | Jun 2000 | WO |
WO 0031931 | Jun 2000 | WO |
0044149 | Jul 2000 | WO |
WO 0041359 | Jul 2000 | WO |
WO 0049819 | Aug 2000 | WO |
WO 0101264 | Jan 2001 | WO |
0113572 | Feb 2001 | WO |
0113656 | Feb 2001 | WO |
WO 0122669 | Mar 2001 | WO |
0141472 | Jun 2001 | WO |
0167716 | Sep 2001 | WO |
0171539 | Sep 2001 | WO |
0225890 | Mar 2002 | WO |
Entry |
---|
Takahashi, Y. et al.: “Communication Method with Data Compression and Encryption for Mobile Computing Environment,” Proceedings of INET96, Montreal, Canada, Jun. 24-28, 1996, Transforming Our Society Now, 11 pages. |
United States District Court, Northern District of California, San Francisco Division: Good Technology, Inc. v. Research In Motion, Ltd., et al., Case No. C02-2348 MJJ, Plaintiff Good Technology, Inc.'s Preliminary Invalidity Contentions Pursuant to Patent L.R. 3-3 and Response Under Patent L.R. 3-4, Jan. 16, 2004, 33 pages. |
Perkins, C.: “RFC 2002—IP Mobility Support,” IBM, Oct. 1996, 61 pages. |
Johnson, D.: “Scalable Support for Transparent Mobile Host Internetworking,” Wireless Networks, The Journal of Mobile Communication, Computation and Information, vol. 1, No. 3, Oct. 1995, pp. 311-321. |
Dawson, F., et al.: “iCalendar Message-Based Interoperability Protocol (iMIP),” Standards Track, RFC 2447, iMIP, Nov. 1998, 4 pages, XP-002249002. |
Nelson, M.: “Wireless Data Services: Here and Now,” PDA Developers 2.6, Nov./Dec. 1994, 3 pages. |
Article, Comford, “Handhelds Duke It Out for the Internet,” Wireless Internet, pp. 35-38 and 41, Aug. 2000. |
Perkins, Charles E., et al., “Mobility Support in IPv6,” Mobicom 96, pp. 27-37, 1996. |
Motorola, “AirMobile™ Wireless Comm Guide for cc:Mail” User Guide Version 1.0, Motorola Wireless Data Group, 1995, pp. 3-48. |
Motorola, “AirMobile™ Wireless Comm Server for cc:Mail” User Guide Version 1.1, Motorola Wireless Data Group, 1995, pp. 4-46. |
Sun Microsystems, JavaMail API Design Specification, Version 1.0, Dec. 9, 1997, Sun Microsystems, Inc., chapters 1-10 appendices A-E. |
Compaq, Aero 2100 Series Color Palm-size PC Reference Guide, Second Edition, Aug. 1999, Compaq Corporation. |
Canadian Office Action, Application No. 2,433,812, Canadian IPO, Jul. 14, 2005, 5 pgs. |
Canadian Office Action, Application No. 2,433,812, Canadian IPO, Aug. 20, 2008, 5 pgs. |
Canadian Office Action, Application No. 2,433,812, Canadian IPO, Jul. 7, 2009, 4 pgs. |
Canadian Office Action, Application No. 2,433,812, Canadian IPO, Dec. 1, 2010, 4 pgs. |
PCT International Preliminary Examination Report, Application No. PCT/CA00/02208, European Patent Office, Jan. 29, 2002, 18 pgs. |
PCT International Preliminary Examination Report, Application No. PCT/US01/26907, European Patent Office, Jan. 20, 2003, 3 pgs. |
PCT Search Report Report, Application No. PCT/US01/26907, European Patent Office, Nov. 15, 2002, 7 pgs. |
EP Communication, Application No. 1968230.1, European Patent Office, Aug. 25, 2005, 11 pgs. |
EP Communication, Application No. 1968230.1, European Patent Office, Jun. 25, 2007, 4 pgs. |
