throbber
0
`United States Patent
`
`[19]
`
`I|||||||||||l||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
`
`USU(l(){l92l 14A
`
`[11] Patent Number:
`
`6,092,114
`
`Shaffer et al.
`
`[45] Date of Patent:
`
`Jul. 18, 2000
`
`[S4] METHOI) AND SYSTEM FOR
`])[.;'r[.;RM[N|N(; ']‘H[1:]'().CA'[‘]()NIa‘()R
`PERFORMING F1LE.1r0RMAT
`
`CONVERSIONS OF ELICCTRONICS
`MESSAGE ATTACHMENTS
`
`[75]
`
`Invenlors: Shmuel Shafier, Palo Alla; Wlllialn
`Joseph Haydn, Cupenino; pm”
`Bunumu‘ San Jose’ all of (_-am:
`
`[733 Aggigncc; Siemens I|1fnr|'“a[i;}|1 and
`Con'[n'[unicfltign N;-gwm-ks, Inc" Bgca
`Rakjn’ [~']a_
`
`[21] Appl_ No_: 09m625294
`
`Apr. 17., 1998
`
`[22
`-
`
`[56]
`
`Filed:
`.
`.
`_
`,
`. 7
`"""""""""""""""“ G06] 15_‘”6’ E06?‘ 1739
`Int: L!’
`.............................. 709E232,
`'r'(l9;‘_46,77(l7f];
`[5._| U.!s. Ll.
`.
`07"!“
`[58]
`Fleld of Search ..................................... 7U9_f§3'%;l241f:3
`-
`.
`References cued
`U_S_ PATENT DOCUMENTS
`
`5,326,'[||52
`5.845.282
`$303,723
`
`lUx'l0¢)8 Fake cl al.
`l2Il998 Alleyetal.
`$1999 Beck cl al.
`
`............................ ..
`‘H19,-"2l.|(fi
`
`.. TOTHU
`............................ .. TIFJIZOD
`
`. L-
`‘
`,
`v
`.1.-.
`P -
`r:rna:'_} -Jlmmmr—Kr1sna
`1m
`[57]
`ABSTRACT
`1
`_
`A melhod and syslem for exchan-glng-eleclronic messages,
`such as email messages. mclllde 1solal|ngpcrsonalcompul-
`ers and other client devices lrom the process. of converling
`
`a message alrachmcnl from one file formal to a second file
`tormal. File-Iormal CCIHVCISIGHS are out-tasked lo enhance
`lllc accessibilily, free computer resources, and conserve a
`user’s time. The access requiremenls of each attach rnenl to
`elcclronic messages are compared [0 [he capabililies of a
`larget clienl device. If il
`is delermined that a file-fornmt
`conversion is required, the conversion operalion is assigned
`to a server that supports Ihe process of reformatting lhc
`allachmenbs. In an email environmenl, lhe server is substan-
`“any cquivalcm 10 the Conventional email Sew“, but
`iIl(.'l1l(lU$ enhanced conversion capabililies.
`In one
`umbodimcmg lhc dulcrminmion of whclhcr an auachmcm is
`accessible wilhoul conversion occurs al the server level. In
`anolher embotlimenl, the Llelerminalion is irnplernenled at
`lhe client device level. Preferably, ll" 21 local email sewer is
`incapable of relormalting lhe allachmenl, a requesl is [rans-
`mlllcd lo :1
`remote server lo perform the Conversion.
`Typically, lhc remote server is lhc email server Ihal supports
`,
`.
`,.
`.
`-
`-
`.
`. _
`mcieage LXCl1<'.lI1gL!9 for the person who onglnated the mess
`”“’="'
`
`20 Claims, 3 Drawing Slleets
`
`'sl'-
`
`---------------------
`
`JR 0|
`fflggg
`on awa
`_,.'
`_mw238
`jug‘)? Tang el al_
`rowzrn
`sues-7 Olorii
`TFDQ,-"2[.l(:
`ll},»’l9‘1".-' RE:-I10, Il
`651 993 Kuzma .................................. .. 7013232
`
`
`
`3,) _,
`5h3m,bn
`5.032.013
`5,675,507
`5,7?1.355
`
`/10
`
`32
`
`
`
`FORMAT
`CONVERTER
`
`APPLICATION
`REGISTER
`
`
`FORMAT
`
`CONVERTER
`
`12
`
`LOCAL
`ROUTEWSERVER
`
`
`
`
`REMOTE
`ROUTERISERVER
`
`Apple/Twitter
`Apple/Twitter
`Ex. 1011
`Ex. 1011
`IPR2 of U.S. Pat. No. 8,612,515
`IPR2 of U.S. Pat. No. 8,612,515
`
`

`
`U.S. Patent
`
`Jul. 18, 2000
`
`Sheet 1 of 3
`
`6,092,114
`
`8SK.
