Abstract:
Systems and methods of processing incoming data provide for receiving incoming data and determining whether to employ stateless routing of the incoming data based on one or more destination hosts associated with the incoming data. In one approach, stateless routing involves storing the incoming data only in volatile memory and withholding confirmation of receipt of the incoming data until confirmation of delivery is received from either the destination host or a downstream router. The determination as to whether stateless routing should be employed can take into to consideration historical data for the destination host as well as control data. The determination can also be based on the number of destination hosts.
Abstract:
A server receives a message from a sender and transmits the message through the Internet to a recipient. The server normally transmits the message in a first path through the Internet to the recipient. When the sender indicates at a particular position in the message that the message is registered, the server transmits the message in a second path through the Internet to the recipient. The sender can also provide additional indications in the message to have the server handle the message in other special ways not normally provided by the server. After learning from the receipt or the recipient's agent through the Internet that the message was successfully received, the server creates, and forwards to the sender, an electronic receipt. The receipt includes at least one, and preferably all: the message and any attachments, a delivery success/failure table listing the receipts, and the receipt times, of the message by the recipient's specific agents, and the failure of other agents of the recipient to receive the message and a digital signature of the message and attachments subsequently. By verifying that the digital signature on the sender's receipt matches the digital receipt at the server, the server can verify, without retaining the message, that the receipt is genuine and that the message is accurate.
Abstract:
A method of providing a fast path message transfer agent is provided. The method includes receiving bytes of a message over a network connection and determining whether the number-of bytes exceeds a predetermined threshold. If the number of bytes is less than a predetermined threshold, then the message is written only to memory. However, if the number of bytes exceeds the predetermined threshold, then some of the bytes e.g. up to the predetermined threshold are written to memory, wherein the remainder of the bytes are stored onto the non-volatile storage. If the message was received successfully-by each destination, then the message is removed from the memory/non-volatile storage. If not, all failed destinations are identified and the message with associated failed destinations is stored on the non-volatile storage for later sending.
Abstract:
Methods and systems for processing a message, the methods and systems including providing a first level (42, 43) of message processing rules, providing at least one second level (44, 45) of message processing rules, determining at least one message attribute associated with the message, and based on the determined message attribute(s), the first level (42, 43) of message processing rules, and the at least one second level (44, 45) of message processing rules, processing the message based on one or more preferences associated with a trusted message (42), a blocked message (43), or an unknown message (49). The preferences can be associated with the first level (42, 43) and/or the second level (44, 45)(s).
Abstract:
A system and method are provided for reliable and customer-friendly delivery of documents. One method of the present invention include the steps of: producing document data for printing documents (Step 202); accepting requests to print selected documents (Step 206); determining whether a selected document is accepted for electronic delivery or for non-electronic delivery (Step 210); printing documents accepted for non-electronic delivery; and electronically delivering documents accepted for electronic delivery (Step 212).
Abstract:
The invention relates to a method which enables a first message, particularly a multi-media message, preferably an sms type message, preferably sent via a mobile radio system and/or the internet to be manipulated, called back or altered by means of a second message sent after the first method. User friendliness is increased for the user according to said system. The invention also relates to the possibility of limited manipulation of a first message, as well as corresponding telecommunication devices, network elements and software programs.
Abstract:
A communication system comprises a computer workstation operable under stored program control, a mobile telecommunication network having a number of active subscribers capable of receiving a text message along the network, a messaging application software program executable on the computer workstation, and an information database that has, for each active subscriber of the telecommunication network, a corresponding mobile telecommunication access number.. The computer workstation is communicable with the mobile telecommunication network. The application software program is usable by a user of the system to compose either one of an e-mail message and a text message, the text message being deliverable along the mobile telecommunication network to an intended recipient who is an active subscriber of the network, the intended recipient being uniquely identifiable by means of a mobile telecommunication access number. The mobile communication network disseminates the composed text message to the intended recipient along the mobile telecommunication network as a function of the recipient's mobile telecommunication access number.
Abstract:
An instant message (IM) proxy (24) according to the present invention is capable of maintaining the availability status of a mobile subscriber (12) even when the mobile subscriber is roaming or temporarily out of a mobile network coverage area, and even after the IM proxy unsuccessfully attempts to send an instant message (42) to the mobile subscriber. Messages will continue to be re-sent to the mobile subscriber (12) in the near-real time manner characteristic of a typical instant message system until IM parameters programmed into a retry counter (38) and/or the timer (40) located at the proxy (24) are exceeded and the IM proxy drops the message. In addition, the IM proxy (24) of the present invention is capable of bundling instant messages intended for the mobile subscriber (12) to minimize mobile system overhead connection costs while at the same time minimizing IM system latency.
Abstract:
A secure mail transmission system provides virus protection, document tracking, tamper proofing, authentication through digital signatures in addition to secure encryption means and time date verification for e-mail messages. The system encrypts a sent message at a user station and provides digital authentication and confidential encryption schemes prior to delivery of the secure mail message to the secure mail system over a communication network. The secure mail system unpacks the secure transmission, verifies the contents, provides a time date stamp and virus checking before reencrypting an retransmitting the original message. The transmission can be logged and stored for later verification. The recipient of the secure message can be a subscriber or non-subscriber and can use supported e-mail platforms, unsupported e-mail platforms, or unknown e-mail systems and receive the secured message with little or no variation from their typical application interface usage. The system provides secure features including the use of public/private key pairs, hashing algorithms and digital signatures to provide privacy and authentication of the secure mail messages. The private key associated with an individual user need not be stored anywhere. The system permits secure and private electronic communications with virus checking and return receipt notifications available.
Abstract:
An e-mail management system a wireless personal communications device user of a terrestrial electronic mail service, the system including: Firstly, a service module, for managing electronic mail and transactions associated therewith, between a user's wireless personal communications device (101) and a proximate base station (104) of the terrestrial communications network, and also between the proximate base station of a terrestrial communications network and a terrestrial communications network's server wherein the user has an electronic mail account; and Secondly, a standardization module, for specifying a wireless communications protocol, at least between the user's wireless personal communications device and the proximate base station of the terrestrial communications network, wherein said protocol, for transmission of a packet of e-mail , is operative to append predetermined header/trailer to the packet, and to allocate base station transmission/reception time substantially equivalent to an interval necessary for transmitting/receiving the appended header-packet-trailer.