EP Extended European Search Report, Application No. 09 172729.7, European Patent Office, Dec. 18, 2009, 7 pgs. |
CIPO, Office Action, Application No. 2,422,812, Jan. 25, 2012, 3 pgs. |
ISA/EPO, International Search Report, Application No. PCT/EP01/10317, Mar. 15, 2002, 4 pgs. |
SIPO, First Office Action, Application No. 01819119.3, Feb. 18, 2005, 23 pgs. |
EPO, Communication Under Rule 71(3) EPC, Application No. 091729.7, Oct. 8, 2012, 5 pgs. |
Feibus, “A Desktop In Your Palm”, Informationweek, Aug. 25, 1997, pp. 65ff. |
Behr, “Handheld Solutions”, Informationweek, Oct. 27, 1997, pp. 106-113. |
Moody's Investors Service, Socket Communications Inc.—History & Debt, Investex Report No. 3240276, Feb. 28, 1198. |
Newsletter, E-Mail Merges With Voice Through Infinite Technologies, Voice Technology & Services News, May 26, 1998. |
Newsletter, Vodapage: Vodapage demos increasing convergence of pagers and mobile communications at TMA 29, M2 Presswire, Nov. 28, 1996. |
Mosher, Microsoft Exchange User's Handbook, Duke Press, 1997, pp. 547-549. |
DTS Wireless Website located at D.R.L. http://www.dtswireless.com, Dec. 30, 1997. |
“3Com PalmPilot Gets Wireless Link for E-Mail”, Spooner, John G., PC Week, Dec. 8, 1997. |
“Have Your Pager Call My Pager”, Sullivan, Kristina B., PC Week, Dec. 8, 1997. |
Briere, Daniel, et al., “One Mailbox, Just Like Old Times,” Network World, vol. 14, issue 16, p. 21 (Apr. 21, 1997). |
Padwick, et al., Special Edition Using Microsoft Outlook 97, 1997, Que Corporation, pp. 250-251, 353-367. |
News Release, “Motorola Rings in 1995 with the Launch of the Marco® Wireless Communicator,” Jan. 4, 1995 (4 pgs.). |
Timeline, “FLEX™ Technology Timeline,” (3 pgs.), Jun. 18, 2001. |
General Magic, Inc., Corporate Backgrounder, 2001 (2 pgs.). |
Pegasus Email Settings, ABSnet Internet Services, Inc. (4 pgs.), Jun. 27, 2001. |
Motorola, Inc., emailVClient, 2001 (4 pages). |
News Release, “Motorola Announces Pagewriter 250, The World's Smallest Pager with Full Keyboard”, Feb. 27, 1997 (2 pgs.). |
Dewey, Barney, “Communications Strategies for Newton 2.0,” Newton Technology Journal, p. 10, Jun. 1996. |
Press Release, “Motorola Announces New Solutions to Provide Consumers with Wireless Access to Personal and Enterprise E-mail Accounts,” Mar. 21, 2001 (4 pgs.). |
“Motorola's ‘Marco’ Wireless Communicator,” http://www.msu.edu/-luckie/gallery/marco.htm, Jun. 14, 2001 (3 pgs.). |
News Release, “CE Software Announces MobileVision,” Editorial Contacts, CE Software, Inc., 1995 (3 pgs.). |
News Release, “CE Software Ships MobileVision,” Jun. 20, 1995 (3 pgs.). |
Newton Reference, Communications, 1996-1997(4 pgs.). |
PC Pro Issue 31: Realworld Computing, PDA Column, Jul. 30, 1997 (7 pgs.). |
Enterprise Solutions for Email Overload, Founder Publications, http://www.amikanow.com/corporte/publications.htm, Aug. 6, 2001 (9 pgs.). |
“Motorola's ‘Marco’ Wireless Communicator,” http://www.msu.edu/-luckie/gallery/marco.htm, Aug. 6, 2001 (2 pgs.). |
Press Release, “Apple Agrees to License Newton Technology to Schlumberger, Digital Ocean,” Nov. 3, 1995 (3 pgs.). |