`
`Eosmm
`
`E>E£$:5m
`
`#53
`
`E>$@$5om
`
`mm
`
`Ezmom
`
`EEm>_,_8
`
`
`
`_,_o:S:&<E_>_mE
`
`$5.8mE:m>zoo
`
`
`
`

`
`U.S. Patent
`
`Jul. 18,2000
`
`Sheet 2 MB
`
`6,092,114
`
`ATTACH A FILE TO A MESSAGE
`
`TRANSMIT MESSAGE
`
`FROM REMOTE DEVICE
`
`RECEIVE MESSAGE AT THE
`
`LOCAL SERVER
`
`CHECK FILE FORMAT
`
`OF THE ATTACHMENT
`
`CHECK ACCESS CAPABILITIES
`OF TARGET CLIENT
`
`-< rn CD .r=-0':
`
`COMPATIBLE?
`
`CO C‘)
`
`C0 00
`
`J3- |\3
`
`-914:--I=-(:3
`
`NO
`
`U‘! (D
`
`52
`
`LOCALLY
`CONVERTIBLE?
`
`-< IT: (/3
`
`CONVERT FILE
`FORMAT
`
`NO
`
`TRANSMIT REQUEST
`TO REMOTE SERVER
`
`RECEIVE MESSAGE WITH
`
`CONVERTED ATTACHMENT
`
`54
`
`U"! U?
`
`TRANSMIT MESSAGE TO CLIENT
`
`FIG. 2
`
`

`
`U.S. Patent
`
`Jul. 13, 2000
`
`Sheet 3 MB
`
`6,092,114
`
`ATTACH A FILE TO A MESSAGE
`
`36
`
`TRANSMIT MESSAGE FROM
`
`REMOTE DEVICE
`
`RECEIVE MESSAGE AT THE
`LOCAL SERVER
`
`TRANSMIT MESSAGE TO CLIENT
`
`CHECK FILE FORMAT AT THE CLIENT
`
`38
`
`40
`
`58
`
`50
`
`YES
`
`62
`
`DIRECTLY
`
`ACCESSIBLE?
`
`NO
`
`66
`
`TRANSMIT REQUEST TO
`
`THE LOCAL SERVER
`
`68
`
`70
`
`LOCALLY
`
`YES
`
`CONVERT FILE
`
`FORMAT
`
`
`
`54
`
`CONVERTIBLE?
`
`TRANSMIT REQUEST TO
`
`REMOTE SERVER
`
`RECEIVE MESSAGE WITH
`
`CONVERTED ATTACHMENT
`
`TRANSMIT MESSAGE TO CLIENT
`
`ACCESS ATTACHMENT AT CLIENT
`
`
`
`FIG. 3
`
`

`
`6,092,114
`
`1
`METHOI) AND SYSTEM FOR
`DETERMINING THE LOCATION FOR
`Pl£RI*‘ORMIN(} FII.E-F()RMAT
`CONVERSIONS OF ELECTRONICS
`MESSAGE ATTACHMENTS
`
`BACKGROUND OF THE INVl:‘N'l'l0N
`
`The invention relates generally to message delivery sys-
`tems and more particularly to methods and systems for
`providing compatibility between file attachments of the
`messages and resource capabilities of devices to which the
`messages are directed.
`DESCRIPTION OF THE RELATED ART
`
`the exchange of text messages
`Systems that support
`among users often allow files to be attached to messages. As
`one example, electronic mail
`(i.e., email) may have an
`attachment that is a word processing document, or an audio,
`video or graphics file. As another example, a download of a
`message from a web site on the World Wide Web may
`include an attached text file in Hypertext Markup Language
`(1-ITML) or an attached audio, video or graphics file.
`Messages may be transmitted from a sending client device
`(such as a computer} or from a remote server (such as a web
`server} to a message transport server that supports a corn-
`ptlter or other client device at which the receiving party
`attempts to access the message. In an email environment, a
`sending party may generate an email message at a lirst
`computer that transmits the message to a first email server.