Frezza, Bill, “PDA, PDA, Wherefore Art Thou, PDA?”, Freewire, Aug. 6, 2001 (6 pgs.). |
Black, Lauren, et al., “Personal Digital Assistants,” Macworld Reviews, Aug. 6, 2001 (5 pgs.). |
Reference, “MobileVision Direct Wireless Connection to Your LAN-Based Electronic Mailbox,” CE Software, Inc., pp. 1, 3, 5, 7, 9, 11, 13, 15, 17, 19, 21, 1995. |
User Manual, “MobileVision Direct Wireless Connection to Your LAN-Based Electronic Mailbox,” CE Software, Inc. 1995. |
Johnson, David B., “Ubiquitous Mobile Host Internetworking,” Fourth Workshop on Workstation Operating Systems, pp. 85-90, Oct. 14-15, 1993. |
Johnson, David B., “Mobile Host Internetworking Using IP Loose Source Routing,” School of Computer Science, Carnegie Mellon University, pp. 1-14 Feb. 1993. |
Schoettle, Bob, “IP-Address Management on LANs,” Byte, pp. 199-200, Feb. 1996. |
Cheshire, Stuart, et al., “Internet Mobility 4 X 4,” Computer Science Department, Stanford University, pp. 1-12, Aug. 1996. |
Yeom, Hoen Y., et al., “IP Multiplexing by Transparent Port-Address Translator,” Proceeding of the Tenth USENIX System Administration Conference, pp. 113-122, Sep. 29-Oct. 4, 1996. |
Johnson, David B., “Scalable and Robust Internetwork Routing for Mobile Hosts,” IEEE Computer Society, pp. 2-11, 1994. |
Egevang, K. et al., “The IP Network Address Translator,” Network Working Group, pp. 1-10, May 1994. |
Manual, “Server and BBS Software for the Packet Radio” by Jean Paul Roubelat, pp. 1-173, Feb. 6, 1993. |
Book, “Internetwork Mobility The CDPD Approach,” by Mark S. Taylor, William Waung, and Mohsen Banan, Jun. 11, 1996. |
“BlackBerry Technical White Paper,” Research In Motion Ltd., Version 1.0, 1998-1999. |
Newsletter, “Battery Friendly Bulletin,” vol. 1, Issue 3, pp. 1-7 and unnumbered page, 1999. |
Article, Comerford, “Handhelds Duke It Out for the Internet,” Wireless Internet, pp. 35-38 and 41, Aug. 2000. |
Press Detail, “Extended Systems and Motorola Bring Short-Range Wireless to the Paging E-volution,” Jan. 13, 2000 (3 pgs.). |
Press Detail, “3Com Corporation Licenses Bluetooth Technology from Extended Systems,” Feb. 22, 2000 (2 pgs.). |
Web site Article, Hawaleshka, “The Web in Your Pocket,” Maclean's, May 15, 2000 (3 pgs.). |
Claxton, “Messaging API's for Voice Networks,” Telecommunications, pp. 116-120, 1998. |
Gifford, David K., et al., “The Application of Digital Broadcast Communication to Large Scale Information Systems,” IEEE Journal on Selected Areas in Communications, vol. SAC-3, No. 3, pp. 457-467 (May 1985). |
Gifford, David K., et al., “An Architecture for Large Scale Information Systems,” ACM, pp. 161-170 (1985). |
Arnum, Eric, “The Universal Mailbox Arrives . . . Sort Of,” Business Communications Review, pp. 49-52 (May 1996). |
“Wireless E-Mail Services Gain Windows Clients,” Kramer, Matt, PC Week, Apr. 17, 1995. |
Perkins, C. et al., “IMHP: A Mobile Host Protocol For The Internet,” Computer Networks And ISDN Systems 27 (1994), pp. 479-491. |
Inouye, Jon et al., “System Support for Mobile Multimedia Applications,” Proceedings of the IEEE 7th International Workshop on Network And Operating System Support For Digital Audio And Video, May 19-21, 1997, pp. 135-146. |
Xu, Kevin Houzhi, “Reliable Stream Transmission Protocols In Mobile Computing Environments,” Bell Labs Technical Journal, Summer 1997, pp. 152-163. |
Lavana, Hemang et al.., “Internet-Based Workflows: A Paradigm For Dynamically Reconfigurable Desktop Environments,” Conference on Supporting Group Work, Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work: The Integration Challenge, Nov. 16-19, 1997, pp. 204-213. |
Perkins, Charles E. et al., “Mobility Support In IPv6,” International Conference on Mobile Computing and Networking, Proceedings of the Second Annual International Conference on Mobile Computing and Networking, Nov. 11-12, 1996, pp. 27-37. |
Goldszmidt, German et al., “ShockAbsorber: A TCP Connection Router,” Globecom 97, IEEE Global Telecommunications Conference, Nov. 3-8, 1997, pp. 1919-1923. |
SAM Reference Manual, System for Automated Messages (Sep. 1989). |
IBM Portable Terminal User's Guide, Third Edition (Jun. 1985). |
Binder, Richard et al, The Alohanet Menehune, University of Hawaii, Version II (Sep. 1974). |
Computer Structures—Principles and Examples, McGraw Hill (1982). |
Krebs, Jay, Portable Computer and Host Talk Over Radio-Frequency Link, Electronic, pp. 142-145 (Aug. 25, 1983). |
Gadol, Steve, et al. “Nomadic Tenets—A User's Perspective,” Sun Microsystems Laboratories, Inc., pp. 1-16 (Jun. 1994). |
Declaration of David A. Keeney regarding SAM System, pp. 1-33 (Sep. 3, 2002). |
“SAM™ integrates E-mail, Alpha Paging, Fax, and more!”, SAM System for Automated Messages (10 pgs.), Oct. 3, 1989. |
SAMpage Manual, version 2.0, TeckNow! (Feb. 1990). |
Reiter, Alan A., “Focus on Technology,” Telocator (Jan. 1990) (4 pgs.). |
Kuehn, Carl, “More than EMail,” Southwest Computer & Business Equipment Review, vol. VII, No. 2, (Feb. 1990) (1 pg.). |
SAM System for Automated Messages User's Manual (1988) (17 pgs.). |
Motorola Operating Instructions for Your “PMR 2000” Series Display Radio Pagers Personal Message Center (2000) (7 pgs.). |
Motorola PMR 2000 Personal Message Receiver POCSAG (CCIR Radio Paging Code #1) (1986) (6 pgs.). |
EPO, Communication Under Rule 71(3) EPC, Application No. 01968230.1, Feb. 6, 2009, 7 pgs. |
EPO, Decision to Grant European Patent Pursuant to Article 97(1) EPC, Application No. 01968230.1, Sep. 17, 2009, 2 pgs. |
EPO, Certificate of Grant EP Pat. 1319294, Application No. 01968230.1, Oct. 14, 2009, 2 pgs. |
USPTO, Office Action, U.S. Appl. No. 11/925,861, Apr. 23, 2010, 31 pgs. |
USPTO, Office Action, U.S. Appl. No. 11/925,866, May 18, 2010, 21 pgs. |
Number | Date | Country | |
---|---|---|---|
20040136358 A1 | Jul 2004 | US |
Number | Date | Country | |
---|---|---|---|
60233501 | Sep 2000 | US | |
60237616 | Oct 2000 | US | |
60268824 | Feb 2001 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 09087623 | May 1998 | US |
Child | 09528495 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 09528495 | Mar 2000 | US |
Child | 10381163 | US |