`If the first email server does not support message access for
`the party to whom the message is directed, the first email
`server forwards the message to a second email server that
`supports access by the receiving party. The message is stored
`at the second server for download by the receiving party.
`Such message exchange systems operate seamlessly for
`messages that do not
`include file attachments, since the
`systems are designed for sending embedded text. Email is
`basically an ASCII text system. Difliculties arise when a
`message includes an attached lile. Seamless access to the
`attached file may be inhibited by decoding-specific require-
`ments or application-specific requirements upon the receiv-
`ing client device. Regarding the decoding—specific
`requirements, attached files are typically encoded to accom-
`modate transmission within a network, such as the Internet.
`There are different available protocols for accomplishing the
`encoding. One such protocol is Multimedia Internet Mail
`Extensions (MIME), which converts the attached files to text
`and sends the convened text within the message. The
`converted text is then reconverted to its original form at the
`receiving client device. Other well known standards include
`UUencode and BinHex. At the receiving client device, the
`same encoding standard must be used to decode the attached
`file, if the file is to be accessed.
`the
`Even if the attached tile is properly decoded at
`receiving client device, the file will not be accessible unless
`the client device has the required application program for
`opening the attached file. Typically, an attachment has a file
`format that is specific to an application. For example, an
`email attachment of a word processing text
`file may be
`specific to a particular word processing program. Access to
`the text
`is possible only if the receiving client device
`includes the program or has the capability of converting the
`decoded lile to another file format that is accessible. Video,
`audio and graphics files typically have more exacting
`demands. For example, an AVI video formatted file is not
`converted to a MPEG video formatted file without signifi-
`
`ll!
`
`15
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`cantly more complexity than the process ol’ converting from
`one application-specific word processing lile format
`to a
`second application-specific word processing file format.
`Many client devices have the capability of converting
`attachments from a
`limited number of inaccessible file
`formats to an acceptable me format. if the attachment is a
`relatively short word processing document, this capability is
`all that is required for eflicient display of the document at the
`receiving client device. Ilowever, if the attached file is large,
`such as an intra-corporation multimedia presentation of a
`new product release, the required time to convert the attach-
`ment between iile formats may lead to a significant inelli-
`cient use of the time of corporate personnel. Particularly in
`the conversion of multimedia file attachments, a complex
`algorithm must be utilized.
`is received that requires an
`Thus, if a file attachment
`application that
`is “l'oreign” to the receiving computing
`device, the lirst issue is whether the computing device is
`capable of converting the attachment to an accessible tile
`format. Asecond issue relates to the time requirements ol’ the
`conversion process,
`if a conversion is executable. A third
`issue relates to the reliability of the conversion operation.
`Often, the conversion causes data loss.
`What is needed is a messaging method and system that
`provide an efficient and reliable exchange of attached liles in
`a multi-application environment.
`SUMMARY OF THE INVENTION
`
`A method and system for exchanging electronic
`messages, such as email messages, include out-tasking con-
`versions of file formats when it is determined that a client
`device does not include the resources to directly access an
`attachment without conversion. The access requirements of
`each attachment to electronic messages are compared to the
`capabilities of the client device to which the attachment is to
`be transferred. If it is detennined that a file-format conver-
`sion is required, the conversion operation is assigned to a
`server that supports the process of reformatting the attach-
`ment. In an email environment, the server may be substan-
`tially equivalent
`to the conventional email server, but
`includes enhanced conversion capabilities.
`In one embodiment,
`the determination of whether an
`attachment
`is accessible without conversion by a target
`client device occurs at the server. One means of enabling the
`server to execute the determination is to maintain a universal
`register of applications at the server. The universal register
`may be a lookup table that
`identities each application
`program stored at each client device supported by the server.
`The lookup table may also include data that matches each
`user (i.e., potential recipient} with a client device at which
`the user typically accesses messages (eg,
`a
`target
`computer). When a message is received at the server, the file
`format of any attachment is identified. In its simplest form,
`this is accomplished by looking at the file extension (e.g.,
`.BMt’ identities a bitmap graphics format and .Ml’E(J indi-
`cates a specific video format). Alternatively,
`the format
`indicator may be embedded by the sending party within the
`message that includes the attachment. As a third possibility,
`the server may access each attachment in order to identify its
`file format. If a
`file-format conversion is necessary,
`the
`conversion can be implemented at the server, thereby freeing
`resources and processing time at the target client device. In
`this embodiment, the conversion may be transparent to the
`receiving party.
`In another embodiment, the determination of whether an
`attachment
`is accessible without conversion occurs at the
`
`

`
`6,092,114
`
`3
`target client device. Conventionally, computers include a
`register of applications that are stored in memory. Such an
`application register may be used to automatically check
`attachment accessibility. If the client device is unable to
`access the attachment without conversion, a request may be
`transmitted to the server to perform the conversion. Many
`server protocols allow messages to be left on the server for
`a period of time after a download to a target client device
`(e.g., Post Olfice Protocol-l’()I’3). Thus, it is not necessary
`to upload the attachment in order to allow the conversion at
`the server. Following the conversion to a directly accessible
`File format, the attachment is again downloaded to the target
`client device.
`
`III
`
`15
`
`The out-tasking of the conversion operation to the local
`server may be utilized even if the target client device is
`capable of the llle-format conversion. By executing the
`conversion at the server, the process is completed ofl‘-line
`with respect to the user and the user’s client device. This
`frees the resources of the client device to perform other tasks
`and often saves time for the user.
`However. if neither the client device nor the local server
`is capable of performing the necessary conversion to allow
`file access by the target client device, the invention prefer-
`ably includes a step of transmitting a request to a remote
`server to perform the conversion. Typically,
`the remote *
`server is the message server that supports the exchange of
`messages for the person who originated the message having
`the attachment
`that
`requires conversion.
`In another
`embodiment, the server is maintained by an independent
`entity. For occasions in which the remote server is capable
`of converting the attachment, the format-converted file is
`returned to the local server for access by the recipient user.
`On the other hand, if the remote server cannot perform the
`conversion, the conversion request may he passed to the
`sending client device, attempting to trigger an automatic
`conversion andfor notifying the sender that this attachment
`was not accessed by the intended receiver.
`
`30
`
`35
`
`BRIE!’ DlESCRIP'I'I(JN OI? TIIIE DRAWINGS
`
`is a schematic view of one embodiment of a
`1
`FIG.
`message exchange system that provides file-format conver-
`sion in accordance with the invention.
`
`FIG. 2 is a process flow of one embodiment for carrying
`out the conversion process in the system of FIG. 1.
`FIG. 3 is a second embodiment ofa conversion process in
`accordance with the invention.
`
`DETAILED DESCRIPTION
`
`With reference to FIG. 1, a messaging system 10 is shown
`as including :1 local routerfscrver 12 for supporting access to
`stored messages by a number ofclient devices 14, 16 and 18.
`The routing operations of the routerlserver 12 are not the
`primary focus of the messaging system and method.
`Therefore, the routerfserver will be identified primarily as
`the local server. The structure of the server is not critical to
`the invention. Conventional message servers are used to
`store received messages and to provide access to the stored
`messages upon verification of a user identity. Such identi-
`fication generally requires input of a password that
`is
`specific to the user.
`The messaging system 10 may be used to exchange
`messages of any one of a variety of message types. For
`example, the messages may be downloads from a web site
`ofthe World Wide Wet), so that a link 20 to a network 22 is
`a connection to the global communications network referred
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`to as the Internet. However. the system and method will be
`described primarily with respect to the preferred embodi-
`ment ofexchanging email messages having file attachments.
`As is well known in the art, a person at a remote client
`device 24 may transmit an email message to a person who
`accesses email via the local server 12. The email message
`may be routed from the routerfserver 26 of the remote client
`device to the local server 12 via two communication links 20
`and 28 to the network 22. The email message may be
`accessed by the target user using any of the supported client
`devices 14, 16 and 18.
`In an Internet application of the system and method of
`exchanging email, the local and remote routerflscrvers l2 and
`26 are Internet Service Providers (ISPS). It is not critical that
`the sending and receiving client devices subscribe to ditfer-
`ent [SI’s. That is, the method to be described below may be
`utilized to provide lile-format conversion of an attachment
`to a message sent from one of the local client devices [4, 16
`and 18 to another one of the local client devices.
`
`The invention may also be used in a local area network or
`wide area network environment. For example, the network
`22 may be a corporate network of a single company having
`one or more sites.
`
`One concern in the exchange of electronic messages, such
`as email. is that attachments may have access requirements
`that are not within the immediate capabilities of a receiving
`client device 14, I6 and 18. For example, access to a video
`file that
`is attached to an email message may have a tile
`format
`that requires a receiving client device to have a
`specific application program, such as an MPEG player. If the
`receiving device does not include the necessary program,
`direct access is typically not possible. Thus,
`there is a
`possibility that the target user will not be able to display the
`attachment. Many client devices have programs with the
`capability of converting attachments from a limited number
`of inaccessible file formats to an acceptable tile format. A
`word processing document may be elliciently converted.
`However,
`if the attached file is large, such as an intra-
`corporation multimedia presentation of a new product
`release, the conversion process is likely to be time consum-
`ing. The process may dominate the resources of the client
`device, preventing a user from efficiently utilizing his or her
`time.
`
`The messaging system 10 of FIG. I provides an improve-
`ment ovcr the conventional system by providing a format
`converter 30 at
`the server level. Consequently,
`if it
`is
`determined that a file attachment to an electronic message
`includes an attachment
`that cannot be accessed without
`
`file-format conversion by the target client device 14, 16 and
`18, the conversion process may be out-tasked to the format
`converter 30. If the determination of the capabilities of the
`target client device occurs at the server level. the resources
`of the target device remain free during the entire process.
`That
`is, by providing a liormat check and a capability
`comparison at the local server 12, the process occurs while
`the target client device is off-line and the process is executed
`in a manner that is transparent to the target device. In this
`server-level embodiment, an application register 34 is uti-
`lized by the local server to monitor the access capabilities of
`each client device, as will be explained more fully below.
`The client devices may be individually polled to determine
`which file formats are accessible without conversion.
`Alternatively,
`the client devices may be programmed to
`provide updates regarding their capabilities.
`In another embodiment, the format check and the capa-
`bility comparison occurs at the target client device 14. 16
`
`

`
`6,092,114
`
`5
`and 18 at which the receiving party accesses the electronic
`message stored at the local server 12. If it is determined that
`the message attachment is inaccessible without conversion,
`a request is transmitted to the local server 12 to file—format
`convert the attachment at the converter 30. For example, a
`special protocol element
`1’ may be sent
`to request
`the
`conversion. Often, downloading an electronic message to a
`client device does not delete the storage of the message from
`the local server. For example, email servers based on the
`standard POP3 (Post Ollice Protocol) maintain a copy after
`download to a target client device. Thus. it is not necessary
`to upload the message to the local server 12 for conversion
`by the format converter 30.
`If the format converter 30 of the local server 12 is unable
`to convert the attached file, the message can he sent to the
`remote routerfs-erver 26 from which the message was origi-
`nally received. This may be necessary when the file format
`is unrecognized at the local server 12 and format converter
`30. As another possibility, the format converter may not have
`the programming algorithm for convening an attachment
`having a particular file fomtat.
`In the embodiment in which the compatibility comparison
`occurs at the client device level (rather than the server level),
`the special protocol element P that was originally generated
`at the target client device 14, 16 and 18 may be forwarded *
`from the local server L2 to the sending remote routerfserver
`26 to request the necessary manipulation of the attachment
`that is not locally convertible. The remote routerfserver 26 is
`connected to a second format converter 32. If the second
`format converter is capable of placing the attachment in a
`file format that is accessible by the target client device, the
`file format can be changed and the message can be retrans-
`mitted to the local server 12 for subsequent access by the
`target client device.
`(Jn the other hand,
`if the remote
`conversion is not successful, the routertserver 26 can return
`the message to the original client device 24.
`In some
`applications, the original client device may be automatically
`triggered to attempt
`to locally convert
`the attachment.
`llowever, in typical applications, the message to the origi-
`nating client device 24 is an infomtational message that the
`target client device was unable to read the attachment, so
`that the attachment should be resent in an accessible format.
`
`ll!
`
`15
`
`30
`
`35
`
`40
`
`The protocol elements and messages described above can
`be designed and implemented in a manner in which they are
`buried in text fonnat within the electronic message. Thus,
`any intermediary servers are unlikely to recognize the con-
`version requests. If the protocol message is human readable.
`it can arrive at
`the sender's message box of the remote
`routerfserver 26 for subsequent viewing by the sender.
`In the embodiment of FIG. 1, the client devices 14,16. 18
`and 24 are shown as being computers. However, this is not
`critical. In the email application, the client devices may be
`any device that is used to access email, either by means of
`wired transmission or wireless transmission.
`
`The attachments to the messages may be simple word
`processing documents. However,
`the invention is more
`benelicial if the conversion complexity and time consump-
`tion are greater than the complexity and time consumption
`typically associated with converting a word processing
`document. For example,
`the attachment may he audio
`embedded into an email message, with the audio file requir-
`ing a specific player. In other examples, the attachments may
`be video files or graphic files or a multimedia presentation.
`The application in which the format check of an attach-
`ment and the access-capability assessment occur at
`the
`server level will be described with reference to FIGS. 1 and
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`2. In a lirst step 36, a lile is attached to an electronic
`message. In the preferred embodiment, the message is an
`email message having a file attachment. With reference to
`FIG. 1, step 36 may he executed at the remote client device
`24.
`
`In step 38, the electronic message is transmitted from the
`remote client device 24 to the local server 12.. At step 40, the
`local server receives the message and preferably stores the
`message in memory, using techniques well known in the art.
`For example, each subscriber of an ISP is assigned an email
`mailbox into which messages directed to the subscribe!’ are
`stored. The mailbox system is carried out in software. A
`similar system is implemented within a corporate environ-
`ment
`in which email and other electronic messages are
`exchanged within a corporate firewall. Thus, the message
`and attachment may be generated at one of the local client
`devices 14, 16 and 18 for access at another local client
`device.
`
`In step 42, the lite format of the attachment is identified
`at the server level. In its simplest form, this may merely be
`a check of the file extension of the attachment. For example,
`.BMP identifies a bitmap graphics format and .Ml-"l:lG iden-
`tifics a specific video format. As another format indicator,
`there may be an identifier that is intentionally embedded by
`the sending party within the message to indicate the tile
`format of the attachment. As a third alternative, the server
`may attempt to access the attachment in order to identify its
`file format. Other approaches to checking the tile format
`may also be implemented.
`At step 44,
`the access capabilities of the target client
`device 14, 16 and 18 are determined. Referring to FIG. 1, an
`application register 34 may be maintained at the server level.
`As is well known in the art, computers typically maintain an
`application register of programs stored at the computer. 'I'l'tc
`application register 34 of FIG. 2 may be considered to be a
`universal application register that identifies all of the access
`capabilities of various client devices that are used to access
`email stored at the local server 12. In one embodiment, the
`application register is maintained as a lookup table. When a
`client device is lirst used to access email stored at the local
`
`the client device is polled to identify its access
`server.
`capabilities. The polling process may also be used to peri-
`odically update a lookup table that
`is compiled within
`memory of the server or within memory of an adjunct
`device. While the format converter 30 and the application
`register 34 are shown as being connected to the local server
`12,
`the operations of the converter and register may be
`integrated into known servers. As an alternative to the
`polling approach, the client devices 14, 16 and 18 may be
`programmed to identify their individual access capabilities
`each time that a program is upgraded or added to the client
`device.
`
`is determined whether the attachment is
`it
`At step -1-6,
`accessible at the target client device without conversion. If
`the attachment is accessible without conversion, the mes-
`sage is transmitted to the target client at step 48. This
`transmission is a conventional download step and its execu-
`tion is not critical
`to the invention. Optionally,
`if it
`is
`determined that
`the attachment
`is inaccessible without
`conversion, the message may nevertheless be transmitted to
`the client, if there is a determination that the conversion is
`neither complex nor time consuming. For example, a short
`word processing document may be forwarded to the target
`client device despite a conversion requirement.
`ll‘ at step 46 it is determined that there is an incompat-
`ibility between the access requirements of the attachment
`
`

`
`6,092,114
`
`ill
`
`15
`
`7
`and the direct access capabilities of the target client device,
`the process proceeds to step 50 for a determination of
`whether the attachment is locally convertible. If the attach-
`ment is locally convertible, the file—format change is imple-
`mented at step 52 and the message is made accessible to the
`target client device at step 48. Preferably, the checking steps
`42 and 44,
`the determining steps 46 and 50, and the
`conversion step 52 are implemented without intervention by
`the target client device. Thus, the process occurs “off-line"
`with respect to the target client device. This frees the client
`device to operate in other capacities.
`The file format conversion at step 52 is executed using
`known techniques. Conventionally, computer software is
`utilized to change an attachment from one file format
`to
`another. However, if the format converter 30 of FIG. I is
`incapable of providing the conversion, because the file
`format is unrecognizable or because the format converter is
`not programmed to provide a particular conversion,
`the
`conclusion at step 52 is that the attachment is not locally
`convertible. In this situation, a request
`is generated and
`transmitted from the local server 12 to the sending remote
`routeriserver 26. The request includes instructions to convert
`the attachment to an accessible file format. For example, at
`step 54, a special protocol element 1’ may be generated and
`transmitted to the remote server to determine whether the
`remote format converter 32 has capabilities beyond that of “
`the local system.
`Ideally, at step 56.
`the attachment
`is
`reformatted remotely and the local server 12 receives the
`message with a converted attachment, which is made avail-
`able to the target client device at step 48. However, if neither
`the local system nor the remote system is capable of pro-
`viding an accessible attachment, the protocol message may
`be forwarded to the originating client device 24. As previ-
`ously noted, the forwarded protocol message may be used
`merely to inform the sending party that the attachment was
`not received and displayed at a client device. Alternatively,
`the protocol message may be formatted to trigger an auto-
`matic conversion and retransmission ofthe attachment in an
`alternative file format.
`
`30
`
`35
`
`Reference will be made to FIGS. 1 and 3 in describing the
`embodiment in which the format check and the access-
`capability determination occur at the target client device 14,
`16 and 18. Steps 36, 38 and 40 are identical to the process
`described with reference to FIG. 2. Thus. a file is attached to
`a message at a sending client device 24 and the message is
`received at the local server 12. The message is stored for
`access by the user at one of the local client devices 14, 16
`and 18. When access is requested, the message is transmitted
`to the client device at step 58.
`A file fonnat check occurs at the target client device in
`step 60. Some of the possible approaches to performing the
`check were described with reference to step 42 in FIG. 2. For
`example, the format check may merely be an identification
`of the tile extension.
`
`After the file format has been identified, in step 62 it is
`determined whether the attachment
`is directly accessible,
`i.e., whether the attachment is accessible without conver-
`sion. If the attachment
`is directly accessible,
`the file is
`displayed at step 64. On the other hand, a determination that
`the attachment is inaccessible without conversion triggers a
`transmission of a request to the local server l2 at step 66.
`The request may be the above-identified protocol element F.
`The request includes instructions to convert the attachment
`to a particular accessible file format.
`In the determination step 68, the ability of performing the
`requested manipulation at the format converter 30 is ascer-
`tained. If the ability exists, the process is implemented at
`step 70. Preferably,
`the message and attachment remain
`stored at the local server. so that the conversion can take
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`8
`place without an upload of the message from the target client
`device to the local server. Following the lile-format change
`at step 70,
`the message is again accessible to the client
`device at step 72, but with the attachment in a directly
`accessible file format.
`
`a negative
`Returning to the determination step 68,
`response to the capability of executing a local conversion
`will
`trigger a
`transmission of a request
`to the remote
`routerlserver 26 from which the message was received. This
`is shown at step 74. if the remote format converter 32 is
`capable of performing the requested reformatting operation,
`the reformatted attachment is transmitted to the local server
`12 at step 76. The reformatted attachment may then be
`transmitted to the target client device at step 72 for display
`at step 64. On the other hand, if the reformatting operation
`cannot be executed, the request is forwarded to the origi-
`nating client device 24. As previously noted, this request
`may merely be informational or may be used to automati-
`cally trigger a desired operation at the remote client device,
`such as a reformatting operation. The protocol message can
`be designed in a way that the protocol element P is buried
`in text format in an email message that is human readable,
`so that intermediary servers do not recognize the conversion
`request as the request is forwarded to the sender’s server.
`While the invention has been described primarily with
`respect
`to email
`transmissions,
`this is not critical. The
`system and method may be used in other applications.
`Moreover, it is anticipated that servers will be dedicated to
`the attachment conversion. Web sites may also performs
`these functions, so that unresolved requests for conversion
`may be sent to a conversion service that is outside of the
`sender-t0—receiver transmission path. That
`is,
`the format
`converter 30 may be maintained by a private company that
`provides service to subscribing companies or individuals.
`What is claimed is:
`
`1. A method of providing message exchange capability for
`a plurality of users comprising steps of:
`receiving electronic messages at a server that supports
`message access by said users, including receiving first
`electronic messages having attachments in file formats
`that are each specific to one of a plurality of applica-
`tions;
`identifying capabilities. of client devices with respect to
`accessing said attachments without conversion from an
`original file format to a second file for

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket